Iiot Unit 3
Iiot Unit 3
proceeding:
This document is confidential and intended solely for the educational purpose
of RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group
/ learning community as intended. If you are not the addressee you should
not disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and
delete this document from your system. If you are not the intended recipient
you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.
20EC004 Industrial IoT
Applications
Department: CSE, CSD & IT
Batch/Year: 2023 -2024/ IVYear
Date: 23.03.2023
CONTENTS
1 Course Objectives
2 Pre Requisites
3 Syllabus
4 Course outcomes
6 Lecture Plan
7 Lecture Notes
8 Assignments
9 Part A Q & A
10 Part B Questions
15 Assessment Schedule
5
1. Course Objectives
6
1. Course
Objectives
OBJECTIVES:
7
2. Pre Requisites
8
3. PRE REQUISITES
Pre-requisite Chart
9
3. Syllabus
10
3. Syllabus
20EC004:Industrial IoT Applications LTPC:3003
UNIT I INTRODUCTION
Introduction to IOT, What is IIOT? IOT Vs. IIOT, History of IIOT, Components of IIOT –
Sensors,Interface, Networks, People Process, Hype cycle, IOT Market, Trends; future Real life
examples,Key terms IOT Platform, Interfaces, API, clouds, Data Management Analytics, Mining
Manipulation;Role of IIOT in Manufacturing Processes, Use of IIOT in plant maintenance
practices, Sustainability through Business excellence tools Challenges, Benefits in implementing
IIOT
of sensors ,Design of sensors, sensor architecture, special requirements for IIOT sensors, Role
of actuators, types of actuators. Hardwire the sensors with different protocols such as
11
4. Course outcomes
12
5. COURSE OUTCOME
7
13
5. CO- PO/PSO Mapping
14
5. CO- PO/PSO Mapping
16
6. Lecture Plan
Introduction to
sensors,
1 Transducers,
Classification,
Roles of sensors
2 in IIOT
Various types of
sensors , Design
3 of sensors,
sensor
architecture,
4 special
requirements for
IIOT sensors,
Role of
actuators, types
5 of actuators.
Hardwire the
sensors with
6 different protocols
such as HART,
MODBUS-Serial,
7
Parallel, Ethernet,
8
BACNet , Current,
M2M
9
10
17
7. Lecture Notes
18
UNIT III
9. Lecture Notes
Introduction: Sensors
Transducer:
Converts a signal from one physical form to another physical form
Physical form: thermal, electric, mechanical, magnetic, chemical, and optical
Energy converter
Example:
Microphone : Converts sound to electrical signal
Speaker : Converts electrical signal to sound
Antenna : Converts electromagnetic energy into electricity and vice
versa
Strain gauge : Converts strain to electrical
Definition of Sensor:
The characteristic of any device or material to detect the presence of a
particular physical quantity
Range
• Gives the highest and the lowest value of the physical quantity within which the
sensor can actually sense
• Beyond this value there is no sensing or no kind of response.
Resolution
• Provides the smallest change in the input that a sensor is capable of sensing
• Resolution is an important specification towards selection of sensors.
• Higher the resolution better the precision
Errors
The difference between the standard value and the value produced by sensor
Sensitivity
• Sensitivity indicates ratio of incremental change in the response of the system
with respect to incremental change in input parameter.
• It can be found from slope of output characteristic curve of a sensor
Linearity
The deviation of sensor value curve from a particular straight line
Drift
The difference in the measurements of sensor from a specific reading when kept at
that value for a long period of time
Repeatability
The deviation between measurements in a sequence under same conditions
Dynamic characteristics
How well a sensor responds to changes in its input
Classification of Actuators
Electric Linear Actuator
• Powered by electrical signal
• Mechanical device containing linear guides, motors, and drive mechanisms
• Converts electrical energy into linear displacement
• Used in automation applications including electrical bell, opening and closing
dampers, locking doors, and braking machine motions.
Three layers:
1. Services layer
2. Data Layer
3. Physical Layer
• Services including routing protocol, data dissemination and data aggregation.
• Data layer models all the messages
• Physical layer consists of nodes that are sinks, children nodes, cluster heads and
parents.
• The sink nodes broadcast a query.
• Sensor nodes close to sensed object broadcast the sensed data to their neighboring sensor
nodes.
• Cluster heads receive this data from their children nodes and are responsible for
processing and aggregating it.
