Unit 2 Aug30
Unit 2 Aug30
Info related
functioning of the 32
lights, the faulty
periodic intervals. lights, about the
presence or absence
of traffic in group
vicinity, and about the
ambient conditions,
whether cloudy, dark
or normal daylight.
The station remotely programs the group controllers, which automatically take an
appropriate action as per the conditions of traffic and light levels. It also directs remedial
actions in case a fault develops in a light at a specific location.
Seven-layer generalised OSI model (on left) and IETF six layer modified OSI model for
IoT/ M2M (in the middle), and similarity with the conceptual framework Equation (on
Consider a model for Internet of streetlights
Following are the layers for data interchange in the modified OSI model:
L1: It consists of smart sensing and data-link circuits with each streetlight
transferring the sensed data to L2.
L2: It consists of a group-controller which receives data of each group through
Bluetooth or ZigBee, aggregates and compacts the data for communication to the
Internet, and controls the group streetlights as per the program commands from a
central station.
L3: It communicates a network stream on the Internet to the next layer.
L4: The transport layer does device identity management, identity registry and data
routing to the next layer
L5: The application-support layer does data managing, acquiring, organising and
analysing, and functionalities of standard protocols such as CoAP, UDP and IP.
L6: The application layer enables remote programming and issue of central
station directions to switch on-off and commands of services to the controllers
along with monitoring each group of streetlights in the whole city
Data communicates from device end to application end. Each
layer processes the received data and creates a new data stack
which transfers it to the next layer.
Each layer processes the received data and creates a new data
stack which transfers it to the next layer.
ITU-T reference model RM1, its correspondence with six layers of modified OSI and a comparison with seven
levels suggested in CISCO IoT reference model RM2
• Three end devices, two routers, one sensor node connected
to coordinator ZigBee devices forming a star network.
• One end device, two routers and one coordinator forming a
mesh network.
• Mesh network router connects to an AP/gateway, which in
turn connects to a cellular network.
• Coordinator of mesh network connects to ZigBee IP border
router, which enables local ZigBee networks’ connectivity
to the Internet
• A router in star network connects to 6LoWPAN, which
connects an IEEE 802.15.4 devices network to IPv6
network.
• 1000s of byte communicate between the network layer
and IoT web objects.
• 127 B communication between the adaptation layer
IEEE 802.15.4 devices at single data transfer.
• IETF ND (Neighbour Discovery), ROLL (Routing Over
Low power Loss Network), RPL routing, IPv6/IPv4
network, TCP/UDP/ICMP transport, SSL/TLS security
layer protocols for the communication between web
object/application and ZigBee devices
• Wi-Fi is an interface technology that uses IEEE 802.11
protocol and enables the Wireless Local Area Networks
(WLANs).
• Wi-Fi connects distributed WLAN networks using the
Internet.
• The issues of Wi-Fi interfaces, APs and routers are higher
power consumption, interference and performance
degradation
Wi-Fi interfaces connect within themselves or to an AP or wireless
router using Wi-Fi PCMCIA or PCI card or built-in circuit cards
PCMCIA (Personal Computer Memory Card International
Association) is an organization that developed a standard for
peripheral interface devices,
PCI (Peripheral Component Interconnect) is a hardware bus
standard used for connecting peripheral devices to a computer's
motherboard.
SSID: ECE-LARA
Protocol: Wi-Fi 4 (802.11n)
Security type: WPA2-Personal
Manufacturer: MediaTek, Inc.
Description: MediaTek Wi-Fi 6 MT7921 Wireless LAN Card
Driver version: 23.32.2.558
Network band: 2.4 GHz
Network channel: 1
Link speed (Receive/Transmit): 216/162 (Mbps)
Link-local IPv6 address: fe80::7ed9:5edb:edad:6ae1%7
IPv4 address: 192.168.0.24
IPv4 DNS servers: 8.8.8.8 (Unencrypted)
8.8.4.4 (Unencrypted)
Physical address (MAC): E8-65-38-E0-C6-0F
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to
automatically assign IP addresses and other network configuration parameters to devices on a
network. This allows devices to communicate on an IP network without the need for manual
configuration.
The Wi-Fi interfaces, access points, routers features are as follows :
Generally used are the 2.4 GHz IEEE 802.11b adapters or 5 GHz (802.11a or 802.11g) or
802.11n or other 802.11 series protocols.
Interfaces use 2.4 GHz or 5 GHz antenna Offers mobility and roaming
Have easy installation simplicity and flexibility
Coverage range is 30 m to 125 m
Used in a room having the limited-coverage 802.11a which coexists with b, coexists with b
and g
Uses the 802.11b in wider coverage range because that is unaffected by walls and is meant
for hotspots for public usage having range data rate 11 Mbps (802.11b) within 30 m
Uses 802.11g for high data rates up to 54 Mbps, and 802.11n for very high 600 Mbps,
using multiple antennas to increase data rates
Interoperable with wireless as well as wired infrastructure which ensures compatibility and
enables easier access and hides complexity when enabling the wireless access to data,
media and streams, and applications and services.
Provides a dynamic environment of network expendability and scalability.
Scalability means a system can have a large number of smaller interfaces, routers and APs
Provides security, integrity and reliability
Uses Wireless Protected Access (WPA) and Wired Equivalent Privacy (WEP) security
sublayers
When discussing Bluetooth with AMP, the term AMP stands for Alternate
MAC/PHY. This is a feature in Bluetooth technology that enhances the data transfer
capabilities by allowing Bluetooth to use alternate physical layers (PHY) beyond the
traditional Bluetooth radio for high-speed data transmission.
RF transmitters, receivers, and transceivers are the simplest RF circuits. A
transceiver transmits the RF from one end and receives the RF from the
other end
These lines are crucial for the data exchange between a master
device (e.g., a microcontroller) and one or more slave devices
(e.g., sensors, memory chips).
MISO
• This line is used to send data from the slave device back to the
master device.
• Data flows from the slave to the master.
MOSI
• This line is used to send data from the master device to the slave
device.
• Data flows from the master to the slave.
I2C
A number of device integrated circuits for sensors,
actuators, flash memory and touchscreens need data
exchanges in a number of processes.
Four potential modes of operation (viz. master transmit,
master receive, slave transmit and slave receive)
I2C bus has two lines that carry the signals—one line is for
the clock and one is for bidirectional data.
Master: Controls the bus
Initiates the communication
Generates the clock signal
Wired USB
USB is a standard for cables, connectors, and protocols used for
communication,
The USB standard defines how devices like keyboards, mice,
printers, external drives, and pen drives connect to and
communicate with computers.
USB is a polled bus. Polling mode functions as: A host controller regularly polls
the presence of a device as scheduled by the software. It sends a token packet. The
token consists of fields for type, direction, USB device address and device end-
point number.
The device does handshaking through a handshake packet, indicating successful
or unsuccessful transmission. A CRC field in a data packet permits error detection
A USB supports three types of pipes—
Stream with no USB-defined protocol is used when the connection
is already established and the data flow starts.
Default control is for providing access.
Message is for control functions of the device.
Uses passive broadcast medium and is wired connections based
Formatting of frame (serially sent bits as PDU of MAC layer) is
according to IEEE 802.2 standard
Uses a 48-bit MAC address assigned distinctly to each computer on
the LAN
Address Resolution Protocol (ARP) resolves a 32 bit IP address at
Internet device LANs. Each frame at a LAN destination host media
address. Reverse Address Resolution Protocol (RARP) resolves 48 bit
destination host media address into 32 bit IP addresses for Internet
communication.
Uses wired bus topology, and transmission speeds are 10 Mbps, 100
Mbps (unshielded and shielded wires), 1 Gbps (high-quality coaxial
cable), 4 Gbps (in twisted pair wiring mode) and 10 Gbps (fiber-optic
Collision Detection). The CSMA/CD mode is half-duplex (wired mode)
which means transmit (Tx) and receive (Rx) signals can be sent on the same
wire or data path. Each one connected to a common communication channel
in the network listens and if the channel is idle then transmits. If not idle, it
waits and tries again. A mode is full-duplex in case of optical-fibre-based
Ethernet that transmits and receives signals separated on dedicated, one-way
channels.
Uses transmission data stack into frames at MAC layer, and each frame
includes a header. The header’s first eight bytes specify a preamble. The
preamble is for indicating start of a frame and is used for synchronisation.
Then the header has next six bytes’ destination address and then six bytes of
the source address. Then next six bytes are for the type field. These are
meaningful only for the higher network layers and define the length of the
data stack to the next layer. Next, minimum 72 bytes and maximum 1500
bytes of data follow the length definition. The last 4 bytes are for CRC
(Cyclic Redundancy Check) for the frame sequence check.
1.Data-Driven Decision Making
Justification: IoT systems generate vast amounts of real-time data from
sensors and devices. BI tools are essential for analyzing this data to extract
meaningful insights, trends, and patterns. Without BI, organizations may
struggle to process and interpret the massive volumes of data produced by
IoT devices, missing opportunities for informed decision-making.
2. Tableau
- Features:
- Advanced data visualization with interactive dashboards
- Integration with cloud platforms and IoT data sources (AWS IoT, Azure IoT, Google Cloud IoT)
- Data analytics capabilities such as forecasting and trend analysis
- Easy collaboration and sharing across teams
- Use Case: Tableau is commonly used to visualize large-scale IoT data for smart cities, energy management,
and IoT-based customer analytics. Its real-time data integration supports the monitoring and optimization of
connected devices.
## 8. Sisense
- Features:
- Unified data analytics platform for IoT and other data sources
- Real-time data processing with API integration for IoT systems
- Advanced data visualization and embedded analytics capabilities
- AI and machine learning-driven insights
- Use Case: Sisense is ideal for IoT data analysis in industries such as retail (connected shopping
experiences), healthcare (patient monitoring), and logistics (supply chain tracking). It can process large-scale
data from connected devices and present it in actionable dashboards.
## 9. Zoho Analytics
- Features:
- Integrates with IoT platforms via API and other data connectors
- Automated reporting and data visualization
- AI-driven insights with built-in predictive analytics
- Cloud-based for easy access and collaboration
- Use Case: Zoho Analytics is commonly used for small and medium-sized businesses (SMBs) that require
affordable BI solutions to monitor IoT systems. It’s useful in retail IoT, home automation, and fleet management
applications.
## Conclusion:
Each of these BI tools has strengths in different areas of IoT data analytics, whether it's real-time monitoring,
predictive analytics, or large-scale data visualization. The choice of BI tool depends on the specific needs of the IoT
Establishing Near Field Communication (NFC) systems can
present several design issues, particularly in terms of
hardware, software, security, and user experience. Below
are some key design challenges:
1. Power Management
- Issue: NFC is a low-power communication system, but ensuring that NFC devices, especially passive ones
(like NFC tags), have enough power to transmit data can be challenging.
- Solution: Implementing efficient power harvesting mechanisms for passive devices is essential, as is
designing energy-efficient protocols for active devices.
2. Range Limitations
- Issue: NFC operates over very short distances (typically within 4 cm). This limitation can pose challenges in
terms of usability, requiring users to bring devices very close together.
- Solution: Designers must ensure accurate alignment between devices or tags to prevent communication
errors and user frustration.
3. Interference
- Issue: NFC operates on the same frequency as other wireless communication systems (13.56 MHz), which
can result in interference or signal degradation, particularly in environments with multiple wireless systems.
- Solution: Careful frequency management and signal processing techniques are necessary to avoid cross-
talk and interference from other devices.
4. Security
- Issue: NFC's proximity-based communication makes it vulnerable to eavesdropping, data corruption, and
relay attacks (man-in-the-middle attacks).
- Solution: Implement strong encryption, authentication mechanisms, and secure communication protocols to
protect data. For example, protocols like secure element (SE) and Host Card Emulation (HCE) can enhance
5. Compatibility
- Issue: Devices from different manufacturers may not always be fully compatible, leading to issues in cross-
platform NFC communication.
- Solution: Ensuring compliance with NFC standards (such as ISO/IEC 14443 or ISO/IEC 18092) can improve
interoperability between devices from different vendors.
9. Environmental Considerations
- Issue: NFC performance can be affected by environmental factors like metal surfaces, water, and other
obstacles that might block or degrade the signal.
- Solution: Designers need to use shielding techniques and choose appropriate materials to ensure reliable
performance in diverse environments.
By addressing these design issues, developers and engineers can create robust and efficient NFC systems
suitable for a wide range of applications, from mobile payments to smart cards and IoT devices.