Things of Internet Iot
Things of Internet Iot
Things of Internet Iot
Q1> Can you explain what are the Technologies Involved In IoT Development of Internet/Web or
Networking Basics OSI Model .
Networking technologies enable IoT devices to communicate with other devices, applications, and
services running in the cloud.
Standard protocols specify rules and formats that devices use to establish and manage networks
and transmit data across those networks.
Networks are built as a “stack” of technologies. A technology such as Bluetooth LE is at the bottom
of the stack.
While others such as such as IPv6 technologies (which is responsible for the logical device
addressing and routing of network traffic) are further up the stack. Technologies at the top of the
stack are used by the applications that are running on top of those layers, such as message queuing
technologies.
This article describes widely adopted technologies and standards for IoT networking. It also
provides guidance for choosing one network protocol over another. It then discusses key
considerations and challenges related to networking within IoT: range, bandwidth, power usage,
intermittent connectivity, interoperability, and security.
Cellular :-
The LPWAN NB-IoT and LTE-M standards address low-power, low-cost IoT
communication options using existing cellular networks. NB-IoT is the newest of these
standards and is focused on long-range communication between large
numbers of primarily indoor devices. LTE-M and NB-IoT were developed
specifically for IoT, however existing cellular technologies are also frequently
adopted for long-range wireless communication. While this has included 2G (GSM)
in legacy devices (and currently being phased out), CDMA (also being retired or
phased out), it also includes 3G, which is rapidly being phased out with several
network providers retiring all 3G devices. 4G is still active and will be until 5G
becomes fully available and implemented.
Bluetooth Low Energy (BLE) :-
NFC
The near field communication (NFC) protocol is used for very small range
communication (up to 4 cm), such as holding an NFC card or tag next to a reader.
NFC is often used for payment systems, but also useful for check-in systems and
smart labels in asset tracking.
RFID
RFID stands for Radio Frequency Identification. RFID tags store identifiers and
data. The tags are attached to devices and read by an RFID reader. The typical
range of RFID is less than a meter. RFID tags can be active, passive, or assisted
passive. Passive tags are ideal for devices without batteries, as the ID is passively read by the
reader. Active tags periodically broadcast their ID, while assisted
passive tags become active when RFID reader is present. Dash7 is a
communication protocol that uses active RFID that is designed to be used within
Industrial IoT applications for secure long-range communication. Similar to NFC, a
typical use case for RFID is tracking inventory items within retail and industrial IoT
applications.
Wifi
Wifi is standard wireless networking based on IEEE 802.11a/b/g/n specifications.
802.11n offers the highest data throughput, but at the cost of high-power
consumption, so IoT devices might only use 802.11b or g for power conservation
reasons. Although wifi is adopted within many prototype and current generation
IoT devices, as longer-range and lower-power solutions become more widely
available, it is likely that wifi will be superseded by lower-power alternatives.
Ethernet
Widely deployed for wired connectivity within local area
networks, Ethernet implements the IEEE 802.3 standard. Not all IoT devices need
to be stationery wireless . For example, sensor units installed within a building
automation system can use wired networking technologies like Ethernet. Power
line communication (PLC), an alternative hard-wired solution, uses existing
electrical wiring instead of dedicated network cables.
INTERNET LAYER IOT NETWORK TECHNOLOGIES
Internet layer technologies (OSI Layer 3) identify and route packets of data. Technologies
commonly adopted for IoT are related to this layer, and include IPv6, 6LoWPAN, and RPL.
IPv6
At the Internet layer, devices are identified by IP addresses. IPv6 is typically used
for IoT applications over legacy IPv4 addressing. IPv4 is limited to 32-bit
addresses, which only provide around 4.3 billion addresses in total, which is less
than the current number of IoT devices that are connected, while IPv6 uses 128
bits, and so provides 2 128 addresses (around 3.4 × 10 38 or 340 billion billion billion
billion) addresses. In practice, not all IoT devices need public addresses. Of the
tens of billions of devices expected to connect via the IoT over the next few years,
many will be deployed in private networks that use private address ranges and
only communicate out to other devices or services on external networks by using
gateways.
6LoWPAN
The IPv6 Low Power Wireless Personal Area Network (6LoWPAN) standard allows
IPv6 to be used over 802.15.4 wireless networks. 6LoWPAN is often used for
wireless sensor networks, and the Thread protocol for home automation devices
also runs over 6LoWPAN. RPL
The Internet Layer also covers routing. IPv6 Routing Protocol for Low-Power and
Lossy Networks (RPL) is designed for routing IPv6 traffic over low-power networks
like those networks implemented over 6LoWPAN. RPL (pronounced “ripple”) is
designed for routing packets within constrained networks such as wireless sensor
networks, where not all devices are reachable at all times and there are high or
unpredictable amounts of packet loss. RPL can compute the optimal path by
building up a graph of the nodes in the network based on dynamic metrics and
constraints like minimizing energy consumption or latency.
MQTT
Message Queue Telemetry Transport (MQTT) is a publish/subscribe-based
messaging protocol that was designed for use in low bandwidth situations,
particularly for sensors and mobile devices on unreliable networks.
AMQP
Advanced Message Queuing Protocol (AMQP) is an open standard messaging
protocol that is used for message-oriented middleware. Most notably, AMQP is
implemented by RabbitMQ.
XMPP
The Extensible Messaging and Presence Protocol (XMPP) was originally designed
for real-time human-to-human communication including instant messaging. This
protocol has been adapted for machine-to-machine (M2M) communication to
implement lightweight middleware and for routing XML data. XMPP is primarily
used with smart appliances.
Your choice of technologies at this layer will depend on the specific application
requirements of your IoT project. For example, for a budget home automation system
that involves several sensors, MQTT would be a good choice as it is great for
implementing messaging on devices without much storage or processing power because
the protocol is simple and lightweight to implement.
In IoT networks, the physical layer can utilize various technologies depending on the
requirements of the application and the available infrastructure. Here are some commonly
used physical layer technologies in IoT:
The physical layer handles tasks such as encoding data into physical signals,
modulation/demodulation, channel access, signal amplification, noise reduction, and error
detection/correction. It ensures reliable transmission of data across the network, taking into
account factors like signal strength, interference, bandwidth, and latency.
It's important to note that different IoT applications may have specific requirements for data
rates, range, power consumption, and network coverage. Therefore, choosing an appropriate
physical layer technology is crucial to meet the unique demands of each IoT deployment.
1. Sensors: Sensors are fundamental components of IoT devices. They detect and measure
physical parameters such as temperature, humidity, light, pressure, motion, or location.
Sensors convert the physical signals into electrical signals that can be processed and
transmitted over the network. Examples of IoT sensors include temperature sensors,
proximity sensors, motion sensors, and GPS modules.
2. Actuators: Actuators are devices that can control or manipulate physical objects based on
the instructions received from the IoT system. They convert electrical signals into physical
actions. Actuators can include motors, servos, valves, switches, or relays. For example, an
IoT system can send a command to an actuator to turn on/off a light, open/close a door,
or control the speed of a motor.
3. Embedded Systems: IoT devices often contain embedded systems, which are specialized
computer systems designed to perform specific tasks within the device. These systems
consist of microcontrollers or microprocessors, memory, input/output interfaces, and
firmware. Embedded systems enable data processing, storage, and device control. They
can be found in various IoT devices like home automation systems, wearable devices, or
industrial monitoring systems.
4. Gateways: Gateways serve as intermediaries between IoT devices and the central IoT
network. They connect multiple devices to the network, aggregate and preprocess data,
and provide connectivity protocols translation. Gateways often have more processing
power, storage capacity, and communication interfaces compared to individual IoT
devices. They can enable local data processing, device management, and security
features.
5. Wearable Devices: Wearable devices are IoT devices that can be worn on the body, such
as smartwatches, fitness trackers, or healthcare monitoring devices. These devices can
collect data about the wearer's health, activity levels, sleep patterns, and transmit the
information to a central system for analysis and action.
6. Smart Home Devices: Smart home devices are IoT devices that automate and control
various aspects of a home, including lighting, heating, security systems, entertainment
systems, and appliances. These devices can be remotely monitored and controlled
through mobile applications or voice assistants.
7. Industrial IoT (IIoT) Devices: IIoT devices are used in industrial environments for
monitoring and optimizing processes, improving efficiency, and reducing downtime.
These devices can include industrial sensors, actuators, machinery, robotics, and other
equipment connected to the internet.
8. Connected Vehicles: IoT is increasingly being used in the automotive industry, enabling
vehicles to be connected to the internet and exchange data. Connected vehicles can have
features like real-time navigation, vehicle diagnostics, remote control, and entertainment
systems.
These are just a few examples of IoT devices, and the range of IoT devices continues to expand as
technology advances. The devices used in IoT can vary greatly depending on the specific
application and industry, but they all share the common characteristic of being connected and
capable of interacting with the internet and other devices.
Q7> How Zig Bee protocol of IoT will works explain in details .
Zigbee is a low-power, low-data-rate wireless communication protocol designed for
short-range communication in IoT (Internet of Things) networks. It operates on the
IEEE 802.15.4 standard, which defines the physical and medium access control (MAC)
layers for low-rate wireless personal area networks (WPANs). Here's how Zigbee
protocol works in detail:
Collision Avoidance:
Collisions occur when multiple devices attempt to transmit data
simultaneously, resulting in data corruption and loss. MAC protocols employ
collision avoidance techniques to minimize such occurrences. For example:
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance): In addition
to sensing the channel, devices also use a random backoff mechanism to select
a random delay before attempting to transmit, reducing the likelihood of
simultaneous transmissions.
Reservation-based protocols: Devices reserve time slots or frequency channels
in advance to avoid collisions. This approach is commonly used in TDMA or
FDMA-based MAC protocols.
Power Management:
IoT devices are often battery-powered and need to conserve energy. MAC
protocols incorporate power management techniques to optimize the energy
consumption of devices. For example:
Duty Cycling: Devices alternate between active and sleep states, where they
periodically wake up to transmit or receive data and then return to sleep mode
to conserve power.
Listen Before Talk (LBT): Devices listen to the channel before transmitting to
ensure it is not already in use. This helps reduce unnecessary transmission
attempts and conserves energy.
Quality of Service (QoS):
MAC protocols may support different QoS levels, depending on the
requirements of IoT applications. QoS parameters define characteristics such
as data reliability, latency, and bandwidth guarantees. The MAC protocol may
prioritize certain types of traffic over others to ensure critical data is
transmitted efficiently.
It's important to note that various MAC protocols exist, such as IEEE 802.15.4
for low-power wireless networks or IEEE 802.11 for Wi-Fi-based IoT
deployments. Each protocol may have its own specific mechanisms and
optimizations tailored to the requirements of the IoT environment in which it
operates .
Q9> Explain about the privacy risks in IoT .
Ans-
IoT (Internet of Things) devices and systems bring numerous benefits and
convenience, but they also introduce privacy risks due to the massive amount of data
collected, transmitted, and processed. Here are some key privacy risks associated
with IoT:
1. Data Collection and Surveillance: IoT devices gather vast amounts of data
about individuals, including personal habits, preferences, and behaviors. This
data can be collected without individuals' explicit consent or awareness,
leading to concerns about surveillance and invasion of privacy. Unauthorized
access to this data could result in profiling, tracking, or misuse.
2. Data Breaches and Unauthorized Access: IoT devices can be vulnerable to
security breaches, exposing sensitive data to malicious actors. Weak security
measures, inadequate encryption, or compromised devices can lead to
unauthorized access, data theft, and potential misuse of personal information.
3. Profiling and Behavioral Tracking: IoT devices collect data that can be used to
create detailed profiles of individuals, including their habits, preferences, and
daily routines. Profiling can lead to targeted advertising, discrimination, or
manipulation based on personal characteristics, raising privacy concerns.
4. Inadequate Consent and Control: IoT devices often operate in the
background, collecting data without individuals actively providing consent or
having control over their data. Lack of transparency and control over data
collection and processing can undermine privacy rights and individuals' ability
to manage their personal information.
5. Data Aggregation and Cross-Referencing: IoT devices generate a vast amount
of data across various contexts and environments. Aggregating this data from
multiple sources allows the creation of comprehensive profiles that reveal
detailed insights into individuals' lives. The combination of data from different
devices can unveil sensitive information, even if the individual data points
seem innocuous on their own.
6. Lack of Standards and Interoperability: The lack of consistent standards and
interoperability among IoT devices and platforms can pose privacy risks.
Incompatibility between devices and platforms may require sharing personal
data with multiple entities, increasing the potential for data exposure and loss
of control.
7. Third-Party Data Sharing: IoT systems often involve multiple stakeholders,
including device manufacturers, service providers, and third-party
applications. Data collected by IoT devices can be shared with these entities,
leading to concerns about how data is handled, shared, and potentially sold to
other parties.
8. Location Tracking: Many IoT devices, such as smartphones, wearables, or
vehicle trackers, collect location data. Continuous monitoring and tracking of
an individual's location can compromise privacy by revealing sensitive
information about their movements and habits.
9. Lack of User Awareness and Education: Users may not fully understand the
privacy implications of IoT devices or how their data is collected, used, and
shared. Insufficient user awareness and education can lead to unintentional
sharing of personal information or acceptance of terms and conditions that
compromise privacy rights.