You are on page 1of 15
INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 The “Things” in loT, Sensors, Actuator, and Smart Objects, Sensor Networks, Connecting Smart Objects, Communications Criteria, loT Access Technologies. 1. List and explain the number of ways to group and cluster sensors into different categories. Answer: Ways to group and cluster sensors into different categories are: © Active or passive: Sensors can be categorized based on whether they energy output and typically require an external power supply (active) oRwhether they simply receive energy and typically require no external power © Invasive or non-invasive: Sensors can be categorized based part of the environment it is measuring (invasive) or external to it (non * Contact or ne-contact: Sensors can be categorized based on whether they require physical contact with what they ate measuring (contact)fppuiot (no-contact) «Absolute or relative: Sensors can be categorized ba they measure on an absofute scale (absolute) or based on a differefice with’ friable reference value (relative). «Area of application: Sensors can be ¢; vertical where they are being used, «How sensors measure: Sensors can be cat used to measure sensory input (ffqgyexample. e 1¢ specific industry or ‘on the physical mechanism lectric, electrochemical, piezo resistive, optic, electric, fuid m + What sensors measure: rized based on their applications or what physical variables, (re SHRISHA HS. Department of €5 & E, CE Page 1 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 2. List and explain sensor types. Exarpioe ies Th pesthe naar ests pourra as Pateacr, chip the pation meauremett an he ether inline iaealute tm tsa ption Sebo opty seme rela terns Gopicmc veces Peszuc sermons cat be ina angela or wuts, ‘azapaney Occupancy mors dec te preci of people sates abl uals sive at, ie mato sermon dees movement of peopl and bjs ‘Taesiteence heres the fs tha ec semmon gente wml even ben er stan ene tice eer ca ‘Vein ied wabciry ype of mio) seme ey he Acokn seclenrion Ine orangutan how but bes oscape mower alongs wr ne how i tae Accektinn emo mean: changin velo Fine Tier comin dkiet sicher a pial ine Toe os soph und eter the magnitude ste tate bepned asieahr ‘ete ouch sense tress Tes seman ae eid tone senon, Ramet, Bound mci fs apy Bg es sng, penne (esse mss! ero Fo ine ow aepses detect he reo iid They Arenson as meat volume us ine rae flow fe senso eee Cela) of aid hats pssed gh > cer eg ee Raden Tempers Chemical Wiser “Teves eens metre goand keels an ‘caer a ori in ial or anal sas il ony re dette seer p00 Whe are nae Tit Ieee cat be metsared i varios wa absete hi eat bia, Toei sermons deta the presence ight RIB conve) aden anasto acne i the ‘eevee, aati can he seed hy ‘Solar deat detect ‘espa semnrsmcinas the ancont OE hear orl tigre ina sy abon, They fan be hm of mo ype coma ‘non-contact Ceetat tezperutue sensors need tobe tephysieal saat wth the objet eg fend Non contac sonsces de mot es pucal cont, a: they measure enperture fal compete anal aati, ‘Used wtnors mcssat he vonconsation of chemical tocar Wa shemical, chemical sensors fypclly sekcoe for urzet typeof chemical or example, 100, ste servesoaly carbon dios Bens detect varios bioligiel eles, chs aio, ime, ef ne seciboies al noi a, heme: sat eahalvan, stmt sere denecce lod phone henson, be ramery, skeracandingraph —.——__-_ a —_ SHRISHA HS. Department of €5 & E, CEC Page 2 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 3. How Sensors and Actuators Interact with the Physical World. Explain Answer: Sensors are designed to sense and mea: physical world. They convert their representations that can be con: ‘agent. Actuators, receive some type of contral signal that trig i, usually some type of motion, force. the physical world and signal their ni to some type of microprocessor or Actuators’ can be classified based on the type of motion they i, linear, rotary, one’two'three-anes) How power, micro paver), or continuous: Actuators can be classified based on the number of stable- state outputs. © Area of application: Actuators can be classified based on the specific industry or vertical where they are used. ‘© Type of energy: Actuators can be classified based on their energy type. Classifications of actuators based on energy are: — J -—-_— SHRISHA HS. Department of €5 & E, CEC Page 3 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 ‘Type Examples Mechanical actuators ‘Lever, serow jack, hand crank lectrical actuators Thyristor, binpolar transistor, diode Electromechanical actuators: “AG motor, DC motor, step motor Hlecaramagnetic actuators Electromagne, linear solenotd Hydraulic and pneumatic actuators Hydraulic cylinder, pneumatic