0% found this document useful (0 votes)
9 views18 pages

IOT Mod1

The document provides a comprehensive overview of the Internet of Things (IoT), detailing its definition, characteristics, functional blocks, and the importance of sensors and actuators in IoT applications. It discusses various types of sensors and actuators, their functions, and the differences between point-to-point and point-to-multipoint connections. Additionally, it examines different network topologies, their advantages and disadvantages, and categorizes computer networks based on reachability.

Uploaded by

hamzashaik98854
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views18 pages

IOT Mod1

The document provides a comprehensive overview of the Internet of Things (IoT), detailing its definition, characteristics, functional blocks, and the importance of sensors and actuators in IoT applications. It discusses various types of sensors and actuators, their functions, and the differences between point-to-point and point-to-multipoint connections. Additionally, it examines different network topologies, their advantages and disadvantages, and categorizes computer networks based on reachability.

Uploaded by

hamzashaik98854
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

(a) Define IoT and explain the Characteristics of IoT.

(b) Draw the functional Block of Iot and Explain.


1
(a). The Internet of Things is the network of physical objects or “embedded with electronics,
software, sensors, and network connectivity, which enables these objects to collect and
exchange data. It allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the physical world
and computer based systems, and resulting in improved efficiency, accuracy and economic
benefit.

• Nowadays, IoT is a common presence in households, transportation, markets, retail,


banking, industries, education, and logistics.
• The inclusion of IoT applications in these domains has resulted in facilitating their
automation, enhanced safety, and precision of operations and allowed the inclusion of
scientifically optimized practices.
• It is popularly considered that the rapid rise of IoT resulted from the inclusion of the
beneficial features from the paradigms and technologies of Internet computing, cloud
computing, wireless sensor networks (WSN), cyber-physical systems (CPS), and
machine-to-machine (M2M) communications.
Characteristics of IoT:
• Massively scalable and efficient
• IP-based addressing will no longer be suitable in the upcoming future.
• An abundance of physical objects is present that do not use IP, so IoT is made possible.
• Devices typically consume less power. When not in use, they should be automatically
programmed to sleep.
• A device that is connected to another device right now may not be connected in another
instant of time.
• Intermittent connectivity – IoT devices aren’t always connected. In order to save
bandwidth and battery consumption, devices will be powered off periodically when not
in use. Otherwise, connections might turn unreliable and thus prove to be inefficient.
(b).
Functional blocks of an Internet of Things (IoT) system [1]. These blocks represent the key
components that work together to enable communication and data exchange between various
devices and a central system or cloud. Here's a breakdown of the functionalities of each layer:
 Device: This layer refers to the physical components with sensors and actuators that can
collect data from the environment and perform actions based on that data [1]. These
devices can range from simple sensors to complex machines, and they are the foundation
of any IoT system.
 Communication: This block manages the exchange of data and information between the
devices and the central system or cloud [1]. It ensures that data is transmitted reliably and
securely between different components of the system.
 Services: This layer encompasses various services that support the overall operation of
the IoT system [1]. These services can include device monitoring, control, data
publishing, and discovery services.
 Management: This block acts as the central brain of the system, overseeing and
regulating various aspects of the IoT ecosystem [1]. It's responsible for device
management, health monitoring, security management, data management, and system
updates.
 Security: This layer safeguards the system from unauthorized access, data breaches, and
other security threats [1]. It implements various security measures to protect the
confidentiality, integrity, and availability of data within the system.
 Application: This layer serves as the user interface for interacting with the IoT system
[1]. It provides users with a platform to monitor and control devices, visualize sensor data,
and interact with the system in a meaningful way.
In essence, these functional blocks work together to create a comprehensive IoT system that can
collect, process, and analyze data from connected devices, enabling users to gain valuable insights
and automate tasks for improved efficiency.

What is the need of sensors in an IoT application and


2 discuss about different types of sensors used in the applications of IoT.
Sensors:
Sensors are devices that can measure, or quantify, or respond to the ambient changes in their
environment or within the intended zone of their deployment.

• Sensors are everywhere. They’re in our homes and workplaces, our shopping centers
and hospitals. They’re embedded in smart phones and an integral part of the Internet
of Things (IoT).
• Broadly speaking, sensors are devices that detect and respond to changes in an
environment. Inputs can come from a variety of sources such as light, temperature,
motion and pressure.
• For Example, A microphone is a sensor that takes vibrational energy (sound waves),
and converts it to electrical energy in a useful way for other components in the system
to correlate back to the original sound.

