Internet of Things Complete Notes
Internet of Things Complete Notes
Ans: Things connected through internet is known as IoT. IoT is a simple concept of controlling
different devices by establishing a connection from mobile app.
Characteristics:
1. Connectivity: In IoT, anything, anytime and anywhere should be connected to the infrastructure,
without connection nothing makes sense.
2. Intelligence: Extraction of knowledge from the generated data is important. Sensors generates
data and this data should be interpreted properly.
3. Scalability: The number of devices that communicate with each other will be much larger than
the devices connected to the current internet.
5. Unique identity: Each IoT device has an IP address. This is helpful in tracking the equipments.
6. Dynamic: The IoT device must dynamically adopt itself to the changing context such as
temperature, speed, location, etc.
Ans: Web service is a mechanism for exchanging data between different systems that are not
developed by the same parties. Web services are a part of the service oriented computing that
provides a computing platform to coordinate among many business platforms. They are
independent software applications called as services and they are available in the web.
3. Applications of IoT
Ans:
1. Smart home:
->By IoT, user can access the home appliances like security, lighting and entertainment remotely.
2. Smart TV:
Refrigerators with LCD screen: Gives information to your smart phone what’s inside, foods that
about to expire, ingredients you need to buy, etc.
3. Smart cities:
4. Wearables:
->Virtual glasses, smart watches are the examples of IoT wearable tools.
->IoT wearables can display calls, text messages, social media updates and track fitness.
5. Connected health:
The use of sensors connected to patients, allows doctors to monitor a patient’s condition outside
the hosoital.
6. Smart retail:
->Customers do not need to stand in a long queue as the checkout system easily reads the tags
from the products and deducts the total amounts.
7. Smart grid:
->It is used to monitor and manage everything remotely such as lighting, traffic lights, traffic jams,
etc.
->Also able to detects extreme situation of weather and influx energy from earthquakes.
4. Mesh topology
Ans: It is a type of network topology in which all devices in the network are interconnected. Data
can be transmitted by routing. It is of 2 types. 1) Full mesh topology, 2) Partial mesh topology.
IoT WoT
->Devices are connected to internet. ->It is made to handle the potential of IoT.
->Deals with actuators, sensors and
computation. ->Deals with web servers and protocols.
->Every IoT devices have a different protocol.
->A single protocol is used for multiple IoT
->Programming is difficult because of multiple devices.
protocols. ->Programming is easy so it doesn’t have
multiple protocols.
Ans: Agility IoT platform is the reliable, scalable and secure infrastructure used by KTS wireless
products. The solution consists of our cloud based servers and devices.
1. Reliable and Scalable: The cloud based server solution provides a scalable database backend
frontend by load-balancing servers. It is scalable to any degree to support large numbers of
devices.
Eg: Soil moisture monitoring application for agriculture us provided for high yield Ag solutions in
the MyFarm web application.
2. Worry Free Security: The secure messaging protocol makes use of Public Key Infrastructure (PKI)
where every message is digitally signed with a private key and is validated using the corresponding
public key.
Ans:
Application Layer: Enables the user to interact with the application whenever the user elects to
read messages or transfer the files. Eg: Skype and Outlook.
Application-Support Layer: Combination of presentation layer + session layer. It handles the
encryption and decryption. It also includes authentication and reconnection after an
interruption.
Transport Layer: It is responsible for transferring data across a network and provides error-
checking mechanisms. Determines how much data to send, where it gets sent and at what rate.
Network Layer: The primary function is to move data thru other networks. The protocols
accomplish this by packaging data with correct network address information. This layer is
applied in IP addresses for routing purposes.
Data Adaption Layer: It handles moving data into and out of a physical link in the network. It
also permits the transmission of data to network layer, where it is noticed.
Physical cum Data-link Layer: It transmits data using electrical and mechanical interfaces. It is
responsible for sending computer bits from one device to another along the network.
Ans:
->It is a computing infrastructure that combines computer resources spread over different
geographical locations to achieve a common goal.
->It is also can be in a form of parallel computing where instead of many CPU cores on a single
machine, it contains multiple cores spread across various locations.
->The concept of grid computing is not new but it is not perfected yet as there are no standard
rules.
(2) Provider: The computer contributes its resources to the network resource pool.
(3) User: The computer that uses the resources on the network.
Ans:
->It allows the requesting systems to access and manipulate textual representations of web
resources.
