IoT Unit-I Question
IoT Unit-I Question
(AUTONOMOUS)
Siddharth Nagar, Narayanavanam Road – 517583
QUESTION BANK (DESCRIPTIVE)
UNIT –I
IOT INTRODUCTION & CONCEPTS
Definition of IoT: A dynamic global n/w infrastructure with self-configuring capabilities based
on standard and interoperable communication protocols where physical and virtual “things”
have identities, physical attributes and virtual personalities and use intelligent interfaces, and
are seamlessly integrated into information n/w, often communicate data associated with users
and their environments.
Characteristics of IoT:
1) Dynamic & Self Adapting: IoT devices and systems may have the capability to dynamically
adapt with the changing contexts and take actions based on their operating conditions, user’s
context or sensed environment.
4) Unique Identity: Each IoT device has a unique identity and a unique identifier (IP address).
5) Integrated into Information Network: IoT devices are usually integrated into the
information network that allow them to communicate and exchange data with other devices
and systems.
The “Things “in IoT usually refers to IoT devices which have unique identities and can perform
remote sensing, actuating and monitoring capabilities. IoT devices can exchange data with
other connected devices and applications (directly or indirectly), or collect data from other
devices and process the data either locally or send the data to centralized servers or cloud-based
application back-ends for processing the data, or perform some tasks locally and other tasks
within the IoT infrastructure, based on temporal and constraints.
An IoT device may consist of several interfaces for communication to other devices both wired
and wireless. These includes (i) I/O interfaces for sensors, (ii) Interfaces for internet
connectivity (iii) memory and storage interfaces and (iv) audio/video interfaces.
Applications of IoT:
Link Layer: Link layer protocols determine how the data is physically sent over the network’s
physical layer or medium. The scope of the link layer is the local network connection to which
host is attached. Hosts on the same link exchange data packets over the link layer using link
layer protocols. Link layer determines how the packets are coded and signaled by the hardware
device over the medium to which the host is attached.
Protocols:
• 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet standards for the link layer. For
example, 802.3 is the standard for 10BASE5 Ethernet that uses co-axial cable as a shared
medium, 802.3.i is the standard for 10BASE-T Ethernet over copper twisted pair connection;
802.3.j is the standard for 10BASE-F Ethernet over fiber optic connection; 802.3ae is the
standard for 10Gbits/s Ethernet over fiber and so on. These standards provide data rates from
10Mb/s to 40 Gb/s and higher.
3 a) With the help of neat Sketch, describe the levels1-3 and deployment templates
of IoT with an example each.
IoT Level 1: A level-1 IoT system has a single node/device that performs sensing and/or
actuation, stores data, performs analysis and host the application as shown in fig. Level-1 IoT
systems are suitable for modeling low cost and low complexity solutions where the data
involved is not big and analysis requirement are not computationally intensive. An example of
a level-1 IoT system for home automation.
IoT Level-2: A level-2 IoT system has a single node that performs sensing and/or actuating
and local analysis as shown in fig. Data is stored in the cloud and application is usually cloud
based. Level-2 IoT systems are suitable for solutions where data are involved is big, however,
the primary analysis requirement is not computationally intensive and can be done locally
itself. An example of a Level-2 IoT system for Smart Irrigation.
COURSE CODE: 20EC0453 R20
IoT Level-3: A level-3 system has a single node. Data is stored and analyzed in the cloud
application is cloud based as shown in fig. Level-3 IoT systems are suitable for solutions where
the data involved is big and analysis requirements are computationally intensive. An example
of a IoT level-3 system for tracking package handling.
3 b) With the help of neat Sketch, describe the levels4-6 and deployment templates
of IoT with an example each.
IoT Level-4: A level-4 IoT system has multiple nodes that perform local analysis. Data is
stored in the cloud and application is cloud based as shown in fig. Level-4 contains local and
cloud-based observer nodes which can subscribe to and receive information collected in the
cloud from IoT devices. Observer nodes can process information and use it for various
COURSE CODE: 20EC0453 R20
applications; however, observer nodes do not perform any control functions. Level-4 IoT
systems are suitable for solutions where multiple nodes are required, the data involved is big
and the analysis requirements are computationally intensive. An example of a Level-4 IoT
system for Noise Monitoring.
IoT Level-5: A level-5 IoT system has multiple end nodes and one coordinator node as shown
in fig. The end nodes that perform sensing and/or actuation. Coordinator node collects data
from the end nodes and sends to the cloud. Data is stored and analyzed in the cloud and
application is cloud based. Level5 IoT systems are suitable for solution based on wireless
sensor network, in which data involved is big and analysis requirements are computationally
intensive. An example of a Level-5 IoT system for Forest Fire Detection.
COURSE CODE: 20EC0453 R20
IoT Level-6: A level-6 IoT system has multiple independent end nodes that perform sensing
and/or actuation and send data to the cloud. Data is stored in the cloud and application is cloud-
based as shown in fig. The analytics component analyses the data and stores the result in the
cloud data base. The results are visualized with cloud-based application. The centralized
controller is aware of the status of all the end nodes and sends control commands to the nodes.
An example of a Level-6 IoT system for Weather Monitoring System.
The scope of IoT is not limited to jus connecting things (devices, appliances, machines) to the
internet. Iot allows these things to communicate and exchange data (control & information,
that could include data associated with users) while executing meaningful applications towards
a common user or machine goal.
4b) What are the protocols associated with network/internet layer of IoT? Explain
them in detail.
Network/Internet Layer: The network layers are responsible for sending of IP datagrams
from source network to destination network. This layer performs the host addressing and packet
routing. The datagrams contain source and destination address which are used to route them
from the source to destination across multiple networks.
Protocols:
• IPv4: Internet Protocol version4 is the most deployed internet protocol that is used to
identify the devices on a network using a hierarchical addressing scheme. IPv4 uses a
32-bit address scheme that allows total of 232 or 4,294,967,296 addresses.
• IPv6: Internet Protocol version6 is the newest version of internet protocol and successor
to IPv4. IPv6 uses 128-bit address scheme that allows total of 2128 or 3.4*1038 addresses.
• 6 LoWPAN: 6LoWPAN brings IP protocol to the low power devices which have
limited processing capability. 6LoWPAN operates in the 2.4 GHz frequency range and
provides data transfer rates of 250 Kb/s.
5 b) Illustrate the physical generic block diagram of an IoT device and explain it
briefly.
It shows a block diagram of a typical IoT device. An IoT device may consist of several
interfaces for connections to other devices, both wired and wireless. These include (i) I/O
interfaces for sensors, (ii) interfaces for internet connectivity, (iii) memory and storage
interfaces and (iv) audio/video interfaces. An IoT device can collect various types of data from
the on board or attached sensors, such as temperature, humidity, light intensity. The sensed
data can be communicated either to other devices or cloud-based servers/storage. IoT devices
can be connected to actuators that allow them to interact with other physical entities in the
vicinity of the device.
Transport Layer: The transport layer provides end-to-end message transfer capability
independent of the underlying network. The message transfer capability can be set up on
connections, either using handshakes (as in TCP) or without handshakes/acknowledgements
(as in UDP). The transport layer provides functions such as error control, segmentation, flow
control and congestion control.
COURSE CODE: 20EC0453 R20
Protocols:
• TCP: Transmission Control Protocol is the most widely used transport layer protocol, that is
used by web browsers (along with HTTP, HTTPS application layer protocols), email programs
(SMTP application layer protocol) and file transfer (FTP). TCP is a connection oriented and
stateful protocol. While IP Protocol deals with sending packets, TCP ensures reliable
transmission of packets in order. TCP also provides error detection capability so that duplicate
packets can be discarded and lost packets are retransmitted. The congestion control capability
of TCP helps in Avoids network congestion and congestion collapse which can lead to
degradation of network performance.
• UDP: User Datagram Protocol is connectionless protocol. UDP is useful for time sensitive
applications that have very small data units to exchange and do not want the overhead of
connection setup. UDP is Transaction oriented and stateless protocol. UDP does not provide
guaranteed delivery, ordering of messages and duplicate elimination. Higher levels of protocols
can ensure reliable delivery or ensuring connections created are reliable.
Push-Pull Model: Push-Pull is a communication model in which the data producers push the
data to queues and the consumers pull the data from the queues. Producers do not need to be
aware of the consumers. Queues help in decoupling the messaging between the producers and
consumers. Queues also act as a buffer which helps in situations when there is a mismatch
between the rate at which the producers push data and the rate at which the consumers pull
data. It shows the publisher-queue-consumer interactions in the push-pull model.
COURSE CODE: 20EC0453 R20
IoT Functional Blocks: An IoT system comprises of a number of functional blocks that
provide the system the capabilities for identification, sensing, actuation, communication and
management as shown in figure.
7 b) Write down the differences between Rest API & Web Socket API.
8 b) Explain the role of big data analysis in IoT and Define its Characteristics.
Big Data Analytics: Big data is defined as collections of data sets whose volume, velocity, or
variety, is so large that it is difficult to store, manage, process and analyze the data using
traditional databases and data processing tools. Big data analytics involves several steps
starting from data cleaning, data managing, data processing and visualization. Some examples
of big data generated by IoT are
• Sensor data generated by IoT systems such as weather monitoring stations.
• Machine sensor data collected from sensors established in industrial and energy systems for
monitoring their health and detecting failures.
• Health and fitness data generated IoT devices such as wearable fitness bands.
• Data generated by IoT systems for location and tracking of vehicles.
• Data generated by retail inventory monitoring systems.
• Volume: Though there is no fixed threshold for the volume of data to be considered as
big data, however, typically, the term big data is used for massive scale data that is
difficult to store, manage and process using traditional data bases and data processing
architectures.
• Velocity: Velocity is another important characteristic of big data and the primary reason
for exponential growth of data.
• Variety: Variety refers to the forms of the data. Big data comes in different forms such
as structured or unstructured data, including text data, image, audio, video and sensor
data.
Communication Protocols: Communication protocols form the back-bone of IoT systems and
enable network connectivity and coupling to applications.
• Communication protocols allow devices to exchange data over network.
• These protocols define the exchange formats, data encoding, addressing schemes for
device and routing of packets from source to destination.
• Other functions of the protocols include sequence control, flow control and
retransmission of lost packets.
Embedded Systems: An Embedded System is a computer system that has computer hardware
and software embedded to perform specific tasks. Key components of an embedded system
include microprocessor or micro controller, memory (RAM, ROM, cache), networking units
(Ethernet, WiFi, adapters), input/output units (display, keyboard, etc) and storage (such as flash
memory). Some embedded systems have specialized processors such as digital signal
processors (DSPs), graphic processors and application specific processors. Embedded systems
run embedded operating systems such as real time operating systems (RTOS).
COURSE CODE: 20EC0453 R20
9b) Describe how wireless sensor networks became one of the enabling
technologies of IoT.
WSNs are enabled by wireless communication protocols such as IEEE 802.15.4. Zig Bee is
one of the most popular wireless technologies used by WSNs. ZigBee operates at 2.4 GHz
frequency and offers data rates upto 250 KB/s and range from 10 to 100 meters depending on
the power output and environmental conditions.
Internet Protocol: Internet Protocol (IP) is a protocol, or set of rules, for routing and
addressing packets of data so that they can travel across networks and arrive at the correct
destination. Data traversing the Internet is divided into smaller pieces, called packets. IP
information is attached to each packet, and this information helps routers to send packets to the
right place. Every device or domain that connects to the Internet is assigned an IP address, and
as packets are directed to the IP address attached to them, data arrives where it is needed.
S.No
IPv4 IPv6
1. IPv4 is a 32-bit address. IPv6 is a 128-bit address.
10 b) Compare Transmission protocol and user data gram protocol with neat
sketch.
S.No
TCP UDP
TCP is a connection-oriented UDP is a connectionless protocol.
1. protocol.
TCP is slower and less efficient in UDP is faster and more efficient than
2.
performance as compared to UDP. TCP.
Retransmission of data packets is Retransmission of packets is not possible
3. possible in TCP in case packet get lost in UDP.
or need to resend.
TCP uses a variable-length (20-60) UDP has a fixed-length header of 8 bytes.
4. bytes header.
Handshakes such as SYN, ACK, It's a connectionless protocol, which means
5. it doesn't require a handshake.
and SYNACK are used.
Broadcasting is not supported by Broadcasting is supported by UDP.
6. TCP.
7. HTTP, HTTPs, FTP, SMTP, and Telnet DNS, DHCP, TFTP, SNMP, RIP, and
use TCP. VoIP use UDP.
COURSE CODE: 20EC0453 R20