Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

Set-1

1. List out the characteristics of IoT


Characteristics of IoT:
- Connectivity: Devices are connected to the internet or each other.
- Data Collection: Sensors gather data from the environment.
- Interoperability: Devices from different manufacturers can
communicate and work together.
- Automation: IoT enables automation of tasks through data-driven
decisions.
- Scalability: Ability to handle a large number of devices and data.
- Security: Ensuring data privacy and protection against cyber threats.
- Real-time Insights: Data collected is used for immediate decision-
making.
- Cost-effectiveness: IoT solutions aim for efficient use of resources.

2. Different components of IoT

Components of IoT:
- Sensors: Collect data from the environment.
- Actuators: Devices that perform actions based on data received.
- Connectivity: Technologies like Wi-Fi, Bluetooth, and cellular networks
enable device communication.
- Data Processing: Edge computing or cloud platforms process and analyze
the collected data.
- User Interface: Interface for users to interact with IoT systems and
devices.
- Security: Measures to protect data and devices from unauthorized access.

3. Write the different layers of the IoT protocol with their layers?

Layers of the IoT protocol:


- Application Layer: Handles data exchange between end-user applications
and IoT devices.
- Transport Layer: Ensures reliable and efficient data transfer between
devices.
- Network Layer: Manages device connectivity and routing of data packets.
- Data Link Layer: Provides error-free transmission of data over physical
connections.
- Physical Layer: Deals with the actual physical connection between
devices, such as cables or wireless signals.

4. Explain any one Domain specific IoTs?

Domain-specific IoT:
- Precision Agriculture: Utilizes IoT devices such as sensors and drones to
monitor and optimize agricultural practices. Sensors collect data on soil
moisture, temperature, and crop health, allowing farmers to make data-
driven decisions on irrigation, fertilization, and pest control.

5. Different blocks in logical design of IoT?

Blocks in the logical design of IoT:


- Perception Layer: Sensors and actuators gather data from the physical
world.
- Network Layer: Manages communication between devices and the cloud
or other systems.
- Middleware Layer: Provides services such as data processing, storage,
and security.
- Application Layer: Interfaces with end-users and applications to provide
services based on IoT data.

6. Write about IoT communication model?

IoT communication model:


- Device-to-Device (D2D): Direct communication between IoT devices
without the need for central infrastructure.
- Device-to-Cloud (D2C): Devices send data to cloud platforms for
processing and storage.
- Cloud-to-Device (C2D): Cloud platforms send commands or updates to
IoT devices.
- Device-to-Gateway (D2G): Devices communicate with gateway devices
that aggregate data and manage device connectivity.

7. Explain the Physical design of IoT?


A) Physical Things of IoT:
1) Things in IoT

The things in IoT refers to IoT devices which have unique identities
and perform remote sensing, actuating and monitoring capabilities.
IoT devices can exchange dat with other connected devices
applications. It collects data from other devices and process data
either locally or remotely.
An IoT device may consist of several interfaces for communication
to other devices both wired and wireless. These includes (i) I/O
interfaces for sensors, (ii) Interfaces for internet connectivity
(iii) memory and storage interfaces and (iv) audio/videointerfaces.
2) IoTProtocols:
a. Link Layer : Protocols determine how data is
physically sent over the network‘s physical layer or
medium. Local network connect to which host is
attached. Hosts on the same link exchange data
packets over the link layer using link layer
protocols. Link layer determines how packets are
coded and signaled by the h/w device over the
medium to which the host isattached.

Protocols:
● 802.3-Ethernet: IEEE802.3 is collection of wired Ethernet
standards for the link layer. Eg: 802.3 uses co-axial cable;
802.3i uses copper twisted pair connection; 802.3j uses fiber
optic connection; 802.3ae uses Ethernet overfiber.
● 802.11-WiFi: IEEE802.11 is a collection of wireless
LAN(WLAN) communication standards including extensive
description of link layer. Eg: 802.11a operates in 5GHz band,
802.11b and 802.11g operates in 2.4GHz band, 802.11n
operates in 2.4/5GHz band, 802.11ac operates in 5GHz band,
802.11ad operates in 60Ghzband.
● 802.16 - WiMax: IEEE802.16 is a collection of wireless
broadband standards including exclusive description of link
layer. WiMax provide data rates from 1.5 Mb/s to 1Gb/s.
● 802.15.4-LR-WPAN: IEEE802.15.4 is a collection of
standards for low rate wireless personal area network(LR-
WPAN). Basis for high level communication protocols such
as ZigBee. Provides data rate from 40kb/s to250kb/s.
● 2G/3G/4G-Mobile Communication: Data rates from 9.6kb/s(2G) to up
to100Mb/s(4G).

