0% found this document useful (0 votes)
21 views12 pages

Iot CT1

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 12

IOT

1. What are the different components present in IOT?



i. Devices/Sensors: These are the physical objects equipped
with sensors and actuators that collect data from the
environment (e.g., temperature sensors, smart thermostats,
cameras).
ii. Connectivity: This component refers to the communication
technologies used to connect devices to the internet or to
each other. Common methods include Wi-Fi, Bluetooth,
Zigbee, and cellular networks.
iii. Data Processing: Once data is collected, it needs to be
processed. This can occur on the device itself (edge
computing) or in the cloud, where more extensive computing
resources are available.
iv. User Interface: This allows users to interact with the IoT
system. It can include mobile apps, web dashboards, or
other forms of user interfaces that display data and allow for
user control.
v. Cloud/Backend Services: These services manage data
storage, processing, and analysis. They provide the
infrastructure for data management and are essential for
scalability.
2. What are the characteristics of IOT system?

i. Connectivity: Devices are connected to the internet or local
networks, enabling communication and data exchange.
ii. Automation and Control: IoT systems can automate tasks
and provide remote control over devices, improving
efficiency and convenience.
iii. Data Collection and Analysis: Sensors and devices collect
data, which is processed and analysed for insights, enabling
informed decision-making.
iv. Scalability: IoT systems can easily scale by adding more
devices without significant changes to the existing
infrastructure.
v. Real-time Monitoring: Continuous monitoring of devices and
environments allows for immediate responses to changing
conditions.
vi. Security: Protecting data and devices from unauthorized
access and cyber threats is crucial in IoT systems.
3. What are the different functional block of an IOT system?

Sensor/Actuator Block
Sensors: These are responsible for collecting data from the
environment, such as temperature, humidity, light, and motion.
They serve as the entry point for data into the IoT system.
Actuators: These components perform actions based on the data
received, such as turning on lights or adjusting machinery
Connectivity Block
This block facilitates communication between IoT devices and the
internet or other devices. It includes various communication
protocols such as Wi-Fi, Bluetooth, Zigbee, and cellular networks
Data Processing Block
After data is collected by sensors, it is processed in this block. This
involves filtering noise, converting raw data into a usable format,
and performing analytics to derive insights or trigger actions
Application Block
This component utilizes the processed data to deliver specific
services or insights to users. Applications can range from smart
home controls to industrial monitoring systems
Security Block
Ensuring the security of an IoT system is crucial. This block
manages authentication, authorization, and data encryption to
protect against unauthorized access and data breaches
Management Block:
This block oversees the overall operation of the IoT system,
including device configuration, firmware updates, and
performance monitoring. It helps in managing resources efficiently

4. What is the significance of Request response communication


model?

Request & Response Model –
This model follows a client-server architecture.
➢ The client, when required, requests the information from the
server. This request is usually in the encoded format.
➢ This model is stateless since the data between the requests
is not retained and each request is independently handled.
➢ The server Categories the request, and fetches the data from
the database and its resource representation. This data is
converted to response and is transferred in an encoded
format to the client. The client, in turn, receives the
response.
➢ On the other hand — In Request-Response communication
model client sends a request to the server and the server
responds to the request. When the server receives the
request it decides how to respond, fetches the data retrieves
resources, and prepares the response, and sends it to the
client.

5. What is the significance of representational State transfer?


rest communication?
 Representational State Transfer (REST) is a software
architectural style that's important for web development
because it helps to create high-quality applications that are
scalable, performant, and simple:
Simplicity
REST builds on existing internet features and systems, rather
than creating new ones.
Scalability
REST's separation of concerns makes it easier to implement
components and tune applications for improved
performance.
Performance
REST's layered architecture promotes caching to reduce
latency and enforce security.
Interoperability
RESTful systems are easy to integrate into various systems.
Uniform interface
REST's uniform interface makes it easy to use, even if you
don't know the inner workings of an application.
Stateless
REST's stateless communication protocol means that each
interaction doesn't interfere with the next.
 REST is commonly used to build web-based APIs, or
Application Programming Interfaces, that enable
communication and data exchange between software
systems. REST APIs are used for a variety of purposes,
including data retrieval, modification, integration, and
automation
6. What Is published subscribe communication model?
 It is a model of comprises of three. (Publisher, consumer and
Broker):
Publishers are the source of data. It sends the data to the
topic which is managed by the broker. They are not aware of
consumers.

