Danny IOT 18CS81
Danny IOT 18CS81
Genesis of IoT
• The person credited with the creation of the term “Internet of Things” is Kevin Ashton.
• While working for Procter & Gamble in 1999, Kevin used this phrase to explain a new
idea related to linking the company’s supply chain to the Internet.
Page 1 of 52
Internet of Things – (18CS81)
• The evolution of the Internet can be categorized into four phases. Each of these phases
has had a profound impact on our society and our lives.
Page 2 of 52
Internet of Things – (18CS81)
• Applications layer:
The oneM2M architecture gives major attention to connectivity between devices and
their applications. This domain includes the application-layer protocols and attempts to
standardize northbound API definitions for interaction with business intelligence (BI)
systems. Applications tend to be industry-specific and have their own sets of data
models, and thus they are shown as vertical entities.
• Services layer:
This layer is shown as a horizontal framework across the vertical industry applications.
At this layer, horizontal modules include the physical network that the IoT applications
run on, the underlying management protocols, and the hardware. Examples include
backhaul communications via cellular, MPLS networks, VPNs, and so on. Riding on
top is the common services layer.
• Network layer:
This is the communication domain for the IoT devices and endpoints. It includes the
devices themselves and the communications network that links them. Embodiments of
this communications infrastructure include wireless mesh technologies, such as IEEE
802.15.4, and wireless point-to-multipoint systems, such as IEEE 801.11ah.
Page 3 of 52
Internet of Things – (18CS81)
3. List and explain the challenges, its impact and problems that IoT is
currently facing with an example.
answer:
Challenges Description
Scale • While the scale of IT networks can be large, the scale of OT can be
several orders of magnitude larger.
• For example, one large electrical utility in Asia recently began
deploying IPv6-based smart meters on its electrical grid.
• While this utility company has tens of thousands of employees the
number of meters in the service area is tens of millions.
• This means the scale of the network the utility is managing has
increased by more than 1,000-fold! explores how new design
approaches are being developed to scale IPv6 networks into the
millions of devices.
Security • With more “things” becoming connected with other “things” and
people, security is an increasingly complex issue for IoT.
• Your threat surface is now greatly expanded, and if a device gets
hacked, its connectivity is a major concern.
• A compromised device can serve as a launching point to attack
other devices.
• IoT security is also pervasive across just about every facet of IoT.
Privacy • As sensors become more prolific in our everyday lives, much of the
data they gather will be specific to individuals and their activities.
• This data can range from health information to shopping patterns
and transactions at a retail establishment.
• For businesses, this data has monetary value.
• Organizations are now discussing who owns this data and how
individuals can control whether it is shared and with whom.
Big Data • IoT and its large number of sensors is going to trigger a deluge of
and Data data that must be handled.
Analytics • This data will provide critical information and insights if it can be
processed in an efficient manner.
• The challenge, however, is evaluating massive amounts of data
arriving from different sources in various forms and doing so in a
timely manner.
Inter- • As with any other nascent technology, various protocols and
operability architectures are jockeying for market share and standardization
within IoT.
• Some of these protocols and architectures are based on proprietary
elements, and others are open.
• Recent IoT standards are helping minimize this problem, but there
are often various protocols and implementations available for IoT
networks.
• The prominent protocols and architectures—especially open,
standards-based implementations—are the subject of this book.
Page 4 of 52
Internet of Things – (18CS81)
Page 5 of 52
Internet of Things – (18CS81)
Page 6 of 52
Internet of Things – (18CS81)
Page 7 of 52
Internet of Things – (18CS81)
Location Processing and data storage Processing and data storage occur at
occur at the edge devices or intermediate nodes in the network,
endpoints of the network. closer to the edge devices but not
directly on them.
Page 8 of 52
Internet of Things – (18CS81)
Page 9 of 52
Internet of Things – (18CS81)
Characteristics
• Contextual location awareness and low latency
Fog node sits as close to the IoT endpoint as possible to deliver distributed computing.
• Geographic distribution
In sharp contrast to the more centralized cloud, the services and applications targeted
by the fog nodes demand widely distributed deployments.
Page 10 of 52
Internet of Things – (18CS81)
Devices and Due to massive scale and New last-mile wireless technologies are
networks longer distance, networks needed to support constrained IoT
constrained by are often constrained, devices over long distances.
power, CPU, lossy, and capable of The network is also constrained,
memory, and supporting only minimal meaning modifications need to be made
link speed data rates (tens of bps to to traditional network-layer transport
hundreds of Kbps). mechanisms.
