Iot 3
Iot 3
Operational Technology
Criteria Information Technology (IT)
(OT)
Systems that monitor and
Systems that manage data,
Definition control physical
communication, and computing
processes
Real-time control and Data processing, storage, and
Purpose
automation communication
Industrial (e.g., factories, Business/Enterprise (e.g.,
Environment
power plants) offices, data centers)
Sensors, PLCs, SCADA, Computers, servers, routers,
Devices Involved
actuators databases
Very low (real-time
Latency Sensitivity Moderate latency acceptable
required)
Physical safety, process Data confidentiality, integrity,
Security Focus
reliability and availability
Communication
MODBUS, DNP3, CAN HTTP, FTP, SMTP, TCP/IP
Protocols
High (can affect safety or May cause data loss or service
Failure Impact
operations) outage
Definition:
Gateways are intermediary devices that connect IoT devices (sensors/actuators) to the
internet or cloud services.
Functions:
Protocol Translation: Converts between protocols like Zigbee to Wi-Fi, or Bluetooth to IP.
Data Aggregation: Collects data from multiple sensors and processes it locally before
forwarding.
Security Management: Encrypts and authenticates data to ensure secure transmission.
Edge Computing Support: Performs local data processing to reduce latency and cloud
dependency.
Examples:
Smart Home Hub, IoT Edge Gateway, Raspberry Pi used as a local gateway.
2. Backhaul Sublayer
Definition:
The backhaul connects the gateway to the core network or cloud infrastructure over high-
speed links.
Functions:
Long-Range Data Transport: Sends collected data from gateway to remote servers.
High Bandwidth and Reliability: Ensures that large volumes of data are transmitted
reliably.
Supports Multiple Technologies: Cellular (3G/4G/5G), Ethernet, Fiber optics, Satellite
links.
Example Technologies:
Wi-Fi/Ethernet (for LAN)
4G/5G (for cellular IoT)
Fiber optic cable (for enterprise backhaul)
7. State the factors which are helping to select right protocol for a particular IOT
application
Ans: Selecting the appropriate communication protocol is crucial in IoT systems as it
directly affects the performance, reliability, and efficiency of the application. The
following factors must be considered:
1. Power Consumption
Protocols should support low-power operation, especially for battery-operated or remote
sensors.
Example: CoAP, BLE, Zigbee are energy-efficient.
2. Range of Communication
Selection depends on the distance between devices and gateways.
Short-range: Bluetooth, Zigbee.
Long-range: LoRaWAN, NB-IoT, 5G.
3. Data Rate / Bandwidth
Applications needing high-speed data (e.g., video surveillance) require high-bandwidth
protocols like Wi-Fi or 5G.
Low-bandwidth protocols like LoRa are suitable for small, periodic data.
4. Scalability
Protocols should support large numbers of devices, especially in smart cities or industrial
IoT.
MQTT and LPWAN protocols are scalable.
5. Latency Requirements
Time-sensitive applications like healthcare monitoring need low-latency protocols.
MQTT and 5G offer real-time performance.
7. Security Features
Protocol must support encryption, authentication, and secure communication.
TLS with MQTT or DTLS with CoAP ensures data security.
Example Use
Network Type Range Access Technologies
Cases
PAN (Personal 1–10 Bluetooth, Zigbee, Z- Smart homes,
Area Network) meters Wave, NFC wearables
Up to
LAN (Local Area Home/office
100 Wi-Fi, Ethernet
Network) automation
meters
NAN
100m–1 Wi-Fi Mesh, PLC (Power Smart meters,
(Neighborhood
km Line Communication) smart streetlights
Area Network)
MAN Smart city
LTE, 5G, LPWAN (LoRa,
(Metropolitan 1–10 km services,
NB-IoT)
Area Network) surveillance
Remote
Cellular (3G/4G/5G),
WAN (Wide Area monitoring,
>10 km Satellite, LPWAN
Network) agriculture, fleet
(LoRaWAN, NB-IoT)
tracking
9. What is the meaning of smart objects ? Give the security and privacy concerns of
smart objects in IOT
What are the characteristics of smart objects. Give trends in smart objects
Ans: A smart object refers to a physical device embedded with sensors, processors,
and communication capabilities, which allow it to collect data, process information,
and interact with other devices or systems through the internet. These objects can
make decisions autonomously or be remotely controlled, making them a key
component of the Internet of Things (IoT). Examples include smart thermostats,
wearables, and connected appliances.
Security Concerns:
Data Interception: Communication can be intercepted, leading to data breaches.
Unauthorized Access: Weak access control allows hackers to take control of devices.
Vulnerabilities: Bugs or flaws in software can be exploited for cyberattacks.
Physical Tampering: Devices in public spaces are at risk of being physically tampered
with.
Privacy Concerns:
Data Collection: Continuous data collection can invade personal privacy.
Inadequate Anonymization: Improper anonymization may expose individuals.
Lack of Consent: Users may not be fully aware of the data being collected.
Data Sharing: Data may be shared with third parties without user consent.
Characteristic Description
What is REST?
REST is an architectural style for designing networked applications. It uses HTTP for
communication and is widely used in IoT platforms for connecting devices, servers, and
applications.
3. REST Architecture in IoT Platforms
Client-Server Model: IoT devices (clients) interact with cloud platforms (servers) via
REST APIs.
Stateless: Each request from client to server must contain all necessary information.
Resources: Devices, sensors, and data are represented as resources (e.g., /temperature,
/device/123).
HTTP Methods used:
GET – Retrieve data (e.g., sensor values)
POST – Create a new data entry
PUT – Update existing data
DELETE – Remove a resource
12. Give the function of each layer of a seven layer IOT architecture reference model
publish by IOTWF architecture
Ans:
1.Perception Layer
Collects data from sensors and devices.
Converts physical signals (temperature, motion, etc.) into digital data.
Examples:
Sensors (temperature, humidity)
RFID tags
GPS devices
2. Network Layer
Transmits data between devices and systems.
Handles communication protocols (e.g., MQTT, CoAP, HTTP).
Examples:
Wi-Fi, Zigbee, Bluetooth, cellular networks (4G, 5G)
Routers, gateways
3. Edge Layer
Processes data locally to reduce latency.
Filters and analyzes data before sending it to the cloud.
Examples:
Edge gateways
Edge computing platforms (e.g., AWS Greengrass)
4. Processing Layer
Centralizes data storage and processing.
Analyzes data to derive actionable insights.
Examples:
Cloud platforms (AWS, Microsoft Azure)
Data analytics systems
5. Application Layer
Provides IoT services to end-users.
Uses processed data for specific applications (smart home, healthcare, etc.).
Examples:
Smart home applications
Healthcare monitoring systems
Industrial automation software
6. Business Layer
Aligns IoT systems with business goals and strategies.
Manages IoT governance, financial models, and processes.
Examples:
Business process management (BPM) tools
IoT lifecycle management systems
7. Security Layer
Protects data and IoT systems from unauthorized access.
Implements encryption, authentication, and security protocols.
Examples:
Encryption algorithms (e.g., AES)
Authentication protocols (e.g., OAuth, TLS)
Security monitoring tools