0% found this document useful (0 votes)
13 views9 pages

Iot 3

The document provides an overview of IoT (Internet of Things), comparing it with Operational Technology (OT) and Information Technology (IT), and discusses various aspects of IoT including cloud platforms, sensors, actuators, and smart services. It also highlights key factors for selecting communication protocols, classifications of networks, and security concerns related to smart objects. Additionally, it outlines the functions of each layer in a seven-layer IoT architecture reference model.

Uploaded by

sinomhatre0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Iot 3

The document provides an overview of IoT (Internet of Things), comparing it with Operational Technology (OT) and Information Technology (IT), and discusses various aspects of IoT including cloud platforms, sensors, actuators, and smart services. It also highlights key factors for selecting communication protocols, classifications of networks, and security concerns related to smart objects. Additionally, it outlines the functions of each layer in a seven-layer IoT architecture reference model.

Uploaded by

sinomhatre0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

1. What is IoT?

Compare with suitable criterion between Operational Technology (OT)


and Information Technology (IT).
Ans: IoT (Internet of Things) refers to a network of physical devices embedded with
sensors, software, and connectivity to collect, exchange, and act on data over the internet.
These "things" can range from home appliances and industrial machines to vehicles and
wearable gadgets. The goal is to enable automation, remote monitoring, and smart
decision-making.

Operational Technology
Criteria Information Technology (IT)
(OT)
Systems that monitor and
Systems that manage data,
Definition control physical
communication, and computing
processes
Real-time control and Data processing, storage, and
Purpose
automation communication
Industrial (e.g., factories, Business/Enterprise (e.g.,
Environment
power plants) offices, data centers)
Sensors, PLCs, SCADA, Computers, servers, routers,
Devices Involved
actuators databases
Very low (real-time
Latency Sensitivity Moderate latency acceptable
required)
Physical safety, process Data confidentiality, integrity,
Security Focus
reliability and availability
Communication
MODBUS, DNP3, CAN HTTP, FTP, SMTP, TCP/IP
Protocols
High (can affect safety or May cause data loss or service
Failure Impact
operations) outage

2. Compare Microsoft Azur Cloud and Google Cloud IOT


Ans:
Criterion Microsoft Azure IoT Google Cloud IoT
Platform Name Azure IoT Hub Google Cloud IoT Core
Protocol
MQTT, HTTPS, AMQP MQTT, HTTPS
Support
Supports Google Cloud
Edge Computing Supports Azure IoT Edge
IoT Edge (limited)
Device Rich device twin model for Device registry and
Management management configuration
Azure Security Center, X.509 Google IAM, TLS, Cloud
Security
certificates IoT Core authentication
Criterion Microsoft Azure IoT Google Cloud IoT
Strong integration with Azure
Integration with Integrates with BigQuery,
Machine Learning, Stream
Services Cloud Functions, Pub/Sub
Analytics, Logic Apps
User-friendly portal, well- Powerful backend tools,
Ease of Use
documented SDKs more developer-focused
Enterprise-level solutions, Data analytics-heavy IoT
Use Case
Industrial IoT projects

3. Differentiate between Sensors and actuators with neat diagram.


Ans:

4. Compare: Raspberry Pi and Arduino


Ans:
Feature Raspberry Pi Arduino
Type Mini computer (SBC) Microcontroller board
Runs full OS (e.g.,
Operating System No OS, runs single sketch
Raspbian/Linux)
Low (e.g., ATmega328P
Processing Power High (Quad-core ARM CPU)
microcontroller)
Programming
Python, Java, C, etc. Arduino C/C++
Language
Web servers, cameras, Simple sensors, motor
Applications
complex automation control, real-time tasks
Built-in Wi-Fi, Bluetooth, Limited; external modules
Connectivity
HDMI, USB ports required
Power
High Low
Consumption
Cost Higher (~₹3000–₹5000) Lower (~₹500–₹1000)
5. Explain Sensors and actuators with Types and examples
Ans:
1. What are Sensors?
Definition:
A sensor is a device that detects or measures physical properties from the environment
(such as temperature, motion, pressure) and converts it into electrical signals for
processing.

Sensor Type Function Example


Temperature
Measures heat or temperature LM35, DHT11
Sensor
Detects presence of nearby IR sensor, Ultrasonic
Proximity Sensor
objects sensor
LDR (Light Dependent
Light Sensor Detects light intensity
Resistor)
Measures pressure in gas or
Pressure Sensor BMP180, MPX5010
liquid
Measures moisture content in
Humidity Sensor DHT22
air
Motion Sensor Detects movement PIR sensor
Detects gas presence (CO₂,
Gas Sensor MQ-2, MQ-135
LPG, etc.)

2. What are Actuators?


Definition:
An actuator is a device that converts electrical signals into physical action such as
movement, rotation, or light.

