0% found this document useful (0 votes)
104 views

Unit 1 FIOT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
104 views

Unit 1 FIOT

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 28
| | i f FUNDAMENTALS OF INTERNET OF THINGS LINTU-HYDERABap, ee (PARTIR) essay questions wiTH SOLUTIONS 1.1 INTRODUCTION TO INTERNET OF THINGS, CHARACTERISTICS OF loT Q9. Define loT. Write in brief about the lo, Answer < ‘ToT can be defined as the method that allows internetworked devices and applications to communicate with each othe, Examples of it are GPS based tracking, monitoring and controlling of devices, connected cars, wearable and personal devices ‘communication, M2M communication and Industry 4.0. Model Papert, cay The Internet isa global network of servers, tablets, mobijes and computers. It follows a set of standard protocols develope for connected systems. It allows to communicate (send, receive and connect) with remote servers, analytics platforms and cloug A thing in English persists various meanings and uses. In dictionary, itis defined as a physical object, an activity or sity. ation, an action or idea ete, Examples of it are a table, chair, streetlight etc. These are the things as objects where as reference ty ‘an action “Such a thing is not expected from her” and reference to a situation “such things are multiple in that region The Internet of things from some other source is defined as the network of physical objects or things including sensors, software, electronics, operators etc, It is defined as vision in which the things become smart and function such as computing, communicating using embedded devices with remote objects or persons or NFC (Neat Field Communication) etc. Vision means making the things smart, intelligent and behave like alive. Q10. List out the entities that provide diverse technology environment and entities considered for five levels behind loT system. Answer ‘The entities that provide a diverse technology environment are examples of technologies. They are also involved in IoT. Software (RIOT OS, Contiki OS, Things square Mist firmware, Eclipse IoT), Integrated Development Environment (IDE) to develop device software, firmware and API's. Communication (NFC, ZigBee, WiMax, 2G/3G/4G, Power Ethernet, RFID, 6LowPAN, UWB. WiFi). XDK110, Intel Edison and Arduino eee e Hardware (ARM mBed, Intel Galileo, Beagle Bone Black, Wireless SoC, Bost Raspberry Pi) Network backbone (IPv4, IPv6, 6LowPAN and UDP). Protocols (HTTP, XMPP, CoAP, RPL, RESTful, MQTT). ° % _ Intemetwork Cloud Platforms/Data Centre (Nimbits, Xively, AWS IoT, IBM BlueMix, Sense, Azure, Thingwors, Open, HAB, CISCO IoT, TCS CUP, lox and Fog). ‘ Machine learning algorithms and software. Example of machine learning software is GRoK of Numenta Inc. It uses the machine intelligence for analyziig the streaming data from clouds, exposing the anomalies. Itcan learn from data and can extract action from GROK’s data models output. It can even perform high level of automa- tion to analyze the streaming data. ‘The entities that are considered for the five levels behind loT system are as follows, Sever and web programming to enable web applications and web services. Cloud platform enabling storage, product development platforms and computing prototype. Device platform that contains device hardware and software to use a microcontroller and software for device APs and web applications. 4, Online transaction processing, predictive analytics, data analytics, online analytics processing and nv that enables wider applications of loT system, Ieee ea ne eae 5. Connecting and networking (Connectivity protocols and circuits) for enabling the internetworki i : ig the internetworking of ica ‘objects such as things and for enabling internet connectivity to remote servers, ae iS ie nd technology? Discuss the Control Units : .d Technology ‘The servers of OT are data centres, databases, enterprise ‘and application servers, They provide var emnpaments Wh AE AS follows, software ‘gata gathering, organizing, analysing, integrator and identification ‘g _ Online platforms. Device identification, management and access manage- ment. ‘g _ Usage of services, business processes and applications. Major Components of ToT System ‘The four major components of lof devices are as follows, 1, Software tis used for actions on messages, data and commands ‘which the devices will receive and generate to the ac- fuators with the actions like robotic hand movement, slowing LED's etc. 2. Hardware It indicates components like microcontroller, control nit, fimmvare, sensors and communication module. 3. _ Physical Object Itrefers to embedding the software into the hardware. 4. Communication Module Itisa software that has device API's and device interface sed for the communication over network circuil/ports and middleware to build communication stacks through CoAP, IPv4, IPv6, 6LOWPAN and LwM2M ete ‘The other components of the JoT system are as follows, Sensors and Control Units 1. Sensors “The sensors are the electronic devices that are capable ‘of sensing the physical environments. They are used in control systems where smart sensors are used in robotic system and industrial automation system. A smart sensor, contains communication and computing circuits. A sen- sor ean measure the temperature, humidity, acceleration in accelerometer, magnetic fields in compass etc, There are two types of’sensors, one provides analog {inputs to control unit. The Hall sensor, photoconductor, photo gauge and thermistor are the examples of it. The ai ‘other type of sensor provides digital inputs to the control © it. Examples of it are touch sensor, traffic presence ‘sensor, metal sensor etc The control units of oT have Microcontroller Unit (MCU) oF custom clip embedded in them. The MCU consists of firmware, functional 1/0 units, processor, memory, interrupt eontrollers and application specific functional circuits. The MCU for example might contain Pulse Width Modulators (PWM) arid Analog to Digital Converters (ADC). Operating Systems The operating systems used in foT are Altfoyn, Contiki, Spark, Raspbian and RIOT. The AllJoyn is an open source cross platform that contains API's for OSX, Windows Operating Systems, Android, 108 and Linux: Contiki is an open source multitasking OS containing UDP, DTLS, 6LoWPAN, TCP/IP and RPL protocols. Spark is a web based IDE distributed and cloud based OS. The Raspbian is the Raspberry Pi operating system that depends upon Debian distribution of Linux. The RIOT s an OS that has support for multiple architectures and developer. Middleware ‘The open oT’is an open source middleware that allows to communicate with cloud based “Sensing as service’ and senior clouds. It provides communication stack for smart devices through OBM, CoAP, 6LoWPAN, IPv6 multiple standards and protocols. Firmware ‘An example of middleware is things square used for true t-connectivity to JOT. It is supported by various microcontrollers witha set of wireless radios. Itsupports bly. wireless mesh networking fle 12. What are the main challenges of Internet of Answer # Things (loT)? Mode! Papers, 2(a) ‘Some of the main challenges of Internet of Things (IT) are as follows, | SPECTRUM ALLIN-ONE JOURNAL FOR ENGINEERING STUDENTS Security Security is considered as one of the major challenges in oT. As the number of connected devices increased, the chances of security vulnerabilities will also increase. The data stored in loT devices could be corresponding to user privacy identity. Thus, itis required to protect the data in the devices else it can be prone to hacking and various attacks, Although it is expensive to provide security in every IoT device, it must be required to secure the user data on the devices, sp = FUNDAMENTALS OF INTERNET OF THINGS LUNTU-HYDERAB An, * The loT devices require good standards and best practices in order to work effectively. The lack of standards may Feu consequences such as poorly designed products, These inturn results in networking issues. So, implementation gy Standardization is requited to develop a good connected device. 3% Privacy {tis an important issue in the Internet of Things, The IoT devices consists of sensitive information of users such a ny address, DOB, health card details, credit eard information etc, So, there is a possibility of information leak while tray ‘mitting the data to a cloud for processing through unauthorized access or third party. This issue needs to be resolved , Safeguard personal data or private information stored by users on a connected device. 