0% found this document useful (0 votes)
42 views

Iot

Uploaded by

R Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
42 views

Iot

Uploaded by

R Rahul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 84
PEE FE INTRODUCTION TO INTERNET OF THINGS : f JOT vision, Strategic research and innovation directions, Iot Applications, Related future technologies, Infrastructure, Networks and communications, Processes, Data Management, Security, Device level energy issues EEE EEE Py oe apertaat af .QL. What is 1OT? Explain the components of OT. ‘Meaning The Intemet of Things (1OT) refers to the network cof physical objects or “things” embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the interet. In simple terms, it's about connecting everyday objects to the intemet and enabling them to send and receive data. ‘Components ‘The components of the Internet of Things are: 1. - Devices/Things ‘These are the physical objects that are equipped with sensors, actuators, and other technologies to collect and transmit data. Examples include smart home devices (thermostats, lights, ‘cameres), wearable devices (smartwatches, fitness trackers), industrial sensors, and more. 2, Sensors and Actuators Sensors gather data from the environment, such as temperature, humidity, motion, or light. ‘Actuators, on the other hand, can perform actions based on the received data, like adjusting the temperature or turning onloff a device. 3. Connectivity’ JOT devices rely on various communication technologies to transmit data to other devices or ‘systems. This can include Wi-Fi, Bluetooth, Zigbee, cellular networks, and more. 4, DataProcessing ‘The data collected by IOT devices is processed and analyzed to derive meaningful insights. This can happen on the device itself (edge computing) or be sent to a centralized cloud server for processing, 5. Cloud Computing Many IOT applications leverage cloud computing for storing and processing large amounts of data. Cloud platforms provide the infrastructure and tools needed to manage and analyze OT data onalarge scale. 6. Software and Applications IOT applications and software enable users to interact with and control connected devices. These applications can range from smart home apps to industrial automation software, 7. Security ‘ Given the interconnected nature of IOT, security isa ctitical aspect. Measures such as encryption, authentication, and secure protocols are essential toprotectIOT devices and the data they transmi @. Explain the features of the Interstet of Things. (i) Interconnectivity With regard to the IOT, anything can be interconnected with the global information and communication infrastructure. (ii) Things-related services- The IOT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency GE, Taal Pecatons @ Scanned with OKEN Scanner MCA between physical things and their virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information ‘world will change. Heterogeneity Due to physical objects ge controlled digitally (i) Automation and Contro} infrastructure, there is ‘automation and control inthe human intervention, the m onnectivity enables network accessibility and Sie eee . 1 obtained fast. This results ir luable time. compatibility. Accessibility is getting on a network e Doge | while compatibility provides the common ability Instead of repeating the same tasks every day it io coiistins eid radians dale enables people to do other creative jobs. Q3. Explain the advantages and disadvantages | ‘“) Saves Money of OT. Ana: Advantages L The biggest advantage of lOTis saving money. If the price of the tagging and monitoring equipment is les than the amount of money saved, then the Intemet of Things ull be very widely adopted. IOT fundamentally proves to be very helpful to people in their daily routines by making the appliances communicate to each other in an effective manner thereby saving and conserving energy and cost. Communication IOT encourages the communication between devices, also famously known as Machine-to- ‘Machine (M2M) communication. Because of this, Rahul Publications G) ae @ Scanned with OKEN Scanner ee | Better Quality of Life wi bi ‘lthe applications ofthis technology culminate in increased comfort, convenience, and better management, thereby improving the quality of ie isadaniages ip Compatibai Complexity (i) Privacy’Security With all oft (of losing privacy incre well en: transmitted v employers to kn are taking or Safety Imagine if a notori prescription. Or ifa lent product that yo ww | changes your | auto | a flavor that you do not like, or a produ already expired. As a result, safety is ultimately in the hands of the consumer to verily any and all automation. (v) Compatibility {As devices from different manufacturers will be interconnected, the issue of compatibility in tagging and monitoring crops up. Although this disadvantage may drop off if all the ‘manufacturers agre toa common standard, even after that, technical issues will