Mid_Term_IoT
Mid_Term_IoT
W1-W2 PDF
1.Challenges of IoT
The Internet of Things (IoT) faces several key challenges that impact its efficiency,
security, and scalability. Addressing these issues is crucial for successful IoT
deployment.
1. Scalability
As the number of IoT devices continues to grow, managing them efficiently
becomes a challenge. Networks must handle massive data traffic, device
authentication, and seamless connectivity without performance degradation.
Scalable cloud solutions, edge computing, and optimized network protocols are
needed to support IoT expansion.
2. Security
IoT devices are prime targets for cyber threats due to weak encryption, outdated
firmware, and poor security configurations. Threats like malware, botnets, and
unauthorized access can compromise entire IoT networks. Implementing strong
encryption, multi-factor authentication, and regular firmware updates is essential
to mitigate risks.
3. Privacy
IoT devices collect large amounts of personal and sensitive data, raising concerns
about data misuse and unauthorized access. Compliance with data protection laws
(such as GDPR and HIPAA), anonymizing data, and ensuring user control over their
information are necessary to protect privacy.
4. Big Data & Data Analytics
IoT generates vast amounts of real-time data that must be stored, processed, and
analyzed efficiently. Traditional data processing methods struggle to handle this
volume. Advanced solutions like artificial intelligence, machine learning, and cloud
computing help extract meaningful insights while ensuring fast processing and
minimal latency.
5. Interoperability
Different IoT manufacturers use various protocols and communication standards,
making device integration difficult. Ensuring smooth interaction between devices
from different vendors is a major challenge. Standardized communication protocols
(such as MQTT and CoAP), APIs, and middleware solutions can help bridge these
compatibility gaps.
W3 pdf
1.Explain The IoT World Forum (IoTWF) Standardized Architecture.
There are 7 layers for standardized architecture-
1. Physical Devices and Controllers Layer
2. Connectivity Layer
3. Edge Computing Layer ei tuk bottom layer
4. Data accumulation layer
5. Data abstraction layer
6. Applications layer
7. Collaboration and processes layer ei tuk upper layer
Here’s a breakdown of the seven layers:
1: Physical Devices and Controllers Layer
The first layer of the IoT Reference Model is the physical devices and controllers
layer. Example: Temperature sensor, smart lights.
2: Connectivity Layer:
This includes transmissions between Layer 1 devices and the network and
between the network and information processing that occurs at Layer 3 (the edge
computing layer).
Example: Wi-Fi, Bluetooth, 5G.
Layer 3: Edge Computing Layer:
Processes IoT data locally to reduce latency and bandwidth usage. Smart devices
like cameras and self-driving cars analyze data in real-time.
Example: Smart CCTV processing footage locally.
4: Data accumulation layer:
Captures data and stores it so it is usable by applications when necessary.
Converts event-based data to query-based processing.
Example: Cloud databases, message queues.
5: Data abstraction layer:
Reconciles multiple data formats and ensures consistent semantics from various
sources.
Example: API gateways, data encryption.
6: Applications layer:
Interprets data using software applications. Applications may monitor, control,
and provide reports based on the analysis of the data.
Example: Mobile apps, dashboards.
7: Collaboration and processes layer:
Consumes and shares the application information. Collaborating on and
communicating IoT information often requires multiple steps, and it is what makes
IoT useful.
Example: AI-based predictive maintenance.
2.What is IT and OT? Which one is better for which situation?
IT (Information Technology) handles data, networks, and software. It includes
computers, cloud storage, and cybersecurity, mainly used in offices, banks, and
businesses.
OT (Operational Technology) controls machines and physical processes in
industries like factories, power plants, and transportation. It includes sensors,
robotics, and industrial control systems.
When is IT Better-
IT is better for handling data, online security, and communication in offices, banks,
and online businesses. It helps with remote work, quick software updates, and
safe online transactions. IT is useful for teamwork, storing information, and
keeping data safe.
When is OT Better-
OT is better for controlling machines, factories, and power plants where work
must run all the time. It makes sure systems work safely and do not stop often. OT
is important for industries where machines and equipment need to be controlled
properly.
Finally, IT and OT are both important but used in different areas. IT is best for
handling data and online security, while OT is best for controlling machines and
industrial processes. Many modern industries use both together for better
efficiency and safety.
2.Level-5
Level 5: Level 5 IoT is very similar to Level 4 but with one major advancement. In
level 5 IoT, coordinator devices are also there in the local part of the ecosystem. A
coordinator device coordinates a certain set of sensing devices. There is an
Observer Node also in the cloud part that observes the entire process.
In summary, Level 5 IoT introduces coordinator devices that manage end nodes
and facilitate data transmission to the cloud for storage and analysis. This level is
ideal for wireless sensor networks with large data volumes and computationally
intensive analysis.
3.Level-6
Level 6: Level 6 IoT is very similar to Level 5 but with one major advancement. In
level 6 IoT, coordinator devices are replaced by a single component Centralized
Controller and that is there in the cloud part of the ecosystem.
IoT connects various entities to enhance efficiency. Connected products improve
operations and serviceability, while connected assets optimize machinery uptime
and reduce costs. Connected fleets track mobile assets like trucks, and connected
infrastructures optimize networks and power grids. In connected markets, IoT
improves resource use and efficiency, while connected people focus on better
work, health, and lifestyle through community connections.
W5 PDF
1.What is sensor actuator and smart object?
Sensor:
A sensor is a device that detects and measures physical properties (like
temperature, pressure, motion, light, etc.) from the environment. It converts
these measurements into electrical signals that can be read and processed by
other devices or systems.
• Example: A temperature sensor in a smart thermostat that measures the
room temperature.
Actuator:
An actuator is a device that performs an action based on commands or signals. It
converts electrical signals into physical movement or changes. Actuators can
control things like motors, valves, or moving parts in a system.
• Example: A motor that moves a robotic arm or a valve that opens and closes
based on sensor data.
Smart Object:
A smart object is an object that is embedded with sensors, actuators, and
communication capabilities, allowing it to interact with other objects or systems
over the internet (IoT). These objects can collect data, perform actions, and often
make decisions or communicate with other smart devices autonomously.
• Example: A smart fridge that can monitor food inventory (sensors), adjust
temperature (actuators), and notify you when you're running low on items
(communication feature).
Sensors detect data, actuators perform actions, and smart objects combine both
with connectivity to interact autonomously in the IoT ecosystem.
2.Single Source Single Object Detection:
Single Source Single Object Detection refers to detecting one object from a single
input source, such as an image, video frame, or sensor data. This method is
commonly used in computer vision and AI-based recognition systems. It is efficient
because it processes only one object at a time, reducing computational load
compared to multi-object detection.
This technique is useful in various applications, such as barcode scanners detecting
a single code, face recognition systems identifying one person, and medical imaging
detecting a tumor in an X-ray. It is also used in industrial quality control to check if
a product is correctly placed or has defects. Since it focuses on one object per input,
it ensures high accuracy and efficiency for specific tasks.
W8 PDF
1.What is Zigbee? When to use it? Which topology is suitable for
Zigbee?
Zigbee is a low-power, short-range wireless protocol used in IoT applications. It
supports mesh networking, allowing devices to communicate over long distances
with low data rates. Ideal for smart homes and industrial automation, Zigbee offers
long battery life and scalability.
When to Use Zigbee:
Zigbee is best for low-power, low-data-rate, and short-range communication in IoT
applications like smart homes, home automation, industrial sensors, and smart
lighting. Use it when you need reliable communication with many devices, energy
efficiency, and long battery life.
Best Topology for Zigbee:
(a)
(b)
Figure: Mesh Topology
The Mesh topology is ideal for Zigbee networks because it allows devices to
communicate with each other, relaying messages to extend the range and improve
network reliability.
Why Mesh Topology is Better:
• Extended Range: Mesh networks relay signals, allowing communication over
long distances.
• Reliability: If one device fails, other devices can take alternative paths to
deliver messages.
• Scalability: Supports a large number of devices, making it suitable for
extensive IoT networks.
In summary, mesh topology enhances Zigbee's range, reliability, and scalability,
making it ideal for large, energy-efficient IoT networks.
Features of ZigBee
1. Low Power Consumption – Designed for energy efficiency, allowing devices
to operate on small batteries for years.
2. Low Data Rate – Supports data rates of 20 kbps to 250 kbps, making it ideal
for IoT and sensor-based applications.
3. Short-Range Communication – Typically works within 10–100 meters
indoors, with longer ranges possible using mesh networking.
4. Supports Multiple Network Topologies – Can be configured in Star, Tree, and
Mesh topologies, allowing flexible and scalable communication.
5. Self-Healing & Reliable Communication – Mesh networking enables devices
to relay data and find alternate paths if a node fails.
6. High Scalability – Supports large networks with up to 65,000 nodes, making
it ideal for smart cities and industrial applications.
7. Strong Security Features – Uses AES-128 encryption, authentication, and data
integrity mechanisms for secure communication.
8. Operates in ISM Frequency Bands – Works in 2.4 GHz (global), 915 MHz
(Americas), and 868 MHz (Europe), ensuring broad compatibility.
9. Interference Resistance – Uses Direct Sequence Spread Spectrum (DSSS) and
CSMA-CA to minimize interference from other wireless signals.
10.Low Cost & Simple Implementation – Requires minimal hardware, reducing
development and deployment costs.
Layer Coverage Covers only PHY and MAC Adds network (NWK) and
layers. application (APL) layers for full
communication.
Networking Supports Star and Peer-to- Supports Star, Tree, and Mesh,
Topologies Peer (Mesh/Tree possible making it more flexible.
but not defined).