Department of Computer Science: Pachamuthu College of Arts and Science For Women Dharmapuri
Department of Computer Science: Pachamuthu College of Arts and Science For Women Dharmapuri
Department of Computer Science: Pachamuthu College of Arts and Science For Women Dharmapuri
DHARMAPURI
PAPERCODE : 21UCAE09
SEMESTER VI
INTERNET OF THINGS21UCAE09
UNIT - I
IoT & Web Technology, The Internet of Things Today, Time for Convergence, Towards the IoT
Universe, Internet of Things Vision, IoT Strategic Research and Innovation Directions, IoT Applications,
Future Internet Technologies, Infrastructure, Networks and Communication, Processes, Data Management,
Security, Privacy & Trust, Device Level Energy Issues, IoT Related Standardization, Recommendations on
Research Topics.
UNIT –II
M2M to IoT – A Basic Perspective– Introduction, Some Definitions, M2M Value Chains, IoT Value
Chains, An emerging industrial structure for IoT, The international driven global value chain and global
information monopolies. M2M to IoT-An Architectural Overview– Building an architecture, Main design
principles and needed capabilities, An IoT architecture outline, standards considerations.
UNIT – III
IoT Architecture -State of the Art – Introduction, State of the art, Architecture. Reference Model-
Introduction, Reference Model and architecture, IoT reference Model, IoT Reference Architecture-
Introduction, Functional View, Information View, Deployment and Operational View, Other Relevant
architectural views.
UNIT – IV
IoT Architecture Introduction, IoT applications for industry: Future Factory Concepts, Brownfield IoT,
Smart Objects, Smart Applications, Four Aspects in your Business to Master IoT, Value Creation from Big
Data and Serialization, IoT for Retailing Industry, IoT For Oil and GasIndustry, Opinions on IoT Application
and Value for Industry, Home Management, eHealth.
UNIT – V
Internet of Things Privacy, Security and Governance Introduction, Overview of Governance, Privacy
and Security Issues, Contribution from FP7 Projects, Security, Privacy andTrust in IoT-Data-Platforms for
Smart Cities, First Steps Towards a Secure Platform, Smartie Approach. Data Aggregation for the IoT in
Smart Cities, Security.
UNIT-I
Control Units:
It is a unit of small computer on a single integrated circuit containing microprocessor or processing
core, memory and programmable input/output devices/peripherals.
Cloud computing:
Data collected through IoT devices is massive, and this data has to be stored on a reliable storage
server.
This is where cloud computing comes into play. The data is processed and learned, giving more
room for us to discover where things like electrical faults/errors are within the system.
Availability of big data:
We know that IoT relies heavily on sensors, especially in real-time.
As these electronic devices spread throughout every field, their usage is going to trigger a massive
flux of big data.
Networking connection:
In order to communicate, internet connectivity is a must, where each physical object is represented
by an IP address. However, there are only a limited number of addresses available according to the IP
naming.
Due to the growing number of devices, this naming system will not be feasible anymore. Therefore,
researchers are looking for another alternative naming system to represent each physical object.
Ways of Building IOT
There are two ways of building IoT:
Form a separate internet work including only physical objects.
Make the Internet ever more expansive, but this requires hard-core technologies such as rigorous
cloud computing and rapid big data storage (expensive).
IoT Enablers
RFIDs: uses radio waves in order to electronically track the tags attached to each physical object.
Sensors: devices that are able to detect changes in an environment (ex: motion detectors).
Nanotechnology: as the name suggests, these are tiny devices with dimensions usually less than a
hundred nanometers.
Smart networks: (ex: mesh topology).
Working with IoT Devices
Collect and Transmit Data :
For this purpose sensors are widely used they are used as per requirements in different
application areas.
Actuate device based on triggers produced by sensors or processing devices:
Ifcertain conditions are satisfied or according to user’s requirements if certain trigger is activated
then which action to perform that is shown by Actuator devices.
Receive Information:
From network devices, users or devices can take certain information also for their analysis and
processing purposes.
Communication Assistance:
Communication assistance is the phenomenon of communication between 2 networks or
communication between 2 or more IoT devices of same or different networks.
This can be achieved by different communication protocols like: MQTT, Constrained
Application Protocol, ZigBee, FTP, HTTP etc.
Characteristics of IoT
Massively scalable and efficient
IP-based addressing will no longer be suitable in the upcoming future.
An abundance of physical objects is present that do not use IP, so IoT is made possible.
Devices typically consume less power. When not in use, they should be automatically programmed
to sleep.
A device that is connected to another device right now may not be connected in another instant of
time.
Intermittent connectivity – IoT devices aren’t always connected. In order to save bandwidth and
battery consumption, devices will be powered off periodically when not in use. Otherwise,
connections might turn unreliable and thus prove to be inefficient.
Desired Quality of any IoT Application
Interconnectivity
It is the basic first requirement in any IoT infrastructure. Connectivity should be guaranteed from
any devices on any network then only devices in a network can communicate with each other.
Heterogeneity
There can be diversity in IoT enabled devices like different hardware and software configuration or
different network topologies or connections, but they should connect and interact with each other despite so
much heterogeneity.
Dynamic in Nature
IoT devices should dynamically adapt themselves to the changing surroundings like different
situations and different prefaces.
Self-adapting and self-configuring technology
For example, surveillance camera. It should be flexible to work in different weather conditions and
different light situations (morning, afternoon, or night).
Intelligence
Just data collection is not enough in IoT, extraction of knowledge from the generated data is very
important.
For example, sensors generate data, but that data will only be useful if it is interpreted properly.
So intelligence is one of the key characteristics in IoT. Because data interpretation is the major part
in any IoT application because without data processing we can’t make any insights from data. Hence, big
data is also one of the most enabling technologies in IoT field.
Scalability
The number of elements (devices) connected to IoTzones is increasing day by day. Therefore, an IoT
setup should be capable of handling the expansion.
It can be either expand capability in terms of processing power, storage, etc. as vertical scaling or
horizontal scaling by multiplying with easy cloning.
Identity
Each IoT device has a unique identity (e.g., an IP address). This identity is helpful in
communication, tracking and to know status of the things.
If there is no identification then it will directly affect security and safety of any system because
without discrimination we can’t identify with whom one network is connected or with whom we have to
communicate.
So there should be clear and appropriate discrimination technology available between IoT networks
and devices.
Safety
Sensitive personal details of a user might be compromised when the devices are connected to the
Internet. So data security is a major challenge.
This could cause a loss to the user. Equipment in the huge IoT network may also be at risk.
Therefore, equipment safety is also critical.
Architecture
It should be hybrid, supporting different manufacturer’s products to function in the IoT network.
As a quick note, IoT incorporates trillions of sensors, billions of smart systems, and millions of
applications.
Application Domains
IoT is currently found in four different popular domains:
1) Manufacturing/Industrial business - 40.2%
2) Healthcare - 30.3%
3) Security - 7.7%
4) Retail - 8.3%
Modern Applications
Smart Grids and energy saving
Smart cities
Smart homes/Home automation
Healthcare
Earthquake detection
Radiation detection/hazardous gas detection
Smartphone detection
Water flow monitoring
Traffic monitoring
Wearables
Smart door lock protection system
Robots and Drones
Healthcare and Hospitals, Telemedicine applications
Security
Biochip Transponders (For animals in farms)
Heart monitoring implants (Example Pacemaker, ECG real time tracking)
Agriculture
Industry
Advantages of IoT
Improved efficiency and automation of tasks.
Increased convenience and accessibility of information.
Better monitoring and control of devices and systems.
Greater ability to gather and analyze data.
Improved decision-making.
Cost savings.
Disadvantages of IoT
Security concerns and potential for hacking or data breaches.
Privacy issues related to the collection and use of personal data.
Dependence on technology and potential for system failures.
Limited standardization and interoperability among devices.
Complexity and increased maintenance requirements.
High initial investment costs.
Limited battery life on some devices.
Concerns about job displacement due to automation.
Limited regulation and legal framework for IoT, which can lead to confusion and uncertainty.
Such super-stack like environments, bringing together a number of distinct constituencies, represents
an opportunity for Europe to develop Internet of Things ecosystems.
As an example this would include the definition of open APIs and hence offer a variety of channels for
the delivery of new applications and services.
Such open APIs are of particular importance at module range on any abstraction level for application-
specific data analysis and processing, thus allowing application developers to leverage the underlying
communication infrastructure and use and combine information generated by various devices to produce
added value across multiple environments.
As a quintessence the next big leap in the Internet of Things evolution will be the coherence of efforts
on all levels towards innovation.
In case of the IoT community this would mean that out of many possible “coherence horizons” the
following will likely provide the foundation for a step forward to the Internet of Things:
Coherence of object capabilities and behaviour: the objects in the Internet of Things will show a huge
variety in sensing and actuation capabilities, in information processing functionality and their time of
existence.
In either case it will be necessary to generally apprehend object as entities with a growing
“intelligence” and patterns of autonomous behaviour.
Coherence of application interactivity: the applications will increase in complexity and modularisation,
and boundaries between applications and services will be blurred to a high degree.
Fixed programmed suites will evolve into dynamic and learning application packages.
Besides technical, semantic interoperability will become the key for context aware information
exchange and processing.
Coherence of corresponding technology approaches: larger concepts like Smart Cities, Cloud
computing, Future Internet, robotics and others will evolve in their own way, but because of
complementarity also partly merge with the Internet of Things.
Here a creative view on potential synergies can help to develop new ecosystems.
Coherence of real and virtual worlds: today real and virtual worlds are perceived as two antagonistic
conceptions.
At the same time virtual worlds grow exponentially with the amount of stored data and ever increasing
network and information processing capabilities.
Understanding both paradigms as complementary and part of human evolution could lead to new
synergies and exploration of living worlds.
As a further analogy to new theories about parallel universes, different Internet of Things worlds might
develop and exist in parallel, potentially overlap and possess spontaneous or fixed transfer gates.
These forward-looking considerations do certainly convey a slight touch of science fiction, but are
thought to stimulate the exploration of future living worlds.
The overall scope is to create and foster ecosystems of platforms for connected smart objects,
integrating the future generation of devices, network technologies, software technologies, interfaces and other
evolving ICT innovations, both for the society and for people to become pervasive at home, at work and while
on the move.
These environments will embed effective and efficient security and privacy mechanisms into devices,
architectures, platforms, and protocols, including characteristics such as openness, dynamic expandability,
interoperability of objects, distributed intelligence, and cost and energy-efficiency.
Whereas the forthcoming Internet of Things related research in the scope of Horizon 2020 and
corresponding national research programs will address the above matters, challenges from a societal and
policy perspective remain equally important, in particular the following:
Directing effort and attention to important societal application areas such as health and
environment, including focus on low energy consumption.
Offering orientation on security, privacy, trust and ethical aspects in the scope of
current legislation and development of robust and future-proof general data protection
rules.
IoT Vision
Various definitions of IoT co-exist due to the fact that everyone gives it a meaning according to
their own
perspective leading to obvious fuzziness. The definition is a mix of two terms-Internet and
Things. The former gives
ita network-oriented vision whereas the latter one pushes it towards objects which are combined
to get settled in a
single architecture. IoT signifies “world-wide network of interconnected objects uniquely
addressable based on
standard communication protocols” [11]. The biggest challenge in IoT is to uniquely identify
each object in parallel with representation and storage of the information that is exchanged
among the objects.
The three visions of IoT[8] are shownin fig 2:
Things Oriented Vision
Internet Oriented Vision
Semantic Oriented Vision
ThingsOrientedVision
In this vision, objects are tracked by sensors and technologies using RFID [27]. Each object is
uniquely identified byElectronic Product Code (EPC).
The data is collected through sensors and sensor based embedded system. Thisvision depends on
RFID-based sensor networks and other sensor-based networks which integrate technologies basedonRFID,
sensing, computing devicesandtheglobal connectivity.
InternetOrientedVision
The internet-oriented vision sees the various physical devices interacting with each other. The sensor-
based objectscan be determined uniquely and theirwhereabouts can be regularly monitored.
These smart embedded objects canbe consideredasmicrocomputerswithcomputingresources.
SemanticOrientedVision
This vision states that the data collected through sensors will be huge. Thus, the collected data is
processedeffectively.
The raw data is processed in order to make it consistent and least redundant which is useful for
betterrepresentationsandinterpretation.
From things perspective, IoT focuses on the integration of smart devices or objects in a single
architecture,where things being RFID tags, the Internet perspective gives IoT a network-oriented meaning.
IoT architecture
The IoT associates trillions of objects or devices which will generate a lot of traffic and to
handle that huge data storage will be needed [12].
The issues like security and privacy also needs to be ensured when proposingthe new
architecture for IoT addressing scalability, interoperability, reliability, QoS etc. The primitive
architecture of IoT is proposed in [10] and [12].
Infrastructure of IOT:
The Internet of Things will become part of the fabric of everyday life. It will become part of our
overall infrastructure just like water, electricity, telephone, TV and most recently the Internet.
Such plug and play functionality requires an infrastructure that supports it, starting from the
networking level and going beyond it to the application level.
2) Infrastructure Functionality:
The infrastructure needs to support applications in finding the things required. An application
may run anywhere, including on the things themselves.
semantic information regarding the things, the information they can provide or the actuation
they can perform need to be available.(e.g: temperature the sensor measures).
Networks Technology
3) Mobile Networks:
The mobile phone of the future could provide mobile function.
5) Overlay Networks:
In some locations even multiple networks overlaying one another physically and logically.
6) Network Self-organization:
Self-organization principles will be applied to configuration by sensing.
2) Correctness of Construction:
Correctness of construction of the whole system is a systematic process that starts from the small systems
running on the devices up to network and distributed applications.
ONE MARK:
2. What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
View Answer
Answer: a
Explanation: The Internet of Things (IoT) is a network of physical objects embedded with sensors, software,
and other technologies for exchanging data with other devices over the internet.
3. Who coined the term “Internet of Things”?
a) Kevin Aston
b) John Wright
c) Edward Jameson
d) George Garton
View Answer
Answer: a
Explanation: Kevin invented coined the term “Internet of Things” in 1999 during his work at Procter &
Gamble to describe the network connecting objects in the physical world with the Internet.
14. Which of the following command is used to trigger the Amazon echo IOT device?
a) Hello
b) Suri
c) Alexa
d) Hey
View Answer
Answer: c
Explanation: Amazon Echo is a hands-free speaker that can be controlled with the human voice. It connects to
Alexa voice services and “Alexa” command is used to trigger Amazon echo IoT device.
15. Which of the following is false about the MANET IoT network?
a) It is a self-configuring network
b) It has a low data rate
c) It doesn’t have any encryption
d) Power is readily available for complex security
View Answer
Answer: d
Explanation: MANET is an unstable network. It is self-configuring and it has a low data rate. It doesn’t have
power availability for complex security. It also doesn’t have any encryption.
24. Which of the following processor is used in the Raspberry PI 3 IoT device?
a) Broadcom BCM2711
b) Broadcom BCM2837
c) Broadcom BCM2838
d) Intel 8085
View Answer
Answer: b
Explanation: Raspberry PI 3 has Broadcom BCM2837 microprocessor. It is a 64-bit Quad-core
microprocessor. Broadcom BCM2711 is the microprocessor of Raspberry PI 4 Model B.
26. Which of the following is not related to Arduino IDE IoT software?
a) Serial monitor
b) Verify
c) Upload
d) Terminate
View Answer
Answer: d
Explanation: Verify option is used to verify or compile the Arduino code and the upload option is used to
upload the code to the Arduino development board. Serial monitor is used to display the data.
27. Which of the following is a complete line of home IoT devices that include smart switches?
a) Belkin’sWeMo
b) Cinder
c) Awair
d) Canary
View Answer
Answer: a
Explanation: Belkin’sWeMo is a complete line of home IoT devices that includes smart switches, cameras,
lights, an air purifier and more. It allows the end user to control a lot of different devices with one smartphone
app.
28. IoT gateway must provide
a) Protocol abstraction
b) Data storage
c) Security with hardware
d) Simple and fast installation
View Answer
Answer: a
Explanation: IoT gateway must provide:
Protocol abstraction
Computing and I/O performance
Integration communication capability.
30. Which of the following protocol is used to link all the devices in the IoT?
a) HTTP
b) UDP
c) Network
d) TCP/IP
View Answer
Answer: d
Explanation: The internet of Thing is the global system of interconnected computer networks that use the
Internet Protocol suite (TCP/IP) to link billions of devices worldwide.
Question Bank:
Machine-to-machine (M2M)
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that
enables networked devices to exchange information and perform actions without the manual assistance of
humans. Artificial intelligence (AI) and machine learning (ML) facilitate the communication between
systems, allowing them to make their own autonomous choices.
Utilities companies often rely on M2M devices and applications to not only harvest energy, such as oil
and gas, but also to bill customers -- through the use of Smart meters -- and to detect worksite factors, such as
pressure, temperature and equipment status.
In telemedicine, M2M devices can enable the real time monitoring of patients' vital statistics,
dispensing medicine when required or tracking healthcare assets.
The combination of the IoT, AI and ML is transforming and improving mobile payment processes and
creating new opportunities for different purchasing behaviors. Digital wallets, such as Google
Wallet and Apple Pay, will most likely contribute to the widespread adoption of M2M financial activities.
Smart home systems have also incorporated M2M technology. The use of M2M in this embedded
system enables home appliances and other technologies to have real time control of operations as well as the
ability to remotely communicate.
M2M is also an important aspect of remote-control software, robotics, traffic control, security, logistics
and fleet management and automotive.
Low power consumption, in an effort to improve the system's ability to effectively service M2M
applications.
Time control, meaning data can only be sent or received at specific predetermined periods.
Location specific triggers that alert or wake up devices when they enter particular areas.
M2M requirements
Scalability - The M2M system should be able to continue to function efficiently as more connected objects
are added.
Anonymity - The M2M system must be able to hide the identity of an M2M device when requested,
subject to regulatory requirements.
Logging - M2M systems must support the recording of important events, such as failed installation
attempts, service not operating or the occurrence of faulty information. The logs should be available by
request.
M2M application communication principles - M2M systems should enable communication between M2M
applications in the network and the M2M device or gateway using communication techniques, such as
short message service (SMS) and IP Connected devices should also be able to communicate with each
other in a peer-to-peer (P2P) manner.
Message transmission scheduling - M2M systems must be able to control network access and messaging
schedules and should be conscious of M2M applications' scheduling delay tolerance.
Message communication path selection - Optimization of the message communication paths within an
M2M system must be possible and based on policies like transmission failures, delays when other paths
exist and network costs.
Both terms relate to the communication of connected devices, but M2M systems are often isolated,
stand-alone networked equipment. IoT systems take M2M to the next level, bringing together disparate
systems into one large, connected ecosystem.
M2M systems use point-to-point communications between machines, sensors and hardware over
cellular or wired networks, while IoT systems rely on IP-based networks to send data collected from IoT-
connected devices to gateways, the cloud or middleware platforms.
Open API support Supports Open API integrations. There is no support for Open APIs
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
A Beginner’s Guide to Perspective
What’s “perspective?”
Perspective gives a three-dimensional feeling to flat images.
To achieve this effect, you need to draw nearer objects larger than further objects.
Linear Perspective
Linear perspective is the most well-known type of perspective.
Draw objects smaller as they become further away until they disappear at a certain “vanishing
point.”
Linear perspective has vanishing points, and everything else is based on the lines
leading to those vanishing points.
One-Point Perspective
This method has a single vanishing point, and everything converges towards that one
single point. One-point perspective is the simplest form of linear perspective and usually used
for rooms and corridors.
● Two-Point Perspective
This method has two vanishing points.
Two-point perspective is often used for drawing exteriors of buildings.
One feature of two-point perspective is that all the vertical lines are perpendicular to
the horizon.
● Three-Point Perspective
As you may imagine, three-point perspective has three vanishing points.
By adding a third vanishing point above (or below) the vanishing point of the two-point
perspective method, you can make the camera look up or look down at an object.
When drawing from these angles, a form of distortion called “height distortion” will
form.
