0% found this document useful (0 votes)
4 views

Mid_Term_IoT

The document outlines key challenges in the Internet of Things (IoT) including scalability, security, privacy, big data analytics, and interoperability. It also distinguishes between Machine-to-Machine (M2M) and OneM2M technologies, explaining their applications and when to use each. Additionally, it covers IoT architecture layers, the differences between Information Technology (IT) and Operational Technology (OT), and the use of Zigbee for low-power, short-range communication in IoT applications.

Uploaded by

promihard
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Mid_Term_IoT

The document outlines key challenges in the Internet of Things (IoT) including scalability, security, privacy, big data analytics, and interoperability. It also distinguishes between Machine-to-Machine (M2M) and OneM2M technologies, explaining their applications and when to use each. Additionally, it covers IoT architecture layers, the differences between Information Technology (IT) and Operational Technology (OT), and the use of Zigbee for low-power, short-range communication in IoT applications.

Uploaded by

promihard
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

IOT MID TEARM TOPICS

W1-W2 PDF
1.Challenges of IoT
The Internet of Things (IoT) faces several key challenges that impact its efficiency,
security, and scalability. Addressing these issues is crucial for successful IoT
deployment.
1. Scalability
As the number of IoT devices continues to grow, managing them efficiently
becomes a challenge. Networks must handle massive data traffic, device
authentication, and seamless connectivity without performance degradation.
Scalable cloud solutions, edge computing, and optimized network protocols are
needed to support IoT expansion.
2. Security
IoT devices are prime targets for cyber threats due to weak encryption, outdated
firmware, and poor security configurations. Threats like malware, botnets, and
unauthorized access can compromise entire IoT networks. Implementing strong
encryption, multi-factor authentication, and regular firmware updates is essential
to mitigate risks.
3. Privacy
IoT devices collect large amounts of personal and sensitive data, raising concerns
about data misuse and unauthorized access. Compliance with data protection laws
(such as GDPR and HIPAA), anonymizing data, and ensuring user control over their
information are necessary to protect privacy.
4. Big Data & Data Analytics
IoT generates vast amounts of real-time data that must be stored, processed, and
analyzed efficiently. Traditional data processing methods struggle to handle this
volume. Advanced solutions like artificial intelligence, machine learning, and cloud
computing help extract meaningful insights while ensuring fast processing and
minimal latency.
5. Interoperability
Different IoT manufacturers use various protocols and communication standards,
making device integration difficult. Ensuring smooth interaction between devices
from different vendors is a major challenge. Standardized communication protocols
(such as MQTT and CoAP), APIs, and middleware solutions can help bridge these
compatibility gaps.

2.What is M2M and OneM2M? When to Use M2M and OneM2M?


M2M (Machine-to-Machine) is a technology that allows devices to communicate
with each other without human involvement. It is used in smart meters, industrial
automation, healthcare monitoring, and connected vehicles. M2M works through
sensors, cellular networks, and the internet to send and receive data between
devices.
OneM2M is a global standard for M2M communication that ensures different
devices and systems can work together smoothly. It provides a common
framework for IoT applications, making it easier to connect smart devices across
industries like healthcare, transportation, and smart cities.

When to Use M2M and OneM2M-


✅ Use M2M when you need direct communication between devices for specific
tasks, such as monitoring temperature in a factory or tracking a vehicle’s location.
M2M is good for simple, device-specific applications that do not need a universal
standard.

✅ Use OneM2M when you need a structured, standardized communication


system that allows different devices and applications to work together. OneM2M
is best for large IoT ecosystems, such as smart cities, connected healthcare, and
industrial IoT, where devices from different manufacturers must interact
seamlessly.
Finally,
M2M is useful for simple, direct device communication, while OneM2M is better
for large-scale IoT systems that need a common communication standard.
OneM2M helps in creating a more connected and interoperable smart world.

3. Comparison of IoT vs M2M


Here's a comparison of M2M (Machine-to-Machine) and IoT (Internet of Things):
This comparison highlights the primary differences between M2M and IoT,
showing how M2M focuses on specific machine communication, while IoT offers a
more comprehensive, connected ecosystem.