B) Network/Internet Layer: Responsible for sending IP


datagrams from source n/w to destination n/w. Performs the
host addressing and packet routing. Datagrams contains
source and destinationaddress.

Protocols:
● IPv4: Internet Protocol version4 is used to identify
the devices on a n/w using a hierarchical addressing
scheme. 32 bit address. Allows total of
2**32addresses.
● IPv6: Internet Protocol version6 uses 128 bit address
scheme and allows 2**128 addresses.
● 6LOWPAN:
(IPv6overLowpowerWirelessPersonalAreaNetwork)operatesin
2.4 GHz frequency range and data transfer 250 kb/s.
C) Transport Layer: Provides end-to-end message transfer
capability independent of the underlying n/w. Set up on
connection with ACK as in TCP and without ACK as in UDP.
Provides functions such as error control, segmentation, flow
control and congestion control. Protocols:
● TCP: Transmission Control Protocol used by web
browsers(along with HTTP and HTTPS), email(along with
SMTP, FTP). Connection oriented and stateless protocol. IP
Protocol deals with sending packets, TCP ensures reliable
transmission of protocols in order. Avoids n/w congestion and
congestioncollapse.
● UDP: User Datagram Protocol is connectionless protocol.
Useful in time sensitive applications, very small data units to
exchange. Transaction oriented and stateless protocol. Does
not provide guaranteeddelivery.
D) Application Layer: Defines how the applications interface
with lower layer protocols to send data over the n/w. Enables
process-to-process communication usingports.
Protocols:
● HTTP: Hyper Text Transfer Protocol that forms foundation
of WWW. Follow request- response model Statelessprotocol.
● CoAP: Constrained Application Protocol for machine-to-
machine(M2M) applications with constrained devices,
constrained environment and constrained n/w. Uses client-
server architecture.
● WebSocket: allows full duplex communication over a single
socketconnection.
● MQTT: Message Queue Telemetry Transport is light weight
messaging protocol based on publish-subscribe model. Uses
client server architecture. Well suited for constrained
environment.
● XMPP: Extensible Message and Presence Protocol for real
time communication and streaming XML data between
network entities. Support client-server and server-server
communication.
● DDS: Data Distribution Service is data centric middleware
standards for device-to-device or machine-to-machine
communication. Uses publish-subscribemodel.
● AMQP: Advanced Message Queuing Protocol is open
application layer protocol for business messaging. Supports
both point-to-point and publish-subscribemodel.

OR

https://medium.com/@algopoint.ltd/introduction-to-iot-characteristics-
physical-logical-design-iot-enabling-technologies-
211c342671b4#:~:text=A%20logical%20design%20for%20an,with
%20low%2Dlevel%20programming%20specifics.

8. Write about Arduino and Rasphberry?


Arduino and Raspberry Pi are two distinct yet complementary platforms
commonly used in the field of IoT (Internet of Things), each offering
unique features and functionalities.

### Arduino:

Arduino is an open-source hardware and software platform designed for


building interactive electronic projects. Key features include:

1. **Microcontroller-Based**: At the heart of Arduino boards lies a


microcontroller (typically from the Atmel AVR or ARM families), which
serves as the computational brain. These microcontrollers are
programmed using the Arduino IDE (Integrated Development
Environment).

2. **Ease of Use**: Arduino is renowned for its simplicity and beginner-


friendly nature. The Arduino programming language is based on C/C++,
but it abstracts away much of the complexity, making it accessible even
to those with limited programming experience.

3. **Versatility**: Arduino boards come in various form factors and


configurations, catering to a wide range of project needs. They support
numerous input and output options, such as digital and analog pins, as
well as interfaces like I2C and SPI. This versatility allows for the
integration of various sensors, actuators, and other peripherals.

4. **Real-Time Interactivity**: Arduino excels in real-time applications,


making it ideal for projects that require immediate responsiveness, such
as robotics, automation, and sensor data acquisition. Its low-level
hardware access enables precise control over timing and execution.