cylinder, piston, pressure contral valves ar motors ‘Smart material actuators ‘Shape memory alloy (SMAJ, ion exchange (ovindes thermal and magnetic actuate) fvsh mgnctnettne material, bart Micro- and nanoactuarors Electrostatic motor, microvalve, comb drive ~= 5. Explain the Characteristics of a Smart Ob; Answer: Four defining characteristics of smart objects a © Processing unit; A smart object has some processing and analyzing sensing control signals to any actuators, object, including the communi processing unit that is needs of different small form fact consumption, © Sensor(s) a ing unit for acquiring data, by the sensor(s), coordinating ‘riety of functions on the smart really, depending on the specific processing 90n is a microcontroller because of its ing simplicity, ubiquity, low power : RK’ smart object is capable of interacting with the and actuators. As described in the previous sections, a ts environment, whereas an actuator is able to produce physical world, A smart object dees not need to contain both in fact, a smart object can contain one or multiple sensors 1's, depending upon the application. device: The communication unit is responsible for connecting a vith other smart objects and the outside world (via the network). wnigition devices for smart objects can be either wired or wireless. lmingly. in IoT networks smart objects are wirelessly interconnected for of reasons, including cost, limited infrastructure availability. and case of deployment. © Power source: Smart objects have components that need to be powered. The most significant power consumption usually comes from the communication unit of a smart object. As with the other three smart abject building blocks, the power requirements also vary greatly from application to application. Typically, smart objects are limited in power, are deployed for a very Jong time, and are not easily accessible. Smart object relies on battery power, requires power efficiency, judicious power management, sleep modes, ultra-low power consumption hardware. SHRISHA HS. Department of €5 & E, CEC INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 6, List and explain the trends in smart objects impacting IOT. Answer: Answer: ‘+ Size Is decreasing: Some smart objects are so small they are not even visible to the naked eye, This reduced size makes smart objects easier to embed in everyday objects + Power consumption ts decreasing: The different hardware components of a smart object continually consume less power. This is especially true for sensors, many of which are completely passive © Processing power Is increasing: Processors are continually gettin and smaller. This is a key advancement for smart objects, as they beco complex and connected. + Communication capabilities are Improving: loT is driving elypment of more and more specialized communication protocols covering a grea use cases and environments. + Communication ts being increasingly standardized” industry to develop open standards for loT communicat and more open source efforts to advance loT. jore powerful increasingly 6. Explain Design Constraints for Wire! Ibjects. Explain Wireless Sensog_ Netw’ Wireless Smart Objects. lesign Constraints for Limited processing Limited mem ze le short notes on Data Aggregation in Wireless Sensor Networks OR Explain Wireless Sensor Networks: Data Aggregation in Wireless Sensor Networks Answer: ‘© Large numbers of sensors permit the intreduction of hierarchies of smart objects. Hierarchy provides, among other organizational advantages, the ability to agaregate similar sensor readings from sensor nodes that are in close proximity to each other. SHRISHA HS, Department of €5 & E, CEC Page S INTERNET OF THINGS TECHNOLOGY (I7C581) MODULE 2 «© These data aggregation techniques are helpfull in reducing the amount of overall traffic. This data aggregation at the network edges is where fog and mist computing. * Wirelessly connected smart objects generally have one of the following two communication pattems: © Event-driven: Transmission of sensory information is triggered only when a smart object detects a particular event or predetermined threshold. © Periodic: Transmission of sensory information occurs only at periodic intervals, ‘Average Temperature =41.C: Dai 8¥Eregation in Wireless Sensor Networks such a data aggregation function in a WSN where temperature 1 grouping of temperature sensors are aggregated as an average tages and disadvantages that a wireless-based solution Advantages ‘© Greater deployment flexibility (espec places} ‘Simpler scaling to a large number of nodes Lower implementation costs Ensier long-term maintenance Effortless introduction of new sensor/actuator nodes Better equipped to handle