4. Regulation InlT, there are regulatory and legal issues which are need to be considered. The lack of regulation may results in interme, ‘elated issues. If these issues exists then there will be effect on the quality of service. Q13._ What kind of information do Internet of Things (loT) objects communicate? Answer : Model Papers, ca The type of information that loT objects communicate is based upon the nature ofthe respective objects. Some times, the information can be easy and same times complex. Consider an examplé of a smart thermometer, It consists of one effective sen. sor that is used to provide temperature to the remote weather - monitoring center or system. Whereas a wireless clinical device ‘consists of multiple sensors to provide information about the body temperature, body pulse, blood stress et., toa medical service company withthe help of smart phone or a computer. s Smart objects can build the systems that are connected with the system and informs the fats and a set of:instructions. This {ype of communication allows to use the smart systems everywhere. The smart systems allgws the user to handle the processes from the remote areas. Consider an example of smart home system. This system is used to control and monitor the home appli- ances, computers, cameras, TV's etc, from remote areas. In this system, the objects communicate complex information in order 10 provide the functionality. Q14. What are the major privacy and security Issues in Internet of Things (IoT)? Answer Model Papers, a2(5) Privacy Issues of loT The major privacy issues incase of IoT are as follows, 1. Eavesdropping Generally, the connected devices help the hacker to monitor the home ofa user virtually. The R&D team of Germany has achieved this by stopping the unencrypted data sent from a smart meter device to know what TV program a particular user is watching ata particular time, 2. Too Much Data The amount of data generated by IoT devices per day is lage. According to a research done by a Federal Trade commis sion, itis known that approximately 150 million discrete data points are generated by less than 10,000 users a day. This, they can have more number of entry points to theft the sensitive data. Unwanted Public Profile ‘Generally, most ofthe users agcepts the "terms and conditions” provided while installing an application in an ToT devi, ‘without going through the complete details. This means that, the user himselfIherself granting the permission to acces their data 4. Consumer Confidence Allthe above mentioned issues will erate a depression on consumer's confidence which may lead to avoiding the Ine of Things (JoT) from its original capacity or capability. | WARNING: XerovPholtopig ofa book CRIMINAL act Anyone found gui fs LIABLEt face LEGAL proceedings. aY Fesuh, oh Boo je trans. slved 19 4.0240) es, the . This appli- order RE ae Sealy ower oF FT cloud based application backends, Other than tis, they ean work on certain tasks in local and sor {pending on the constrains such as communication processing/memory capabilities, speed etc, Data can be exchanged between Tot and other devices or applications, The figure depicts the block diagram of an 1oT deviee. Jasues in fo are as flows, ‘True security meas other shan securing the orig ers should develop the security ina the applic Security Apainst Attackers According tasurvey cond ming $000 companies, ts known that percent companies re ed tpaevelop ToT devies wheres only 10 percent of them are ready to develop 10 devien wits teary ngans stacker PutliePerception tl evlepiog an plain ev ws well as the network devices that are 1s : Public perception is one ofthe main security issues of Io: Aecording to Leontrol state ofthe smart home study (2015). 44 percent of American users are worried about losing of information through their smart home devices and27%q of American {ers are worried about the thet of information, This makes some of the users not to buy the loT devices, Vulnerability to Hacking “The researchers are easily entering into on-the-market and real devices with their enough energy and time. Thus, they are capable of duplicating their efforts, 1.2. PHYSICAL DESIGN OF loT ‘15, Illustrate the importance of things in loT with a block diagram of its physical design. Answer Things” in loT are refered to the IoT devices with unique identifications. They tend to possess the capabilities such as sensing, actuating and monitoring ‘The loT devices are also capable of extracting, processing and sending data from other deviees to centralized servers oF e ther tasks in LoT infrastructure ieee Connectiv H USB Host NAND/NOR RU4S/Ethernet DDRUDDR2DDR3 Processor Graphics ‘ cpu PU ¥ Audio/Video Inter Storage Interfaces * HDMI SD 3.5 mmaudio MMC RCA video DIO VO Interfaces (for sensors, actuator etc.) UART 2c SDI CAN” Figure; Block Diagram of an loT Devico LS OF INTERNET OF THINGS TINTUHYDERAGAG, feviees connected over wired and FUNDAMENTAI 8 various interfaces to connect with other ess ‘The above figure conte i ‘They consists of the following, (VO interface for sensors (Gi). Interfaces for internet connectivity Gili) AudioVideo interfices (iv) Memory and storage interfaces, Initially, the ToT device gathers different types of data from the sen data is used in the data communication among various devices or cloud-based se role in allowing the connected sensors to communicate with other physical enti different types of loT devices such as wearable sensors, smart watches, LED lights, automobiles are depicted inthe below figure. sors which are on-board ot attached externally. This Wed servers/storage. The actuators play an importny ies available in the scope of devices. There are ind industrial machines. These - JoT Devices] : | | | | | | | ¥ | | - Hone _][Searehones] Wearable te | TL Tedd Jf Aesth [Surin and Automotites Payment |} Printers ae one snliances |! computers {| Elestronies systems |] Systeme Machines |] systems _}|_& . Figure: Types of loT Devices Alltypes of devices listed in the above figure produce data that is processed by data analytics systems and help in taking ‘appropriate actions that are to be performed locally or remotely. For example, the data generated by a sphygmomanometer helps * in determining the blood pressure levels of the patient when processed. Q16. Explain different types of protocols of loT. Answer : There are four types of protocols available in loT, They are a follows, ToT Protocols ee rc Application Layer ‘Transport Layer. Network Layer, Link Layer HTTP 802.3 Ethernet ate ep UDP_—IPv4._IPy6. 6LoWPAN 802.16 WiMAX j MQTT 802.11 WiFi | ‘XMPP 802.15.4 LR-WPAN | DDS i SG/LTE Cellular ; AMQP ‘WebSockets 1. Link Layer Link layer protocols illustrate the process of transmitting data over physical layer of the network. The vicinity ofthis network ‘would be the network connection that is locally integrated and the host is connected, Multiple hosts on a link can exchange dat packets through link layer protocols. Moredver, the link layer instructs the process of coding and signaling the packets through? hardware device on a medium connected to host, Different types of link layer protocols are as follows, WARNING: ‘orox/Photocopying of tis book i'a CRMHNIAL act. Anyone found Ally is LIABLE to face LEGAL proceedings, a =< —____ ‘This protocol offers various wired Ethernet standards forthe link layer. For example, the standards such as 802.3. 802.3 ‘and 802.30¢ are associated with OBASE-T, !OBASE-F and 10 Ghits respectively over different mediums. All these stan- dards offer data rates ranging from 10 Mbps to 40 Gbps and even higher than this. @ sew, This protocol offers communication standards related to WLAN along with additional information about the link layer. For example, the standards such as 802.1], 802.116/802.11, 802.1 1n, 802, Tae and 802.11ad tend to operate in 5 GHz, 2.4 GHe, 2.45 GHz, 5 GHz and 60 GHz respectively. All these standards offer the data rates ranging from | Mbps to 6.75 Gbps. (w 02.16 WiMax ‘This protocol offers broadband standards that are wireless along with additional information related tothe link layer. These standards offer data rates ranging from 1.5 Mbps to 1 Gbps, © 302.154 LR-WPAN This protocol offers standards that provide low-cost wireless personal area networks. These standards act as the building blocks of high level communication protocols like Zigbee. These standards offer data rates ranging from 40 kbps to 250 tps. (9) 2G3GH4G Mobile Communication ‘The mobile communication is classified based on different generations such as 2G, 3G, 4G ete. They help the IoT devices in providing communication medium over cellular networks. These standards offer data rates ranging from 9.6 Kbps to * 400 Mbps. 2. Network/Internet Layer ‘The network layer protocol is used for the transmission of IP datagrams between source and destination networks. It offers various functions Such as packet routing and host addressing. The IP datagrams hold addresses of source as well as destination ‘where the host can be located through addressing schemes such as IPv4 or IPV6. @ rvs The IPV4 header contains a number of words including 160-bits and optional extended words (ie., n - 5). Extension is, required to perform certain actions by using the data stack from or for the transport layer. Features of IPv4 1, IPVv4 header contains five words of size 160-bits and two additional words called option and padding words of variable * size. These extended words are used only when they required. The maximum number of words that the data stack sends to the network layer is, v= (n + len) where, v < (2!*—n).. 2. The fourth and fifth words in header are known as source address and destination address. Only a single data packet can communicate in one direction at a time. 4:2 The data stack in a IP layer is known as “IP Packet”, When UDP is used as transport layer protocol, the IP packet has ‘no assurance in reaching the target. When TCP is used as transport layer protocol, the IP packet is assured to reach the destination/target. 5. ‘The transmission in Internet protocol layer is half duplex unacknowledged about the data flow from an internet layer to ‘ther internet layer at two different ends. a Ee 1,10 FUNDAMENTALS OF INTERNET OF THINGS [JNTU-HYDERARag, a @ Iev6 4 ‘ PVG was developed and desigied to overcome the liititions oF 1Pv4, Features of IPV6 ‘The features of IPV6 are as follows, 1, Teprovides huge addressing space, 2. handles security, mobility and configuration characteristics of a device. 3. Itprovides extra optimizations to deliver the services with the help of subnets, routers and interfaces. 4. Itprovides jumbo grams (i., big size datagrams). S. _Itprovides the extensibility of options 6. Itallows route aggregation over the intemet hierarchal address allocation. It restricts the expansion of routing tables 7. uses the expanded and simple versions of multicast addressing. (i) 6LowPAN SLoWPAN is the abbreviation of Internet Protocol version 6 over Low Power Wireless Personal Area Network. Itis used, by data stack at adaptation layer before transferring tothe IPV6 intemet layer. The 6LOWPAN interface serial port is used in IEEE 802.15.4 WPAN devices for connectivity. The IEEE 802.15.4 devices are the nodes with low power and speed, They use 6LoWPAN as an adaptation-layer protocol. These devices are known as the WPAN nodes of multiple device mesh network. The devices with low power are required to restrict the data size. Fragmentation and data compression are used to reduce the size ofthe data. Reassembly, header compression and fragmentation are some of the important features of 6LoWPAN. Ifthe fragmentation of data is done prior to the communication process, then a fragment header contains 27-bits in which datagram is of size 11-bits and datagram tags of size 16-bits are included. The fragment comprises of header 8-bits that contains datagram size, datagram tag and offset. The reassembly time limit of fragment is set to 60 seconds. 3. Transport Layer ‘The transport layer protocol is responsible for the transmission of messages from one end to the other end without the ‘concer of underlying network. This layer offers various functions sich as flow, congestion and erfor controls. Different types of transport layer protocols are as follows, ® TCP TCP is a connection oriented and most commonly used protocol in the transport layer. It is mainly used by the transport Jayer when the receiver accepts the data segment sequence number and sends back the remaining data segment sequence ‘numbers to the receiver. TCP can also be used to process the data segment from application layer port and transfers only the segment part. In a TCP stream, the size of the data to be transmitted depends on the network traffic. If the traffic is high, few data packets are sent to the receiver-end of the Intermet layer L3, ‘ UDP ‘ ‘The Universal Datagram Protocol (UDP) is used for unacknowledged data flow from the receiver and the applictios datagram needs to transfer data over the internet and when the datagram size is limited to 2*bytes; Here, datagram refes toa message which does not have any relation with the preceding and succeeding messages. 4, Application Layer For answer refer Unit-l, QI7. WARNING: xerx/Photocopyig on bok a CRIMINAL ae Kner found gully LIABLE i foes LEGAL proceacings ppuiention Layer © Application layer protocols are used for interfacing between applic ions and low layer protocols to offer exchange of am over the network. They allow process-l-process communication through ports. Some of the application layer protocols are ss follows i arr Hypertext Transfer Protocol (HTTP) is used by Web browsers and Web servers to communicate with one another(default number is 80). Universal Resource Locator(URL) is the way representing an address of a system. The URL can be in string forn(ike www.yahoo.com) or in the number format(like 122.120.1.8) Clients ean use the URL. to contact the server. By issuing ge HTTP GET command the Web bre wser can inform the server of what data it want ike text, images etc thsi called setting [MIMB(Multiple Internet Mail Extension) type) HTTPS When HTTP is taken over SSL, HTTPS is obtained. It is nothing but the combination of HTTP and SSL. The HTTPS semployed inorder to have a secure communication between web browser and a web-server. All contemporary web browsers incorporate HTTPS and it operates based upon web-server that substantiates HTTPS communication. ‘The basic difference noticed by the web-browser user is that the URL. i.e., Uniform Resource Locator address is initiated swith hips:/ but not with http. The usual port utilized for HTTP connection is port 80 but shen HTTPS is specified, the port sed is 443 which activates the SSL. a : FIP (File Transfer Protocol) is used to access files by FIP. FTP is a standard internet protocol through which internet users ‘can upload files from their computers to a website or download files from a website to their PCs. TELNET ‘The TELNET protocol is used to create connection between two remote machines. It is used on the internet or local area networks to provide a 2-way (bidirectional) interactive text-oriented communication facility between a client and a host using a virtual terminal connection. Other Ports The familiar port numbers are reserved by Internet Number Assigned Authority (IANA), The port numbers range between 10 1023. Here, the number ‘0’ indicates that it is the host by itself, The registered port numbers ranges from 1024 to 49,151 and the unregistered port numbers ranges from 49,152 to 65,535. The port number of an unregistered server is above 5000. Constrained Application Protocol (CoAP) Constrained application protocol is a web transfer protocol which is specifically designed to fulfil the requirements of ‘onstrained devices. It runs on devices that support UDP protocol. Since CoAP is a web transfer protocol it depends on REST{ul architecture, This architecture provides request/response interaction between the endpoints ofapplication. I is mainly developed for loT and M2M applications for sending messages over UDP protocol, It employs client-server communication model. Initially client sends request to the server and then server sends Tesponse to the client, However, CoAP is more essential for constrained devices because triditional protocols like HTTP are too ‘heavy for IoT applications,” ee spectrum aLiN-OME JOURNAL FOR ENGINEERING STUDENTS © ee 1.12 FUNDAMENTALS OF INTERNET OF THINGS LUNTU-HYDERABAn, a MQrT MOTT stands for Message Queuing Telemetry Transport protocol It is an open source protacol used for machine toy. chine ot 1oT connectivity, This protocol was initially developed by IBM who later donated itt "M2M' Pao pr MQTT v3.1.1 and MQTT'SN v1.2 are the versions of MOTT OF eclipye MOTTSN v1_2is used by sensor networks and non TCP/IP networks. It allows expansion of MOTT protocols for wire, ‘sensor networks, Sensor and actuator devices and their networks, AMQP, ‘The Advanced Message Queuing Protocol (AMQP) isan open standard which communicates between applications throug, messages, Instead of device management AMQP is placed around message management, Advanced Message Queuing Protoca, (AMQP) defines three architectures, They are, 1, AMQP command architecture 2 AMOP tansport architecture 3._AMQP client architecture. Q18. Which of the devices are used to connect loT devices to a home network? Answer : Model Paper, 03s) ‘The cloud devices that are used to connect loT devices to a home network are as follows, 1. Cloud server 2. Home gateway. 