0% found this document useful (0 votes)
61 views9 pages

Assingment Answers

The document discusses Internet of Things (IoT) protocols and technologies. It defines IoT as a network of physical devices connected via standards-based communication protocols. These "things" have identities and sensing/actuating capabilities, allowing them to exchange data over the network. The document then outlines various protocols used at different layers, including link (Ethernet, WiFi), network (IPv4, IPv6), transport (TCP, UDP), and application (HTTP, CoAP, MQTT) layers. It also discusses two common communication models - request-response and publish-subscribe. Finally, it identifies several enabling IoT technologies like wireless sensor networks, cloud computing, big data analytics, and embedded systems.

Uploaded by

Mohammad saheem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views9 pages

Assingment Answers

The document discusses Internet of Things (IoT) protocols and technologies. It defines IoT as a network of physical devices connected via standards-based communication protocols. These "things" have identities and sensing/actuating capabilities, allowing them to exchange data over the network. The document then outlines various protocols used at different layers, including link (Ethernet, WiFi), network (IPv4, IPv6), transport (TCP, UDP), and application (HTTP, CoAP, MQTT) layers. It also discusses two common communication models - request-response and publish-subscribe. Finally, it identifies several enabling IoT technologies like wireless sensor networks, cloud computing, big data analytics, and embedded systems.

Uploaded by

Mohammad saheem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODT, PDF, TXT or read online on Scribd
You are on page 1/ 9

1.What is IoT? What is meant by “Things” in IoT? What are the characteristics of IoT?

A dynamic global n/w infrastructure with self configuring capabilities based on standard and
interoperable communication protocols where physical and virtual ―things‖ have identities,
physical attributes and virtual personalities and use intelligent interfaces, and are seamlessly
integrated into information n/w, often communicate data associated with users and their
environments.
The things in IoT refers to IoT devices which have unique identities and perform remote sensing,
actuating and monitoring capabilities. IoT devices can exchange data with other connected devices
applications. It collects data from other devices and process data either locally or remotely.
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically
adapt with the changing contexts and take actions based on their operating conditions, user‗s
context or sensed environment. Eg: the surveillance system is adapting itself based on context and
changing conditions.
2) Self Configuring: allowing a large number of devices to work together to provide certain
functionality.
3) Inter Operable Communication Protocols: support a number of interoperable communication
protocols and can communicate with other devices and also with infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address).
5) Integrated into Information Network: that allow them to communicate and exchange data with
other devices and systems
2. List the various IoT protocols present in link layer, transport layer network layer and application?
Draw a suitable diagram.
a) Link Layer : Protocols determine how data is physically sent over the network‗s physical layer or
medium. Local network connect to which host is attached. Hosts on the same link exchange data
packets over the link layer using link layer protocols. Link layer determines how packets are coded
and signaled by the h/w device over the medium to which the host is attached.
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3
uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection;
802.3ae uses Ethernet over fiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards
including extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and
802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz
band, 802.11ad operates in 60Ghzband.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data
rate from 40kb/s to250kb/s.
2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).

B) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to destination
n/w. Performs the host addressing and packet routing. Datagrams contains source and destination
address.
Protocols:  IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2**32addresses.  IPv6: Internet
Protocol version6 uses 128 bit address scheme and allows 2**128 addresses

 6LOWPAN:(IPv6overLowpowerWirelessPersonalAreaNetwork)operates in 2.4 GHz frequency


