Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
42 views
Iot
Uploaded by
R Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Iot For Later
Download
Save
Save Iot For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
42 views
Iot
Uploaded by
R Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Iot For Later
Carousel Previous
Carousel Next
Save
Save Iot For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 84
Search
Fullscreen
PEE FE INTRODUCTION TO INTERNET OF THINGS : f JOT vision, Strategic research and innovation directions, Iot Applications, Related future technologies, Infrastructure, Networks and communications, Processes, Data Management, Security, Device level energy issues EEE EEE Py oe apertaat af .QL. What is 1OT? Explain the components of OT. ‘Meaning The Intemet of Things (1OT) refers to the network cof physical objects or “things” embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the interet. In simple terms, it's about connecting everyday objects to the intemet and enabling them to send and receive data. ‘Components ‘The components of the Internet of Things are: 1. - Devices/Things ‘These are the physical objects that are equipped with sensors, actuators, and other technologies to collect and transmit data. Examples include smart home devices (thermostats, lights, ‘cameres), wearable devices (smartwatches, fitness trackers), industrial sensors, and more. 2, Sensors and Actuators Sensors gather data from the environment, such as temperature, humidity, motion, or light. ‘Actuators, on the other hand, can perform actions based on the received data, like adjusting the temperature or turning onloff a device. 3. Connectivity’ JOT devices rely on various communication technologies to transmit data to other devices or ‘systems. This can include Wi-Fi, Bluetooth, Zigbee, cellular networks, and more. 4, DataProcessing ‘The data collected by IOT devices is processed and analyzed to derive meaningful insights. This can happen on the device itself (edge computing) or be sent to a centralized cloud server for processing, 5. Cloud Computing Many IOT applications leverage cloud computing for storing and processing large amounts of data. Cloud platforms provide the infrastructure and tools needed to manage and analyze OT data onalarge scale. 6. Software and Applications IOT applications and software enable users to interact with and control connected devices. These applications can range from smart home apps to industrial automation software, 7. Security ‘ Given the interconnected nature of IOT, security isa ctitical aspect. Measures such as encryption, authentication, and secure protocols are essential toprotectIOT devices and the data they transmi @. Explain the features of the Interstet of Things. (i) Interconnectivity With regard to the IOT, anything can be interconnected with the global information and communication infrastructure. (ii) Things-related services- The IOT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency GE, Taal Pecatons @ Scanned with OKEN ScannerMCA between physical things and their virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information ‘world will change. Heterogeneity Due to physical objects ge controlled digitally (i) Automation and Contro} infrastructure, there is ‘automation and control inthe human intervention, the m onnectivity enables network accessibility and Sie eee . 1 obtained fast. This results ir luable time. compatibility. Accessibility is getting on a network e Doge | while compatibility provides the common ability Instead of repeating the same tasks every day it io coiistins eid radians dale enables people to do other creative jobs. Q3. Explain the advantages and disadvantages | ‘“) Saves Money of OT. Ana: Advantages L The biggest advantage of lOTis saving money. If the price of the tagging and monitoring equipment is les than the amount of money saved, then the Intemet of Things ull be very widely adopted. IOT fundamentally proves to be very helpful to people in their daily routines by making the appliances communicate to each other in an effective manner thereby saving and conserving energy and cost. Communication IOT encourages the communication between devices, also famously known as Machine-to- ‘Machine (M2M) communication. Because of this, Rahul Publications G) ae @ Scanned with OKEN Scanneree | Better Quality of Life wi bi ‘lthe applications ofthis technology culminate in increased comfort, convenience, and better management, thereby improving the quality of ie isadaniages ip Compatibai Complexity (i) Privacy’Security With all oft (of losing privacy incre well en: transmitted v employers to kn are taking or Safety Imagine if a notori prescription. Or ifa lent product that yo ww | changes your | auto | a flavor that you do not like, or a produ already expired. As a result, safety is ultimately in the hands of the consumer to verily any and all automation. (v) Compatibility {As devices from different manufacturers will be interconnected, the issue of compatibility in tagging and monitoring crops up. Although this disadvantage may drop off if all the ‘manufacturers agre toa common standard, even after that, technical issues will persist: Today, we have Bluetooth-enabled devices and compatiblity problems exist even in this technology! Compatibility issues may result in people buying appliances from a certain manufacturer, leading (ii) INTERNET OF THINGS Complexity The IOT is a diverse and complex network. Any failure or bugs in the software or hardware will have serious consequences. Even power failure «an cause allot of inconvenience Explain the elements of Internet of Things. Data-driven Insights JOT devices generate vast amounts of data. The vision involves hamessing this data to gain valuable insights, make informed decisions, and optimize processes. This data-criven approach can lead to improved efficiency, cost savings, and ‘enhanced user experiences. ‘Automation and Control JOT envisions automation and control of