Professional Documents
Culture Documents
2017CS10324 Assignment 2
2017CS10324 Assignment 2
❖ Bandwidth cost savings: Edge computations on IoT devices helps send only selected
tasks to servers
❖ Better privacy options and regulatory compliance: If data is not sent to the server
and kept with the IoT device, security is achieved
Micro/Femto cells support higher QoS capabilities and exibility. Such cells are easily
maintained and implemented because of lower weights. These cells are eco-friendly
because of lesser cell towers and low power requirements. They also have higher
capacity because than macro cells and are less prone to interference. More bene ts
include lower delay, in-building coverage and better cell-edge coverage
Challenges
• Identi cation of the millions of necessary locations
• Energy ef ciency Challenge
ASSIGNMENT 2 2017CS10324 1
fi
fi
:
2
.
fl
t
fi
• Acquiring permits for identi ed locations
• Operational costs to lease, deploy and maintain sites for most of these new small cells
Path Loss
The free space path loss is dependent on the carrier frequency fc. Antenna size
decreases with an increase in fc. Path loss may be unchanged because constant antenna
aperture is maintained in most network end points. Furthermore, if both end points have
constant aperture, path loss will surprisingly reduce
Blockage
mmWave are very susceptible to blockages since they expose prismatic propagation. This
will result in a large scale drawback that cannot be bypassed with small scale diversity
countermeasures
4. IoT Scheduling
ASSIGNMENT 2 2017CS10324 2
fi
.
fi
good nodes to send data. Furthermore, the probability will depend on the importance of a
node as in how pivotal for the task a particular node is.
Autonomous vehicles have to be very minutely designed taking care of any change in the
surroundings because of the real time dynamic nature of driving. Connectivity of the car to
the network may become weak at times but they have to be taken care of and AI/ML
comes into play here
Smart home environments uses GPS, ML and AI to perform lots of sophisticated tasks
such as changing the thermostat setting by recognising what I like when I come home.
Smart locks can be installed in homes using visual recognition and similarly smart
doorbells can recognise me, lights can be controlled using this and maybe start playing
music. If these tasks are done separately, they are not very dif cult but to implement them
in conjuncture and on a daily basis is the genius
Lots of machinery and big equipments are used for production and processing; in order to
ensure proper functioning, monitoring them regularly is a must and if it is not done,
companies can suffer huge losses. Edge computing and ML at these hardware can look
for warning signs and perform regular maintenance and checks
VR/AR in Retai
Some stores provide the customers an option to try out clothes and makeups virtually by
using cameras and augmentations to try on products quickly and easily. This cuts out the
ASSIGNMENT 2 2017CS10324 3
-
fi
l
fi
.
fi
c
6. N heterogeneous IoT (last mile) devices are sensing diverse data (e.g.,
Pressure, Temperature, Humidity, Vibration, etc.) and storing a time series
of the data. These N heterogeneous devices communicate the date to the
sink node (e.g., the 5G gateway) over wireless links. The gateway will
aggregate the date from the N devices and forward it to the upstream
cloud.
(a) From the point of view of data analytics, what are the challenges at the
Gateway node
❖ Challenge: Handling high raw data volume for processing in the IoT gateway drives
high energy consumption. Solution: Reduce the number of data transmission (which
tells the data volume) using LMS adaptive lters
❖ Challenge: Continuous availability of the gateway, without any downtime and security
breaches. Solution: IoT Gateway Clustering: Many gateways are deployed in the
networks and a concept like cloud networks is used to support P2P connectivity
❖ Challenge: Raw data processing from the sensors. Solution: Information centric
networking (ICN) solutions: IoT Network edge data processing can be improved
❖ Challenge: Network attacks (active and passive) eg- device monitoring, eavesdropping,
man-in-the-middle. Solution: Many security strategies can be used to such as pyaload
encryption, certi cate usage, rest and transit data encryption and so on along with
secure connectivity.
Speed: If all data is sent to the server in its raw form, the latency increases due to the
overhead of sending the data to the server. Using edge computing, many computations
are done at a source very close to the device and processed data is sent to the server,
this reduces the overhead and overall performance improves.
ASSIGNMENT 2 2017CS10324 4
fi
fi
fi
?
fi
.
fi
.
Security: Edge computing sends less information through the network and processes the
data before sending so the network becomes more secure
Scalability: In cloud, everything happens on the cloud, but in edge, edge server manages
the devices rst and then the main server receives the data, so by appropriately using
these local servers, edge computing becomes highly scalable without worrying too much
about the availability of storage
Reliability: Edge computing decreases network traf c and storage requirements at the
cloud and this leads to more structured and smooth business operations. It prevents site
electrical failures and increases optimal site up-time. Heart rate monitors and other health
related equipments become more reliable with edge computing
A. Interfaces: Interfaces are used while communicating with the cloud and device and
also access security to device using protocols such as HTTP.
B. Protocols: The network interface protocol ports are major attack vectors on an
internet-connected device. Access to the device is exposed through these ports (eg-a
web interface is exposed typically through port 80) and can provide the attacker with
the information about the type of attacks possible.
C. Password and authentication risks: For the the convenience of users and
administrators, strong authentication measures such as multi-factor or two-stage
authentication are not employed by Edge systems.
D. Physical Security: The device can be compromised physically or opened using some
way.
E. Firmware Update Process: Edge computing has a requirement to be updated
regularly and x pervious bugs. This update process also creates an attack vector
9. Discuss the interdependence of 5G, IoT and Edge Computing. How are
these three technologies correlated and how do they impact each other.
Industry 4.0 refers to an array of areas like smart city grids, mobile content streaming,
data analytics and autonomous vehicles. 5G, IoT and Edge Computing together are the
enablers for Industry 4.0. If these are not all done simultaneously and only say IoT is
expanded, there will be network issues in handling the billions of devices and also in
processing the huge volume of data
5G is the foundation for reaching the heights of IoT. Being much more than downloads;
DG is a unique combination of very low latency, high-speed connectivity, and ubiquitous
coverage. Connected cars, trucks and other vehicle and transport is supported by 5G and
it provides ultra smooth, low-latency solutions because even a split second delay can
result in 4-way crash from smooth traf c. Real-time network performance is critical in
many areas such as heavy machinery environments, these devices can be controlled
remotely using 5G
Devices are at the edge of the networks and each device produces a huge amount of data
and there is a large number of devices from end points, now these end points if send all
data on to the network in the raw form, storage limitations, bandwidth limitations, latency
and throughput issues will Crete havoc in the IoT. Thus edge computing is essential for
ASSIGNMENT 2 2017CS10324 5
fi
fi
.
fi
.
fi
fi
.
the scalability of IoT. Furthermore, traditional approaches can’t provide real time solutions
and edge computing has become essential
10. N IoT devices are connected to the edge compute server. The N devices
are running concurrently. Explain how the edge compute server will be
able to concurrently handle the N IoT devices
The server will maintain a queue for the tasks that come to it and each task will be
determined by two things i) the IoT device that sent the task ii) the data of the task.
Scheduling algorithms can be used as per the requirements such as FCFS, Priority
Scheduling, Multi-level queue scheduling and so on. After a task has been fully nished, it
will be sent to the concerned IoT device
(ii) The bandwidth between IoT devices and the edge servers needs to be
strictly greater than the bandwidth between the edge servers and the cloud
servers.
YES. All data is sent to edge device, however edge device only sends certain fraction of it
to the cloud. Thus much larger volume transfer is needed between IoT device and edge
server. Therefore, the bandwidth should be greater.
(iv) With super high speed WiFi 6 networks, 5G networks are going to
become increasingly irrelevan
NO. 5G provides much more than Wi 6, 10x lower latency vs only 75% lower latency,
1000x capacity against only 4x capacity and 50x speed. Although Wi is low cost and
easy to deploy, 5G has much longer range and uses licensed spectrum so bandwidth is
not determined by current number of users.
ASSIGNMENT 2 2017CS10324 6
fi
t
fi
.
fi
fi
12.You are told to implement 5G Network Slicing in your networking lab.
Describe the key metrics and factors that you need to keep in mind as you
work on a proof-of-concept
Latency, Data Security, Throughput, Energy Ef ciency, Mobility, Massive Connectivity,
Reachability, Guaranteed Qo
14. The transmission range (R) of an IoT node is the coverage area of the
node. Nodes within the transmission range are able to communicate with
each other.
(b) How will the above plot change as you increase the number of nodes in
the network? Plot Pc versus R with varying number of nodes in the
network
Pc varies with inverse R2 and the transmission can be done successfully for a threshold
number of nodes. When the number further increase, the probability decreases.
ASSIGNMENT 2 2017CS10324 7
)
fi
fi
?
15. Suppose four active IoT nodes – nodes A, B, C and D – are competing
for access to a channel using slotted ALOHA. Assume each IoT node has
an in nite number of packets to send. Each node attempts to transmit in
each slot with probability ‘p’. The rst slot is numbered slot 1, the second
slot is numbered slot 2, and so on.
(a) What is the probability that node A succeeds for the rst time in slot
5? Hint: rst compute the probability that node A succeeds in a slot,
then compute the required probability.
Probability A succeeds in one slot =pA= only A sends = p.(1-p)^
ASSIGNMENT 2 2017CS10324 8
fi
fi
fi
fi
4
fi
3