0 ratings0% found this document useful (0 votes) 429 views106 pagesIOT EQ Soln
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Ra oan
Internet of Things
Mumbai University Examination Paper Solutions
CONTENTS
Year of Exams Page
ear of Exam: raat
Oct. "19 1
April 19 37
Oct. '18 70Vidyalankar
TY. B.Sc. (IT): Sem. V
Internet of Things
Time : 24Hrs.] Mumbai University Examination Paper Solution: Oct.'19 (Marks : 75
Q.1 Attempt any THREE of the following: [15]
Q.1(a) Define and explain Ubiquitous Computing (ubicom). [5]
Ans.: 1. Ubiquitous computing (or "ubicomp") is a concept in software engineering
and computer science where computing is made to appear anytime and
everywhere. This paradigm is also described as pervasive computing,
ambient intelligence or “everywhere”.
2. In contrast to desktop computing, ubiquitous computing can occur using
any device, in any location, and in any format.
3. A user interacts with the computer, which can exist in many different
forms, including laptop computers, tablets and terminals in everyday
objects such as a refrigerator or a pair of glasses.
4, The underlying technologies to support ubiquitous computing include
Internet, advanced middleware, operating system, mobile code, sensors,
microprocessors, new I/O and user interfaces, networks, mobile
protocols, location and positioning, and new materials.
5. Each term emphasizes slightly different aspects. When primarily
concerning the objects involved, it is also known as physical computing,
the Internet of Things, haptic computing and "things that think’.
6. Ubiquitous computing touches on a wide range of research topics,
including distributed computing, mobile computing, location computing,
mobile networking, context-aware computing, sensor networks, human-
computer interaction, and artificial intelligence. 7.Application of ubicomp
in LOT: (LoT) infographic includes the smart alarm clock and coffee pot
connected to the work scheduler that is alerted to let the user sleep an
extra 30 minutes even though there is an accident on the driving route
to work, the car knows it needs gas and the train is of f its schedule.
Q.1(b) List and explain the roles of people making IoT. 15)
Ans.: People who make the Internet of Things are :
© Artist ‘* Designer
+ Craftsperson © Hacker
«Engineer * Architect
People making the Internet of things do not do individual work for devices.
They work together with mutual understanding to do the task.Vidyalankar : T.Y. B.Sc. (IT) - IoT
Artist works at the forefront of technology innovation and can bring a fresh
point of view on technology. They observe how people respond to these
experiments in advanced technologies can provide insights about what people
need and will accept, and this can feed into the design and development of
those technologies
Engineering challenges for IoT are developing and managing Things, Network
and Data/Cloud. Engineers must consider and include the comprehensive
characterization of the environment in their designs. Engineers need to
create virtual prototypes and simulate them to make sure they will work in
the real world.
ToT is about a new experience. An experience that doesn't exist today. But
an experience if designed well can change the way we live tomorrow. That's
why designers are going to play a very critical role in shaping up the future
of IoT. For that designers will also have to change, adapt and broaden their
horizon about the way they think about design. There are 5 key attributes
that will define the designers work:
Deal with ambiguity, try multiple alternatives & fail fast
Technology awareness & collaboration
Days of Handoff are gone: Do stuff
Holistic thinking beyond interfaces
The structure of the device by using the idea of Artist. And Engineer
will implement this design into actual
ghene
Artists collaborate with designers on the time of installation of ToT devices
or they can collaborate with traditional craftsperson for printmaking while
thinking about the idea of IoT device.
Designers and Engineers work together and for making the product. In this,
the Designer will design the structure of a device by using the idea of
Artist. And Engineer will implement this design into actual
“Hackers” (in the sense of tinkerers and amateur engineers), by their
nature, have various technical and artistic interests and skills. They will
include new features into the device or will test the device properly so that
the device remains safe.
The IoT Architect leads the way through “the vision, strategy, architecture
and shepherding of ToT solutions from inception to deployment.” Becoming an
IoT Architect requires several strategies:Oct. '19 ~ Paper Solution
Learn good Internet of Things Data Management practices. Develop
communication and leadership skills.
A more striking omission, a hacker might tinker at the prototype for a
Thing, a software developer might write the online component, a
designer might turn the ugly prototype into a thing of beauty, possibly
invoking the skills of a craftsperson and an engineer might be required
to solve difficult technical challenges, especially in scaling up to
production. The Internet of Things is, or should be, the “Internet of
Beautiful Things", and every object, as well as being a crafted, designed,
and engineered object, is, or could be, the work of an artist also.
Getting additional expertise to make a project work, from prototype to
production, is no bad.
The most important lesson, however, is that whatever your interest as a
creative person, you are abundantly qualified to get involved in the
exciting field of the Internet of Things!
Q.1(c) What is manufactured normalcy field? Explain. (5)
Ans.
1
Venkatesh Rao a technology blogger came up with a term to explain how
new technology is adopted. He proposed that we don't see the present,
the world that we live is now, as something that is changing. If we step
back for a second, we do know that it has changed, although the big
advances sneak up on us over time, hidden in plain sight. This concept is
called Manufactured normalcy field.
For a technology to be adopted, it has to make its way inside the
Manufactured normalcy field, The successful user-experience the
designer is one who gives user experience which does not stretch the
boundaries of their particular normalcy field too far, even if the
underlying technology is a huge leap ahead of the norm.
For example, the mobile phone was first introduced as a phone that
wasn't tethered to a particular location. Now broadly the same
technology is used to provide a portable Internet terminal, which can
play movies, carry your entire music collection, and make phone calls.
The way that portable Internet terminals made it into our manufactured
normalcy field was through the phone metaphor. Introducing technology
to people in terms of something they already understand is a tried and
tested effect: computers started off as glorified typewriters; graphical
user interfaces as desktops, etc
As we know, Arthur C. Clarke has claimed that “any sufficiently advanced
technology is indistinguishable from magic". The Internet of thingsVidyalankar : T.Y. B.Sc. (IT) - IoT
provides ordinary objects with some additional semi-hidden capabilities.
The enchanted objects of magic and fairy the tale is a good metaphor to
help people understand ToT objects.
Examples:
1. Where Dial takes its lead from the clock in Harry Potter which tracked
the location of the members of the Weasley family. The Where Dial, by
comparison, has to rely on mere technology for its capabilities: however,
with the GPS chipsets in smartphones and location check-in services like
Foursquare, it isn’t much of a leap to also own an ornament which updates
to show when you are at work or travelling, or at a restaurant.
2. Enchanted mirrors seem a popular choice in design research, “Mirror,
mirror on the wall" in the Snow-White tale. They tend to show
information which is useful as you start or end your day, in line with the
expected times when you'd use a bathroom mirror. You get the time and
can check appointments and traffic and weather information while having
your morning shower. Presumably, it is merely a matter of time before
cone shows the number of “likes” you have on Facebook, thus turning it
into the modern equivalent of the evil queen's query to know "who is the
fairest of them all2".
3. Ambient Devices then took the idea one step further and built an
enchanted umbrella, It can read the weather forecast, and the handle
glows gently if rain is expected, alerting you to the fact that you may
need to pick it up as you head out of the house.
Q.1(d) "Data available through IoT device belongs to public or company [5]
Ans.:
which implement the IoT device”. Discuss.
1, There is an increase in the number of sensors being deployed, so it isn't
always clear whose data is being gathered.
2. For example in case of a camera deployed in an advertising hoarding
which can check to see whether people are looking at the different
adverts,
3. Now here arises the question whether the data belong to the company
that installed the camera or to the members of the public who are
looking at the adverts.
4. So Adam Greenfield, a leading practitioner of urban computing, makes a
convincing argument that in a public space this data is being generated
by the public, so they should at least have equal rights to be aware of,
and also have access to, that data.Oct. '19 ~ Paper Solution
5. On private property, you can more easily claim that the members of the
public don't have such a right, but perhaps the property owner might
assert rights to the data rather than whoever installed the camera.
6. And there are many places such as shopping malls which, to all intents
and purposes, look and feel like public spaces, despite being privately
owned.
7. The participants at the Open Internet of Things Assembly coined the
term data subjects to those people to whom the data pertains,
regardless of whether they owned the sensors used to gather the data
or the property where the sensors were sited.
Q.1(e) What is DNS? How does it work? (5)
Ans.
The Domain Name. System (DNS) is the phonebook of the internet. Humans
access information online through domain names, like nytimes.com or
espn.com. Web browsers interact through protocol (IP) addresses. DNS
translates domain names to IP addresses so browsers can load Internet
resources.
Each device connected to the Internet has a unique IP address which other
machines use to find the device. DNS servers eliminate the need for humans
to memorize IP addresses such as 192.168.1.1 (in IPv4).
How does DNS work?
The process of DNS resolution involves converting a hostname (such as
www.example.com) into a computer-friendly IP address (such as 192.168.1.1)
An IP address is given to each device on the Internet, and that address is
necessary to find the appropriate Internet device - like a street address is
used to find a particular home. When a user wants to load a webpage, a
translation must occur between what a user types into their web browser
(example.com) and the machine-friendly address necessary to locate the
example.com webpage.
In order to understand the process behind the DNS resolution, it's
important to learn about the different hardware components a DNS query
must pass between. For the web browser, the DNS lookup occurs * behind
the scenes" and requires no interaction from the user's computer apart from
the initial request.
There are 4 DNS servers involved in loading a webpage:
1. DNS precursor : The precursor can be thought of as a librarian who is
asked to go find a particular book somewhere in a library. The DNS
5Vidyalankar : T.Y. B.Sc. (IT) - IoT
precursor is a server designed to receive queries from client machines
through applications such as web browsers. Typically the precursor is
then responsible for making additional requests in order to satisfy the
client's DNS query.
2. Root name server : The root server is the first step in translating
(resolving) human-readable hostnames into IP addresses. It can be
thought of like an index in a library that points to different racks of
books - typically it serves as a reference to other more specific
locations.
3. TLD name server : The top-level domain server (TLD) can be thought of
as a specific rack of books ina library. This name server is the next step
in the search for a specific IP address, and it hosts the last portion of a
hostname (In example.com, the TLD server is “com").
4, Authoritative name server : This final name server can be thought of
as a dictionary on a rack of books, in which a specific name can be
translated into its definition. The authoritative name server is the last
stop in the name server query. If the authoritative name server has
access to the requested record, it will return the IP address for the
requested hostname back to the DNS Recursor (the librarian) that made
the initial request.
Q.1(f) What are TCP n UDP ports? Explain with examples. (5)
Ans.:
TcP : Stands for Transmission Control Protocol. Using this method, the
computer sending the data connects directly to the computer it is sending
the data it to and stays connected for the duration of the transfer. With
this method, the two computers can guarantee that the data has arrived
safely and correctly, and then they disconnect the connection. This method
of transferring data tends to be quicker and more reliable but puts a higher
load on the computer as it has to monitor the connection and the data going
across it. A real-life comparison to this method would be to pick up the
phone and call a friend, You have a conversation and when it is over, you both
hang up, releasing the connection.
UDP : Stand for User Datagram Protocol. Using this method, the computer
sending the data packages the information into a nice little package and
releases it into the network with the hopes that it will get to the right place.
What this means is that UDP does not connect directly to the receiving
computer like TCP does, but rather sends the data out and relies on the
devices in between the sending computer and the receiving computer to get
the data where it is supposed to go properly. This method of transmission
does not provide any guarantee that the data you send will ever reach itsOct. '19 ~ Paper Solution
destination. On the other hand, this method of transmission has very low
overhead and is therefore very popular to use for services that are not that
important to work on the first try. A comparison you can use for this method
is the plain old US Postal Service. You place your mail in the mailbox and
hope the Postal Service will get it to the proper location. Most of the time
they do, but sometimes it gets lost along the way.
TCP and UDP Ports :
1. Every computer or device on the Internet must have a unique number
assigned to it called the IP address. This IP address is used to recognize
your particular computer out of the millions of other computers
connected to the Internet. When information is sent over the Internet
to your computer how does your computer accept that information? It
accepts that information by using TCP or UDP ports.
2. An easy way to understand ports is to imagine your IP address is a cable
box and the ports are the different channels on that cable box. The
cable company knows how to send a cable to your cable box based upon a
unique serial number associated with that box (IP Address), and then you
receive the individual shows on different channels (Ports).
3. Ports work the same way. You have an IP address, and then many ports
on that IP address. When I say many, I mean many. You can have a total
of 65,535 TCP Ports and another 65,535 UDP ports. When a program on
your computer sends or receives data over the Internet it sends that
data to an IP address and a specific port on the remote computer and
receives the data on a usually random port on its own computer. If it
uses the TCP protocol to send and receive the data then it will connect
and bind itself to a TCP port. If it uses the UDP protocol to send and
receive data, it will use a UDP port. Figure 1, below, is a representation
of an IP address split into its many TCP and UDP ports. Note that once
an application binds itself to a particular port, that port can not be used
by any other application. I+ is first-come, first-served
4. Tf you are the remote user connecting to a web server it would work in
reverse. Your web browser would pick a random TCP port from a certain
range of port numbers, and attempt to connect to port 80 on the IP
address of the webserver. When the connection is established, the web
browser will send the request for a particular web page and receive it
from the webserver. Then both computers will disconnect the
connection.