### Raspberry Pi:


Raspberry Pi is a single-board computer (SBC) that offers a full
computing experience in a compact and affordable package. Key features
include:

1. **Linux-Based**: Unlike Arduino, which is primarily focused on


microcontroller-based projects, Raspberry Pi runs a full-fledged Linux
operating system (OS), typically Raspbian (a Debian-based distribution).
This allows it to execute complex tasks and run a wide range of software
applications.

2. **Computational Power**: Raspberry Pi boards are equipped with


ARM-based processors and offer significantly more computational power
compared to Arduino. This makes them suitable for applications requiring
intensive processing, multimedia capabilities, and networking.

3. **General-Purpose Computing**: Raspberry Pi can be used for a


variety of tasks beyond traditional IoT applications, such as web
browsing, media streaming, programming, and even desktop computing.
Its versatility makes it an attractive choice for hobbyists, educators, and
professionals alike.

4. **Networking and Connectivity**: Raspberry Pi boards feature built-


in networking capabilities, including Ethernet and Wi-Fi, enabling
seamless connectivity to local networks and the internet. This makes
them well-suited for IoT projects that require data communication,
remote access, and cloud integration.

### Complementary Nature:

While Arduino and Raspberry Pi serve different purposes and cater to


different types of projects, they are often used together in IoT
applications. Arduino provides real-time control and interfacing with
sensors and actuators, while Raspberry Pi handles higher-level
processing, networking, and data management tasks. This combination
allows for the development of sophisticated IoT solutions that leverage
the strengths of both platforms.
9. Write down Basics of IoT system management with NETCOF,
YANG NETFONG?

A) IoT Systems Management with NETCONF-YANG


YANG is a data modeling language used to model configuration
and state data manupulated by the NETCONF protocol.
The generic approach of IoT device management weith
NETCONF-YANG.

Roles of various componentsare:


1) ManagementSystem
2) ManagementAPI
3) TransactionManager
4) RollbackManager
5) Data ModelManager
6) ConfigurationValidator
7) ConfigurationDatabase
8) ConfigurationAPI
9) Data ProviderAPI

1)
Management System : The operator uses a management
system to send NETCONF messages to configure the IoT
device and receives state information and notifications from
the device as NETCONFmessages.
2) Management API : allows management application to start
NETCONFsessions.
3) Transaction Manager: executes all the NETCONF
transactions and ensures that ACID properties hold true for
thetrasactions.
4) Rollback Manager : is responsible for generating all the
transactions necessary to rollback a current configuration to its
original state.
5) Data Model Manager : Keeps track of all the YANG data
models and the corresponding managed objects. Also keeps
track of the applications which provide data for each part of a
datam,odel.
6) Configuration Validator : checks if the resulting
configuration after applying a transaction would be a
validconfiguration.
7) Configuration Database : contains both configuration and
operastionaldata.
8) Configuration API : Using the configuration API the
application on the IoT device can be read configuration data
from the configuration datastore and write opeartional data to
the opearationaldatastore.
9) Data Provider API: Applications on the IoT device can
register for callbacks for various events using the Data
Provider API. Through the Data Provider API, the
applications can report statistics and opeartionaldata.

Steps for IoT device Management with NETCONF-YANG

1) Create a YANG model of the system that defines the


configuration and state data of the system.
2) Complete the YANG model with the ‗Inctool‘ which comes
withLibnetconf.
3) Fill in the IoT device mangement code in the TransAPImodule.
4) Build the callbacks C file to generate the libraryfile.
5) Load the YANG module and the TransAPImodule into the
Netopeer server using Netopeer managertool.
6) The operator can now connect from the management system
to the Netopeer server using the NetopeerCLI.
7) Operator can issue NETCONF commands from the Netopeer
CLI. Command can be issued to changew the configuration
dsta, get operational dat or execute an RPC on the IoTdevice.

SET-2
1) Define IoT?
IoT Definition:
- IoT (Internet of Things) refers to the network of physical
objects embedded with sensors, software, and connectivity,
enabling them to collect and exchange data over the internet.
2) Differences between SDN vs NFV?