Page 11 of 52
Internet of Things – (18CS81)
Sensors measures some physical quantity and converts that measurement reading into a
digital representation.
Categories
• Active or passive
Sensors can be categorized based on whether they produce an energy output and
typically require an external power supply (active) or whether they simply receive
energy and typically require no external power supply (passive).
• Invasive or non-invasive
Sensors can be categorized based on whether a sensor is part of the environment it is
measuring (invasive) or external to it (non-invasive).
• Contact or no-contact
Sensors can be categorized based on whether they require physical contact with what
they are measuring (contact) or not (no-contact).
• Absolute or relative
Sensors can be categorized based on whether they measure on an absolute scale
(absolute) or based on a difference with a fixed or variable reference value (relative).
• Area of application
Sensors can be categorized based on the specific industry or vertical where they are
being used.
Page 12 of 52
Internet of Things – (18CS81)
Types
Sensor Types Description Examples
Page 13 of 52
Internet of Things – (18CS81)
Flow Flow sensors detect the rate of fluid flow. They Anemometer
measure the volume (mass flow) or rate (flow Mass flow
velocity) of fluid that has passed through a system sensor
in a given period of time. Water meter
Light Light sensors detect the presence of light (visible Infrared sensor
or invisible). Photodetector
Flame detector
Page 14 of 52
Internet of Things – (18CS81)
Advantages Disadvantages
• Real-time data collection • Cost of implementation and
• Remote monitoring and maintenance
control • Limited battery life or power
• Improved accuracy and requirements
precision • Data privacy and security concerns
• Enhanced automation and • Compatibility issues with different
efficiency protocols and systems
• Cost-effective solution • Sensitivity to environmental
• Predictive maintenance conditions
capabilities • Calibration and accuracy challenges
• Increased safety and security • Data overload and management
• Environmental monitoring complexity
and conservation • Vulnerability to physical damage or
• Data-driven decision-making tampering
• Integration with other IoT • Limited processing capabilities
devices and systems • Dependency on network connectivity.
Page 15 of 52
Internet of Things – (18CS81)
Actuators are natural complements to sensors, it receives some type of control signal
that triggers a physical effect, usually some type of motion, force, and so on
Categories
• Type of motion
o Actuators can be classified based on the type of motion they produce (for example,
linear, rotary, one/two/three-axes).
• Power
o Actuators can be classified based on their power output (for example, high power,
low power, micro power)
• Binary or continuous
o Actuators can be classified based on the number of stable-state outputs.
• Area of application
o Actuators can be classified based on the specific industry or vertical where they are
used.
• Type of energy
o Actuators can be classified based on their energy type.
Type Examples
Page 16 of 52
Internet of Things – (18CS81)
Advantages Disadvantages
• Enable remote control and • Cost of implementation and
automation. maintenance
• Facilitate real-time response and • Limited durability and lifespan
feedback. • Dependency on power supply or
• Enhance efficiency and energy source
productivity. • Compatibility issues with
• Enable precise and targeted different protocols and systems
actions. • Reliability and fault tolerance
• Support seamless integration with challenges
IoT devices and systems. • Response time limitations
• Enable intelligent decision- • Complexity in controlling and
making and adaptive behavior. coordinating multiple actuators
• Enhance user convenience and • Vulnerability to physical
comfort. damage or tampering
• Enable proactive maintenance and • Limited range or scope of
fault detection. operation
• Enable personalized and • Dependency on network
customized experiences. connectivity.
• Support energy optimization and
conservation.
Page 17 of 52
Internet of Things – (18CS81)
• IEEE 802.15.4 is a standard for low-rate wireless personal area networks (LR-
WPANs).
• It defines the physical (PHY) and medium access control (MAC) layers for LR-
WPANs.
• The protocol stack for IEEE 802.15.4 includes the PHY layer, MAC layer, and
network layer (optional).
• The PHY layer is responsible for transmitting and receiving data over the wireless
medium, and includes functions such as modulation and demodulation.
• The MAC layer manages access to the wireless medium and includes functions
such as channel allocation, data framing, and security.
• The network layer (optional) provides additional functionality such as addressing,
routing, and data fragmentation.
• The protocol stack for IEEE 802.15.4 can be illustrated using a table that shows the
layers, their functions, and the corresponding protocols and standards.
3. Briefly explain High–level Zigbee and Zigbee protocol stack with a neat
diagram.
answer:
BOTH ZIGBEE PROTOCOL STACK AND HIGH–LEVEL ZIGBEE
PROTOCOL STACK ARE SIMILAR TO ONE ANOTHER AND ALSO
THIS ANSWER IS ALREADY GIVEN IN QUESTION 2
Page 18 of 52
Internet of Things – (18CS81)
Limitations
• Limited processing power
• Limited memory
• Lossy communication
• Limited transmission speeds
• Limited power
Page 19 of 52
Internet of Things – (18CS81)
Smart Objects are, quite simply, the building blocks of IoT. They are what transform
everyday objects into a network of intelligent objects that are able to learn from and interact
with their environment in a meaningful way. A smart object, is a device that has, at a
minimum.
Characteristics
• Processing Unit
o A smart object has some type of processing unit for acquiring data, processing and
analyzing sensing information received by the sensor(s), coordinating control
signals to any actuators, and controlling a variety of functions on the smart object,
including the communication and power systems.
• Communication Device
o The communication unit is responsible for connecting a smart object with other
smart objects and the outside world (via the network).
o Communication devices for smart objects can be either wired or wireless.
• Power Source
o Smart objects have components that need to be powered.
o Interestingly, the most significant power consumption usually comes from the
communication unit of a smart object.
Page 20 of 52
Internet of Things – (18CS81)
6. What is SANET?
Explain some advantages and disadvantages that a wireless based
solution offers?
answer:
Advantages
• Greater deployment flexibility
(especially in extreme environments or hard-to-reach places)
• Simpler scaling to a large number of nodes
• Lower implementation costs
• Easier long-term maintenance
• Effortless introduction of new sensor/actuator nodes
• Better equipped to handle dynamic/rapid topology changes
Disadvantages
• Potentially less secure (for example, hijacked access points)
• Typically lower transmission speeds
• Greater level of impact/influence by environment
Page 21 of 52
Internet of Things – (18CS81)
Page 22 of 52
Internet of Things – (18CS81)
Topology
• LoRaWAN: "Star of stars" topology with gateways and network server.
• Gateways: Bridges between endpoints and LoRaWAN network server.
Security
• LoRaWAN Security: Two layers of security for communication and data privacy.
• Network Security Layer: Authenticates endpoints and encrypts LoRaWAN
packets.
• Application Security Layer: Encrypts data between endpoint and application
server.
• Gateway Protection: Gateways secured for traffic and network management.
Page 23 of 52
Internet of Things – (18CS81)
• Versatile
Ethernet, Wi-Fi, cellular not universally applicable. Communication tech evolves faster
than OT. Layered IP architecture flexible for diverse layers.
• Ubiquitous
Recent OS releases support integrated IPv4 and IPv6 IP stacks. IoT app protocols
increasingly run over IP. IPv6 adoption growing.
• Scalable
Adding IoT devices may require specific design rules. Similar to voice and video
endpoints over IP. IP is scalable.
Page 24 of 52
Internet of Things – (18CS81)
Page 25 of 52
Internet of Things – (18CS81)
Page 26 of 52
Internet of Things – (18CS81)
Page 27 of 52
Internet of Things – (18CS81)
Adaptation Adoption
• It refers to the modification or • It refers to the widespread
adjustment of existing protocols acceptance and usage of a
to meet specific requirements or protocol by various stakeholders.
constraints. • It involves the integration and
• It involves customizing or deployment of the protocol
tailoring the protocol to suit a across different systems,
particular context or application. networks, and applications.
• It may involve adding new • It typically occurs when a
features, removing or disabling protocol becomes a standard or
certain functionalities, or widely recognized in the
optimizing the protocol for industry.
specific network conditions. • It implies a broader acceptance
• The purpose of adaptation is to and implementation by
enhance the protocol's organizations, service providers,
compatibility, performance, or and users.
functionality within a specific • It often leads to the
environment. establishment of infrastructure,
• It does not necessarily require support, and ecosystem around
widespread implementation or the protocol, fostering its growth
acceptance. and usage.
Page 28 of 52
Internet of Things – (18CS81)
Page 29 of 52
Internet of Things – (18CS81)
Page 30 of 52
Internet of Things – (18CS81)
2. List and explain the comparison between Big Data, Edge Analytics and
Network analytics with relevant diagrams.
answer:
Page 31 of 52
Internet of Things – (18CS81)
Page 32 of 52
Internet of Things – (18CS81)
• Enterprise zone
o Corporate applications, ERP, CRM, document management, internet access.
o Level 5 - Enterprise network: Corporate-level applications, VPN entry, internet
access.
o Level 4 - Business planning and logistics network: Scheduling, material flow,
optimization.
