NET Exam Preparations
NET Exam Preparations
FOR
AC
Optimization
E
R
CA
Syllabus
Y
Group Theory: Groups, Subgroups, Semi Groups, Product and Quotients of Algebraic
M
Structures, Isomorphism, Homomorphism, Automorphism, Rings, Integral Domains, Fields,
DE
Applications of Group Theory.
Graph Theory: Simple Graph, Multigraph, Weighted Graph, Paths and Circuits, Short-
A
est Paths in Weighted Graphs, Eulerian Paths and Circuits, Hamiltonian Paths and Circuits,
AC
Planar graph, Graph Coloring, Bipartite Graphs, Trees and Rooted Trees, Prefix Codes, Tree
Traversals, Spanning Trees and Cut-Sets.
Boolean Algebra: Boolean Functions and its Representation, Simplifications of Boolean
Functions.
E
Optimization: Linear Programming - Mathematical Model, Graphical Solution, Simplex
R
and Dual Simplex Method, Sensitivity Analysis; Integer Programming, Transportation and
CA
Assignment Models, PERT - CPM: Diagram Representation, Critical Path Calculations, Re-
source Levelling, Cost Consideration in Project Scheduling.
R ’S
HE
AC
TE
Y
1 Mathematical Logic 1
M
1.1 Propositions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
DE
1.2 Compound Proposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Proposition and Truth Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
A
1.3.1 Algebra of Propositions . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
AC
1.3.2 Conditional Proposition . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.3 Converse, Contrapositive and Inverse . . . . . . . . . . . . . . . . . . . 8
1.3.4 Biconditional Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.3.5 Negation of Compound Statements . . . . . . . . . . . . . . . . . . . . 9
E
1.3.6 Tautologies and Contradictions . . . . . . . . . . . . . . . . . . . . . . . 12
R
1.4 Normal Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
CA
Y
3.1.6 The Inclusion-Exclusion Principle . . . . . . . . . . . . . . . . . . . . . . 77
M
3.1.7 Tree Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
DE
3.1.8 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
3.2 Mathematical Induction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
A
3.3 Discrete Probability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
AC
3.3.1 Sample Space and Events . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.3.2 Finite Probability Spaces . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.3.3 Conditional Probability . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
E
3.3.4 Independent Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.3.5 Independent Repeated Trials, Binomial Distribution . . . . . . . . . . . . 95
R
3.3.6 Random Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
CA
Y
4.6.4 Fundamental Theorem of Algebra . . . . . . . . . . . . . . . . . . . . . 136
M
5 Graph Theory 142
DE
5.1 Graphs and Multigraphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
5.2 Subgraph, Isomorphic graphs and Homeomorphic graphs . . . . . . . . . . . . 144
A
5.3 Paths, Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
AC
5.4 Traversable and Eulerian Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . 147
5.5 Labeled and Weighted Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
5.6 Complete, Regular and Bipartite Graphs . . . . . . . . . . . . . . . . . . . . . . 150
E
5.7 Tree Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
5.8 Planar Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
R
5.9 Graph Colorings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
CA
Y
6.12.3 Case of Four Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
M
7 Optimization 216
DE
7.1 Linear Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
7.1.1 Mathematical Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . 216
A
7.1.2 Graphical Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
AC
7.1.3 Simplex Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
7.1.4 Simplex Method - Use of Artificial Variables . . . . . . . . . . . . . . . . 241
7.1.5 Duality in Linear Programming . . . . . . . . . . . . . . . . . . . . . . . 250
E
7.1.6 Duality and Simplex Method . . . . . . . . . . . . . . . . . . . . . . . . . 253
7.1.7 Dual Simplex Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
R
7.1.8 Sensitivity Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
CA
Mathematical Logic
M Y
DE
Logic is the science dealing with the methods of learning. Logic which uses a symbolic lan-
guage to express its principles in precise and unambiguous terms is known as mathematical
A
logic. One reason for this is that all efforts at the verification of algorithms inevitably the no-
AC
tation and methods of logic. Logic, among other things, have provided the theoretical basis
for many areas of computer science such as digital logic design, automata theory and com-
putability, and artificial intelligence etc. One component of logic is proposition calculus which
E
deals with statements with values true and false and is concerned with analysis of propo-
R
sitions. And the other part is predicate calculus which deals with the predicates which are
CA
1.1 Propositions
’S
A number of words making a complete grammmatical structure having a sense and meaning
R
and also meant an assertion in logic or mathematics is called a sentence. This assertion may
HE
statements, the first because it is true and the second because it is false. Similarly “x + y > 1”
is not a statement because for some values of x and y the sentence is true, whereas for oth-
TE
ers it is false. For instance, if x = 1 and y = 2, the sentence is true, if x = −3 and y = 1, this is
false. The truth or falsity of a statement is called its truth value. Since only two possible truth
values are admitted this logic is sometimes called two-valued logic. Questions, exclamations
and commands are not propositions.
It is customary to represent simple statements by letters p, q, r, · · · known as proposition vari-
ables. Propositional variables can only assume two values, true or false. There are also two
propositional constants, T and F , that represent true or false, respectively. If p denotes the
proposition “The sun sets in the east”, then instead of saying “The sun sets in the east” is
false, one can simply say the value of p is F .
1
Teacher’s Care Academy Computer Science Unit I - Discrete Structures and Optimization
Y
It is an exclamation. Hence it is not a
M
(e) What a hot day!
statement.
DE
It is a statement since it is either true
We shall have chicken for or false but not both, although one
A
(f)
dinner. has to wait until dinner to find out if it
AC
is true or false.
stant is called an atomic(primary, primitive) proposition or simply proposition; that is, they
can not be further subdivided. A proposition obtained from the combinations of two or more
propositions by means of logical operators or connectives of two or more propositions or by
negating a single proposition is referred to molecular or composite or compound proposition.
’S
Connectives
R
HE
The words or phrases (or symbols) used to form compound propositions are called connec-
tives. There are five basic connectives called
AC
• Negation,
• Conjunction,
TE
• Disjunction,
• Equivalence or Biconditional.
Example 1.2.1: Let p: Paris is in France. Then the negation of p is the statement
Nature of the
Connective compound statement Symbolic
Symbol used Negation
word formed by the form
connective
∼, ¬, N not Negation ∼p ∼ (∼ p) = p
∨ or Disjunction p∨q (∼ p) ∧ (∼ q)
Y
Implication (or)
M
⇒, → if, · · · then p⇒q p ∧ (∼ q)
Conditional
DE
Equivalence (or)
⇔, < − > if and only if p⇔q [p ∧ (∼ q)] ∨ [q ∧ (∼ p)]
Bi-conditional
A
AC
Normally it is written as
∼ p : Paris is not in France.
E
R
Statement p ∼p
CA
Remark 1.2.1. It is to be noted that “not” is not a connective, since it does not join two
AC
statements and ∼ p is not really a compound statement. However, “not” is a unary operation
for the collection of statements, and ∼ p is a statement if p is considered a statement.
TE
Example 1.2.2: From the conjunction of p and q for each of the following.
2. p: It is cold, q: It is raining.