5. A port is a 16-bit number used to identify specific applications and
services. TCP and UDP specify the source and destination port numbers
uVidyalankar : T.¥. B.Sc. (IT) - ToT
in their packet headers and that information, along with the source and
destination IP addresses and the transport protocol (TCP or UDP),
enables applications running on hosts on a TCP/IP network to
communicate.
6. Applications that provide a service (such as FTP or and HTTP servers)
opena port on the local computer and listen for connection requests. A
client can request the service by pointing the request to the application's
IP address and port. A client can use any locally unused port number for
communication. Consider the following example :
IP Address:
IP Address:
192.168.0.50 192,168.0.150
es
Request:
Source IP Address: 192.168.0.50
Destination IP Address: 192.16.0.150
Source Port: 1200
Destination Port: 21
IP Address: IP Address:
192.168.0.50 192.168.0.150
Response:
Source IP Address: 192.168.0.160
Destination IP Address: 192.168.0.50
Source Port: 21
Destination Port: 1200
6. In the picture above you can see that a host with an IP address of
192.168.0.50 wants to communicate with the FTP server. Because FTP
servers use, by default, the well-known port 21, the host generates the
request and sends it to the FTP server's IP address and port. The host
use the locally unused port of 1200 for communication. The FTP server
receives the request, generates the response, and sends it to the host's
IP address and port.Oct. '19 ~ Paper Solution
7. Port numbers are from 0 to 65535. The first 1024 ports are reserved
for use by certain privileged services:
Top UDP
FIP 20, 21 DNS 53
SSH 22 BooTPS/DHCP | 67
Telnet 23 TFTP 69
SMTP 25 SNMP 161
DNS 53
HTTP 80
POPS 110
NTP. 123
WAP4 143
INTTPS 443
Q.2 Attempt any THREE of the following: [15]
Q.2(a) What is sketching? Explain its role in prototyping. (5)
Ans.: 1. There is a good chance that the first step we will take when working on
our prototype will be to jot down some ideas or draw out some design
ideas with pen and paper.
2. That is an important first step in exploring our idea and one we would
like to extend beyond the strict definition to also include sketching in
hardware and software.
3. What we mean by that is the process of exploring the problem space:
iterating through different approaches and ideas to work out what works
and what doesn't.
4. The focus isn’t on the fidelity of the prototype but rather on the ease
‘and speed with which we can try things out.
5. For the physical design, that could mean digging out childhood LEGO
collection to prototype the mix of cogs and three-dimensional forms, or
maybe attacking some foam core or cardboard with a craft knife.
6. Sketching enables us to brainstorm, explore multiple ideas, define flows,
communicate with team members all why being quick and cheap.
7. Prototyping enables us to get out of the building quicker, talk to users,
validate assumptions, ensure expectations are meeting stakeholder
needs while spending a little time as possible worrying about polish.
8. Benefits of Sketching and Prototyping are:
(a) Validate assumptions
(b) Discover problems early
(c) Brainstorm ideas
(4) Design more iterationsVidyalankar : T.Y. B.Sc. (IT) - IoT
(e) Conduct early usability testing
(f) Cheaper & faster to implement
(9) Shorten the feedback loop
(h) Disposable
(i) Explore alternatives
(j) Helps communication between the team
(k) Ensure the right thing is being designed Ensure sketching and
prototyping plays an important role in your design process and worry
about pixel perfection later.
Q.2(b) "Open source has a competitive advantage”. Discuss. (5)
Ans.
1. Open source allows computer source code to be shared and modified
free of charge by other users or organisations under a licensing
agreement.
2. In other words, it is a piece of software which can evolve and be
iterated upon by other developers anywhere in the world.
3. In case of open source, the software is evolved many times and during
this evolution, it takes many twists and turns and becomes entirely
different than its original version,
For example: Android
4. Using open source is often a no-risk way of getting software that has
been tested, improved and debugged by many eyes.
5. Secondly, using open source aggressively gives your product the chance
to gain mindshare.
6. Companies are increasingly adopting open source software as a way to
gain competitive advantage rather than just a cost-savings measure.
7. Open source software has long been used for basic infrastructure, but
organisations are now using it to build better software to support core
business activities, such as data management and integration, application
development etc.
8. Open source becomes better and stronger the more we apply it,
contribute to it, and invest in its communities.
9. So we must apply our knowledge and efforts to ensure that open source
can continue to prosper and serve as a source of competitive advantage
for businesses and developers well into the future.
Q.2(c) How can one tap into the community for promoting IoT devices? [5]
Ans. =
Explain.
1. Local decision-making is sometimes considered a puzzle by research
ecologists, resource managers, and policy researcher's. The eternal hope
is to find that model or concept that provides the "right" information to
10Oct. '19 ~ Paper Solution
support local environmental decisions. Researchers have hypothesized
that ecosystem services could be that concept.
2. The Mid-Continent Ecology Lab is currently investigating that hypothesis
through a systematic investigation of local values of ecosystem services ,
as well as the decision making process . We argue that “local” decisions
are multi- dimensional and composed of overlapping and sometimes
oppositional processes.
3. Governmental bodies, non-profit organizations , and citizens all have
expertise and knowledge to contribute to the process. This particular
presentation will focus on one of these dimensions namely the citizen
mobilization around the revitalization effort.
4. We present preliminary findings from research on the diverse efforts
that citizens have undertaken in response to the revitalization efforts in
the St. Louis River Corridor and the ecosystem services values that the
underlie their activities. The contents of this abstract neither
constitute nor necessarily reflect US PEA policy.
Q.2(d) With the help of an example explain the process of scaling up the [5]
Ans.:
electronics.
1. Scaling up electronics is the process where a circuit is built from initial
testing through prototype to a finished PCB.
2. The starting point for prototyping is usually a Breadboard. This lets u
push-fit components and wires to make up circuits without requiring any
soldering and therefore makes experimentation easy.
3. When we are happy with how things are wired up its easy to solder the
components, which may be sufficient to make the circuit more permanent
and prevent wires from getting away.
For example:
Let us consider an evolution of the part of Bubblino circuit, from initial
testing through prototype, to finished PCB.
1, The first step in creating a circuit is generally to build it up on a
breadboard, this way we can easily reconfigure things as we decide
exactly how it should be laid out.
2. When we are happy with how the circuit works, soldering it onto a
stripboard will make the layout permanent. This means you can stop
worrying about any wire getting loose, and if we are going to make only
‘one copy of the circuit, then it might be as far as we need to take
things.