1. Cloud Server ‘The cloud server consists of IP address of public network. It provides various services tothe client whenever required and ‘controls the system remotely. It acts as a medium between the home gateway and the control terminal for exchanging the data when the devices are handled by the user with the help of internet, 2. Home Gateway Home gateway is considered as a control center for the smart home system. Generally, most of the users consider it as a small server because it provides services such as adding/deleting data, device status and controlling device actions. It is also used to handle the daily work of a controlled device. It provides the instructions to controlled devices and receives the present status for managing the devices. Some times, it acts as a client for the cloud server to request for some cloud services. ‘Smartphone PAD Cloud Server ZigBee | Controlled ‘equipment 3G/4G Ethernet | WiFi Environment Monitoring Equipment Infrared Smart PC PAD ‘Transponder phone Figure: Design Diagram of Smart Home System § WARNING: xeroxPhotocoying oi beoks 8 CRIMINAL act Anyne found guilty LABLE to face LEGAL proceedings 1.13 ‘The examples of 107% include various wearable devices like sleep monitors, watches, fitness trackers and heart monitors _yarious devices of such type are produced by Garmin, Fibit and other companies ‘Wearable Smart Watches x 4 ‘The examples of wearable watches depending upon 1oT concept are as follows, (Apple Watch ‘The Apple ismartwatch contains certain applications like health and fitness, Nike, Running to track morning ot evening sans ee Ithas the following features, Updating names and emails Measuring heart rate Allowing to run music while exploring through parks without using phone “Allowing chat with others e Making payments through payment wallets Finding and tracking a taxi e444 44 4% Controling Apple TV. (i Microsoft Wrist Band 2 “The Microsoft wrist band 2 provides the following features, 4 _Ithelps in productivity through message notifications, calendar and email & tis compatible with iOS devices, Windows and Android devices. 4 Itinctudes sensors, such as GPS, UV, 3-axis accelerometer, optical heart rate, gyrometer, ambient light, galvanic skin response skin temperature and Barometer. (Gi Samsung Galaxy Gear Smartwatch The Samsung Galaxy Gear Smartwatch provides the following features, It includes GPS It eontains WiFi and Bluetooth connectivity options and navigational features like assist walking, Ithas two inch curved display and supports calling as well as messaging. es 8 8 The S Health App will measure the heart rate and the UV will monitor and inform the user about the food time, resting time etc. 2 Smart Home ‘A smart home'can be managed by the sensors and actuators through internet connection. The wired and wireless sensors sre embeded into cameras, smart plugs, enteriainment systems, lights thermostats and security sensors. The actuators and Do-i Youself (DIY) sensors contain smoke detector, energy meter interface, reinote control, surveillance camera, HUE LED lights, lectric utility meter etc. 3. Smart Cities ‘altro The concept of lo? is applied on Internet of everything inorder to develop smartcities. fd > SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS ” OF INTERNET OF 114 FUNDAMENTALS 3 FUNCTIONAL BLOCKS OF oT 020. Discuss in brief about the functional blocks of f0T- ei Paes, Answer + Functional blocks of lohelps in sensing, communicating a! tional blocks of an loT device are illustated in the below fie, unig, identifying and managing the TOT 8m. The Device [Communication Management| =| Secu ‘Application Figure: Funetiona Blocks of oT Device The devices ofl are reeponsible for petforming various functions such as sensing, monitoring, contol and actuation 2 Communication ‘The communication block i responsible for handling the communication in an ToT system, 3 Management “The management block is responsible for performing different functions that help in guiding the JOT system, 4 Services An oT system makes use of various services of oT to monitor and coitrol the device, publish data and discover the device Security “The security functional block is responsible for providing security to ToT system through various security functions such as authentication, authorization, data security, content and message imtegrily 6 Application ‘The applications of 1oT are responsible for providing an interface through which users gain control as well as monitor different aspects of 1oT systems. They also allow to observe the system status and processed data. 1.4 SENSING, ACTUATION Q21. Explain about sensor technology and list some examples of sensors. i Answer + Model Papers, ‘Sensor Technology Sensor technology plays akey role in designing the sensors and respective circuits, electronic readers and devices. A sense isan electronic device that receives signal and responds with an electrical signal A sensor can sense different parameters like, 1 Physi 2, Acceleration, speed, orientation, angle tc. 3. Amierophone ean sense the change in the sound and also used to record the sound (like music or voice) ‘These parameters can be sensed andl converted into electrical energy I parameters such as light, metal, energy, heat, smoke, pressure, A sensor consists of electronic circuit connected tothe input which is used to receive the output of the sensor that scconiace wit the chang ith pial condition, Asmat ear a sensor conse of lente ee computing and communication capabilities. Analog Sensor i used to compute the changes in the parameters on the tae aft reference ora condition and resus the Valeo! the sensed parameter afer some appropiate calculations In igtal ance changes inthe parameters with respect toa reference or contin canbe represented inthe form of Os ead fo WARHING:xorouPhotocopyig of tis book 0 CRIMINAL oc Anyone ound gully is LABLE te ace LEGAL proceedings. AA Taal sibladideaai es TO J of percents inthe ar at 2, bieht ‘A photocon (On the othe 3. Accelerat A Micro-B vy. with th 4 Vibration AMEMS piezoelect ‘Angular AGyrosec acceletom 6 LIDAR LIDAR ( sensing a laser light Q22. Explain Asensor the change in th Analog Sensors Analog s ‘according to the of the sensing o pressure inerea inch or 4.5 inch sensing resistor ‘The ana @ Initially, i) The ou Gi) ADC pr (iv) By usin conditio 1,15 “The different examples of sensors are as follows, Humidity Sensor ‘Humidity sensor also known as hygrometer is used to sense and measure the water vapours or moisture in the air in terms ‘ofpercentages. The relative humility is the ratio of water vapours in the air to the highest possible content of water vapours {nthe air at a particular temperature, The humility above 90% indicates that it is rainy day. 2 Light A photoconducter is used to sense the intensity of the light. The sensor displays a drop in resistance with the nearby light. On the other hand, the psn junetion photodiode or photo transistor is also used to measure the intensity of the light. 4. Acceleration [A Micro-Electro-Mechanical Sesnsor (MEMS) is used to measure the linear acceleration a, ya, across the three axes x, ‘y,= with the help of capacitive change in the axes. Bq. 4 Vibrations and Shocks ‘A MEMS can also be used to sense and measure the vibrations and shocks by the variations that occurred due to the piezoelectric effect Angular Acceleration and Change in Direction (Angle) ‘A Gyroscope is used to sense and measure the change/variation in the angular velocity i.c., angular acceleration and change/ variation in the direction (ie., angle). An application is used to read the measurements with the help of a gyroscope oF accelerometer and the system starts computing as programmed. 6 LIDAR LIDAR (Laser Imaging, Detection and Ranging) sensors and Laser 3D imaging technology is used to turn on the remote sensing and imaging. It detects the distance by focusing the laser light on target. The sensor is used to sense the reflected laser light that enables the measurement of distance. (022. Explain the concept of sensing the real world. ‘Answer + ‘Sensing the Real World For answer refer Unit-l, Q21, Topic: Sensor Technology: ‘A sensor is used to sense a physical change when it exposes a measurable change in a characteristic circuit parameters on the change inthe surrounding, physical state on a condition ‘Analog Sensors ‘Analog sensor makes use of sensor with the respected electronic analog circuit. It is used to produce the analog outputs sccording to the physical environmental parameters like pressure, temperature, humidity, proximity or magnetic field. The resistance ofthe sensing component results a small change depending on the physical environmental variables, pressure or strain ete, I the pressure increases on a pressure sensor then the strain on the sensor will be increased, For example, a flex sensor of length 2.2 {inch oF 45 inch shows results the change in resistance across the sensor trip because of the change in path and deflection of the sensing resistor ° “The analog output from a sensor circuit can be measured as given below, (®) Initially, the sensor output is sent to signal conditioning-cum-amplifying circuit (SC) as an input. (i) The output of SC will be sent to ADC as an input Gil) ADC produces the digital output in the form of 8 or 12 bits which can be read using the microcontrollers. (Gy) By using the microcontroller readings and computations, it produces the sensed! parameter value and displays the physical Condition ofthe sensor at surroundings. © SpecTRUM ALLIN-ONE JOURNAL FOR ENGINEERING STUDENTS agewen oe 116. FUNDAMENTALS OF INTERNET OF THINGS UINTU.HYDERa, <<. _———_$——rerrrrrrevveag _The main advantage of seria Port interface with ADC is that the ADC 8 or 10 or 12 bit of output will be sent as inp ‘othe inerfce andthe interface provides the uo the serial port at microcontroller. Analog to Digital Converter Wisan analog sensor circuit that is. ‘connected