Three-point perspective is a method for drawing such height distortion.
Eye Level
The phrase “eye level” is something you will see many times as you learn about
perspective.
Setting the eye level helps determine the overall structure of your illustration.
For example, setting the eye level to the same eye level as the character makes the
camera look directly at the person.
The eye-level is the same as the horizon if the camera is looking in the same direction.
Raising the eye level will also raise the position of the horizon.
In turn, lowering the eye level will also lower the position of the horizon.
Things to Take Care When Using Linear Perspective
Suppose you raised the eye level and horizon positions in a 1-point perspective like
the following illustration.
You’re supposed to be looking down at the box, but there’s too much height distortion
to make it look natural.
A value chain describes the full range of activities that firms and workers perform to
bring a product from its conception to end use and beyond, including design, production,
marketing, distribution, and support to the final consumer.
Sensors and RFID devices are working as inputs to the I-GVC through the capture
and transmission of data necessary for the development of information products.
Smart phones have also been developed that allow mobile devices to interact with
sensors and RFID.
This allows for a two-way interaction between a mobile terminal and the sensor
technology.
The data is used as one part of the input to the commodity chain, which uses it to
create the information products that are eventually exchanged.
In this sense, the sensor networks, and NFC and RFID technologies may be viewed as
subcontractors Resellers Intermediaries Data Factories Service Providers/ Data
Wholesalers End User Information Domestic and overseas input from human and
sensor-based ‘subcontractors’ to the I-GVC, workers that constantly gather data for
further processing and sale.
End-users
End-users that choose to use and participate within the digital world are now deeply
embedded into the very process of production.
Every human that enters a search query into a search engine,
Every human that agrees to allow the mobile broadband platform to inform a service
of their location,
Every human that uses NFC to allow a bank to establish and confirm their identity are
also functioning as subcontractors to the global information systems that form the
basis of the I-GVC.
Data factories
Data factories are those entities that produce data in digital forms for use in other
parts of the I-GVC.
Service providers/data wholesaler:
Service Providers and Data wholesalers are those entities that collect data from
various sources worldwide, and through the creation of massive databases, use it to
either improve their own information products or sell information products in various
forms.
Example: Twitter, Facebook, Google
Intermediaries
IIoT Architecture
These are the groupings of networked objects located at the edge of an IoT ecosystem.
These are situated as near as feasible to the data source. These are often wireless
actuators and sensors in an industrial environment.
What occurs at the network’s most remote edge? Sensors acquire data from both the
surrounding environment and the items they monitor.
Then, they transform the information into metrics and numbers that an IoT platform
can analyze and transform into actionable insights.
Actuators control the processes occurring in the observed environment. They modify
the physical circumstances in which data is produced.
In this aspect, edge computing provides the quickest answers since data is
preprocessed at the network’s edge, at the sensors themselves. Here, you can conduct
analyses on your digital and aggregated data.
Edge devices are restricted in their capacity for preprocessing. While you should
strive to reach as near to the edge as is realistically possible to limit the consumption of
native computational power, users will need to utilize the cloud for processing that is more
in-depth and thorough.
At this point, you must choose whether to prioritize the agility and immediacy of edge
devices or the advanced insights of cloud computing.
A hub: It offers a secure link to the on-site system in addition to telemetry and
device control. The hub provides remote connectivity to and from on-premises
systems, if required, across several locations. It maintains all elements of
communication, such as connection management, the secure communication
channel, and device verification and authorization.
Storage: It is useful for storing information before and after it is processed.
Analytics: It aids in data processing and analysis.
A user interface: It provides visualization for conveying the analysis findings
to the end user, often via a web browser interface and also through alerts via
email, text message, and/or phone call.
4. Internet gateways
Here sensor data is gathered and turned into digital channels for further processing at
the internet gateway.
After obtaining the aggregated and digitized data, the gateway transmits it over the
internet so that it may be further processed before being uploaded to the cloud. Gateways
continue to be part of the edge’s data-collecting systems.
They remain adjacent to the actuators and sensors and perform preliminary data
processing at the edge.
Gateways may be deployed as hardware or software:
5. Connectivity protocols
Protocols are required for the transfer of data across the IIoT system. These protocols
should preferably be industry-standard, well-defined, and secure.
IIoT systems are now capable of orchestrating, monitoring, and controlling operations
throughout the whole value chain.
The platforms control the device data and manage the analytics, data visualization,
and artificial intelligence (AI) duties from the edge devices and, in certain cases, the sensors
right through to the cloud and back.
The industrial internet reference architecture (IIRA) may serve as a reference for
developing sophisticated systems in the IIoT domain.
In general, the IIRA’s frameworks advocate that businesses design a framework using
a systematic approach, which includes feedback and iterations.
ONE MARK:
10. One of the main characteristics of Linked Stream Data is “Live Streaming”.
a) True
b) False
View Answer
Answer: a
Explanation: Most of the data on the web is from sensing devices. To facilitate the integration
of data from sensed devices and other sources, both sensor stream source and data are being
enriched with schematic descriptions, creating Linked Stream Data. It shows the live data
depending on our application.
11. The huge number of devices connected to the Internet of Things has to communicate
automatically, not via humans. What is this called?
a) Skynet
b) Bot 2 Bot
c) Machine 2 Machine
d) Intercloud
View Answer
Answer: c
Explanation: Devices are connected to other devices like mobiles, laptops, etc, to
communicate among themselves which is called machine to machine and that involves
wireless communication techniques, serial connection and powerline connection.
12. Internet of Things needs a lot of network connection. What is the proposed “white Space”
radio standard called?
a) Bluetooth
b) WiMax
c) Weightless
d) Zigbee
View Answer
Answer: c
Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast
digital TV. The development of so called “Weightless standard” is for the use of TV white
space and for IOT/M2M purpose. The main intention is to reduce the cost and power
utilization.
15. Open IoT ontology is extending the W3C SSN ontology which supports the description of
the physical and processing structure of sensors.
a) True
b) False
View Answer
Answer: a
Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is
anything that can calculate the value of the phenomenon. Thus, either a device or
Computational process or a combination of them could play the role of a sensor.
16. Open IoT manages the registration, data acquisition, deployment of sensors and
interconnected of objects, through which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP
View Answer
Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can
represent not only physical devices but in general any abstract or concrete entity that observes
features of any kind.
25. API architecture not only includes critical elements but also caters for
a) System
b) Devices
c) Network
d) Multi homing
View Answer
Answer: d
Explanation: API architecture not only includes critical elements but also caters for multi
homing, mobile networks with dynamic membership, and third party persistent storage based
on indirection.
30. Services are the way in which the IoT is connected to data.
a) Cloud
b) Bigdata
c) Internet
d) Network
QUESTION BANK:
3. Write about The international driven global value chain and global information
monopolies?
1. Sensing Layer
The sensing layer is the first layer of the IoT architecture and is responsible
for collecting data from different sources.
This layer includes sensors and actuators that are placed in the environment to
gather information about temperature, humidity, light, sound, and other physical
parameters.
These devices are connected to the network layer through wired or wireless
communication protocols.
2. Network Layer
The network layer of an IoT architecture is responsible for providing
communication and connectivity between devices in the IoT system.
It includes protocols and technologies that enable devices to connect and
communicate with each other and with the wider internet.
Examples of network technologies that are commonly used in IoT include
WiFi, Bluetooth, Zigbee, and cellular networks such as 4G and 5G.
Additionally, the network layer may include gateways and routers that act as
intermediaries between devices and the wider internet, and may also include security
features such as encryption and authentication to protect against unauthorized access.
3. Data processing Layer
The data processing layer of IoT architecture refers to the software and
hardware components that are responsible for collecting, analyzing, and interpreting
data from IoT devices.
This layer is responsible for receiving raw data from the devices, processing
it, and making it available for further analysis or action.The data processing layer
includes a variety of technologies and tools, such as data management systems,
analytics platforms, and machine learning algorithms.
These tools are used to extract meaningful insights from the data and make
decisions based on that data.Example of a technology used in the data processing layer
is a data lake, which is a centralized repository for storing raw data from IoT devices.
4. Application Layer
The application layer of IoT architecture is the topmost layer that interacts
directly with the end-user.
It is responsible for providing user-friendly interfaces and functionalities that
enable users to access and control IoT devices.This layer includes various software and
applications such as mobile apps, web portals, and other user interfaces that are
designed to interact with the underlying IoT infrastructure.
It also includes middleware services that allow different IoT devices and
systems to communicate and share data seamlessly.The application layer also includes
analytics and processing capabilities that allow data to be analyzed and transformed into
meaningful insights.
This can include machine learning algorithms, data visualization tools, and
other advanced analytics capabilities.
A reference model is a model that describes the main conceptual entities and how they
are related to each other, while the reference architecture aims at describing the main
functional components of a system as well as how the system works, how the system is
deployed, what information the system processes, etc.
M2M Device:
An M2M device connects to the Network Domain either directly or through an M2M
Gateway
Direct connection:
The M2M Device is capable of performing registration, authentication,
authorization, management, and provisioning to the Network Domain.
Direct connection also means that the M2M device contains the appropriate physical
layer to be able to communicate with the Access Network.
M2M Gateway:
This is the case when the M2M device does not have the appropriate physical layer,
compatible with the Access Network technology, and therefore it needs a network
domain proxy.
The M2M Gateway acts as a proxy for the Network Domain and performs the
procedures of authentication, authorization, management, and provisioning. An M2M
Device could connect through multiple M2M Gateways.
M2M Area Network:
This is typically a local area network (LAN) or a Personal Area Network (PAN) and
provides connectivity between M2M Devices and M2M Gateways
M2M Gateway:
The M2M Gateway contains M2M Applications and M2M Service Capabilities.
The M2M Gateway may also provide services to other legacy devices that are not
visible to the Network Domain.
The device that provides connectivity for M2M Devices in an M2M Area Network
towards the Network Domain.
Access Network:
The network that allows the devices in the Device and Gateway Domain to communicate
with the Core Network.
Core Network:
IP connectivity.
• Service and Network control.
• Interconnection with other networks.
• Roaming.
Functions use underlying Core Network functions, and their objective is to abstract
the network functions for simpler applications.
