Unit 1 (Fiot)
Unit 1 (Fiot)
Unit-1
Contents pg.no
Characteristics of IoT 2
Sensing 16
Actuation 24
Sensor Networks 29
Basics of Networking, 35
1
2
INTRODUCTION
“Internet of Things” was coined by Kevin Ashton in 1999, and it has recently become
more relevant to the practical world largely because of the growth of mobile devices,
embedded and ubiquitous communication, cloud computing and data analytics.
Imagine a world where billions of objects can sense, communicate and share
information, all interconnected over public or private Internet Protocol (IP) networks.
These interconnected objects have data regularly collected, analyzed and used to
initiate action, providing a wealth of intelligence for planning, management and decision
making. This is the world of the Internet of Things.
Definition :
IOT can be defined as a global infrastructure that enables advanced services
by interconnecting physical and virtual things based on existing information and
communication technology .
The Internet of Things (IoT) refers to a system of interrelated, internet-connected
objects that are able to collect and transfer data over a wireless network without human
intervention.
Characteristics of IoT:
Various characteristics of IoT are:
• Dynamic and self-adapting
• Self-configuring
• Interoperable Communication protocols
• Unique identity
2
3
Self-configuring:
I. IoT devices can be able to upgrade the software with minimal intervention of user, whenever
they are connected to the internet
. II. They can also setup the network i.e a new device can be easily added to the existing network.
For ex: Whenever there will be free wifi access one device can be connected easily.
I. The IoT devices are connected to the network to share some information with other connected
devices. The devices can be discovered dynamically in the network by other devices. For ex. If a device has
wifi connectivity then that will be shown to other nearby devices having wifi connectivity
II. The devices ssid will be visible though out the network. Due to these things the network is also called as
information network.
III. The IoT devices become smarter due to the collective intelligence of the individual devices in
collaboration with the information network. For Ex: weather monitoring system. Here the information
collected from different monitoring nodes (sensors, arduino devices) can be aggregated and analysed to
predict the weather.
3
4
Things
Basically Things refers to IoT Devices which have unique identities and can perform
remote sensing, actuating and monitoring capabilities. Things are is main part of IoT
Application. IoT Devices can be various type, Sensing Devices, Smart Watches, Smart
Electronics appliances, Wearable Sensors, Automobiles, and industrial machines.
IoT devices can:
Exchange data with other connected devices and applications (directly or indirectly).
Collect data from other devices and process the data locally .
Send the data to centralized servers or cloud-based application back-ends
for processing the data, or
Perform some tasks locally and other tasks within the IoT infrastructure,
based on temporal and space constraints.
4
5
As shown in above diagram An IoT device may consist of several interfaces for
connections to other devices, both wired and wireless.
I/O interfaces for sensors
Interfaces for Internet connectivity
Memory and storage interface
IoT Protocols
IoT protcols help to establish Communication between IoT Device (Node Device) and
Cloud based Server over the Internet. It help to sent commands to IoT Device and
received data from an IoT device over the Internet. An image is given below. By this
image you can understand which protocols used.
5
6
1.Link Layer
Link layer protocols determine how data is physically sent over the network’s physical layer or medium
(Coxial calbe or other or radio wave). This Layer determines how the packets are coded and signaled by
the hardware device over the medium to which the host is attached (eg. coxial cable).
1. 802.3 – Ethernet : Ethernet is a set of technologies and protocols that are used primarily in
LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical
layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet
networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.
802.3i – is IEEE standard for 10Base5 that uses coaxial cable as shared medium .
6
7
802.3j-- is IEEE standard for 10BaseT uses copper twisted pair connection .
2. 802.11 – WiFi : IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media
access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network
(WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4 GHz,
5 GHz, and 60 GHz frequency bands.
Forex:
3. 802.16 – Wi-Max : The standard for WiMAX technology is a standard for Wireless Metropolitan Area
Networks (WMANs) that has been developed by working group number 16 of IEEE 802, specializing in
point-to-multipoint broadband wireless access.
