0% found this document useful (0 votes)
26 views25 pages

IoT Answers

Uploaded by

sudarshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views25 pages

IoT Answers

Uploaded by

sudarshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Q.1 Define Internet of Things. Explain its characteristics with examples.

Ans:

Internet technology connecting devices, machines and tools to the internet by means of wireless
technologies. OR

The Internet of Things (IoT) is the network of physical objects that contain embedded technology to
communicate and sense or interact with their internal states or the external environment.

1. Efficient, scalable and associated architecture


2. Unambiguous naming and addressing
3. Abundance of sleeping nodes, mobile and non-IP devices
4. Intermittent connectivity

Examples of IoT:

1. Business/Manufacturing: Real time analytics of supply chains and equipment, robotic


machinery.
2. Healthcare: Portable health monitoring, electronic recordkeeping, pharmaceutical
safeguards.
3. Retail: Inventory tracking, smartphone purchasing, anonymous analytics of consumer
choices.
4. Security: Biometric and facial recognition locks, remote sensors.

Q.2 Which are technologies closely related to IoT? State difference between two such technologies
with IOT.

Ans: A number of technologies that are very closely related to IoT include:

1. Machine to Machine (M2M) communications,


2. Cyber Physical Systems (CPS)
3. Web of Things (WoT)

Sr No IoT M2M
1 M2M is part of the IoT M2M refers to communications and
interactions between machines and
devices.
2 IoT has a broader scope than M2M, since M2M interactions can occur via a cloud
it comprises a broader range of computing infrastructure
interactions, including interactions
between devices/things, things and
people, things with applications and
people with applications.
3 It also enables the composition of M2M offers the means for managing
workflows comprising all of the devices and devices interaction,
interactions. while also collecting machine and/or sensor
data.
4 IoT includes the notion of internet M2M is a term introduced by
connectivity (which is provided in most telecommunication services providers and,
of the networks outlined above), but is not pays emphasis on machines interactions via
necessarily focused on the use of Telcom one or more Telcom /communication
networks. networks (e.g., 3G, 4G, 5G, satellite, public
networks).
Sr No IoT WoT
1 While IoT is about creating a network of From a developer's perspective, the WoT
objects, things, people, systems and enables access and control over IoT
applications, WoT tries to integrate them resources and applications using
to the Web. mainstream web technologies (such as
HTML 5.0, JavaScript, Ajax, PHP, Ruby n'
Rails etc.)
2 The scope of IoT applications is broader WoT can be thought as a flavor/option of an
and includes systems that are not application layer added over the IoT's
accessible through the web (e.g., network layer.
conventional WSN and RFID systems)

Q.3 What is RFID protocol? Explain its features, working principle with a neat diagram and state its
applications.

Ans:

RFID is an acronym for “radio‐frequency identification” Data digitally encoded in RFID tags, which
can be read by a reader. It is similar to barcodes. Data read from tags are stored in a database by the
reader. As compared to traditional barcodes and QR codes, RFID tag data can be read outside the
line‐of‐sight.

RFID Features:

1. RFID tag consists of an integrated circuit and an antenna.


2. The tag is covered by a protective material which also acts as a shield against various
environmental effects.
3. Tags may be passive or active.
4. Passive RFID tags are the most widely used.
5. Passive tags have to be powered by a reader inductively before they can transmit
information, whereas active tags have their own power supply

Working Principle:

It is Derived from Automatic Identification and Data Capture (AIDC) technology. AIDC performs
object identification, object data collection and mapping of the collected data to computer systems
with little or no human intervention. AIDC uses wired communication whereas RFID uses radio
waves to perform AIDC functions. The main components of an RFID system include an RFID tag or
smart label, an RFID reader, and an antenna.
RFID Applications:

1. Inventory management
2. Asset tracking
3. Personnel tracking
4. Controlling access to restricted areas
5. ID badging
6. Supply chain management
7. Counterfeit prevention (e.g., in the pharmaceutical industry)

Q.4 What is the MQTT protocol? Explain its working principle with a neat diagram and state its
applications.

Ans:

MQTT stands for Message Queue Telemetry. It is a publish‐subscribe‐based lightweight messaging


protocol for use in conjunction with the TCP/IP protocol. Designed to provide connectivity (mostly
embedded) between applications and middle‐wares on one side and networks and communications
on the other side.

MQTT Components:

1. Publishers: These are lightweight sensors.


2. Subscribers: These include applications interested in sensor data.
3. Brokers: It connects publishers and subscribers as well as classify sensor data into topics.

The different MQTT methods are as follows:

1. Connect
2. Disconnect
3. Subscribe
4. Unsubscribe
5. Publish

Working Principle:

The protocol uses a publish/subscribe architecture (HTTP uses a request/response paradigm).


Publish/subscribe is event‐driven and enables messages to be pushed to clients. The central
communication point is the MQTT broker, which is in charge of dispatching all messages between
the senders and the rightful receivers. Each client that publishes a message to the broker, includes a
topic into the message. The topic is the routing information for the broker. Each client that wants to
receive messages subscribes to a certain topic and the broker delivers all messages with the
matching topic to the client. Therefore, the clients don’t have to know each other. They only
communicate over the topic. This architecture enables highly scalable solutions without
dependencies between the data producers and the data consumers.

MQTT Topics:

A topic is a simple string that can have more hierarchy levels, which are separated by a slash. A
sample topic for sending temperature data of the living room could be house/living‐
room/temperature. On one hand the client (e.g. mobile device) can subscribe to the exact topic or
on the other hand, it can use a wildcard.
The subscription to house/+/temperature would result in all messages sent to the previously
mentioned topic house/living room/ temperature, as well as any topic with an arbitrary value in the
place of living room, such as house/kitchen/temperature. The plus sign is a single level wild card and
only allows arbitrary values for one hierarchy. If more than one level needs to be subscribed, such
as, the entire sub‐tree, there is also a multilevel wildcard (#). It allows to subscribe to all underlying
hierarchy levels. For example, house/# is subscribing to all topics beginning with house.

Applications:

1. Facebook Messenger uses MQTT for online chat.


2. Amazon Web Services use Amazon IoT with MQTT.
3. Microsoft Azure IoT Hub uses MQTT as its main protocol for telemetry messages.
4. The EVRYTHNG IoT platform uses MQTT as an M2M protocol for millions of connected
products.
5. Adafruit launched a free MQTT cloud service for IoT experimenters called Adafruit IO.

Q7. State the features of the ZigBee protocol. Explain its types and state its applications.

Ans:

1. Most widely deployed enhancement of IEEE 802.15.4.


2. The ZigBee protocol is defined by layer 3 and above. It works with the 802.15.4 layers 1 and
2.
3. The standard uses layers 3 and 4 to define additional communication enhancements.
4. These enhancements include authentication with valid nodes, encryption for security, and a
data routing and forwarding capability that enables mesh networking.
5. The most popular use of ZigBee is wireless sensor networks using the mesh topology.

Important components

1. ZigBee Device Object: Device management, Security, Policies


2. Application support Sub-layer: Interfacing and control services, bridge between network and
other layers

ZigBee Mesh:

1. In a mesh, any node can communicate with any other node within its range.
2. If nodes are not in range, messages are relayed through intermediate nodes.
3. This allows the network deployment over large areas.
4. Meshes have increased network reliability.
5. For example, if nodes C and F are down, the message packets from A can still be relayed to
via B and E.
6. ZigBee mesh networks are self-configuring and self‐healing.

ZigBee Type:

1. ZigBee Coordinator (ZC):


▪ The Coordinator forms the root of the ZigBee network tree and might act as a bridge
between networks.
▪ There is a single ZigBee Coordinator in each network, which originally initiates the
network.
▪ It stores information about the network under it and outside it.
▪ It acts as a Trust Center & repository for security keys.
2. ZigBee Router (ZR):
▪ Capable of running applications, as well as relaying information between nodes connected
to it.
3. ZigBee End Device (ZED):
▪ It contains just enough functionality to talk to the parent node, and it cannot relay data
from other devices.
▪ This allows the node to be asleep a significant amount of the time thereby enhancing
battery life.
▪ Memory requirements and cost of ZEDs are quite low, as compared to ZR or ZC.

ZigBee Network Layer:

1. The network layer uses Ad Hoc On‐Demand Distance Vector (AODV) routing.
2. To find the final destination, the AODV broadcasts a route request to all its immediate
neighbors.
3. The neighbors relay the same information to their neighbors, eventually spreading the
request throughout the network.
4. Upon discovery of the destination, a low‐cost path is calculated and informed to the
requesting device via unicast messaging.

Applications:

1. Building automation
2. Remote control (RF4CE or RF for consumer electronics)
3. Smart energy for home energy monitoring
4. Health care for medical and fitness monitoring
5. Home automation for control of smart homes
6. Light Link for control of LED lighting
7. Telecom services

Q8. State the difference between wireless HART and ZigBee

Sr No Wireless HART ZigBee


1 A WirelessHART node hops after every ZigBee does not feature hopping at all, and
message, changing channels every time it only hops when the entire network hops.
sends a packet.
2 At the MAC layer, WirelessHART utilizes ZigBee applies carrier sense multiple access
time division multiple access (TDMA), with collision detection (CSMA/CD).
allotting individual time slots for each
transmission.
3 WirelessHART represents a true mesh ZigBee utilizes a tree topology, which makes
network, where each nodes along the trunk critical
node is capable of serving as a router so
that, if one node goes down, another can
replace it, ensuring packet delivery.
4 WirelessHART devices are all back ZigBee, ZigBee Pro, ZigBee RF4CE, and
compatible, allowing for the integration of ZigBee IP are otherwise incompatible with
legacy devices as well as new ones. ZigBee each other
devices share the same basis for their
physical layers.

Q9. Define what is WSN and explain what are different challenges that occur while implementing
WSN. Explain the different node behavior in WSNs.

1. Consists of a large number of sensor nodes, densely deployed over an area.


2. Sensor nodes are capable of collaborating with one another and measuring the condition of
their surrounding environments (i.e. Light, temperature, sound, vibration).
3. The sensed measurements are then transformed into digital signals and processed to reveal
some properties of the phenomena around sensors.
4. Due to the fact that the sensor nodes in WSNs have short radio transmission range,
intermediate nodes act as relay nodes to transmit data towards the sink node using a multi‐
hop path.

Challenges:

1. Scalability
▪ Providing acceptable levels of service in the presence of large number of nodes.
1
▪ Typically, throughput decreases at a rate of , N = number of nodes.
√𝑁
2. Quality of service
▪ Offering guarantees in terms of bandwidth, delay, jitter, packet loss probability.
▪ Limited bandwidth, unpredictable changes in RF channel characteristics
3. Energy efficiency
▪ Nodes have limited battery power
▪ Nodes need to cooperate with other nodes for relaying their information.
4. Security
▪ Open medium.
▪ Nodes prone to malicious attacks, infiltration, eavesdropping, interference.
Normal nodes work perfectly in ideal environmental conditions

Failed nodes are simply those that are unable to perform an operation; this could be because of
power failure and environmental events.

Badly failed nodes exhibit features of failed nodes but they can also send false routing messages
which are a threat to the integrity of the network.

Selfish nodes are typified by their unwillingness to cooperate, as the protocol requires whenever
there is a personal cost involved. Packet dropping is the main attack by selfish nodes.

Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying
network service if possible.

Q10. Explain in brief coverage problems in static WSNs.

Coverage – area‐of‐interest is covered satisfactorily.

1. Determine how well the sensing field is monitored or tracked by sensors


2. To determine, with respect to application‐specific performance criteria,
▪ In case of static sensors, where to deploy and/or activate them
▪ In case of (a subset of) the sensors are mobile, how to plan the trajectory of the mobile
sensors.
3. These two cases are collectively termed as the coverage problem in wireless sensor
networks.

Coverage Problems in Static WSNs

Most problems can be classified as

1. Area coverage
2. Point coverage
3. Barrier coverage

Area Coverage:

▪ Energy‐efficient random coverage


▪ Connected random coverage
▪ A network is connected if any active node can communicate with any other active node
▪ Zhang and Hou proved that if the communication range Rc is at least twice the sensing
range Rs, then coverage implies connectivity.
▪ An important observation is that an area is completely covered if there are at least two
disks that intersect and all crossing are covered
▪ Based on these they proposed a distributed, localized algorithm called optimal geographical
density control

Point Coverage:

Objective is to cover a set of points

▪ Random point coverage – Distribute sensors randomly, so that every point must be covered
by at least one sensor at all times
▪ Deterministic point coverage – Do the same in a deterministic manner.

Barrier Coverage
▪ 1‐barrier coverage – covered by at least 1 sensor
▪ 2‐barrier coverage – covered by at least 2 sensors
▪ K‐barrier coverage – covered by at least k sensors

Q11.What is interoperability? Why is it required? Explain the different types of interoperability with
examples.

Interoperability is a characteristic of a product or system, whose interfaces are completely


understood, to work with other products or systems, present or future, in either implementation or
access, without any restrictions.

Why Interoperability is Important in Context of IoT?

1. To fulfill the IoT objectives


• Physical objects can interact with any other physical objects and can share their information
• Any device can communicate with other devices anytime from anywhere
• Machine to Machine communication(M2M), Device to Device Communication (D2D), Device
to Machine Communication (D2M)
• Seamless device integration with IoT network
2. Heterogeneity
• Different wireless communication protocols such as ZigBee (IEEE 802.15.4), Bluetooth
(IEEE802.15.1), GPRS, 6LowPAN, and Wi-Fi (IEEE802.11)
• Different wired communication protocols like Ethernet (IEEE 802.3) and Higher Layer LAN
Protocols (IEEE 802.1)
• Different programming languages used in computing systems and websites such as
JavaScript, JAVA, C, C++, Visual Basic, PHP, and Python
• Different hardware platforms such as Crossbow, NI, etc.
3. Different operating systems
• As an example, for sensor node: TinyOS, SOS, Mantis OS, RETOS, and mostly vendor specific
OS
• As an example, for personal computer: Windows, Mac, Unix, and Ubuntu
4. Different databases: DB2, MySQL, Oracle, PostgreSQL, SQLite, SQL Server, and Sybase
5. Different data representations
6. Different control models
7. Syntactic or semantic interpretations

Types of Interoperability:

User Interoperability

Interoperability problem between a user and a device

Device Interoperability

Interoperability problem between two different devices


Example of Device and User Interoperability

Using IoT, both A and B provide a real-time security


service A is placed at Delhi, India, while B is placed at
Tokyo, Japan. A, B, U use Hindi, Japanese, and English
language, respectively User U wants real-time service of
CCTV camera from the device A and B.

Problems are listed below

The user does not know the devices A and B Devices A


and B are different in terms of syntactic and semantic
notions Therefore, it is difficult to find CCTV device. User
U can’t understand the service provided by A and B.
Similarly, A and B do not mutually understand each
other.
Q12.Give an overview of the current network and explain the limitations of the current network with
suitable diagrams.
Q13. Explain the different challenges that occur while implementing SDN.
Q14.What is cloud computing? Explain it with one example. Explain its essential characteristics.

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., network infrastructures, servers, storage, applications, etc.)

Example: In Healthcare Domain

Using cloud computing, medical professionals host information, analytics and do diagnostics
remotely. As healthcare also comes in the list of examples of cloud computing it allows other doctors
around the world to immediately access this medical information for faster prescriptions and
updates. Application of cloud computing in health care includes telemedicine, public and personal
health care, E-health services and bioinformatics.

