Professional Documents
Culture Documents
Iot Main
Iot Main
PDF
Take it easy (previous - year)
https://prod-files-secure.s3.us-west-2.amazonaws.com/872d74be-2f52-4
a00-ad56-893819e7a4ea/4aa76a7e-0fa9-4654-8e68-8ba1fc144b14/iot_
SIMP_tie_(1).pdf
QP - 2
https://prod-files-secure.s3.us-west-2.amazonaws.com/872d74be-2f52-4
a00-ad56-893819e7a4ea/79fbaee3-2dba-47cc-80f2-fb5665cb975f/Jul-20
23.pdf
QP - 3
Take it easy 1
https://prod-files-secure.s3.us-west-2.amazonaws.com/872d74be-2f52-4
a00-ad56-893819e7a4ea/235a3d6f-ad4c-4245-b760-117dda1c3164/My_
Doc_-_326892.pdf
Module 1
1. What is IOT? discuss the evolutionary phase of the
internet with neat diagram. (6M) (OR) Explain the different
evolutionary phases of the Internet (6M). (OR) What is IOT?
Explain Genesis of IOT, with a neat diagram. (8M)
IoT is a technology transition in which devices will allow us to sense and control
the physical world by making objects smarter and connecting them through an
intelligent network. When objects and machines can be sensed and controlled
remotely across a network, a tighter integration between the physical world and
computers is enabled. This allows for improvements in the areas of efficiency,
accuracy, automation, and the enablement of advanced applications. It is an
umbrella of various concepts, protocols, and technologies.
In simple terms, the Internet of Things (IoT) is a technology that makes
everyday objects smart by connecting them to the internet. This allows
these objects to sense and share information, making them more efficient
and enabling new applications.
Take it easy 2
a. Connectivity (Digitize access): This phase connected people to email, web
services, and search so that information is easily accessed.
b. Networked Economy (Digitize business): This phase enabled e-
commerce and supply chain enhancements along with collaborative
engagement to drive increased efficiency in business processes.
c. Immersive Experiences (Digitize interactions): This phase extended the
Internet experience to encompass widespread video and social media while
always being connected through mobility. More and more applications are moved
into the cloud.
d. Internet of Things (Digitize the world): This phase is adding connectivity to
objects and machines in the world around us to enable new services and
experiences. It is connecting the unconnected.
2. List the difference b/w operation and information
technology with their challenges. (6M) (OR) Compare IT and
OT Networks with different criterion. (8M)
Take it easy 3
IT disruption can be business-
OT network disruption directly
7 impacting, with workarounds
impacts business.
possible depending on the industry.
Challenges Of IOT
Take it easy 4
The oneM2M architecture for IoT breaks down into three layers:
Application Layer:
Services Layer:
Network Layer:
Utilizes technologies like wireless mesh (e.g., IEEE 802.15.4) and point-
to-multipoint (e.g., IEEE 801.11ah).
Take it easy 5
Handles the transmission of data between devices in the IoT ecosystem.
Security
Privacy
Data Sensitivity:
Data Deluge:
Take it easy 6
Efficient processing of this data is crucial for obtaining insights.
Interoperability
IoT Standards:
Unlike other models, this framework separates core IoT and data
management into parallel stacks for a closer look at functions at each
stage.
Functional Stack:
Take it easy 7
The Core IoT Functional Stack simplifies the IoT architecture into three
layers for foundational understanding.
Take it easy 8
Challenges with IoT Data Analysis
Data-Related Problems
High latency.
Take it easy 9
Bring data management closer to the edge of the IP network.
Fog nodes allow intelligence gathering and control from the closest
possible point.
Fog services operate close to IoT endpoints, reducing the volume of data
sent upstream.
Fog nodes are placed close to IoT endpoints for quick and distributed
computing.
Geographic Distribution
Take it easy 10
Fog nodes are typically placed where there's a large number of IoT
endpoints.
Wireless Communication
Take it easy 11
IoT is about linking objects and machines to a computer network, like the
Internet.
c. Digitization Definition:
e. Digitization as a Differentiator:
Digitization sets businesses apart, and IoT plays a key role in enabling
this digitization.
Challenges Addressed:
Take it easy 12
i) Safety:
ii) Mobility:
iii) Environment:
Intelligent Systems:
Take it easy 13
HVAC Control: Sensors influence the building management system's
control of air flow for temperature regulation.
Digital Ceiling:
Benefits:
Take it easy 14
Layer 1: Physical Devices and Controllers Layer:
Functions:
Functions:
Functions:
Take it easy 15
Confirms Data Set Completeness.
Applications:
Monitoring.
Control.
Report Generation.
Functions:
Take it easy 16
1. Access Network Sub-Layer:
3. IP Transport Sub-Layer:
Functions:
Applications Layer:
IoT Emphasis:
Take it easy 17
Components of Applications Layer:
Analytics Component:
Message Stressed:
Purpose of IoT:
Take it easy 18
1. Contextual Location Awareness and Low Latency:
Simple Explanation: The fog node (a part of fog computing) is placed very
close to where the Internet of Things (IoT) devices are. This helps in quick
and nearby processing of information, reducing delays.
2. Geographic Distribution:
Simple Explanation: Fog nodes are usually set up where there are many
IoT devices. For example, in systems that measure things like electricity
usage, there might be thousands of devices connected to a fog node.
Simple Explanation: Fog computing is best for applications that need things
to happen quickly, in real-time. The fog node does some initial processing of
data, making it faster for the applications to respond, rather than waiting to
process everything all at once.
12. Illustrate various access technologies with respect to
distances in core IoT functional stack. (5M)
A. "Things" Layer:
Take it easy 19
Description: Facilitates communication when smart objects need to
interact with an external system, often using wireless technology.
Sublayers:
Functionality:
Take it easy 20
systems, employing wireless technologies, gateways, backhaul networks, and
transport protocols. The upper layer, Application and Analytics, processes data
for intelligent decision-making and instructs devices to adapt accordingly.
Module 2
1. Define sensors. List the different categories of the
sensors. (5M) (OR) List and explain different types of sensors
(any 8) with an example each. (8M) (OR) Explain any 5 ways to
group sensors into different categories. (5M) Repeated
Sensors are devices or instruments that detect and measure physical properties,
environmental conditions, or changes in those conditions and convert this
information into signals or data that can be interpreted, displayed, or recorded.
Invasive or Non-Invasive
Contact or No-Contact
Absolute or Relative
Take it easy 21
Absolute Sensors: Measure on an absolute scale, providing
information without reference to another value.
Area of Application
Take it easy 22
Take it easy 23
3. What is actuator and smart objects. Explain the different
characteristics of smart objects. (7M) (OR) What are smart
objects? With a neat diagram, explain characteristics of smart
object (8M) (OR) What is a Smart Object? Explain its
characteristics. (8M) Repeated
Actuator:
An actuator is a mechanical or electronic device that is responsible for
moving or controlling a mechanism or system. It receives signals from a
control system and converts them into physical action.
Smart Objects:
Smart objects refer to physical entities or devices that are embedded with
sensors, actuators, and communication capabilities, allowing them to interact
with the environment, collect data, and respond intelligently to changing
conditions. These objects are often part of the Internet of Things (IoT)
ecosystem, where they can communicate with each other and with a central
system to enable automation, monitoring, and control.
1. Processing Unit:
Take it easy 24
What: A smart object has a brain (processing unit) to think and make
decisions.
Example: It's like a tiny computer inside a smart object that helps it
understand and respond to information.
3. Communication Device:
What: Smart objects can talk to each other or the outside world using
a communication device.
4. Power Source:
What: Smart objects need power to work, and the most power is
usually used for communication.
Take it easy 25
1. Purpose and Standards:
Purpose: ZigBee IP was created to align with open standards from the
IETF (Internet Engineering Task Force), including IPv6, 6LoWPAN (IPv6
over Low-Power Wireless Personal Area Networks), and RPL (Routing
Protocol for Low-Power and Lossy Networks).
Take it easy 26
Requirements: It requires the support of 6LoWPAN's fragmentation and
header compression schemes.
IPv6 Support: All ZigBee IP nodes support IPv6 at the network layer.
Routing Protocol: ZigBee IP nodes use RPL for routing packets across
the mesh network.
5. Define LoRaWAN explain LoRaWAN layers with neat
diagram. (10M)
LoRaWAN : Low-Power Wide-Area is adapted for long-range and battery-
powered endpoints
Take it easy 27
2. Physical Layer:
3. MAC Layer:
LoRaWAN Classes:
The MAC payload size depends on the frequency band and the data
rate, ranging from 59 to 230 bytes for the 863–870 MHz band and 19
to 250 bytes for the 902–928 MHz band.
Take it easy 28
6. What are actuators? Explain comparison of sensors and
actuators functionality with human (4M).
Actuators:
An actuator is a mechanical or electronic device that is responsible for
moving or controlling a mechanism or system. It receives signals from a
control system and converts them into physical action.
1. Sensors:
Functionality Similarity:
2. Actuators:
Functionality Similarity:
Take it easy 29
mechanical system.
Overall Comparison:
Advantages:
Greater deployment flexibility (especially in extreme environments or
hard-to-reach places)
Simpler scaling to a large number of nodes
Lower implementation costs
Easier long-term maintenance
Effortless introduction of new sensor/actuator nodes
Better equipped to handle dynamic/rapid topology changes
Disadvantages:
Take it easy 30
9. List and explain in brief communication criteria. (6M)
1. Range:
Short Range: Suitable for distances up to tens of meters, both wired and
wireless options are available. Examples of short-range wireless
technologies include IEEE 802.15.1 Bluetooth and IEEE 802.15.7 Visible
Light Communications (VLC).
2. Frequency Bands:
Well-known unlicensed ISM bands include the 2.4 GHz band used by
IEEE 802.11b/g/n Wi-Fi, IEEE 802.15.1 Bluetooth, and IEEE 802.15.4
WPAN.
Take it easy 31
3. Power Consumption:
Take it easy 32
Sensors are designed to sense and measure practically any measurable
variable in the physical world. They convert their measurements into electric
signals or digital representations that can be consumed by an intelligent agent.
Actuators, receive some type of control signal that triggers a physical effect,
usually some type of motion, force.
IoT sensors are devices that sense and measure the physical world and signal
their measurements as electric signals sent to some type of microprocessor
or microcontroller for additional processing.
A processor can send an electric signal to an actuator that translates the signal
into some type of movement (linear, rotational, and so on) or useful work that
changes or has a measurable impact on the physical world.
11. Explain the following key factors involved in connecting
smart objects to the network: i) Range ii) Frequency bonds.
(10M)
Range:
Short Range:
Take it easy 33
Alternative to serial cables.
Medium Range:
Long Range:
Examples: Cellular (2G, 3G, 4G), outdoor IEEE 802.11 Wi-Fi, Low-
Power Wide-Area (LPWA) technologies.
Industrial networks may use IEEE 802.3 over optical fiber and IEEE
1901 Broadband Power Line Communications but are not
considered IoT access technologies.
Frequency Bands:
Take it easy 34
Sub-GHz bands used by IEEE 802.15.4, 802.15.4g, 802.11ah, and
LPWA technologies (e.g., LoRa, Sigfox).
Common sub-GHz ranges: 169 MHz, 433 MHz, 868 MHz, and 915 MHz.
Module 3
1. Explain the key advantages of IP suite for IOT. (6M) (OR)
Explain key advantages of Internet Protocol for the IOT. (8M)
(OR) Explain the key advantages of IP suite for IOT. (5M)
Repeated
Open and Standards-Based
Take it easy 35
IoT benefits from standardized solutions for compatibility, security, and
management.
The Internet Engineering Task Force (IETF) sets standards for network
and transport layers.
Versatile
Many technologies can connect IoT devices, and IP can work with
various ones, making it a flexible choice.
Ubiquitous
Almost all devices, from computers to small sensors, use IP, ensuring
compatibility and integration.
Scalable
Innovation Factor
Take it easy 36
Without Header Compression:
In the top half of Figure 3.4, a 6LoWPAN frame is depicted without any
header compression enabled.
The full IPv6 header (40 bytes) and UDP header (8 bytes) are visible.
Take it easy 37
It's highlighted that the 2-byte header compression is applicable to intra-
cell communications, while communications external to the cell may
require some fields of the header to remain uncompressed.
3. Explian 6 LOWPAN protocol header compression and
Fragmentation, with a neat diagram. (8M)
Fragmentation in IPv6
MTU (Maximum Transmission Unit):
Take it easy 38
Purpose: 6LoWPAN mesh addressing facilitates packet forwarding
over multiple hops.
Header Fields: Three fields are defined - Hop Limit, Source Address,
and Destination Address.
Hop Limit: Similar to IPv6's hop limit, it sets an upper limit on how
many times the frame can be forwarded. Each hop decreases this
value by 1. When it reaches 0, the frame is dropped and no longer
forwarded.
4. Describe CoAP ( Constrained Application Protocol ) message
format with neat diagram.(8M) (OR) Explain with neat diagram
Constrained Application Protocol (COAP) message format.
(8M)
Take it easy 39
Options fields if necessary
Payload field
Ver (Version) Identifies the CoAP version. Allows for version identification.
TKL (Token Specifies size of the Token Determines the length of the Token
Length) field (0–8 Bytes). for correlation.
This table summarizes the key fields in a CoAP message, their descriptions, and
their respective purposes.
5. Explain MQTT ( Message Queuing Telemetry Transport ) message
format and its types with neat diagram. (8M)
Take it easy 40
Field Description Purpose
When set, indicates that the Allows the client to note that the packet
DUP (Duplication packet has been sent is a duplicate, helping in scenarios
Flag) previously without where acknowledgments were not
acknowledgment. received.
This table summarizes the MQTT header fields, their descriptions, and their
respective purposes.
6. Explain IOT Data Broker with an ex. (4M)
Take it easy 41
An IoT data broker is a piece of middleware that standardizes sensor output into
a common format that can then be retrieved by authorized applications.
1. Data Collection:
2. Organization:
The Data Broker organizes and makes sense of the data, putting it in
a standard format.
4. Compatibility:
Ensures that data from different devices can understand each other.
5. Security:
6. Efficiency:
Handles the increasing flow of data as you add more smart devices.
In short, the IoT Data Broker helps devices talk to each other by organizing,
translating, and directing their data, making your smart home work smoothly.
7. Explain the need for optimization. (8M)
Constrained Nodes:
1. Communication Challenges:
Take it easy 42
network.
3. Node Types:
Constrained Networks:
1. Unique Characteristics:
2. Underreact to Failure:
IP Versions in IoT:
1. Transition to IPv6:
Due to limited IPv4 addresses, there's a shift to IPv6 over the last 20
years.
Both IPv4 and IPv6 are used in IoT to align with existing systems.
Techniques like tunneling ensure compatibility.
Take it easy 43
3. Factors for IP Version Choice:
Take it easy 44
these devices. In today's networks, SCADA systems enable global, real-time,
data-driven decision-making to enhance various business processes.
While SCADA networks are present across multiple industries, they are
particularly prominent in utilities and manufacturing/industrial verticals. Within
these specific sectors, SCADA commonly employs specific protocols for
communication between devices and applications. For instance:
Take it easy 45
1. An MQTT client can act as a publisher to send data (or resource information)
to an MQTT server acting as an MQTT message broker.
2. The MQTT server (or message broker) accepts the network connection along
with application message from the publishers.
3. The MQTT server also handles the subscription and unsubscribes process
and pushes the application data to MQTT clients acting as subscribers.
4. Clients can subscribe to all data (using a wildcard character) or specific data
from the information tree of a publisher.
6. A benefit of having this decoupling is that the MQTT message broker ensures
that information can be buffered and cached in case of network failures.
Publishers and subscribers do not have to be online at the same time.
7. MQTT control packets run over a TCP transport using port 1883. TCP
ensures an ordered, lossless stream of bytes between the MQTT client and
the MQTT server.
Take it easy 46
11. Illustrate Routing Protocol for low Power and Lossy
Networks (RPL), with a neat diagram (7M) NOT DONE
12. Describe the Scheduling Management Mechanisms and
forwarding Models and Supported by 6 TiSCH. (10M) NOT
DONE
13. Explain the message format of the following protocols
with a neat diagram:
i) Constrained Application Protocol (CoAP).
ii) Message Queuing Telemetry Transport (MQTT) (10M)
Repeated Q4 and Q5
Module 4
1. Explain in detail how iot data is categorized. (6M)
IoT (Internet of Things) data can be categorized in various ways based on
different criteria such as the nature of the data, its source, and its application.
Here are several common ways to categorize IoT data:
Based on Source
Take it easy 47
Device Metadata: Information about the IoT devices themselves, such
as device ID, location, and status.
Based on Purpose/Application
Analytical Data: Data used for analysis and gaining insights. This can
include historical data, trends, and patterns used for predictive
maintenance or optimizing processes.
Based on Location
Local Data: Data that is processed and stored locally on the IoT device.
Cloud Data: Data that is transmitted to and processed in the cloud. This
is common for applications that require centralized processing, analytics,
and storage.
Take it easy 48
Non-sensitive Data: Data that is less critical in terms of security and
privacy.
2. With neat diagram explain the edge analytics processing
unit with its functions. (8M) (OR) Expalin edge streaming
analytics and functions of Edge Analytics Processing Unit.
(10M) Repeated
Raw input data: This is the raw data coming from the sensors into the
analytics processing unit.
Analytics processing unit (APU): The APU filters and combines data
streams, organizes them by time windows, and performs various analytical
functions. It is at this point that the results may be acted on by micro services
running in the APU.
Output streams: The data that is output is organized into insightful streams
and is used to influence the behaviour of smart objects, and passed on for
storage and further processing in the cloud. Communication with the cloud
often happens through a standard publisher/subscriber messaging protocol,
such as MQTT
Filter
Take it easy 49
Transform
Time
Correlate
Match Patterns
Take it easy 50
Simplified Explanation:
MPPs are often called analytic databases because they handle large
datasets simultaneously across many processors and nodes. In this
architecture, there's a master node coordinating everything across the
cluster. Each node works independently, having its processing, memory, and
storage (a "shared-nothing" approach).
Take it easy 51
Lambda System Overview
Take it easy 52
Flexibility and Robustness
Limitation
Take it easy 53
Currently moving through the Stored or held, not actively
Nature of Data
network. moving.
Fog computing tools for real- Hadoop and other tools for
Analytics Tools
time processing. structured data in databases.
Hadoop is the most recent entrant into the data management market, but it is
arguably the most popular choice as a data repository and processing engine.
Take it easy 54
Hadoop was originally developed as a result of projects at Google and Yahoo!,
and the original intent for Hadoop was to index millions of websites and quickly
return search results for open source search engines. Initially, the project had two
key elements:
Hadoop Distributed File System (HDFS): A system for storing data across
multiple nodes
MapReduce: A distributed processing engine that splits a large task into
smaller ones that can be run in parallel
1. NameNodes:
Function: Critical for data adds, moves, deletes, and reads in HDFS.
Take it easy 55
Write Requests: Accepts write requests, distributes files across
available nodes in configurable block sizes (e.g., 64 MB or 128 MB).
2. DataNodes:
Take it easy 56
OCTAVE Allegro Methodology:
Take it easy 57
5. Identify Threat Scenarios:
6. Identify Risks:
7. Risk Analysis:
8. Mitigation:
Three possible decisions: accept the risk, mitigate with control effort,
or defer a decision.
1. Risk Definition:
Take it easy 58
Result of a threat agent acting on an asset with a specified frequency
(threat event frequency - TEF).
Take it easy 59
Example: A thermometer in a truck engine reports temperature values
every second. Descriptive analysis allows you to pull this data at any
moment to gain insight into the current operating condition of the truck
engine.
Take it easy 60
Discovers patterns, relationships,
Predicts or classifies outcomes
Goal or structures within the data
based on input data.
without predefined outcomes.
Clustering, Dimensionality
Classification, Regression,
Use Cases Reduction, Anomaly Detection,
Object Detection, etc.
etc.
Take it easy 61
Lambda System Overview
Take it easy 62
Flexibility and Robustness
Limitation
Module 5
1. Write notes on
i) Arduino UNO
ii) Raspberry Pi. (12M)
i) Arduino UNO
Arduino UNO is an open-source microcontroller board based on the
ATmega328P microcontroller and developed by Arduino.cc.
The board is equipped with sets of digital and analog input/output (I/O)
pins that may be interfaced to various expansion boards (shields) and
other circuits.
The board features 14 digital I/O pins (of which 6 can be used as PWM
outputs), 6 analog inputs, a 16 MHz quartz crystal, a USB connection, a
power jack, an ICSP header, and a reset button.
Take it easy 63
Key Features of Arduino UNO
1. Microcontroller (ATmega328P):
The brain of Arduino UNO, responsible for executing program
instructions.
Take it easy 64
Maximum current that can be sourced or sunk by each digital I/O pin.
9. SRAM (2 KB)
Volatile memory used for runtime data storage during program
execution.
Non-volatile memory for storing data that persists even when the
board is powered off.
Take it easy 65
Programming Language: Uses a simplified version of C++, making it
easier to learn and use.
Programming and Software
The Arduino Integrated Development Environment (IDE) is used for writing
programs for the Arduino. Programs written using the Arduino IDE are
called sketches. These sketches are written in the text editor and are
saved with the file extension .ino. The IDE includes a code editor, a
message area, a text console, a toolbar with buttons for common
functions, and a series of menus. It connects to the Arduino hardware to
upload programs and communicate with them.
Take it easy 66
GPIO: 40-pin header, populated or unpopulated
Raspberry Pi 1 Model B+: Improved design with more USB ports and
GPIO pins.
Raspberry Pi Interfaces
GPIO: General-purpose input/output pins for interfacing with a wide
range of hardware.
Take it easy 67
The Raspberry Pi can run a variety of operating systems, including:
Take it easy 68
The Raspberry Pi board consists of several key components:
Processor
The Raspberry Pi uses a Broadcom system on a chip, which includes an
ARM processor and a VideoCore Graphics Processing Unit (GPU). This is
the heart of the Raspberry Pi, controlling the operations of all connected
devices and handling all required computations.
Memory (RAM)
Random Access Memory is a core part of the computer's processing system.
It's where real-time information is stored for easy access. The initial
Raspberry Pi had 256MB RAM, but this has been significantly improved over
the years. For instance, the Raspberry Pi 4 model comes with 8GB RAM.
HDMI
The High Definition Multimedia Interface is used for transmitting video or
digital audio data to a computer monitor or TV.
Ethernet port
This allows the Raspberry Pi to connect to a network, enabling internet
access and communication with other devices.
USB ports
Take it easy 69
These are used to connect peripheral devices such as a keyboard, mouse, or
external storage devices.
GPIO Pins
General Purpose Input/Output pins are used to connect the Raspberry Pi to
other electronic components, allowing it to control these components or
receive data from them.
Power Source
The Raspberry Pi is typically powered through a micro USB port, although
newer models use a USB-C port.
Take it easy 70
3.3V power source, the GND pin is connected to ground, and the Data pin is
connected to a GPIO pin on the Raspberry Pi.
2. Raspberry Pi
The Raspberry Pi is a small, affordable computer that can be used to
process and transmit the temperature data. It reads the temperature data
from the DS18B20 sensor through one of its GPIO pins. The Raspberry Pi
can be programmed using Python, a popular, easy-to-learn programming
language[1].
3. Wireless Transmission
The Raspberry Pi is connected to a wireless network, allowing it to transmit
the temperature data to a remote device or server. This can be done using
Wi-Fi or other wireless communication protocols. The remote device can
then display the temperature data in real-time, allowing for continuous
monitoring[1].
4. Architecture
The provided diagram illustrates a wireless temperature monitoring system
that includes two main sections: the transmitter and the receiver. The system
is designed to measure temperature, process the data, and then wirelessly
transmit the information to a remote location where it can be monitored and
displayed.
Here's a breakdown of the components and their functions as depicted in the
diagram:
Take it easy 71
Transmitter Section
Temperature Sensor: This is the component that measures the
temperature. It could be a digital sensor like the DS18B20, which is
capable of sending digital signals to the microcontroller representing
the measured temperature.
Encoder: The encoder takes the digital data from the microcontroller
and encodes it for wireless transmission, ensuring that the signal can
be properly received and decoded at the other end.
Take it easy 72
Transmitter: This component wirelessly sends the encoded
temperature data. It could use various wireless technologies such as
RF, Wi-Fi, or Bluetooth.
Decoder: The decoder takes the encoded data from the receiver and
converts it back into a format that the microcontroller can understand
and process.
LCD: An LCD display in the receiver section may show the received
temperature data for local monitoring.
5. Explain the steps to install operating system in the SD
card of Raspberry Pi. Write a Python program to blink on LED.
(10M)
To install an operating system on the SD card of a Raspberry Pi, follow
these steps
Take it easy 73
of any previous data that could cause issues.
3. Write the Operating System to the SD Card: Use a program like Balena
Etcher to write the downloaded image of the Raspberry Pi OS onto your
SD card. Select the downloaded image file, choose your SD card, and
then click "Flash" to start the process.
4. Insert the SD Card into the Raspberry Pi: Once the image has been
successfully written to the SD card, remove it from your computer and
insert it into the SD card slot on the Raspberry Pi.
To write a Python program to blink an LED, you can use the RPi.GPIO
library which allows you to easily configure the GPIO pins of your
Raspberry Pi. Here's a simple example
try:
while True:
Take it easy 74
# Turn on the LED
GPIO.output(LED_PIN, GPIO.HIGH)
# Wait for one second
time.sleep(1)
# Turn off the LED
GPIO.output(LED_PIN, GPIO.LOW)
# Wait for one second
time.sleep(1)
except KeyboardInterrupt:
# Reset the GPIO settings if the user stops the p
rogram
GPIO.cleanup()
This program will continuously turn the LED on and off every second. The
LED is connected to GPIO23. The try/except block is used to catch a
keyboard interrupt (Ctrl+C) which will stop the program and run
GPIO.cleanup() to reset the GPIO settings.
6. Explain the following with respect to Ardunio
Programming:
i) Structures
ii) Functions
iii) Variables
iv) Flow control statements
v) Data type with example. (10M)
In Arduino programming, the following concepts are crucial:
i) Structures
In Arduino, structures are used to group together variables of different data
types under a single name. They are similar to arrays, but they can store
non-homogeneous data types. For example, you could create a structure to
store information about a sensor, including its ID (an integer), its reading (a
float), and its status (a boolean).
ii) Functions
Take it easy 75
Functions are blocks of code that perform a specific task. They can take
inputs (parameters) and return a result (output). In Arduino, there are two
main functions that every program must have: setup() and loop() . The
setup() function runs once when the program starts and is typically used for
initialization. The loop() function runs repeatedly after setup() completes,
and is where the main logic of the program is usually placed.
iii) Variables
Variables are used to store data. In Arduino, variables must be declared with
a specific data type, such as int for integers, float for floating-point
numbers, char for characters, and boolean for true/false values. Variables
can be used to store sensor readings, keep track of time, control the state of
outputs, and more.
v) Data types
Data types define the type of data that a variable can hold. Some common
data types in Arduino include:
byte : for 8-bit numbers, ranging from 0 to 255, e.g., byte myVar = 255;
These data types are used when declaring variables, and they determine
how much memory is allocated for the variable and how the stored value is
interpreted.
7. Explain IOT strategy for smart cities. (10M)
Take it easy 76
An IoT strategy for smart cities involves the integration of various IoT devices and
sensors into the urban infrastructure to collect data, monitor various aspects of
the city's functioning, and automate processes to improve efficiency,
sustainability, and the quality of life for its residents. Here's a detailed explanation
of the IoT strategy for smart cities:
5. Security Layer: Given the sensitivity of data and the potential for cyber-
attacks, a robust security architecture is essential. This includes
encryption, access control, and continuous monitoring for threats.
Traffic Management: IoT sensors can monitor traffic flow and adjust
traffic signals in real-time to reduce congestion and improve commute
times.
Take it easy 77
Waste Management: Smart bins equipped with sensors can notify
collection services when they are full, optimizing waste collection routes
and schedules.
Scalability: Designing systems that can grow with the city's needs
without significant overhauls.
Take it easy 78
Funding: Securing the necessary investment for infrastructure upgrades
and maintenance.
The architecture can be visualized as a layered diagram, with each layer building
upon the previous one to create a comprehensive system that supports smart
city operations. The diagram would typically show the flow of data from the street
Take it easy 79
layer through the city network and data center layers, culminating in the services
layer where applications utilize the processed data.
Street Layer
This is the foundational layer where data collection begins. It consists of
various devices and sensors deployed throughout the city to monitor and
interact with the physical environment. Examples include:
Network Routers and Switches: These are used to handle the large
volume of data from the street layer and ensure its reliable transport.
Take it easy 80
Data Processing: Applications in the data center analyze the data to
provide insights
and automated responses, such as traffic light coordination to reduce
congestion.
Application Diversity: Uses the same data for various purposes, such
as parking apps for citizens and traffic management tools for city
operators.
Cloud: Offers
scalability and flexibility but comes with security risks that must be
mitigated. Data sovereignty laws may affect where data is stored.
Security Considerations
Take it easy 81
A critical aspect of the Smart City IoT Architecture is ensuring the security of
the data being shared and processed. This involves implementing security
protocols across all layers, including firewalls, VLANs, and encryption, to
protect against unauthorized access and tampering.
Take it easy 82
1. Smart Buildings: These structures integrate heating, ventilation, and air-
conditioning (HVAC) and other building infrastructure systems efficiently to
reduce energy consumption and lower operating costs. This can potentially
save up to $100 billion.
3. Smart Parking: This system provides real-time visibility into parking space
availability across a city, potentially creating $41 billion. It allows residents to
identify and reserve the closest available space, traffic wardens to identify
noncompliant usage, and municipalities to introduce demand-based pricing.
7. Utilities: Smart grids are used for energy consumption monitoring and
management, water leakage detection, and water potability monitoring.
Take it easy 83
This architecture is layered and must be fortified at each level to protect city data
from unauthorized access, collection, and tampering.
Data Ownership
Citizens generally feel more secure when the city, rather than a private entity,
owns public or city-relevant data. This ownership structure allows for better
control over how data is used and prevents potential misuse by private
entities.
Security Protocols
These protocols authenticate various components and protect data transport
throughout the system. For example, they can prevent the hijacking of traffic
sensors that could lead to congestion issues.
Firewall
Located at the edge of the network, the firewall should be IPsec- and VPN-
ready, and include user- and role-based access control. It should also be
integrated with the architecture to give city operators remote access to the
city data center.
VLAN
A VLAN provides end-to-end segmentation of data transmission, further
protecting data from rogue intervention. Each service/domain has a
dedicated VLAN for data transmission.
Encryption
Protecting the traffic from the sensor to the application is a common
requirement to avoid data tampering and eavesdropping. In most cases,
encryption starts at the sensor level.
Take it easy 84
This approach assumes no trust is given to any entity (inside or outside the
network) by default and requires verification for every data request.
Network Segmentation/Microsegmentation
This involves dividing the network into smaller parts to improve security and
reduce the potential impact of a breach.
Authentication
This involves verifying the identity of users, systems, or devices before
granting access to data or resources.
The security architecture should be able to evolve with the latest technology and
incorporate regional guidelines, such as city by-laws or regional security
regulations. Network partners may also have their own compliance standards,
security policies, and governance requirements that need to be added to the
local city requirements.
Take it easy 85