Sensor is only sensitive to the measured property (e.g., a temperature sensor only senses the
ambient temperature of a room). It is insensitive to any other property besides what it is
designed to detect (e.g., a temperature sensor does not bother about light or pressure while
sensing the temperature). Finally, a sensor does not influence the measured property (e.g.,
measuring the temperature does not reduce or increase the temperature). Figure 1.1 shows the
simple outline of a sensing task. Here, a temperature sensor keeps on checking an environment
for changes. In the event of a fire, the temperature of the environment goes up. The temperature
sensor notices this change in the temperature of the room and promptly communicates this
information to a remote monitor via the processor.
Figure 1.1 The outline of a simple sensing operation

Types Sensors
• Temperature Sensors – agriculture field to monitor soil temperature
• Humidity Sensors- Humidity sensors are commonly found in heating, vents and air
conditioning (HVAC) systems in both industrial and residential domains.
• Pressure Sensors- A pressure sensor senses changes in gases and liquids.
- Pressure sensors are also useful in the manufacturing of water systems as it is easy to
detect fluctuations or drops in pressure.
• Proximity Sensors- These types of sensors often emit electromagnetic fields or
beams of radiation such as infrared.
- used in the parking lots of malls, stadiums to indicate parking availability.
• Level Sensors- used to detect the level of substances including liquids, powders and
granular materials.
• Accelerometers- Accelerometers detect an object’s acceleration i.e. the rate of
change of the object’s velocity with respect to time.
• Gyroscope- motion sensing for video games, and camera-shake
• Gas Sensors-detect changes in air quality, presence of toxic and hazardous gasses.
• Infrared Sensors- sensors sense characteristics in their surroundings by either
emitting or detecting infrared radiation.
- Infrared sensors are used in a variety of different IoT projects including healthcare as
they simplify the monitoring of blood flow and blood pressure. Televisions use infrared
sensors to interpret the signals sent from a remote control.
• Optical Sensors- vehicles use optical sensors to recognize signs, obstacles, and other
things that a driver would notice when driving or parking. Optical sensors play a big
role in the development of driverless cars.

a) What is an actuator and explain different types of actuators.


3 b) Explain about point-to-point and point-to-multipoint connection types.
(a). Actuators
An actuator can be considered as a machine or system’s component that can affect the
movement or control the said mechanism or the system.
• Actuators basically need a control signal and a source of energy. Upon receiving a control signal,
the actuator uses energy from the source to bring about a mechanical motion.
• An actuator is a device that converts energy into motion. It does this by taking an electrical signal
and combining it with an energy source.
• In an IoT system, the actuator can act on data collected by sensors to create an outcome as
determined by the chosen settings of the user.

The control system of an actuator can be a mechanical or electronic system, a software-based system (e.g.,
an autonomous car control system), a human, or any other input. Figure 1.3 shows the outline of a simple
actuation system.

Figure 1.3 The outline of a simple actuation mechanism

A remote user sends commands to a processor. The processor instructs a motor controlled robotic arm to
perform the commanded tasks accordingly. The processor is primarily responsible for converting the human
commands into sequential machine-language commandsequences, which enables the robot to move. The
robotic arm finally moves the designated boxes, which was its assigned task.

3.1 Types Actuators

Broadly, actuators can be divided into seven classes: 1) Hydraulic, 2) pneumatic, 3) electrical, 4)
thermal/magnetic, 5) mechanical, 6) soft, and 7) shape memory polymers.

1) Hydraulic actuators
A hydraulic actuator works on the principle of compression and decompression of fluids. These actuators
facilitate mechanical tasks such as lifting loads through the use of hydraulic power derived from fluids in
cylinders or fluid motors. The mechanical motion applied to a hydraulic actuator is converted to, linear,
rotary, or oscillatory motion. The almost incompressible property of liquids is used in hydraulic actuators
for exerting significant force. These hydraulic actuators are also considered as stiff systems. The actuator’s
limited acceleration restricts its usage.

2) Pneumatic actuators
A pneumatic actuator works on the principle of compression and decompression of gases. These actuators
use a vacuum or compressed air at high pressure and convert it into either linear or rotary motion. Pneumatic
rack and pinion actuators are commonly used for valve controls of water pipes. Pneumatic actuators are
considered as compliant systems. The actuators using pneumatic energy for their operation are typically
characterized by the quick response to starting and stopping signals. Small pressure changes can be used
for generating large forces through these actuators. Pneumatic brakes are an example of this type of actuator
which is so responsive that they can convert small pressure changes applied by drives to generate the
massive force required to stop or slow down a moving vehicle. Pneumatic actuators are responsible for
converting pressure into force. The power source in the pneumatic actuator does not need to be stored in
reserve for its operation.

3) Electric actuators
Typically, electric motors are used to power an electric actuator by generating mechanical torque. This
generated torque is translated into the motion of a motor’s shaft or for switching (as in relays). For example,
actuating equipment’s such as solenoid valves control the flow of water in pipes in response to electrical
signals. This class of actuators is considered one of the cheapest, cleanest and speedy actuator types
available.

4) Thermal or magnetic actuators


The use of thermal or magnetic energy is used for powering this class of actuators. These actuators have a
very high power density and are typically compact, lightweight, and economical. One classic example of
thermal actuators is shape memory materials (SMMs) such as shape memory alloys (SMAs). These
actuators do not require electricity for actuation. They are not affected by vibration and can work with liquid
or gases. Magnetic shape memory alloys (MSMAs) are a type of magnetic actuators.

5) Mechanical actuators
In mechanical actuation, the rotary motion of the actuator is converted into linear motion to execute some
movement. The use of gears, rails, pulleys, chains, and other devices are necessary for these actuators to
operate. These actuators can be easily used in conjunction with pneumatic, hydraulic, or electrical actuators.

6) Soft actuators
Soft actuators (e.g., polymer-based) consists of elastomeric polymers that are used as embedded fixtures in
flexible materials such as cloth, paper, fiber, particles, and others. The conversion of molecular level
microscopic changes into tangible macroscopic deformations is the primary working principle of this class
of actuators. These actuators have a high stake in modern-day robotics. They are designed to handle fragile
objects such as agricultural fruit harvesting, or performing precise operations like manipulating the internal
organs during robot-assisted surgeries.

7) Shape memory polymers


Shape memory polymers (SMP) are considered as smart materials that respond to some external stimulus
by changing their shape, and then revert to their original shape once the affecting stimulus is removed.
Features such as high strain recovery, biocompatibility, low density, and biodegradability characterize these
materials. SMP-based actuators functionsimilar to our muscles. Modern-day SMPs have been designed to
respond to a wide range of stimuli such as pH changes, heat differentials, light intensity, and frequency
changes, magnetic changes, and others.

(b). Point-to-point:
• Point-to-point connections are used to establish direct connections between two hosts.
• These networks were designed to work over duplex links.
• Day-to-day systems such as a remote control for an air conditioner or television are apoint to
point connection, where the connection has the whole channel dedicated to it
only.

Point-to-multipoint:
• In a point-to-multipoint connection, more than two hosts share the same link.
• Point-to-multipoint connections find popular use in wireless networks and IPtelephony.
• The channel is shared between the various hosts, either spatially or temporally.
Spatial sharing – FDMA Temporal sharing –
TDMA

Discuss the pros and cons of the following network topologies.


(a) Star
4 (b) Ring
(c) Bus
(d) Mesh
Star topology:
• In a star topology, every host has a point-to-point link to a central controller or hub.
• The hosts cannot communicate with one another directly; they can only do so throughthe central
hub.
• The hub acts as the network traffic exchange.
• Advantages are easy installation and the ease of fault identification within the network.
• The main disadvantage of this topology is the danger of a single point of failure. If the hub fails,
the whole network fails.

Mesh topology:

• In a mesh topology, every host is connected to every other host using a dedicated link(in a point-
to-point manner).
• This implies that for n hosts in a mesh, there are a total of n(n-1)/2 dedicated fullduplex links
between the hosts.
• Even if a link is down or broken, the network is still fully functional as there remain
other pathways for the traffic to flow through.
• The second advantage is the security and privacy of the traffic as the data is only seenby the
intended recipients and not by all members of the network.
• The third advantage is the reduced data load on a single host, as every host in this network
takes care of its traffic load.

Bus topology:

• A bus topology follows the point-to-multipoint connection. A backbone cable or busserves as the
primary traffic pathway between the hosts.
• The hosts are connected to the main bus employing drop lines or taps. The mainadvantage of
this topology is the ease of installation.
• Restriction on the length of the bus and the number of hosts.
• Signal loss over the extended bus.
• The installation is very easy and cheap. However, the Main drawback of this topology is the
difficulty in fault localization within the network.

Ring topology:

• A ring topology works on the principle of a point-to-point connection.


• Here, each host is configured to have a dedicated point-to-point connection with itstwo
immediate neighboring hosts on either side of it through repeaters at each host.
The repetition of this system forms a ring.
• The repeater at each host capture the incoming signal intended for other hosts,regenerates the bit
stream, and passes it onto the next repeater.
• However, the main disadvantage of this system is the high probability of a singlepoint of
failure. If even one repeater fails, the whole network goes down.
a) Explain different computer network categories based on
network reachability.
5 b) Compare different Network topologies
(a). The computer networks are divided into four broad categories based on network reachability.
▪ Personal area networks
• PANs are mostly restricted to individual usage.
• Example, wireless headphones, wireless speakers, laptops, smartphones, wireless
keyboards, wireless mouse, and printers.
• PANs are low-range and low-power technologies such as Bluetooth. Thereachability of
PANs are limited.
▪ Local area networks
• A LAN is a collection of hosts linked to a single network through wired or
wireless connections.
• LANs are restricted to buildings, organizations, or campuses.
• They used a few leased lines connected to the Internet provide web access tothe whole
organization or a campus.
• The data access rates within the LANs range from 100 Mbps to 1000 Mbps.
• Commonly used network components in a LAN are servers, hubs, routers,switches,
terminals, and computers.
▪ Metropolitan area networks
• MANs connect various organizations or buildings within a given geographic
location or city.
• Example of a MAN is an Internet service provider (ISP) supplying Internet connectivity
to various organizations within a city.
• MANs are costly, they may not be owned by individuals or even singleorganizations.
• Typical networking devices/components in MANs are modems and cables.
▪ Wide area networks
• They connect diverse geographic locations and are restricted within the
boundaries of a state or country.
• WANs connecting two LANs or MANs may use public switched telephone networks
(PSTNs) or satellite-based links.
• WANs tend to have more errors and noise during transmission and are verycostly to
maintain.
b) same as 4th question

a) What is the ISO-OSI model?


6 b) Discuss the highlights of the seven layers of the OSI stack.

a) The ISO-OSI model, also known as the OSI (Open Systems Interconnection) model, is a conceptual
framework used to understand and describe how different networking protocols and technologies
interact with each other to enable communication between devices in a network. It was developed by
the International Organization for Standardization (ISO) in the 1980s.
The OSI model is divided into seven layers, each representing a specific function or set of functions
in the networking process. Here's a brief overview of each layer:
1. Physical Layer: This layer deals with the physical connection between devices and the transmission of
raw data over a physical medium, such as cables or wireless signals.
2. Data Link Layer: The data link layer is responsible for the reliable transmission of data between
adjacent nodes on a network. It ensures error-free transmission over the physical layer.
3. Network Layer: This layer handles the routing of data packets across multiple networks. It determines
the optimal path for data to travel from the source to the destination based on network conditions and
addresses.
4. Transport Layer: The transport layer provides end-to-end communication between the source and
destination devices. It ensures that data is delivered reliably and in the correct order, managing issues
like flow control and error correction.
5. Session Layer: The session layer establishes, maintains, and terminates connections between
applications. It manages communication sessions, allowing data exchange between devices.
6. Presentation Layer: This layer is responsible for data translation, encryption, and compression. It
ensures that data sent by one application can be understood by another, regardless of differences in
data representation.
7. Application Layer: The application layer contains protocols and interfaces used by applications to
communicate over a network. It enables users to access network services and resources, such as web
browsing, email, and file transfer.
Each layer in the OSI model performs specific functions, and communication between layers is
standardized to facilitate interoperability between different networking technologies and protocols.

(b). The OSI (Open Systems Interconnection) model is a conceptual framework used to understand
and standardize the functions of a telecommunication or computing system. It consists of seven layers,
each responsible for a specific set of functions. Here are the highlights of each layer:
1. Physical Layer (Layer 1):
 This is the lowest layer of the OSI model.
 It deals with the physical transmission of data over the network medium.
 Highlights include:
 Transmission of raw binary data bits over physical media such as cables or wireless
signals.
 Specifies characteristics like voltage levels, data rates, modulation schemes, and
physical connectors.
 Examples of devices at this layer include network interface cards (NICs), hubs,
repeaters, and cables.
2. Data Link Layer (Layer 2):
 Responsible for node-to-node communication and error detection/correction within a single
network segment.
 Highlights include:
 Framing: Dividing data into frames for transmission.
 MAC addressing: Assigning unique addresses to network devices.
 Error detection and correction: Ensuring data integrity.
 Access control: Managing access to the network medium, e.g., through protocols like
Ethernet.
 Examples of devices at this layer include switches and bridges.
3. Network Layer (Layer 3):
 Handles routing and forwarding of data packets between different networks.
 Highlights include:
 Logical addressing: Assigning IP addresses to devices for identification.
 Routing: Determining the best path for data transmission across interconnected
networks.
 Packet switching: Dividing data into packets and forwarding them based on logical
addresses.
 Examples of devices at this layer include routers and layer 3 switches.
4. Transport Layer (Layer 4):
 Provides end-to-end communication between the sender and receiver, ensuring data delivery
and reliability.
 Highlights include:
 Segmentation and reassembly: Breaking data into smaller segments and reassembling
them at the destination.
 Flow control: Managing the pace of data transmission to avoid overwhelming the
recipient.
 Error detection and recovery: Ensuring data integrity through error detection and
retransmission.
 Examples of protocols at this layer include TCP (Transmission Control Protocol) and
UDP (User Datagram Protocol).
5. Session Layer (Layer 5):
 Establishes, manages, and terminates connections between applications.
 Highlights include:
 Session establishment, maintenance, and termination.
 Synchronization: Ensuring coordination between sender and receiver.
 Dialogue control: Managing the communication between applications.
 Examples include APIs (Application Programming Interfaces) for remote procedure
calls (RPCs) and session management protocols.
6. Presentation Layer (Layer 6):
 Responsible for data translation, encryption, and compression to ensure compatibility between
different systems.
 Highlights include:
 Data encryption and decryption.
 Data compression and decompression.
 Data format conversion (e.g., ASCII to EBCDIC).
 Examples include SSL/TLS for encryption and MIME for email formatting.
7. Application Layer (Layer 7):
 Provides interfaces for user applications and network services.
 Highlights include:
 Network services such as email, file transfer, and remote access.
 User interfaces for accessing network resources.
 Examples include HTTP for web browsing, FTP for file transfer, SMTP for email, and
DNS for domain name resolution.
Understanding the OSI model and its layers helps in troubleshooting network issues, designing network
protocols, and ensuring interoperability between different networking devices and software applications.

7 Explain about different IoT Data Communication Protocols


data communication protocols
AMQP
 AMQP or the advanced message queuing protocol is an open standard middleware at the application
layer developed for message-oriented operations .
It tries to bring about the concept of interoperability between clients and the server by enablingcross-vendor
implementations.
 It provides a wide variety of features such as flow-controlled communication, message- oriented
communication, message delivery
There are nine frame types in AMQP: (i) Open: responsible for opening the connection betweenpeers. (ii)
Begin: responsible for setup and control of messaging sessions between peers. (iii) Attach: responsible for
link attachment. (iv) Transfer: responsible for message transfer over the link. (v) Flow: responsible for
updating the flow control state. (vi) Disposition: responsible for updating of transfer state. (vii) Detach:
responsible for detachment of link between two peers.
(viii) End: responsible for truncation of a session. (ix) Close: responsible for closing/ending a connection.
MQTT
 MQTT Message queue telemetry transport or MQTT is a simple, lightweight publish–subscribe
protocol, designed mainly for messaging in constrained devices and networks.
 It provides a one-to-many distribution of messages and is payload content agnostic.
 MQTT works reliably and flawlessly over high latency and limited bandwidth of unreliable
networks without the need for significant device resources and device power.
 The MQTT paradigm consists of numerous clients connecting to a server; this server isreferred to as
a broker.
Operational Principle
 Operational Principle MQTT is built upon the principles of hierarchical topics and works on TCP
for communication over the network.
 Brokers receive new messages in the form of topics from publishers. A publisher first sends a control
message along with the data message. Once updated in the broker, the broker distributes this topic’s
content to all the subscribers of that topic for which the new message has arrived.
 This paradigm enables publishers and subscribers to be free from any considerations ofthe address
and ports of multiple destinations/subscribers or network considerations ofthe subscribers, and vice
versa.
The clients can have the roles of information publishers (sending messages to the broker) or information
subscribers (retrieving messages from the broker). This allows MQTT to be largely decoupled from the
applications being used with MQTT.
COAP
• CoAP The constrained application protocol, or CoAP as it is more popularly known, isdesigned for
use as a web transfer protocol in constrained devices and networks, whichare typically low power
and lossy.
The constrained devices typically have minimal RAM and an 8-bit processor at most. CoAP can efficiently
work on such devices, even when these devices are connected to highly lossy networks with high packet
loss, high error rates, and bandwidth in the range of kilobits.

The CoAP is characterized by the following main features:


• (i) It has suitable web protocol for integrating IoT and M2M services in constrained environments
with the Internet.
• (ii) CoAP enables UDP binding and provides reliability concerning unicast as well as multicast
requests.
(iii) Message exchanges between end points in the network or between nodes is asynchronous. Operational
Principle
Operational Principle CoAP is built upon the exchange of messages between two or more UDPend points.
Options and payload follow the compact 4-byte binary header in CoAP. This arrangement is typical of
request and response messages of CoAP. A 2-byte message ID is usedwith each message to detect duplicates.

XMPP
 XMPP The extensible messaging and presence protocol, or XMPP, which was initiallynamed as
Jabber, is designed for message-oriented middle wares based on the extensible markup language
(XML) .

Operational Principle
XMPP was developed for instant messaging, maintenance of contacts, and information about network
presence.
 A unique XMPP address, which is also referred to as a Jabber ID (JID), is assigned to every user on
the network. The JID, similar to an email address, has a username and a
domain name ([email protected]). The domain name is mostly the IP address of theserver hosting
the XMPP service.
XMPP allows its users to login from multiple devices by means of specifying resources. The resource is
used to identify a user’s clients/devices (home, mobile, work, laptop, and others), which is generally
included in the JID by appending the JID with the resource name separatedby a slash.
REST
Representational state transfer or REST encompasses a set of constraints for the creation of web services,
mainly using a software architectural style [22]. The web services adhering to REST styles are referred to as
RESTful services; these services enable interoperability between various Internet- connected devices.
RESTful systems are stateless: the web services on the server do not retain client states. The use of
stateless protocols and standards makes RESTful systems quite fast, reliable, and scalable.
RESTful systems are guided by six general constraints
(i) Statelessness: The statelessness of the client–server communication prevents the storage of any contextual
information of the client on the server. Each client request has to be self-sufficient in informing its responders
about its services and session state
(ii)Uniform Interface: Each part or component of a RESTful system must evolve independently as
a result of the decoupling of architectures and its simplification.
Cache ability: The responses have to be implicitly, or in some cases, explicitly clear on whether they
(iii)
have to be cached or not. This helps the clients in retaining the most updated data in response to requests.
Caching also reduces the numberof client–server interactions, thereby improving the performance and
scalabilityof the system as a whole.
(iv) Client–server Architecture: The user–interface interactions should be separate from data storage
ones. This would result in enhanced portability of user interfaces across multiple platforms. The separation
also allows for the independent evolution of components, which would result in scalability over the
Internet across various organizational domains.
(v) Layered System: The client in RESTful services is oblivious to the nature of the server to which it is
connected: an end point server or an intermediary server. The use of intermediaries also helps in improving
the balancing of load and enhancing security measures and system scalability.
(vi) Code on Demand: This is an optional parameter. Here, the functionality of clients can be extended for
a short period by the server. For example, the transfer of executable codes from compiled components.
WebSocket
Websocket is an IETF (Internet Engineering Task Force)-standardized full-duplex communication
protocol. Websockets (WS), an OSI layer seven protocol, enables reliable and full-duplex
communication channels over a single TCP connection [23].Figure 8.24 shows the position of a
websocket layer in a stack. The WS relies on theOSI layer 4 TCP protocol for communication. Despite
being different from the HTTP protocol, WS is compatible with HTTP and can work over HTTP ports
80 and 443, enabling support for network mechanisms such as the HTTP proxy, which is usually present
during organizational Internet accesses through firewalls.
Operational Principle
A client initiates the WS connection process by sending a WS handshake request. In response, a WS
server responds with a WS handshake response. As the servers have to incorporate both HTTP
and WS connections on the same port, the handshakingis initiated by an HTTP request/response mechanism.
Upon establishment of a connection between the client and server, the WS communication separates as a
bi- directional protocol that is non-conformant with the HTTP protocol.

Explain Wireless Sensor Networks (WSN) with the


8 block diagram of the typical constituents of a WSN node.

Wireless Sensor Networks


Wireless sensor networks (WSN), as the name suggests, is a networking paradigm that makes use
of spatially distributed sensors for gathering information concerning the immediate environment of
the sensors and collecting the information centrally.
Here, the sensors are not standalone devices but a combination of sensors, processors, and radio
units—referred to as sensor nodes—sensing the environment and communicating the sensed data
wirelessly to a remote location, which may or may not be connected to a backbone network. Figure
shows the block diagram of the various standard components of a typical WSN node.
The exact specifications of each of these blocks vary depending on the implementation requirements and
the network architect’s choice.
Figure shows a typical WSN implementation, where the master node aggregates data from multiple
slave nodes, forwards it to a remote server utilizing access to the Internet through cellular
connectivity. The stored data on the server can be visualized by a user or a subscriber to the system
from anywhere in the world over the Internet.
WSNs mainly follow a system of communication known as master–slave architecture. In a master–
slave architecture, a single aggregator node, the master, is responsible for collecting data from
various sensor nodes under its dominion or range of operations.
The sensor nodes under the range of the master node are referred to as slave nodes. Multiple slave
nodes communicate to the master node using low power short-range wireless radios suchas Zigbee,
Bluetooth, and WiFi for transferring their sensed data to a remote central server. Often, in popular
WSN architectures, the master node connects the WSN to the Internet and acts as the gateway for
the WSN.
Upon collecting data from the slave nodes, the master node pushes the aggregated datato a remotely
located central server using the Internet. The master node may be linked to the Internet through
cellular connections, another gateway, or directly through a backbone infrastructure.
WSNs must have the following distinguishing features:
i) Fault Tolerance
ii) Scalability
iii) Long lifetime
iv) Security
v) Programmability
vi) Affordability
vii) Heterogeneity
viii) Mobility

Discuss the implementation of WSN and explain how master node aggregates data
9 from multiple slave nodes.

WSNs can be organized broadly into the following domains of implementation:


➢ 1) Wireless multimedia sensor networks
➢ 2) underwater sensor networks
➢ 3) wireless underground sensor networks
➢ 4) wireless mobile sensor networks stock management
➢ i) Wireless Multimedia Sensor Networks (WMSN): This class of WSNs boasts of the ability to
retrieve videos, audios, images, or all three in addition to regular scalar sensor readings. The
sensing range and coverage area of a camera based WMSN are defined by the field of view
(FOV) of the constituent cameras.
➢ ii) Underwater Sensor Networks (UWSN): This class of WSN is designed specifically to work
in underwater environments. Compared to terrestrial or aerial environments, wireless
underwater communications are severely restricted in terms of data rate, range, and bandwidth
due to the high underwater attenuation of electromagnetic signals.
➢ ) Wireless Underground Sensor Networks (WUSN): This class of WSNs is designed to be
deployed entirely underground. The underground environment poses challenges of attenuation
due to the rocks and minerals in the soil. Another significant problem associated with this class
is the need for digging up of the nodes to replenish their energy sources.
➢ iv) Wireless Mobile Sensor Networks (MSN): This class of WSNs is characterized by its
mobility and low power requirements. The sensor nodes are mobile, which requires them to
rapidly connect to networks, disconnect from them, and then again connect to new networks
until the nodes are mobile.
a) What are the components of the M2M networking model?
10 b) What is the M2M service ecosystem
a) Machine-to-Machine (M2M) networking refers to the communication between devices, machines, or
sensors without human intervention, enabling them to exchange data and perform tasks autonomously.
The M2M networking model typically consists of several key components:

1. **Devices or Sensors**: These are the physical endpoints in the M2M network that collect data or
perform actions. Devices can range from simple sensors that measure environmental parameters (such as
temperature or humidity) to complex machines equipped with embedded computing and communication
capabilities.

2. **Communication Modules**: Communication modules enable devices to connect to the network and
exchange data with other devices or a central server. These modules may include cellular, satellite, Wi-Fi,
Bluetooth, Zigbee, or other wireless communication technologies, depending on the requirements of the
application and the environment.

3. **Network Infrastructure**: The network infrastructure provides the underlying connectivity and
transport mechanisms for M2M communication. This infrastructure may include cellular networks, satellite
networks, local area networks (LANs), or wide area networks (WANs), depending on the scale and coverage
requirements of the M2M deployment.

4. **Middleware**: Middleware serves as an intermediary layer between the devices and the applications or
services that interact with them. It handles tasks such as data processing, protocol translation, security, and
device management, abstracting the complexity of the underlying network and devices from higher-level
applications.

5. **Data Storage and Processing Systems**: M2M applications often generate large volumes of data that
need to be stored, processed, and analyzed. Data storage and processing systems, such as databases, data
warehouses, and analytics platforms, are essential components of the M2M networking model. These
systems enable organizations to derive insights from the collected data and make informed decisions.

6. **Applications and Services**: Applications and services leverage the data collected from M2M devices
to deliver value to end-users or organizations. These may include monitoring and control applications,
predictive maintenance systems, asset tracking solutions, and other M2M-enabled services that automate
processes, optimize resource utilization, and improve operational efficiency.

7. **Security Mechanisms**: Security is a critical aspect of M2M networking to protect sensitive data,
ensure the integrity of communication, and prevent unauthorized access to devices and networks. Security
mechanisms such as encryption, authentication, access control, and secure protocols are essential
components of the M2M networking model.

Overall, the components of the M2M networking model work together to enable seamless communication,
data exchange, and interaction between interconnected devices, facilitating the automation of various
processes and unlocking new opportunities for innovation and efficiency across industries.

b) M2M Service Ecosystem


The functions and roles of the various domains are as follows.
➢ M2M Area Networks: These networks form the base of the M2M ecosystem. They are similar
to the M2M area networks previously described in the M2M networking model. The constituent
devices are classified as low-end, mid-end, and high-end based on their functionalities and
ability to handle mobility.
➢ Core Network: The core networks form the crux of the communication infrastructure of the
M2M ecosystem, and carry the bulk load of traffic across the M2M network. The core network
can be wired or wireless or both. Some of the conventional technologies associated with the
core networks include WLAN, LTE, GSM, WiMAX, DSL, and others.
➢ M2M Service Platform: The M2M service platform is further divided into the following four
parts:
➢ i) Device Management Platform: This platform enables anytime anywhere access between
Internet-connected platforms and registered objects or devices connected to the platform
➢ (ii) User Management Platform: Various service providers and device managers can maintain
administrative privileges over the devices or networks under their jurisdiction through the
platform’s device monitoring and control.
➢ (iii) Data and Analytics Platform: This platform provides integrated services based on device
collected data and datasets. Heterogeneous data emerging from various devices are used for
creating new services.
(iv) User Access Platform: This platform provides a smartphone and web access environment
to users.
Stakeholders: The stakeholders in an M2M service ecosystem can be divided into five different
types: Device providers, Internet service providers (ISPs), Platform providers, Service
providers, and Service users.

11 Discuss the various features desirable in an ideal M2M platform


An ideal Machine-to-Machine (M2M) platform should possess a range of features that enable seamless
communication, efficient data exchange, robust security, scalability, and flexibility to support diverse M2M
applications. Here are some desirable features of an ideal M2M platform:

1. **Interoperability**: The platform should support interoperability between different types of devices,
sensors, and communication protocols to facilitate seamless integration and communication across
heterogeneous M2M networks.

2. **Scalability**: The platform should be able to scale effortlessly to accommodate a growing number of
connected devices and increasing data volumes without compromising performance or reliability.

3. **Reliability and Availability**: The platform should ensure high availability and reliability to guarantee
continuous operation and minimal downtime, even in challenging environments or under heavy loads.

4. **Low Latency**: Low latency is crucial for real-time M2M applications that require quick response
times, such as industrial automation, remote monitoring, and control systems.

5. **Security**: Robust security mechanisms should be integrated into the platform to protect sensitive data,
prevent unauthorized access, and safeguard against cyber threats, including encryption, authentication,
access control, and secure communication protocols.

6. **Remote Device Management**: The platform should provide comprehensive tools for remote device
management, configuration, monitoring, and troubleshooting, allowing administrators to manage connected
devices efficiently and proactively address issues.

7. **Data Processing and Analytics**: Built-in data processing and analytics capabilities enable the
platform to extract insights from M2M data in real-time, enabling predictive maintenance, performance
optimization, and data-driven decision-making.

8. **Integration with Legacy Systems**: The platform should support integration with existing IT
infrastructure and legacy systems, enabling seamless communication and data exchange between M2M
devices and enterprise applications.
a) What is Interoperability? Explain Important in Context of IoT ?
12 b)Explain Types of interoperability?

