QB - IoT (AutoRecovered)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Q 1) What is IoT and digitization?

Ans: IOT AND DIGITIZATION


IoT and digitization are terms that are often used interchangeably.
In most contexts, this duality is fine, but there are key differences to be aware of.
At a high level, IoT focuses on connecting “things,” such as objects and machines, to a
computer network, such as the Internet. IoT is a well-understood term used across the
industry as a whole
On the other hand, digitization can mean different things to different people but generally
encompasses the connection of “things” with the data they generate and the business insights
that result.
Example
In a shopping mall where Wi-Fi location tracking has been deployed, the “things” are the Wi-
Fi devices.
Wi-Fi location tracking is simply the capability of knowing where a consumer is in a retail
environment through his or her smart phone’s connection to the retailer’s Wi-Fi network.
Tracking real-time location of Wi-Fi clients provides a specific business benefit to the mall
and shop owners.
In this case, it helps the business understand where shoppers tend to congregate and how
much time they spend in different parts of a mall or store.  Analysis of this data can lead to
significant changes to the locations of product displays and advertising, where to place
certain types of shops, how much rent to charge, and even where to station security guards.
Digitization, as defined in its simplest form, is the conversion of information into a digital
format.
For example, the whole photography industry has been digitized  The video industry
Transportation industry - Uber
In the context of IoT, digitization brings together things, data, and business process to make
networked connections more relevant and valuable Example
Home automation with popular products, such as Nest.
With Nest, sensors determine your desired climate settings and also tie in other smart objects,
such as smoke alarms, video cameras, and various third-party devices.
In the past, these devices and the functions they perform were managed and controlled
separately and could not provide the holistic experience that is now possible.

Q.2) Different challenges in IoT.


Ans:-
Challenges with IoT
Security – While the explosion in connected devices has brought seemingly limitless
opportunities, progress remains tempered by security challenges in both the enterprise and
consumer space. New research shows that the growing number of devices because of the IoT
will see the global spend on cyber security technology surpass $1.8 billion by 2020.
High profile hacks and breaches may provide intermittent wake up calls, but the reality is that
security remains an afterthought in much of the design of applications exacerbated by the
small size of most embedded devices.
Designed for low power consumption with limited connectivity, their often low cost and
disposable nature remains a barrier to the incorporation of encryption and other more robust
security measures.
Not surprisingly, establishing a standardized security protocol to address the scope and
diversity of the devices has become the Holy Grail as the IoT market matures. Solutions that
can secure both the device and network while avoiding the kind of draconian interventions
that become a barrier to engagement and creativity is a central challenge.
Apple’s response in the form of its smart home accessories line, Homekit, is one option
trying to negotiate this tightrope. In a unique move for the connected home platform, the tech
titan is shunning the cloud completely and exerting further control by insisting other
manufacturers that work with the products must incorporate Apple’s approved micro-
controller for a sufficient level of encryption and security,
A simple punch in code aims to negate the usual complexity of IoT device set up processes,
while a natural language interface will enable able to give commands to devices all over their
home as if they were talking to another person in the room. It’s a feature aligned to the
increasingly naturalistic interaction that users are demanding.
OR

Challenges with IoT


The Internet Of Things has been facing many areas like Information Technology, Healthcare,
Data Analytics and Agriculture.The main focus is on protecting privacy as it is the primary
reason for other challenges including government participation. Integrated effort from the
government, civil society and private sectors would play a vital role in protecting the
following values given below in to prevent IoT from getting hampered:
Scalability:
Billions of internet-enabled devices get connected in a huge network, large volumes of data
are needed to be processed. The system that stores, analyses the data from these IoT devices
needs to be scalable. In present, the era of IoT evolution everyday objects are connected with
each other via Internet. The raw data obtained from these devices need big data analytics and
cloud storage for interpretation of useful data.
Interoperability:
Technological standards in most areas are still fragmented. These technologies need to be
converged. Which would help us in establishing a common framework and the standard for
the IoT devices. As the standardization process is still lacking, interoperability of IoT with
legacy devices should be considered critical. This lack of interoperability is preventing us to
move towards the vision of truly connected everyday interoperable smart objects.
Lack of government support:
Government and Regulatory bodies like FDA should come up and bring up regulations by
setting up a standard committee for safety and security of devices and people.
Safety Of Patients:
Most Of IoT devices are left unattended, as they are connected with real-world objects. If
used on patients as wearable devices, any technical error in security can be life-threatening
for patient.
Security And Personal Privacy:
There has been no research in security vulnerabilities and its improvements. It should ensure
Confidentiality, Integrity and Availability of personal data of patient.
Design Based Challenge:
With the development in technology design challenges are increasing at a faster rate. There
have been issues regarding design like limited computation power, limited energy and limited
memory which need to be sorted out.

Q.3) Explain smart creatures.

Q 4) The oneM2M IoT Standardized Architecture

In an effort to standardize the rapidly growing field of machine-to-machine (M2M)


communications, the European Telecommunications Standards Institute (ETSI) created the
M2M Technical Committee in 2008. The goal of this committee was to create a common
architecture that would help accelerate the adoption of M2M applications and devices. Over
time, the scope has expanded to include the Internet of Things.

One of the greatest challenges in designing an IoT architecture is dealing with the
heterogeneity of devices, software, and access methods. By developing a horizontal platform
architecture, oneM2M is developing standards that allow interoperability at all levels of the
IoT stack.
The oneM2M architecture divides IoT functions into three major domains: the application
layer, the services layer, and the network layer

▪ Applications layer: The oneM2M architecture gives major attention to connectivity


between devices and their applications. This domain includes the application-layer
protocols and attempts to standardize northbound API definitions for interaction with
business intelligence (BI) systems. Applications tend to be industry-specific and have
their own sets of data models, and thus they are shown as vertical entities.
▪ Services layer: This layer is shown as a horizontal framework across the vertical
industry applications. At this layer, horizontal modules include the physical network that
the IoT applications run on, the underlying management protocols, and the hardware.
Examples include backhaul communications via cellular, MPLS networks, VPNs, and so
on. Riding on top is the common services layer.
▪ Network layer: This is the communication domain for the IoT devices and endpoints. It
includes the devices themselves and the communications network that links them.
Embodiments of this communications infrastructure include wireless mesh technologies,
such as IEEE 802.15.4, and wireless point-to-multipoint systems, such as IEEE
801.11ah.
Q 5) The IoT World Forum (IoTWF) Standardized Architecture.
Ans:
IoT World Forum (IoTWF) Standardized Architecture. • Defines set of levels with control
flowing from. the center (cloud service or dedicated data. center), to the edge.
This seven-level framework aims to help educate CIOs, IT departments, and developers on
deployment of IoT projects, and accelerate the adoption of IoT.

Using this reference model, we are able to achieve the following:


• Decompose the IoT problem into smaller parts
• Identify different technologies at each layer and how they relate to one another
• Define a system in which different parts can be provided by different vendors
• Have a process of defining interfaces that leads to interoperability
• Define a tiered security model that is enforced at the transition points between levels
Layer 1: Physical Devices and Controllers Layer
• The various endpoint devices and sensors that send and receive information
• The size of these “things” can range from almost microscopic sensors to giant
machines in a factory.
• Their primary function is generating data and being capable of being queried and/or
controlled over a network.
Layer 2: Connectivity Layer
• The most important function of this IoT layer is the reliable and timely transmission
of data.
• More specifically, this includes transmissions between Layer 1 devices and the
network and between the network and information processing that occurs at Layer 3
(the edge computing layer).

Layer 3: Edge Computing Layer Fog layer At this layer, the emphasis is on data
reduction and converting network data flows into information that is ready for storage and
processing by higher layers One of the basic principles of this reference model is that
information processing is initiated as early and as close to the edge of the network as possible
Another important function that occurs at Layer 3 is the evaluation of data to see if it can
be filtered or aggregated before being sent to a higher layer This also allows for data to be
reformatted or decoded, making additional processing by other systems easier

Q 6) Difference between oneM2M & IoT WF.

Basis of IoT M2M

Abbreviation Internet of Things Machine to Machine


Basis of IoT M2M

Devices have objects that are Some degree of intelligence is


Intelligence responsible for decision making observed in this

Connection type The connection is via Network and The connection is a point to
used using various communication types. point

Traditional protocols and


Communication Internet protocols are used such communication technology
protocol used as HTTP, FTP, and Telnet. techniques are used

Data is shared between other


applications that are used to improve Data is shared with only the
Data Sharing the end-user experience. communicating parties.

Internet connection is required for Devices are not dependent on


Internet communication the Internet.

A large number of devices yet scope


Scope is large. Limited Scope for devices.

Business 2 Business(B2B) and


Business Type used Business 2 Consumer(B2C) Business 2 Business (B2B)

There is no support for Open


Open API support Supports Open API integrations. Api’s

Smart wearables, Big Data and Cloud, Sensors, Data and Information,
Examples etc. etc.

Q) Difference between edge and Fog

S.NO. EDGE COMPUTING FOG COMPUTING

Highly scalable when compared to edge


01. Less scalable than fog computing. computing.

02. Billions of nodes are present. Millions of nodes are present.

03. Nodes are installed far away from Nodes in this computing are installed closer
S.NO. EDGE COMPUTING FOG COMPUTING

the cloud. to the cloud(remote database where data is


stored).

