IoT Answers
IoT Answers
Ans:
Internet technology connecting devices, machines and tools to the internet by means of wireless
technologies. OR
The Internet of Things (IoT) is the network of physical objects that contain embedded technology to
communicate and sense or interact with their internal states or the external environment.
Examples of IoT:
Q.2 Which are technologies closely related to IoT? State difference between two such technologies
with IOT.
Ans: A number of technologies that are very closely related to IoT include:
Sr No IoT M2M
1 M2M is part of the IoT M2M refers to communications and
interactions between machines and
devices.
2 IoT has a broader scope than M2M, since M2M interactions can occur via a cloud
it comprises a broader range of computing infrastructure
interactions, including interactions
between devices/things, things and
people, things with applications and
people with applications.
3 It also enables the composition of M2M offers the means for managing
workflows comprising all of the devices and devices interaction,
interactions. while also collecting machine and/or sensor
data.
4 IoT includes the notion of internet M2M is a term introduced by
connectivity (which is provided in most telecommunication services providers and,
of the networks outlined above), but is not pays emphasis on machines interactions via
necessarily focused on the use of Telcom one or more Telcom /communication
networks. networks (e.g., 3G, 4G, 5G, satellite, public
networks).
Sr No IoT WoT
1 While IoT is about creating a network of From a developer's perspective, the WoT
objects, things, people, systems and enables access and control over IoT
applications, WoT tries to integrate them resources and applications using
to the Web. mainstream web technologies (such as
HTML 5.0, JavaScript, Ajax, PHP, Ruby n'
Rails etc.)
2 The scope of IoT applications is broader WoT can be thought as a flavor/option of an
and includes systems that are not application layer added over the IoT's
accessible through the web (e.g., network layer.
conventional WSN and RFID systems)
Q.3 What is RFID protocol? Explain its features, working principle with a neat diagram and state its
applications.
Ans:
RFID is an acronym for “radio‐frequency identification” Data digitally encoded in RFID tags, which
can be read by a reader. It is similar to barcodes. Data read from tags are stored in a database by the
reader. As compared to traditional barcodes and QR codes, RFID tag data can be read outside the
line‐of‐sight.
RFID Features:
Working Principle:
It is Derived from Automatic Identification and Data Capture (AIDC) technology. AIDC performs
object identification, object data collection and mapping of the collected data to computer systems
with little or no human intervention. AIDC uses wired communication whereas RFID uses radio
waves to perform AIDC functions. The main components of an RFID system include an RFID tag or
smart label, an RFID reader, and an antenna.
RFID Applications:
1. Inventory management
2. Asset tracking
3. Personnel tracking
4. Controlling access to restricted areas
5. ID badging
6. Supply chain management
7. Counterfeit prevention (e.g., in the pharmaceutical industry)
Q.4 What is the MQTT protocol? Explain its working principle with a neat diagram and state its
applications.
Ans:
MQTT Components:
1. Connect
2. Disconnect
3. Subscribe
4. Unsubscribe
5. Publish
Working Principle:
MQTT Topics:
A topic is a simple string that can have more hierarchy levels, which are separated by a slash. A
sample topic for sending temperature data of the living room could be house/living‐
room/temperature. On one hand the client (e.g. mobile device) can subscribe to the exact topic or
on the other hand, it can use a wildcard.
The subscription to house/+/temperature would result in all messages sent to the previously
mentioned topic house/living room/ temperature, as well as any topic with an arbitrary value in the
place of living room, such as house/kitchen/temperature. The plus sign is a single level wild card and
only allows arbitrary values for one hierarchy. If more than one level needs to be subscribed, such
as, the entire sub‐tree, there is also a multilevel wildcard (#). It allows to subscribe to all underlying
hierarchy levels. For example, house/# is subscribing to all topics beginning with house.
Applications:
Q7. State the features of the ZigBee protocol. Explain its types and state its applications.
Ans:
Important components
ZigBee Mesh:
1. In a mesh, any node can communicate with any other node within its range.
2. If nodes are not in range, messages are relayed through intermediate nodes.
3. This allows the network deployment over large areas.
4. Meshes have increased network reliability.
5. For example, if nodes C and F are down, the message packets from A can still be relayed to
via B and E.
6. ZigBee mesh networks are self-configuring and self‐healing.
ZigBee Type:
1. The network layer uses Ad Hoc On‐Demand Distance Vector (AODV) routing.
2. To find the final destination, the AODV broadcasts a route request to all its immediate
neighbors.
3. The neighbors relay the same information to their neighbors, eventually spreading the
request throughout the network.
4. Upon discovery of the destination, a low‐cost path is calculated and informed to the
requesting device via unicast messaging.
Applications:
1. Building automation
2. Remote control (RF4CE or RF for consumer electronics)
3. Smart energy for home energy monitoring
4. Health care for medical and fitness monitoring
5. Home automation for control of smart homes
6. Light Link for control of LED lighting
7. Telecom services
Q9. Define what is WSN and explain what are different challenges that occur while implementing
WSN. Explain the different node behavior in WSNs.
Challenges:
1. Scalability
▪ Providing acceptable levels of service in the presence of large number of nodes.
1
▪ Typically, throughput decreases at a rate of , N = number of nodes.
√𝑁
2. Quality of service
▪ Offering guarantees in terms of bandwidth, delay, jitter, packet loss probability.
▪ Limited bandwidth, unpredictable changes in RF channel characteristics
3. Energy efficiency
▪ Nodes have limited battery power
▪ Nodes need to cooperate with other nodes for relaying their information.
4. Security
▪ Open medium.
▪ Nodes prone to malicious attacks, infiltration, eavesdropping, interference.
Normal nodes work perfectly in ideal environmental conditions
Failed nodes are simply those that are unable to perform an operation; this could be because of
power failure and environmental events.
Badly failed nodes exhibit features of failed nodes but they can also send false routing messages
which are a threat to the integrity of the network.
Selfish nodes are typified by their unwillingness to cooperate, as the protocol requires whenever
there is a personal cost involved. Packet dropping is the main attack by selfish nodes.
Malicious nodes aim to deliberately disrupt the correct operation of the routing protocol, denying
network service if possible.
1. Area coverage
2. Point coverage
3. Barrier coverage
Area Coverage:
Point Coverage:
▪ Random point coverage – Distribute sensors randomly, so that every point must be covered
by at least one sensor at all times
▪ Deterministic point coverage – Do the same in a deterministic manner.
Barrier Coverage
▪ 1‐barrier coverage – covered by at least 1 sensor
▪ 2‐barrier coverage – covered by at least 2 sensors
▪ K‐barrier coverage – covered by at least k sensors
Q11.What is interoperability? Why is it required? Explain the different types of interoperability with
examples.
Types of Interoperability:
User Interoperability
Device Interoperability
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of
configurable computing resources (e.g., network infrastructures, servers, storage, applications, etc.)
Using cloud computing, medical professionals host information, analytics and do diagnostics
remotely. As healthcare also comes in the list of examples of cloud computing it allows other doctors
around the world to immediately access this medical information for faster prescriptions and
updates. Application of cloud computing in health care includes telemedicine, public and personal
health care, E-health services and bioinformatics.
Essential Characteristics
3. Measured service
• Resource usage should be recorded and monitored
• Facility to dynamically control and optimize the resource usage
• This facility should be transparent between the service provider and consumer.
4. On-demand self-service
• Provide server time and network storage to users automatically
• This facility should be available as a self-service
5. Resource pooling
• Automatically pool the whole available resources
• Serve multiple end-users using a multi-tenant model
• Resources should be allocated according to user’s demand
• Software-as-a-Service (SaaS)
• Platform-as-a-Service (PaaS)
• Infrastructure-as-a-Service (IaaS)
Software-as-a-Service (SaaS).
Platform-as-a-Service (PaaS)
Platform-as-a-service remove the need for organizations to manage the underlying infrastructure
(usually hardware and operating systems) and allow you to focus on the deployment and
management of your applications.
