0% found this document useful (0 votes)
106 views

IOT Notes

Uploaded by

muzammil04786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
106 views

IOT Notes

Uploaded by

muzammil04786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 93
TY. B.Sc. (IT): Sem. V Internet of Things Notes CONTENTS Topi i + | Syllabus @ The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles \ 1.1_| The Internet of Things : An Overview 2 1.2_| Design Principles for Connected Devices 7 1.3 _| Internet Principles 13 Thinking About Prototyping and Prototyping Embedded 25 " 2.1_| Thinking About Prototyping 26 2.2_| Prototyping Embedded Devices 30 Prototyping the Physical Design & eo Prototyping Online Components a 3.1. | Prototyping the Physical Design 44 3.2. | Prototyping Online Components 56 Techniques for Writing Embedded Code & Business Models v Techniques for Writing Embedded Code 64 Business Models 67 Moving to Manufacture & Ethics 75 v Moving to Manufacture 76 Ethics 86 Internet of Things TY. BSo. (IT): Sem. V Unit I Unit II Unit Il EVALUATION SYSTEM SYLLABUS The Internet of Things: An Overview : The Flavour of the Internet of Things, The “Internet” of “Things”, The Technology of the Internet of Things, Enchanted Objects, Who is Making the Internet of Things? Design Principles for Connected Devices: Calm and Ambient Technology, Magic as Metaphor, Privacy, Keeping Secrets, Whose Data Is It Anyway? Web Thinking for Connected Devices, Small Pieces, Loosely Joined, First-Class Citizens On The Internet, Graceful Degradation, Affordances. Internet Principles: Internet Communications: An Overview, IP, TCP, The IP Protocol Suite (TCP/IP), UDP, IP Addresses, DNS, Static IP Address Assignment, Dynamic IP Address Assignment, IPv6, MAC Addresses, TCP and UDP Ports, An Example: HTTP Ports, Other Common Ports, Application Layer Protocols, HTTP, HTTPS: Encrypted HTTP, Other Application Layer Protocols. Thinking About Prototyping: Sketching, Familiarity, Costs versus Ease of Prototyping, Prototypes and Production, Changing Embedded Platform, Physical Prototypes and Mass Personalisation, Climbing into the Cloud, Open Source versus Closed Source, Why Closed? Why Open? Mixing Open and Closed Source, Closed Source for Mass Market Projects, Tapping into the Community. Prototyping Embedded Devices: Electronics, Sensors, Actuators, Scaling Up the Electronics, Embedded Computing Basics, Microcontrollers, System-on- Chips, Choosing Your Platform, Arduino, Developing on the Arduino, Some Notes on the Hardware, Openness, Raspberry Pi, Cases and Extension Boards, Developing on the Raspberry Pi, Some Notes on the Hardware, Openness. Prototyping the Physical Design: Preparation, Sketch, Iterate, and Explore, Nondigital Methods, Laser Cutting, Choosing a Laser Cutter, Software, Hinges and Joints, 3D Printing, Types of 3D Printing, Software, CNC Milling, Repurposing/Recycling. Prototyping Online Components: Getting Started with an API, Mashing Up APIs, Scraping, Legalities, Writing a New API, Clockodillo, Security, Implementing the API, Using Curl to Test, Going Further, Real-Time Reactions, Polling, Comet, Other Protocols, MQ Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol 0 Unit IV Techniques for Writing Embedded Code: Memory Management, Types of Unit V Memory, Making the Most of Your RAM, Performance and Battery Life, Libraries, Debugging, Business Models: A Short History of Business Models, Space and Time, From Craft to Mass Production, The Long Tail of the Internet, Learning from History, The Business Model Canvas, Who Is the Business Model For? Models, Make Thing, Sell Thing, Subscriptions, Customisation, Be a Key Resource, Provide Infrastructure: Sensor Networks, Take a Percentage, Funding an Internet of Things Startup, Hobby Projects and Open Source, Venture Capital, Government Funding, Crowdfunding, Lean Startups. Moving to Manufacture: What Are You Producing? Designing Kits, Designing Printed circuit boards, Software Choices, The Design Process, Manufacturing Printed Circuit Boards, Etching Boards, Milling Boards. Assembly, Testing, Mass- Producing the Case and Other Fixtures, Certification, Costs, Scaling Up Software, Deployment, Correctness and Maintainability, Security, Performance, User Community. Ethics: Characterizing the Internet of Things, Privacy, Control, Disrupting Control, Crowdsourcing, Environment, Physical Thing, Electronics, Internet Service, Solutions, The Internet of Things as Part of the Solution, Cautious Optimism, The Open Internet of Things Definition. oo000Q0 “i Unit The Internet of Things: An Overview, Design Principle for Connected Devices and Internet Principles Weightage : 15 Marks The Internet of Things : An Overview The Flavour of the Internet of Things, The “Internet” of “Things”, The Technology of the Internet of Things, Enchanted Objects, Who is Making the Internet of Things? Design Principles for Connected Devices Calm and Ambient Technology, Magic as Metaphor, Privacy, Keeping Secrets, Whose Data Is It Anyway? Web Thinking for Connected Devices, Small Pieces, Loosely Joined, First-Class Citizens On The Internet, Graceful Degradation, Affordances. Internet Principles Internet_Communications : An Overview, IP, TCP, The IP Protocol Suite (TCP/IP), UDP, IP Addresses;-DNS,..Static IP Address Assignment, Dynamic IP Address Assignment, IPv6, MAC Addresses, TCP and" UDP:Ports,.An Example: HTTP Ports, Other Common Ports, Application Layer Protocols, HTTP, HTTPS : Encrypted’ HTTP, Other Application Layer Protocols. Topics : 1.1 The Internet of Things : An Overview 1.2 Design Principles for Connected Devices 1.3. Internet Principles Help Line : For any query WhatsApp to 704 501 85 39 & get it Solved 2| _Vidyalankar : T.Y. B.Sc. (IT) - loT 1.1 THE INTERNET OF THINGS: AN OVERVIEW > Introduction Q.1 Whatis oT? [0-18] Ans.: The Internet of Things (loT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low — or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. Fig. 1 : lo > The Flavour of the Internet of Things Q2 Ans.: Explain applications of loT. Discuss different flavor of loT. The alarm dynamically rings looking at the train time online, and your train must be delayed, so it lets you sleep in a little longer. In your kitchen, blinking lights at particular time reminds you to take medicine. On your way out of the house, you catch a glow in the corer of your eye. Your umbrella handle is lit up, which means that it predicts rain. ‘As you pass the bus stop on the way to the station, you notice the large LCD display flash that the number 23 is due. It arrives when you turn the next comer. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles [3 ‘On your lunch break, a pedometer in your training shoes and a heart monitor in your wrist band help track your run around the block. The wrist band’s large display also makes it easy to glance down and see how fast you are running and how many calories you've burned. All the data is automatically uploaded to your sports tracking site, which also integrates with your online supermarket shopping account to make it easy to compare with how many calories you've eaten. > The “Internet” of “Things” Q.3 Explain the different loT equation. [0-18] Ans.: All the cases we saw used the Internet to send, receive, or communicate information. And in each case, the gadget that was connected to the Internet wasn't a computer, tablet, or mobile phone but an object, a Thing. These Things are designed for a purpose: the umbrella has a retractable canopy and a handle to hold it. A bus display has to be readable to public transport users, including the elderly and partially sighted and be able to-survive poor weather conditions and the risk.of. vandalism. The sports bracelet is easy to wear while running, has a display that is largeyenough and bright enough to read even when you are moving,"and will'survive heat, cold, sweat, and rain. sia onset eeeeee contnouns, SENSORS, & ACTUATORS loT Equation A simple equation for the Internet of Things is shown in above figure in which a physical object follows the function. of the thing and being connected to the internet, it.can be controlled and monitored through internet. The sensor within or attached to the objects are connected:to-the internet via wired or wireless internet connections. Various local area connections for these sensors include ZigBee, Bluetooth, RFID, Wi-Fi, etc. These sensors also use wide area networks including GSM, GPRS, 3G, 4G, etc. It refers to the network of physical objects that are embedded with electronics, sensors, actuators, software and communication connectivity, in which the whole arrangement enables the exchanging of data, remote sensing and control of various objects or things. > The Technology of the Internet of Things a4 Discuss different technologies involved in loT. Ans.: Technology's great drivers have initially been fundamental needs, such as food and water, warmth, safety, and health. Information becomes key, too—hence, 4l Vidyalankar : T.Y. B.Sc. (IT) - loT the development of language to communicate technology to others. The technology behind the Internet of Things has been a long time in the making, even starting before we had computers. Machine-to-Machine (M2M) communication has been a thing for quite some time. The processing of data on web-connected servers in large data centers, what we refer to as the cloud, has also contributed greatly to the ability of everyday gadgets to become part of the loT. These devices may connect to the Internet by sending data to your phone or some other dedicated hardware in your home that acts as a hub over a local communication method, such as : Bluetooth Bluetooth LE (low energy) 6LowPan IEEE 802.15.4 NFC (near-field communication) ZigBee Z-wave That connection can be made directly through your router or modem via WiFi or wired methods like Ethernet, cable or power line networking (signals sent directly over your home's power lines). It could also bypass your home network entirely via cellular communication, They may also communicate with other smart devices in the vicinity. The) connected gadgets of the loT contain computing hardware, including processors with embedded programming telling them what to do, sensors that gather various’Sorts of readings (such as temperature, moisture, light, motion, chemical levels, heart rate and body movement) and communication hardware that can send and receive signals. Some connected systems may be able to use other nearby devices to gather data, like city road systems. that signal smartphones to help monitor traffic conditions. The devices may be run mostly via their’ own-embedded software or firmware, but they can also offload a lot of the processing to cloud-based software via the Internet. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet P! > Enchanted Objects as Ans.: as Ans.: Why have we yet to be enchanted by the internet of things? x § @2 8 OF ti EN Yit@ie Which objects should we enchant? tap Ree aq i) SOB Wf) v= Some believe the future will look like more of the same—more smartphones, tablets, screens embedded in every conceivable surface. David Rose has a different vision; technology that atomizes, combining itself with the objects that make up the very fabric of daily living. Such technology will be woven into the background of our environment, enhancing human relationships and channelling desires for omniscience, long life, and creative expression. The enchanted objects of fairy tales and science fiction will enter real life Who is making the Internet of Things? The Interet of Things (loT) continues to evolve and expand’ in'terms’ of the number of companies, products, and applications that illustrate just how beneficial it is becoming to connect our devices, appliances, homes, and vehicles together. Some companies like Nest have led the way and are becoming instantly recognizable. 1. SkyBell : SkyBell offers an award-winning smart video doorbell that allows you to see, hear, and speak to visitors whether you are at home or away. 2. Deako : Deako is quickly becoming a leading provider of smart light switches, thanks to beautiful design, innovative engineering and prices that fall below their competition 3. TP-Link : The loT company offers its Smart Wi-Fi LED bulb with color- changing hue to help you reduce energy consumption while controlling your lighting at home. While it connects directly to your home Wi-Fi you can also cl Vidyalankar : T.Y. B.Sc. (IT) - loT control it from anywhere through the Kasa app so you can adjust color and brightness, track your energy consumption, and set schedules for when it's on. 4. MyMDBand : This is a wearable digital device is actually a medical emergency bracelet. 5. Awair : This loT company has various products, including Awair Glow, which is an air monitoring device with a smart plug. It provides multiple benefits for consumers that use these loT products. The air monitoring aspect of the device tracks toxins and chemicals in the air and then offers a recommendation on how to improve the air quality. From innovative consumer products now available to industrial and commercial hardware and platform development -- it's clear that loT continues to expand and provide an exciting future of how connectivity can improve work and life productivity while ensuring that data and personal details are protected: > Block Diagram of loT az Ans.: Discuss with neat diagram block diagram of loT. Virtual world sends & receive data via receive data via ‘communication ~ EE communication Network Fig.: Block Dig of loT In order to have an aerial view of the infrastructure of an loT ecosystem, it is important to understand the following terminology : 1. Things" In:context to Internet of things, any object of the physical world or the information world that has @ unique identity. and can be integrated in a communication network is called ‘Thing’. The Things can be physical things as well as virtual things. 2. Physical World : So, there can be both physical things as well as virtual things in an loT system. The physical world in an loT system refers to the collection of physical things or devices. These physical things are capable of sensing, collecting, storing, sharing and processing information and may be capable of operating one or more actuators to impact in the real world. 3. Virtual World : In loT systems, virtual world refers to the collection of virtual things. These virtual things are generally web, cloud or mobile applications, APIs or application platforms. 4, Communication Network : In oT, communication network is link that allows interaction between the physical world and the virtual world. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Pr \7 1.2 DESIGN PRINCIPLES FOR CONNECTED DEVICES > Calm and Ambient Technology Q.1 Explain the term Calm and Ambient Technology. OR What is the difference between split flap display and Dot Matrix LED Display? Ans.: The loT has its roots in the work done by Mark Weiser at Xerox PARC. The work he did was not assumed that there would be network connectivity but focused more on how the system would look when the objects would be integrated this term is said to be ubiquitous computing. Ambient term has nothing related with foreground but is present in background. As per Mark Weiser, the term calm technology means systems which are not paid attention yet are ready to provide utility. or-useful: information when we decide to give them some attention Major issues for designing such systems are configuration, how to provide power to all these items, how they talk to each other, and how they communicate with us Configuration and user interaction;»are difficult problems to solve with just technical solutions. This is where good design and usability comes into picture. Example : Apple iPod Though wasn’t the first portable MP3_player, its overall interface made it easy to use. It is never/better to design a connected device in isolation, but always design. it in a way how the systemywill work in connection! As per Saarinen’s.“Always design a thing by considering it in its next larger context”. It becomes very complicated-when-system,start interacting —_Fig,: Apple iPod with each other, A great example is Live Wire, one of the first Internet of Things devices. Developed by Natalie Jeremijenko under the guidance of Mark Weiser, Live Wire which is known as Dangling String. It is a simple device: an electric motor connected to an eight-foot long piece of plastic string. The power for the motor is provided by the data transmissions on the Ethernet network to which it is connected, so it twitches whenever a packet of information is sent across the network. Under normal, light network load, the string twitches occasionally. If the network is overloaded, the string whirls madly, accompanied by a distinctive noise from the motor's activity. Conversely, if no network activity is occurring, Fig.: Live Wire an unusual stillness comes over the string. Both extremes of activity therefore alert the nearby human. 81 Vidyalankar : T.Y. B.Sc. (IT) - loT Talking about the displays, split-flap displays have been phased out in and are replaced by dot-matrix LED displays. The newer displays are much easier to update with new destinations. INTERNATIONAL DEPARTURE ae nT eg cea nt rt rt rt rt cr ABCOEF OHI JKLMNOPORSTUVWXYZ PE 5 c eevee Fig.: Dot Matrix LED Display They also have capabilities. such as horizontally scrolling messages which were impossible to add with the split-lap technology. The only problem is display updates, passengers waiting in a station terminal must stare endlessly up at the display waiting for their train to be announced, There has been some interesting’ experimentation in the use of screens around what has been called glanceable displays. Example : AirTunes WiFi speakers, which anyone play music through. Users will often wonder exactly what a particular track was but had no way of finding out who was in charge of the music at that moment and what was playing right now Fig.: WiFi Speaker To solve that problem it was suggested to use the display along with the system. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles | 9 > Magic as Metaphor Q2 Ans.: Discuss THE WHEREDIAL concept, also explain the concept of intelligent mirror. CASE STUDY: The WhereDial Developer John McKerrell is passionate about maps and location worked at MAPME. The Harry Potter franchise was near its peak, and in it one of the families, the Weasleys, has a clock which shows where each family member is. A friend suggested that John could use that as a way to visualise some of the location data that he was already gathering. John sourced a traditional carriage clock and rigged up a stepper motor to drive the clock mechanism, controlled by an Arduino which could talk to the service. The numbers on the clock-face™were replaced..with~a~collection of common location: home, work, shops, pub, restaurant, ete. Or, if the person wasn't in-a specific place, it would show that they were travelling. That gave him a nice piece to sit on his sideboard and show.whomever was at home the current location of both John and-his wife (one hand on the clock for each). Fig.: WhereDial Over the following years, John has refined the concept and turned it into an Internet of Things product. The software has been updated. to hook into more location services. a” Y Fig.: Intelligent Mirrors Intelligent Mirrors tend to show information which is useful as you start or end your day, in line with the expected times. You get the time and can check appointments and traffic and weather information while having your morning shower. Privacy : The Internet of Things devices concern us when it comes to matters of trust. With more sensors and devices, the privacy of third parties who cross our sensors’ paths is an important consideration. > Keeping Secrets az Ans.: Explain how Secrecy are maintained in loT. Example : Intelligent Parking Each parking is implemented by a small sensor, which has camera to tell whether the space is occupied. The sensors are connected in network and provides information about the car park. 10| _Vidyalankar : T.Y. B.Sc. (IT) - loT. Major issue was Find My Car, you need to enter some characters of your license plate, and system returns photos of matches—from optical character recognition. But security professional Troy Hunt found that the implementation has loophole. With one hacking software which information the user was requesting from the server which is in unencrypted form, even the reply is in unencrypted form for example, the IP addresses of each of the sensor units, but more importantly, it also included the full licence plate for each vehicle and the length of time it had been parked in the space which can be easily altered. : Intelligent Parking System > Hashes Q4 | What is Hashing? How it protects the password? Ans.: A hash is a string or number generated from a string of text. The resulting string ‘or number is a fixed length, and will vary widely with small variations in input. The best,hashing algorithms are designed’ so that it's impossible to turn a hash back into its original string: Password Hash Salting ser Pateword sa Ades Algor Hashed Password + Sat Fig.: Hashing The most common use of cryptographic hashes is in password verification. 1. When the user wants to authenticate, the hash can be recalculated; 2. Ifit matches the password is correct. 3. Adding salt to the password before applying the hash would give some more features. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles _| 11 4. This adds some random, non-secret extra text to the password before the hash is computed. The salt is then stored with the hash, so the service can coneatenate the two again when it needs to verify a newly presented password. 5. The salt prevents any attacker who ends up with a copy of the hash from easily comparing it to a dictionary of precompiled hashes to work out the password. > Small Pieces, Loosely Joined as Ans.: Explain the reason why loosely coupling is encouraged? OR State difference between Loosely Coupled and Tightly Coupled Systems. OR State Advantages of loosely coupled systems. One of the most important ideas in the world of software.engineering.is the concept of loose coupling, In..a-loosely"coupléd design, components\are independentyand*changes in one will not affect the operation of others. This ‘approach offers optimal flexibility and reusability when components are added, replaced; “or modified. (Conversely,a_ tightly /coupled=design™ means. that components tend to be interdependent. Changes in a single component can have a system wide impact, with unanticipated and undesirable effects. Loose Coupling is when two objects can interact with each other but/have very limited knowledge about what the other object can do. While this concept is relatively. simple to understand, its difficult to implement. Sometimes you may be under the gun to get a project out the door (hey, you gotta ship it, right?). ‘Some advantages of making your code loosely coupled include : * Better Testability : Because your code isn’t dependent on other objects and they are just passed in, this makes your unit tests easier to write. + Easy-to-understand code/: When) your code is decoupled from other objects;-they.areusually passed in or dependency injected into the cade. Your code provides a self-documenting service to your users. * Swappable components : While most developers don't think about a plug- in architecture, this is ultimately what developers strive to achieve. If you want to swap out the Oracle database component with a SQL Server component, if developed properly, it can be done easily. * Scalability : As your system grows, you can provide a diverse number of components to plug into your application, making it more scalable. There is a term I use when a system can't scale properly. It's called "painting yourself into a comer" where you need to re-evaluate your design. * Isolated Code/Features : Adding new features to a system means that you can write additional code without breaking existing functionality and feel safe writing it. 12] Vidyalankar : T.Y. B.Sc. (IT) - loT » First-Class Citizens on the Internet a6 Ans.: With example explain the term First Class Citizen in Internet. Initially in any new development, we may compromise and use ready protocols which are easier to work with. In some scenario the existing protocols don't work, itis better work with existing standards or develop new open standards. Example : Mobile web Servers Fig.: Mobile Server (PL REDRAW) Initially mobile phones were notvable to communicate in intemet as the interaction with web server was difficult so Wireless Application Protocol (WAP) was developed. So mobile is termed to be the First Class Citizen Device. > Graceful Degradation az Ans.: What is graceful Degradation? Explain with example. The process of maintaining basic functionality of the device even when major part of itis destroyed is known/as graceful degradation. Example, When mobile cannot get connected to network since it is on IPv4. and the everyone has shifted to IPv6, you would still be able to use its touchscreen to write messages, call, view photos and listen to music. > Affordances as Ans.: Explain the term Affordances with example. Atfordances are clues about how an object should be used: For example, A coffee mug which is used for drinking coffee can also use for holding writing utensils or even as a pot for growing small plants. For example, A light dimmer switch which has knob to give fine-grained control over the brightness. But when it is switched to home-automation, the issue is of synchronizing both the knob and the light level, as the brightness can be managed remotely. So the user cannot make rapid large changes and smaller, fine grained adjustments. The best way is whenever the lights are adjusted remotely let even the knob move automatically. Fig.: Automated Dimmer Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles _| 13 1.3 INTERNET PRINCIPLES > Internet Communications: An Overview Qi Ans.: Explain OS! Model with diagram. OSI Model : The Open Systems Interconnection [Application ‘Application (OS!) model defines a networking I t framework to implement protocols in [Presentation Presentation layers, with control passed from one T t layer to the next. It is primarily used -—go25on Session today as a teaching tool. It conceptually divides computer network architecture -—z u Fi Fi f 7 into 7 layers. ae a 1. Application Layer : The Application |__ Network. TREC layer_supplies-network services to t ‘end-user applications. Network |__Data Link Data Link: services-are- typically protocols that £ i work with user's data. For example, Physical Physical in a Web browser application, the Application layer protocol HTTP packages the data needed to send Network and receive Web page content. Fig.:, OSI Model. 2." Presentation Layer : It handles syntax processing of message data such as. format conversions and’ encryption / decryption needed to support the Application layer above it. 3. Session Layer : The Session Layer manages the sequence and flow of events that initiate and tear down network connections. 4. Transport Layer : It performs process to process communication for which it uses 16-bits port address. It supports a range of optional capabilities including error recovery, flow control, and support for re-transmission. 5. Networks Layer : It performs host to host communication for which it uses 32-bits IP address. It also performs fragmentation, 6. Data Link Layer : When obtaining data from the Physical layer, the Data Link layer checks for physical transmission errors and packages bits into data "frames". The Data Link layer also manages physical addressing schemes such as MAC addresses for Ethernet networks, controlling access of any various network devices to the physical medium. 7. Physical Layer : At Layer 1, the Physical layer of the OSI model is responsible for ultimate transmission of digital data bits from the Physical layer of the sending (source) device over network communications media to the Physical layer of the receiving (destination) device. 14] Vidyalankar : T.Y. B.Sc. (IT) - loT a2 Ans.: What is process to process communication? Process to process Communication : When two devices communicate with each other in a network, we would use an IP address which is of 32-bits that works at network layer of OSI model, such communication is known as host to host communication. Processes Processes if) LD ‘Anioteret . ‘Network ayer * Hosttorhostdeivery Transport yer Process to process delivery Fig.: Process to Process Communication. Logically, the processes in the machines actually communicate with each other, for which 16-bits port address is used, that works at transport layer of OSI model. > IP [Internet Protocol] a3 Ans.: Write a short note on IP. It is a network layer protocol used for host to host communication for which it uses an IP address. The data sent at this layer is known as packet, which has source and destination address printed on it. Many a times, the packets go through a number of intermediary machines, called routers, to reach their destination. > TCP [Transmission Control Protocol] a4 Ans.: Write a short note on TCP. It is a transport layer protocol used for process to process communication for which it uses a port address. The data sent at this layer is known as segment, which "has*source.and destination address printed on it. It is a connection oriented reliable protocol, it will be first'establishing the connection and then only start the data transfer and finally the connection is terminated:—Since it is reliable, sender will send data and wait till it receives an acknowledgement and then only proceed further with the remaining data transfer. It also performs error control, flow control and congestion control. > UDP [User Datagram Protocol] as Ans.: Write a short note on UDP. It is a transport layer protocol used for process to process communication for which it uses a port address. The data sent at this layer is known as segment, which has source and destination address printed on it. It is a connection less unreliable protocol, it will be directly start the data transfer without any establishment of any connection. Since it is unreliable, sender will send data and without waiting for any acknowledgement proceed further with the remaining data transfer. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles | 15 >» The IP Protocol Suite (TCP/IP) a6 Ans.: Explain in detail the TCP/IP suite. The TCP/IP protocol suite (a.k.a. Internet Protocol Suite) is a collection of protocols that collectively provides the data transport services used on the Internet. They provide a robust and efficient mechanism for moving data between machines across computer networks. Internet Protocol suite is the standard network model and communication protocol stack used on the Internet and on most other computer networks. The IP suite follows a client/server model, in which multiple client programs share the services of a common server program. Protocols in the suite define end-to- end data handling methods for everything from packetizing, addressing and routing to receiving. The suite is split into five layers : - Application Taye, sw || erp. || tere || bys || sume Boor?| Transport layer Network layer Bata tink ayer Underlying LAN or WAN vechnalogy, Physical layer TCPIIP Suite. TCP/IP functionality is-divided. into four layers, each of which include specific protocols. 1, The application layer provides applications with standardized data exchange. Its protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP). 2. The transport layer is responsible for maintaining end-to-end communications across the network. TCP handles communications between hosts and provides flow control, multiplexing and reliability. The transport protocols include TCP and User Datagram Protocol (UDP), which is sometimes used instead of TCP for special purposes. 3. The network layer, also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error reporting. 16] Vidyalankar : T.Y. B.Sc. (IT) - loT 4. The physical layer consists of protocols that operate only on a link -- the network component that interconnects nodes or hosts in the network. The protocols in this layer include Ethernet for local area networks (LANs) and the Address Resolution Protocol (ARP). > IP Addresses az Ans.: Write a short note on IP Addressing. It is also known as logical address or network address that works at network layer used for host to host communication which is of 32-bits. IPv4 addresses are stored internally as binary numbers but they are represented in decimal numbers because of simplicity. An example of IPv4 address is 192.168.10.100, which is actually 11000000.10101000.00001010.01100100 For Each.network;-one address is used to represent the network and one address is used for broadcast. Network address is an |Pv4 address with all host bits’are"0"» Broadcast address is an IPv4 address with all host bits are"1": > Static IP Address Assignment Qs Ans.: What is static IP address assignment? Also state advantages and disadvantages. A static IP address/is an address that is permanently assigned to you by your ISP\(as long as your contract is in good standing), and does not, change even if your computer reboots. A static IP address is usually assigned to a server hosting websites, and providing email, database and FTP services. A static IP address is also assigned toa commercial leased line, or public organization requiring same/IP address each and_every time. Since static IP address is assigned to you, you'll have to manually configure your machine (router or server) to use the static IP address assigned to you. Advantages : 1. Address-does not change - good for web servers, email servers and other Internet servers. 2. Use DNS to map domain name to IP address, and use domain name to address the static IP address. 3. Similar can be achieved with Dynamic DNS for dynamic IP address, but it's not as clean as the static IP address. Disadvantages : 1. Expensive than dynamic IP address - ISPs generally charge additional fee for static IP addresses. 2. Need additional security - Since same IP is assigned to a machine, hackers try brute force attack on the machine over period of time. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles _| 17 > Dynamic IP Address Assignment ag Ans.: What is dynamic IP address assignment? Also state advantages and disadvantages. ‘A dynamic IP address is an IP address dynamically assigned to your computer by your ISP. Each time your computer (or router) is rebooted, your ISP dynamically assigns an IP address to your networking device using DHCP protocol. Since your ISP dynamically assigns an IP address to a computing device on reboot, your device may not always receive the same IP address previous assigned to it. Even if your machine is always on and permanently connected, some ISPs do change IP address on-the-fly even though this is very rare. A sticky nature of DHCP generally reassigns same IP address to the same machine, it is not guaranteed to receive same IP address as IP pool may exhaust at times and lease time may expire. To find your dynamic IP address, you may visit What is my IP address page. Advantages: 1. Cheaper than static IP address. 2. Changing IP address gives more privacy Disadvantages : 1. Requires DHCP server to obtain an IP address. 2. Non-static. Each time IP address changes, you may have to find you IP address again. > IPV6 Q10 Ans.: Write a short note on IPv6. ‘* It is an improved version of IPv4, which uses 128-bit addresses, usually displayed to users as eight groups of four hexadecimal digits. « Here is an example of a full IPv6 address: FE80:0000:0000:0000:0202:B3FF:FE1E:8329 + IPv6 which was discussed during the 1980s and finally released in 1996. ‘* Even though it is"tess popular in market than IPv4 today, but one can easily upgrade from v4 to v6. * With wireless and network-attached devices increasing rapidly by the day, it was expected that by 2010, the internet would have exhausted all unique IPv4 addresses. To come up with a new standard of network layer protocol that allows more unique IP addresses to be created, IPv6 was standardized. > MAC Addresses an Ans.: Write a short note on MAC Address and also state difference between MAC and IP. A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, ‘such as an Ethernet card or Wi-Fi card, and therefore cannot be changed 18] Vidyalankar : T.Y. B.Sc. (IT) - loT Difference between MAC and IP : As shown MAC address is used for node to node delivery and IP address used for host to host delivery. Tor MAC Address ofc Fig.: MAG Address Vs IP Address. > TCP and UDP Ports Q2 Ans.: Write a short note on TCP and UDP ports. The Transmission Control Protocol (TCP) uses a set of communication channels called ports to manage among multiple different applications running on the same physical device. Unlike the physical ports on computers like USB ports or Ethemet ports, TCP ports are virtual - programmable entries numbered between 0 and 65535. On a TCP/IP network every device must have an IP address. The IP address identifies the device e.g. computer. However an IP address alone is not sufficient for running, network applications, as/@ computer can run multiple applications and/or services. Just as the IP address identifies the computer, The network port identifies the ‘application or service running on the computer. Port numbers are divided into ranges as follows: 1. Well known ports (Port numbers 0-1023)- These are allocated to server services by the Internet Assigned Numbers Authority (IANA). e.g Web servers normally use port 80 and SMTP servers use port 25 (see diagram above). 2. Registered Port (Ports 1024-49151)-These can be registered for services with the IANA and should be treated as semi-reserved. User written programs should not use these ports 3. Ports 49152-65535- These are used by client programs and you are free to use these in client programs. When a Web browser connects to a web server the browser will allocate itself a port in this range. Also known as ephemeral ports, Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles _| 19 TCP Sockets : ‘A connection between two computers uses a socket, it is the combination of IP address plus port. Port5000 Port 80 webserver 25 Fig.: IP Address and Port Address. > An Example : HTTP Ports * Imagine sitting on your PCat home, and you have two browser windows open * One looking at the Google website, and the other at the Yahoo website. * |The connection to Google would be : Your PC — IP1+port 60200 Google IP2 +port 80 (standard port) The combination 1P1+60200 =the socketon the client computer and IP2 + port 80 = destination socket on the Google server * The connection to Yahoo would be: your PC ~1P1+port 60401 Yahoo IP3 +port 80 (standard port) The combination 1P1+60401 = the socket on the client computer and IP3 + port 80__, = destination socket on the Yahoo server > Other Common Ports Even if you will rarely need a complete catalogue of all port numbers for services, you can rapidly start to memorize port numbers for the common services that you use daily. For example, you will very likely come across the following ports regularly: © 80HTTP 8080 HTTP (for testing servers) 443 HTTPS 22 SSH (Secure Shell) 23 Telnet 25 SMTP (outbound email) 110 POPS (inbound email) 220 IMAP (inbound email) > DNS (Domain Name Service) Q.13 What is DNS? Ans.: It is a service in network used for mapping human oriented name (URL) to system oriented name (IP address), this is required as humans are comfortable working with names and systems are comfortable working with numbers, so there is a need to map human name to system name 20| _Vidyalankar : T.Y. B.Sc. (IT) - loT S. 5 rceonse zm eS a ——— er with Web browser inne Fig.: DNS Representation Application Layer Protocols A protocdl is set of rules used to communicate between systems in a network. Although the application-layer-is'the medium through which you are able-to-communicate with other users, a set of protocols aré required to assist with this communication. For example, if you have to open a web page, you need the HTTP or HTTPS protocols. Similarly you would require POP3 or IMAP and SMTP for sending and receiving emails. > HTTP Q.14 Write a short note on HTTP. Ans.: “It is an application layer protocol used for accessing a’ web page. The client requests a web»page, assuming version of HTTP, 1.1. Assuming to access simple document at hitp://abe.com/home.tt. You can see the result if you open the URL in your web browser which will. show the content of the file. The basic structure of the request would look like this: GET /home.txt HTTP/1.1 Host: abc.com ‘As shown the entire message’ is in plaintext as we are using GET method. Finally, the server sends back its response. Previous fret name entered: First name entered: “Joe” Previous last name entered: ** Lastname entered: "Guy" Fest name: [New Last name: [Dude Enter GET method of HTTPs. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles _| 21 > The request/response cycle Q.15 Explain with diagram Working of Web server. Ans.: Working of Web Server / Apache / Httpd : Web server is responsible to host the website : Block Diagram : DNS (2) URL IP wowacom | 1.294 P1284 (4) Connection on port 80 7.1: Lookup for wow..c0m (5) Connection established Ser Sener ate (©) Rea. or webpage B a vw oom Web —— Client “SEND” Server nee (8) Give the webpage T re rere IT es] fen Connection terminated pa NNOGRO i 7, 8, 9, (1) URL | www.a.com in Browser Fos Fig. Working of Web Server. User gives the URL to the browser whichis further given to client. Client needs to known the-IP of webserver and hence it sends the request to DNS. DNS maps the URL to equivalent IP and gives it to client. Client first set up connection with web server on port 80. Ifweb'serveriis free, the connection is established. Client sends the request for the webpage with “GET” primitive. Server side processing, 1 Web server look up for the URL in the server table to convert the URL into path for example, www.a.com + Narhwwwia 2 Web server searches for the webpage in the given path inside the disk. 3 Web server fetches the webpage, if it is static it is directly given to client and if itis dynamic, it is processed by SSI or CGI and then will be given to client. Web server sends the webpage using “SEND” primitive. Client gives this webpage to the browser. Finally the connection will be terminated. 22| Vidyalankar : T.Y. B.Sc. (IT) - loT > The request/response cycle with HTML Q.16 Ans.: Explain request/response cycle of HTML. The operation of Hypertext Transfer Protocol (HTTP) involves the communication between a Hypertext Transfer Protocol (HTTP) client application (Usually web browser) and a Hypertext Transfer Protocol (HTTP) server application (Web servers like IS). Hypertext Transfer Protocol (HTTP) uses Transmission Control Protocol (TCP) as the Transport Layer Protocol at Well Known port number 80. Once the TCP connection is established, the two steps in Hypertext Transfer Protocol (HTTP) communication are 14. HTTP Client Request : Hypertext Transfer Protocol (HTTP) client sends an Hypertext Transfer Protocol (HTTP) Request to the Hypertext Transfer Protocol (HTTP) Server according to the HTTP standard, specifying the information the client like to retrieve from the Hypertext Transfer Protocol (HTTP) Server. 2. HTTP Server-Response : Once the Hypertext Transfer Protocol (HTTP) Request arrived at the Hypertext Transfer. Protocol (HTTP) server, it will process the=request and, creates an Hypertext Transfer" Protocol-(HTTP) Response message. The Hypertext Transfer Protocol (HTTP) response message may contain the resource the Hypertext Transfer Protocol (HTTP) Client requested or information why the Hypertext Transfer Protocol (HTTP) request failed. lent Sever HTTP Request HTTP Response | Listening at ort 80 Fig.: The request/response cycle with HTML. > HTTPS: Encrypted HTTP Qi7 Ans.: What is HTTPS? Also explain importance of encrypted HTTP. [0-18] As seen; the-request.and response are created in a simple text format i.e. in plaintext. In case of Man in the Middle-attack,.someone eavesdropped your connection that person can easily read the conversation. “Thus*compromising three goals if security i.e. Integrity, Confidentiality, Availability. 0 J aaa Host 8 Fig.: Man in the Middle Attack. The solution to this is send the request and response in an encrypted form, for this use a protocol service HTTPS. Unit | : The Internet of Things : An Overview, Design Principles for Connected Devices and Internet Principles | 23 The HTTPS protocol is actually just a mix-up of plain old HTTP over the Secure Socket Layer (SSL) protocol. An HTTPS server listens to a different port (usually 443) and on connection sets up a secure, encrypted connection with the client). When that's established, both sides just speak HTTP to each other as before! | HTTP vs HTTPS = = a= Fig.: HTTP VS HTTPs. > Other Application Layer Protocols Q.18 Discuss other application layer protocols. OR Write a short note on FTP, DHCP, Telnet, SMTP. [0-18] Ans.: | FTP (File Transfer Protocol) : * It used to’exchange files on the internet, to enable the data transfer FTP uses TCP/IP, FTP is most commonly used to upload and download files from the internet. + Ituses a reserved portino 21. DHCP : ‘Dynamic Host Configuration Protocol (DHCP) is used assigning IP addresses to computers-in..a_network, the IP addresses are assigned dynamically. IP address may change even when'the-computer is in network this means that DHCP leases out the IP address to the computer for some time. Main advantage of DHCP is that the software can be used to manage IP address rather than the administrator. DHCP Server Ethernet Client Client Client tient 1 2 3 1 Fig.: DHCP Cleint server. 24| _Vidyalankar : T.Y. B.Sc. (IT) - loT Telnet * It is an application layer protocol, which can be used on the internet or LAN(Local Area Network). * It provides a bi-directional interactive text oriented communication service by using virtual terminal connection. * Telnet is basically a client server protocol, which is based on a reliable connection- oriented transport. + Ituses a port number 23, to establish the connection with TCP (Transmission Control Protocol). SMTP (Simple Mail Transport Protocol) : ‘* It is an internet standard for e-mail Transmission. SMTP connections are secured with SSL (Secure Socket Layer). In SMTP, the messages are stored and then forwarded to the destination. SMTP uses a port number 25 of TCP. Qg0000 Unit Thinking About Il Prototyping and Prototyping Embedded Weightage : 15 Marks Thinking~About Prototyping : Sketching, Familiarity, Costs versus Ease of Prototyping, Prototypes and. Production... Changing .Embedded_ Platform, Physical Prototypes and Mass Personalisation, Climbing into the Cloud, Open Source versus Closed Source, Why Closed? Why Open? Mixing Open and Closed Source, Closed Source for Mass Market Projects, Tapping into the Community, Prototyping Embedded Devices : Electronics, Sensors, Actuators, Scaling, Up the Electronics, Embedded “Computing Basics, Microcontrollers, System-on-Chips, Choosing.-Your Platform, Arduino, Developing on the Arduino, Some Notes on the Hardware, Openness, Raspberry Pi,Cases and Extension Boards, Developing on the Raspberry Pi, Some Notes on the Hardware, Openness Topics : 2.1. Thinking about Prototyping 2.2 Prototyping Embedded Devices 26| _Vidyalankar : T.Y. B.Sc. (IT) - loT 2.1. THINKING ABOUT PROTOTYPING > Prototyping Q.1_ Whats a Prototype? Explain the benefits of prototyping. Ans.: A Prototype is said to be the early stage or a preliminary model of a product which explains its core functionalities. The process of creating a preliminary model of a product is called as Prototyping. Benefits of Prototyping : 1. It allows you to use the product physically and check whether it functions properly. 2. It helps to collaborate between the developers and designers to work on the same objectives as well as it serves a vital role when they pitch idea to the investors. 3. Ithelps saving the costs at the time of actual production, > Sketching Q.2/ Whatis Sketching? Ans.: Sketching is the first and the most important step in the process of Prototyping. Sketch gives a visualization to the idea. It involves noting down the ideas and exploring the problem space: It extends beyond the strict definitions to form a sketch. Sketching is the result of iterating through different approaches to check whether the idea works out as per expectation or not, Sketching offers a visual model for offering cognitive scaffolding to modify the perception. Fig.: Sketching process. Q.3 State difference between Sketching vs. Prototyping. Ans.: Sketching Prototyping 1. lExpressive Persuasive 2. [Suggest Describe 3._ Exploring Reforming 4. [Recommend Finalize 5. [Experimental Certain > Familiarity Familiarity is the second option for prototyping. It allows you to use those concepts with which you are familiar, rather than using those which you need to learn. For example : If you are making a device using Raspberry pi which allows you to code in different languages, then you can use that language with which you are familiar rather than learning Arduino right from scratch. Unit Il: Thinking About Prototyping and Prototyping Embedded | 27 > Costs Versus Ease of Prototyping a4 Ans.: Explain with an example how cost affects the ease of Prototyping. [0-18] Though familiarity provides ease for prototyping, but there is one more factor which needs to be taken into consideration, i.e., relation between cost of the platform and the efforts required to develop that platform. In other words, relation between the prototyping cost and production cost is one of the important factors in prototyping. It is not mandatory, but it would be beneficial if you use the same platform for both prototyping and the final production. This would not hamper the cost much at the time final production. > Case Study: Bubblino as Ans.: Write a short note on Bubblino. Bubblino is a bubble machine that bubble as many times as the number of tweets. ‘Components: Bluetooth enabled Arduino (Python Programmed Arduino), Nokia Phone. Working : The phone helped connecting to the Intemet and sehd the number of recent tweets to the Arduino. This triggered Bubblino to bubble that many times. Though Python is an easy scripting language but its compatibility with Series 60 was not proper. Thus, Perl script was used which worked by opening the COM port which represented the Bluetooth connection. This limited the Bubblino to work either by using a USB port or a Bluetooth Connection. Thus, this is not a mass production and requires more refinement with respective to cost and time effectiveness. |. Bubblino Bubblino > Prototypes and Productions a6 Ans.: Discuss the importance of prototypes and productions. [0-18] It may happen that while making the prototype you might have use programming languages or scripting languages with which you are familiar and with this you also might have gathered many investors and collaborators. But while moving towards the mass production, you may have to think to change or replace the platform. If you use a constrained platform, then you may find that you need to make changes to your code or limit your code. But in actual implementation you may find that very often you don't need to make changes in the platforms used in prototyping. 28| Vidyalankar : T.Y. B.Sc. (IT) - loT Changing Embedded Platform * Physical Prototypes and Mass Personalisation : Mass Production provides low cost products through large scale manufacturing, but number of varieties offered by such productions is very limited. As the demand for product variety increased, Mass Personalisation came into existence For example : The number of different automobile models increase as compared from year 1965 till date. In each such model, there can be many choices right from the powertrains to the interiors. This helps you to offer something unique with the accompanying potential to charge a premium. * Climbing the Cloud : There are many projects which requires to be changed from the basic web framework to the server software. Moreover, making such kind of changes in the early days of the project. would-require a strong server. The solution for this as. per the project demand one can move to cloud computing services like Amazon Web Service. * Case Study: DoES Liverpool : DoESLiverpool is an independent and self-funded hack-space incorporated as a community interest company. This company raises funds from membership fess to pay for room rent, machines, materials, cleaning, a part-time administrator and coffee. One of the’ product of this community is YAHMS. It is central heating controller system which consists of collection of sensors that/ measures the temperature both inside the room and outside, an actuator that turns the heating on or off, and avserver software to manage'timer for heating. Though, this is a timer based system, a user can log on to the YAHMS website to checkout the heating time. Thus, the interface of this system works well on both desktop and smartphone giving ease to the users. > Open Source Versus Closed Source az Ans.: Discuss Open Source Versus Closed Source. [0-18] Open Source : Open source allows computer source code to be shared-and..modified.free of charge by other users or organisations under a licensing agreement. In other words, it is a piece of software which can evolve and be iterated upon by other developers anywhere in the world. In case of Open Source, the software is evolved many times and during this evolution, it takes many twists and turns and becomes entirely different than its original version. For example, Android Closed Source : On the other hand, closed source is those software that are issued to authorized users or organisations with customized modifications and copying limitations. In other words, the software cannot be used or modified by anyone and anywhere. For example, Apple Unit Il : Thinking About Prototyping and Prototyping Embedded | 29 Key Points Open Source Closed Source Cost Free Cost vary with respect to complexity of software Service _|Poor Good Innovation [Innovation is more as the code __|innovation is less as the R&D is |could be changed discussed only on discussion Htorums. Usability |Less as itisnotreviewedby [High lexperts Security |Less as the software is not High lalways developed in a controlled lenvironment > Mixing Open and Closed Source Both open and closed source has its own pros.and:cons: In’ such case, companies. are keen to keep the libraries"as open source whereas the core code to be a proprietary softwaré which depends from»project to project. It is not necessary that both should coexist at a time. But at the same time, we as a responsible ‘citizen should contribute back on various discussion forums and communities to enhance the existing software. Closed Source for Mass Market Production One can choose closed source, when it is known that. your project is going to be huge and would be a mass market community. In a supply chain if you are the first to introduce a software which could be a mass market commodity and at a cheaper price, then there are chances that some other company may try to copy the product. Thus, in such cases, it is necessary that the software should be closed source. > Tapping into Community 8 — Explain different ways of tapping into community. Ans.: While thinking to make a software or an embedded system, one really needs to choose between open source or closed source platform. Thus, tapping into the community would be one of the useful options. For example : If you are thinking to-make-an.embedded system that uses Arduino platform and you are unaware of how to work with an’ Arduino, then community would provide answer for this. Now-a-days, you just need to type your query on Google and you get many youtube videos that could answer your query. Also, it provides results as many blogs and forums like Chumby Hacker Board which not will answer to your question but will also provide you with some code. ‘Community could be tapped in one more way, i.e., if you are confident enough to hire people to get a part of your project done. Mindshare could be one of the important options for you to scale up while hiring people. Also, meeting local people could be of great help to discuss your project. If you are not too open minded and you don't want to discuss your project over the internet, this platform could be very useful as you can discuss your project to limited people and would learn about others. 30| Vidyalankar : T.Y. B.Sc. (IT) - loT 2 PROTOTYPING EMBEDDED DEVICES > Electronics Qi Ans. State the importance of Electronics in loT. One of the industries that stands to gain the most from the IoT is the electronics industry. Electronics manufacturers have been connecting devices and appliances for years — the now ubiquitous availability of in-home WiFi and connectivity points is creating an environment that enables devices to constantly be connected into the cloud to send operational, warranty and service data. It's easy to see what a huge opportunity the connected home is creating for the electronics industry. Major components involved in loT are 1. Sensors 2. Actuator > Sensors and Actuators. Q2 Ans.: What are sensors and actuators meant for? OR Discuss the roles and responsibilities of Sensors and Actuators. A better term for a sensor is a:transducer. A transducer is any physical device that converts one form of energy into another. So, in the case of a sensor, the transducer converts some physical phenomenon into an electrical impulse that can then be interpreted to determine a reading. A microphone is a sensor that takes vibrational energy (sound waves), and converts it to electrical energy in a useful way for other components’in the system to correlate back to the original sound. Another type of transducer that you will encounter in many loT systems is an actuator. In simple terms, anactuator operates in the reverse direction of a sensor. It takes an electrical input and turns it into physical action. For instance, an electric motor, a hydraulic system, and a pneumatic system are all different types of actuators. In a typical loT system,~a~sensor.may collect information and route to a control center where a decision is made and a corresponding command is sent back to an actuator in response to that sensed input. Later, we will discuss where the control center resides in the greater loT system. Sensor Control Center Actuator iG) > pea © ipo > fe] > s Temperature Sends this Control center Sprinkler turns sensor detects detect signal to. sends command on and puts, heat. the control to sprinkler. out flame. center. ‘ensor, Controller and Actuator. Sensor : a device that converts a physical parameter to an electrical output. Actuator : a device that converts an electrical signal to a physical output. Unit Il: Thinking About Prototyping and Prototyping Embedded _| 31 > Scaling Up the Electronics a3 Ans.: What are the ways the electronics devices are placed? Wile a short note on breadboard. aie a short note on Stripboard. ‘ite a short note on PCB. The main part for prototyping is usually a breadboard which allows to fit components and wires to build up circuits without requiring any soldering. Further it can be switched to protoboard, Stripboard and PCB. Circuit Journey : 1. Using Breadboard : Breadboards.are-one-of the most.fundamental pieces when learning how to build circuits. While designing the citcuits the first step is placing the electronic devices properly on breadboard. This is very easy and/simple to configure and reconfigure as per the requirements. Fig:: Breadboard 2. Using Strip Board : A stripboard’is a circuit board with holes. and printed strips of metal. These boards are a good way of connecting simple to medium, complicated circuits, They give you a\lot of control of your connections and it's relatively easy to fix errors. Once the circuit is finalized. it is always. better to -—-~FIG+ Stripboard solder all the components on the stripboard. This is Useful-only-if.only one copy is to be maintained. 3. Using Printed Circuit Board : A printed circuit board (PCB) is an electronic circuit used in devices to provide mechanical support and a pathway to its electronic components. It is the traditional name for the bare board of which you supply us with the layout data and which you use to mount your components. PCB Layout To have more than one copy of the circuit design the circuit with a PCB as it is simple develop the circuit because the position of each component will be labelled, there will be holes only where the components can be integrated.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy