IOT(Internet Of Things)

The Internet of Things (IoT) is a network of devices that can communicate with each other and the internet. IoT devices can collect and share data and can be used to monitor and control the physical world.

IOT(Internet Of Things)

Introduction To Internet Of Things:

IoT stands for Internet of Things. It refers to the interconnectedness of 
physical devices, such as appliances and vehicles, that are embedded with 
software, sensors, and connectivity which enables these objects to 
connect and exchange data. This technology allows for the collection and 
sharing of data from a vast network of devices, creating opportunities for 
more efficient and automated systems.

IOT is a system of interrelated things, computing devices, mechanical and 
digital machines, objects, animals, or people that are provided with unique 
identifiers. And the ability to transfer the data over a network requiring 
human-to-human or human-to-computer interaction.

Four Key Components of IOT :

1.Device or sensor
2.Connectivity
3.Data processing
4.Interface

  • Control Units: It is a unit of small computer on a single integrated circuit 
    containing microprocessor or processing core, memory and programmable 
    input/output devices/peripherals. It is responsible for major processing 
    work of IoT devices and all logical operations are carried out here.

  • Cloud computing: Data collected through IoT devices is massive, and this 
    data has to be stored on a reliable storage server. This is where cloud 
    computing comes into play. The data is processed and learned, giving more 
    room for us to discover where things like electrical faults/errors are within 
    the system.
  • Availability of big data: We know that IoT relies heavily on sensors, 
    especially in real-time. As these electronic devices spread throughout 
    every field, their usage is going to trigger a massive flux of big data.
  •  
    Networking connection: In order to communicate, internet connectivity is 
    a must, where each physical object is represented by an IP address. 
    However, there are only a limited number of addresses available according 
    to the IP naming. Due to the growing number of devices, this naming 
    system will not be feasible anymore. Therefore, researchers are looking for 
    another alternative naming system to represent each physical object.

Characteristics of IoT:

  • Massively scalable and efficient.
  • IP-based addressing will no longer be suitable in the upcoming future.
  • An abundance of physical objects is present that do not use IP, so IoT is 
    made possible.
  • Devices typically consume less power. When not in use, they should be 
    automatically programmed to sleep.
  • A device that is connected to another device right now may not be 
    connected in another instant of time.
  • Intermittent connectivity – IoT devices aren’t always connected. In order 
    to save bandwidth and battery consumption, devices will be powered off 
    periodically when not in use. Otherwise, connections might turn unreliable 
    and thus prove to be inefficient.

Standardizing the IoT:

Smart objects produce large volumes of data. This data needs to be managed, processed, 
transferred and stored securely. Standardization is key to achieving universally accepted 
specifications and protocols for true interoperability between devices and applications.
The use of standards:

  • ensures interoperable and cost-effective solutions.
  • opens up opportunities in new areas.
  • allows the market to reach its full potential.
  • The more things are connected, the greater the security risk. So, security standards are 
    also needed to protect the individuals, businesses and governments which will use the 
    IoT.

 

Smart Machine-to-Machine (M2M) communications:


ETSI is one of the founding partners in oneM2M, the global standards initiative that covers 
requirements, architecture, Application Programming Interface (API) specifications, 
security solutions and interoperability for M2M and IoT .

 Wireless Sensor Network (WSN):


 Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed 
in a large number of wireless sensors in an ad-hoc manner that is used to monitor the 
system, physical or environmental conditions. 
Sensor nodes are used in WSN with the onboard processor that manages and monitors the 
environment in a particular area. They are connected to the Base Station which acts as a 
processing unit in the WSN System. 
Base Station in a WSN System is connected through the Internet to share data.

Industrial Internet of Things (IIoT):

  • As the name suggests, these are IoT devices used in the industry.
  • The large-scale implementation of IoT devices requires knowledge of many issues in the 
    field of, among others: IT security, robotics, inter-machine communication, automation, 
    the Cloud services, artificial intelligence (AI), machine learning, and Big Data.
  • Despite the high level of complexity, proper IIoT implementation has a number of 
    benefits, e.g. more accurate monitoring of quality and production rate, resource and 
    supply chain management, and improved workplace safety.

                      difference between IOT  and  IIOT:


 
 

Network Security:
Network Security refers to the measures taken by any 
enterprise or organization to secure its computer network 
and data using both hardware and software systems.

                                                             Different Types Of Network Security:
 1. Access Control. 
This refers to controlling which users have access to 
the network or especially sensitive sections of the 
network.

2.  Antivirus and anti-malware software.
Malware, or “malicious software,” is a common form 
of cyberattack that comes in many different shapes 
and sizes. 
Some variations work quickly to delete files or corrupt 
data, while others can lie dormant for long periods of 
time and quietly allow hackers a back door into your 
systems.

 3. Email security :
Email is an especially important factor to consider 
when implementing networking security tools.

Thousands threat like scams, phishing, malware, and 
suspicious links, can be attached to or incorporated 
into emails.

4. Firewalls :
 A firewall is a network security device that monitors 
incoming and outgoing network traffic and decides 
whether to allow or block specific traffic based on a 
defined set of security rules.
Firewalls have been a first line of defense in network 
security. They establish a barrier between secured and 
controlled internal networks that can be trusted and 
untrusted outside networks, such as the Internet.

 5. Web security : 
Web security software serves a few purposes. it limits 
internet access for employees, with the intention of 
preventing them from accessing sites that could contain 
malware. 
It also blocks other web-based threats and works to 
protect a customer’s web gateway.

SPAMMING : the sending of multiple unsolicited emails or text messages, 
usually for marketing purposes .


VIRUS : it's a computer program that can self-replicate, infect other 
programs, and spread to other computer.

Phishing:
Phishing is a type of attack which attempts to steal sensitive 
information like user login credentials and credit card 
number. 
It occurs when an attacker is masquerading as a trustworthy 
entity in electronic communication.

Intrusion Detection System (IDS):
 An Intrusion Detection System (IDS) is a system that 
monitors network traffic for suspicious activity and issues 
alerts when such activity is discovered for the harmful activity or policy breaching. 


It is a software application that scans a network or a system.

Any malicious venture or violation is normally reported 
either to an administrator or collected centrally using a 
security information and event management (SIEM) 
system.

IMMERSIVE TECHNOLOGY :
Immersive technology is an integration of virtual 
content with the physical environment in a way 
that allows the user to engage naturally with the 
blended reality

Blockchain technology :

  • Blockchain technology is a decentralized, digital 
    ledger that records transactions across a 
    network of computers.
  • Each block in the chain contains a number of 
    transactions, and every time a new transaction 
    occurs on the blockchain, a record of that 
    transaction is added to every participant's 
    ledger.
  • The decentralized nature of technology ensures 
    that no single entity can alter or delete previous 
    transactions, providing a high degree of security 
    and transparency

CLOUD COMPUTING :

  • Cloud computing means storing and accessing the data 
    and programs on remote servers that are hosted on the 
    internet instead of the computer’s hard drive or local 
    server. 
  • Cloud computing is also referred to as Internet-based 
    computing. 
  • Cloud computing is the on-demand delivery of IT 
    resources through the internet with pay-to-use charges.

THREE MAJOR CLOUD SERVICE MODELS:

  • Cloud computing services can be broken down into 
    three models

              1. Software as a Service (SaaS)
              2. Platform as a Service (PaaS)
              3. Infrastructure as a Service (IaaS)

2. Platform as a Service (PaaS):

3. Infrastructure as a Service (IaaS):

Q. What is the main purpose of virtual reality technology?

  • To create realistic simulations of real-world environments.
  • To enhance the gaming experience.
  • To improve communication and collaboration in remote teams.
  • To enhance the visual effects of movies and television shows.

Q. In immersive technology, what does MR stand for?

  • Mixed Reality
  • Measured Reality
  • More Reality
  • Mirrored Realit
     

Q. What is a blockchain?

  • A blockchain is a centralized digital ledger consisting of records 
    called blocks.
  •   A blockchain is a decentralized, distributed, digital ledger consisting 
    of records called blocks.
  •  A blockchain is a digital database consisting of records called class.
  • It is a private ledger that no one can inspect.

Q. What is Machine learning?

  • The autonomous acquisition of knowledge through the 
    use of computer programs
  • The autonomous acquisition of knowledge through the 
    use of manual programs
  • The selective acquisition of knowledge through the use 
    of computer programs
  • The selective acquisition of knowledge through the use 
    of manual program

Q. What is Cloud Computing?

  • Cloud Computing means providing services like storage, servers, 
    database, networking, etc
  • Cloud Computing means storing data in a database
  • Cloud Computing is a tool used to create an application
  • None of the mentione

Grid Computing:

  • Grid Computing can be defined as a network of 
    computers working together to perform a task that 
    would rather be difficult for a single machine. 

  • consists of a large number of computers which are 
    connected parallel and forms a computer cluster. This 
    combination of connected computers uses to solve a 
    complex problem.

  • The task that they work on may include analyzing 
    huge datasets or simulating situations that require high 
    computing power. 

  • Computers on the network contribute resources like 
    processing power and storage capacity to the network. 

A Grid computing network mainly consists of these 
three types of machines:

  • Control Node: A computer, usually a server or a group 
    of servers which administrates the whole network and 
    keeps the account of the resources in the network pool.

         

  • Provider: The computer contributes its resources to 
    the network resource pool.

  • User: The computer that uses the resources on the 
    networks.

What is Big Data Analytics?

  • Big data analytics describes the process of uncovering trends, 
    patterns, and correlations in large amounts of raw data to help 
    make data-informed decisions. 

  • These processes use familiar statistical analysis techniques—like 
    clustering and regression—and apply them to more extensive 
    datasets with the help of newer tools.

  • On a broad scale, data analytics technologies and techniques 
    give organizations a way to analyze data sets and gather new 
    information.

  • Business intelligence (BI) queries answer basic questions about 
    business operations and performance.

Big data analytics tools and technology:

  • Big data analytics cannot be narrowed down to a single tool or 
    technology. Instead, several types of tools work together to help 
    you collect, process, cleanse, and analyze big data. Some of the 
    major players in big data ecosystems are listed below.

  • Hadoop is an open-source framework that efficiently stores and 
    processes big datasets on clusters of commodity hardware.

  • NoSQL databases are non-relational data management systems 
    that do not require a fixed scheme, making them a great option 
    for big, raw, unstructured data. 
    Big data analytics tools and technology.

  • MapReduce is an essential component to the Hadoop 
    framework serving two functions. The first is mapping, which 
    filters data to various nodes within the cluster. 

  • YARN stands for “Yet Another Resource Negotiator.” It is 
    another component of second-generation Hadoop. 
    Big data analytics tools and technology.

  • Spark is an open source cluster computing framework that uses 
    implicit data parallelism and fault tolerance to provide an 
    interface for programming entire clusters. 

  • Tableau is an end-to-end data analytics platform that allows you 
    to prep, analyze, collaborate, and share your big data insights. 
    Tableau excels in self-service visual analysis, allowing people to 
    ask new questions of governed big data and easily share those 
    insights across the organization