You are on page 1of 5

IOT

What is iot?
The Internet of Things (IoT) describes the network of physical objects
—“things”—that are embedded with sensors, software, and other technologies
for the purpose of connecting and exchanging data with other devices and
systems over the internet.
Why is it imp?
By means of low-cost computing, the cloud, big data, analytics, and mobile
technologies, physical things can share and collect data with minimal human
intervention. In this hyperconnected world, digital systems can record, monitor,
and adjust each interaction between connected things. The physical world meets
the digital world—and they cooperate.
What Technologies Have Made IoT Possible?
Access to low-cost, low-power sensor technology
Connectivity
Cloud computing platforms.
Machine learning and analytics.
Conversational artificial intelligence (AI). 
Pro’s
 Smart manufacturing
 Preventive and predictive maintenance
 Smart power grids
 Smart cities
 Connected and smart logistics
 Smart digital supply chains
Influence of electronics and its market.
As IOT is completely dependent on electronics boon of IOT results in boon of
electronics. From passive components like resistor , register , capacitor to
microprocessor everything is necessary for IOT.
Cons :
 breach of privacy :
The privacy issues also leads to the question of who will control
the Internet of Things?  If there is only one company, that could
potentially lead to a monopoly hurting consumers and other
companies.  If there are multiple companies that are given access to
the information acquired, doesn’t that breach consumers
privacy?  Also, where is the information going to be stored? 
 over-reliance on technology:
relying on technology on a day to day basis, making decisions by
the information that it gives up could lead to devastation.  No
system is robust and fault-free. Also use of brain
 loss of jobs:

WiFi Security and privacy


What is wifi security?
Wireless security is the prevention of unauthorized access or damage to
computers or data using wireless networks, which include Wi-Fi networks.
Types:
Wired Equivalent Privacy (WEP) [Weak]
Wi-Fi Protected Access (WPA).[Strong]
WPA2 uses an encryption device that encrypts the network with a 256-bit key;
the longer key length improves security over WEP.
Hackers have found wireless networks relatively easy to break into, and even
use wireless technology to hack into wired networks. 
Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion Detection
Systems (WIDS) are commonly use to enforce wireless security policies.
What is wifi privacy?
Similar to security and add personal privacy .
Why should we maintain are wifi privacy?
Data breaching.
Data mining.
Hackers hacking into personal cloud space.
Giving out confidential information.
Eg. Bank account detail , password to access accounts.
How can we protect this?
Keep your connection secure(browse certified sites)
Use a VPN
Use two-factor authentication
Disable file sharing
Components used in wifi:
https://stevessmarthomeguide.com/networking-components/
Components used in router:
RAM: Used for volatile memory storage tasks . In technical terms used to store
routing tables ,ARP tables and running configurations.Used as buffer location
for storing temporary data packets created before processing of tasks.

2.ROM: Used to store all the software data that is permanent and no changes
are allowed in it.Without this any router can’t work. It is like the BIOS of the
computer.

3.CPU: Used to execute all the processes that the OS demands.This includes
system initialization,routing functions and switching functions.

4.OS: Most routers store OS in ROM .It controls each and every function that is
performed by the router.

 Mosfets:
1. Advantages: Voltage controlled device, thermally stable than BJT.
2. Voltage rating more than BJT.
3. Mosfet as TTL circuits, Heavy duty high current switches.
4. Mosfets: 1> Deplretion (p,n),|| 2> Enhancement (p,n).
5. Construction: 4 ports-> Drain, Source, Substrate, Gate.
6. Less dissipation than BJT.
7. Mosfets are used in computer memory.
 Diodes:
1. pn
2. photo
3. Zener
4. Backward
5. Varactor
6. Schottky
7. gunn
8. src
9. LED.

 RFID:
Applications : Electronic locks, Hotel Identification, Toll, Lifestock
management, airport baggage tags, Malls product identification, rfid
implants.
RFID-> Radio Waves, EM waves<directional>.
RF-> LF, HF, UHF
1m 10-15m 30-40m
RFID-> Radio Freq Identification.

 Sensors used in auto:


1. Max airflow sensor
2. Temperature sensor
3. RPM
4. Level indicator
5. Fuel Injectors
6. Pressure
7. Oxygen
8. Monoxide
9. ECU-engine control unit
10.Coolant sensor
11.Speedometer
12.Voltage Sensor
13.Motion Processing Unit.

You might also like