Io T

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

IoT

Unit 3

// non -digital

Read and write on own

Certainly! Non-digital prototyping involves creating physical models without relying on digital
technologies. Here are some accessible materials and methods commonly used for this
purpose:

1. **Modeling Clay:** Brands like Play-Doh and Plasticine are pliable materials that allow you to
shape and mold your ideas easily.

2. **Epoxy Putty (Milliput):** This is a two-part material that, when mixed, becomes a moldable
and sturdy substance, providing a hands-on way to create prototypes.

3. **Sugru:** A moldable silicone rubber that sets in about 30 minutes and remains flexible once
cured. It's a quick and flexible option for creating prototypes.

4. **Toy Construction Sets:** Utilize popular sets like Lego, Meccano, or Erector sets. These kits
come with modular pieces, including gears and hinges, allowing you to build interactive models.

5. **Cardboard:** A cost-effective and readily available material that is easy to cut with scissors
or a craft knife. It comes in various colors and thicknesses, providing a simple way to shape
your prototypes.

6. **Foam Core/Foam Board:** This material consists of a layer of foam sandwiched between
two sheets of card. It's available in different thicknesses and is easy to cut with a craft knife,
offering a balance of flexibility and rigidity for prototyping.

7. **Extruded Polystyrene (Blue Foam):** This denser form of polystyrene, often known as blue
foam, is suitable for modeling. Despite its name, it's the density rather than the color that makes
it useful for creating prototypes.

These non-digital methods offer a hands-on and practical approach to prototype development,
allowing for quick experimentation and iteration of ideas.

// Lazer cutter

Read and write on OWN


**Laser Cutter Basics:**

1. **Parts:**
- Flat bed holds stuff to cut.
- Laser beam directed by mirrors and lenses.

2. **How It Works:**
- Like a high-tech pen burning patterns instead of drawing.
- Adjustable laser power controls cutting depth.

3. **Key Features:**
- **Bed Size:** Big bed, cut big things.
- **Laser Power:** Strong laser, cut thick stuff.

4. **Cool Stuff:**
- Makes intricate designs easily.
- Can adjust power to avoid cutting all the way through.

Remember: Laser cutter = High-tech cutter with a cool laser, big bed, and adjustable power for
awesome designs!

// Method use for 3d printing

Read and write on OWN


Not much important for regular exam

1. **Fuse Filament Fabrication (FFF):**


- *Process:* It uses a nozzle to extrude a fine filament of material (usually plastic) layer by
layer.
- *Control:* The nozzle is controlled by a computer, moving both horizontally and vertically.
- *Key Point:* It's like a 3D printer with a hot plastic nozzle that builds up the object by adding
melted material layer by layer.

2. **Laser Sintering (SLS, EBM, DMLS):**


- *Process:* Involves a laser melting powdered materials (plastic or metal) selectively.
- *Applications:* Common in industrial settings, can print various materials in powder form.
- *Key Point:* Laser selectively melts powder to create the 3D object, giving flexibility in
material choices.
3. **Powder Bed Printing:**
- *Process:* Similar to laser sintering but uses a print head to dispense a binder onto
powdered material.
- *Advantage:* Allows for color customization as the binder is applied, offering more design
possibilities.
- *Key Point:* Instead of a laser, a print head applies a binding agent to powdered material for
layer-by-layer construction.

4. **Laminated Object Manufacturing (LOM):**


- *Process:* Builds models by laminating layers of paper together.
- *Color Printing:* Colors are applied to each layer before cutting and gluing, providing
full-color prints.
- *Key Point:* Uses paper layers and color printing before assembling the final object.

5. **Stereolithography and Digital Light Processing (DLP):**


- *Process:* Models are built from a vat of liquid polymer resin cured by ultraviolet light.
- *Comparison:* Stereolithography is older; DLP is a newer, popular method.
- *Key Point:* UV light solidifies liquid resin to create the 3D object, with variations in the
specific technology used.

These methods showcase the diverse approaches to 3D printing, each with its unique process
and applications. Remember the key features of each method to distinguish them effectively.

// CNC milling

CNC milling is a subtractive manufacturing process controlled by a computer. it starts with a


larger material block and precisely removes unwanted parts using a rotating cutter bit.

