Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 3 IoT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

IOT U3 Notes

Unit 3
Q1 Note on webserver for IoT.
ANS:
● IoT devices typically generate a large amount of data, which requires a robust
web server to handle and process it effectively. A web server is software that
accepts requests from web clients (such as IoT devices) and responds with the
appropriate data.

● The web server used for IoT should be able to handle requests from a variety of
IoT devices with different protocols and interfaces, including HTTP, MQTT, CoAP,
and others. It should also support different data formats, such as JSON, XML,
and CSV.

● Security is a critical concern for IoT web servers, as these servers often handle
sensitive data. The web server should be designed with strong security
measures, such as encryption and authentication, to protect against
unauthorized access and data breaches.

● The web server should be highly scalable to accommodate large numbers of IoT
devices and handle spikes in traffic. This can be achieved through techniques
such as load balancing, clustering, and horizontal scaling.

● An IoT web server should be able to communicate with other systems, such as
databases and analytics platforms, to store and analyze IoT data. This requires
integration with other software and APIs.

● Finally, an IoT web server should be highly reliable, with minimal downtime and
fast response times. This can be achieved through redundancy, failover
mechanisms, and effective monitoring and management tools.

@_.vedangs._13
IOT U3 Notes

Q2 difference between data in Web server and IoT device.


ANS:

IoT device. Web server


1) IoT devices can generate a large 1) Web servers, on the other hand, typically
volume of data, such as sensor serve data that is smaller in volume, such as
readings or telemetry data, which can web pages and images.
overwhelm a web server that is not
designed to handle high data
volumes.

2) IoT devices can generate data in 2) Web servers, on the other hand, typically
various formats, depending on the serve data in standard formats, such as
type of device and its sensors. For JSON or XML.
example, data from a temperature
sensor may be in Fahrenheit or
Celsius, or data from a motion sensor
may be in binary form.

3) IoT devices can use various protocols 3)which require different processing and
to transmit data, such as HTTP, handling than the standard HTTP protocol
MQTT, or CoAP, used by web servers

4) IoT devices may transmit sensitive 4)which require stronger security measures
data, such as personal information or than those used by web servers.
control signals,

5)The data generated by IoT devices is 5)while data served by web servers is
often used to monitor and control typically used for informational or
physical systems, such as machines entertainment purposes. This context can
or appliances, affect how the data is processed and used.

6) Example:Smart home devices, such as 6)Example:Social media platforms, such as


Amazon Echo or Google Home, that Facebook or Twitter, that serve
can control various devices in a home user-generated content and media
and provide information

Q3 note on cloud for IoT


ANS:
● Scalability: Cloud computing platforms are designed to handle large volumes of data
and traffic, making them ideal for IoT deployments that require processing and analysis
of massive amounts of data.

● Data storage: Cloud platforms provide secure and reliable storage for IoT data,
eliminating the need for businesses to maintain expensive on-premises storage
solutions.

@_.vedangs._13
IOT U3 Notes

● Data processing: Cloud platforms offer a range of data processing and analytics tools
that can help organizations extract insights and value from their IoT data.

● Cost-effective: Using cloud services can be more cost-effective than building and
maintaining a dedicated infrastructure for IoT data management and analysis.

● Flexibility: Cloud platforms offer a high degree of flexibility in terms of resource


allocation, allowing businesses to adjust their capacity as needed to meet changing
demand.

● Security: Cloud providers have extensive security measures in place to protect IoT data
from cyber threats, including encryption, access controls, and intrusion detection
systems.

● Integration: Cloud platforms can integrate with a wide range of IoT devices and
protocols, enabling seamless data transmission and analysis.

● Availability: Cloud providers offer high availability and uptime guarantees, ensuring that
IoT services remain accessible even in the event of system failures or outages.

● Standardization: Cloud platforms provide standardized interfaces and protocols, making


it easier for IoT developers to build and deploy applications that work across different
devices and platforms.

Q4 Note on Node Red.


ANS:Node-RED is an open-source programming tool that provides a visual,
drag-and-drop interface for creating IoT applications and workflows. Here are some key
points to know about Node-RED:

● Flow-based programming: Node-RED uses a flow-based programming paradigm, in


which nodes represent discrete functions and can be connected to create complex
workflows.

● Visual interface: The Node-RED interface is highly visual, allowing users to create and
manipulate nodes, connect them with wires, and build flows without writing any code.

● Built-in nodes: Node-RED comes with a wide range of built-in nodes that can be used to
connect to different devices and protocols, such as MQTT, HTTP, and TCP.

● Custom nodes: Users can create their own custom nodes using JavaScript or other
programming languages, allowing for greater flexibility and customization.

@_.vedangs._13
IOT U3 Notes

● Integration with other tools: Node-RED can be easily integrated with other tools and
platforms, such as cloud services, databases, and analytics tools, using built-in nodes or
custom nodes.

● Ease of deployment: Node-RED can be deployed on a wide range of devices, from small
microcontrollers to large servers, and can be run on-premises or in the cloud.

● Open source: Node-RED is open source, which means that users can access the source
code, contribute to the project, and build their own custom nodes and extensions.

● Community support: Node-RED has a large and active community of developers and
users, who provide support, share knowledge, and contribute to the development of the
platform.

Q5 M2M vs IoT communication protocols.

Basis M2M IoT

Connection Type Used Simple device-to-device Devices use IP networks


communication usually to communicate.
within an embedded
software at the client site.

Communication Communication directly IoT sensors automation.


between machines.

Communication Protocol Communication Internet protocols like


Used technology techniques HTTP, FTP and Telnet.
and traditional protocols.

Intelligence Observation of some Objects are responsible


degree of intelligence. for decision-making.

@_.vedangs._13
IOT U3 Notes

Technology Hardware-based. Hardware and


Software-based.

Data Sharing Data sharing among Data sharing between


communicating parties other applications to
only. improve the end-user
experience.

Scope Deployed in a closed Connects to a larger


system. network.

Open API Support No open API support. Supports open API


integration.

Internet Devices do not rely on An active internet


internet connection. connection is required.

Q6 what is WSN and its types.


ANS:WSN stands for Wireless Sensor Network, which is a network of wireless sensors
that are distributed throughout a physical environment to collect data on various
physical or environmental conditions such as temperature, humidity, pressure, and more.
WSNs are commonly used in various applications such as industrial automation,
environmental monitoring, and smart cities.

There are several types of WSNs based on their characteristics, such as:

Static WSN: These WSNs have sensors that are stationary and fixed in place, and are often
used for monitoring physical conditions in a particular location.

Mobile WSN: These WSNs have sensors that are mounted on mobile objects such as robots or
vehicles, and are often used for tasks such as surveillance or environmental monitoring.

@_.vedangs._13
IOT U3 Notes

Hybrid WSN: These WSNs combine both static and mobile sensors to provide a more
comprehensive view of the physical environment.

Acoustic WSN: These WSNs use acoustic sensors to detect sounds in the environment, and
are often used for applications such as wildlife monitoring or noise pollution monitoring.

Visual WSN: These WSNs use cameras or image sensors to collect visual data, and are often
used for applications such as surveillance or traffic monitoring.

Chemical WSN: These WSNs use chemical sensors to detect various chemicals in the
environment, and are often used for applications such as air quality monitoring or water pollution
monitoring.

Health WSN: These WSNs use sensors to monitor the health and well-being of individuals, and
are often used in healthcare applications such as remote patient monitoring or elderly care.

Q7 Explain architecture of a Wsn.


ANS:
Sensor Nodes: These are the basic building blocks of a WSN, which consist of a sensor, a
processor, and a wireless communication module. The sensor is responsible for collecting data
from the environment, while the processor is responsible for processing the data and controlling
the operation of the sensor node. The wireless communication module is used to transmit data
to other nodes or to a central base station.

Base Station: This is the central node in a WSN architecture, which collects data from multiple
sensor nodes and acts as a gateway to external networks. The base station is responsible for
processing the data received from the sensor nodes and transmitting it to other networks or
devices.

Network Topology: The network topology of a WSN defines the structure of the network and
the way in which sensor nodes are connected to each other. The topology can be star, mesh,
tree, or hybrid, depending on the requirements of the application.

Routing Protocol: The routing protocol is responsible for determining the path that data should
take from the sensor nodes to the base station. There are several routing protocols used in
WSNs, such as direct transmission, single hop routing, and multi-hop routing.

Data Management: Data management in a WSN involves collecting, processing, storing, and
retrieving data from the sensor nodes. The data collected from the sensor nodes may be raw or
processed, and may need to be filtered or aggregated before being transmitted to the base
station.

Power Management: Power management is an important aspect of a WSN, as the sensor


nodes are usually battery-powered and have limited energy resources. Power management

@_.vedangs._13
IOT U3 Notes

techniques such as duty cycling, sleep mode, and energy harvesting are used to optimize the
energy consumption of the sensor nodes and prolong their battery life.

Q8 Note on modern IoT case studies.


ANS:
Smart Agriculture: IoT technology is being used in agriculture to monitor crop growth, soil
moisture, and weather conditions, among other things. For example, John Deere's precision
agriculture system uses sensors and GPS technology to optimize planting, fertilizing, and
harvesting, resulting in increased yield and reduced waste.

Smart Healthcare: IoT is being used in healthcare to monitor patients remotely, automate
patient monitoring, and improve healthcare delivery. For example, the Philips Healthcare eICU
program uses sensors and cameras to monitor patients in the ICU, enabling doctors to remotely
diagnose and treat patients in real-time.

Smart Home: IoT technology is being used to create smart homes, which are homes equipped
with connected devices that can be controlled remotely. For example, Amazon's Echo is a
voice-controlled speaker that can be used to control smart devices such as lights, thermostats,
and security cameras.

Smart Cities: IoT technology is being used to make cities more efficient and sustainable by
optimizing energy use, traffic flow, and waste management. For example, Barcelona's Smart
City project uses IoT sensors to monitor traffic flow, reduce energy consumption, and improve
public safety.

Industrial IoT: IoT technology is being used in industrial settings to optimize production, reduce
downtime, and improve safety. For example, General Electric's Predix platform uses sensors
and analytics to optimize the performance of industrial equipment, resulting in reduced
maintenance costs and increased productivity.

Q9 what is edge computing.


ANS:Edge computing is a distributed computing paradigm that brings computation and
data storage closer to the location where it is needed, in order to improve the
performance, reliability, and efficiency of cloud-based services

Q10 note on applications of edge computing.


ANS:
Industrial Automation: Edge computing can be used in industrial automation to enable
real-time monitoring and control of manufacturing processes, equipment, and machinery. This
enables faster decision-making, reduces downtime, and improves the overall efficiency of the
production process.

@_.vedangs._13
IOT U3 Notes

Autonomous Vehicles: Edge computing can be used in autonomous vehicles to enable


real-time data processing and decision-making, such as object detection and obstacle
avoidance. This can help to improve the safety and reliability of self-driving cars, while reducing
the amount of data that needs to be transmitted to centralized cloud servers.

Smart Cities: Edge computing can be used in smart cities to enable real-time monitoring and
control of traffic, energy consumption, and public safety. This can help to optimize the use of
resources, reduce traffic congestion, and improve public safety.

Healthcare: Edge computing can be used in healthcare to enable real-time monitoring and
analysis of patient data, such as heart rate, blood pressure, and oxygen levels. This can help to
improve the accuracy and timeliness of diagnosis and treatment, while reducing the risk of
errors and improving patient outcomes.

Retail: Edge computing can be used in retail to enable real-time analysis of customer behavior
and preferences, such as purchasing history, location data, and social media activity. This can
help retailers to personalize the customer experience, optimize inventory management, and
increase sales.

Q11 difference between edge and fog computing.

@_.vedangs._13
IOT U3 Notes

Q12 what is edge computing hardware architecture.


ANS:Edge Devices: These are the devices at the edge of the network, such as sensors,
cameras, wearables, and smart appliances, that collect and process data from the environment.
Edge devices are typically low-power, low-cost, and have limited computing and storage
resources. They are optimized for low-latency, low-power operations and are designed to
operate in challenging environments.

Edge Servers/Gateways: These are the intermediate devices that sit between the edge
devices and the cloud servers. Edge servers/gateways can perform local data processing,
storage, and analytics. They can also aggregate data from multiple edge devices and act as a
communication bridge between the edge devices and the cloud servers. Edge servers/gateways
are typically more powerful than edge devices, with more connectivity options and computing
and storage resources.

Cloud Servers: These are the servers in the cloud that provide additional processing, storage,
and analytics capabilities. They receive data from the edge devices and edge servers/gateways
for further processing, analysis, and storage. Cloud servers are typically highly scalable, with a
large number of computing and storage resources, and can support multiple applications and
users.

Q13 Note on edge computing platforms.


ANS:Edge computing platforms are software and hardware frameworks that enable the
deployment, management, and orchestration of edge applications. These platforms
provide an interface between the edge devices and the cloud servers, and they offer
various services and functionalities that enable the development and deployment of edge
applications.
Device Management: Edge computing platforms provide tools for managing and monitoring the
edge devices, such as device registration, configuration, firmware updates, and diagnostics.

Data Management: Edge computing platforms provide mechanisms for collecting, storing, and
processing data from the edge devices. They support different data formats, protocols, and
storage options, and they enable data processing and analytics at the edge.

Application Management: Edge computing platforms provide tools for deploying, managing,
and scaling edge applications. They offer APIs, SDKs, and other development tools that enable
developers to create custom applications and services.

Security: Edge computing platforms provide security mechanisms that protect the edge
devices, data, and applications from cyber threats. They provide authentication, encryption,
access control, and other security features that ensure the integrity, confidentiality, and
availability of the data and applications.

@_.vedangs._13
IOT U3 Notes

Orchestration: Edge computing platforms provide mechanisms for orchestrating and managing
the communication between the edge devices, edge servers/gateways, and cloud servers. They
ensure that the data and applications are processed and distributed efficiently and effectively.

Q14 Note on communication models - edge, fog & M2M.


ANS:
Edge Computing: Edge computing is a distributed computing model that brings data
processing and computation closer to the edge devices, rather than processing everything in the
cloud.
Edge devices can process data in real-time, enabling faster decision-making and better use of
available network bandwidth.
Edge computing is ideal for use cases such as autonomous vehicles, smart factories, and smart
cities.

Fog Computing: Fog computing is a hierarchical model that extends cloud computing to the
edge devices.
In this model, edge devices send their data to local servers called fog nodes for processing and
analytics, which reduces network latency and improves data security.
Fog computing is ideal for use cases such as remote monitoring, video surveillance, and smart
homes.

M2M (Machine-to-Machine): M2M communication is a direct communication model that


enables devices to communicate with each other without human intervention.
In this model, devices exchange data and commands using standardized protocols such as
MQTT, CoAP, and ZigBee.
M2M communication is ideal for use cases such as industrial automation, smart grids, and
environmental monitoring.

Q15 explain sensor network architecture.


ANS:
Sensors: Sensors are the devices that are deployed in the physical environment to measure
and collect data. Sensors can be designed to measure various parameters such as
temperature, humidity, pressure, motion, and light. The sensors are typically low-power and can
operate for extended periods of time using battery or energy harvesting techniques.

Sensor Nodes: Sensor nodes are composed of the sensor, a microcontroller, and wireless
communication hardware. The sensor node is responsible for processing the data collected by
the sensor, transmitting the data to a central location, and performing other tasks such as data
compression, encryption, and aggregation.

@_.vedangs._13
IOT U3 Notes

Gateway: The gateway acts as a bridge between the sensor nodes and the back-end
infrastructure. The gateway is responsible for collecting the data from the sensor nodes and
forwarding it to a cloud-based or on-premise server for storage and analysis.

Back-end Infrastructure: The back-end infrastructure consists of the servers, databases, and
software applications that process and store the data collected by the sensors. The back-end
infrastructure is responsible for performing data analytics, visualization, and reporting.

Communication Protocol: The communication protocol specifies the rules and standards for
how the sensor nodes communicate with each other and the gateway. Common communication
protocols used in sensor networks include Zigbee, Bluetooth Low Energy (BLE), and LoRaWAN.

Power Management: Sensor nodes are typically battery-powered and may need to operate for
long periods without maintenance. Therefore, the sensor network architecture includes
mechanisms for energy-efficient data collection, transmission, and processing. Techniques such
as duty cycling, sleep modes, and energy harvesting are used to prolong the lifespan of the
sensor network.

@_.vedangs._13

You might also like