0% found this document useful (0 votes)
11 views33 pages

Final IOT - 70 Important Questions & Answers by Dipayan Kumar Ghosh, CSE Department, MITRC.

The document outlines 70 important questions related to the Internet of Things (IoT), covering definitions, characteristics, protocols, and applications. It discusses various communication models, including publish-subscribe and WebSocket, as well as the significance of big data and cloud computing in IoT systems. Additionally, it highlights the roles of sensors and actuators, differences between analog and digital sensors, and provides a sample Arduino program for LED control.

Uploaded by

0979itachi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views33 pages

Final IOT - 70 Important Questions & Answers by Dipayan Kumar Ghosh, CSE Department, MITRC.

The document outlines 70 important questions related to the Internet of Things (IoT), covering definitions, characteristics, protocols, and applications. It discusses various communication models, including publish-subscribe and WebSocket, as well as the significance of big data and cloud computing in IoT systems. Additionally, it highlights the roles of sensors and actuators, differences between analog and digital sensors, and provides a sample Arduino program for LED control.

Uploaded by

0979itachi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Sub Code: 6CS4-05

Sem: CSE VI sem


Department : Computer Science and Engineering
Faculty: Asst.Professor Dipayan Kumar Ghosh

70 Important Question in Internet of Things

Q1. Define Internet of Things and mention its main characteristics.

ANS: Definition :A dynamic global network infrastructure with self-configuring capabilities based
on standard and interoperable communication protocols where physical and virtual "things" have
identities, physical attributes, and virtual personalities and use intelligent interfaces, and are
seamlessly integrated into the information network, Often communicate data associated with users
and their environments.

Important characteristics of IoT are:


1. Dynamic and Self-Adapting: IoT devices and systems may have the capability to
dynamicallyadapt with the changing contexts and take actions based on their operating
conditions, user’s context, or sensed environment.
2. Self-Configuring: IoT devices may have self-configuring capability, allowing a large number of
devices to work together to provide certain functionality (such as weather monitoring).
3. Interoperable Communication Protocols: IoT devices may support a number of interoperable
communication protocols and can communicate with other devices and also with the infrastructure.
4. Unique Identity: Each IoT device has a unique identity and a unique identifier (such as an IP
address or a URI). IoT systems may have intelligent interfaces which adapt based on the context,
allow communicating with users and the environmental contexts.
5. Integrated into Information Network: IoT devices are usually integrated into the information
network that allows them to communicate and exchange data with other devices and systems. loT
devices can be dynamically discovered in the network, by other devices and/or the network, and
have the capability to describe themselves (and their characteristics) to other devices or user
applications.

Q2. Give example of Link Layer protocols that can be used in IoT

ANS: Link layer protocols determine how the data is physically sent over the network’s
physical layer or medium (e.g., copper wire, coaxial cable, or a radio wave). It determines how the
packets are coded and signaled by the hardware device over the medium to which the host is
attached (such as a coaxial cable). Few important Link layer protocol are that can be used in IoT
are:
i) 802.3 - Ethernet : IEEE 802.3 is a collection of wired Ethernet standards for
the link layer. These standards provide data rates from 10 Mb/s to 40 Gb/s and higher.
ii) 802.11 - WiFi : IEEE 802.11 is a collection of wireless local area network (WLAN)
communication standards, including extensive description of the link layer. These standards provide
data rates from 1 Mb/s to upto 6.75 Gb/s
iii) 802.16 - WiMax: IEEE 802.16 is a collection of wireless broadband standards, including
extensive descriptions for the link layer (also called WiMax). WiMax standards provide data rates
from 1.5 Mb/s to 1 Gb/s.
iv) 802.15.4 - LR-WPAN : IEEE 802.15.4 is a collection of standards for lowrate wireless
personalarea networks (LR-WPANs). These standards form the basis of specifications for high
level communication protocols such as ZigBee. LR-WPAN standards provide data rates from 40
Kb/s250 Kb/s. These standards provide low-cost and low-speed communication for power
constraineddevices.
v) 2G/ 3G/ 4G - Mobile Communication : There are different generations of mobile communication
standards including second generation (2G including GSM and CDMA), third generation (3G -
including UMTS and CDMA2000) and fourth generation (4G - including LTE). IoT devices based
on these standards can communicate over cellular networks. Data rates for these standards range
from 9.6 Kb/s (for 2G) to upto 100 Mb/s (for 4G) and are available from the 3GPP websites.

Q3. Mention important application protocol that is suitable for IoT. Describe its characteristic
briefly.

ANS: Important application protocol that are important for IoT system are:

i) HTTP : Hypertext Transfer Protocol (HTTP) is the application layer protocol that forms the
foundation of the World Wide Web (WWW). HTTP includes commands such as GET, PUT, POST,
DELETE, HEAD, TRACE, OPTIONS, etc. The protocol follows a request-response model where a
client sends requests to a server using the HTTP commands. HTTP is a stateless protocol and each
HTTP request is independent of the other requests. An HTTP client can be a browser or an
application running on the client (e.g., an application running on an IoT device, a mobile
application or other software). HTTP protocol uses Universal Resource Identifiers (URIs) to
identify HTTP resources.
ii) CoAP: Constrained Application Protocol (CoAP) is an application layer protocol for machine-
to-machine (M2M) applications, meant for constrained environments with constrained devices and
constrained networks. Like HTTP, CoAP is a web transfer protocol and uses a request-response
model, however it runs on top of UDP instead of TCP. CoAP uses a client-server architecture where
clients communicate with servers using connectionless datagrams. CoAP is designed to easily
interface with HTTP. Like HTTP, CoAP supports methods such as GET, PUT, POST, and DELETE.
iii) Websocket : WebSocket protocol allows full-duplex communication over a single socket
connection for sending messages between client and server. WebSocket is based on TCP and allows
streams of messages to be sent back and forth between the client and server while keeping the TCP
connection open. The client can be a browser, a mobile application or an IoT device
iv) MQTT : Message Queue Telemetry Transport (MQTT) is a light-weight messaging protocol
based on the publish-subscribe model. MQTT uses a client-server architecture where the client
(such as an IoT device) connects to the server (also called MQTT Broker) and publishes messages
to topics on the server. The broker forwards the messages to the clients subscribed to topics. MQTT
is well suited for constrained environments where the devices have limited processing and memory
resources and the network bandwidth is low.
v) XMPP : Extensible Messaging and Presence Protocol (XMPP) is a real-time communication and
streaming XML data between network entities. XMPP powers wide range of applications including
messaging, presence, data syndication, gaming, multi-party chat and voice/video calls. XMPP
allows sending small chunks of XML data from one network entity to another in near real-time.
XMPP is a decentralized protocol and uses a client-server architecture. XMPP supports both client-
to-server and server-to-server communication paths. In the context of IoT, XMPP allows real-time
communication between IoT devices.
vi) AMQP : Advanced Message Queuing Protocol (AMQP) is an open application layer protocol
for business messaging. AMQP supports both point-to-point and publisher/subscriber models,
routing and queuing. AMQP brokers receive messages from publishers (e.g., devices or
applications that generate data) and route them over connections to consumers (applications that
process data). Publishers publish the messages to exchanges which then distribute message copies
to queues. Messages are either delivered by the broker to the consumers which have subscribed to
the queues or the consumers can pull the messages from the queues.

Q4. What is Data distribution Service (DDS) ?

ANS: Data Distribution Service (DDS) is a data-centric middleware device-todevice or machine-


to-machine communication. DDS uses a publish-subscribe model where publishers (e.g. devices
that generate data) create topics to which subscribers (e.g., devices that want to consume data) can
subscribe. Publisher is an object responsible for data distribution and the subscriber is responsible
for receiving published data. DDS provides quality-of-service (QoS) control and configurable
reliability. DDS is described in Object Management Group (OMG) DDS specification.

Q5. What is publish subscribe communication model?

ANS: Publish-Subscribe is a communication model that involves publishers, brokers and


consumers. Publishers are the source of data. Publishers send the data to the topics which are
managed by the broker. Publishers are not aware of the consumers. Consumers subscribe to the
topics which are managed by the broker, When the broker receives data for a topic from the
publisher, it sends the data to all the subscribed consumers.

Publish Subscribe communication model

Q6. What are advantages of WebSocket based communication APIs?

ANS: The WebSocket API is an advanced technology that makes it possible to open a two-way
interactive communication session between the user’s browser and a server. WebSocket
communication begins with a connection setup request sent by the client to the server. This request
(called a WebSocket handshake) is sent over HTTP and the server interprets it as an upgrade
request. If the server supports WebSocket protocol, the server responds to the WebSocket handshake
response. After the connection is setup, the client and server can send data/messages to each other in
full-duplex mode.
The main advantages of this API are:
i) With this API, you can send messages to a server and receive event-driven responses
without having to poll the server for a reply.
ii) WebSocket APIs allow bi-directional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communication model.
Iii) Unlike request-response APIs such as REST, the WebSocket APIs allow full duplex
communication and do not require a new connection to be setup for each message to be sent.
iv) WebSocket is suitable for loT applications that have low latency or high throughput
requirements.

Websocket Communication API

Q7. What is big data and why it is important for IoT system?

ANS: Big data is defined as collections of data sets whose volume, velocity (in terms of its
temporal variation), or variety, is so large that it is difficult to store, manage, process
and analyze the data using traditional databases and data processing tools. Big
data analytics involves several steps starting from data cleansing, data munging (or
wrangling), data processing and visualization. Some examples of big data generated
by IoT systems are :
i) Sensor data generated by IoT systems such as weather monitoring stations
ii) Machine sensor data collected from sensors embedded in industrial and energy
systems for monitoring their health and detecting failures.
Iii) Data generated by IoT systems for location and tracking of vehicles.
Q8. What are important characteristics of Big Data?

ANS: The underlying characteristics of big data include:

i) Volume: Though there is no fixed threshold for the volume of data to be considered as big data,
however, typically, the term big data is used for massive scale data that is difficult to store, manage
and process using traditional databases and data processing architectures. The volumes of data
generated by modern IT, industrial, and health-care systems, for example, is growing exponentially
driven by the lowering costs of data storage and processing architectures and the need to extract
valuable insights from the data to improve bi processes, efficiency and service to consumers.
ii) Velocity: Velocity is another important characteristic of big data and the primary reason
forexponential growth of data. Velocity of data refers to how fast the data is generated and
how frequently it varies. Modern IT, industrial and other systems are generating data at
increasinglyhigher speeds.
Iii) Variety: Variety refers to the forms of the data. Big data comes such as structured or
unstructured data. including text data. image. audio. Video and sensor data.

Q9. What is cloud computing and what are different form of cloud computing from service
pointof view?

ANS : Cloud computing is a transformative computing paradigm that involves delivering


applications and services over the Internet. Cloud computing resources can be provisioned on-
demand by the users, without requiring interactions with the cloud service provider. The process of
provisioning resources is automated. Cloud computing resources can be accessed over the network
using standard access mechanisms that provide platform-independent access through the use
of heterogeneous client platforms such as workstations, laptops, tablets and smartphones. The
computing and storage resources provided by cloud service providers are pooled to serve multiple
users using multi-tenancy.

Cloud computing services are offered to users in different forms:

i) Infrastructure-as-a-Service (IaaS): IaaS provides the users the ability to provision computing and
storage resources. These resources are provided to the users as virtual machine instances and virtual
storage. Users can start, stop, configure and manage the virtual machine instances and virtual
storage. Users can deploy operating systems and applications of their choice on the virtual resources
provisioned in the cloud. The cloud service provider manages the underlying infrastructure. Virtual
resources provisioned by the users are billed based on a pay-per-use paradigm
ii) Platform-as-a-Service (PaaS): PaaS provides the users the ability to develop and deploy
application in the cloud using the development tools, application programming interfaces (APIs),
software libraries and services provided by the cloud service provider. The cloud service provider
manages the underlying cloud infrastructure including servers, network, operating systems and
storage. The users, themselves, are responsible for developing, deploying, configuring and
managing applications on the cloud infrastructure.
Iii) Software-as-a-Service (SaaS) : SaaS provides the users a complete software application or the
user interface to the application itself. The cloud service provider manages the underlying cloud
infrastructure including servers, network, operating systems, storage and application software, and
the user is unaware of the underlying architecture of the cloud. Applications are provided to the user
through a thin client interface (e.g., a browser). SaaS applications are platform independent and can
be accessed from various client devices such as workstations, laptop, tablets and smart-phones,
running different operating systems. Since the cloud service provider manages both the application
and data, the users are able to access the applications from anywhere.
Q10. Explain Level-5 template of IoT system with an example?

ANS : A level-5 IoT system has multiple end nodes and one coordinator node . The end nodes that
perform sensing and/or actuation. Coordinator node collects data from the end nodes and sends to
the cloud. Data is stored and analyzed in the cloud and application is cloud-based. Level-5 IoT
systems are suitable for solutions based on wireless sensor networks, in which the data involved
is big and the analysis requirements are computationally intensive. Let us consider an example of a
level-5 IoT system for forest fire detection. The system consists of multiple nodes placed in
different locations for monitoring temperature, humidity and carbon dioxide (CO2) levels in a
forest. The end nodes in this example are equipped with various sensors (such as temperature,
humidity and CO2). The coordinator node collects the data from the end nodes and acts as a
gateway that provides Internet connectivity to the loT system. The controller service on the
coordinator device sends the collected data to the cloud. The data is stored in a cloud database. The
analysis of data is done in the computing cloud to aggregate the data and make predictions. A cloud-
based application is used for visualizing the data.

IoT Deployment Level 5

Q11. What roles do sensors and actuators play in IoT system?

ANS: A sensor is a device that converts a physical quantity to an electrical signal, and therefore
either provides a voltage or a current, or causes a change of its resistance. Actuator on other hand are
usedto control some external parameter of the environment with which smart things are interacting.
Sensors and actuator serve as interface through which smart things of IoT ecosystem interact with
the environment, receive data, send control signal.

Q12. What is difference between analog and digital sensors?

ANS: Analog sensor output is continuous signal while digital sensors gives either produce
discrete pulseor binary data. To process analog sensor they are first converted to digital using
ADC while for digital sensor we dont need such device.
Q13. Mention few temperature sensors. Briefly explain the physical phenomena involved in
theirworking?

ANS:
Important type of temperature sensors are:

Resistance-based temperature detectors (RTD): example are PT100 temperature sensor which is
calibrated platinum based sensor . It is based on the fact that the resistance of a very pure metal is
determined by scattering of electrons in the conduction band with phonons, which are vibrations of
the ions that make up the crystal lattice of the metal. Higher temperatures cause stronger vibrations
of the lattice, with correspondingly higher resistance.

Q14. What is importance of PWM in arduino ?

ANS: PWM stands for pulse width modulation. It is square wave signal with variable width used to
generate variable dc volatge. The DC level are fixed by varrying how much part of period the
voltage level is high and low. It is used in application like wavefor generator, control dc motor
speed, fading in and fading our LED.

Q15. Write arduino program to fade in and fade out LED.

ANS:

const int LED=9; // Define LED for Pin 9void setup()


{
pinMode (LED, OUTPUT); // Set the LED pin as an output
}
void loop()
{
for (int i=0; i<256; i++)
{
analogWrite(LED, i);delay(10);
}
for (int i=255; i>=0; i--)
{
analogWrite(LED, i);delay(10);
}
}
Q 16. Mention important connectors and its features of raspbery pi board .

ANS:

The Raspberry Pi is a series of single-board computers created in the United Kingdom by the Raspberry Pi
Foundation. The original aim of the founders was to encourage the teaching of basic computer science in
schools and developing countries. But now it is also used in robotic and as anedge device for various IoT
application. It is cheaper and comes and various configuration.
Few important feature of the Pi are:

i) The Broadcom BCM2835 SoC firs generation include 700 MHz ARM1176JZF-S processor,
VideoCore IV GPU, and RAM. It has a level 1 (L1) cache of 16 kB. Now with Pi 4 this capacity
has increased much.
ii) The Raspberry Pi 3 and Pi Zero W (wireless) provide a 2.4 GHz Wi-Fi 802.11n (150 Mbit/s) and
Bluetooth 4.1 (24Mbit/s) connectivity module.
Iii) The Raspberry Pi can be also used with USB storage, USB-to-MIDI converters, and virtually
any other device/component with USB capabilities
iv) he Raspberry Pi board family can run multiple operating systems, such as Raspbian, Fedora,
Ubuntu MATE, Kali Linux, Ubuntu Co.
v) the Raspberry Pi sports a video processor that can display videos at full-HD resolution
(1920×1080) via the built-in HDMI-connector.
vi) The Raspis are very attractive due to their built-in low-level peripherals. There are 17 general-
purpose inputoutput (GPIO) pins exposed on the board, some of which support I2C, SPI, and UART
(RS-232-like) communication.

Q17. Write a short note on real time OS and its importance in IOT.

ANS: A real-time operating system is critical for the management of hardware resources in
computers and host applications as well as processing data on a real-time basis. real-time operating
system provides a high degree of consistency and reliability in timing between the acceptance of a
task and its completion, otherwise known as lower jitter. What differentiates a real-time operating
system from general purpose or traditional operating systems is its ability to perform under real-
time constraints, including time, power, and efficiency of memory use. An RTOS is ideal for
multiple tasks that have worst-case execution scenarios as a specific architecture that produces
accurate outputs in a timely manner.
Some of the components of an RTOS include file management, real-time kernel, graphical user
interface, protocol stacks, and advanced scheduling algorithm, as well as features like thread
switching latency and minimal interrupt latency. For instance, a car’s airbag system needs to
respond at the exact time when it’s necessary. A small error in timing during the design process can
lead to an early or late response by the airbag. The advanced features and speed of an RTOS prevent
those types of errors.

Traditional operating systems like Windows, iOS, and Android work well with a fast processor that
consumes a lot of power. However, they do not guarantee a real-time response within the
environment where they are used. Therefore, these operating systems are not ultimate solutions for
most IoT devices.

Q18. Mention important features of Contiki OS.


ANS:
Contiki is an operating system for networked, memory-constrained systems with a focus on low-
power wireless Internet of Things devices. Extant uses for Contiki include systems for street
lighting, sound monitoring for smart cities, radiation monitoring, and alarms. It is open source
software released under a BSD license.

Contiki supports per-process optional preemptive multithreading, inter-process communication


using message passing through events, as well as an optional graphical user interface (GUI)
subsystem with either direct graphic support for locally connected terminals or networked virtual
display with Virtual Network Computing (VNC) or over Telnet.

A full installation of Contiki includes the following features:

> Multitasking kernel


> Optional per-application preemptive multithreading
> Protothreads
> Internet Protocol Suite (TCP/IP) networking, including IPv6
> Windowing system and GUI
> Networked remote display using Virtual Network Computing
> A web browser (claimed to be the world's smallest)
> Personal web server
> Simple telnet client
> Screensaver

Contiki is supported by popular SSL/TLS libraries such as wolfSSL, which includes a port in its
3.15.5 release

Q 19. What are important features of RIOT OS ?

ANS: RIOT is based on a microkernel architecture. In contrast to other operating systems with
similarlylow memory use (such as TinyOS or Contiki), RIOT allows application programming with
the programming languages C and C++. An experimental Rust API is also available. It has full
multithreading and real-time abilities.

Q.20. What is importance of reference architecture in IoT?

ANS: When it comes to product development and other activities, an architectural reference
model is offourfold use.
i) Cognitive Aid : It helps to guide discussions, since it provides a language everyone
involved can use, and which is intimately linked to the architecture, the system,
the usage domain. The high-level view provided in such a model is of high educational
value, since it provides an abstract but also rich view of the domain.
ii) Reference Model as a Common Ground: Establishing the common ground for the IoT
encompasses defining IoT entities and describing their basic interactions and relationships with
each other.
Iii) Generating Architectures: One of the main benefits is its use for generating compliant
architectures for specific systems. One of the main benefits is the use of the IoT ARM for
generating compliant architectures for specific systems.
iv) Identifying Differences in Derived Architectures: the IoT ARM defines a set of tactics and
design choices for meeting qualitative system requirements. All of these facts can be used to predict
whether two derived architectures will differ and where they will do so.
v) Achieving Interoperability: By comparing the design choices made when deriving two
architectures, one can readily identify where in the architecture measures are necessary to achieve
inter operability. Interoperability may be achieved a posteriori by integrating one IoT system as
subsystem in another system, or by building a bridge through which key functionalities of the
respective other IoT system can be used.
v) Benchmarking: While the reference model prescribed the language to be used in the
systems/architectures to be assessed, the reference architecture stated the minimum (functional)
requirements for the systems/ architectures.

Q. 21. Describe layers of IoT architecture (IoTWF) briefly.

ANS: In 2014 the IoTWF architectural committee (led by Cisco, IBM, Rockwell Automation, and
others) published a seven-layer IoT architectural reference model. These are :
Layer 1: Physical Devices and Controllers Layer: The first layer of the IoT Reference Model is
the physical devices and controllers layer. This layer is home to the things in the Internet of Things,
including the various endpoint devices and sensors that send and receive information.
Layer 2: Connectivity Layer: The most important function of this IoT layer is the reliable and
timely transmission of data. More specifically, this includes transmissions between Layer 1 devices
and the network and between the network and information processing that occurs at Layer
3 (the edge computing layer)
Layer 3: Edge Computing Layer: At this layer, the emphasis is on data reduction and converting
network data flows into information that is ready for storage and processing by higher layers. One
of the basic principles of this reference model is that information processing is initiated as early and
as close to the edge of the network as possible.
Layer 4: Data Accumulation (Storage): This level converts data-in-motion to data-at-rest. Data
format is converted from network packets to database relational tables. It transforms event-based
computing to query based computing. Data is also reduced through filtering and selective storage.
Layer 5: Data Abstraction (Aggregation and Access): This level creates schemas and views of
data in the manner that applications want. It combines data from multiple sources. It simplifies,
filters, selects, projects and reformats data to serve client applications. It reconciles the differences
in data shape, format, semantics, access protocol and security.
Layer 6: Application (Reporting, Analytics, Control): This level controls the applications and
performs business intelligence and analytics.
Layer 7: Collaboration & Processes: This level involves the people and business processes.

Q 22. What is REST architecture?

ANS: Representational State Transfer (REST) is the architectural style behind the web. Defined in
2000 in Roy Fielding’s PhD thesis , REST defines a set of rules and principles that all the elements
of thearchitecture must conform to in order to build web applications that scale well, in terms of:
• scalability (number of interacting clients)
• robustness (long-term evolution of systems).
Loose coupling means that the endpoints should contain as little information about each other as
needed to work. All necessary missing information should be collected while interacting. The client
must know very few things a-priori. The server will drive the client and pass in the information
required to progress and to perform the intended operations. The more a client knows about the
server, the more closely it.

Q . 23 What is difference between resource oriented architecture (ROA) and service oriented
architecture (SOA) ?

ANS: REST is based on the concept of a resource. A resource can be defined as any relevant entity in
anapplication?s domain that is exposed on the network. A webpage, a video, and an order on an e-
commerce website can all be considered web resources. A resource is anything with which a user
interacts while progressing toward some goal. Anything can be mapped as a resource, as long as it
is meaningful for the application. Resources are characterized by some data, such as the title of the
page or the items in an order.
A SOA refers to an architecture where two endpoints communicate through a pre-defined set of
messaging contracts. A client starts interacting with a server by retrieving the list of available
services and how these can be mapped to HTTP messages, in a Web Service Definition Language
(WSDL) document. In essence, the WSDL maps a message to a method call on the server. Remote
method calls are contained in a SOAP (an XML specification) included in the body of messages.
The presence of a WSDL document is needed to add semantics to messages.

Q 24. What is motivation behind REST architecture?

ANS: The principle of separation of concerns is a fundamental of the REST architecture.


According to this principle, each element of a system is responsible for a specific concern. Well-
separated concerns allow for modularity, reusability, and independent evolution of the system?s
elements. AREST architecture builds on:
• clients (or user agents, such as browsers), which are the application interface
and initiate the interactions
• servers (origin servers) host resources and serve client requests.
Intermediaries act as clients and servers at the same time. Forward proxies (known to clients) are
exit points for a request. Reverse proxies appear as origin servers to a client, but actually relay
requests.

Q. 25. What are the most important characteristics of REST architecture?

ANS: A REST architecture is characterized by uniform interfaces: all connectors


within the system must conform to this interface?s constraints. Collectively, REST
definesthe following principles:
• identification of resources
• manipulation of resources through representations
• self-descriptive messages
• hypermedia as the engine of application states
An application that follows the above principles is termed RESTful.

Q 26. Explain statelessness characteristics of REST architecture?

ANS: An important principle of REST is statelessness. Statelessness implies that no state


information must be kept on the client and server sides, thus avoiding the need to use cookies or to
introduce the concept of sessions, which demand a stricter coupling between the endpoints. All
requests must therefore be stateless. In order to preserve statelessness, each message must be self-
descriptive. This means that all requests must contain all the information to understand the request
so that servers can process them without context (about the state of the client). There is no state
information maintained between clients and servers: the state of the client is contained in the
request, so the server is relieved from the burden of keeping track of the client state.
Q. 27. How M2M is different from IoT?

ANS: IoT systems may incorporate some M2M nodes (such as a Bluetooth mesh using non-
IP com- munication) but it is significantly different at different level of system. Importance
differencecan be given as:
a) Communication Protocols: M2M and IoT can differ in how the communication between
the machines or devices happens. M2M uses either proprietary or non-IP based communi-
cation protocols for communication within the M2M area networks. Commonly uses M2M
protocols include ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Commu-
nication (PLC), 6LoWPAN, IEEE 802.15.4, Z-Wave, etc. The focus of communication in
M2M is usually on the protocols below the network layer. The focus of communication in
IoT is usually on the protocols above the network layer such as HTTP, CoAP, WebSockets,
MQTT, XMPP etc.
(b) Machines in M2M vs Things in IoT : The “Things” in IoT refers to physical objects
that have unique identifiers and can sense and communicate with their external environment
(and user applications) or their internal physical states. The unique identifiers for the things
in IoT are the IP addresses (or MAC addresses). Things have software components for
accessing, processing, and storing sensor information, or controlling actuators connected.
IoT systems can have heterogeneous things, M2M systems, in contrast to IoT, typically
have homogeneous machine types within an M2M area network.
(c) Hardware vs Software Emphasis: While the emphasis of M2M is more on hardware with
embedded modules, the emphasis of IoT is more on software. loT devices run specialized software
for sensor data collection, data analysis and interfacing with the cloud through IP-based
communication.
(d) Data Collection & Analysis: M2M data is collected in point solutions and often in on-premises
storage infrastructure. In contrast to M2M, the data in IoT is collected in the cloud (can be public,
private or hybrid cloud). The analytics component analyzes the data and stores the results in the
cloud database. The IoT data and analysis results are visualized with the cloud-based applications.
The centralized controller is aware of the status of all the end nodes and sends control commands to
the nodes. Observer nodes can process information and use it for various applications, however,
observer nodes do not perform any control functions.
(e) Applications: M2M data is collected in point solutions and can be accessed by on-
premises applications such as diagnosis applications, service management applications, and
on-premisis enterprise applications. IoT data is collected in the cloud and can be accessed
by cloud applications such as analytics applications, enterprise applications, remote diagno-
sis and management applications, etc. Since the scale of data collected in IoT is so massive,
cloud-based real-time and batch data analysis frameworks are used for data analys

Q. 28. What is Software defined Network (SDN)?

ANS: Software-Defined Networking (SDN) is an emerging paradigm that promises to make


complex IP network more manageable and flexible by breaking vertical integration(the control
and data planes are bundled together), separating the network?s control logic from the underlying
routersand switches, promoting (logical) centralization of network control, and introducing the
ability to program the network.
The separation of concerns introduced between the definition of network policies, their imple-
mentation in switching hardware, and the forwarding of traffic, is key to the desired flexibility.
By breaking the network control problem into tractable pieces, SDN makes it easier to create
and introduce new abstractions in networking, simplifying network management and facilitating
network evolution.
Q 29 . Mention important characteristics of SDN?

ANS: The important characteristics of SDN network are:


• The control plane is decoupled from the data plane. Data plane hardware becomes simple
packet-forwarding devices.
• All forwarding decisions are flow-based rather than destination-based. A flow is a set of
packets that match a criterion or filter. All packets in a flow are treated with the same
forwarding and service policies. Flow programming allows for easy scaling and flexibility
with virtual switches, firewalls, and middleware.
• The control logic is also known as the SDN Controller. This software version of legacy
hardware is capable of running on commodity hardware and cloud-based instances. Its
purpose is to command and govern the simplified switching nodes.
• The control logic is also known as the SDN Controller. This software version of legacy
hardware is capable of running on commodity hardware and cloud-based instances. Its
purpose is to command and govern the simplified switching nodes.
• Network application software can reside over the SDN controller through a northbound
interface. This software can interact and manipulate the data plane with services such as
deep packet inspection, firewalls, and load balancers.

Q 30.What are key elements of SDN network?

ANS: The key elements of SDN network are:


• Centralized Network Controller: With decoupled control and data planes and centralized
network controller, the network administrators can rapidly configure the network, SDN applications
can be deployed through programmable open APIs. This speeds up innovation as the network
administrators no longer need to wait for the device vendors to embed new features in their
proprietary hardware.
• Programmable Open APIs: SDN architecture supports programmable open APIs for interface
between the SDN application and control layers (Northbound interface). With these open APIs
various network services can be implemented, such as routing, quality of service (QoS), access
control, etc.
• Standard Communication Interface (OpenFlow): SDN architecture uses a standard
communication interface between the control and infrastructure layers (Southbound interface).
OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted
SDN protocol for the Southbound interface. With OpenFlow, the forwarding plane of the network
devices can be directly accessed and manipulated.

Q 31. What are advantages of SDN ?

ANS: SDN has many important benefits over traditional network when it comes to
traffic nature of IoT.
• Service chaining: This allows a customer or provider to sell services a la carte. Cloud network
services such as firewalls, deep packet inspection, VPNs, authentication services, and policy
brokers can be linked and used on a subscription basis. Some customers may want a full set of
features, others may not choose any or may change their configuration routinely. Service chaining
allows for significant flexibility in deployments.
• Dynamic load management: An SDN enjoys the flexibility of cloud architecture, and by design
it can scale resources dynamically depending on load. This type of flexibility is crucial for the IoT
as architects need to plan for
capacity and scale as the number of things grows exponentially. Only virtual networking in the
cloud provides the ability to scale capacity when needed.
• Bandwidth calendaring: This allows an operator to partition data bandwidth and usage to
specified times and days. This is pertinent to IoT as many edge sensors only report data periodically
or at a certain time of day. Sophisticated bandwidth sharing algorithms can be constructed to time
slice capacity

Q 32. What are immportant elements of SDN Architecture?

ANS: Elements of SDN Architecture:

1. Forwarding Devices (FD): Hardware- or software-based data plane devices that perform a set of
elementary operations. The forwarding devices have welldefined instruction sets (e.g., flow rules)
used to take actions on the incoming packets (e.g., forward to specific ports, drop, forward to the
controller, rewrite some header). These instructions are defined by southbound interfaces (e.g.,
OpenFlow, ForCES ) and are installed in the forwarding devices by the SDN controllers
implementing the southbound protocols.
2. Data Plane (DP) Forwarding devices are interconnected through wireless radio channels or
wired cables. The network infrastructure comprises the interconnected forwarding devices, which
represent the data plane.
3. Southbound Interface (SI): The instruction set of the forwarding devices is defined by the
southbound API, which is part of the southbound interface. Furthermore, the SI also defines the
communication protocol between forwarding devices and control plane elements. This protocol
formalizes the way the control and data plane elements interact.
4. Control Plane (CP): Forwarding devices are programmed by control plane elements through
well-defined SI embodiments. The control plane can therefore be seen as the ?network brain?. All
control logic rests in the applications and controllers, which form the control plane.
5. Northbound Interface (NI): The network operating system can offer an API to application
developers. This API represents a northbound interface, i.e., a common interface for developing
applications. Typically, a northbound interface abstracts the low level instruction sets used by
southbound interfaces to program forwarding devices
6. Management Plane (MP): The management plane is the set of applications that leverage the
functions offered by the NI to implement network control and operation logic. This includes
applications such as routing, firewalls, load balancers, monitoring, and so forth. Essentially, a
management application defines the policies, which are ultimately translated to southbound-specific
instructions that program the behavior of the forwarding devices

Q 33. Describe in detail the layered architecture of SDN ?

ANS: An SDN architecture can be depicted as a composition of different layers. While some of
them arealways present in an SDN deployment, such as the southbound API, network operating
systems, northbound API and network applications, others may be present only in particular
deployments, such as hypervisor- or languagebased virtualization.
Layer I: Infrastructure
An SDN infrastructure, similarly to a traditional network, is composed of a set of networking
equipment (switches, routers and middlebox appliances). The difference is that those traditional
physical devices are now simple forwarding elements without embedded control or software to take
autonomous decisions. Configuration and communication compatibility and interoperability among
different data and control plane devices are ensured by standard open interfece like OpenFlow.
Layer II: Southbound Interfaces
Southbound interfaces (or southbound APIs) are the connecting bridges between control and
forwarding elements, thus being the crucial instrument for clearly separating control and data plane
functionality. As a central component of its design the southbound APIs represent one of the major
barriers for the introduction and acceptance of any new networking technology therefore standard
SDN southbound API like OpenFlow Emerges .
Layer III: Network Hypervisors
Hypervisors enable distinct virtual machines to share the same hardware resources. Virtual
machines can be easily migrated from one physical server to another and can be created and/or
destroyed on-demand, enabling the provisioning of elastic services with flexible and easy
management. Item Unfortunately, virtualization has been only partially realized in practice.
Layer IV: Network Operating Systems / Controllers
Networks have so far been managed and configured using lower level, device-specific instruction
sets and mostly closed proprietary network operating systems (e.g., Cisco IOS and Juniper JunOS)
SDN is promised to facilitate network management and ease the burden of solving networking
problems by means of the logically-centralized control offered by a network operating system
(NOS) The crucial value of a NOS is to provide abstractions, essential services, and common
application programming interfaces (APIs) to developers. Generic functionality as network state
and network topology information, device discovery, and distribution of network configuration
can be provided as services of the NOS. With NOSs, to define network policies a developer no
longer needs to care about the low-level details of data distribution among routing elements, for
instance
Layer V: Northbound Interfaces
The northbound interface is mostly a software ecosystem, not a hardware one as is the case of the
southbound APIs. Open and standard northbound interfaces are crucial to promote application
portability and interoperability among the different the control platforms. A northbound API can be
compared to the POSIX standard in operating systems, representing an abstraction that guarantees
programming language and controller independence.
Layer VI: Language-based Virtualization
Two essential characteristics of virtualization solutions are the capability of expressing modularity
and of allowing different levels of abstractions while still guaranteeing desired properties such as
protection Pyretic is example of such language that offers this type of high-level abstraction of
network topology. It incorporates this concept of abstraction by introducing network objects. These
objects consist of an abstract network topology and the sets of policies applied to it. Network
objects simultaneously hide information and offer the required services.
Layer VII: Programming languages
In SDNs, high-level programming languages can be designed and used to create higher level
abstractions for simplifying the task of programming forwarding devices; It enable more productive
and problem-focused environments for network software programmers, speeding up development
and innovation; It also promote software modularization and code reusability in the network control
plane and foster the development of network virtualization.
Layer VIII: Network Applications
Network applications can be seen as the ?network brains?. They implement the control-logic that
will be translated into commands to be installed in the data plane, dictating the behavior of the
forwarding devices. Software-defined networks can be deployed on any traditional network
environment, from home and enterprise networks to data centers and Internet exchange points. Such
variety of environments has led to a wide array of network applications. Existing network
applications perform traditional functionality such as routing, load balancing, and security policy
enforcement, but also explore novel approaches, such as reducing power consumption. Other
examples include fail-over and reliability functionalities to the data plane, end-to-end QoS
enforcement, network virtualization, mobility management in wireless networks, among many
others. The variety of network applications, combined with real use case deployments, is expected
to be one of the major forces on fostering a broad adoption of SDN
Q 34. What is OpenFLow ?
ANS: OpenFlow is outbound interface protocol of SDN. The OpenFlow protocol provides three
information sources for network operating systems. First, event-based messages are sent by
forwarding devices to the controller when a link or port change is triggered. Second, flow statistics
are generated by the forwarding devices and collected by the controller. Third, packet-in messages
are sent by forwarding devices to the controller when they do not known what to do with a new
incoming flow or because there is an explicit \send to controller? Action in the matched entry of the
flow table.

Q 35. What is server virtualization?

ANS: Virtualization encompasses a variety of technologies for managing computing resources,


providinga software translation layer, known as an abstraction layer, between the software and the
physical hardware. Virtualization turns physical resources into logical, or virtual, resources. A
machine running virtualization software can host numerous applications, including those that run
on different operating systems, on a single hardware platform. The solution that enables
virtualization is a virtual machine monitor (VMM), or commonly known today as a hypervisor.
This software sitsbetween the hardware and the VMs acting as a resource broker. Simply put, the
hypervisor allows multiple VMs to safely coexist on a single physical server host and share that
host?s resources.

Q 36. What is Container Virtualization?

ANS: A relatively recent approach to virtualization is known as container virtualization. In this


approach, software, known as a virtualization container, runs on top of the host OS kernel and
provides an execution environment for applications. Unlike hypervisor-based VMs, containers do
not aim to emulate physical servers. Instead, all containerized applications on a host share a
common OS kernel. This eliminates the resources needed to run a separate OS for each application
and can greatly reduce overhead. Because the containers execute on the same kernel, thus sharing
most of the base OS, containers are much smaller and lighter weight compared to a
hypervisor/guest OS VM arrangement. Accordingly, an OS can have many containers running on
top of it, compared tothe limited number of hypervisors and guest operating systems that can be
supported.
Q 37. What is Network Fucntion Virtualization?

ANS: Network Function Virtualization is defined as the virtualization of network functions by


implementing these functions in software and running them on VMs. NFV decouples network
functions, such as Network Address Translation (NAT), firewalling, intrusion detection, Domain
Name Service (DNS), and caching, from proprietary hardware appliances so that they can run in
software on VMs.NFV builds on standard VM technologies, extending their use into the networking
domain.
In traditional networks, all devices are deployed on proprietary/closed platforms. All network
elements are enclosed boxes, and hardware cannot be shared. Each device requires additional
hardware for increased capacity, but this hardware is idle when the system is running below
capacity. With NFV, however, network elements are independent applications that are flexibly
deployed on a unified platform comprising standard servers, storage devices, and switches. In this
way, software and hardware are decoupled, and capacity for each application is increased or
decreased by adding or reducing virtual resources.
Q 38. What are important principles of NFV ?

ANS: The VNFs are the building blocks used to create end-to-end network services.
Threekey NFV principles are involved in creating practical network services:
• Service chaining: VNFs are modular and each VNF provides limited functionality on its own. For
a given traffic flow within a given application, the service provider steers the flow through multiple
VNFs to achieve the desired network functionality. This is referred to as service chaining.
• Management and orchestration (MANO): This involves deploying and managing the lifecycle
of VNF instances. Examples include VNF instance creation, VNF service chaining, monitoring,
relocation, shutdown, and billing. MANO also manages the NFV infrastructure elements.
• Distributed architecture: A VNF may be made up of one or more VNF components (VNFC),
each of which implements a subset of the VNF?s functionality. Each VNFC may be deployed in one
or multiple instances. These instances may be deployed on separate, distributed hosts to provide
scalability and redundancy.

Q 39. Mention important concept of NFV Architecture?

ANS:

• Network Function Virtualization Infrastructure (NFVI): The totality of all hardware and
software components that build up the environment in which virtual network functions (VNFs) are
deployed. The NFVI can span across several locations (that is, multiple points of presence [N-
PoPs). The network providing connectivity between these locations is considered to be part of the
NFVI.

• NFVI-Node: Physical devices deployed and managed as a single entity, providing the NFVI
functions required to support the execu- tion environment for VNFs.
• Virtual Network: A topological component used to affect routing of specific characteristic
information. The virtual network is bounded by its set of permissible network interfaces. In the
NFVI architecture, a virtual network routes information among the network interfaces of VM
instances and physical network interfaces, providing the necessary connectivity.
• Virtual Network Function (VNF): An implementation of an NF that can be deployed on an
NFVI. • NFVI-POP: An N-PoP where a network function is or could be deployed as
a VNF.
• Network Forwarding Path: Ordered list of connection points forming a chain of NFs, along with
policies associated with the list.
• VNF Forwarding Path: Graph of logical links connecting VNF nodes for the pur- pose of
describing traffic flow between these network func- tions.

Q 40. Describe NFV reference architecture in detail

ANS: This framework supports the implementation of network functions as software-


onlyVNFs. The NFV framework consists of three domains of operation:
• Virtualized network functions: The collection of VNFs, implemented in software, that run over
the NFVI.
• NFV infrastructure (NFVI): The NFVI performs a virtualization function on the three main
categories of devices in the network service environment computer devices, storage devices, and
network devices.
• NFV management and orchestration: Encompasses the orchestration and lifecycle management
of physical/software resources that support the infrastructure virtualization, and the lifecycle
management of VNFs. NFV management and orchestration focuses on all virtualization-specific
management tasks necessary in the NFV framework.

You can view this architecture as consisting of four major blocks:


• NFV infrastructure (NFVI): Comprises the hardware and software resources that create the
environment in which VNFs are deployed. NFVI virtualizes physical computing, storage, and
networking and places them into resource pools.
• VNF/EMS: The collection of VNFs implemented in software to run on virtual computing,
storage, and networking resources, together with a collection of element management systems
(EMS) that manage the VNFs.
• NFV management and orchestration (NFV-MANO): Framework for the management and
orchestration of all resources in the NFV environment. This includes computing, networking,
storage, and VM resources.
• OSS/BSS: Operational and business support systems implemented by the VNF service provider
Q.41. What are important advantages of NFV ?

ANS: If NFV is implemented efficiently and effectively, it can provide a number of benefits
compared totraditional networking approaches.
The following are the most important potential benefits:
• Reduced CapEx, by using commodity servers and switches, consolidating equipment, exploiting
economies of scale, and supporting pay-as-you grow models to eliminate wasteful
overprovisioning.
• Reduced OpEx, in terms of power consumption and space usage, by using commodity servers and
switches, consolidating equipment, and exploiting economies of scale, and reduced network
management and control expenses.
• The ability to innovate and roll out services quickly and also lowers the risks associated with
rolling out new services, allowing providers to easily trial and evolve services to determine what
best meets the needs of customers.
• Ease of interoperability because of standardized and open interfaces
• Use of a single platform for different applications, users and tenants. This allows network
operators to share resources across services and across different customer bases.
• Provided agility and flexibility, by quickly scaling up or down services to address changing
demands.
• Targeted service introduction based on geography or customer sets is possible. Services can be
rapidly scaled up/down as required.
• A wide variety of ecosystems and encourages openness. It opens the virtual appliance market to
pure software entrants, small players and academia, encouraging more innovation to bring new
services and new revenue streams quickly at much lower risk.
Q 42. What is differences and similarity between NFV and SDN?
ANS: The core similarity between software-defined networking (SDN) and network functions
virtualization (NFV) is that they both use network abstraction. Both depend heavily on
virtualization to enable network design and infrastructure to be abstracted in software and then
implemented by underlying software across hardware platforms and devices. SDN seeks to separate
network control functions from network forwarding functions, while NFV seeks to abstract network
forwarding and other networking functions from the hardware on which it runs. SDN abstracts
physical networking resources ?switches, routers and so on ? and moves decision making to a
virtual network control plane. In this approach, the control plane decides where to send traffic,
while the hardware continues to direct and handle the traffic. NFV aims to virtualize all physical
network resources beneath a hypervisor, which allows the network to grow without the addition of
more devices. When SDN executes on an NFV infrastructure, SDN forwards data packets from one
network device to another. At the same time, SDN’s networking control functions for routing,
policy definition and applications run in a virtual machine somewhere on the network. Thus, NFV
provides basic networking functions, while SDN controls and orchestrates them for specific uses.
SDN further allows configuration and behavior to be programmatically defined and modified.

Q. 43. How SDB and NFV can be deployed together ?

ANS: The concern of a network service provider is about the set of network devices (such as
routers) andthe control and management of the functions they perform (such as packet
forwarding). Both SDF and NFV can be used seperately to provide this but SDN and NFV are not
mutually exclusive. If both SDN and NFV are implemented for a network, the following
relationships hold:
• The relationship between SDN and NFV is perhaps viewed as SDN functioning as an enabler of
NFV.
• Network data plane functionality is implemented on VMs.
• The control plane functionality may be implemented on a dedicated SDN platform or on an SDN
VM.
• A major challenge with NFV is to best enable the user to configure a network so that VNFs
running on servers are connected to the network at the appropriate place, with the appropriate
connectivity to other VNFs, and with desired QoS
• With SDN, users and orchestration software can dynamically configure the network and the
distribution and connectivity of VNFs.
• Without SDN, NFV requires much more manual intervention, especially when resources beyond
the scope of NFVI are part of the environment.

Q. 44. What are benefit of using SDN/NFV in IoT ecosystem ?

ANS: The key advantages in employing SDN/NFV in IoT are:


1. Solving Interoperability in the Internet of Things: Interoperability challenge in IoT arises
when we have heterogeneous devices exchanging data formats and diverse protocols for machine to
machine (M2M) data exchange, and also with the interconnectivity of large number of different
devices, there is lack of cooperation and capability mismatch between devices which can hinder the
performance of the network. However, SDN approach brings flexibility which can be used to allow
different objects connected to heterogeneous networks to communicate with each other. This will be
able to handle simultaneous connections of various communication technologies. Network
management decisions such as routing, scheduling can be done at the SDN controller and moreover,
the programmability allows for any updates for new proposals or even clean state approaches.
2. Discoverability: Discoverability in IoT devices is one of the main factors in achieving a
successful deployment of IoT applications to prevent long outages and configuration errors. The
ability to self-configure and adapt to the environment without human intervention brings about
requirements such as resource and service discovery. It is not feasible to manually configure each
and every device in order to discover which objects are nearby and which functions they provide.
SDN approach can be used to address this issue which allows applications to operate with devices
with minimal or no configuration.
3. Security: Having large number of heterogeneous devices that are involved in the Internet of
Things, there is high propensity to be vulnerable to attacks, and ensuring data protection, data
authentication needs to be taken seriously. Security threats can be easier to attack through the
improved visibility SDN provides to the network. SDN can also provide a dynamic, intelligent,
selflearning layered model of security that provides access rules to ensure authorization for people
who are allowed to change the configuration of devices.
4. Management: The SDN controller manages and supervises the entire network. The centralized
position of the SDN controller makes it suitable to have a global vision of the network topology and
conditions, performing network control such as routing and QoS control. The controller can
determine the best routing decisions and inserting these decisions into the flow tables. The sensor
nodes do not make routing decisions but only forward and drop packets according to the rules set by
the controller. The scheduling must be built over defined routes and the controller can optimize the
sleep/active cycles of the sensors by choosing the most energy-efficient set in every scheduling
cycle. Latency can be reduced and significant energy savings can be achieved.
5. Scalability Issues: The rapid growth of embedded technologies is leading to enormous
deployment of miniaturized devices (sensors, actuators, etc.). As the number of devices grows, the
data produced by these devices grow unboundedly. SDN can improve scalability issues in IoT
network where the SDN controller oversees the network domain and communicates with other SDN
controllers to exchange aggregated network-wide formation. The distributed SDN model tends to
share the load among several controllers. This easily helps in adapting to the users and applications.
This is a distributed way and spreads functionality across several nodes. This brings many benefits
such as (1) scalability (2) reducing latency from the sensor nodes to closest controller, (3) load
balancing (4) fault-tolerance among others. With multiple controllers, this can be used to offload
computational tasks which brings benefits in terms of administration. Each domain has its SDN
controller which controls all traffic in its domain. When one SDN controller fails, another SDN
controller can take control to avoid network failures.
6. Application Specific Requirements: As earlier stated that some IoT applications works in
realtime, so a need to support real-time applications is required in an IoT environment where it is
expected to monitor different things at different time periods. SDN is able to strengthen network
controlling ability and also perform dynamic adaptation of control logic by the devices in real-time.
SDN and its extension to the Wireless Sensors and Actuators Domain will give the possibility to
support application specific requirements with control logic that jointly act at the network and
processing level enhancing the QoS/QoE of the entire system.
7. Service Chain Simplification and Application Provisioning: SDN and NFV can make service
chain shorter and simpler by increasing the efficiency and capacity of the network without radically
changing hardware making it easier to spin up IoT applications. SDN & NFV will help service
providers to enhance their service delivery infrastructure which is very important in the contribution
to the IoT. This addresses the issues of network ossification by utilizing the network resources in a
better way and transiting to softwarecentric programmable networks due to the rapid evolution and
dynamicity of IoT applications.

