Professional Documents
Culture Documents
The following are some common examples of information that can undergo
digitization:
Data, such as numeric data from sensors, financial data and weather data.
Data from barcodes and quick response (QR) codes can be scanned into
a digital format to make them machine readable.
3. Brief about impact of IOT for the below given examples:
1.Connected Roadways
2.Connested Factory
3.Smart connected buildings
4.Smart Creature.
4. Highlights challenges in IOT.
While an IoT-enabled future paints an impressive picture, it does not
come without significant challenges. Many parts of IoT have become
reality, but certain obstacles need to be overcome for IoT to become
ubiquitous throughout industry and our everyday life.
IoT Challenges
Scale
Scalability refers to the ability of a system to handle increasing workloads or
numbers of users without a significant decline in performance. In the context
of the Internet of Things (IoT), scalability is a major challenge as the number
of connected devices is rapidly growing,
Security
Security is a critical concern in the Internet of Things (IoT) as it involves the
protection of sensitive data and systems from unauthorized access, theft, or
damage.
Privacy
Privacy is a critical concern in the Internet of Things (IoT), as IoT devices
collect, store, and transmit large amounts of personal and sensitive
information.
Big Data analytics : Challenges in IoT Big Data analytics include data
volume, variety, velocity, security, privacy, and real-time processing constraints.
Interoperability
Interoperability refers to the ability of different systems, devices, or
components to work together seamlessly and exchange data effectively. In the
context of the Internet of Things (IoT), interoperability is a critical challenge,
as a large number of diverse devices are being connected to the internet
5. Explain oneM2M IOT standardized architecture.
The oneM2M architecture divides IoT functions into three major domains: the
application layer, the services layer, and the network layer
Applications layer:
The oneM2M architecture gives major attention to connectivity between devices and
their applications.
This domain includes the application-layer protocols and attempts to standardize
northbound API definitions for interaction with business intelligence (BI) systems.
Applications tend to be industry-specific and have their own sets of data models, and
thus they are shown as vertical entities.
Services layer:
This layer is shown as a horizontal framework across the vertical industry applications.
At this layer, horizontal modules include the physical network that the IoT applications run on,
the underlying management protocols, and the hardware.
Examples include backhaul communications via cellular, MPLS networks, VPNs, and so on.
Riding on top is the common services layer.
Network layer: This is the communication domain for the IoT devices and endpoints. It
includes the devices themselves and the communications network that links them.
Embodiments of this communications infrastructure include wireless mesh technologies, such
as IEEE 802.15.4, and wireless point-to-multipoint systems, such as IEEE 801.11ah.
data.
1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is
responsible for collecting data from different sources. This layer
includes sensors and actuators that are placed in the environment to
gather information about temperature, humidity, light, sound, and
other physical parameters. These devices are connected to the
network layer through wired or wireless communication protocols.
2. Network Layer –
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system.
This is the communication domain for the IoT devices and endpoints. It includes the devices
themselves and the communications network that links them.
Examples of network technologies that are commonly used in IoT
include WiFi, Bluetooth, Zigbee, and cellular networks such as 4G
and 5G.
3. Data processing Layer –
The data processing layer of IoT architecture refers to the software
and hardware components that are responsible for collecting,
analyzing, and interpreting data from IoT devices. This layer is
responsible for receiving raw data from the devices, processing it,
and making it available for further analysis or action.
Example of a technology used in the data processing layer is a data
lake, which is a centralized repository for storing raw data from IoT
devices.
4. Application Layer –
The application layer of IoT architecture is the topmost layer that
interacts directly with the end-user. It is responsible for providing
user-friendly interfaces and functionalities that enable users to access
and control IoT devices.This layer includes various software and
applications such as mobile apps, web portals, and other user
interfaces that are designed to interact with the underlying IoT
infrastructure.
For instance, thermometers take our body temperatures in the form of physical
characteristics, convert the temperatures into electrical signals, and convey them to
their systems. Tilt sensors, Temperature sensors, Accelerometers, Ultrasonic sensors,
etc., are a few types of sensors.
Actuator
For instance, heaters, comb drives, pneumatic cylinders, hydraulic cylinders, and
electric motors are some of the common actuators you can find around you.
.
Types of Sensors
1. Temperature: Beginning with the most common type of sensor, the
temperate sensor records the amount of heat in a given setting. It can be
a machine, a room, a car, a lab, etc.
2. Moisture: Where temperature sensors record the heat, moisture
sensors record the amount of humidity. They have a wide array of
applications in the environment, food supply chains, medicinal labs,
agriculture, etc.
3. Light: Light sensors record and assess the ambient light settings in a
defined area and recommend actions to change the same. In your
smartphone, when the brightness is adjusted according to the exposure
to light, the light sensor and the electrical actuator play their part.
4. Motion: Motion sensors are usually installed in security systems and
help detect unauthorized activity. Motion IoT sensors use radar,
infrared, or ultrasonic waves to detect activity in their vicinity.
5. Noise: Noise sensors, as the name suggests, record the noise levels in
the given environment. It can be an entire city, a room, a car, etc. In IoT,
these sensors are used to build safe working and living environments for
people. They are also used to send warning notifications to the right
people when noise levels go beyond the stipulated threshold limit.
6. Proximity: Motion sensors and proximity sensors can be kept in the
same basket, as the majority of their functions are similar. These sensors
record activity nearby with the help of electromagnetic waves, including
infrared.
7. Level: From granular materials to semi-solid liquids, level sensors
detect the quantity or level of different substances.
8. Accelerometers: Accelerometers are an impressive type of IoT
sensor used to record and measure an object’s acceleration. These types
of sensors record the rate of change of an object’s speed in relation to
time.
ACTUATORS
Taking the sensor discussion forward, actuators do the opposite of
a sensor. They convert electrical impulses into physical actions or
objects.
Types of Actuators
14. Ellaborate design constraints for Wireless Smart Objects with diagram.
15. Compare STAR ,Mesh ,Peer to Peer Topology.
The cost of Star topology is The cost of Mesh topology is Depends on network size and
less. expensive. structure
The complexity of Star The complexity of Mesh Can be simple to complex depending
topology is quite simple. topology is complex. on network structure
Star topology is very good Mesh topology is poor Depends on network structure and
extensible. extensible. design
Star topology is used in LAN Mesh topology is used in Various, including file sharing, video
as setup is easy. WAN. conferencing, etc.
The breakdown of central hub The breakdown of a node , the failure of individual
leads to failure of entire does not affect other nodes in peers does not disrupt the
network. a network. entire network