3. p: 5x + 6 = 26, q: x > 3.
Solution.
3. p ∧ q: 5x + 6 = 26 and x > 3.
M Y
DE
1.3 Proposition and Truth Tables
A
AC
p q p∧q p q p∨q p ∼p
T T T T T T T F
T F F T F T F T
R E
F T F F T T
CA
F F F F F F
1. p ∧ (∼ q ∨ q)
R
HE
2. ∼ (p ∨ q) ∨ (∼ p∧ ∼ q)
Solution.
AC
p q ∼q ∼q∨q p ∧ (∼ q ∧ q)
TE
T T F T T
T F T T T
F T F T F
F F T T F
(∼ ∼ (p ∨ q) ∨ (∼
p q ∼p ∼q p∧q ∼ (p∧q)
p∧ ∼ q) p∧ ∼ q)
T T F F T F F F
T F F T T F F F
F T T F T F F F
F F T T F T T T
Y
Table 1.3: 2. Truth table for ∼ (p ∨ q) ∨ (∼ p∧ ∼ q)
M
DE
Definition 1.3.1. If two propositions P (p, q, · · · ) and Q(p, q, · · · ) where p, q, · · · are proposi-
tional variables have the same truth values in every possible case, the propositions are called
A
logically equivalent or simply equivalent, and denoted by
AC
P (p, q, · · · ) ≡ Q(p, q, · · · ).
1. Idempotent laws.
(a) p ∨ p ≡ p,
’S
(b) p ∧ p ≡ p.
R
2. Associative laws.
HE
(a) (p ∨ q) ∨ r ≡ p ∨ (q ∨ r),
(b) (p ∧ q) ∧ r ≡ p ∧ (q ∧ r).
AC
3. Commutative laws.
TE
(a) p ∨ q ≡ q ∨ p,
(b) p ∧ q ≡ q ∧ p.
4. Distributive laws.
(a) p ∨ (q ∧ r) ≡ (p ∨ q) ∧ (p ∨ r),
(b) p ∧ (q ∨ r) ≡ (p ∧ q) ∨ (p ∧ r).
5. Identity laws.
(a) p∨ F ≡ p,
(b) p∨ T ≡ T,
(c) p∧ T ≡ p,
(d) p∧ F ≡ F.
6. Complement laws.
Y
(a) p∨ ∼ p ≡ T,
M
(b) p∧ ∼ p ≡ F,
DE
(c) ∼ T ≡ F,
(d) ∼ F ≡ T.
A
AC
7. Involution law. ∼ (∼ p) ≡ p.
8. DeMorgan’s laws. E
(a) ∼ (p ∨ q) ≡∼ p∧ ∼ q,
R
(b) ∼ (p ∧ q) ≡∼ p∨ ∼ q.
CA
9. Absorption laws.
(a) p ∨ (p ∧ q) ≡ p,
’S
(b) p ∧ (p ∨ q) ≡ p.
R
If p and q are proposition, the compound proposition “if p then q” denoted by p ⇒ q is called
a conditional proposition or implication and the connective is the conditional connective. The
AC
proposition p is called antecedent or hypothesis, and the proposition q is called the conse-
quent or conclusion.
TE
1. p implies q.
2. p is sufficient for q.
3. p only if q.
4. q is necessary for p.
5. q if p.
6. q follows from p.
7. q is a consequence of p.
M Y
p q p⇒q
DE
T T T
T F F
A
AC
F T T
F F T
(a) If the earth is round then the earth travels around the sun.
(b) If Alexander Graham Bell invented telephone, then tigers have wings.
’S
Solution.
HE
(a) True. Let p: The earth is round, q: The earth travels round the sun. Here p is true and q is
true and hence the conditional proposition is true.
AC
(b) False. Let p: Alexander Graham Bell invented telephone, q: Tigers have wings. Here p is
true and q is false and hence the conditional proposition is false.
TE
(c) True. Let p: Tigers have wings, q: RDX is dangerous. Here p is false and q is true and
hence the conditional proposition is true.
1. p∨ ∼ q ⇒ p,
2. (∼ (p ∧ q) ∨ r) ⇒∼ p.
Solution.
p q ∼q p∨ ∼ q p∨ ∼ q ⇒ p
T T F T T
T F T T T
F T F F T
Y
F F T T F
M
DE
p q r (p ∧ q) ∼ (p ∧ q) (∼ (p ∧ q) ∨ r) (∼ (p ∧ q) ∨ r) ⇒∼ p
T T T T F T F
A
T T F T F F T
AC
T F T F T T F
T F F F T T F
E
F T T F T T T
R
F T F F T T T
CA
F F T F T T T
F F F F T T T
R ’S
There are some related implication that can be formed from p ⇒ q. If p ⇒ q is an implication,
then the converse of p ⇒ q is the implication q ⇒ p, the contrapositive of p ⇒ q is the
AC
p q p⇒q q⇒p ∼ p ⇒∼ q ∼ q ⇒∼ p
T T T T T T
T F F T T F
F T T F F T
F F T T T T
The proof of contrapositive is easy. Since x is odd, one can write x = 2k + 1, for some integer
Y
k. Hence
M
x2 = (2k + 1)2 = 4k 2 + 4k + 1 = 4(k 2 + k + 1/4).
DE
Since k 2 + k is an integer, k 2 + k + 1/4 is not an integer; therefore x2 is not divisible by 4.
A
1.3.4 Biconditional Statement
AC
If p and q are statements, then the compound statement p if and only if q, denoted by p ⇔
q is called a biconditional statement and the connective if and only if is the biconditional
connective. The biconditional statement p ⇔ q can also be stated as “p is a necessary and
E
sufficient condition for q” or as “p implies q and q implies p”.
R
CA
p q p⇔q
T T T
T F F
’S
F T F
R
F F T
HE
AC
which exist simultaneously. Therefore, the negation of the conjunction would mean the nega-
tion of at least one of the two sub-statements. Thus, we have “the negation of a conjunction
p ∧ q is the disjunction of the negation of p and the negation of q”. Equivalently, we write
∼ (p ∧ q) ≡∼ p∨ ∼ q.
p q p∧q ∼ (p ∧ q) ∼p ∼q ∼ p∨ ∼ q
T T T F F F F
T F F T F T T
F T F T T F T
F F F T T T T
The negation of a disjunction p ∧ q is the conjunction of the negation of p and the negation
Y
of q. Equivalently, we write
M
∼ (p ∨ q) ≡∼ p∧ ∼ q.
DE
In order to prove the above equivalence, we prepare the following table.
A
p q ∼p ∼q ∼ p∧ ∼ q p∧q ∼ (p ∧ q)
AC
T T F F F T F
T F F T E F T F
F T T F F T F
R
F F T T T F T
CA
∼ (p ⇒ q) ≡ p∧ ∼ q.
’S
p q p⇒q ∼ (p ⇒ q) ∼q p∧ ∼ q
HE
T T T F F F
T F F T T T
AC
F T T F F F
TE
F F T F T F
∼ (p ⇔ q) ≡ p ⇔∼ q ≡∼ p ⇔ q.
p q p⇔q ∼ (p ⇔ q) ∼p ∼p⇔q ∼q p ⇔∼ q
T T T F F F F F
T F F T F T T T
F T F T T T F T
F F T F T F T F
p q p↑q
M Y
T T F
DE
T F T
F T T
A
F F T
AC
Table 1.5: Truth table for NAND
p q p↓q
T T F
R
HE
T F F
F T F
AC
F F T
Note that
(i) ∼ p ≡ p ↓ p
(ii) p ∧ q ≡ (p ↓ p) ↓ (q ↓ q)
(iii) p ∨ q ≡ (p ↓ q) ↓ (p ↓ q)
3. XOR (Exclusive OR): Assume p and q be two proposition. The exclusive OR (XOR) of
p and q, denoted by p ⊕ q is the proposition that is true when exactly one of p and q is
p q p⊕q
T T F
T F T
F T T
F F F
M Y
true but not both and is false otherwise.
DE
Properties of Exclusive OR
(i) p ⊕ q ≡ q ⊕ p (Commutative)
A
(ii) (p ⊕ q) ⊕ r ≡ p ⊕ (q ⊕ r) (Associative)
AC
(iii) p ∧ (q ⊕ r) ≡ (p ∧ q) ⊕ (p ∧ r) (Distributive)
in other words contain only T in the last column of its truth table is called a tautology. A
compound proposition that is always false for all possible values of its variables or, in other
words contain only F in the last column of its truth table is called a contradiction. Finally a
proposition that is neither a tautology nor a contradiction is called a contingency.
’S
Propositions like
R
Propositions like
TE
(b) All men are good and all men are bad
(a) p∨ ∼ p
(b) ∼ (p ∧ q) ∨ q
(c) p ⇒ (p ∨ q)
Solution.
(a) The truth table of the given proposition is shown below. Since the truth value is TRUE for
all possible values of the propositional variables which can be seen in the last column of
the table, the given proposition is a tautology.
p ∼p p∨ ∼ p
T F T
Y
F T T
M
DE
(b) We construct the truth table for the expression in question. It can be seen that for any
possible assignment of p and q, the expression ∼ (p ∧ q) ∨ q is true, which establishes that
A
it is a tautology.
AC
p q p∧q ∼ (p ∧ q) ∼ (p∧q)∨q
T T T F T
E
T F F T T
R
F T F T T
CA
F F F T T
(c) We construct the truth table of the given expression. It can be seen from the last column
’S
of the truth table that the expression is true for all possible assignments of p and q. Hence
the proposition is a tautology.
R
HE
p q p∨q p ⇒ (p ∨ q)
T T T T
AC
T F T T
F T T T
TE
F F F F
1. System software. This software includes the operating system and all utilities that
enable the computer to function.
2. Application software. These consist of programs that do real work for users. For
example, word processors, spreadsheets, and database management systems
fall under the category of applications software.
Definition:
• Software Engineering is a discipline whose aim is the production of fault free software
that satisfies the user’s needs and that is delivered on time and within budget. (NET-
JUNE-2012)
TEACHER'S CARE ACADEMY
• A process is a collection of activities, actions, and tasks that are performed when
some work product is to be created.
• An action (e.g., architectural design) encompasses a set of tasks that produce a major
work product (e.g., an architectural design model).
• A task focuses on a small, but well-defined objective (e.g., conducting a unit test) that
produces a tangible outcome.
• In addition, the process framework encompasses a set of umbrella activities that are
applicable across the entire software process.
• In addition, a set of umbrella activities project tracking and control, risk management,
quality assurance, configuration management, technical reviews, and others are
applied throughout the process. This aspect is called process flow. It describes how
the framework activities and the actions and tasks that occur within each framework
activity are organized with respect to sequence and time and is illustrated in following
figure.
• A number of task sets - each a collection of software engineering work tasks, project
milestones, work products, and quality assurance points - enable the framework
activities to be adapted to the characteristics of the software project and the
requirements of the project team.
• The desired result is high-quality software at low cost. Clearly, if a process does not
scale up and cannot handle large software projects or cannot produce good-quality
software, it is not a suitable process.
• Business process models, social process models, and training models, are all
examples of processes that come under this. These processes also affect the
software development activity but are beyond the purview of software engineering.
• Software Process framework is a set of guidelines, concepts and best practices that
describes high level processes in software engineering. It does not talk about how
these processes are carried out and in what order.
• Each software development project starts with some needs and is expected to end
with some software that satisfies those needs.
• A software process specifies the abstract set of activities that should be performed to
go from user needs to the final product.
• The actual act of executing the activities for some specific user needs is a software
project. And all the outputs that are produced while the activities are being executed
are the products.
• One can view the software process as an abstract type, and each project is done
• In other words, there can be many projects for a process and there can be many
products produced in a project.
• Overall, the process specifies activities at an abstract level that are not project-
specific.
• Process patterns can be defined as the set of activities, actions, work tasks or work
products and similar related behaviour followed in a software development life cycle.
• Process patterns can be more easily understood by dividing it into terms: "Process",
which means the steps followed to achieve a task and "patterns", which means the
recurrence of same basic features during the lifecycle of a process. Thus in a more
universal term process patterns are common or general solution for a complexity.
describe a problem (and solution) associated with a complete process model (e.g.,
prototyping).
• Forces. The environment in which the pattern is encountered and the issues that
make the problem visible and may affect its solution.
• Process models may include activities, which are part of the software process,
software products and the roles of people involved in software engineering. Some
examples of the types of software process model that may be produced are:
1. A workflow model: This shows the sequence of activities in the process along
with their inputs, outputs and dependencies. The activities in this model
represent human actions.
2. A dataflow or activity model: This represents the process as a set of activities
each of which carries out some data transformation. It shows how the input to
the process such as a specification is transformed to an output such as a design.
The activities here may be at a lower level than activities in a workflow model.
They may represent transformations carried out by people or by computers.
3. A role/action model: This represents the roles of the people involved in the
software process and the activities for which they are responsible.
TEACHER'S CARE ACADEMY
• Resources refer to the memory and processor utilization. The software should
efficiently perform what the user demanded and give appropriate response in each
case i.e. the output given is accurate or not.
• Maintainability: This characteristic of the software is important for both the software
engineer and the user. If the change is to be required in the software then the change
leads to the change in the software so that it performs in accordance with the user
requirement. The software engineer has to respond very fast if there is any change in
the user requirements. Changes should be performed like this that it will not affect the
overall integrity of the software.
• On-time: The software should be developed on-time. If the software is urbanized late
then it is of no use. A good engineer always develops the software on-time.
• Within Budget: Some of the software gets swarming. Overrun does not mean that
the cost of the software exceeds the limit given by user. But, it means that the software
cost is out of control. So, the software should be developed in such a manner that it
will not overrun and the software being developed is within budget.
• Dependability: It is the ability of the software that should not cause any physical or
economic damage in the event of system failure. It includes a range of characteristics
like: Reusability, security, and safety.
• Usability: Software becomes usable if it does not call for extra efforts to be learned.
Usability increases with good documentation provided along with the software. In
software operations a lot depends on the quality of user manual. If software satisfies
all the above characteristics then it is said to be good software or the software is well
engineered.
• The software development life-cycle consists of several phases and these phases
need to be identified along with defining the entry and exit criteria for every phase. A
phase can begin only when the corresponding phase-entry criteria are satisfied.
Similarly, a phase can be considered to be complete only when the corresponding
exit criteria are satisfied. If there is no clear indication of the entry and exit for every
phase, it becomes very difficult to track the progress of the project.
• The software development life-cycle can be divided into 5-9 phases, i.e., it must have
a minimum of five phases and a maximum of nine phases. On average it has seven
or eight phases. These are:
1. Project initiation and planning/Recognition of need/Preliminary investigation
2. Project identification and selection/Feasibility study
3. Project analysis
CHAPTER 3 : STACK
3.1 Introduction 21
3.1.1. Definition 22
1
3.2 Operations on Stacks 22
3.3.5. Backtracking 37
CHAPTER 4 : QUEUE
4.1 Introduction 40
5.3 Deque 49
CHAPTER 7 : TREES
7.1 Introduction 65
CHAPTER 8 : FOREST
8.1.2. Forest 68
9.1 Introduction 72
9.5.1.Insertion 77
9.5.2.Deletion 80
9.5.3.Traversal 82
9.5.4.Merging 86
10.1 Introduction 89
11.1 Introduction 94
11.2.1. Searching 95
11.2.2.Insertion 96
11.2.3.Deletetion 97
11.2.4.Traversing 99
4
12.2.4. B Tree 119
CHAPTER 15 : GRAPH
5
16.2.1.5. Radix Sort 167
6
TEACHER’S CARE ACADEMY, KANCHIPURAM
TNPSC-TRB- COMPUTER SCIENCE -TET COACHING CENTER
HEAD OFFICE: NO. 38/23, VAIGUNDA PERUMAL KOIL,
SANNATHI STREET, KANCHIPURAM – 1. CELL: 9566535080
B.Off 2: 65C, Thillai Ngr(West), 4th Cross St, Trichy – 620018
B.Off 3: 266-C - Advaitha Ashram Road, Opp to New Bus Stand, Salem – 4
SYLLABUS
Data Structures: Arrays and their Applications; Sparse Matrix, Stacks, Queues, Priority
Queues, Linked Lists, Trees, Forest, Binary Tree, Threaded Binary Tree, Binary Search
Tree, AVL Tree, B Tree, B+ Tree, B* Tree, Data Structure for Sets, Graphs, Sorting and
Searching Algorithms; Hashing.
Performance Analysis of Algorithms and Recurrences: Time and Space
Complexities; Asymptotic Notation, Recurrence Relations.
Design Techniques: Divide and Conquer; Dynamic Programming, Greedy Algorithms,
Backtracking, Branch and Bound.
Lower Bound Theory: Comparison Trees, Lower Bounds through Reductions.
Graph Algorithms: Breadth-First Search, Depth-First Search, Shortest Paths, Maximum
Flow, Minimum Spanning Trees.
Complexity Theory: P and NP Class Problems; NP-completeness and Reducibility.
Selected Topics: Number Theoretic Algorithms, Polynomial Arithmetic, Fast Fourier
Transform, String Matching Algorithms.
Advanced Algorithms: Parallel Algorithms Algorithms, Randomized Algorithms.
BOOKS TO STUDY:
1) Classic Data Structures - D.Samanta
2) Data Structures made simple - Sathish Jain, Shashi Singh.
3) Data Types and structures - Gotlieb, C.C. and L.R.Gotlieb.
4) Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, "Fundamentals of
Computer Algorithms", 2nd Edition, University Press, 2008.
5) T. H. Cormen, C. L. Leiserson, R. L. Rivest, and C. Stein, "Introduction to
Algorithms", MIT Press
2
1. Traversing:
This operation is used visiting all elements in an array.
Example: Array ‘a’ contains the following elements:
5 3 4 8 7
Steps:
1. i=L // start from first location L
2. while i<=U do // U upper bound
1. Process (A[i])
2. Sorting:
10 2 3 4 6 9 1 1 2 3 4 6 9 10
Algorithm steps:
1) Read the array elements.
2) Set the first position by comparing the first position of the array element
with other array element. If the value is smaller than the first position
element then swap the elements.
3) Set the second position by comparing the elements. If the value is smaller
than the second position element then swap the elements.
4) Set the other positions likewise.
Input: An array with integer data
Output: An array with sorted element in an order according to ORDER ( )
Steps:
1. i= U
2. While i>= L do
1. j=L // start comparing from first
2. While j< i do
1. If ORDER (A[j, A[j+1]) = FALSE // if A[j] and A[j+1]
are not in order
1. Swap (A[j], A[j+1]) // Interchange the
elements
2. Endif
A[J+1]
A[J]
A[J]
A[J+1]
3. Searching:
❖ This operation is applied to search an element of interest in an array
Example:
4 5 6 8 9
Element to search: 8
The given element is present in the position: 4
Algorithm steps:
1) Read the element to search.
2) Compare the element to the array elements.
3) If it matches then, display the position of the array.
4) Otherwise compare the entire array.
5) If match not found display the message “search is unsuccessful, key is
not in the array “
Algorithm: Search_array(key)
Input: Key is the element to be searched
Output: Index of key in A or a message on failure
Steps:
1. i=L, found=0, location=0 // found=0 indicates search is not
finished and unsuccessful
Insert -2 at position: 3
4 5 -2 6 8 9 After insertion
Algorithm steps:
1) Read the number to insert and the position to insert.
2) Shift the numbers from the specified position, one place to the right from
their existing position.
3) Place the number at the vacant place.
TEACHER'S CARE ACADEMY
5. Deletion:
This operation is used to delete a particular element from an array. The element
will be deleted by overwriting it with its subsequent element and this subsequent
element then is to be deleted.
Example: Delete the element in the position: 3
Before deletion:
4 5 6 8 9
After deletion:
4 5 8 9 0 0
Algorithm steps:
1) Read the position to delete.
2) Shift the numbers placed after the position, where the number is to
be deleted.
3) Leave the last position blank.
6. Merging:
❖ Merging is an important operation when we need to compact the lements from
two different arrays into a single array.
Rules:
1) Copy all the elements of first array into a new array(third array)
2) Copy the second array into the third array after the position ,at which the
last elements of the first array copied.
Types
➢ Merging can be done in two ways:
Merging without sorting.
2 8
4
8
Steps:
1. i1=L1, i2=L2; // initialization of variables
2. L=L1, U=U1+U2 –L2 +1 // initialization of lower and upper
bounds of an array
3. i=L
4. Allocate memory for a[L…U]
5. while i1<U do // to copy array A1 into the first
part of A
1. A[i] = A1[i1]
2. i=i+1, i1=i1+1
6. End while
7. While i2<=U2 do // To copy the array A2 into last part of
A
1. A[i] = A2[i2]
2. i=i+1, i2=i2+1
8. End while
9. Stop
❖ The first index is for row number and second is for column index. In the example
shown the first index values row=2 column=3 is used to access element 56.