Differences between SDN vs NFV:


- SDN (Software-Defined Networking) separates the control plane
from the data plane, allowing centralized control of network traffic.
NFV (Network Functions Virtualization) virtualizes network functions
such as firewalls and load balancers, allowing them to run on
commodity hardware. While SDN focuses on network management
and control, NFV focuses on virtualizing network services.

3) List out IoT enabled Technologies?

IoT enabled Technologies:


- RFID (Radio Frequency Identification)
- NFC (Near Field Communication)
- Bluetooth Low Energy (BLE)
- Zigbee
- LoRa (Long Range)
- Wi-Fi
- Cellular (3G, 4G, 5G)
- Ethernet

4) Types of blocks in logical design of IoT?

Types of blocks in logical design of IoT:


- Perception Layer
- Network Layer
- Middleware Layer
- Application Layer

5) List some sensor networks?


Sensor Networks:
- Wireless Sensor Networks (WSN)
- RFID (Radio Frequency Identification) Networks
- Industrial Sensor Networks
- Environmental Sensor Networks
- Smart Grid Sensor Networks

6) Write the Thing in IoT?

Thing in IoT:
- In IoT, "thing" refers to any physical object embedded with
sensors, actuators, and connectivity that enables it to collect and
exchange data over the internet. These can include devices such as
sensors, wearables, appliances, vehicles, and industrial machinery.

7) Explain the Logical Design of IoT?

LOGICAL DESIGN of IoT


Refers to an abstract represent of entities and processes
without going into the low level specifies of implementation.
1) IoT Functional Blocks 2) IoT Communication Models 3) IoT Comm.
APIs

1) IoT Functional Blocks: Provide the system the capabilities


for identification, sensing, actuation, communication
andmanagement.
● Device: An IoT system comprises of devices that provide
sensing, actuation, monitoring and controlfunctions.
● Communication: handles the communicationfor IoTsystem.

● Services: for device monitoring, device control services,


data publishing services and services for devicediscovery.
● Management: Provides various functions to govern the IoTsystem.

● Security: Secures IoT system and priority functions such as


authentication,authorization, message and context integrity
and datasecurity.
● Application: IoT application provide an interface that the
users can use to control and monitor various aspects of
IoTsystem.

2) IoT CommunicationModels:

1) Request-Response 2) Publish-Subscibe 3)Push-Pull 4)


ExclusivePair
1) Request-ResponseModel:

In which the client sends request to the server and the


server replies to requests. Is a stateless communication model
and each request-response pair is independent of others.

2) Publish-SubscibeModel:

Involves publishers, brokers and consumers. Publishers are source of


data. Publishers send data to the topics which are managed by the
broker. Publishers are not aware of the consumers. Consumers
subscribe to the topics which are managed by the broker. When the
broker receives data for a topic from the publisher, it sends the data
to all the subscribedconsumers.
1) Push-Pull Model: in which data producers push data to
queues and consumers pull data from the queues. Producers
do not need to aware of the consumers. Queues help in
decoupling the message between the producers andconsumers.

2) Exclusive Pair: is bi-directional, fully duplex communication model


that uses a persistent connection between the client and server. Once
connection is set up it remains open until the client send a request to
close the connection. Is a stateful communication model and server is
aware of all the open connections

3) IoT CommunicationAPIs:
a) REST based communication APIs(Request-Response
BasedModel)
b) WebSocket based Communication APIs(Exclusive PairBasedModel)
a) REST based communication APIs: Representational State
Transfer(REST) is a set of architectural principles by which we can
design web services and web APIs that focus on a system‘s
resources and have resource states are addressed andtransferred.
The REST architectural constraints: Fig. shows
communication between client server with REST APIs.

Client-Server: The principle behind client-server constraint is the


separation of concerns. Separation allows client and server to be
independently developed and updated.
Stateless: Each request from client to server must contain all the
info. Necessary to understand the request, and cannot take advantage
of any stored context on the server.
Cache-able: Cache constraint requires that the data within a
response to a request be implicitly or explicitly labeled as cache-able
or non-cacheable. If a response is cache-able, then a client cache is
given the right to reuse that response data for later,
equivalentrequests.
Layered System: constraints the behavior of components such that
each component cannot see beyond the immediate layer with which
they are interacting.
User Interface: constraint requires that the method of
communication between a client and a server must be uniform.
Code on Demand: Servers can provide executable code or scripts
for clients to execute in their context. This constraint is the only one
that is optional.
Request-Response model used by REST:

