Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

1a.Define IoT. Describe the characteristics of Internet of Things IoT?

What is IoT (Internet of Things)?


Kevin Ashton, in a presentation of Procter & Gamble in 1999, coined the term “Internet of
Things“. Almost every area, device, sensor, software, etc are connected to each other. The
ability to access these devices through a smartphone or through a computer is called IoT.
These devices are accessed from a distance.
For example, an Air Conditioner’s sensor can gather the data regarding the outside
temperatures, and accordingly adjust its temperature to increase or decrease it with respect to
the outside climate. Similarly, your refrigerators can also adjust their temperature
accordingly. This is how devices can interact with a network.

Characteristics of the Internet of Things :


There are the following characteristics of IoT as follows. Let’s discuss it one by one.
1.Connectivity –
Connectivity is an important requirement of the IoT infrastructure. Things of IoT
should be connected to the IoT infrastructure. Anyone, anywhere, anytime can
connectivity should be guaranteed at all times Without connection, nothing makes
sense.

2.Intelligence and Identity –


The extraction of knowledge from the generated data is very important. For example,
a sensor generates data, but that data will only be useful if it is interpreted properly.
Each IoT device has a unique identity. This identification is helpful in tracking the
equipment and at times for querying its status.

3.Scalability –
The number of elements connected to the IoT zone is increasing day by day. Hence,
an IoT setup should be capable of handling the massive expansion. The data
generated as an outcome is enormous, and it should be handled appropriately.

4.Dynamic and Self-Adapting (Complexity) –


IoT devices should dynamically adapt themselves to the changing contexts and
scenarios. Assume a camera meant for the surveillance. It should be adaptable to
work in different conditions and different light situations (morning, afternoon, night).

5.Architecture –
IoT architecture cannot be homogeneous in nature. It should be hybrid, supporting
different manufacturers ‘ products to function in the IoT network. IoT is not owned by
anyone engineering branch. IoT is a reality when multiple domains come together.

6.Safety –
There is a danger of the sensitive personal details of the users getting compromised
when all his/her devices are connected to the internet. This can cause a loss to the
user. Hence, data security is the major challenge. Besides, the equipment involved is
huge. IoT networks may also be at the risk. Therefore, equipment safety is also
critical.

1b. Discuss Internet of Things enabling technologies?


IoT(internet of things) enabling technologies are
1.Wireless Sensor Network
2.Cloud Computing
3.Big Data Analytics
4.Communications Protocols
5.Embedded System

1. Wireless Sensor Network(WSN) :


A WSN comprises distributed devices with sensors which are used to monitor the
environmental and physical conditions. A wireless sensor network consists of end nodes,
routers and coordinators. End nodes have several sensors attached to them where the
data is passed to a coordinator with the help of routers. The coordinator also acts as the
gateway that connects WSN to the internet.
Example –
•Weather monitoring system
•Indoor air quality monitoring system
•Soil moisture monitoring system
•Surveillance system
•Health monitoring system

2. Cloud Computing :
It provides us the means by which we can access applications as utilities over the
internet. Cloud means something which is present in remote locations.
With Cloud computing, users can access any resources from anywhere like databases,
webservers, storage, any device, and any software over the internet.

Characteristics –
1.Broad network access
2.On demand self-services
3.Rapid scalability
4.Measured service
5.Pay-per-use

Provides different services, such as –


•IaaS (Infrastructure as a service)
Infrastructure as a service provides online services such as physical machines, virtual
machines, servers, networking, storage and data center space on a pay per use
basis. Major IaaS providers are Google Compute Engine, Amazon Web Services and
Microsoft Azure etc. 
Ex : Web Hosting, Virtual Machine etc.

•PaaS (Platform as a service)


Provides a cloud-based environment with a very thing required to support the
complete life cycle of building and delivering West web based (cloud) applications –
without the cost and complexity of buying and managing underlying hardware,
software provisioning and hosting. Computing platforms such as hardware, operating
systems and libraries etc. Basically, it provides a platform to develop applications.
Ex : App Cloud, Google app engine 

•SaaS (Software as a service)
It is a way of delivering applications over the internet as a service. Instead of
installing and maintaining software, you simply access it via the internet, freeing
yourself from complex software and hardware management.
SaaS Applications are sometimes called web-based software on demand software or
hosted  software.
SaaS applications run on a SaaS provider’s service and they manage security
availability and performance.
Ex : Google Docs, Gmail, office etc.

3. Big Data Analytics :


It refers to the method of studying massive volumes of data or big data. Collection of
data whose volume, velocity or variety is simply too massive and tough to store, control,
process and examine the data using traditional databases.
Big data is gathered from a variety of sources including social network videos, digital
images, sensors and sales transaction records.
Several steps involved in analyzing big data –
1.Data cleaning
2.Munging
3.Processing
4.Visualization
Examples –
•Bank transactions
•Data generated by IoT systems for location and tracking of vehicles
•E-commerce and in Big-Basket
•Health and fitness data generated by IoT system such as a fitness bands

4. Communications Protocols :
They are the backbone of IoT systems and enable network connectivity and linking to
applications. Communication protocols allow devices to exchange data over the network.
Multiple protocols often describe different aspects of a single communication. A group of
protocols designed to work together is known as a protocol suite; when implemented in
software they are a protocol stack.
They are used in 
1.Data encoding
2.Addressing schemes

5. Embedded Systems :
It is a combination of hardware and software used to perform special tasks.
It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi
adapters), input output units (display keyword etc. ) and storage devices (flash
memory).
It collects the data and sends it to the internet.
Embedded systems used in
Examples –
1.Digital camera
2.DVD player, music player
3.Industrial robots
4.Wireless Routers etc.

3. List and explain typical applications of IoT?


IoT Applications

Healthcare Application: These days we have digital watches and fitness monitoring
devices that have changed the ways of healthcare monitoring. People can now
monitor their own health at regular intervals of time. These days if a person is being
rushed to the hospital by an ambulance, his/her healthcare statistics are already given
to the doctor, and the treatment gets started well in time. Also, data collected from
different patients are now being put to use for the cure.
Energy Applications: The energy rates have become paramount. All Individuals and
organizations, both are searching for ways to reduce and control the consumption of
energy. IoT provides a way to monitor energy usages not only at the appliance-level
but also at the grid level, house-level or even at the distribution level. Smart systems
such as Meters & Smart Grids are installed at various organizations to monitor energy
consumption.
Education Applications: IoT’s yet another great application lies in the field of
education. IoT helps in fulfilling the gaps and loopholes in the education industry. It
improves the quality of education being offered to students by optimizing the cost. It
also improves administration and management by taking into consideration students’
response and performance.
Government Applications: The smart city initiative by our government is an
example of how efficient and big this technology is. Its incorporation in sectors like
transportation, healthcare, armed forces, and security is commendable.
Consumer applications: A growing portion of IoT devices is being developed for
consumer use, including connected vehicles, home automation, wearable technology,
connected health, and remote monitoring devices.
Industrial applications: Also known as IIoT, industrial IoT devices attain and
analyse generated by connected equipment, operating technology (OT), locations and
people. In combination with operational technology (OT) monitoring devices, IioT
helps to control and supervise industrial systems.In addition, the same integration can
be conducted out for computerised record notifications of asset positioning in
manufacturing storage units as the size of assets can vary from a small screw to the
entire engine spare part and the misplacement of such assets can result in a percentile
loss of manpower time and money.
Medical applications: The Internet of Medical Things (IoMT) is a technology for
medical and health related purposes, data collection and analysis for mapping and
testing. IoMT has been referred to as "Smart Healthcare" as a digital healthcare
system technology, connecting available healthcare resources and healthcare
services.IoT devices can be used to access multiple health surveillance and
emergency communication systems. Specialized detectors can also be outfitted in
living spaces to monitor the condition and particular well-being of senior citizens,
while also making sure that effective care is dispensed and helping people to gain
extra movement through treatment.
Infrastructural applications: Planning and controlling the process of feasible urban
and rural infrastructure such as bridges, rail tracks and offshore wind farms is a key
application of the IoT[60]. The IoT infrastructure can be used to monitor any event or
change in structural conditions that could jeopardise quality and enhance risk.The IoT
can profit the construction industry through cost savings, time reduction, better
workday quality, cashless workflow and increased productivity. It can help you make
quick decisions and save funds with Real-Time Data Analytics.

4a. What are the main challenges of IoT implementation?

IOT had faced some significant challenges and those are addressed as follows:
• Inadequate testing and upgrading
• Information security and privacy concerns
• Complexity of software and bulk volumes of data.
• AI integration and automation techniques
• Constant power supply, which is very hard to maintain everytime needed.
• Interaction and communication shortage.
4b. Why is the zigbee protocol so important for the IoT implementation?
Over the past few years, we have moved from disconnected systems into a world
completely linked to each other all in control of our fingertip. Smart home devices and similar
technologies have augmented over the years. What once started with automation has now
expanded into the Internet of Things(IoT). This in turn has settled into a more amiable category
we call smart homes.
The whole point of a smart home is to have everything connected to literally everything. In
particular, all the connected devices can share information with each other. You can control all of
them without the need to visit each thing individually. All the devices, manufactured by different
companies are connected over a single network. Therefore, requires a common language for its
communication. That’s where ZigBee shows in!
What is ZigBee?
ZigBee is a wireless technology standard that provides a set of communication protocols for
short-range communications. It is an open-source global standard developed by Zigbee Alliance to
address the needs of low-cost, low power wireless IoT networks. The protocol is used in low data
rate, short to medium range wireless networking devices like senors and control networks.
ZigBee provides flexibility for developers and end-users and delivers great interoperability.
Because of its important feature of being low-cost, low-power consumption and having faster
wireless connectivity, the protocol has many applications. For instance, its a popular technology for
smart home, because it outstands other wireless technologies with some distinct features. Firstly,
communication is two -way which makes ZigBee devices reliable. Secondly, it caters to all sectors
like lightings, security, appliances and home access. Thirdly, and most importantly, this technology
requires very little power mainly due to its low latency and low duty cycle. In addition, it uses mesh
network and thus reduce chances of failure at nodes.
ZigBee offers a wireless range of 70m indoors and 400m outdoors. It supports multiple
networks like point to point, point to multipoint mesh- networks. Notably, it uses AES 128
encryption thus protecting your information while on air transfers. In addition, its easy installation
and maintenance makes it more affordable.
Here’s an interesting fact on the origin of the name ZigBee! The name is closely in relation
with Bees because they do ‘waggle dance’ to communicate with each other when they return to their
hives. This zigzag dance is where ZigBee got its name.

ZigBee Applications
ZigBee enables a wide usage in wireless networks with low- cost, low-power solutions.
Most importantly, it provides the ability to run for years on inexpensive batteries to monitor and
control applications. Generally, home automation, Healthcare, Material tracking are some of the
areas where ZigBee is making its advancements. Some of its applications include:

• Home Automation including security systems, meter reading systems, Light control systems

• consumer electronics including Gaming consoles, wireless remote controls.


• Industrial Automation systems as in asset management, personnel tracking, livestock
management.
• Healthcare, the patient wears a ZigBee device, which periodically collects patients metrics
and sends to the hospital for analysis.
• Building’s structural health monitoring. It is useful in earthquake-prone areas. Sensors
installed throughout the building sends data to detect signs of damage.
• Grid monitoring involving temperature monitoring, power management, fault locating etc.
• Smart metering to prevent theft, pricing support etc
5a. Discuss the issues in Wireless Networks?

Issues in Wireless Sensor Networks

There are different issues occurred in wireless sensor networks like design issues, topology issues,
and other issues. The design issues in different types of wireless sensor networks mainly include

 Low latency
 Fault
 Coverage Problems
 Transmission Media
 Scalability
The topology issues of wireless sensor networks include the following.

 Sensor Holes
 Geographic Routing
 Coverage Topology
The major issues of a wireless sensor network include the following. These issues mainly affect the
design and performance of the WSN.

 Operating System & Hardware for WSN


 Middleware
 Characteristics of Wireless Radio Communication
 Schemes for Medium Access
 Deployment
 Localization
 Sensor Networks Programming Models
 Synchronization
 Architecture
 Calibration
 Database Centric and Querying
 Network Layer
 Data Dissemination & Data Aggregation
 Transport Layer

6. List and explain types of Wireless Sensor Networks

Types of Wireless Sensor Networks

Depending on the environment, the types of networks are decided so that those can be deployed
underwater, underground, on land, and so on. Different types of WSNs include:
1 Terrestrial WSNs
2 Underground WSNs
3 Underwater WSNs
4 Multimedia WSNs
5 Mobile WSNs
Terrestrial WSNs

Terrestrial WSNs are capable of communicating base stations efficiently, and consist of hundreds to
thousands of wireless sensor nodes deployed either in an unstructured (ad hoc) or structured (Pre-
planned) manner. In an unstructured mode, the sensor nodes are randomly distributed within the
target area that is dropped from a fixed plane. The preplanned or structured mode considers optimal
placement, grid placement, and 2D, 3D placement models.

In this WSN, the battery power is limited; however, the battery is equipped with solar cells as a
secondary power source. The Energy conservation of these WSNs is achieved by using low duty
cycle operations, minimizing delays, and optimal routing, and so on.
Underground WSNs

The underground wireless sensor networks are more expensive than the terrestrial WSNs in terms of
deployment, maintenance, and equipment cost considerations and careful planning. The WSNs
networks consist of several sensor nodes that are hidden in the ground to monitor underground
conditions. To relay information from the sensor nodes to the base station, additional sink nodes are
located above the ground.

The underground wireless sensor networks deployed into the ground are difficult to recharge. The
sensor battery nodes equipped with limited battery power are difficult to recharge. In addition to
this, the underground environment makes wireless communication a challenge due to the high level
of attenuation and signal loss.

Under Water WSNs

More than 70% of the earth is occupied with water. These networks consist of several sensor nodes
and vehicles deployed underwater. Autonomous underwater vehicles are used for gathering data
from these sensor nodes. A challenge of underwater communication is a long propagation delay, and
bandwidth and sensor failures.
Under Water WSNs
Underwater, WSNs are equipped with a limited battery that cannot be recharged or replaced. The
issue of energy conservation for underwater WSNs involves the development of underwater
communication and networking techniques.

Multimedia WSNs

Multimedia wireless sensor networks have been proposed to enable tracking and monitoring of
events in the form of multimedia, such as imaging, video, and audio. These networks consist of
low-cost sensor nodes equipped with microphones and cameras. These nodes are interconnected
with each other over a wireless connection for data compression, data retrieval, and correlation.

Multimedia WSNs
The challenges with the multimedia WSN include high energy consumption, high bandwidth
requirements, data processing, and compressing techniques. In addition to this, multimedia contents
require high bandwidth for the content to be delivered properly and easily.

Mobile WSNs

These networks consist of a collection of sensor nodes that can be moved on their own and can be
interacted with the physical environment. The mobile nodes can compute sense and communicate.

Mobile wireless sensor networks are much more versatile than static sensor networks. The
advantages of MWSN over static wireless sensor networks include better and improved coverage,
better energy efficiency, superior channel capacity, and so on.
7. Give the classification of Wireless Sensor Networks?

Classification of Wireless Sensor Networks

The classification of WSNs can be done based on the application but its characteristics mainly
change based on the type. Generally, WSNs are classified into different categories like the
following.

 Static & Mobile


 Deterministic & Nondeterministic
 Single Base Station & Multi Base Station
 Static Base Station & Mobile Base Station
 Single-hop & Multi-hop WSN
 Self Reconfigurable & Non-Self Configurable
 Homogeneous & Heterogeneous
Static & Mobile WSN

All the sensor nodes in several applications can be set without movement so these networks are
static WSNs. Especially in some applications like biological systems uses mobile sensor nodes
which are called mobile networks. The best example of a mobile network is the monitoring of
animals.

Deterministic & Nondeterministic WSN

In a deterministic type of network, the sensor node arrangement can be fixed and calculated. This
sensor node’s pre-planned operation can be possible in simply some applications. In most
applications, the location of sensor nodes cannot be determined because of the different factors like
hostile operating conditions & harsh environment, so these networks are called non-deterministic
that need a complex control system.

Single Base Station & Multi Base Station

In a single base station network, a single base station is used and it can be arranged very close to the
region of the sensor node. The interaction between sensor nodes can be done through the base
station. In a multi-base station type network, multiple base stations are used & a sensor node is used
to move data toward the nearby base station.

Static Base Station & Mobile Base Station


Base stations are either mobile or static similar to sensor nodes. As the name suggests, the static
type base station includes a stable position generally close to the sensing area whereas the mobile
base station moves in the region of the sensor so that the sensor nodes load can be balanced.

Single-hop & Multi-hop WSN

In a single-hop type network, the arrangement of sensor nodes can be done directly toward the base
station whereas, in a multi-hop network, both the cluster heads & peer nodes are utilized to transmit
the data to reduce the energy consumption.
Self Reconfigurable & Non-Self Configurable

In a nonself configurable network, the arrangement of sensor networks cannot be done by them
within a network & depends on a control unit for gathering data. In wireless sensor networks, the
sensor nodes maintain and organize the network and collaboratively work by using other sensor
nodes to accomplish the task.

Homogeneous and Heterogeneous

In a homogeneous wireless sensor network, all the sensor nodes mainly include similar energy
utilization, storage capabilities & computational power. In the heterogeneous network case, some
sensor nodes include high computational power as well as energy necessities as compared to others.
The processing & communication tasks are separated consequently.

8a. Give the components of sensor node?

A sensor node is made up of four basic components such as sensing unit,


processing unit, transceiver unit and a power unit which is shown in Fig. 5. It also
has application dependent additional components such as a location finding
system, a power generator and a mobilizer. Sensing units are usually composed of
two subunits: sensors and analogue to digital converters (ADCs) (Akyildiz et al.,
2002). The analogue signals produced by the sensors are converted to digital
signals by the ADC, and then fed into the processing unit. The processing unit is
generally associated with a small storage unit and it can manage the procedures
that make the sensor node collaborate with the other nodes to carry out the
assigned sensing tasks. A transceiver unit connects the node to the network. One
of the most important components of a sensor node is the power unit. Power units
can be supported by a power scavenging unit such as solar cells. The other
subunits, of the node are application dependent
8b. Differentiate Cloud computing, edge computing and fog computing?

Cloud 
Most businesses are familiar with cloud computing since it’s now the
golden standard in most industries. Put simply, cloud computing stands for
storing and accessing data and programs over the internet, rather than on your
computer’s hard drive. For it to be considered ‘cloud computing’, you need to
access your data or your programs over the internet, or have that data synced
with other information over the web.
Cloud computing allows organisation to significantly exceed the normal
available storage, without having to host extra servers on site. Data can also
be collected from multiple sites and devices, accessible anytime, anywhere.
Fog and edge computing push both data and intelligence to analytic platforms
that are situated either on, or close to where the data originated from. This
helps to reduce latency cost and increase user experience. However, there are
key differences between the two.
 
Fog
Fog computing – a term created by Cisco – refers to extending cloud
computing to the edge of an enterprise’s network. It pushes intelligence down
to the local area network (LAN) level of network architecture, processing data
in a fog node or IoT gateway. Simply put, it involves moving your computers
closer to the sensors they are talking to.
One example of fog computing would be with trains. As part of the rise in
the Industrial Internet of Things, trains and tracks are being equipped with a
new generation of gadgets and sensors, with trains acting as the central hub
for all the data gathered from these sensors. The issue is that because trains
move so fast, it’s difficult to maintain a connection with the cloud. By installing
some fog computing nodes in the locomotive, you bypass this issue.
However, fog computing’s architecture relies on many links in a communication
chain to move data from the physical world of our assets into the digital world
of information technology. Each of these links is a potential point of failure.
 
Edge
Edge computing can be defined as the processing of sensor data away
from the centralised nodes and close to the logical edge of the network, toward
individual sources of data. It effectively pushes the computational functions to
the edge of the network. In other words, rather than pumping all the data back
up to the cloud for analysis and action, this process takes place much closer to
the data’s source.  
Edge computing triages the data locally, reducing the backhaul traffic to
the central repository. It simplifies fog’s communication chain and reduces
potential points of failure.
Edge devices can be anything with sufficient compute capacity and
capability such as routers, switches and even the IoT sensors collecting the
data.
1.Elaborate wireless technologies of IOT?

Various types of wireless technology and networks allow devices to speak


(send data) to each other and to the web (TCP/IP Networks) without cables. There
are a number of different wireless technologies out there that can be implemented in
hardware products for the Internet of Things (IoT) and Machine to Machine
(M2M) communication.
The Institute of Electrical and Electronics Engineers (IEEE) has seven task
groups in place for 802.15 technologies. Those groups set the standards for
common types of wireless technologies used for personal area networks. Those
802.15 task groups include: WPAN/Bluetooth, Coexistence, High Rate WPAN, Low
Rate WPAN,  mesh Networking, Body Area Networks, and Visible Light
Communication. Each IEEE protocol has its own distinctive advantages and
limitations. Promising developments expand their potential applications and uses.

IEEE 802.15.4: What is ZigBee?


A wireless technology currently gaining traction in the LPWAN group, ZigBee is
an open global standard and is designed specifically to be used in M2M networks.
The technology is inexpensive to run and doesn’t require a lot of power, making it
an ideal solution for many industrial applications. The technology has a low latency,
and a low duty cycle, allowing products to maximize battery life.

The ZigBee protocol offers 128-bit AES encryption. The technology is also used in
Mesh networks, which allow nodes to be connected together through
multiple pathways. The wireless technology is hoped to ultimately be implemented in
things like smart home devices. The technology's ability to connect multiple devices
together simultaneously makes it ideal for a connected home environment where
users may want things like smart locks, lights, robots and thermostats to talk to one
another. The ZigBee Alliance recently standardized the technology in the hope to
make that connectivity possible. Currently all ZigBee devices are not capable of
talking to all other ZigBee devices. The hope is that standardization will correct that
issue and that the devices will offer a uniform experience for the end user.

At Link Labs, many of our customers are former ZigBee users, but found that range
and performance limited their applications.

IEEE 802.11: WiFi


WiFi uses radio waves (RF) to allow two devices to communicate with one
another. The technology is most commonly used to connect Internet routers to
devices like computers, tablets and phones; however, it can be used to connect
together any two hardware components. WiFi is a local wireless network that runs of
the 802.11 standards set forth by the Institute of Electrical and Electronics Engineers
(IEEE).

WiFi can utilize both the global 2.4GHz UHF and 5GHz SHF ISM radio bands.
The WiFi Alliance certifies some products, allowing them to be labeled as “Wi-Fi
Certified.” In order to receive that designation, and product must go through the
Alliance’s interoperability certification testing.

802.11b, 802.11g, and 802.11n run on the 2.4GHz ISM band. The band is
susceptible to interference from some Bluetooth devices as well as some microwave
ovens and cordless phones. Devices that run on either band can be operated in the
United States without a license from the FCC, but still require FCC part 15
certification. The first six channels of frequencies from each are considered part of
the amateur radio band.

IEEE 802.15.1: Bluetooth and BLE


Bluetooth and Bluetooth Low Energy (BLE) are wireless technologies used to
transfer data over short distances. The technology is frequently used in small consider
devices that connect to users phones and tablets. For instance, the technology is used
in many speaker systems. Bluetooth Low Energy uses less power than standard
Bluetooth and is used in hardware such as fitness trackers, smart watches and other
connected devices in order to wirelessly transmit data without heavily compromising
the battery power in a user’s phone.
BLE has only recently started to pick up steam. The technology was initially
introduced by smartphone maker Nokia in 2006, but didn’t become part of Bluetooth
standard until 2010. Today, BLE, which is also referred to as Bluetooth Smart, is
supported by the majority of smartphone and computer makers as well as most major
operating systems including Windows 8, OS X, Linux, Windows Phone, Android and
iOS.
Bluetooth uses UHF radio waves for data transfer. The technology was originally
standardized as IEEE 802.15.1, but the IEEE no longer maintains that specific
standard. Companies that work with Bluetooth are often affiliated with the Bluetooth
Special Interest group (SIG). The group currently has over 20,000 members, and
must certify a product before it can be marketed as a Bluetooth device to the
consumer or business market. That certification helps ensure that all Bluetooth
devices work in a standardized way and provide a similar experience for consumers.
IEEE 802.16: WiMax
WiMax stands for Worldwide Interoperability for Microwave Access. This
wireless technology allows data to be transferred at a rate of 30-40 megabits per
second. The term refers specifically to interoperable implementations of the IEEE
802.16 wireless family. The technology was once used by several mobile carriers,
notably Sprint, to deliver wireless data to its customers. Sprint, along with many of
the other carriers who used the technology, has since switched over to using faster
LTE 4G networks for data.
The WiMax Forum certifies devices before they can be sold to consumer or
businesses. The technology can be used both indoors and outdoors, however, WiMax
devices typically produce a better signal when used outside or by a window.
Link Labs builds a new type of wireless technology, called Symphony Link.
Symphony Link solves many of the range and performance issues of the technologies
listed above.

2. Key challenges of Wireless Sensor Networks(WSN)?

Challenges of WSN

The different challenges in wireless sensor networks include the following.

 Fault Performance
 Scalability
 Production Cost
 Operation Environment
 Quality of Service
 Data Aggregation
 Data Compression
 Data Latency
Fault Performance

Some sensor nodes stop working because of power loss, so physical damage may
occur. This shouldn’t affect the sensor network’s overall performance, so this is
known as the issue of fault tolerance. Fault tolerance is nothing but the ability to
maintain the functionalities of the sensor network without any interruption because of
the failures of sensor nodes.

Stability

The number of nodes used in the detecting area may be in the order of thousands,
hundreds & routing schemes should be scalable enough for responding to events.
Production Cost

The sensor networks include a number of sensor nodes where a single node price is
very significant to validate the cost of the overall network and thus each sensor
node’s price must be kept low.

Operation Environment

The arrangement of sensor networks can be done within large machinery, under the
ocean, in the field of chemically or biologically contaminated. in homes, battlefields,
connected to fast-moving vehicles, animals, for monitoring in forests, etc.

Quality of Service

The quality of service which needs by the application could be energy efficiency,
lifetime length, and reliable data.

Data Aggregation

The combination of data from various sources with different functions like average,
max, min, is known as data aggregation.

Data Compression

The data reduction is known as data compression

Data Latency

These are treated like the essential factors that influence the design of routing
protocol. The data latency can be caused through data aggregation & multi-hop
relays.

3. List and explain edge computing protocols?

Introduction to Edge Computing Architecture

Edge Computing Architecture is a new model for providing storage and substantial
computing properties near to the devices. This bringing of storage and computing
nearer to the devices improves response time and lessens the bandwidth. Edge
computing involves all types of computations which occur at the edge of a network
outside the cloud. Edge time works on real-time data generated by sensors and real-
time applications. The enormous emergence of IoT devices has pushed the bandwidth
demands to the extreme levels, resulting in delay. Edge computing moves services
closer to the edge and enhances service delivery.
Edge Computing Architecture
An Edge Computing Architecture comprises of the following components
Data source/devices

The data sources in an edge computing environment can be applications capturing


data, sensors, appliances, or any data capturing device. Data generated by these
devices is different depending upon the source. Data sources vary from one another
depending upon their functionalities and locations. The various edge devices capture
data and communicate via IoT protocols, sending data to the edge gateways. The
protocols used for the data transfer can be Ethernet, Bluetooth, Wi-Fi, NFC, ZigBee,
etc. In short every data generating device will be considered as an edge device.
Edge gateway

An edge gateway acts as a node between edge devices and a core network. A core
network comprises devices powerful enough to pre-process data. Edge gateways are
employed to provide interfaces to wired and radio-based transmissions.
The various standards used are:
• Z-Wave: Z-Wave is used for 30 meters point-to-point communication and is
specified for applications that involve small transmissions like household
appliance control applications. Z-Wave functions in ISM bands (around 900
MHz) and allows a transmission rate of 40 kbps. Z-wave is considered to be
the best possible option available for household appliances communication.
• LTE-A (Long Term Evolution—Advanced): This communication protocol
comprises of a set of various protocols meant for communication that fall under
Machine-Type signals and IoT based architectures. In terms of service cost and
scalability, it outperforms other cellular solutions.
• EPC-global: Electronic Product Code is used in the supply chain management
to identify items, as a unique identification number stored on an RFID tag. The
architecture uses RFID technologies along with easy to use RFID tags as well
as readers for information sharing.This architecture is recognized as a
promising technique for the future of the IoT because of the features of
openness, scalability, etc
• Bluetooth Low Energy: Bluetooth Low-Energy (BLE) or Bluetooth Smart
makes use of radio signals with short-range and a minimum power
requirement. It operates at a range that is nearly about ten times more than
classic Bluetooth technology. Its latency factor compared to classic Bluetooth
technology is 15 times less. The transmission power between 0.01 mW to 10
mW is feasible for its operation.
Protocols used
The Various Protocols used in this Layer
CoAP

CoAP is an application layer protocol for edge devices and applications, created by
IETF Constrained RESTful Environments (CoRE) working group. The CoAP
proposes a transfer protocol based on Representational State Transfer (REST) on top
of HTTP functionalities. REST is a cacheable connection protocol that relies on the
stateless client-server architecture. It represents a proper way to exchange data
between clients and servers on top of HTTP. It is used in mobile-based social network
applications and it makes complexity less by using HTTP methods(get, post, put, and
delete).
MQTT

MQTT is used to make a connection between embedded devices, networks with


services as well as middleware. The connection operation is based on a routing
mechanism and makes MQTT as the best possible connection protocol for both IoT
and M2M. MQTT is built on top of the TCP protocol and is suitable for devices with
low resource availability, unreliable or low bandwidth links. MQTT simply consists
of three components, subscriber, publisher, and a broker.
AMQP

AMQP focuses on message-oriented environments and is an open standard


application layer protocol. It provides reliable Communication through message
delivery guarantee primitives which include at-most-once, at-least-once and exactly-
once delivery. TCP is used as a reliable protocol for message exchange.
Edge

an edge-computing architecture simply means the edge of the network. The devices
present at the edge of the network vary based upon the functionalities. A mobile
phone can be employed at the edge. A router can be employed at the edge of the
network etc. Edge comprises of those devices which can perform temporary data
processing and temporary storage before sending the actual data to the cloud for
further storage and processing. The communication between an edge device and an
edge is facilitated by an edge gateway. Edge provides data computing capabilities
nearer to the source of data. Edge is a demarcation between the core network and the
rest of the network in an edge computing environment. It just acts as an interface to
connect the edge architecture with either fog domain or cloud environment. The
devices which are employed at the edge should be capable of providing storage and
computing services. The edge of a network can be at a distance from the actual edge
device. In most of the cases, depending upon the response time and bandwidth
available, the edge can be just a hop distance from the main edge device, collecting
the data.

4. Discuss the applications of cloud computing?

Cloud Computing Applications


Cloud service providers provide various applications in the field of
art, business, data storage and backup services, education,
entertainment, management, social networking, etc.
The most widely used cloud computing applications are given below
-

1. Art Applications
Cloud computing offers various art applications for quickly and
easily design attractive cards, booklets, and images. Some
most commonly used cloud art applications are given below:
i Moo
Moo is one of the best cloud art applications. It is used for designing
and printing business cards, postcards, and mini cards.
ii. Vistaprint
Vistaprint allows us to easily design various printed marketing
products such as business cards, Postcards, Booklets, and wedding
invitations cards.
iii. Adobe Creative Cloud
Adobe creative cloud is made for designers, artists, filmmakers, and
other creative professionals. It is a suite of apps which includes
PhotoShop image editing programming, Illustrator, InDesign,
TypeKit, Dreamweaver, XD, and Audition.

2. Business Applications
Business applications are based on cloud service providers. Today,
every organization requires the cloud business application to grow
their business. It also ensures that business applications are 24*7
available to users.
There are the following business applications of cloud computing -
i. MailChimp
MailChimp is an email publishing platform which provides
various options to design, send, and save templates for emails.
iii. Salesforce
Salesforce platform provides tools for sales, service, marketing, e-
commerce, and more. It also provides a cloud development
platform.
iv. Chatter
Chatter helps us to share important information about the
organization in real time.
v. Bitrix24
Bitrix24 is a collaboration platform which provides
communication, management, and social collaboration tools.
vi. Paypal
Paypal offers the simplest and easiest online payment mode using
a secure internet account. Paypal accepts the payment through
debit cards, credit cards, and also from Paypal account holders.
vii. Slack
Slack stands for Searchable Log of all Conversation and
Knowledge. It provides a user-friendly interface that helps us to
create public and private channels for communication.
viii. Quickbooks
Quickbooks works on the terminology "Run Enterprise anytime,
anywhere, on any device." It provides online accounting
solutions for the business. It allows more than 20 users to work
simultaneously on the same system.

3. Data Storage and Backup Applications


Cloud computing allows us to store information (data, files, images,
audios, and videos) on the cloud and access this information using
an internet connection. As the cloud provider is responsible for
providing security, so they offer various backup recovery application
for retrieving the lost data.
A list of data storage and backup applications in the cloud are given
below -
i. Box.com
Box provides an online environment for secure content
management, workflow, and collaboration. It allows us to store
different files such as Excel, Word, PDF, and images on the cloud.
The main advantage of using box is that it provides drag & drop
service for files and easily integrates with Office 365, G Suite,
Salesforce, and more than 1400 tools.
ii. Mozy
Mozy provides powerful online backup solutions for our personal
and business data. It schedules automatically back up for each day
at a specific time.
iii. Joukuu
Joukuu provides the simplest way to share and track cloud-based
backup files. Many users use joukuu to search files, folders, and
collaborate on documents.
iv. Google G Suite
Google G Suite is one of the best cloud
storage and backup application. It includes Google Calendar,
Docs, Forms, Google+, Hangouts, as well as cloud storage and tools
for managing cloud apps. The most popular app in the Google G
Suite is Gmail. Gmail offers free email services to users.

4. Education Applications
Cloud computing in the education sector becomes very popular. It
offers various online distance learning platforms and student
information portals to the students. The advantage of using cloud
in the field of education is that it offers strong virtual classroom
environments, Ease of accessibility, secure data storage, scalability,
greater reach for the students, and minimal hardware requirements
for the applications.
There are the following education applications offered by the cloud -
i. Google Apps for Education
Google Apps for Education is the most widely used platform for free
web-based email, calendar, documents, and collaborative study.
ii. Chromebooks for Education
Chromebook for Education is one of the most important Google's
projects. It is designed for the purpose that it enhances education
innovation.
iii. Tablets with Google Play for Education
It allows educators to quickly implement the latest technology
solutions into the classroom and make it available to their students.
iv. AWS in Education
AWS cloud provides an education-friendly environment to
universities, community colleges, and schools.

5. Entertainment Applications
Entertainment industries use a multi-cloud strategy to interact
with the target audience. Cloud computing offers various
entertainment applications such as online games and video
conferencing.
i. Online games
Today, cloud gaming becomes one of the most important
entertainment media. It offers various online games that run
remotely from the cloud. The best cloud gaming services are
Shaow, GeForce Now, Vortex, Project xCloud, and PlayStation Now.
ii. Video Conferencing Apps
Video conferencing apps provides a simple and instant connected
experience. It allows us to communicate with our business partners,
friends, and relatives using a cloud-based video conferencing. The
benefits of using video conferencing are that it reduces cost,
increases efficiency, and removes interoperability.
6. Management Applications
Cloud computing offers various cloud management tools which help
admins to manage all types of cloud activities, such as resource
deployment, data integration, and disaster recovery. These
management tools also provide administrative control over the
platforms, applications, and infrastructure.
Some important management applications are -

i. Toggl
Toggl helps users to track allocated time period for a particular
project.

ii. Evernote
Evernote allows you to sync and save your recorded notes, typed
notes, and other notes in one convenient place. It is available for
both free as well as a paid version.
It uses platforms like Windows, macOS, Android, iOS, Browser, and
Unix.

iii. Outright
Outright is used by management users for the purpose of accounts.
It helps to track income, expenses, profits, and losses in real-time
environment.

iv. GoToMeeting
GoToMeeting provides Video Conferencing and online meeting
apps, which allows you to start a meeting with your business
partners from anytime, anywhere using mobile phones or tablets.
Using GoToMeeting app, you can perform the tasks related to the
management such as join meetings in seconds, view presentations
on the shared screen, get alerts for upcoming meetings, etc.

7. Social Applications
Social cloud applications allow a large number of users to connect
with each other using social networking applications such
as Facebook, Twitter, Linkedln, etc.
There are the following cloud based social applications -
i. Facebook
Facebook is a social networking website which allows active
users to share files, photos, videos, status, more to their friends,
relatives, and business partners using the cloud storage system. On
Facebook, we will always get notifications when our friends like and
comment on the posts.
ii. Twitter
Twitter is a social networking site. It is a microblogging system.
It allows users to follow high profile celebrities, friends, relatives,
and receive news. It sends and receives short posts called tweets.
iii. Yammer
Yammer is the best team collaboration tool that allows a team of
employees to chat, share images, documents, and videos.
iv. LinkedIn
LinkedIn is a social network for students, freshers, and
professionals.

5. Define DSP and applications of DSP?


6. What is Cloud Analytics? How it is important in business
organisations?
Cloud analytics describes the application of analytic algorithms
in the cloud against data in a private or public cloud to then deliver
a result of interest. Cloud analytics involves deployment of scalable
cloud computing with powerful analytic software to identify patterns
in data and to extract new insights. More and more businesses rely
on data analysis to gain a competitive advantage, to advance
scientific discovery, or to improve life in all sorts of ways. Data
analytics has therefore become an increasingly valuable tool as the
quantity and the value of data continue to climb.
Cloud analytics is often associated with artificial intelligence
(AI), machine learning (ML), and deep learning (DL). And it is
commonly used in industry applications such as scientific research
in genomics or in oil and gas fields, business intelligence, security,
Internet of Things (IoT), and many others. In fact, any industry can
benefit from data analytics to improve organizational performance
and to drive new value.
By leveraging AI and other analytics approaches, organizations
of all sizes can quickly make data-driven decisions to gain
efficiencies in their products and services. The cloud is an
indispensable platform that enables quick experimentation of ideas
through proofs of concept (POCs) and provides a rich software
ecosystem for building AI applications and for training DL models.

AI is increasingly being used in multiple industry verticals to


support important business needs such as automating business
processes, providing cognitive insights through data analysis, and
interacting with customers with natural language processing. DL,
the next level of ML, is effective at learning from large volumes of
data to mimic the human brain’s pattern recognition (for example,
images, speech, and text).

Cloud infrastructure analytics, a subset of cloud analytics,


focuses on the analysis of data that’s associated with IT
infrastructure, on the premises or in the cloud. The goal is to
identify I/O patterns, to evaluate application performance, to
identify policy compliance, and to support capacity management
and infrastructure resilience.

How cloud analytics can help drive growth and scalability


Data analytics isn’t a new concept. The term “big data” was
introduced in the late 90’s to describe large data sets often found in
specific industries such as energy, financial services, healthcare,
space travel, and other scientific disciplines. The ability to analyze
and extract insights from large data sets, data analytics,
accelerated with the introduction of analytics software, such
as Apache Hadoop. As analytics technologies and workloads moved
to the cloud they became known as Cloud Analytics. Cloud Analytics
has rapidly increased the ease, accessibility, and capability of
performing complex data analysis on very large data sets.
Cloud Analytics is particularly interesting for several reasons:
• The amount of data collected around the world is growing at
staggering rates and much of it is being created and pooled in
the cloud or at IOT endpoints
• Services delivered in the cloud are much easier to deploy as
they are delivered as an automated service and they don’t
require deployment and maintenance of physical hardware
• The cloud business model enables a user to turn services on and
off as needed. This consumption approach allows customers to
pay only for what they use when they use it, thereby removing
the responsibility of procuring and managing capital
infrastructure as well as reducing data center space
• The cloud allows users to deploy the right quantity of IT
resources to match the problem at hand. Dynamic resizing of
resources means that users can easily apply compute and
storage and scale them as needs change. Users are spared the
requirement to procure a fixed capacity of physical IT equipment
for all of their data analysis projects
• Building a hybrid analytics solution is effective for users who
wish to leverage the cloud to test a new analytics project as a
POC before committing to investments on-premises

Cloud Analytics empowers organizations to:


• Test genomic data to better understand genetic disease and how
to offer cures
• Identify patterns in speech, images and videos in order to
improve customer satisfaction and improve customer service
• Study buying behavior to improve product availability and
delivery
• Identify patterns of disease reporting to improve availability of
medicine and vaccines
• Analyze hybrid cloud infrastructures to improve application
performance and optimize IT costs

7. Risks and challenges of implementing IOT?


Although the risks are generally well understood, the sheer
volume and diversity of IoT devices requires a greater level of
attention and control than a business might otherwise exercise. The
most detrimental risks of IoT environments include the following:
Inability to discover all IoT devices. IoT tools and practices
must be capable of discovering and configuring all IoT devices in
the environment. Undiscovered devices are unmanaged devices
and can provide attack vectors for hackers to access the network. In
a broader sense, admins must be able to discover and control all
devices on the network.
Weak or absent access control. IoT security depends on the
proper authentication and authorization of each device. This is
strengthened by each device's unique identifier, but it's still
important to configure each IoT device for least privilege --
accessing only the networkresources that are essential. Reinforce
other security measures by adopting strong passwords and enabling
network encryption for every IoT device.
Ignored or overlooked device updates. IoT devices can require
periodic updates or patches to internal software or firmware.
Ignoring or overlooking a device update can leave IoT devices
susceptible to intrusion or hacking. Consider update logistics and
practices when designing an IoT environment. Some devices might
be difficult or impossible to update in the field and might even be
inaccessible or problematic to take offline.
Poor or weak network security. IoT deployments can add
thousands of devices to a LAN. Each new device opens a potential
access point for intrusion. Organizations that implement IoT often
implement additional network-wide security measures, including
intrusion detection and prevention systems, tightly controlled
firewalls and comprehensive antimalware tools. Organizations might
also opt to segment the IoT network from the rest of the IT network.
Lack of security policy or process. Policy and process is vital for
proper network security. This represents the combination of tools
and practices used to configure, monitor and enforce device
security across the network. Proper documentation, clear
configuration guidelines and rapid reporting and response are all
part of IoT and everyday network security.
8. Give most important business considerations for IoT Solutions?
The 10 most important considerations for IoT solutions:
• IoT Security
• IoT Analytics
• IoT Device (Thing) Management
• Low-Power, Short-Range IoT Networks
• Low-Power, Wide-Area Networks
• IoT Processors
• IoT Operating Systems
• Event Stream Processing
• IoT Platforms
• IoT Standards and Ecosystems
IoT Security
IoT introduces a wide range of new security risks and challenges to the IoT
devices themselves, their platforms and operating systems, their communications, and
even the systems to which they're connected. Security technologies will be required
to protect IoT devices and platforms from both information attacks and physical
tampering, to encrypt their communications, and to address new challenges such as
impersonating "things" or denial-of-sleep attacks that drain batteries. IoT security
will be complicated by the fact that many "things" use simple processors and
operating systems that may not support sophisticated security approaches.
IoTamy security specialists are focused on security threats as hackers find new
ways to attack IoT devices and protocols. IoTamy solutions support updatable
firmware “over the air” to ensure that risks can be mitigated through patches as soon
as a vulnerability is detected or requirements change or capabilities are improved.
IoT Analytics
IoT business models will exploit the information collected by "things" in many
ways — for example, to understand customer behavior, to deliver services, to
improve products, and to identify and intercept business moments. IoTamy has
partnered with leading edge Analytics service providers to ensure that you get the
flexibility you require when iterating your interpretation of your dataset.
IoT Device (Thing) Management
Long-lived nontrivial "things" will require management and monitoring. This
includes device monitoring, firmware and software updates, diagnostics, crash
analysis and reporting, physical management, and security management. IoT also
brings new problems of scale to the management task.
IoTamy tools are capable of managing and monitoring thousands and perhaps
even millions of devices.
Low-Power, Short-Range IoT Networks
Selecting a wireless network for an IoT device involves balancing many
conflicting requirements, such as range, battery life, bandwidth, density, endpoint
cost and operational cost.
IoTamy solutions comprise either fixed or wireless networking for IoT devices.
Fixed networking technologies include “IoT over Powerline” while Wireless
technologies include LoRa, which is a long-range low power spread spectrum
technology that can connect millions of devices in a single LoRa network.
Low-Power, Wide-Area Networks
Traditional cellular networks don't deliver a good combination of technical
features and operational cost for those IoT applications that need wide-area coverage
combined with relatively low bandwidth, good battery life, low hardware and
operating cost, and high connection density.
The long-term goal of a wide-area IoT network is to deliver data rates from
hundreds of bits per second (bps) to tens of kilobits per second (kbps) with
nationwide coverage, a battery life of up to 10 years, an endpoint hardware cost of
around $5, and support for hundreds of thousands of devices connected to a base
station or its equivalent.
The first low-power wide-area networks (LPWANs) were based on proprietary
technologies, but in the long term emerging standards such as Narrowband IoT (NB-
IoT) will likely dominate this space.
IoTamy is working with Tier 1 Telcos to develop NB-IoT solutions that are
secure, cost effective and provide nationwide coverage. NB-IoT is a new standard
that was defined recently and is not commonly deployed by Telcos. NB-IoT requires
both the network solution together with NB-IoT low cost hardware solutions. IoTamy
is at the forefront of this development and has advanced products and solutions
already in the field.
IoT Processors
The processors and architectures used by IoT devices define many of their
capabilities, such as whether they are capable of strong security and encryption,
power consumption, whether they are sophisticated enough to support an operating
system, updatable firmware, and embedded device management agents.
IoTamy understands the complex trade-offs between features, hardware cost,
software cost, software upgradability and build best practice into every solution we
deliver.
IoT Operating Systems
Traditional operating systems (OSs) such as Windows and iOS were not
designed for IoT applications. They consume too much power, need fast processors,
and in some cases, lack features such as guaranteed real-time response. They also
have too large a memory footprint for small devices and may not support the chips
that IoT developers use.
IoTamy has developed an IoT operating system that suits many different
hardware footprints and feature needs.
Event Stream Processing
Some IoT applications will generate extremely high data rates that must be
analyzed in real time. Systems creating tens of thousands of events per second are
common, and millions of events per second can occur in some telecom and telemetry
situations.
To address high data rate requirements IoTamy has developed distributed
stream computing platforms (DSCPs) using parallel architectures to process very
high data rate streams to perform tasks such as real-time analytics and pattern
identification.
IoT Platforms
IoT amy provides three key platform components;
(1) low-level device control and operations such as communications, device
monitoring and
management, security, and firmware updates
(2) IoT data acquisition, transformation and management
(3) IoT application development, including event-driven logic, application
programming,
visualization, analytics and adapters to connect to enterprise systems.
IoT Standards and Ecosystems
Although ecosystems and standards aren't precisely technologies, most
eventually materialize as application programming interfaces (APIs). Standards and
their associated APIs will be essential because IoT devices will need to interoperate
and communicate, and many IoT business models will rely on sharing data between
multiple devices and organizations.

You might also like