W3 pdf
1.Explain The IoT World Forum (IoTWF) Standardized Architecture.
There are 7 layers for standardized architecture-
1. Physical Devices and Controllers Layer
2. Connectivity Layer
3. Edge Computing Layer ei tuk bottom layer
4. Data accumulation layer
5. Data abstraction layer
6. Applications layer
7. Collaboration and processes layer ei tuk upper layer
Here’s a breakdown of the seven layers:
1: Physical Devices and Controllers Layer
The first layer of the IoT Reference Model is the physical devices and controllers
layer. Example: Temperature sensor, smart lights.
2: Connectivity Layer:
This includes transmissions between Layer 1 devices and the network and
between the network and information processing that occurs at Layer 3 (the edge
computing layer).
Example: Wi-Fi, Bluetooth, 5G.
Layer 3: Edge Computing Layer:
Processes IoT data locally to reduce latency and bandwidth usage. Smart devices
like cameras and self-driving cars analyze data in real-time.
Example: Smart CCTV processing footage locally.
4: Data accumulation layer:
Captures data and stores it so it is usable by applications when necessary.
Converts event-based data to query-based processing.
Example: Cloud databases, message queues.
5: Data abstraction layer:
Reconciles multiple data formats and ensures consistent semantics from various
sources.
Example: API gateways, data encryption.
6: Applications layer:
Interprets data using software applications. Applications may monitor, control,
and provide reports based on the analysis of the data.
Example: Mobile apps, dashboards.
7: Collaboration and processes layer:
Consumes and shares the application information. Collaborating on and
communicating IoT information often requires multiple steps, and it is what makes
IoT useful.
Example: AI-based predictive maintenance.
2.What is IT and OT? Which one is better for which situation?
IT (Information Technology) handles data, networks, and software. It includes
computers, cloud storage, and cybersecurity, mainly used in offices, banks, and
businesses.
OT (Operational Technology) controls machines and physical processes in
industries like factories, power plants, and transportation. It includes sensors,
robotics, and industrial control systems.

When is IT Better-
IT is better for handling data, online security, and communication in offices, banks,
and online businesses. It helps with remote work, quick software updates, and
safe online transactions. IT is useful for teamwork, storing information, and
keeping data safe.
When is OT Better-
OT is better for controlling machines, factories, and power plants where work
must run all the time. It makes sure systems work safely and do not stop often. OT
is important for industries where machines and equipment need to be controlled
properly.
Finally, IT and OT are both important but used in different areas. IT is best for
handling data and online security, while OT is best for controlling machines and
industrial processes. Many modern industries use both together for better
efficiency and safety.

3. IoT vs. OT in Industrial Applications (***)


IoT (Internet of Things) connects devices over the internet to collect, share, and
analyze data, enabling remote monitoring and insights for optimization in various
industries.
OT (Operational Technology), on the other hand, focuses on controlling and
automating physical systems in real-time, ensuring operational efficiency and
safety in industrial environments like manufacturing and energy.
IoT vs. OT in Industrial Applications

In summary, IoT is focused on data collection, remote monitoring, and analysis,


whereas OT is specialized in real-time control and automation of industrial
processes.
W4 PDF
1.Level-4
Key Components:
• Sensors and Devices
• Local Analysis
• Cloud Connectivity
• Cloud Storage
• Cloud-Based Analysis
• Observer Nodes
In summary, IoT Level 4 enables faster decision-making through distributed
intelligence and cloud-based storage. It supports advanced applications like
predictive maintenance and real-time monitoring, enhancing scalability and
security.

2.Level-5
Level 5: Level 5 IoT is very similar to Level 4 but with one major advancement. In
level 5 IoT, coordinator devices are also there in the local part of the ecosystem. A
coordinator device coordinates a certain set of sensing devices. There is an
Observer Node also in the cloud part that observes the entire process.
In summary, Level 5 IoT introduces coordinator devices that manage end nodes
and facilitate data transmission to the cloud for storage and analysis. This level is
ideal for wireless sensor networks with large data volumes and computationally
intensive analysis.

3.Level-6
Level 6: Level 6 IoT is very similar to Level 5 but with one major advancement. In
level 6 IoT, coordinator devices are replaced by a single component Centralized
Controller and that is there in the cloud part of the ecosystem.
IoT connects various entities to enhance efficiency. Connected products improve
operations and serviceability, while connected assets optimize machinery uptime
and reduce costs. Connected fleets track mobile assets like trucks, and connected
infrastructures optimize networks and power grids. In connected markets, IoT
improves resource use and efficiency, while connected people focus on better
work, health, and lifestyle through community connections.

In summary, Level 6 IoT replaces coordinator devices with a centralized controller


in the cloud, enabling more streamlined management. This level enhances
efficiency across connected products, assets, fleets, infrastructures, markets, and
people by providing integrated control and insights.

W5 PDF
1.What is sensor actuator and smart object?
Sensor:
A sensor is a device that detects and measures physical properties (like
temperature, pressure, motion, light, etc.) from the environment. It converts
these measurements into electrical signals that can be read and processed by
other devices or systems.
• Example: A temperature sensor in a smart thermostat that measures the
room temperature.

Actuator:
An actuator is a device that performs an action based on commands or signals. It
converts electrical signals into physical movement or changes. Actuators can
control things like motors, valves, or moving parts in a system.
• Example: A motor that moves a robotic arm or a valve that opens and closes
based on sensor data.

Smart Object:
A smart object is an object that is embedded with sensors, actuators, and
communication capabilities, allowing it to interact with other objects or systems
over the internet (IoT). These objects can collect data, perform actions, and often
make decisions or communicate with other smart devices autonomously.
• Example: A smart fridge that can monitor food inventory (sensors), adjust
temperature (actuators), and notify you when you're running low on items
(communication feature).

Sensors detect data, actuators perform actions, and smart objects combine both
with connectivity to interact autonomously in the IoT ecosystem.
2.Single Source Single Object Detection:
Single Source Single Object Detection refers to detecting one object from a single
input source, such as an image, video frame, or sensor data. This method is
commonly used in computer vision and AI-based recognition systems. It is efficient
because it processes only one object at a time, reducing computational load
compared to multi-object detection.
This technique is useful in various applications, such as barcode scanners detecting
a single code, face recognition systems identifying one person, and medical imaging
detecting a tumor in an X-ray. It is also used in industrial quality control to check if
a product is correctly placed or has defects. Since it focuses on one object per input,
it ensures high accuracy and efficiency for specific tasks.

Single Source Multiple Object Detection:


Single Source Multiple Object Detection detects multiple objects from a single
input, such as an image, video frame, or sensor data. It identifies different objects
in the same scene, making it useful for analyzing complex environments.
This method is used in self-driving cars to detect pedestrians and vehicles,
surveillance systems for tracking multiple people, and medical imaging for
identifying multiple abnormalities. It requires more processing power than single-
object detection but provides a broader understanding of the scene.
Multiple Source Single Object Detection:
Multiple Source Single Object Detection detects a single object using data
from multiple sources, such as multiple cameras, sensors, or data
streams. This approach improves accuracy by combining information
from different perspectives.
It is used in autonomous vehicles, where cameras and LiDAR work
together to detect an obstacle, and in security systems that track a
person using multiple surveillance cameras. This method enhances
reliability by reducing blind spots and improving detection precision.
Multiple Source Multiple Object Detection:
Multiple Source Multiple Object Detection involves detecting multiple objects using
data from multiple sources, such as multiple cameras, sensors, or data streams. This
approach allows for the identification of several objects from different perspectives,
improving overall accuracy and robustness.
It is commonly used in complex applications like autonomous vehicles, where
various sensors (e.g., cameras, radar, LiDAR) work together to detect and track
multiple objects, such as pedestrians, vehicles, and obstacles. This method helps
cover a larger area, reduces blind spots, and enhances the system's ability to make
decisions in dynamic environments.

W8 PDF
1.What is Zigbee? When to use it? Which topology is suitable for
Zigbee?
Zigbee is a low-power, short-range wireless protocol used in IoT applications. It
supports mesh networking, allowing devices to communicate over long distances
with low data rates. Ideal for smart homes and industrial automation, Zigbee offers
long battery life and scalability.
When to Use Zigbee:
Zigbee is best for low-power, low-data-rate, and short-range communication in IoT
applications like smart homes, home automation, industrial sensors, and smart
lighting. Use it when you need reliable communication with many devices, energy
efficiency, and long battery life.
Best Topology for Zigbee:

(a)

(b)
Figure: Mesh Topology
The Mesh topology is ideal for Zigbee networks because it allows devices to
communicate with each other, relaying messages to extend the range and improve
network reliability.
Why Mesh Topology is Better:
• Extended Range: Mesh networks relay signals, allowing communication over
long distances.
• Reliability: If one device fails, other devices can take alternative paths to
deliver messages.
• Scalability: Supports a large number of devices, making it suitable for
extensive IoT networks.
In summary, mesh topology enhances Zigbee's range, reliability, and scalability,
making it ideal for large, energy-efficient IoT networks.

2. When to use Zigbee and when to use WIFI explain


When to Use Zigbee:
Zigbee is best for low-power, low-data-rate, and short-range communication in IoT
applications like smart homes, home automation, industrial sensors, and smart
lighting. Use it when you need reliable communication with many devices, energy
efficiency, and long battery life.
When to Use Wi-Fi:
Wi-Fi is better for high-data-rate applications that require internet connectivity or
large bandwidth, such as streaming, web browsing, or high-speed file transfers. It
is suitable for devices that have access to power sources and where fast internet
speeds are essential, like laptops, smartphones, and smart TVs.
Key Difference-

Features of IEEE 802.15.4


1. Designed for Low Data-Rate Applications – Developed for monitoring and
control applications with low power consumption and extended battery life.
2. Layer Structure – Uses only the PHY and MAC layers, along with LLC and SSCS
for communication with upper layers.
3. Operating Frequency and Modulation – Works in the ISM band using DSSS,
BPSK (low speed), and O-QPSK (high speed) for modulation.
4. Interference Tolerance and Reliability – Resistant to noise and interference
with link reliability mechanisms.
5. Channel Access Mechanism – Uses CSMA-CA to avoid collisions and supports
multiplexing for interference-free communication.
6. Power Efficiency – Low power consumption due to short packet
transmissions with a duty cycle <1%. The minimum power level is –3 dBm
(0.5 mW).
7. Transmission Characteristics – Requires Line-of-Sight (LOS) for most cases,
with a range of 10m–75m (standard) and up to 1000m (best case outdoors).
8. Supported Network Topologies – Supports Star and Mesh networking
structures for flexible connectivity.
9. Multiplexing Capability – Allows multiple users or nodes to access the same
channel at different times without interference.

Features of ZigBee
1. Low Power Consumption – Designed for energy efficiency, allowing devices
to operate on small batteries for years.
2. Low Data Rate – Supports data rates of 20 kbps to 250 kbps, making it ideal
for IoT and sensor-based applications.
3. Short-Range Communication – Typically works within 10–100 meters
indoors, with longer ranges possible using mesh networking.
4. Supports Multiple Network Topologies – Can be configured in Star, Tree, and
Mesh topologies, allowing flexible and scalable communication.
5. Self-Healing & Reliable Communication – Mesh networking enables devices
to relay data and find alternate paths if a node fails.
6. High Scalability – Supports large networks with up to 65,000 nodes, making
it ideal for smart cities and industrial applications.
7. Strong Security Features – Uses AES-128 encryption, authentication, and data
integrity mechanisms for secure communication.
8. Operates in ISM Frequency Bands – Works in 2.4 GHz (global), 915 MHz
(Americas), and 868 MHz (Europe), ensuring broad compatibility.
9. Interference Resistance – Uses Direct Sequence Spread Spectrum (DSSS) and
CSMA-CA to minimize interference from other wireless signals.
10.Low Cost & Simple Implementation – Requires minimal hardware, reducing
development and deployment costs.

ZigBee vs IEEE 802.15.4

Feature IEEE 802.15.4 ZigBee

Definition A wireless standard for low- A networking protocol built on


power, low-data-rate IEEE 802.15.4 for IoT and
WPANs. automation.

Layer Coverage Covers only PHY and MAC Adds network (NWK) and
layers. application (APL) layers for full
communication.

Networking Supports Star and Peer-to- Supports Star, Tree, and Mesh,
Topologies Peer (Mesh/Tree possible making it more flexible.
but not defined).

Data Rate 20 kbps to 250 kbps. Same, as it is based on IEEE


802.15.4.

Range 10m to 100m (higher with Same, but Mesh networking


power adjustments). allows extended range.

Power Low power, but no built-in Lower power due to efficient


Consumption sleep mechanisms. sleep modes and optimized
communication.
Security Basic security features. Stronger security with AES-128
encryption, authentication, and
key management.

Interoperability Provides basic Standardized communication


communication but lacks protocols for seamless device
standardized profiles. compatibility.

Use Cases General-purpose low-power Specifically designed for IoT,


WPAN applications. home automation, industrial
control, and smart cities.

You might also like