Edge computing is a subdivision Fog computing is a subdivision of cloud


04. of fog computing. computing.

The bandwidth requirement is The bandwidth requirement is high. Data


very low. Because data comes originating from edge nodes is transferred to
05. from the edge nodes themselves. the cloud.

06. Operational cost is higher. Operational cost is comparatively lower.

High privacy. Attacks on data are


07. very low. The probability of data attacks is higher.

Edge devices are the inclusion of


the IoT devices or client’s
08. network. Fog is an extended layer of cloud.

The power consumption of nodes filter


important information from the massive
The power consumption of nodes amount of data collected from the device
09. is low. and saves it in the filter high.

Edge computing helps devices to Fog computing helps in filtering important


get faster results by processing the information from the massive amount of
data simultaneously received from data collected from the device and saves it
10. the devices. in the cloud by sending the filtered data.

Q. What are the different types of sensors?


Ans:
IoT Sensor Types
Sensors are designed to respond to specific types of conditions in the physical world, and
then generate a signal (usually electrical) that can represent the magnitude of the condition
being monitored. Those conditions may be light, heat, sound, distance, pressure, or some
other more specific situation, such as the presence or absence of a gas or liquid. The common
IoT sensors that will be employed include:

Temperature sensors
Pressure sensors
Motion sensors
Level sensors
Image sensors
Proximity sensors
Water quality sensors
Chemical sensors
Gas sensors
Smoke sensors
Infrared (IR) sensors
Acceleration sensors
Gyroscopic sensors
Humidity sensors
Optical sensors
A description of each of these sensors is provided below.

Temperature sensors
Temperature sensors detect the temperature of the air or a physical object and concert that
temperature level into an electrical signal that can be calibrated accurately reflect the
measured temperature. These sensors could monitor the temperature of the soil to help with
agricultural output or the temperature of a bearing operating in a critical piece of equipment
to sense when it might be overheating or nearing the point of failure.

Pressure sensors
Pressure sensors measure the pressure or force per unit area applied to the sensor and can
detect things such as atmospheric pressure, the pressure of a stored gas or liquid in a sealed
system such as tank or pressure vessel, or the weight of an object.

Motion sensors
Motion sensors or detectors can sense the movement of a physical object by using any one of
several technologies, including passive infrared (PIR), microwave detection, or ultrasonic,
which uses sound to detect objects. These sensors can be used in security and intrusion
detection systems, but can also be used to automate the control of doors, sinks, air
conditioning and heating, or other systems.

Level sensors
Level sensors translate the level of a liquid relative to a benchmark normal value into a
signal. Fuel gauges display the level of fuel in a vehicle’s tank, as an example, which
provides a continuous level reading. There are also point level sensors, which are a go-no/go
or digital representation of the level of the liquid. Some automobiles have a light that
illuminates when the fuel level tank is very close to empty, acting as an alarm that warns the
driver that fuel is about to run out completely.

Image sensors
Image sensors function to capture images to be digitally stored for processing. License plate
readers are an example, as well as facial recognition systems. Automated production lines can
use image sensors to detect issues with quality such as how well a surface is painted after
leaving the spray booth.

Proximity sensors
Proximity sensors can detect the presence or absence of objects that approach the sensor
through a variety of different technology designs. These approaches include:
• Inductive technologies which are useful for the detection of metal objects
• Capacitive technologies, which function on the basis of objects having a different
dielectric constant than that of air
• Photoelectric technologies, which rely on a beam of light to illuminate and reflect
back from an object, or
• Ultrasonic technologies, which use a sound signal to detect an object nearing the
sensor

Water quality sensors


The importance of water to human beings on earth not only for drinking but as a key
ingredient needed in many production processes dictates the need to be able to sense and
measure parameters around water quality. Some examples of what is sensed and monitored
include:
• chemical presence (such as chlorine levels or fluoride levels)
• oxygen levels (which may impact the growth of algae and bacteria)
• electrical conductivity (which can indicate the level of ions present in water)
• pH level (a reflection of the relative acidity or alkalinity of the water)
• turbidity levels (a measurement of the number of suspended solids in water)

Chemical sensors
Chemical sensors are designed to detect the presence of specific chemical substances which
may have inadvertently leaked from their containers into spaces that are occupied by
personnel and are useful in controlling industrial process conditions.

Gas sensors
Related to chemical sensors, gas sensors are tuned to detect the presence of combustible,
toxic, or flammable gas in the vicinity of the sensor. Examples of specific gases that can be
detected include:
Bromine (Br2)
Carbon Monoxide (CO)
Chlorine (Cl2)

Smoke sensors
Smoke sensors or detectors pick up the presence of smoke conditions which could be an
indication of a fire typically using optical sensors (photoelectric detection) or ionization
detection.

Infrared (IR) sensors


Infrared sensor technologies detect infrared radiation that is emitted by objects. Non-contact
thermometers make use of these types of sensors as a way of measuring the temperature of an
object without having to directly place a probe or sensor on that object. They find use in
analyzing the heat signature of electronics and detecting blood flow or blood pressure in
patients.

Acceleration sensors
While motion sensors detect movement of an object, acceleration sensors, or accelerometers
as they are also known, detect the rate of change of velocity of an object. This change may be
due to a free-fall condition, a sudden vibration that is causing movement with speed changes,
or rotational motion (a directional change). One of several technologies that are employed in
acceleration sensors include:

Hall-effect sensors (which rely on measuring changes in magnetic fields)


Capacitive sensors (which depend on measuring changes in voltage from two surfaces)
Piezoelectric sensors (which generate a voltage that changes based on pressure from
distortion of the sensor)

Gyroscopic sensors
Gyroscopes or gyroscopic sensors are used to measure the rotation of an object and determine
the rate of its movement called the angular velocity, using a 3-axis system. These sensors
enable the determination of the object’s orientation without having to visibly observe it.

Humidity sensors
Humidity sensors can detect the relative humidity of the air or other gas, which is a measure
of the amount of water vapor contained in that gas. Controlling environmental conditions is
critical in the production processes of materials and humidity sensors enable readings to be
taken and changes made to mitigate increasing or decreasing levels. A common application is
in HVAC systems to maintain desired comfort levels.

Optical sensors
Optical sensors respond to light that is reflected off of an object and generate a corresponding
electrical signal for use in detecting or measuring a condition. These sensors work by either
sensing the interruption of a beam of light or its reflection caused by the presence of the
object. The types of optical sensors include:
• Through-beam sensors (which detect objects by the interruption of a light beam as the
object crosses the path between a transmitter and remote receiver)
• Retro-reflective sensors (which combine transmitter and receiver into a single unit
and use a separate reflective surface to bounce the light back to the device)
• Diffuse reflection sensors (which operate similarly to retro-reflective sensors except
that the object being detected serves as the reflective surface)
Q) Draw the architecture of the wireless sensor network.

Wireless Sensor Network Architecture

Application Layer
The application layer is liable for traffic management and offers software for numerous
applications that convert the data in a clear form to find positive information. Sensor
networks arranged in numerous applications in different fields such as agricultural, military,
environment, medical, etc.
Transport Layer
The function of the transport layer is to deliver congestion avoidance and reliability where a
lot of protocols intended to offer this function are either practical on the upstream. These
protocols use dissimilar mechanisms for loss recognition and loss recovery. The transport
layer is exactly needed when a system is planned to contact other networks.
Providing a reliable loss recovery is more energy-efficient and that is one of the main
reasons why TCP is not fit for WSN. In general, Transport layers can be separated into
Packet driven, Event-driven. There are some popular protocols in the transport layer namely
STCP (Sensor Transmission Control Protocol), PORT (Price-Oriented Reliable Transport
Protocol and PSFQ (pump slow fetch quick).
Network Layer
The main function of the network layer is routing, it has a lot of tasks based on the
application, but actually, the main tasks are in the power conserving, partial memory, buffers,
and sensor don’t have a universal ID and have to be self-organized.
The simple idea of the routing protocol is to explain a reliable lane and redundant lanes,
according to a convincing scale called a metric, which varies from protocol to protocol. There
are a lot of existing protocols for this network layer, they can be separated into; flat routing
and hierarchal routing or can be separated into time-driven, query-driven & event-driven.
Data Link Layer
The data link layer is liable for multiplexing data frame detection, data streams, MAC, &
error control, confirm the reliability of point–point (or) point– multipoint.
Physical Layer
The physical layer provides an edge for transferring a stream of bits above the physical
medium. This layer is responsible for the selection of frequency, generation of a carrier
frequency, signal detection, Modulation & data encryption. IEEE 802.15.4 is suggested as
typical for low rate particular areas & wireless sensor networks with low cost, power
consumption, density, the range of communication to improve the battery life. CSMA/CA is
used to support star & peer to peer topology. There are several versions of IEEE 802.15.4.V.
The main benefits of using this kind of architecture in WSN is that every node involves
simply in less-distance, low- power transmissions to the neighboring nodes due to which
power utilization is low as compared with other kinds of sensor network architecture. This
kind of network is scalable as well as includes a high fault tolerance.

You might also like