Interoperability refers to the ability of different systems, devices, or applications to communicate,


exchange data, and operate seamlessly together, regardless of their underlying technologies,
protocols, or manufacturers. In the context of the Internet of Things (IoT), interoperability is crucial
for enabling the integration and interaction of diverse IoT devices, platforms, and services to create
cohesive and interconnected ecosystems. Here's why interoperability is important in the context of
IoT:

1. Integration of Heterogeneous Devices: IoT environments typically consist of a wide


variety of devices from different manufacturers, each utilizing different communication
protocols and standards. Interoperability ensures that these devices can communicate and
interact with each other, facilitating the seamless integration of heterogeneous IoT systems.
2. Scalability and Flexibility: Interoperability allows IoT deployments to scale efficiently and
adapt to changing requirements without being limited by proprietary technologies or
vendor lock-in. It enables organizations to mix and match devices and platforms from
multiple vendors, fostering flexibility and future-proofing their IoT investments.
3. Interoperable Standards: Industry-wide adoption of interoperable standards and
protocols, such as MQTT (Message Queuing Telemetry Transport), CoAP (Constrained
Application Protocol), and OPC UA (Open Platform Communications Unified Architecture),
promotes compatibility and interoperability across IoT ecosystems. These standards ensure
that devices and platforms can communicate seamlessly, regardless of their origin or
implementation.
4. Seamless Data Exchange: Interoperability enables the seamless exchange of data between
IoT devices, edge devices, cloud platforms, and enterprise systems, facilitating data
aggregation, processing, and analysis across the entire IoT ecosystem. This interoperability
fosters collaboration, data-driven insights, and decision-making across organizational
boundaries.
5. Cross-Domain Integration: Interoperability enables integration and collaboration between
IoT systems operating in different domains or industries, such as smart cities, industrial
automation, healthcare, agriculture, and transportation. It enables cross-domain data
sharing and interoperable solutions that address complex challenges and create synergies
between different sectors.
6. Interoperable Platforms and Services: Interoperability extends beyond devices to include
IoT platforms, middleware, and services. Interoperable platforms provide standardized APIs,
data formats, and protocols that enable seamless integration with third-party applications,
analytics tools, and services, fostering innovation and ecosystem development.
7. Reduced Development Effort: Interoperability simplifies the development and deployment
of IoT solutions by providing standardized interfaces, libraries, and development
frameworks. Developers can leverage interoperable components and building blocks to
accelerate development, reduce complexity, and focus on value-added functionality.
8. Enhanced User Experience: Interoperability leads to a more cohesive and integrated IoT
experience for end-users, as they can seamlessly interact with and control diverse devices
and services through unified interfaces and applications. This enhances usability,
convenience, and satisfaction, driving greater adoption and value realization from IoT
deployments.
Interoperability in the context of information technology can be categorized into several types
based on the level and scope of interoperability required. Here are the main types of
interoperability:

1. Technical Interoperability: Technical interoperability focuses on the ability of different


systems or components to communicate and exchange data effectively. It involves ensuring
compatibility at the technical level, such as data formats, communication protocols, and
interfaces. Technical interoperability enables seamless integration and interaction between
disparate systems, regardless of their underlying technologies or implementations.
2. Semantic Interoperability: Semantic interoperability involves ensuring that the meaning of
exchanged data is understood and interpreted correctly by all participating systems. It goes
beyond syntactic compatibility (the correct structure and format of data) to address
semantic consistency (the shared understanding of data semantics). Semantic
interoperability often relies on standardized data models, ontologies, and vocabularies to
establish common semantics and enable effective data exchange and interpretation.
3. Organizational Interoperability: Organizational interoperability focuses on enabling
collaboration and coordination between different organizations, departments, or
stakeholders. It involves aligning business processes, policies, and practices to facilitate
seamless information sharing, workflow integration, and decision-making across
organizational boundaries. Organizational interoperability often requires establishing trust,
governance frameworks, and agreements to address legal, regulatory, and cultural
differences between organizations.
4. Syntactic Interoperability: Syntactic interoperability ensures that data exchanged between
systems conforms to agreed-upon syntax or structure, such as XML, JSON, or specific
messaging formats. It involves establishing common data exchange formats, schemas, and
protocols to enable interoperability at the data representation level. Syntactic
interoperability is a foundational aspect of technical interoperability and is essential for
ensuring that systems can understand and process exchanged data correctly.
5. Cross-Domain Interoperability: Cross-domain interoperability involves enabling
interaction and integration between systems operating in different domains, industries, or
application areas. It requires addressing domain-specific challenges, requirements, and
standards while ensuring compatibility and seamless data exchange across diverse domains.
Cross-domain interoperability fosters collaboration, innovation, and synergies between
disparate sectors, such as healthcare, transportation, smart cities, and industrial automation.
6. Platform Interoperability: Platform interoperability focuses on enabling integration and
interaction between different software platforms, middleware, or ecosystems. It involves
providing standardized APIs, interfaces, and integration mechanisms that allow third-party
applications and services to interoperate with the platform. Platform interoperability
enables developers to leverage existing platforms, services, and ecosystems to build
interoperable solutions and extend functionality across multiple domains.

You might also like