Actuator Type Function Example


Converts electrical energy into DC Motor, Servo
Electric Motor
rotation Motor
Relay Switches electrical devices on/off Electromagnetic Relay
Emits light when electric current
LED Indicator lights, lamps
passes
Speaker/Buzzer Converts signals into sound Alarms, alerts
Solenoid Valve Controls flow of liquid/gas Water control system
6. Explain Gateways and Backhaul Sublayer considering Layer 2: Communications
Network Layer in IoT.
Ans: The Communication Network Layer (Layer 2) in the IoT architecture provides the
backbone for data transmission between devices and the cloud. It is composed of two key
sublayers:

Definition:
Gateways are intermediary devices that connect IoT devices (sensors/actuators) to the
internet or cloud services.
Functions:
Protocol Translation: Converts between protocols like Zigbee to Wi-Fi, or Bluetooth to IP.
Data Aggregation: Collects data from multiple sensors and processes it locally before
forwarding.
Security Management: Encrypts and authenticates data to ensure secure transmission.
Edge Computing Support: Performs local data processing to reduce latency and cloud
dependency.
Examples:
Smart Home Hub, IoT Edge Gateway, Raspberry Pi used as a local gateway.

2. Backhaul Sublayer
Definition:
The backhaul connects the gateway to the core network or cloud infrastructure over high-
speed links.
Functions:
Long-Range Data Transport: Sends collected data from gateway to remote servers.
High Bandwidth and Reliability: Ensures that large volumes of data are transmitted
reliably.
Supports Multiple Technologies: Cellular (3G/4G/5G), Ethernet, Fiber optics, Satellite
links.
Example Technologies:
Wi-Fi/Ethernet (for LAN)
4G/5G (for cellular IoT)
Fiber optic cable (for enterprise backhaul)

7. State the factors which are helping to select right protocol for a particular IOT
application
Ans: Selecting the appropriate communication protocol is crucial in IoT systems as it
directly affects the performance, reliability, and efficiency of the application. The
following factors must be considered:

1. Power Consumption
Protocols should support low-power operation, especially for battery-operated or remote
sensors.
Example: CoAP, BLE, Zigbee are energy-efficient.

2. Range of Communication
Selection depends on the distance between devices and gateways.
Short-range: Bluetooth, Zigbee.
Long-range: LoRaWAN, NB-IoT, 5G.
3. Data Rate / Bandwidth
Applications needing high-speed data (e.g., video surveillance) require high-bandwidth
protocols like Wi-Fi or 5G.
Low-bandwidth protocols like LoRa are suitable for small, periodic data.

4. Scalability
Protocols should support large numbers of devices, especially in smart cities or industrial
IoT.
MQTT and LPWAN protocols are scalable.

5. Latency Requirements
Time-sensitive applications like healthcare monitoring need low-latency protocols.
MQTT and 5G offer real-time performance.

6. Reliability & QoS (Quality of Service)


Critical applications (like industrial automation) require reliable delivery.
MQTT provides QoS levels; TCP-based protocols offer reliability.

7. Security Features
Protocol must support encryption, authentication, and secure communication.
TLS with MQTT or DTLS with CoAP ensures data security.

8. Give the classifications of network according to access technologies and distances


considering in IOT based applications
Ans: In IoT systems, different network types are used based on range (distance) and
access technologies. These networks help connect devices from very short range (e.g.,
wearables) to long range (e.g., smart cities).

Example Use
Network Type Range Access Technologies
Cases
PAN (Personal 1–10 Bluetooth, Zigbee, Z- Smart homes,
Area Network) meters Wave, NFC wearables
Up to
LAN (Local Area Home/office
100 Wi-Fi, Ethernet
Network) automation
meters
NAN
100m–1 Wi-Fi Mesh, PLC (Power Smart meters,
(Neighborhood
km Line Communication) smart streetlights
Area Network)
MAN Smart city
LTE, 5G, LPWAN (LoRa,
(Metropolitan 1–10 km services,
NB-IoT)
Area Network) surveillance
Remote
Cellular (3G/4G/5G),
WAN (Wide Area monitoring,
>10 km Satellite, LPWAN
Network) agriculture, fleet
(LoRaWAN, NB-IoT)
tracking
9. What is the meaning of smart objects ? Give the security and privacy concerns of
smart objects in IOT
What are the characteristics of smart objects. Give trends in smart objects
Ans: A smart object refers to a physical device embedded with sensors, processors,
and communication capabilities, which allow it to collect data, process information,
and interact with other devices or systems through the internet. These objects can
make decisions autonomously or be remotely controlled, making them a key
component of the Internet of Things (IoT). Examples include smart thermostats,
wearables, and connected appliances.

Security Concerns:
Data Interception: Communication can be intercepted, leading to data breaches.
Unauthorized Access: Weak access control allows hackers to take control of devices.
Vulnerabilities: Bugs or flaws in software can be exploited for cyberattacks.
Physical Tampering: Devices in public spaces are at risk of being physically tampered
with.

Privacy Concerns:
Data Collection: Continuous data collection can invade personal privacy.
Inadequate Anonymization: Improper anonymization may expose individuals.
Lack of Consent: Users may not be fully aware of the data being collected.
Data Sharing: Data may be shared with third parties without user consent.

