IOT Unit I EQ Solution
IOT Unit I EQ Solution
Internet of Things
UNIT I
1. Define and explain the Internet of Things. (Oct 2018) (May 2019) (Nov 2022)
Internet of Things:
• Internet - IoT devices will need connectivity to the controllers that will be
controlling the devices. Each thing is uniquely identifiable through its
embedded computing system but is able to interoperate within the existing
internet infrastructure.
• Examples –
- Smart Alarm: The alarm can check the train times online, and if it finds train
delayed, so it lets you sleep in a little longer.
- Smart Bus Stop: The bus stop has large LCD display that can flash which bus
is due. Every bus has GPS tracking its location, they simply connect to the
bus company’s online service and always give the updated information.
VSIT Internet of Things
• Magic like technology has evolved to meet our needs and desires.
The objects in folktales and fairy tales are often wish fulfilment fantasies to fill
the deepest desires.
• From the point of view of a Silicon Valley entrepreneur and technologist, David
Rose has talked about Enchanted Objects at TEDx Berkeley and has
categorised various objects drawn from fairy tales and fantasy literature in ways
that apply as much to technological objects.
• For Protection, just as magical swords and helmets protected the protagonists
of fairy tales from their enemies, so has much of the development of science
and technology throughout history been driven by the need for military
superiority, for the purpose of security or conquest.
• Health has been a driver for many quests to find an ingredient for a health
potion and for research into various branches of medicine, pharmacology and
surgery, physiotherapy, and diet.
• Human Connection, even when one’s loved ones are far away, is an urgent,
aching need: the Finnish hero’s family know that he has been hurt when the
enchanted comb that he left on the mantelpiece starts to bleed. Similarly, the
postal service, telephones, and social networking help keep us in touch with
our family and friends.
3 Explain calm and ambient technology using example of Live wire. (Oct 2018)
(May 2019) (Nov 2022) (May 2023)
• The IoT has its roots in the work done by Mark Weiser at Xerox PARC. The work
he did was not assumed that there would be network connectivity but focused
more on how the system would look when the objects would be integrated this
term is said to be ubiquitous computing.
• calm technology—systems which don’t vie for attention yet are ready to
provide utility or useful information when we decide to give them some
attention.
• Major issues for designing such systems are configuration, how to provide
power to all these items, how they talk to each other, and how they
communicate with us
• Configuration and user interaction are difficult problems to solve with just
technical solutions. This is where good design and usability comes into Picture
• A great example is Live Wire, one of the first Internet of Things devices.
• For instance, the mobile phone's initial introduction didn't aim to redefine the
very concept of communication. Instead, it was introduced as a phone without
the constraints of a fixed location. Gradually, it evolved into a portable Internet
terminal, capable of diverse tasks beyond mere calls. The key to this successful
transformation was the use of the familiar phone metaphor. This approach
leverages the fact that people tend to embrace new technology more readily
when it's presented in terms of something they already understand.
VSIT Internet of Things
• In the context of the Internet of Things (IoT), some projects take inspiration from
the world of magic and fairy tales, where everyday objects are filled with semi-
hidden, enchanting capabilities. For example, the WhereDial, a project
inspired by the clock in Harry Potter, uses GPS technology and location services
to display family members' whereabouts, albeit without the magic, offering a
real-world touch of enchantment to ordinary objects.
5 Differentiate between static IP address and Dynamic IP address. (Oct 2018) (Nov 2022)
Static IP address:
• A static IP address is an address that is permanently assigned to you by your ISP
and does not change even if your computer reboots.
• A static IP address is usually assigned to a server hosting website, and providing
email, database and FTP services.
• A static IP address is also assigned to a commercial leased line, or public
organization requiring same IP address every time.
• Since static IP address is assigned to you, you'll have to manually configure your
machine (router or server) to use the static IP address assigned to you.
• Advantages:
- Address does not change good for web servers, email servers and other
Internet servers.
