IoT Unit - 03
IoT Unit - 03
Ans. : -
IoT networking is the foundation of the Internet of Things (IoT) ecosystem and
enabling devices to communicate and share data.
IoT networking involves connecting various devices and sensors to the internet to
collect and exchange data.
IoT network uses protocols like MQTT or HTTP for communication, with devices using
such as Wi-Fi, Bluetooth or cellular networks to connect.
These are the physical components of the IoT network (such as sensors, actuators
and motion detectors) that collect data from the environment and transmit over
networks. Sensors can measure various parameters such as temperature, humidity,
motion, light, and more. Devices can be simple sensors to complex machinery and
appliances.
2) Network Connectivity : -
Connectivity enables communication between IoT devices and other components of the
system. It includes various networking technologies such as Wi-Fi, Bluetooth,
Zigbee, cellular, LoRaWAN and cellular networks (3G, 4G, or 5G).
3) Communication Protocols : -
IoT devices use communication protocols to transmit data over networks. Common
protocols include MQTT (Message Queuing Telemetry Transport), CoAP (Constrained
Application Protocol) and HTTP (Hypertext Transfer Protocol).
4) Cloud Services/Platforms : -
Cloud platforms provide storage, processing, and management services for IoT data.
They offer scalability, reliability, and accessibility from anywhere with the
internet. Cloud platforms also facilitate data visualization, real-time monitoring,
and integration with other systems.
User Interface (UI) enables user to interact with IoT systems, visualize data, and
control devices. User Interfaces can be mobile apps and web dashboards to command-
line interfaces (CLIs) and voice-controlled systems.
6) Security Mechanisms : -
Security is crucial in IoT systems to protect data privacy, prevent unauthorized
access and ensure the integrity of devices and communications. Security measures
may include encryption, authentication, access control, secure bootstrapping,
firmware updates and intrusion detection systems.
Ans. : -
Security remains a primary concern in IoT due to the vast number of interconnected
devices and the potential for data breaches, unauthorized access, and cyberattacks.
It ensures the security measures such as encryption, authentication, access control
and secure firmware updates are essential to protect IoT systems and data.
IoT deployment is grows in large amount, so managing and maintaining large numbers
of interconnected devices becomes more challenging and arise issues such as network
blocking, data overload, device management, and resource limitations.
3) Data Management : -
IoT generates vast amounts of data from diverse sources including sensors, devices,
and systems. Managing, processing, and analyzing this data in real-time to extract
valuable data presents serious challenges in terms of data storage, processing and
latency.
IoT applications often require high levels of reliability and resilience to ensure
continuous operations. Network connectivity, device failures, environmental
conditions and power consumption all of these factors can affect the reliability
and resilience of IoT systems.
Ans. : -
It is known for its features such as low power consumption, extended battery life,
mesh networking capabilities, short range and low data rate communication and cost-
effectiveness.
In IEEE 802.15.4 technology has 20 to 250 kbps data rate and its range lies between
10 to 100 meters.
In IEEE 802.15.4 technology, Mesh and Star network topologies are used to connect
devices, where Mesh topology enables direct communication between devices without
central node and Star topology has all devices, who can communicate with a central
node.
IEEE 802.15.4 technology offers benefits such as low power consumption and extended
battery life, low cost and simple implementation, limited data transmission rate
and limited range.
Ans. : -
It operates in the 2.4 GHz ISM band and is commonly used in IoT (Internet of
Things) deployments due to its reliability, low power consumption, and support for
mesh networking.
Zigbee defines a set of specifications for the Physical Layer (PHY), Medium Access
Control (MAC) layers, Network and Application layers.
Types of ZigBee : -
1) Zigbee 3.0 : -
Zigbee 3.0 is the latest version of the Zigbee standard, designed to unify various
Zigbee profiles into a single interoperable ecosystem. It provides backward
compatibility with previous Zigbee standards and supports enhanced security
features.
Zigbee Green Power is a variant of Zigbee designed for ultra-low-power devices that
operate without batteries or with long battery life. It utilizes energy harvesting
techniques, such as kinetic energy or solar power, to operate sensor nodes and
switches without depend on batteries.
Zigbee Light Link is a Zigbee profile specifically designed for lighting control
applications, such as smart bulbs, switches, and dimmers.
It defines standardized commands and behaviors for interoperable communication
between lighting devices.
4) Zigbee Home Automation (ZHA) : -
Zigbee Home Automation is a Zigbee profile focused on home automation and smart
home applications. It provides standardized device classes, commands, and
interoperability guidelines for various smart home devices, including thermostats,
door locks, sensors, and actuators.
Zigbee Smart Energy is a Zigbee profile introduced for energy management and
utility metering applications. It enables communication between smart meters,
energy management systems, and consumer devices to optimize energy usage and
monitor power consumption.
Ans. : -
It enables the transmission of IPv6 packets over limited wireless networks, such as
IEEE 802.15.4-based networks.
Functionality of 6LoWPAN : -
1) IPv6 Integration : -
6LoWPAN enables the use of IPv6 addresses in IoT devices, allowing them to
communicate with other IPv6-enabled devices and services on the internet.
2) Header Compression : -
Header Compression reduces the overhead of IPv6 packet headers to satisfy the
limitations of low-power wireless networks. By compressing IPv6 headers, 6LoWPAN
optimizes packet size, reduces transmission overhead and conserves bandwidth,
essential for IoT devices with limited data rates and energy resources.
3) Mesh Networking : -
4) Application Support : -
Ans. : -
In the context of IoT (Internet of Things), RFID plays a crucial role in connecting
physical objects to digital networks and enables entire data collection,
monitoring, and management.
1) Automatic Identification : -
RFID enables automatic identification of objects or assets without the need for
line-of-sight or manual scanning. RFID tags attached to items. RFID tags are small
electronic devices that consist of an integrated circuit (chip) and an antenna.
2) Unique Identification : -
Each RFID tag is embedded with a unique identifier (ID) and enables individual
items to be uniquely identified from one to another. This feature is essential for
asset tracking and product authentication in IoT applications.
3) Real-time Tracking : -
RFID technology enables real-time tracking of objects as they move through various
stages of production, distribution, and usage. By continuously monitoring the
location and status of assets, organizations can optimize workflows, reduce losses
and improve efficiency.
4) Data Storage : -
RFID tags can store additional data over the unique identifier, such as product
specifications, manufacturing dates, batch numbers, or maintenance records.
RFID systems can be entirely integrated with IoT platforms and cloud-based services
and enables for centralized management, data analytics, and automation.
RFID technology offers features for security and privacy, such as encryption,
authentication, and access control. These features help prevent unauthorized access
to RFID data and ensure the integrity and confidentiality of sensitive information
The working principle of RFID (Radio Frequency Identification) involves three main
components : - RFID tags, RFID readers, and a Backend System.
1) RFID Tags : -
RFID tags consist of an integrated circuit (chip) and an antenna. Each tag is
programmed with a unique identifier (ID) and may also contain additional data.
Active RFID tags have their own power source (battery) and can transmit data over
longer distances. On the other hand, Passive RFID tags do not have their own power
source and are powered by the radio frequency energy released by RFID readers.
2) RFID Readers : -
RFID readers releases radio waves and receive signals from RFID tags within their
vicinity. When an RFID tag enters the range of an RFID reader, it detects the
reader's signal and responds by transmitting its unique ID and any additional data
stored on the tag's memory. RFID readers capture this information and relay it to a
backend system for processing.
3) Backend System: -
The backend system receives data from RFID readers and processes it to perform
various tasks, such as inventory management, asset tracking, access control, or
authentication.
Ans. : -
1) Communication Range : -
NFC operates over a very short range, typically less than 10 centimeters. This
close proximity requirement ensures secure communication and prevents interference
from nearby devices, making NFC suitable for applications requiring close
interaction between devices.
2) Communication Modes : -
NFC supports three communication modes: peer-to-peer mode, reader/writer mode, and
card emulation mode. In peer-to-peer mode, two NFC-enabled devices can exchange
data bidirectionally. In reader/writer mode, an NFC-enabled device can read
information from NFC tags. In card emulation mode, an NFC-enabled device can
emulate an NFC tag, allowing it to interact with NFC readers.
3) Security : -
NFC incorporates security features to protect data exchange between devices. These
include encryption, mutual authentication, and data integrity checks, ensuring that
NFC transactions are secure and tamper-resistant.
4) Ease of Use : -
5) Application in IoT : -
In IoT applications, NFC enables seamless interaction between physical objects and
digital systems. NFC tags embedded in IoT devices, products, or assets can store
unique identifiers, product information, or URLs, allowing users to access relevant
data or services by tapping their NFC-enabled devices near the tags.
NFC is widely supported by smartphones, tablets, and other mobile devices, making
it easy to incorporate NFC functionality into IoT solutions. Mobile applications
can support NFC technology to interact with IoT devices, exchange data, and enable
user engagement and functionality of IoT applications.
Ans. : -
WSNs consist of sensors that can measure physical parameters such as temperature,
humidity, pressure, light, sound, motion, or chemical concentrations.
WSNs sensor nodes can communicate wirelessly with each other devices using wireless
communication protocols such as Zigbee, Bluetooth, Wi-Fi, or LoRaWAN.
WSN provide raw data from different devices to cloud platform. This cloud platform,
stores it, processes it, and provides analytical data to end-users or applications.
Application of WSNs : -
1) Environmental Monitoring : -
WSNs are used for environmental monitoring applications such as air quality
monitoring, water quality monitoring, weather forecasting, and natural disaster
detection. Sensor nodes deployed in environmental monitoring networks collect data
on temperature, humidity, air pollution levels, and other parameters.
2) Smart Agriculture : -
WSNs are deployed in industrial settings for monitoring and controlling various
processes and equipment. Sensor nodes collect data on machine performance, energy
consumption, temperature, and vibration levels, allowing for predictive
maintenance, process optimization, and energy efficiency improvements in factories
and manufacturing facilities.
WSNs enable remote health monitoring and medical diagnostics through wearable
devices and smart healthcare systems. Sensor nodes embedded in wearable devices
collect biometric data such as heart rate, blood pressure, and activity levels,
enabling continuous health monitoring and early detection of health issues.
5) Smart Cities : -
WSNs play a crucial role in smart city initiatives by monitoring and managing urban
infrastructure, transportation systems, and public services. Sensor nodes deployed
throughout the city collect data on traffic flow, parking availability, air
quality, noise pollution, and waste management.
6) Home Automation : -
WSNs enable smart home automation systems that monitor and control home appliances,
lighting, heating, and security systems. Sensor nodes deployed in smart homes
collect data on occupancy, temperature, and energy usage,
Ans. : -
Bluetooth Classic is the original version of Bluetooth designed primarily for audio
streaming and file transfer applications. It supports point-to-point and point-to-
multipoint communication between devices.
Bluetooth-enabled devices can locate and track the movement of assets in real-time
using proximity-based detection.