• Operational zone
o Workflow management, monitoring, production scheduling, security management.
Page 33 of 52
Internet of Things – (18CS81)
• Safety zone
o Safety-critical devices, sensors, equipment for managing safety functions.
Characteristics
• Device Diversity: IoT networks consist of a wide range of devices with varying
capabilities, protocols, and connectivity options.
• Real-time Communication: IoT OT networks often require low latency and real-time
data transmission for time-sensitive applications.
• Scalability: IoT networks need to accommodate a large number of devices and handle
the increasing volume of data generated.
• Edge Computing: Processing and analyzing data at the network edge to reduce latency,
optimize bandwidth, and enhance efficiency.
• Security: Implementing robust security measures to protect IoT devices, data, and
network infrastructure from cyber threats and unauthorized access.
• Reliability and Availability: IoT OT networks must provide reliable and continuous
connectivity to ensure uninterrupted operations.
Page 34 of 52
Internet of Things – (18CS81)
Challenges
• Security Risks: IoT devices often have vulnerabilities that can be exploited, posing
risks to data privacy, device integrity, and network security.
• Data Management and Analytics: Handling and processing large volumes of IoT
data, extracting valuable insights, and implementing efficient data management
strategies.
• Privacy Concerns: Safeguarding personal and sensitive data collected by IoT devices
and complying with privacy regulations.
• Network Resilience: Building robust and resilient IoT OT networks that can withstand
disruptions, failures, and environmental challenges.
• Skill Gap and Knowledge: The shortage of skilled professionals with expertise in IoT
OT network design, implementation, and management.
Page 35 of 52
Internet of Things – (18CS81)
• Enterprises rely on relational databases (data warehouses) for structured data storage.
• Relational databases are used for long-term archiving and can be slow for data queries.
• Massively parallel processing (MPP) databases are faster and more efficient.
• MPP databases distribute data and processing across multiple nodes in a scale-out
architecture.
• MPP databases are also known as analytic databases with built-in analytic functions.
• They process large data sets in parallel across multiple processors and nodes.
• MPP architectures have a master node coordinating data storage and processing.
• Each MPP node operates independently with local processing, memory, and storage.
• Data storage in MPP databases is optimized in a structured SQL-like format.
• MPP databases provide faster response times for complex SQL queries.
• IoT implementations with diverse data sources may require alternative databases
alongside MPP.
Page 36 of 52
Internet of Things – (18CS81)
• Flexible NetFlow (FNF) and IPFIX are widely used network protocols. FNF provides
flexibility, scalability, aggregation of flow data, and enhanced security detection.
• FNF components include Flow Monitor, Flow Record, and Exporter.
• Flow Monitor stores flow information, including key and non-key fields.
• Flow Record characterizes flows with key and non-key field values.
• Flow Exporter configures export destination, transport type, and properties.
• Flow export timers determine the frequency of exporting flows.
• NetFlow export format specifies the flow reporting format.
• NetFlow server collects and reports exported flows for analysis.
Page 37 of 52
Internet of Things – (18CS81)
• Modbus
o Lack of inherent security features.
o Absence of authentication and encryption.
o Vulnerability to eavesdropping, data tampering, and unauthorized access.
• EtherNet/IP
o Insufficient authentication mechanisms.
o Lack of encryption.
o Risk of unauthorized access, data interception, and injection attacks.
Page 38 of 52
Internet of Things – (18CS81)
(i) Structure
void setup() // Preparation function used to declare variables
{
// First function that runs only one in the program
Statement(s); // It used to set pins for serial communication
}
(ii) Function
It is a piece of code that has a name and set of statements executed when function
is called. These are declared by its type followed with a name of a function.
