0% found this document useful (0 votes)
5 views

msc_notes

The document provides an overview of various networking technologies and concepts, including Ethernet, Wireless Sensor Networks (WSN), data enrichment, actuators, and short-range wireless communication technologies. It also explains the three layers of IoT architecture (Perception, Network, and Application), details on RFID, MQTT protocol, and features of Raspberry Pi and Arduino platforms. Additionally, it describes different types of MAC protocols, including contention-based, channel polling-based, scheduling-based, and hybrid MAC protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

msc_notes

The document provides an overview of various networking technologies and concepts, including Ethernet, Wireless Sensor Networks (WSN), data enrichment, actuators, and short-range wireless communication technologies. It also explains the three layers of IoT architecture (Perception, Network, and Application), details on RFID, MQTT protocol, and features of Raspberry Pi and Arduino platforms. Additionally, it describes different types of MAC protocols, including contention-based, channel polling-based, scheduling-based, and hybrid MAC protocols.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Q.1) Answer the following.

1) What is Ethernet?
Ethernet is a networking technology that connects computers on a network over a wired
connection. It is widely used LAN protocol . it connects computer within Local area network and
wide area netwotk.Since it’s wired connection it provides provides higher speeds, lower latency,
and greater security. than Wi-Fi (WLAN).

Q.2) What is WSN?


Ans 2) WSN stands for Wireless Sensor Network , It is an infrastructure less wireless network
that is deployed in a large number of wireless sensors in an ad-hoc manner that is used to
monitor the system, physical or environmental condition.

Q.3) Define data enrichment?


Ans 3) It is a process of enhancing existing data by adding more information to make it more
valuable and insightful. It involves adding context, integrating external data, applying algorithms
and attaching metadata.

Q.4) What do you mean by actuators.


An actuator is a machine that moves or controls components in a system by converting
energy into physical motion. For ex. DC Motor, Stepper Motor etc.

Q.5) What are the different short range wireless communication technology:
1) Bluetooth, NFC, RFID, Wifi

Q.6) what is the function of GPIo pins of RPi.


GPIO (General Purpose Input Output) pins can be used as input or
output and allows raspberry pi to connect with general purpose I/O
devices like Switches, Sensor, LED, LCD etc. to build some electronic
system.
3 layer IoT architecture :

Perception Layer
These layer supports sensors and installed systems are used. These sensors collect huge
amount of information depending on the requirements.

This also contains edge devices, sensors, and actuators that connect with the surroundings. It
can find specific spatial parameters or find other intelligent things /objects in the
surroundings.

Network Layer
The network layer generates a logical association between the sender and the user by
providing a logical method. This layer switches and routes message packets as
important to receive them to their destination.

It is important for sending and delivering message packets. The network layer makes routing
decisions and promotes the packets for devices that are farther away than a single
connection.

The network layer can also break huge packets into small blocks if the packet is larger than
the most considerable data link layer. The network reassembles the fragments into packets at
the receiving end.

Application Layer
This layer supports services for client and software functions. It decides how the user
will use the data network. It allows the client to use the structure.

Q.2) What is RFID


Radio Frequency Identification (RFID) is a form of wireless communication that
incorporates the use of electromagnetic or electrostatic coupling in the radio frequency
portion of the electromagnetic spectrum to uniquely identify an object or person. It uses radio
frequency to search, identify, track, and communicate with items and people.

What is MQTT protocol?


MQTT is a simple, lightweight messaging protocol used to establish
communication between multiple devices. It is a TCP-based protocol relying on
the publish-subscribe model. This communication protocol is suitable for
transmitting data between resource-constrained devices having low bandwidth
and low power requirements.

What are the features of RPi?

Raspberry Pi Features
 CPU: The brain of the computer, responsible for processing information.
 RAM: Temporary storage for data the CPU is actively using.
 WiFi and Bluetooth: Wireless communication capabilities.
 Ethernet: Wired internet connection.
 USB Ports: Connect to peripherals like keyboards, mice, and external
storage.
 HDMI: Connects to displays for video output.
 SD Card Slot: For storing operating systems, applications, and data.
 Audio Jack: For connecting headphones or speakers.
 GPIO Pins: General-purpose input/output pins for connecting to
external devices.
 Power Supply: Provides electricity to the board.

What is Arduino
Arduino is an open-source electronics platform that combines a
programmable circuit board (hardware) with a development environment
(software) for writing and uploading code to the board to perform specific
functions. It is known for its user-friendly nature, affordability, and extensive
community support, which makes it widely accessible, particularly for
beginners.

Arduino Features
 Microcontroller: Serves as the core processing unit, handling simple
commands in real time.
 GPIO Pins: General-purpose input/output pins for connecting to
external devices.
 Power Supply: Provides electricity to the board.
 USB: Connects to a computer for programming and power.
 Reset Button: Restarts the board.
 PWM: Modulates the width of pulses to simulate varying output levels
and can be used to control LED brightness or motor speed.
 Serial Communication: Sends and receives bits sequentially.
 Parallel Communication: Sends multiple bits simultaneously.
 Interrupts: Responds to external events.
 Timers: Precisely controls timing.
 ADC: Converts analog signals to digital.
 Memory: Stores programs and data.
 Crystal Oscillator: Provides stable timing for the board.

 Raspberry Pi boards are essentially complete computers on a printed


circuit board the size of a credit card. These devices contain a central
processing unit (CPU), random access memory (RAM), WiFi and
Bluetooth connectivity, input/output connectors, Ethernet and USB
ports, an audio jack for headphones, HDMI ports to connect monitors,
and a micro SD slot. These boards have no internal storage, so an SD
or microSD card is necessary for these boards to function.

 Raspberry Pi boards can connect to peripherals such as keyboards,


mice, and monitors, turning them into fully functional desktops. With
built-in Ethernet ports, they can connect to the Internet for browsing, file
transfers, and networked tasks. Equipped with powerful CPUs,
Raspberry Pi boards are capable of running full operating systems and
handling multiple complex computing tasks, making them versatile tools
for a wide range of applications.

#define echoPin 6

#define trigPin 7

long duration;

int distance;
void setup()

pinMode(trigPin, OUTPUT);

pinMode(echoPin, INPUT);

Serial.begin(9600);

void loop()

digitalWrite(trigPin, LOW);

delayMicroseconds(2);

digitalWrite(trigPin, HIGH);

delayMicroseconds(10);

digitalWrite(trigPin, LOW);

duration = pulseIn(echoPin, HIGH);

distance = duration * 0.034 / 2;

Serial.print("Distance: ");

Serial.print(distance);

Serial.println(" cm");

}
MAC protocol
The description of four types of MAC protocols is listed below −

1. Contention-based MAC Protocol

It is used for accessibility purposes. To transmit the data from one node
to another node, before initiation it will check for the nearest nodes and
their positions and also examine the carrier status. The accessibility of the
channel is specified by the carrier status. If the value is ideal, then it can
start the transmission of data. If it is not then the node has to wait for a
while. This mechanism will reduce the collision and simultaneous
accessing of resources. It is flexible even the network grows or shrinks.
There is no guarantee of transmission of data and it is solely dependent
on the sender. Under contention-based, there are sender-based and
receiver-based sender-based transmissions that can start by the sender.
The receiver initiates the Connection.

2. Channel polling-based MAC Protocol

Under channel polling-based MAC protocol, there is the keyword


“preamble sampling”. Like the above before transmission, the sender will
check for the receiver’s availability by sending a preamble. A preamble is
a byte that is added with the data packet prefix value. It will help the
sender to activate the receiver when it is in sleep mode. If the receiver is
active then it will take the packet otherwise this preamble will be in sleep
mode. The receiver is in sleep mode until no more activation signals are
sent by the sender. This happens on an interval basis. For this scheduling
is not needed. All nodes are synchronized. This channel polling is also
represented as LPL in BMAC protocol.
3. Scheduling-Based MAC Protocol

In scheduling-based protocol, there will be a schedule followed by the


nodes while transmitting the data, all nodes must follow certain time
slots. As it is scheduled one packet will transfer as per the schedule only
so there is no collision occurs while transmitting the data. Nodes don’t
check for the availability or status of other nodes because they have their
time slots. So before going to access the channel first they should get the
timeslot. It has advantages like reduction of collision, and avoiding the
checking of the status of the receiver randomly. It is also associated with
the drawbacks like traffic, less throughput, reduce scalability, etc… as it
follows a scheduling mechanism there is a guarantee of packet
reachability while transmitting the data.

4. Hybrid MAC protocol

It is the combination of MAC Protocols. It supports both synchronous and


asynchronous. As it is the combination of MAC protocols under this it has
the advantage of remaining protocols. It will be like a new approach as it
includes more than one MAC protocol. An example of a hybrid MAC
protocol is Z-MAC i.e; Zebra MAC.

You might also like