persist: Today, we have Bluetooth-enabled devices and compatiblity problems exist even in this technology! Compatibility issues may result in people buying appliances from a certain manufacturer, leading (ii) INTERNET OF THINGS Complexity The IOT is a diverse and complex network. Any failure or bugs in the software or hardware will have serious consequences. Even power failure «an cause allot of inconvenience Explain the elements of Internet of Things. Data-driven Insights JOT devices generate vast amounts of data. The vision involves hamessing this data to gain valuable insights, make informed decisions, and optimize processes. This data-criven approach can lead to improved efficiency, cost savings, and ‘enhanced user experiences. ‘Automation and Control JOT envisions automation and control of devices, ‘and systems based on real-time data. This can range from smart home devices adjusting temperature and lighting to industrial processes ‘optimizing production based on sensor inputs. to its monopoly in the market. Rahul Publications @ Scanned with OKEN Scanner (iw) wy) (vii) (viii) (ix) (%) Smart Cities 1OT can contribute to the development of smart cities by integrating various systems, such as transportation, energy management, and public services. This integration aims to enhance urban living through increased eficiency, sustainability, and responsiveness to citizens’ needs, Enhanced Connectivity JOT relies on improved connectivity, including 5G networks, to enable seamless communication between devices. This high-speed, lowlatency connectivity is crucial for the success of many IOT applications. ‘Security and Privacy Ensuring the security and privacy of IOT data is 2 critical aspect ofthe vision. As more devices me interconnected, there isa need for robust Security measures to protect against cyber threats and unauthorized access, Innovation and New Business Models The IOT vision involves fostering innovation and the development of new business models, Companies can create value by offering 101 enabled products and services, and entire industries may undergo transformation as a result. Environmental Sustainability {OT can contribute to sustanabilty efforts by optimizing resource usage, reducing waste, and ‘enabling more efficient energy management Human-Centric Design ‘TheOT vision emphasizes creatingsolutions that enhance the quality of life for individuals, Human-centic design principles ensure that OT: technologies are userstiendly, accessible, and contribute positively fo people's daily lives, Global Collaboration Achieving the full potential of IOT requires fon across industries, govemments, and regions, Standardization, inleroperabilty and Cen ecosystems are essential for realizing a cohesive and interconnected IOT landscape. In summary, the IOT vision revolves around creating a connected : ‘ystems, and data work together to provide valuable insights, automation, and improved ‘experiences across various domains, M2M to OT _The Vision From (i) We attempt to describe the today referred to as Keuntuncation towards an emengn “thing known asthe intemet of Thing a The Intemet has undoubtedly hag Fact cos society ad indo two decades. Starting off as ARE ‘einen remote computer io introduction of the TCPAP proto suite later the introduction of series lig eral. the World Wide Web (WWW), creas? tremendous growth Of usage and trate, *? |nconjunction with innovations that cata, ‘educed the cast of semiconductor technolg! and the subsequent extension ofthe reasonable cost va mobile netwots tet people and businesses are now. connected Intemet, Quite simply, no industry and no of soi have remained untouched by thie technical revolution At the same time that the Intemet bas been evolving another technology revolitonhasken Unfolding the use of sensors, electronic ise actuators to digitally identify, observe nice objects in the physical word, Rapidly decreasing costs ‘of sensors and actuaios have meant that where such ‘components Previously cost several Euros each, they ae now a few cents, In addition, these: ‘devices, through increases in the computational capacity of the associated chipsets, are now able to communicate via fed and mobile networks, As a result, they are able to communicle information about the physical world in nearrea {time across networks with high bandwidth alow relative cost So, while we have seen M2M solutions for ut some time, we are now enteringa period of ire ‘where the uptake of both M2M and ee will increase dramatically. The reasons for are three-fold: M2M tot MOve fy Machine ort te, (ii) ) (iv) () (vi) (vii) (viti) (ix) @ Scanned with OKEN Scanner INTERNET OF THINGS ‘aninereased need for understanding the ph installations through to public spaces ari consumer demands. These requirements are often driven by efficiency improvements, sustainability objectives, or improved health and safety Singh 2012) ‘The improvement of technology and improve 2 etworking capabilites nee, 4, _ Reduced costs of components and the ability to ly collect and more cheaply collect and analyze the data they produce. 