Q. 45. How can you make your smart home using IoT?

ANS: IoT ecosystem can help in various way to make your home smart. Some of them are:
Smart Lighting: Smart lighting for homes helps in saving energy by adapting the lighting to the
ambient conditions and switching on/off or dimming the lights when needed. Key enabling
technologies for smart lighting include solid state lighting (such as LED lights) and IP-enabled
lights. Smart lighting solutions for home achieve energy savings by sensing the human movements
and their environments and controlling the lights accordingly.
Smart Appliances:
Modern homes have a number of appliances such as TVs, refrigerators, music systems,
washer/dryers, etc. Managing and controlling these appliances can be cumbersome, with each
appliance having its own controls or remote controls. Smart appliances make the management
easier and also provide status information to the users remotely.
Intrusion Detection: Home intrusion detection systems use security cameras and sensors (such as
PIR sensors and door sensors) to detect intrusions and raise alerts. Alerts can be in the form of an
SMS or an email sent to the user. Advanced systems can even send detailed alerts such as an image
grab or a short video clip sent as an email attachment.
Smoke/Gas Detectors: Smoke detectors are installed in homes and buildings to detect smoke that
is typically an early sign of fire. Smoke detectors use optical detection, ionization or air sampling
techniques to detect smoke. Alerts raised by smoke detectors can be in the form of signals to a fire
alarm system, Gas detectors can detect the presence of harmful gases such as carbon monoxide
(CO), liquid petroleum gas (LPG), etc. A smart smoke/gas detector can raise alerts in human voice
describing where the problem is, send or an SMS or email to the user or the local fire safety
department and provide visual feedback on its status (healthy, battery-low, etc.).

Q.46. What role IoT play in making your city smart? Mention some application areas.

ANS: The new Internet of Things (IoT) applications are enabling Smart City initiatives worldwide. It
provides the ability to remotely monitor, manage and control devices, and to create new insights and
actionable information from massive streams of real-time data.
Smart Lighting: Smart lighting systems for roads, parks and buildings can help in saving energy.
Smart lighting allows lighting to be dynamically controlled and also adaptive to the ambient
conditions. Smart lights connected to the Internet can be controlled remotely to configure lighting
schedules and lighting intensity. Custom lighting configurations can be set for different situations
such as a foggy day, a festival, etc. Smart lights equipped with sensors can communicate with other
lights and exchange information on the sensed ambient conditions to adapt the lighting.
Smart Roads: Smart roads equipped with sensors can provide information on driving conditions,
travel time estimates and alerts in case of poor driving conditions, traffic congestions and accidents,
Such information can help in making the roads safer and help in reducing traffic jams. Information
sensed from the roads can be communicated via Internet to cloud-based applications and social
media and disseminated to the drivers who subscribe to such applications.
Smart Parking: Finding a parking space during rush hours in crowded cities can be time
consuming and frustrating. Furthermore, drivers blindly searching for parking spaces create
additional traffic tion. Smart parking make the search for parking space easier and convenient for
Smart parking are powered by IoT systems that detect the number of empty parking slots and send
the information over the Internet to smart parking application back-ends, These applications can be
accessed by the drivers from smart-phones, tablets and in-car navigation systems.
Structural Health Monitoring: Structural Health Monitoring c a network of sensors to monitor the
vibration levels in the structures such as bridges and buildings. The data collected from these
sensors is analyzed to assess the health of the structures. By analyzing the data it is possible to
detect cracks and mechanical breakdowns, locate the damages to a structure and also calculate the
remaining life of the structure.
Surveillance: Surveillance of infrastructure, public transport and events in cities is required to
ensure safety and security. City wide surveillance infrastructure comprising of large number of
distributed and Internet connected video surveillance cameras can be created. The video feeds from
surveillance cameras can be aggregated in cloudbased scalable storage solutions.
Emergency Response: ToT systems can be used for monitoring the critical infrastructure in cities
such as buildings, gas and water pipelines, public transport and power substations. IoT systems for
fire detection, gas and water leakage detection can help in generating alerts and minimizing their
effects on the critical infrastructure. IoT systems for critical infrastructure monitoring enable
aggregation and sharing of information collected from large number of sensors.
Q. 47. How IoT can help in monitoring various aspect of environment ?

ANS: Weather Monitoring: IoT-based weather monitoring systems can collect data from a number
of sensor attached (such as temperature, humidity, pressure, etc.) and send the data to cloudbased
applications and storage back-ends. The data collected in the cloud can then be analyzed and
visualized by cloud-based applications. Weather alerts can be sent to the subscribed users from such
applications.
Air Pollution Monitoring: IoT based air pollution monitoring systems can monitor emission of
harmful gases (CO, CO, NO, NOp, etc.) by factories and automobiles using gaseous and
meteorological sensors. The collected data can be analyzed to make informed decisions on
pollutions control approaches.
Noise Pollution Monitoring: Due to growing urban development, noise levels in cities have
increased and even become alarmingly high in some cities, Noise pollution can cause health hazards
for humans due to sleep disruption and stress. Noise pollution monitoring can help in generating
noise maps for cities, Urban noise maps can help the policy makers in urban planning and making
policies to control noise levels near residential areas, schools and parks.
Forest Fire Detection: Forest fires can cause damage to natural resources, property and human
life. There can be different causes of forest fires including lightening, human negligence, volcanic
eruptions and sparks from rock falls. Early detection of forest fires can help in minimizing the
damage. IoT based forest fire detection systems use a number of monitoring nodes deployed at
different locations in a forest. Each monitoring node collects measurements on ambient conditions
including temperature, humidity, light levels, etc.
River Floods Detection: River floods can cause extensive damage to the natural and human
resources and human life. River floods occur due to continuous rainfall which cause the river levels
to rise and flow rates to increase rapidly. Early warnings of floods can be given by
monitoring the water level and flow rate. IoT based river flood monitoring system
use a number of sensor nodes that monitor the water level (using ultrasonic sensors)
and flow rate (using the flow velocity sensors). Data from a number of such sensor
nodes is aggregated in a server or in the cloud. Monitoring applications raise alerts
when rapid increase in water level and flow rate is detected.

Q. 48. Explain the importance of IoT in managing modern energy production and
distribution system.

ANS: IoT can play critical role in managing energy production and distribution system. Few areas
where it can play important are:
Smart Grids: Smart Grid is a data communications network integrated with the electrical grid that
collects and analyzes data captured in near-real-time about power transmission, distribution, and
consumption. Smart Grid technology provides predictive information and recommendations to
utilities, their suppliers, and their customers on how best to manage power. Smart Grids collect data
regarding electricity generation (centralized or distributed), consumption (instantaneous or
predictive), storage (or conversion of energy into other forms), distribution and equipment health
data. Smart grids use high-speed, fully integrated, two-way communication technologies for real-
time information and power exchange. By using loT based sensing and measurement technologies,
the health of equipment and the integrity of the grid can be evaluated.
Smart Meter: Smart metering benefits utilities by improving customer satisfaction with faster
interaction, while giving consumers more control of their energy usage to save money and reduce
carbon emissions.
Smart metering helps utilities to:
• Reduce operating expenses by managing manual operations remotely
• Improve forecasting and streamline power-consumption
• Improve customer service through profiling and segmentation
• Reduce energy theft
• Simplify micro-generation monitoring and track renewable power
In addition Smart Meters can enable an array of new smart services to residential, commercial, and
industrial customers to better manage their energy usage patterns, reduce overall power
consumption and even benefit from new pricing models.
Renewable Energy Systems: Due to the variability in the output from renewable energy sources
(such as solar and wind), integrating them into the grid can cause grid stability and reliability
problems. Variable output produces local voltage swings that can impact power quality. Existing
grids were designed to handle power flows from centralized generation sources to the loads through
transmission and distribution lines. When distributed renewable energy sources are integrated into
the grid, they create power bi-directional power flows for which the grids were not originally
designed. IoT based systems integrated with the transformers at the point of interconnection
measure the electrical variables and how much power is fed into the grid.
Prognostics: Energy systems (smart grids, power plants, wind turbine farms, for instance) have
a large number of critical components that must function correctly so that the systems can perform
their operations correctly. Energy systems have thousands of sensors that gather real-time
maintenance data continuously for condition monitoring and failure prediction purposes. IoT based
prognostic real-time health management systems can predict performance of machines or energy
systems by analyzing the extent of deviation of a system from its normal operating profiles.
Smart light, temperature, air condition control: The most obvious way to save energy is to cut
down on wasting it. Smart lighting, learning thermostats and sensor-based HVAC systems of the
new generation are designed to automatically maintain the perfect conditions in spaces and keep
energy use at the optimum level. Equipped with different sensors (light, movement, humidity, CO2
level, etc.) these systems can dynamically adjust the regimes depending on the changing conditions
and avoid using energy in potential waste points.
Energy Storage System: In the case of smart storage, for example, the residents can make
informed decisions no the loads and choose which loads should be protected, how much energy
should be spent in the off-grid mode and where. Moreover, using smart storage, the adopters of
solar and other renewables can now better manage the clean energy they generate, control the
surplus and ensure maximized performance for their power network. In other words, energy storage
is the application of Internet of Things in energy management which enables saving energy both
directly and indirectly
Connected stations, plants, solar and wind fields: Another application of IoT for saving energy
is focused on optimizing the very source of power production. Stations, plants, solar fields and wind
turbines also consume energy, require maintenance and a wide range of effort and resource-heavy
works to keep them running. Using IoT in this sector, or Internet of Energy Things, is the right way
to maximize the performance. Resource management in Internet of Energy Things implies a
complex of measures to optimize the performance at a power grid. It includes using sensors, data
analytics, predictive maintenance and other practices. Predictive maintenance ensures timely repair
of the equipment and prevents blackouts, accidents and costly downtime.

Q. 49. Explain how IoT is modernizing the retail system ?

ANS: Inventory Management: Inventory management for retail has become increasingly
important inthe recent years with the growing competition. While over-stocking of products can
result in additional storage expenses and risk (in case of perishables), under-stocking can lead to
loss of revenue. loT systems using Radio Frequency Identification (RFID) tags can help in
inventory management and maintaining the right inventory levels.
Smart Payments: Smart payment solutions such as contact-less payments powered by
technologies such as Near field communication (NFC) and Bluetooh, Near field communication
(NFC) is a set of standards for smart-phones and other devices to communicate with each other by
bringing them into proximity or by touching them. Customers can store the credit card information
in their NFC-enabled smart-phones and make payments by bringing the smart-phones near the point
of sale terminals.
Smart Vending Machines: Smart vending machines connected to the Internet allow remote
monitoring of inventory levels, elastic pricing of products, promotions, and contact-less payments
using NFC. Smart-phone applications that communicate with smart vending machines allow user
preferences to be remembered and learned with time. When a user moves from one vending
machine to the other and pairs the smart-phone with the vending machine, a user specific interface
is presented.

Q 50. Describe in what way IoT can make Logistic buisness simple, efficient and relaible ?

ANS: Route Generation & Scheduling: Modern transportation systems are driven by data
collected from multiple sources which is processed to provide new services to the stakeholders, By
collecting large amount of data from various sources and processing the data into useful
information, data- driven transportation systems can provide new services such as advanced route
guidance, dynamic vehicle routing, anticipating customer demands for pickup and delivery
problem, for instance, Route generation and scheduling systems can generate end-to-end routes
using combination of route patterns and transportation modes and feasible schedules based on the
availability of vehicles.
Fleet Tracking: Vehicle fleet tracking systems use GPS technology to track the locations of the
vehicle real-time. Cloud-based fleet tracking systems can be scaled up on demand to handle large
number of vehicles. Alerts can be generated in case of deviations in planned routes. The vehicle
locations and routes data can be aggregated and analyzed for detecting bottlenecks in the supply
chain such as traffic congestions on routes, assignments and generation of alternative routes, and
supply chain optimization.
Shipment Monitoring: IoT based shipment monitoring systems use sensors such as temperature,
pressure, humidity, for instance, to monitor the conditions inside the containers and send the data to
the cloud, where it can be analyzed to detect food spoilage. The analysis and interpretation of data
on the environmental conditions in the container and food truck positioning can enable more
effective routing decisions in real time. Therefore, it is possible to take remedial measures such as -
the food that has a limited time budget before it gets rotten can be re-routed to a closer destinations,
alerts can be raised to the driver and the distributor about the transit conditions, such as container
temperature exceeding the allowed limit, humidity levels going out of the allowed limit, for
instance, and corrective actions can be taken before the food gets damaged.

Q. 51. Explain how IoT ecosystem can help in increasing the yield of Agriculture?

ANS: Smart Irrigation: Smart irrigation systems use IoT devices with soil moisture sensors to
determinethe amount of moisture in the soil and release the flow of water through the irrigation
pipes only when the moisture levels go below a predefined threshold. Smart irrigation systems also
collect moisture level measurements on a server or in the cloud where the collected data can be
analyzed to plan watering schedules.
Green House Control: Green houses are structures with glass or plastic roofs that provide
conducive environment for growth of plants. The climatological conditions inside a green house
can be monitored and controlled to provide the best conditions for growth of plants. IoT systems
play an important role in green house control and help in improving productivity. The data collected
from various sensors is stored on centralized servers or in the cloud where analysis is performed to
optimize the control strategies and also correlate the productivity with different control strategies.
Climate Conditions: Climate plays a very critical role for farming. And having improper
knowledge about climate heavily deteriorates the quantity and quality of the crop production. But
IoT solutions enable you to know the real-time weather conditions. Sensors are placed inside and
outside of the agriculture fields. They collect data from the environment which is used to choose the
right crops which can grow and sustain in the particular climatic conditions. The whole IoT
ecosystem is made up of sensors that can detect real-time weather conditions like humidity, rainfall,
temperature and more very accurately.
Precision Farming: Precision Agriculture/Precision Farming is one of the most famous
applications of IoT in Agriculture. It makes the farming practice more precise and controlled by
realizing smart farming applications such as livestock monitoring, vehicle tracking, field
observation, and inventory monitoring. The goal of precision farming is to analyze the data,
generated via sensors, to react accordingly. Precision Farming helps farmers to generate data with
the help of sensors and analyze that information to take intelligent and quick decisions.
Crop management: One more type of IoT product in agriculture and another element of precision
farming are crop management devices. Just like weather stations, they should be placed in the field
to collect data specific to crop farming; from temperature and precipitation to leaf water potential
and overall crop health.Thus, you can monitor your crop growth and any anomalies to effectively
prevent any diseases or infestations that can harm your yield.
DRONES Monitoring: Agriculture is one of the major industries to incorporate drones. Drones
equipped with sensors and cameras are used for imaging, mapping and surveying the farms. There
are ground based drones and aerial drones. Ground drones are bots that survey the fields on wheels.
Aerial drones- formally known as unmanned aerial vehicles (UAVs) or unmanned aircraft systems
(UASes) are flying robots. From the drone data, insights can be drawn regarding crop health,
irrigation, spraying, planting, soil and field, plant counting and yield prediction and much more
Remote Sensing: IoT based remote sensing utilizes sensors placed along the farms like weather
stations for gathering data which is transmitted to analytical tool for analysis. Sensors are devices
sensitive to anomalies. Farmers can monitor the crops from analytical dashboard and take action
based on insights.

Q. 52. What are the advantages of IoT?

ANS: Key benefits of IoT technology are as follows:


• Technical Optimization: IoT technology helps a lot in improving techniques and making
them better. For example, with IoT, a manufacturer is able to collect data from various car
sensors. The manufacturer analyses them to improve its design and make them more
efficient.
• Improved Data Collection: Traditional data collection has its limitations and its design for
passive use. IoT facilitates immediate action on data.
• Reduced Waste: IoT offers real-time information leading to effective decision making &
management of resources. For example, if a manufacturer finds an issue in multiple car
engines, he can track the manufacturing plan of those engines and solves this issue with the
manufacturing belt.
• Improved Customer Engagement: IoT allows you to improve customer experience by
detecting problems and improving the process.
Q. 53. What is Thermocouple?
ANS: A Thermocouple is a device which consists of two different conductors joined together to form
anelectrical junction.
Q.54. What are the sensors can be used in Agriculture?

ANS: 1.soil moisture


sensor 2.Airflow sensors
3.Electrochemical sensors
Q. 55. List out some of the water sensors?

ANS:
1.Total organic carbon sensor
2.Turbidity sensor
3.Conductivity sensor
4.pH sensor

Q.56. What is the Purpose of MQTT protocol?


ANS: MQTT – Message Queue Telemetry Transport. Its provide the connectivity between
application and middleware from net side networks to another side networks.

Q. 57. What are the most common IoT applications?


ANS: The most common IoT applications are:
• Smart Thermostats: Helps you to save resources on heating bills by knowing your usage
patterns.
• Connected Cars: IoT helps automobile companies handle billing, parking, insurance, and
other related stuff automatically.
• Activity Trackers: Helps you to capture heart rate patterns, calorie expenditure, activity
levels, and skin temperature on your wrist.
• Smart Outlets: Remotely turn any device on or off. It also allows you to track a device's
energy level and get custom notifications directly into your smartphone.
• Parking Sensors: IoT technology helps users to identify the real-time availability of parking
spaces on their phones.
• Connect Health: The concept of a connected healthcare system facilitates real-time health
monitoring and patient care. It helps in improved medical decision-making based on patient
data.
Q. 58. What are the advantages of IoT?
ANS: Key benefits of IoT technology are as follows:
• Technical Optimization: IoT technology helps a lot in improving techniques and making
them better. For example, with IoT, a manufacturer is able to collect data from various car
sensors. The manufacturer analyses them to improve its design and make them more
efficient.
• Improved Data Collection: Traditional data collection has its limitations and its design for
passive use. IoT facilitates immediate action on data.
• Reduced Waste: IoT offers real-time information leading to effective decision making &
management of resources. For example, if a manufacturer finds an issue in multiple car
engines, he can track the manufacturing plan of those engines and solves this issue with the
manufacturing belt.
• Improved Customer Engagement: IoT allows you to improve customer experience by
detecting problems and improving the process.
Q. 59. What are the challenges of IoT?
ANS: Important challenges of IoT are:
• Insufficient testing and updating
• Concern regarding data security and privacy
• Software complexity
• Data volumes and interpretation
• Integration with AI and automation
• Devices require a constant power supply which is difficult
• Interaction and short-range communication

Q. 60. When you say the Internet of Things, what do you mean by the “thing”?
ANS: In the Internet of Things implementation world, the word “Thing” has a more meaningful
approach because it takes into consideration of an idea. For example, A” thing” can be a shipping
container which has an RFID tag associated with it and it is shipped from one location to another
where it gives out the current information whenever the RFID tag passes through an RFID
reader.Another example is a microchip integrated into your mobile phone or a fitness band which
continuously monitors your physical movements and then push the information to the central
repository over the internet.

Q. 61. Describe the different components of IOT


ANS: An IoT device typically comprises four major components.
• Sensors – Much of IoT involves environment adaptability and the major factor contributing
to it are the sensors in the IoT devices. Sensors are devices which enable the IoT devices to
gather data from its surroundings. Effectively, they may be perceived as instruments which
sense the environment and perform multiple tasks. Senors make the IoT devices capable of
real world integration. It can be of varied types. From a simple GPS in your phones to the
live video feature on a social media platform.
• Connectivity- With the advent of cloud computing, devices can be launched on a cloud
platform and in the due course, devices can interact freely with each other at a cheaper and
more transparent scale. For IoT devices, cloud computing facilitates freedom from exclusive
network providers. Instead, small network connection mediums like mobile satellite
networks, WAN, Bluetooth etc. are used.
• Data Processing – As as soon as the environmental stimuli are gathered by the sensors and
transmuted to the cloud, it is the job of the data processors to process the information
collected and perform the required tasks. From adjusting the temperatures of the AC to facial
recognition on mobile phones or biometric devices, data processing software are largely
responsible for enhancing the automation in IoT devices.
• User Interface – The IoT introduced a new paradigm among the available devices for active
interaction and engagement. This has transformed the user interface widely. Instead of one-
way communication mechanisms of traditional devices, IoT enables cascading effects on
end-user commands. This is precisely why IoT devices are all the more communicative and
active.
Q. 62. Give examples of the Impact of Internet of Things (IoT) on our lives?
ANS: With interconnected devices, you can better arrange your lifestyles and be extra productive,
safer, smarter and informed than ever earlier than.
As an instance how smooth it’ll be that allows you to begin your day if your alarm clock is not only
capable of wake you up however also able to talk together with your brewer to tell it that you are
awake on the same time notifies your geezer to startwater heating.

Q. 63. How is business IoT (IIoT) exclusive from the internet of things (IoT)?
ANS: Internet of Things:- Everyday comsumer-level gadgets related to one another and made
smarter and barely self-aware. For examples: Comsumer cellular phone, smart thermostat.
Industrial Internet of Things:- System and structures in industries and groups in which failures
may be disastrous. For examples: Man or woman health video display units and alert structures in
hospitals.
Q. 64. What impacts will the Internet of Things (IoT) have on Health Care Sector?
ANS: IoT has many applications inside the healthcare field, in both fitness tracking and treatment,
together with telemedicine and telehealth. Applications may additionally contain the usage of a
medical era and the internet to provide lengthy-distance health care and training. Medical devices,
which may be wearable or non-wearable, or maybe implantable, injectable, or ingestible, can allow
far off monitoring of an affected person’s important signs, persistent situations, or different
indicators ofhealth and wellbeing.
Q. 65. What are the main Social and Cultural Impacts of Internet Of Things (IoT)?
ANS: The IoT may also create webs of connections a good way to basically transform the manner
people and things interact with every other.
Some observers have proposed that the growth of iot will bring about a hyper- connected world
wherein the seamless integration of gadgets and people will purpose the internet to vanish as a
separate phenomenon. In this type of system, cyberspace and human space would seem to correctly
merge right into an unmarried surrounding, with unpredictable but probably huge societal and
cultural influences.
Q. 66. What are the main challenges of an Internet of Things (IoT)?
ANS: Safety is one of the important concerns of professionals who believe definitelyendless linked
gadgets and statistics sharing can severely compromise one’s safety and properly being. Through
IoT devices, we can open a gateway for an entire community to hack, not like other hacking
episodes which compromise online information and privacy.
Q. 67. What is Bluetooth Low Energy (BLE) Protocol for an Internet of Things (IoT)?
ANS: Nokia originally introduced this protocol as wibree in 2006. Additionally known as Bluetooth
smart this protocol presents the same range coverage with a good deal of decreased strength intake
because of the unique Bluetooth. It has comparable bandwidth with narrow spacing as utilized by
Zigbee. Low electricity latency and decrease complexity makeable greater appropriate to include
into low-cost microcontrollers.
Q. 68. What are the top 5 Machine-to-Machine (M2M) applications in the world?

ANS:
1. Asset tracking and/or monitoring in some form or some other (stolen automobiles, fleet,
construction system, wood pellets, tank level tracking, and many others.) seems to be the biggest.
2. Insurance telematics is huge as it gives insurance groups the possibility to cut threat and force
higher/extra appealing pricing.
3. Utilities/automatic meter reading/clever grids – plenty of regulation and funding into this in the
intervening time. There a plenty of countrywide solutions because the requirements and business
case are driven in very numerous ways.
4. Automotive is also very big and is driven by consumers demand.
5. mHealth is also there but not that big in size.

Q. 69. How Iot can impact Life style of Human?

ANS:
Wearable IoT devices that allow non-invasive and continuous monitoring of physiological
parameters can help in continuous health and fitness monitoring. These wearable devices may can
be in various forms such as belts and wrist-bands. Wearable Electronics: Wearable electronics such
as wearable gadgets (smart watches, smart glasses, wristbands, etc.) and fashion electronics (with
electronics integrated in clothing and accessories, (e.g.. Google Glass or Moto 360 smart watch)
provide various functions and features to assist us in our daily activities and making us lead healthy
lifestyles. Smart watches that run mobile operating systems (such as Android) provide enhanced
functionality beyond just timekeeping.
Hearables: Hearables are new-age hearing aids which have completely transformed the way people
who suffered hearing loss interact with the world. Nowadays, hearables are compatible with
Bluetooth which syncs your smartphone with it. It allows you to filter, equalize and add layered
features to real-world sounds.
Moodables: Moodables are mood enhancing devices which help in improving our mood throughout
the day. It may sound like science fiction, but it?s not far from reality.Thync and Halo
Neurosciences are already working on it and has made tremendous progress. Moodables are head-
mounted wearables that send low-intensity current to the brain which elevates our mood.
Computer vision technology: Computer vision technology along with AI has given rise to drone
technology which aims to mimic visual perception and hence decision making based on it. Drones
like Skydio use computer vision technology to detect obstacles and to navigate around them. This
technology can also be used for visually impaired people to navigate efficiently.
Q.70. How IoT can help in improving Health Care system?
ANS: Healthcare services are costlier than ever, global population is aging and the number of
chronic diseases are on a rise. A new paradigm, known as the Internet of Things (IoT), has an
extensive applicability in numerous areas, including healthcare.
Simultaneous reporting and monitoring: Real-time monitoring via connected devices can save
lives in event of a medical emergency like heart failure, diabetes, asthma attacks, etc. With real-time
monitoring of the condition in place by means of a smart medical device connected to a smartphone
app, connected devices can collect medical and other required health data and use the data
connection of the smartphone to transfer collected information to a physician.
End-to-end connectivity and affordability: IoT can automate patient care workflow with the help
healthcare mobility solution and other new technologies, and next-gen healthcare facilities.
Connectivity protocols: Bluetooth LE, Wi-Fi, Z-wave, ZigBee, and other modern protocols,
healthcare personnel can change the way they spot illness and ailments in patients and can also
innovate revolutionary ways of treatment.
Data assortment and analysis: Vast amount of data that a healthcare device sends in a very short
time owing to their real-time application is hard to store and manage if the access to cloud is
unavailable. Even for healthcare providers to acquire data originating from multiple devices and
sources and analyze it manually is a tough bet. IoT devices can collect, report and analyses the data
in real-time and cut the need to store the raw data. Moreover, healthcare operations allow
organizations to get vital healthcare analytics and data-driven insights which speed up decision-
making and is less prone to errors.
Tracking and alerts: On-time alert is critical in event of life-threatening circumstances. Medical
IoT devices gather vital data and transfer that data to doctors for real-time tracking, while dropping
notifications to people about critical parts via mobile apps and other linked devices. Reports and
alerts give a firm opinion about a patient?s condition, irrespective of place and time. It also helps
make well-versed decisions and provide on-time treatment. Thus, IoT enables real-time alerting,
tracking, and monitoring, which permits hands-on treatments, better accuracy, apt intervention by
doctors and improve complete patient care delivery results.
Remote medical assistance: In event of an emergency, patients can contact a doctor who is many
kilometers away with a smart mobile apps. With mobility solutions in healthcare, the medics can
instantly check the patients and identify the ailments on-the-go. Also, numerous healthcare delivery
chains that are forecasting to build machines that can distribute drugs on the basis of patient?s
prescription and ailment-related data available via linked devices. IoT will Improve the patient?s
care In hospital. This in turn, will cut on people?s expanse on healthcare.
Ingestible sensors: Ingestible sensors are genuinely a modern-science marvel. These are pill-sized
sensors which monitor the medication in our body and warns us if it detects any irregularities in our
bodies. These sensors can be a boon for a diabetic patient as it would help in curbing symptoms and
provide with an early warning for diseases. Proteus Digital Health is one such example.

--------------------------------------------------------------------------------------------------------------------------------------

You might also like