- Use DNS to map domain name to IP address and use domain name to
address the static IP address.
- Similar can be achieved with Dynamic DNS for dynamic IP address, but it's
not as clean as the static IP address.
• Disadvantages:
- Expensive than dynamic IP address - ISPs generally charge additional fee
for static IP addresses.
- Need additional security - Since same IP is assigned to a machine, hackers
try brute force attack on the machine over period of time.
Dynamic IP address:
• A dynamic IP address is an IP address dynamically assigned to your computer
by your ISP.
• Each time your computer (or router) is rebooted, your ISP dynamically assigns
an IP address to your networking device using DHCP protocol.
• Since your ISP dynamically assigns an IP address to a computing device on
reboot, your device may not always receive the same IP address previous
assigned to it.
• Even if your machine is always on and permanently connected, some ISPs do
change IP address on-the-fly even though this is very rare.
• A sticky nature of DHCP generally reassigns same IP address to the same
machine, it is not guaranteed to receive same IP address as IP pool may
exhaust at times and lease time may expire.
• Advantages:
- Cheaper than static IP address.
- Changing IP address gives more privacy.
• Disadvantages:
VSIT Internet of Things
6 Define protocol. Explain the following application layer protocols: HTTP, HTTPS, SMTP,
FTP,POP3, IMAP. (Oct 2018) (May 2023)
• Protocol:
- A protocol is a set of rules and guidelines for communicating data.
- Rules are defined for each step and process during communication
between two or more computers.
- Networks must follow these rules to successfully transmit data.
• HTTP:
- The Hypertext Transfer Protocol (HTTP) is an application protocol for
distributed, collaborative, hypermedia information systems.
- HTTP is the foundation of data communication for the World Wide Web,
where hypertext documents include hyperlinks to other resources that the
user can easily access.
• SMTP:
- Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic
mail (email) transmission.
• FTP:
- The File Transfer Protocol (FTP) is a standard network protocol used for the
transfer of computer files between a client and server on a computer
network.
• POP3:
- Post Office Protocol, version 3 is an email retrieval protocol used for
receiving email messages from a mail server.
- It's a simple and widely used method for accessing email from a remote
server.
• IMAP:
- Internet Message Access Protocol is an email retrieval and synchronization
protocol used for accessing and managing email messages stored on a
mail server.
- Unlike POP3, it allows users to manage their email messages on the server.
• MAC addresses are primarily used within a specific Ethernet network, such as a
home network, and are not typically utilized beyond the local network or your
home router.
• MAC addresses play a vital role in the physical routing of data packets within
a network. When an IP message is transmitted across the internet, it passes
through various nodes and routers. When it reaches a node that knows the
location of the intended device, it uses the corresponding MAC address to
deliver the message to the correct physical machine.
• Most networked devices, like laptops, come with their MAC addresses hard-
coded into their Ethernet chips. This ensures the uniqueness of each device.
• Some chips, like the one used in the Arduino Ethernet, don't have built-in MAC
addresses. Instead, a MAC address sticker may be provided. While it may seem
unconventional, it serves a purpose. This MAC address is reserved and
guaranteed to be unique.
• The Internet of Things devices that we own aren’t the only ones that should
concern us when it comes to matters of trust.
• With more sensors and devices connected and reporting data to the Internet,
the privacy of third parties who cross sensors’ paths is an important
consideration.
• Keeping Secrets
- Privacy concerns are an obvious issue, even seemingly innocuous
applications can leak personal information, so one should be alert to the
danger and take measures to avoid it.
- Don’t share more than you need to provide the service.
- If you can avoid gathering and/or storing the data in the first place, you
need not worry about disclosing it accidentally.
• Hashing:
- The most common use of cryptographic hashes is in password verification.
- When the user wants to authenticate, the hash can be recalculated.
- If it matches the password is correct.
- Adding salt to the password before applying the hash would give some
more features.
- This adds some random, non-secret extra text to the password before the
hash is computed. The salt is then stored with the hash, so the service can
concatenate the two again when it needs to verify a newly presented
password.
- The salt prevents any attacker who ends up with a copy of the hash from
easily comparing it to a dictionary of precompiled hashes to work out the
password.
- At the lowest layer, known as the link layer, the focus is on the physical
transfer of bits of information across a network link.
- This link can be established using various technologies, such as Ethernet
cables, Wi-Fi, telephone networks, or short-range radio standards like IEEE
802.15.4 (used in Personal Area Networks, PAN).
• Internet Layer:
- Sitting on top of the link layer is the Internet layer, which abstracts away the
complexities of various network links.
- Its primary function is to handle the routing of data packets to their
destination based on IP addresses.
• Transport Layer (TCP):
- The transport layer is where the Transmission Control Protocol (TCP)
operates. TCP enhances the capabilities of IP by providing sophisticated
message control.
- It ensures reliable, ordered, and error-checked delivery of data between
devices. TCP is essential for applications that require precise data transfer,
such as web browsing and email.
• Application Layer:
- The application layer, which is at the top of the stack, houses various
application-specific protocols. These protocols are responsible for handling
specific tasks, such as fetching web pages, sending emails, or enabling
Internet telephony.
- For instance, HTTP (Hypertext Transfer Protocol) is the dominant protocol for
the web and is widely used for communication between Internet of Things
(IoT) devices. It defines how web browsers and web servers communicate.
10 Write short note on DNS (Domain Name System). (May 2019) (Nov 2019) (Nov 2022)
- While most DNS examples involve websites, DNS can also point to various
other internet services. For instance:
- "pop3.google.com" directs you to the POP3 email server for Gmail,
enabling you to receive email.
- "smtp.google.com" takes care of sending email to Gmail.
- "ns1.google.com" represents the address of one of Google's DNS servers,
responsible for resolving domain names.
• Configuring DNS:
- To configure DNS, users typically need to modify some settings. Domain
name registrars, the companies where users purchase domain names,
often offer control panels for changing these settings.
- Users can also run their authoritative DNS servers, which define how their
domains are resolved. DNS settings may include entries specifying the
association of domain names with IP addresses and the duration for which
these associations remain valid.
11 Define and Explain Ubiquitous Computing (Ubicomp) (Nov 2019) (May 2023)
Ubiquitous Computing:
• Ubiquitous computing, this idea emerged as a predecessor to the Internet of
Things (IoT), offering insights into the historical evolution of technology's role in
society.
• Ubiquitous computing (or "ubicomp") is a concept where computing is made
to appear anytime and everywhere.
• A user interacts with the computer, which can exist in many different forms,
including laptop computers, tablets and terminals in everyday objects such as
a refrigerator or a pair of glasses.
• Ubiquitous Computing employs middleware, operating system, mobile code,
sensors and other technologies to support and operate the system.
• It is only differentiated from the “Internet of Things” by the fact that computing
also involves an Internet connection.
• Devices like mobile phones evolved from their initial purpose as portable
telephones to serve as versatile Internet terminals capable of multimedia
functions. This transformation occurred by embedding technology into
everyday objects, reshaping them to provide additional value beyond their
original design.
• The integration of computing into objects and appliances has significantly
reduced the cost of computing power.
• This concept of ubiquitous computing has paved the way for the Internet of
Things, which extends beyond ubiquitous computing by connecting devices to
the Internet.
12 List and explain the roles of people making IoT. (Nov 2019) (Nov 2022)
People involved in making Internet of Things (IoT) devices come from various
backgrounds and possess diverse skills. IoT development is a multidisciplinary
field, and individuals may have roles that span different aspects of the IoT
creation process. Here are some of the key roles and their explanations:
• Hacker/Tinkerer:
- Role: Often hobbyists or amateur engineers, hackers and tinkerers
experiment with building prototypes of IoT devices. They work on the initial
concept and basic functionalities.
VSIT Internet of Things
13 “Data available through IOT device belongs to public or company which implements
the IOT device”. Discuss. (Nov 2019)
• Urban computing expert Adam Greenfield suggests that in such scenarios, the
data generated is a result of public actions, and, therefore, the public should
VSIT Internet of Things
have rights to be aware of and access that data. This perspective aligns with
the notion that data subjects, the individuals to whom the data pertains, should
have a say in how this data is used.
• On private property, the situation can be different. Property owners may assert
their rights to the data generated on their premises, even if they did not install
the sensors themselves.
• The Open Internet of Things Assembly in 2012 introduced the concept of data
subjects, emphasizing that individuals to whom the data pertains should have
a say in how that data is collected, used, and shared.
• The ultimate resolution of data ownership matters in the IoT space will likely
involve legal, ethical, and societal considerations, which will evolve over time.
14 What are TCP n UDP ports? Explain with examples. (Nov 2019)
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) ports
are a fundamental part of the Internet's communication system.
• TCP Ports:
• Using the wrong port when sending a TCP message can result in different
outcomes, such as receiving an "RST" packet, which signifies an error, or simply
having the request ignored.
• UDP Ports:
• UDP ports, like TCP ports, are also numbered from 0 to 65535.
• UDP is a connectionless protocol, meaning it does not establish a persistent
connection before sending data.
• Common UDP ports may include:
- Port 53: Used for DNS (Domain Name System) to resolve domain names into
IP addresses.
- Port 67: Used for DHCP (Dynamic Host Configuration Protocol) for
automatic IP address assignment.
- Port 69: Used for TFTP (Trivial File Transfer Protocol) for transferring files.
- Port 161: Used for SNMP (Simple Network Management Protocol) for
network management and monitoring.
• Unlike TCP, UDP doesn't establish a connection, and it simply sends data
packets to the specified port without verifying the recipient's readiness.
15 "Be conservative in what you do, be liberal in what you accept from others" Explain.
(May 2023)
Explain the following concepts with respect to IoT: (Nov 2022)
i. Small pieces loosely joined
ii. Graceful degradation
Jon Postel wrote: “Be conservative in what you do, be liberal in what you
accept from others”. It is good to bear this in mind when designing or building
anything which must interact with other services— particularly when you aren’t
the one building the other components with which your system interacts.
• GRACEFUL DEGRADATION
- Graceful degradation is the ability of a computer, machine, electronic
system or network to maintain limited functionality even when a large
portion of it has been destroyed or rendered inoperative.
- In DoES Liverpool, the central heating system has been connected to the
internet, named YAHMS.
- YAHMS consists of temperature sensors for indoor and outdoor
measurements, an actuator to control heating, and server software.
- It has both timer-based automation for basic comfort and a web-based
interface for user control.
- Users can access the YAHMS website from anywhere to check temperatures
and adjust heating settings. Temperature sensors remain unhoused Arduino
boards and are managed by John, who oversees the project.
- The cabling to the boiler is neatly installed, and electronic components are
hidden from view.
- The user interface is well-designed, featuring a minimal interface suitable for
both desktop and smartphone access.
ii) Doorbot
- DoorBot started as a PC with a monitor showing office views, events, and
welcoming messages.
- It had an RFID reader for member access and speakers for personalized
greetings.
- Initial development was straightforward, focusing on software
configuration.
- To accommodate expansion, the DoorBot was switched to a cost-effective
Raspberry Pi.
- Using standard PCs for multiple doors is expensive; devices with integrated
screens are costlier.
- A Raspberry Pi, with affordability and compatibility, became a scalable
solution.
- Starting with a cost-effective platform simplifies scaling.
- Pushing hardware limits might require a more powerful platform, affecting
upgradability.