to a signal conditioner amplifier and then to an Analog to (ADC), al Coen impling ADC Sampling isa process that an ADCs used to ‘ccep the input signals in particular periodic intervals and converting them digits. Here, thei Will be provided according to the signal frequency and other requirements, There are many application STADE suc as, the sampling ADC receives the Signals fom microphone forthe recording sensor while recording a misc» voice Signal Conditioning Amplifier ‘ Signal codditioning amplifier is used to amplify a signal at input and also fo add or subtract the offset voltage in such, ay thatthe minimum V, (min) shoud be 0 V andthe maxignun Vga, (max) should be V,,. at the outputs of SC. Digital Sensors (digital sensors a sensor with the respected electronic cteuit or ‘component that produces the digital output of 0's an 1s (in inary form) or 1 and 0, The output can be read ‘sing ports in a microcontroller, This circuit helps in sensing the chang in the physical state or condition or change in the set of physical states and conditions. Sensing of an On-Off State The digital ouput of on-of stat detection requires a number of Conditions Itrequires a circuit or microcontroller to read ‘De-output. There are many applications tat use sensing ofan omoff stat. Examples © Sensing the filing of water in a water tank and prov iding an emergeney alert (i) Sensing of petro! filling in the Vehicle tank (ii) Sensing the traffic ina specific street 925. Write about network of networks of sensors and actuators, Answer : For answer refer Unit-ll, Q16. 924. Explain the concept of participatory sensing. Answer : In the process of participatory sensing, a participant could be sexsors employed in mobile phones. Mobile phones incluie “arious Sensors such ab camera, temperature and humidity sensors, an accelerometer, Compass, infrared sensors, NFC sensor, ‘microphone, bar or QR code readers ant GPS. Mobiles interact over the internet Using sensed information associated with tine, date and location stamps Various applications of pancipatory sensing aré data collection regarding weather, ‘management, Italso includes data about oad faults, urban mobility trafic congestion, group of people and disaster management like flood, fire and so on, Pollution, environment, waste health concemed to individuals as wel WARNING: Xerox/Protocopig ofthis book 8 CRIMINAL ac Anne found pity ABLE to face LEGAL proceedings ynit-1 The se (Security (ii). Privacy (iii) Reputation F allenges involved ig are, {iy)_ Poor incentives to participants, The following figure illustrates various sources of data involved in the process of participatory sensing along with various pases involved init waar = r Phases of PS Knowledge discovery process for oT applications and (Phase 5 : Anatylies and Data Visualisation Phase 4 : Data Processing oes Phase 3 : Data of participants a =. This phase involves co-ordination where in participants organize soon after locating the data sources Phases 2 & Phase 3 In these phases, data capture, communication as well as storage on servers or cloud takes place. Phase 4 & Phase 5 In these phases, data processing and analytics, visualisation and knowledge discovery takes place. Phase 6 ‘This phase involves initiation of respective actions. 1.5 BASICS OF NETWORKING 925. Define computer network. How is a computer network different from other types of networks? Answer : (Model Paper, 03a) Computer Network A computer network refers to a network in which several computers placed at different locations are interconnected With each other. This interconnection is possible either by communication medium or communication device through which the data ‘can be shared or transmitted among multiple computer systems. The system that transmits the data to the other {es within a network is referred to asa server, whereas, the systems that receive or accept the shared daa are referred 8 nodes ‘Sex “ © SPECTRUM @LLIN-ONE JOURNAL FOR ENGINEERING STUDENTS) — VMOU ¢ G — FUNDAMENTALS OF INTERNET O° Ul ‘Computer Network Different from Other Types of Network (Distributed System) In cistributed system, the users wil not have any idea of the basic organization and existence of various au ‘computers, It will only run the applications. ‘or commands, the whole responsibility of choosing the right process or and Sans in computer networks, the users will be aware of the au data to it lies with the operating ‘operating system. On the other hand, nodes present in the networks, The user has to ‘manually log on to the remote machine and transfer files and data, nothing i gy ey automatically by the operating system. But at present even computer inthe network are being connected using wireless ns Q26. Categorize the network based on thoir sizes. Answer : The networks based on the size are categorized into following types, 1, Local Area Network (LAN) 2. Wide Area Network (WAN) 3. Metropolitan Area Network (MAN) 4. Personal Area Networks (PAN). 1. Local Area Network (LAN), ‘\ Local Area Network (LAN) is a privately owned network having its links in a single office, building or campus. LA) are designed to allow personal computers or workstations in an organization, to share resources (e.g., printers) and exchang information. Local Area ‘Network Figure (1): LAN Characteristics of LAN The three distinguishing characteristics of LANs are, @ Size LANSare limited in size upto a few kilometers. The advantage of a limited size is that, in the worst case transmission tin bounds are predictable. It is simpler in design which simplifies network management. (il) Transmission Technology The transmission technology used in LANs often consist of a single cable to which, all the machines are connect Traditional LANs operates at speeds of 10 to 100 Mbps. Newer LANs may run at speeds of upto hundreds of megabit sec. (ili) Network Topology Various LAN topologies are possible for broadcast LANs. The two most common topologies are bus and ring topolog 2. Wide Area Network (WAN) ‘A Wide Area Network (WAN) spans a very large area that comprises a country, a continent or even the whole world ‘The two types of WANs are, () Point-to-point WAN (ii) Switehed WAN. WARNING: xerox/Photocopyng of tis book ta CRIMINAL act: Anyone found guy Is LIABLE to face LEGAL proceedings. ary? vunft-1 @ Pointto-point WAN point-to-point WAN isthe simplest WAN that connects computer to 0 small LAN or to an internet Service Provider as shown in figure (4). This type of WAN provides internet gocess 10.8 COMPUTE, Poit-tospoint WAN Goa: poh : etn a Figure (4): Point-to-point WAN. Switched WAN ‘The switched WAN is a complex WAN, that connects she hosts (oF end systems) to the subnet, The subnet consists fftransmission lines and switching elements. The router is a ‘pitching element which connects two of more transmission ‘and also connects to another LAN or WAN. In a WAN, slike LAN where the transmission medium is shared, the ission media isnot shared so any computer can send data tray time. The transmission mechanism of WAN is based on the concept of packet store-and-forward. When data arrives from the sender on an incoming tine router, the switching element stores it in its buffer it then, ‘chooses an appropriate outgoing line to forward it over the ine. ftwo routers are not directly connected, then packet js received and stored at each intermediate routers along the path until the required output line is free and then forwarded, ‘Thesubnet using this concept is called a ‘point-to-point’, ‘store~ snd-forward’ or ‘packet-switched’ subnet. Figure (5) shows a switched WAN. Host Host peal AT Figure (3: Switched WAN ‘Subnet Unlike LAN, that usually have symmetric topologies, WANs typically have irregular topologies. Several possible topologies are shown in the figure (6). Node (a) Star oe Eh Figure 4): WAN Topologies Another possibility of WAN is the wireless WAN, that is becoming more and more popular. In such WANS the router has an antenna, that helps in sending and receiving data Wide Area Network Figure (5): Wide Area Network / SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS ‘ cover es AMMAN ase Network (MAN) isa network silat LAN, but lage than LAN and smaller than Way, customers why seed. Ntch might be either rvtely owned by a grou publi lied. I mainly do, example ofa Man gory nd eed ahigh-speed conection oth InemetA MAN can suport both ata an eae ‘cable television network that provides high-speed data connection fo the Internet. A MAN ig, ‘One oF two cables to which All the computers are connected. It does not contain any switching element Figure (6: Metropolitan Area Notwork 4 Personal Area Network (PAN) Tae! itera pena (PAN) is a network that interconnects several computing devices to be used by an individ coummanieess cad cated physically together and connected for sharing the data, hardware internet connection cte,Ithelp with mobile coon aemit data among multiple hardware devices using one computer A compute by default will communi ‘Computer such as PDA, mobile