TEACHER'S CARE ACADEMY
3. Three-dimensional Array
❖ In types of arrays, a three-dimensional array is an extension to the two
dimensional array with addition of depth.
❖ It can be seen as a cube that has rows, columns and depth as third dimension.
To access any element in a three-dimensional array three subscripts are
required for position of element in a specific row, column and depth.
❖ The first index is for depth (dimension or layer), second is for row index and third
is for column. In the example shown the index values (2,0,3) is used to access
element 24.
• Searching: Arrays can be searched for specific elements using algorithms such
as linear search and binary search.
• Matrices: Arrays are used to represent matrices in mathematical computations
such as matrix multiplication, linear algebra, and image processing.
• Stacks and queues: Arrays are used as the underlying data structure for
implementing stacks and queues, which are commonly used in algorithms and
Disadvantages
• Fixed-size: The size of an array is fixed at the time of its creation, which means
that once the array is created, its size cannot be changed. This can be a limitation
in situations where the size of the data is not known in advance.
• Memory wastage: There will be a wastage of memory if we store less number of
elements than the declared size because there is static memory allocation in
TEACHER'S CARE ACADEMY
arrays.
• Inefficient insertion and deletion: Arrays store data in contiguous memory
locations, which makes deletion and insertion very difficult to implement. All the
elements after insertion or deletion must be shifted to accommodate the new
element or fill in the gap. This can be a time-consuming process, especially for
large arrays.
• Homogeneous data: Arrays can only store elements of the same data type, which
can be a limitation in situations where the user needs to store data of different
types.
• No built-in support for dynamic resizing: While some programming languages
provide built-in support for dynamic resizing of arrays, many do not. In those
cases, the developer may have to implement their own resizing logic, which can
be complex and error-prone.
EXCERICE 1: (PART-A)
1) What is Data Structure?
A) Address of the variable B) Subset of all variables
C) The memory representation of data D) The type of the variable
2) Which of the following is a collection of heterogeneous elements?
A) Array B) Structure C) Stack D) Queue
3) __________is a linear data structure
A) Tree B) Array C) Graph D) None of these.
4) The Smallest element of an array index is __________
A) Smallest Bound B) Lower Bound
C) First Bound D) Higher Bound
5) Two Dimensional Array are also called a
A) Table Array B) Matrix Array
C) Both A & B D) None of above
6) An Array of n elements will be declared in c as
2.SPARSE MATRIX
2.1. WHAT IS A MATRIX?
• A matrix can be defined as a two-dimensional array having 'm' rows and 'n'
columns. A matrix with m rows and n columns is called m × n matrix. It is a set of
numbers that are arranged in the horizontal or vertical lines of entries.
• For example:
CHAPTER 1
DATA COMMUNICATION
1.1 COMPONENTS OF DATA COMMUNICATION SYSTEM
➢ Sending or Receiving information, such as speaking, writing, telephone lines ,
computers or using some other medium is communication.
➢ The communication system basically deals with the transmission of information from
one point to another using the well-defined steps which are carried out in sequential
manner. The system for data transmission makes use of the sender and destination
address, In this other so many elements are also there that allows it to transfer data
from one set of point to another set of point after dividing the elements of
communication system in groups and these interface elements acts as the
main component for data communication.
1. Message:
➢ The message is the information or data that needs to be transmitted from the source
to the destination.
➢ It can take various forms, such as text, numbers, images, audio, video, or any other
type of digital data.
2. Sender/Transmitter:
➢ The sender or transmitter is the device that originates and sends the message.
➢ It converts the message into electrical, electromagnetic, or optical signals suitable for
transmission over the communication channel.
3. Receiver:
➢ The receiver is the device that receives the transmitted signals from the sender.
➢ It converts the received signals back into the original message format for interpretation
by the destination device.
4. Communication Channel/Medium:
➢ The communication channel or medium is the physical or logical pathway through
which the signals travel from the sender to the receiver.
TEACHER'S CARE ACADEMY
➢ It can be wired (e.g., twisted-pair cables, coaxial cables, optical fibers) or wireless
(e.g., radio waves, microwaves, infrared).
➢ The choice of communication channel depends on factors such as distance, data rate,
cost, and environmental conditions.
5. Protocol:
➢ A protocol is a set of rules, conventions, and standards that governs how data is
transmitted and received between devices in a network.
➢ It defines parameters such as data format, error detection and correction, flow control,
and addressing.
➢ Protocols ensure interoperability and reliable communication between different
devices and systems.
6. Encoder/Decoder:
➢ Encoders and decoders are responsible for converting the message into a format
suitable for transmission and then back into its original form upon reception.
➢ They may perform functions such as data compression, encryption, modulation, and
demodulation.
7. Modem (Modulator-Demodulator):
➢ A modem is a device that modulates digital signals into analog signals for transmission
over analog communication channels and demodulates analog signals back into digital
signals upon reception.
➢ It enables communication between digital devices over analog communication
networks such as telephone lines.
➢ Switches operate at the data link layer (Layer 2) of the OSI model, while routers
operate at the network layer (Layer 3).
9. Multiplexers/Demultiplexers:
➢ Multiplexers combine multiple signals or data streams into a single transmission
channel, allowing for more efficient use of bandwidth.
➢ Demultiplexers separate the combined signals back into their original individual signals
3. Full-Duplex Mode:
➢ In full-duplex mode, communication occurs in both directions simultaneously.
➢ Each party can transmit and receive data independently without any interference.
➢ Dedicated channels are used for transmitting and receiving, allowing for
simultaneous communication.
➢ Examples of full-duplex mode include telephone conversations and most modern
computer networks.
TEACHER'S CARE ACADEMY
4. Asynchronous Mode:
➢ In asynchronous mode, data transmission is not synchronized with a common clock
signal between the sender and receiver.
➢ Each data character is preceded by start and stop bits to indicate the beginning and
end of the data transmission.
➢ Asynchronous communication is commonly used in serial communication interfaces,
such as RS-232.
5. Synchronous Mode:
➢ In synchronous mode, data transmission is synchronized with a common clock
signal shared between the sender and receiver.
➢ Data is transmitted in blocks or frames, with each frame preceded by
synchronization bits or headers.
➢ Synchronous communication allows for higher data rates and more efficient
bandwidth utilization.
➢ Examples of synchronous communication protocols include Ethernet and
SONET/SDH.
1. Unicast
➢ This type of information transfer is useful when there is
a participation of single sender and single recipient. So,
in short, you can term it as a one-to-one transmission.
➢ For example, a device having IP address 10.1.2.0 in a
network wants to send the traffic stream (data packets) to the device with IP address
20.12.4.2 in the other network, then unicast comes into the picture. This is the most
common form of data transfer over the networks.
2. Broadcast
Broadcasting transfer (one-to-all) techniques can be classified into two types :
a. Limited Broadcasting
➢ Suppose you have to send stream of packets to all the devices over the network
that you reside, this broadcasting comes handy.