RESTful webservice is a collection of resources which are


represented by URIs. RESTful web API has a base URI(e.g:
http://example.com/api/tasks/). The clients and requests to these
URIs using the methods defined by the HTTP protocol(e.g: GET,
PUT, POST or DELETE). A RESTful web service can support
various internet media types.
a) WebSocket Based Communication APIs: WebSocket APIs allow bi-
directional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communicationmodel.
Or
https://medium.com/@algopoint.ltd/introduction-to-iot-characteristics-
physical-logical-design-iot-enabling-technologies-
211c342671b4#:~:text=A%20logical%20design%20for%20an,with
%20low%2Dlevel%20programming%20specifics.

8) Explain the Interfaces (Serial, SPL, I2C)?


Interfaces play a crucial role in connecting various electronic
components within an Internet of Things (IoT) system, facilitating
communication and data exchange. Three commonly used
interfaces in IoT are Serial, SPI (Serial Peripheral Interface), and
I2C (Inter-Integrated Circuit). Each interface has its own
characteristics, advantages, and applications.

### Serial Interface:

1. **Definition**: Serial communication involves the transmission


of data one bit at a time over a single wire or pair of wires. It is a
simple and widely used interface for connecting devices over short
distances.
2. **Characteristics**:
- Asynchronous or synchronous transmission.
- Typically uses UART (Universal Asynchronous Receiver-
Transmitter) protocol.
- Supports relatively low data rates compared to other interfaces.
- Suitable for point-to-point or point-to-multipoint connections.
- Commonly used in applications such as communication
between microcontrollers, sensors, and peripheral devices.

### SPI (Seria

haa

7777tttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
ttttttttttttttttttttttttttttttttttttttttttttttttm.m……………………………
………………………………………………………………………
………………….m……m…..m……..m…
..
..

.
.

ha
l Peripheral Interface):

1. **Definition**: SPI is a synchronous serial communication


interface used for connecting multiple peripheral devices to a
microcontroller or other master device. It allows for full-duplex
communication, meaning data can be transmitted and received
simultaneously.

2. **Characteristics**:
- Requires four signal lines: Master Out Slave In (MOSI), Master
In Slave Out (MISO), Serial Clock (SCK), and Chip Select (CS).
- Operates in a master-slave configuration, where in mn..
û88888888888⁸88uu7uuuuijjj9juuuuuuuuuuuuuuuuuuúúuuuúú uu
uu ju uu u uu uu uuuu uu uu uu uu uu u uu uu úuuu uu uu uu uu u
uu u uu uuu uu uúuu uu uuuu uu uuúu uu úúúu uu u uu úuuuuuu uu
u uu uuuuu uu uu uu uu úúúuuú úuuu 99 oomaster device initiates
communication with one or more slave devices.
- Supports higher data rates compared to Serial interface.
- Suitable for applications requiring high-speed data transfer,
such as data acquisition, display drivers, and memory interfaces.

### I2C (Inter-Integrated Circuit):

1. **Definition**: I2C is a serial communication protocol


developed by Philips Semiconductor (now NXP Semiconductors)
for connecting multiple integrated circuits on a single bus. It allows
for communication between devices using only two signal lines:
Serial Data (SDA) and Serial Clock (SCL).

2. **Characteristics**:
- Supports multiple devices connected to the same bus, each with
a unique address.
- Supports multi-master communication, allowing multiple
devices to initiate data transfers.
- Relies on addressing to specify the target device for data
transmission.
- Typically operates at lower data rates compared to SPI but
requires fewer signal lines.
- Commonly used in IoT applications for interfacing with
sensors, EEPROMs, real-time clocks, and other peripheral devices.

In summary, Serial, SPI, and I2C are three important interfaces


used in IoT systems for connecting and communicating between
electronic components. Each interface has its own strengths and is
selected based on factors such as data rate requirements, distance,
complexity, and the number of devices to be connected.
Understanding these interfaces is essential for designing and
implementing IoT solutions effectively.

9) Write down Basics of IoT system management with NETCOF,


YANG NETFONG?

A) IoT Systems Management with NETCONF-YANG


YANG is a data modeling language used to model configuration
and state data manupulated by the NETCONF protocol.
The generic approach of IoT device management weith
NETCONF-YANG.

