Professional Documents
Culture Documents
IoT Question Answer
IoT Question Answer
IoT Question Answer
OR
What effect does IOT have on our daily lives?Explain with Example of
smart devices.
Ans-
Definition of IoT
Internet of Things (IoT) is a network of physical objects or people called “things” that are embedded with
software, electronics, network, and sensors that allows these objects to collect and exchange data. IoT
makes virtually everything “smart,” by improving aspects of our life with the power of data collection, AI
algorithms, and networks.
The term “The Internet of Things” (IoT) was coined by Kevin Ashton in a presentation to Proctor &
Gamble in 1999.
IoT is network of interconnected computing devices which are embedded in everyday objects, enabling
them to send and receive data.
IoT is a concept that connects all the devices to the internet and lets them communicate with
each other over the internet. IoT is a giant network of connected devices – all of which gather and share
data about how they are used and the environments in which they are operated.
Things on IoT
In the context of IoT, things refer to a variety of devices. At times, even humans in the loop become a
thing. For anything to qualify as a “thing”, it requires the identity of its existence. The “thing” in a network
can monitor/measure; for example, a temperature sensor could be a thing. Things are capable of
exchanging data with other connected devices in the system.
Not just sensors, the following also can be called as things:
1. Industrial motors.
2. Wearables (your watch, band).
3. Vehicles.
4. Shoes.
5. Heart monitoring implants (pacemaker, ECG tracking real time).
6. Biochip transponders (this is for animals in the farms).
7. Automobiles with built-in sensors (automobile feature monitoring real time).
8. Food/perishables quality measuring.
9. Minimize human effort: As the devices of IoT interact and communicate with each
other and do lot of task for us, then they minimize the human effort.
1. Security/Personnel Safety: It is one of the most prominent and very highly rated
challenges to confront. Since a number of devices are used in the IoT zone, user data
becomes more vulnerable to theft. So, it becomes necessary to make sure that the data
is safe. Safeguarding the data is very important. Poor security features can let the
attackers damage the whole network. People’s personal safety is a concern and
challenge too. The implants and wearables used by the users in the IoT infra should be
safe. The devices should not cause any physical damage to the person using the same.
Since many devices are in the loop, if one device gets attacked, then the rest of the
devices could also fall prey.
5. Power Requirements: All the IoT devices need power. Most of them are battery
operated. Even though we now have long-lasting batteries that are economical,
however, demand for power is on the rise and hence usage of green power sources like
solar/wind should be motivated. If the power requirements are met appropriately, IoT
can still more be powerful.
6. Complexity Involved: IoT is not easy! Why so? It needs a lot of different domains to
come together. There is a very limited expertise available in the market. But, the growth
is very rapid. The toolkits, software, hardware are not abundant and it needs real skill to
build an application. Over the next few years, IoT would get more and more technology
experts to work. 7. Storage: Cloud is becoming mandatory for the data to be stored and
analysed. The challenge with respect to this aspect would be connected to the following
points:
a. Which cloud to use (private, public or hybrid)?
b. How to identify the service provider?
c. How much does it cost?
d. Do we really need cloud?
7.Costs:The infrastructure that IoT requires is expensive in itself, but the overall costs
often prove to be a surprise for most people. There are invisible costs to every major
undertaking, and IoT projects are not an exception to this. The cost of updates,
maintenance, design, replacing outdated devices, and the technical skillsets required
can pile up very quickly.
The costs of IoT development are high because the infrastructure has not caught up
with the technology yet, and finding the right team with the required expertise is very
difficult. However, this is quickly changing as more businesses invest in IoT.
9. Development Skillset: Finding people who are experts in IoT and also understand
security, hardware, and user requirements is extremely tough. This is a multi-domain
expertise that also comes with further specialization in industry and scale.
As the size of the IoT industry grows, the demand for IoT professionals has shot up,
which is not at par with the supply. This usually means that the cost of the project goes
up, and you might not have people with the right skillset to execute your project.
10. Design: As IoT becomes commonplace across the world, usability becomes a key
concern. The interface that allows you to handle multiple devices at the same time has
to be as well designed as the overall system. If the user experience is not taken into
account, the efficiency of your devices and processing will make little difference.
SMART ENERGY: smart energy also called smart grids, is a significant opportunity for
IoT systems. Smart energy is about connecting the power grid infrastructure, homes,
and buildings to make them more tightly integrated with each other. In effect, smart
grids enable all parts of the energy system to communicate with each other. Smart
energy starts with homes and buildings equipped with smart meters. They acquire the
current cost of power from the utility company and report the energy usage to the
homeowner, who can change their consumption patterns to save costs. This can also
be done using automated systems that start the washing machine or heating system
automatically when demand and price are low, for example at night.
This enables cost optimization and better utilization of the grid as a whole. If we switch
the perspective from the entire grid infrastructure to a tiny detail of the energy system,
we can find an additional use for IoT. The energy rates have raised to a great instinct.
Individuals and organisations, both are searching ways to reduce and control the
consumption. IoT provides a way to not only monitor the energy usage at the
appliance-level but also at the house-level, grid level or could be at the distribution level.
Smart Meters & Smart Grid are used to monitor energy consumption. It also detects
threats to the system performance and stability, which protect appliances from downtime
and damages.
Thanks to pressure sensors, the bed also detects if the patient tries to get up, perhaps
at three o’clock in the morning when the nurses are not around to notice. The bed can
send an alarm notifying nurses that a patient requires attention.
SMART FACTORIES: Factories may be the most obvious place for IoT. Thousands of
sensors and actuators exist in a modern plant, along with industrial robots and other
machinery. Connecting them all to a network makes great sense.But now, many
industrial devices are connected directly to the Internet instead. This unites
manufacturing and business domains, such that they can interact more tightly by
connecting the factory floor with enterprise systems and decision makers.
Even farm animals are becoming Internet-connected now. Cows get necklaces with
motion sensors and microphones that monitor the animal’s activity and rumination level.
The system can alert farmers of indications an animal is in heat or may have health
problems. RFID and temperature tags are already being planted in pigs. Combined with
information on drinking and feed rate, CO2 concentration, ammonia, pH levels, and
more, it is possible to improve the welfare of pigs and give an early warning of any
diseases.
SMART HOMES:Your home will likely be very different than it is now within a couple of
years. Homes are perhaps the most obvious place for many IoT devices. IoT
connections are already integrated into thermostats, door locks, fire and burglar alarms,
and automatic garage doors. Security cameras, heating, and air conditioning systems,
as well as sound and TV systems, are becoming more common too. The same goes for
baby monitors, and I will discuss these in some detail in the chapter on security and
privacy problems.
SMART EDUCATION SYSTEM: IoT provides education aids which helps in fulfilling the
gaps in the education industry. It not only improves the quality of education but also
optimizes the cost and improves the management by taking into consideration students
response and performance.
Data from smart roads and sensors on lampposts can measure other conditions like
noise, air quality, temperature, or even the level of precipitation. This data, collected
over a long period, can be incredibly useful for city planning.
SMART ROADS AND TRANSPORTATION: With smart cars come smart roads. IoT is
being used to create interactive roads that adapt their behavior based on dynamic
environmental considerations like theweather or the movement of cars and pedestrians.
With smart light-, weight-, or motion sensors, road lighting or overhead signs can be
turned on or off to respond to traffic conditions at a particular time.
IoT has changed the transportation sector. Now, we have self-driving cars with sensors,
traffic lights that can sense the traffic and switch automatically, parking assistance,
giving us the location of free parking space etc. Also, various sensors in your vehicle
indicate you about the current status of your vehicle, so that you don’t face any issues
while travelling.
SMART MARKETING: Using IoT, organizations can better analyze & respond to
customer preferences by delivering relevant content and solutions. It helps in improving
business strategies in the real-time.
The cars use several sensors and embedded systems connected to the Cloud and the
internet to keep generating data and sending them to the Cloud for informed
decision-making through Machine Learning. Though it will take a few more years for the
technology to evolve completely and for countries to amend laws and policies, what
we’re witnessing right now is one of the best applications of IoT.