Syntax:
type functionName(parameters)
{
Statements(s);
}
Example:
int delayvar()
{
int var; // create temporary variable var
var = analogRead(potent); // read from potentiometer
var = var/4; // convert the value of variables
return var; // return var
}
(iii) Variables and Data types
Variables
It is a way of storing value for later use in the program.
int var; // variable var visible to all functions
void setup()
{
// nothing is required
}
Page 39 of 52
Internet of Things – (18CS81)
void loop()
{
for(int local=0; local<5;)
{
local++: //variable local is only visible within loop
}
float local_f; //variable local_f is only visible inside the loop
}
Data types
Data type Syntax Range
Byte byte x = 100; 0 to 255
Int int y = 200; 32767 to -32768
Long long var = 8000; 2147483647 to - 2147483648
Float float x = 3.14; 3.4028235E+28 to -3.4028235E+28
Arrays int myarray [] = {10, 20, 30, 40} Size depends on the data type
associated with declaration
Methods Usage
pinMode(pin, mode) Used in setup() method to configure pin to behave as INPUT
/ OUTPUT
pinMode(pin, INPUT) // pin set to INPUT
pinMode(pin, OUTPUT) // pin set to OUTPUT
Digital Read(pin) Read value from a specified pin with result being HIGH /
LOW, Val = digital Read)pin); // Val will be equal to input pin
Digital Write(pin, value) Outputs to HIGH / LOW on a specified pin.
Digital Write(pin, HIGH); // pin is set to HIGH
Example
int x = 13; // connect ‘x’ to pin 13
int p = 7; // connect push button to pin 7
int val = 0; // variable to store the read value
void setup()
{
pin MODE(x, OUTPUT); // sets ‘x’ as OUTPUT
}
void loop()
{
val = digital Read(p); // sets ‘value’ to 0
digital Write(x, val); // sets ‘x’ to button
}
Page 40 of 52
Internet of Things – (18CS81)
• Street Layer
o Sensors collect data and take action based on instructions.
o ICT connectivity relies on sensors for data collection and analysis.
o Magnetic sensors detect parking events by analyzing changes in the magnetic field.
o Lighting controllers adjust brightness based on time and ambient conditions.
o Air quality sensors measure gas and particulate matter concentrations.
• City Layer
o Network routers and switches are deployed to handle city data.
o This layer aggregates data from sensors and end-node networks.
o City layer must support multiple protocols for various IoT applications.
o Resiliency is crucial to ensure successful packet forwarding.
o Considerations for delay-sensitive and deterministic applications.
Page 41 of 52
Internet of Things – (18CS81)
• Smart buildings
o Integration of HVAC and building infrastructure systems in smart buildings saves
costs.
o Potential for $100 billion savings in operating expenses through energy efficiency.
o Financial gains directly benefit city budgets for city-owned buildings.
o Reduced emissions positively impact the environment, benefiting the entire city.
o Smart building technologies offer significant financial and environmental
advantages.
Page 42 of 52
Internet of Things – (18CS81)
• Gas monitoring
o Gas monitoring offers $69 billion savings in meter-reading costs and accuracy.
o Financial gains evident for users and utility companies in city-managed utilities.
o Safety benefits from timely alerts in cases of consumption increases.
o Swift emergency response enhances safety in the urban environment.
o Gas monitoring provides cost savings and improved safety for all stakeholders.
• Smart parking
o Real-time visibility in smart parking creates a $41 billion opportunity.
o Residents benefit from identifying and reserving nearby parking spaces.
o Traffic wardens can enforce regulations and address noncompliant parking.
o Municipalities can implement demand-based pricing strategies to optimize parking
utilization.
o Smart parking improves efficiency, convenience, and revenue potential for cities.
• Water management
o Smart water management saves $39 billion by connecting household water meters.
o Real-time consumption visibility and leak detection improve efficiency and savings.
o Remote and automatic control of gates and pumps optimizes water flow.
o Vibration measurements enable equipment failure detection and predictive
maintenance.
o Proactive dispatch of repair teams prevents equipment failures and disruptions.
• Road pricing
o Implementing automatic payments in busy city zones generates $18 billion.
o Real-time traffic data enables proactive rerouting of public and private
transportation.
o Automatic payments improve overall traffic conditions and reduce congestion.
o Valuable and actionable information leads to efficient use of transportation services.
o Cities benefit from increased revenues and improved traffic management strategies.
Page 43 of 52
Internet of Things – (18CS81)
Page 44 of 52
Internet of Things – (18CS81)
Solution
• Cities seek solutions to reduce lighting expenses and improve efficiencies.
• Smart street lighting provides energy savings and additional service opportunities.
• LED technology leads the transition from traditional to smart street lighting.
• LEDs require less energy, have longer lifespans, and lower maintenance.
• Complete switch to LEDs can reduce individual light bills by 70%.
Page 45 of 52
Internet of Things – (18CS81)
Page 46 of 52
Internet of Things – (18CS81)
• Video analytics sensor computes traffic events from video feed: Advantages: Accurate
traffic event detection without transmitting individual images.