phone and electronic equipment such as camera, scanner, printer etc. All the hardy ‘Components in a PAN can be connected through wire or wireless method. gm ee oo aS a ae ac Figure (7): Wired PAN Moti Phone earner Figure (8: Wireless PAN In wireless PAN the devices need to be in the radio vicinity of each other in order to create a communication mei i ‘among them, The bluetooth protocols allow them to form a network only when they are in the Vicinity of each other. Ad can then find out the services offered by other devices and then obtains them, ‘ WARNING: Xerox/Photocopying of this book is @ CRIMINAL act, Anyone found guilty is LIABLE to face LEGAL proceedings. ‘ost Reference Model ‘This model was developed by the International Standards Organization (180) q § Is ‘ation (ISO) for connecting open systems. Hence, it ‘Fis model has seven layers, which js shown in the following figure. ‘ HOST. __ Hos Application biyer fy Application ayer] APDU 7 Presentation Protocol rae layer Presentation layer PPDU sii layer Session layer ‘SPDU ‘Transport layer Transport layer TPDU ’ ‘Network layer Network layer PACKET Y Data ink hye Data ink yer] FRAME Physical yer Physicallyer_] BITS © Communication subnet Figure: OSI Reference Model 1, Physical Layer {) _Itis the first layer of OSI model. {i _Itdeals withthe transmission of information in the form of raw bits over the conmunication channel. ‘Here atthe time of transmission, data is converted into electrical/optical signal and sent to the destination device. And ‘when receiver receives them, it is again converted back to data, The type of connections supported between devices across network are ethernet, token ring ete ong with the underlying physical medium. (Gil) ts design issues include mechanical, electrical and procedural interface Example ‘What is the mode of communication? How much voltages are used to denote logic 1 and logic 0? et. 2. Data Link Layer {)tisalayerabove the physical layer whose function isto receive data from network layer, break the input data into (data) ames and take care of acknowledgments (i). Itregulates the flow of traffic in case of fast sender transmitting to a slow receiver. (Gi). _Ttprovides an error-free transmission for the network layer and solves the problems that results from frames (ic. damage, lost and duplication), (iv) maintains the device address called MAC sublayer (ic. a sublayer of DLL) which provides controlled access to the shared channel. 3. Network Layer (i) Itlies above the data link layer: (ii) routes packets from source to destination by applying routing algorithms. (iti) It controls the entire operation of the subnet besides controlling congestion. (iv) Ttalso maintains the accounging information about the data sent by each user, “() _Iestablishes the connections with other heterogeneous networks 1.22 HINGS [JNTU-HY pe, A Transport Layer (The ranspor layer ie above session layer. Is responsible for accepting data from the session layer, dividing i, Pieces (TPDUS), i ; gure the correct reception of 4% i if required and passing these pieces tothe network layer and ass teary FUNDAMENTALS OF INTERNET OF TI © Ni sets yp and teminates the connetons across the network thereby epulating the flow of information ii) (HD Walso mtiploxes the data and establishes multiple connections, when a high throughput is desired. S Session Layer @ Sesion layers responsible for conducting sessions among various users on diferent machines. (G Temanages the iatogue control in eas of half-dplex communication, Ait) Te prevents the occurence of simultaneous operntion at bot sides by using a service called token management’ (%) Data synchronization is also provided by inserting checkpoints int the data steam, so that only the data afer the jg checkpoint is retransferred in case ofa system crash, 6 Presentation Layer (This layer is concemed with the syntax and semantes of te information transmitted. () _Mconverts the information between the representations used in individual computers and globally accepted standari, (Gil) _Teperforms operation like encryption, deeryption and compression on data. 7. Application Layer (This layer lies above the presentation layer and is close to end uses. Gi)” It provides interface between user and computer hardware Gi) _tcontains the implementation of various protocols used for user interaction such as, Telnet, FTP, SMTP, etc 28. Discuss various components of a network. Answer : Model Papers, any Following are some of the comriion components of a network, 1. Repeaters ‘ Repeater refers to a communicating device, which is used at the physical layer ofthe OSI reference model. It consists two ports using which two segments (logical area of a network) of a network can be connected. However, if several segment are to be connected then multiple repeaters must be used. The main purpose of using repeaters is to enhance the extensiily factor of LAN network. This device is generally preferred when the distance between two communicating systems is large. Thi is because, repeaters amplify the strength of the signals (which decreases during the transmission) such thatthe strength of sign being transmitted is equal to the actual strength of signal Computer A TE Figure: Repeater Connecting Two Network Segments WARNING: Xerox Photocopying o ths bookls @ CRIMINAL. act. Anyone found quity fs LIABLE to face LEGAL proceedings aft unt 1.23 li 2 Bridges Abridge isan electric device used fo connect multiple LANs, The bridges are operated a the data fink layer. Suppose, there exist a pair of ethernet LANS for interconnection. One approach i to conneet them by using a repeater, but {his would nt be a workable solution, An altemative way to connect two LANS is by bridge. With the help of abridge, device can be forward from one ethernet LAN to another: The brides typically operate inthe physical and the data link layers ste OST model, The role ofthe bridge is to divide a lage network into smaller segments, 7 Bridge Physical Layer SNGsaaa Figure: Bridge in the OS! Model 3 Router A router is an interconnecting device which is used to connect varied networks that uses different technologies, media, frame formats etc. It can be employed at the network layer of the OSI model to perform its operation ie. to transmit the packets based on the IP addresses. Basically, the routers are used to connect the networks such as LAN to LAN, LAN to WAN or WAN to WAN. Each router includes processor, 1/0 interface and memory. The packets are forwarded to the destination computer through the shortest route within a network. Computer A ans oo 7\ ao ee LANA LAN B QO Computer B Computer C Figure: Router Connecting Heterogeneous 4 Gateways Gateway is a device which is used to connect two networks of different kinds, tis implemented at the transport layer and is used to convert protocols among the networks. It is employed in firewall mechanism. Ifa packet is forwarded to one protocol, itaceepts the packet and converts it for another protocol. It has the ability to translate the messages from one form to another form. Gateway is implemented by software installed within a router, but it can also be implemented in hardware or in both. ComputerA E F Gateway B D C Figure © SPECTRUM ALL-IN-ONE JOURNAL FOR ENGINEERING STUDENTS 124 FUNDAMENTALS OF INTERNET OF THINGS [JNTU-Hyp., - 5. Brouters A brouter is a network device Which operates layer. It serves as routers for ‘Toutable, at ‘oth bridge and router Ht fr router Drotocols and as bridges for non-routable protec Brouter can be single-protoco! brouter or multiprotocol brotter ions at network layer as well a, ‘ hi ols. fy When asingle protocol bfowter receives a packet, to ts coresponding protocol then tether acts arora transits the data using network ler adie Fats asa yg ‘sends the data using di io LAN using IP protocol 1p Table Brouier . ink yer adress Simialy, whe a multprotoco!broter receives a packet belonging oie M Protocol then it forwards the data using network layer address and passes it ust data link layer address. sh, TAN using IP protocol Figure: Single Protocol Brouter, P Table Tine LAN using IPX TAN using IPX or IP or IP protocol protocol P Table 3: Multprotocol Brouter 6 Switches ‘Switch is a network connecting device which also'contains multiple ports that connects maltiple computers within a ne, work or among different segments of the same network hence; itis also called as multiport bridge. The data is taken as aframs (but not as a signal) since the switch operates atthe data link layer ofthe OSI reference model. Instead of broadcasting the data directly send from source to destination computer. When a switch receives the data frame from the source computers, it checks th MAC address of the frame which identifies the destination computer and deliver the frame to the port connecting the destinatia ‘computer with the same MAC address. Once the data frame is received by the destination port, switch will reconvert the fram into signal and forward itto the destination computer