0% found this document useful (0 votes)
45 views34 pages

IOT Unit 3

The document outlines key concepts in the Internet of Things (IoT), focusing on network and communication aspects essential for IoT deployment. It covers topics such as device connectivity, data transmission, security, interoperability, and various protocols like MAC and routing protocols. Additionally, it discusses methods for neighbor node discovery, data aggregation, and dissemination strategies in wireless sensor networks.

Uploaded by

devilkapoor133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views34 pages

IOT Unit 3

The document outlines key concepts in the Internet of Things (IoT), focusing on network and communication aspects essential for IoT deployment. It covers topics such as device connectivity, data transmission, security, interoperability, and various protocols like MAC and routing protocols. Additionally, it discusses methods for neighbor node discovery, data aggregation, and dissemination strategies in wireless sensor networks.

Uploaded by

devilkapoor133
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

Engineering in One Video (EIOV) Watch video on EIOV

Engineering in One Video (EIOV) Watch video on EIOV

Internet of Things
Unit-3
Network and Communication Aspects in IoT
Engineering in One Video (EIOV) Watch video on EIOV

Topics to be covered...
Roles of network for IoT deployment
Wireless medium access issues
MAC protocol used in sensor network
Schemes of MAC protocol
Routing protocols & types
Neighbour Node Discovery (NND)
Methods used in node discovery
Data Aggregation & approach types
Data dissemination & Methods
Happy Ending!
Engineering in One Video (EIOV) Watch video on EIOV

Roles of network for


IoT deployment
Engineering in One Video (EIOV) Watch video on EIOV

Roles of network for IoT deployment in devices


1. Device Connectivity:
Networks enable various IoT devices to connect with each other and central systems,
allowing seamless data exchange.
This connectivity is essential for IoT devices to operate and share real-time information.

2. Data Transmission:
Networks facilitate the transmission of data collected from IoT devices to cloud servers
or data centers.
This data flow is necessary for analysis, monitoring, and decision-making.

3. Security and Data Protection:


Networks in IoT deployments play a role in securing data through encryption and
authentication methods.
Network security is vital to protect sensitive information from unauthorized access and
cyber threats.
Engineering in One Video (EIOV) Watch video on EIOV

Roles of network for IoT deployment in devices


4. Interoperability Across Devices:
Networks provide a common platform for different IoT devices and protocols to
communicate with each other.
This interoperability allows devices to work together within the same ecosystem.

5. Remote Access and Control:


IoT networks allow devices to be accessed and controlled remotely, enabling users to
manage systems and devices from anywhere.
This feature is critical for applications like home automation and industrial control.

6. Scalability:
IoT networks support the scalability of deployments by allowing more devices to join
and operate efficiently.
As IoT ecosystems grow, networks adapt to support increased data and device
connections.
Engineering in One Video (EIOV) Watch video on EIOV

Wireless medium
access issues
Engineering in One Video (EIOV) Watch video on EIOV

Wireless medium access issues


In wireless communication, medium access issues refer to the challenges of allowing
multiple devices to share the same communication channel (or frequency) without
interference.
Since wireless channels are shared, these issues can impact the efficiency and reliability of
data transmission.

Some key wireless medium access issues:


1. Half-Duplex Operation:
In half-duplex communication, devices can either send or receive data, but not both
simultaneously.
They switch between sending and receiving, which can lead to delays but is more
efficient in environments where simultaneous communication is unnecessary.
An example is walkie-talkies, where only one person can speak at a time.

2. Limited Bandwidth:
Wireless channels have limited capacity, certain amount of data can be sent at once.
Engineering in One Video (EIOV) Watch video on EIOV

Wireless medium access issues


3. Time-Varying Channel:
A time-varying channel means the quality of the communication channel changes over
time due to factors like movement, weather, or interference.
In wireless networks, this can affect signal strength and data quality, leading to
fluctuations in communication performance.

4. Burst Channel Errors:


Burst errors occur when a sequence of bits gets corrupted all at once in a short time,
rather than occasional single-bit errors.
These errors often result from sudden interference or signal loss and can disrupt data
transmission, requiring error correction methods to recover the lost data.

6. Power Consumption:
Wireless devices, especially battery-powered ones, need to save power. Frequent
transmissions drain battery life, so finding ways to balance communication.
Engineering in One Video (EIOV) Watch video on EIOV

MAC protocol used in


sensor network
Engineering in One Video (EIOV) Watch video on
Engineering in One Video (EIOV) Watch video on EIOV

MAC protocol used in sensor network


1. Contention-Based Protocols:
Protocols like CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

2. Scheduled-Based Protocols:
TDMA (Time Division Multiple Access)

3. Hybrid Protocols:
Protocols like Z-MAC (Zebra MAC)

4. Low Power Listening (LPL) Protocols:


B-MAC (Berkeley MAC

5. Cluster-Based Protocols:
LEACH (Low-Energy Adaptive Clustering Hierarchy)
Engineering in One Video (EIOV) Watch video on EIOV

Schemes of MAC
protocol
Engineering in One Video (EIOV) Watch video on EIOV

Schemes of MAC protocol


1. Frequency Division Multiple Access (FDMA)
Available frequency spectrum is divided into multiple frequency bands or channels.
Each device is assigned a unique frequency band and can use it continuously without
interference.
Since devices operate on separate frequencies, they can transmit data simultaneously
without colliding.

Key Points:
Good for constant, low-data-rate transmissions.
Requires careful frequency management.
Less flexible if more devices join, as it relies on fixed frequency assignments.
Engineering in One Video (EIOV) Watch video on EIOV

Schemes of MAC protocol


2. Time Division Multiple Access (TDMA)
In TDMA, time is divided into fixed slots, and each device is allocated a specific time slot to
transmit data.
Devices take turns to send data during their assigned slot, avoiding interference.
TDMA is commonly used in synchronized networks where devices need to conserve energy
by only activating during their slots.

Key Points:
Efficient in terms of power, as devices can sleep when not in their slot.
Requires precise synchronization to avoid collisions.
Suited for networks with predictable data transmission patterns.
Engineering in One Video (EIOV) Watch video on EIOV

Schemes of MAC protocol


3. Code Division Multiple Access (CDMA)
In CDMA, all devices transmit simultaneously over the same frequency but use unique
codes to distinguish their data.
Each device’s signal is spread across the frequency spectrum using a specific code, allowing
multiple signals to coexist without interference.
The receiver identifies the data by decoding it with the same code used by the transmitter.

Key Points:
Highly efficient in terms of spectrum usage.
Allows simultaneous transmission but requires complex processing.
Commonly used in cellular networks for handling many users in the same frequency.
Engineering in One Video (EIOV) Watch video on EIOV

Routing protocols
& types
Engineering in One Video (EIOV) Watch video on EIOV

Routing protocols & types


Routing protocols are essential for managing how data is transmitted from sensor nodes to
a central base station or sink.
Routing protocols are designed to handle limited power, memory, and computational
resources in sensor networks.

Types:
Flat-Based Routing Protocols: Example: Flooding Protocol

Hierarchical-Based Routing Protocols: Example: LEACH

Location-Based Routing Protocols: Example: GPSR

Data-Centric Routing Protocols: Example: SPIN

QoS-Based Routing Protocols: Example: SAR

Mobility-Based Routing Protocols: Example: MOBIC


Engineering in One Video (EIOV) Watch video on EIOV

Neighbour Node
Discovery (NND)
Engineering in One Video (EIOV) Watch video on
Engineering in One Video (EIOV) Watch video on EIOV

Neighbour Node Discovery (NND)


Neighbor Node Discovery (NND) is a process used in Wireless Sensor Networks (WSNs) to
find and identify nearby sensor nodes.
In WSNs, sensors are spread across an area to monitor conditions like temperature,
humidity, or movement.
For the network to function well, each sensor (or node) needs to know which other sensors
are nearby.
This information helps the nodes communicate efficiently, share data, and conserve energy
by reducing unnecessary transmissions.

Why NND is Important:


Efficient Communication: Shortest path for faster message delivery.
Energy Conservation: Reduces energy use in battery-operated networks.
Data Accuracy: Minimizes errors by communicating with nearby nodes.
Network Scalability: Adapts when nodes move or new nodes are added.
Engineering in One Video (EIOV) Watch video on EIOV

Algorithm for Neighbor Node Discovery (NND)


Initialization
Hello Message Broadcast
Listen for Replies
Neighbor Table Update
Periodic Updates
Engineering in One Video (EIOV) Watch video on EIOV

Methods used in
node discovery
Engineering in One Video (EIOV) Watch video on EIOV

Methods used in node discovery


Node discovery in Wireless Sensor Networks (WSNs) involves various methods to help
each sensor node identify and communicate with neighboring nodes.
These methods ensure efficient data sharing, energy conservation, and network stability.

Key methods:
1. Proactive Discovery: Nodes actively broadcast "Hello" messages periodically to
update neighbor lists, useful in static networks where node positions don’t change
frequently.

2. Reactive Discovery: Discovery occurs only when necessary, such as when a node
loses connection or needs to send data, helping conserve energy by reducing
broadcasts.

3. Dynamic Source Routing (DSR): DSR is a method used in synchronized sensor


networks to achieve efficient neighbor node discovery. All routing information is
managed and updated independently at dynamic nodes.
Engineering in One Video (EIOV) Watch video on EIOV

Methods used in node discovery


4. Energy Management using Hybrid MAC (HMAC) Protocol:
The HMAC protocol divides time into two slots: Wakeup Slot (W-SLOT) and
Information Slot (I-SLOT).
Process:
Advantages: HMAC conserves energy and supports one-hop broadcasting, where the
sender broadcasts to all neighbors within range using a single wakeup message.

5. Adhoc On-demand Multipath Distance Vector (AOMDV) Routing:


AOMDV is designed to create multiple loop-free and disjoint paths in a network, which
increases fault tolerance and reliability.
Process:
Advantage: AOMDV ensures multiple available paths for each destination, maintaining
network resilience by providing alternate routes in case of path failures.
Engineering in One Video (EIOV) Watch video on EIOV

Data Aggregation &


approach types
Engineering in One Video (EIOV) Watch video on
Engineering in One Video (EIOV) Watch video on EIOV

Data Aggregation & approach types


Data Aggregation in Wireless Sensor Networks (WSNs) refers to the process of collecting
and combining data from multiple sensor nodes to reduce redundancy and minimize the
amount of data transmitted across the network.

The main goal is to conserve energy and bandwidth by reducing the number of
transmissions needed to send data to a central point (like a base station or sink).

This process is essential in WSNs because sensors are typically battery-powered and have
limited communication resources.

Data aggregation type:


1. Centralized Data Aggregation:
All nodes send their data directly to a central node (sink) for aggregation.
Simple to implement but can lead to high energy consumption due to multiple long-
range transmissions.
Engineering in One Video (EIOV) Watch video on EIOV

Data Aggregation & approach types


2. In-Network Data Aggregation
Nodes aggregate data at intermediate points within the network before forwarding it to
the sink.
Reduces the number of transmissions, saving energy, but requires synchronization
between nodes.

3. Cluster-Based Data Aggregation


Nodes are grouped into clusters with a Cluster Head (CH) that aggregates data from all
cluster members.
Conserves energy by limiting transmissions to the CH, but requires CH rotation to
balance energy usage.

4. Tree-Based Data Aggregation


Nodes are organized in a tree structure, with data aggregated at each level as it moves
up to the sink.
Efficient for hierarchical networks, but a single node failure can disrupt data flow.
Engineering in One Video (EIOV) Watch video on EIOV

Data dissemination
& Methods
Engineering in One Video (EIOV) Watch video on EIOV

Data dissemination
Data Dissemination in Wireless Sensor Networks (WSNs) is the process of distributing data
and routing queries from one node to another within the network.

It involves the interaction between nodes, where data generated by certain sensor nodes
(called sources) is sent to other nodes interested in that data (called sinks).

The purpose is to ensure efficient data routing, considering that WSNs are decentralized
and sensors typically have limited battery power.

Key Concepts in Data Dissemination


Source Node: Generates and sends data based on detected events.
Event: The specific information or condition to be reported.
Sink Node: A node that seeks data about a specific event.
Interest: A description of the event a sink node desires.
Engineering in One Video (EIOV) Watch video on EIOV

Methods of Data Dissemination


1. Flooding
Description: Each sensor node that receives a data packet sends it to all neighboring nodes,
ensuring maximum data distribution.
Pros: Simple and reliable, ensuring that all nodes receive the data quickly.
Cons: Causes network congestion and high energy consumption due to redundant
broadcasts, leading to a phenomenon called "implosion."

2. SPIN (Sensor Protocols for Information via Negotiation)


Description: SPIN uses a negotiation-based approach, where nodes advertise data
availability and only transmit if neighboring nodes express interest.
Process: Three messages are used—ADV (Advertise) for initial data interest, REQ
(Request) for response, and DATA for actual transmission.
Pros: Prevents unnecessary data transmission and conserves energy by sending data only
to interested nodes.
Cons: Non-interested nodes miss data, which may lead to incomplete data dissemination
across the network.
Engineering in One Video (EIOV) Watch video on EIOV

Methods of Data Dissemination


3. Gossiping
Description: Nodes forward received data to one randomly selected neighboring node
rather than all neighbors, improving efficiency.
Pros: Reduces energy usage and minimizes the risk of network overload by avoiding
redundant data transmission.
Cons: Some nodes may not receive the message in larger networks because the random
selection of neighbors can cause gaps in coverage.

4. Cost-Field Approach
Description: Uses a metric-based cost calculation to set up an optimal path for data to
follow within the network.
Process: First, each node calculates a "cost" to the sink based on metrics (e.g., energy or
distance); then data is routed along the lowest-cost path.
Pros: Efficient data routing, minimal energy consumption, nodes follow cost-effective paths.
Cons: Initial setup of cost fields is resource-intensive, requiring additional computations and
network setup.
EIOV

Happy Ending!

You might also like