0% found this document useful (0 votes)
23 views48 pages

IoE - Unit 2 Notes

The document provides an overview of network topology, detailing its importance, types, and communication protocols relevant to the Internet of Everything (IoT). It describes various topologies such as Point to Point, Mesh, Star, Bus, Ring, Tree, and Hybrid, outlining their advantages and disadvantages. Additionally, it discusses communication protocols like Bluetooth Low Energy and WiFi, emphasizing their characteristics, use cases, and security features.

Uploaded by

pirateprasad0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views48 pages

IoE - Unit 2 Notes

The document provides an overview of network topology, detailing its importance, types, and communication protocols relevant to the Internet of Everything (IoT). It describes various topologies such as Point to Point, Mesh, Star, Bus, Ring, Tree, and Hybrid, outlining their advantages and disadvantages. Additionally, it discusses communication protocols like Bluetooth Low Energy and WiFi, emphasizing their characteristics, use cases, and security features.

Uploaded by

pirateprasad0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

INTERNET OF EVERYTHING (24EC114)

Syllabus:

What is Network Topology?


Network topology is the way devices are connected in a network. It defines how these
components are connected and how data transfer between the network. Understanding the
different types of network topologies can help in choosing the right design for a specific
network.
There are two major categories of Network Topology i.e. Physical Network topology
and Logical Network Topology. Physical Network Topology refers to the actual structure
of the physical medium for the transmission of data. Logical network Topology refers to
the transmission of data between devices present in the network irrespective of the way
devices are connected. The structure of the network is important for the proper
functioning of the network. one must choose the most suitable topology as per their
requirement.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 1


INTERNET OF EVERYTHING (24EC114)

Types of Network Topology


Below mentioned are the types of Network Topology
• Point to Point Topology
• Mesh Topology
• Star Topology
• Bus Topology
• Ring Topology
• Tree Topology
• Hybrid Topology
Point to Point Topology
Point-to-point topology is a type of topology that works on the functionality of the sender
and receiver. It is the simplest communication between two nodes, in which one is the
sender and the other one is the receiver. Point-to-Point provides high bandwidth.

Point to Point Topology

Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel.
Every device is connected to another via dedicated channels. These channels are known as
links. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 2


INTERNET OF EVERYTHING (24EC114)

Mesh Topology

• Suppose, the N number of devices are connected with each other in a mesh topology,
the total number of ports that are required by each device is N-1. In Figure 1, there are
5 devices connected to each other, hence the total number of ports required by each
device is 4. The total number of ports required = N * (N-1).
• Suppose, N number of devices are connected with each other in a mesh topology, then
the total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In
Figure 1, there are 5 devices connected to each other, hence the total number of links
required is 5*4/2 = 10.
Advantages of Mesh Topology
• Communication is very fast between the nodes.
• Mesh Topology is robust.
• The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
• Provides security and privacy.
Disadvantages of Mesh Topology
• Installation and configuration are difficult.
• The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
• The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet
service providers are connected to each other via dedicated channels. This topology is also
used in military communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be
passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time
the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 3


INTERNET OF EVERYTHING (24EC114)

popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.

Star Topology

Advantages of Star Topology


• If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
• Each device requires only 1 port i.e. to connect to the hub, therefore the total number
of ports required is N.
• It is Robust. If one link fails only that link will affect and not other than that.
• Easy to fault identification and fault isolation.
• Star topology is cost-effective as it uses inexpensive coaxial cable.
Disadvantages of Star Topology
• If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
• The cost of installation is high.
• Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where all
computers are connected to a central hub. This topology is also used in wireless networks
where all devices are connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected
to a single cable. It is bi-directional. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes. In Bus Topology,

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 4


INTERNET OF EVERYTHING (24EC114)

various MAC (Media Access Control) protocols are followed by LAN ethernet connections
like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.

Bus Topology

Advantages of Bus Topology


• If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus-based networks that support up
to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to build small
networks.
• Bus topology is familiar technology as installation and troubleshooting techniques are
well known.
• CSMA is the most common method for this type of topology.
Disadvantages of Bus Topology
• A bus topology is quite simpler, but still, it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
• Adding new devices to the network would slow down networks.
• Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected
to a single coaxial cable or twisted pair cable. This topology is also used in cable television
networks.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 5


INTERNET OF EVERYTHING (24EC114)

Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring
Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.

Ring Topology

The most common access method of ring topology is token passing.


• Token passing: It is a network access method in which a token is passed from one node
to another node.
• Token: It is a frame that circulates around the network.
Operations of Ring Topology
• One station is known as a monitor station which takes all the responsibility for
performing the operations.
• To transmit the data, the station has to hold the token. After the transmission is done,
the token is to be released for other stations to use.
• When no station is transmitting the data, then the token will circulate in the ring.
• There are two types of token release techniques: Early token release releases the
token just after transmitting the data and Delayed token release releases the token
after the acknowledgment is received from the receiver.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 6


INTERNET OF EVERYTHING (24EC114)

Advantages of Ring Topology


• The data transmission is high-speed.
• The possibility of collision is minimum in this type of topology.
• Cheap to install and expand.
• It is less costly than a star topology.
Disadvantages of Ring Topology
• The failure of a single node in the network can cause the entire network to fail.
• Troubleshooting is difficult in this topology.
• The addition of stations in between or the removal of stations can disturb the whole
topology.
• Less secure.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration) are used.

Tree Topology

In tree topology, the various secondary hubs are connected to the central hub which
contains the repeater. This data flow from top to bottom i.e. from the central hub to the
secondary and then to the devices or from bottom to top i.e. devices to the secondary hub
and then to the central hub. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 7


INTERNET OF EVERYTHING (24EC114)

Advantages of Tree Topology


• It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
• It allows the network to get isolated and also prioritize from different computers.
• We can add new devices to the existing network.
• Error detection and error correction are very easy in a tree topology.
Disadvantages of Tree Topology
• If the central hub gets fails the entire system fails.
• The cost is high because of the cabling.
• If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization. At the top of
the tree is the CEO, who is connected to the different departments or divisions (child
nodes) of the company. Each department has its own hierarchy, with managers overseeing
different teams (grandchild nodes). The team members (leaf nodes) are at the bottom of
the hierarchy, connected to their respective managers and departments.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied
above. Hybrid Topology is used when the nodes are free to take any form. It means these
can be individuals such as Ring or Star topology or can be a combination of various types
of topologies seen above. Each individual topology uses the protocol that has been
discussed earlier.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 8


INTERNET OF EVERYTHING (24EC114)

Hybrid Topology

The above figure shows the structure of the Hybrid topology. As seen it contains a
combination of all different types of networks.
Advantages of Hybrid Topology
• This topology is very flexible .
• The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
• It is challenging to design the architecture of the Hybrid Network.
• Hubs used in this topology are very expensive.
• The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices .
A common example of a hybrid topology is a university campus network. The network may
have a backbone of a star topology, with each building connected to the backbone through
a switch or router. Within each building, there may be a bus or ring topology connecting
the different rooms and offices. The wireless access points also create a mesh topology for
wireless devices. This hybrid topology allows for efficient communication between
different buildings while providing flexibility and redundancy within each building.
Why is Network Topology Important?
Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is
important.
• Network Performance: Upon choosing the appropriate topology as per requirement,
it helps in running the network easily and hence increases network performance.
• Network Reliability: Some topologies like Star, Mesh are reliable as if one connection
fails, they provide an alternative for that connection, hence it works as a backup.
• Network Expansion: Chosing correct topology helps in easier expansion of Network
as it helps in adding more devices to the network without disrupting the actual
network.
• Network Security: Network Topology helps in understanding how devices are
connected and hence provides a better security to the network.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 9


INTERNET OF EVERYTHING (24EC114)

Overview of Communication Protocols


From the network and communication perspective, IoT can be viewed as an aggregation of
different networks, including mobile networks (3G, 4G, CDMA, etc.), WLANs, WSN, and
Mobile Adhoc Networks (MANET). Seamless connectivity is a key requirement for IoT.
Network-communication speed, reliability, and connection durability will impact the overall
IoT experience. With the emergence of high-speed mobile networks like 5G, and the higher
availability of local and urban network communication protocols such as Wi-Fi, Bluetooth,
and WiMax, creating an interconnected network of objects seems feasible.