1.3 Srratecic Reseancn ano INNOVATION Directons 6 Explain the Strategic research and innovation directions, fas (imp.) Strategic research and innovation directions can vary across industries and organizations, but there are some general trends and areas of focus that are commonly considered important for driving progress. The folowing are the strategic research and innovation directions: 1. Digital Transformation Embracing digital technologies to im» rove processes, enhance customer experiences, and drive operational efficiency. This inciudes technologies like artificial intelligence, machine leering Intemet of Things (101), and blockchain. 2 Sustainability and Green Technologies Investing in research and innovation to develop sustainable solutions, reduce environmental impact, and promote the use of green technologies. Tis can include renewable energy, eco-friendly manufacturing processes, and . Greular economy initiatives. Healthcare and Biotechnology ‘Advancements in medical research, personalized medicine, and biotechnology are critical for improving healthcare outcomes. This may involve genomics, precision medicine, telemedicine, and the development of new pharmaceuticals. 4 Cybersecurity With the increasing reliance on digital systems, Protecting data and information fron: cyber Se threats is a major priority. Innovation in cybersecurity technologies, encryption methods, and threat detection is crucial. Artificial Intelligence and Automation Leveraging Al and automation to streamline Processes, increase productivity, and create new business models. This includes autonomous systems, robotics, and the integration of Al in various industries. 5G and Connectivity ‘The rollout and optimization of 5G networks, as well as the development of applications and services that leverage high-speed, low-latency ‘connectivity. This is particularly relevant for the advancement of the Intemet of Things (OT) and Industry 4.0. Space Exploration and Technology Investments in space research, satellite technology, and space exploration for both’ scientific and ‘commercial purposes. This includes developments in satellite communication, space tourism, and miningasteroids. Human Augmentation Research ilo technofogies that enhance human. capabilities, such as brain-machine interfaces, exoskeletons, and bio-hacking. This can have applications in healthcare, manufacturing, and. other industries. AgTech and Food Security Innovations in agriculture technology to increase efficiency, reduce environmental impact, and ensure food security: This includes precision farming, vertical farming, and the development of sustainable agricultural practices. Education Technology ‘Advancements in educational tools, platforms, and methodologies to support personalized and accessible learning experiences. This can include virtual reality, augmented reality, and online leaming platforms. It's important for organizations to align their strategic esearch and innovation directions with their overall mission, goals, and the specific challenges and opportunities within their industry. Additionally, collaboration with external partners, ‘academia, and research institutions often plays a crucial role in driving successful innovation initiatives, ‘Rahul Publications @ Scanned with OKEN Scanner ns of Internet of Thing! jin the Applicatio Q7._ Explain the APF ee sings (OT isdlefines as. 2,networ ot dev rhe uemet of Thing lll ects physical devi ices that feed data into a platfom 1. digital interfaces. 7 gs, proce: ernet conngction fro! everythin ing with each oth 1. Smart Home: aa 'OT technologies are commonly used in smart homes to enable connectivity and automation. Such (i) Smart Sensors al ley s saat collecting data about the home environment. They can detect motion ture, humidity, light intensity, and more. These sensors provide tion for fulomaling dierent functions inthe snarthome, ms Protde valuable ifomaion (ii) Voice Assistants Voice asista nis, such as Amazon Alexa or Google Assistant, have gained popularity in sinart homes. They allow users to ; nd inte contol enpeneen 28 24 Perform tasks using voice commands, offering a handset Rahul Publications @ Scanned with OKEN Scanner (ii) Smart Applian lOT-enabled refrigerators, appliances, such as ashing machines, or ovens, can communicate with the central hub and on about their status, (v)_ Energy Man Smart agri Agriculture, as an industry could massive ene from the Intemet of Things. The world » hu population tated to grow to around 10 billion by 2050. As such, governments @ priorliingthescalinguporagnculturalsy ‘This, combined with climate change, has farmers marrying technology to cultivation. Sensors are used 10 provide details of soil Chemistry and fertlizer profile. CO2 levels, moisture, temperature, level of acidity, and the presence of appropriate