devices, ‘and systems based on real-time data. This can range from smart home devices adjusting temperature and lighting to industrial processes ‘optimizing production based on sensor inputs. to its monopoly in the market. Rahul Publications @ Scanned with OKEN Scanner(iw) wy) (vii) (viii) (ix) (%) Smart Cities 1OT can contribute to the development of smart cities by integrating various systems, such as transportation, energy management, and public services. This integration aims to enhance urban living through increased eficiency, sustainability, and responsiveness to citizens’ needs, Enhanced Connectivity JOT relies on improved connectivity, including 5G networks, to enable seamless communication between devices. This high-speed, lowlatency connectivity is crucial for the success of many IOT applications. ‘Security and Privacy Ensuring the security and privacy of IOT data is 2 critical aspect ofthe vision. As more devices me interconnected, there isa need for robust Security measures to protect against cyber threats and unauthorized access, Innovation and New Business Models The IOT vision involves fostering innovation and the development of new business models, Companies can create value by offering 101 enabled products and services, and entire industries may undergo transformation as a result. Environmental Sustainability {OT can contribute to sustanabilty efforts by optimizing resource usage, reducing waste, and ‘enabling more efficient energy management Human-Centric Design ‘TheOT vision emphasizes creatingsolutions that enhance the quality of life for individuals, Human-centic design principles ensure that OT: technologies are userstiendly, accessible, and contribute positively fo people's daily lives, Global Collaboration Achieving the full potential of IOT requires fon across industries, govemments, and regions, Standardization, inleroperabilty and Cen ecosystems are essential for realizing a cohesive and interconnected IOT landscape. In summary, the IOT vision revolves around creating a connected : ‘ystems, and data work together to provide valuable insights, automation, and improved ‘experiences across various domains, M2M to OT _The Vision From (i) We attempt to describe the today referred to as Keuntuncation towards an emengn “thing known asthe intemet of Thing a The Intemet has undoubtedly hag Fact cos society ad indo two decades. Starting off as ARE ‘einen remote computer io introduction of the TCPAP proto suite later the introduction of series lig eral. the World Wide Web (WWW), creas? tremendous growth Of usage and trate, *? |nconjunction with innovations that cata, ‘educed the cast of semiconductor technolg! and the subsequent extension ofthe reasonable cost va mobile netwots tet people and businesses are now. connected Intemet, Quite simply, no industry and no of soi have remained untouched by thie technical revolution At the same time that the Intemet bas been evolving another technology revolitonhasken Unfolding the use of sensors, electronic ise actuators to digitally identify, observe nice objects in the physical word, Rapidly decreasing costs ‘of sensors and actuaios have meant that where such ‘components Previously cost several Euros each, they ae now a few cents, In addition, these: ‘devices, through increases in the computational capacity of the associated chipsets, are now able to communicate via fed and mobile networks, As a result, they are able to communicle information about the physical world in nearrea {time across networks with high bandwidth alow relative cost So, while we have seen M2M solutions for ut some time, we are now enteringa period of ire ‘where the uptake of both M2M and ee will increase dramatically. The reasons for are three-fold: M2M tot MOve fy Machine ort te, (ii) ) (iv) () (vi) (vii) (viti) (ix) @ Scanned with OKEN ScannerINTERNET OF THINGS ‘aninereased need for understanding the ph installations through to public spaces ari consumer demands. These requirements are often driven by efficiency improvements, sustainability objectives, or improved health and safety Singh 2012) ‘The improvement of technology and improve 2 etworking capabilites nee, 4, _ Reduced costs of components and the ability to ly collect and more cheaply collect and analyze the data they produce. 1.3 Srratecic Reseancn ano INNOVATION Directons 6 Explain the Strategic research and innovation directions, fas (imp.) Strategic research and innovation directions can vary across industries and organizations, but there are some general trends and areas of focus that are commonly considered important for driving progress. The folowing are the strategic research and innovation directions: 1. Digital Transformation Embracing digital technologies to im» rove processes, enhance customer experiences, and drive operational efficiency. This inciudes technologies like artificial intelligence, machine leering Intemet of Things (101), and blockchain. 2 Sustainability and Green Technologies Investing in research and innovation to develop sustainable solutions, reduce environmental impact, and promote the use of green technologies. Tis can include renewable energy, eco-friendly manufacturing processes, and . Greular economy initiatives. Healthcare and Biotechnology ‘Advancements in medical research, personalized medicine, and biotechnology are critical for improving healthcare outcomes. This may involve genomics, precision medicine, telemedicine, and the development of new pharmaceuticals. 4 Cybersecurity With the increasing reliance on digital systems, Protecting data and information fron: cyber Se threats is a major priority. Innovation in cybersecurity technologies, encryption methods, and threat detection is crucial. Artificial Intelligence and Automation Leveraging Al and automation to streamline Processes, increase productivity, and create new business models. This includes autonomous systems, robotics, and the integration of Al in various industries. 5G and Connectivity ‘The rollout and optimization of 5G networks, as well as the development of applications and services that leverage high-speed, low-latency ‘connectivity. This is particularly relevant for the advancement of the Intemet of Things (OT) and Industry 4.0. Space Exploration and Technology Investments in space research, satellite technology, and space exploration for both’ scientific and ‘commercial purposes. This includes developments in satellite communication, space tourism, and miningasteroids. Human Augmentation Research ilo technofogies that enhance human. capabilities, such as brain-machine interfaces, exoskeletons, and bio-hacking. This can have applications in healthcare, manufacturing, and. other industries. AgTech and Food Security Innovations in agriculture technology to increase efficiency, reduce environmental impact, and ensure food security: This includes precision farming, vertical farming, and the development of sustainable agricultural practices. Education Technology ‘Advancements in educational tools, platforms, and methodologies to support personalized and accessible learning experiences. This can include virtual reality, augmented reality, and online leaming platforms. It's important for organizations to align their strategic esearch and innovation directions with their overall mission, goals, and the specific challenges and opportunities within their industry. Additionally, collaboration with external partners, ‘academia, and research institutions often plays a crucial role in driving successful innovation initiatives, ‘Rahul Publications @ Scanned with OKEN Scannerns of Internet of Thing! jin the Applicatio Q7._ Explain the APF ee sings (OT isdlefines as. 2,networ ot dev rhe uemet of Thing lll ects physical devi ices that feed data into a platfom 1. digital interfaces. 7 gs, proce: ernet conngction fro! everythin ing with each oth 1. Smart Home: aa 'OT technologies are commonly used in smart homes to enable connectivity and automation. Such (i) Smart Sensors al ley s saat collecting data about the home environment. They can detect motion ture, humidity, light intensity, and more. These sensors provide tion for fulomaling dierent functions inthe snarthome, ms Protde valuable ifomaion (ii) Voice Assistants Voice asista nis, such as Amazon Alexa or Google Assistant, have gained popularity in sinart homes. They allow users to ; nd inte contol enpeneen 28 24 Perform tasks using voice commands, offering a handset Rahul Publications @ Scanned with OKEN Scanner(ii) Smart Applian lOT-enabled refrigerators, appliances, such as ashing machines, or ovens, can communicate with the central hub and on about their status, (v)_ Energy Man Smart agri Agriculture, as an industry could massive ene from the Intemet of Things. The world » hu population tated to grow to around 10 billion by 2050. As such, governments @ priorliingthescalinguporagnculturalsy ‘This, combined with climate change, has farmers marrying technology to cultivation. Sensors are used 10 provide details of soil Chemistry and fertlizer profile. CO2 levels, moisture, temperature, level of acidity, and the presence of appropriate nutrients all contibute to how good a harvest turns out to be. ‘Smart irrigation is an JOT application to regulate and efficiently use water for farming, The IOT system only initiates the water flow when the soil teaches a certain dryness level. It also stops the ‘apply oncea certain evel ofmoistureisreached, “This reduces wastage caused by human errs, INTERNET OF THIN Smarter cities A\ smart city is an urban city that uses sensors and cellular or wireless technology placed in ubiquitous places such as lamp posts and antennae. There are multiple facets in which one corporate JOT into the functioning of a Traffic management iii) Resource management With water management, Se are tached intemally or extemally to water meters. These sensors provide informatio smption pattems. They to understand ‘detect faults in supply and automatically begin the necessary course of action. Trends in water wastage can be used to develop anefficient water recycling system. JOT:enabled waste management systems produce a geographical mapping of waste production. These systems trigger the Elearance process themselves for example, bby generating alerts when a trash bin full. “They also provide more insights info waste segregation and how people can improve waste processing. Electricity management comes in the form of a smart grid, covered in detail in this article. ‘Rahul Publications @ Scanned with OKEN ScannerMCA (iv) Parking solutions Parking woes, while sounding insignificant, play big part in traffic management. Smart parking solutions provide drivers with real: time information about empty spaces available (v) Infrastructure management Public infrastructure such as street lamps, roads, parks, and gas supply lines costa lot to maintain. Repair work in any of these causes disruptions to everyday functioning JOT-based maintenance and monitoring systems lookout for signs of wear and tear while analyzing pattems. This proactive approach can save a city a lot of money. (vi) Disaster management The Internet of Things can be used to hook Up disaster-prone areas to a notification system. A forest fire, for example, can be detected and curbed before it grows beyond control Upgrading supply chain management Supply chain management (SCM) is a Process: that streamlines the flow of goods and services from raw material procurement to the customers. 11 involved inventory management, fleet management. vendor relationships, and ‘maintenance During the pandemic, many businesses were affected by supply chain issues, The Internet of Things s used at multiple in the SCM process Shipping oa uy patients, doctors, and traditionally reactive medical proncive Ore cnt Ny Attaching #€8078 10 & patie nw allows doctors to monitor then Continuous abnormality ay irri erhe ocon c Ag action. Doctors can use this to mye iy patients such as the elderly and from chronic diseases fovea JOT is being used 10 optimize the process at the pharmaceutical ene Utiity companies are tuming to 107 jp, energy provision more efficient, ey sensors are installed in pas transmission lines, production oleae distribution points. This loT ‘Sytem 2 smart gid be | ‘Smart wearables ‘Another visible implementation of Things ls wearable technology: peal {Industrial JOT (HOT) isthe Internet of Thingpat «factory evel. HOT is often refered toa be fourth woe ol tehsil cena © scanned with OKEN Scannerif INTERNET OF Wireless Sensor Network(WSN) Comprises of dstibuted devices with sy conditions. Zig Bee is one ofthe most popular WSN used in oT systems are described Weather Monitoring System 1) Which are used to monitor the environmental and ph Witeless technologies used by WSNs. as follows: inwhich nodes collet temp, humility humidity and oi ; Indoor air quality monitoring systems a eames ole To collect data on the indoor air jay SoilMotsture Monitoring ae and concentration of various gases. Tomonitor soil moisture at various locations, {Surveillance Systems Use WSNsfor collecting survellance data (motion dala detection) (x) Smart Grids Use WSNs for monitoring grids at vatious points, (vi) Structural Health Monitoring Systems ee aoe (bulding, bridges) by collecting vibrations from sensor nodes 2) Cloud Computing Services are offered to users in different forms. (i) _Infrastructure-as-a-service (IaaS) Provides users the ability to provision computing and storage resources. These resources are provided to the users asa virtual machine instances and virtual storage. (i) Platform-as-a-Service(PaaS) Provides users the ability to develop and deploy application in cloud using the development tools, APIs, software libraries and services provided by the cloud service provider. (ii) Software-as-a-Service(SaaS) : Provides the user a complete software application or the user interface to the application ise 3) Big Data Analytics Some examples of big data generated by loT are (Sensor data generated by IoT systems, {W) Machine sensor data collected from sensors established in ndustial and energy systems (iil) Health and fitness data generated IoT devices. (iw) Data generated by [oT systems for location and tracking vehicles. () Data generated by retail inventory monitoring systems, 4) Communication Protocols form the back-bone of loT systems and enable network connectivity and coupling to applications. () Allow devices to exchange data over network. (W)Define the exchange formats, data encoding addressing schemes for device and routing of packets from ‘source to destination. (itl) Itineludes sequence control, flow control and retransmission ‘of lost packets. 3) Embedded Systems: is a computer system that has computer hardware and software embedded to perform specific tasks. Embedded System range | from low cost miniaturized devices such as digital watches qo dovieos such as digital eameras, POS terminals, vending machines, appliances etc. Rahul Publications @ Scanned with OKEN Scanneru MCA 8 Ry Q9. Explain the Infrastructure of OT. tus The components of OT infrastructure include: 1. Devices and Sensors ‘These are phusical objects embecided with sensors or actuators to collect data or perform actions include smart thermostats, wearable devices, industrial sensors, and more. 2. Connectivity JOT devices rely on various communication protocols to transmit data. Common ceninectity techn include Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks 4G, 5G), and Low Power Wide Area Nets * (LPWAN) like LoRaWANor NB-OT. Sees 2 Rahul Publications © scanned with OKEN Scanner- ite! me ili liidete d/l INTERNET , ue Interfaces and Applications 7 -user intera Data analytics The paneer with IOT applications Data analysts can use data from the bia dake thre eh cates such as mobile apps vrehouse fn er vl gain actionable trtgb dashboards, to monitor and control OA ent i connected devices, insights. When analyzed (and in many cose visualized in schemes, diagrams. info gray andards and Protocols qugsiantords and Protocol ——e ah si | Ce rite erope Faint | : : Fe # se ; a ns. Comm | m ¢ 1 object equip 12, Machine learning and the mod eet lamps, buildings, ¥ hicle: 2 at achinery, rehabilitati ouse in all cases phys attached to the things: nalyst node 8, Gateways and alerts to actuator Data goes from things othe cloud and vice va [aa provides automatic comm through the gateways. A gateway ys and the cloud part ables data preprocessing {to the cloud (to systems 9§ plants. con the forecasts taken from the weather ser. connectivity between of the OT solution, ens and filtering before moving i Teduce the volume of data for detalled Poco! rand storing) and transmits Montrol commands | 16, Sensors help ‘monitor the state of industrial going from the: cloud to things. ‘Things then execute equipment, andin case: ofa pre-failure situation, commands using their actuators: cn JOT system generates and sends automatic 9. Cloud gateway {acitates data compressionand ‘notifications to field engineers. seam data transmission between field gBiev oe leu OT, servars-pityalso;ene compatibility with various protocols and corre iatee wth ld gateways using dil? protocols depending on what protocol is Q10. a ‘about [OT Communication supported by gateways. rameters. (imp.) 10. Streaming daia processor ensures effective Aaa i ow that the soi 15, When sensor 1.7 Networks AND COMMUNICATIONS, PROCESSES a yn einpat data toa dealake and conto! Commun! : ication protocols are the set of rules spntcalions.Nodata.canbe oessonaly es cextablished between nodes fo exchange information in reliable and safe manner. @ Scanned with OKEN ScannerMCA 4 tag wy 4 The main experts of @ communication protocol ooo Spe ot Data Rate the amount of information to be trwitied within © ime durseon, cexprensed i tye (bm per second), bps, Mbps. or Gps . Range the maximum distance between tao intercommunicating nodes. It mainly depends upon the 4 ‘power, the frequency bend used. and the type of modulation. It can be also affected by the may, ‘conditions or the physical placement of the nodes. In Figure 1 You can 30 8 10Ugh raph of te wermur the mange of various IOT network protocols. ny ~~, DATA RATE ‘onsumption can have a diectimpact onthe maintenance strategy, 2 Interoperability The capability o exchange information 3. Sealabitity a nodes, even if they are of diferent types. [Te challenge of deploying a higher number of nodes, increasing the number of : a without the needofmigatngthe ecg nn © scanned with OKEN ScannerINTERNET OF THINGS ° ° eine: T ses eo KA Extended star Hueraremical Ne Fig,: Examples of different network topologies. Security ideas
device, looking for an opening Taming umeresary device features lose thasaat ports DNS filtering DNSfitering is the process of using the Name System to block malicious websie Adding DNS fiterng as a securty measure ms network with IOT devices prevens those dais from reaching out to places on the Intemet hy should not (i.e. an attacker's domain) QU7. What is mutual TLS (MTLS)? Ana Mutual Transport Layer Security (MTLS) isatpe of ‘mutual authentication, which is when both sides ot ‘network connection authenticate each other. TLS 2 protocol for verifying the server in a client server connection; MTLS verifies both conned devices, instead of just one. MILS is important for IOT security because it ensures only legitimate devices and servers can send commands or request data. It also encrypts all communications over the Tetwork so. that attackers cannot intercept them. MTLS requires issuing TLS certificates to all authenticated devices and servers. A TLS cetfcale ‘contains the device's public key and information about who issued the certificate. Showing a TLS certificate initiate @ network connection can be compared 10 2 arson showing thelr ID card to prove theiridenty Rahul Publications fae) @ Scanned with OKEN Scanner1 2 yt! at attacks are IOT devic 08 et? device mont euscep ie Firmware vulnerability exploits ‘Allcomputerized devices have firmware, which s the software that operates the hardware. I computers and smartphones, operating aaah tun on top of the firmware; for the majority of JOT devices, the firmware is essentially the operating system. st IOT firmwar He rolsciar passe abel y 2 as the sophisticated operating systems running on computers. And often this firmware is rife with known vulnerabilities that in some cases cannot be patched. This leaves OT devices open to attacks that target these vulnerabilities. (i) Credential-based attacks Many IOT devices come with default administrator ‘usernames and passwords. These usemamesand passwords are often not very secure — for instance, “password” as the password — and worse, sometimes all IOT devices of a given model share these same credentials. In some cases, these credentials cannot be reset Attackers are well aware of these default tusemames and passwords, and many successful oT device attacks occur simply because an attacker guesses the right credentials. (iii) On-path attacks On path attackers position themselves between two parties that trust each other — for example, an oT security camera and the camera's cloud sewer and intercept communications between the two, loT devices are particularly vulnerable to such attacks because many of them do not encrypt their communications bY default {eneryption serambles data so that it ‘cannot be interpreted by unauthorized parties). (iv) Physical hardware-based attacks Many IOT devices, ike IOT security cameras, stoplights, and fire alarms, are ‘placed in more or Tess permanent positions in public area, fan attacker has physical access to an 1oT device's ae are: tiey cat aaa inden cave ve Ne device. This approach would affect only one device ata time, ‘puta physical attack could have INTERNET OF THINGS 1.10 Device Lever ENercy Issues Q19. Explain about Device Level Energy Issues- Aus (imp.) Implementing 1OT- enabled Energy manage- ment ina developing country like India comes with its ‘own set of practical issues and challenges. The challenges ate as follows: (i) Infrastructure and Connectivity India has diverse geographical and infrastructural challenges, especially in remote and rural areas. Though we have gradually improved the connedtivity across urban and rural areas and are one of the leading nations in the world in implementing 5G, we still have shadow zones having significantly weak or no network connectivity, Ensuring liable internet connectivity fand proper infrastructure for IOT devices can be a significant hurdle. (ii) Cost and Affordability ‘The initial cost of deploying IOT devices and seting up the necessary infrastructure can be ‘elatively high and therefore, can affect the cost ‘of supply, from an electricity distributor's / retailer's perspective. Regulating the incidence of euch costs, from a tariffsetting perspective, can ‘be challenging for policy makers and regulators. (iii) Data Security and Privacy JOT devices collect and transmit sensitive energy consumption data, Ensuring robust data security and privacy measures becomes| crucial to protect consumers’ information from potential cyber threats and unauthorized access. (iv) Interoperability and Standards Different manufacturers may have their own proprietary [OT systems, leadingto compatibility issues and a lack of standardization. Ensuring interoperability among various devices and systems is vital for’ seamless integration and scalability. (v) Skilled workforce and Awareness Deploying and maintaining IOT-enabled eneray killed workforce. a larger effect if the gains information ‘management systems requires as that enables them to compromise additional In many cases, there might be a lack of trained devices on the network. personnel with expertise in OT technologies. Sg ia @ Scanned with OKEN Scanneraf Be 3 YEAR MCA = Shep (vi) Power Supply Reliability Kalanjali printers ki chesa in mnt Inacountry like India, where power # outages are not uncommon, ensuring cot i supply to IOT devices is essential for their effective functioning. (vii) Regulatory and Policy frame work i The lack of clear and supportive regulations around IoT implementation and data managemeny, : : ves Sty Pebaiioi to adoption io: businesses and inucstoks. (vill) Scalability and Integration energy demand grows, th n should be scalable enough to handle increased data am snsidth existing energy infrastructure and systems can be comply: sal (ix) Maintenance and Upgrades ing regule intenance and timely upgrades of IOT devices fs crucial for their long tem Pema, ney. However, resource constraints can hinder effective maintenance in some cases, Perception and Acceptance New orslow adoption due fo skepticism or lack of awarenes abe nal or conservative sectors. (xi) Environmental Impact loyment and disposal of IQT devices can have environmental imple nable practices need to be considered, prehensive approach, involving colebortion betwee Gog nnology pr potential solutions: (xii) Government Support Enablin; cies, incentives, and funding support can encourage OT ad loption in the energy sector (xiii) Public private partnerships Glaborations between government agencies and private companies ean help deploy [OT solutions cot effectively, (xiv) Capacity building © scanned with OKEN Scannerasaatiaeteszestint JUNIT fT EEE TEE INTERNET PRINCIPLES AND COMMUNICATION TECHNOLOGY : Internet Communicat mnicafions: An Overview IP, TCP, IP protocol Suite, UDP. IP- addresses ~ DNS, Stati . Static and Dynamic IP addresse Pp UDP Ports, Application Layer Dynamic IP adresses MAC Addressess, TCP and eEEEEEEE EE | 2.1 IneRNeT COMMUNICATIONS | 2.1.1 An Overview | (ii) Control Protocol) and [P{Intemet Protocol are themest commonly-used protocols for using the Intemet, (But there are others at ower levels.) ‘The combination is simply known as TCPIIP. “The Internet is a packet switching system. Any message i broken into packets that are transmit fed independently across the interment (some- time by different routes). packets are called datagrams. The route (iv) (wv) (ii) TCP/IP IP ensures that packets get to the night place. > — TCPis the higher-level protocol that uses the lower-level IP. UDP (User Datagram Protocol) UDPis an unreliable protocol, since: > It doesn't guarantee that a packet will ar- tive. > It doesn't guarantee that packets will be in the right order. UDP doesn't re-send a packet if it is missing or there is some other error, and it doesn t assemble pack: @ Scanned with OKEN ScannerIWYEAR MCA SEM (iil) IP Addresses Consists of 4 byt. host computer in the world. Consists of 4 bytes or 39 unique address for every host computer in the athe range Ot ae An IPaddress is tation (or dot notation) as four 8-bii nun is represented in quad 131.123.2.220. IP addresses are registered so that they stay unique. a (iv) Domain Names A domain name is the user-friendly equivalent of an IP address. It is used because the numbers in ap, iP ‘address are hard to remember and use. It is also known as a host name. Example: es.stmarys.ca () The Domain Name System A program, say a Web browser, that wants to use a domain address usually needs to convert it into an p address before making contact with the server. The domain name system (DNS) provides a Mapping be. {ween IP addresses and domain names. All this information cannot be located in one place, 60 itis held in @ distributed database. (vi) Port Numbers ‘To identify @ host machine, an IP address or a domain name is needed. To identify a particular server ona host, a port number is used. A portislike a logical connection toa machine. Port numbers can take values from 1 to 65,535. A port number does not correspond to any physical connection on the machine, of which there might be just one, Each type of service has, by convention, a standard port number. (vii) Sockets A socket is the software mechanism for one program to connect fo another. A pair of programs open a socket connection between themselves. This then acts like a telephone connection - they can converse in both directions for as long as the connection is open. (In fact, data can flow in both directions atthe same time.) More than one socket can use any particular port. The network software ensures that data is routed ~ to or from the conect socket. (viii) URL . AURL (Uniform Resource Locator) > _ isaunique identifier for any resource on the Intemet can be typed into a Web browser > can be used as. hyperlink within a HTML document > canbe quoted as a reference to a source 2.2 IP, TCP IP Prorocot Suite Q2. Explain briefly about TCP IP protocol suite. Aus; % - : (lmp.) Protocols are sels of rules for message formals and procedures that allow machines and application PP” grams to exchange information. These rules mustbe followed by each machine involved in the communication order for the receiving host to be able to understand the message. The TCP/IP suite of protocols can be under stood in terms of layers (or levels). ee @ Scanned with OKEN Scanner v
You might also like
Hourglass Workout Program by Luisagiuliet 2
PDF
76% (21)
Hourglass Workout Program by Luisagiuliet 2
51 pages
12 Week Program: Summer Body Starts Now
PDF
87% (46)
12 Week Program: Summer Body Starts Now
70 pages
Read People Like A Book by Patrick King-Edited
PDF
57% (83)
Read People Like A Book by Patrick King-Edited
12 pages
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
PDF
77% (13)
Livingood, Blake - Livingood Daily Your 21-Day Guide To Experience Real Health
260 pages
Cheat Code To The Universe
PDF
94% (79)
Cheat Code To The Universe
34 pages
Facial Gains Guide (001 081)
PDF
91% (45)
Facial Gains Guide (001 081)
81 pages
Curse of Strahd
PDF
95% (467)
Curse of Strahd
258 pages
The Psychiatric Interview - Daniel Carlat
PDF
91% (34)
The Psychiatric Interview - Daniel Carlat
473 pages
The Borax Conspiracy
PDF
91% (57)
The Borax Conspiracy
14 pages
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
PDF
94% (215)
COSMIC CONSCIOUSNESS OF HUMANITY - PROBLEMS OF NEW COSMOGONY (V.P.Kaznacheev,. Л. V. Trofimov.)
212 pages
I Hate You - Don't Leave Me
PDF
80% (54)
I Hate You - Don't Leave Me
6 pages
TDA Birth Certificate Bond Instructions
PDF
97% (285)
TDA Birth Certificate Bond Instructions
4 pages
The Secret Language of Attraction
PDF
86% (108)
The Secret Language of Attraction
278 pages
How To Develop and Write A Grant Proposal
PDF
83% (542)
How To Develop and Write A Grant Proposal
17 pages
Penis Enlargement Secret
PDF
60% (124)
Penis Enlargement Secret
12 pages
Workbook For The Body Keeps The Score
PDF
89% (53)
Workbook For The Body Keeps The Score
111 pages
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
PDF
83% (1016)
Donald Trump & Jeffrey Epstein Rape Lawsuit and Affidavits
13 pages
KamaSutra Positions
PDF
78% (69)
KamaSutra Positions
55 pages
7 Hermetic Principles
PDF
93% (30)
7 Hermetic Principles
3 pages
27 Feedback Mechanisms Pogil Key
PDF
77% (13)
27 Feedback Mechanisms Pogil Key
6 pages
Frank Hammond - List of Demons
PDF
92% (92)
Frank Hammond - List of Demons
3 pages
Phone Codes
PDF
79% (28)
Phone Codes
5 pages
36 Questions That Lead To Love
PDF
91% (35)
36 Questions That Lead To Love
3 pages
How 2 Setup Trust
PDF
97% (307)
How 2 Setup Trust
3 pages
100 Questions To Ask Your Partner
PDF
78% (36)
100 Questions To Ask Your Partner
2 pages
The 36 Questions That Lead To Love - The New York Times
PDF
91% (35)
The 36 Questions That Lead To Love - The New York Times
3 pages
Satanic Calendar
PDF
25% (56)
Satanic Calendar
4 pages
The 36 Questions That Lead To Love - The New York Times
PDF
95% (21)
The 36 Questions That Lead To Love - The New York Times
3 pages
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
PDF
100% (8)
14 Easiest & Hardest Muscles To Build (Ranked With Solutions)
27 pages
Jeffrey Epstein39s Little Black Book Unredacted PDF
PDF
77% (13)
Jeffrey Epstein39s Little Black Book Unredacted PDF
95 pages
1001 Songs
PDF
70% (73)
1001 Songs
1,798 pages
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
PDF
23% (954)
The 4 Hour Workweek, Expanded and Updated by Timothy Ferriss - Excerpt
38 pages
Zodiac Sign & Their Most Common Addictions
PDF
63% (30)
Zodiac Sign & Their Most Common Addictions
9 pages
IoT Question Answer
PDF
No ratings yet
IoT Question Answer
27 pages
Iot Notes
PDF
No ratings yet
Iot Notes
33 pages
18CS81 IOT Notes Module1
PDF
No ratings yet
18CS81 IOT Notes Module1
13 pages
FSIoT Chapter2
PDF
No ratings yet
FSIoT Chapter2
94 pages
941ed817-c3e9-4ceb-abe5-bf22b9b387f8
PDF
No ratings yet
941ed817-c3e9-4ceb-abe5-bf22b9b387f8
35 pages
Internet of Things (Iot) : Security Challenges, Business Opportunities & Reference Architecture For E-Commerce
PDF
No ratings yet
Internet of Things (Iot) : Security Challenges, Business Opportunities & Reference Architecture For E-Commerce
5 pages
IOT Mod1 Aiml 18ai731
PDF
100% (2)
IOT Mod1 Aiml 18ai731
11 pages
Iot CH1
PDF
No ratings yet
Iot CH1
56 pages
IoT material
PDF
No ratings yet
IoT material
5 pages
"Internet of Things (Iot) ": A Microproject Report ON
PDF
96% (25)
"Internet of Things (Iot) ": A Microproject Report ON
17 pages
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015 PDF
PDF
No ratings yet
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015 PDF
40 pages
Internet of Things (Iot) - Systems and Applications
PDF
No ratings yet
Internet of Things (Iot) - Systems and Applications
200 pages
Unit-1 Iot
PDF
No ratings yet
Unit-1 Iot
24 pages
17CS81 m1
PDF
No ratings yet
17CS81 m1
13 pages
iot seminar
PDF
No ratings yet
iot seminar
9 pages
IOT InternetOFThings
PDF
No ratings yet
IOT InternetOFThings
69 pages
MODULE I INTERNET OF THINGS CONCEPTS 2
PDF
No ratings yet
MODULE I INTERNET OF THINGS CONCEPTS 2
27 pages
It Era Chapter 5
PDF
No ratings yet
It Era Chapter 5
34 pages
Internet of Things (Iot)
PDF
No ratings yet
Internet of Things (Iot)
35 pages
IoT_unit
PDF
No ratings yet
IoT_unit
40 pages
IOT (1)
PDF
No ratings yet
IOT (1)
9 pages
The Internet of Things
PDF
No ratings yet
The Internet of Things
17 pages
Unit-1
PDF
No ratings yet
Unit-1
35 pages
INTERNET OF THINGS
PDF
No ratings yet
INTERNET OF THINGS
60 pages
30_imp_questions_answer
PDF
No ratings yet
30_imp_questions_answer
52 pages
Prashant Sharma Report
PDF
No ratings yet
Prashant Sharma Report
26 pages
Elements of Industry Unit - Iv
PDF
No ratings yet
Elements of Industry Unit - Iv
38 pages
IOT Mod1@AzDOCUMENTS - in
PDF
No ratings yet
IOT Mod1@AzDOCUMENTS - in
13 pages
1872771766
PDF
No ratings yet
1872771766
38 pages
Chapter 4 History
PDF
No ratings yet
Chapter 4 History
42 pages
Barun Kumar - 60 (IoT)
PDF
No ratings yet
Barun Kumar - 60 (IoT)
36 pages
MOdule 1 - Introduction To Internet of Things (Autosaved)
PDF
No ratings yet
MOdule 1 - Introduction To Internet of Things (Autosaved)
70 pages
Internet of Things (IoT) 01
PDF
No ratings yet
Internet of Things (IoT) 01
22 pages
The story of Internet Of Things
PDF
No ratings yet
The story of Internet Of Things
11 pages
iot
PDF
No ratings yet
iot
5 pages
IOT Report
PDF
No ratings yet
IOT Report
11 pages
Internet of Things
PDF
No ratings yet
Internet of Things
21 pages
FALLSEM2024-25 SWE4005 ETH VL2024250103359 2024-07-19 Reference-Material-I
PDF
No ratings yet
FALLSEM2024-25 SWE4005 ETH VL2024250103359 2024-07-19 Reference-Material-I
50 pages
Updated Notes Unit-1
PDF
No ratings yet
Updated Notes Unit-1
23 pages
iot
PDF
No ratings yet
iot
33 pages
Presentation 3 (2)
PDF
No ratings yet
Presentation 3 (2)
24 pages
Conference-template-A4
PDF
No ratings yet
Conference-template-A4
3 pages
Introduction To Internet of Things New Points
PDF
No ratings yet
Introduction To Internet of Things New Points
26 pages
Security Requirement For Internet of Things
PDF
No ratings yet
Security Requirement For Internet of Things
34 pages
Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges
PDF
No ratings yet
Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges
13 pages
IOT NOTES UNIT 1&2
PDF
No ratings yet
IOT NOTES UNIT 1&2
41 pages
15 Days In-House Training Program: Department of Electronics and Communication Engineering
PDF
No ratings yet
15 Days In-House Training Program: Department of Electronics and Communication Engineering
46 pages
ITELEC3207 Module1 Introduction-to-IoT
PDF
No ratings yet
ITELEC3207 Module1 Introduction-to-IoT
8 pages
Chapter 1
PDF
100% (3)
Chapter 1
45 pages
Introduction To IOT
PDF
No ratings yet
Introduction To IOT
28 pages
Iot
PDF
No ratings yet
Iot
25 pages
Internet of Things in Redefining Industry: Goa Institute of Management
PDF
No ratings yet
Internet of Things in Redefining Industry: Goa Institute of Management
21 pages
Unit 1 FIOT
PDF
No ratings yet
Unit 1 FIOT
28 pages
Moizuddin Shaikh IOT Asgnmt
PDF
No ratings yet
Moizuddin Shaikh IOT Asgnmt
12 pages
Mems Report
PDF
No ratings yet
Mems Report
8 pages
INTERNET OF THINGS
PDF
No ratings yet
INTERNET OF THINGS
8 pages
Iot (Internal 1)
PDF
No ratings yet
Iot (Internal 1)
13 pages