If you change your mind and pick up another article, the previous one gets deleted and
replaces in your cart with the new item. The best part of the concept store is that there
is no cashier to bill your products. You don’t have to stand in line but just step out after
you pick up your products from shelves. If this technology is effective enough to fetch
more patronage, this is sure to become a norm in the coming years.
WEARABLES
Wearables remain a hot topic in the market, even today. These devices serve a wide
range of purposes ranging from medical, and wellness to fitness. Of all the IoT startups,
Jawbone, a wearables maker, is second to none in terms of funding.
INDUSTRIAL IOT
The Industrial Internet of Things consists of interconnected sensors, instruments, and
other devices connected with computers’ industrial applications like manufacturing,
energy management, etc. While still being unpopular in comparison to IoT wearables
and other uses, market researchers like Gartner, Cisco, etc., believe the industrial
internet to have the highest overall potential.
TELEHEALTH
Telehealth, or Telemedicine, hasn’t completely flourished yet. Nonetheless, it has great
future potential. IoT Examples of Telemedicine include the digital communication of
Medical Imaging, Remote Medical Diagnosis & Evaluations, Video Consultations with
Specialists, etc.
Q5.Explain four main pillars of IoT and how they are inter-connected
with each other?
OR
2.CONNECTIVITY
Connectivity refers to establishing a proper connection between all the things of IoT to
IoT platform; it may be server or cloud. After connecting the IoT devices, it needs a high
speed messaging between the devices and cloud to enable reliable, secure and
bi-directional communication. All the collected data is sent to a cloud infrastructure. The
sensors should be connected to the cloud using various mediums of communications.
These communication mediums include mobile or satellite networks, Bluetooth, WI-FI,
WAN, etc.Gateway manages bi-directional data traffic between different networks and
protocols. Another function of the gateway is to translate different network protocols and
to ensure the interoperability of connected devices and sensors. The IoT gateway
provides a certain level of security for the network and data transmitted with
higher-order encryption techniques.
3.DATA PROCESSING/CLOUD COMPUTING
IoT systems send huge amounts of data from devices, and these data must be
managed efficiently to generate meaningful results. IoT technology uses the cloud to
store a large amount of data. It provides tools for collecting, processing, and storing
data. The data is easily available and accessible remotely through the internet. It also
provides a platform for analysis. The IoT cloud is an advanced network of
high-performance servers for high-speed processing of large amounts of data.
4.USER INTERFACE
The information needs to be available to the end-user in some way which can be
achieved by triggering alarms on their phones or sending them notification through
email or text message. The user sometimes might need an interface which actively
checks their IoT system. For example, the user has a camera installed in his home. He
wants to access video recording and all the feeds with the help of a web server.
However, it’s not always one-way communication. Depending on the IoT application and
complexity of the system, the user may also be able to perform an action which may
create cascading effects. For example, if a user detects any changes in the temperature
of the refrigerator, with the help of IoT technology the user should be able to adjust the
temperature with the help of their mobile phone.
Q6. Write a note on M2M.
OR
M2M Applications
• Machine-to-machine communication is often used for remote monitoring. In product
restocking, for example, a vending machine can message the distributor's network, or
machine, when a particular item is running low to send a refill. An enabler of asset
tracking and monitoring, M2M is vital in warehouse management systems (WMS) and
supply chain management (SCM).
• Utilities companies often rely on M2M devices and applications to not only harvest
energy, such as oil and gas, but also to bill customers -- through the use of smart
meters -- and to detect worksite factors, such as pressure, temperature and equipment
status.
• In telemedicine, M2M devices can enable the real time monitoring of patients' vital
statistics, dispensing medicine when required or tracking healthcare assets.
• The combination of the IoT, AI and ML is transforming and improving mobile payment
processes and creating new opportunities for different purchasing behaviors. Digital
wallets, such as Google
Wallet and Apple Pay, will most likely contribute to the widespread adoption of M2M
financial activities.
• Smart home systems have also incorporated M2M technology. The use of M2M in
this embedded system enables home appliances and other technologies to have real
time control of operations as well as the ability to remotely communicate.
• M2M is also an important aspect of remote-control software, robotics, traffic
control, security, logistics and fleet management and automotive.
KEY FEATURES OF M2M
• Low power consumption, in an effort to improve the system's ability to
effectively service M2M applications.
• A Network operator that provides packet-switched service
• Monitoring abilities that provide functionality to detect events.
• Time tolerance, meaning data transfers can be delayed.
• Time control, meaning data can only be sent or received at specific predetermined
periods.
• Location specific triggers that alert or wake up devices when they enter particular
areas.
• The ability to continually send and receive small amounts of data.
Q7. What are the differences between machines in M2M and IoT.
Ans-
Definition of IOT and M2M
1. Internet of Things : IoT is network of interconnected computing devices which are embedded in
everyday objects, enabling them to send and receive data.
IoT is a concept that connects all the devices to the internet and lets them communicate with
each other over the internet. IoT is a giant network of connected devices – all of which gather and share
data about how they are used and the environments in which they are operated.
A value chain describes the full range of activities that firms and workers perform to bring a
product from its conception to end use and beyond, including design, production, marketing,
distribution, and support to the final consumer
1. Inputs: Inputs are the base raw ingredients that are turned into a product.
Examples could be cocoa beans for the manufacture of chocolate or data from
an M2M device that will be turned into a piece of information.
● The IoT value chain explains the building blocks of IoT, how value is created,
who they players are, and how they interact with each other to deliver value.
● Looking at the IoT value chain as a pyramid, at the base is all the connected
devices: phones, fitness bands, connected cars, smart homes, and other devices
on the consumer side; in industry, you have things like building sensors, smart
cities, and connected factories, for example.
● Stepping up a level from the base brings in the network and connectivity—how
devices are connected and communicate. It’s also where service providers
collect device and network data and upload it to the cloud.
● Finally, at the top of the value chain, are applications and services that are
closest to the eventual end users—enterprises and consumers.
● The Value Chain is usually defined for a particular industry. For IoT as a
technology (coming together of technologies rather), it starts with the (bottom up)
STEPS IN IOT VALUE CHAIN
MEMORY AND STORAGE RAM between 1 and 8 GB. Average RAM of 4GB and
Micro SD card for storage. Hard Drive/SSD for storage.
The tips below can help assure the proper security considerations in the design of connected
devices for all applications:
• Build threat models: Assess the use case of your devices and services during the product
design phase. Evaluate the various risks, and build mitigation plans into the overall product
design.
• Create security and abuse cases: Make sure that you put your team to work doing tests to
validate your threat model. Put in play a continual evaluation with each product iteration to
ensure the threat model continues to meet your threat scenarios.
• Securely manage keys: Integrate your processes by generating and storing your private keys
securely, either using hardware security modules (HSMs) or one of the major cloud-based IoT
platforms.
• Put certificates to use: Enable your devices to use certificates instead of passwords for
authentication. Public key infrastructure (PKI) certificates play a critical role in your IoT solution,
as they validate a device’s identity to only allow authorized devices, users and servers to access
the device. Certificates are also used to encrypt data sent to and from the device. Additionally,
code signing certificates ensure over-the-air updates are signed with tamper-proof code and
that the device securely boots every time.
Security by design is a methodical process, not an ad hoc undertaking. Failure to adopt this
mindset for every single IoT device that rolls off an assembly line will likely lead to the need to
make quick fixes to address bugs or newly discovered security threats. That’s an expensive,
complicated solution that may still fail to make the device more secure because an attacker can
develop a workaround to a fix that does not address the vulnerability from a structural
standpoint.
The IoT Reference Model starts with Level 1: physical devices and controllers that might control
multiple devices.
These are the “things” in the IoT, and they include a wide range of endpoint devices that send
and receive information. Today, the list of devices is already extensive. It will become almost
unlimited as more equipment is added to the IoT over time.Devices are diverse, and there are
no rules about size, location, form factor, or origin. Some devices will be the size of a silicon
chip. Some will be as large as vehicles. The IoT must support the entire range. Dozens or
hundreds of equipment manufacturers will produce IoT devices.
Level 2: Connectivity
● Communications and connectivity are concentrated in one Level 2. The most important
function of Level 2 is reliable, timely information transmission. This includes
transmissions:
● Between devices (Level 1) and the network
● Across networks (east-west)
● Between the network (Level 2) and low-level information processing occurring at Level 3
One objective of the IoT Reference Model is for communications and processing to be executed
by existing networks. The IoT Reference Model does not require or indicate creation of a
different network— it relies on existing networks.
Connectivity includes:
The functions of Level 3 are driven by the need to convert network data flows into information
that is suitable for storage and higher level processing at Level 4 (data accumulation). This
means that Level 3 activities focus on high-volume data analysis and transformation. For
example, a Level 1 sensor device might generate data samples multiple times per second, 24
hours a day, 365 days a year. A basic tenet of the IoT Reference Model is that the most
intelligent system initiates information processing as early and as close to the edge of the
network as possible. This is sometimes referred to as fog computing. Level 3 is where this
occurs.
Given that data is usually submitted to the connectivity level (Level2) networking equipment by
devices in small units, Level 3 processing is performed on a packet-by-packet basis. This
processing is limited, because there is only awareness of data units—not “sessions” or
“transactions.” Level 3 processing can encompass many examples, such as:
Level 3 functionality
At Level 4, Data Accumulation, data in motion is converted to data at rest. Level 4 determines:
● If data is of interest to higher levels: If so, Level 4 processing is the first level that is
configured to serve the specific needs of a higher level.
● If data must be persisted: Should data be kept on disk in a non- volatile state or
accumulated in memory for short-term use?
● The type of storage needed: Does persistency require a file system, big data system, or
relational database?
● If data is organized properly: Is the data appropriately organized for the required storage
system?
● If data must be recombined or recomputed: Data might be combined, recomputed, or
aggregated with previously stored information, some of which may have come from
non-IoT sources.
As Level 4 captures data and puts it at rest, it is now usable by applications on a non-real-time
basis. Data Abstraction
● Creates schemas and views of data in the manner that applications want
● Combines data from multiple sources, simplifying the application
● Filtering, selecting, projecting, and reformatting the data to serve the client applications
● Reconciles differences in data shape, format, semantics, access protocol, and security
● Abstracting the data interface for applications
Level 6: Application
Level 6 is the application level, where information interpretation occurs. Software at this level
interacts with Level 5 and data at rest, so it does not have to operate at network speeds. The
IoT Reference Model does not strictly define an application. Applications vary based on vertical
markets, the nature of device data, and business needs. For example, some applications will
focus on monitoring device data. Some will focus on controlling devices. Some will combine
device and non-device data. Monitoring and control applications represent many different
application models, programming patterns, and software stacks, leading to discussions of
operating systems, mobility, application servers, ,multi-threading, etc.
The IoT system, and the information it creates, is of little value unless it yields action, which
often requires people and processes. Applications execute business logic to empower people.
People use applications and associated data for their specific needs. Often, multiple people use
the same application for a range of different purposes. So the objective is not the application—it
is to empower people to do their work better. Applications (Level 6) give business people the
right data, at the right time, so they can do the right thing.But frequently, the action needed
requires more than one person. People must be able to communicate and collaborate,
sometimes using the traditional Internet, to make the IoT useful.
Ans-
Information model does not describe the specifics of how the information is represented
or stored.
To define the information model, we first list the Virtual Entities defined in the Domain
Model.
Information model adds more details to the Virtual Entities by defining their attributes
and relations
STEP 5:Service Specifications
From the process specification and information model, we identify the states and
attributes.
For each state and attribute we define a service.
These services either change the state or attribute values or retrieve the current values.
STEP 6: IoT Level Specification
The sixth step in the IoT design methodology is to define the IoT level for the system.
STEP 7: Functional View Specification
The Functional View (FV) defines the functions of the IoT systems grouped into various
Functional Groups (FGs).
The Functional Groups (FG) included in a Functional View include:
Device : The device FG contains devices for monitoring and control. In the home
automation example. the device FG includes a single board mini-computer, a light
sensor and relay switch(actuator).