A. Physical and Link Layer:

1. Bluetooth Low Energy (BLE)


• Overview: BLE is a variant of Bluetooth technology designed for low power consumption,
making it ideal for battery powered IoT devices. BLE is widely used in wearable devices,
proximity beacons, and other applications that don’t require constant connectivity.
• Data Rate: BLE provides data rates of 125 Kbps, 500 Kbps, and up to 2 Mbps in newer
versions, which is generally adequate for periodic data transmission.
• Range: BLE can achieve a range of up to 100 meters in ideal conditions, but it generally
operates effectively within 1050 meters indoors. The range and data rate depend on the BLE
version and mode used.
• Topology: BLE supports star topologies, where devices communicate with a central hub. In
Bluetooth 5, it also supports mesh networking, which extends its use cases in home
automation.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 10


INTERNET OF EVERYTHING (24EC114)

• Security: BLE includes 128bit AES encryption, providing a secure communication channel
for sensitive data.
• Power Consumption: BLE is highly power efficient, designed to conserve battery life and
suitable for wearables and sensors that send data intermittently.
• Use Cases: Primarily used in wearables, healthcare (fitness trackers, heart monitors), smart
home sensors, and asset tracking.
2. WiFi
• Overview: WiFi is one of the most widely used communication protocols, known for its high
data throughput and wellestablished infrastructure. WiFi is based on IEEE 802.11 standards,
with variants that support different ranges and data rates.
• Data Rate: WiFi offers high data rates, typically ranging from hundreds of Mbps to several
Gbps, depending on the standard (e.g., 802.11n, 802.11ac, 802.11ax).
• Range: WiFi has a typical range of up to 50 meters indoors, depending on interference and
barriers, and up to 100 meters outdoors.
• Topology: WiFi typically follows a star topology, where all devices connect to a central
router. With mesh WiFi setups, it’s possible to create larger, connected networks with
extended range.
• Security: WiFi offers robust security features such as WPA2 and WPA3 encryption,
providing high levels of protection for connected devices.
• Power Consumption: WiFi generally consumes more power than other IoT protocols,
making it less ideal for batterypowered devices.
• Use Cases: Highdata applications such as video streaming, large data transfer, or situations
where an established WiFi network is available, as in smart home hubs, cameras, and
appliances.

3. NFC (Near Field Communication)


• Overview: NFC is a short-range communication protocol designed for close-proximity
interactions. It enables devices to communicate when they are within a few centimeters of
each other. NFC is widely used for contactless payment systems, authentication, and data
transfer in scenarios requiring minimal setup and low power.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 11


INTERNET OF EVERYTHING (24EC114)

• Data Rate: NFC offers low data rates, typically ranging from 106 kbps to 424 kbps, which is
sufficient for small data exchanges like payment information or authentication tokens.
• Range: NFC operates at very short ranges, usually up to 10 cm, making it ideal for secure,
close-contact transactions and interactions.
• Topology: NFC generally operates in a point-to-point topology, where two NFC-enabled
devices communicate directly without needing a central router or intermediary.
• Security: NFC offers good security, largely due to its short range. It also supports encryption
and secure channels, making it suitable for sensitive applications like payment and access
control.
• Power Consumption: NFC is designed for low power consumption, and it can even operate
in passive mode, where one device powers the communication for both devices. This makes
it ideal for battery-powered devices and situations where power conservation is critical.
• Use Cases: NFC is commonly used for contactless payments, access control (e.g., keycards),
quick device pairing (like Bluetooth speakers), and data sharing between devices in close
proximity.

B. Network Layer:
1. Zigbee
• Overview: Zigbee is a low power, wireless mesh networking protocol standardized by the
IEEE (802.15.4) and commonly used in home automation, smart metering, and industrial
settings. It supports short range communication, typically up to 100 meters, with a focus on
low energy consumption and device to device communication.
• Data Rate: Zigbee offers relatively low data rates, typically around 250 Kbps, which is
suitable for transmitting small packets of data in IoT networks.
• Range: Zigbee devices generally operate within a range of 10–100 meters indoors,
depending on interference and obstructions. Using a mesh network, it extends the range by
allowing data to hop between devices.
• Topology: Zigbee networks can form star, tree, or mesh topologies. The mesh architecture
is a key feature that allows Zigbee networks to be highly scalable.
• Security: Zigbee uses 128bit AES encryption, providing a secure layer for communication.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 12


INTERNET OF EVERYTHING (24EC114)

• Power Consumption: Zigbee is designed for low power, enabling long battery life for
devices.
• Use Cases: Ideal for smart home applications, such as lighting, security, and environmental
sensors, due to its short range, mesh networking, and low power usage.

2. ZWave
• Overview: ZWave is another popular wireless communication protocol designed for home
automation. Originally developed by Zensys and later managed by the ZWave Alliance,
ZWave operates in the subGHz frequency range, which helps avoid interference from WiFi
and Bluetooth.
• Data Rate: ZWave has a lower data rate than Zigbee, around 100 Kbps, suitable for IoT
devices that require minimal bandwidth.
• Range: ZWave has a typical indoor range of around 30 meters, but like Zigbee, it can extend
range through mesh networking, where each device acts as a node.
• Topology: ZWave supports a mesh network, which enables more reliable and extensive
coverage in home automation.
• Security: ZWave includes AES128 encryption to secure communications within the
network.
• Power Consumption: ZWave is optimized for low power, allowing it to work well with
battery operated devices.
• Use Cases: Home automation (lighting, locks, thermostats), with a focus on seamless device
to device communication and broad compatibility between ZWave certified products.

3. LoRaWAN (Long Range Wide Area Network)


• Overview: LoRaWAN is a longrange, lowpower wireless communication protocol designed
for widearea networks. It uses the LoRa modulation technique and operates in unlicensed
ISM bands, making it suitable for largescale deployments.
• Data Rate: LoRaWAN has a low data rate of around 0.3 to 50 Kbps, suited for transmitting
small data packets at intervals, such as in sensor networks.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 13


INTERNET OF EVERYTHING (24EC114)

• Range: LoRaWAN offers an extensive range of up to 1520 kilometers in rural areas and
several kilometers in urban environments.
• Topology: LoRaWAN operates in a starofstars topology, with end devices connecting to a
central gateway that relays data to a network server.
• Security: LoRaWAN includes AES128 encryption at both the network and application layers,
ensuring secure transmission of data.
• Power Consumption: LoRaWAN is optimized for low power consumption, making it
suitable for battery operated devices with long lifespans.
• Use Cases: Ideal for applications in smart agriculture, asset tracking, environmental
monitoring, and remote infrastructure management, where wide coverage and low data
rates are required.

4. NBIoT (Narrowband IoT)


• Overview: NBIoT is a lowpower widearea (LPWA) technology standardized by 3GPP,
leveraging cellular networks to provide IoT connectivity. It operates within the licensed
frequency bands, making it more reliable in environments where interference could be an
issue.
• Data Rate: NBIoT has a data rate of about 250 Kbps, focusing on intermittent lowbandwidth
data transfers rather than continuous, highthroughput needs.
• Range: NBIoT offers good coverage, with penetration advantages in indoor environments,
including basements and other challenging locations.
• Topology: NBIoT uses a star topology, where each device communicates with a cell tower in
the cellular network.
• Security: Since it is based on cellular technology, NBIoT benefits from the extensive security
standards of cellular networks, including SIMbased authentication and encryption.
• Power Consumption: NBIoT is designed to be very energyefficient, enabling years of
battery life for IoT devices.
• Use Cases: NBIoT is ideal for applications requiring wide coverage, such as utility metering,
asset tracking, smart city infrastructure, and applications in locations with limited power
availability.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 14


INTERNET OF EVERYTHING (24EC114)

5. IPv4 and IPv5


The address through which any computer communicates with our computer is simply called
an Internet Protocol Address or IP address.
For example, if we want to load a web page or download something, we require the
address to deliver that particular file or webpage. That address is called an IP Address.
There are two versions of IP: IPv4 and IPv6. IPv4 is the older version, while IPv6 is
the newer one. Both have their own features and functions, but they differ in many ways.
What is IP?
An IP, or Internet Protocol address, is a unique set of numbers assigned to each device
connected to a network, like the Internet. It’s like an address for your computer, phone, or
any other device, allowing them to communicate with each other. When you visit a website,
your device uses the IP address to find and connect to the website’s server.
Types of IP Addresses
• IPv4 (Internet Protocol Version 4)
• IPv6 (Internet Protocol Version 6)
What is IPv4?
• IPv4 addresses consist of two things: the network address and the host address.
• It stands for Internet Protocol version four.
• It was introduced in 1981 by DARPA and was the first deployed version in 1982 for
production on SATNET and on the ARPANET in January 1983.
• IPv4 addresses are 32-bit integers that have to be expressed in Decimal Notation.
• It is represented by 4 numbers separated by dots in the range of 0-255, which have
to be converted to 0 and 1, to be understood by Computers.
• For Example, An IPv4 Address can be written as 189.123.123.90.
IPv4 Address Format
IPv4 Address Format is a 32-bit Address that comprises binary digits separated by a dot (.).

