IOT Unit 2
IOT Unit 2
Machine to Machine
This is commonly known as Machine to machine communication. It is a concept where two or more than
two machines communicate with each other without human interaction using a wired or wireless
mechanism. M2M is a technology that helps the devices to connect between devices without using the
internet. M2M communications offer several applications such as security, tracking and tracing,
manufacturing, and facility management. M2M is also named as Machine Type Communication (MTC) in
3GPP (3rd Generation Partnership Project). The communication could carry over mobile networks, for ex-
GSM-GPRS, CDMA EVDO Networks and the role of mobile networks is largely confined to servers as
transport networks.
Applications of WSN:
1. Internet of Things (IoT)
2. Surveillance and Monitoring for security, threat detection
3. Environmental temperature, humidity, and air pressure
4. Noise Level of the surrounding
5. Medical applications like patient monitoring
6. Agriculture
7. Landslide Detection
Challenges of WSN:
1. Quality of Service
2. Security Issue
3. Energy Efficiency
4. Network Throughput
5. Performance
6. Ability to cope with node failure
7. Cross layer optimization
8. Scalability to large scale of deployment
Components of WSN:
Sensors:
Sensors in WSN are used to capture the environmental variables and which are used for data acquisition.
Sensor signals are converted into electrical signals.
Radio Nodes:
It is used to receive the data produced by the Sensors and send it to the WLAN access point. It consists of a
microcontroller, transceiver, external memory, and power source.
WLAN Access Point:
It receives the data, which is sent by the Radio nodes wirelessly, generally through the internet.
Evaluation Software:
The data received by the WLAN Access Point is processed by a software called Evaluation Software for
presenting the report to the users for further processing of the data which can be used for processing,
analysis, storage, and mining of the data.
2. Time-varying channel:
Time-varying channels include the three mechanisms for radio signal propagations they are Reflection,
Diffraction, and Scattering.
Reflection –
This occurs when a propagating wave carrying information intrudes on an object that has very large
dimensions than the wavelength of the wave.
Diffraction –
This occurs when the radio path between the transmitter and the receiver is collided by the surface with
sharp edges. This is a phenomenon which causes the diffraction of the wave from the targeted position.
Scattering –
This occurs when the medium through from the wave is traveling consists of some objects which have
dimensions smaller than the wavelength of the wave.
While transmitting the signal by the node these are time shifted and this is called multipath propagation.
While when this node signals intensity is dropped below a threshold value, then this is termed as fade. As a
result, the Handshaking strategy is widely used so that healthy communication can be set up.
Routing Protocol
A Router is a process of selecting path along which the data can be transferred from source to the
destination. Routing is performed by a special device known as a router.
A Router works at the network layer in the OSI model and internet layer in TCP/IP model.
A router is a networking device that forwards the packet based on the information available in the
packet header and forwarding table.
The routing algorithms are used for routing the packets. The routing algorithm is nothing but a
software responsible for deciding the optimal path through which packet can be transmitted.
The routing protocols use the metric to determine the best path for the packet delivery. The metric is
the standard of measurement such as hop count, bandwidth, delay, current load on the path, etc. used
by the routing algorithm to determine the optimal path to the destination.
The routing algorithm initializes and maintains the routing table for the process of path
determination.
Types of Routing
Static Routing
Default Routing
Dynamic Routing
Static Routing
1. Static Routing is also known as Nonadaptive Routing.
2. It is a technique in which the administrator manually adds the routes in a routing table.
3. A Router can send the packets for the destination along the route defined by the administrator.
4. In this technique, routing decisions are not made based on the condition or topology of the networks.
Default Routing
1. Default Routing is a technique in which a router is configured to send all the packets to the same hop
device, and it doesn't matter whether it belongs to a particular network or not. A Packet is transmitted
to the device for which it is configured in default routing.
2. Default Routing is used when networks deal with the single exit point.
3. It is also useful when the bulk of transmission networks have to transmit the data to the same hp
device.
4. When a specific route is mentioned in the routing table, the router will choose the specific route
rather than the default route. The default route is chosen only when a specific route is not mentioned
in the routing table.
Dynamic Routing
1. It is also known as Adaptive Routing.
2. It is a technique in which a router adds a new route in the routing table for each packet in response to
the changes in the condition or topology of the network.
3. Dynamic protocols are used to discover the new routes to reach the destination.
4. In Dynamic Routing, RIP and OSPF are the protocols used to discover the new routes.
5. If any route goes down, then the automatic adjustment will be made to reach the destination.
Multipath Approach
This approach is used to overcome the drawbacks of tree-based approach. Accordingly, to this approach
each and every node could send data packets over multiple paths using multiple neighbors in aggregation
tree. So, a data packet sends from source to destination using multiple paths with the help of intermediate
nodes. An example of this approach like ring topology. Overhead is the disadvantage of this approach.
Hybrid Approach
The Hybrid Approach is the mixture of cluster-based approach, multipath approach and tree based approach.
This approach is mainly used for adaptively for optimal performance of their data aggregation.
Data Dissemination
Data Dissemination is the process in which sensor nodes collect the data and communicate to the base
station or any other interested node. The source node is generating the data and the information to be
reported is known as an event. Those nodes which are interested in event and seek information are known as
sink. So, in this whole process data is routed in sensor network. It is two steps process; in first step interested
nodes are broadcast to their neighbor nodes in the network and in second step nodes after receiving the
request nodes sends requesting data.
There are many data dissemination methods or approaches which are following as:
Flooding
If the destination node does not receive the data packet or specified number of hops is not reached. Then
each node broadcasts the gathered data until the packet reaches their destination node. The main advantage
of flooding is not requiring costly topology maintain or route discovery but it faces several problems like
implosion, overlap and resource blindness.
Gossiping
Gossiping is the version of flooding approach .In this approach the packet is sent to a single neighbor chosen
from the neighbor table randomly instead of broadcasting each packet to the entire neighbor. This process
can take a long time from completion. Gossiping avoids the problem faced in flooding approach like
implosion.
Communication Protocol
A communication protocol is a system of rules that allows two or more entities of a communications system
to transmit information via any kind of variation of a physical quantity. The protocol defines the rules,
syntax, semantics and synchronization of communication and possible error recovery methods. Protocols
may be implemented by hardware, software, or a combination of both.
Advantages of Gateway:
There are several advantages of using a gateway in the Internet of Things (IoT), including:
Protocol translation: IoT devices typically use different communication protocols, and a gateway can
translate between these protocols to enable communication between different types of devices.
Data aggregation: A gateway can collect data from multiple IoT devices and aggregate it into a single
stream for easier analysis and management.
Edge computing: Gateways can perform edge computing tasks such as data processing, analytics, and
machine learning, enabling faster and more efficient decision-making.
Security: Gateways can act as a secure access point for IoT devices, providing a layer of protection against
cyber threats.
Scalability: Gateways can support a large number of IoT devices and can be easily scaled up or down to
meet changing needs.
Improved reliability: Gateways can help to improve the reliability of IoT devices by managing network
connectivity and providing a backup mechanism in case of network failure.
Cost-effective: Gateways can be a cost-effective way to manage and control a large number of IoT devices,
reducing the need for expensive infrastructure and IT resources.
SOAP
Simple Object Access Protocol (SOAP) is a network protocol for exchanging structured data between nodes.
It uses XML format to transfer messages. It works on top of application layer protocols like HTML and
SMTP for notations and transmission. SOAP allows processes to communicate throughout platforms,
languages and operating systems, since protocols like HTTP are already installed on all platforms.
SOAP was designed by Bob Atkinson, Don Box, Dave Winer, and Mohsen Al-Ghosein at Microsoft in 1998.
SOAP was maintained by the XML Protocol Working Group of the World Wide Web Consortium until 2009.
Advantages of SOAP
1. SOAP is a light weight data interchange protocol because it is based on XML.
2. SOAP was designed to be OS and Platform independent.
3. It is built on top of HTTP which is installed in most systems.
4. It is suggested by W3 consortium which is like a governing body for the Web.
5. SOAP is mainly used for Web Services and Application Programming Interfaces (APIs).
REST
Representational State Transfer (REST) is an architectural style that defines a set of constraints to be used
for creating web services. REST API is a way of accessing web services in a simple and flexible way
without having any processing.
REST technology is generally preferred to the more robust Simple Object Access Protocol (SOAP)
technology because REST uses less bandwidth, simple and flexible making it more suitable for internet
usage. It’s used to fetch or give some information from a web service. All communication done via REST
API uses only HTTP request.
HTTP
HTTP stands for HyperText Transfer Protocol. It is invented by Tim Berner. HyperText is the type of text
which is specially coded with the help of some standard coding language called HyperText Markup
Language (HTML). HTTP/2 is the successor version of HTTP, which was published on May 2015. HTTP/3
is the latest version of HTTP, which is published in 2022.
The protocols that are used to transfer hypertext between two computers is known as HyperText Transfer
Protocol. HTTP provides standard between a web browser and web server to establish communication. It is
set of rules for transferring data from one computer to another. Data such as text, images, and other
multimedia files are shared on the World Wide Web. Whenever a web user opens their web browser, user
indirectly uses HTTP. It is an application protocol which is used for distributed, collaborative, hypermedia
information systems.
Characteristics of HTTP
HTTP is IP based communication protocol which is used to deliver data from server to client or vice-versa.
1. Server processes a request, which is raised by client and also server and client knows each other only
during current request and response period.
2. Any type of content can be exchanged as long as server and client are compatible with it.
3. Once data is exchanged then servers and client are no more connected with each other.
4. It is a request and response protocol based on client and server requirements.
5. It is connection less protocol because after connection is closed, server does not remember anything
about client and client does not remember anything about server.
6. It is stateless protocol because both client and server does not expecting anything from each other but
they are still able to communicate.
Advantages
1. Memory usage and CPU usage are low because of less simultaneous connections.
2. Since there are few TCP connections hence network congestion are less.
3. Since handshaking is done at initial connection stage, then latency is reduced because there is no
further need of handshaking for subsequent requests.
4. The error can be reports without closing connection.
5. HTTP allows HTTP pipe-lining of request or response.
Disadvantages
1. HTTP requires high power to establish communication and transfer data.
2. HTTP is less secure, because it does not uses any encryption method like https use TLS to encrypt
normal http requests and response.
3. HTTP is not optimized for cellular phone and it is too gabby.
4. HTTP does not offer genuine exchange of data because it is less secure.
5. Client does not close connection until it receives complete data from server and hence server needs
to wait for data completion and cannot be available for other clients during this time.