• PaaS provides the platform which allows developers to create applications which can be
offered as services via Internet
• Simplifies the application development and deploy providing the cloud-aware feature
• PaaS is an application middleware offered as a service to developers
• Provides abstraction and security for deployed applications.
• Facilitates development and managing applications without the complexity of maintaining
the underlying infrastructure
• Allows customers to rent virtualized servers and associated services
• Provides elastic scaling of the user’s deployed application
• Examples: Windows Azure, Google App Engine
Infrastructure-as-a-Service (IaaS)
Infrastructure-as-a-Service, abbreviated as IaaS, contains the basic building blocks for cloud IT and
typically provide access to networking features, computers (virtual or dedicated hardware), and data
storage space.
Q16.Explain the architecture of the sensor cloud along with its actors.
Actors in Sensor-cloud
End‐users
Sensor‐owner
• A business actor.
• SCSP charges price from the end‐users as per their usage of Se‐aaS.
Q17.How does fog computing work? What are the benefits of it?
• Fog computing or fogging is a term coined by CISCO.
• The idea of fog computing is to extend the cloud nearer
to the IoT devices.
• The primary aim: solve the problems faced by cloud
computing during IoT data processing.
• an intermediate layer between cloud and devices.
Data Volume
Example
Private firms, Factories, airplane companies produce colossus amount of data everyday
Latency
Bandwidth
Q18. Explain what is smart cities and their need? What are the IoT challenges in smart cities?
A Smart City is
• An urban system
• Uses Information & Communication Technology (ICT)
• Makes infrastructure more interactive, accessible and efficient.
Heterogeneity
Reliability
Large scale
• Services based on user provided information may be subject to local or international laws.
• Individual and informed consent required for using humans as data sources.
Big data
Sensor Networks
Smart grid is conceptualized as a planned nationwide network that uses information technology to
deliver electricity efficiently, reliably, and securely.
According to the definition given by NIST, smart grid is – “a modernized grid that enables
bidirectional flows of energy and uses two‐way communication and control capabilities that will lead
to an array of new functionalities and applications.”
Consumer Participation
Real‐time Pricing
Distributed Generation
• Power Monitoring
• Asset Management and optimal utilizations
• Distribution Automation and Protection
Power Quality
• Self‐Healing
• Frequency Monitoring and Control
• Load Forecasting
• Anticipation of Disturbances
3. It deals with large scale networks. It deals with small scale networks.
Volume
Example of volume ‐
• 30TB of images will be generated every night from the Large Synoptic Survey Telescope
(LSST)
• 72 hours of video are uploaded to YouTube every minute
Velocity
Example of velocity
• 140 million tweets per day on average (according to a survey conducted in 2011)
• New York Stock Exchange captures 1TB of trade information during each trading session
Variety
Example of variety
• Pure text, images, audio, video, web, GPS data, sensor data, SMS, documents, PDFs, flash
etc.
Variability
Example:
Veracity
It is important in programs that involve automated decision‐making, or feeding the data into an
unsupervised machine learning algorithm.
Veracity isn’t just about data quality, it’s about data understandability.
Visualization
Value
Easy to access and delivers quality analytics that enables informed decisions
Q22.What is data analytics? Explain what its types are? And write a difference between them
“Data analytics (DA) is the process of examining data sets in order to draw conclusions about the
information they contain, increasingly with the aid of specialized systems and software. Data
analytics technologies and techniques are widely used in commercial industries to enable
organizations to make more informed business decisions and by scientists and researchers to verify
or disprove scientific models, theories and hypotheses.”
Two types of analysis
Qualitative Analysis
Data can be gathered by many methods such as interviews, videos and audio recordings, field notes
• Notice things
• Collect things
• Think about things
Quantitative Analysis
• Statistical models
• Analysis of variables
• Data dispersion
• Analysis of relationships between variables
• Contingence and correlation
• Regression analysis
• Statistical significance
• Precision
• Error limits
OR
• Descriptive Analytics
• Diagnostic Analytics
• Predictive Analytics
• Prescriptive Analytics