IPv4 Address Format

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 15


INTERNET OF EVERYTHING (24EC114)

Drawback of IPv4
• Limited Address Space: IPv4 has a limited number of addresses, which is not enough
for the growing number of devices connecting to the internet.
• Complex Configuration: IPv4 often requires manual configuration or DHCP to assign
addresses, which can be time-consuming and prone to errors.
• Less Efficient Routing: The IPv4 header is more complex, which can slow down data
processing and routing.
• Security Issues: IPv4 does not have built-in security features, making it more vulnerable
to attacks unless extra security measures are added.
• Limited Support for Quality of Service (QoS) : IPv4 has limited capabilities for
prioritizing certain types of data, which can affect the performance of real-time
applications like video streaming and VoIP.
• Fragmentation: IPv4 allows routers to fragment packets, which can lead to inefficiencies
and increased chances of data being lost or corrupted.
• Broadcasting Overhead: IPv4 uses broadcasting to communicate with multiple devices
on a network, which can create unnecessary network traffic and reduce performance.
What is IPv6?
• IPv6 is based on IPv4 and stands for Internet Protocol version 6.
• It was first introduced in December 1995 by Internet Engineering Task Force.
• IP version 6 is the new version of Internet Protocol, which is way better than IP
version 4 in terms of complexity and efficiency.
• IPv6 is written as a group of 8 hexadecimal numbers separated by colon (:). It can be
written as 128 bits of 0s and 1s.
IPv6 Address Format
IPv6 Address Format is a 128-bit IP Address, which is written in a group of 8 hexadecimal
numbers separated by colon (:).

IPv6 Address Format

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 16


INTERNET OF EVERYTHING (24EC114)

To switch from IPv4 to IPv6, there are several strategies:


• Dual Stacking : Devices can use both IPv4 and IPv6 at the same time. This way, they can
talk to networks and devices using either version.
• Tunneling : This method allows IPv6 users to send data through an IPv4 network to
reach other IPv6 users. Think of it as creating a “tunnel” for IPv6 traffic through the older
IPv4 system.
• Network Address Translation (NAT) : NAT helps devices using different versions of IP
addresses (IPv4 and IPv6) to communicate with each other by translating the addresses
so they understand each other.
Difference Between IPv4 and IPv6
Benefits of IPv6 over IPv4
The recent Version of IP IPv6 has a greater advantage over IPv4. Here are some of the
mentioned benefits:
• Larger Address Space: IPv6 has a greater address space than IPv4, which is required for
expanding the IP Connected Devices. IPv6 has 128 bit IP Address rather and IPv4 has a
32-bit Address.
• Improved Security: IPv6 has some improved security which is built in with it. IPv6
offers security like Data Authentication, Data Encryption, etc. Here, an Internet
Connection is more Secure.
• Simplified Header Format: As compared to IPv4, IPv6 has a simpler and more effective
header Structure, which is more cost-effective and also increases the speed of Internet
Connection.
• Prioritize: IPv6 contains stronger and more reliable support for QoS features, which
helps in increasing traffic over websites and increases audio and video quality on pages.
• Improved Support for Mobile Devices: IPv6 has increased and better support for
Mobile Devices. It helps in making quick connections over other Mobile Devices and in a
safer way than IPv4.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 17


INTERNET OF EVERYTHING (24EC114)

IPv4 IPv6
IPv4 has a 32-bit address length IPv6 has a 128-bit address length
It Supports Manual and DHCP address It supports Auto and renumbering address
configuration configuration
In IPv4 end to end, connection integrity is
In IPv6 end-to-end, connection integrity is Achievable
Unachievable
The address space of IPv6 is quite large it can produce
It can generate 4.29×10 9 address space
3.4×10 38 address space
The Security feature is dependent on the IPSEC is an inbuilt security feature in the IPv6
application protocol
Address representation of IPv4 is in
Address representation of IPv6 is in hexadecimal
decimal
Fragmentation performed by Sender and In IPv6 fragmentation is performed only by the
forwarding routers sender
In IPv4 Packet flow identification is not In IPv6 packet flow identification are Available and
available uses the flow label field in the header
In IPv4 checksum field is available In IPv6 checksum field is not available
It has a broadcast Message Transmission In IPv6 multicast and anycast message transmission
Scheme scheme is available
In IPv4 Encryption and Authentication
In IPv6 Encryption and Authentication are provided
facility not provided
IPv4 has a header of 20-60 bytes. IPv6 has a header of 40 bytes fixed
IPv4 can be converted to IPv6 Not all IPv6 can be converted to IPv4
IPv4 consists of 4 fields which are IPv6 consists of 8 fields, which are separated by a
separated by addresses dot (.) colon (:)
IPv4’s IP addresses are divided into five
different classes. Class A , Class B, Class C, IPv6 does not have any classes of the IP address.
Class D , Class E.
IPv4 supports VLSM( Variable Length subnet
IPv6 does not support VLSM.
mask ).
Example of IPv6:
Example of IPv4: 66.94.29.13
2001:0000:3238:DFE1:0063:0000:0000:FEFB

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 18


INTERNET OF EVERYTHING (24EC114)

C. Transport Layer:

1. UDP (User Datagram Protocol)

• Overview: UDP is a lightweight, connectionless protocol that allows fast, low-latency


data transfer without establishing a dedicated connection. It is suitable for
applications where speed is prioritized over reliability, making it popular in real-time
applications.
• Data Rate: UDP supports variable data rates, depending on network conditions, with
no built-in mechanisms for managing packet loss or guaranteeing delivery.
• Range: UDP operates over IP networks, so its range is dependent on network
infrastructure rather than the protocol itself.
• Topology: UDP can support point-to-point, multicast, and broadcast topologies,
enabling flexible communication patterns suitable for IoT applications.
• Security: UDP does not inherently provide security features, so encryption and
security protocols (like DTLS) are commonly added to secure data transmitted over
UDP.
• Power Consumption: UDP is efficient and generally consumes less power than TCP
due to its minimal overhead, making it suitable for low-power devices.
• Use Cases: Ideal for applications requiring fast, low-overhead transmission, such as
sensor data streaming, real-time monitoring, or control signals where occasional data
loss is acceptable, such as in environmental monitoring or video streaming in IoT.

2. TCP (Transmission Control Protocol)

• Overview: TCP is a connection-oriented protocol that ensures reliable data


transmission through acknowledgment and retransmission mechanisms. It
establishes a dedicated connection and is widely used in applications that require
data integrity.
• Data Rate: TCP supports high data rates but may experience delays due to error-
checking, packet sequencing, and retransmission, depending on network conditions.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 19


INTERNET OF EVERYTHING (24EC114)

• Range: TCP operates over IP networks, so its range is determined by network


coverage, similar to UDP.
• Topology: TCP is typically used in point-to-point or client-server topologies, where
reliable data delivery between two devices is critical.
• Security: TCP does not include inherent encryption; however, security is often
implemented at higher layers using protocols like SSL/TLS to secure the connection.
• Power Consumption: TCP can be power-intensive due to its connection-oriented
nature and data management overhead, making it less suitable for low-power IoT
devices.
• Use Cases: TCP is ideal for applications requiring data reliability and integrity, such
as file transfers, secure data exchange, firmware updates, and applications where
packet loss cannot be tolerated, like in banking and e-commerce IoT systems.

D. Application Layer:

1. HTTP (Hypertext Transfer Protocol)

• Overview: HTTP is an application-layer protocol commonly used for transferring


hypertext and media across the web. It operates over TCP and is well-suited for client-
server communication in IoT applications.
• Data Rate: HTTP's data rate depends on the underlying network; it can handle high
data rates, but it is generally slower than more lightweight protocols due to its
verbose headers.
• Range: HTTP operates over the internet, so its range is effectively global, depending
on network infrastructure.
• Topology: HTTP typically uses a client-server topology, where IoT devices act as
clients requesting data from or sending data to a server.
• Security: HTTP itself is not secure, but HTTPS (HTTP Secure) provides encryption
through TLS, securing data during transfer and ensuring data integrity and privacy.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 20


INTERNET OF EVERYTHING (24EC114)

• Power Consumption: HTTP is relatively power-intensive due to its use of TCP and
verbose headers, making it less ideal for low-power IoT devices, especially those
running on batteries.
• Use Cases: HTTP is widely used for IoT devices that communicate with web-based
servers or APIs, ideal for scenarios where periodic data updates are needed, such as
in smart home applications, remote monitoring, and data logging.

2. CoAP (Constrained Application Protocol)

• Overview: CoAP is a lightweight, application-layer protocol specifically designed for


low-power, resource-constrained IoT devices. It operates over UDP, enabling
efficient, low-latency communication with minimal overhead, often used in machine-
to-machine (M2M) and IoT environments.
• Data Rate: CoAP supports low data rates due to its simplicity and minimal header
size, making it suitable for small payloads and intermittent data transmissions.
• Range: CoAP relies on the underlying network (usually IP) for range; it can function
on local networks or extend over the internet with appropriate infrastructure.
• Topology: CoAP typically follows a client-server model, but it also supports multicast
and is compatible with publish-subscribe architectures, making it flexible for various
IoT network setups.
• Security: CoAP can be secured with DTLS (Datagram Transport Layer Security),
providing encryption, authentication, and integrity for data transmitted over UDP.
• Power Consumption: CoAP is highly efficient in terms of power consumption due to
its lightweight design and UDP-based communication, making it ideal for battery-
powered IoT devices.
• Use Cases: CoAP is well-suited for constrained IoT applications, such as smart
meters, environmental monitoring, remote sensor networks, and other scenarios
where low bandwidth, low power, and intermittent connectivity are key
requirements. It is also used in smart city applications and industrial IoT where low
latency and minimal overhead are beneficial.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 21


INTERNET OF EVERYTHING (24EC114)

• This table encapsulates each protocol's unique attributes, helping determine which
technology aligns with specific IoT needs based on coverage, data rate, and power
requirements.
Power
Protocol Range Data Rate Topology Primary Use Cases
Consumption
Wearables, health
Up to 100 monitoring, asset
BLE Up to 2 Mbps Low Star
meters tracking, short-range
data exchange
Up to 50
Smart home hubs, video
meters indoors; 100 Mbps to
WiFi High Star, Mesh streaming, data-
100 meters several Gbps
intensive applications
outdoors
Contactless payments,
Point-to- access control, data
NFC Up to 10 cm ~424 Kbps Very Low
Point transfer between nearby
devices
Up to 100 Home automation,
Zigbee meters 20 to 250 Kbps Low Mesh sensor networks, smart
(indoors) lighting
Smart home devices,
Up to 30
Z-Wave 9.6 to 100 Kbps Low Mesh security systems, energy
meters indoors
monitoring
Long-range sensing,
Up to 15 km
agriculture,
LoRaWAN (urban), 5 km 0.3 to 50 Kbps Very Low Star
environmental
(rural)
monitoring
Smart meters,
environmental
Up to 35 km Low to
NB-IoT Up to 250 Kbps Star monitoring, asset
(urban) Moderate
tracking, low-bandwidth
IoT
Variable, Internet communication,
Based on
IPv4 & depending on Point-to- device addressing,
network Moderate
IPv6 protocol and Point enabling internet-based
infrastructure
network IoT
Variable, Point-to- Real-time data
Network-
UDP depending on Low Point, streaming, sensor data,
dependent
network Multicast monitoring applications
Variable, File transfer, secure data
Network- Point-to-
TCP depending on Moderate exchange, applications
dependent Point
network requiring data integrity
Variable, Web-based IoT services,
Network-
HTTP depending on High Client-Server device control, cloud
dependent
network communication
Resource-constrained
Client-
Network- Low, typically devices, smart city
CoAP Very Low Server,
dependent up to a few Kbps applications, low-power
Multicast
sensor networks

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 22


INTERNET OF EVERYTHING (24EC114)

Role of 5G in IoT
5G, or the fifth generation wireless technology, plays a transformative role in advancing the
Internet of Things (IoT). The combination of 5G and IoT offers the potential to drive
innovation across various industries due to its speed, low latency, massive connectivity, and
efficiency.

5G refers to the utilization of fifth-generation (5G) wireless technology. 5G is the next


evolutionary step in mobile communications that has seen mobile networks previously
mature from 2G to 3G to 4G. Away from the hype, what 5G really offers is low latency and
high-speed connectivity.

For many IoT applications this will be a critical enabling technology but the bulk of
IoT will continue to be well served by 4G and connectivity such as LTE-M, NB-IoT and Low
Power Wide Area (LPWA) networks.

Benefits of 5G for IoT?


• By connecting things enterprises can develop new or improve existing products,
services, and business processes.
• From automotive to smart manufacturing and utilities, the role of IoT will grow in
importance, transcending almost every industry.
• In addition, IoT will continue to benefit society by enabling implementation of
government policy.
• For example, by enabling further control of electricity demand and fluctuating supply
or minimizing waste of critical resources such as water.
• Today’s mobile networks, known as 2G, 3G and 4G, provide a strong foundation for
connecting things.
• 2G, 3G and 4G were originally developed to enable personal communication and
mobile broadband services. Still, they have also proven extremely capable for the
demands of IoT, offering technical capabilities exceeding most existing use cases and
with characteristics particularly well-suited to IoT.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 23


INTERNET OF EVERYTHING (24EC114)

• For example, global standardization and coverage mean products and services can be
scaled globally. Building on the scale of the mobile industry and billions of connected
mobiles enables cost efficiency, reliability, security, and continuous development of
devices, network technologies and service provider capabilities.

1. Enhanced Speed and Bandwidth


• Explanation: 5G offers data transfer speeds of up to 10 Gbps, which is up to 100 times
faster than 4G LTE. This high speed is crucial for IoT devices that need to transmit
large amounts of data, such as autonomous vehicles, smart cities, and industrial IoT
applications.
• Impact on IoT: IoT devices that require realtime data analytics, video surveillance, or
remote monitoring benefit immensely from 5G’s increased bandwidth. For example,
autonomous vehicles use numerous IoT sensors to collect data from surroundings,
which requires highspeed data transmission for immediate decisionmaking.

2. UltraLow Latency
• Explanation: 5G networks are designed to deliver latency as low as 1 millisecond, far
lower than 4G's average of 3050 milliseconds. Latency is the delay between sending
and receiving data, and minimizing it is crucial for realtime applications.
• Impact on IoT: This low latency is particularly beneficial for applications like
autonomous driving, remote surgery, and industrial robotics, where even slight
delays can result in critical failures. IoT devices in these areas can operate in realtime,
providing instant feedback and response.

3. Massive IoT Connectivity


• Explanation: 5G is designed to connect a massive number of devices simultaneously.
While 4G networks can handle around 10,000 devices per square kilometer, 5G can
support over 1 million, enabling “massive machinetype communication” (mMTC).
• Impact on IoT: In densely populated areas or industrial sites with numerous sensors
and devices, 5G enables seamless connectivity for thousands of devices. For example,

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 24


INTERNET OF EVERYTHING (24EC114)

in smart cities, 5G can support IoT devices like traffic sensors, smart lighting,
surveillance cameras, and public transport systems without network congestion.

4. Network Slicing for Customization and Efficiency


• Explanation: 5G supports a technology known as “network slicing,” which allows
network operators to create virtualized, customized network slices that can be
tailored to specific needs or applications.
• Impact on IoT: Network slicing allows different IoT applications to share the same
physical network but operate in isolated segments with tailored quality of service
(QoS). For example, a healthcare IoT network slice for telemedicine can be separated
from a network slice used for lowpriority sensors in agriculture. This ensures
efficient, reliable communication based on the application's demands.

5. Energy Efficiency and Extended Battery Life


• Explanation: 5G is designed to be more powerefficient than its predecessors, which is
crucial for IoT devices that need long battery life. The 5G New Radio (NR) standard
includes “sleep mode” and lowpower protocols for IoT devices to minimize power
consumption.
• Impact on IoT: IoT devices like smart meters, sensors, and wearables can benefit from
these energysaving features, allowing them to operate in the field for longer periods
without frequent battery replacements. This is particularly useful for remote
applications where battery replacement is challenging and costly.

6. Security Enhancements
• Explanation: 5G introduces improved security protocols, such as better encryption,
network authentication, and identity protection, which are essential for protecting
data transmitted by IoT devices.
• Impact on IoT: With billions of connected devices, security is a critical concern in IoT.
5G's security features help protect sensitive data in sectors like healthcare, finance,

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 25


INTERNET OF EVERYTHING (24EC114)

and government. For example, in connected medical devices or autonomous vehicles,


enhanced 5G security ensures that data and control commands are transmitted safely.

7. Support for Edge Computing


• Explanation: 5G networks support edge computing, where data processing occurs
closer to where it is generated (at the “edge” of the network) rather than in a
centralized cloud.
• Impact on IoT: For latency sensitive IoT applications, edge computing minimizes data
travel time, enabling faster processing and decision making. For instance, in an
industrial IoT setting, real time data analysis can be done at the edge, reducing the
need to send data back to a central server and cutting down on latency.

Application Areas of 5GEnabled IoT


Here’s how various industries utilize 5G to enable innovative IoT applications:
1. Smart Cities: 5G supports connected infrastructure, including traffic sensors, smart
lighting, waste management, and surveillance systems, enhancing urban living and safety.
2. Healthcare: Remote patient monitoring, telemedicine, and connected medical devices
benefit from 5G’s reliability and low latency, allowing doctors to provide care from afar.
3. Manufacturing and Industry 4.0: Industrial IoT relies on realtime monitoring of equipment
and automated processes, which 5G enables through high bandwidth and low latency.
4. Agriculture: 5G allows IoT devices in agriculture to monitor crops, soil health, and weather
conditions in realtime, enabling precision agriculture and improved crop yields.
5. Autonomous Vehicles and Transportation: Selfdriving cars and intelligent transportation
systems use IoT sensors to communicate with each other and with road infrastructure,
with 5G enabling ultrafast data exchange necessary for safety.
Challenges of 5G in IoT
While 5G brings numerous benefits to IoT, some challenges still exist:
• Infrastructure Costs: Deploying 5G infrastructure, particularly in remote areas,
requires substantial investment.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 26


INTERNET OF EVERYTHING (24EC114)

• Interoperability: Ensuring compatibility between 5G and existing IoT devices across


different standards can be complex.
• Cybersecurity Concerns: As 5G expands IoT applications, it also increases the attack
surface for cyber threats.

Overview of IoT Network Architectures


• The Internet of Things (IoT) system is built on a foundation of connected devices,
sensors, and communication networks that work together to collect, process, and
exchange data.
• To understand how IoT systems are structured and how data flows through these
systems, we often refer to layered architectures.
• These architectures define how devices, communication protocols, and data
processing functions interact with each other.
• The two most commonly referenced models in IoT are the 3-Layer Architecture and
the 5-Layer Architecture.
1. Three-Layer Architecture
The three-layer architecture is a widely used model in IoT. It represents the basic structure
of an IoT system and simplifies the flow of data from the physical world to the final user
interface.

a. Perception Layer (Sensing Layer)


Function:
• The perception layer is the first and most fundamental layer in IoT.
• It consists of physical devices and sensors that interact directly with the environment.
• The role of this layer is to collect real-world data through sensors and actuators.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 27


INTERNET OF EVERYTHING (24EC114)

• It is often referred to as the "sensing" layer because it enables the system to "sense"
or gather data on environmental conditions, such as temperature, humidity, pressure,
light levels, motion, etc.
Devices/Technologies:
• Sensors: Temperature sensors, humidity sensors, pressure sensors, motion detectors,
etc.
• Actuators: Devices like motors, relays, and servos that interact with the physical
environment (e.g., adjusting the thermostat or turning on lights).
• RFID tags, Cameras, GPS modules, etc.
Role:
• The perception layer is responsible for data collection and conversion.
• This data is typically analog in nature and needs to be converted into digital signals.
• The layer plays an essential role in initiating the data lifecycle in IoT systems.
• Without this layer, the system would not be able to gather real-time data to respond
to the environment.
b. Network Layer (Transmission Layer)
Function:
• The network layer is responsible for transmitting the data collected by the perception
layer to a more central processing unit or server for further analysis.
• This layer deals with the data routing, addressing, and forwarding protocols needed
to ensure that data reaches its destination efficiently and securely.
Devices/Technologies:
Gateways: These act as intermediaries between the perception layer devices (sensors) and
the network. Gateways convert the data from one protocol to another and may add security
or data processing functions.
Routers, Switches: These are devices that help manage the traffic flow of data within a
network, ensuring that packets of data are sent to the correct destination.
Communication Protocols: Common communication technologies include Wi-Fi, Bluetooth,
Zigbee, NB-IoT, LoRaWAN, and cellular networks (e.g., 4G/5G), among others.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 28


INTERNET OF EVERYTHING (24EC114)

Role:
• The network layer handles the data transmission aspect of IoT systems.
• It ensures that the data collected by the sensors reaches the cloud or servers where it
can be processed or stored.
• It also manages addressing, error correction, and the overall optimization of data
routes in large-scale networks.

c. Application Layer
Function:
• The application layer is the topmost layer of the three-layer model and deals with the
processing of data for specific applications.
• This layer ensures that the data collected from the sensors is meaningful, actionable,
and presented to the end-users in a useful format.
• It processes and analyzes the data, triggering actions based on predefined rules or
algorithms.
Devices/Technologies:
Web and Mobile Applications: IoT systems often provide user interfaces through web or
mobile apps to allow users to interact with the IoT devices and systems.
Cloud Platforms: These provide the infrastructure for data storage, processing, and analytics.
Examples include AWS IoT, Microsoft Azure IoT, and Google Cloud IoT.
Analytics Tools: Data analytics platforms and machine learning algorithms that process the
data to provide insights, forecasts, or control actions.
Role:
This layer delivers the real value of IoT systems to the end-users. It processes the raw data
coming from sensors and converts it into actionable insights. In industrial IoT (IIoT) systems,
this could involve predictive maintenance, optimization of operations, or monitoring system
health.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 29


INTERNET OF EVERYTHING (24EC114)

2. Five-Layer Architecture
• While the three-layer architecture provides a simple model, the five-layer
architecture is a more comprehensive framework, especially designed to address the
complexity and scalability of large IoT systems.
• The five-layer model introduces additional layers that provide more granular control
over the entire IoT system, particularly in terms of data processing, edge computing,
and business logic integration.

a. Perception Layer
Function:
• Similar to the three-layer model, the perception layer in the five-layer architecture is
still responsible for data acquisition from the physical world.
• This layer comprises various sensors and actuators that detect environmental
parameters and convert physical data into digital signals.
Devices/Technologies:
• Sensors: Environmental sensors, wearables, temperature sensors, humidity sensors,
pressure sensors, etc.
• Actuators: Used for controlling devices like motors or switches based on data inputs.
• RFID/NFC Tags: For asset tracking and identification.
Role:The role of the perception layer remains the same: sensing and collecting real-world
data to feed the system. However, in the five-layer model, this layer may interact with the
next layer (Edge Layer) to perform preliminary data processing.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 30


INTERNET OF EVERYTHING (24EC114)

b. Network Layer/ Transport Layer


Function:
• This layer is responsible for transmitting the sensed data to higher layers.
• It involves communication protocols, routers, and network devices that ensure the
delivery of data to the processing system.
Devices/Technologies:
Gateways, Routers, Switches.
Communication protocols like Wi-Fi, Bluetooth, Zigbee, LoRaWAN, NB-IoT, 5G.
Role:
In the five-layer model, the network layer still handles basic data transmission. However,
this layer in some cases can support edge devices or gateways that perform preliminary data
filtering and aggregation, thus offloading some processing from higher layers.

c. Edge Layer (Edge Computing Layer) / Processing Layer


Function:
• The edge layer introduces an additional layer between the network and application
layers that performs localized data processing.
• Edge computing reduces latency by processing data closer to the source rather than
transmitting all data to a central cloud server.
• This helps reduce network congestion and ensures faster response times for critical
applications.
Devices/Technologies:
• Edge Devices: Edge servers, microcontrollers, local gateways.
• Edge Analytics: Localized data analytics and pre-processing.
• Fog Computing: A decentralized computing model that extends cloud computing to
the edge of the network.
Role:
• The edge layer processes data locally, filters irrelevant information, and performs
pre-processing tasks (such as aggregation or anomaly detection).

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 31


INTERNET OF EVERYTHING (24EC114)

• It ensures that only the most relevant or actionable data is sent to the cloud for
further analysis.
• This reduces bandwidth usage and enhances the overall efficiency of the IoT system.
d. Application Layer
Function:
• The application layer in the five-layer architecture still processes data and provides
end-users with meaningful insights.
• This layer serves as the interface for the end-user, where applications are developed
to provide value based on the processed data.
Devices/Technologies:
• Web/Mobile Applications: User interfaces that allow interaction with IoT systems.
• Cloud Services: IoT platforms for data storage, analysis, and real-time processing.
• Big Data and Analytics Platforms: For handling large volumes of data and performing
advanced analytics.
Role:
• This layer provides actionable information and enables decision-making based on
data insights.
• It is highly specific to the use case, whether it's smart homes, healthcare, industrial
applications, or agriculture.
• It also allows users to configure devices, monitor status, and control IoT systems.

e. Business Layer
Function:
• The business layer is the top-most layer in the five-layer architecture and is
responsible for managing the entire IoT system from a business perspective.
• This includes setting the rules and policies for data usage, analyzing data to derive
business value, and making decisions about how the IoT system supports
organizational goals.
Devices/Technologies:
• Enterprise Resource Planning (ERP) systems.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 32


INTERNET OF EVERYTHING (24EC114)

• Business Intelligence (BI) tools.


• Data Visualization tools.
Role:
• The business layer translates IoT data into actionable business intelligence.
• It handles tasks such as managing devices, planning resource allocation, performing
cost-benefit analysis, and ensuring that IoT systems align with the business
objectives.
The three-layer and five-layer IoT architecture models both provide essential frameworks
for understanding the flow of data in IoT systems. While the three-layer model offers
simplicity and clarity for smaller-scale applications, the five-layer architecture provides a
more comprehensive solution for complex IoT systems by introducing edge computing and
business logic integration. Both models serve different purposes, but together they enable
the development of scalable, efficient, and secure IoT systems that cater to various industrial
and consumer applications.
Tabular Data
Layer 3-Layer Architecture 5-Layer Architecture
- Senses and collects real-world data
- Same function as the 3-layer model.
from the environment.
1. Perception Layer
- Includes sensors, actuators, and
- Includes sensors and actuators.
RFID tags.

Sensors (Temperature, Humidity, Sensors (Environmental, Wearables),


Devices/Technologies
Pressure), Actuators (Motors, Relays) Actuators, RFID/NFC Tags

Data collection and conversion from Same as 3-layer model, with potential
Role
analog to digital signals. edge processing.
- Responsible for data transmission
- Same function as the 3-layer model.
between devices and higher layers.
2. Network Layer
- Manages data routing and - Includes additional edge devices and
addressing. gateways for data aggregation.
Gateways, Routers, Switches, Edge
Devices/Technologies Gateways, Routers, Switches
devices (e.g., Edge Servers)
Transmits data to central cloud or Transmits data while offloading some
Role
server. processing to edge devices.
- Provides meaningful data insights
- Same function as the 3-layer model.
for end-users.
3. Application Layer - Processes data for specific
- Delivers actionable insights and
applications like smart homes,
interfaces for user interaction.
industrial IoT.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 33


INTERNET OF EVERYTHING (24EC114)

Web/Mobile Applications, Cloud Web/Mobile Apps, Cloud Services, Big


Devices/Technologies
Platforms, Analytics Tools Data Platforms
Provides interfaces for user interaction
Processes data and triggers actions
Role and integrates data into actionable
based on analytics.
applications.
- Introduced to handle local data
4. Edge Layer (Edge processing and reduce latency.
N/A
Computing) - Includes edge devices and local
analytics.
Edge Servers, Microcontrollers, Fog
Devices/Technologies N/A
Computing
Processes data locally, performs data
Role N/A filtering and aggregation, reduces
network congestion.
- Manages the IoT system from a
business perspective.
5. Business Layer N/A - Focuses on aligning IoT systems with
business goals and deriving business
value from IoT data.
ERP Systems, Business Intelligence (BI),
Devices/Technologies N/A
Data Visualization Tools
Translates IoT data into actionable
Role N/A business insights, manages system-wide
business rules and policies.
IoT Communication Standards
IoT communication standards are essential for ensuring interoperability, data exchange, and
the scalability of IoT systems. These standards govern the interaction between IoT devices,
networks, and applications. Some of the major standards and protocols are discussed below

a. Physical Layer and Data Link Layer Standards


The physical layer deals with the transmission medium, while the data link layer ensures
reliable data communication.

WiFi (IEEE 802.11):


• Function: WiFi is one of the most widely used communication standards for IoT,
offering high data rates for applications requiring substantial bandwidth.
• Range: Typically up to 50 meters indoors.
• Use Cases: Smart home applications, video streaming, and high-data-rate IoT devices.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 34


INTERNET OF EVERYTHING (24EC114)

Bluetooth and Bluetooth Low Energy (BLE):


• Function: Bluetooth is commonly used for short-range communication, while BLE is
designed for low-power, short-range applications.
• Range: BLE typically ranges up to 100 meters.
• Use Cases: Wearables, asset tracking, smart home devices, and health monitoring.

Zigbee (IEEE 802.15.4):


• Function: A low-power, low-data-rate protocol designed for home automation,
remote sensing, and industrial IoT.
• Range: Typically up to 100 meters.
• Use Cases: Smart homes, smart lighting, and industrial control systems.

LoRaWAN (Long Range Wide Area Network):


• Function: A long-range, low-power, wide-area network protocol used for IoT devices
in remote locations.
• Range: Up to 15 km in urban areas.
• Use Cases: Agricultural monitoring, environmental sensing, and smart cities.

NFC (Near Field Communication):


• Function: A short-range communication standard designed for very close proximity
communication (typically 4 cm).
• Range: Up to 10 cm.
• Use Cases: Contactless payments, asset tracking, and secure access control.

NB-IoT (Narrowband IoT):


• Function: A cellular-based IoT standard designed for low-power, low-data-rate
applications.
• Range: Up to 35 km in urban areas.
• Use Cases: Smart meters, environmental monitoring, and asset tracking.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 35


INTERNET OF EVERYTHING (24EC114)

b. Network Layer Standards


At the network layer, several protocols manage the transmission of data between devices.
IPv4 and IPv6:
• Function: These are Internet Protocol standards that define how devices are
addressed and communicate over a network.
• IPv6 is particularly important for IoT, as it provides a vast address space suitable for
billions of connected devices.
• Use Cases: Device communication over the internet, enabling end-to-end connectivity
for IoT devices.

CoAP (Constrained Application Protocol):


• Function: A lightweight application-layer protocol designed for constrained devices.
CoAP works over UDP and supports multicast, making it ideal for low-power IoT
devices.
• Use Cases: Smart cities, industrial IoT, and resource-constrained devices in
environments like home automation and remote monitoring.

MQTT (Message Queuing Telemetry Transport):


• Function: A lightweight messaging protocol that operates on a publish-subscribe
model. It is used for sending small messages with minimal bandwidth consumption.
• Use Cases: Real-time applications, like monitoring, and control systems in home
automation, agriculture, and transportation.

XMPP (Extensible Messaging and Presence Protocol):


• Function: A messaging protocol that provides real-time communication for IoT
devices, supporting presence, and status updates.
• Use Cases: Real-time messaging, smart home systems, and chatbots for IoT devices.

c. Security and Privacy Standards

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 36


INTERNET OF EVERYTHING (24EC114)

Security is a critical concern for IoT, and several standards ensure data integrity,
confidentiality, and device authentication.
DTLS (Datagram Transport Layer Security):
• Function: Provides encryption and security for UDP-based communications, ensuring
data privacy and integrity.
• Use Cases: CoAP, IoT networks with constrained devices.

TLS (Transport Layer Security):


• Function: Ensures secure communication over the internet for applications like HTTP
and MQTT.
• Use Cases: Secure data exchange between IoT devices and servers, cloud-based IoT
applications.

Comparative analysis of various communication technologies


This table compares the different communication technologies used in IoT applications,
highlighting their range, data rate, power consumption, topology, primary use cases,
and security features. Each technology is suited to specific types of IoT applications based
on factors such as power efficiency, communication distance, and data throughput
requirements.
Power
Topolog Primary Use
Technology Range Data Rate Consumptio Security
y Cases
n
Up to 1 Low Wearables,
AES-128
10–100 meters Mbps (optimized for Point-to- health
Bluetooth Low encryption,
(depending on (varies battery- point, star, monitoring,
Energy (BLE) pairing
environment) with powered mesh home
mechanisms
version) devices) automation
300 Mbps High-speed
50 meters to several High (not ideal Star, mesh data
indoors, up to Gbps for battery- (with applications WPA2, WPA3
Wi-Fi
100 meters (depending operated special (video encryption
outdoors on devices) routers) streaming,
standard) smart homes)
Payment Secure
Near Field
Up to 424 Low, passive Point-to- systems, transactions
Communicatio 4–10 cm
kbps communication point access control, with
n (NFC)
smart tags encryption

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 37


INTERNET OF EVERYTHING (24EC114)

Power
Topolog Primary Use
Technology Range Data Rate Consumptio Security
y Cases
n
10–100 meters Very low, Home AES-128
(depends on designed for Mesh, star, automation, encryption,
Zigbee 250 kbps
environmental low-power tree smart lighting, secure key
factors) devices industrial IoT establishment
Home
Low, ideal for
30–100 meters automation,
battery- AES-128
Z-Wave (depends on 100 kbps Mesh smart locks,
powered encryption
environment) security
devices
systems
Very low,
Smart
2–15 km designed for
0.3 kbps to agriculture, AES-128
LoRaWAN (urban to rural long-range, Star
27 kbps smart cities, encryption
areas) low-power
industrial IoT
devices
25.5 kbps Smart
Low, designed Cellular LTE security
Long-range (uplink) metering, asset
Narrowband for battery- (based on standards,
(up to several and 250 tracking,
IoT (NB-IoT) operated LTE end-to-end
kilometers) kbps environmental
devices network) encryption
(downlink) monitoring
Varies Supports General
Dependent on
based on various networking,
underlying Depends on the IPSec (IPv6),
IPv4 & IPv6 network topologies data
communicatio network used firewall, VPN
(Ethernet, (star, communicatio
n technology
Wi-Fi, LTE) mesh, bus) n
Variable
Peer-to- Real-time No built-in
Depends on (depends Low, as it is a
peer, applications, security, relies
UDP the underlying on connectionless
broadcast, streaming, on application-
network application protocol
multicast gaming level security
)
High (up to
Moderate (due Point-to- Reliable TLS/SSL for
Depends on Gbps range,
to connection point, communicatio secure
TCP the underlying depending
setup and client- n (file transfer, communicatio
network on
maintenance) server web services) n
network)
Depends on Variable, Web-based IoT
Moderate to Client- HTTPS
HTTP the underlying usually applications,
high server (SSL/TLS)
network moderate RESTful APIs
Client-
Depends on Low server,
Very low, Low-power
the underlying (designed publish- DTLS
optimized for IoT devices,
CoAP network (low- for subscribe (Datagram
low-power smart homes,
power constrained (with TLS)
devices smart cities
networks) devices) observe
pattern)

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 38


INTERNET OF EVERYTHING (24EC114)

Knowledge of configuring and using different IoT communication technologies


This table summarizes the range, data rate, power consumption, topology, primary use
cases, configuration knowledge, hardware requirements, software/platform support,
and security configurations for each IoT communication technology. It highlights the
specific needs for configuring and using these technologies effectively, including hardware
and software configurations, security practices, and common use cases.

Power Primary Configurati Hardware Software/ Security


Techn Rang Data Topol
Consu Use on Requiremen Platform Configur
ology e Rate ogy
mption Cases Knowledge ts Support ation

Knowledge
of Bluetooth AES-128
Wearabl protocol encrypti
Platforms
es, stack, BLE modules on,
like
50 m healthca pairing, like ESP32, pairing
BLE 1 Point- Android,
– 100 re device Nordic mechanis
(Bluet Mbps to- iOS,
m Low monitori discovery, chips, or ms,
ooth –2 Point / Raspberry
(Vari ng, home and smartphones bonding
LE) Mbps Star Pi, Arduino
es) automati connection with BLE for
with BLE
on, asset setup. support secure
libraries
tracking Configure communi
advertising cation.
intervals.

Configuring
Smart SSID, WPA2/
homes, password, WPA3
Platforms
100 video DHCP/stati Wi-Fi encrypti
Up to Star like AWS
Mbps streamin c IP, and modules like on,
100 (Route IoT, Google
– 10 g, large security ESP32, SSL/TLS
Wi-Fi m High r- Cloud IoT,
Gbps data protocols routers, for
(outd Central Raspberry
(vari transfer, like smartphones, secure
oor) ized) Pi with Wi-
es) cloud- WPA2/WPA and laptops. internet
Fi support
connecte 3. Setup communi
d devices routers/acc cation.
ess points.

Encrypti
on for
Contactl Configuring
secure
ess tag
424 NFC-enabled Android, transacti
Up to Point- payment reading/wr
Kbps Very devices like iOS ons,
NFC 10 to- s, access iting, device
– 848 Low smartphone support, secure
cm Point control, pairing, and
Kbps s, NFC tags NFC SDKs element
asset communicati
s for data
tracking on range.
protectio
n.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 39


INTERNET OF EVERYTHING (24EC114)

Power Primary Configurati Hardware Software/ Security


Techn Rang Data Topol
Consu Use on Requiremen Platform Configur
ology e Rate ogy
mption Cases Knowledge ts Support ation

Configuring
AES-128
Home network
encrypti
automati formation,
Xbee, TI Platforms on,
Mesh on, device
Zigbee like secure
10 m (Devic industria pairing
250 chipsets, Zigbee2MQ device
Zigbee – 100 Low e-to- l control, (coordinator
Kbps Zigbee TT, Xbee pairing,
m Device smart , router, end
coordinator API, Home network
) cities, device), and
s/routers Assistant security
remote mesh
configura
sensors network
tions.
setup.

Similar to AES-128
Home
Zigbee, encrypti
Mesh automati OpenHAB,
100 configuring Z-Wave on, S2
30 m (Devic on, Home
Z- Kbps device modules, Security
– 100 Low e-to- security Assistant,
Wave – 200 inclusion, controllers, for
m Device systems, Z-Wave
Kbps network Z-Wave hubs secure
) lighting SDK
security communi
control
modes. cation.

Configuring
AES-128
Smart LoRaWAN
encrypti
agricultu gateways,
on,
re, joining LoRaWAN The Things
2 km Star network
0.3 environ devices to modules, Network,
– 15 (Gatew keys for
LoRa Kbps Very mental the network, gateways, ChirpStack
km ays secure
WAN – 27 Low monitori and LoRa- for network
(vari and device
Kbps ng, asset managing enabled manageme
es) Nodes) onboardi
tracking, device-to- devices nt
ng and
smart cloud
communi
cities communica
cation.
tion.

Smart Configuring LTE


Cellular IoT
metering SIM cards, security,
platforms
1 km , asset cellular NB-IoT SIM
10 Cellula like
– 10 tracking, networks, modules, authenti
NB- Kbps r (Cell Ericsson
km Low remote and cellular cation
IoT – 250 Tower- IoT,
(urba monitori managing networks, for
Kbps based) Huawei
n) ng, data SIM cards secure
IoT
industria transmissio communi
platform
l IoT n. cation.
Cloud
Knowledge
services, Node-RED, IPSec for
of IP
data RIOT OS IPv6
Long addressing, Standard IoT
High Moderat Intern centers, for security,
IPv4 & range subnetting, devices with
(Vari e to et- smart embedded firewalls
IPv6 (inter routing. Ethernet,
es) High based home IoT , VPNs
net) Configuring Wi-Fi
devices, developme for IPv4
IP
industria nt security.
protocols.
l IoT

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 40


INTERNET OF EVERYTHING (24EC114)

Power Primary Configurati Hardware Software/ Security


Techn Rang Data Topol
Consu Use on Requiremen Platform Configur
ology e Rate ogy
mption Cases Knowledge ts Support ation

Knowledge Security
Real-
of socket at the
time
programmi applicati
applicati IoT devices Python,
ng, on layer
Long ons (e.g., with UDP C/C++,
High Point- managing using
range video/au support, Node.js for
UDP (Vari Low to- connectionl DTLS,
(inter dio ESP8266, UDP
es) Point ess TLS for
net) streamin Raspberry communica
communica encrypte
g, IoT Pi tion
tion, and d
sensor
packet communi
data)
handling. cation.

Reliable
SSL/TLS
data
encryptio
transmis Configuring
Raspberry n for
sion for connection Node-RED,
Long Pi, ESP32, secure
High Moderat Point- IoT establishme ThingSpea
range Arduino for communi
TCP (Vari e to to- devices nt, session k, IoT
(inter TCP cation,
es) High Point (e.g., manageme cloud
net) communicati certificat
remote nt, flow platforms
on e-based
monitori control.
authenti
ng, cloud
cation.
services)

Knowledge
Web-
of RESTful
based Flask, HTTPS
APIs,
Mode IoT Devices with Django, with
managing
Long rate Client- applicati HTTP client AWS IoT, SSL/TLS
HTTP
range to Server ons, support (e.g., ThingSpea certificat
HTTP High requests/re
(inter High (Web- RESTful ESP32, k support es for
sponses,
net) (vari based) APIs, Raspberry for HTTP secure
and web
es) cloud Pi) communica communi
server
commun tion cation.
configurati
ication
on.
IoT
sensor
data Knowledge
exchang of CoAP
e, stack, CoAP
DTLS for
Long Client- constrai message libcoap protocols
Low security
range Server ned types, and library, CoAP support
CoAP (vari Low of CoAP
(inter (Web- environ observe clients, CoAP CoAP.NET
es) communi
net) based) ments, patterns for servers library for
cation.
low- resource- integration
bandwid constrained
th devices.
applicati
ons

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 41


INTERNET OF EVERYTHING (24EC114)

Applications
Steps involved in configuring LoRaWAN for a smart agriculture application.

Configuring LoRaWAN for a smart agriculture application involves setting up sensors,


gateways, and network configurations tailored to the low-power, long-range requirements
of agricultural monitoring.

Step 1. Define Application Requirements


• Identify Parameters to Monitor: Determine the specific data points, like soil moisture,
temperature, humidity, rainfall, or crop health, that the sensors will capture.
• Estimate Data Transmission Frequency: Decide how frequently each sensor should
send data (e.g., hourly, daily, etc.) to balance between real-time monitoring needs and
power conservation.
Step 2. Select and Configure LoRaWAN Nodes (End Devices)
• Choose LoRaWAN-Compatible Sensors: Select sensors with integrated LoRaWAN
modules or use LoRa transceivers that can be attached to the sensors.
• Device Registration: Register each device on the chosen network server by setting up
a unique device EUI (Extended Unique Identifier) and AppKey for security.
• Configure Data Rate: Set an appropriate data rate, taking into account the adaptive
data rate (ADR) feature, which adjusts the data rate based on the distance to the
gateway. Lower data rates enhance range and reduce power consumption.
• Set Transmission Power: Adjust the transmission power level of the device based on
the required communication distance to conserve battery life.
Step 3. Set Up the LoRaWAN Gateway
• Choose Gateway Location: Place the gateway in an elevated, central position within
the agricultural field to maximize coverage and range.
• Register Gateway with Network Server: Set up the gateway’s network server
connection by providing its Gateway EUI and network credentials. This enables the
gateway to handle device communication within its range.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 42


INTERNET OF EVERYTHING (24EC114)

• Configure Gateway Range and Power Output: Optimize gateway settings to maximize
range while maintaining efficient power usage and minimizing interference with
other devices.
4. Connect to a LoRaWAN Network Server
• Select a Network Server Provider: Choose between public (e.g., The Things Network,
AWS IoT) or private LoRaWAN networks depending on data security needs and
availability.
• Device and Application Settings: Register devices, applications, and gateways on the
network server to facilitate data routing from devices to application servers.
• Enable Downlink Communication: For some applications, configure downlink
communication to allow commands from the server to the device, if needed, such as
for turning devices on or off.
5. Optimize Power and Communication Settings
• Use Adaptive Data Rate (ADR): Enable ADR on end devices to automatically adjust
data rate, airtime, and power based on network conditions. Lower data rates will
enable long-range communication with less power.
• Set Sleep Mode for Low-Power Devices: Use sleep mode on devices between
transmission intervals to conserve battery.
• Reduce Transmission Frequency: Send data less frequently (e.g., every 15 or 30
minutes) to reduce power usage while ensuring that monitoring needs are met.
• Adjust Duty Cycle for Regional Compliance: Ensure devices comply with regional duty
cycle regulations, which control how often devices can transmit to minimize
interference.
6. Establish and Test Application Layer
• Connect to Application Server: Set up a dashboard or application that processes,
visualizes, and stores the data from the network server.
• Set Up Alerts and Automations: Configure alerts based on sensor readings, such as
notifications when moisture levels are low, or automate irrigation systems based on
sensor data.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 43


INTERNET OF EVERYTHING (24EC114)

• Conduct Field Testing: Perform field tests to verify the communication range, data
accuracy, and device functionality across the coverage area.

Outline the basic steps for configuring a WiFi network for a smart home IoT system.
What considerations should be made regarding network security?

Steps for Configuring a WiFi Network for Smart Home IoT


Step-1 Set Up and Configure the WiFi Router
• Position the Router: Place the router in a central location in the home to maximize
coverage.
• Select Frequency Band: Choose between 2.4 GHz (better range, slower speed) or 5
GHz (faster speed, shorter range), or enable dual-band for flexibility.
• Configure SSID and Password: Set a unique SSID (network name) and a strong,
complex password to protect the network.
Step-2 Assign Static IP Addresses (Optional)
• For devices like cameras or hubs that need consistent access points, assign static IP
addresses through the router’s configuration settings. This helps with network
stability and simplifies device management.

Step-3 Connect IoT Devices to the WiFi Network


• Ensure Device Compatibility: Verify that all IoT devices support the selected WiFi
band (2.4 GHz or 5 GHz).
• Follow Device Setup Procedures: For each device, use the manufacturer’s app or
configuration interface to connect to the WiFi network by entering the SSID and
password.
Step-4 Enable Quality of Service (QoS) Settings (Optional)
• Configure QoS on the router if available to prioritize network traffic for critical
devices, such as security cameras or voice assistants, ensuring stable connectivity.
• Test Device Connections

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 44


INTERNET OF EVERYTHING (24EC114)

• Confirm that each device is connected, accessible through the smart home app or
interface, and that data transfer is smooth.
Step-5 Set Up Remote Access (Optional)
• If remote access is needed, enable secure remote access features through the router
settings, ideally using a Virtual Private Network (VPN) for added security.
Step-6 Organize IoT Devices into VLANs (Optional)
• For additional security, some routers allow creating Virtual LANs (VLANs). Placing
IoT devices on a separate VLAN isolates them from other devices on the network,
reducing the risk of cross-device contamination.

Security Considerations for a Smart Home IoT Network


Use Strong Encryption (WPA3 or WPA2)
• Set WiFi security to WPA3 (if available) or WPA2, avoiding the outdated and
vulnerable WEP encryption.
Use a Unique SSID and Strong Password
• Avoid default or generic network names and passwords. Create a unique SSID and use
a strong, complex password (at least 12 characters with a mix of letters, numbers, and
symbols).
Disable SSID Broadcasting (Optional)
• Hiding the SSID adds a basic layer of security by preventing casual users from seeing
the network. Note, however, that determined hackers can still detect it.
Regularly Update Firmware
• Keep the router and IoT devices up to date with the latest firmware to patch security
vulnerabilities. Most routers offer an option to check for and apply firmware updates.
Implement Network Segmentation
• Place IoT devices on a separate network or VLAN to limit access between IoT devices
and personal devices like laptops and smartphones. This isolation helps prevent
potential attacks from affecting the entire network.
Disable Unnecessary Features

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 45


INTERNET OF EVERYTHING (24EC114)

• Turn off unused features, such as Universal Plug and Play (UPnP), WPS (WiFi
Protected Setup), and remote management, which can introduce security risks.
Use Multi-Factor Authentication (MFA)
• If available, enable MFA on your WiFi network and the smart home control
application to add an extra layer of security.
Monitor Network Traffic
• Use network monitoring tools or the router’s management interface to detect unusual
activity or unauthorized devices.
Limit Access to Trusted Devices
• Enable MAC address filtering if your router supports it. By only allowing specific MAC
addresses to connect, you can restrict network access to known, trusted devices.

Steps for setting up and optimizing an NB-IoT network for a smart parking system, along
with key factors related to signal coverage and power consumption.
Step Description Key Considerations
1. Choose NB-IoT- Select parking sensors that support NB-IoT, and Ensure that the sensors can handle the
Compatible Parking check compatibility with local telecom environmental conditions (e.g., heat, cold,
Sensors and Modules infrastructure. moisture) of the parking area.
2. Deploy NB-IoT If using dedicated gateways, place them
Decide whether to use dedicated NB-IoT
Gateways or Use strategically for optimal coverage. Otherwise,
gateways or rely on the existing cellular
Cellular ensure the cellular network has adequate signal
network infrastructure for data communication.
Infrastructure strength across the parking area.
Program the sensors to send data at intervals
3. Configure Sensors Set up sensors to enter low-power mode during
instead of continuous transmission to conserve
for Power Efficiency inactive hours or when no vehicles are present.
battery life.
4. Set Up Device Register each sensor on the network and Use secure encryption methods (e.g., device
Registration and configure unique identifiers for data tracking authentication and data encryption) to protect data
Security and security. integrity and privacy.
Determine and configure optimal data
5. Optimize Data Balance the need for real-time updates with power
transmission intervals based on system
Transmission efficiency; less frequent data transmission saves
requirements (e.g., every 15 minutes or only on
Intervals power.
status change).
Address dead zones or low-signal areas by
6. Establish Signal Conduct field tests to assess signal strength and
adjusting gateway placement or adding additional
Coverage Testing coverage throughout the parking area.
gateways if necessary.
7. Integrate Data with Connect the NB-IoT network to a central Ensure that the platform can process data in real
Parking Management management system or cloud platform to time and provide accessible insights, such as
Platform aggregate and analyze data. available spots and occupancy trends.
8. Implement Schedule periodic battery replacements or
Regularly monitor network performance and
Monitoring and recharges based on consumption data to maintain
sensor health to ensure reliable operation.
Maintenance uptime.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 46


INTERNET OF EVERYTHING (24EC114)

Question Bank
1. Assess the scalability of traditional network architectures when applied to IoE environments.
Suggest architectural modifications or innovations that could better support IoE’s demands
for largescale connectivity, data processing, and real time decision making.
2. Discuss the issue of interoperability within IoE ecosystems, focusing on how diverse
communication protocols and data standards can impact device compatibility. Develop a
roadmap for achieving interoperability that could accommodate multiple industries and
applications.
3. What are the main characteristics of Zigbee and ZWave protocols, and how do they differ in
terms of range and power consumption? Provide examples of IoT applications where each
protocol is commonly used.
4. Explain the advantages of using Bluetooth Low Energy (BLE) in IoT applications. What type
of devices or environments benefit most from BLE?
5. Describe LoRaWAN and its significance in IoT networks. What are some key use cases where
LoRaWAN is preferred over other communication technologies?
6. Compare WiFi and BLE for IoT applications based on range, power consumption, and data
speed. Which protocol would be more suitable for a home automation system, and why?
7. Explain the differences between LoRaWAN and NBIoT in terms of range and power
consumption. Which one is more appropriate for rural IoT applications, and why?
8. Compare and contrast Zigbee, ZWave, and Bluetooth Low Energy (BLE) in terms of range,
power consumption, and data transfer rate. For which types of IoT applications would each
be most suitable?
9. Analyze WiFi’s role in IoT communications compared to lowpower widearea networks
(LPWAN) like LoRaWAN and NBIoT. When would WiFi be a better choice over LPWANs for
IoT solutions?
10. Describe how 5G technology is poised to transform IoT communication. In what ways does
5G enhance IoT applications compared to previous generations of mobile networks?
11. Discuss how 5G can enhance IoT applications. What makes 5G a suitable option for
supporting large numbers of IoT devices in smart cities?
12. Compare the role of 5G in IoT with that of NBIoT. Under what circumstances would NBIoT be
preferable to 5G, and vice versa?

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 47


INTERNET OF EVERYTHING (24EC114)

13. Analyze the primary types of IoT network architectures (e.g., star, mesh, and cellular
architectures). Discuss the strengths and weaknesses of each type and identify scenarios
where one might be more effective than others.
14. Discuss the importance of standardization in IoT communication technologies. What are
some of the key challenges faced in establishing universal standards, and how do they impact
the interoperability of IoT devices?
15. What is the difference between mesh and star network architectures in IoT? Give examples
of scenarios where each architecture would be advantageous.
16. Explain why standardization is important in IoT communication protocols. How does
standardization impact interoperability and device compatibility?
17. Conduct a comparative analysis of Zigbee, ZWave, and BLE. Focus on parameters such as
security, ease of integration, and compatibility with other IoT systems. What tradeoffs must
be considered when selecting among these technologies?
18. Evaluate the scalability and interoperability of WiFi, LoRaWAN, and 5G in supporting IoT
devices in smart industrial applications. Which technology would you recommend as the
primary communication method, and why?
19. Describe the steps involved in configuring LoRaWAN for a smart agriculture application.
20. Outline the basic steps for configuring a WiFi network for a smart home IoT system. What
considerations should be made regarding network security?
21. How would you set up and optimize an NBIoT network for a smart parking system? Discuss
factors related to signal coverage and power consumption that should be considered during
setup?
22. Outline the process of setting up a Bluetooth Low Energy (BLE) network for a healthcare
facility’s wearable devices. Discuss how BLE configurations impact power usage, data
security, and patient safety in the IoT system.

ROHITH M N, DEPT OF ECE, SJCE, JSSSTU 48

You might also like