➢ For this to achieve, it will append 255.255.255.255 (all
the 32 bits of IP address set to 1) called as Limited
TEACHER'S CARE ACADEMY
b. Direct Broadcasting
➢ This is useful when a device in one network wants
to transfer packet stream to all the devices over
the other network.
➢ This is achieved by translating all the Host ID part
bits of the destination address to 1, referred
as Direct Broadcast Address in the datagram header for information transfer.
➢ This mode is mainly utilized by television networks for video and audio distribution.
One important protocol of this class in Computer Networks is Address Resolution
Protocol (ARP) that is used for resolving IP address into physical address which is
necessary for underlying communication.
3. Multicast
➢ In multicasting, one/more senders and one/more recipients participate in data
transfer traffic. In this method traffic recline between the boundaries of unicast (one-
to-one) and broadcast (one-to-all).
➢ Multicast lets server’s direct single copies of data streams that are then simulated
and routed to hosts that request it. IP multicast requires support of some other
protocols like IGMP (Internet Group Management Protocol), Multicast
routing for its working. Also in Classful IP addressing Class D is reserved for
multicast groups.
4. Point-to-Point Communication:
➢ In point-to-point communication, data is transmitted between two individual nodes,
typically over a dedicated communication link.
➢ Examples include serial communication between two devices using cables or
wireless communication between two mobile devices.
5. Client-Server Communication:
➢ In client-server communication, one or more client devices request services or
resources from a central server.
➢ The server responds to client requests by providing the requested data or
performing the requested tasks.
➢ This model is prevalent in networked environments, such as web browsing, email
services, and file sharing.
1.4. SIGNAL
➢ A signal is an electromagnetic or electrical current that carries data from one system
or network to another.
➢ In electronics, a signal is often a time-varying voltage that is also an electromagnetic
wave carrying information, though it can take on other forms, such as current.
➢ There are two main types of signals used in electronics: analog and digital signals.
a.) Analog Signal
➢ That's the big difference between analog and digital waves. Analog waves are
smooth and continuous, digital waves are stepping, square, and discrete.
c.) Key Differences:
• An analog signal is a continuous signal whereas Digital signals are time separated
signals.
• Analog signal is denoted by sine waves while It is denoted by square waves
• Analog signal uses a continuous range of values that help you to represent
information on the other hand digital signal uses discrete 0 and 1 to represent
TEACHER'S CARE ACADEMY
information.
• The analog signal bandwidth is low while the bandwidth of the digital signal is high.
• Analog instruments give considerable observational errors whereas Digital
instruments never cause any kind of observational errors.
• Analog hardware never offers flexible implementation, but Digital hardware offers
flexibility in implementation.
• Analog signals are suited for audio and video transmission while Digital signals are
suited for Computing and digital electronics.
d.) Characteristics Of Analog Signal
Here, are essential characteristics of Analog Signal
• These types of electronic signals are time-varying
• Minimum and maximum values which is either positive or negative.
• It can be either periodic or non-periodic.
• Analog Signal works on continuous data.
• The accuracy of the analog signal is not high when compared to the digital signal.
• It helps you to measure natural or physical values.
• Analog signal output form is like Curve, Line, or Graph, so it may not be meaningful.
e.) Characteristics of Digital Signals
Here, are essential characteristics of Digital signals
• Digital signal are continuous signals
• This type of electronic l signals can be processed and transmitted better compared
to analog signal.
• Digital signals are versatile, so it is widely used.
• The accuracy of the digital signal is better than that of the analog signal.
f.) Difference Between Analog and Digital Signal
Here are important differences between Analog and Digital Signal:
Analog Digital
An analog signal is a continuous signal that Digital signals are time separated signals
represents physical measurements. which are generated using digital
modulation.
It uses a continuous range of values that help Digital signal uses discrete 0 and 1 to
you to represent information. represent information.
Temperature sensors, FM radio signals, Computers, CDs, DVDs are some examples
Photocells, Light sensor, Resistive touch of Digital signal.
screen are examples of Analog signals.
It is suited for audio and video transmission. It is suited for Computing and digital
electronics.
Processing can be done in real-time and It never gives a guarantee that digital signal
consumes lesser bandwidth compared to a processing can be performed in real time.
digital signal.
Analog instruments usually have s scale Digital instruments never cause any kind of
which is cramped at lower end and gives observational errors.
considerable observational errors.
Analog signal doesn't offer any fixed range. Digital signal has a finite number, i.e.,0 and 1.
➢ Therefore, baud rate is always less than or equal to the bit rate but never greater.
• 20/2=10 baud/Sec
Example:
1. If there are 4 bits per baud and there are 40 pits transferred per second , what will
be the baud rate? 40/4=10 Baud/sec
2. If there are 10 baud per second and each baud contains 4 bit then what is bit rate?
10*4=40 bps
3. If there are 10 baud per second and the bit rate is 40 bps then how many signal
elements are there? 40/10=4 bits/baud.
Example:
1.) An analog signal has a bit rate of 8000 bps and a baud rate of 1000.
Then analog signal has _____ signal elements and carry _____ data elements in
each signal.
(A) 256, 8 bits (B) 128, 4 bits (C) 256, 4 bits (D) 128, 8 bits
Answer: (A)
Explanation:
• Analog signal has a bit rate of 8000 bps and a baud rate of 1000. So, each signal
will clearly carry bit rate / baud rate bits. i.e. 8000 / 1000 = 8 bits and 28 = 256
signal. So, option (A) is correct.
CHAPTER 1.4 MCQ
1.5. NOISE
➢ In computer networks, noise refers to
any unwanted or random interference
that disrupts the transmission of data
between devices. It can occur in both
wired and wireless communication
channels and can arise from various
sources, including electromagnetic
interference, signal attenuation, crosstalk, and environmental factors.
UNIT-10:
Internet of Things
Page
S.No CONTENT
No.
10.2.a Introduction to Internet of Things 1
10.2.b Characteristics: 1
10.2.c Application areas of IoT: 1
10.2.d IoT Categories 2
10.2.e Baseline technologies 2
10.2.e SENSOR 3
10.2.f ACTUATOR 5
10.2.f IOT COMPONENTS 6
10.2.g Service Oriented Architecture of IoT 7
10.2.h Challenges for IoT 8
10.2.i IOT Networking 9
10.2.j IoT identification and Data protocols 12
10.2.k IPv6 13
10.2.I MQTT 15
SMQTT
10.2.m 16
CoAP
10.2.n 16
10.2.o XMPP 17
10.2.p AMQP 18
10.2.q Connectivity Technologies 19
10.2.r Wireless Sensor Networks (WSNs): 27
TECHNOLOGIES INVOLVED IN IOT DEVELOPMENT:
10.2.1.1 INTERNET/WEB AND NETWORKING BASICS OSI MODEL 46
10.2.1.2. NETWORKING STANDARDS AND TECHNOLOGIES 46
NETWORK ACCESS AND PHYSICAL LAYER IOT
10.3.1.3 NETWORK TECHNOLOGIES 48
✓ Wearables: Wearables are devices that have sensors and software installed
which can collect data about the user which can be later used to get the insights
about the user. They must be energy efficient and small sized.