The number of movement axes distinguishes CNC Mills:


- 2.5 axis: Can move any two of the three axes (X, Y, Z) at a time.
- 3 axis: Moves in X and Y axes on the bed, and Z with the milling head, can move all three
simultaneously.
- 4 axis: Adds a rotary axis (A) for rotating the piece, enabling milling from different angles.
- 5 axis: Introduces a secondary rotary axis (B), usually around the Y axis.
- 6 axis: Includes a third rotary axis (C) around the Z axis, offering complete movement control.

For CNC milling, CAD (Computer-Aided Design) software helps design the model, while CAM
(Computer-Aided Manufacturing) software generates a tool path—a set of coordinates for the
CNC machine to follow, revealing the final model by precise material removal.
// Sketch iterate and explore

( Read and write on own )


Certainly! The "sketch, iterate, and explore" process in prototyping is a methodical approach to
developing and refining design ideas. Let's break it down step by step:

1. **Sketch:**
- Start by drawing quick, rough sketches of your design ideas on paper. These sketches don't
need to be perfect; the goal is to get your ideas down quickly.
- Emphasize speed over detail during this phase. It's about capturing the essence of your
concepts without getting bogged down in perfection.

2. **Iterate:**
- Understand that your initial design is unlikely to be the best one. Iteration involves going
through a cycle of creating, testing, and refining your designs.
- Use low-tech methods like pen and paper to rapidly create and adjust different versions of
your design. This process helps you improve and evolve your ideas quickly.

3. **Explore:**
- Take your sketches and bring them into the physical realm. Use hands-on methods like
modeling clay, Lego, or other simple materials to create three-dimensional representations of
your designs.
- This hands-on exploration allows you to interact with your ideas in a tangible way,
uncovering potential issues and sparking new creative solutions.

In summary, the sketching phase is about getting initial ideas on paper quickly, the iteration
phase involves refining those ideas through quick cycles of improvement, and the exploration
phase brings your designs into the physical world for hands-on testing and refinement. This
process is a dynamic way to develop and enhance design concepts efficiently.

// Repurposing and recycling

(Read and write on own)

Certainly! In the context of IoT prototyping, repurposing or recycling refers to the practice of
using existing components or mechanisms from other products in the creation of new IoT
devices.

Here's a breakdown:

1. **Economies of Scale:** This concept involves taking advantage of the cost benefits that
come with large-scale production. Instead of manufacturing every component from scratch, you
reuse parts from other products, benefiting from the cost efficiency achieved by the original
manufacturer.

2. **Cost Efficiency:** Buying pre-existing components, like sensors or casings, can often be
cheaper than making them in-house, especially when you're working on a small-scale project.
This is because the original product's manufacturer has likely produced these components in
larger quantities, reducing the cost per unit.

3. **Example:** Imagine you're building a prototype for an IoT device like "Bubblino." Instead of
manufacturing a bubble machine from the ground up, you might find that using an off-the-shelf
bubble machine from a children's game is more cost-effective. Even if you're buying it at retail
price, it could be cheaper than producing the various parts needed for the bubble machine
in-house.

4. **Batch Production:** This approach becomes particularly useful in batch production


scenarios. If you're creating a small number of units, the initial effort to adapt and integrate
recycled parts is outweighed by the overall cost savings compared to producing everything from
scratch.

In summary, repurposing or recycling in IoT prototyping is a strategy to keep costs down by


reusing existing components, aligning with the principle of leveraging external economies for a
more efficient and affordable prototyping process.
IOT

Unit 2

// How can we decide between the cost and ease of prototyping

When considering the choice of a programming platform for an IoT project, it's essential to
measure various factors. Also it is crucial to evaluate the relationship between the cost of
prototyping and mass production, along with the development effort required for the chosen
platform. This trade-off is not rigid and depends on your project's specific needs.

• AVR microcontroller chip 210rs, cost is less but overhead of work increases
• Arduino or Similar 1400 rupees, cost is high but reduces work (programming C++)
• BeagleBone 2100 rs, can work on js and node.js and improvement in Ram
• Raspberry 3800 rs, standards and works on many languages (python)

// Open and closed source

Advantages of Open Source Software (IoT):


1. Cost-Efficiency: Open source is free, reducing expenses for IoT implementation.
2. Customization: Source code access allows tailored solutions.
3. Community Support: A large user community aids with issues and improvements.

Disadvantages of Open Source Software (IoT):


1. Limited Technical Support: Professional support isn't guaranteed.
2. Complex Setup: Setup can be challenging for non-developers.
3. Lack of Features: May lack advanced features, especially for specialized IoT applications.

Advantages of Closed Source Software (IoT):


1. Technical Support: Professional support is available for setup and troubleshooting.
2. Rich Features: Offers advanced analytics, reporting, and security.
3. Enhanced Security: Built-in security features protect against threats.

Disadvantages of Closed Source Software (IoT):


1. Costly: Licensing fees and maintenance can be expensive.
2. Vendor Lock-In: Dependency on a single vendor can limit flexibility.
3. Limited Customization: May not be as customizable as open source solutions.

**Open Source Software in IoT:**


*Advantages:*
1. **Cost** - Free to use, no licensing fees.
2. **Customization** - Source code access for tailored solutions.
3. **Transparency** - Visible source code ensures transparency.

*Disadvantages:*
1. **Limited Tech Support** - May lack professional assistance.
2. **Feature Gap** - May not have all features, especially for niche uses.
3. **Complexity** - Setup and configuration may be challenging.

**Closed Source Software in IoT:**

*Advantages:*
1. **Technical Support** - Professional help for setup and issues.
2. **Features** - Offers advanced analytics and security tools.
3. **Integration** - Designed for seamless enterprise integration.

*Disadvantages:*
1. **Cost** - Expensive due to licensing and maintenance.
2. **Limited Customization** - Less adaptable to specific needs.
3. **Lack of Transparency** - Source code closed, privacy concerns may arise.

// Factors we should consider when deciding to build IoT device

• Processor Speed:
The processor speed or clock speed of your processor tells you how fast it can execute the
individual instruction in the machine code.

• RAM:
RAM provides the working memory for the system. if you have more RAM, you may be able to
do more things.

• Networking:
In the world of IoT, how your device connects is important. You can use wired Ethernet, which is
simple and cheap but needs a cable. Wi-Fi is common, but it can be pricier and less
power-efficient. Bluetooth LE (Bluetooth 4.0) is low-power and becoming popular in phones and
laptops.

• USB:
If your device can rely on a more powerful computer being nearby, tethering to it via USB can be
an easy way to provide both power and networking.
• Power Consumption
Power consumption is crucial. Faster processors use more power, which can be problematic for
portable devices relying on batteries or solar power.

• Physical Size and Form Factor (OWN)


Pay attention to the size of your device, which is often determined by the number of connections
it needs to make to other components on the PCB (Printed Circuit Board).

// Prototype to production/mass production

1. Production Techniques: The techniques used for prototypes may not directly apply to mass
production. For instance, you might switch from 3D printing to injection molding. However,
what's possible remains relatively consistent.

2. Personalization: Mass production requires producing changeable parts in quantity. This


approach is known as "mass personalization" and can have premium pricing.

3. Prototyping vs. Production: Prototyping is essential but different from mass production. The
biggest challenge is scaling up to produce many devices efficiently.

4. Platform Consideration: Moving to a different platform for cost or size reasons may be
necessary when scaling up.

5. Code Portability: Code used in prototypes may need to be adapted for smaller or more
restricted devices. This could present challenges.

6. Resource Constraints: Be mindful of resource constraints in mass production. For example, if


using an Arduino with limited memory, manage the data efficiently it can quickly consume all the
memory and which can lead to system crash.

// Difference Arduino & Raspberry pi


( 9 points from Shikshak ans no. 6)
// Scaling up electronics (write on OWN)

Certainly! Let's use the example of creating a smart lighting system to explain the process of
scaling up electronics:

1. **Breadboard (Initial Concept):** Imagine you want to design a smart lighting system for your
home. You start by using a breadboard to connect LEDs, sensors, and a microcontroller like an
Arduino. This is like planning the lighting system on paper, without any permanent wiring.

2. **Experiment and Test:** You write code to control the lights based on sensor input. It's like
testing your system to see if the lights turn on when someone enters a room and turn off when
it's bright enough. You use the breadboard setup to experiment with different sensors and
coding logic.

3. **Protoboard (Sturdier Setup):** Once you're confident in your design, you move to a
protoboard. It's similar to creating a more reliable lighting system with all components securely
soldered. You might install this in one room of your home as a stable test setup.

4. **Through-Hole Components (Small Production):** Let's say your friends and family are
impressed and want their own smart lighting systems. You choose through-hole components,
which are like pre-packaged lighting modules. You assemble and solder these components into
a few units to give to your loved ones.

5. **Shields (Market Expansion):** Now, you decide to take your smart lighting system to the
market. You design a Shield for popular microcontrollers, such as Raspberry Pi or ESP8266.
This Shield acts as an expansion module that can easily be added to these microcontrollers,
making it a scalable product for a broader audience.

// sketching in prototyping
(Read and write on OWN)
"Sketching is a crucial step in IoT design as it allows you to visually explore and communicate
your ideas. It encompasses both pen-and-paper drawings and digital designs. When sketching
for IoT, consider three key areas:

1. **Graphic Design:** Visualizing the appearance of the user interface and printed materials to
ensure a user-friendly and aesthetically pleasing IoT system.

2. **Physical Hardware:** Creating rough sketches or prototypes of the hardware components,


such as sensors and displays, to understand their form and function.

3. **Server Software:** Sketching the software architecture that connects all IoT components,
helping you plan how data flows and the system operates.

In summary, sketching is a versatile tool in IoT design, aiding in the visualization and
communication of ideas for graphic design, physical hardware, and server software aspects."

Real life Example↓

Imagine you have an idea for a smart refrigerator that automatically creates a shopping list.
Here's how sketching plays a role:

1. **Graphic Design:** You sketch out how the refrigerator's touchscreen interface will look. You
draw the buttons, categories, and how the shopping list will be displayed. This helps you plan an
intuitive and attractive user interface, making it easy for users to interact with the fridge.

2. **Physical Hardware:** You create a rough sketch of the refrigerator itself. You draw where
the sensors and cameras will be placed inside the fridge to detect items. This sketching stage
helps you understand how the hardware components fit within the fridge's structure.

3. **Server Software:** You sketch a diagram showing how data flows from the fridge's sensors
to the cloud server and then to the user's smartphone app. This visualization helps you plan the
software architecture, ensuring a seamless connection between the fridge and the app.

So, in this example, sketching is like drawing a blueprint for your smart refrigerator. It helps you
design the fridge's appearance, understand its internal components, and plan the software
connections. This visual roadmap makes it easier to remember how sketching is a vital step in
IoT design.
Unit 1

// Define IOT & Explain

The Internet of things is a physical objects with sensors, processing ability, software and other
technologies that connect and exchange data with other devices and systems over the Internet.

• Why use
• where use
• how use
• example, in these explain sensors of heartattak
For example point refer this below link ↓
( https://youtu.be/APH6Nrar27w )

(Diagram pg 25 of txtbk*)

// Ubiquitous Computing

• Ubiquitous computing also known as 'ubicomp', refers to the concept of integrating computers
and technology seamlessly into everyday life

• The goal of ubiquitous computing is to create an environment where computational devices


and technologies are effortlessly integrated into the surroundings and are capable of interacting
with each other and with users without requiring explicit attention.

• The concept of ubiquitous computing envisions a world where computing becomes an integral
part of our daily activities, making interactions with technology more natural

• Ubiquitous computing involves various technologies such as sensors, wireless communication,


artificial intelligence etc. All working together to create a seamless and interconnected
technological ecosystem.
// "Any sufficiently advanced technology is indistinguishable from magic" discuss?

Certainly! Clarke's law, "Any sufficiently advanced technology is indistinguishable from magic,"
implies that when technology reaches an extremely advanced and complex level, it can appear
to be magical or supernatural to those who do not understand its workings. In other words, as
technology becomes more sophisticated, it can seem mysterious and beyond comprehension,
similar to how magic appears to be inexplicable and wondrous. This idea highlights the concept
that what seems like magic in one era could actually be the result of advanced technology in
another era. It speaks to the transformative and awe-inspiring nature of advancements in
science and technology.

(Also read pg 31 & 32 of txtbk*)

(Read all these and Write on own)

// Calm and Ambient Technology?

"Calm Technology" and "Ambient Technology" are concepts within the realm of Internet of
Things (IoT) design that emphasize unobtrusiveness and seamless integration of technology
into our lives. They focus on creating devices and systems that provide useful information and
functionality without demanding constant attention or overwhelming the user.

Calm Technology: Coined by Mark Weiser and John Seely Brown in the 1990s, Calm
Technology refers to technology that engages both the center and periphery of our attention. It
aims to seamlessly blend into our surroundings, providing relevant information when needed
while remaining non-intrusive. Calm technology avoids unnecessary distractions and
notifications. It's about designing devices that don't compete for our primary attention but
enhance our experience in the background.

Ambient Technology: Ambient technology, in the context of IoT, refers to technology that
operates in the background of our lives, often without requiring direct user interaction. It's
technology that is integrated into our environment and seamlessly provides services or
information without the need for explicit commands. Ambient technology can include devices
like smart thermostats that adjust temperature based on the time of day or sensors that turn on
lights when it gets dark.

Both concepts are focused on creating a more natural and intuitive interaction between humans
and technology, where devices are responsive and helpful without being overwhelming or
disruptive. In the context of IoT, applying these principles can result in devices and systems that
enhance our lives while minimizing unnecessary distractions.

Example "Smart Lighting System"

Imagine a smart lighting system that adapts to your daily routine and the natural light outside.
As the day progresses, Live Wire subtly adjusts the color and intensity of your indoor lights to
mimic the changing daylight, promoting a calm and soothing atmosphere. This technology
operates quietly in the background, creating a harmonious environment without overtly
disrupting your attention.

Example "Live Wire"

also known as "Dangling String," is a captivating example of early Internet of Things (IoT)
artistry by artist Natalie Jeremijenko during her residency at Xerox PARC. This innovative
installation features an electric motor connected to an eight-foot plastic string, deriving its power
from data transmissions on an Ethernet network. As network data flows, the motor responds
with delicate twitches, providing a tangible, ambient representation of digital activity. During
periods of heavy network traffic, the string whirls vigorously, accompanied by a distinct sound,
creating a visually striking and immersive experience. Conversely, when the network is quiet,
the string remains still, reflecting tranquility. By translating digital data into physical motion and
sound, "Live Wire" blurs the boundary between the virtual and physical realms, embodying the
essence of calm and ambient technology in a visually poetic manner.

(Write on own)

// list and explain roles of people making iot

• Artists: Artists collaborate with designers and traditional craftspeople on printmaking, bringing
creative and aesthetic aspects to IoT projects.

• Designers: Designers collaborate closely with engineers to enhance prototypes and with the
skills of craftspersons improves aesthetics.

• Engineers: Engineers play a crucial role in solving complex technical challenges, especially
when scaling IoT prototypes up to the production levels.
• Software Developers: Software developers contribute by writing code for the components of
IoT devices, enabling connectivity and data exchange.

• Craftsperson: Craftsperson transforms the Iot prototypes into visually appealing IoT devices.

• Hobbyist Hackers (Tinkerers): Hobbyist hackers tinker with IoT prototypes, contributing to the
initial stages of creating Things.

// Normalcy feild in IOT

• In addition to the technology becoming capable of a particular action, we often need


society, to be ready to accept it.

• There are many examples when the main difference between a failed technology and a
wildly successful one is that the successful one arrived a few years later, when people were
more receptive to what was offered.

• Technology blogger Venkatesh Rao came up with a good term to help explain how new
technology becomes adopted.

• He posits (suggest something as a basic fact) that we don’t see the present, the world that
we live in now, as something that is changing.

• If we step back for a second, we do know that it has changed.

• Rao called this concept the manufactured normalcy (situation in which everythong is
normal) field.

• For a technology to be adopted, it has to make its way inside the manufactured normalcy
field.

• As a result, the successful user-experience designer is the one who presents users with an
experience which doesn’t stretch the boundaries of their particular normalcy field too far, even if
the underlying technology being employed is a huge leap ahead of the norm.

• For example, the mobile phone was first introduced as a phone that wasn’t tethered to a
particular location.

• Now broadly the same technology is used to provide a portable Internet terminal, which can
play movies, carry your entire music collection, and (every now and then) make phone calls.

• The way that portable Internet terminals made it into our manufactured normalcy field was
through the phone metaphor.
Learn↓ (summary)

• A technology blogger named Venkatesh Rao came up with a term to explain how new tech
becomes popular.

• Rao suggests that we often don't notice the changes happening around us in the present.

• If we take a step back, we can see that things have indeed changed over time.

• Rao named this idea the "manufactured normalcy field," where things gets changed becomes
normal without us realizing.

• For a technology to be accepted, it has to fit into this "manufactured normalcy field", Situation
in which everything is normal.

Example↓ (read & explain example on own)

When mobile phones were first introduced, they were seen as devices that allowed people to
make calls without being tied to a specific location, unlike traditional landline phones. This
concept of "untethered communication" was a change from the norm, but it still fit within the
boundaries of what people considered acceptable or normal.

Over time, as people became accustomed to the idea of mobile phones, the technology
evolved. The same technology that allowed for portable communication was used to create
more advanced devices. These devices could not only make calls from anywhere but also
access the Internet, play movies, and store music collections.

The key point here is that the transition from basic mobile phones to multifunctional portable
Internet terminals was made smoother by leveraging the familiar concept of a phone. People
were already comfortable with the idea of a phone, so introducing additional capabilities within
that framework allowed the new technology to become part of their "manufactured normalcy
field".
// Postel's law: “Be conservative in what you do, be liberal in what you accept from others”

• IoT refers to the interconnection of various physical devices, vehicles, buildings, and other
objects through the internet, enabling them to collect and exchange data. Since IoT involves a
diverse range of devices and technologies, each with their own specifications and capabilities,
adhering to Postel's Law becomes crucial.

When designing IoT systems or protocols:

• Be Conservative in What You Do: This means that when you're creating IoT devices, sensors,
or software, you should adhere strictly to established standards, protocols, and best practices.
Ensuring that your devices send out data in a well-defined and standardized manner helps
maintain consistency and compatibility in the IoT ecosystem.

• Be Liberal in What You Accept from Others: On the receiving end, your IoT devices should be
designed to handle a variety of data formats and inputs. Since different devices may interpret
data slightly differently, your IoT system should be able to process diverse data inputs
gracefully, without breaking or causing errors. This could involve handling variations in data
structure, units, or unexpected sensor readings.

• Postel's Law plays a vital role in ensuring that IoT devices can communicate seamlessly, even
in the face of diverse data inputs and interpretations, ultimately contributing to a more effective
and robust Internet of Things.

(Read & explain on own)

// MAC Address

• Every network-connected device has a unique Identifier called MAC Address.


• It acts as the physical address of the device on a local network.
• MAC stands for Media Access Control
• It is a 48-bit number, usually written as six groups of hexadecimal digits, separated by
colons—for example: 01:23:45:67:89:ab.
• Most devices, such as your laptop, come with the MAC address permanently stored in their
Ethernet chips.
• Some chips, such as the Arduino Ethernet’s WizNet, don’t have a preprogrammed MAC
address.
• MAC addresses are used to distinguish one device from another within the same local
network.
// Protocols

Protocol is a set of rules that govern data communication. If two different devices are connected
but there is no protocol among them, there would not be any kind of communication between
those two devices. Thus the protocol are necessary for data communication to take place.

// Application Layer Protocol

HTTP (Hypertext Transfer Protocol): It's the foundation of data communication on the World
Wide Web. It's used for transferring web pages and resources from servers to clients, allowing
you to access websites.

HTTPS (Hypertext Transfer Protocol Secure): This is a secure version of HTTP. It adds a layer
of encryption using SSL/TLS protocols for secure communication between server and client.

SMTP (Simple Mail Transfer Protocol): SMTP is used to send email messages from a client to a
server or between servers.

FTP (File Transfer Protocol): FTP is used for uploading and downloading files between
computers over a network.

POP3 (Post Office Protocol version 3): POP3 is an email retrieval protocol that allows you to
download emails from a server to your device. It usually removes emails from the server once
downloaded.

IMAP (Internet Message Access Protocol): IMAP is another email retrieval protocol, but it keeps
emails on the server and syncs changes between the server and your device. This allows you to
manage your email from multiple devices.

DNS (Domain Name System): DNS is responsible for translating human-readable domain
names (like example.com) into IP addresses that computers use to identify each other on the
network.
Telnet: Telnet is a protocol that allows you to remotely access and control a device over a
network. It's not secure and is mostly replaced by more secure alternatives like SSH.

