Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

With Neat Diagram, Explain Wireless Temperature Monitoring System Using Rasp B

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

With neat diagram, explain wireless temperature monitoring system using Rasp B

Internet of Things (IoT) has provided a promising opportunity to build powerful industrial
systems and applications by leveraging the growing ubiquity of RFID, wireless, mobile and
sensor devices. A wide range of industrial IoT applications have been developed and
deployed in recent years. In an effort to understand the development of IoT in industries, this
paper reviews the current research of IoT, key enabling technologies, major IoT applications
in industries and identifies research trends and challenges. A main contribution of this
review paper is that it summarizes the current state-of-the-art of IoT in industries
systematically.
ThingSpeak is an application platform for the Internet of Things. ThingSpeak allows you to
build an application around data collected by sensors. At the heart of ThingSpeak is a
ThingSpeak Channel. A channel is where you send your data to be stored. Each channel
includes 8 fields for any type of data, 3 location fields, and 1 status field. Once you have a
ThingSpeak Channel you can publish data to the channel, have ThingSpeak process the data,
and then have your application retrieve the data.
Existing System Manually Monitoring the Industrial application By using the GSM
technology, it will take more time to get the exact situation CCTV camera monitoring is
possible but cant able to sense the gas, temperature,and position of the valves.
Proposed System The Internet of Things is regarded as the third wave of information
technology after Internet and mobile communication network, which is characterized by
more thorough sense and measure, more comprehensive interoperability and intelligence.
IOT Consumes the time and monitoring the exact situation.
Explain in detail smart city IOT architecture.A smart city IoT infrastructure is a four-
layered architecture –1) flows from devices at the street layer 2)to the city network layer and
connect to the 3)data center layer, where the data is aggregated, normalized, and
virtualized.4)The data center layer provides information to the services layer, which consists
of the applications that provide services to the city.

Street layer is composed of devices and sensors that collect data and take action based on
instructions. A sensor is a data source that generates data required to understand the physical
world. A magnetic sensor can detect a parking event by analyzing changes in the
surrounding magnetic field when a heavy metal object, such as a car or a truck, comes close
to it (or on top of it).
At the city layer, which is above the street layer, network routers and switches. Must be
deployed to match the size of city data that needs to be transported. This layer aggregates all
data collected by sensors and the end-node network into a single transport network.
Data Centre Layer - Data collected from the sensors is sent to a data center, where it can be
processed and correlated. Based on this processing of data, meaningful information and
trends can be derived, and information can be provided back. An application in a data center
can provide a global view of the city traffic and help authorities decide on the need for more
or less common transport vehicles.
Services Layer - The true value of ICT connectivity comes from the services that the
measured data can provide to different users operating within a city. The collected data
should be visualized according to the specific needs of each consumer of that data and the
particular user experience requirements and individual use cases.
Q)wap for led blink
1. Write a note on Business case for IP.

Data flowing from or to “things” is consumed, controlled, or monitored by data center


servers either in the cloud or in locations that may be distributed or centralized. Dedicated
applications are then run over virtualized or traditional operating systems or on network edge
platforms (for example, fog computing). These lightweight applications communicate with
the data center servers.
The Key Advantages of Internet Protocol
Using the Internet Protocol suite does not mean that an IoT infrastructure running IP has to
be an open or publicly accessible network. Indeed, many existing mission-critical but private
and highly secure networks, such as inter-banking networks, military and defence networks,
and public-safety and emergency-response networks, use the IP architecture.
Open and standards-based: Operational technologies have often been delivered as
turnkey features by vendors who may have optimized the communications through closed
and proprietary networking solutions. The Internet of Things creates a new paradigm in
which devices, applications, and users can leverage a large set of devices and functionalities
while guaranteeing interchangeability and interoperability, security, and management.
Versatile: A large spectrum of access technologies is available to offer
connectivity of “things” in the last mile. Additional protocols and technologies are also used
to transport IoT data through backhaul links and in the data center.
Ubiquitous: All recent operating system releases, from general-purpose
computers and servers to lightweight embedded systems (TinyOS, Contiki, and so on), have
an integrated dual (IPv4 and IPv6) IP stack that gets enhanced over time.
Scalable: As the common protocol of the Internet, IP has been massively deployed
and tested for robust scalability. Millions of private and public IP infrastructure nodes have
been operational for years, offering strong foundations for those not familiar with IP network
management.
Manageable and highly secure: Communications infrastructure requires
appropriate management and security capabilities for proper operations. Well-known
network and security management tools are easily leveraged with an IP network layer.
Stable and resilient: IP has been around for 30 years, and it is clear that IP is a workable
solution. IP has a large and well-established knowledge base and, more importantly, it has
been used for years in critical infrastructures, such as financial and defense networks.
Consumers’ market adoption: When developing IoT solutions and products targeting the
consumer market, vendors know that consumers’ access to applications and devices will
occur predominantly over roadband and mobile wireless infrastructure.
The innovation factor: The past two decades have largely established the adoption of IP
as a factor for increased innovation. IP is a standards-based protocol that is ubiquitous,
scalable, versatile, and stable.
Adoption or Adaptation of the Internet Protocol
The use of numerous network layer protocols in addition to IP is often a point of
contention between computer networking experts. Typically, one of two models,
adaptation or adoption, is proposed:
● Adaptation means application layered gateways (ALGs) must be
implemented to ensure the translation between non-IP and IP layers.
● Adoption involves replacing all non-IP layers with their IP layer
counterparts, simplifying the deployment model and operations.
Q) PROTOCOLS COAP MQTT RPL LOWPAN TISCH

CoAP Constrained Application Protocol (CoAP) resulted from the IETF Constrained
RESTful Environments (CoRE) working group’s efforts to develop a generic framework
for resource-oriented applications targeting constrained nodes and networks.
CoAP MESSAGE FORMAT

MQTT

● An MQTT client can act as a publisher to send data (or resource information) to an
MQTT server acting as an MQTT message broker.
● The MQTT client on the left side is a temperature (Temp) and relative humidity
(RH) sensor that publishes its Temp/RH data.
● The MQTT server (or message broker) accepts the network connection along with
application messages, such as Temp/RH data, from the publishers.
MQTT Message Format

3)LoWPAN Optimizing IP for IoT Using an Adaptation Layer, it highlights the TCP/IP
layers where optimization is applied.
6TiSCH(Time-Slotted Channel Hopping (TSCH) –
IEEE 802.15.4e, Time-Slotted Channel Hopping (TSCH), is an add-on to the Media
Access Control (MAC) portion of the IEEE 802.15.4 standard, with direct inheritance from
other standards, such as Wireless HART and ISA100.11a.

RPL(Routing Protocol for Low Power and Lossy Networks)


The IETF chartered the RoLL (Routing over Low-Power and Lossy Networks) working
group to evaluate all Layer 3 IP routing protocols and determine the needs and requirements
for developing a routing solution for IP smart objects

This new distance-vector routing protocol was named the IPv6 Routing Protocol for Low
Power and Lossy Networks (RPL). The RPL pecification was published as RFC 6550 by the
RoLL working group.
To cope with the constraints of computing and memory that are common characteristics of
constrained nodes, the protocol defines two modes:
Storing mode: All nodes contain the full routing table of the RPL domain. Every node
knows how to directly reach every other node.
Non-storing mode: Only the border router(s) of the RPL domain contain(s) the full routing
table.

You might also like