attached to it. Hence, switch is a multiport bridge that i capable of filter ODIO | rus ry Figure: Switch Connecting Multiple Computers and Servers in a Network __ WARNING: Xerox/Photacopying ofthis book is a CRIMINAL act Anyone found quity is LIABLE to face LEGAL proceedings bats 1.25 = 1.6 COMMUNICATION PROTOCOLS ‘a2. What is. a communication protocol? Explain, answer £ ‘Model Pape, 2a) ‘communication Protocol ‘Communication protocol refers ‘to a set of communication rales tsing which the data can be efficiently exchanged o among several computers, Italso provides formatting rules which defines the wa of packaging the data into sent and received messages, header and its field along with theit meanings. ‘The different communication protocols used for the data transmission are, Data Sequencing This protocol is used to fragmenta long message into small number of data packets of fixed size. These packets are thus sequentially transmitted from sender to receiver without any error or fault, Flow Control 3 This protocol is used to control the flow of data to be transmitted between sender and receiver. Generally, the speed of transmission of all the computers is not equally efficient. Thus, the data is transmitted between a fast sender and slow receiver. (ii) Data Routing This protocol is used to identity an efficient route between the soice and destination so as to transmit the data. Gv) Error Control This protocol is used to detect and remove the erors that occur during the data transmission, Thus, the data is transmitted without any error ‘ (9) Data Formatting These are the rules which specify the way of packaging the data into sent and received messages. (i) "Precedence and Order of Transmission These are the rules which provides assurance that each of the node gets an opportunity to use the communication channel as ell asthe other network resources depending on the priority assigned to them. (oii) Connection Establishment and Termination ‘These are the rules that specifies the establishment, maintenance and termination of the connection takes place when two different nodes within'a network wants to interact with one another (iil) Data Security ‘These are the rules that specifies the process of providing message security as well a privacy wl messages over the network ’ () Log Information These are the rules which specifies the types of log information that has to be maintained by the system. Wherein, this information can be used for applying charges to the Bser depending on the usage of the network resources. 30. What are the different terminologies used by message communication protocols? Answer The different terminologies used by message communication protocols are as follows, 1, _ Request/Response (client/server) «The procéSs of requesting a resource and sending response to an object is known as requesUresponse message exchange. ‘When an object makes a request for a resource, a protocol provides the header words such that every field of the header fanilates the request atthe receiver objector server 2 Publish/Subseribe (pubsub) ‘The process of publishing messages by a service is referred as publish/subscribe message exchange. For instance, weather {elecast service publishes weather reports messages for the potential receivers, ‘This type of service ean be used by single or multiple clients/brokers. A client can receive service messages by subscribing for a specific service. The pubsub protocol specifically functions for publishing messages and accepting the subscription ‘made by the authentictegistered devices, © specrmunt autt-one youRNAL FoR ENGINEERING stupeNTs ==" le sending and receiving OF THINGS | Clabbebleven | 1.26 TALS OF INTERNET unit : FUNDAME! a ‘Resource Directory (RD) ; g eto 4 ence. Te revues BEEES the jenn ‘This i ic sed or rng dn and ales for every 98 Noda, trondeat com from RD by using URE fo he resoure weve. the = . ne Ph imi rdtete wees MM ce This dacovery service i sed for advertising the infomation of resauoe IKE OTR we states at frequent intervals. A client uses resource diacovery service fF assing een a re a bic ‘resource for availing resourve directory service, eZ ‘S. Registration/Registration Update agen eo more evek centers wth evict te Teter etn refer ta ec gen ees When nor mre davies ENO, ATT device gins access over specific resource and receives published messes 2. Resi service receiver mast be authenticated before geting reisiered with a seve: as nn age Registration updates refers to the process of updating and unregistering one or more end points leview, esi © Pall (SubseriberNotiy) Data aN 5. Qual Pull data servic is wed for piling a message, Fae, resource or data of resoute Pe By Ses RR ora ig energy Initially, a len pulls a esouee then the server manages the information about the state of Tester ee resources changes the server notifies the client and then the client pulls the resource again om He energ anges the server notifies the client and then the cient pulls the resource aga ene 7. Polling oF Observing amount o Poting of oeervitg eters tthe process demining tbe loetion trom Where the Rew messae Has eve ot hesty ibe the availabilty of @ message or if any updates are avaiable or any ofthe message information needs 5 Resistam dtcrmining the caret sats of information sate. When messages are saved at database Server then client can Petra ue polling by using GET method of REST architecture and server uses POST method aoe & Push (Pubiish/Subseribe) Data environs odes + information ot data at regular intervals. For instance, Push data service refers to the process of pushing a message of provider ofthe mobile service pushes temperature and location information at regular intervals fr the potential receives. 3, Sealab When compared tothe polling service push service is more efficent specifically incase of sending notifications or alerts, fois 9. Message Cache ofa ver Cache refers tothe hardware component which is used for storing the data so that future requests made by a client can ar be served quickly. In other words, the data stored in cache can be used later whenever needed. I is helpful in short ot serve prolonged service disconnection 4 Deploy 10, Message Queue These ‘Message queuing refers tothe process of data storage in the similar form as received from devices or client/server. This fins wervice is ued so that messages can be forwarded when the state ofthe connection changes. A message ean be Sento mosto nce from a queue by using FIFO method. Each resource ype has Separate queue, separate registered device and separa protoc subscription list. S Quali 11, nformation/Query 4 " TheQ “Aclient makes request for a resource by using a query and server responds to the client's request by replying to the quer, ee ‘The query processing uses database or resource directory resources. Q32. Defin 7 se 1.7 SENSOR NETWORKS _ Answer : 31, Discuss about sensor network. Outline the features of wireless sensor networks: Concepts o ‘Anower : mecakcetl ‘Sensor Networks — @ Sens | WSN comprises large number of sensors that aré mostly implemented in certain areas where there is a necessity oi he | situation to be monitored. These sensors are involved in various sensing tasks such as temperature, sound, vibration and so fel However, the output ofthese sensors is transmitted to a snk (a central gathering node) afer realizing a particular envioas# situation and performing in-network processing on the sensed data, This sensor also encourages inter communication wo 0) Sem Vill ‘multi-hop wireless communication links and transfers the sensed data to the sink. The sink then rece id | i othe si ives the data and performs Sen Vil further processing and analysis. However, wireless sensor networks can be used for variotis applications that deal with monitr® and ‘control and surveillance. point communication. Due to the excessive jos sensor nodes are ommuication paradigm, whereas the other networks such as ad-hoe networks make use of pinto este Sensor odes are confined to cera limit of power, computational capacities and memory. Hore lrge numberof sensors, the sensor Hodes are hot identified universally. In addition, the vari co orders of magnitude ‘nodes are highly implemented and inclined to failures as well. However, the sensor network topology ‘keeps on on eguar basis of Wireless Sensor Networks : Fe dei ete of wireless enor netwek ice, 1, Brergy limitations 43, Resistance to node fiture 3, Scalability 4, Deployment Quality of Service (QOS). nergy Limitations ‘The energy is one ofthe major concerns in the wireless sensor networks. The sensor nodes uses chip devices that runs on tattres which are the common means to acquire energy. However, at times the batteries may not facilitate the required mount ofpower for longer sustenance, So, therefore, mechanism is necessary for efficient utilization of energy resources fr long term use. 1. Resistance to Node Fa ‘The failure of nodes is also another concerns of energy losses in WSN. The wireless sensor networks are dynamic in nature and exhibits tolerance to node failures. The caused of the node failures could be depleted batteries, intruder attacks and eavironmental factors such as fie, flood ete. Therefore such factors can effect the topology of the networks. Hence, the odes must be tolerant and robust in nature. 