2G/3G/4G- Mobile Communication : These are different types of telecommunication generations. IoT
devices are based on these standards can communicate over the celluer networks.
2.Network Layer
Responsible for sending of IP datagrams from the source network to the destination network. Network
layer performs the host addressing and packet routing. We used IPv4 and IPv6 for Host identification.
IPv4 and IPv6 are hierarchical IP addrssing schemes.
1.IPv4 :
IPv4 is the most deployed intrnet protocol used to identify the device on a network using hierarchical
addressing scheme.ipv4 uses 32 bit addressing scheme which allows to identify 26^32 addresses . But
more and more addresses got connected to the inntenet addresses got exhausted by year 2011 .IPV6
succeeded this .
2.IPV6 : it is the newest version in nternet protocol which uses 2^128 addresses .
3.6LoWPAN : It is an acronym of IPv6 over Low-Power Wireless Personal Area Networks. 6LoWPAN
is the name of a concluded working group in the Internet area of the IETF. This protocol allows for the
7
8
smallest devices with limited processing ability to transmit information wirelessly using an internet
protocol. 6LoWPAN can communicate with 802.15.4 devices as well as other types of devices on an IP
network link like WiFi.
Transport Layer
This layer provides functions such as error control, segmentation, flow control and congestion control. So
this layer protocols provide end-to-end message transfer capability independent of the underlying
network.
1.TCP : TCP (Transmission Control Protocol) is a standard that defines how to establish and maintain a
network conversation through which application programs can exchange data. TCP works with the
Internet Protocol (IP), which defines how computers send packets of data to each other.
UDP : User Datagram Protocol (UDP) is a Transport Layer protocol. UDP is a part of Internet Protocol
suite, referred as UDP/IP suite. Unlike TCP, it is unreliable and connectionless protocol. So, there is no
need to establish connection prior to data transfer.
Application Layer
Application layer protocols define how the applications interface with the lower layer protocols to send
over the network.
HTTP : Hypertext Transfer Protocol (HTTP) is an application-layer protocol for transmitting hypermedia
documents, such as HTML. It was designed for communication between web browsers and web servers,
but it can also be used for other purposes. HTTP follows a classical client-server model, with a client
opening a connection to make a request, then waiting until it receives a response. HTTP is a stateless
protocol, meaning that the server does not keep any data (state) between two requests.
CoAP : CoAP-Constrained Application Protocol is a specialized Internet Application Protocol for
constrained devices, as defined in RFC 7252. It enables devices to communicate over the Internet. The
protocol is especially targeted for constrained hardware such as 8-bits microcontrollers, low power
sensors and similar devices that can’t run on HTTP or TLS
WebSocket : The WebSocket Protocol enables two-way communication between a client running
untrusted code in a controlled environment to a remote host that has opted-in to communications from
that code. The security model used for this is the origin-based security model commonly used by web
browsers.
8
9
XMPP : Extensible Messaging and Presence Protocol (XMPP) is a communication protocol for
message-oriented middleware based on XML (Extensible Markup Language). It enables the near-real-
time exchange of structured yet extensible data between any two or more network entities.
DDS : The Data Distribution Service (DDS™) is a middleware protocol and API standard for data-centric
connectivity from the Object Management Group® (OMG®). It integrates the components of a system
together, providing low-latency data connectivity, extreme reliability, and a scalable architecture that
business and mission-critical Internet of Things (IoT) applications need.
AMQP : The AMQP – IoT protocols consist of a hard and fast of components that route and save
messages within a broker carrier, with a set of policies for wiring the components together. The AMQP
protocol enables patron programs to talk to the dealer and engage with the AMQP model.
Device: An IoT system comprises of devices that provide sensing, actuation, monitoring and control
functions.
Services: services for device monitoring, device control service, data publishing services and
services for device discovery.
Management: this blocks provides various functions to govern the IoT system.
9
10
Security: this block secures the IoT system and by providing functions such as authentication ,
authorization, message and content integrity, and data security.
Application: This is an interface that the users can use to control and monitor various aspects of the
IoT system. Application also allow users to view the system status and view or analyze the processed
data.
Request-Response Model
Request-response model is communication model in which the client sends requests to
the server and the server responds to the requests. When the server receives a request,
it decides how to respond, fetches the data, retrieves resource representation, prepares
the response, and then sends the response to the client. Request-response is a stateless
communication model and each request-response pair is independent of others.
HTTP works as a request-response protocol between a client and server. A web
browser may be the client, and an application on a computer that hosts a web site may
be the server.
Example: A client (browser) submits an HTTP request to the server; then the server
returns a response to the client. The response contains status information about the
request and may also contain the requested content.
10
11
Publish-Subscribe Model
Publish-Subscribe is a communication model that involves publishers, brokers and
consumers. Publishers are the source of data. Publishers send the data to the topics
which are managed by the broker. Publishers are not aware of the consumers.
Consumers subscribe to the topics which are managed by the broker. When the broker
receive data for a topic from the publisher, it sends the data to all the subscribed
consumers.
11
12
Push-Pull Model
Push-Pull is a communication model in which the data producers push the data to queues and the
consumers Pull the data from the Queues. Producers do not need to be aware of the consumers.
Queues help in decoupling the messaging between the Producers and Consumers. Queues also act as
a buffer which helps in situations when there is a mismatch between the rate at which the producers
push data and the rate rate at which the consumer pull data.
12
13
Client-server – The principle behind the client-server constraint is the separation of concerns. for
example clients should not be concerned with the storage of data which is concern of the serve.
Similarly the server should not be concerned about the user interface, which is concern of the
clien. Separation allows client and server to be independently developed and updated .
Stateless – Each request from client to server must contain all the information necessary to
understand the request, and cannot take advantage of any stored context on the server. The session
state is kept entirely on the client.
Cache-able – Cache constraints requires that the data within a response to a request be implicitly or
explicitly leveled as cache-able or non cache-able. If a response is cache-able, then a client cache is
given the right to reuse that repsonse data for later, equivalent requests. caching can partially or
completely eliminate some instructions and improve efficiency and scalability.
Layered system – layered system constraints, constrains the behavior of components such that
each component cannot see beyond the immediate layer with they are interacting. For example, the
client cannot tell whether it is connected directly to the end server or two an intermediaryalong the
way. System scalability can be improved by allowing intermediaries to respond to requests instead of
the end server, without the client having to do anything different.
Uniform interface – uniform interface constraints requires that the method of communication
between client and server must be uniform. Resources are identified in the requests (by URIsin web
based systems) and are themselves is separate from the representations of the resources data returned
to the client. When a client holds a representation of resources it has all the information required to
update or delete the resource you (provided the client has required permissions). Each message
includes enough information to describe how to process the message.
Code on demand – Servers can provide executable code or scripts for clients to execute in their
context. this constraint is the only one that is optional.
A RESTful web service is a ” Web API ” implemented using HTTP and REST principles. REST is
most popular IoT Communication APIs.
13
14
14
15
15
16
SENSING
A sensor is a device that is able to detect changes in an environment. By
itself, a sensor is useless, but when we use it in an electronic system, it plays a key role.
A sensor is able to measure a physical phenomenon (like temperature, pressure, and so
on) and transform it into an electric signal.
What is a Sensor ?
A device that receives and responds to a signal or stimulus.
Example: A pressure sensor detects pressure (a mechanical form of energy) and converts it to
electrical signal for display.
A sensor is a device that receives a stimulus (measurand) and responds with an electrical signal.
A sensor may have several energy conversion steps before it produces and outputs an electrical
signal, since most of stimuli are not electrical.
Transducers:
What is a Transducer:
A device that converts a signal from one physical form to a corresponding signal having a different
physical form.
Actuators
Another type of transducer that you will encounter in many IoT systems is an actuator. In simple terms,
an actuator operates in the reverse direction of a sensor. It takes an electrical input and turns it into
physical action. For instance, an electric motor, a hydraulic system, and a pneumatic system are all
different types of actuators.
16
17
Sensing in IoT
Definition
A sensor detects (senses) changes in the ambient conditions or in the state of another
device or a system, and forwards or processes this information in a certain manner.
"A device which detects or measures a physical property and record, indicates, or
otherwise responds to it"
Sensors
They perform some input functions by sensing or feeling the physical changes in
characteristics of a system in response to a stimuli.
For example heat is converted to electrical signals in a temperature sensor, or
atmospheric pressure is converted to electrical signals in a barometer.
17
18
It is only sensitive to the measured property (e.g., A temperature sensor senses the ambient
temperature of a room.)
It is insensitive to any other property likely to be encountered in its application
(e.g., A temperature sensor does not bother about light or pressure while sensing the
temperature.)
It does not influence the measured property (e.g., measuring the temperature
does not reduce or increase the temperature).
Sensor Resolution
Analog Sensors
Digital Sensors
18
19
Digital sensors produce a binary output signal in the form of a logic "1" or a
logic "0" , ("ON" or "OFF).
Digital signal only produces discrete (non-continuous) values, which may be
output as a signal "bit" (serial transmission), or by combing the bits to produce a
signal "byte" output (parallel transmission).
Scalar Sensors
Scalar Sensors produce output signal or voltage which generally proportional
to the magnitude of the quantity being measured.
Physical quantities such as temperature, color, pressure, strain, etc. are all
scalar quantities as only their magnitude is sufficient to convey an information.
For example the temperature of a room can be measured using thermometer
or thermocouple, which responds to temperature changes irrespective of the
orientation of the sensor or its direction.
Vector Sensors
Vector Sensors produce output signal or voltage which generally proportional
to the magnitude, direction, as well as the orientation of the quantity being measured.
Physical quantities such as sound, image, velocity, acceleration, orientation,
etc. are all vector quantities, as only their magnitude is not sufficient to convey the
complete information.
For example, the acceleration of a body can be measured using an
accelerometer, which gives the components of acceleration of the body with respect
to the x,y,z coordinate axes.
Types of sensors :
19
20
Temperature sensors
Temperature sensors detect the temperature of the air or a physical object and concert that
temperature level into an electrical signal that can be calibrated accurately reflect the
measured temperature. These sensors could monitor the temperature of the soil to help with
agricultural output or the temperature of a bearing operating in a critical piece of equipment
to sense when it might be overheating or nearing the point of failure.
Pressure sensors
Pressure sensors measure the pressure or force per unit area applied to the sensor and can
detect things such as atmospheric pressure, the pressure of a stored gas or liquid in a
sealed system such as tank or pressure vessel, or the weight of an object.
Image sensors
Image sensors function to capture images to be digitally stored for processing. License plate
readers are an example, as well as facial recognition systems. Automated production lines
can use image sensors to detect issues with quality such as how well a surface is painted
after leaving the spray booth.
Proximity sensors
Proximity sensors can detect the presence or absence of objects that approach the sensor
through a variety of different technology designs. These approaches include:
Inductive technologies which are useful for the detection of metal objects
Capacitive technologies, which function on the basis of objects having a different dielectric constant than that of
air
Photoelectric technologies, which rely on a beam of light to illuminate and reflect back from an object, or
20
21
Ultrasonic technologies, which use a sound signal to detect an object nearing the sensor
Chemical sensors
Chemical sensors are designed to detect the presence of specific chemical substances
which may have inadvertently leaked from their containers into spaces that are occupied by
personnel and are useful in controlling industrial process conditions.
Smoke sensors
Smoke sensors or detectors pick up the presence of smoke conditions which could be an
indication of a fire typically using optical sensors (photoelectric detection) or ionization
detection.