3. If we need to make copies of the circuit, or if we want a professional
finish, we can turn our circuit into a PCB, this makes it easier to build up
1Vidyalankar : T.Y. B.Sc. (IT) - IoT
the circuit because the position of each component will be labelled, there
will be holes only where the components go, and there will be less chance
of short circuits because the track between components will be
protected by the solder resist.
4, When you want to scale things even further moving to combined board
allows us to remove any unnecessary components from the
microcontroller board.
Q.2(e) Explain the following IoT devices built with Arduino : (5)
() The Good night lamp, (ii) Botanicals, (iii) Baker treat
Ans.: (i) The Good Night Lamp
(a) The idea of Good Night Lamp was initially brought up by Alexandro
Deschamps Soncino. He came up with an idea of internet connected
table or bedside lamp.
(b) A simple consumer device, this lamp would be paired with another
lamp anywhere in the world, allowing it to switch the other lamp on or
off, and vice versa.
(©) Because light is integrated into our daily routine, seeing when our
loved ones turn, for example, their bedside lamp on or off gives us a
calm and ambient view onto their lives.
(d) The product consists of a "big lamp" which is paired with one or more
“little lamps", The big lamp has its own switch and is designed to be
used like a normal lamp. The little lamps, however, don't have
switched but instead reflect the state of the big lamp.
(e) Adrian and the rest of the teams familiarity with Arduino led to it
being an obvious choice as the prototyping platform. In addition, as
the lamps are designed to be a consumer product rather than a
technical product, and are targeted at a mass market, design, cost,
and ease of use are also important.
(f) The Arduino platform is simple enough that it is possible to reduce
costs and size substantially by choosing which components you need
in the production version
(g) A key challenge in creating a mass-market connected device is
finding a convenient way for consumers, some of whom are non-
technical, to connect the device to the Internet. Even if the user has
Wi-Fi installed, entering authentication details for your home
network on a device that has no keyboard or screen presents
challenges.Oct. '19 ~ Paper Solution
(h) As well as looking into options for the best solution for this issue,
the Good Night Lamp team are also building a version which connects
over the mobile phone networks via GSM or 36. This option fits in
with the teams vision of connecting people via a “physical social
network" even if they are not otherwise connected to the Internet.
(ii) Botanicals
(a) Botanicals is a collaboration between technologists and designers
that consists of monitoring kits to place in plant pots.
(b) The Botanicals kits then contact the owner if the plant's soil gets
too dry. The project write-up humorously refers to this as “an
effort to promote successful inter-species understanding" and as a
way of translating between a plant's communication protocols to
human protocols, such as telephone, email, or twitter .
(c
The original project used stack Arduino controllers, although the
kits available for sale today use the AT mega 168 microcontroller
with a custom board, which remains Arduino-compatible, and the
programming is all done using the Arduino IDE. To match the form
factor of the leaf-shaped printed circuit board , the device uses a
WizNet Ethernet chip instead of the larger Arduino Ethernet
Shield.
(ii) Baker Tweet
(a) The Baker Tweet is effectively a physical client for Twitter
designed for use in bakery.
(b) A baker may want to let customers know that a certain product has
Just come out of the ovens-fresh bread, hot muffins, cupcakes laden
with icing-yet the environment he would want to tweet from contains
hot ovens, flour dust, and sticky dough and batter, all of which would
pay havoc with the electronics, keyboards , and screen of a
computer, tablet, or phone.
(c) Staff of design agency Poke in London wanted to know when their
local bakery had just produced a fresh batch of their favourite
bread and cake , so they designed a proof of concept to make it
possible.
(d) Because Baker Tweet communicates using Wi-Fi, bakeries, typically
not built to accommodate Ethernet cables, can install it. Baker Tweet
exposes the functionality of Twitter in a “bakery-proof” box with
more robust electronics than a general-purpose computer, and a
13Vidyalankar : T.Y. B.Sc. (IT) - IoT
simplified interface that can be used by fingers covered in flour and
dough.
(e) It was designed with an Arduino , an Ethernet Shield, and a WiFi
adopter. As well as the Arduino simply controlling a third-party
service, it is also hooked up to a custom service which allows the
baker to configure the messages to be sent.
Q.3_ Attempt any THREE of the following : [15]
Q.3(a) Explain the sketch iterate and explore process in prototyping. (5)
Ans.: 1. Sketching enables you to brainstorm, explore multiple ideas, define
flows, communicate with team members all why being quick and cheap.
Iterative design is a design methodology based on a cyclic process of
prototyping, testing, analysing, and refining a product or process.
2. A prototype is a draft version of a product that allows you to explore
your ideas and show the intention behind a feature or the overall design
concept to users before investing time and money into development.
3. Doing a large amount of introductory jobs doesn't mean that you won't do
extra research and gathering of possible beginning points when you do
eventually sit down with a particular estimate in mind.
4. To start with, you're looking for a extensive search across the problem
area. The motive is to get to clutch with as many aspects of the design
as possible, rather than drilling down into one specific possible result.
Pushing beyond the obvious solutions forces you to look at things
differently and increases the likelihood that you'll have a good design
‘among your options.
5. Use whatever tools make most sense to help with the idea triggering and
investigation. You might use a mood board—a whiteboard where you jot
down thoughts and sketches over a few days—or a notebook that you
doodle sketches.
6. They only need to capture and convey your ideas. The more sketching you
do, the better they will get.
7. Then give it or show it to some of the people who might use the finished
item to find out how they interact with it.
8. Arguably, in the early stages of a design, you can never do too much
iterating through ideas and trying out different approaches to solving
the problem.
9. If the idea warrants it (and maybe even if it doesn't), don't be afraid to
take your sketching into three dimensions. Mock up different designs
with modelling clay or LEGO or some of the other methods we cover in
this chapter. Try out different sizes and see how the changes in
dimensions affect the feel or the look of the design.
14Oct. '19 ~ Paper Solution
10. Maybe even combine the approaches here with the things you learnt in
for prototyping the software and electronics and lash up a rough-and-
ready prototype that you can try out properly. Then give it or show it to
some of the people who might use the finished item to find out how they
interact with it.
11. For example, the evolution of the design for the Good Night Lamp (which
we featured in a case study in the last chapter). The original design was
amore traditional lamp shape, but in a design workshop, the team batted
‘around a range of ideas with the help of a purely functional prototype.
They realised that a design echoing the shape of a house better
conveyed the core concept of connecting loved ones in their homes.
12. The key lesson is to use these techniques to experiment with different
possibilities and learn which features of which designs are best. This
approach allows you to synthesize the results into a coherent final
design.
Q.3(b) Write a short note on laser cutters. (5)
Ans. =
1. Laser cutting is a technology that uses a laser to cut materials, such as
industrial manufacturing, glass jars, metallic things etc.
2. But it is also starting to be used by schools, small businesses, and
hobbyists.
3. Laser cutting works by directing the output of a high-power laser most
commonly through optics.
4. A commercial laser for cutting materials involved a motion control
system to follow a CNC or G-code of the pattern to be cut onto the
material.
5. The focused laser beam is directed at the material, which then either
melts, burns, vaporizes away, or is blown away by a jet of gas , leaving an
edge with a high- quality surface finish.
6. Industrial laser cutters are used to cut flat-sheet material as well as
structural and piping materials.
7. The laser cutting machine was first used on 1965, to do holes in diamond
dies.
8. The first machine was made by Western Electric Engineering Research
Center.
9. Laser printer is very useful to have in your workshop.
10. 3D printer can produce more complicated parts, but the simpler design
process, greater range of materials which can be cut at faster speed
makes the laser cutter a useful product.
15Vidyalankar : T.Y. B.Sc. (IT) - IoT
11, Choosing a laser cutter:
(a) The size of bed: This is the surface where the sheet of material is
kept at the time of cutting. Bigger bed can be more cost effective.
(b) Power of the laser: More power of the cutter can cut thicker sheets.
Example, 40W laser can cut 10mm thick acrylic and 60W laser can
cut 25mm thick acrylic.
Q.3(c) What is milling? Explain. (5)
Ans.
1. Milling is the process of machining using rotary cutters to remove
material by advancing a cutter into a work piece.
2. This may be done varying direction on one or several axes, cutter head
speed, and pressure.
3. Milling covers a wide variety of different operations and machines, on
scales from small individual parts to large, heavy-duty gang milling
operations.
4. It is one of the most commonly used processes for machining custom
parts to precise tolerances.
5. Milling can be done with a wide range of machine tools.
6. The original class of machine tools for milling was the milling machine
(often called a mill).
7. After the advent of computer numerical control (CNC) in the 1960s,
milling machines evolved into machining centers: milling machines
‘augmented by automatic tool changers, tool magazines or carousels, CNC
capability, coolant systems, and enclosures.
8. Milling centers are generally classified as vertical machining centers
(VMCs) or horizontal machining centers (HMCs).
9. The integration of milling into turning environments, and vice versa,
began with live tooling for lathes and the occasional use of mills for
turning operations.
10. This led to a new class of machine tools, multitasking machines (MTMs),
which are purpose-built to facilitate milling and turning within the same
work envelope.
Milling Process :
1. Milling is a cutting process that uses a milling cutter to remove material
from the surface of a work piece.
2. The milling cutter is a rotary cutting tool often with multiple cutting
points.
3. As opposed to drilling, where the tool is advanced along its rotation axis,
the cutter in milling is usually moved perpendicular to its axis so that
cutting occurs on the circumference of the cutter.
16Oct. '19 ~ Paper Solution
4. As the milling cutter enters the work piece, the cutting edges (flutes or
teeth) of the tool repeatedly cut into and exit from the material,
shaving off from the work piece with each pass. The cutting action is
shear deformation; material is pushed off the work piece in tiny clumps
that hang together to a greater or lesser extent (depending on the
material) to form chips.
5. This makes metal cutting somewhat different from slicing softer
materials with a blade.
Q.3(d) What are the legalities associated with scrapping? (5)
Ans.:
1, Most of the companies have sample of relevant data but they don't have
knowledge to make it available as API's.
2. From facebook example you understand that the computer is only
suppose to run the browser and navigate it through UI elements which
can be delicate but making computer do more work is not impossible.
3. This is known as “screen - scrapping".
4. Screen-scrapping is not useful for website as it may break the terms and
conditions that a website can follow.
5. For example the Google won't allow to screen scrap its search bar but
will provide a API for the same. Even if you don't follow the legal rules
the basic terms and conditions that are put by the company like Google
should be followed else the company will exclude you from all other
services that is provides that me lead to in convenience.
6. Rest of the data is protected with various security techniques like
copyright, authenticating users to database rights and many more.
7. There are always alternatives for all the information that is available.
For example you can use microsoft Outlook rather than using Gmail or
you can use OpenStreetMap rather than using GoogleMaps.
Q.3(e) What is comet? Explain. (5)
Ans.:
COMET :
Comet is an umbrella name for a set of technologies developed to get around
the inefficiencies of polling. As with many technologies, many of them were
developed before the “brand” of Comet was invented; however, having a
name to express the ideas is useful to help discuss and exchange ideas and
push the technology forward
1. Long Polling (Unidirectional) :
(a) The first important development was “long polling’, which starts of f
with the client making a polling request as usual. However, unlike a
normal poll request, in which the server immediately responds with an
7Vidyalankar : T.Y. B.Sc. (IT) - IoT
answer, even if that answer is “nothing to report", the long poll waits
until there is something to say.
(b) This means that the server must regularly send a keep-alive to the
client to prevent the Internet of Things device or web page from
concluding that the server has simply timed out.
(c) Long polling would be ideal for the case of WhereDial: the dial
requests to know when the next change of a user's location will be.
As soon as WhereDial receives the request, it moves the dial and
issues a new long poll request.
2. Multipart XMLHttpRequest (MXHR)(Unidirectional) :
(a) When building web applications, it is common to use a JavaScript API
called XMLHttpRequest to communicate with the web server without
requiring a full new page load.
(b) From the web server's point of view, these requests are no different
from any other HTTP request, but because the intended recipient is
some client-side code, conventions and support libraries (both client-
and server-side) have developed to address this method of
interaction specifically.
(c) Many browsers support a multipart / x-mixed-replace content type,
which allows the server to send subsequent versions of a document
via XHR.
3. HTML5 WebSockets (Bidirectional) :
(@) Traditionally, the API used to talk directly to the TCP layer is known
as the sockets API. When the web community was looking to provide
similar capabilities at the HTTP layer, they called the solution
WebSockets.
(b) Although WebSockets are currently a working draft in the HTML5
spec, they seem to have traction in modern browsers, servers, and
other clients.
(c) For example, there is a (partial) implementation for the Arduino
platform. WebSockets have the benefit of being bidirectional. You
can consider them like a full Unix socket handle that the client can
write requests to and read responses from.
(d) This might well be the ideal technology for the task timer. After a
socket is established, the timer can simply send information down it
about tasks being started, modified, or cancelled, and can read
information about changes made in software, too.Oct. '19 ~ Paper Solution
4. Implementations :
(a) The options described in the preceding section seemed to us to have
most traction currently: however, as a fast-changing area with no
absolute consensus as yet, the actual details of transports and
limitations are bound to change. It is worth paying attention to these
transports as they develop. The Wikipedia page on Comet is a useful
starting point for tracking the current state of play.
(b) Let's look at support for these techniques on the three main
platforms that you may need to consider for an Internet of Things
application: the browser web app (if applicable), the microcontroller
itself, and the server application.
(c) On the browser side, it is often possible to abstract the actual
transport using a library which chooses which method to connect to
the server. For example, it might use WebSockets if available;
otherwise, it will fall back to MXHR or long polling.
(d) This capability is useful because each web browser currently has
varying levels of support for the different techniques. There are
wellknown Comet libraries for jQuery and for Dojo.
(e) There are also libraries for the microcontroller; however, they tend
to support only one scheme. For example, several dedicated
WebSockets libraries are available for Arduino. In fact, the fallback
to different methods of interchanging data aren't really needed on
the Arduino.
(f) Unlike the case of a desktop web app, with Arduino you don't have to
worry about the users having different browsers because you'll be
providing the firmware for the device.
5. Scaling :
(a) An important consideration is that all these Comet techniques
require the client to have a long-term connection with the server.
For a single client, this is trivial. But if there are many clients, the
server has to maintain a connection with each of them.
(b) If you run a server with multiple threads or processes, you
effectively have an instance of the server for each client. As each
thread or process will consume system resources, such as memory,
this doesn't scale to many clients.
(©) Instead, you might want to use an asynchronous web server, which
looks at each client connection in turn and services it when there is
new input or output.
(d) If the server can service each client quickly, this approach can scale
up to tens of thousands of clients easily. There is a problem that
19Vidyalankar : T.Y. B.Sc. (IT) - IoT
each process on a typical Unix server has a maximum number of
sockets, so you are restricted to that number of simultaneous
clients.
Q.3(f) Explain HTML5 web socket. (5)
Ans.
Web Socket is a web technology that provides full-duplex communication
channels over a single TCP connection. A full-duplex communication is the
communication system that allows simultaneous bidirectional communication.
A telephone conversation is a good example of full-duplex communication
where in both parties can speak and hear at the same time.
1. The API used to talk directly to the TCP layer is known as the sockets
API. When the web community was looking to provide similar capabilities
at the HTTP layer, they called the solution Web Sockets.
2. Web Sockets are currently a working draft in the HTML spec, they are
embedded in modern browsers, servers, and other clients.
3. Web Sockets have the benefit of being bidirectional. You can consider
them like a full Unix socket handle that the client can write requests to
and read responses from.
4. This might well be the ideal technology for the task timer. After a
socket established, the timer can simply send information down it about
tasks being started, modified, or cancelled, and can read information
about changes made in software, too.
5. Because Web Sockets are new and push the HTTP protocol ina slightly
unorthodox direction, they are known to have some issues with proxy
servers.
6. This situation should change as the proxies currently broken in this
respect are fixed to be aware of Web Sockets.
7. One of the more unique features WebSockets provide is its ability to
traverse firewalls and proxies, a problem area for many applications.
Comet-style applications typically employ long- polling as a rudimentary
line of defense against firewalls and proxies.
8. The technique is effective, but is not well suited for applications that
have sub-500 millisecond latency or high throughput requirements.
9. A WebSocket detects the presence of a proxy server and automatically
sets up a tunnel to pass through the proxy.
10. WebSockets—like other pieces of the HTML5 effort such as Local
Storage and Geolocation—was originally part of the HTML5
specifications.
20Oct. '19 ~ Paper Solution
Q.4 Attempt any THREE of the following: [15]
Q.4(a) Explain different types of memory. (5)
Ans.: Types of memory
1. ROM (Read-only Memory) :
(@) ROM is non-volatile memory so always retains its data.
(b) Read-only memory is used to store the hard-coded information of
chips and can onle be read afterwards.
(c) It is used to store only the executable program code and any data
which is fixed and never changes.
(d) ROM's are the least flexible memory.
(e) Creating memory with ROM is the cheapest way. It is less flexible
from flash memory.
(f) ROM needs power to store information and no data lose happen
whenever the power failure occur.
2. Flash =
(a) Flash is a semi-permanent type of memory which provides all the
advantages of ROM. Flash doesn't need power to store information,
so its contents can survive after the circuit being unplugged.
(b) The content of flash can be rewritten a maximum number of times.
(c) The reading speed of information is not much different as of speed
of RAM or ROM.
(d) In flash writing process takes few processor cycles, which means it's
best to store the program executable data or important data that
has been gathered.
3. RAM (Random-access Memory) :
(a) RAM is also called as read write memory or the main memory or the
primary memory. RAM is volatile memory as the data loses when
power is turned off.
(b) Random-access memory mostly used for it's speed to access the
data, RAM requires power to retain its contents,
(c) RAM is used as working memory for the systems the place where the
things are stored while being processed.
Q.4(b) With the help of examples, compare stack and heap. (5)
Ans.: Stack:
1, New items which are added to the stack go on the top, and items can be
removed only in strict reverse order, so the first thing to be removed is
the last item that was placed onto the stack.
a1Vidyalankar : T.Y. B.Sc. (IT) - IoT
2
This arrangement makes it easy for the processor to keep track of
where things are and how much space is being used because it has to
track only the top of the stack.
Consequently, the stack is really only useful for
(a) Items that aren't going to survive for long periods of time.
(b) Items that remain in constant use, from the beginning to the end of
the program.
The downside to this approach is that if you're finished with a particular
variable, you can release the memory used for it only when you can
remove it from the stack, and you can do that only when everything
added since it was allocated is removed from the stack, too.
Global variables, which are always available, are allocated first on the
stack, After that, whenever the path of execution enters a function,
variables declared within it are added. The parameters to the function
get pushed onto the stack immediately, while the other variables are
pushed as they are encountered. Because all the variables within a
function are available only to code inside it, when you reach the end of
that function, all those parameters and variables are ready to be
discarded. So, the stack gets unwound back to the same size it was just
before control passed to the function.
Example,
// global variables function A {
variable A1; variable A2; call B():
}
function B { variable B1; variable B2; variable B3; call C(); call D():
}
function C { variable C1;
}
function D { variable D1;
variable D2:}
call AQ:
Before function A is called, the stack looks like state (i).
(a) As execution moves into function A, its variables are added to the
stack (ii).
(b) Function A then calls function B, resulting in its variables being
added to the stack (ii).
(©) Inside function B, first function C is called, resulting in its variables
being added to the stack (iv).
22Oct. '19 ~ Paper Solution
(d) When execution returns from function C, its variables are removed
from the stack, taking you back to stack (iii).
(e) Then function D is called, so its variables are pushed onto the stack
instead (v),
(f) Then execution returns to function B, with D's variables removed
(iii).
(g) And back to A, removing B's variables (ii).
(h) And, finally, you leave function A, dropping back to just the global
variables being defined (i).
uneven cs | ena]
[ Fancuon 0
varies pascal
i
Fron Bs Fuecton Bs'| | Furctore's
variables, variables | variables,
‘Function A's: Function A's. ‘Function A's: Funcbon A's.
arabes variables variables variables
Gloais Globats Gloals Glass | Ghbass
l
(i) (ii) (iii) (iv) (v)
Heap:
1. Heap allows the allocation of chunks of memory at any time.
2. The heap is a bit like the seating area of a train where you fill up the
seats strictly from the front and have to keep everyone who is travelling
as a group in consecutive seats.
3. To begin, all the seats are empty. As groups of people arrive, you direct
them to the next available block of seats.
4. But two possible problems exist,
(a) First, you might simply have more people to fit on the train than
there are seats (this is the same problem as running out of memory).
(b) The second problem is more subtle: though you theoretically have
enough free seats for the next group of passengers, those free
seats are spread across the train and aren't available in a continuous
block of free seats. This last situation is known as memory
fragmentation.
23Vidyalankar : T.Y. B.Sc. (IT) - IoT
5. Example,
create object A (size 20 bytes)
create object B (size 35 bytes)
create object C (size 50 bytes)
// do some work that needs object C
delete object C
create object D (size 18 bytes)
// do more work with objects B and D
delete object 8
create object E (size 22 bytes)
w
(Ww)
(iii)
{iv)
{v)
(vi)
tt
aomt (vi)
(a) At the start of execution, the heap will be empty (i).
(b) Object A is added to the heap (ii), taking up 20 bytes of space.
(c) Object B is added to the heap (iii), consuming a further 35 bytes
straight after the space for object A.
24Oct. '19 ~ Paper Solution
(d) Object Cis added to the heap (iv), adding 50 bytes to the heap right
after object B.
(e) Object C is no longer needed and is deleted, releasing the space it
consumed on the heap and taking us back to heap (iii).
(f) Object D is created and takes up 18 bytes of the space just vacated
by object C (v).
(g) Now object B is finished with and deleted. As other code might be
relying on the position of object D, we can't move it, so there's now a
free space between objects A and D (vi).
(h) Object E is created. It requires 22 bytes of space, which means it
will fit in the hole left by object B (vii).
Q.4(C) What are libraries? Explain with examples. (5)
Ans.
1, These days when developing software for server or desktop machines,
you have huge array of possible libraries and framework available to
make your life easier.
2. In the embedded world task are often a little trickier as microcontroller
are still too resource constraints to just pull in main steam operation
system libraries and code.
3, Example :
(a) IwIP : LwIP or Lightweight IP is a full TCP/IP stack which run in low-
resource conditions, It requires only tens of kilobytes of RAM and
around 40KB ROM/flash. The Arduino WiFi shield uses these library.
(b) uIP : uIP, or micro IP is TCP/IP stack for smallest possible system.
Tt can even run on system with only a couple of kilobytes of RAM. It
does this by using any buffers to stores incoming packet.
(©) uClibe : uClibe is a version of standard GNU C library for embedded
Linux system.
(d) Atomthreads : Atomthreads is lightweight real-time scheduler for
embedded systems. You can use it when your code get complicated.
(e) BusyBox : Tt is not library. BusyBox is a collection of a host of useful
Unix utilities.
Q.4(d) Define business model. Explain different factors in the definition. [5]
Ans.:
Business Model describes the rationale of how organization creates,
delivers, capture value in economic, social , cultural or other contexts And
the process of business model construct and modify is also called business
model innovation.
25Vidyalankar : T.Y. B.Sc, (IT) - ToT
The business model definition brings together a number of factors:
1. A group of people(customers).
2. The need of those customer:
3. A thing that your business can do to meet those needs.
4. A success criterion such as making a profit.
5. Organisational practices that help to achieve this goal.
6. And to be able to carry on doing so, sustainably.
Q.4(e) With the help of a diagram, explain business model canvas. (5)
Ans.: One of the most popular templates for working on a business model is the
Business Model Canvas by Alexander Osterwalder and his startup, the
Business Model Foundry. The canvas is a Creative Commons-licensed single-
page planner.
Key Partners Key Activities Value Propositions
Identity your company’skey What spectickeyactiviiesare | identity the core valuethe
partners. Thiscan consist of necessar/todelveryourvalue | company providesto customers.
Important supliesin your proposition? What ecivitiesset_ | Whatexactyisthe company
supply chain. Whatkey yourcompany aparttromothers? | tryingtogveto customers? What,
resources doesthecomoary | Considerhomyourcomparys | problemisyourcompany tying
receive fromthese partners? Unique diferencesinitsrevenue | tosolveand what needs are your
Whatkey activites are streams distibutionchannels, | company satisfying? Howedo you
perormedbythesepartners? | orcustomerrelationships.D0 | offersomething diferen:that
Thinkaboutwhyyourcompany | youneedto procurespectieniche | satisfies thecemandsof your
workswith these key partners | resources? Doyouneed to customer segments (es. price,
and themotvationsbehindthem | streamineto keep co¥s end: quality, design satus)?
prices low? eet
Key Resources
Whatspecifickey resourcesor
assets are necessary to deliver
your valueproposttion? Consider
what resoureesyourdistribution
channels and revenue streams
may requireto function.
‘Additionally thinkaboutwhat
resources are needed to maiatain
customer relationships Does
yyourcompany require alot fF
capital orhumen resources?
26Oct. '19 ~ Paper Solution
Customer Relationships
What typeof relationship doyou
hhavewith your customers? How
do you interact with customers
‘and how does this differ amongst
‘customer segments? Doyou
‘communicate frequently withyour
‘customers? How much support
> fe] =
Temperature Sends this_—_Contralcanter__Spinker tums
tnsardetects detcctaignalto sendseommand —“on'and put
wea thecontel” ““tosprnier | “out ame,
Fig.: Sensor, Controller and Actuator
Sensor : a device that converts a physical parameter to an electrical output.
Actuator : a device that converts an electrical signal to a physical output.
45Vidyalankar : T.Y. B.Sc. (IT) - IoT
Q.2(d) Write note on Raspberry Pi. 6)
Here are the various components on the Raspberry Pi board :
Ans.:
ARM CPU/GPU: The CPU
performs all basic computations
and the GPU performs graphics
related functions.
GPIO : These are exposed
general-purpose input/output
connection points that will allow
the real hardware hobbyists the
opportunity to tinker.
RCA : Used for connecting analog devices.
Audio out : It is 3.5mm audio output jack.
LEDs : Used for giving some notification.
USB : Used for connecting some peripherals or even cascading the USB
ports.
HDMI : Used for connecting HD devices.
Power : Used for power supply.
SD card slot : It has OS in it used while booting.
Ethernet : Used for wired LAN.
Openness
Many of the components are highly open of Raspberry Pi, the Linux
distributions, the ARM VideoCore drivers etc., makes it open source.
Q.2(e) Discuss the factors we should consider when deciding to build [5]
Internet of Things device.
The following sections discuss about choosing the platform required to
design the systems
Ans.:
Processor Speed :
The speed of the processor tells how fast the
instruction will be executed. It is always defined in
the form of MIPS (Millions of Instructions Per
Seconds). Fig.: Speed of the
processor
RAM :
Random Access memory also known as primary memory is fastest memory
available in the system. All the programs are executed in RAM, and it is
always better to have higher size of RAM.
46April '19 ~ Paper Solution
Fig.: RAM Chip
Networking :
This is the most important thing for IoT, which tells how the devices are
connected, It is possible to connect a device with wired LAN but only issue is
physical cable.
Wireless connection though it gives mobility but it is a costly affair and is
bad in power consumption.
Fig. : Networks
usB :
For more powerful computer, tethering to it via USB can be easy way to
provide power and networking. So it is better that microcontrollers include
support for USB, so no extra chip is not required.
Power Consumption :
Always fast processors consume more power and hence required very high
power supply. For portable device major issue will be power supply.
Interfacing with Sensors and Other Circuitry :
This is the main concept of ToT, device needs to interact with sensors to
gather data about its environment, motors, LEDs, screens etc.
Q.2(f) What are the disadvantages of Open source? 6)
Ans. :
Advantages of Open Source Software
The benefits of open source is tremendous and has gained huge popularity in
the field of IT in recent years. This is mainly because the advantages of
open-source software is that it's free to use - its greatest advantage. As it
is developed by a non-profit community, it has some disadvantages as well
47Vidyalankar : T.Y. B.Sc. (IT) - IoT
Open-source software is free to use, distribute, and modify. Tt has lower
costs, and in most cases this is only a fraction of the cost of their
proprietary counterparts.
Open-source software is more secured as the code is accessible to everyone.
Anyone can fix bugs as they are found, and users do not have to wait for the
next release. The fact that is continuously analyzed by a large community
produces secure and stable code.
Open source is not dependent on the company or author that originally
created it. Even if the company fails, the code continues to exist and be
developed by its users. Also, it uses open standards accessible to everyoni
thus, it does not have the problem of incompatible formats that exist in
proprietary software.
Lastly, the companies using open-source software do not have to think about
complex licensing models and do not need anti-piracy measures like product
activation or serial number.
Disadvantages
The main disadvantage of open-source software is not being straightforward
to use. Open-source operating systems like Linux cannot be learned in a day.
They require effort and possibly training from your side before you are able
to master them. You may need to hire a trained person to make things
easier, but this will incur additional costs.
There is a shortage of applications that run both on open source and
proprietary software; therefore, switching to an open-source platform
involves a compatibility analysis of all the other software used that run on
proprietary platforms. In addition, there are many ongoing parallel
developments on open source software. This creates confusion on what
functionalities are present in which versions.
Lastly, many of the latest hardware are incompatible to the open-source
platform: so you have to rely on third-party drivers.
Q.3 Attempt any THREE of the following : [15]
Q.3(a) Discuss the methods of 3D printing. (5)
Ans.: * Fused Filament Fabrication (FFF) : Also known as fused deposition
modeling (FDM, is a relatively new method of rapid prototyping) which
works by laying down consecutive layers of material at high
temperatures, allowing the adjacent layers to cool and bond together
before the next layer is deposited
48April '19 ~ Paper Solution
Fiamentis led Flamert spect
tothe extruder
‘Tne exer uses torque
{and 8 pinch system 1 eed
‘and revac he flament
precise amounts.
‘Anester block mets the
flamentto 8 useable
lemperatre.
‘The heated flaments forced
cout the heated nozsie at = The extruded materia is at down
‘malar damater ‘on tho model wher is needed
‘The print head andlor bed is moved
to the comect X/¥72 postion or pacing
the maton
Fig. : 3D printing
3D models are transformed into g-code, essentially a set of instructions
which positions the motors precisely and generates the required volume
extrusions to create the part. For most simple objects, the FFF method
only uses the amount of material required for the part, as opposed to a
CNC machine which requires significant amounts of scrap material. One
exception to this case is when overhangs are introduced into the part
features.
Laser Sintering : The Selective Laser Sintering process mainly
describes the method through which miniature particles of plastic, glass
or ceramics are exposed to heat by high-power laser: in order to fuse
them together forming a 3-Dimensional solid object. In the most basic
sense, this is exactly what happens in the Selective Laser Sintering
process.
The process often starts by creating a CAD file. The CAD file is what
will have all the details related to the design of the object which is to be
created
Once the design is complete, the CAD file has to be converted to STL
format for easy comprehension of the design by an SLS machine. At this
stage, the printing process can begin.
49Vidyalankar : T.Y. B.Sc. (IT) - IoT
Bear in mind that all the 3D printing materials to be used in the SLS
process have to be powdered. Before the printing starts, the powdered
materials must be dispersed above the build platform ina thin layer. The
build platform is always found inside the SLS machine.
Laser beam : }—] can |
Roller
es
Piston —— | "Signal
z
vex
Fig.: Working of Laser sintering
The next step will now be to direct a laser down to the platform. The
laser normally is controlled by a computer and therefore through the
computer the designer can easily determine what will be fabricated using
the laser. When the laser is directed to the platform, it begins tracing
cross-sections of the designed digital object onto the powdered
material.
The laser's main purpose is to heat the powder just below its melting
point fusing the tiny particles together forming a solid object.
Immediately the first layer is created, the platform of the Selective
Laser Sintering machine drops by about O.lmm to expose a new layer of
the powdered material for another cross-section of the object to be
traced and fused together by the laser.
This process repeats itself over and over again until the entire object
has been fabricated.
* Powder bed : Like laser sintering, the powder-bed printers start with a
powder form, but rather than fusing it together with a laser, the binder
is more like a glue which is dispensed by a print head similar to one in an
inkjet printer. After the printing process, we need post processing
where they are sprayed with a hardening solution.
50