Essential Characteristics

1. Broad network access


• Cloud resources should be available over the network
• Should support standard mechanisms for information retrieval using traditional interfaces
• Supported clients: heterogeneous thin or thick client platforms (e.g., mobile phones,
laptops, and PDAs)
2. Rapid elasticity
• Cloud resource allocation should be rapid, elastic and automatic
• Dynamic allocation/release facility for scale-out and scale-in
• Consumers should feel infinite resources
• Facility for add/remove of quantity should be there

3. Measured service
• Resource usage should be recorded and monitored
• Facility to dynamically control and optimize the resource usage
• This facility should be transparent between the service provider and consumer.
4. On-demand self-service
• Provide server time and network storage to users automatically
• This facility should be available as a self-service
5. Resource pooling
• Automatically pool the whole available resources
• Serve multiple end-users using a multi-tenant model
• Resources should be allocated according to user’s demand

Q15.Explain in brief the different service models in cloud computing


Service Models

• Software-as-a-Service (SaaS)
• Platform-as-a-Service (PaaS)
• Infrastructure-as-a-Service (IaaS)

Software-as-a-Service (SaaS).

Software as a Service provides you with a completed product


that is run and managed by the service provider. In most
cases, people referring to Software as a Service are referring
to end-user applications.

• SaaS is a simplified model of software delivery over


Internet
• Operation, maintenance and technical support is
provided by the service provider
• Typically offered via web browser working as a thin-
client
• Supports a fully pay-as-you-go model
• Facility to execute service provider’s applications at user’s end Applications are available as
‘services’
• Services can be accessed via different types of client devices (e.g., web browser, app)
• End-users do not possess the control of the cloud infrastructure
• Examples: Google Apps, Salesforce, Learn.com.

Platform-as-a-Service (PaaS)

Platform-as-a-service remove the need for organizations to manage the underlying infrastructure
(usually hardware and operating systems) and allow you to focus on the deployment and
management of your applications.

• PaaS provides the platform which allows developers to create applications which can be
offered as services via Internet
• Simplifies the application development and deploy providing the cloud-aware feature
• PaaS is an application middleware offered as a service to developers
• Provides abstraction and security for deployed applications.
• Facilitates development and managing applications without the complexity of maintaining
the underlying infrastructure
• Allows customers to rent virtualized servers and associated services
• Provides elastic scaling of the user’s deployed application
• Examples: Windows Azure, Google App Engine

Infrastructure-as-a-Service (IaaS)

Infrastructure-as-a-Service, abbreviated as IaaS, contains the basic building blocks for cloud IT and
typically provide access to networking features, computers (virtual or dedicated hardware), and data
storage space.

• On-demand delivery of computing infrastructure


• IaaS provides the following:
o Servers- Compute, machines
o Storage
o Network
o Operating system
• Facility to access computing resources such as network, storage, and operating system
• User can deploy, execute and control any software (Operating systems and other
applications)
• In some case, the user can control selected networking components (e.g., host firewalls).
• Examples: Amazon EC2, GoGrid, iland, Rackspace Cloud Servers.

Q16.Explain the architecture of the sensor cloud along with its actors.

End‐users: Registered themselves, selects

templates, and request for application(s)

Sensor‐owner: Deploy heterogeneous/

homogeneous physical sensor nodes over different


geographical location

SCSP: Plays managerial role

(Explain the adjacent diagram in your own language)

Actors in Sensor-cloud

End‐users

• Enjoy Se‐aaS through applications as per the requirements.


• Unknown about what and which physical sensor is/are allocated to serve the application

Sensor‐owner

• Plays a role from business perspective.


• They purchase physical sensor devices, deployed over different geographical locations, and
lend these devices to the sensor‐cloud

Sensor‐Cloud Service Provider (SCSP)

• A business actor.
• SCSP charges price from the end‐users as per their usage of Se‐aaS.

Q17.How does fog computing work? What are the benefits of it?
• Fog computing or fogging is a term coined by CISCO.
• The idea of fog computing is to extend the cloud nearer
to the IoT devices.
• The primary aim: solve the problems faced by cloud
computing during IoT data processing.
• an intermediate layer between cloud and devices.

Benefits of Fog computing

Data Volume

• By 2020, about 50 billion devices will be online.


• Presently billions of devices produce exabytes of data every day.
• Device density is still increasing every day.
• Current cloud model is unable to process this amount of data.

Example

Private firms, Factories, airplane companies produce colossus amount of data everyday

Current cloud model cannot store all these data

Latency

• Time taken by a data packet for a round trip


• An important aspect for handing a time sensitive data.
• If edge devices send time sensitive data to cloud for analysis and wait for the cloud to give
• a proper action, then it can lead to many unwanted results.
• While handling time sensitive data, a millisecond can make a huge difference.

(Capture theory part only)

Bandwidth

• Bit‐rate of data during transmission


• If all the data generated by IoT devices are sent to cloud for storage and analysis, then, the
traffic generated by these devices will be simply gigantic.
• consumes almost all the bandwidths.
• Handling this kind of traffic will be simply a very hard task.

Q18. Explain what is smart cities and their need? What are the IoT challenges in smart cities?

A Smart City is

• An urban system
• Uses Information & Communication Technology (ICT)
• Makes infrastructure more interactive, accessible and efficient.

IoT Challenges in Smart Cities

Security and Privacy

• Exposure to attacks (e.g. cross-site scripting, side channel, etc.).


• Exposure to vulnerabilities.
• Multi-tenancy induces the risk of data leakage.

Heterogeneity

• Integration of varying hardware platforms and specifications.


• Integration of different radio specifications.
• Integration of various software platforms.
• Accommodating varying user requirements.

Reliability

• Unreliable communication due to vehicle mobility.


• Device failures still significant

Large scale

• Delay due to large scale deployments.


• Delay due to mobility of deployed nodes.
• Distribution of devices can affect monitoring tasks.

Legal and Social aspects

• Services based on user provided information may be subject to local or international laws.
• Individual and informed consent required for using humans as data sources.

Big data

• Transfer, storage and maintenance of huge volumes of data is expensive.


• Data cleaning and purification is time consuming.
• Analytics on gigantic data volumes is processing intensive.

Sensor Networks

• Choice of appropriate sensors for individual sensing tasks is crucial.


• Energy planning is crucial.
• Device placement and network architecture is important for reliable end-to-end IoT
implementation.
• Communication medium and means play an important role in seamless function of IoT in
smart cities.

What is a Smart Grid? What are its benefits and properties?

Smart grid is conceptualized as a planned nationwide network that uses information technology to
deliver electricity efficiently, reliably, and securely.

Smart grid is also named as –

• Electricity with a brain


• The energy internet
• The electronet

According to the definition given by NIST, smart grid is – “a modernized grid that enables
bidirectional flows of energy and uses two‐way communication and control capabilities that will lead
to an array of new functionalities and applications.”

Benefits of Smart Grid

Benefits associated with the Smart Grid include:

• More efficient transmission of electricity


• Quicker restoration of electricity after power disturbances
• Reduced operations and management costs for utilities, and ultimately lower power costs
for consumers
• Reduced peak demand, which will also help lower electricity rates
• Increased integration of large‐scale renewable energy systems
• Better integration of customer‐owner power generation systems, including renewable
energy systems
• Improved security
• Using smart grid, both the consumers and the energy service providers or stakeholders get
benefited.
For consumers, the benefit of using smart grid are as follows:

• Updated information on their energy usage in real‐time


• Enabling electric cars, smart appliances, and other smart devices to be charged
• Program the smart devices to run during off‐peak hours to lower energy bills
• Different pricing options

For stakeholders, the benefit of using smart grid are as follows:

• Increase grid reliability


• Reduce the frequency of power blackouts and brownouts
• Provide infrastructure for monitoring, analysis, and decision‐making
• Increase grid resiliency by providing detailed information
• Reduce inefficiencies in energy delivery
• Integrate the sustainable resources of wind and solar alongside the main grid
• Improve management of distributed energy resources, including micro‐grid operations and
storage management.

Properties of Smart Grid

Consumer Participation

• Real‐time monitoring of consumption


• Control of smart appliances
• Building Automation

Real‐time Pricing

Distributed Generation

• Integration of renewable energy resources


• Integration of micro‐grid

Power System Efficiency

• Power Monitoring
• Asset Management and optimal utilizations
• Distribution Automation and Protection

Power Quality

• Self‐Healing
• Frequency Monitoring and Control
• Load Forecasting
• Anticipation of Disturbances

Q20.State the difference between IoT and IIoT.