MQTT (Message Queuing Telemetry Transport): MQTT is a lightweight messaging protocol


designed for efficient communication between devices in situations where bandwidth is limited
or network conditions are unreliable. It's commonly used in Internet of Things (IoT) scenarios,
where devices need to exchange data with a central server or with each other.

Voice over IP (VoIP): VoIP is a technology that enables voice communication. VoIP converts
voice signals into digital packets and sends them over data networks.

DHCP (Dynamic Host Configuration Protocol): DHCP is used to automatically assign IP


addresses and network configuration settings to devices on a network, simplifying network
administration.

NFS (Network File System): NFS allows remote access and sharing of files and directories over
a network. It's commonly used in Unix and Linux environments.

// Static IP and Dynamic IP

» Static IP
• It is provided by ISP(Internet Service Provider).
• A static IP address remains constant and doesn't change over time.
• The device designed by static ip address can be trace.
• Static ip address is more stable than dynamic ip address.
• The cost to maintain the static ip address is higher than dynamic ip address.

» Dynamic IP
• it is provided by DHCP (Dynamic Host Configuration Protocol).
• A dynamic IP address changes periodically, often each time the device connects to the
network.
• the device designed by dynamic ip address can’t be trace.
• dynamic ip address is less stable than static ip address.
• the maintaining cost of dynamic ip address is less than static ip address.

// DNS working

DNS is responsible for translating human-readable domain names (like example.com) into IP
addresses that computers use to identify each other on the network.

↓ Working

User Query: When you type a URL (Uniform Resource Locator) into your web browser, your
computer sends a DNS query to a DNS resolver.

DNS Resolver: The DNS resolver is typically provided by your ISP (Internet Service Provider) or
a third-party service like Google DNS or OpenDNS. It's responsible for finding the IP address
associated with the requested domain name.

Caching: Resolvers often store recently queried information in a cache to speed up future
lookups. This helps reduce the need to query authoritative DNS servers for frequently visited
sites.

Root Servers: If the resolver doesn't have the IP address in its cache, it contacts a root DNS
server. These servers maintain a list of authoritative DNS servers for top-level domains (TLDs)
like .com, .org, etc.

TLD Servers: The root server directs the resolver to the appropriate TLD server (e.g., .com
server) based on the requested domain's TLD.

Authoritative Servers: The TLD server then directs the resolver to the authoritative DNS server
of the requested domain. This server stores the specific IP address associated with the domain.

Response: The authoritative server sends the IP address back to the DNS resolver.

Caching and Response: The resolver caches the IP address and sends it to the user's
computer. The computer now knows the IP address and can establish a connection with the
web server hosting the requested website.

Connection: With the IP address in hand, your computer connects to the web server, and the
website content is retrieved and displayed in your browser.

It's worth noting that DNS also supports other record types, like MX records for email servers,
CNAME records for aliases, and more. DNS is essential for the functioning of the internet,
enabling users to access websites and other online resources using human-friendly names
instead of remembering numerical IP addresses.

(Read & Write on own)

// TCP and UDP


Extra↓

// Enchanted Object

An enchanted object refers to a physical item, often an everyday object, that has been
augmented with digital technology to enhance its capabilities and provide additional
functionalities. These objects can connect to the internet, collect and transmit data, and interact
with users or other devices.

// TCP/IP Suite & IP Suite are Same! &


Network access layer is link Layer &
Link layer is the lowest Layer &
Also Network layer is Internet Layer

Application Layer:
This layer deals with communication between applications and provides various
application-specific protocols like HTTP, FTP, SMTP, etc.

Transport Layer:
The Transport Layer handles end-to-end communication and is responsible for ensuring reliable
data delivery. It includes TCP and UDP.

Internet Layer (Network Layer):


The Internet Layer is where the Internet Protocol (IP) resides.
It handles the routing of data packets between different networks and is responsible for
assigning unique IP addresses to devices.

Link Layer (Network Access Layer):


The Link Layer is the lowest layer in the TCP/IP model, and it deals with the physical
transmission of data over the local network medium.
It includes protocols specific to the physical hardware and network interface cards (NICs) such
as Ethernet, Wi-Fi, etc.

( Refer pg 59 of book pdf* )

//

You might also like