Infrared sensor technologies detect infrared radiation that is emitted by objects. Non-contact
thermometers make use of these types of sensors as a way of measuring the temperature
of an object without having to directly place a probe or sensor on that object. They find use
in analyzing the heat signature of electronics and detecting blood flow or blood pressure in
patients
Characteristics of Sensors
It is the minimum step size within the range of measurement of a sensor in a wire-wound
potentiometer, it will be equal to resistance of one turn of wire. In digital devices with
‗n‘bits, resolution is ‗Full range/2n
Sensitivity:
It is defined as the change in output response divided by the change in input response.
Highly sensitive sensors show larger fluctuations in output as a result of fluctuations
in input.
Linearity:
It represents the relationship between input variations and output variations.
In a sensor with linear output, any change in input at any level within the range will
produce the same change in output.
21
22
Range:
It is the difference between the smallest and the largest outputs that a sensor can provide,
or the difference between the smallest and largest inputs with which it can operate
properly.
Response time:
It is the time that a a certainsensor‘spercentage output of total change.
It is also defined as the time required to observe the change in output as a result of
change in input for example, ordinary mercury thermometer response time and digital
thermometer response time.
Frequency response:
The frequency response is the range i to the input remains relatively high.
The larger the range of frequency response, the better the ability of the system to
respond to varying input.
Reliability:
It is the ratio between the number of times a system operates properly and the number
of times it is tried.
For continuous satisfactory operation, it is necessary to choose reliable sensors that last
long while considering the cost as well as other requirements.
Accuracy:
It shows how close the output of the sensor is to the expected value.
For a given input, certain expected output value is related to how close the sensor‘s
output value is to this value.
Repeatability:
is poor.
Also, a specific range is desirable for operational performance as the performance of
robots depends on sensors.
Repeatability is a random phenomenon and hence there is no compensation.
22
23
Interfacing:
Direct interfacing of the sensor to the microcontroller/microprocessor is desirable
while some add-on circuit may be necessary in certain special sensors.
The type of the sensor output is equally important. An ADC is required for analogue
output sensors for example, potentiometer output to microcontroller.
Size, weight and volume:
Size is a critical consideration for joint displacement sensors.
When robots are used as dynamic machines, weight of the sensor is important.
Volume or spaces also critical to micro robots and mobile robots used for surveillance.
Cost is important especially when quantity involved is large in the end application.
23
24
ACTUATORS
Actuators
Another type of transducer that you will encounter in many IoT systems is
an actuator. In simple terms, an actuator operates in the reverse direction of a
sensor. It takes an electrical input and turns it into physical action. For
instance, an electric motor, a hydraulic system, and a pneumatic system are all
different types of actuators.
Controller
In a typical IoT system, a sensor may collect information and route to a control center.
There, previously defined logic dictates the decision. As a result, a corresponding command
controls an actuator in response to that sensed input. Thus, sensors and actuators in IoT
work together from opposite ends. Later, we will discuss where the control center resides in
the greater IoT system.
24
25
The control system acts upon an environment through the actuator. It requires a source
of energy and a control signal. When it receives a control signal, it converts the source
of energy to a mechanical operation. On this basis, on which form of energy it uses, it
has different types given below.
IoT actuator types
Actuators, as the name itself suggests, can act on their immediate environment to enable
correct operation of the machines or devices they are embedded into.
Small as they are, they are rarely visible during operation, but the effects of their work can
be felt in vehicles, industrial machines or any other electronic equipment involving
automation technologies. They can be separated into four main categories based on
their construction pattern and the role they play in a specific IoT environment:
25
26
26
27
Types of Actuators :
. Hydraulic Actuators –
A hydraulic actuator uses hydraulic power to perform a mechanical operation.
They are actuated by a cylinder or fluid motor. The mechanical motion is converted to rotary, linear,
or oscillatory motion, according to the need of the IoT device. Ex- construction equipment uses
hydraulic actuators because hydraulic actuators can generate a large amount of force.
Advantages :
Hydraulic actuators can produce a large magnitude of force and high speed.
Used in welding, clamping, etc.
Used for lowering or raising the vehicles in car transport carriers.