range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer capability independent of the underlying
n/w. Set up on connection with ACK as in TCP and without ACK as in UDP. Provides functions
such as error control, segmentation, flow control and congestion control.
Protocols:  TCP: Transmission Control Protocol used by web browsers(along with HTTP and
HTTPS), email(along with SMTP, FTP). Connection oriented and stateless protocol. IP Protocol
deals with sending packets, TCP ensures reliable transmission of protocols in order. Avoids n/w
congestion and congestion collapse.  UDP: User Datagram Protocol is connectionless protocol.
Useful in time sensitive applications, very small data units to exchange. Transaction oriented and
stateless protocol. Does not provide guaranteed delivery.
D) Application Layer: Defines how the applications interface with lower layer protocolsto send data
over the n/w. Enables process-to-process communication using ports.
Protocols:  HTTP: Hyper Text Transfer Protocol that forms foundation of WWW. Follow
requestresponse model Stateless protocol.  CoAP: Constrained Application Protocol for machine-
to-machine (M2M) applications with constrained devices, constrained environment and constrained
n/w. Uses clientserver architecture.  WebSocket: allows full duplex communication over a single
socket connection.  MQTT: Message Queue Telemetry Transport is light weight messaging
protocol based on publish-subscribe model. Uses client server architecture. Well suited for
constrained environment.  XMPP: Extensible Message and Presence Protocol for real time
communication and streaming XML data between network entities. Support client-server and
server-server communication.  DDS: Data Distribution Service is data centric middleware
standards for device-to-device or machine-to-machine communication. Uses publish-subscribe
model.  AMQP: Advanced Message Queuing Protocol is open application layer protocol for
business messaging. Supports both point-to-point and publish-subscribe model
3.What are the IoT Functional Blocks? Explain the following with suitable diagram: a. Request-
Response Model b. Publish-Subscribe Model
1) Request-Response Model:
In which the client sends request to the server and the server replies to requests. Is a stateless
communication model and each request-response pair is independent of others.

2) Publish-Subscibe Model:
Involves publishers, brokers and consumers. Publishers are source of data. Publishers send data to
the topics which are managed by the broker. Publishers are not aware of the consumers. Consumers
subscribe to the topics which are managed by the broker. When the broker receives data for a topic
from the publisher, it sends the data to all the subscribed consumers.
4.Discuss REST based communication APIs (Request-Response Based Model)?
Representational State Transfer(REST) is a set of architectural principles by which we can design
web services and web APIs that focus on a system‗s resources and have resource states are
addressed and transferred.
The REST architectural constraints: Fig. shows communication between client server with REST
APIs.Client-Server: The principle behind client-server constraint is the separation of concerns.
Separation allows client and server to be independently developed and updated. Stateless: Each
request from client to server must contain all the info. Necessary to understand the request, and
cannot take advantage of any stored context on the server. Cache-able: Cache constraint requires
that the data within a response to a request be implicitly or explicitly labeled as cache-able or non-
cacheable. If a response is cache-able, then a client cache is given the right to reuse that response
data for later, equivalent requests. Layered System: constraints the behavior of components such
that each component cannot see beyond the immediate layer with which they are interacting. User
Interface: constraint requires that the method of communication between a client and a server must
be uniform. Code on Demand: Servers can provide executable code or scripts for clients to execute
in their context. This constraint is the only one that is optional.
5. Discuss any five IoT enabling technologies?
IoT Enabling Technologies IoT is enabled by several technologies including Wireless Sensor
Networks, Cloud Computing, Big Data Analytics, Embedded Systems, Security Protocols and
architectures, Communication Protocols, Web Services, Mobile internet and semantic search
engines. 1) Wireless Sensor Network(WSN): Comprises of distributed devices with sensors which
are used to monitor the environmental and physical conditions. Zig Bee is one of the most popular
wireless technologies used byWSNs. WSNs used in IoT systems are described as follows: 
Weather Monitoring System: in which nodes collect temp, humidity and other data, which is
aggregated and analyzed.  Indoor air quality monitoring systems: to collect data on the indoor air
quality and concentration of various gases.  Soil Moisture Monitoring Systems: to monitor soil
moisture at variouslocations.  Surveillance Systems: use WSNs for collecting surveillance
data(motiondata detection).  Smart Grids : use WSNs for monitoring grids at variouspoints.
Structural Health Monitoring Systems: Use WSNs to monitor the health of structures(building,
bridges) by collecting vibrations from sensor nodes deployed at various points in the structure. 2)
Cloud Computing: Services are offered to users in different forms.  Infrastructure-as-a-
service(IaaS):provides users the ability to provision computing and storage resources. These
resources are provided to the users as a virtual machine instances and virtual storage.  Platform-
as-a-Service(PaaS): provides users the ability to develop and deploy application in cloud using the
development tools, APIs, software libraries and services provided by the cloud service provider. 
Software-as-a-Service(SaaS): provides the user a complete software application or the user interface
to the application itself. 3) Big Data Analytics: Some examples of big data generated by IoT are 
Sensor data generated by IoT systems.  Machine sensor data collected from sensors established in
industrial and energy systems.  Health and fitness data generated IoT devices.  Data generated
by IoT systems for location and tracking vehicles.  Data generated by retail inventory monitoring
systems. 4) Communication Protocols: form the back-bone of IoT systems and enable network
connectivity and coupling to applications.  Allow devices to exchange data over network. 
Define the exchange formats, data encoding addressing schemes for device and routing of packets
from source to destination.  It includes sequence control, flow control and retransmission of lost
packets. 5) Embedded Systems: is a computer system that has computer hardware and software
embedded to perform specific tasks. Embedded System range from low cost miniaturized devices
such as digital watches to devices such as digital cameras, POS terminals, vending machines,
appliances etc.,
6. Discuss IoT reference model with a diagram.
The Reference Model consists of several sub-models that set the scope for the
IoT design space and that address architectural views and perspectives.The IoT
Reference Model aims at establishing a common grounding and a common language
for IoT architectures and IoT systems. It consists of the sub-models shown in Fig
The yellow arrows show how concepts and aspects of one model are used as the basis
for another.
The IoT Reference Model provides the highest abstraction level for the definition of
the IoT-A Architectural Reference Model. It promotes a common understanding of
the IoT domain. The description of the IoT Reference Model includes a general
discourse on the IoT domain, an IoT Domain Model as a top-level description, an IoT
Information Model explaining how IoT information is going to be modeled, and an
IoT Communication Model in order to understand specifics about communication
between many heterogeneous IoT devices and the Internet as a whole.