Consumers subscribe to the topics which are managed by


the broker.

Brokers' responsibility is to accept data from publishers


and send it to the appropriate consumers. The broker only
has the information regarding the consumer to which a
particular topic belongs which the publisher is unaware.

7. What is push pull communication model?

 The push-pull model constitutes data publishers, data


consumers, and data queues.

Publishers and Consumers are not aware of each other.

Publishers publish the message/data and push it into the


queue. The consumers, present on the other side, pull the
data out of the queue. Thus, the queue acts as the buffer for
the message when the difference occurs in the rate of push
or pull of data on the side of a publisher and consumer.

Queues help in decoupling the messaging between the


producer and consumer. Queues also act as a buffer which
helps in situations where there is a mismatch between the
rate at which the producers push the data and consumers
pull the data.

8. Exclusive pair communication model?

 Exclusive Pair is the bi-directional model, including full-


duplex communication between client and server. The
connection is constant and remains open till the client sends
a request to close the connection.

The Server has the record of all the connections which has
been opened.

This is a state-full connection model and the server is aware


of all open connections.

WebSocket-based communication API is fully based on this


model.

9. What Is IOT security and what are the types of IOT


security?

 This block secures the IoT system and by providing


functions such as authentication, authorization, message
and content integrity, and data security.

10. What Is the architecture of ZigBee network?

 Zigbee builds on the physical layer and media access control


defined in IEEE standard 802.15. 4 for low-rate wireless
personal area networks (WPANs).

11. What Is the advantage and disadvantages of WIFI


as a communication protocol in IOT system?

 Advantages of Wi-Fi in IoT Systems

High Data Rate: Wi-Fi offers high data transfer rates,


making it suitable for applications requiring real-time data
transmission, such as video surveillance or remote control
of devices.

Wide Availability: Wi-Fi infrastructure is widely available


in homes and public spaces, reducing the need for
additional network setup.

Cost-Effective: Wi-Fi is a relatively inexpensive


technology, especially when considering the cost of cellular
connectivity.
Easy Installation: Wi-Fi devices are easy to set up and
configure, making it a convenient choice for many IoT
applications.

Disadvantages of Wi-Fi in IoT Systems

Limited Range: Wi-Fi signals are susceptible to


interference and have a limited range, making it unsuitable
for devices deployed in remote or outdoor areas.

Power Consumption: Wi-Fi devices consume more


power than other wireless technologies like Zigbee or BLE,
which can be a significant drawback for battery-powered
devices.

Security Concerns: Wi-Fi networks can be vulnerable to


hacking and cyberattacks, making it essential to implement
strong security measures to protect IoT devices.

Network Congestion: In densely populated areas, Wi-Fi


networks can become congested, leading to slower data
transfer rates and increased latency.

12. What is the difference between wired and


wireless network in IOT communication?

S.No Wired Network Wireless Network

A wired network employs “Wireless” means without wire, media


wires to link devices to the that is made up of electromagnetic
1. Internet or another waves (EM Waves) or infrared waves.
network, such as laptops or Antennas or sensors will be present
desktop PCs. on all wireless devices

2. Faster transmission speed Slow transmission speed

3. Propagation delay is Low Propagation delay is high

More Secure & hence


4. Less Secure & hence less Reliable
Reliable
Devices must be hard-
5. Installation is Quick
wired

6. Less Expensive More Expensive

High installation &


7. Low installation & maintenance cost
maintenance cost

Hub, Switch, etc. devices Wireless routers, access points, etc.


8.
are used are used.

13. What is RPL protocol and what is the significance


of RPL protocol?

 RPL (Routing Protocol for Low-Power and Lossy Networks)


is a routing protocol for wireless networks that are
susceptible to packet loss and have low power
consumption. It's designed to support a variety of link
layers, including those with limitations or that are used in
devices with limited resources.