nutrients all contibute to how good a harvest turns out to be. ‘Smart irrigation is an JOT application to regulate and efficiently use water for farming, The IOT system only initiates the water flow when the soil teaches a certain dryness level. It also stops the ‘apply oncea certain evel ofmoistureisreached, “This reduces wastage caused by human errs, INTERNET OF THIN Smarter cities A\ smart city is an urban city that uses sensors and cellular or wireless technology placed in ubiquitous places such as lamp posts and antennae. There are multiple facets in which one corporate JOT into the functioning of a Traffic management iii) Resource management With water management, Se are tached intemally or extemally to water meters. These sensors provide informatio smption pattems. They to understand ‘detect faults in supply and automatically begin the necessary course of action. Trends in water wastage can be used to develop anefficient water recycling system. JOT:enabled waste management systems produce a geographical mapping of waste production. These systems trigger the Elearance process themselves for example, bby generating alerts when a trash bin full. “They also provide more insights info waste segregation and how people can improve waste processing. Electricity management comes in the form of a smart grid, covered in detail in this article. ‘Rahul Publications @ Scanned with OKEN Scanner MCA (iv) Parking solutions Parking woes, while sounding insignificant, play big part in traffic management. Smart parking solutions provide drivers with real: time information about empty spaces available (v) Infrastructure management Public infrastructure such as street lamps, roads, parks, and gas supply lines costa lot to maintain. Repair work in any of these causes disruptions to everyday functioning JOT-based maintenance and monitoring systems lookout for signs of wear and tear while analyzing pattems. This proactive approach can save a city a lot of money. (vi) Disaster management The Internet of Things can be used to hook Up disaster-prone areas to a notification system. A forest fire, for example, can be detected and curbed before it grows beyond control Upgrading supply chain management Supply chain management (SCM) is a Process: that streamlines the flow of goods and services from raw material procurement to the customers. 11 involved inventory management, fleet management. vendor relationships, and ‘maintenance During the pandemic, many businesses were affected by supply chain issues, The Internet of Things s used at multiple in the SCM process Shipping oa uy patients, doctors, and traditionally reactive medical proncive Ore cnt Ny Attaching #€8078 10 & patie nw allows doctors to monitor then Continuous abnormality ay irri erhe ocon c Ag action. Doctors can use this to mye iy patients such as the elderly and from chronic diseases fovea JOT is being used 10 optimize the process at the pharmaceutical ene Utiity companies are tuming to 107 jp, energy provision more efficient, ey sensors are installed in pas transmission lines, production oleae distribution points. This loT ‘Sytem 2 smart gid be | ‘Smart wearables ‘Another visible implementation of Things ls wearable technology: peal {Industrial JOT (HOT) isthe Internet of Thingpat «factory evel. HOT is often refered toa be fourth woe ol tehsil cena © scanned with OKEN Scanner if INTERNET OF Wireless Sensor Network(WSN) Comprises of dstibuted devices with sy conditions. Zig Bee is one ofthe most popular WSN used in oT systems are described Weather Monitoring System 1) Which are used to monitor the environmental and ph Witeless technologies used by WSNs. as follows: inwhich nodes collet temp, humility humidity and oi ; Indoor air quality monitoring systems a eames ole To collect data on the indoor air jay SoilMotsture Monitoring ae and concentration of various gases. Tomonitor soil moisture at various locations, {Surveillance Systems Use WSNsfor collecting survellance data (motion dala detection) (x) Smart Grids Use WSNs for monitoring grids at vatious points, (vi) Structural Health Monitoring Systems ee aoe (bulding, bridges) by collecting vibrations from sensor nodes 2) Cloud Computing Services are offered to users in different forms. (i) _Infrastructure-as-a-service (IaaS) Provides users the ability to provision computing and storage resources. These resources are provided to the users asa virtual machine instances and virtual storage. (i) Platform-as-a-Service(PaaS) Provides users the ability to develop and deploy application in cloud using the development tools, APIs, software libraries and services provided by the cloud service provider. (ii) Software-as-a-Service(SaaS) : Provides the user a complete software application or the user interface to the application ise 3) Big Data Analytics Some examples of big data generated by loT are (Sensor data generated by IoT systems, {W) Machine sensor data collected from sensors established in ndustial and energy systems (iil) Health and fitness data generated IoT devices. (iw) Data generated by [oT systems for location and tracking vehicles. () Data generated by retail inventory monitoring systems, 4) Communication Protocols form the back-bone of loT systems and enable network connectivity and coupling to applications. () Allow devices to exchange data over network. (W)Define the exchange formats, data encoding addressing schemes for device and routing of packets from ‘source to destination. (itl) Itineludes sequence control, flow control and retransmission ‘of lost packets. 3) Embedded Systems: is a computer system that has computer hardware and software embedded to perform specific tasks. Embedded System range | from low cost miniaturized devices such as digital watches qo dovieos such as digital eameras, POS terminals, vending machines, appliances etc. Rahul Publications @ Scanned with OKEN Scanner u MCA 8 Ry Q9. Explain the Infrastructure of OT. tus The components of OT infrastructure include: 1. Devices and Sensors ‘These are phusical objects embecided with sensors or actuators to collect data or perform actions include smart thermostats, wearable devices, industrial sensors, and more. 2. Connectivity JOT devices rely on various communication protocols to transmit data. Common ceninectity techn include Wi-Fi, Bluetooth, Zigbee, RFID, cellular networks 4G, 5G), and Low Power Wide Area Nets * (LPWAN) like LoRaWANor NB-OT. Sees 2 Rahul Publications © scanned with OKEN Scanner - ite! me ili liidete d/l INTERNET , ue Interfaces and Applications 7 -user intera Data analytics The paneer with IOT applications Data analysts can use data from the bia dake thre eh cates such as mobile apps vrehouse fn er vl gain actionable trtgb dashboards, to monitor and control OA ent i connected devices, insights. When analyzed (and in many cose visualized in schemes, diagrams. info gray andards and Protocols qugsiantords and Protocol ——e ah si | Ce rite erope Faint | : : Fe # se ; a ns. Comm | m ¢ 1 object equip 12, Machine learning and the mod eet lamps, buildings, ¥ hicle: 2 at achinery, rehabilitati ouse in all cases phys attached to the things: nalyst node 8, Gateways and alerts to actuator Data goes from things othe cloud and vice va [aa provides automatic comm through the gateways. A gateway ys and the cloud part ables data preprocessing {to the cloud (to systems 9§ plants. con the forecasts taken from the weather ser. connectivity between of the OT solution, ens and filtering before moving i Teduce the volume of data for detalled Poco! rand storing) and transmits Montrol commands | 16, Sensors help ‘monitor the state of industrial going from the: cloud to things. ‘Things then execute equipment, andin case: ofa pre-failure situation, commands using their actuators: cn JOT system generates and sends automatic 9. Cloud gateway {acitates data compressionand ‘notifications to field engineers. seam data transmission between field gBiev oe leu OT, servars-pityalso;ene compatibility with various protocols and corre iatee wth ld gateways using dil? protocols depending on what protocol is Q10. a ‘about [OT Communication supported by gateways. rameters. (imp.) 10. Streaming daia processor ensures effective Aaa i ow that the soi 15, When sensor 1.7 Networks AND COMMUNICATIONS, PROCESSES a yn einpat data toa dealake and conto! Commun! : ication protocols are the set of rules spntcalions.Nodata.canbe oessonaly es cextablished between nodes fo exchange information in reliable and safe manner. @ Scanned with OKEN Scanner MCA 4 tag wy 4 The main experts of @ communication protocol ooo Spe ot Data Rate the amount of information to be trwitied within © ime durseon, cexprensed i tye (bm per second), bps, Mbps. or Gps . Range the maximum distance between tao intercommunicating nodes. It mainly depends upon the 4 ‘power, the frequency bend used. and the type of modulation. It can be also affected by the may, ‘conditions or the physical placement of the nodes. In Figure 1 You can 30 8 10Ugh raph of te wermur the mange of various IOT network protocols. ny ~~, DATA RATE ‘onsumption can have a diectimpact onthe maintenance strategy, 2 Interoperability The capability o exchange information 3. Sealabitity a nodes, even if they are of diferent types. [Te challenge of deploying a higher number of nodes, increasing the number of : a without the needofmigatngthe ecg nn © scanned with OKEN Scanner INTERNET OF THINGS ° ° eine: T ses eo KA Extended star Hueraremical Ne Fig,: Examples of different network topologies. Security ideas device, looking for an opening Taming umeresary device features lose thasaat ports DNS filtering DNSfitering is the process of using the Name System to block malicious websie Adding DNS fiterng as a securty measure ms network with IOT devices prevens those dais from reaching out to places on the Intemet hy should not (i.e. an attacker's domain) QU7. What is mutual TLS (MTLS)? Ana Mutual Transport Layer Security (MTLS) isatpe of ‘mutual authentication, which is when both sides ot ‘network connection authenticate each other. TLS 2 protocol for verifying the server in a client server connection; MTLS verifies both conned devices, instead of just one. MILS is important for IOT security because it ensures only legitimate devices and servers can send commands or request data. It also encrypts all communications over the Tetwork so. that attackers cannot intercept them. MTLS requires issuing TLS certificates to all authenticated devices and servers. A TLS cetfcale ‘contains the device's public key and information about who issued the certificate. Showing a TLS certificate initiate @ network connection can be compared 10 2 arson showing thelr ID card to prove theiridenty Rahul Publications fae) @ Scanned with OKEN Scanner 1 2 yt! at attacks are IOT devic 08 et? device mont euscep ie Firmware vulnerability exploits ‘Allcomputerized devices have firmware, which s the software that operates the hardware. I computers and smartphones, operating aaah tun on top of the firmware; for the majority of JOT devices, the firmware is essentially the operating system. st IOT firmwar He rolsciar passe abel y 2 as the sophisticated operating systems running on computers. And often this firmware is rife with known vulnerabilities that in some cases cannot be patched. This leaves OT devices open to attacks that target these vulnerabilities. (i) Credential-based attacks Many IOT devices come with default administrator ‘usernames and passwords. These usemamesand passwords are often not very secure — for instance, “password” as the password — and worse, sometimes all IOT devices of a given model share these same credentials. In some cases, these credentials cannot be reset Attackers are well aware of these default tusemames and passwords, and many successful oT device attacks occur simply because an attacker guesses the right credentials. (iii) On-path attacks On path attackers position themselves between two parties that trust each other — for example, an oT security camera and the camera's cloud sewer and intercept communications between the two, loT devices are particularly vulnerable to such attacks because many of them do not encrypt their communications bY default {eneryption serambles data so that it ‘cannot be interpreted by unauthorized parties). (iv) Physical hardware-based attacks Many IOT devices, ike IOT security cameras, stoplights, and fire alarms, are ‘placed in more or Tess permanent positions in public area, fan attacker has physical access to an 1oT device's ae are: tiey cat aaa inden cave ve Ne device. This approach would affect only one device ata time, ‘puta physical attack could have INTERNET OF THINGS 1.10 Device Lever ENercy Issues Q19. Explain about Device Level Energy Issues- Aus (imp.) Implementing 1OT- enabled Energy manage- ment ina developing country like India comes with its ‘own set of practical issues and challenges. The challenges ate as follows: (i) Infrastructure and Connectivity India has diverse geographical and infrastructural challenges, especially in remote and rural areas. Though we have gradually improved the connedtivity across urban and rural areas and are one of the leading nations in the world in implementing 5G, we still have shadow zones having significantly weak or no network connectivity, Ensuring liable internet connectivity fand proper infrastructure for IOT devices can be a significant hurdle. (ii) Cost and Affordability ‘The initial cost of deploying IOT devices and seting up the necessary infrastructure can be ‘elatively high and therefore, can affect the cost ‘of supply, from an electricity distributor's / retailer's perspective. Regulating the incidence of euch costs, from a tariffsetting perspective, can ‘be challenging for policy makers and regulators. (iii) Data Security and Privacy JOT devices collect and transmit sensitive energy consumption data, Ensuring robust data security and privacy measures becomes| crucial to protect consumers’ information from potential cyber threats and unauthorized access. (iv) Interoperability and Standards Different manufacturers may have their own proprietary [OT systems, leadingto compatibility issues and a lack of standardization. Ensuring interoperability among various devices and systems is vital for’ seamless integration and scalability. (v) Skilled workforce and Awareness Deploying and maintaining IOT-enabled eneray killed workforce. a larger effect if the gains information ‘management systems requires as that enables them to compromise additional In many cases, there might be a lack of trained devices on the network. personnel with expertise in OT technologies. Sg ia @ Scanned with OKEN Scanner af Be 3 YEAR MCA = Shep (vi) Power Supply Reliability Kalanjali printers ki chesa in mnt Inacountry like India, where power # outages are not uncommon, ensuring cot i supply to IOT devices is essential for their effective