7. Explain the IoT-Fog Architecture with the help of suitable diagram?


 Fog Computing paradigm utilizes local computing resources locating at the network edge instead of those residing at the
cloud for processing data collected from sensors linked to physical devices in an IoT platform.
the physical distance between data source(s) and the data centre makes delays a
frequent problem in cloud computing infrastructures. Fog computing has been
proposed as a distributed service computing model that provides a solution to these
limitations. It is based on a para-virtualized architecture that fully utilizes the
computing functions of terminal devices and the advantages of local proximity
processing.
It is defined as a distributed computing infrastructure for the internet of things (IoT)
that extends computing power and data analytics applications to the “edge” of the
network. A fog computing model is equivalent to a local cloud, where data
management is done and controlled by the users themselves. Users can analyze and
manage their data at any time, from anywhere and in any way. The core idea of fog
computing lies in the “smart front-end” concepts which promotes the use of
networked or dedicated devices to provide computing, storage, and network
communication services between cloud servers and terminal devices. Thus, bringing
data storage and computing much closer to acquisition terminal; reducing data
transmission and storage overhead, improving application response speed and
improving the utilization of network resources.
Fog computing can be viewed as a middle layer between cloud computing and
terminal computing. It is located at the edge of the network and close to the terminal.
It is often combined with cloud computing to form a common network structure
model, which includes the cloud computing layer, fog computing layer and terminal
access layer as shown in Figure 1. In the coverage area of the fog node, various
intelligent terminals access the node and achieve interconnection and
intercommunication. In addition, the fog computing layer is able to complete the
direct computing processing thereby reducing network transmission delay from
sending/receiving from the remote cloud. Initially, the number of fog nodes was
small and easily manageable, but their number has increased drastically in recent
times. This increase in IoT terminals has brought the critical issue of energy
consumption in fog nodes to the limelight. It is, therefore, an inevitably important
research area for the development of IoT.
8. What are the challenges faced in establishing IoT network?
challenges you may face for IoT network.

Connectivity

Connectivity is the first concerning issue, i.e., how to connect devices to the Internet and the cloud
computing platform. However, to a great extent, this is determined by the device application
environment and the type of communication infrastructure provided to these devices.

For example, if you need to develop a smart home device, such as an online toaster, you may access
a Wi-Fi home router or a ZigBee/Z-Wave IoT router. Therefore, your device must support one or
more transmission media. However, in some environments, such as the agriculture IoT or smart
cars, access to the Wi-Fi network is unavailable, and the mobile network may be your only choice
for connection.

Therefore, you must balance your choice and make design decisions based on possibilities provided
by every option and investments. For example, it may be expensive to transmit data through a
cellular network to the cloud service, but you may determine to select the function first mode or the
blockchain mode to build an IoT ecosystem that is less dependent on cloud computing.

Security and Privacy

IoT security has always been a controversial issue. The first challenge to be considered is that
security and privacy of IoT are fundamentally different from network security that we've known.
The following lists some key points for security design that are considerable:

1.Physical Security: IoT devices are often located in open fields, and are unattended and not
physically protected. You must ensure that they will not be maliciously tampered with by
vicious organization, breached by hackers, or operated using a flat-head screwdriver. Also,
you must protect data that gets stored on the devices in any form. Although it is costly to
embed a security protection component on every IoT device, it is still important to encrypt
data on these devices.

2.Security of Data Exchange: Data protection is also important because data must get
transmitted from the IoT sensors and devices to the gateway, and then to the cloud.
Therefore, use of encrypted transfer protocols is a must. In addition to encryption, you must
also consider the authentication and authorization to ensure IoT security.

3.Security of Cloud Storage: Data stored in the cloud is equally fragile as other parts of the
IoT ecosystem. Your platform should be able to protect data stored in the cloud. Protection
measures include appropriate encryption, access control, and so on.

4.Update: Security vulnerabilities always exist no matter how much efforts you pay to
enhance your product code and hardware. In this case, you must first have a plan to fix
errors and quickly release patches, instead of leaving the errors unfixed for a long period.
Next, you must provide customers with a direct and secure method to fix errors. Currently, it
is popular to update online devices over the air, but you must ensure that the above method
itself will not become a security vulnerability.

9. Explain the working of IoT device and WSN device with the help of block diagram?

In an IoT system, all of the sensors directly send their information to the internet. For
example, a sensor may be used to monitor the temperature of a body of water. In this case,
the data will be immediately or periodically sent directly to the internet, where a server can
process the data and it can be interpreted on a front-end interface.

Conversely, in a WSN, there is no direct connection to the internet. Instead, the various sensors connect to
some kind of router or central node. A person may then route the data from the router or central node as
they see fit. That being said, an IoT system can utilize a wireless sensor network by communicating with
its router to gather data.

IoT devices contain sensors and mini-computer processors that act on the data
collected by the sensors via machine learning. Essentially, IoT devices are mini
computers, connected to the internet, and are vulnerable to malware and hacking .

A Wireless sensor network can be defined as a network of devices that can communicate


the information gathered from a monitored field through wireless links. The data is
forwarded through multiple nodes, and with a gateway, the data is connected to
other networks like wireless Ethernet.
10. What is Software defined networking (SDN) and Network function virtualization (NFV) for IoT
?

Software-Defined Networking (SDN) is a networking architecture that separates the control plane
from the data plane and centralizes the network controller. • Software-based SDN controllers
maintain a united view of the network • The underlying infrastructure in SDN uses simple packet
forwarding hardware as opposed to specialized hardware in conventional networks

Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate


the heterogeneous network devices onto industry standard high volume servers, switches and
storage. • NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can
run.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy