Model - IOT Questions - Answers
Model - IOT Questions - Answers
• Easily Customizable
• Low power consumption
• Low cost
• Enhanced performance
Microcontrollers are particularly used in embedded systems for real-time control applications
with on-chip program memory and devices.
It is a Single task oriented. For example, a washing machine is designed for washing clothes only.
RAM, ROM, I/O Ports, and Timers cannot be added externally. These components are to be
embedded together on a chip and are fixed in numbers.
Fixed number for memory or I/O makes a microcontroller ideal for a limited but specific task.
Microcontrollers are lightweight and cheaper.
A microcontroller-based system consumes less power and takes less space.
• CPU
CPU is the brain of a microcontroller. CPU is responsible for fetching the instruction, decodes it,
then finally executed. CPU connects every part of a microcontroller into a single system. The
primary function of CPU is fetching and decoding instructions. The instruction fetched from
program memory must be decoded by the CPU.
• Memory
• Serial ports
Serial ports provide various serial interfaces between a microcontroller and other peripherals
like parallel ports.
• Timers/counters
This is the one of the useful function of a microcontroller. A microcontroller may have more
than one timer and counters. The timers and counters provide all timing and counting functions
inside the microcontroller. The major operations of this section are performed clock functions,
modulations, pulse generations, frequency measuring, making oscillations, etc. This also can be
used for counting external pulses.
ADC converters are used for converting the analog signal to digital form. The input signal in this
converter should be in analog form (e.g. sensor output) and the output from this unit is in
digital form. The digital output can be used for various digital applications (e.g. measurement
devices).
DAC perform reversal operation of ADC conversion.DAC converts the digital signal into analog
format. It usually used for controlling analog devices like DC motors, various drives, etc.
• Interrupt control
The interrupt control used for providing interrupt (delay) for a working program. The interrupt
may be external (activated by using interrupt pin) or internal (by using interrupt instruction
during programming).
Some microcontrollers used only for some special applications (e.g. space systems and robotics)
these controllers containing additional ports to perform such special operations. This
considered as special functioning block.
Q4) Draw 8051 Microcontroller as SoC as functional block diagram and explain important
modules of it.
Ans:
8051 microcontroller is designed by Intel in 1981. It is an 8-bit microcontroller. It is built with
40 pins DIP (dual inline package), 4kb of ROM storage and 128 bytes of RAM storage, 2 16-bit
timers. It consists of are four parallel 8-bit ports, which are programmable as well as
addressable as per the requirement. An on-chip crystal oscillator is integrated in the
microcontroller having crystal frequency of 12 MHz.
In the following diagram, the system bus connects all the support devices to the CPU. The system
bus consists of an 8-bit data bus, a 16-bit address bus and bus control signals. All other devices
like program memory, ports, data memory, serial interface, interrupt control, timers, and the
CPU are all interfaced together through the system bus.
• Memory –
• Address Bus –
A bus of the Microcontroller can be defined as a group of wire which can act as a medium for
the transfer of data. There are two buses present in the 8051 Microcontroller. While we are
already aware of the Data Bus, let us know about the Address Bus of the 8051 Microcontroller.
The address bus, which is used to address memory locations, is 16-bit wide. Furthermore, the
address bus can also be used to transfer data from the CPU (Central Processing Unit) to the
memory. Hence, for obvious reasons the address bus is unidirectional.
• Interrupts –
The most powerful attribute of the 8051 Microcontroller is the concept of Interrupts. The
interrupt is a mechanism to –
• Input/Output Ports –
The 8051 Microcontroller needs to be connected to the peripheral devices in order to control
their operations. The I/O Ports are responsible for the connection of the Microcontroller to its
peripheral devices. There are total Four 8-bit Input/Output Ports present in this
Microcontroller.
Additionally, these are some important features of 8051 microcontroller given as follows :
b) HARDWARE->Computer hardware is the collection of all the parts you can physically
touch. Computer hardware is the collection of physical parts of a computer system. This
includes the computer case, monitor, keyboard, and mouse. It also includes all the parts
inside the computer case, such as the hard disk drive, motherboard, video card, and many
others. Computer hardware is what you can physically touch.
RTOS->A Real Time Operating System, commonly known as an RTOS, is a software component
that rapidly switches between tasks, giving the impression that multiple programs are being
executed at the same time on a single processing core.
In actual fact the processing core can only execute one program at any one time, and what the
RTOS is actually doing is rapidly switching between individual programming threads (or Tasks) to
give the impression that multiple programs are executing simultaneously.
HARD REAL TIME OS=> hard real-time system (also known as an immediate real-time system) is
hardware or software that must operate within the confines of a stringent deadline. The
application may be considered to have failed if it does not complete its function within the
allotted time span. Examples of hard real-time systems include components of pacemakers,
anti-lock brakes and aircraft control systems.
e) SOFT REAL TIME OS -> In soft real time system, the meeting of deadline is not
compulsory for every time for every task but process should get processed and give the
result. Even the soft real time systems cannot miss the deadline for every task or
process according to the priority it should meet the deadline or can miss the deadline. If
system is missing the deadline for every time the performance of the system will be
worse and cannot be used by the users. Best example for soft real time system is
personal computer, audio and video systems, etc.
f) SYSTEM -> Is a collection of entities(hardware,software and liveware) that are
designed to receive, process, manage and present information in a meaningful format.
• Operating system
• Utility software applications
• Voltage regulators and power management circuits
• Timing sources such as phase lock loop control systems or oscillators
• A microprocessor, microcontroller or digital signal processor
• Peripherals such as real-time clocks, counter timers and power-on-reset generators
• External interfaces such as USB, FireWire, Ethernet, universal asynchronous receiver-
transmitter or serial peripheral interface bus
• Analog interfaces such as digital-to-analog converters and analog-to-digital converters
• RAM and ROM memory
• An SoC consumes less power. Usually 90% of power consumption is in data and bus
address cabling. Since all the components are on the same chip and internally
connected, and their size is also very small, the power consumption is hugely decreased.
• A smaller size means it is lightweight and of small size.
• Overall, the cost of an SoC is small due to advancements in VLSI technology. As
mentioned in the first point, cabling is not much required and so the cost of cabling is
conserved.
• An SoC provides greater design security at hardware and firmware levels.
• An SoC provides faster execution due to high speed processor and memory.
Disadvantages of an SoC
• Initial cost of design and development is very high. If the number of SoCs is small, the
cost per SoC will be very high.
• Even a single transistor or system damage may prove to be very costly as the complete
board has to be replaced, and its servicing is very expensive.
• Integrating all systems on single chip increases complexity.
• It is not suitable for power-intensive applications.
Usually, FPGAs are kept for particular vertical applications where the production volume
is small. For these low-volume applications, the top companies pay in hardware costs per unit.
Today, the new performance dynamics and cost have extended the range of viable applications.
Some more common FPGA Applications are: Aerospace and Defence, Medical
Electronics, ASIC Prototyping, Audio, Automotive, Broadcast, Consumer Electronics, Distributed
Monetary Systems, Data Centre, High Performance Computing, Industrial, Medical, Scientific
Instruments, Security systems, Video & Image Processing, Wired Communications, Wireless
Communications.
Q12) Draw and explain structure of GPU.
VPU - is a specialised processor which takes video stream as input and has the capability to
perform highly complex processes on the input stream. Processing a video stream means
performing calculation on each pixel value of multiple frames of the video, which is a huge
amount of data, which isn’t possible without a VPU.
DIF - continuously fetches the frame buffer data (the buffer in the system memory that
contains the image to be displayed) and transmit the same to the display.
GMC – used to read and write data from and into various memories, related to display and
graphics requirements.
It provides address, data and control signal while receives instructions, data, status signal and
interrupt which is processed with the help of the system bus. A system bus is a group of various
busses such as address, control and data bus. The CPU assigns more hardware unit to fast cache
while low to computation, unlike GPU.
The GPU (Graphics Processing Unit) is a processor specifically designed for computing the
graphical displays. It is typically incorporated with CPU for sharing RAM with CPU which is good
for the most computing task. It is needed for the high-end graphics intensive processing. The
discrete GPU unit contains its own RAM known as VRAM for video RAM. The advanced GPU
system cooperatively works with the multi-core CPUs. At first, the graphics unit was introduced
by the Intel and IBM in the 1980s. These cards were enabled with simple functionalities such as
area filling, alteration of simple images, shape drawing and so on.
The modern graphics are capable of performing the research and analysis task, often surpassing
CPUs because of its extreme parallel processing. In the GPU the several processing units are
stripped together where no cache coherency exist.
a) The GPU’s of most powerful class typically interface with the motherboards by means of
an expansion slot such as PCI Express.
b) A dedicated GPU is not necessarily removable, nor does it necessarily interface with the
motherboard in standard fashion.
c) The term dedicated refers to the dedicated RAM that these GPU’s have for the cards use.
2) Integrated GPU.
a) Integrated GPU utilize a portion of Computer’s systems RAM rather than having its own
dedicated memory.
b) IGPU’s can be integrated with the motherboard as a part of chipset or on same Disc with
CPU.
a) These newer class of GPUs compete with IGPUs in the low end Desktop markets.
c) These share memory with the system and have a small dedicated cache to make up for
the high latency of the System RAM.
o The ALU has two 32-bits inputs. The primary comes from the register file, whereas
the other comes from the shifter. Status registers flags modified by the ALU
outputs. The V-bit output goes to the V flag as well as the Count goes to the C flag.
Whereas the foremost significant bit really represents the S flag,
the ALU output operation is done by NOR to get the Z flag. The ALU has a 4-bit
function bus that permits up to 16 opcodes to be implemented.
o The multiplier factor has 3 32-bit inputs and the inputs return from the register
file. The multiplier output is barely 32-Least Significant Bits of the merchandise.
The entity representation of the multiplier factor is shown in the above block
diagram. The multiplication starts whenever the beginning 04 input goes active.
Fin of the output goes high when finishing.
• Barrel Shifter
o The barrel shifter features a 32-bit input to be shifted. This input is coming back
from the register file or it might be immediate data. The shifter has different
control inputs coming back from the instruction register. The Shift field within the
instruction controls the operation of the barrel shifter. This field indicates the
kind of shift to be performed (logical left or right, arithmetic right or rotate
right). The quantity by which the register ought to be shifted is contained in an
immediate field within the instruction or it might be the lower 6 bits of a register
within the register file.
• Control Unit
o For any microprocessor, control unit is the heart of the whole process and it is
responsible for the system operation, so the control unit design is the most
important part within the whole design. The control unit is sometimes a pure
combinational circuit design. Here, the control unit is implemented by easy state
machine. The processor timing is additionally included within the control unit.
Signals from the control unit are connected to each component within the
processor to supervise its operation.
Q16 State features of ARM.
• Load/store architecture.
• The simplified design of ARM processors enables more efficient multi-core processing and
easier coding for developers.
• The ARM 7 core uses a three-stage pipeline to increase the flow of instructions to the
processor. This allows multiple simultaneous operations to take place.
• The ARM can be configured to treat stored words in either big-endian or little-endian
format.
CPU modes refer to the various ways that the processor creates an operating environment for
itself. Specifically, the processor mode controls how the processor sees and manages the system
memory and the tasks that use it. There are three different modes of operation:
Real Mode:
Real mode is characterized by a 20-bit segmented memory address space (giving exactly 1 MiB
of addressable memory) and unlimited direct software access to all addressable memory, I/O
addresses and peripheral hardware. Real mode provides no support for memory protection,
multitasking, or code privilege levels.
Protected Mode:
The name of this mode comes from its primary use, which is by multitasking operating systems.
Each program that is running has its own assigned memory locations, which are protected from
conflict with other programs. If a program tries to use a memory address that it isn’t allowed to,
a “protection fault” is generated. The advantages of protected mode (compared to real mode)
are:
• Full access to all of the system’s memory. There is no 1 MB limit in
protected mode.
• Ability to multitask, meaning having the operating system manage the
execution of multiple programs simultaneously.
• Support for virtual memory, which allows the system to use the hard disk
to emulate additional system memory when needed.
• Faster (32-bit) access to memory, and faster 32-bit drivers to do I/O
transfers
• Actuators – Actuators are the energy conversion device used inside a robot. The major
function of actuators is to convert energy into movement.
• Electric motors (DC/AC)- Motors are electromechanical component used for converting
electrical energy into its equivalent mechanical energy. In robots motors are used for
providing rotational movement.
• Sensors – Sensors provide real time information on the task environment. Robots are
equipped with tactile sensor it imitates the mechanical properties of touch receptors of
human fingerprints and a vision sensor is used for computing the depth in the
environment.
• Power Supply – The working power to the robot is provided by batteries, hydraulic, solar
power, or pneumatic power sources.
Control theory
Control theory in control systems engineering is a subfield of mathematics that deals with the
control of continuously operating dynamical systems in engineered processes and machines. In
the context of robotics control plays a fundamental role, particularly in mechanical robots, where
actuators must be manipulated in an organized and even intelligent way by algorithms. Those
algorithms are basically controls.
Robot Learning
Robot learning is a research field at the intersection of machine learning and robotics. It studies
techniques allowing a robot to acquire novel skills or adapt to its environment through learning
algorithms. The embodiment of the robot, situated in a physical embedding, provides at the same
time specific difficulties (e.g. high-dimensionality, real time constraints for collecting data and
learning) and opportunities for guiding the learning process .
Computer Vision
Computer vision is a theory and technology of creating machines that can detects and classify
Objects and their movement receiving information from the series of images.
Important issue of the artificial intelligence is an automatic planning or decision-making in
systems which can performs mechanical actions, such as moving a robot through certain
environment.
Q20. Define the term Embedded System. State its components.
An embedded system is a computer system—a combination of a computer processor, computer
memory, and input/output peripheral devices—that has a dedicated function within a larger
mechanical or electrical system. It is embedded as part of a complete device often including
electrical or electronic hardware and mechanical parts.
Components of Embedded System:
1. Processor : A microprocessor is a computer processor which
incorporates the functions of a computer’s central processing unit
(CPU) on a single integrated circuit (IC), or at most a few integrated
circuits. The microprocessor is a multipurpose, clock driven, register
based, digital-integrated circuit which accepts binary data as input,
processes it according to instructions stored in its memory, and
provides results as output. (Can also be a microcontroller).
• ARM CPU/GPU -- This is a Broadcom BCM2835 System on a Chip (SoC) that's made up of
an ARM central processing unit (CPU) and a Videocore 4 graphics processing unit (GPU).
The CPU handles all the computations that make a computer work (taking input, doing
calculations and producing output), and the GPU handles graphics output.
• GPIO -- These are exposed general-purpose input/output connection points that will
allow the real hardware hobbyists the opportunity to tinker.
• RCA -- An RCA jack allows connection of analog TVs and other similar output devices.
• Audio out -- This is a standard 3.55-millimeter jack for connection of audio output
devices such as headphones or speakers. There is no audio in.
• LEDs -- Light-emitting diodes, for all of your indicator light needs.
• USB -- This is a common connection port for peripheral devices of all types (including
your mouse and keyboard). Model A has one, and Model B has two. You can use a USB
hub to expand the number of ports or plug your mouse into your keyboard if it has its
own USB port.
• HDMI -- This connector allows you to hook up a high-definition television or other
compatible device using an HDMI cable.
• Power -- This is a 5v Micro USB power connector into which you can plug your
compatible power supply.
• SD cardslot -- This is a full-sized SD card slot. An SD card with an operating system (OS)
installed is required for booting the device. They are available for purchase from the
manufacturers, but you can also download an OS and save it to the card yourself if you
have a Linux machine and the wherewithal.
• Ethernet -- This connector allows for wired network access and is only available on the
Model B.
1.Desktop PC
The Raspberry Pi can make a useful desktop computer if set up properly. To turn your raspberry
pi into a desktop PC you’ll need other gadgets than RPi itself such as a screen, a mouse, a
keyboard and if you want, an extra storage device.
You also need to install an operating system like Raspbian or any other operating systems
available for RPi. Some apps such as email and web browsing apps are included and many other
are available for RPi.
2.Media Center
You can have your media center application for your TV running on your Raspberry Pi. Media
center allows you to organize and play media, including pictures, music and videos. You just need
to use the Raspberry Pi and Kodi software.
3.Web Server
The Raspberry Pi board is a great alternative to launch lightweight Web Server. It can handle a
small amount of traffic and you can learn web programming languages such as HTML, CSS, PHP
and MySQL. It can even handle WordPress, if you want to launch your own blog/web site you can
easily do it.
The Raspberry Pi is capable of hosting a powerful home automation application. You can attach
sensors, a camera, relays, etc. And you can monitor and control your house remotely. To extend
its capabilities you can also add Arduinos or other similar boards. This is what someone made
and documented over at Instructables.
5.VPN
A virtual private network (VPN). A VPN extends your own private network into public places, so
even if you’re using Starbucks’ Wi-Fi connection, your Internet browsing stays encrypted and
secure.
6.Robotics
Build and control awesome robots with the Raspberry Pi. Some cool projects out there include
control robotic arms (example), drones (check out this example), humanoid robots (check this
example), etc. There are many examples of robots out there that you can do or adapt to build
your own original robot.
7.Game Server
Raspbian, default OS of pi comes with a special version of Minecraft game pre-installed. But, the
applications of Raspberry Pi can be used as a game server as well. It is an excellent game server
for Minecraft. If multiple Raspberry Pis are used, making one as a dedicated server, a great
gaming experience can be achieved.
Other multiplayer network games can be set up on the Raspberry Pi.
8.Retro Gaming
Raspberry Pi is ideal as a retro gaming machine. It fits as one of the lightest components of a
machine. Particularly, it’s a version, The Raspberry Pi Zero can fit into small spaces for gaming
projects. There are two main options, Recalbox and RetroPie. Other platforms can be emulated
too. Classic MS-DOS PC gaming and Commodore 64 can also be set-up and also many other
popular 16-bit games consoles.
Depending on your version of Raspbian, you may or may not have to install the pygame package
(e.g. Raspbian Lite does not come with some Python packages pre-installed). In a terminal, enter
the following:
Sudo apt-get update
Sudo apt-get install python3-pygame
In a new file, enter the following code:
Import time
Import RPi.GPIO as GPIO
From pygame import mixer
# Pins definitions
Btn_pin = 4
# Set up pins
GPIO.setmode(GPIO.BCM)
GPIO.setup(btn_pin, GPIO.IN)
# Initialize pygame mixer
Mixer.init()
# Remember the current and previous button states
Current_state = True
Prev_state = True
# Load the sounds
Sound = mixer.Sound(‘applause-1.wav’)
# If button is pushed, light up LED
Try:
While True:
Current_state = GPIO.input(btn_pin)
If (current_state == False) and (prev_state == True):
Sound.play()
Prev_state = current_state
# When you press ctrl+c, this will be called
Finally:
GPIO.cleanup()
Save the file (e.g. applause.py), and start the program with python applause.py. Push the button,
and you should hear some congratulatory sounds!
28.Draw Circuit Diagram for connecting LED with Pi module and explain.
The first step in this project is to design a simple LED circuit. Then we will make the LED circuit
controllable from the Raspberry Pi by connecting the circuit to the general purpose input/output
(GPIO) pins on the Raspberry Pi.
A simple LED circuit consists of a LED and resistor. The resistor is used to limit the current that is
being drawn and is called a current limiting resistor. Without the resistor the LED would run at
too high of a voltage, resulting in too much current being drawn which in turn would instantly
burn the LED, and likely also the GPIO port on the Raspberry Pi.
When hooking up the circuit note the polarity of the LED. You will notice that the LED has a long
and short lead. The long lead is the positive side also called the anode, the short lead is the
negative side called the cathode. The long should be connected to the resistor and the short lead
should be connected to ground via the blue jumper wire and pin 6 on the Raspberry Pi as shown
on the diagram.
To find the pin number refer to this diagram showing the physical pin numbers on the Raspberry
Pi.
Ans:
1. In Linux, and other Unix-like operating systems, the /boot/ directory holds files used in booting the operating
system. The usage is standardized in the Filesystem Hierarchy Standard.
It contains :
vmlinux – the Linux kernel
initrd.img – a temporary file system, used prior to loading the kernel
System.map – a symbol lookup table
2. bin file is a self extracting binary file for Linux and Unix-like operating systems. Before executing a . bin file you need
to give it executive permissions. ... If you like to practise terminal commands then open a new terminal and run the
following command to give the file execute permissions.
3. /dev is the location of special or device files. It is a very interesting directory that highlights one important aspect of
the Linux filesystem - everything is a file or a directory.
4. /etc - Usually contain the configuration files for all the programs that run on your Linux/Unix system. /opt - Third
party application packages which does not conform to the standard Linux file hierarchy can be installed here.
5. A standard subdirectory of the root directory, /home has the sole purpose of containing users' home directories.
The root directory, which is designated by a forward slash ( / ), is the directory that contains all other directories
and their subdirectories as well as all files on the system.
6. The lib folder is a library files directory which contains all helpful library files used by the system. In simple terms,
these are helpful files which are used by an application or a command or a process for their proper execution. The
commands in /bin or /sbin dynamic library files are located just in this directory.
7. /media – Removable Media:The /media directory contains subdirectories where removable media devices inserted
into the computer are mounted. For example, when you insert a CD into your Linux system, a directory will
automatically be created inside the /media directory.
8. The /mnt directory and its subdirectories are intended for use as the temporary mount
points for mounting storage devices, such as CDROMs, floppy disks and USB (universal serial bus) key drives. /mnt is
a standard subdirectory of the root directory on Linux and other Unix-like operating systems, along with directories
such as /bin, /boot, /dev, /etc, /home, /proc, /root, /sbin, /usr and /var.
9. /opt is for “the installation of add-on application software packages”.
10. Proc file system (procfs) is virtual file system created on fly when system boots and is dissolved at time of system
shut down. It contains the useful information about the processes that are currently running, it is regarded as
control and information centre for kernel.
11. /sys is an interface to the kernel. Specifically, it provides a filesystem-like view of information and configuration
settings that the kernel provides, much like /proc . Writing to these files may or may not write to the actual device,
depending on the setting you're changing.
12. /sbin is a standard subdirectory of the root directory in Linux and other Unix-like operating systems that
contains executable (i.e., ready to run) programs. They are mostly administrative tools, that should be made
available only to the root (i.e., administrative) user.
13. The /tmp directory contains mostly files that are required temporarily, it is used by different programs to create
lock files and for temporary storage of data. Many of these files are important for currently running programs and
deleting them may result in a system crash.
14. The /usr/local hierarchy is for use by the system administrator when installing software locally. It needs to be safe
from being overwritten when the system software is updated. It may be used for programs and data that are
shareable amongst a group of hosts, but not found in /usr.
15. /var is a standard subdirectory of the root directory in Linux and other Unix-like operating systems that
contains files to which the system writes data during the course of its operation
Q35. In order to setup Raspberry pi what all components are needed? (hint: hardware /software/OS)
Ans: Here are the various components needed to setup Raspberry Pi:
• ARM CPU/GPU -- This is a Broadcom BCM2835 System on a Chip (SoC) that's made up of an ARM central processing
unit (CPU) and a Videocore 4 graphics processing unit (GPU). The CPU handles all the computations that make a
computer work (taking input, doing calculations and producing output), and the GPU handles graphics output.
• GPIO -- These are exposed general-purpose input/output connection points that will allow the real hardware
hobbyists the opportunity to tinker.
• RCA -- An RCA jack allows connection of analog TVs and other similar output devices.
• Audio out -- This is a standard 3.55-millimeter jack for connection of audio output devices such as headphones or
speakers. There is no audio in.
• LEDs -- Light-emitting diodes, for all of your indicator light needs.
• USB -- This is a common connection port for peripheral devices of all types (including your mouse and keyboard).
Model A has one, and Model B has two. You can use a USB hub to expand the number of ports or plug your mouse
into your keyboard if it has its own USB port.
• HDMI -- This connector allows you to hook up a high-definition television or other compatible device using an HDMI
cable.
• Power -- This is a 5v Micro USB power connector into which you can plug your compatible power supply.
• SD cardslot -- This is a full-sized SD card slot. An SD card with an operating system (OS) installed is required for
booting the device. They are available for purchase from the manufacturers, but you can also download an OS and
save it to the card yourself if you have a Linux machine and the wherewithal.
• Ethernet -- This connector allows for wired network access and is only available on the Model B.
• Embedded computers where a device has extremely limited resources. For example, a
microwave oven will have an extremely small computer to read its touchpad and door
sensor, provide output to a digital display and speaker, and to control the machinery for
cooking food. This computer will not be powerful enough to run a compiler, a file system, or
a development environment. Since debugging and testing may also require more resources
than are available on an embedded system, cross-compilation can be less involved and less
prone to errors than native compilation.
• Compiling for multiple machines. For example, a company may wish to support several
different versions of an operating system or to support several different operating systems.
By using a cross compiler, a single build environment can be set up to compile for each of
these targets.
38) Compare I2C and SPI.
I2C SPI
I2C can be multi-master and multi-slave, SPI can be multi-save but does not a multi-
which means there can be more than one master serial protocol, that means there can
master and slave attached to the I2C bus be only one master attached to SPI bus.
I2C has the feature of clock stretching, that Clock stretching is not the feature of SPI.
means if the slave cannot able to send fast
data as fast enough then it suppresses the
clock to stop the communication.
I2C is used only two wire for the SPI needs three or four wire for
communication, one wire is used for the data communication ((depends on requirement),
and the second wire is used for the clock. MOSI, MISO, SCL and Chip-select pin.
I2C draws more power than SPI. Draws less power as compared to I2C.
I2C is less susceptible to noise than SPI SPI is more susceptible to noise than I2C.
I2C work on wire and logic and it has a pull- There is no requirement of pull-up resistor in
up resistor. case of the SPI.
I2C ensures that data sent is received by the SPI does not verify that data is received
slave device. correctly or not.
I2C support the multi-master SPI does not support multi -master
communication. communication.
I2C is the address base bus protocol, you In case of the SPI, you have to select the
have to send the address of the slave for the slave using the slave select pin for the
communication. communication.
I2C has some extra overhead due to start and SPI does not have a start and stop bits.
stop bits.
I2C supports multiple devices on the same SPI requires additional signal (slave select
bus without any additional select lines (work lines) lines to manage multiple devices on
on the basis of device address). the same bus.
I2C is better for long distance. SPI is better for the short distance.
There are 26 pins grouped in two rows of 13, and these collectively are called the General
Purpose Input Output header or GPIO for short. These are a mix of four power pins, five ground
pins and 17 data pins.
The first thing you need to do is connect up the power and ground wires. As with most
electronics projects, everything that connects together will require a common ground.
The ground on the Raspberry Pi is physical pin 6. Starting at the top left with pin 3V3, counting
left to right so 5V is pin 2, GPIO 2 (labelled 2) is pin 3 and so on.
Reading pin numbers on Integrated Circuit (IC) chips is easily done by having the notch or dot to
the left then starting from bottom left gives us pin 1.
Pin 1 is at the bottom left
It is extremely important that you double-check every connection before adding the batteries.
Only when you are happy that everything is in place, connect the battery wires to the power
rails of the breadboard.
-Navigate to the "camera" option, and enable it. Select “Finish” and reboot your
Raspberry Pi.
-"raspistill" is a command line application that allows you to capture images with your
camera module.
-To capture an image in jpeg format, type "raspistill -o image.jpg" at the prompt, where
"image" is the name of your image.
---Working:
-Data is transmitted from the master to the slave by using the MOSI line (master
out, slave in).
- As each bit is being sent out by the master, the slave sends data bits on the MISO
line (master in, slave out).
- Bits are shifted out of the master and into the slave.
-Simultaneously, bits are shifted out of the slave and into the master.
-Both transfers occur to the beat of the system clock (CLK).
BUFFER:
Pure JavaScript is Unicode friendly, but it is not so for binary data. While dealing with TCP
streams or the file system, it's necessary to handle octet streams. Node provides Buffer class
which provides instances to store raw data similar to an array of integers but corresponds to a
raw memory allocation outside the V8 heap.Buffer class is a global class that can be accessed in
an application without importing the buffer module.
CALLBACKS:
Callback is an asynchronous equivalent for a function. A callback function is called at the
completion of a given task. Node makes heavy use of callbacks. All the APIs of Node are written
in such a way that they support callbacks.
STREAMS:
Streams are objects that let you read data from a source or write data to a destination in
continuous fashion. In Node.js, there are four types of streams −
• Readable − Stream which is used for read operation.
• Writable − Stream which is used for write operation.
• Duplex − Stream which can be used for both read and write operation.
• Transform − A type of duplex stream where the output is computed based on input.
GLOBAL:
Node.js global objects are global in nature and they are available in all modules. We do not need
to include these objects in our application, rather we can use them directly. These objects are
modules, functions, strings and object itself.
MODULES:
There are several utility modules available in Node.js module library. These modules are very
common and are frequently used while developing any Node based application.
2 Path Module: Provides utilities for handling and transforming file paths.
3 Net Module: Provides both servers and clients as streams. Acts as a network wrapper.
4 DNS Module: Provides functions to do actual DNS lookup as well as to use underlying operating
system name resolution functionalities.
5 Domain Module: Provides ways to handle multiple different I/O operations as a single group.
Features of Node.js
Following are some of the important features that make Node.js the first choice of software
architects.
• Asynchronous and Event Driven − All APIs of Node.js library are asynchronous, that is,
non-blocking. It essentially means a Node.js based server never waits for an API to return
data. The server moves to the next API after calling it and a notification mechanism of
Events of Node.js helps the server to get a response from the previous API call.
• Very Fast − Being built on Google Chrome's V8 JavaScript Engine, Node.js library is very
fast in code execution.
• Single Threaded but Highly Scalable − Node.js uses a single threaded model with event
looping. Event mechanism helps the server to respond in a non-blocking way and makes
the server highly scalable as opposed to traditional servers which create limited threads
to handle requests. Node.js uses a single threaded program and the same program can
provide service to a much larger number of requests than traditional servers like Apache
HTTP Server.
• No Buffering − Node.js applications never buffer any data. These applications simply
output the data in chunks.
• License − Node.js is released under the MIT license.
• Linux is an operating system used in almost all Raspberry Pi projects. This is because Linux is
loaded with rich features such as portability, modularity, scalability which allows users to
add or remove different functional blocks, scale the software according to the user’s needs.
• Linux provides an open source ecosystem to the Raspberry pi, allowing the Raspberry Pi
Foundation to contribute to various open source projects as well as releasing much of its
own software as open source. These projects can often reduce the cost of hardware by
taking advantage of multi-tasking feature of Linux.
• Linux is versatile, durable, secure. It allows unlimited modifications in the source code. i.e
we can re -use components multiple times. Software is of free cost as the utilities are
provided by Linux. There are many forums, blogs available for support. Most of the vendors
provide support to Linux based embedded products.
“Raspbian” is a version of Linux built specifically for the Raspberry Pi. It comes packed with all
the software you’ll need for every basic task with a computer. You’ll get an office suite, a web
browser, email program, and some tools to learn programming.
• GPIO is your standard pins that can be used to turn devices on and off. For example, a
LED.
• I2C (Inter-Integrated Circuit) pins allow you to connect and talk to hardware modules
that support this protocol (I2C Protocol). This protocol will typically take up two pins.
• SPI (Serial Peripheral Interface Bus) pins can be used to connect and talk to SPI devices.
Pretty much the same as I2C but makes use of a different protocol.
• The power pins pull power directly from the Raspberry Pi.
• GND are the pins you use to ground your devices. It doesn’t matter which pin you use as
they are all connected to the same line.
• START bit: It is a bit with which indicates that serial communication has started and it is
always low.
• Data bits packet: Data bits can be packets of 5 to 9 bits. Normally we use 8-bit data
packet, which is always sent after the START bit.
• STOP bit: This usually is one or two bits in length. It is sent after data bits packet to
indicate the end of frame. Stop bit is always logic high.
Asynchronous transmission allows data to be transmitted without the sender having to
send a clock signal to the receiver. Instead, the sender and receiver agree on timing
parameters in advance and special bits called 'start bits' are added to each word and used
to synchronize the sending and receiving units.
UART is commonly used on the Pi as a convenient way to control it over the GPIO, or access
the kernel boot messages from the serial console (enabled by default).It can also be used as
a way to interface an Arduino, etc with your Pi.
Function:
1. The transmitting UART receives data in parallel from the data bus, adds start bit, stop bit
to data frame.
2. The entire packet is sent serially from the transmitting UART to the receiving UART.
3. The receiving UART discards the start bit and stop bit from the data frame and converts
and transfers to data bus on receiving end.
• It is an open source OS which gives a great advantage to the programmers as they can
design their own custom operating systems.
• It gives you a lot of option of programs having some different features so you can choose
according to your need.
• A global development community look at different ways to enhance its security, hence it
is highly secured and robust so you don’t need an anti-virus to scan it regularly.
Companies like Google, Amazon and Facebook use Linux in order to protect their servers
as it is highly reliable and stable.
• Portability: Portability doesn’t mean it is smaller in file size or can be carried in pen drives
or memory cards. It means that it supports different types of hardware.
• Generally, for Raspberry Pi a lighter OS is required as hardware is limited and as you can
tailor Linux to your needs it is a perfect solution.
• Linux can be made free of code bloat which reduces the load on raspberry pi.
• Systems that run on Raspberry Pi must be compatible with its ARM processors, such as
Linux.
• Python language is more expressive means that it is more understandable and readable.
• Python is an interpreted language i.e. interpreter executes the code line by line at a time.
This makes debugging easy and thus suitable for beginners.
• Python can run equally on different platforms such as Windows, Linux, Unix and
Macintosh etc. So, we can say that Python is a portable language.
• Python language is freely available at official web address. The source-code is also
available. Therefore, it is open source.
• Python supports object-oriented language and concepts of classes and objects come into
existence.
• It implies that other languages such as C/C++ can be used to compile the code and thus it
can be used further in our python code.
• Python has a large and broad library and provides rich set of module and functions for
rapid application development.
Many of the features that are missing, such as Wi-Fi and audio in, can be added using the USB
port(s) or a USB hub as needed.
1. How do you play sound using raspberry pi? Provide python code.
Required Tools:
• Raspberry Pi Setup with monitor,USB mouse and keyboard.
• Solderless breadboard.
• Jumper wires for easy hookup.
• Register pack.
• Speaker.
Recommended Reading:-
• Amixer – We will be using the amixer Linux tool to adjust the volume on our Raspberry Pi
• Pygame – Pygame is a framework that is used for making simple games in Python.
Raspbian comes pre-loaded with Pygame, which means we can use it to play sounds.
Hardware Connections:-
• Connect GPIO12 (pin 32) to the 330Ω resistor, and the resistor to the LED
• Connect GPIO4 (pin 7) to the button
• Make the power (3.3 V) and ground (GND) connections as shown in the diagram.
Code:-
Import time
Import RPi.GPIO as GPIO
From pygame import mixer
# Pins definitions
Btn_pin = 4
# Set up pins
GPIO.setmode(GPIO.BCM)
GPIO.setup(btn_pin, GPIO.IN)
# Initialize pygame mixer
Mixer.init()
# Remember the current and previous button states
Current_state = True
Prev_state = True
# Load the sounds
Sound = mixer.Sound(‘applause-1.wav’)
# If button is pushed, light up LED
Try:
While True:
Current_state = GPIO.input(btn_pin)
If (current_state == False) and (prev_state == True):
Sound.play()
Prev_state = current_state
# When you press ctrl+c, this will be called
Finally:
GPIO.cleanup()
2. State and explain the concept of Node.js. Write features of the same.
3. Draw a connection diagram for connecting LED with PI. Write python code
Of raspberry pi. On the very first day he received following task which needs to
Be done in Linux. Help him by giving solutions.
I) Creation of user called “ramu”
$who -H -a
IV) Find out the location where he is working currently.
$pwd
V) To create a folder called project.
$mkdir project
Q. What do you mean by GPU? Explain the role of following with respect to GPU:
• Vertex Shader
• Geometry Shader
• Pixel Shader
Answer:
Graphics Processing Unit (GPU):
1. A programmable logic chip (processor) specialized for display functions. The GPU
renders images, animations and video for the computer’s screen.
2. GPUs are located on plug-in cards, in a chipset on the motherboard or in the same
chip as the CPU.
3. A GPU performs parallel operations. Although it is used for 2D data as well as for
zooming and panning the screen, a GPU is essential for smooth decoding and
rendering of 3D animations and video. The more sophisticated the GPU, the higher
the resolution and the faster and smoother the motion in games and movies.
4. GPUs on stand-alone cards include their own memory, while GPUs built into the
chipset or CPU chip share main memory with the CPU.
Vertex Shader:
1. The purpose is to transform each vertex’s 3D position in virtual space to the 2D
coordinate at which it appears on the screen.
2. The vertex shader is used to transform the attributes of vertices (points of a
triangle) such as color, texture, position and direction from the original color space
to the display space.
3. It allows the original objects to be distorted or reshaped in any manner.
Geometry Shader:
1. This type of shader can generate new graphics primitives, such as points, lines,
and triangles.
2. Geometry shader programs are executed after vertex shaders. They take as input
a whole primitive, possibly with adjacency information.
3. For example, when operating on triangles, the three vertices are the geometry
shader’s input. The shader can then emit zero or more primitives, which are
rasterized and their fragments ultimately passed to a pixel shader.
Pixel Shader:
1. Pixel shaders are specialized shaders that are executed for each pixel of a bitmap.
They are typically used to implement per-pixel effects.
2. Pixel shader effects in WPF are effects that one can apply to a UI element.
3. Pixel shader effects allow you to add adjustments such as glow, pixel brightness,
red eye removal, and shadows, to rendered objects.
Q. Currently world is moving towards M:M technology. Justify the impact of such technology
in human life by providing at least three examples.
Answer:
1. MANUFACTURING
2. HOME APPLIANCES
IoT already affects home appliance connectivity through platforms like Nest. However, M2M is
expected to take home-based IoT to the next level. Manufacturers like LG and Samsung are
already slowly unveiling smart home appliances to help ensure a higher quality of life for
occupants.
For example, an M2M-capable washing machine could send alerts to the owners’ smart devices
once it finishes washing or drying, and a smart refrigerator could automatically order groceries
from Amazon once its inventory is depleted. There are many more examples of home automation
that can potentially improve quality of life for residents, including systems that allow members
of the household to remotely control HVAC systems using their mobile devices. In situations
where a homeowner decides to leave work early, he or she could contact the home heating
system before leaving work to make sure the temperature at home will be comfortable upon
arrival.
3. HEALTHCARE DEVICE MANAGEMENT
One of the biggest opportunities for M2M technology is in the realm of health care. With M2M
technology, hospitals can automate processes to ensure the highest levels of treatment. Using
devices that can react faster than a human healthcare professional in an emergency situation
make this possible. For instance, when a patient’s vital signs drop below normal, an M2M-
connected life support device could automatically administer oxygen and additional care until a
healthcare professional arrives on the scene. M2M also allows patients to be monitored in their
own homes instead of in hospitals or care centers. For example, devices that track a frail or elderly
person’s normal movements can detect when he or she has had a fall and alert a healthcare
worker to the situation.
Q. Justify the role of RFID in the field of IoT which helps in tracking inventory and improving
customer satisfaction.
Answer:
1. Improved visibility and faster scanning: Since RFID tags do not require a “line-of-
sight” scan like barcodes, it is possible to read them at a distance for fast inventory
processing. They can also be read in any orientation and give you improved
visibility into your inventory with the potential for more frequent updates and
scanning locations.
2. Reduced labor costs: With labor costs accounting for as much as 50-80% of
distribution center costs, RFID offers potential benefits in this area. Inventory
check-in, counting, and shipment verification can be done very quickly and
automatically in a few scans without the need for multiple employees to process
them. These savings must be weighed against the cost of investing in an RFID
inventory solution, which we’ll discuss in more detail below.
3. Tracking of returnable assets: For those companies that utilize a returnable fleet
of assets such as containers and pallets, there is often a significant capital
investment to protect. Utilizing RFID allows you to track these assets through the
entire supply chain loop and provide increased visibility on inventory locations.
This has the added benefit of improving returns and reducing theft or neglect.
Q. Draw block diagram for Information-Driven Value Chain for IoT and explain.
Answer:
Q. What are the challenges for IOT implementation now and in future ?
1. Compatibility and Interoperability of Different IoT systems
• As per the market analysts at McKinsey, 40% to 60% of the total values lies on our ability
to achieve interoperability between different IoT systems. With numerous vendors,
OEMs, and service providers, it becomes really difficult to maintain interoperability
between different IoT systems.
• Sensors and Networking are the integral components of IoT. But not every machine is
equipped with advanced sensors and networking capabilities to effectively
communicate and share data. Besides, sensors of different power consumption
capabilities and security standards inbuilt in legacy machines may not be capable to
provide the same results.
• A quick workaround could be to add external sensors, but this is also challenging
because determining which function and which part will communicate and share data
with the network is complex.
2. Identification and Authentication of Technologies
• According to a report, there are around 20 billion connected devices at present, and to
connect all the devices involves a lot of security risks and not just complexity. Bringing
along a large number of connected devices on one platform needs formalization and
system architecture that can identify and authenticate those devices.
3. Integration of IoT Products with IoT Platforms
• It is the part of networking challenges, as the Internet is still not available everywhere at
the same speed. A global mobile satellite company Inmarsat revealed that 24% finds
connectivity issue as the one of the biggest challenges in IoT deployment.
• Specifically, Logistics and Oil & Gas companies engaged in remote operations require
robust communication networks to collect data in tough conditions and transmit back to
the centre for analysis.
• The quality of signals collected by the sensors and to transmit over to the Networks
largely depend upon the routers, LAN, MAN, and WAN.
• These networks have to be well-connected through different technologies to facilitate
quick and quality communication. But the number of connected devices is growing at a
much higher rate than the network coverage, which creates monitoring and tracking
problems.
5. Delivering Value
• According to Forbes Insights Survey, 29% executives feel major challenge in building IoT
capabilities is the quality of IoT technology.
• This data reveals the struggle of IoT application development companies in bringing the
value for their consumers. So, before plunging into the development of IoT applications,
an enterprise must clearly define what value they are going to deliver through what
capabilities. And how their solution will enhance the efficiency and productivity, while
also generating customer-satisfaction.
• As the IoT is all about “connected things”, the IoT projects also require a high level of
assistance throughout the way. Around 50% of companies with IoT initiatives are
strongly involved with IT service providers or consulting firms, relying on them to help
across solution delivery and provide business advice.
• Connect with an IoT Development Company that thinks engineering beyond design and
work on integrating all the components of IoT in a manner that is focused on
connectivity, gaining insight, and maintaining accuracy at all the stages.
• Nevertheless, keep a scope for enhancements of product capabilities to successfully
improve the functional efficiency of the product or service based on the latest
technology.
6. Data Capturing Capabilities
• The purpose of capturing data is to transform the information collected from various
sources in a standard format that can be analyzed and automated.
• As IoT is mainly about dependence on sensors for signals and networks for the
distribution, chances are that due to certain anomalies in runtime, such as a shutdown
of power, incorrect data may get recorded.
7. Intelligent Analytics
• At this stage, we are at the very purpose of IoT i.e. translating data into meaningful
information. A flaw in data or data model could lead to false positives and false
negatives. We have to understand the data in itself is not an insight, rather right
questions have to be asked from the precise data to gain the insight.
• Legacy systems such as traditional analytics software where not all data can be loaded
at a time can limit the capabilities to manage real-time data. Here’s the list of challenges
that deter intelligent analytics:
➢ Unpredictable action of the machine during an incident
➢ Traditional analytics software
➢ Slow adoption of the latest technology due to the high cost
➢ Lack of skilled professionals in data mining, algorithms, machine learning, and
complex event processing
8. Data Security and Privacy Issues
• Even top companies like Apple, known for big security claims, and visionaries like Elon
Musk have not been spared by hackers. Recent cases of ransomware attacks have also
challenged the confidence of corporate.
• A latest research claims that by 2020, 25% of cyber attacks will target IoT devices.
➢ Malware infiltration: 24%
➢ Phishing attacks: 24%
➢ Social engineering attacks: 18%
➢ Device misconfiguration issues: 11%
➢ Privilege escalation: 9%
➢ Credential theft:6%
• When it comes to cyber security, lapses could be from both company and consumer
side, so it is essential for each party to take necessary measures to improve security.
• A study revealed that 54% IoT device owners do not use any third party security tool
and 35% out of these do not even change default password on their devices.
• Here, it should be a collaborative effort between companies and customers to plan and
implement collaborative data security policies for successful IoT implementation.
9. Consumer Awareness
• Many people are not aware of IoT, but they understand the dependence on Smart Apps
like news apps, stocks applications, entertainment applications. It is not actually
important for the consumers to how things work technically, but lack of basic awareness
can create a fear of security and cost, which could lead to the slow adoption of
technology.
• According to a survey of 3,000 U.S. and Canadian consumers conducted by Cisco, 53%
consumers would not prefer to get their data collected, irrespective of the device. This
shows the fear among users to share their data, which can act as a deterrent to the IoT
Q. Explain Functional model and need for various functional groups with respect to IOT?
The IoT Functional Model aims at describing mainly the Functional Groups (FG) and their
interaction with the ARM, while the Functional View of a Reference Architecture describes the
functional components of an FG, interfaces, and interactions between the components. The
Functional View is typically derived from the Functional Model in conjunction with high level
requirements.
1. Device functional group
• The Device FG contains all the possible functionality hosted by the physical Devices that
are used for instrumenting the Physical Entities. This Device functionality includes
sensing, actuation, processing, storage, and identification components, the
sophistication of which depends on the Device capabilities.
2. Communication functional group
• The Communication FG abstracts all the possible communication mechanisms used by
the relevant Devices in an actual system in order to transfer information to the digital
world components or other Devices.
• Examples of such functions include wired bus or wireless mesh technologies through
which sensor Devices are connected to Internet Gateway Devices. Communication
technologies used between Applications and other functions such as functions from the
IoT Service FG are out of scope because they are the typical Internet technologies.
3. IoT Service functional group
• The IoT Service FG corresponds mainly to the Service class from the IoT Domain Model,
and contains single IoT Services exposed by Resources hosted on Devices or in the
Network (e.g. processing or storage Resources). Support functions such as directory
services, which allow discovery of Services and resolution to Resources, are also part of
this FG.
4. Virtual Entity functional group
• The Virtual Entity FG corresponds to the Virtual Entity class in the IoT Domain Model,
and contains the necessary functionality to manage associations between Virtual
Entities with themselves as well as associations between Virtual Entities and related IoT
Services, i.e. the Association objects for the IoT Information Model.
• Associations between Virtual Entities can be static or dynamic depending on the
mobility of the Physical Entities related to the corresponding Virtual Entities. An
example of a static association between Virtual Entities is the hierarchical inclusion
relationship of a building, floor, room/corridor/open space, i.e. a building contains
multiple floors that contain rooms, corridors, and open spaces. An example of a dynamic
association between Virtual Entities is a car moving from one block of a city to another
(the car is one Virtual Entity while the city block is another).
• A major difference between IoT Services and Virtual Entity Services is the semantics of
the requests and responses to/from these services. Referring back to the parking lot
example, the Parking Sensor Service provides as a response only a number “0” or “1”
given the identifier of a Loop Sensor (e.g. #11). The Virtual Entity Parking Spot #01
responds to a request about its occupancy status as “free.” The IoT Service provides
data or information associated to specific Devices or Resources, including limited
semantic information (e.g. Parking sensor #11, value5“0”, units 5 none); the Virtual IoT
Service provides information with richer semantics (“Parking spot #01 is free”), and is
closer to being human-readable and understandable.
5. IoT Service Organization functional group
• The purpose of the IoT Service Organization FG is to host all functional components that
support the composition and orchestration of IoT and Virtual Entity services. Moreover,
this FG acts as a service hub between several other functional groups such as the IoT
Process Management FG when, for example, service requests from Applications or the
IoT Process Management are directed to the Resources implementing the necessary
Services.
• Therefore, the Service Organization FG supports the association of Virtual Entities with
the related IoT Services, and contains functions for discovery, composition, and
choreography of services. Simple IoT or Virtual Entity Services can be composed to
create more complex services, e.g. a control loop with one Sensor Service and one
Actuator service with the objective to control the temperature in a building.
Choreography is the brokerage of Services so that Services can subscribe to other
services in a system.
Inputs: Inputs are the base raw ingredients that are turned into a product.
Examples could be cocoa beans for the manufacture of chocolate or
data from an M2M device that will be turned into a piece of information.
Production/Manufacture: Production/Manufacture refers to the process
that the raw inputs are put through to become part of a value chain.
For example, cocoa beans may be dried and separated before being transported
to overseas markets. Data from an M2M solution, meanwhile,
needs to be verified and tagged for provenance.
Processing: Processing refers to the process whereby a product is
prepared for sale. For example, cocoa beans may now be made into cocoa
powder, ready for use in chocolate bars. For an M2M solution, this refers
to the aggregation of multiple data sources to create an information
component something that is ready to be combined with other data sets
to make it useful for corporate decision-making.
Packaging: Packaging refers to the process whereby a product can be
branded as would be recognizable to end-user consumers. For example, a
chocolate bar would now be ready to eat and have a red wrapper with
the words “KitKatt” on it. For M2M solutions, the data will have to be
combined with other information from internal corporate databases, for
example, to see whether the data received requires any action. This data
would be recognizable to the end-users that need to use the information,
either in the form of visualizations or an Excel spreadsheet.
Distribution/Marketing: This process refers to the channels to market
for products. For example, a chocolate bar may be sold at a supermarket, a
kiosk, or even online. An M2M solution, however, will have produced an
Information Product that can be used to create new knowledge within a
corporate environment examples include more detailed scheduling of
maintenance based on real-world information or improved product design
due to feedback from the M2M solution.
As mentioned previously, M2M value chains are internal to one company
and cover one solution. IoT Value Chains, meanwhile, are about the
use and reuse of data across value chains and across solutions.
What do you mean by M2M communication? Provide any 2 applications for the same.
M2M communication
M2M refers to those solutions that allow communication between devices of the same type
and a specific application, all via wired or wireless communication networks.
M2M solutions allow end-users to capture data about events from assets, such as temperature
or inventory levels.
Typically, M2M is deployed to achieve productivity gains, reduce costs,and increase safety or
security
Applications
Telematics for cars and vehicles.
Typical applications include navigation, remote vehicle diagnostics,pay-as-you-drive insurance
schemes, road charging, and stolen vehicle recovery
Metering applications
include primarily remote meter management and data collection for energy consumption in the
electricity utility sector, but also for gas and water consumption.
Remote monitoring
is more generalized monitoring of assets, and includes remote patient monitoring as one prime
example.
Fleet management
includes a number of different applications, like data logging, goods and vehicle positioning,
and security of valuable or hazardous goods.
Security applications
are mainly those related to home alarms and small business surveillance solutions
Automated Teller Machines (ATM) and Point of Sales (POS) terminals
ATM and POS devices are connected to a centralized secure environment.
Draw block diagram for Information-Driven Value Chain for IoT and explain the same.
❖ Inputs: The first thing that is apparent for an IoT value chain is that there are significantly
more inputs than for an M2M solution
• Devices/Sensors: the manner in which the data from these devices and sensors is used
provides a different and much broader marketplace than M2M does
• Open Data: Open data is an increasingly important input to Information Value Chains. A
broad definition of open data defines it as: “A piece of data is open if anyone is free to use,
reuse, and redistribute it subject only, at most, to the requirement to attribute and/or
share-alike” Open data requires a license stating that it is open data
.• OSS/BSS: The Operational Support Systems and Business Support Systems of mobile
operator networks are being used increasingly in tightly closed information marketplaces
that allow operators to deliver services to enterprises
• Corporate Databases: Companies of a certain size generally have multiple corporate
databases covering various functions, including supply chain management, payroll,
accounting, etc.
❖ Production/Manufacture: In the production and manufacturing processes for data in an IoT
solution, the raw inputs described above will undergo initial development into information
components and products.Irrespective of input type described above, this process will need
to include tagging and linking of relevant data items in order to provide provenance and
traceability across the information value chain. Some examples,are as follows
• Asset Information:this relates to whatever the sensor/device has been developed to
monitor.
• Open Data Sets: Open data sets may include maps, rail timetables, or demographics about
a certain area in a country or city.
• Network Information: Network information relates to information such as GPS data,
services accessed via the mobile network, etc.
• Corporate Information: Corporate information may be, for example, the current state of
demand for a particular product in the supply chain at a particular moment in time.
❖ Processing:the data from the various inputs from the production and manufacture stage are
combined together to create information. This process involves the extensive use of data
analytics for M2M and IoT solutions
❖ Packaging:packaging section of the information value chain creates information
components. These components could be produced as charts or other traditional methods
of communicating information to end-users
❖ Distribution/Marketing: The final stage of the Information Value Chain is the creation of an
Information Product. A broad variety of such products may exist, but they fall into two main
categories:
Information products for improving internal decision-making
Information products for resale to other economic actors
In what capacity modern Retailers can leverage IoT for Supply Chain Management?
to leverage the following features of IoT in supply chain management :
Product tracking: Real-time monitoring and accurate tracking of the supply throughout the
product life cycle using location based services (Geofencing, telematics) is bound to help you
ensure timely and quality delivery of services and improve customer satisfaction.
Improve Transactional Efficiency: Most retailers struggle with consumers complaining about
delayed product delivery, damaged or misplaced order.
These instances could be prevented using the power of cognitive computing to analyze data
and offer deep insights.
Efficient Inventory management: With the help of IoT, the supply chain stake holders can build
an efficient inventory system. In such a system, the information related to finished products,
volume and time of orders, raw material availability, inventory and manufacturing capacity – all
are captured using intelligent IoT devices.
Explain an IoT architecture showing Functional layers and capabilities of an IoT solution with
a block diagram
• Asset Layer:Assets are instrumented with embedded technologies that bridge the digital
realm with the physical world, and that provide the capabilities to monitor and control
the assets as well as providing identities to the assets.
• Resource Layer: provides the main functional capabilities of sensing,actuation, and
embedded identities.This is also where gateways of different types are placed that can
provide aggregation or other capabilities that are closely related to these basic
resources
• Communication Layer:provide the means for connectivity between the resources on one
end and the different computing infrastructures that host and execute service support
logic and application logic on the other end. Different types of networks realize the
connectivity,and it is customary to differentiate between the notion of a Local Area
Network (LAN) and a Wide Area Network (WAN)
• Service Support Layer:IoT applications benefit from simplification by relying on support
services that perform common and routine tasks. These support services are provided
by the Service Support Layer and are typically executing in data centers or server farms
inside organizations or in a cloud environment. These support services can provide
uniform handling of the underlying devices and networks, thus hiding complexities in
the communications and resource layers.
• Data and Information Layer: provides a more abstract set of functions as its main
purposes are to capture knowledge and provide advanced control logic support. Key
concepts here include data and information models and knowledgerepresentation in
general, and the focus is on the organization of information.
• Application Layer:provides the specific IoT applications.There is an open-ended array of
different applications, and typical examples include smart metering in the Smart Grid,
vehicle tracking, building automation, or participatory sensing (PS).
• Business Layer:focuses on supporting the core business or operations of any enterprise,
organization, or individual that is interested in IoT applications. This is where any
integration of the IoT applications into business processes and enterprise systems takes
place
In addition to the functional layers, three functional groups cross the different layers,
• Management:deals with management of various parts of the system solution related to
its operation, maintenance, administration, and provisioning. This includes management
of devices, communications networks, and the general Information Technology (IT)
infrastructure as well as configuration and provisioning data, performance of services
delivered, etc.
• Security: is about protection of the system, its information and services,from external
threats or any other harm.Trust and identity management, and authentication and
authorization, are key capabilities
• Data and Services:Data and Service processing can, from a topological perspective, be
done in a very distributed fashion and at different levels of complexity
Q) WHAT ARE THE CHALLENGES FOR IOT IMPLEMENTATIONS NOW AND IN THE FUTURE?
A.
CHALLENGES FOR IOT IMPLEMENTATIONS NOW:
Moving from one end of the maturity curve to the other may require a substantial investment.
Companies shouldn’t try to make the leap from beginning to end in one step. A grand vision
may be persuasive, but its cost may prevent management from giving the go-ahead.
To manage risk and mitigate cost, several successive “bite-sized” IoT projects implementations
with concrete milestones and reasonable costs are recommended. Start small with pilot
technologies and then invest in foundational pieces rolled-out in phases. To control costs
further, make use of public infrastructure and software-as-a-service in lieu of more expensive
private or on-premise installations.
2. Security
Posting data to—or transferring data via—the internet seems to be the source of many
information technology (IT) department nightmares, and rightfully so. Hacking is an
international industry producing frequent announces of security breaches. Putting data
online—particularly data related to critical equipment—may seem dangerous. Many IoT
platforms consider security a core element and work to ensure that any potential leaks are
stopped before hackers find them.
3. Technology infrastructure
Often, clients have instruments tied into SCADA that generate the data needed to provide
analytics and insights. Or, even without power monitoring equipment, SCADA’s network
potentially could provide the communication infrastructure needed to connect new
instrumentation. Yet, almost universally when seeking to tie into SCADA, IT replies, “Our
network is super secure and cannot be used to send information to an IoT platform”—and
rightfully so.
As discussed under the security of in-flight data, the most secure networks rely on one-way,
outbound-only communication. SCADA, being a supervisory control network, necessarily must
handle control signals going to the equipment.
4. Communications infrastructure
Using a cellular gateway to connect IoT instruments sounds great, but users don’t get phone
reception at some remote sites. Building an infrastructure would be too costly. Although LTE-M
and LTE-NB use existing cellular towers, these low-powered, wide-area networks provide much
broader coverage. Even if the user doesn’t get a strong-enough signal for voice calls or 4G-LTE
data, he or she may still be able to access LTE-M.
6. Procuring IoT
Implementing IoT often involves procuring devices and services that don’t have IoT in their
name, such as instrumentation, communication networks, storage, and data management
consultants. The complexity of procuring these services and the lack of the IoT label can make it
difficult for stakeholders to see how the multitude of pieces fit together.
The right plan can help streamline this complexity and help communicate each piece’s
importance to the overall project and make it work.
Security
IoT has already turned into a serious security concern that has drawn the attention of
prominent tech firms and government agencies across the world. The hacking of baby
monitors, smart fridges, thermostats, drug infusion pumps, cameras and even assault rifles are
signifying a security nightmare being caused by the future of IoT. So many new nodes being
added to networks and the internet will provide malicious actors with innumerable attack
vectors and possibilities to carry out their evil deeds, especially since a considerable number of
them suffer from security holes.
Connectivity
Connecting so many devices will be one of the biggest challenges of the future of IoT, and it will
defy the very structure of current communication models and the underlying technologies. At
present, we rely on the centralized, server/client paradigm to authenticate, authorize and
connect different nodes in a network.
Compatibility and Longevity
IoT is growing in many different directions, with many different technologies competing to
become the standard. This will cause difficulties and require the deployment of extra hardware
and software when connecting devices.
Other compatibility issues stem from non-unified cloud services, lack of standardized M2M
protocols and diversities in firmware and operating systems among IoT devices.
Standards
Technology standards which include network protocols, communication protocols, and data-
aggregation standards, are the sum of all activities of handling, processing and storing the data
collected from the sensors. This aggregation increases the value of data by increasing, the scale,
scope, and frequency of data available for analysis.
The last stage in IoT implementation is extracting insights from data for analysis, where analysis
is driven by cognitive technologies and the accompanying models that facilitate the use of
cognitive technologies.
Q) WHAT IS WIRELESS HOME AUTOMATION? DRAW THE BLOCK DIAGRAM FOR THE SAME
AND EXPLAIN THE ROLE OF IOT IN IN WIRELESS HOME AUTOMATION.
A.
WIRELESS HOME AUTOMATION:
“Home automation” refers to the automatic and electronic control of household features,
activity, and appliances. In simple terms, it means you can easily control the utilities and
features of your home via the Internet to make life more convenient and secure, and even
spend less on household bills.
Home automation systems offer a variety of services and functions. Some of the more
common features available through these platforms include:
BLOCK DIAGRAM:
ROLE OF IOT:
The IoT based Home Automation will enable the user to use a Home Automation System based
on Internet of Things (IoT). The modern homes are automated through the internet and the
home appliances are controlled. The user commands over the internet will be obtained by the
Wi-Fi modems. The Microcontroller has an interface with this modem. The system status is
displayed through the LCD display, along with the system data. This is a typical IoT based Home
Automation system, for controlling all your home appliances. The smart home market is taking
off as IoT device prices come down and the general public comes to understand the benefits of
these products. And from smart homes, the next logical step is smart cities, which would take
the IoT to the next level. And yet, smart homes are just one small part of our daily lives that the
Internet of Things will transform in the coming years.
Q) EXPLAIN GVC WITH PROPER DIAGRAM.
A.
Global value chains
A value chain describes the full range of activities that firms and workers perform to bring a
product from its conception to end use and beyond, including design, production, marketing,
distribution, and support to the final consumer
Analyzing an industry from a global value chain (GVC) perspective permits understanding of the
context of globalization on the activities contained within them by “focusing on the sequences
of tangible and intangible value-adding activities, from conception and production to end use.
GVC analysis therefore provides a holistic view of global industries both from the top down and
from the bottom up”.
EXAMPLES
Organs-on-Chips
Yes, you have read this correctly and it’s exactly what your first thought implied. Organs-on-
Chips is truly a groundbreaking invention of creating human organ system on miniature micro-
engendered chips. These chips help to better understand the functions of our organs, in
addition to supporting research and development by reducing cost, data reporting, and
increasing medicine efficiency. It is an advanced personalized treatment with the main role of
accelerating new drug developments.
Wearables
What is the deal with wearables one might ask? Well, these devices in their current form are
only the beginning of something spectacular. So far, we have had wristbands that measure a
user’s pulse, daily routine, blood pressure, temperature, and oxygen levels. All these pieces of
data are sent to the user’s smartphone. We can only imagine what comes next because this
type of health support can eliminate human error in versatile healthcare regions.
Q.State the role of following with respect to IGVC :-
Data Factories
Data factories are those entities that produce data in digital forms for use in other parts of the I-GVC.
Many of these companies existed in the pre digital era; for example, Ordnance Survey (OS) in the UK
has always col lected map information from the field, and collated and produced maps for purchase.
Previously, such data factories would create paper-based pro ducts and sell them to end-users via
retailers. With the move to the digital era, however, these companies now also provide this data via
digital means; for example, OS now makes maps and associated data available in digital format.
Essentially, its business model has not changed significantly it still produces maps but its means of
delivery of products has changed. Moreover, its products can now be combined, reused, and bundled
together with other products by actors in the commodity chain as the foundation of other services. For
example, maps from OS can be combined with other data from travel services such as TFL to provide
detailed travel applications on mobile devices.
Intermediaries
In the emerging industrial structure of the I-GVC, there is a need for intermediaries that handle several
aspects of the production of information products. As mentioned above, there are many privacy and
regional issues associated with the collection of personal information. In Europe, the man ner in which
Facebook collects and uses the data of the individuals that participate in its service may actually be in
contravention of European pri vacy law. The development of databases such as the ones created by
Google, Facebook, and Twitter may therefore require the creation of enti ties that are able to
“anonymise” data sufficiently to protect individuals’ privacy rights in relevant regional settings. These
corporations will provide protection for the consumer that their data is being used in an appropriate
manner, i.e. the manner in which the consumer has approved its usage.
Resellers
Resellers are those entities that combine inputs from several different intermediaries, combine it
together, analyze, and sell it to either end-users or to corporate entities. These resellers are currently
rather limited in terms of the data that they are able to easily access via the converged
communi cations platform, but they are indicative of the types of corporate entities that are forming
within this space. One example is BlueKai, which tracks the online shopping behavior of Internet users
and mines the data gathered for “purchasing intent” in order to allow advertisers to target buyers more
accurately. BlueKai combines data from several sources, including Amazon, Ebay, and Alibaba
To be more specific, taking advantage of cutting-edge technologies like Machine Learning, Machine-to-
Machine (M2M) Communication and Artificial Intelligence (AI), IoT aims at extending connectivity
beyond standard Internet supported physical devices (smartphones, tablets, desktops, and laptops) to a
wide spectrum of non-internet-enabled physical devices and everyday objects, such as coffee makers,
washing machines, door locks, etc., so you can remotely monitor and control them with the help of a
mobile or tablet device
IOT Example :
Nest Learning Thermostat self-learning Wi-Fi-enabled smart thermostat that leverages Machine
Learning to automatically optimize the heating and cooling of your home to conserve energy. You can
also manually control your home’s temperature with just a few taps on your smartphone or tablet
Amazon Go
Amazon Go is one of its kind retail store that facilitates customers shopping with no checkout required.
All you need to sign in the Amazon Go app to enter the store, then shop as you normally would and
leave the store. No lines, no checkout, just walk out!
2. Gateway - IOT gateway manages the bidirectional data traffic between different networks and
protocols. IOT gateway offers extreme level of security for the network and transmitted data with higher
order encryption techniques.
3. Cloud - Basically cloud is an advanced high performance network of servers optimized to perform high
speed data. Cloud system integrates billion of devices, sensors, gateway, protocols, data storage and
provide predictive analytics.
4. Analytics - Analytics is the process of converting analog data from billions of smart devices and
sensors into useful insights which can be interpreted and used for detailed analysis.
5. User interface - User interfaces are the visible, tangible part of the loT system which can be
accessible by users.
So: When a device (a client) wants to send data to the broker, we call this operation a “publish”.
When a device (a client) wants to receive data from the broker, we call this operation a “subscribe”.
MQTT Components:
That takes us to the MQTT components, which are 5 as follows:
Broker, which is the server that handles the data transmission between the clients.
A topic, which is the place a device want to put or retrieve a message to/from.
The message, which is the data that a device receives “when subscribing” from a topic or send “when
publishing” to a topic.
Publish, is the process a device does to send its message to the broker.
Advantages:
1. Data:
The more the information, the easier it is to make the right decision. Knowing what to get from
the grocery while you are out, without having to check on your own, not only saves time but is
convenient as well.
2. Tracking:
The computers keep a track both on the quality and the viability of things at home. Knowing the
expiration date of products before one consumes them improves safety and quality of life. Also,
you will never run out of anything when you need it at the last moment.
3.
Time:
The amount of time saved in monitoring and the number of trips done otherwise would be
tremendous.
4. Money:
The financial aspect is the best advantage. This technology could replace humans who are in
charge of monitoring and maintaining supplies.
Disadvantages:
1. Compatibility:
As of now, there is no standard for tagging and monitoring with sensors. A uniform concept like
the USB or Bluetooth is required which should not be that difficult to do.
2. Complexity:
There are several opportunities for failure with complex systems. For example, both you and
your spouse may receive messages that the milk is over and both of you may end up buying the
same. That leaves you with double the quantity required. Or there is a software bug causing the
printer to order ink multiple times when it requires a single cartridge.
3. Privacy/Security:
Privacy is a big issue with IoT. All the data must be encrypted so that data about your financial
status or how much milk you consume isn’t common knowledge at the work place or with your
friends.
4. Safety:
There is a chance that the software can be hacked and your personal information misused. The
possibilities are endless. Your prescription being changed or your account details being hacked
could put you at risk. Hence, all the safety risks become the consumer’s responsibility.
Q) Discuss the working of HTTP protocol.
Ans)
The Hypertext Transfer Protocol is an application protocol for distributed, collaborative,
hypermedia information systems that allows users to communicate data on the World Wide
Web.
HTTP was invented alongside HTML to create the first interactive, text-based web browser: the
original World Wide Web. Today, the protocol remains one of the primary means of using the
Internet.
As a request-response protocol, HTTP gives users a way to interact with web resources such as
HTML files by transmitting hypertext messages between clients and servers. HTTP clients
generally use Transmission Control Protocol (TCP) connections to communicate with servers.
UPnP allows direct networking between home appliances like printers, personal computers,
mobile devices, and many more. It uses established standard industry protocols like TCP/IP,
XML, Simple Object Access Protocol (SOAP), UDP, DHCP (Dynamic Host Configuration Protocol),
DNS (Domain Name System). UPnP technology was initially promoted by UPnP forum which
was an initiative by various vendors.
Advantages of UPnP:
1.It can be used for NAT traversal or Firewall punching.
2.It allows real Plug and Play compatibility.
3.It is backed by various big vendors and companies like Microsoft and Intel, which makes it an
industry standard.
4.It is an ideal architecture for home devices and networks.
Q) Explain in breif how IoT can be helpful in Education and Government sector?
Ans)
Education sector:-
a. Poster boards into IoT enabled boards
It is indeed very difficult to compare the older era presentation boards with present-day
multimedia poster boards. Internet gear like Glogster has changed this ease and permits us to
create digital posters without problems combining with the photos, audio, video, text, and
hyperlinks.
b. Interactive gaining of knowledge
Getting to know these days is not restrained to the mixture of texts and pictures but beyond
that. Most of the textbooks are paired with net-primarily based websites that consist of extra
substances, films, exams, animations and different substances to support the mastering.
c. Learning at any time and anywhere
IoT plays an important position in constructing a network through the use of special internet-
based systems. Advanced technology enables the academics to display the development of the
scholars. IoT allows students and teachers to communicate via extraordinary method, checking
messages and upcoming events at the same time when away from the classroom or even
replying to posts. It is by far a very effective app that provides safe network and complete
privacy. It also allows a user to save your specific thoughts and class undertaking without
worrying and assure you full confidentiality.
d. Superior safety features
This Application of IoT in Education is important as enforcing the superior technology answers
inside the school rooms and training area may be very useful. It includes emergency indicators,
audio enhancement, wi-fi clocks and hearing impaired notifications that offer the scholars and
body of workers with a feeling of security.
e. Bye Bye to Chalkboards
Students in recent times make use of a very powerful platform which includes smart boards. It
facilitates the lecturers to provide an explanation for the lectures more without problems with
the assist of online displays and films.
Government sector:-
1. Law enforcement
The enormity of the general population and complexity of the inhabited areas like cities and
towns make it hard for government agencies to provide surveillance and protection with the
relatively small number of personnel they have. Even the presence of a myriad of cameras is
pointless if there aren't enough eyes to constantly analyze the footage recorded by them. IoT
can help government law enforcement agencies in monitoring public safety through its smart
network of sensing and scanning devices. Since it is impossible for law enforcement personnel
to be present at all high-risk locations simultaneously, IoT enabled surveillance systems can
provide continuous, real-time intelligence. These systems, powered by machine and deep
learning algorithms, can not only gather video and audio footage but also analyze it for threats.
They can notify concerned personnel upon discovery of potentially harmful situations, which
can be looked into and prevented in time.
IoT-enabled license plate scanning systems can help track down vehicles of criminals and traffic
offenders. An intelligent, well connected IoT network can not only enable quick response to
threats but can also minimize crime rates through preventive action.
2. Infrastructure management
Governments spend vast amounts of tax money on building and maintaining infrastructural
facilities for the public. This includes the building of roads and bridges, power grids, water
supply lines, gas supply, rail lines, airports, etc. which cost a lot more to maintain than to build.
Any major damages or defects any of these systems can cause disruptions in civilian activities,
which can have far-reaching ramifications. To ensure the effective functioning of these systems,
governments can use IoT enabled maintenance and monitoring. For instance, IoT sensors can
constantly analyze railway lines and engines for any defects or really sounds of failure and
notify the authorities and the concerned staff for prompt repairs. They can also constantly
monitor and regulate power supply through nation-wide power grids, and help in identifying
impending break-downs.
In addition to helping governments manage infrastructure, IoT can help governments to make
decisions regarding new infrastructure projects, such as laying new roads and railway lines.
3. Disaster management
Governments have the obligation of preventing man-made disasters and protecting the public
from natural ones. IoT and big data enabled disaster prevention and management systems can
help governments preserve human life during times of unforeseen disasters. In areas where
forest fires are common, IoT sensors can be set up in forests to detect fires in their early stages
to curb their spreading and the consequent devastating effects. IoT can also help in areas that
are prone to flooding, by monitoring the water bodies for alerting authorities when the water
levels rise at alarming rates.
IoT can also prevent man-made disasters by providing emergency response teams with
continuous monitoring capability, which enables them to be prepared for contingencies.
Integrating IoT in government operations will be a long and effortful endeavor. However, the
potential benefits far outweigh the initial friction. With greater penetration and propagation of
IoT, governments can take a fully supervisory role, and ensure public welfare without
obtrusion.
Q) Explain the working of protocol which is responsible for publishing and subscribing.
Ans)
MQTT (MQ Telemetry Transport) is a lightweight messaging protocol that provides resource-
constrained network clients with a simple way to distribute telemetry information. The
protocol, which uses a publish/subscribe communication pattern, is used for machine-to-
machine (M2M) communication and plays an important role in the internet of things (IoT).
The MQTT protocol is a good choice for wireless networks that experience varying levels of
latency due to occasional bandwidth constraints or unreliable connections.
The MQTT protocol surrounds two subjects: a client and a broker. An MQTT broker is a server,
while the clients are the connected devices. When a device -- or client -- wants to send data to a
server -- or broker-- it is called a publish. When the operation is reversed, it is called a
subscribe.
If the connection from a subscribing client to a broker is broken, then the broker will buffer
messages and push them out to the subscriber when it is back online. If the connection from
the publishing client to the broker is disconnected without notice, then the broker can close the
connection and send subscribers a cached message with instructions from the publisher.
While the TT in MQTT stands for Telemetry Transport, the MQ is in reference to a product
called IBM MQ.
Clayster - Internet Clayster Include XMPP is the core into which we normalize data from
different sources and make it available in unified fabric. The Include platform abstracts and
transforms any data source to coexist in a data normalized infrastructure.
13.i>thinger.io –
Thinger.io is a platform that allows connecting things to the Internet.It is Open Source, so you
can take the code an build your own cloud if you want. It provides thing API discovery right out
of the box, so you can code your things and interact easily from the web.
· imple but Powerful: Just a couple code lines to connect a device and start retrieving data or
controlling it's functionalities with our web based Console, able to connect and manage
thousands of devices in a simple way.
· Hardware agnostic: Any device from any manufacturer can be easily integrated with
Thinger.io's infrastructure.
· Open-Source: most of the platform modules, libraries and APP source code are available in
our github repository to be downloaded and modified with MIT license.
First fullstack programming solution: combines in one tool, the ability to write high-level code
(GUI apps, scripting and DSL) and fast low-level code (writing device drivers, operating systems,
native interfacing, etc). Moreover, Red is also a both-sided technology (client & server).
Cross-platform native code compiler: from any platform the toolchain runs on, you can compile
to about 15 other platforms, with a simple command-line option (-t Windows, -t Linux, -t Darwin,
-t RPi, …).
Extremely lightweight: Red is a 1MB, single-file, no install, no setup, toolchain. It takes typically a
few seconds to download and you can immediatly start writing and running code, there’s
*nothing* to setup (it’s just terrible that this is the exception instead of being the norm…).
Batteries-included solution: it comes with a very rich runtime library, despite its tiny size,
covering pretty much anything you need for common tasks.
DSL-oriented environment: Red comes with many embedded DSL addressing important needs
(like GUI or system-programming). DSL are a very powerful way to reduce complexity arising
from frameworks or API, while drastically increasing productivity. Red includes a DSL (called
Parse) for constructing DSLs.
Red (like Rebol) is a Lisp derivative, but with a human-friendly syntax (no parenthesis hell). Red is
its own data format. All code is treated as data until you evaluate it, code/data serialization
comes for free. The minimal punctuation makes it easy on the eye.
Q16):features of carriots?
1.Carriots offers an end-to-end Internet of Things (IoT) platform designed
for today’s industry needs and tomorrow’s innovations.
2.Carriots is a smart Platform as a Service (PaaS) designed for machine to
machine (M2M) and digital twin projects.
3.Carriots accelerates your IoT application development and provides simple
scalability as your projects and devices grow.
4.Carriots lets users collect & store data from connected devices,
build powerful applications, deploy and scale
from prototypes to thousands of devices.
It's features are:
>Real-Time Interactive Visualization.
>End-to-End Security Encryption.
>User-Specified Data Engine Assignment.
>Multi-Tenant Architecture.
>Self-Service Interface.
>Analytical Data Engine.
>Multiple Data Source Reports.
>Sparse Navigation
>Embed Link Generation
2.Structure of url:
URL address has a determined structure which includes:
method of access to the resource that is also named the network protocol;
access authorization;
hosts – DNS address that is inscribed as IP address;
port – one more obligatory detail included in combination with IP address;
track – determines the information about the method of gaining access;
parameter – the internal information of resource about the file.
HTTP. The first part is the name of the scheme. Then comes a colon and two slashes (//).
WWW or webreference. The second part is the name of the computer that hosts the
document.
:80. The third part of the URL, which is optional, is the port number. Computers have a
certain number of so-called ports. The meaning of the port is that through it there are
interactions of a certain kind. One supports HTTP interactions, the other supports
sending mail, and so on.
something/something.html. The fourth part is also optional. This is the path to the document
we want to request. The path is a set of characters separated by slashes (/).
This is very similar to the paths to folders and files on your regular computer.
There is a root folder (directory), inside it, there are other folders, which,
in turn, may contain other folders and files.
?query. The fifth part is the query string, which is also optional.
In fact, the query string is some kind of data intended for a certain program to
process it and return the necessary information. The query string consists of a question mark
(?)
Followed by the transmitted information (it completely depends on which program will process
it).
4 EXAMPLE
https://portal.svkm.ac.in/usermgmt/loginSvkm
Q.20) Manoj wants to purchase an IoT device to secure his office. Give him some tips to avoid
IoT disasters.
Ans:
Common reasons of iot failures:
1. They take too long to progress
2. The enterprise has limited expertise in IoT
3. The quality of data is subpar
4. There is a lack of integration across teams
5. Companies are plagued by budget overruns
Solutions:
• Leverage standards that ensure data coming from different sources is in sync
• Deploy secure devices and networks to prevent tampering with data
• Make sure devices in the field are operating as they should when gathering and sending
data
• Another step companies can take to succeed at IoT is to overcome any lack of
integration across teams. IT and operations teams, like their respective leaders, must
work closely together and coordinate their efforts as much as possible.
With so many devices offering potential points of failure within an IoT system, device
authentication and authorization is critical for securing IoT systems.
Devices must establish their identity before they can access gateways and upstream
services and apps. However, there are many IoT devices that fall down when it comes to
device authentication, for example, by using weak basic password authentication, or using
passwords unchanged from their default values.
Secure communication:
Once the devices themselves are secured, the next IoT security challenge is to ensure that
communication across the network between devices and cloud services or apps is secure.
Many IoT devices don’t encrypt messages before sending them over the network.
However, best practice is to use transport encryption, and to adopt standards like TLS.
Using separate networks to isolate devices also helps with establishing secure, private
communication, so that data transmitted remains confidential.
Web, mobile, and cloud apps and services are used to manage, access, and process IoT
devices and data, so they must also be secured as part of a multi-layered approach to IoT
security.
When developing IoT applications, be sure to apply secure engineering practices to avoid
vulnerabilities such as the OWASP top 10 vulnerabilities. Just like devices, apps should also
support secure authentication, both for the apps themselves and the users of the
applications, by providing options such as 2FA and secure password recovery options.
A longer-term IoT security challenge is to apply security intelligence not only for detecting
and mitigating issues as they occur, but also to predict and proactively protect against
potential security threats. Threat modeling is one approach used to predict security issues.
Other approaches include applying monitoring and analytics tools to correlate events and
visualize unfolding threats in real-time, as well as applying AI to adaptively adjust security
strategies applied based on the effectiveness of previous actions.
Q. 22) Anisha is new in your area and she wants to some tips to make her smart home secure.
What kind of tips will you provide to make her home more secure?
Ans:
Reroute: Your router is the gateway to all your devices. If you haven't already reset
your router after the FBI warning about malware a few months back, you should.
Then rename it so that its brand and model are not immediately identifiable.
Change the default password, if you haven't already done so. And set up a guest
network for those who visit your home so that they don't have and retain access to
your primary one.
Don't give anyone a pass(word): IoT devices generally come with a set user name
and password. Change both on all your devices to avoid the easiest way for
someone to gain control of them.
Correct any defaults: Go into the settings for all IoT devices and review the
defaults. Turn off any that are unnecessary or that share more information than
you'd like.
Keep up to date: Check for software updates on all your devices to make sure that
any known vulnerabilities are patched. Even if you haven't received a notification
about updates, visit the manufacturer's site and social media to see whether any
have been issued.
Q. 23) List different types of security measure that can protect your different types of IoT
devices.
Ans:
1. Install reputable internet security software on your computers, tablets, and
smartphones. For instance, Norton Security Deluxe can provide real-time protection
against existing and emerging malware, including ransomware and viruses.
2. Use strong and unique passwords for device accounts, Wi-Fi networks, and connected
devices. Don’t use common words or passwords that are easy to guess, such as
“password” or “123456.”
3. Be aware when it comes to apps. Always make sure you read the privacy policy of the
apps you use to see how they plan on using your information and more.
4. Do your research before you buy. Devices become smart because they collect a lot of
personal data. While collecting data isn’t necessarily a bad thing, you should know about
what types of data these devices collect, how it’s stored and protected, if it is shared
with third parties, and the policies or protections regarding data breaches.
5. Know what data the device or app wants to access on your phone. If it seems
unnecessary for the app’s functionality or too risky, deny permission.
6. Use a VPN, like Norton Secure VPN, which helps to secure the data transmitted on your
home or public Wi-Fi.
7. Check the device manufacturer’s website regularly for firmware updates.
8. Use caution when using social sharing features with these apps. Social sharing features
can expose information like your location and let people know when you’re not at
home. Cybercriminals can use this to track your movements. That could lead to a
potential cyberstalking issue or other real-world dangers.
9. Never leave your smartphone unattended if you’re using it in a public space. In crowded
spaces, you should also consider turning off Wi-Fi or Bluetooth access if you don’t need
them. Some smartphone brands allow automatic sharing with other users in close
proximity.
• Macro viruses : A macro virus is a virus that is written in a macro language i.e. a
• File infectors : These are file infecting viruses that usually copy their code onto
executable files like .exe and .com. They replicate and spread, and might even damage
host programs.
system areas on a disk. They attach to the master boot sector and the USB thumb drives
• Polymorphic viruses : It’s a kind of virus that uses polymorphic engine to mutate while
keeping the original algorithm intact. It changes itself everytime it runs but its function does
not change.
tricked into loading and downloading this software by hackers trying to gain the users’
personal information.
• Logic bombs : It is a piece of code that is deliberately inserted into a software so that it
can set off some malicious function if certain requirements are met.
• Worms : A worm is a malicious, self replicating virus that can spread rapidly throughout
• Time Bombs :It is a part of a computer program which will start or stop functioning if a
locked and encrypted and a ransom is asked to restore access to that data.
28. Rakhi wants to purchase an IoT device to secure his office. Give her some tips
● Ensure that the data you store is visible to only you. Enable private locks and
security passwords.
● Take care of your personal belongings where you have stored your IoT data.
● There are several IoT wearable available. But choose only devices that are
necessary to you, in your official or personal life. Never buy them just for the
v) As you may notice, some features are very similar to HTTP. Although these similarities, CoAP
must not be considered a compressed HTTP protocol because it is specifically designed for IoT.
Therefore, it optimizes the M2M data exchange.
Ans)i) Many types of attacks have been around for a very long time.
ii) What’s new is the scale and relative simplicity of attacks in the Internet of Things (IoT) – the
millions of devices that are a potential victim to traditional style cyber attacks, but on a much
larger scale and often with limited, if any protection.
iii) At its core, IoT is all about connecting and networking devices that up until now have not
necessarily been connected. This means that all of those devices, whether it is your brand new
connected refrigerator or your connected vehicle, are creating a new entry point to the
network and therefore posing an increasing security and privacy risk.
A)Botnets: A botnet is a network of systems combined together with the purpose of remotely
taking control and distributing malware. Controlled by botnet operators via Command-and-
Control-Servers (C&C Server), they are used by criminals on a grand scale for many things:
stealing private information, exploiting online-banking data, DDos-attacks or for spam and
phishing emails. With the rise of the IoT, many objects and devices are in danger of, or are
already being part of, so called thingbots – a botnet that incorporates independent connected
objects.
B)Man-in-the-middle: The man-in-the-middle concept is where an attacker or hacker is looking
to interrupt and breach communications between two separate systems. It can be a dangerous
attack because it is one where the attacker secretly intercepts and transmits messages between
two parties when they are under the belief that they are communicating directly with each
other. As the attacker has the original communication, they can trick the recipient into thinking
they are still getting a legitimate message. Many cases have already been reported within this
threat area, cases of hacked vehicles and hacked "smart refrigerators".
C)Data and Identity Theft : While the news is full of scary and unpredictable hackers accessing
data and money with all types of impressive hacks, we are often also our own biggest security
enemy. Careless safekeeping of internet connected devices (e.g. mobile phone, iPad, Kindle,
smartwatch, etc.) are playing into the hands of malicious thieves and opportunistic finders.
D)Denial of Service : A denial of service (DoS) attack happens when a service that would usually
work is unavailable. There can be many reasons for unavailability, but it usually refers to
infrastructure that cannot cope due to capacity overload. In a Distributed Denial of Service
(DDoS) attack, a large number of systems maliciously attack one target. This is often done
through a botnet, where many devices are programmed (often unbeknownst to the owner) to
request a service at the same time.
Ans)i) HTTP full form HyperText Transfer Protocol used mainly to access data on the World
Wide Web.
ii) HTTP is a Server and Client communication Protocol, which is primarily set of rules for
formating and transferring webpage data (text, images, video and Multimedia files) over the
world wide web.
iii) This is the Protocol used to create communication between Web Servers and Web Users.
iv) The working of the HTTP protocol is explained step by step as follows:
Step 1: Establishing a TCP/IP connection by the client.
The first step is initiating a TCP connection with the server by the client. Once the connection
established, the browser and the server access TCP through their socket interfaces.
Connectivity provides the foundation of smart city services and it acts as an enabler of smart
healthcare as well. With the help of this citizens are able to communicate with authorities easily
and it helps authorities as well to gather more health data of its citizens which in return can be
used to inform further city and service planning that makes public healthcare a priority. Here
IoT plays an important role.
IoT in healthcare allows connecting data collected from smart devices and sensors to extract
valuable insights. The technology can play a foremost role in healthcare observation and help in
early detection of health issues. It would also help in assimilating the data collected from tests
instantly, monitor the condition of the patient, and then convey that information to the doctors
and staff in real-time, thus improving the effectiveness in the overall healthcare system. In the
near future personal IoT-based health checking devices will change the way, we track the
health of individuals.
When the health data is collected it needs to be analyzed and managed for accurate treatment
and here Artificial intelligence and automation are applied.
AI is also applied to perform tasks like analyzing laboratory tests, x-rays, CT scans, and data
entry. AI-based apps can be used to access the current medical condition of patients that can
provide assistance in medical consultation.
Technologies like Blockchain redefine the methods of maintaining and populating Electronic
Health Records as well as they also help link them to other services like payments and
insurance.
These advanced technologies are very critical in making healthcare a more determinate
process, with concrete results, with a service that is more pertinent to the lifestyle of the
modern citizen. Continuing innovation and improved data analysis will also help make it an area
of constant enhancement that will continue to invent new ways of keeping people fitter and
healthier.
we’ll talk about two major areas of agriculture that IoT can revolutionize:
1. Precision farming
2. Farming automation/robotization
1. Precision Farming
that make farming more controlled and accurate. In simple words, plants and cattle get
precisely the treatment they need, determined by machines with superhuman accuracy. The
biggest difference from the classical approach is that precision farming allows decisions to be
made per square meter or even per plant/animal rather than for a field.
By precisely measuring variations within a field, farmers can boost the effectiveness of
As in the case of precision agriculture, smart farming techniques enable farmers better to
monitor the needs of individual animals and to adjust their nutrition accordingly, thereby
Large farm owners can use wireless IoT applications to monitor the location, well-being, and
health of their cattle. With this information, they can identify sick animals, so that they can be
a proportional control mechanism, which often results in production loss, energy loss, and
IoT-driven smart greenhouses can intelligently monitor as well as control the climate,
eliminating the need for manual intervention. Various sensors are deployed to measure the
environmental parameters according to the specific requirements of the crop. That data is
stored in a cloud-based platform for further processing and control with minimal manual
intervention.
Agricultural Drones
Agriculture is one of the major verticals to incorporate both ground-based and aerial drones for
crop health assessment, irrigation, crop monitoring, crop spraying, planting, soil and field
Ans.
The Internet of Things (IoT) is no longer a fad. It is here to stay. But as you’d expect with
technology that thrives in inter-connectivity, it can be a target of malicious programs and
attacks. Combine this with BYOD policies of multiple companies and you can have a security
nightmare on your hands. Hackers can target the weakly secured devices your employees bring
to the office and, assuming they’re connected to your corporate networks, can use them as
a gateway into your systems.
It is not difficult to see that more attacks in the future will target IoT technology. The very thing
that makes it so appealing – its ability to connect various devices and systems - also makes it
susceptible to attacks. In addition to the devices themselves being affected, either used as a
backdoor for hackers or enslaved as part of a botnet, they can also put sensitive information in
danger of being illegally accessed or intercepted while in transit.
Well, here are some tips:
Just because there is a BYOD policy, it shouldn’t mean that employees can just bring any device
they have and connect it to the office network.
IoT wearables, in particular, have several security vulnerabilities that can put an organization in
danger of breaches. Many of these devices store and transmit data without encryption, often
with no password or biometric authentication. It also connects to your smartphone through
unsecure connections like Bluetooth or NFC, making it particularly vulnerable to brute-force
attacks even more.
You know when you create a separate network that can only be accessed by guests so that they
have limited to no access to your business’ main network?
You can do the same for IoT devices. You can create a separate network that is dedicated to
you and your staff’s IoT devices. This way, you are allowing the use of such devices within your
premises so your employees are happy, without putting your main network at risk.
Like any security measure, it always starts with a strong password. The same goes for IoT
security. Encourage your employees to use strong and unique passwords, especially if they are
connecting their devices over a Wi-Fi network.
Most IoT devices have universal plug and play (UPnP) features that make them easier to get
connected to other devices. It makes it pretty easy for different devices like routers, printers,
cameras, and others to discover and connect with each other without complex configurations.
Just because you have security features on your device doesn’t mean you will automatically be
safe.
Like your PC software, it is good practice to always update your IoT devices’ firmware. These
patches address bugs and other security-related issues, which are always evolving. Neglecting
these updates makes it easier for your device’s security to fail because it is unable to recognize
new forms of attacks.
Ans.
Q34) Explain the working of protocol which is responsible for publishing and subscribing.
Ans)
MQTT is one of the most commonly used protocols in IoT projects. It stands for Message
Queuing Telemetry Transport.
In addition, it is designed as a lightweight messaging protocol that uses publish/subscribe
operations to exchange data between clients and the server. Furthermore, its small size, low
power usage, minimized data packets and ease of implementation make the protocol ideal of
the “machine-to-machine” or “Internet of Things” world.
Like any other internet protocol, MQTT is based on clients and a server. Likewise, the server is
the guy who is responsible for handling the client’s requests of receiving or sending data
between each other.
MQTT server is called a broker and the clients are simply the connected devices.
So:
When a device (a client) wants to send data to the broker, we call this operation a “publish”.
When a device (a client) wants to receive data from the broker, we call this operation a
“subscribe”.
In addition, These clients are publishing and subscribing to topics. So, the broker here is the
one that handles the publishing/subscribing actions to the target topics.
Q35) Draw and explain the working of coap protocol used in IOT.
Ans)
Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with
constrained nodes and constrained networks in the Internet of Things. CoAP is designed to
enable simple, constrained devices to join the IoT even through constrained networks with
low bandwidth and low availability. It is generally used for machine-to-machine (M2M)
applications such as smart energy and building automation.
Working:
CoAP functions as a sort of HTTP for restricted devices, enabling equipment such
as sensors or actuators to communicate on the IoT. These sensors and actuators are controlled
and contribute by passing along their data as part of a system. The protocol is designed for
reliability in low bandwidth and high congestion through its low power consumption and low
network overhead. In a network with a lot of congestion or limited connectivity, CoAP can
continue to work where TCP-based protocols such as MQTT fail to exchange information and
communicate effectively.
Additionally, the effective and conventional CoAP features enable devices operating in poor
signal quality to send their data reliably or enable an orbiting satellite to maintain its distant
communication successfully. CoAP’s also supports networks with billions of nodes. For security,
the DTLS parameters chosen for default are an equivalent to 3072 bit RSA keys.
COAP uses UDP as the underlying network protocol. COAP is basically a client-server IoT
protocol where the client makes a request and the server sends back a response as it happens
in HTTP. The methods used by COAP are the same used by HTTP.
Q36) Explain the working of IOT with the help of a neat labelled diagram.
Ans)
Ans)
1. Insufficient testing and updating
Currently, there are over 23 billion IoT connected devices worldwide. This number will further
rise up to reach 30 billion by 2020 and over 60 billion by the end of 2025. This massive wave of
new gadgets doesn’t come without a cost.
In fact, one of the main problems with tech companies building these devices is that they are
too careless when it comes to handling of device-related security risks.
Most of these devices and IoT products don’t get enough updates while, some don’t get
updates at all.
This means that a device that was once thought of as secure when the customers first bought it
becomes insecure and eventually prone to hackers and other security issues.
Early computer systems had this same problem, which was somewhat solved with automatic
updates.
IoT manufacturers, however, are more eager to produce and deliver their devices as fast as
they can, without giving security too much of a thought.
This leaves their trusted customers exposed to potential attacks as a result of outdated
hardware and software.
To protect their customers against such attacks, each device needs proper testing before being
launched into the public and companies need to update them regularly.
Failing to do so is bad for both the companies and their consumers, as it only takes a single
large-scale breach in consumer data to completely ruin the company.
2. Brute-forcing and the issue of default passwords
The Mirai botnet, used in some of the largest and most disruptive DDoS attacks is perhaps one
of the best examples of the issues that come with shipping devices with default passwords and
not telling consumers to change them as soon as they receive them.
There are some government reports that advise manufacturers against selling IoT devices that
come with default (read, hackable) credentials such as using “admin” as username and/or
passwords.
That said, these are nothing more than guidelines now, and there aren’t any legal repercussions
to incentivize manufacturers to abandon this dangerous practice.
Weak credentials and login details leave nearly all IoT devices vulnerable to password hacking
and brute-forcing in particular.
The only reason why Mirai malware was so successful is that it identified vulnerable IoT devices
and used default usernames and passwords to log in and infect them.
Therefore, any company that used factory default credentials on their devices is placing both
their business and its assets and the customers and their valuable information at risk of being
susceptible to a brute-force attack.
3. IoT malware and ransomware
As the number of IoT connected devices continues to rise in the following years, so will the
number of malware and ransomware used to exploit them.
While the traditional ransomware relies on encryption to completely lock out users out of
different devices and platforms, there’s an ongoing hybridization of both malware and
ransomware strains that aims to merge the different types of attack.
The ransomware attacks could potentially focus on limiting and/or disabling device
functionality and stealing user data at the same time.
For example, a simple IP camera is ideal for capturing sensitive information using a wide range
of locations, including your home, work office or even the local gas station.
The webcam can then be locked and footage funneled to an infected web address which could
extract sensitive data using the malware access point and demand ransom to unlock the device
and return the data.
The ever-increasing number of IoT devices will give birth to unpredictability in regards to future
attack permutations.
4. IoT botnets aiming at cryptocurrency
The heated mining competition, coupled with the recent rise of cryptocurrency valuations is
proving too enticing for hackers trying to cash in on the crypto-craze.
While most find blockchain resistant to hacking, the number of attacks in the blockchain sectors
seems to be increasing.
IoT applications, structures, and platforms relying on blockchain technology need to become
regulated and constantly monitored and updated if it were to prevent any future
cryptocurrency exploits.
5. Data security and privacy concerns (mobile, web, cloud)
Data privacy and security continues to be the single largest issues in today’s interconnected
world.
Data is constantly being harnessed, transmitted, stored and processed by large companies
using a wide array of IoT devices, such as smart TVs, speakers and lighting systems, connected
printers, HVAC systems, and smart thermostats.
Commonly, all this user-data is shared between or even sold to various companies, violating our
rights for privacy and Data security and further driving public distrust.
6. AI and automation
As IoT devices continue to invade our everyday lives, enterprises will eventually have to deal
with hundreds of thousands, if not millions of IoT devices.
This amount of user-data can be quite difficult to manage from a data collection and
networking perspective.
7. Home Invasions
Perhaps one of the scariest threats that IoT can possess is of the home invasion. Nowadays, IoT
devices are used in a large number at homes and offices which has given rise to the home
automation.
The security of these IoT devices is a huge matter of concern as it can expose your IP address
that can pinpoint to your residential address.
This vital information can be sold by the hackers to the underground websites which are havens
for criminal outfits.
Moreover, if you’re using IoT devices in your security systems, then there is a possibility that
they might compromise as well as leave your house at a huge potential threat.
8. Remote vehicle access
Apart from home invasion, hijack of your car is also one of the threat possessed by the IoT.
Smart cars are on the verge of becoming reality with the help of connected IoT devices.
However, due its IoT association, it also possesses a greater risk of a car hijack.
A skilled hacker might hijack by getting the access of your smart car through the remote access.
This will be scary situation as anyone can have control over your car and it can leave you
vulnerable to lethal crimes.
9. Untrustworthy communication
There are many IoT devices which send messages to the network without any encryption. This
is one of the biggest IoT security challenge which exists out there.
It’s high time that all the companies ensure encryption of the highest level among their cloud
services and devices.
To avoid this threat, the best way to do is to use transport encryption and standards like TLS.
Another way is to use different networks that isolates different devices.You can also use private
communication which ensures that the data transmitted is secure and confidential.
• Ans: Connectivity: Internet connectivity is either available within the device itself or can be
an access point then it is most probably collecting data and operational information from a
range of sensors for a specific device and then communicating with the cloud to relay this
information.
• Sensors: Sensors are an important aspect of devices and systems within the internet of
things. The sensors monitor, track and measure the activity and interactions of a device
and then relay this information using the cloud. Some examples of such sensors include
ones that monitor a person’s health and fitness or sensors that can detect whether a door
has been opened in your house or even ones that monitor usage statistics (eg: for utilities).
• Processors: Devices in the Internet of Things will need to have a certain degree of
computing power even if it is just to be able to relay and transmit gathered data to the
cloud. Like any computing device this will require a processor which will handle such tasks,
so all devices connected to the internet of things will have a processor as well.
that maybe highly sensitive and regulated, an example is health related or financial data.
Since a variety of sensitive data can be relayed by these devices it is very important that
• Energy-efficiency, Quality & Reliability: Devices in the IoT may be operating in severe
weather, unforgiving environments and hard to reach places for instance devices operating
in outer space or deep inside mines. Since the devices may be operating in such
environments it is important that they are made with the highest quality, are reliable and
• Cost effectiveness: Things or devices that require sensors to relay useful information may
need to be circulated in a large quantity in order to be effective, hence they will need to be
cost effective. For instance if it is a sensor attached to food products to monitor the expiry
dates, it will need to be implemented into every single product – in addition to being
MQTT has unique features you can hardly find in other protocols, like:
• It’s a lightweight protocol. So, it’s easy to implement in software and fast in data transmission.
• It’s based on a messaging technique. Of course, you know how fast your messenger/WhatsApp
message delivery is. Likewise, the MQTT protocol.
• Minimized data packets. Hence, low network usage.
• Low power usage. As a result, it saves the connected device’s battery.
• It’s real time! That’s is specifically what makes it perfect for IoT applications.
Like any other internet protocol, MQTT is based on clients and a server. Likewise, the server is
the guy who is responsible for handling the client’s requests of receiving or sending data
between each other.
MQTT server is called a broker and the clients are simply the connected devices.
So:
• When a device (a client) wants to send data to the broker, we call this operation a “publish”.
• When a device (a client) wants to receive data from the broker, we call this operation a
“subscribe”.
In addition, These clients are publishing and subscribing to topics. So, the broker here is the one
that handles the publishing/subscribing actions to the target topics.
Let’s say there is a device that has a temperature sensor. Certainly, it wants to send his readings
to the broker. On the other side, a phone/desktop application wants to receive this
temperature value. Therefore, 2 things will happen:
• The device defines the topic it wants to publish on, ex: “temp”. Then, it publishes the message
“temperature value”.
• The phone/desktop application subscribes to the topic “temp”. Then, it receives the message
that the device has published, which is the temperature value.
Again, the broker role here is to take the message “temperature value” and deliver it to
phone/desktop application.
Gateway enables easy management of data traffic flowing between protocols and networks. On
the other hand, it also translates the network protocols and makes sure that the devices and
sensors are connected properly.
It can also work to preprocess the data from sensors and send them off to next level if it is
configured accordingly. It is essential to configure it as the presence of TCP/IP protocol allows
easy flow.
Not only this, it gives proper encryption with the network flow and data transmission. The data
flowed through it is in the higher order that is protected by using latest encryption techniques.
You can assume it like an extra layer between the cloud and devices that filter away the attack
and illegal network access.
2. Analytics
The analog data of devices and sensors are converted into a format that is easy to read and
analyze. This is all possible due to the IoT ecosystem that manages and helps in improving the
system. The main factor that is influenced is security.
The most important function of IoT technology is that it supports real-time analysis that easily
observes the irregularities and prevents any loss or scam. Preventing the malicious things to
attack the smart devices will not only give you a sense of security but also it will save all your
private data from being used for illegal purposes.
The big companies collect the data in bulk and analyze it to see the future opportunity so that
they can easily develop more business advancement and gain something out of it. This analysis
easily helps in setting future trends that have a capability to rule the market. From this analysis,
they can be one step ahead of the time and easily achieve success. Data may be a small word
but it holds the power to make or break the business if used correctly.
3. Connectivity Of Devices
The main components that complete connectivity layer are sensors and devices. Sensors collect
the information and send it off to the next layer where it is being processed. With the
advancement of technology, semiconductor technology is used that allows the production of
micro smart sensors that can be used for several applications.
• Proximity detection,
• Humidity or Moisture Level,
• Temperature sensors and thermostats,
• Pressure sensors,
• RFID tags.
The modern smart sensors and devices use various ways to be connected. The wireless
networks like LORAWAN, Wi-Fi, and Bluetooth makes it easy for them to stay connected. They
have their own advantages and drawbacks that are classified in various forms like efficiency
rate, data transfer, and power.
4. Cloud
With the help of internet of things ecosystem, companies are able to collect bulk data from the
devices and applications. There are various tools that are used for the purpose of data
collection that can collect, process, handle and store the data efficiently in real time. It is also
responsible for making a tough decision that can easily break the deal. This all is done by one
system that is IoT Cloud.
One of the most important components of IoT cloud is database management that is
distributed in nature. The cloud basically combines many devices, gateways, protocols, devices
and a data store that can be analyzed efficiently. These systems are used by many companies in
order to have improved and efficient data analysis that can help in the development of the
services and products. In addition to this, it also helps in forming an accurate strategy that can
help in building an ideal business model.
5. User Interface
This is another factor on which IoT ecosystem depends immensely. It provides a visible and
physical part that can be easily accessed by the user. It is important for the developer to create
a user-friendly interface that could be accessed without putting any extra efforts in it and that
can help in easy interaction.
With the help of advancement, there are various interactive designs that could be used easily
and that can easily solve any complex query. For examples, at home people have started to use
the colorful touch panels instead of the hard controls that were used earlier. It is increasing day
by day as now the touchpads are also launched that can switch on the air conditioners from a
distance.
This has set out a trend for the digital generations and have managed to hype up today’s
competitive market. The user interface is the first thing that user pay attention to before buying
a device. Even customers are oriented to buy the devices that are user-friendly and less
complex that could be used with wireless connectivity.
6. Standards And Protocols
The webpages are now using the HTML format with the cascading style sheet. This has made
the internet more stable and reliable service to use. They are the most used standard protocols
making it no just friendly but easily acceptable. However, IoT doesn’t have that standard.
It is important to choose a platform the IoT that can help in determining the way your platform
will interact with the system. Thus, you will be able to have an interaction with devices and
networks with the same standard as yours. It is important for having the same protocol to have
a successful interaction.
7. Database
Internet of things are increasing dynamically and is all dependent on data that are used
immensely in the data centers. It is essential to have a proper database system that can store
and manage the data that is being gathered from various device and end-users. There are also
various management tools that offer many automated features that help in easy accumulation
of data stored and managed in bulk at the same place.
8. Automation
As mentioned above, the database system is using the automotive features that help in
managing data and accumulating it. However, the data management is the only limited thing
that is used by the internet of things. It is now used for a much more advanced version that
allows the automatic adjustment of the wireless things. For example, you can easily control
light with a click of the remote. The air conditioner is now connected to your smartphone and
you can switch them on and off whenever you want. Even it is possible to play with the
temperature.
9. Development
Internet of things is the latest advancement in technology. The need for the development is
growing and increasing with time. Each and every one is not depending on the launch of various
automotive devices and smart sensors. There are various prototypes that are in the market that
are being deployed and are running in the testing phase. Also, IoT is not working with only one
device. Hence, it is important that the devices are completed tested according to the
compatibility of the device and checked thoroughly that whether the devices can connect
wirelessly or not.
The journey of the internet of things is growing for years. We have managed to experience
many things and advancement in most of the technology. IoT ecosystem is used to make the
protocols easily accessible, reasonably priced, efficient and secure. It will be excited to see the
new demands and development in the several sectors that will be bought by the internet of
things.
Especially the way it connects different companies and vendors together. The main is that we
need to lookout the way everyone can incorporate this IoT ecosystem to increase their
production.
3. Software attacks
The third area that poses an IoT security risk is your software. Software attacks occur when
malware is installed into your network’s program. This malicious software sends a virus,
corrupts or steals data, and can both interrupt and spy on the activities. A software attack can
launch a DDoS, too.
4. Encryption attacks
Finally, encryption attacks strike at the heart of your algorithmic system. Hackers analyze and
deduce your encryption keys, to figure out how you create those algorithms. Once the
encryption keys are unlocked, cyber-assailants can install their own algorithms and take control
of your system.
Consequently, it is essential that IoT users maintain an awareness of these cyber risks and put
preventative measures in place
Q42)State the security measure which can use to keep IOT device safe?
Q42) State the security measures which can be used to keep IoT devices safe.