->”Web resources” were first defined on the World Wide Web (WWW) as documents identified
by URLs.
->In a RESTful web service, requests made to a resource's URI will elicit a response that may be in
XML, HTML, JSON, or some other format.
->The response may confirm that some alteration has been made to the stored resource, and the
response may provide hypertext links to other related resources or collections of resources.
->When HTTP is used, as is most common, the operations available are GET, POST, PUT, DELETE,
and other predefined CRUD HTTP methods.
->By using a stateless protocol and standard operations, REST systems aim for fast performance,
reliability, and the ability to grow, by re-using components that can be managed and updated
without affecting the system as a whole, even while it is running.
Ans:
IoT WoT
->Devices are connected to internet. ->It is made to handle the potential of IoT.
->Deals with actuators, sensors and
computation. ->Deals with web servers and protocols.
->Every IoT devices have a different protocol.
->A single protocol is used for multiple IoT
->Programming is difficult because of multiple devices.
protocols. ->Programming is easy so it doesn’t have
multiple protocols.
2. WWW:
->The World Wide Web is the general name for accessing the Internet via HTTP. The Internet is
the large container, and the web is a part within the container.
->The key to make the IoT takes off is nothing but WoT.
->There are also many applications in WoT:
1. Arduino,
2. Nanode,
3. AgSphere, etc
->The application server ecame the foundation that helped build widely spreading web-based
applications.
->An application server acts as a set of components accessible to the software developer through
an API defined by the middleware itself.
100%
5. Smart Card:
->The smart card along with contactless interface are becoming increasingly popular for payment
and tickeing applications.
Ans:
Communication middleware and platform middleware are closely related to each other.
Platform middleware refers to application frameworks or 3-tier application server.
Goal is to bring the IoT applications to the WWW.
According to WoT/IoT vision, everyday objects will be connected with each other and with
internet.
These will form a distributed network with sensing capabilities.
16. Explain in details data synchronization techniques in IoT. (16)
Ans:
-> Data Synchronization (Sync) is the process of establishing consistency and consolidation of data
between different devices.
File Synchronization: Faster and more error-proof than a manual copy technique, this method
is most used for home backups, external hard drives, or updating portable data via flash drive.
Version Control: This technique aims to provide synchronizing solutions for files that can be
altered by more than one user at the same time.
Distributed File Systems: When multiple file versions must be synced at the same time on
different devices, those devices must always be connected for the distributed file system to
work.
Mirror Computing: Mirror computing is used to provide different sources with an exact copy
of a data set. Especially useful for backup, mirror computing provides an exact copy to just
one other location — source to target.
Ans:
-> This data needs to be managed, processed, transferred and stored securely. Standardization is
key to achieving universally accepted specifications and protocols for true interoperability
between devices and applications.
-> The use of standards: ensures interoperable and cost-effective solutions, opens up
opportunities in new areas, allows the market to reach its full potential
-> It consists of 5 components: Sensors, Networks, Standards, Intelligent Analysis, and Intelligent
Actions.
Sensors
There two types of sensors: active sensors & passive sensors. The driving forces are new trends in
technology that made sensors cheaper, smarter and smaller. But the challenges facing IoT
sensors are: power consumption, security, and interoperability.
Networks
The second component of IoT implantation is to transmit the signals collected by sensors over
networks with all the different components of a typical network including routers, bridges in
different topologies. Connecting the different parts of networks to the sensors can be done by
different technologies including Wi-Fi, Bluetooth, Low Power Wi-Fi , etc.
Standards
The third stage in the implementation process includes the sum of all activities of handling,
processing and storing the data collected from the sensors.
There are two types of standards relevant for the aggregation process; technology
standards (including network protocols, communication protocols, and data-aggregation
standards) and regulatory standards (related to security and privacy of data, among other
issues). Challenges facing the adoptions of standards within IoT are: standard for handling
unstructured data, security and privacy issues in addition to regulatory standards for data
markets.
Intelligent Analysis
The fourth stage in IoT implementation is extracting insight from data for analysis. IoT analysis is
driven by cognitive technologies and the accompanying models that facilitate the use of cognitive
technologies. Challenges facing the adoption of analytics within IoT ; Inaccurate analysis due to
flaws in the data and/or model, legacy systems’ ability to analyze unstructured data, and legacy
systems’ ability to manage real- time data
Intelligent Actions
Intelligent actions can be expressed as M2M (Machine to Machine) and M2H (Machine to Human)
interfaces for example with all the advancement in UI and UX technologies. Challenges facing the
adoption of intelligent actions within IoT : machines’ actions in unpredictable situations,
information security and privacy, etc.
