0% found this document useful (0 votes)
18 views14 pages

IOT Key 2019

Uploaded by

reddyshadvalini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views14 pages

IOT Key 2019

Uploaded by

reddyshadvalini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

1. Explain in brief the characteristics of IOT.

Ans. Characteristics of IOT are:

I. Dynamic and Self-Adapting


II. II. Self-Configuring
III. III. Interoperable Communication Protocols
IV. IV. Unique Identity
V. V. Integrated into Information Networks

2. List the various protocols used in IOT.

Ans. Various protocols used in IOT are:

 802.3 - Ethernet
 802.11 - WIFI
 802.16 - WiMax
 2G/3G/4G
 IPv4
 IPv6
 TCP
 UDP
 HTTP
 WebSocket

4. Differentiate between M2M and IOT.


Ans.
M2M IOT

Point to point communication usually Devices communicate using IP networks and

embedded within hardware at customers communication protocols

site

Many devices use cellular or wired networks Data delivery is relayed through a middle

layer present in cloud

Devices do not rely on internet Device requires an internet connection

Limited integration options Unlimited integration options


7. Write the functions of GPIO pins in Raspberry Pi.

Ans. The GPIO (Generel Purpose Input Output ) pins on raspberry pi are used to connect the
micro conrtroller to other external pheripheral devices like sensors and actuators.They can also
be used to connect to other analog and digital devices like resisters. They are some voltage pins
and ground pins also persent in the GPIO pins which act as power supply pins and are not
programmable for other use.

11)
IOT COMMUNICATION MODELS
1. Request-Response communication model
2. Publish-Subscribe communication model
3. Push-Pull communication model
4. Exclusive Pair communication model

Request-Response communication model:


Request-Response is a communication model in which the client sends requests to the
server and the server responds to the requests.

• When the server receives a request, it decides how to respond, fetches the data, retrieves
resource representations, prepares the response, and then sends the response to the client.
Fig: Request-Response communication model

Publish-Subscribe communication model:


Publish-Subscribe is a communication model that involves publishers, brokers and consumers.

• Publishers are the source of data. Publishers send the data to the topics which are managed by
the broker. Publishers are not aware of the consumers.

• Consumers subscribe to the topics which are managed by the broker.

• When the broker receives data for a topic from the publisher, it sends the data to all the
subscribed consumers.

Fig: Publish-Subscribe communication model

Push-Pull communication model:


Push-Pull is a communication model in which the data producers push the data to queues and the
consumers pull the data from the queues. Producers do not need to be aware of the consumers.

• Queues help in decoupling the messaging between the producers and consumers.

• Queues also act as a buffer which helps in situations when there is a mismatch between the rate
at which the producers push data and the rate at which the consumers pull data.

Fig: Push-Pull communication model

Exclusive Pair communication model:


Exclusive Pair is a bidirectional, fully duplex communication model that uses a persistent
connection between the client and server.

• Once the connection is setup it remains open until the client sends a request to close the
connection.

• Client and server can send messages to each other after connection setup.
Fig: Exclusive Pair communication model

12)

IOT Enabling Technologies:


1. Wireless Sensor Networks
2. Cloud Computing
3. Big Data Analytics

Cloud Computing:is the on-demand delivery of compute power, database storage,


applications, and other IT resources through a cloud services platform via the internet with pay-
as-you-go pricing.

Cloud Computing Models Cloud Providers offer services that can be grouped into three
categories.

1. Software as a Service (SaaS): In this model, a complete application is offered to


the customer, as a service on demand. A single instance of the service runs on the cloud &
multiple end users are serviced. On the customers‟ side, there is no need for upfront investment
in servers or software licenses, while for the provider, the costs are lowered, since only a single
application needs to be hosted & maintained. Today SaaS is offered by companies such as
Google, Sales force, Microsoft, Zoho, etc.

2. Platform as a Service (Paas): Here, a layer of software, or development


environment is encapsulated & offered as a service, upon which other higher levels of service
can be built. The customer has the freedom to build his own applications, which run on the
provider’s infrastructure. To meet manageability and scalability requirements of the applications,
PaaS providers offer a predefined combination of OS and application servers, such as LAMP
platform (Linux, Apache, MySql and PHP), restricted J2EE, Ruby etc. Google’s App Engine,
Force.com, etc are some of the popular PaaS examples.

3. Infrastructure as a Service (Iaas): IaaS provides basic storage and computing


capabilities as standardized services over the network. Servers, storage systems, networking
equipment, data centre space etc. are pooled and made available to handle workloads. The
customer would typically deploy his own software on the infrastructure. Some common
examples are Amazon, GoGrid, 3 Tera, etc.

Big Data Analytics:


 Big Data Analytics largely involves collecting data from different sources, munge
it in a way that it becomes available to be consumed by analysts and finally deliver data products
useful to the organization business. The process of converting large amounts of unstructured raw
data, retrieved from different sources to a data product useful for organizations forms the core of
Big Data Analytics.

 Bigdata is the term for collection of data sets so large and complex that it
becomes difficult to process using on-hand database system tools or traditional data processing
applications.

