INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
1. Analyze the hardware specifications and architecture of the Raspberry
Pi.
Raspberry Pi a series of small, inexpensive single-board computers (SBCs)
developed by the British charity Raspberry Pi Foundation.
Released in 2012.
The Raspberry Pi was originally designed to support computer science education and
provide students and amateurs with an inexpensive platform to learn programming
and electronics.
Architecture of Raspberry Pi
Hardware Specifications:
1. Processor (CPU):
The processor has significant improvements over previous models; This makes it
suitable for many tasks such as multimedia work, web browsing and general
computer use.
Raspberry Pi models typically use ARM-based processors
BCM2837B0 SoC and quad-core’s Cortex-A53 CPU clocked at 1.4GHz. While
not as powerful as the BCM2711, it still provides respectable performance for
many applications.
2. Graphics Processing Unit (GPU):
Raspberry Pi boards feature integrated graphics processing
This GPU provides high performance in graphics applications including 3D
gaming and multimedia playback.
It works for decoding and simple 3D graphics.
It provides high performance in graphics applications
3. Memory (RAM):
The amount of RAM varies across different models
Models, including the 3 Model B+, come with 1GB LPDDR2 SDRAM, which is
sufficient for most tasks but may limit performance in more demanding situations.
4. Storage:
1
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
Raspberry Pi models rely on microSD card for storage, allowing users to
easily expand storage capacity and change functionality.
There is no onboard storage, except for a small EEPROM that contains boot
code and configuration settings.
5. Ports and Connectivity:
Ethernet and different Wi-Fi and Bluetooth features are also available
Multiple USB ports are available for connecting peripherals such as keyboards,
mice, and external storage devices.
GPIO pins for connecting to external devices It has many ports and connection
options.
Raspberry Pi boards come with various connectivity options
Main blocks of Raspberry Pi
Architecture:
1. ARM Architecture:
Raspberry Pi devices are built around a processor based on the ARM architecture,
known for its high performance, low power consumption and suitable for laptops.
ARM processors are widely used in smartphones, tablets, IoT devices, and other
embedded systems.
2. Broadcom SoC:
Developed by Broadcom, the system-on-chip (SoC) combines various components
such as CPU, GPU, memory and hardware into a single chip.
This integration helps the Pi's size, price, and power consumption also make for a
powerful computer.
3. GPIO Pins:
These pins allow the Raspberry Pi to interact with external devices and sensors.
They enable a variety of functions and applications.
GPIO pins can interact with hardware through programmatic control.
4. Low Power Consumption:
2
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
Raspberry Pi devices are designed to be powerful, battery friendly and low power
consumption.
The combination of ARM-based processors and efficient power management
contributes to the Raspberry Pi's low power consumption.
5. Expansion Options:
Raspberry Pi supports expansion via multiple interfaces, including USB, HDMI,
GPIO, camera/monitor connectors, and expansion headers
Allows other hardware to fix and keep working in Raspberry Pi projects.
2. Examine the TCP/IP protocol suite in detail.
A. The TCP/IP (Transmission Control Protocol/Internet Protocol) suite is the set of
protocols that governs communication on the internet and most networks today.
Provides design principles and standards for network data communications. The
TCP/IP protocol family has many protocols and is divided into four layers:
1. Application layer
2. Transport layer
3. Internet layer
4. Network layer
3
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
1. Application Layer:
The Application layer is the top layer in the TCP/IP protocol suite.
Corresponds roughly to the OSI's Application, Presentation, and Session layers.
It encompasses all protocols and processes that interact directly with end-users or
applications.
Application layer protocols include HTTP (Hypertext Transfer Protocol) for web
browsing
SMTP (Simple Mail Transfer Protocol) for email transmission, FTP (File Transfer
Protocol) for file transfer.
DNS (Domain Name System) for domain name resolution, and many others.
This layer handles high-level communication tasks and data exchange between
applications running on different devices.
2.Transport Layer:
The transport layer sits above the Internet layer and is responsible for end-to-end
communication between hosts.
It ensures reliable and orderly delivery of data packets, performing error detection,
correction, and flow control.
The two primary protocols at this layer are:
TCP (Transmission Control Protocol): Provides reliable, connection-oriented
communication by establishing and maintaining virtual circuits between sender
and receiver.
It guarantees in-order delivery of data packets, error recovery, and congestion
control.
UDP (User Datagram Protocol): Provides unreliable, connectionless
communication.
UDP is faster and more lightweight than TCP but does not guarantee delivery or
packet ordering.
It is commonly used for real-time applications like video streaming, VoIP, and
online gaming.
The transport layer also handles port numbers to distinguish between different
services running on the same host.
3.Internet Layer:
The Internet layer is responsible for addressing, routing, and forwarding packets
between networks.
It uses IP (Internet Protocol) to assign logical addresses (IP addresses) to devices
and determine the best path for data packets to reach their destination.
IP is a connectionless, best-effort protocol that operates independently of the
underlying network technologies.
Other protocols, such as ICMP (Internet Control Message Protocol) for error
reporting and IGMP (Internet Group Management Protocol) for managing
multicast group membership, also operate at this layer.
4
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
4. Network Access Layer
The bottom layer of the TCP/IP model.
It deals with the physical connection between devices and their local network.
The link layer encompasses protocols and technologies used for data framing,
error detection, access control, and physical transmission.
Ethernet, Wi-Fi (IEEE 802.11), PPP (Point-to-Point Protocol), and others are
examples of link layer protocols.
This layer also handles hardware addressing (MAC addresses) to identify devices
within the same local network segment.
3. Explain about the use of Extensible Messaging and Presence Protocol
(XMPP)
A. XMPP- Extensible Messaging and Presence Protocol
It serves as a backbone for real-time communication by streaming XML elements
across networks to exchange messages and presence updates swiftly.
It's commonly associated with instant messaging platforms like WhatsApp.
X (Extensible): XMPP is open-source and adaptable, allowing modifications or
extensions to meet specific needs.
M (Messaging): It's optimized for instant message delivery, offering efficient push
mechanisms for real-time communication.
P (Presence): Indicates online/offline/busy status, crucial for users to know when
contacts are available for interaction.
P (Protocol): XMPP is a defined set of standards facilitating communication between
systems.
XMPP meets the needs of instant messengers, including sending/receiving
messages, availability, subscriptions, calling and blocking communications.
The server acts as an intermediary. Each XMPP user is identified by a unique
Jabber ID (JID), which includes user, server, and optional information. flow.
Created HTTP transfer option to bypass firewall restrictions.
5
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
When the standard XMPP port is blocked, the server listens on the HTTP port,
allowing message exchange even in restricted environments.
Advantages:
Openness:
XMPP protocols are freely available, comprehensible, and supported by various
implementations including clients, servers, and libraries, fostering a collaborative
environment.
Standardization:
Core XMPP protocols have been formalized by the Internet Engineering Task
Force (IETF), ensuring adherence to recognized standards. Published RFCs
outline specifications, continually updated for relevancy.
Security:
XMPP supports robust security measures such as SASL and TLS, ensuring data
integrity and confidentiality. Ongoing efforts within the developer community
enhance security further through initiatives like end-to-end encryption.
Extensibility:
Leveraging XML, XMPP enables easy customization and extension of core
protocols. While common extensions are standardized, organizations can develop
private extensions to tailor XMPP to specific needs.
Flexibility: Beyond instant messaging, XMPP finds application in diverse fields
including network management, collaboration, file sharing, gaming, and cloud
computing, showcasing its adaptability to various use cases.
6
INTERNET OF THINGS
ASSIGNMENT- II
Name: V. Amrutha Roll.no: 21691A0504
Diversity: XMPP enjoys widespread adoption across companies and open-source
projects, ensuring users aren't tied to proprietary technologies and promoting
interoperability across platforms.