Ucs1505 - Iot
Ucs1505 - Iot
MISSION
M1: To provide technical exposure in the field of Computer Science and Engineering
through state of the art infrastructure and ethical standards.
M2: To engage the students in research and development activities in the field of
Computer Science and Engineering.
M3: To empower the learners to involve in industrial and multi-disciplinary projects for
addressing the societal needs.
PEO1: Analyse, design and create innovative products for addressing social needs.
PEO3: Nurture the leadership qualities and entrepreneurial skills for their successful
career.
PSO1: Apply the basic and advanced knowledge in developing software, hardware and
firmware solutions addressing real life problems.
PSO2: Design, develop, test and implement product-based solutions for their career
enhancement.
K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(Autonomous)
Samayapuram, Tiruchirappalli-62112
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
T Bratko, “Prolog: Programming for Artificial Intelligence”, Fourth edition, Addison- Wesley
Educational Publishers Inc., 2011
T Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms,
and Implementations”, CRC press,2016
R Dieter Uckelmann, Mark Harrison, Florian Michahelles, “Architecting the Internet of
Things”,Springer, 2011.
R Donald Norris, “The Internet of Things: Do-It-Yourself at Home Projects for Arduino, Raspberry Pi
and Beagle Bone Black”, Mc.Graw Hill, 2015.
COURSE OBJECTIVES:
2 To learn about the hands on training for building simple applications using appropriate
sensors.
K PO(1..12) &
SNO Level DESCRIPTION PSO(1..2)
MAPPING
CO1 K4 Rephrase the internet of things and the protocols of IoT. PO1,2,3,4,5,6,12
CO4 K3 Inspect the role of cloud and security in IoT. 5. Organize PO1,2,3,5,12
data analytics and IoT platforms.
P P P P P P P P P P P P PS PS
SNO Objective O O O O O O O O O O O O O O
1 2 3 4 5 6 7 8 9 10 11 12 1 2
Anything Anyone
any device anybody
Healthcare Robots and
and hospitals drones
Internet Internet
of of
Things Things
Any path
any network
Web 3.0 View of IoT
Web 3.0, also known as the third-generation internet, is the next evolution of the World
Wide Web. It provides a data-driven Semantic Web employing a machine-based
understanding of data with the objective of developing a more intelligent and connected
web experience for users.
The Web of today is static and unable to adjust to the individual needs of each person
experiencing it. Web 3.0 promises to be more dynamic and interactive. By implementing
artificial intelligence and blockchain technology, it will redefine the web experience
with structural changes to ensure democratization across all aspects of the internet.In
Web 3.0, data is stored securely and distributed across many devices, removing the need
for centralized servers. Such a design also reduces the risks of massive data leaks
because data is no longer centrally stored — making it more resilient to compromise.
Web 3.0 Definition and Features
Web 3.0 is highly decentralized, driven by machine learning and artificial intelligence,
and leverages blockchain technology. The result is real-world human communication.
Users retain control over their data and content, and they can sell or trade their data
without losing ownership, risking privacy or relying on intermediaries. In this business
model, users can log into a website without having their internet identity tracked.
Key to the innovation in Web 3.0 is the digitization of assets via tokenization.
Tokenization converts assets and rights into a digital representation, or token, on a
blockchain network. Cryptocurrency and fungible tokens are forms of digital currency
that can easily be exchanged across networks, driving a new business model that
democratizes finance and commerce. Non fungible tokens (NFTs) are units of data that
represent unique assets such as avatars, digital art, or trading cards, that can be owned by
users and monetized for their own gain.
It’s relatively easy to identify the major differences between Web 1.0 and Web 2.0. With
the former, users passively consult web pages and, generally, do not generate their own
content. With the latter, users generate content and interact with sites (and each other)
through social media platforms, forums and more. With the Web 3.0 generation of the
internet, the differences are not as clearly defined.
The term Web 3.0, coined by reporter John Markoff of The New York Times in 2006,
refers to a new evolution of the Web which includes specific innovations and practices.
Below are eight main features that can help us define Web 3.0:
1. Semantic Web: The next evolution of the Web involves the Semantic Web. The
Semantic Web improves the abilities of web technologies to generate, share and connect
content through search and analysis by understanding the meaning of words rather than
by keywords or numbers.
2. Artificial Intelligence: By combining semantic capabilities with natural language
processing, computers can understand information on a human-like level to provide
faster and more relevant results. In doing so, they become more intelligent and better
satisfy the needs of users.
3. 3D Graphics: Three-dimensional design is used extensively in websites and
services in Web 3.0. Museum guides, computer games, eCommerce, geospatial contexts
and more are all common examples of this.
4. Connectivity: With Web 3.0, information is more connected thanks to semantic
metadata. As a result, the user experience evolves into a new level of connectivity that
leverages all available information.
5. Ubiquity: Internet content and services can be accessed anywhere at any time via
any number of devices, rather than exclusively via computers and smartphones. Web 2.0
is already ubiquitous in many ways, but the growth of IoT devices will take it to new
levels.
6. Blockchain: With blockchain technology, user data is protected and encrypted.
This prevents large companies from controlling and/or using users’ personal data for
their gain.
7. Decentralized: Decentralized data networks store data within a peer-to-peer
interconnection. Users maintain ownership over their data and digital assets and are able
to log in securely over the internet without being tracked.
8. Edge Computing: Web 3.0 relies on the advance of edge computing in which
apps and data are processed at the network edge on devices such as mobile phones,
laptops, appliances, sensors and even smart cars.
Difference Between Web 1.0, Web 2.0, and Web 3.0
S.
Web 1.0 Web 2.0 Web 3.0
No.
Interactive
8. Banner Advertising Behavioral Advertising
Advertising
Information sharing is
12. Interaction is the goal. Immersion is the goal.
the goal.
The WoT explores the layer on top of connectivity with things and addresses
issues such as fast prototyping, data integration, and interaction with objects.
The WoT is a version where things become seamlessly integrated into the web.
There are also many other WoT applications around the world. Some of the WoT
applications are listed here.
Arduino
Japan Geiger Map
Nanode
The National Weather Study Project
AgSphere
Two Pillars of the Web
The application server became the foundation that helped build widely spreading
web-based applications. An application server acts as a set of components accessible to
the software developer through an API defined by the middleware itself.
The application server is based on the three-tiered (Fig. 6.2) or multi- tiered
software architecture. As the two pillars for web applications and the Internet revolution,
the protocols (HTML)/HTTP/URL and the software will continue to be the two pillars
of play an important role in building WoT applications.
APPLICATION LAYER PROTOCOLS:
MQTT – Message Queue Telemetry Transport Protocol
DDS – Data Distribution Service
AMQP – Advanced Message Queuing Protocol
CoAP – Constrained Application Protocol
This protocol is an internet utility protocol for the few (restricted) IoT gadgets.
It is useful in most of IoT applications. Initially, CoAP is used in the machine to
machine communications. CoAP is the alternate protocol for the HTTP.
This protocol has an effective XML interchange data format technique. It is a
different technique of binary data format has more preferable in terms of space. This
could be better than plain text HTML/XML file.
There are two modes in which CoAP protocol messages get exchanged between
CoAP client and CoAP server viz. without separate response and with separate response.
With separate response, server notifies client about receipt of the request message.
It is suitable for multi party chatting ,voice and video calling and telecommunity
It’s protocol for streaming XML elements over a network in order to exchange
messages and presence information in close to real time.
This protocol is mostly used by instant messaging applications like WhatsApp.
HTTP
Bluetooth operates in the license-exempt band at 2.45 GHz. It has a range of only
about 10 m. For this reason, and because the communicating devices typically belong to
one individual or group, Bluetooth is sometimes categorized as a personal area network
(PAN). Version 2.0 provides speeds up to 2.1 Mbps. Power consumption is low.
Bluetooth class:
In Bluetooth, "class" refers to the three levels of power for Bluetooth devices:
Class 1, 2, and 3. The following table compares power and range of these three classes:
All the secondary stations synchronize their clocks and hopping sequence in
accordance with the primary. Further a piconet can have only one primary station. The
communication between the primary and the secondary is a one-to-one or one-to-many
relationship.
802.15.1, more commonly known as Bluetooth, is a low-data-rate, low-power
wireless networking standard aimed at replacing cables between lightweight
devices [IEEE802.15.1].
The Bluetooth protocol stack, shown in Figure 1, is somewhat unusual compared
to other IEEE networking stacks. The Bluetooth stack defines many components above
the PHY and MAC layers, some of which are optional
Protocols in the Bluetooth Protocol Architecture
Transport layer
The Bluetooth transport layer is roughly equivalent to the traditional OSI PHY and
MAC layers. All Bluetooth devices are required to implement this layer in hardware.
The transport layer is composed from the radio, baseband, and link manager layers,
which are described below.
Physical Layer − This includes Bluetooth radio and Baseband (also in the data
link layer.
o Radio − This is a physical layer equivalent protocol that lays down the
physical structure and specifications for transmission of radio waves. It
defines air interface, frequency bands, frequency hopping specifications,
and modulation techniques.
o Baseband − This protocol takes the services of radio protocol. It defines
the addressing scheme, packet frame format, timing, and power control
algorithms.
Data Link Layer − This includes Baseband, Link Manager Protocol (LMP), and
Logical Link Control and Adaptation Protocol (L2CAP).
o Link Manager Protocol (LMP) − LMP establishes logical links between
Bluetooth devices and maintains the links for enabling communications.
The other main functions of LMP are device authentication, message
encryption, and negotiation of packet sizes.
o Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP
provides adaption between upper layer frame and baseband layer frame
format. L2CAP provides support for both connection-oriented as well as
connectionless services.
Middleware Layer − This includes Radio Frequency Communications
(RFComm) protocol, adopted protocols, SDP, and AT commands.
o RFComm − It is short for Radio Frontend Component. It provides a serial
interface with WAP.
o Adopted Protocols − These are the protocols that are adopted from
standard models. The commonly adopted protocols used in Bluetooth are
Point-to-Point Protocol (PPP), Internet Protocol (IP), User Datagram
Protocol (UDP), Transmission Control Protocol (TCP), and Wireless
Application Protocol (WAP).
o Service Discovery Protocol (SDP)− SDP takes care of service-related
queries like device information so as to establish a connection between
contending Bluetooth devices.
o AT Commands − ATtention command set.
Applications Layer − This includes the application profiles that allow the user to
interact with the Bluetooth applications.
At the baseband layer, Bluetooth devices form into piconets and/or scatternets.
Piconets consist of one master device that communicates directly with up to 7 active
slave devices. Piconets can also have up to 250 parked (i.e., inactive) slave nodes at any
given time. Multiple piconets can also be combined into a single multi-hop scatternet.
Piconet
Piconet is a type of Bluetooth network that contains one primary node called the
master node and seven active secondary nodes called slave nodes. Thus, we can say that
there is a total of 8 active nodes which are present at a distance of 10 meters. The
communication between the primary and secondary nodes can be one-to-one or one-to-
many.
Scatternet
It is formed by using various piconets. A slave that is present in one piconet can
act as master or we can say primary in another piconet. This kind of node can receive a
message from a master in one piconet and deliver the message to its slave in the other
piconet where it is acting as a slave. This type of node is referred to as a bridge node. A
station cannot be mastered in two piconets.
IEEE 802.15.4
Criticisms of IEEE 802.15.4 often focus on its MAC reliability, unbounded latency,
and susceptibility to interference and multipath fading. The negatives around reliability
and latency often have to do with the Collision Sense Multiple Access/Collision
Avoidance (CSMA/CA) algorithm.
CSMA/CA is an access method in which a device “listens” to make sure no other
devices are transmitting before starting its own transmission. If another device is
transmitting, a wait time (which is usually random) occurs before “listening” occurs
again.
Interference and multipath fading occur with IEEE 802.15.4 because it lacks a
frequency-hopping technique. Later variants of 802.15.4 from the IEEE start to address
these issues.
Standardization and Alliances:
IEEE 802.15.4 or IEEE 802.15 Task Group 4 defines low-data-rate PHY and
MAC layer specifications for wireless personal area networks (WPAN). This standard
has evolved over the years and is a well-known solution for low-complexity wireless
devices with low data rates that need many months or even years of battery.
Since 2003, the IEEE has published several iterations of the IEEE 802.15.4
specification. Newer releases typically supersede older ones, integrate addendums, and
add features or clarifications to previous versions.
The IEEE 802.15.4 PHY and MAC layers are the foundations for several
networking protocol stacks. These protocol stacks make use of 802.15.4 at the physical
and link layer levels, but the upper layers are different. These protocol stacks are
promoted separately through various organizations and often commercialized. Some of
the most well-known protocol stacks based on 802.15.4 are highlighted in Table 2-1.
The MAC layer provides links to the PHY channel by determining that devices
in the same region will share the assigned frequencies. The scheduling and routing of
data packets are also managed at this layer.
The 802.15.4 MAC layer is responsible for a number of functions like:
Beaconing for devices that operate as controllers in a network.
used to associate and dissociate PANs with the help of devices.
The safety of the device.
Consistent communication between two MAC devices that are in a peer-
to-peer relationship.
Several established frame types are used by the MAC layer to accomplish these
functions. In 802.15.4, there are four different types of MAC frames:
frame of data
Frame for a beacon
Frame of acknowledgement
Frame for MAC commands
4. Topology:
Networks based on IEEE 802.15.4 can be developed in a star, peer-to-peer, or
mesh topology. Mesh networks connect a large number of nodes. This enables nodes
that would otherwise be out of range to interact with each other to use intermediate
nodes to relay data.
5. Security:
For data security, the IEEE 802.15.4 standard employs the Advanced Encryption
Standard (AES) with a 128-bit key length as the basic encryption technique.
Activating such security measures for 802.15.4 significantly alters the frame
format and uses a few of the payloads. The very first phase in activating AES
encryption is to use the Security Enabled field in the Frame Control part of the 802.15.4
header.
For safety, this field is a single bit which is assigned to 1. When this bit is set, by
taking certain bytes from its Payload field, a field known as the Auxiliary Security
Header is formed following the Source Address field.
6. Competitive Technologies:
The IEEE 802.15.4 PHY and MAC layers serve as a basis for a variety of
networking profiles that operate in different IoT access scenarios. DASH7 is a
competing radio technology with distinct PHY and MAC layers.
BACnet
BACnet is "a data communication protocol for building automation
and control networks." A data communication protocol is a set of rules governing the
exchange of data over a computer network that covers everything from what kind of
cable to use to how to form a particular request or command in a standard way.
Wireless HART
All objects must have an identifier, data type (i.e., analog or digital value), and
additional information such as read-only, modified by other devices, etc.. The BACnet
defines a total of 23 standard objects and covers almost all general-purpose functions in
a building automation system. A collection of objects performing a specific function is
called a BACnet Device.
BACNet Communication
The devices that use BACnet are called Native BACnet, which means that devices
generate signals that are compatible with the BACnet technology, and can be
interconnected with any BACnet network.
BACnet IP
IP is one of the networking technologies that BACnet supports. Support of
BACnet-compatible devices can be connected and utilized over an IP network, called
BACnet IP. BACnet IP represents a network that uses IP as its networking technique
and devices that support IP as a means of communication can be used in the BACnet.
Many companies have their networking technology in the IP structure, even
when not connected to the internet, making it easy and cost-effective to implement a
BACNet structure.
The devices on the BACNet IP have a unique IP address. The IP address is
understandable and recognizable on the BACnet.
Some advantages of BACNet IP are:
IP based on the Ethernet structure offers a fast response speed. Normally,
Ethernet supports up to 100 megabits per second.
A large number of devices can be connected to each other on the IP.
Easy troubleshooting.
Modbus
Modbus is a serial communication protocol developed by Modicon published by
Modicon® in 1979 for use with its programmable logic controllers (PLCs). In simple
terms, it is a method used for transmitting information over serial lines between
electronic devices.
The device requesting the information is called the Modbus Client and the devices
supplying information are Modbus Servers. In a standard Modbus network, there is one
Client and up to 247 Servers, each with a unique Server Address from 1 to 247. The
Client can also write information to the Servers.
Modbus devices communicate using a master-slave (client-server) technique in
which only one device (the master/client) can initiate transactions (called queries). The
other devices (slaves/servers) respond by supplying the requested data to the master, or
by taking the action requested in the query.
A slave is any peripheral device (I/O transducer, valve, network drive, or other
measuring device) which processes information and sends its output to the master using
Modbus. The I/O Modules form slave/server devices, while a typical master device is a
host computer running appropriate application software. Other devices may function as
both clients (masters) and servers (slaves).
Types of Modbus Communication Protocol
Modbus serial protocol (the original version) is a master/slave protocol, e.g. one
master that controls the Modbus data transactions with multiple slaves that respond to
the master’s requests to read from or write data to the slaves. Network architectures are
shown Figures 1.
Modbus TCP, also known as Modbus TCP/IP, uses a client/server architecture.
Network architectures are shown Figures 2. (below)
Modbus TCP is often referred to as Modbus over Ethernet. Modbus TCP (also
ModbusTCP/IP) is simply the Modbus RTU protocol with a TCP interface that runs on
Ethernet. The Modbus messaging structure is the application protocol that defines the
rules for organizing and interpreting the data independent of the data transmission
medium. TCP/IP refers to the Transmission Control Protocol and Internet Protocol,
which provides the transmission medium for Modbus TCP/IP messaging.
Unlike Modbus RTU and Modbus ASCII, Modbus/TCP will allow multiple
Clients to poll the same Server device simultaneously. This is permitted because over
Ethernet via TCP/IP, multiple messages can be sent, buffered and delivered without the
requirement of token passing or total bus control, which is often the case with many
RS485 and RS422 protocols.
KNX
KNX is the internationally recognized and worldwide standard for smart home
automation and building control. KNX is technology which controls the automation of
integral functions of any residential, commercial or industrial building such as HVAC,
lighting systems, multimedia, security, energy management and more.
In order to transfer control data to all building management components (or
smart home devices/functions), a system is required that avoids the problem of having
isolated devices speaking 'different languages'.
KNX devices can manage lighting, blinds and shutters, HVAC, security systems,
energy management, audio video, white goods, displays, remote control, etc.
S-Mode uses the standard frame format. It needs active Network Management (as
performed by ETS) with Broadcast and Individual Addressing.
Controller Mode:
It uses Group communication with the standard frame format. It needs active Network
Management (as performed by ETS) with Broadcast and Individual Addressing.
For configuration, PB mode relies only on active management from one device directly
by another. It uses group addressing with the standard frame, with structured binding.
LTE defines extended frames for its “native”• run-time communication, with tagged
binding on Interface Object properties.
Advantages:
Some of the key features of the architecture for KNX systems are:
Figure below depicts KNX protocol stack layers. Refer OSI protocol stack
layers which mentions basic and generic functions of each of the layers used in
KNX.
PHYSICAL LAYER:
The KNX physical layer in KNX protocol stack uses any of the following physical
layers.
1.TwistedPair(KNX-TP)
2.PowerLine(KNX-PL)
3.RadioFrequency(KNX-RF)
4.KNX-IP
KNX-TP uses CSMA/CA mechanism at MAC layer using inductive coupling.
The Bus delivers 21-29 Volt power supply. Low power KNX nodes using the twisted
pair and draw power of about 150 mWatt.
KNX-PL version PL110 uses FSK modulation. Each of the PLC line will have
about 64 devices. As PLC is a broadcast open media, the separation of domain is done
using 48 bit domain address.
KNX-RF physical layer uses 868 to 870 MHz frequency band.KNX-IP uses IP
protocols as medium of communication. It uses binary or XML encoded PDUs.
Various Physical layers will use different telegram formats in KNX protocol
stack. Figure-2 depicts KNX telegram formats for TP(Twisted Pair), PL(PowerLine) and
RF (Radio Frequency) PHY layer modes.
KNX ROUTING AND NETWORK LAYER
Each of the KNX node has 2 byte unique address assigned. It is used as source of
telegrams or used for configurations.
Source address = {
AreaIdentifier(4bits),
Line identifier(4 bits),
device number ( 8 bits) }
Source address here is used as physical address. It is configured during
installation. Here device number 0 is used for backbone and line couplers.Destination
address can be used either as logical group address(bit 17 = 1) or as physical address (bit
17=0). Group address 0000h will address all the KNX nodes.
The KNX installation will have 64K space. All the individual as well as group
addresses are stored in the address table of the KNX device.
Total 4 priority levels are supported by KNX protocol and encoded as specific values of
control bits in the frame.
THE TRANSPORT LAYER OF KNX PROTOCOL
The transport layer of KNX protocol stack provides connection oriented peer to
peer communication service. It provides connect primitive, disconnect primitive, TL-
ACK, Sequence counter, time out management(about 6sec for configuration mode).
KNX APPLICATION LAYER
It defines group objects and exchange of object values through service requests.
It also defines "property value write" service. This service is used to set values and also
to configure parameters to KNX device for interfacing objects.
ZIGBEE ARCHITECTURE
ZigBee is a Personal Area Network task group with low rate task group 4. It is a
technology of home networking. ZigBee is a technological standard created for
controlling and sensing the network. ZigBee is the Personal Area network of task group
4 so it is based on IEEE 802.15.4 and is created by Zigbee Alliance.
The Zigbee Alliance is an industry group formed to certify interoperability
between vendors and it is committed to driving and evolving ZigBee as an IoT solution
for interconnecting smart objects. ZigBee solutions are aimed at smart objects and
sensors that have low bandwidth and low power needs.
ZigBee is a standard that addresses the need for very low-cost implementation of
Low power devices with Low data rates for short-range wireless communications.
This communication standard defines physical and Media Access Control (MAC) layers
to handle many devices at low-data rates.
These Zigbee’s WPANs operate at 868 MHz, 902-928MHz, and 2.4 GHz
frequencies. The data rate of 250 kbps is best suited for periodic as well as intermediate
two-way transmission of data between sensors and controllers.
Zigbee is a low-cost and low-powered mesh network widely deployed for
controlling and monitoring applications where it covers 10-100 meters within the range.
Zigbee supports different network configurations for the master to master or
MiWi
ZigBee
master to slave communications. Zigbee networks are extendable with the use of routers
and allow many nodes to interconnect with each other for building a wider area network.
6LoWPAN
ZIGBEE PROTOCOL STACK ARCHITECTURE
AC
PHY
802.15.4
802.15.4
802.15.4
802.15.4
Physical Layer:
This layer does modulation and demodulation operations upon transmitting and
receiving signals respectively. This layer’s frequency, data rate, and a number of
channels are given below.
MAC Layer:
This layer is responsible for reliable transmission of data by accessing different
networks with the carrier sense multiple access collision avoidances (CSMA). This also
transmits the beacon frames for synchronizing communication.
The network layer is also responsible for forming the appropriate topology,
which is often a mesh but could be a star or tree as well. From a security perspective,
ZigBee utilizes 802.15.4 for security at the MAC layer, using the Advanced Encryption
Standard (AES) with a 128-bit key and also provides security at the network and
application layers.
Application Framework:
It provides two types of data services as key-value pair and generic message
services. The generic message is a developer-defined structure, whereas the key-value
pair is used for getting attributes within the application objects. ZDO provides an
interface between application objects and the APS layer in Zigbee devices. It is
responsible for detecting, initiating, and binding other devices to the network.
Types of zigbee evices
Zigbee Coordinator
In an FFD device, it is a PAN Coordinator is used to form the network. Once the
network is established, then it assigns the address of the network for the devices used
within the network. And also, it routes the messages among the end devices.
Zigbee Router
A Zigbee Router is an FFD Device that allows the range of the Zigbee Network.
This Router is used to add more devices to the network. Sometimes, it acts as a Zigbee
End Device.
Operating Frequency Bands (Only one channel will be selected for use in a network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)
Star Topology (ZigBee Smart Energy): Consists of a coordinator and several end
devices, end devices communicate only with the coordinator.
Mesh Topology (Self Healing Process): Mesh topology consists of one coordinator,
several routers, and end devices.
Tree Topology: In this topology, the network consists of a central node which is a
coordinator, several routers, and end devices. the function of the router is to extend
the network coverage.
Zigbee operating modes
Zigbee two-way data is transferred in two modes: Non-beacon mode and Beacon
mode. In a beacon mode, the coordinators and routers continuously monitor the active
state of incoming data hence more power is consumed.
In this mode, the routers and coordinators do not sleep because at any time any
node can wake up and communicate. However, it requires more power supply and its
overall power consumption is low because most of the devices are in an inactive state
for over long periods in the network.
In a beacon mode, when there is no data communication from end devices, then
the routers and coordinators enter into a sleep state. Periodically this coordinator wakes
up and transmits the beacons to the routers in the network.
These beacon networks are work for time slots which means, they operate when
the communication needed results in lower duty cycles and longer battery usage. These
beacon and non-beacon modes of Zigbee can manage periodic (sensors data),
intermittent (Light switches), and repetitive data types.
Channel Access:
1. Contention Based Method (Carrier-Sense Multiple Access With Collision Avoidance
Mechanism)
2. Contention Free Method (Coordinator dedicates a specific time slot to each device
(Guaranteed Time Slot (GTS)))
It needs the system information to control Zigbee based devices for the owner.
As compared with WiFi, it is not secure.
The high replacement cost once any issue happens within Zigbee based home
appliances
The transmission rate of the Zigbee is less
It does not include several end devices.
It is so highly risky to be used for official private information.
It is not used as an outdoor wireless communication system because it has less
coverage limit.
Similar to other types of wireless systems, this ZigBee communication system is
prone to bother from unauthorized people.
UNIT II PROGRAMMING MICROCONTROLLER FOR IOT
Introduction
A microcontroller (MCU) is a small computer on a single integrated circuit that is designed to control specific tasks within
electronic systems. It combines the functions of a central processing unit (CPU), memory, and input/output interfaces , all
on a single chip.
Microcontrollers are widely used in embedded systems, such as home appliances, automotive systems, medical devices,
and industrial control systems. They are also used in consumer electronics products, such as gaming systems, digital
cameras, and audio players.
A typical microcontroller consists of a processor core, volatile and non-volatile memory, input/output peripherals, and
various communication interfaces. The processor core is responsible for executing instructions and controll ing the other
components of the microcontroller. The memory is used to store data and program code, while the input/output peripherals
are used to interact with the external environment.
Microcontrollers are programmable, which means that they can be customized to perform specific tasks. The programming
languages used to write code for microcontrollers vary depending on the manufacturer and the type of microcontroller.
Some of the commonly used programming languages include C, C++, and assembly language.
A microcontroller is a self-contained desktop that can be utilized in an embedded system. A few microcontrollers may run
at clock rate rates and use four-bit expressions. Because many of the devices they control are battery-operated,
microcontrollers must often be low-power. Microcontrollers are found in a wide range of products, including consumer
electronics, automobile engines, computer peripherals, and test and measurement equipment. These are also well -suited to
long-term battery usage. The vast majority of microcontrollers in use today are embedded in other devices.
The microcontroller used in Embedded System. for example:
• Security Systems
• Laser Printers
• Automation System
• Robotics
Working of Microcontroller:
The microcontroller chip is a high-speed device, yet it is slow when compared to a computer. As a result, each command
will be executed quickly within the microcontroller. The quartz oscillator is enabled and through control logic register
once the supply is powered on. Parasite capacitors will be recharged for a few seconds while the early preparation is taking
place. Once the voltage level reaches its maximum value and the oscillator’s frequency stabilizes, the operation of writing
bits through special function registers becomes stable. Everything is controlled by the oscillator’s CLK, and the whole
electronics will begin to function. All of this happens in a matter of nanoseconds.
A microcontroller’s major role is that it can be thought of as a self-contained system with a processor memory. Its
peripherals can be used in the same way that an 8051 microcontroller can. The bulk of microcontrollers in use today are
embedded in other types of machinery such as telephones, appliances, vehicles, and computer system peripherals.
Types of Microcontroller:
Here are some of the most common types of microcontrollers:
8-bit Microcontrollers: These are the most basic type of microcontrollers, typically used in simple applications such
as toys, small appliances, and remote controls. They have a limited processing power and memory capacity, but they
are easy to use and cost-effective.
16-bit Microcontrollers: These are more advanced than 8-bit microcontrollers and are capable of performing more
complex tasks. They are commonly used in applications such as medical devices, automotive systems, and industrial
control systems.
32-bit Microcontrollers: These are the most powerful and feature-rich microcontrollers, capable of handling large
amounts of data and performing high-speed processing. They are used in applications such as gaming systems,
multimedia devices, and high-end industrial automation.
ARM Microcontrollers: These microcontrollers are based on the ARM architecture and are widely used in a variety
of applications, including mobile devices, automotive systems, and industrial control systems.
PIC Microcontrollers: These microcontrollers are manufactured by Microchip Technology and are commonly used
in a wide range of applications, including home appliances, automotive systems, and medical devices.
AVR Microcontrollers: These microcontrollers are manufactured by Atmel Corporation and are commonly used in
applications such as robotics, industrial control systems, and consumer electronics.
FPGA-based Microcontrollers: These microcontrollers use field-programmable gate arrays (FPGAs) to provide
highly customizable and flexible processing capabilities. They are commonly used in applications such as digital signal
processing, video processing, and high-speed networking.
CPU: The microcontroller is referred to as a CPU device since it is utilized to carry and decode data before effectively
completing the assigned duty. All microcontroller components are connected to a specific system utilizing a central
processing unit. The CPU can decode instructions retrieved from the programmable memory.
Memory: The memory chip of a microcontroller functions similarly to a microprocessor in that it stores all of the data
as well as programming. Microcontrollers have a limited quantity of RAM/ROM/flash memory for storing program
source code.
Input and Output ports: In general, these ports are used to interface or otherwise drive various appliances like LEDs,
LCDs, printers, and so on.
Serial Ports: Serial ports are used to offer serial interfaces between the microcontroller and a range of additional
peripherals, such as the parallel port.
Timers: Timers and counters are included in a microcontroller. In a microcontroller, they are used to manage all timing
and counting activities. The fundamental function of a counter is to count external pulses, whereas timers conduct clock
tasks, pulse production, modulations, frequency measurement, and oscillations, among other things.
ADC (Analog to Digital Converter): ADC is an acronym for Automated Data Collection (Analog to Digital
Converter). Analog to digital converter is abbreviated as ADC. The primary function of an ADC is to convert analog
signals to digital signals. The required input signals for ADC are analog, and the resulting digital signal is employed
in a variety of digital applications such as measurement equipment.
Control Interpretation: This controller is used to provide delayed control to a running application, with internal or
external interpretation.
Block with Special Functions: A specific function block is included in some special microcontrollers built for
particular devices such as robots and space systems. This block has additional ports for doing specific tasks.
Microcontroller Applications :
In contrast to microprocessors, which are used in personal computers and other devices, microcontrollers are mostly
employed in embedded devices. These are mostly utilized in a variety of products such as implantable medical devices,
machine tools, automotive engine control systems, office equipment, remote-controlled appliances, and so on. The
following are some of the most common uses for microcontrollers.
Microcontroller Properties :
Microcontroller devices are capable of having words longer than 64 bits.
Microcontroller consist of RAM , ROM , Timer , I/O Ports.
Microcontroller ROM is used for program storage and RAM is used for data storage.
It is designed by using CISC architecture.
The power consumption of modern microcontrollers is significantly lower and have operating voltage range from 1.8V
to 5.5V
The latest feature of microcontroller is flash memory like EPROM and EEPROM.
The most recent feature of a microcontroller is flash memory, such as EPROM and EEPROM.
Uses of Microcontroller :
Microcontrollers are used in a wide range of electronic devices and systems, including:
1. Home Appliances: Many home appliances, such as washing machines, refrigerators, and air conditioners, use
microcontrollers to perform various functions, such as temperature control, timing, and monitoring.
2. Automotive Systems: Microcontrollers are used in automotive systems, such as engine control units, anti-lock braking
systems, and airbag systems, to control various functions and ensure safe and efficient operation.
3. Medical Devices: Medical devices, such as insulin pumps, heart monitors, and blood glucose met ers, use
microcontrollers to perform various functions and provide accurate and reliable results.
4. Industrial Control Systems: Microcontrollers are used in industrial control systems, such as robotics, process control
systems, and manufacturing equipment, to control and monitor various processes and operations.
5. Consumer Electronics: Many consumer electronics devices, such as digital cameras, gaming systems, and audio
players, use microcontrollers to perform various functions and provide advanced features and capabilities.
6. IoT Devices: Internet of Things (IoT) devices, such as smart home systems, wearables, and environmental sensors, use
microcontrollers to connect to the internet and perform various functions.
7. Aerospace and Defense Systems: Microcontrollers are used in aerospace and defense systems, such as satellites,
avionics, and missiles, to control and monitor various functions and ensure safe and efficient operation.
Issues in Microcontroller :
some of the most common issues that can arise with microcontrollers:
1. Timing Issues: Microcontrollers rely on precise timing to execute instructions and perform tasks. Any issues with
timing can cause errors and malfunctions, which can be difficult to diagnose and fix.
2. Power Issues: Microcontrollers require a stable and consistent power supply to operate correctly. Any fluctuations or
disruptions in the power supply can cause the microcontroller to malfunction or fail.
3. Heat Issues: Microcontrollers generate heat during operation, and excessive heat can damage the dev ice or cause it to
malfunction. Heat issues can be caused by poor design, inadequate cooling, or high ambient temperatures.
4. Noise Issues: Microcontrollers can be affected by electromagnetic interference (EMI) and radio frequency interference
(RFI) from other electronic devices, which can cause errors and malfunctions.
5. Code Issues: The programming code used to control the microcontroller can contain errors and bugs, which can cause
the device to malfunction or fail.
6. Security Issues: Microcontrollers can be vulnerable to security breaches, including unauthorized access, data theft, and
malware attacks.
7. Compatibility Issues: Microcontrollers may not be compatible with other electronic components or devices, which can
cause errors and malfunctions.
8051 Architecture
In 1980, Intel introduced a powerful 8051 series of 8 -bit microcontrollers. They are the second generation of 8-bit
microcontrollers. The 8051 microcontrollers are used for a variety of applications involving limited calculations and relatively
some control strategies. They are used for industrial and commercial control applications, appliances control, instrumentation
etc.
The 8051 contains Boolean processor, full duplex serial port and power saving circuitry in addition to essential components
such as 8-bit CPU, RAM, ROM/EPROM/OTPROM, timer/counter and parallel I/O lines.
The pin diagram of 8051 microcontroller consists of 40 pins as given below:
Pin 1-8 (Port1): These are 8-bit bidirectional I/O port with internal pull-up resisters. It does not perform any task; it is just
an I/O port
Pin 9 (RST): It is a Reset input pin which is used to reset the microcontroller to its initial position.
Pin 10 to 17 (Port 3): It is also an 8-bit bidirectional I/O port with internal pull-up resisters. Additionally, it performs some
special functions:
P3.4 T0 Timer 0
P3.5 T1 Timer 1
Pin 18 and 19: It is XTAL1 and XTAL1 pins respectively. These pins are used for connecting an external crystal to get the
system clock.
Pin 20 (GND): It is a ground pin. It provides the power supply to the circuit.
Pin 21 to 28 (Port 2): These pins are bidirectional I/O port. Higher order address bus signals are multiplexed with this
bidirectional port.
Pin 29 (PSEN): It is a Program Enable Pin. Using this PSEN pin external program memory can be read.
Pin 30 (ALE/PROG): This pin is the Address Latch Enable pin. Using this pin, external address can be separated from data.
Pin 31 (EA/VPP): Named as external Access Enable Pin (EA). It is used to enable or disable the external memory
interfacing.
Pin 32 - 39 (Port 0): These are also a bidirectional I/O pins but without any internal pull-ups. Hence, it requires external pins
in order to use port 0 pins as I/O port. Lower order data and address bus signals are multiplexed with this port.
8051 microcontroller have 4 I/O ports each of 8-bit, which can be configured as input or output. Hence, total 32 I/O pins
allows the microcontroller to be connected with the peripheral devices.
Note: Pin can be configured as 0 for output and 1 for the input.
1) PORT 0
P0 can be used as a bidirectional I/O port or it can be used for address/data connected for accessing external memory. When
control is 1 the port is used for address or data interfacing. When the control is 0 then the port can be used as a bidirectional
I/O port.
If the control is 0 then the port is used as an input port and 1 is written to the latch. In this type of situation both the output
MOSFETs are off. Since the output pin has floats therefore, whatever data written on pin is directly read by read pin.
Suppose we want to write '0' on pin of port 0, when '0' is written to the latch, the pin is pulled down by the lower FET. Hence
the output becomes zero.
2) PORT 1
PORT 1 is dedicated only for I/O interfacing. When used as an output port, not needed to connect additional pull-up resistor
like port 0.
To use PORT 1 as an input port '1' has to be written to the latch. In this mode 1 is written to the pin by the external device
then it read fine.
3) PORT 2
PORT 2 is used for higher external address byte or a normal I/O port. Here, the I/O operation is similar to PORT 1. Latch of
PORT 2 remains stable when Port 2 pin are used for external memory access.
Fig: Structure of port 2 pin
4) PORT 3
P3.4 T0 Timer 0
P3.5 T1 Timer 1
It works as an I/O port same like port 2. Alternate functions of port 3 makes its architecture different than other ports.
8051 interrupts
Interrupt is a process of creating a temporary halt main program and pass the control to the external sources and execute
their task and then passes the control to the main program where it held left off.
o INT0,
o TFO,
o INT1,
o TF1,
o RI/TI.
The number of interrupt sources differs from version to version. It varies from 5 to 15.
The important interrupt sources are: one from the serial port, two from timers, two from external interrupts INT0 and INT1.
Each of the interrupts can individually be enabled/disabled by setting/clearing a bit in the special function register IE
(interrupt enable). The IE register also contains a global disable bit, which disables all the interrupts.
Each interrupt can also be programmed to one of the priority level scheme by setting/clearing bits in the special function
register IP (Interrupt Priority register).
A low priority interrupt can be interrupted by a high priority interrupt, but it cannot be interrupted by another low priority
interrupt. A high priority interrupt can?t be interrupted by a low priority interrupt.
Since I/O and memory connected Since I/O and memory present
externally, the circuit becomes large. internally, the circuit is small.
Can't be used in compact systems and Can be used in compact systems and
hence inefficient. microcontroller is an efficient
technique.
Different types of applications require different types of sensors to collect data from the
environment. This article takes a look at some common IoT sensors. In an Internet of Things (IoT)
ecosystem, two things are very important: the Internet and physical devices like sensorsand actuators.
As shown in Fig. 1, the bottom layer of the IoT system consists of sensor connectivity and network to
collect information. This layer is an essential part of the IoT systemand has network connectivity to the
next layer, which is the gateway and network layer.
Types of sensors
All the parameters i.e. the Sensors (which give inputs to the Computers), the Computers (the
brains of the system) and the mechanics (the outputs of the system like engines and motors)
are equally important in building a successful automated system.
Sensor as an input device which provides an output (signal) with respect to a specific physical
quantity (input). Sensor means that it is part of a bigger system which provides input to a main
control system (like a Processor or a Microcontroller).
PassiveIR, Ultrasound
Occupancy sensor Home/office monitoring
mostcommon
4.
Industrial monitoring/control,
Air/fluid pressuresensor Capacitive, Resistive
automotive, agriculture
8.
Industrial
9. Acoustic sensor Diaphragmcondenser
monitoring/control, humaninterface
Industrial Resistive thinfilms
10. Strain sensor
monitoring/control, civilinfrastructure
1. IR LED
It is also called as IR Transmitter. It is used to emit Infrared rays. The range of these frequencies are greater than the
microwave frequencies (i.e. >300GHz to few hundreds of THz). The rays generated by an infrared LED can be sensed
by Photodiode explained below.The pair of IR LED and photodiode is called IR Sensor.
It is a semiconductor device which is used to detect the light rays and mostly used as IR
Receiver. Its construction is similar to the normal PN junction diode but the working principle
differs from it. As we know a PN junction allows small leakage currents when it is reverse
biased so, this property is used to detect the light rays. A photodiode is constructed such that
light rays should fall on the PN junction which makes the leakage current increase based on
the intensity of the light that we have applied. So, in this way, a photodiode can be used to
sense the light rays and maintain the current through the circuit. Check here the working
of Photodiode with IR sensor.
3. Proximity Sensor
A Proximity Sensor is a non-contact type sensor that detects the presence of an object.
Proximity Sensors can be implemented using different techniques like Optical (like Infrared or
Laser), Ultrasonic, Hall Effect, Capacitive, etc.
As the name itself specifies that the resistor that depends upon the light intensity. It works on
the principle of photoconductivity which means the conduction due to the light. It is generally
made up of Cadmium sulfide. When light falls on the LDR, its resistance decreases and acts
similar to a conductor and when no light falls on it, its resistance is almost in the range of
MΩ or ideally it acts as an open circuit. One note should be considered with LDR is that it
won’t respond if the light is not exactly focused on its surface.
Fig. 7 LDR
With a proper circuitry using a transistor it can be used to detect the availability of light. A
voltage divider biased transistor with R2 (resistor between base and emitter) replaced with an
LDR can work as a light detector.
A thermistor can be used to detect the variation in temperature. It has a negative temperature
coefficient that means when the temperature increases the resistance decreases. So, the
thermistor’s resistance can be varied with the rise in temperature which causes more current
flow through it. This change in current flow can be used to determine the amount of change
in temperature. An application for thermistor is, it is used to detect the rise in temperature and
control the leakage current in a transistor circuit which helps in maintaining its stability. Here
is one simple application for Thermistor to control the DC fan automatically.
Fig. 8 Thermistor6.Thermocouple
(Temperature Sensor)
Another component that can detect the variation in temperature is a thermocouple. In its
construction, two different metals are joined together to form a junction. Its main principle is
when the junction of two different metals are heated or exposed to high temperatures a
potential across their terminals varies. So, the varying potential can be further used to measure
the amount of change in temperature.
A strain gauge is used to detect pressure when a load is applied. It works on the principle of
resistance, we know that the resistance is directly proportional to the length of the wire and is
inversely proportional to its cross-sectional area (R=ρl/a). The same principle can be used
here to measure the load. On a flexible board, a wire is arranged in a zig-zag manner as shown
in the figure below. So, when the pressure is applied to that particular board, it bends in a
direction causing the change in overall length and cross-sectional area of the wire. This leads
to change in resistance of the wire. The resistance thus obtained is very minute (few ohms)
which can be determined with the help of the Wheatstone bridge. The strain gauge is placed
in one of the four arms in a bridge with the remaining values unchanged. Therefore, when the
pressure is applied to it as the resistance changes the current passing through the bridge varies
and pressure can be calculated.
Strain gauges are majorly used to calculate the amount of pressure that an airplane wing can
withstand and it is also used to measure the number of vehicles allowable on a particular road
etc.
Load cells are similar to strain gauges which measure the physical quantity like force and give
the output in form of electrical signals. When some tension is applied on the load cell it
structure varies causing the change in resistance and finally, its value can be calibrated using
a Wheatstone bridge. Here is the project on how to measure weight using Load cell.
Fig 11.Load Cell
9. Potentiometer
A potentiometer is used to detect the position. It generally has various ranges of resistors
connected to different poles of the switch. A potentiometer can be either rotary or linear type.
In rotary type, a wiper is connected to a long shaft which can be rotated. When the shaft has
rotated the position of the wiper alters such that the resultant resistance varies causing the
change in the output voltage. Thus the output can be calibrated to detect the change its
position.
Fig 12.Potentiometer
10. Encoder
To detect the change in the position an encoder can also be used. It has a circular rotatable
disk-like structure with specific openings in between such that when the IR rays or light rays
pass through it only a few light rays get detected. Further, these rays are encoded into a digital
data (in terms of binary) which represents the specific position.
Fig 13.Encoder
11 Hall Sensor
The name itself states that it is the sensor which works on the Hall Effect. It can be defined as
when a magnetic field is brought close to the current carrying conductor (perpendicular to the
direction of the electric field) then a potential difference is developed across the given
conductor. Using this property a Hall sensor is used to detect the magnetic field and gives
output in terms of voltage. Care should be taken that the Hall sensor can detect only one pole
of the magnet.
The hall sensor is used in few smartphones which are helpful in turning off the screen when
the flap cover (which has a magnet in it) is closed onto the screen. Here is one practical
application of Hall Effect sensor in Door Alarm.
12. Flex Sensor
A FLEX sensor is a transducer which changes its resistance when its shape is changed or
when it is bent. A FLEX sensor is 2.2 inches long or of finger length. Simply speaking the
sensor terminal resistance increases when it’s bent. This change in resistance can do no good
unless we can read them. The controller at hand can only read the changes in voltage and
nothing less, for this, we are going to use voltage divider circuit, with that we can derive the
resistance change as a voltage change.
Microphone can be seen on all the smartphones or mobiles. It can detect the audio signal and
convert them into small voltage (mV) electrical signals. A microphone can be of many types
like condenser microphone, crystal microphone, carbon microphone etc. each type of
microphone work on the properties like capacitance, piezoelectric effect, resistance
respectively. Let us see the operation of a crystal microphone which works on the
piezoelectric effect. A bimorph crystal is used which under pressure or vibrations produces
proportional alternating voltage. A diaphragm is connected to the crystal through a drive pin
such that when the sound signal hits the diaphragm it moves to and fro, this movement changes
the position of the drive pin which causes vibrations in the crystal thus an alternating voltage
is generated with respect to the applied sound signal. The obtained voltage is fed to an
amplifier in order to increase the overall strength of the signal.
Fig 16.Microphone
14.Ultrasonic sensor
Ultrasonic means nothing but the range of the frequencies. Its range is greater than audible
range (>20 kHz) so even it is switched on we can’t sense these sound signals. Only specific
speakers and receivers can sense those ultrasonic waves. This ultrasonic sensor is used to
calculate the distance between the ultrasonic transmitter and the target and also used to
measure the velocity of the target.
Ultrasonic sensor HC-SR04 can be used to measure distance in the range of 2cm-400cm
with an accuracy of 3mm. Let’s see how this module works. The HCSR04 module generates
a sound vibration in ultrasonic range when we make the ‘Trigger’ pin high for about 10us
which will send an 8 cycle sonic burst at the speed of sound and after striking the object, it
will be received by the Echo pin. Depending on the time taken by sound vibration to get back,
it provides the appropriate pulse output. We can calculate the distance of the object based on
the time taken by the ultrasonic wave to return back to the sensor.
There are many applications with the ultrasonic sensor. We can make use of it avoid obstacles
for the automated cars, moving robots etc. The same principle will be used in the RADAR for
detecting the intruder missiles and airplanes. A mosquito can sense the ultrasonic sounds. So,
ultrasonic waves can be used as mosquito repellent.
15.Touch Sensor
In this generation, we can say that almost all are using smartphones which have widescreen
that too a screen which can sense our touch. So, let’s see how this touchscreen works.
Basically, there are two types of touch sensors resistive based and a capacitive based touch
screens. Let’s know about working of these sensors briefly.
The resistive touch screen has a resistive sheet at the base and a conductive sheet under the
screen both of these are separated by an air gap with a small voltage applied to the sheets.
When we press or touch the screen the conductive sheet touches the resistive sheet at that
point causing current flow at that particular point, the software senses the location and relevant
action is performed.
16.PIR sensor
PIR sensor stands for Passive Infrared sensor. These are used to detect the motion of
humans, animals or things. We know that infrared rays have a property of reflection. When
an infrared ray hits an object, depending upon the temperature of the target the infrared ray
properties changes, this received signal determines the motion of the objects or the living
beings. Even if the shape of the object alters, the properties of the reflected infrared rays can
differentiate the objects precisely. Here is the complete working or PIR sensor.
3. ACTUATOR
Actuators use energy from a source upon the receipt of a signal so as to bring about a
mechanical motion. This blog tells you about how they function and the many types of actuators
used today. Actuators are mechanical or electro-mechanical devices that, upon beingoperated
electrically, manually, or by various fluids, allow controlled and sometimes limited movements
or positioning. They refer to that component of a machine that helps carry out the moving and
controlling of a mechanism or system; take for instance opening a valve. To put itsimply, they
can be called movers.
Actuators basically need a control signal and a source of energy. Upon receiving a control
signal, the actuator uses energy from the source to bring about a mechanical motion. The
control system can be a human, a fixed mechanical or electronic system, or even software-
based, say a printer driver, or a robot control system. Examples of actuators include electric
motors, stepper motors, electroactive polymers, screw jacks, servomechanism, solenoids and
hydraulic cylinders.
1. PHYSICAL DEVICE- INTRODUCTION TO AUDUINO
Arduino is an open-source platform used for building electronics projects. Arduino
consists of both a physical programmable circuit board (often referred to as a microcontroller)
and a piece of software, or IDE (Integrated Development Environment) that runs on your
computer, used to write and upload computer code to the physical board. Accepts analog and
digital signals as input and gives desired output.
BOARD DETAILS:
ARDUIN0 UN0
Power Supply:
Feature Value
USB or power barrel jack
OperatingVoltage 5V
Voltage Regulator
LED Power Indicator
Tx-Rx LED Indicator
Output power,
Ground
Analog Input Pins
Digital I/O Pin
SET UP:
2. LilyPad Arduino
3. RedBoard
5. Arduino Leonardo
Fig. 1 Arduino Board
Every Arduino board needs a way to be connected to a power source. The Arduino
UNO can be powered from a USB cable coming from your computer or a wall power supply
(like this) that is terminated in a barrel jack. In the picture above the USB connection is labeled
(1) and the barrel jack is labeled (2). The USB connection is also how you will load code onto
your Arduino board.
NOTE: Do NOT use a power supply greater than 20 Volts as you will overpower (and thereby
destroy) Arduino. The recommended voltage for most Arduino models is between 6 and 12
Volts.
The pins on your Arduino are the places where you connect wires to construct a circuit
(probably in conjunction with a breadboard and some wire. They usually have black plastic
‘headers’ that allow you to just plug a wire right into the board. The Arduino has several
different kinds of pins, each of which is labeled on the board and used for different functions.
GND (3): Short for ‘Ground’. There are several GND pins on the Arduino, any of which can
be used to ground your circuit.
5V (4) & 3.3V (5): As you might guess, the 5V pin supplies 5 volts of power, and the 3.3V pin
supplies 3.3 volts of power. Most of the simple components used with the Arduino run happily
off of 5 or 3.3 volts.
Analog (6): The area of pins under the ‘Analog In’ label (A0 through A5 on the UNO) are
Analog In pins. These pins can read the signal from an analog sensor (like a temperature sensor)
and convert it into a digital value that we can read.
Digital (7): Across from the analog pins are the digital pins (0 through 13 on the UNO). These
pins can be used for both digital input (like telling if a button is pushed) and digital output (like
powering an LED).
PWM (8): You may have noticed the tilde (~) next to some of the digital pins (3, 5, 6, 9, 10,
and 11 on the UNO). These pins act as normal digital pins, but can also be used for something
called Pulse-Width Modulation (PWM). We have a tutorial on PWM, but for now, think of
these pins as being able to simulate analog output (like fading an LED in and out).
AREF (9): Stands for Analog Reference. Most of the time you can leave this pin alone. It is
sometimes used to set an external reference voltage (between 0 and 5 Volts) as the upper limit
for the analog input pins.
Reset Button
Just like the original Nintendo, the Arduino has a reset button (10). Pushing it will temporarily
connect the reset pin to ground and restart any code that is loaded on the Arduino. This can be
very useful if your code doesn’t repeat, but you want to test it multiple times. Unlike the original
Nintendo however, blowing on the Arduino doesn’t usually fix any problems.
Just beneath and to the right of the word “UNO” on your circuit board, there’s a tiny LED next
to the word ‘ON’ (11). This LED should light up whenever you plug your Arduino into a power
source. If this light doesn’t turn on, there’s a good chance something is wrong. Time to re-
check your circuit!
TX RX LEDs
TX is short for transmit, RX is short for receive. These markings appear quite a bit in electronics
to indicate the pins responsible for serial communication. In our case, there are twoplaces on
the Arduino UNO where TX and RX appear – once by digital pins 0 and 1, and a second time
next to the TX and RX indicator LEDs (12). These LEDs will give us some nice visual
indications whenever our Arduino is receiving or transmitting data (like when we’re loading a
new program onto the board).
Main IC
The black thing with all the metal legs is an IC, or Integrated Circuit (13). Think of it as the
brains of our Arduino. The main IC on the Arduino is slightly different from board type to
board type, but is usually from the ATmega line of IC’s from the ATMEL company. This can
be important, as you may need to know the IC type (along with your board type) before loading
up a new program from the Arduino software. This information can usually be found in writing
on the top side of the IC. If you want to know more about the difference between various IC’s,
reading the datasheets is often a good idea.p
Voltage Regulator
The voltage regulator (14) is not actually something you can (or should) interact with on the
Arduino. But it is potentially useful to know that it is there and what it’s for. The voltage
regulator does exactly what it says – it controls the amount of voltage that is let into the Arduino
board. Think of it as a kind of gatekeeper; it will turn away an extra voltage that might harm
the circuit. Of course, it has its limits, so don’t hook up your Arduino to anything greater than
20 volts.
DATA TYPES:
Void ,Long, Int ,Char ,Boolean, Unsigned char ,Byte, Unsigned int, Word ,Unsigned long
,Float, Double, Array ,String-char array, String-object, Short
Delay() function is one of the most common time manipulation function used to provide a delay
of specified time. It accepts integer value (time in miliseconds)
EXAMPLE BLINKING LED:
Requirement:
Arduino controller board, USB connector, Bread board, LED, 1.4Kohm resistor, connecting
wires, Arduino IDE
Connect the LED to the Arduino using the Bread board and the connecting wires
Connect the Arduino board to the PC using the USB connector
Select the board type and port Write the sketch in the editor, verify and upload
Connect the positive terminal of the LED to digital pin 12 and the negative terminal to the
ground pin (GND) of Arduino Board
void setup()
{
pinMode(12, OUTPUT); // set the pin mode
} void loop()
{
digitalWrite(12, HIGH); //
Turn on the LED
delay(1000);
digitalWrite(12, LOW);
//Turn of the LED
delay(1000);
}
Connect he board to the PC Set the port and board type Verify the code and
upload,Notice the TX – RX led in the board starts flashing as the code is
uploaded.
Sensor and actuators are critical components of embedded systems. These are utilized in
various real-world applications, including flight control systems in aircraft, process control
systems in nuclear reactors, and power plants that require automated control. Sensors and
actuators differ primarily in their purpose; the sensor is utilized to track environmental changes
using measurands, whereas the actuator is utilized when monitoring is combined with control,
such as controlling physical changes.
In this article, you will learn about the difference between Sensors and Actuators. But before
discussing the differences, you must know about Sensors and Actuators with their types and
features.
A sensor is a device that detects changes and events in a physical environment. It may convert
physical parameters like humidity, pressure, temperature, heat, motion, etc., into electrical
signals. This signal can be converted into a human-readable display and sent across a network
for additional processing. Active sensors and passive sensors are the two primary types of
sensors. Active sensors necessitate a power supply, whereas passive sensors don't require a
power supply.
There are various types of sensors available, including temperature, ultrasonic, pressure, and
location sensors, among others. They are utilized for detecting and measuring the relevant
quantities. A sensor works by sensing a quantity by utilizing a particular detecting device. Each
sensor operates on a distinct principle, such as an electromagnetic sensor, a resistive sensor, a
capacitor sensor, etc. In general, they sense the matching attribute in the environment and
convert it into a proportional magnitude electrical signal.
1. Biosensors
These biosensors utilize electrochemical technology. These sensors are used in medical, food,
and water testing devices. These biosensors also aid in analyzing proteins, cells, nucleic acid,
etc.
2. Accelerometers
These sensors utilize the Micro Electro Mechanical Sensor Technology. These sensors utilize
in patient monitoring, vehicle systems, etc.
3. Image Sensors
These sensors utilize the Complementary Metal Oxide Sensor mechanism. They detect and
transfer data that is utilized to make an image. These image sensors are very useful in consumer
surveillance and electronic systems.
4. Chemical Sensors
These sensors use ultrasonic, microwave, and radar technology, and they are used in security
systems, video games, and other applications.
Features of Sensors
There are various features of Sensors. Some main features of Sensors are as follows:
1. A sensor could be either active or passive. Active sensors necessitate a power source,
but passive doesn't necessitate a power source.
2. It is a device that monitors and measures changes in the environment.
3. It is responsible for converting physical quantities into electrical signals.
4. It is connected to a system's input.
5. It generates an electrical signal as its output.
What are Actuators?
A device that changes electrical signals into mechanical work is known as an actuator. It is
used to cause movement or a change in the surroundings. For instance, a fan is utilized to lower
the temperature, and a servo motor is utilized to change position, among other things.
Actuators are connected to a system's output. It receives an electrical signal as input and
produces mechanical movement as output. It receives input or instruction from a system or a
signal conditioning device and outputs it to the environment.
The actuator is dependent on the sensor data. The sensor sends data to a signal condition unit,
which analyzes the data or information and transmits commands to the actuator depending on
that data. A "temperature control system" is an instance of an actuator system in which a
temperature sensor manages the temperature. If the temperature surpasses a specific limit, the
device instructs the fan to increase its speed and decrease the temperature.
Types of Actuators
1. Manual Actuator
This type of actuator is manually operated via gears, levers, and wheels, among other things.
They do not need a power source because they are powered by human action.
2. Spring Actuator
It has a loaded spring that is triggered and released to generate mechanical work. It may be
triggered in several ways.
3. Hydraulic Actuator
4. Electric Actuators
These actuators require power to function. It utilizes an electric motor to produce movement.
They are quick and effective.
Features of Actuators
There are various features of Actuators. Some main features of Actuators are as follows:
There are various key differences between Sensors and Actuators. Some main differences
between Sensors and Actuators are as follows:
1. A sensor is a device that detects changes or events in the environment and transmits
that data to other electronic devices. In contrast, an actuator is a machine component
that moves and controls mechanisms.
2. Electrical signals are generated via sensors. On the other hand, an actuator produces
energy in the form of heat or motion.
3. The sensor is placed at the input port to receive input. In contrast, the actuator is located
at the output port.
4. There is some example of sensors that utilize sensors, including Magnetometer,
cameras, microphones, etc. In contrast, actuators are employed in LEDs, loudspeakers,
motor controllers, lasers, etc.
5. Sensors are utilized to measure physical quantities. On the other hand, the actuator is
utilized to measure the discrete and continuous process parameters.
6. The sensor takes input from the environment. In contrast, the actuator receives input
from the system's output conditioning unit.
Here, you will learn the head-to-head comparisons between Sensors and Actuators. The main
differences between Sensors and Actuators are as follows:
Type of Electrical signals are generated via IIt generates energy in the form of
Output sensors. heat or motion.
Source of It receives input from the environment. IIt receives input from the system's
Input output conditioning unit.
Placement These are placed at a system's input IThese are placed at a system's
port. output port.
Output It produces output for the input IIt produces output for their
Generation conditioning unit of a system. environment.
The IoT connects the devices in a location and enables the exchange of regular information and
data. That’s how devices and humans can communicate freely, and you can relay instructions
and settings to the different home appliances.
This communication takes place over the Wi-Fi, wireless Bluetooth systems, and Ethernet
cables linking the devices directly to the router.
The most critical aspect of IoT is efficient and uninterrupted connectivity that defines how well
your end-to-end IoT functions. The Internet of Things communicates via hundreds of different
protocols or languages.
Several factors influence the protocol you’ll choose to connect IoT devices over internet.
Like, for instance:
Although the systems that connect IoT devices over the internet vary in structure, they
essentially have some basic components. You will need these software and hardware
to connect IoT devices over internet.
1. IoT device is the central hub of your home that connects to the internet and transmits
data. Some great examples include Google Home Voice Controller, Amazon
Echo, Apple HomeKit, and Samsung SmartThings.
2. Application protocols are the languages in which the devices communicate with one
another.
3. Communication devices include Wi-Fi, Bluetooth, and Ethernet cables.
4. The network server remains inside the cloud data center. This server accepts commands
and data and transmits it back to the internet.
5. Gateways are responsible for linking local device networks to the internet server by
converting the information into relevant protocols. Gateways process the information
to ensure that the devices understand the commands or messages you send.
6. Cloud applications work like a bridge or translator that processes IoT data into
information that humans can use.
7. In case you opt to use an Ethernet cable, you’ll need adequate lengths of wiring to
connect the various appliances.
8. The user interface is the application’s appearance on the mobile phone or any other
device like a tablet or laptop. This interface enables you to change settings according
to specifications. The app then relays the commands to the IoT appliances.
Wi-Fi networks are possibly the most popular ways to connect IoT devices over the internet.
Wi-Fi connectivity technology has the highest throughput and capacity compared to other
options.
Although Wi-Fis use more power than your average Bluetooth system, they are more reliable
and scalable. You can receive signals to your mobile devices and relay signals that penetrate
barriers like walls and objects.
Your Wi-Fi system’s range will depend on factors like the antenna, location, and power of
transmission. The typical range of a standard Wi-Fi is 50 meters, achievable with a
performance standard of 802.11b. If you need more extensive ranges like 90 meters, you’ll go
with the 802.11ac version.
You’ll need two main pieces of hardware to get the Wi-Fi system running. For starters, you’ll
create the wireless local area network (LAN) by connecting to a home wireless network.
Next, you’ll need to ensure your hub has a WI-Fi-enabled chip with a micro-controller.
Micro-controllers function like mini computers and carry components like an input/output
(I/O), memory, and processor. Also, make sure that the hub has a compatible antenna that picks
up signals from your Wi-Fi network.
Homeowners can use their Wi-Fi systems to run a whole range of domestic appliances. Smart
home solutions include your Smart TV, HVAC and climate control systems, smart lighting,
voice-activated electronic devices, and cooking appliances.
You can also integrate smart fridges and water and power metering with the hub. Home security
devices are also compatible, and that’s how you use Wi-Fi to connect IoT devices over the
internet.
Cellular connectivity is possibly one of the cheapest and most efficient ways to connect IoT
devices over the internet. Cellular options are more effective since they connect to satellites
and use the nearest broadcast towers to communicate.
Unlike Wi-Fis, which have a limited range, cellulars function with your typical SIM or eSIM
card. In other words, you’ll relay commands to your appliances via your cell network. This
option to enable remote connect IoT over internet is very reliable and provides universal
compatibility.
Cellular connectivity does come with a couple of downsides. For one, this networking option
has a high power consumption rate and is not exactly cost-effective. Further, any commands
you send must route via satellites to reach your appliances.
Connecting to the Internet via Ethernet Cable to Remote Connect iot over Internet
Although using wireless methods to connect IoT device over internet seems convenient,
there are several downsides. For instance, Wi-Fi connections have a limited range, and when
you need to integrate multiple appliances, that’s a problem.
Further, you might need higher bandwidth and speeds that could weaken as the distance to the
appliances increases. A good way to get around the problem is to use Ethernet cables.
Should you opt to go with this option, you can expect great speeds thanks to the latest fiber
optic cable technology. Though, the standard DSL cables or standard phone lines are also
efficient. Your home appliances will communicate directly with the central hub via an Ethernet
cable.
This option assures you of reliability, and modern-day homes have a cable network running
through the walls. You can directly plug your appliances into the wall Ethernet jack and link it
to the home automation or IoT. That’s how you can access IoT device over the internet.
This information should give you an overview of the different options available to connect IoT
device over internet. Let’s answer a few of the most commonly asked questions users have.
Most smartphones today use Bluetooth technology for short-range communication. The more
advanced versions like Bluetooth Mesh and Bluetooth low energy (BLE) enable you to use
your smartphone or Android like a hub.
So, you might say that Bluetooth is the best mobile technology for IoT. Smartphones use the
“Bluetooth Terminal” app, though the “BT Voice Control for Android” is also compatible with
it. You’ll download and install the Bluetooth interface and send commands to your appliances
by configuring settings on the app.
If you choose to adopt the BT voice App, it receives your voice commands in human English.
Next, it converts the message into protocols and sends the message over to the configured
device. It will interest you to know that these protocols are in the form of numbers.
The app assigns each number to a different appliance and relates numeric commands like “On”
or “Off.” Modern-day Bluetooth consumes very little power, and users can use this
communication type to manage a range of personal devices.
Wearable health devices like smartwatches and health and fitness gadgets also enable remote
connect IoT over the internet. For instance, a pulse oximeter to measure the user’s oxygen
saturation in their blood. Or glucose meters to continuously measure blood sugar levels. Then,
there are wearable devices that relay a constant reading of the user’s blood pressure and heart
rate.
Low power wide area networks typically utilise unlicensed radio technologies to enable
relatively low capacity over sites such as factories, campuses and mines. Most offer a cost-
effective, low power alternative to cellular connectivity, with the exception of NB-IoT, and are
well-suited for IoT applications that require modest throughput.
1. MICROPROCESSOR
Microprocessor is a controlling unit of a micro-computer, fabricated on a small chip capable of
performing ALU (Arithmetic Logical Unit) operations and communicating with the other devices
connected to it.
Microprocessor consists of an ALU, register array, and a control unit. ALU performs arithmetical
and logical operations on the data received from the memory or an input device. Register array
consists of registers identified by letters like B, C, D, E, H, L and accumulator. The control unit
controls the flow of data and instructions within the computer.
Initially, the instructions are stored in the memory in a sequential order. The microprocessor
fetches those instructions from the memory, then decodes it and executes those instructions till
STOP instruction is reached. Later, it sends the result in binary to the output port. Between these
processes, the register stores the temporarily data and ALU performs the computing functions.
Features of a Microprocessor
MICROPROCESSOR ARCHITECTURE
We have tried to depict the architecture of 8085 with this following image –
Microprocessor – Functional Units
8085 consists of the following functional units −
Accumulator
It is an 8-bit register used to perform arithmetic, logical, I/O & LOAD/STORE operations. It is
connected to internal data bus & ALU.
Arithmetic and logic unit
As the name suggests, it performs arithmetic and logical operations like Addition, Subtraction,
AND, OR, etc. on 8-bit data.
General purpose register
There are 6 general purpose registers in 8085 processor, i.e. B, C, D, E, H & L. Each register can
hold 8-bit data.
These registers can work in pair to hold 16-bit data and their pairing combination is like B-C, D-
E & H-L.
Program counter
It is a 16-bit register used to store the memory address location of the next instruction to be
executed. Microprocessor increments the program whenever an instruction is being executed, so
that the program counter points to the memory address of the next instruction that is going to be
executed.
Stack pointer
It is also a 16-bit register works like stack, which is always incremented/decremented by 2 during
push & pop operations.
Temporary register
It is an 8-bit register, which holds the temporary data of arithmetic and logical operations.
Flag register
It is an 8-bit register having five 1-bit flip-flops, which holds either 0 or 1 depending upon the
result stored in the accumulator.
These are the set of 5 flip-flops −
• Sign (S)
• Zero (Z)
• Auxiliary Carry (AC)
• Parity (P)
• Carry (C)
Its bit position is shown in the following table −
D7 D6 D5 D4 D3 D2 D1 D0
S Z AC P CY
Instruction register and decoder
It is an 8-bit register. When an instruction is fetched from memory then it is stored in the Instruction
register. Instruction decoder decodes the information present in the Instruction register.
Timing and control unit
It provides timing and control signal to the microprocessor to perform operations. Following are
the timing and control signals, which control external and internal circuits −
Interrupt control
As the name suggests it controls the interrupts during a process. When a microprocessor is
executing a main program and whenever an interrupt occurs, the microprocessor shifts the control
from the main program to process the incoming request. After the request is completed, the control
goes back to the main program.
There are 5 interrupt signals in 8085 microprocessor: INTR, RST 7.5, RST 6.5, RST 5.5, TRAP.
Serial Input/output control
It controls the serial data communication by using these two instructions: SID (Serial input data)
and SOD (Serial output data).
Address buffer and address-data buffer
The content stored in the stack pointer and program counter is loaded into the address buffer and
address-data buffer to communicate with the CPU. The memory and I/O chips are connected to
these buses; the CPU can exchange the desired data with the memory and I/O chips.
Address bus and data bus
Data bus carries the data to be stored. It is bidirectional, whereas address bus carries the location
to where it should be stored and it is unidirectional. It is used to transfer the data & Address I/O
devices.
2. TYPES OF MICROPROCESSOR:
RISC stands for Reduced Instruction Set Computer. It is designed to reduce the execution time
by simplifying the instruction set of the computer. Using RISC processors, each instruction
requires only one clock cycle to execute results in uniform execution time. This reduces the
efficiency as there are more lines of code, hence more RAM is needed to store the instructions.
The compiler also has to work more to convert high-level language instructions into machine code.
Architecture of RISC
RISC microprocessor architecture uses highly-optimized set of instructions. It is used in portable
devices like Apple iPod due to its power efficiency.
Characteristics of RISC
The major characteristics of a RISC processor are as follows −
• It consists of simple instructions.
• It supports various data-type formats.
• It utilizes simple addressing modes and fixed length instructions for pipelining.
• It supports register to use in any context.
• One cycle execution time.
• “LOAD” and “STORE” instructions are used to access the memory location.
• It consists of larger number of registers.
• It consists of less number of transistors.
CISC PROCESSOR
CISC stands for Complex Instruction Set Computer. It is designed to minimize the number of
instructions per program, ignoring the number of cycles per instruction. The emphasis is on
building complex instructions directly into the hardware.
The compiler has to do very little work to translate a high-level language into assembly level
language/machine code because the length of the code is relatively short, so very little RAM is
required to store the instructions.
Some of the CISC Processors are −
• IBM 370/168
• VAX 11/780
• Intel 80486
Architecture of CISC
Its architecture is designed to decrease the memory cost because more storage is needed in larger
programs resulting in higher memory cost. To resolve this, the number of instructions per program
can be reduced by embedding the number of operations in a single instruction.
Characteristics of CISC
• Variety of addressing modes.
• Larger number of instructions.
• Variable length of instruction formats.
• Several cycles may be required to execute one instruction.
• Instruction-decoding logic is complex.
• One instruction is required to support multiple addressing modes.
Special Processors
These are the processors which are designed for some special purposes.
• Vector processors
• Array Processors or SIMD Processors
• Digital Signal Processors (DSP)
• Symbolic Processors
• Graphic Processors
Symbolic Processors
• Symbolic processors are designed for expert system, machine intelligence, knowledge
based system, pattern-recognition, text retrieval, etc.
• The basic operations which are performed for artificial intelligence are:
• Logic interference,
• compare, search,
• pattern matching, filtering, unification, retrieval, reasoning, etc.
• This type of processing does not require floating point operations.
Graphics Processors
Coprocessor
A coprocessor is a specially designed microprocessor, which can handle its particular function
many times faster than the ordinary microprocessor.
For example − Math Coprocessor.
Some Intel math-coprocessors are −
• Microprocessors understand machine code, but they will require a higher level
programming language such as "C" or "Assembly" to write the program.
• An essential tool for programming a microprocessor is an Integrated Development
Environment (IDE).
• This is software that is developed by the creators of the microprocessors which will
compile the code into a language the machine can understand.
STEPS
Step1: set up the IDE TOOL
Step2 : Write the program
Step3: test the program using the IDE simulation package.
(Debugging the code through the simulation software )
Step 4: This device connects to your serial port and has a socket that
fits up to 60-pin microprocessors.
Step5: Then you can embed your program onto your microprocessor.
2.Exploitingsoftwarevulnerabilities
A mistake in software is referred to as a bug. In most cases, these bugs are annoying, but
harmless. However, some bugs are significant vulnerabilities that can be exploited to gain
unauthorized access into applications, networks, operating systems, or hardware. These
vulnerability exploits are commonly executed with software or code that can take control of
systems and steal data.
3.Socialengineering
Cybercriminals often gain unauthorized access by taking advantage of human
vulnerabilities, convincing people to hand over credentials or sensitive data. These attacks, known
as social engineering, often involve some form of psychological manipulation and utilize malicious
links in email, pop-ups on websites, or text messages. Common social engineering tactics used to
gain unauthorized access include phishing, smishing, spear phishing, ransomware,
and impersonation.
1.2.2 Physical Unauthorized Access Tactics
Cybercriminals often gain unauthorized access to physical spaces to carry out their plans.
Some opt to steal laptops or smart devices, then break into them offsite. Others target computers
or routers to insert malware.
1. Tailgating or piggybacking
Tailgating is a tactic used to gain physical access to resources by following an authorized
person into a secure building, area, or room. The perpetrator can be disguised as a delivery or
repair person, someone struggling with an oversized package who may require assistance, or
someone who looks and acts as if they belong there. Most of these situations occur "in plain
sight."
2.Fraudulentuseofaccesscards
Access cards that are lost, stolen, copied or shared pose an unauthorized access risk.
3.Doorpropping
While incredibly simple, propping open a door or window is one of the most effective ways
for an insider to help a perpetrator gain unauthorized access to restricted buildings or spaces.
2.Passbacks
Passbacks are instances of sharing credentials or access cards to gain unauthorized access
to physical places or digital systems.
• Encryption should be used for viewing, exchanging, and storing sensitive information.
• Network drives should be used to store sensitive information to protect it from unauthorized
access and for disaster recovery.
• Mobile devices and personal computing devices should not be used for storing sensitive
information.
• Removable media and devices should not be used to store sensitive information.
• Access to systems and data should be limited on a need to use basis, also known as the
principle of least privilege.
Organizational leaders should ensure strong password policies and effective compliance programs
are in place to prevent unauthorized access, as well as follow these guidelines themselves.
• Passwords should be changed for any account or device that has experienced an unauthorized
access incident.
• Strong passwords should be used that include a combination of letters, numbers, and
symbols. A password should not be a word, common phrase, or one that someone with a little
personal knowledge might guess, such as the user’s child’s name, address, or phone number.
• Computers, laptops, and smart devices should have the lock screen enabled, and should be
shut down when not in use for extended periods.
• Single sign-on (SSO) should be considered to centrally manage users’ access to systems,
applications, and networks.
• Operating systems and applications should be updated when patches and new versions are
available.
• Timing is of the essence in the event of an unauthorized access incident. Prior planning
and having a team ready to respond is critical.
• The National Institute of Standards and Technology offers four steps for incident response
handling:
•
The Incident Response Lifecycle illustrates the steps involved to recover from an
unauthorized access incident.
2. IoT and Cloud Computing
Internet of Things
Internet of Things (IoT) refers to a system of connected physical objects via the
internet. The ‘thing’ in IoT can refer to a person or any device which is assigned through
an IP address. A ‘thing’ collects and transfers data over the internet without any manual
intervention with the help of embedded technology. It helps them to interact with the
external environment or internal states to take the decisions.
Cloud Computing
Cloud Computing offers services to users on a pay-as-you-go model. Cloud
providers offer three primary services.
Cloud is a centralized system helping to transfer and deliver data and files to data
centers over the Internet. A variety of data and programs are easy to access from a centralized
cloud system. The Internet of Things refers to devices connected to the Internet. In the IoT, data
is stored in real-time, as well as historical data. The IoT can analyze and instruct devices to
make effective decisions, as well as track how certain actions function.
Cloud computing encompasses the delivery of data to data centers over the Internet.
IBM divides cloud computing into six different categories:
Cloud computing works to improve the efficiency of daily tasks in conjunction with the
Internet of Things. Cloud computing is about providing a path for data to reach its destination
while the Internet of Things generates a huge amount of data.
According to Amazon Web Services, there are four benefits of cloud computing:
1. No need to pre-guess infrastructure capacity needs
2. Saves money, because you only need to pay for those resources that you use, the larger the
scale, the more savings
3. In a few minutes, platforms can be deployed around the world
4. Flexibility and speed in providing resources to developers
Thus, the role of cloud computing in IoT is to work together to store IoT data, providing
easy access when needed. It’s important to note that cloud computing is an easy way to move
large data packets across the Internet generated by the IoT.
The three main components of the cloud listed below will revolutionize the Internet of Things:-
1. Computing power
2. Reliability
3. Connectivity
Cloud computing offers a wide range of services to IoT such as data storage, processing, and analysing.
Cloud computing also allows IoT device users to carry out common computing tasks using services
that are entirely provided over the internet.
Integrating IoT and cloud computing, especially in an enterprise environment, is very cost-
effective. The enterprise does not have to own all the devices, platforms and services but can hire from
the cloud service providers.
The mobile IoT devices such as smartwatches collect data at different locations and may need
to access these data at any time. The cloud enables the devices to store data and access it from any
location.
o Public Cloud: Third-party providers that distribute computing services over the Internet
are known as public cloud platforms. A few good examples of trending and mostly used
cloud platform are Google Cloud Platform, AWS (Amazon Web Services), Microsoft
Azure, Alibaba and IBM Bluemix.
o Hybrid Cloud: The type of cloud architecture that combines both the public and private
cloud systems is termed to as a Hybrid cloud platform. Data and programs are easily
migrated from one to the other. This allows the company to be more flexible while still
improving infrastructure, security, and enforcement.
Organizations can use a cloud platform to develop cloud-native software, test and build them,
and store, back up, and recover data. The major role of it is that will not only help the company to
grow but also it helps to perform the data analysis with the help of different algorithms and the
results can be a true deal breaker. Streaming video and audio, embedding information into
activities, and providing applications on-demand on a global scale are all possibilities.
Simply stated, cloud computing is the distribution of computing services over the Internet
("the cloud") in order to provide quicker innovation, more versatile resources, and economies of
scale.
We usually only pay for the cloud services that we use, which helps us to cut costs, operate
our infrastructure more effectively, and scale as our company grows.
Amazon Web Services (AWS) –
AWS provides different wide-ranging clouds IaaS services, which ranges from virtual
compute, storage, and networking to complete computing stacks. AWS is well known for its
storage and compute on demand services, named as Elastic Compute Cloud (EC2) and Simple
Storage Service (S3). EC2 offers customizable virtual hardware to the end user which can be
utilize as the base infrastructure for deploying computing systems on the cloud.
Google AppEngine –
Microsoft Azure is a Cloud operating system and a platform in which user can develop the
applications in the cloud. Generally, a scalable runtime environment for web applications and
distributed applications is provided. Application in Azure are organized around the fact of roles,
which identify a distribution unit for applications and express the application’s logic. Azure
provides a set of additional services that complement application execution such as support for
storage, networking, caching, content delivery, and others.
Hadoop –
Apache Hadoop is an open source framework that is appropriate for processing large
data sets on commodity hardware. Hadoop is an implementation of MapReduce, an application
programming model which is developed by Google. This model provides two fundamental
operations for data processing: map and reduce.
Yahoo! Is the sponsor of the Apache Hadoop project, and has put considerable effort in
transforming the project to an enterprise-ready cloud computing platform for data processing.
Hadoop is an integral part of the Yahoo! Cloud infrastructure and it supports many business
processes of the corporates. Currently, Yahoo! Manges the world’s largest Hadoop cluster,
which is also available to academic institutions.
Force.com and Salesforce.com –
Force.com is a Cloud computing platform at which user can develop social enterprise
applications. The platform is the basis of SalesForce.com – a Software-as-a-Service solution
for customer relationship management. Force.com allows creating applications by composing
ready-to-use blocks: a complete set of components supporting all the activities of an enterprise
are available.
From the design of the data layout to the definition of business rules and user interface
is provided by Force.com as a support. This platform is completely hostel in the Cloud, and
provides complete access to its functionalities, and those implemented in the hosted applications
through Web services technologies.
With Cloud Computing comes cloud antivirus software which is stored in the cloud
from where they monitor viruses and malware in the organization’s system and fixes them. Earlier,
organizations had to install antivirus software within their system and detect security threats.
6. E-commerce Application
Ecommerce applications in the cloud enable users and e-businesses to respond quickly
to emerging opportunities. It offers a new approach to business leaders to make things done with
minimum amount and minimal time. They use cloud environments to manage customer data,
product data, and other operational systems.
E-learning, online distance learning programs, and student information portals are some
of the key changes brought about by applications of cloud computing in the education sector. In
this new learning environment, there’s an attractive environment for learning, teaching,
experimenting provided to students, teachers, and researchers so they can connect to the cloud of
their establishment and access data and information.
UNIT V
IOT ANALYTICS AND PLATFORMS
IOT Analytics: Role of Analytics in IOT – Data visualization Techniques –
Introduction to R Programming – Statistical Methods – IoT Platforms –
Future Trends of IoT.
Introduction
IoT devices are connected to the internet, producing large amounts of
heterogeneous data. This data, also known as big data, is generated by multiple
machines and devices that exchange information. Once these data are stored in a
database, they can be analyzed by advanced analytic tools. These tools are highly
efficient and can be used to analyze IoT-related big data. This can provide detailed
descriptions of the examined data.
DATA ANALYTICS
• Many of the techniques and processes of data analytics have been automated
into mechanical processes and algorithms that work over raw data for human
consumption.”
• Data analytics is examined as a procedure to examine small and big data sets
with different properties to extract conclusions from the data sets. These
conclusions are in the form of statistics and patterns that help businesses to
make effective decisions. It plays a major role in the success of IoT
applications along with investments.
processes.
• Data Analytics has a significant role to play in the growth and success of IoT
applications and investments. Analytics tools will allow the business units to
The kind of information we get from the Internet of Things (IoT) devices is
analog and we need a way to capture that analog information. And then
locate it to the place from where we can access the data at any time with help
analytics tools. The IoT devices & it’s applications have the potential to
• Gateway – It is responsible for collecting data from devices & relaying it.
• Cloud – The nervous system of a business or application, where this IoT data
analyze the same for extracting relevant information. These data sets along
with real-time data can be analyzed easily and efficiently with data analytics
tools.
• Data Structure : IoT applications involve data that may have a variable
structure. There may also be a significant difference in data formats and
types. Data analytics will allow the business executive to analyze all of these
would lead to the development of services and offers as per the customer
market. The use of data analytics in IoT will provide a business unit to offer
better services and will, therefore, provide the ability to gain a competitive
Streaming Analytics:
This kind of data analytics is known as event streaming processing and examines
big data-sets. Real-time data assets are analyzed to detect urgent situations. IoT
applications on the lines of financial transactions, air fleet tracking, and traffic
analysis can gain from this method.
Spatial Analytics:
This type of data analytics is built upon time-based data which is examined
to expose trends.
IoT applications, such as weather prediction and health monitoring systems
can gain a lot.
Prescriptive Analysis:
Healthcare is one of the prime sectors of every country and the utilization of
data analytics in IoT based healthcare applications can provide
breakthroughs in this area. The reduction of the healthcare costs,
enhancement of telehealth monitoring, and remote health services, increased
diagnosis and treatment can be achieved using the same.
Big Data Tools for Data Analysis
1. Tableau
The primary objective of Tableau is to focus on business intelligence. It is the best
efficient data visualization tool.
In tableau, users do not have to write a program in order to create maps, charts, etc.
For live data in the visualization, tableau explored the web connector to connect
the database or API.
Features of Tableau :
Tableau provides a central location to delete, manage schedules and tag, and
change permissions.
It does not require complicated software setup.
In this real-time collaboration is available.
Without any integration cost, it can blend various datasets like relational
datasets, structured datasets, etc.
2. Cloudera Distribution for hadoop
If you are searching for a highly secure Big data platform, then Cloudera is the best
option for your project. It is the fastest, modern and most accessible platform.
Using this cloudera hadoop, you will easily get any data across any environment
within a single and scalable platform.
It generally offers end to end solutions for data warehousing. Its development is
based on the MPP (Massively Parallel Processing Architecture ).
Features of Teradata :
Teradata can connect network-attached systems or mainframes.
Its significant components are a node, parsing engine, the message passing
layer, and the access module processor (AMP).
It is highly scalable.
It supports industry-standard SQL in order to interact with the data.
4. R – Programming
R Programming language is used for statistical computing, graphics and for big
data analysis. It provides a wide variety of statistical tests.
Features of Spark:
It offers Fast Processing
Has the ability to integrate with Hadoop and existing Hadoop Data
Using Spark an application can be run in a Hadoop cluster, up to 100 times
faster in memory, and ten times faster on disk.
6. Lumify
Lumify is a platform that involves big data fusion, analysis, and visualization. It is
a free and open source tool for analytics.
It supports the cloud-based environment and also works well with Amazon’s
AWS.
Features of Lumify:
Lumify’s primary features include the full-text search, 2D and 3D graph
visualizations, link analysis between graph entities, automatic layout,
integration with mapping systems, geospatial layouts, multimedia analysis,
real-time collaboration through a set of projects or workspaces.
It is usually built on proven, scalable big data technologies.
It is secure, scalable, and supported by a dedicated full-time development
team.
7. Talend
Talend simplifies and automates big data integration. Its graphical wizard
generates native code. It also allows big data integration, check data quality, and
master data management.
Features of Talend:
Talend Big Data Platform generates native code which simplifies using
MapReduce and Spark.
It accelerates time to value for big data projects.
It also simplifies ETL & ELT for big data.
8. Microsoft HDInsight
Azure HDInsight is a Spark and Hadoop service in the cloud. Standard and
Premium are the two data cloud offerings provided by Azure HDInsight.
For running the Big data workloads of the organization it also provides an
enterprise-scale cluster.
Features of HDInsight:
Offers enterprise-grade security and monitoring.
Protects data assets and extends on-premises security and governance controls
to the cloud.
Provides a high-productivity platform for developers and scientists.
9. Skytree
Skytree is a big data analytics tool that helps data scientists to build more accurate
models faster. It also offers accurate predictive machine learning models that are
easy to use.
Features of Skytree:
Helps to develop Highly Scalable Algorithms.
Allows data scientists to visualize and understand the logic behind Machine
Learning decisions.
Solves robust predictive problems with data preparation capabilities.
10. Pentaho
Pentaho is a software that can access, prepare and can analyze any data from any
source. It is a best and trendy choice for data integration, orchestration, and
business analytics platform.
The main motto of this too is to turn Big data analytics into big insights.
Features of Pentaho:
Pentaho generally supports a wide range of Big data sources.
No such coding is required and it can deliver the data effortlessly to your
business.
It generally permits to check data with easy access to analytics, like charts,
visualizations, etc.
It can also access and integrate data for data visualization effectively.
•
Categories of Data Visualization
Numerical Data:
ContinuousData–
It can be narrowed or categorized (Example: Height measurements).
DiscreteData–
This type of data is not “continuous” (Example: Number of cars or children’s
a household has).
• Pie charts
• Bar charts
• Histograms
• Gantt charts
• Heat maps
• Box-and-whisker plots
• Waterfall charts
• Area charts
• Scatter plots
• Infographics
• Maps
What Are Data Visualization Tools?
There are limitations to what you can create in Excel. If your organization is
looking for a more powerful data visualization tool but wants to stay within the
Microsoft ecosystem, Power BI is an excellent alternative. Built specifically as a
data analytics and visualization tool, Power BI can import data from various
sources and output visualizations in a range of formats.
2. Google Charts
The tool can pull data from various sources—including Salesforce, SQL databases,
and Google Sheets—and uses HTML5/SVG technology to generate charts, which
makes them incredibly accessible. It offers 18 types of charts, including bar charts,
pie charts, histograms, geo charts, and area charts.
Members of the Google community occasionally generate new charts and share
them with other users, which are arranged in a gallery on Google's website. These
charts tend to be more advanced but may not be HTML5-compliant.
3. Tableau
Tableau is one of the most popular data visualization tools on the market for two
main reasons: It’s relatively easy to use and incredibly powerful. The software can
integrate with hundreds of sources to import data and output dozens of
visualization types—from charts to maps and more. Owned by Salesforce, Tableau
boasts millions of users and community members, and it’s widely used at the
enterprise level.
A free option, called Tableau Public, is also available. It’s important to note,
however, that any visualizations created on the free version are available for
anyone to see. This makes it a good option to learn the software's basics, but it’s
not ideal for any proprietary or sensitive data.
4. Zoho Analytics
Zoho Analytics has several paid options, depending on your needs. There’s also a
free version that allows you to build a limited number of reports, which can be
helpful if you’re testing the waters to determine which tool is best for your
business.
There are many other tools that work similarly to Zoho Analytics and are tailored
to sales and marketing professionals. HubSpot and Databox are two examples, both
of which include powerful data visualization capabilities.
5. Datawrapper
Datawrapper is a tool that, like Google Charts, is used to generate charts, maps,
and other graphics for use online. The tool’s original intended audience was
reporters working on news stories, but any professional responsible for managing a
website can find value in it.
Some common outputs include scatterplots, line charts, stacked bar charts, pie
charts, range plots, and a variety of maps and tables. Free and paid options are
available, depending on how you intend to use the tool.
6. Infogram
Infogram is another popular option that can be used to generate charts, reports, and
maps.
What sets Infogram apart from the other tools on this list is that you can use it to
create infographics (where its name comes from), making it especially popular
among creative professionals. Additionally, the tool includes a drag-and-drop
editor, which can be helpful for beginners.
Visualizations can be saved as image files and GIFs to be embedded in reports and
documents, or in HTML to be used online. Like most of the other tools on this list,
Infogram has tiered pricing, ranging from a free to enterprise-level version.
8115 - K.RAMAKRISHNAN COLLEGE OF ENGINEERING
(AUTONOMOUS)
Department of Computer Science and Engineering
UCS1505 – INTERNET OF THINGS
3
Write down the steps to install microprocessor on the board.
1. Step 1: Getting the processor ready for removal. ...
2. Step 2: Open the computer case. ...
3. Step 3: Remove the CPU fan. ...
4. Step 4: Remove the Processor. ...
5. Step 5: Insert new CPU on motherboard. ...
6. Step 6: Apply thermal paste. ...
7. Step 7: Install Heat Sink and CPU Fan. ...
8. Step 8: Power computer on.
4 Differentiate IEEE 802.11 and IEEE 802.15
7 List out the benefits of cloud computing according to amazon web service.
No need to pre-guess infrastructure capacity needs
Saves money, because you only need to pay for those resources that you use, the
larger the scale, the more savings
In a few minutes, platforms can be deployed around the world
Flexibility and speed in providing resources to developers
Java
C
Java Script
14. Different types of communication available in IoT.
Human to Machine (H2M)
Machine to Machine (M2M)
Machine to Human (M2H)
17 List out the benefits of cloud computing according to amazon web service.
✓ No need to pre-guess infrastructure capacity needs
✓ Saves money, because you only need to pay for those resources that
you use, the larger the scale, the more savings
✓ In a few minutes, platforms can be deployed around the world
✓ Flexibility and speed in providing resources to developers
18 What is meant by wormhole attack and sinkhole attack?
Wormhole attack:
It is a severe and popular attack in VANETs and other ad-hoc networks.
This attack involves two or more than two malicious nodes and the data packet from
one end of the malicious node is tunneled to the other spiteful/malicious node at the
other point, and these data packets are broadcasted.
Sinkhole attack:
It is the most destructive routing attacks in IoT environment. It creates
the network traffic and collapses the network communication. It used different
routing metrics. The metrics are fake link quality, shortest path etc.
• Java
• C
• Java Script
24. Different types of communication available in IoT.
• Human to Machine (H2M)
• Machine to Machine (M2M)
• Machine to Human (M2H)