Volume:
We currently see the exponential growth in the data storage as the data is now more than
text data. We can find data in the format of videos, music’s and large images on our social media
channels. It is very common to have Terabytes and Peta-bytes of the storage system for
enterprises. As the database grows the applications and architecture built to support the data
needs to be reevaluated quite often. Sometimes the same data is re-evaluated with multiple
angles and even though the original data is the same the new found intelligence
creates explosion of the data. The big volume indeed represents Big Data.

Velocity:
Velocity is another important characteristic of big data and the primary reason for
exponential growth of data. Velocity of data refers to how fast the data is generated and how
frequently it varies. Modern IT, industrial and other systems are generating data at increasingly
higher speeds.

Variety:
Variety refers to the forms of the data. Big data come in different forms such as
structured or unstructured data, including text data, image, audio, video and sensor data.

A wireless sensor network (WSN):


A Wireless Sensor Network is a self-configuring network of small sensor nodes
communicating among themselves using radio signals, and deployed in quantity to sense,
monitor and understand the physical world.

A wireless sensor network (WSN) in its simplest form can be defined as a network of
(possibly low-size and low-complex) devices denoted as nodes that can sense the environment
and communicate the information gathered from the monitored field through wireless links; the
data is forwarded, possibly via multiple hops relaying, to a sink that can use it locally, or is
connected to other networks (e.g., the Internet) through a gateway.

• The nodes can be stationary or moving.

• They can be aware of their location or not.

• They can be homogeneous or not.

WSN are enabled by wireless communication protocols such as IEEE 802.15.4. ZigBee is
one of the most popular wireless technologies used by WSNs. ZigBee specifications are based on
IEE 802.15.4.ZigBee operates at 2.4 GHz frequency and offers data rates up to 250 KB/s and
range from 10 to 100 meters depending on the power output and environmental conditions.

13)

• Software-Defined Networking (SDN) is a networking architecture that separates the control


plane from the data plane and centralizes the network controller.
• Software-based SDN controllers maintain a unified view of the network and make configuration,
management and provisioning simpler.
• The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to
specialized hardware in conventional networks.

A typical SDN architecture consists of three layers.


 Application layer:
It contains the typical network applications like intrusion detection, firewall, and load bal-
ancing
 Control layer:
It consists of the SDN controller which acts as the brain of the network. It also allows
hardware abstraction to the applications written on top of it.
 Infrastructure layer:
This consists of physical switches which forms the data plane and carries out actual move-
ment of data packets.
The layers communicate via a set of interfaces called the northbound APIs(between application
and control layer) and southbound APIs(between control and infrastructure layer).

(openflow)

14)

Network Function Virtualization (NFV): NFV is a technology that leverages virtualization to


consolidate the heterogeneous network devices onto industry standard high volume servers, switches
and storage.
NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run.
Key elements of NFV
• Virtualized Network Function (VNF): VNF is a software implementation of a network function
which is capable of running over the NFV Infrastructure (NFVI).
• NFV Infrastructure (NFVI): NFVI includes compute, network and storage resources that are
virtualized.
• NFV Management and Orchestration: NFV Management and Orchestration focuses on all
virtualization-specific management tasks and covers the orchestration and life-cycle management
of physical and/or software resources that support the infrastructure virtualization, and the life-
cycle management of VNFs.

18)
19)

WAMP is a sub-protocol of Websocket which provides publish-subscribe and


remote procedure call (RPC) messaging patterns. WAMP enables distributed
application architectures where the application components are distributed on
multiple nodes and communicate with messaging patterns provided by WAMP.

Key concepts of WAMP:

 Transport: Transport is channel that connects two peers Default transport


for WAMP is Websocket
 Session: Session is a conversation between two peers that runs over a
transport.
 Client: Clients are peers that can have one or more roles. In publish-sub-
scribe model client can have following roles: –
o Publisher: Publisher publishes events (including payload) to the topic
maintained by the Broker.
o Subscriber: Subscriber subscribes to the topics and receives the
events including the payload.

In RPC model client can have following roles: – Caller, callee

 Caller: Caller issues calls to the remote procedures along with call argu-
ments.
 Callee: Callee executes the procedures to which the calls are issued by the
caller and returns the results back to the caller.

 Router: Routers are peers that perform generic call and event routing. In
publish-subscribe model Router has the role ofa Broker:

o Broker: Broker acts as a router and routes messages published to a


topic to all subscribers subscribed to the topic.In RPC model Router
has the role of a Broker:
Dealer: Dealer acts a router and routes RPC calls from the Caller to
the Callee and routes results.
 Application Code: Application Code runs on the Clients(Publisher, Sub-
scriber, Callee or Caller).

Figure: 8.1 WAMPSession between Client and Router, established over a


Transport.
Figure 8.2 WAMP protocol interactions between peers. WAMP transport
used is Websocket. WAMP sessions are established over WebSocket
transport within the lifetime of WebSocket transport. AutoBahn framework
provides open-source implementations of the WebSocket and WAMP
protocols.
20)

You might also like