14. What Is the ibv4 and ibv6 addressing and what


are the disadvantages?

IPv4 IPv6

IPv4 has a 32-bit address


IPv6 has a 128-bit address length
length

It Supports Manual
It supports Auto and renumbering
and DHCP address
address configuration
configuration

In IPv4 end to end, connection In IPv6 end-to-end, connection integrity


integrity is Unachievable is Achievable
IPv4 IPv6

It can generate The address space of IPv6 is quite large


4.29×10 9 address space it can produce 3.4×10 38 address space

The Security feature is IPSEC is an inbuilt security feature in the


dependent on the application IPv6 protocol

Address representation of IPv4 Address representation of IPv6 is in


is in decimal hexadecimal

15. What are the 3 main power sources use in IOT


device?

 The three main power sources for Internet of Things (IoT)


devices are batteries, solar panels, and thermoelectric effect
power:

Batteries

The most common power source for IoT devices, with


lithium-ion batteries being a popular choice.

Solar panels

A mature technology that uses the sun's ultraviolet rays to


generate electricity.

Thermoelectric effect power

Can be used when there's no vibration or mechanical


energy, and there's a hot surface nearby. Semiconductor
devices harvest the waste heat from the hot surface and
convert it into electrical power.

16. What are the characteristics of RFID?

 Radio frequency identification (RFID) has several


characteristics, Here I discuss about some of these.:

Unique identification
Each RFID tag has a unique serial number that can't be
cloned, allowing for product authenticity verification.

Automatic reading

RFID tags can be read automatically in large numbers


without the need to scan each item individually.

Reading without line of sight

RFID tags can be scanned without being visible, even if


they're in closed boxes or hard-to-reach places.

Data storage

RFID tags can store several kilobytes of information,


including process and inspection history

17. What is RFID technology?

 Radio Frequency Identification (RFID) is a wireless


technology that uses radio waves to identify objects, people,
or animals. RFID systems are made up of two parts: a tag
and a reader. The reader emits radio waves and receives
signals back from the tag.

18. What are the characteristics of wireless sensor


network?

 Wireless sensor networks (WSNs) have many


characteristics, including:

• Power efficiency: Nodes are battery-powered and have


limited power capacity. WSNs are designed to maximize
network lifetime by being energy efficient.
• Fault tolerance: WSNs should be able to maintain network
functionality even if some nodes fail.
• Scalability: WSNs should be able to manage large numbers of
nodes.
• Responsiveness: WSNs should be able to adapt to changes
in the network topology.
• Communication failures: WSNs should be able to quickly
inform the base station if a node fails to communicate with
other nodes.
• Heterogeneity: WSNs typically use different types of sensors
and nodes, each with different capabilities.
• Security: WSNs are vulnerable to security threats like
eavesdropping, jamming, and spoofing.
• Interference: WSNs may have trouble communicating in
environments with a lot of wireless activity.
• Reliability: WSNs should be able to function consistently and
accurately in all conditions

19. What are the different wireless sensor network


tropology?

 Here are some different wireless sensor network topologies:

• Bus topology

A node sends a broadcast message to the network, but only


the intended recipient processes it. This topology is easy to
install but works best with a limited number of nodes.

• Star topology

Sensor nodes are connected to a central node, which acts as


a coordinator. This topology is commonly used in personal
area networks.

• Mesh topology
A common topology for wireless sensor networks. A home
monitoring network may use a self-healing mesh topology.

• Hybrid topology

Nodes are divided into clusters, and each cluster is managed


by one or more cluster heads. This is an effective method for
saving energy

20. How IOT correlates with cloud services?

 The Internet of Things (IoT) and cloud computing are


closely related technologies that work together to improve
efficiency and productivity across many industries:

Data storage

Cloud computing provides a centralized, scalable, and


flexible way to store and retrieve the large amounts of data
generated by IoT devices.

Data processing

Cloud computing provides the computational power needed


to process IoT data in real-time, which can lead to data-
driven decision making.

Security

Cloud-based solutions can help enhance security for IoT


deployments.

You might also like