Assingment Answers
Assingment Answers
A dynamic global n/w infrastructure with self configuring capabilities based on standard and
interoperable communication protocols where physical and virtual ―things‖ have identities,
physical attributes and virtual personalities and use intelligent interfaces, and are seamlessly
integrated into information n/w, often communicate data associated with users and their
environments.
The things in IoT refers to IoT devices which have unique identities and perform remote sensing,
actuating and monitoring capabilities. IoT devices can exchange data with other connected devices
applications. It collects data from other devices and process data either locally or remotely.
Characteristics:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically
adapt with the changing contexts and take actions based on their operating conditions, user‗s
context or sensed environment. Eg: the surveillance system is adapting itself based on context and
changing conditions.
2) Self Configuring: allowing a large number of devices to work together to provide certain
functionality.
3) Inter Operable Communication Protocols: support a number of interoperable communication
protocols and can communicate with other devices and also with infrastructure.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address).
5) Integrated into Information Network: that allow them to communicate and exchange data with
other devices and systems
2. List the various IoT protocols present in link layer, transport layer network layer and application?
Draw a suitable diagram.
a) Link Layer : Protocols determine how data is physically sent over the network‗s physical layer or
medium. Local network connect to which host is attached. Hosts on the same link exchange data
packets over the link layer using link layer protocols. Link layer determines how packets are coded
and signaled by the h/w device over the medium to which the host is attached.
802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. Eg: 802.3
uses co-axial cable; 802.3i uses copper twisted pair connection; 802.3j uses fiber optic connection;
802.3ae uses Ethernet over fiber.
802.11-WiFi: IEEE802.11 is a collection of wireless LAN(WLAN) communication standards
including extensive description of link layer. Eg: 802.11a operates in 5GHz band, 802.11b and
802.11g operates in 2.4GHz band, 802.11n operates in 2.4/5GHz band, 802.11ac operates in 5GHz
band, 802.11ad operates in 60Ghzband.
802.16 - WiMax: IEEE802.16 is a collection of wireless broadband standards including exclusive
description of link layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
802.15.4-LR-WPAN: IEEE802.15.4 is a collection of standards for low rate wireless personal area
network(LR-WPAN). Basis for high level communication protocols such as ZigBee. Provides data
rate from 40kb/s to250kb/s.
2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up to100Mb/s(4G).
B) Network/Internet Layer: Responsible for sending IP datagrams from source n/w to destination
n/w. Performs the host addressing and packet routing. Datagrams contains source and destination
address.
Protocols: IPv4: Internet Protocol version4 is used to identify the devices on a n/w using a
hierarchical addressing scheme. 32 bit address. Allows total of 2**32addresses. IPv6: Internet
Protocol version6 uses 128 bit address scheme and allows 2**128 addresses
2) Publish-Subscibe Model:
Involves publishers, brokers and consumers. Publishers are source of data. Publishers send data to
the topics which are managed by the broker. Publishers are not aware of the consumers. Consumers
subscribe to the topics which are managed by the broker. When the broker receives data for a topic
from the publisher, it sends the data to all the subscribed consumers.
4.Discuss REST based communication APIs (Request-Response Based Model)?
Representational State Transfer(REST) is a set of architectural principles by which we can design
web services and web APIs that focus on a system‗s resources and have resource states are
addressed and transferred.
The REST architectural constraints: Fig. shows communication between client server with REST
APIs.Client-Server: The principle behind client-server constraint is the separation of concerns.
Separation allows client and server to be independently developed and updated. Stateless: Each
request from client to server must contain all the info. Necessary to understand the request, and
cannot take advantage of any stored context on the server. Cache-able: Cache constraint requires
that the data within a response to a request be implicitly or explicitly labeled as cache-able or non-
cacheable. If a response is cache-able, then a client cache is given the right to reuse that response
data for later, equivalent requests. Layered System: constraints the behavior of components such
that each component cannot see beyond the immediate layer with which they are interacting. User
Interface: constraint requires that the method of communication between a client and a server must
be uniform. Code on Demand: Servers can provide executable code or scripts for clients to execute
in their context. This constraint is the only one that is optional.
5. Discuss any five IoT enabling technologies?
IoT Enabling Technologies IoT is enabled by several technologies including Wireless Sensor
Networks, Cloud Computing, Big Data Analytics, Embedded Systems, Security Protocols and
architectures, Communication Protocols, Web Services, Mobile internet and semantic search
engines. 1) Wireless Sensor Network(WSN): Comprises of distributed devices with sensors which
are used to monitor the environmental and physical conditions. Zig Bee is one of the most popular
wireless technologies used byWSNs. WSNs used in IoT systems are described as follows:
Weather Monitoring System: in which nodes collect temp, humidity and other data, which is
aggregated and analyzed. Indoor air quality monitoring systems: to collect data on the indoor air
quality and concentration of various gases. Soil Moisture Monitoring Systems: to monitor soil
moisture at variouslocations. Surveillance Systems: use WSNs for collecting surveillance
data(motiondata detection). Smart Grids : use WSNs for monitoring grids at variouspoints.
Structural Health Monitoring Systems: Use WSNs to monitor the health of structures(building,
bridges) by collecting vibrations from sensor nodes deployed at various points in the structure. 2)
Cloud Computing: Services are offered to users in different forms. Infrastructure-as-a-
service(IaaS):provides users the ability to provision computing and storage resources. These
resources are provided to the users as a virtual machine instances and virtual storage. Platform-
as-a-Service(PaaS): provides users the ability to develop and deploy application in cloud using the
development tools, APIs, software libraries and services provided by the cloud service provider.
Software-as-a-Service(SaaS): provides the user a complete software application or the user interface
to the application itself. 3) Big Data Analytics: Some examples of big data generated by IoT are
Sensor data generated by IoT systems. Machine sensor data collected from sensors established in
industrial and energy systems. Health and fitness data generated IoT devices. Data generated
by IoT systems for location and tracking vehicles. Data generated by retail inventory monitoring
systems. 4) Communication Protocols: form the back-bone of IoT systems and enable network
connectivity and coupling to applications. Allow devices to exchange data over network.
Define the exchange formats, data encoding addressing schemes for device and routing of packets
from source to destination. It includes sequence control, flow control and retransmission of lost
packets. 5) Embedded Systems: is a computer system that has computer hardware and software
embedded to perform specific tasks. Embedded System range from low cost miniaturized devices
such as digital watches to devices such as digital cameras, POS terminals, vending machines,
appliances etc.,
6. Discuss IoT reference model with a diagram.
The Reference Model consists of several sub-models that set the scope for the
IoT design space and that address architectural views and perspectives.The IoT
Reference Model aims at establishing a common grounding and a common language
for IoT architectures and IoT systems. It consists of the sub-models shown in Fig
The yellow arrows show how concepts and aspects of one model are used as the basis
for another.
The IoT Reference Model provides the highest abstraction level for the definition of
the IoT-A Architectural Reference Model. It promotes a common understanding of
the IoT domain. The description of the IoT Reference Model includes a general
discourse on the IoT domain, an IoT Domain Model as a top-level description, an IoT
Information Model explaining how IoT information is going to be modeled, and an
IoT Communication Model in order to understand specifics about communication
between many heterogeneous IoT devices and the Internet as a whole.
Connectivity
Connectivity is the first concerning issue, i.e., how to connect devices to the Internet and the cloud
computing platform. However, to a great extent, this is determined by the device application
environment and the type of communication infrastructure provided to these devices.
For example, if you need to develop a smart home device, such as an online toaster, you may access
a Wi-Fi home router or a ZigBee/Z-Wave IoT router. Therefore, your device must support one or
more transmission media. However, in some environments, such as the agriculture IoT or smart
cars, access to the Wi-Fi network is unavailable, and the mobile network may be your only choice
for connection.
Therefore, you must balance your choice and make design decisions based on possibilities provided
by every option and investments. For example, it may be expensive to transmit data through a
cellular network to the cloud service, but you may determine to select the function first mode or the
blockchain mode to build an IoT ecosystem that is less dependent on cloud computing.
IoT security has always been a controversial issue. The first challenge to be considered is that
security and privacy of IoT are fundamentally different from network security that we've known.
The following lists some key points for security design that are considerable:
1.Physical Security: IoT devices are often located in open fields, and are unattended and not
physically protected. You must ensure that they will not be maliciously tampered with by
vicious organization, breached by hackers, or operated using a flat-head screwdriver. Also,
you must protect data that gets stored on the devices in any form. Although it is costly to
embed a security protection component on every IoT device, it is still important to encrypt
data on these devices.
2.Security of Data Exchange: Data protection is also important because data must get
transmitted from the IoT sensors and devices to the gateway, and then to the cloud.
Therefore, use of encrypted transfer protocols is a must. In addition to encryption, you must
also consider the authentication and authorization to ensure IoT security.
3.Security of Cloud Storage: Data stored in the cloud is equally fragile as other parts of the
IoT ecosystem. Your platform should be able to protect data stored in the cloud. Protection
measures include appropriate encryption, access control, and so on.
4.Update: Security vulnerabilities always exist no matter how much efforts you pay to
enhance your product code and hardware. In this case, you must first have a plan to fix
errors and quickly release patches, instead of leaving the errors unfixed for a long period.
Next, you must provide customers with a direct and secure method to fix errors. Currently, it
is popular to update online devices over the air, but you must ensure that the above method
itself will not become a security vulnerability.
9. Explain the working of IoT device and WSN device with the help of block diagram?
In an IoT system, all of the sensors directly send their information to the internet. For
example, a sensor may be used to monitor the temperature of a body of water. In this case,
the data will be immediately or periodically sent directly to the internet, where a server can
process the data and it can be interpreted on a front-end interface.
Conversely, in a WSN, there is no direct connection to the internet. Instead, the various sensors connect to
some kind of router or central node. A person may then route the data from the router or central node as
they see fit. That being said, an IoT system can utilize a wireless sensor network by communicating with
its router to gather data.
IoT devices contain sensors and mini-computer processors that act on the data
collected by the sensors via machine learning. Essentially, IoT devices are mini
computers, connected to the internet, and are vulnerable to malware and hacking .
Software-Defined Networking (SDN) is a networking architecture that separates the control plane
from the data plane and centralizes the network controller. • Software-based SDN controllers
maintain a united view of the network • The underlying infrastructure in SDN uses simple packet
forwarding hardware as opposed to specialized hardware in conventional networks