✓ Connected cars: A connected car is able to optimize its own operation,
maintenance as well as passenger’s comfort using sensors and internet
connectivity.
✓ Smart retail: Retailers can enhance the in-store experience of the customers
TEACHER'S CARE ACADEMY
using IoT. The shopkeeper can also know which items are frequently bought
together using IoT devices.
✓ Smart healthcare: People can wear the IoT devices which will collect data about
user's health. This will help users to analyze themselves and follow tailor-made
techniques to combat illness. The doctor also doesn't have to visit the patients in
order to treat them.
10.2.d IoT Categories
IOT can be classified into two categories:
1. Consumer IoT(CIOT): The Consumer IoT refers to the billions of physical personal
devices, such as smartphones, wearables, fashion items and the growing number of
smart home appliances, that are now connected to the internet, collecting and sharing
data.
✓ A Consumer IoT network typically entails few consumer devices, each of which
has a limited lifetime of several years.
✓ The common connectivity used in this kind of solutions are Bluetooth, WiFi, and
ZigBee. These technologies offer short-range communication, suitable for
applications deployed in limited spaces such as houses, or small offices.
2. industrial internet of things (IIoT): It refers to interconnected sensors, instruments,
and other devices networked together with computers' industrial applications, including
manufacturing and energy management. This connectivity allows for data collection,
exchange, and analysis, potentially facilitating improvements in productivity and
efficiency as well as another economic ben.
a) Machine-to-Machine (M2M):
• Machine-to-Machine (M2M) refers to networking of machines (or devices) for the
purpose of remote monitoring and control and data exchange.
• An M2M area network comprises of machines (or M2M nodes) which have embedded
network modules for sensing, actuation and communicating various communication
protocols can be used for M2M LAN such as ZigBee, Bluetooth, M- bus, Wireless M-
Bus etc., These protocols provide connectivity between M2M nodes within an M2M
area network.
• The communication network provides connectivity to remote M2M area networks.
www.tcaexamguide.com (95665 35080; 9786269980; 76399 67359; 93602 68118 )
3
Characteristics of Sensors
1. Range: It is the minimum and maximum value of physical variable that the sensor can
sense or measure. For example, a Resistance Temperature Detector (RTD) for the
measurement of temperature has a range of -200 to 800oC.
2. Span: It is the difference between the maximum and minimum values of input. In above
example, the span of RTD is 800 – (-200) = 1000oC.
3. Accuracy: The error in measurement is specified in terms of accuracy. It is defined as
the difference between measured value and true value. It is defined in terms of % of full
scale or % of reading.
4. Precision: It is defined as the closeness among a set of values. It is different from
accuracy.
5.Linearity: Linearity is the maximum deviation between the measured values of a
sensor from ideal curve.
6.Hysteresis: It is the difference in output when input is varied in two ways- increasing
and decreasing.
7. Resolution: It is the minimum change in input that can be sensed by the sensor.
8. Reproducibility: It is defined as the ability of sensor to produce the same output when
same input is applied.
9. Repeatability: It is defined as the ability of sensor to produce the same output every
time when the same input is applied and all the physical and measurement conditions
TEACHER'S CARE ACADEMY
kept the same including the operator, instrument, ambient conditions etc.
10. Response Time: It is generally expressed as the time at which the output reaches a
certain percentage (for instance, 95%) of its final value, in response to a step change of
the input.
Classification of sensors:
Sensors based on the power requirement sensor is classified into two types: Active
Sensors, Passive Sensors.
✓ Active Sensors: Does not need any external energy source but directly generates
an electric signal in response to the external.
✓ Example: Thermocouple, Photodiode, Piezoelectric sensor.
✓ Passive Sensors: The sensors require external power called excitation signal.
Sensors modify the excitation signal to provide output.
✓ Example: Strain gauge.
✓ Sensors based on output sensor is classified into two types: Analog Sensors,
Digital Sensors.
✓ Analog Sensors
• Analog Sensors produces a continuous output signal or voltage which is
generally proportional to the quantity being measured.
• Physical quantities such as Temperature, speed, Pressure, Displacement,
Strain etc. are all analog quantities as they tend to be continuous in nature.
• For example, the temperature of a liquid can be measured using a
thermometer or thermocouple (e.g. in geysers) which continuously
responds to temperature changes as the liquid is heated up or cooled down.
✓ Digital Sensors
• Digital Sensors produce discrete output voltages that are a digital
representation of the quantity being measured.
• Digital sensors produce a binary output signal in the form of a logic "1" or
a logic "0" ("ON" or "OFF).
• Digital signal only produces discrete (non-continuous) values, which may
be output as a signal "bit" (serial transmission), or by combing the bits to
produce a signal "byte" output (parallel transmission).
Based on type of data measured sensor is classified into two types: Scalar Sensors and
Vector Sensors.
✓ Scalar Sensors
•Scalar Sensors produce output signal or voltage which generally
proportional to the magnitude of the quantity being measured.
• Physical quantities such as temperature, color, pressure, strain, etc. are all
scalar quantities as only their magnitude is sufficient to convey an
information.
• For example, the temperature of a room can be measured using
10.2.f ACTUATOR
Actuator is a device that converts the electrical signals into the physical events or
characteristics. It takes the input from the system and gives output to the environment.
For example, motors and heaters are some of the commonly used actuators.
Types of Actuators
1. Hydraulic Actuators: Hydraulic actuators operate by the use of a fluid-filled cylinder
with a piston suspended at the centre. Commonly, hydraulic actuators produce linear
movements, and a spring is attached to one end as a part of the return motion. These
actuators are widely seen in exercise equipment such as steppers or car transport
carriers.
2. Pneumatic Actuators: Pneumatic actuators are one of the most reliable options for
machine motion. They use pressurized gases to create mechanical movement. Many
companies prefer pneumatic-powered actuators because they can make very precise
motions, especially when starting and stopping a machine. Examples of equipment that
uses pneumatic actuators include: Bus brakes, Exercise machines, Vane motors,
Pressure sensors
3.Electric Actuators: Electrical actuators, as you may have guessed, require
electricity to work. Well-known examples include electric cars, manufacturing machinery,
and robotics
equipment. Similar to pneumatic actuators, they also create precise motion as the flow
of electrical power is constant.
4.Thermal and Magnetic Actuators: Thermal and magnetic actuators usually
consist of shape memory alloys that can be heated to produce movement. The motion of
thermal or magnetic actuators often comes from the Joule effect, but it can also occur
when a coil is placed in a static magnetic field. The magnetic field causes constant motion
called the Laplace-Lorentz force. Most thermal and magnetic actuators can produce a
wide and powerful range of motion while remaining lightweight.
5.Mechanical Actuators: Some actuators are mostly mechanical, such as pulleys or
rack and pinion systems. Another mechanical force is applied, such as pulling or pushing,
and the actuator will leverage that single movement to produce the desired results. For
TEACHER'S CARE ACADEMY
instance, turning a single gear on a set of rack and pinions can mobilize an object from
point A to point B. The tugging movement applied on the pulley can bring the other side
upwards or towards the desired location.
6. Soft Actuators: Soft actuators (e.g., polymer based) are designed to handle fragile
objects like fruit harvesting in agriculture or manipulating the internal organs in
biomedicine.
They typically address challenging tasks in robotics. Soft actuators produce flexible
motion due to the integration of microscopic changes at the molecular level into a
macroscopic deformation of the actuator materials.
• Also, a user sometimes might also have an interface through which they can actively
check in on their IOT system. For example, a user has a camera installed in his house,
he might want to check the video recordings and all the feeds through a web server.
4. Interface Layer: The core responsibility of the interface layer has also simplified the
interconnection and management of things. Interface specific profile can be defined as
the subset of services that support interaction with the application used in a network
poorly designed devices, which can expose user data to theft by leaving data streams
inadequately
protected and in some cases people’s health and safety can be put at risk.
2. Privacy: The IoT creates unique challenges to privacy, many that go beyond the data
privacy issues that currently exist. Much of this stems from integrating devices into our
environments without us consciously using them. This is becoming more prevalent in
consumer devices, such as tracking devices for phones and cars as well as smart
televisions.
3. Scalability: Billions of internet-enabled devices get connected in a huge network, large
volumes of data are needed to be processed. The system that stores, analyses the data
from these IoT devices needs to be scalable.
4. Interoperability: Technological standards in most areas are still fragmented. These
technologies need to be converged. Which would help us in establishing a common
framework and the standard for the IoT devices. As the standardization process is still
lacking, interoperability of IoT with legacy devices should be considered critical. This lack
of interoperability is preventing us to move towards the vision of truly connected everyday
interoperable smart objects.
5. Bandwidth: Connectivity is a bigger challenge to the IoT than you might expect. As
the size of the IoT market grows exponentially, some experts are concerned that
bandwidth- intensive IoT applications such as video streaming will soon struggle for
space on the IoT’s
current server-client model.
6. Standards: Lack of standards and documented best practices have a greater impact
than just limiting the potential of IoT devices. Without standards to guide manufacturers,
developers sometimes design products that operate in disruptive ways on the Internet
without much regard to their impact. If poorly designed and configured, such devices can
have negative consequences for the networking resources they connect to and the
broader Internet.
7. Regulation: The lack of strong IoT regulations is a big part of why the IoT remains a
severe security risk, and the problem is likely to get worse as the potential attack surface
expands to include ever more crucial devices. When medical devices, cars and children’s
toys are all connected to the Internet, it’s not hard to imagine many potential disaster
scenarios unfolding in the absence of sufficient regulation.
remote anchor point instead of channelling their packets through the router
which is achieved by using tunnelling protocols such as IKEv2:internet key
exchange version 2
➢ Multihoming
• Multihoming is the practice of connecting a host or a computer network to
more than one network. This can be done in order to increase reliability or
performance or to reduce cost. There are several different ways to perform
TEACHER'S CARE ACADEMY
multihoming.
➢ Host multihoming: A single host may be connected to multiple networks. For
example, a mobile phone might be simultaneously connected to a WiFi network
and a 3G network, and a desktop computer might be connected to both a home
network and a VPN. A multihomed host usually is assigned multiple addresses,
one per connected network.
➢ Classical multihoming: In classical multihoming a network is connected to
multiple providers, and uses its own range of addresses (typically from a Provider
Independent (PI) range). The network's edge routers communicate with the
providers using a dynamic routing protocol, typically BGP, which announces the
network's address range to all providers. If one of the links fails, the dynamic
routing protocol recognizes the failure within seconds or minutes, and reconfigures
its routing tables to use the remaining links, transparently to the hosts.
➢ Multihoming with multiple addresses: In this approach, the network is
connected to multiple providers, and assigned multiple address ranges, one for
each provider. Hosts are assigned multiple addresses, one for each provider.
➢ Deviation from regular Web
It is used in non-
constrained network
Function or It is used in constrained network having having no limits on
application low power, low bandwidth and low memory power/BW/memory.
requirements.
It will have MAC layer as per IoT wireless It will have MAC layer
technology used viz. bluetooth, zigbee, as per LAN or WLAN or
Datalink or zwave etc. It takes care of medium access DSL or ISDN
MAC layer control and resource allocation and technologies.
management.
Physical layer It will have physical layer (baseband) as It will have PHY layer
and Radio per IoT wireless technologies viz. as per LAN or WLAN or
Frequency bluetooth, zigbee, zwave etc. It uses DSL or ISDN
(RF) layer frequencies as per cellular or indoor technologies.
wireless technologies and country wide
allocations for the same.
TEACHER'S CARE ACADEMY
Characteristics of IPv4
• IPv4 could be a 32-Bit IP Address.
• IPv4 could be a numeric address, and its bits are separated by a dot.
• The number of header fields is twelve and the length of the header field is twenty.
• It has Unicast, broadcast, and multicast style of addresses.
• IPv4 supports VLSM (Virtual Length Subnet Mask).
• IPv4 uses the Post Address Resolution Protocol to map to the MAC address.
• RIP may be a routing protocol supported by the routed daemon.
• Networks ought to be designed either manually or with DHCP.
• Packet fragmentation permits from routers and causing host.
✓ Version: This field indicates the version number of the IP packet so that the
revised version can be distinguished from the previous version. The current IP
version is 4.
✓ Internet Header Length (IIHL): It specifies the length of the IP header in unit 32
bits. In case of no option present in the IP header, IHL will have a value of 5. So,
if the value of IHL is more than 5 then the length of the option field can be easily
calculated.
10.2.k IPv6
• Internet Protocol version 6 (IPv6) is also known as Internet Protocol next
generation (IPng). It also accommodates more feature to meet the global
requirement of growing Internet.
✓ Version: This field is 4 bits long and it defines the version of the IP packet. The value
of it for IPv6 is 6 and IPv4 its value is 4. During the transition period from IPv4 to IPv6,
the routers will be able to distinguish the two versions of the IP packets.
✓ Traffic Class: This field is 20 bits long and it is used to distinguish between the
different requirements for real-time delivery services.
✓ Flow Label: This field is 20 bits long and it is used to allow the source and destination
nodes to set up a pseudo connection with particular properties and requirements. It
is designed to provide special handling of a particular flow of data.
✓ Payload Length: It is of 2 bytes length and signifies the number of bytes that follow
the 40 bytes base header. It is the length of the IP datagram excluding the base
header.
✓ Next Header: This field is of 1 bye length and it defines one of the extension headers
that follow the base header. The extension headers also contain this field to indicate
the next header. if this is the last IP header then Next header field tells which of the
transport protocols (TCP or UDP) the packet is to be passed.
✓ Hop Limit: This field contains 1 byte and it signifies the maximum number of hops a
packet can travel. The time to live field in the IPv4 header did the same task, except
that in IPv4 it was counted in time and in IPv6 it is counted in terms of the number of
routers.
✓ Source Address: It is 16 bytes long and contains the IP address of the source
machine to the network interface.
✓ Destination Address: It is 16 bytes long and usually contains the IP address of
the ultimate destination machine to the network interface. In case of specific
routing, it may contain the IP address of the next router.