• Cluster heads then broadcast the response to the sink nodes through neighboring nodes.
Sensor design considers the desired sensitivity (ability to detect small changes) and the range
(the span of values it can measure).
- Calibration may be necessary to ensure accuracy within the specified range.
Response Time:
- Sensors are designed with a specific response time, indicating how quickly they can detect
and report changes in the measured parameter.
- Faster response times are essential for certain applications, such as safety-critical systems.
Resolution:
- Resolution refers to the smallest detectable change in the parameter being measured.
- High-resolution sensors can discern subtle variations, while lower resolution sensors provide a
more generalized reading.
Output Signal:
- Sensor output signals can be analog (continuous voltage or current) or digital (discrete
values).
- Analog sensors often require additional analog-to-digital conversion for digital processing.
. Power Requirements:
- Sensor design considers power consumption, with some sensors optimized for low power to
prolong battery life or reduce energy costs.
User Interface:
- Some sensor designs include user-friendly interfaces like displays or apps for easy interaction
and data visualization.
HART COMMUNICATION PROTOCOL:
The basic principles behind the operation of HART instruments and networks:
• Communication Modes
• Frequency Shift Keying
• HART Networks
• HART Commands
Communication Modes:
2. Multidrop mode:
1. Universal:
Provides functions which are implemented in all field devices.
Examples:
Read model
Read serial number
Read range
2.Common Practice:
Provides functions common to many field devices but not all. If a device uses these
functions, these commands should be used to perform them.
Examples:
3.Device specific:
Provides functions which are more or less unique to a particular field device.
Examples:
Advantages of HART:
Modbus was a single protocol built on top of serial, so it could not be divided into
multiple layers. Over time, different application data units were introduced to either
change the packet format used over serial or to allow the use of TCP/IP and user
datagram protocol (UDP) networks. This led to a separation of the core protocol, which
defines the protocol data unit (PDU), and the network layer, which defines the
application data unit (ADU).
• The PDU and the code that handles it comprise the core of the Modbus Application
Protocol Specification.
• This specification defines the format of the PDU, the various data concepts used by
the protocol, the use of function codes to access that data, and the specific
implementation and restrictions of each function code.
• The Modbus PDU format is defined as a function code followed by an associated set
of data.
• The size and contents of this data are defined by the function code, and the entire
PDU (function code and data) cannot exceed 253 bytes in size.
Accessing Data in Modbus and the Modbus Data Model:
Discrete
Boolean Read-only Read/Write
Inputs
Holding Unsigned
Read/Write Read/Write
Registers Word
Input Unsigned
Read-only Read/Write
Registers Word
Coils 0
Discrete Inputs 1
Input Registers 3
Holding Registers 4
Number Number
Register
Address (1-indexing, (0-indexing,
Number
standard) alternative)
0 1 400001 400000
1 2 400002 400001
2 3 400003 400002
Because the packet size is limited to 253 bytes, devices are constrained on the amount of
data that can be transferred. The most common function codes can transfer between 240
and 250 bytes of actual data from the slave data model, depending on the code.
In addition to the functionality defined at the PDU core of the Modbus protocol, you can use
multiple network protocols. The most common protocols are serial and TCP/IP, but you can
use others like UDP as well. To transmit data necessary for Modbus across these layers,
Modbus includes a set of ADU variants that are tailored to each network protocol.
Common Features
Modbus requires certain features to provide reliable communication. The Unit ID or Address
is used in each ADU format to provide routing information to the application layer. Each
ADU comes with a full PDU, which includes the function code and associated data for a
given request
Standard Formats
The three standard ADU formats are TCP, remote terminal unit (RTU), and ASCII. RTU and
ASCII ADUs are traditionally used over a serial line, while TCP is used over modern TCP/IP
or UDP/IP networks.
TCP/IP
The TCP ADUs consists of the Modbus Application Protocol (MBAP) Header concatenated
with the Modbus PDU. The MBAP is a general-purpose header that depends on a reliable
networking layer. The format of this ADU, including the header, is shown in Figure 6.
The data fields of the header indicate its use. First, it includes a transaction identifier. This is
valuable on a network where multiple requests can be outstanding simultaneously. That is,
a master can send requests 1, 2, and 3. At some later point, a slave can respond in the
order 2, 1, 3, and the master can match the requests to the responses and parse data
accurately. This is useful for Ethernet networks.
The protocol identifier is normally zero, but you can use it to expand the behavior of
the protocol. The length field is used by the protocol to delineate the length of the
rest of the packet.
The Unit ID is typically unused for TCP/IP devices. However, Modbus is such a
common protocol that many gateways are developed, which convert the Modbus
protocol into another protocol. In the original intended use case, a Modbus TCP/IP
to serial gateway could be used to allow connection between new TCP/IP networks
and older serial networks. In such an environment, the Unit ID is used to determine
the address of the slave device that the PDU is actually intended for.
Finally, the ADU includes a PDU. The length of this PDU is still limited to 253 bytes
for the standard protocol.
RTU
The RTU ADU appears to be much simpler, as shown in Figure 7.
ASCII
The ASCII ADU is more complex than RTU as shown in Figure 8, but also avoids many of
the issues of the RTU packet. However, it has some of its own disadvantages.
Resolving the issue of determining packet size, the ASCII ADU has a well-defined and
unique start and end for each packet. That is, each packet begins with “:” and ends
with a carriage return (CR) and line feed (LF). In addition, serial APIs like NI-VISA and
the .NET Framework SerialPort Class can easily read data in a buffer until a specific
character—like CR/LF—is received. These features make it easy to process the stream
of data on the serial line efficiently in modern application code.
Network Layers:
Modbus can run on many network layers besides serial and TCP. A potential
implementation is UDP because it is suited to the Modbus communication style.
Modbus is a message-based protocol at its core, so UDP’s ability to send a
well-defined packet of information without any additional application-level information,
like a start character or length, makes Modbus extremely simple to implement.
ADU Modifications
Parallel Communication:
• As many bits are transferred over various parallel paths at the same time, the order
of received bit strings may be different or out of sync subject to various factors
such as source distance, location and available bandwidth.
• An example of this is distortion/skipping in internet calls (VOIP) and video
streaming.
As the length of cable increases, so does the amount of metal wires. This increases the
chances of Cross-talk. Cross-talk means interference between the cable wires and it leads to
the unsuccessful exchange of readable data (garbage value).
Due to this effect, we cannot increase the length of cable beyond a certain safe limit. Owing
to this factor, the cable length supported by a parallel link is quite shorter than serial links.
Easy Installation:
Parallel data links are relatively easy to be installed as hardware, which in turn makes them a
reasonable choice. The configuration of a parallel port in a PC is quite easy as compared to
its counterpart ‘Serial links’.
It is because almost all serial links require its conversion into a parallel form using a Universal
asynchronous receiver transmitter to enable it to be connected with a data bus directly.
•No of paths for Data transfer: Serial link has only one path for data transfer
while Parallel one has multiple paths.
•Distance Coverage: Serial link supports communication to long distances while
Parallel data transmission supports limited distance transmission.
•Cross-talk: Chances of Cross-talk is less in Serial link compared to Parallel one due to only
one path available.
•Speed: Serial link is slow compared to Parallel one.
•Communication: Serial transmission is full duplex as data can be sent or received at either
ends. Parallel data is half duplex as the data can either be sent or received.
•Cost Factor: Serial links are cheaper than Parallel one owing to more paths in parallel
mode.
•Complexity: Serial links are simple and reliable while Parallel links are complex and
unreliable.
Ethernet Protocol:
The most popular and oldest LAN technology is Ethernet Protocol, so it is
more frequently used in LAN environments which is used in almost all networks like
offices, homes, public places, enterprises, and universities. Ethernet has gained huge
popularity because of its maximum rates over longer distances using optical media .
• Ethernet protocol mainly works in the first two layers in the OSI network model like
data-link & physical. Ethernet at the first layer uses signals, bitstreams that move on the
media, physical components that situate signals on media & different topologies.
• Ethernet protocol simply divides the Data Link layer functions into two separate sublayers
like the Logical Link Control sublayer & the Media Access Control sublayer.
• The functions of the Data Link layer in the OSI model are allocated to both the sublayers
like LLC & MAC. For Ethernet protocol, the IEEE 802.2 standard simply explains the
functions of the LLC sublayer & the 802.3 standard explains the functions of MAC & the
Physical layer.
• The Logical Link Control (LLC) handles the communication between the upper layers &
the lower layers. The LLC layer uses the data of network protocol like IPv4 packet & adds
control data to help in delivering the packet toward the destination node.
Ethernet Protocol Frame Structure:
• The structure of the Ethernet frame is defined within the IEEE 802.3
standard.
• The frame structure at the data link layer in the OSI model is almost the
same for all Ethernet speeds. The structure of the frame simply adds
headers & trailers in the region of the Layer 3 PDU (Protocol Data Unit) to
summarize the message.
• Ethernet header includes both Source & Destination MAC address, after
which the frame’s payload is present. The end field is Cyclical Redundancy
Checking, used to notice the error. The following diagram shows the
structure of the frame & fields.
Preamble:
The first pattern of the Ethernet Protocol frame is 7-Bytes of Preamble where
alternative 0’s and 1’s in this frame indicate the beginning of the frame & permit the
sender & receiver to set up bit-level synchronization. At first, a Preamble in the above
frame was introduced to permit for the few bits loss because of signal delays.
The start of frame delimiter (SFD) is a 1-Byte field with 10101011 values that
indicates that upcoming bits are the beginning of the frame, which is the address of the
destination. The start of the frame delimiter is mainly designed to split the pattern of the
bit to the preamble & signal the beginning of the frame.
Destination Address:
The Destination Address Field is a 6-bytes field in the above Ethernet frame. The
address within the frame & the device MAC address is compared. If both the addresses are
matched, then the device simply allows the frame. This MAC address is a uni-cast,
multi-cast, or broadcast.
Source Address:
The source address is a 6-Byte field, including the source machine’s MAC address. Once
the address of source is an individual address or Unicast always, then LSB of an initial byte
will be always.
Length:
This field size is 2-byte long that specifies the entire Ethernet frame length. The length
value held by the 16-bit field ranges from 0 to 65534, however, the length cannot be
higher than 1500 due to some own Ethernet limitations.
Data Field
Data field is the location where actual data can be added and it is also called Payload.
Here, both the data & IP header will be inserted if IP is used over Ethernet. So, the highest
data available may be 1500 Bytes. If the data length is below the minimum length of 46
bytes, then padding zeros can be included to reach the minimum achievable length.
CRC Field
The CRC in the frame is the last pattern with 4 Bytes. This field includes 32-bits of data
hash code, which is produced over the Source Address, Destination Address, Length, and
Ethernet Protocol’s Data field. If the checksum is calculated through a destination that is
not similar to the sent checksum value, then received data can be corrupted.
Here, the frame size for IEEE 802.3 Ethernet standard changes from 64 bytes – 1518 bytes
with 46 to 1500 bytes of data length.
Extended Ethernet Frame:
In the above, the standard Ethernet frame is discussed in detail. Now let’s discuss
the extended Ethernet frame using which we can obtain Payload even higher than 1500
Bytes.
• This protocol analyzer is a software tool mainly used for capturing & analyzing the traffic of
data within a network.
• These protocol analyzers are generally used by developers for capturing & analyzing the
data traffic from their applications. The number of functions mainly depends on the
complexity of the analyzer.
Advantages:
The advantages of Ethernet protocol include the following.
•Security, speed, efficiency, and reliability.
•The Gigabit Ethernet provides very fast speed like 1Gbps. Its speed mainly ranges from above
10 times as compared to Fast Ethernet.
•Less cost.
•It does not need any hubs or switches
•Simple maintenance
•It is very strong toward the noise.
•The data transfer doesn’t degrade.
•The quality of data transfer is good.
Disadvantages:
The disadvantages of Ethernet protocol include the following.
8 IoT communication protocols that have been widely deployed in numerous existing
and emerging IoT applications.
1.Bluetooth
Bluetooth-compatible IoT sensors are ideal for applications that require short range
connectivity and low power communication. Bluetooth protocol has an effective range
of 50 to 100 m and supports a data transfer rates up to 1 Mbps.
Recently, IoT developers have shown an inclination toward the low energy version of
Bluetooth, Bluetooth Low Energy (BLE), based on the Bluetooth Smart protocol. BLE
offers significantly reduced power compared to its predecessor but is not deemed fit
for large file transfers.
2. Zigbee
Zigbee, based on the IEEE 802.15.4 standard, has emerged as a one of the most
widely used communications protocols for embedded applications. Zigbee is used to
connect devices in the 10-100 m range and supports a data rate of up to 250 Kbps. As
a low-power, low data rate technology, Zigbee is well suited for two-way data transfer
between IoT sensors and IoT gateway devices, as well as ad hoc wireless mesh
networks.
Through its mesh topology, Zigbee devices can transmit data through intermediate
devices over a distance. For IoT applications that require low cost and low power
sensor networks in the consumer and industrial segments, Zigbee is an excellent
option.
3. 6LoWPAN:
Wi-Fi was intended to replace Ethernet and provide easy-to-use short-range wireless
connectivity and cross-vendor interoperability through the IEEE 802.11 family of
standards.
Wi-Fi is known for faster, larger volume communications, and can transmit over ranges
of 50 m using the 2.4 GHz and 5 GHz frequency bands. Its popularity continues to grow
thanks to the ubiquity of existing infrastructure.
5.Cellular:
IoT applications that require continuous connectivity over very long distances can be
designed based on cellular networks like GSM, LTE, EDGE, 3G, 4G and 5G. Cellular
networks can communicate with devices over distances of up to 35km.
Cellular technology is beneficial for IoT applications because of the following features:
• Cost-optimized, enhanced coverage for IoT applications through LTE networks like
Cat-0 and Cat-1.
• End-to-end security through TLS/DTLS security and on-air encryption of the LTE
networks.
• Minimal or zero regulatory regulations. With a cellular network, data can be exchanged
at up to 23 dBm.
6.ModBus:
7. PROFINET:
PROFINET is highly compatible with fieldbus technologies and can be easily integrated
with existing industrial systems. The PROFINET specification defines proxies (proxy
addresses) with specified data mapping systems to allow the protocol to communicate
with modern IoT protocols.
8. EtherCAT
EtherCAT is based on the CANopen protocol and Ethernet and specifically optimized for
industrial automation. It allows any standard PC to be used as an EtherCAT master and
communicate with EtherCAT slaves using any topology. Together, they can be used to
connect all devices on a factory floor at rates of up to 1,000 I/O points in 30
microseconds.
IoT and M2M
M2M
Machine to machine (M2M) refers to networking of Machines for the purpose of remote
monitoring and control and data exchange. The end-to-end architecture for M2M systems
comprising of M2M area networks, Communications Network and application domain.
An M2M area network comprises of machines which have embedded hardware module for
sensing actuation and communication. Various Communication protocols can be used for
M2M local area network such as Zigbee , Bluetooth , Modbus M –bus, wireless, power LINE
Communication ,6LoWPAN.
These Communications protocols provide connectivity between M2M nodes within and M2M
area network. The Communications Network provides connectivity to remote m2m area
network. communication network can use wired or wireless network. The M2M area network
use either proprietary or non IP based protocol.
The communication between the M2M nodes and the M2M Gateway ((Fig-1.18) is based on
the communication protocol. M2M Gateway protocol translation to enable IP connectivity for
M2M . M2M Gateway act as a proxy performing translation from / to native protocol to M2M
area network.
M2M data is gathered into point solution such as enterprise applications, service
management application for remote monitoring applications. M2M has various application
domain such as smart metering, Home Automation , industrial Automation, smart grid.
Machine-to-Machine
53
Machine-to-Machine(M2M) Gateway
Communication protocols:
M2m and IoT can differ in how the communication between the machines are device
happens. M2M uses other proprietary or not IP based communication protocol for
communication with in the M2M area networks. Commonly uses M2m protocol include zigbee,
Bluetooth, ModBus, wireless M-Bus ,power line communication.
The focus of communication in M2M is usually on the protocols below the network layer.
Focus of communication in IoT is usually a protocol in network layer such as http web
sockets, MQTT, XMPP, DDS, AMQP.
54
Machines in M2M vs Things in IoT:
The " things " IoT refers to Physical objects that have unique identifier and can sense and
communicate with the external environment or their internal physical status. The unique
identifiers the things in IoT are the IP addresses. Things have software component for
accessing processing and storing sensor information on controlling actuator connector. IoT
system can include IoT devices of various types such as fire alarms , door alarms, lighting
control devices.
while the emphasis of M2M is more on hardware with embedded modules, the emphasis
modules, the emphasis of IoT is more on software . IoT devices run specialist software
sensor Data Collection, data analysis and interfacing with cloud through IP based
communication.
M2M data is collected in point solutions and often in on premises storage infrastructure. In
contrast to M2M,the data in IoT is connected in the cloud. The analytical component
analysis the data and stores the result in the cloud database. Data and analysis results are
visualized with the cloud based applications. The centralized controller is aware of the
status of all the nodes and send Control Commands to the nodes.
Applications:
M2m data is collected in point solutions and can be accessed by on premises application
diagnosis applications, service management applications , and on-premises enterprise 55
application.
8. Assignments
3
11. Part A
Course
Q. K
Questions Outcom
No.: Level
es
What is a Transducer?
Example:
5 K2 CO1
Define Actuator.
• An actuator is part of the system that deals with the
control action required (mechanical action)
• Mechanical or electro-mechanical devices
6 K2 CO1
• A control signal is input to an actuator and an energy
source is necessary for its operation.
• Available in both micro and macro scales
• Example: Electric motor, solenoid, hard drive stepper
motor
7 K2 CO1
Course
Q. K
Questions Outcom
No.: Level
es
8 K3 CO3
Define Preamble.
What is routers?
• A router is required whenever we need to couple
similar or dissimilar LAN technologies and control the
traffic exchanged between them.
• The router does not modify BACnet message it just
18 forward it the from one LAN to the other when ever it K2 CO3
needs to access.
20 K2 CO3
21 K3 CO3
10
10. Part B Questions
1 Measure the extent of benefits that can be provided by IOT for K5 CO2 A
Home Automation, Health monitoring system, Smart
Transportation and Smart Shopping.
(ii) How many protocols are there in IoT? How to choose the
right IoT protocol (7)
11. Activity based learning
12
11. Activity based learning
14
12. Supportive online Certification courses
https://onlinecourses.nptel.ac.in/noc23_cs83
https://www.udemy.com/course/introduction-to-industrial-iot-for-it-professionals/
13. Real time Applications in day to day life
and to Industry
16
13. Real time Applications in day to day life and to Industry
• Manage building automation data from multiple locations- all Star hotels
• IIoT can be used to monitor and control the heating, lighting, energy consumption, fire
protection, employee safety and many other systems for multiple buildings from a
central location. The real-time machine data can be transferred to a central cloud
application, using industrial communication networks.
14. Contents beyond the Syllabus
18
14. Contents beyond the Syllabus
What is edge computing?
•Edge computing is an emerging computing paradigm which refers to a
range of networks and devices at or near the user. Edge is about
processing data closer to where it’s being generated, enabling processing
at greater speeds and volumes, leading to greater action-led results in real
time.
•It offers some unique advantages over traditional models, where computing power
is centralized at an on-premise data center. Putting compute at the edge allows
companies to improve how they manage and use physical assets and create new
interactive, human experiences. Some examples of edge use cases include self-
driving cars, autonomous robots, smart equipment data and automated retail.
• Possible components of edge include:
•Edge devices: We already use devices that do edge computing every day—like
smart speakers, watches and phones – devices which are locally collecting and
processing data while touching the physical world. Internet of Things (IoT) devices,
point of sales (POS) systems, robots, vehicles and sensors can all be edge devices—
if they compute locally and talk to the cloud.
•Network edge: Edge computing doesn’t require a separate “edge network” to
exist (it could be located on individual edge devices or a router, for example). When
a separate network is involved, this is just another location in the continuum
between users and the cloud and this is where 5G can come into play. 5G brings
extremely powerful wireless connectivity to edge computing with low latency and
high cellular speed, which brings exciting opportunities like autonomous drones,
remote telesurgery, smart city projects and much more. The network edge can be
particularly useful in cases where it is too costly and complicated to put compute on
premises and yet high responsiveness is required (meaning the cloud is too distant).
•On-premises infrastructure: These are for managing local systems and
connecting to the network and could be servers, routers, containers, hubs or
bridges.
15. Assessment Schedule
20
15. Assessment Schedule
SCHEDULED ON 24/09/23
SCHEDULED ON 28/10/23
16. Prescribed Text Books &
Reference Books
22
Prescribed Text Books & Reference Books
TEXT BOOKS:
•1. Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving World of
M2M Communications,First Edition, Wiley Publications, 2013
24
17. Mini Project suggestions
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK
Group of Educational Institutions. If you have received this document through email in
error, please notify the system manager. This document contains proprietary
information and is intended only to the respective group / learning community as
intended. If you are not the addressee you should not disseminate, distribute or copy
through e-mail. Please notify the sender immediately by e-mail if you have received this
document by mistake and delete this document from your system. If you are not the
intended recipient you are notified that disclosing, copying, distributing or taking any
action in reliance on the contents of this information is strictly prohibited.