functioning. (vii) Regulatory and Policy frame work i The lack of clear and supportive regulations around IoT implementation and data managemeny, : : ves Sty Pebaiioi to adoption io: businesses and inucstoks. (vill) Scalability and Integration energy demand grows, th n should be scalable enough to handle increased data am snsidth existing energy infrastructure and systems can be comply: sal (ix) Maintenance and Upgrades ing regule intenance and timely upgrades of IOT devices fs crucial for their long tem Pema, ney. However, resource constraints can hinder effective maintenance in some cases, Perception and Acceptance New orslow adoption due fo skepticism or lack of awarenes abe nal or conservative sectors. (xi) Environmental Impact loyment and disposal of IQT devices can have environmental imple nable practices need to be considered, prehensive approach, involving colebortion betwee Gog nnology pr potential solutions: (xii) Government Support Enablin; cies, incentives, and funding support can encourage OT ad loption in the energy sector (xiii) Public private partnerships Glaborations between government agencies and private companies ean help deploy [OT solutions cot effectively, (xiv) Capacity building © scanned with OKEN Scanner asaatiaeteszestint JUNIT fT EEE TEE INTERNET PRINCIPLES AND COMMUNICATION TECHNOLOGY : Internet Communicat mnicafions: An Overview IP, TCP, IP protocol Suite, UDP. IP- addresses ~ DNS, Stati . Static and Dynamic IP addresse Pp UDP Ports, Application Layer Dynamic IP adresses MAC Addressess, TCP and eEEEEEEE EE | 2.1 IneRNeT COMMUNICATIONS | 2.1.1 An Overview | (ii) Control Protocol) and [P{Intemet Protocol are themest commonly-used protocols for using the Intemet, (But there are others at ower levels.) ‘The combination is simply known as TCPIIP. “The Internet is a packet switching system. Any message i broken into packets that are transmit fed independently across the interment (some- time by different routes). packets are called datagrams. The route (iv) (wv) (ii) TCP/IP IP ensures that packets get to the night place. > — TCPis the higher-level protocol that uses the lower-level IP. UDP (User Datagram Protocol) UDPis an unreliable protocol, since: > It doesn't guarantee that a packet will ar- tive. > It doesn't guarantee that packets will be in the right order. UDP doesn't re-send a packet if it is missing or there is some other error, and it doesn t assemble pack: @ Scanned with OKEN Scanner IWYEAR MCA SEM (iil) IP Addresses Consists of 4 byt. host computer in the world. Consists of 4 bytes or 39 unique address for every host computer in the athe range Ot ae An IPaddress is tation (or dot notation) as four 8-bii nun is represented in quad 131.123.2.220. IP addresses are registered so that they stay unique. a (iv) Domain Names A domain name is the user-friendly equivalent of an IP address. It is used because the numbers in ap, iP ‘address are hard to remember and use. It is also known as a host name. Example: es.stmarys.ca () The Domain Name System A program, say a Web browser, that wants to use a domain address usually needs to convert it into an p address before making contact with the server. The domain name system (DNS) provides a Mapping be. {ween IP addresses and domain names. All this information cannot be located in one place, 60 itis held in @ distributed database. (vi) Port Numbers ‘To identify @ host machine, an IP address or a domain name is needed. To identify a particular server ona host, a port number is used. A portislike a logical connection toa machine. Port numbers can take values from 1 to 65,535. A port number does not correspond to any physical connection on the machine, of which there might be just one, Each type of service has, by convention, a standard port number. (vii) Sockets A socket is the software mechanism for one program to connect fo another. A pair of programs open a socket connection between themselves. This then acts like a telephone connection - they can converse in both directions for as long as the connection is open. (In fact, data can flow in both directions atthe same time.) More than one socket can use any particular port. The network software ensures that data is routed ~ to or from the conect socket. (viii) URL . AURL (Uniform Resource Locator) > _ isaunique identifier for any resource on the Intemet can be typed into a Web browser > can be used as. hyperlink within a HTML document > canbe quoted as a reference to a source 2.2 IP, TCP IP Prorocot Suite Q2. Explain briefly about TCP IP protocol suite. Aus; % - : (lmp.) Protocols are sels of rules for message formals and procedures that allow machines and application PP” grams to exchange information. These rules mustbe followed by each machine involved in the communication order for the receiving host to be able to understand the message. The TCP/IP suite of protocols can be under stood in terms of layers (or levels). ee @ Scanned with OKEN Scanner v

You might also like