Ans:
-> The CoT is used to represent the ongoing trend for the next generation applications of IoT smart
services.
-> The IoT objects which generate a large amount of data that will be processed and analyzed in
the Cloud in order to produce important information.
-> That information is very sensitive information used by many smart services and/or applications.
-> Therefore, to achieve the objective of efficiently managing the large amount of data, the
existing cloud architecture needs to be reinforced.
-> This enhancement is important to be more efficient and practical for the IoT based real-time
services in terms of energy consumption, security, privacy, and end-to-end delays.
-> To overcome these two last problems, cloud architectures are migrating to distributed
architectures which are closer to the network edge like it is the case for Cloudlets, micro-cloud
and fog nodes.
-> The CoT networks, with these distributed architectures, can gain many facilities. The CoT
ecosystem describes it as a tiered architecture which is made of diverse devices interconnected.
-> These objects can be interconnected through various and different networked environments.
It acts as a plan for the technology and describes its components.
Architecture of CoT:
Applications of CoT
Healthcare
Smart city
Smart Home
Smart surveillance
Smart mobility
Smart logistics.
Environmental monitoring
Challenges
Ans:
Things/devices -Data-> Gateway -Data-> Cloud -Data-> Analytics -Data-> User Interface
(UI)
IoT connects multiple devices at a time to the internet thereby facilitating man to M2M
interactions.
IoT ecosystem is not limited to a particular realm but has applications in home
automation, vehicle automation, etc.
There are 4 fundamental components:
1. Sensors/devices
->It is ah/w device that takes the input from environment and gives to the system by
converting them.
->Actuators: It is a device that converts the electrical signals into the physical events. It takes
input from the system and gives output to the environment. Eg: Motors, heaters, etc.
->Smart devices continuously collect data from environment and transmit the data to the next
layer i.e. Gateway.
2. Gateway
-> It performs processing of the collected data form thousands of sensors locally before
transmitting it to the next layer i.e. cloud.
->It acts as a middle layer between sensors and cloud to protect the system from malicious
attacks.
->IoT cloud offers tools to collect, process, manage and store huge amount of data created by
devices and users.
->Distributed database management systems are the most important component of the IoT
cloud.
-> Analytics is nothing but converting analogue data form billions of smart devices into useful
insights which can be used for detailed analysis.
4. User Interface (UI)
-> UI should be well designed so that user can perform minimum effort to operate the IoT
devices through it.
b. Elements in IoT
1. Computer network: A control panel manages the 2-way data traffic between different
networks and protocols.
2. Sensors: One data form sensors is collected, that information need to be filtered and
sent to the end user.
3. Analytics: Analytics is nothing but converting analogue data form billions of smart
devices into useful insights which can be used for detailed analysis.
4. Gateway: It performs processing of the collected data form thousands of sensors locally
before transmitting it to the next layer i.e. cloud.
6. UI: UI should be well designed so that user can perform minimum effort to operate the
IoT devices through it.
7. H/w
8. Encryption
9. Actuators
Short notes:
1. TCP: At the transport level TCP has dominated the internet and web. It is used HTTP.
2. HTTP: The capability of processing high amounts of data HTTP can process extremely
large quantities of data.
4. WiFi: It provide internet connection to nearby devices that are within a certain range.
5. Bluetooth Low Energy: It works on low power and suitable for short range
communication similar to the classic Bluetooth.
Ans:
b. IoT communication models. Explain publish-subscribe communication model
&request-response communication model (16)
Ans: There are multiple kinds of models available in an Internet of Things system that is
used for communicating between the system and server, such as:
Request-response model
Push-pull model
Publish-subscribe model
Ans:
1. APIs are used to communicate between the server and system in IoT. Some API’s
include:
Stateless
Cacheable
Ans:
b. Cloud computing
Ans:
Ans:
d. Embedded systems
Ans:
An embedded system is a tiny computer that was built for a custom purpose.
Such a computer usually has a microprocessor or microcontroller, which is an integrated
circuit that typically contains processor, memory, and I/O (input/output) peripherals on
one chip.
What is the difference between the two?
Ans:
Device: An IoT device allows identification, remote sensing and actuating capabilities.