• Events reach applications driving traffic services: Advantages: Enables traffic light
coordination and toll road license plate identification.
• Sensors recognize abnormal patterns and upload video to enforcement agencies:
Advantages: Enhanced detection of violations and improved traffic enforcement.
• Other sensors include Bluetooth vehicle counters and real-time speed counters:
Advantages: Real-time data collection and historical data analysis for trending.
• Communication techniques vary with sensor form factors: Advantages: Flexible wired
or wireless communication options for different applications.
Page 47 of 52
Internet of Things – (18CS81)
• Multivendor sensors with various communication protocols are deployed at street layer.
• Connected environment sensors measure gases, weather, and noise levels.
• Sensors are integrated into urban fixtures and smart city infrastructure.
• Wearables and crowd sourcing contribute to global air quality information.
• Communication technologies vary based on sensor location and data collection.
Page 48 of 52
Internet of Things – (18CS81)
6. Describe the main parts of the Arduino UNO learning board with a neat
diagram.
answer:
Page 49 of 52
Internet of Things – (18CS81)
Advantages
• Compatibility
o Raspberry Pi OS is specifically designed for Raspberry Pi boards, ensuring seamless
compatibility and optimal performance in IoT projects.
• Lightweight
o The OS is lightweight, allowing it to run efficiently on resource-constrained IoT
devices, making it suitable for a wide range of IoT applications.
• GPIO Pin Support
o Raspberry Pi OS provides full support for GPIO pins, enabling easy integration with
external components and sensors, facilitating IoT device interactions.
• Vast Software Repository
o Based on the Debian operating system, Raspberry Pi OS benefits from a vast
software repository, providing access to a wide range of applications and libraries
for IoT development.
• Community Support
o Raspberry Pi has a large and active community of developers, providing ample
resources, tutorials, and forums for IoT enthusiasts to seek assistance and share
knowledge.
Disadvantages
• Processing Power Limitation
o Raspberry Pi boards, although capable, may have limitations in processing power
compared to more powerful devices, which can impact the performance of resource-
intensive IoT applications.
• Limited Memory
o Depending on the Raspberry Pi model, the available RAM might be limited, which
can restrict the complexity and scale of IoT projects.
• Limited Storage
o Raspberry Pi boards typically have limited onboard storage, necessitating additional
external storage for storing large datasets or applications.
• Learning Curve
o While Raspberry Pi OS offers a user-friendly environment, beginners in the
Raspberry Pi ecosystem may require some time to learn and familiarize themselves
with the tools, programming languages, and hardware interfaces for IoT
development.
Page 50 of 52
Internet of Things – (18CS81)
Advantages
• Processing Power
o The Raspberry Pi 2 Model B offers improved processing power compared to its
predecessors, allowing for more complex IoT applications and data processing.
• GPIO Pins
o It has a 40-pin GPIO header, providing a wide range of digital and analog
input/output options for connecting sensors, actuators, and other electronic devices
in IoT projects.
• Compatibility
o Raspberry Pi 2 Model B is compatible with a vast ecosystem of hardware add-ons
and software libraries, allowing for easy integration and expansion of IoT projects.
• Affordable
o Raspberry Pi 2 Model B is cost-effective, making it accessible for hobbyists,
students, and small-scale IoT deployments.
• Community Support
o There is a large and active community of developers and enthusiasts for Raspberry
Pi, providing ample resources, tutorials, and support for IoT projects.
Disadvantages
• Limited Processing Power
o While improved, the processing power of Raspberry Pi 2 Model B is still relatively
modest compared to more powerful devices, which can be a limitation for resource-
intensive IoT applications.
• Memory Limitation
o The onboard RAM of Raspberry Pi 2 Model B is limited, which can impact the
performance and scalability of memory-intensive IoT projects.
• Limited Storage
o It has limited onboard storage, requiring external storage solutions for storing large
datasets or applications in IoT deployments.
• Power Consumption
o Compared to low-power microcontrollers, Raspberry Pi 2 Model B consumes more
power, which can be a concern for battery-powered or energy-efficient IoT projects.
Page 51 of 52
Internet of Things – (18CS81)
INDEX
MODULES PAGE NO
1 – Introduction to IoT 01 – 11
2 – Smart Objects 12 – 23
3 – IP for IoT as Network Layer 24 – 29
4 – Data and Analytics for IoT 30 – 38
5 – IoT Physical Devices and Endpoints 39 – 51
Page 52 of 52