3. Scalability this defined asthe ability of a network to retain its performance irrespective ofits size. A wireless sensor network comprises ‘ofa very large number of nodes and therefore scalability is a very important aspect. Scalability is affected generally by ‘datess or routine table entries and these information should be restricted by limiting the resource of sensor nodes. Its ‘observed that number of nodes compared to large number of nodes, resulting in considerable efficiency. 4 Deployment The sensors nodes can be deployed in distinct ways, whichis characterised by requirement, application and environmental factors. The sensor nodes can be set up randomly across the monitoring field or sensor field, which then remain stationary in smostofthe applications. To substantiate the WSN functionality, various deployment strategies and necessary communication protocols are incorporated depending upon the existing network topology. {Quality of Service (QoS) The QoS is one ofthe major factors in WSN. It is mainly concer with the reliability ofthe networks. Therefore, ensuring te quality service i the basic requirements in achieving any application goals. ‘2, Define some of the key terms and concepts of sensor networks. Also, discuss various subsystems of sensor nodes. Answer : ‘Concepts of WSN There are several concepts that are used while developing the techniques for sensor nodes. Few of them are as follows, 0 Sensor i The conversion of physical matter such as sound, light and heat to any other signal or electrical signal is referred as sensor. These signals canbe handled using an apparatus inthe future, _ Sensor Node ‘Sensor node is said to and on-board sensors, re Model Papert, (>) 'be a basic unit ofa sensor network comprising of memory, processor, wireless modem power supply | SPECTRUM ALLAN-ONE JOURNAL FOR ENGINEERING STUDENTS © 1.28 INTERNET OF THINGS LINTUHYDER, SS FUNDAMENTALS OF Gd) Row ‘ . inati mt in the network. Routing refers to dacovering af ute fora sire node 0 reac is desiation node PS (iv) In-network Inchetwork sa type of processing which processes the data and integrates it wih Me data from where thas been prog, ©) State State represents the snapshot ofthe physical environment ora system. Physical Pees ee ee Pig hich the source is moving and number of signal sources whereas sytem self refers 0 6 oD Task Tasks; ve igh level system ask are sensing, commun ennai ier el ink a tin Cutt tan nd of the data. (Wii) Detection Detection is a process of checking the availability of a physical phenomenon. It is done by using threshold based dete, Which sets a flag as soon as it detects the presence of physical phenomenon more than. required. (lt) Resource Resources are nothing but sensors, processors, node energy reserves, communication links and on-board memory wig will-be allocated to the tasks, in order to make best use of it and to enhance the performance. (ix) Sensor Tasking Sensor tasking is the process of assigning the sensors to a specific task. It also assigns sensors to control of sensor sty Which control them using the buttons ON/OFF, PAN/TILT in order to perform the task. (x) _ Geographic Routing Geographic rduting is the process of routing the data depending upon the geographical attributes which includes locatog or regions. Subsystems of Sensor Node The different subsystems of sensor node are, 1, Sensing unit 2. Processing unit 3. Communication unit 4. Power unit. L Sensing Unit : ‘Combination of sensor and ADC forms the sensing unit, which is used for converting analog to digital signals. It contin ‘wo components (i) Sensor (i) ADC. 2 Processing Unit Processing unit holds the responsibility of performing assigned sensing tasks. It contains two components. (i) Memory (ii) Microcontroller. 3. Communication Unit . ion unit behaves as a communication channel between the sensor node and network. It consists of 4, Power Unit Power unt acts as source for power. It makes use of bateres, ___ WARNING: Xerox/Photocopying ofthis book is a CRIMINAL act. Anyone found guilty s LIABLE to face LEGAL proceedings. Seong ini pene Communication ni Microcontole. {Rio} 2 yg Baste Power Sour Unit Figure: Differont Subsystoms of a Sonsor Node {Q38. Mention the applications of wireless sensor networks. answer = The wireless sensors networks are used in the wide area of applications ate as follows, 1, Habitat Monitoring ‘Monitoring of habitat involves the following methods, ‘Data reduction by adopting the technique of zero crossing rate, 4 Localizing by adopting the technique of beam forming based on TDOA (Time difference of arrival). % Classifying the target by adopting the technique of eross-correlation between the calculated reference and acoust¢ signals. For example the communication in the Grand Duck Island Monitoring Network (GDIMN) can be achieved as follows, ‘Grand Duck Island Monitoring Network Itis a two-tier network architecture deployed by UCB (University of California at Berkeley) and IRL (Intel Research Laboratory) in 2002. In this architecture, the sensor nodes in the patch network transmits the data to transit network through a gateway which janum forwards the information to the base station. The base station transmits the information using the satellite link, at every interval of 15 minutes by replicating it atthe Berkeley’s database e + The sensor network can be accessed by the two different types of users in two different ways. The remote users access the replicated database in the Berkeleys where as the local users uses PDA-style devices to interact with the sensor network Data serie ) y) ei Base remote Se Sensor nodes + } (nes ) Wireless patch network Wied patch network Figur: Grand Duck island Monitoring Network SPECTRUM AILLAN-ONE JOURNAL FOR ENGINEERING STUDENTS 1.30 Nis awiretess roth of endangered anon ees of environmental sensors The purpose of his networks 10 determine he reasons, +: ‘The different methods involv ° ° ° ° angered species of pina” Merl species of plants ina speific aren hut not into the neighbouring aes Environmental Monitoring Environmental the house held and in I monitoring involves " ill in the area whic mt Nes the supervising ult fair and nil The landfill inthe area Which is Fie din monitoring Landi ae, Drilling the collection well periodically. ‘Gathering the samples of gas in air tight bags, Inspecting off-site waste treatment operation, Allowing the process to take longtime for completion. Tk © perform tis the gas sensors are interfaced withthe wireless radio and customt-mode devices that obtain the sense for further inspecti Pollutants such as carbon of sulphides and ammonia, ing and processing. In addition to this, the sensor in large quantity are spreaded area to monitor the risky ™onoxide lead, nitrogen dioxide, particulates of nitrogen dioxide, sulphur dioxide, methane, compo, Observation and Forecasting System of Environment EOFSisasy the environmental on: @) ) © stem which is distributed over a very large geographic area, Is responsibility isto sense, model and forecy e ions such as pollution, flooding, earth quakes, cyclones etc I isan integration of three units, Sensof station Centralized processing farm Distribution network. 3. Drinking Water Quality ‘To monitor and model the quality of lity of water, a monitoring system, consisting of sensors that performs spatial-temporal data mining, using the technology called in situ sensing is developed. In addition to this, several data mining techniques performed on the databases storing the information about quality of water. These techniques are used for controlling the level of chlorine in the water. 4. Disaster Relief Management ‘An innovative sensor network has been introduced to deal with the attacks caused by terorists, earthquakes, storms, flods and fires. All the sensors present inthis network are deployed at homes, offices and other areas. They gather information from unde normal conditions and continuously updates the control database servers connected through back bones. Whenever any disasty ‘occurs the connectivity among the control databases is achieved through the lov. 1 aerial vehicles or satellites. The sensor nods ‘transmits the information through the predetermined routes. 5. Soil Moisture Monitoring Sensors are also used to monitor the various performance parameters of the soil moisture. For example, a custom moist sensor have been developed that is interfaced with a wireless board named Mica 2 Mote. This board consists of a rain gauge tx ‘wakes up the sensors from sleeping mode. It also saves the energy and achieves the robustness and durability by reducing the ne of clock synchronization, time stamping, time setting and clock-

You might also like