Resource: These are s/w components on the IoT device for accessing, processing, and storing
sensor information. It also includes the s/w components that enable network access for the
device.
Controller service: It is a native service that runs on the device and interacts with the web
services. Controller service sends data from the web service and receives commands from the
application controlling the service.
Database: It can be either local or in the cloud and stores data generated by the IoT device.
Web service: It serves as a link between the IoT device, application, and database. Web service
can be implemented by HTTP and REST principles or using WebScocket.
Application: IoT application provides an interface that the users can use to control and
monitor various aspects of the IoT system. Application also allows to users to view the system
status.
22. What is IEEE 802.15.4 protocol, how is it related to IoT.
Ans:
-> The institute of Electrical and Electronics Engineers (IEEE) supports many working groups to
maintain wireless and wire communication standards.
Eg: 802.3 (wired Ethernet), 802.11 (wireless LAN), 802.15.1 (bluetooth), 802.15.4 (largest standard for
low-data-rate WPANS).
-> a technical standard which defines the operation of a low-rate wireless personal area
network (LR-WPAN).
-> Provides framework in the OSI model for low cost, low power wireless connectivity networks (PAN).
Module: 2
Ans:
2. Difference between IoT and M2M.
Ans:
8. What is IoT level of home automation system? Explain.
Ans:
In the IoT home automation ecosystem, you can control your devices like light, fan, TV,
etc.
A domestic automation system usually connects controlled devices to a central hub or
gateway.
Smart Home Components:
Component-1 :
Smart Lighting –
Smart lighting for home helps in saving energy by adapting the life to the ambient
condition and switching on/off or dimming the light when needed.
Smart lighting solutions for homes achieve energy saving by sensing the human
movements and their environments and controlling the lights accordingly.
Component-2 :
Smart Appliances –
Smart appliances with the management are here and also provide status information to
the users remotely.
Smart washer/dryer can be controlled remotely and notify when the washing and drying
are complete.
Smart refrigerators can keep track of the item store and send updates to the users when
an item is low on stock.
Component-3 :
Intrusion Detection –
Home intrusion detection systems use security cameras and sensors to detect intrusion
and raise alerts.
Alert can we inform of an SMS or an email sent to the user.
Advanced systems can even send detailed alerts such as an image shoot or short video
clips.
Component-4 :
Smoke/gas detectors –
Smoke detectors are installed in homes and buildings to detect smoke that is typically an
early sign of Fire.
It uses optical detection, ionization for Air sampling techniques to detect smoke.
Gas detectors can detect the presence of harmful gases such as CO, LPG, etc.
It can raise alerts in the human voice describing where the problem is.
The first step in IoT system design methodology is to define the purpose and requirements of
the system. In this step, the system purpose, behaviour and requirements such as data
collection requirements, data analysis requirements, system management requirements, etc
are captured.
The second step in the IoT design methodology is to define the process specification. In this
step, the use cases of the IoT system are formally described based on and derived from the
purpose and requirement specifications.
The third step in the IoT design methodology is to define the Domain Model. The domain
model describes the main concepts, entities and objects in the domain of IoT system to be
designed. Domain model defines the attributes of the objects and relationships between
objects.
Step 4: Information Model Specification
The fourth step in the IoT design methodology is to define the Information Model. Information
Model defines the structure of all the information in the IoT system, for example, attributes
of Virtual Entities, relations, etc.
The sixth step in the IoT design methodology is to define the IoT level for the system.
The seventh step in the IoT design methodology is to define the Functional View. The
Functional View (FV) defines the functions of the IoT systems grouped into various Functional
Groups (FGs).
Step 8: Operational View Specification
The eighth step in the IoT design methodology is to define the Operational View Specifications.
In this step, various options pertaining to the IoT system deployment and operation are
defined, such as, service hosting options, storage options, device options, etc.
The ninth step in the IoT design methodology is the integration of the devices and
components.
Step 10: Application Development
The final step in the IoT design methodology is to develop the IoT application.
9. Explain about IoT level of weather monitoring system?
Ans:
Module 3:
Module: 4
Ans:
-> The use of IoT devices involves dealing with enormous volumes of information and interpreting it
in real-time to make meaningful insights.
-> For example, patients wear IoT-enabled bracelets that capture their heart rate, pulse, glucose level,
and much more, and send the information toBig data analytics needs to be implemented when IoT
devices are deployed as they produce large amounts of information.
-> Having access to real-time patient health metrics allows doctors to monitor the vital signs and adjust
the treatment plan whenever it is required.
-> Data can also be used for further research and drug studies. Big data is a huge part of the process
as it provides platforms and techniques to analyze information, recognize patterns, build algorithms
and draw conclusions.
-> This relationship allows big data to grow and become more sophisticated.
-> At the same time, big data technology is a tool that fuels the internet of things and helps it expand.
their physicians.
> They communicate with each other in real- > First of all, big data is voluminous, as it mostly
time and exchange information. The devices can deals with large amounts of information.
include complex machines as well as common Additionally, data is produced fast and
household objects, depending on the industry frequently, which is another feature of big data.
and purpose. > Finally, big data is diverse and involves dealing
with different types of information.
Ans:
Google Chart
Tableau
Microsoft Power BI
D3 (Data-Driven Documents)
Google Chart
Google Chart is one of the most accessible tools for visualization. With the help of google charts, you
can analyze small datasets to complex unstructured datasets.
We can implement simple charts as well as complex tree diagrams. Google Chart is available cross-
platform as well.
Tableau
The tableau desktop is a very easy-to-use its visualization tool. Two more versions are available of
Tableau. One is "Tableau Server," and the other is cloud-based "Tableau Online." Here we can perform
visualization operations by applying drag and drop methods for creating visual diagrams. In Tableau,
we can create dashboards very efficiently.
Microsoft Power BI
This tool is mainly used for business analysis. Microsoft Power BI can be run from desktops,
smartphones, and even tablets. This tool also provides analysis results very quickly.
D3
D3 is one of the best data visualization tools. D3.js is an open-source visualization tool.ig
Datawrapper
Datawrapper is a simple tool. Even non-technical persons can use the Datawrapper tool. Data
representation in a table format or responsive graphs like a bar chart, line chart, or map draws quickly
in the Datawrapper.
Databox
Databox is another visualization tool. It is an open-source tool. The whole data set can store in one
location in the Databox tool. Then discover the insight data and perform visualization operations. In
dashboard can view or match data from different datasets. Many more tools are available per
requirements and based on datasets. Visualization tools are chosen.
Ans:
-> Industry 4.0 is revolutionizing the way companies manufacture, improve and distribute their
products. Manufacturers are integrating new technologies, including Internet of Things (IoT), cloud
computing and analytics, and AI and machine learning into their production facilities and throughout
their operations.
1. Big Data and AI analytics: In Industry 4.0, Big Data is collected from a wide range of sources,
from factory equipment and Internet of Things (IoT) devices, to ERP and CRM systems, to
weather and traffic apps. Analytics powered by artificial intelligence (AI) and machine
learning are applied to the data in real time.
2. Horizontal and vertical integration: With horizontal integration, processes are tightly
integrated at the “field level” on the production floor, across multiple production facilities,
and across the entire supply chain. With vertical integration, all the layers of an organisation
are tied together.
3. Cloud computing: Cloud computing is the “great enabler” of Industry 4.0 and digital
transformation. Today’s cloud technology goes way beyond speed, scalability, storage, and
cost efficiencies. It provides the foundation for most advanced technologies.
4. Augmented reality (AR): Augmented reality, which overlays digital content on a real
environment, is a core concept of Industry 4.0. With an AR system, employees use smart
glasses or mobile devices to visualise real-time IoT data, repair or assembly instructions,
training content, and more when looking at a physical thing.
5. Industrial Internet of Things (IIoT): The Industrial Internet of Things is so central to Industry
4.0 that the two terms are often used interchangeably. This technology lets companies run
smoother supply chains, rapidly design and modify products, prevent equipment downtime,
and much more.
7. Autonomous robots: With Industry 4.0, a new generation of autonomous robots is emerging.
Programmed to perform tasks with minimal human intervention, autonomous robots vary
greatly in size and function, from inventory scanning drones to autonomous mobile robots for
pick and place operations.
9. Cybersecurity: With the increased connectivity and use of Big Data in Industry 4.0,
effective cybersecurity is paramount.
Ans:
Ans:
Bluetooth Low Energy is a wireless, low-power personal area network that operates in
the 2.4 GHz ISM band.
Its goal is to connect devices over a relatively short range.
BLE was created with IoT applications in mind, which has particular implications for its
design.
For example, IoT devices tend to be constrained and require extended battery use.
So BLE favours low power consumption over continuous data transfer. In other words:
when not in use, it goes into sleep mode to conserve energy.