S.No. IIOT IOT

It focuses on industrial applications


such as manufacturing, power plants, It focuses on general applications ranging
1. oil & gas, etc. from wearables to robots & machines.

It uses critical equipment & devices


connected over a network which will
cause a life-threatening or other
emergency situation on failure Its implementation starts with small scale
therefore uses more sensitive and level so there is no need to worry about
2. precise sensors. life-threatening situations.

3. It deals with large scale networks. It deals with small scale networks.

It can be programmed remotely i.e.,


4. offers remote on-site programming. It offers easy off-site programming.

It handles data ranging from medium to


5. high. It handles very high volume of data.

It requires robust security to protect


6. the data. It requires identity and privacy.

7. It needs stringent requirements. It needs moderate requirements.

8. It having very long-life cycle. It having short product life cycle.

9. It has high- reliability. It is less reliable.

Q21.Explain What are the characteristics of Big Data?

Characteristics of Big Data

Big Data is characterized by 7 Vs


• Volume
• Velocity
• Variety
• Variability
• Veracity
• Visualization
• Value

Volume

Quantity of data that is generated

Sources of data are added continuously

Example of volume ‐

• 30TB of images will be generated every night from the Large Synoptic Survey Telescope
(LSST)
• 72 hours of video are uploaded to YouTube every minute

Velocity

Refers to the speed of generation of data

Data processing time decreasing day‐by‐day in order to provide real‐time services

Older batch processing technology is unable to handle high velocity of data

Example of velocity

• 140 million tweets per day on average (according to a survey conducted in 2011)
• New York Stock Exchange captures 1TB of trade information during each trading session
Variety

Refers to the category to which the data belongs

No restriction over the input data formats

Data mostly unstructured or semi‐structured

Example of variety

• Pure text, images, audio, video, web, GPS data, sensor data, SMS, documents, PDFs, flash
etc.

Variability

Refers to data whose meaning is constantly changing.

Meaning of the data depends on the context.

Data appear as an indecipherable mass without structure

Example:

• Language processing, Hashtags, Geo‐spatial data, Multimedia, Sensor events

Veracity

Veracity refers to the biases, noise and abnormality in data.

It is important in programs that involve automated decision‐making, or feeding the data into an
unsupervised machine learning algorithm.

Veracity isn’t just about data quality, it’s about data understandability.

Visualization

Presentation of data in a pictorial or graphical format

Enables decision makers to see analytics presented visually

Identify new patterns

Value

It means extracting useful business information from scattered data.

Includes a large volume and variety of data

Easy to access and delivers quality analytics that enables informed decisions

Q22.What is data analytics? Explain what its types are? And write a difference between them

“Data analytics (DA) is the process of examining data sets in order to draw conclusions about the
information they contain, increasingly with the aid of specialized systems and software. Data
analytics technologies and techniques are widely used in commercial industries to enable
organizations to make more informed business decisions and by scientists and researchers to verify
or disprove scientific models, theories and hypotheses.”
Two types of analysis

Qualitative Analysis

• Deals with the analysis of data that is categorical in nature

Data is not described through numerical values

Described by some sort of descriptive context such as text

Data can be gathered by many methods such as interviews, videos and audio recordings, field notes

Data needs to be interpreted

The grouping of data into identifiable themes

Qualitative analysis can be summarized by three basic principles (Seidel, 1998):

• Notice things
• Collect things
• Think about things

Quantitative Analysis

• Quantitative analysis refers to the process by which numerical data is analyzed

Quantitative analysis refers to the process by which numerical data is analyzed

Involves descriptive statistics such as mean, media, standard deviation

The following are often involved with quantitative analysis:

• Statistical models
• Analysis of variables
• Data dispersion
• Analysis of relationships between variables
• Contingence and correlation
• Regression analysis
• Statistical significance
• Precision
• Error limits
OR
• Descriptive Analytics

• Diagnostic Analytics

• Predictive Analytics

• Prescriptive Analytics

You might also like