dynamic‘rapid topology changes ly in extreme environments or hard-to-reach — oo -_— SHRISHA HS., Department of C5 & E, CEC Page 6 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 Disadvantages: ‘© Potentially less secure (for example, hijacked access points) Typically lower transmission specds © Greater level of impact/influence by environment 9, Explain the Communications Criteria in connecting smart objects in [OT Answer: + Range: © Short range: The classical wired example is a serial c: range technologies are often considered is an alt supporting tens of meters of maximum distance betw Examples of short-range wireless technologies are IEEE 802.15. and IEFE 802.15,7 Visible Light Communicatigns (VLC). © Medium range: This ringe is the main catego T access technologies In the range of tens to hundreds of meteryThe stance is generally less than I mile between two devices. E: Wi-Fi, range technologies, These techn oT sensors Example-2G, 3G, * Frequency Bands: In loT acc: wireless communications are split spectrum is generally applicable to to communications int broadcasters, and utilt For loT access, thespgire t well-Befown ISM bands: © 24GHzband IEEE 802.1 tb’g/n Wi-Fi for battery-powered frequency bands leveraged by and unlicensed bands. Licensed access technologies and allocated services providers. public services ered node has a direct connection to a power source, not limited by power consumption criteria. Ease of cered nodes is limited by the availability of a power source. bring much more flexibility to [oT devices, These nodes are ¢ required lifetimes of their batteries. JoT wireless access technologies needs of low power consumption and connectivity for battery- 's. This has led to the evolution af a new wireless environment known as — SHRISHA HS. Department of €5 & E, CEC Page 7 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 cea epg EEE rarrcncoen (© feosen rca os For medium-range technologies, a star, peer-to-peer, or mesh topato; mb. Pecr-to- peer topologies allow any device to communicate with any other device as y are in range of each other. Peer-to-peer topologies rely on multiple full-function devic##APecr-io- peer topologies enable more comptex formations. such asa magh networking topology. Mesh topology requires a properly optimized implementation for b vered nodes. Battery- powered nodes are oflen placed in a “sleep mode", transmitting. life when not + Constrained Devices: Devices are categorized into classes of loT n and networking. jemory, storage, power, Class Definition of hodes is severely constrained, vith'¥&ss than 10 KB of memory and less than 100 KB of Flash processing and storage Class 0 ipability, These nodes are typically battery powered. They do not have the resources required to directly implement an IP siack and associated security mechanisms. While greater than Class 0, the processing and code. space _—_ characteristics (approximately 10 KB RAM — and approximately 100 KB Flash) of Class | are still lower than expected for a complete IP cB 1 stack implementation, They cannot easily communicate with nodes employing a full IP stack. However, these nodes can implement tan optimized stack specifically designed for constrained nodes, such as Constrained | Application Protocal (Ci : _ Class 2 ‘are characterized by running full implementations of an IP stack on Class 2 embedded devices. They contain more than 50 KB of memory and 250 KB of Flash, so they can he fully integrated in IP networks. Constrained-Node Networks: SHRISHA HS. Department of €5 & E, CEC Page 8 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 Constrained-node networks are often referred to as low-power and lossy networks, Lew power in the context of LLNs refers to the fact that nodes must cope with the requirements from powered and batiery powered constrained nodes. Lossy merworks indicate that network performance may suffer from interference and variability due to harsh radio environments. Layer | and Layer 2 protocols that can be used for constrained-node networks must be evaluated in the context of the following characteristics for use-case applicability: data rate and throughput, latency and determinism, and overhead and payload. © Data Rate and Throughput: Understanding the bandwidth requirements of a particular technology, its applicability to given use cases, the capacity planning rules, and the expected real throughput are important for proper network design and successful production deployment. Short-range technologies can also provide mdium to high data raies that have enough throughput to connect a few endpoints The loT access consumption, but they are also limited in terms of data rate, Wi selected frequency band, and throughput. Majority of them common than dawnstream traffic from the application = Latency and Determinism: Latency expectations of loT should be known ‘when selecting an access technology. This is Bfks, where packet loss and retransmissions due to interference, and noise are normal behaviours, On constrained networks, fa a few milliseconds to seconds, and applications and prot with these wide-ranging values © Overhead and Payload: When ca is important to review the MAC ‘access network technologies. it teristics required by applications The minimum IPvi MTU size is expected to be 1280 by entation of the 1Pv6 payload has to be taken into account by Tit ‘otocols with smaller MTUs. Most LPWA. technologies offer i se small payload sizes are defined to cope with the low ir oF duty cycle requirements of loT nodes and sensors 10. Writ jote on Classes of Constrained Nodes, as Def 7228 nswer? ¢ content of question 9 potnt 5: Constrained devices iL Write a note on IEEE 802.15.4 technology Answer: * TEE 802.154: IEEE 802. 15.4 is.a wireless access technology for low-cost and low- data-rate devices that are powered or run on batteries. In addition to being low cast and offering a reasonable battery life, this access technology enables easy installation using a compact protocol stack while remaining both simple and flexible, IEEE R02.15.4 is commonly found in the following types of deployments: sO SHRISHA HS. Department of €5 & E, CEC Page 9 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 Home and building automation ‘Automotive networks Industrial wireless sensor networks poa0 Interactive toys and remote controls © Standardization and Alliances; IEEE 802.15.4 or IEEE 802.15 Task Group 4 defines low-data-rate PHY and MAC layer ‘Speeafiuat ini. for wireless personal area networks (WPAN). Protocol Stacks Utilizing IEFE $02.15.4.are Proteeal Description Prumated Gioigh the Zielicx Allance, Figie defince ‘uppertayer commoneats) ax weil ax application profilex Digitee LowPAN ZigBee ESAnO0. 18 WirelescHART Threat + Physteal Layer: The 802.154 that range from 2.4 GHz to sub-Gl © 2.4GHz, 16 char co 915 MHz, 16: hy is DSSS PHY, employing binary phase-shift keying ation, BPSK specifies two unique phase shifis as its data e. ad encoding scheme that offers increased range, throughput, data rates, signal integrity compared to DSSS. wr ter ope Start ot Fame Detar ‘Sychronzaton Header SEyes 1 Byte IEEE 02.154 PHY Forman The PHY Header portion of the PHY frames a frame length value. It lets the receiver know ‘how much total data to expeet in the PHY service data unit (PSDU) portion of the 802.4.15 PHY, The PSDU is the data field or payload. — SHRISHA HS. Department of €5 & E, CEC Page 10 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 AC Layer: The IEEE 802.154 MAC layer manages access to the PHY channel by defining how devices in the same area will share the frequencies allocated. At this layer, the scheduling and routing of data frames are also coordinated. The 802.154 MAC layer performs the following tasks: ‘© Network beaconing for devices acting as coordinators PAN association and disassociation by a device Device security Reliable link communications between two peer MAC entities The MAC layer achieves those tasks by using various predefined frame types. They are: 2 Data frame: Handles all transfers of dat © Beacon frame: Used in the transmission of bgaggns fly a PAN soordinator Acknowledgement frame: Confirms the successful reception oPWiijame MAC command frame: Responsible for cqnirol communication between devices eg MAC Frame 4-2osytes 28 4B Variable 28 —— _$—$_$_-.—_ settee Source Fen same. | sanree [enO" oecaten| 2" | sous Conmol | Maree | eM | accrecs | pen, | Accs: ‘Frame Pavost, eal PHY Frame Sta ot Frama Preamble Fresno Length OOOO ‘Byles 127 Bes WEEE 802.15.4 MAC Format +7 2.15.4-based networks can be built as star, peer-to-peer, or mesh @ Full Function Device Reduced Function Device PAN ID 13.1.4 Sample Mesh Newwnrk Topology SHRISHA HS, Department of €5 & E, CEC Page 11 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 « Security: The [EEE 802.154 specification uses Advanced Encryption Standard 4 128-bit key length as the base encryption algorithm for securing its data. Competitive Technologies: A competitive radio technology that is different in its PHY and MAC layers is DASHT. They are commonly employed in active radio frequency identification (RFID) implementations. The current DASHT technology offers low power consumption, a compact protocol stack, range up to | mile, and AES encryption. 12. What is all the Protocol Stacks Utilizing IEEE 802.15.4? Answer: See question | point 2: Standardization and Alliances 13. Write a short note on High-Level ZigBee igbee IP Protocol Stack. Answer: High-Level ZigBee: ~/ Zigbee ar Vendor Specific Zigbee Platform Stack IEEE n02 15.4 o Hi | ZigBee Protocol Stack . d sgturity Iyer provides mechanisms for network start-up, jon, Paytin, ‘uring communications. ating routing paths in what is offen a changing topology, and managing the routing tables as devices join for the first is also responsible for forming the appropriate topology, which is ft could be a star or tree as well ulilizes 802.154 for security at the MAC layer, using the Advanced ion Standard (AES) with a 198cbit key and also provides security at the network and application layers ZigBee uses Ad hoc On-Demand Distance Vector (AODV) routing across a mesh network. This routing algorithm does not send # message until a routs is needed. ZigBee IP: ————_ HH 7 SHRISHA HS. Department of €5 & E, CEC Page 12 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 Zigllce IP Protocol Stack + ZigBee IP was created to embrace the open standards coming. T's work on LLNs, such as Ipv6, 6LoWPAN, and RPL. . Tey provide for low-handwidih. low-power, and cost-effective ca ions connecting smart objects. . ae IP utilizes the mesh over or route-over mel forwarding packets. ZigBee IP requires the support of 6LOWBAN's mand header ‘compression schemes. 14, Explain LoRaWAN, Answer: Low-Power Wide-Area is adapted for lon; ery-powered endpoints, «Standardization and Alliances: asa Layer 1 PHY modulation technology is available mul vendors, To differentiate from the physical layer modu LoRa, the LoRa Allianee uses the term LoRaWAN to refer, a cifications that deseribe end-to-end LoRaWAN commun LoRaWAN Layers © Physteal Layer: LoRaWAN 1.0.2 regional specifications describe the use of the main unlicensed sub-GHz frequency bands of 433 MHz, 779-787 MHz, 863-870 MHz, and 902-928 MHz, as well as regional profiles for a subset of the 902-928 MHz bandwidth.A LoRa gateway is deployed as the center hub of a star network architecture. It uses multiple transceivers and channels and can demodulate multiple channels at once or even demodulate multiple signals on the same channel simultancously, LoRa gateways serve as a transparent bridge relaying data between endpoints, and the endpoints use a single-hop wireless connection to communicate with one or many gateways. SO OO SHRISHA H.S., Department of €5 & E, CEC Page 13, INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 @ MAC Layer: The LaRs¥AN specifcaton documents three classes af LoRsWAN devices: © Glass A: Optimized for battery-powered nodes, alows bidirectional communications, where & Given node is able ip receive dawnstream irfic after transmiting, © Glass B: A Class B nade or endpoint should get addtional receive windows compared to Class ‘A. but gsteways must be synchronized through a beaconing pracess, © Class G: This class is particularly adapted for powered nodes. This classification enables & ‘node to be continuously listening by Keeping its receive window open when nat iransmiting. 1 Byte ‘arishie Byes —_— ee _* S_—*=l MAG Haaser (MeO Wa Pao, gress ight Level LaRaWAN MAC Frame Format © Topology: LoRaWAN topology is often described as a “star of Infrastructure consists of endpoints exchanging packets throu bridges, with a central LoRaWAN network server. Gateways network using standard IP connections, and endpoints communicate swith one or more gateways. LORAWAN Endpoints ‘Gateways: Network Servers: Applicaton Servers. WAN Roeitecure = Security: a © Each et network session key (NwkSKey), used by both itself, IN Fetwork server. The NwkSKey ensures data integrity checking the MIC of every data message as well as MAC-onlydata message payloads. and’ authenticated. This can be achieved through one of the two join echanisms: * Activation by personalization (ABP): Endpoints don’t need to run a Join procedure as their individual details, including DevAddr and the ‘NwkSKey and AppSKey session keys, are preconfigured and stored in she end device * Over-thealr activation (OTAA): Endpoints are allowed to dynamically join a particular LoRaWAN network after successfully ‘going through a join procedure. The join procedure must he done every time a session context is renewed. SS SHRISHA HS. Department of €5 & E, CEC Page 14 INTERNET OF THINGS TECHNOLOGY (I7CS81) MODULE 2 Didene enppie tnt erc-t-end (ih omcrypts neg etry Degman engl aareal oer HS Disease a (D Asorcstserg ap te Gm sernngemewstsce yg see on attr Mem LoRaWAN Secunty ‘* Competitive Technologies; LPWA solutions and unlicensed and licensed bands, The licensed-band { service providers that have acquired hi Ss Jogies are split between s are dedicated to SHRISHA HS. Department of €5 & E, CEC

You might also like