Roles of various componentsare:


● ManagementSystem

● ManagementAPI

● TransactionManager
● RollbackManager

● Data ModelManager

● ConfigurationValidator

● ConfigurationDatabase

● ConfigurationAPI

● Data ProviderAPI

Management System : The operator uses a management


system to send NETCONF messages to configure the IoT
device and receives state information and notifications
from the device as NETCONFmessages.
● Management API : allows management application to start
NETCONFsessions.
● Transaction Manager: executes all the NETCONF
transactions and ensures that ACID properties hold true for
thetrasactions.
● Rollback Manager : is responsible for generating all the
transactions necessary to rollback a current configuration
to its original state.
● Data Model Manager : Keeps track of all the YANG data
models and the corresponding managed objects. Also
keeps track of the applications which provide data for each
part of a datam,odel.
● Configuration Validator : checks if the resulting
configuration after applying a transaction would be a
validconfiguration.
● Configuration Database : contains both configuration and
operastionaldata.
● Configuration API : Using the configuration API the
application on the IoT device can be read configuration
data from the configuration datastore and write opeartional
data to the opearationaldatastore.
● Data Provider API: Applications on the IoT device can
register for callbacks for various events using the Data
Provider API. Through the Data Provider API, the
applications can report statistics and opeartionaldata.

Steps for IoT device Management with NETCONF-YANG

1) Create a YANG model of the system that defines the


configuration and state data of the system.
2) Complete the YANG model with the ‗Inctool‘ which comes
withLibnetconf.
3) Fill in the IoT device mangement code in the TransAPImodule.
4) Build the callbacks C file to generate the libraryfile.
5) Load the YANG module and the TransAPImodule into the
Netopeer server using Netopeer managertool.
6) The operator can now connect from the management
system to the Netopeer server using the NetopeerCLI.
7) Operator can issue NETCONF commands from the
Netopeer CLI. Command can be issued to changew the
configuration dsta, get operational dat or execute an RPC
on the IoTdevice.

SET-3
1) Registry (List) the IoT enabled Technologies?
Registry of IoT enabled Technologies:
- RFID (Radio Frequency Identification)
- NFC (Near Field Communication)
- Bluetooth Low Energy (BLE)
- Zigbee
- LoRa (Long Range)
- Wi-Fi
- Cellular (3G, 4G, 5G)
- Ethernet

2) Discriminate the SDN and NFV?

Discrimination between SDN and NFV:


- SDN (Software-Defined Networking) separates the control plane
from the data plane, enabling centralized control of network traffic.
NFV (Network Functions Virtualization) virtualizes network
functions, allowing them to run on commodity hardware. SDN
focuses on network management and control, while NFV focuses
on virtualizing network services.

3) Defination of IoT?

Definition of IoT:
- IoT (Internet of Things) is a network of physical objects embedded with
sensors, software, and connectivity, enabling them to collect and exchange
data over the internet.

4) Write the Things in IoT?

Things in IoT:
- In IoT, "things" refer to physical objects embedded with sensors,
actuators, and connectivity, allowing them to collect and exchange data over
the internet. Examples include sensors, wearables, appliances, vehicles, and
industrial machinery.

5) List some sensor networks?

Some sensor networks:


- Wireless Sensor Networks (WSN)
- RFID (Radio Frequency Identification) Networks
- Industrial Sensor Networks
- Environmental Sensor Networks
- Smart Grid Sensor Networks

6) Write about the use of Internet in IoT?

Use of Internet in IoT:


- The Internet is essential in IoT for connecting devices, collecting data
from sensors, transmitting information to cloud platforms for processing, and
enabling communication between devices. It provides the infrastructure
necessary for IoT devices to exchange data and interact with each other and
with users.

7) Expalin IoT Communication APIs?


IoT CommunicationAPIs:
a)REST based communication APIs(Request-Response BasedModel)
b)WebSocket based Communication APIs(Exclusive PairBasedModel)
REST based communication APIs: Representational State
Transfer(REST) is a set of architectural principles by which we can
design web services and web APIs that focus on a system‘s resources
and have resource states are addressed andtransferred.
The REST architectural constraints: Fig. shows
communication between client server with REST APIs.

Client-Server: The principle behind client-server constraint is the


separation of concerns. Separation allows client and server to be
independently developed and updated.
Stateless: Each request from client to server must contain all the
info. Necessary to understand the request, and cannot take advantage
of any stored context on the server.
Cache-able: Cache constraint requires that the data within a
response to a request be implicitly or explicitly labeled as cache-able
or non-cacheable. If a response is cache-able, then a client cache is
given the right to reuse that response data for later,
equivalentrequests.
Layered System: constraints the behavior of components such that
each component cannot see beyond the immediate layer with which
they are interacting.
User Interface: constraint requires that the method of
communication between a client and a server must be uniform.
Code on Demand: Servers can provide executable code or scripts
for clients to execute in their context. This constraint is the only one
that is optional.
Request-Response model used by REST:

RESTful webservice is a collection of resources which are


represented by URIs. RESTful web API has a base URI(e.g:
http://example.com/api/tasks/). The clients and requests to these
URIs using the methods defined by the HTTP protocol(e.g: GET,
PUT, POST or DELETE). A RESTful web service can support
various internet media types.
b) WebSocket Based Communication APIs: WebSocket APIs allow bi-
directional, full duplex communication between clients and servers.
WebSocket APIs follow the exclusive pair communicationmodel.
8) Write about Domain Specific IoT?
DOMAIN SPECIFIC IoTs
1) Home Automation:
a) Smart Lighting: helps in saving energy by adapting the
lighting to the ambient conditions and switching on/off or
diming the light whenneeded.
b) Smart Appliances: make the management easier and also
provide status information to the usersremotely.
c) Intrusion Detection: use security cameras and
sensors(PIR sensors and door sensors) to detect intrusion
and raise alerts. Alerts can be in the form of SMS or email
sent to theuser.
d) Smoke/Gas Detectors: Smoke detectors are installed in
homes and buildings to detect smoke that is typically an
early sign of fire. Alerts raised by smoke detectors can be
in the form of signals to a fire alarm system. Gas detectors
can detect the presence of harmful gases such as CO,
LPGetc.,

2) Cities:
a) Smart Parking: make the search for parking space easier
and convenient for drivers. Smart parking are powered by
IoT systems that detect the no. of empty parking slots and
send information over internet to smart application
backends.
b) Smart Lighting: for roads, parks and buildings can help in
savingenergy.
c) Smart Roads: Equipped with sensors can provide
information on driving condition, travel time estimating
and alert in case of poor driving conditions, traffic
condition andaccidents.
d) Structural Health Monitoring: uses a network of sensors
to monitor the vibration levels in the structures such as
bridges and buildings.
e) Surveillance: The video feeds from surveillance cameras
can be aggregated in cloud based scalable storagesolution.
f) Emergency Response: IoT systems for fire detection, gas
and water leakage detection can help in generating alerts
and minimizing their effects on the critical infrastructures.

3) Environment:
a) Weather Monitoring: Systems collect data from a no. of
sensors attached and send the data to cloud based
applications and storage back ends. The data collected in
cloud can then be analyzed and visualized by cloud
basedapplications.
b) Air Pollution Monitoring: System can monitor emission
of harmful gases(CO2, CO, NO, NO2 etc.,) by factories
and automobiles using gaseous and meteorological sensors.
The collected data can be analyzed to make informed
decisions on pollutions controlapproaches.
c) Noise Pollution Monitoring: Due to growing urban
development, noise levels in cities have increased and even
become alarmingly high in some cities. IoT based noise
pollution monitoring systems use a no. of noise monitoring
systems that are deployed at different places in a city. The
data on noise levels from the station is collected on servers
or in the cloud. The collected data is then aggregated to
generate noise maps.
d) Forest Fire Detection: Forest fire can cause damage to
natural resources, property and human life. Early detection
of forest fire can help in minimizingdamage.
e) River Flood Detection: River floods can cause damage to
natural and human resources and human life. Early
warnings of floods can be given by monitoring the water
level and flow rate. IoT based river flood monitoring
system uses a no. of sensor nodes that monitor the water
level and flow ratesensors.

4) Energy:
a) Smart Grids: is a data communication network integrated
with the electrical grids that collects and analyze data
captured in near-real-time about power transmission,
distribution and consumption. Smart grid technology
provides predictive information and recommendations to
utilities, their suppliers, and their customers on how best to
manage power. By using IoT based sensing and
measurement technologies, the health of equipment and
integrity of the grid can beevaluated.
b) Renewable Energy Systems: IoT based systems
integrated with the transformers at the point of
interconnection measure the electrical variables and how
much power is fed into the grid. For wind energy systems,
closed-loop controls can be used to regulate the voltage at
point of interconnection which coordinate wind turbine
outputs and provides powersupport.
c) Prognostics: In systems such as power grids, real-time
information is collected using specialized electrical sensors
called Phasor Measurment Units(PMUs) at the substations.
The information received from PMUs must be monitored
in real-time for estimating the state of the system and for
predictingfailures.
5) Retail:
a) Inventory Management: IoT systems enable remote monitoring
of inventory using
data collected by RFIDreaders.
b) Smart Payments: Solutions such as contact-less
payments powered by technologies such as Near Field
Communication(NFC) and Bluetooth.
c) Smart Vending Machines: Sensors in a smart vending
machines monitors its operations and send the data to
cloud which can be used for predictivemaintenance.

6) Logistics:
a) Route generation & scheduling: IoT based system
backed by cloud can provide first response to the route
generation queries and can be scaled upto serve a large
transportationnetwork.
b) Fleet Tracking: Use GPS to track locations of vehicles inreal-time.
c) Shipment Monitoring: IoT based shipment monitoring
systems use sensors such as temp, humidity, to monitor the
conditions and send data to cloud, where it can be analyzed
to detect foodspoilage.
d) Remote Vehicle Diagnostics: Systems use on-board IoT
devices for collecting data on Vehicle operaions(speed,
RPMetc.,) and status of various vehicle subsystems.

7) Agriculture:
a) Smart Irrigation: to detemine moisture amount insoil.
b) Green House Control: to improveproductivity.

8) Industry:
a) Machine diagnosis andprognosis
b) Indoor Air QualityMonitoring

9) Health and LifeStyle:


a) Health & FitnessMonitoring
b) WearableElectronics

9) Write down Basics of IoT system management


with NETCOF,YANG NETFONG?
A) IoT Systems Management with NETCONF-YANG
YANG is a data modeling language used to model configuration
and state data manupulated by the NETCONF protocol.
The generic approach of IoT device management weith
NETCONF-YANG.

Roles of various componentsare:


● ManagementSystem

● ManagementAPI

● TransactionManager

● RollbackManager

● Data ModelManager

● ConfigurationValidator

● ConfigurationDatabase
● ConfigurationAPI

● Data ProviderAPI

Management System : The operator uses a management


system to send NETCONF messages to configure the IoT
device and receives state information and notifications
from the device as NETCONFmessages.
● Management API : allows management application to start
NETCONFsessions.
● Transaction Manager: executes all the NETCONF
transactions and ensures that ACID properties hold true for
thetrasactions.
● Rollback Manager : is responsible for generating all the
transactions necessary to rollback a current configuration
to its original state.
● Data Model Manager : Keeps track of all the YANG data
models and the corresponding managed objects. Also
keeps track of the applications which provide data for each
part of a datam,odel.
● Configuration Validator : checks if the resulting
configuration after applying a transaction would be a
validconfiguration.
● Configuration Database : contains both configuration and
operastionaldata.
● Configuration API : Using the configuration API the
application on the IoT device can be read configuration
data from the configuration datastore and write opeartional
data to the opearationaldatastore.
● Data Provider API: Applications on the IoT device can
register for callbacks for various events using the Data
Provider API. Through the Data Provider API, the
applications can report statistics and opeartionaldata.

Steps for IoT device Management with NETCONF-YANG

● Create a YANG model of the system that defines the


configuration and state data of the system.
● Complete the YANG model with the ‗Inctool‘ which comes
withLibnetconf.
● Fill in the IoT device mangement code in the TransAPImodule.

● Build the callbacks C file to generate the libraryfile.

● Load the YANG module and the TransAPImodule into the


Netopeer server using Netopeer managertool.
● The operator can now connect from the management system to
the Netopeer server using the NetopeerCLI.
● Operator can issue NETCONF commands from the Netopeer CLI.
Command can be issued to changew the configuration dsta, get
operational dat or execute an RPC on the IoTdevice.

You might also like