M2M Applications:
M2M applications (e.g. smart metering) that utilize the M2M Service Capabilities
through the open interfaces.
Functions required to manage the M2M Service Capabilities on the Network Domain
while the management of an M2M Device or Gateway is performed by specific M2M
Service Capabilities.
• An ARM consists of two main parts: a Reference model and a Reference Architecture.
The domain model captures the basic attributes of the main concepts and the relationship
between these concepts. A domain model also serves as a tool for human communication
between people working in the domain in question and between people who work across
different domains.
Model notation and semantics
Main concepts
The IoT is a support infrastructure for enabling objects and places in the physical world to
have a corresponding representation in the digital world.
Physical vs.
Virtual World
• The Devices are physical artefacts with which the physical and virtual worlds interact.
Devices as mentioned before can also be Physical Entities for certain types of applications,
such as management applications when the interesting entities of a system are the Devices
themselves and not the surrounding environment. For the IoT Domain Model, three kinds of
Device types are the most important:
1. Sensors:
These are simple or complex Devices that typically involve a transducer that converts
physical properties such as temperature into electrical signals.
These Devices include the necessary conversion of analog electrical signals into
digital signals, e.g. a voltage level to a 16-bit number, processing for simple
calculations, potential storage for intermediate results, and potentially communication
capabilities to transmit the digital representation of the physical property as well
receive commands.
A video camera can be another example of a complex sensor that could detect and
recognise people.
2. Actuators:
These are also simple or complex Devices that involve a transducer that converts
electrical signals to a change in a physical property (e.g. turn on a switch or move a
motor).
These Devices also include potential communication capabilities, storage of
intermediate commands, processing, and conversion of digital signals to analog
electrical signals.
3. Tags:
Tags in general identify the Physical Entity that they are attached to. In reality, tags
can be Devices or Physical Entities but not both, as the domain model shows.
An example of a Tag as a Device is a Radio Frequency Identification (RFID) tag,
while a tag as a Physical Entity is a paper-printed immutable barcode or Quick
Response (QR) code.
Either electronic Devices or a paper-printed entity tag contains a unique identification
that can be read by optical means (bar codes or QR codes) or radio signals (RFID
tags).
The reader Device operating on a tag is typically a sensor, and sometimes a sensor
and an actuator combined in the case of writable RFID tags.
Information Model
Virtual Entity in the IoT Domain Model is the “Thing” in the Internet of Things, the
IoT information model captures the details of a Virtual Entity- centric model. Similar to the
IoT Domain Model, the IoT Information Model is presented using Unified Modelling
Language (UML) diagrams.
Functional model
The IoT Functional Model aims at describing mainly the Functional Groups (FG) and their
interaction with the ARM, while the Functional View of a Reference Architecture describes
the functional components of an FG, interfaces, and interactions between the components.
The Functional View is typically derived from the Functional Model in conjunction with
high-level requirements.
Device functional group
The Device FG contains all the possible functionality hosted by the physical Devices
that are used for increment the Physical Entities.
The IoT Service FG corresponds mainly to the Service class from the IoT Domain
Model, and contains single IoT Services exposed by Resources hosted on Devices or in the
Network (e.g. processing or storage Resources).
The Virtual Entity FG corresponds to the Virtual Entity class in the IoT Domain
Model, and contains the necessary functionality to manage associations between Virtual
Entities with themselves as well as associations between Virtual Entities and related IoT
Services, i.e. the Association objects for the IoT Information Model.
Associations between Virtual Entities can be static or dynamic depending on the
mobility of the Physical Entities related to the corresponding Virtual Entities.
The purpose of the IoT Service Organisation FG is to host all functional components
that support the composition and orchestration of IoT and Virtual Entity services.
Moreover, this FG acts as a service hub between several other functional groups such
as the IoT Process Management FG when, for example, service requests from Applications or
the IoT Process Management are directed to the Resources implementing the necessary
Services.
The Management FG includes the necessary functions for enabling fault and
performance monitoring of the system, configuration for enabling the system to be flexible to
changing User demands, and accounting for enabling subsequent billing for the usage of the
system. Support functions such as management of ownership, administrative domain, rules
and rights of functional components, and information stores are also included in the
Management FG.
The Security FG contains the functional components that ensure the secure operation
of the system as well as the management of privacy.
The Application FG is just a placeholder that represents all the needed logic for
creating an IoT application. The applications typically contain custom logic tailored to a
specific domain such as a Smart Grid
Communication model
Safety
The IoT Reference Model can only provide IoT-related guidelines for ensuring a safe
system to the extent possible and controllable by a sys- tem designer.
Eg: smart grid.
Privacy
Because interactions with the physical world may often include humans, protecting
the User privacy is of utmost importance for an IoT system.
The IoT-A Privacy Model depends on the following functional components: Identity
Management, Authentication, Authorisation, and Trust & Reputation
Trust
Generally, an entity is said to ‘trust’ a second entity when the first entity makes the
assumption that the second entity will behave exactly as the first entity expects.”
Security
The Security Model for IoT consists of communication security that focuses mostly
on the confidentiality and integrity protection of interacting entities and functional
components such as Identity Management, Authentication, Authorisation, and Trust &
Reputation.
ONE MARK:
1. What happens when service providers change their operating system and communication
protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises
View Answer
Answer: a
Explanation: Complexity arises when service providers change their operating system and
communication protocols, which results in inoperability. Service providers use standard
protocols and conventional interfaces to facilitate information among diverse services.
12. is used to describe a perceived, quickly growing set of web based applications.
a) Web 4.0
b) Web 3.5
c) Web 2.0
d) Web 4.5
View Answer
Answer: c
Explanation: Web 2.0 to describe a perceived, quickly growing set of web based applications.
A topic that has experienced extensive coverage involves the relationship between Web 2.0
and service oriented architectures.
15. Services in a microservice architecture are that communicates with each other
over the network.
a) Microservices
b) SOA
c) API
d) Processes
View Answer
Answer: d
Explanation: Services in the microservice architecture are processes that communicate with
each other over the network in order to fulfill a goal. These services use technology agnostic
protocols.
24. Which is the example for smart grid edge device for utility?
a) Smart Meters
b) Smart Home
c) Smart Car
d) Smart Collage
View Answer
Answer: a
Explanation: One of the examples of Smart Edge Devices for Utility is Smart Meters.
25. According to the analysis on IoT application frame work, smart grid is divided into
layers.
a) 2layers
b) 3 layers
c) 4 layers
d)5 layers
View Answer
Answer: b
Explanation: According to analysis on IoT application framework based on a smart grid, node
features of various parts, distinct application needs and basic IoT model, IoT based on smart
grid is a combination of :
Perception layer
Smart network layer
Smart Application layer.
26. Monitor target of the smart includes sensor objects in the power link.
a) Perception layer
b) Smart network layer
c) Smart Application layer
d) Data layer
View Answer
Answer: a
Explanation: Monitor target of the smart perception layer includes sensor objects in the
power link, smart house hold objects and smart security objects.
27. layer can be divided into the data access network and the core network.
a) Perception layer
b) Smart network layer
c) Smart Application layer
d) Data layer
View Answer
Answer: b
Explanation: Smart network layer can be divided into the data access network and the core
network. The data on perception terminals and interaction terminals is uploaded to the power
access network and the Internet separately according to its type and security level.
28. In layer, various application platforms are built as required by the services
needs of smart grid.
a) Perception layer
b) Smart network layer
c) Smart Application layer
d) Data layer
View Answer
Answer: c
Explanation: In the smart application layer, various application platforms are built as required
by the services needs of smart grid. The application platform as required by the services
needs of smart grid.
Question Bank:
1. Industrial Automation
Autonomous vehicles don’t just imply self-driving cars or trucks. These also include
autonomous robots.
There are many examples of warehouses that have deployed robots that work without
human intervention.
Robots had been deployed earlier as well to work on factory floors. However, earlier,
they were guided by a defined set of tracks on which they would function.
They are also capable of determining any other human or robot in their path and
change their route accordingly.
The system deployed, allows humans to give instructions to these robots with the
click of a button on a tablet.
Now, the robots are also capable of working alongside their human counterparts
without any collisions.
These sensors are capable of monitoring and maintaining a pre-decided set of working
conditions for the machines.
Earlier, maintenance was done with the help of scheduled checking and reporting.
However, in the case of machines, age isn’t always a dependable criterion for
scheduling maintenance activities.
They monitor the health of the machines at all times and report any issues in the
machines at the time they occur.
Smart dust is tiny dust-sized sensors that would be deployed in the working
environment alongside the machines.
The data so collected will be stored on the cloud for further analysis.
It is not just in factories and manufacturing industries that IIoT finds its applications.
Although it has not been implemented widespread yet, IIoT could make a big
difference in the agriculture industry.
By implementing connected IIoT projects in large farms, the farmers can keep a track
of the yield from the field to the market.
Using satellite imaging and IIoT, the farmers can check various agricultural aspects.
These include soil quality, humidity, air quality, and temperature with the help of
sensors installed in the farmland.
The farmers can then regulate the irrigation and decide on the fertilizers to be given to
the plants..
5. Aerospace – Increasing Safety in Airplanes
Another major industry that makes the best use of IIoT is the airline industry.
At the manufacturing plants, companies use IIoT solutions to track the availability of
parts that are required.
Sensors collect the airplane machinery’s data at all times. The data is sent in real-time
to the manufacturer.
In case of any discrepancy, the suppliers would be able to fix the issue in time to save
time and money both.
Logistics can be touted as one of the front runners in terms of adopting IIoT.
Here millions of parcels are being packed and shipped across all corners of the world.
IIoT helps them track packages through easy-to-read scanners and LoRa to track
shipments without the need for a GPS system.
The manufacturing industry is using IIoT to ensure its perishables are being shipped
quickly and more efficiently.
Airlines are also using IIoT to diagnose issues in the aircraft for easy maintenance.
This ensures planes are safe to travel and also makes it easier to ship spare parts based
on diagnostics and maintenance.
One would imagine wearables to be only consumer-centric such as Fitbits and the
works.
But industries are leveraging the technology on their premises for their employees.
Organizations are using wearable devices on employees to ensure they are at their
best performance level. Various parameters are checked to ensure this.
Accordingly, they can upgrade their work areas to be more suitable for their
employees. This can include humidity, temperature, etc.
Other industries such as healthcare and pharma companies are also adopting the use
of IIoT wearables.
These wearable devices monitor the health of their employees. They also maintain a
conducive atmosphere, where a controlled environment is imperative.
Smart sensors and controls ensure the environment is well controlled automatically
for the best results in research and development.
Other industries can also leverage wearables to bring in efficiency and effectiveness
in the workplace.
Energy is by far the most important resource we have and ensuring that it is used to
the maximum without wastage, is imperative.
One such application is Smart Meters. They monitor energy consumption at particular
times and report it back.
Using this information, the meters can be programmed to make the optimum use of
energy during the times when the demand is low.
It can also manage the various energy demand spikes that occur during specific times.
The oil and gas industries also make use of IIoT well with smart sensors.
A commonly used IT term, Brownfield was borrowed from the building industry,
where brownfield land describes a geographical location where new buildings may be
constructed after considering the area's established structures and services.
Brownfield Vs Greenfield
The term greenfield was originally used in construction to designate land that has
never been used and therefore, involves no need to rebuild or to demolish existing
infrastructures.
In software development, the term references software built from scratch, in a new
environment, without the necessity to consider prior work or to integrate with other systems.
Greenfield, in sum, suggests a straightforward process and infrastructural
homogeneity.
The Downside Of Greenfield Development
How about the downside? For one thing, greenfield products may force companies to
dispose of devices that could have served them for decades.
Starting with a clean slate, at times, means discarding everything that had existed so
far. The compatibility issue is particularly poignant with industrial manufacturers.
Here, going greenfield means those whole infrastructures will need to be replaced.
As Ben Dickson predicted in 2016, “Such efforts cause the IoT landscape to grow in
many different directions at the same time, effectively becoming a fragmented hodgepodge of
incompatible and non-interoperable standards and protocols.”
Heightened implementation effort is needed here as well. The heritage hardware and
software may have taken years to put in use and cannot simply be discarded. When it comes
to the Industrial Internet of Things (IIoT), companies need to build on infrastructures that
cannot be easily replaced or where a replacement is not commercially viable.
Retrofitting
Wolfgang Thieme, Chief Product Officer at BTI, enumerates current approaches, the
most prominent of which is outfitting existing infrastructure with smart sensors to collect data
on the shop floor.
In this scenario, an IoT gateway aggregates data from remote sensors and
communicates the data to the cloud.
Retrofitting legacy assets—including assets that have no history of prior sensor
capabilities—with current IoT sensors is one step towards becoming IoT-ready.
Using Converters
Another approach towards full connectivity is to bring IoT to the programmable logic
controllers (PLCs) that manage and supervise existing automation systems.
Operating in a local environment without the ability to communicate with “the outside
world”, the PLCs process, not retain, huge amounts of production data that can be brought to
the cloud for analysis.
Recommended here is the use of a converter that extracts sensor data from the PLCs
using automation-specific protocols, and further communicates the data with the help of
wireless IoT connectivity.
IoT-ready remote I/O modules can close the gap between the edge and the cloud by
passing data from the edge directly to a variety of cloud platforms via MQTT and RESTful
APIs. The IoT-ready I/O modules are robust, suited for outdoor applications, and equipped
with wide-area communication capabilities.
Industry Insights
The potentials inherent in brownfield development are not yet fully untapped.
Advancements can be moving at a much quicker pace.
Many industrial manufacturers prefer to go entirely greenfield as the attraction of
starting from scratch also means no predefined parameters and no dealing with past
development efforts.
Brownfield developers are constrained by hardware, software, and design decisions
that put a strain on their own conceptual work.
Non-invasive incremental development is popular among industrial manufacturers as
it offsets the need for radical change while still offering a point of entry into the world of
digital transformation.
Managing The Brownfield
At Record Evolution, we have developed an IoT platform that facilitates brownfield
IoT development and supports the coexistence of different devices within highly
heterogeneous environments.
Tests can be run in the platform’s test environment until the finalization of a fully
customized migration strategy.
Platform Collaboration
Collaborative and community-building features enable developers to share their
findings with other users or external partners.
Developers can collect ideas, or, in the case of large enterprises, use the platform
internally across the entire company.
Instead, legacy devices and old architectures can be made IoT-ready thanks to an
open-ended, facilitator perspective on IoT development.
The concept of smart in IoT is used for physical objects that are active, digital,
networked, can operate to some extent autonomously, reconfigurable and has local control of
the resources. The smart objects need energy, data storage, etc.
A smart object is an object that enhances the interaction with other smart objects as
well as with people also. The world of IoT is the network of interconnected heterogeneous
objects (such as smart devices, smart objects, sensors, actuators, RFID, embedded computers,
etc.) uniquely addressable and based on standard communication protocols.
In a day to day life, people have a lot of object with internet or wireless or wired
connection. Such as:
o Smartphone
o Tablets
o TV computer
These objects can be interconnected among them and facilitate our daily life (smart home,
smart cities) no matter the situation, localization, accessibility to a sensor, size, scenario or
the risk of danger.
Smart objects are utilized widely to transform the physical environment around us to a
digital world using the Internet of things (IoT) technologies.
A smart object carries blocks of application logic that make sense for their local
situation and interact with human users. A smart object sense, log, and interpret the
occurrence within themselves and the environment, and intercommunicate with each other
and exchange information with people.
What are Smart Applications?
Insights are delivered in context as features in applications that enable users to more
efficiently complete a desired task or action.
They often take the form of recommendations, estimates, and suggested next actions.
Smart applications can be consumer-facing or employee-facing. In some cases, the “user” is
not a human, but a machine or system.
Data-driven, actionable insights are what make smart applications smart. A robust
data science practice to uncover actionable insights hidden in large volumes of data is a
prerequisite for successful smart applications.
By their nature, smart applications are dynamic, not static. They must be continuously
updated with new features and capabilities, which requires developers that ship code early
and often.
Agile isn’t just for developers. Data scientists must also take an Agile approach to
analytics to support smart applications. Data science is an iterative discipline, meaning data
scientists must be able to ask lots of questions of their data and update algorithms and models
daily.
Traditionally, application and software developers haven’t worked closely with data
engineers and data scientists.
TRADITIONAL ENTERPRISE
SMART APPLICATIONS
APPLICATIONS
Data-driven. Data science and machine Data blind. Most traditional enterprise
learning at scale that lead to actionable applications were not designed to ingest or use
insights are the lifeblood of smart output from analytical systems.
applications.
Deliver insights in context. Smart applications One size fits all. Traditional enterprise
seamlessly present personalized insights in the applications present similar views and features
context of the user experience to enable to all users with limited ability for
action. customization.
Dynamic and evolving. Developers and data Relatively static. Once operationalized,
scientists continuously evolve smart traditional enterprise applications are rarely
applications based on new data, insights, and updated in light of new data, insights, or user
user feedback. feedback.
Also, some artificial intelligence IoT devices may complete actions automatically,
minus waiting for the user to trigger them.
But it all depends upon:
1. IoT Sensors/Devices
Sensors are necessary to gather data from the environment consistently. Their primary
function is to enable connected IoT devices to collect and transfer relevant data for
real-time processing.
The Internet of Things leverages Sensors or Devices to gather data from connected
environments, and the sensors and devices can be chosen or modified based on the
requirement.
Targeted sensors like smoke detectors or temperature detectors are used for specific
purposes, whereas devices like beacons and QR codes with logos can be used for
multiple applications.
2. Connectivity
For data gathered by sensors to get into the cloud, it needs an uninterrupted channel
for transmission.Sensors and Interrelated computing devices get connected to the
cloud via various methods, including Satellite networks, mobile, Bluetooth, Wi-Fi,
router, or with a direct internet connection using ethernet.Selecting which
connectivity channel to use depends on your specific IoT application. Still, the
primary aim of connectivity channels is to transfer data onto cloud platforms.
3. Data Processing
After data successfully uploads to the cloud, computing software, and big-data
analytics process it to render it comprehensive and insightful for the end-user.For
instance, night vision and motion sensors can detect unauthorized activity within a
defined parameter. Still, the signals get sent to the user via an alert or video footage.
4. User Interface
IoT leverages a user interface to make data ready and practical for consumption by an
end-user. The IoT-connected devices display the processed information on a dashboard or
alert the user via any set and viable notification, as real-time system monitoring
occurs.IoT enables provisions for live system monitoring using a mobile phone or a web
browser app.
4 Key Aspects of IoT Success
1. Volume
The whole thing about IoT is that it does not rest. That means there is a constant flood
of data coming your way.
You'll have to find a way to stay afloat or you’ll drown in it. One way is to learn how
to swim, which means you do all the work yourself.
If you have a sizeable IT department with data analytics capabilities this might be
feasible. For others it will be easier to invest in flotation devices, i.e. data analytics and
visualization tools.
2. Variety
But it’s not all about the amount of data. Imagine you won free ice cream for the rest
of your life, delivered to your home at the start of every week.
Every Monday morning you would open your front door to receive a tub of vanilla ice
cream. After a few weeks or months you’re bound to get fed up. But what if every week
brought you a new and unexpected variety?
3. Velocity
One of the best things about IoT-produced big data is that you can get it in real time.
At the most basic level data velocity means immediate action if something goes wrong.
So if you calculate getting ROI by minimizing waste in the cold chain, velocity is
what gets you there.
For example, if your truck has a problem with its refrigeration unit, the driver gets
alerted and knows to call a functioning replacement or drive to a closer cold hub. Without
data velocity he’d happily keep going while the shipment melts and spoils.
4. Veracity
The most important thing in this blog is this: if your data is wrong it doesn’t matter how
much of it you get or how fast you collect it. So how to make sure you are collecting accurate
data? There are two main ways, namely automation and calibration.
There are four capabilities organizations need internally for harnessing big
data to create value: data democratization, data contextualization, data
experimentation and data execution.
Data democratization is capability to integrate data across the firm and enable a wide range
of employees to access and understand data where it is needed at any given time. The sheer
volume of data can be a challenge, but this can be alleviated when employees across the firm
can benefit from extracting insights from the data.
Data contextualization is the ability to assign meaning as a way of interpreting the data
within which an action is executed. Firms collect a significant amount and different types of
data, including data on customer behaviour, market demand, shifting preferences and
changing customer needs. The capability to identify the contextual clues to gain a holistic
view of customers is positively associated with better value creation.
Data experimentation is the firm’s capability to promote ‘trial and error’ and continuous
experimenting with the data and monitor the changes. The research suggests that a ‘trial and
error’ organizational culture, when coupled with a greater level of data accessibility, tends to
have a better chance to transform value from big data within the firm. Firms that put a lot of
emphasis on the robustness of the data itself rather than on experimentation are less
successful at extracting value.
Data execution is the capability to transform data insights into actions that lead to
identification of new opportunities that increase customer engagement thus creating value.
The researchers found variation in how firms execute big data insights and that the real value
of big data depended heavily on the speed of the firm’s execution ability.
What Is Serialization?
Serialization is the process of converting a data object—a combination of code and
data represented within a region of data storage—into a series of bytes that saves the state of
the object in an easily transmittable form. In this serialized form, the data can be delivered to
another data store (such as an in-memory computing platform), application, or some other
destination.
Serialization enables us to save the state of an object and recreate the object in a new
location. Serialization encompasses both the storage of the object and exchange of data.
Since objects are composed of several components, saving or delivering all the parts
typically requires significant coding effort, so serialization is a standard way to capture the
object into a sharable format.
In some distributed systems, data and its replicas are stored in different partitions on
multiple cluster members. If data is not present on the local member, the system will retrieve
that data from another member. This requires serialization for use cases such as:
Data formats such as JSON and XML are often used as the format for storing
serialized data. Customer binary formats are also used, which tend to be more space-efficient
due to less markup/tagging in the serialization.
Big data systems often include technologies/data that are described as “schemaless.” This
means that the managed data in these systems are not structured in a strict format, as defined
by a schema. Serialization provides several benefits in this type of environment:
A quick trip to your local retail store, supermarket, or convenience store would
suggest how inescapable the Internet of Things (IoT) has become in the retail sector. The
sectorial landscape has experienced a seismic shift with the evolution of IoT.
Today, stores are constantly leveraging emerging technologies like cloud, mobile,
RFID, beacons & more to provide connected retail services and offer better shopping
experiences to customers. And, with that, more than 70% of retailers feel confident that IoT
will significantly impact how they will do business in the future.
If you also want to leverage IoT applications in your retail business but wish to learn
more about the IoT capabilities that influence upcoming trends, business benefits & more. In
that case, the article is for you.
IoT refers to a network of physical devices, objects & spaces embedded with
Bluetooth beacons, sensors, Global Positioning System (GPS) & Radio-frequency
identification (RFID) technologies.
It helps brands track the location, condition & movement of their assets & inventory
anytime, anywhere. Retailers get 360-degree visibility by connecting and exchanging data
with systems & devices over the internet.
Listed below are two of the most common IoT applications in the retail industry:
1. Data collection & sharing: Devices embedded with sensors help track product and
shopping lifecycle. It would include tracking various forms of data, including environmental
& equipment, asset performance, stock levels & more. This information can be stored,
transformed & analyzed using algorithms to extract meaningful insights to optimize
operations.
2. Process automation: IoT-enabled connected stores and devices can be partially or fully
automated to bring efficiency, sustainability & resilience to retail operations and processes.
Further, retail automation helps increase the pace, precision & efficiency of supply chain
operations, inventory management, order fulfillment & checkout.
Due to the seismic shift in demand for IoT in retail, its market size is expected to hit
$177.90 billion by 2031.
North America will dominate the IoT in the retail industry.
It is attributed to factors including an increase in digitalization and the adoption of IoT
solutions by the retail sector.
However, the Asia-Pacific region is to witness the highest growth rate during the
forecast period (2031)
Factors include effective store space monitoring, inventory management, supply chain
management, and customer behavior monitoring. It will drive demand for IoT in the retail
market.
Optimization and automation of the supply chain is identified as the main
factor for IoT adoption
Further, connectivity technologies, including digital signage, top-of-the-shelf
displays, beacons, and price displays, will allow brands to access large volumes of
data on customer activity during in-store shopping.
IoT implementation in the retail industry is gaining momentum due to several reasons.
The technology aids in developing new business models, analyzing consumer behavior,
optimizing processes & increased employee productivity. Let’s look at the key benefits of
implementing IoT apps in retail.
Optimized Supply Chain Management: RFID & GPS technologies allow retailers to
identify and inspect every object across warehouses, in transit and on the shelves. Connected
sensors provide a consistent stream of real-time data from the floor to the store. It helps
identify potential bottlenecks, enable contingency planning, allow route optimization and
accelerate product delivery. It also enables manufacturers, suppliers and distribution centers
to optimize shipping & handling times while ensuring speedy delivery to vendors and
consumers.
Enhanced Customer Experience: IoT capabilities and machine learning algorithms can
accurately assess consumer data to personalize shopping experiences. Bluetooth Light Energy
(BLE) beacons can help personalize shopping by sending alerts & notifications about special
discounts and seasonal offers on smartphones based on a shopper’s location proximity.
Layout Optimization: Aisle analytics software clubbed with infrared sensors enables IoT
technology to improve the in-store layout. It helps optimize customer behavior. This data can
be used to understand buyer journeys, identify confused and impatient shoppers and
determine the reasons for abandoned carts. IoT retail analytics and Machine-learning-driven
demand forecasting can help the staff anticipate demand, supply & customer retention ratios
and make proactive decisions to adjust the shopping environment.
Efficient Inventory Management: RFID chips, beacons and sensors can seamlessly
synchronize assets and inventory with data centers. Smart price tags and digital displays
integrated with image analytics capabilities help improve control and order stock levels &
expiration dates in the warehouse and on the front shelves.
The modern retail ecosystem comprises various IoT devices, platforms, applications
& more. Here’s how retailers leverage IoT’s potential to navigate the changing retail
landscape.
Seamless In-Store Navigation
Sensor-based lights, temperature controls, security controls, stock monitoring, indoor
air quality (IAQ), and point-of-sale queuing assistance aid in enhancing the in-store
experience for shoppers.
Indirect advantages of the data extracted and analyzed from the IoT mentioned above
include compliance monitoring across lighting schedules, energy consumption, refrigeration
zones, warehousing, HVAC equipment performance & maintenance plans.
Costa Coffee uses a smart vending machine solution across its stores.
Incorporated a cashless payment system and remote temperature monitoring sensors. And,
features a secure loyalty card connectivity system for the vendor
Enabled, the coffee chain to get real-time information about cash collection, restocking and
more. It helped drastically reduce the overstocking challenge
Smart Shelves
Help track items to ensure they’re never out-of-stock, and check that things aren’t
misplaced on various shelves.
Fitted with weight sensors and RFID tags & readers allow scanning of the products on
both display and stock shelves. It makes your inventory process cost-effective and more
precise.
Additionally, by connecting each RFID tag to a reader, Smart Shelves can detect in-
store theft — saving money on security personnel and cameras.
Kroger, a US-based supermarket chain, has installed 2000+ Edge shelves (RFID-equipped
shelves) throughout the center of the supermarket, including most aisles with dry goods.
Automatic replenishment alerts (for items out of stock), misplaced item alerts,
Last scanned alerts (for prevention of theft),
Expired date notifications, customer interest notifications (how much is the item looked at,
picked up, put back, etc)
IoT: a Technological Advancement for Oil & Gas
Boris defines the essence of IoT in the oil and gas industry, unveils its benefits, and
describes how oil and gas companies use IoT solutions to their advantage.
If you need expert help to implement an advanced IoT solution for your oil and gas
business, don’t hesitate to contact ScienceSoft’s Internet of Things (IoT) team.
Upstream operators use it to enhance drilling and extraction management and reduce non-
productive time.
Midstream operators improve fleet management as well as pipeline and storage
maintenance.
Downstream businesses leverage IoT for optimized oil and gas processing and distribution.
Fleet management. IoT solutions enable real-time monitoring of tanker and vessel
location and condition, idle time, cargo status, etc. to optimize carrier use and facilitate
preventive maintenance. This feature can be further advanced with IoT-enabled geo-fencing.
Euronav, the world’s largest independent crude oil tanker company, employs a
centralized IoT-based platform called FAST (Fleet Automatic Statistics & Tracking) that
captures data from ships for real-time analysis.
End-to-end connected pipelines ensure safe and cost-effective oil and gas
transportation through IoT-enabled monitoring of pipeline parameters like temperature, flow,
pressure, etc. The collected data is used to detect abnormalities and helps optimize human
efforts and avoid accidents caused by equipment failures.
Shell launched an IoT solution called Digital Oilfield to enrich Shell Nigeria’s
pipeline facility with advanced capabilities such as remote pipeline surveillance and wellhead
monitoring, field data analysis, automation, etc.
Seismic exploration sensors help map subsurface drilling sites optimize the process
of oil exploration. A network of connected sensors collects seismic wave data and transfers it
to remote servers, which process the data and provide an image of the subsurface site. The
sensor-based system accelerates site selection data analysis and drives informed decision-
making.
From monitoring patient vitals in real-time to tracking medical assets, IoT is enabling
doctors and providers to deliver better, more proactive care.
In this post, we'll explore exactly what IoT is, the current IoT healthcare applications,
the major benefits it brings, and key challenges too.
Read on to learn how IoT is transforming modern healthcare and changing the future
for the better.
So, in healthcare, IoT-based healthcare systems collect a variety of patient data and
get inputs from doctors and medical professionals. Continuous glucose monitoring for insulin
pens is the best example of this.
All these devices can communicate with each other and take important actions that
would provide timely help to save someone’s life. After collecting the data, an IoT healthcare
device would send this critical information to the cloud so that doctors can act upon it.
From this, we can say that the potential application of IoT in healthcare can improve a
patient’s health, healthcare employee productivity, and hospital workflow.
As we have already discussed above, the healthcare IoT market is expected to show
an annual growth rate (CAGR 2023-2028) of 17.8%, leading to a market volume of
US$289.2 billion by 2028.
Some other key statistics on the current state of IoT in healthcare include:
Europe 25.70%
Latin America 9%
MEA 4.40%
Hospitals, clinics, nursing homes, and even patients' homes are starting to integrate
IoT devices into healthcare processes.
Wearables such as fitness trackers and smartwatches are some of the most commonly
used IoT devices in healthcare. They allow patients to track their fitness levels and monitor
their health conditions in real time.
Ingestible sensors are being used to monitor medication adherence and patient vital signs,
while computer vision technology is helping to identify early warning signs of diseases like
cancer.
Remote health monitoring via connected devices can save lives in the event of a
medical emergency like heart failure, diabetes, asthma attacks, etc.
Even for healthcare professionals to acquire data originating from multiple devices
and sources and analyze it manually is a tough bet.
ONE MARK:
9. XMPP supports .
a. Gaming b. CoAP
c. Polling d. Email
a. Public/subscriber b. Message
Answer:- D
Answer:- C
C) Laptop D) Tubelight
Answer:- D
Answer:- C
Explanation: AWS, Google Cloud, and Xiaomi Cloud deliver cloud computing IoT services.
But Myntra is an e-commerce website that supplies goods.
C) Laptop D) Tubelight
Answer:- D
Answer:- D
Answer:- A
Answer:- C
29. What “bit” represents the address bit in the control register?
A) MML B) ML C) MX D) MM
Answer:- C
Answer:- C
QUESTION BANK:
3. Briefly write about Value Creation from Big Data and Serialization?
As IoT usage becomes more widespread, the physical network of IoT devices grows
larger and more complicated to manage, with approximately 13.1 billionIoT devices in
operation today according to Statista.
An IoT governance model is an effective way to address data security and privacy
concerns, as well as legal, ethical, and public relations matters. It establishes the policies,
procedures, and practices that define how a company will design, build, deploy, and manage
an IoT system.
A good IoT governance model should serve as a roadmap to follow, addressing the
most pressing IoT concerns, including data security, data management, privacy, and
technological requirements.
The more comprehensive an IoT governance model is, and the more areas of concern
it covers, the more effectively it will overcome challenges and deliver successful results.
No two IoT governance models are alike. But there are three areas that any model
should cover.
Technical Architecture
Technical architecture is the blueprint to follow to design an IoT system and related
software. There may already be a technical architecture standard in place before the creation
of the IoT governance model.
This standard may be used as is or modified to suit the unique requirements of the IoT
governance model.
It may need modifying based on the volume of IoT devices that are added or
interacted with, the technical limitations of the physical IoT device, and the type of data the
IoT device will collect.
Given the nature of the subject, matters surrounding technical architecture are largely
established by technical experts such as coders, programmers, and project managers.
Data Management
Data management is one of the most complex and challenging components of an IoT
governance model.
That is because there are more than technical considerations to be made. How a
company collects, stores, and uses data is a major legal and ethical hurdle to overcome.
Data scientists, data analysts, and data engineers play a huge role in outlining the data
management components of an IoT governance model. For example, the data analyst may
outline what data should be collected and how it should be analyzed, while a data engineer
will propose the tools to be used for easy data access and interpretation.
Information Security
Information security refers to how secure an IoT device is. Following the
recommended manufacturer guidelines is the best way to secure an IoT device.
And those configurations should be reviewed when changes occur, such as when IoT
devices are added or removed from the network.
Information security also refers to the data collection process, including the type and
volume of data collected. If an IoT device collects Personally Identifiable Information (PII),
strict security measures should be in place to protect that data.
These include requiring users to provide additional proof of identity with MFA, and
encrypting sensitive PII during transmission from one IoT device to another device.
Stay Ahead With the Latest IoT Solutions
Preparation must be rooted in clarity. Dana Blouin, IoT thought leader, reports that
“the biggest mistake a company could make to put themselves in jeopardy would be to not
clearly define a data privacy policy, which clearly outlines what the scope of the data being
collected will be and how it will be used.”
Kirk Borne, Principal Data Scientist at Booz Allen Hamilton, reminds us that “the
promise of IoT is greater visibility and actionability.” Further, he contends that “this promise
can go unfulfilled” if we don’t ask the right questions, such as:
How do we ensure data quality, discovery, usability and security for the many
different teams and business units that create, use and manage the data?
What are the key business questions and goals that are driving what data we collect
and use?
“Data governance is getting evermore complex with the devolution of company tech
borders, [with] data flowing to and from a breadth of devices, which are more often mobile
and across a wider range of operating systems and platforms,” says Ian Moyse, Sales Director
at Axios Systems.
To many, governance is synonymous with control – that is, to ensure security and
compliance, even data quality.
But Chuck Martin, Editor at MediaPost, contends that it’s a mistake to “too tightly
restrict the ebb and flow of information, especially among and between connected devices.”
That kind of grip can quickly break down the agility and nimbleness for which we
strive.
6. Skipping compliance best practices
Compliance best practices are there for a reason and should be embraced. According
to Glen Gilmore, Principal at Gilmore Business Network (provider of digital marketing and
social business strategic consulting):
“The Federal Trade Commission (FTC) has urged business to adopt specific best
practices relating to big data and connected devices.
The failure to adhere to these articulated best practices is a failure of governance and
the Achilles’ heel of legal liability in the use of big data and IoT.”
Bill McCabe, Recruiter at SoftNet, says it’s a mistake to “underestimate the added
security and privacy demands that come with the introduction of IoT.”
When everything is connected, everything is at risk, Gilmore points out, and “a data
breach destroys consumer trust and can devastate an enterprise’s reputation and business.
In the rush to capitalize on big data and connected devices, businesses are putting
themselves at big risk by not putting privacy and security first.
We often assume that the infrastructure – both the platform and the people – are there
to support our innovations.
But Steele urges us to take a hard look at such assumptions. “The infrastructure that
data lands on is overlooked and is a critical foundation for dealing with mass amounts of data
in an efficient and secure way.
We need to take ownership of our data governance. Martin warns that we mustn’t fall
prey to “complacency regarding external technologies, expecting that outside suppliers have
products that are completely bulletproof.” Do the necessary due diligence to make sure
governance is covered – or pay the price.
Finally, we often wait until every possible kink has been smoothed. But don’t wait too
long. According to Daniel Newman, CEO at Broadsuite Media Group, “It’s a risk to wait on
leveraging the power of big data – but even if you aren’t jumping in strategically, your plan
to manage compliance needs to be a priority for when you do.” Translation: Get involved.
Vulnerability to Hacking: Researchers have been able to hack into real, on-the-market
devices with enough time and energy, which means hackers would likely be able to replicate
their efforts. For example, a team of researchers at Microsoft and the University of Michigan
found a plethora of holes in the security of Samsung’s SmartThings smart home platform,
and the methods were far from complex.
Are Companies Ready?: AT&T’s Cybersecurity Insights Report surveyed more than 5,000
enterprises around the world and found that 85% of enterprises are in the process of or intend
to deploy IoT devices. Yet a mere 10% of those surveyed feel confident that they could
secure those devices against hackers.
True Security: Jason Porter, AT&T’s VP of security solutions, told Insider Intelligence that
securing IoT devices means more than simply securing the actual devices themselves.
Companies also need to build security into software applications and network connections
that link to those devices.
Unwanted Public Profile: You’ve undoubtedly agreed to terms of service at some point, but
have you ever actually read through an entire document? The aforementioned FTC report
found that companies could use collected data that consumers willingly offer to make
employment decisions. For example, an insurance company might gather information from
you about your driving habits through a connected car when calculating your insurance rate.
The same could occur for health or life insurance thanks to fitness trackers.
Consumer Confidence: Each of these problems could put a dent in consumers’ desire to
purchase connected products, which would prevent the IoT from fulfilling its true potential.
IoT solutions for Smart Cities allow municipalities and utilities to make faster and
better decisions that will lead to greater efficiency, safety and quality of life for everyday
people. We live in a digitized world where IoT technology makes it possible for us to collect,
analyze and use data to optimize processes and the consumption of valuable resources.
The zenon Software Platform uses the wide spectrum of this technology for multiple
purposes, including:
Data acquisition: Hardware-independent data collection and transfer on all your
operations and equipment.
Visualization and control: The simplification and streamlining of complex processes
to give you more control and visibility.
Analytics and reporting: Calculations and estimates are made based on historical
and real-time data and with the help of advanced analytics, artificial intelligence, and
machine learning.
Engineering: The simplified configuration of automation solutions to make projects
easier for you to develop and manage.
Data management: The comparison and organization of real-time data on a city-
wide basis to make more intelligent and impactful decisions.
zenon has the power to analyze data and help develop Smart City solutions that can
improve sustainability, safety, and efficiency in cities all over the world. Smart City
technology can apply to many different city components, such as energy, water, buildings,
transportation, and traffic. See below to learn more about zenon’s wide-reaching solutions to
city challenges.
Energy
If you need a solution that allows you to secure energy supply or control your grid more
effectively, zenon is a proven and reliable way to streamline your processes and improve
network reliability in the city, so that everyone can depend on the energy they need to
function.Whether it is for smart grids, substations, hydropower plants, wind farms, or
photovoltaic systems, zenon provides an integrated environment for all applications.
Water
A reliable water supply is one of the most important services that every city needs. The zenon
Software Platform has capabilities to predict rates of water depletion and provide answers so
you can resolve problems. With zenon, maintenance technicians can stay on top of leaks or
other problems that may occur with the water supply through the help of alert messages. This
way, downtime is reduced and maintenance costs can be more easily controlled.
Smart Buildings
zenon offers utility management for Smart Cities by creating simple and effective solutions
for the operations and processes that take place in city buildings. For example, zenon can
help you come up with ways to save energy in public buildings to cut down on costs, waste,
and your impact on the environment.
This software has the ability to integrate energy systems and, it can do the same thing with
most systems that are needed to run a building. From heating and air conditioning to elevators
and electricity, zenon can take on the management of all these systems and condense it into a
more streamlined and data-driven automated process.
Transportation and Traffic
Another aspect of Smart City life that zenon can enhance is the public transportation and
traffic systems. For instance, you can use zenon to oversee and control lighting on airport
runways or to control overhead displays on high-traffic roads. Because one of zenon’s staple
functions is the conservation of energy, our software also monitors for possible savings in
public transportation energy usage.
With zenon, a city is no longer just a city — it’s something altogether smarter and
more in tune with tomorrow. Discover how to integrate Smart City technology and
automation into your city plans and processes with zenon today. Contact us now for more
information about our ever-developing Smart City solutions.
Data aggregation
Data aggregation is often used to provide statistical analysis for groups of people and
to create useful summary data for business analysis. Aggregation is often done on a large
scale, through software tools known as data aggregators.
Data aggregators typically include features for collecting, processing and presenting
aggregate data.
Data aggregators summarize data from multiple sources. They provide capabilities for
multiple aggregate measurements, such as sum, average and counting.
Voter turnout by state or county. Individual voter records are not presented, just the vote
totals by candidate for the specific region.
Average age of customer by product. Each individual customer is not identified, but for
each product, the average age of the customer is saved.
Data aggregation can also result in a similar effect to data anonymization -- as individual data
elements with personally identifiable details are combined and replaced with a summary
representing a group as a whole. An example of this is creating a summary that shows the
aggregate average salary for employees by department, rather than browsing through
individual employee records with salary data.
Aggregate data does not need to be numeric. You can, for example, count the number of any
non-numeric data element.
Before aggregating, it is crucial that the atomic data is analyzed for accuracy and that there is
enough data for the aggregation to be useful. For example, counting votes when only 5% of
results are available is not likely to produce a relevant aggregate for prediction.
Data aggregators work by combining atomic data from multiple sources, processing
the data for new insights and presenting the aggregate data in a summary view.
Furthermore, data aggregators usually provide the ability to track data lineage and can
trace back to the underlying atomic data that was aggregated.
Collection. First, data aggregation tools may extract data from multiple sources, storing it in
large databases as atomic data. The data may be extracted from internet of things (IoT)
sources, such as the following:
news headlines;
Processing. Once the data is extracted, it is processed. The data aggregator will identify the
atomic data that is to be aggregated. The data aggregator may apply predictive analytics,
artificial intelligence (AI) or machine learning algorithms to the collected data for new
insights. The aggregator then applies the specified statistical functions to aggregate the data.
Presentation. Users can present the aggregated data in a summarized format that itself
provides new data. The statistical results are comprehensive and high quality.
Uses for data aggregation
Data aggregation can be helpful for many disciplines, such as finance and business
strategy decisions, product planning, product and service pricing, operations optimization and
marketing strategy creation.
Users may be data analysts, data scientists, data warehouse administrators and subject
matter experts.
Aggregated data is commonly used for statistical analysis to obtain information about
particular groups based on specific demographic or behavioral variables, such as age,
profession, education level or income.
For business analysis purposes, data can be aggregated into summaries that help
leaders make well-informed decisions.
User data can be aggregated from multiple sources, such as social media
communications, browsing history from IoT devices and other personal data, to give
companies critical insights into consumers.
Smart City
A smart city uses Internet of Things (IoT) sensors in urban areas to collect data and
automate systems such as traffic, energy use, and waste management. By doing so, smart
cities improve the efficiency of urban services, reduce costs, and deliver a higher standard of
living.
These include IoT technologies, big data and analytics, edge computing, regional data
centers, 5G networks, cloud computing, artificial intelligence (AI) & machine learning
(ML), blockchain, and robotics.
Copenhagen 80.3
Seoul 74.3
Beijing 74.0
Amsterdam 72.6
Singapore 70.5
London 70.3
Zurich 69.7
Sydney 69.4
Toronto 69.1
Internet of Things (IoT) and the Smart City
The Internet of Things (IoT) refers to the network of physical objects, such as devices,
vehicles, and buildings, embedded with sensors, software, and connectivity, which enable
them to collect and exchange data.
These connected devices can communicate with other devices and systems, allowing
them to function and share data seamlessly.
Together, IoT and the smart city are being used to efficiently address the escalating
demands for resources of so many residents living, working, driving, and interacting with
each other.
For example, IoT and smart city initiatives are being applied to the improvement of
traffic management, energy consumption, public safety, healthcare, and more.
The foundation of smart cities relies on the utilization of Internet of Things (IoT)
devices and networks. These devices, in combination with software solutions, user interfaces,
and communication networks, enable and enhance the functioning and efficiency of smart
cities.
Ultimately, the goal is to have IoT technologies interconnected, with data flowing
seamlessly between devices, in order to create a truly smart city that can improve quality of
life.
The higher density offered by 5G means that it has the ability to support 10x more
connected devices, per square kilometer of network, as compared to 4G LTE.
DASH7
This standard is typically used in applications requiring modest bandwidth like text
messages, sensor readings, asset tracking, or location-based advertising coordinates.
Addressing
Addressing refers to the process of uniquely identifying and addressing IoT devices
and other network entities. This is necessary to ensure that data and commands can be
properly routed and delivered to the correct devices and systems in a smart city.
Smart city services and Internet of Things (IoT) applications are improving the way
we live. Examples range from greater safety on roads, to saving valuable time from daily
commutes, to providing cleaner air for people to breathe – their impact has already been felt
in cities around the globe.
1) Smart Urban Mobility
Traffic congestion is one of the key challenges of every city administration. IoT is
playing a key role in alleviating traffic congestion by making various types of real-time data
available on vehicular movement.
Traffic Monitoring
Smart traffic management solutions are being used to monitor and analyze traffic
flows. These systems optimize traffic lights and help prevent roadways from becoming too
congested, based on time of day or ‘rush hour’ schedules.
Smart Parking
Smart parking applications use cameras and other sensors to help drivers find
available parking spaces without continuously circling around crowded city blocks or parking
lots.
Sensors placed on parking spots transmit data to a server, which delivers information
to drivers via mobile phone applications or display boards. To-date, smart parking has
already increased the capacity of roads by 10%.
Connected Vehicles
Connected cars and transport services are growing in adoption, with their ability to
provide real-time traffic data and faster routes to drivers. According to Insider Intelligence,
connected cars will make up 97% of the total number of registered vehicles in the U.S. by
2035.
2) Urban Sustainability
Our world is transitioning to more environmentally-aware smart cities and IoT
technologies are the catalyst for this shift. Beyond existing initiatives – such as switching to
energy-efficient LED lighting or creating low-emission zones – smart lighting, smart meters,
and smart waste management are important examples of urban sustainability.
Smart Lighting
Smart lighting changes the intensity of street lights based on movement of vehicles
and pedestrians. This results in notable energy savings and reduction of light pollution. Also,
installing sensors to detect malfunctioning public lights reduces maintenance costs.
According to CTIA’s Smart Cities Playbook, smart lighting solutions have the
potential to save more than $1 billion per year across the United States. While in Europe, on a
more micro-level in the city of Guadalajara, Spain, 13,500 LED lights were connected to a
central management system, reducing street lighting energy consumption by 68%.
Smart Meters
Smart meters are IoT devices that are attached to buildings and connected to a smart
energy grid, allowing utility companies to manage energy flow more effectively.
Also, smart meters enable users to track their power consumption, leading to more
energy usage awareness and potential savings. Insider Intelligence predicts that utility
companies will save $157 billion by 2035 due to smart meter adoption.
As an example, Vodafone, one of the world’s largest wireless carriers, has over 12
million smart meter connections globally using its IoT technology, saving an estimated 1.6
million tons of CO2e.
One of the key purposes of a smart city is to improve the quality of life of its citizens
in both indoor and outdoor environments.
Internet of Things (IoT) technologies and data are advancing a wide range of urban
services, buildings, and infrastructure in order to achieve this purpose.
In particular, smart buildings use a number of IoT devices to support these goals,
including the following hardware:
Smart city and Internet of Things (IoT) technology are also working in tandem to
solve problems in air quality, building automation, and noise.
Specifically, air quality monitoring has been made possible with optical,
electrochemical, and beta attenuation sensors placed around a smart city.
Building Automation
IoT technologies are helping to improve the efficiency, safety, and comfort of public
buildings such as schools, libraries, government facilities, and community centers through
automation.
The goal with building automation is to enhance the end user’s experience and reduce
operating costs, all while providing a more sustainable environment.
Noise Monitoring
Different types of sensors and devices can be used for noise monitoring, such as
microphones, accelerometers, and geophones.
These IoT devices are placed strategically around a smart city to capture data on noise
levels, which is then transmitted to a central monitoring system.
ONE MARK:
1. The IoT platforms are mainly divided into how many types
a) 3 types
b) 5 types
c) 4 types
d) 2 types
View Answer
Answer: c
Explanation: The IoT platforms could be divided into four types:
eGovermnent related
Enterprise-based
Company based
Business oriented platform.
advertisement
4. The may become an important facilitator and stimulate for the modern
economy.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform
View Answer
Answer: d
Explanation: The pure business oriented IoT may become an important facilitator and
stimulus for the modern economy, by attracting investments and developing strategic
industry sectors.
6. The autonomous based IoT platforms are used for internal management of
the corresponding enterprise.
a) eGovermnent related
b) Enterprise-based
c) Company based
d) Business oriented platform
View Answer
Answer: c
Explanation: The autonomous enterprise based and company based IoT platforms are
used for internal management of the corresponding enterprise and as such are
supported by independent investments.
Answer: CoAP
c) RFID/NFC d) Bluetooth
Answer: Bluetooth
Answer: RFID/NFC
a) 2 b) 5 c) 4 d) 3
Answer: 4
21. specification defining the PHY and MAC layer of low power devices.
23. Which protocol is used to link all the devices in the IoT?
Answer: TCP/IP
Answer: CoAP
Answer: CoAP
27. enables seamless integration of LoWPAN devices with internet leveraging.
a) 2 b) 5 c) 3 d) 4
Answer: 4
29. Adheres to approach for managing resources and support mapping to HTTP.
Answer: RESTful
a) True b) False
Answer: True
QUESTION BANK:
4. Write about Data Aggregation for the IoT in Smart Cities, Security?