Disadvantages :
Hydraulic fluid leaks can cause efficiency loss and issues of cleaning.
It is expensive.
It requires noise reduction equipment, heat exchangers, and high maintenance systems.
2. Pneumatic Actuators –
A pneumatic actuator uses energy formed by vacuum or compressed air at high pressure
to convert into either linear or rotary motion. Example- Used in robotics, use sensors that work like
human fingers by using compressed air.
Advantages :
They are a low-cost option and are used at extreme temperatures where using air is a safer
option than chemicals.
They need low maintenance, are durable, and have a long operational life.
It is very quick in starting and stopping the motion.
Disadvantages :
Loss of pressure can make it less efficient.
The air compressor should be running continuously.
Air can be polluted, and it needs maintenance.
3. Electrical Actuators –
An electric actuator uses electrical energy, is usually actuated by a motor that
converts electrical energy into mechanical torque. An example of an electric actuator is a solenoid
based electric bell.
Advantages :
It has many applications in various industries as it can automate industrial valves.
It produces less noise and is safe to use since there are no fluid leakages.
It can be re-programmed and it provides the highest control precision positioning.
Disadvantages :
It is expensive.
It depends a lot on environmental conditions.
27
28
28
29
SENSOR NETWORKS
A wireless sensor network (WSN) is a network formed by a large number of sensor nodes where
each node is equipped with a sensor to detect physical phenomena such as light, heat, pressure, etc.
... With the rapid technological development of sensors, WSNs will become the key technology
for IoT.
Area monitoring: In area monitoring, the sensor nodes are deployed over a region where
some phenomenon is to be monitored. When the sensors detect the event being monitored
(heat, pressure etc), the event is reported to one of the base stations, which then takes
appropriate action.
Health applications: Some of the health applications for sensor networks are supporting
interfaces for the disabled, integrated patient monitoring, diagnostics, and drug
administration in hospitals, tele-monitoring of human physiological data, and tracking &
monitoring doctors or patients inside a hospital.
Landslide detection
Structural monitoring: Wireless sensors can be utilized to monitor the movement within
buildings and infrastructure such as bridges, flyovers, embankments, tunnels etc enabling
Engineering practices to monitor assets remotely with out the need for costly site visits.
Industrial monitoring: Wireless sensor networks have been developed for machinery
condition-based maintenance (CBM) as they offer significant cost savings and enable new
functionalities. In wired systems, the installation of enough sensors is often limited by the
cost of wiring.
Agricultural sector: using a wireless network frees the farmer from the maintenance of
wiring in a difficult environment. Irrigation automation enables more efficient water use
and reduces waste.
1.Star Network
2.MeshNetwork
3.HybridStar-MeshNetwork
A star network is a communications topology where a single base station can send and/or
receive a message to a number of remote nodes. The remote nodes are not permitted to send
messages to each other. The advantage of this type of network for wireless sensor networks
includes simplicity, ability to keep the remote node’s power consumption to a minimum. It also
allows low latency communications between the remote node and the base station. The
disadvantage of such a network is that the base station must be within radio transmission range
of all the individual nodes and is not as robust as other networks due to its dependency on a
single node to manage the network.
30
31
2.Mesh network :
A mesh network allows transmitting data to one node to other node in the network
that is within its radio transmission range. This allows for what is known as multi-hop
communications, that is, if a node wants to send a message to another node that is out of radio
communications range, it can use an intermediate node to forward the message to the desired
node. This network topology has the advantage of redundancy and scalability. If an individual
node fails, a remote node still can communicate to any other node in its range, which in turn, can
forward the message to the desired location. In addition, the range of the network is not
necessarily limited by the range in between single nodes; it can simply be extended by adding
more nodes to the system. The disadvantage of this type of network is in power consumption for
the nodes that implement the multi-hop communications are generally higher than for the nodes
that don’t have this capability, often limiting the battery life. Additionally, as the number of
communication hops to a destination increases, the time to deliver the message also increases,
especially if low power operation of the nodes is a requirement .
31
32
A hybrid between the star and mesh network provides a robust and versatile communications
network, while maintaining the ability to keep the wireless sensor nodes power consumption to a
minimum. In this network topology, the sensor nodes with lowest power are not enabled with
the ability to forward messages. This allows for minimal power consumption to be maintained.
However, other nodes on the network are enabled with multi-hop capability, allowing them to
forward messages from the low power nodes to other nodes on the network. Generally, the
nodes with the multi-hop capability are higher power, and if possible, are often plugged into the
electrical mains line. This is the topology implemented by the up and coming mesh networking
standard known as ZigBee.
A functional block diagram of a versatile wireless sensing node is provided in Fig. 6. Modular
design approach provides a flexible and versatile platform to address the needs of a wide variety
of applications. For example, depending on the sensors to be deployed, the signal conditioning
block can be re-programmed or replaced. This allows for a wide variety of different sensors to
be used with the wireless sensing node. Similarly, the radio link may be swapped out as required
32
33
for a given applications’ wireless range requirement and the need for bidirectional
communications.
Using flash memory, the remote nodes acquire data on command from a base station, or by an event
sensed by one or more inputs to the node. Moreover, the embedded firmware can be upgraded through the
wireless network in the field.
A key aspect of any wireless sensing node is to minimize the power consumed by the system. Usually, the radio
subsystem requires the largest amount of power. Therefore, data is sent over the radio network only when it is
required. An algorithm is to be loaded into the node to determine when to send data based on the sensed event.
Furthermore, it is important to minimize the power consumed by the sensor itself. Therefore, the hardware
should be designed to allow the microprocessor to judiciously control power to the radio, sensor, and sensor
signal conditioner
34
35
BASICS OF NETWORKING
Switches, routers, and wireless access points are the essential networking basics.
Through them, devices connected to your network can communicate with one another and with
other networks, like the Internet. Switches, routers, and wireless access points perform very different
functions in a network.
switches
Switches are the foundation of most business networks. A switch acts as a
controller, connecting computers, printers, and servers to a network in a building or acampus.
Switches allow devices on your network to communicate with each other, as well as with
other networks, creating a network of shared resources. Through information sharing and
resource allocation, switches save money and increase productivity.
There are two basic types of switches to choose from as part of your networkingbasics: on-
premises and cloud-managed.
A managed on-premises switch lets you configure and monitor your LAN,
giving you tighter control of your network traffic.
Have a small IT team? A cloud-managed switch can simplify your network
management. You get a simple user interface, multisite full-stack
management, and automatic updates delivered directly to the switch.
ROUTERS
35
36
ACCESS POINT
An access point* allows devices to connect to the wireless network without cables. A
wireless network makes it easy to bring new devices online and provides flexible
support to mobile workers.
An access point acts like an amplifier for your network. While a router provides the
bandwidth, an access point extends that bandwidth so that the network can support
many devices, and those devices can access the network from farther away.
WIRELESS NETWORKING
To create your wireless network, you can choose between three types of deployment:
centralized deployment, converged deployment, and cloud-based deployment
1. Centralized deployment
The most common type of wireless network system, centralized deployments are
traditionally used in campuses where buildings and networks are in close proximity. This
deployment consolidates the wireless network, which makes upgrades easier
and facilitates advanced wireless functionality. Controllers are based on-premises and
are installed in a centralized location.
2. Converged deployment
This system uses the cloud to manage network devices deployed on-premises at
different locations. The solution requires Cisco Meraki cloud-managed devices, which
provide full visibility of the network through their dashboards.
36
37
Using routers, LANs can connect to wide area networks (WANs, explained
below) to rapidlyand safely transfer data.
3. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs –
and incorporate elements from both types of networks. MANs span an
entire geographic area (typically a town or city, but sometimes a
campus). Ownership and maintenance is handled by either asingle
person or company (a local council, a large company, etc.).
38
Communication models
Communication Api’s