Characteristic Description

Connectivity Can connect to other devices or networks

Can operate and make decisions with minimal human


Autonomy intervention

Context-awareness Can sense and react to environmental changes

Often battery-powered and designed for low power


Energy Efficiency usage

Real-Time Capable of capturing and responding to data instantly


Processing

4. Trends in Smart Objects


AI Integration: Smart objects using AI/ML for intelligent decision-making (e.g., smart
assistants).
Edge Computing: Processing data locally on the device for faster response.
Energy Harvesting: Self-powered devices using solar or kinetic energy.
5G Connectivity: Faster communication with lower latency.
Increased Personalization: Adapting behavior based on user preferences and habits.
10. Explain in detail about Smart Services in IOT
Ans: Smart Services in IoT refer to intelligent, data-driven services enabled by connected
devices that improve automation, decision-making, and user experiences. These services
are built upon data collected from smart objects and processed using cloud, AI, and
analytics.

2. Key Features of Smart Services


Context-Awareness – Services respond based on environment or user behavior.
Automation – Tasks are performed without manual intervention.
Real-Time Communication – Quick response between devices and platforms.
Personalization – Services adjust based on user preferences or patterns.
Security-Enabled – Ensures secure transmission and access of data.

3. Examples of Smart Services in IoT

Domain Smart Services Examples


Smart lighting, smart thermostats, voice-controlled assistants
Smart Homes
(Alexa, Google Home)
Smart parking, traffic control systems, waste management,
Smart Cities
environmental monitoring
Remote patient monitoring, health alerts, smart medication
Healthcare
dispensers
Agriculture Precision irrigation, soil monitoring, crop health analysis
Industry
Predictive maintenance, asset tracking, energy optimization
(IIoT)
Retail Smart shelves, personalized promotions, customer footfall tracking

4. Benefits of Smart Services


Efficiency improvement
Cost reduction
Enhanced customer experience
Better resource management
Real-time decision-making

11. Explain IOT Software Platform-REST


Ans: IoT software platforms act as middleware to manage IoT devices, collect sensor
data, perform analytics, and integrate with applications. One of the most commonly used
communication models in these platforms is REST (Representational State Transfer).

What is REST?
REST is an architectural style for designing networked applications. It uses HTTP for
communication and is widely used in IoT platforms for connecting devices, servers, and
applications.
3. REST Architecture in IoT Platforms
Client-Server Model: IoT devices (clients) interact with cloud platforms (servers) via
REST APIs.
Stateless: Each request from client to server must contain all necessary information.
Resources: Devices, sensors, and data are represented as resources (e.g., /temperature,
/device/123).
HTTP Methods used:
GET – Retrieve data (e.g., sensor values)
POST – Create a new data entry
PUT – Update existing data
DELETE – Remove a resource

4. Features of REST in IoT


Lightweight – Ideal for IoT due to its simplicity
Secure – Can use HTTPS for secure communication
Scalable – Easy to integrate large numbers of devices
Interoperable – Platform-independent communication
Human-readable – Data is often sent in JSON or XML

5. Example Use Case


In a smart home IoT system, a temperature sensor can send data to the cloud using:
Edit
POST /api/temperature
Body: { "value": 27, "unit": "°C" }
A mobile app can GET the latest temperature from the cloud using REST API.

12. Give the function of each layer of a seven layer IOT architecture reference model
publish by IOTWF architecture
Ans:
1.Perception Layer
Collects data from sensors and devices.
Converts physical signals (temperature, motion, etc.) into digital data.
Examples:
Sensors (temperature, humidity)
RFID tags
GPS devices

2. Network Layer
Transmits data between devices and systems.
Handles communication protocols (e.g., MQTT, CoAP, HTTP).
Examples:
Wi-Fi, Zigbee, Bluetooth, cellular networks (4G, 5G)
Routers, gateways

3. Edge Layer
Processes data locally to reduce latency.
Filters and analyzes data before sending it to the cloud.
Examples:
Edge gateways
Edge computing platforms (e.g., AWS Greengrass)
4. Processing Layer
Centralizes data storage and processing.
Analyzes data to derive actionable insights.
Examples:
Cloud platforms (AWS, Microsoft Azure)
Data analytics systems

5. Application Layer
Provides IoT services to end-users.
Uses processed data for specific applications (smart home, healthcare, etc.).
Examples:
Smart home applications
Healthcare monitoring systems
Industrial automation software

6. Business Layer
Aligns IoT systems with business goals and strategies.
Manages IoT governance, financial models, and processes.
Examples:
Business process management (BPM) tools
IoT lifecycle management systems

7. Security Layer
Protects data and IoT systems from unauthorized access.
Implements encryption, authentication, and security protocols.
Examples:
Encryption algorithms (e.g., AES)
Authentication protocols (e.g., OAuth, TLS)
Security monitoring tools

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy