IOT(Internet Of Things)
The Internet of Things (IoT) is a network of devices that can communicate with each other and the internet. IoT devices can collect and share data and can be used to monitor and control the physical world.

Introduction To Internet Of Things:
IoT stands for Internet of Things. It refers to the interconnectedness of
physical devices, such as appliances and vehicles, that are embedded with
software, sensors, and connectivity which enables these objects to
connect and exchange data. This technology allows for the collection and
sharing of data from a vast network of devices, creating opportunities for
more efficient and automated systems.
IOT is a system of interrelated things, computing devices, mechanical and
digital machines, objects, animals, or people that are provided with unique
identifiers. And the ability to transfer the data over a network requiring
human-to-human or human-to-computer interaction.
Four Key Components of IOT :
1.Device or sensor
2.Connectivity
3.Data processing
4.Interface
- Control Units: It is a unit of small computer on a single integrated circuit
containing microprocessor or processing core, memory and programmable
input/output devices/peripherals. It is responsible for major processing
work of IoT devices and all logical operations are carried out here.
Cloud computing: Data collected through IoT devices is massive, and this
data has to be stored on a reliable storage server. This is where cloud
computing comes into play. The data is processed and learned, giving more
room for us to discover where things like electrical faults/errors are within
the system.- Availability of big data: We know that IoT relies heavily on sensors,
especially in real-time. As these electronic devices spread throughout
every field, their usage is going to trigger a massive flux of big data. -
Networking connection: In order to communicate, internet connectivity is
a must, where each physical object is represented by an IP address.
However, there are only a limited number of addresses available according
to the IP naming. Due to the growing number of devices, this naming
system will not be feasible anymore. Therefore, researchers are looking for
another alternative naming system to represent each physical object.
Characteristics of IoT:
- Massively scalable and efficient.
- IP-based addressing will no longer be suitable in the upcoming future.
- An abundance of physical objects is present that do not use IP, so IoT is
made possible. - Devices typically consume less power. When not in use, they should be
automatically programmed to sleep. - A device that is connected to another device right now may not be
connected in another instant of time. - Intermittent connectivity – IoT devices aren’t always connected. In order
to save bandwidth and battery consumption, devices will be powered off
periodically when not in use. Otherwise, connections might turn unreliable
and thus prove to be inefficient.
Standardizing the IoT:
Smart objects produce large volumes of data. This data needs to be managed, processed,
transferred and stored securely. Standardization is key to achieving universally accepted
specifications and protocols for true interoperability between devices and applications.
The use of standards:
- ensures interoperable and cost-effective solutions.
- opens up opportunities in new areas.
- allows the market to reach its full potential.
- The more things are connected, the greater the security risk. So, security standards are
also needed to protect the individuals, businesses and governments which will use the
IoT.
Smart Machine-to-Machine (M2M) communications:
ETSI is one of the founding partners in oneM2M, the global standards initiative that covers
requirements, architecture, Application Programming Interface (API) specifications,
security solutions and interoperability for M2M and IoT .
Wireless Sensor Network (WSN):
Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed
in a large number of wireless sensors in an ad-hoc manner that is used to monitor the
system, physical or environmental conditions.
Sensor nodes are used in WSN with the onboard processor that manages and monitors the
environment in a particular area. They are connected to the Base Station which acts as a
processing unit in the WSN System.
Base Station in a WSN System is connected through the Internet to share data.
Industrial Internet of Things (IIoT):
- As the name suggests, these are IoT devices used in the industry.
- The large-scale implementation of IoT devices requires knowledge of many issues in the
field of, among others: IT security, robotics, inter-machine communication, automation,
the Cloud services, artificial intelligence (AI), machine learning, and Big Data. - Despite the high level of complexity, proper IIoT implementation has a number of
benefits, e.g. more accurate monitoring of quality and production rate, resource and
supply chain management, and improved workplace safety.
difference between IOT and IIOT:
Network Security:
Network Security refers to the measures taken by any
enterprise or organization to secure its computer network
and data using both hardware and software systems.
Different Types Of Network Security:
1. Access Control.
This refers to controlling which users have access to
the network or especially sensitive sections of the
network.
2. Antivirus and anti-malware software.
Malware, or “malicious software,” is a common form
of cyberattack that comes in many different shapes
and sizes.
Some variations work quickly to delete files or corrupt
data, while others can lie dormant for long periods of
time and quietly allow hackers a back door into your
systems.
3. Email security :
Email is an especially important factor to consider
when implementing networking security tools.
Thousands threat like scams, phishing, malware, and
suspicious links, can be attached to or incorporated
into emails.
4. Firewalls :
A firewall is a network security device that monitors
incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a
defined set of security rules.
Firewalls have been a first line of defense in network
security. They establish a barrier between secured and
controlled internal networks that can be trusted and
untrusted outside networks, such as the Internet.
5. Web security :
Web security software serves a few purposes. it limits
internet access for employees, with the intention of
preventing them from accessing sites that could contain
malware.
It also blocks other web-based threats and works to
protect a customer’s web gateway.
SPAMMING : the sending of multiple unsolicited emails or text messages,
usually for marketing purposes .
VIRUS : it's a computer program that can self-replicate, infect other
programs, and spread to other computer.
Phishing:
Phishing is a type of attack which attempts to steal sensitive
information like user login credentials and credit card
number.
It occurs when an attacker is masquerading as a trustworthy
entity in electronic communication.
Intrusion Detection System (IDS):
An Intrusion Detection System (IDS) is a system that
monitors network traffic for suspicious activity and issues
alerts when such activity is discovered for the harmful activity or policy breaching.
It is a software application that scans a network or a system.
Any malicious venture or violation is normally reported
either to an administrator or collected centrally using a
security information and event management (SIEM)
system.
IMMERSIVE TECHNOLOGY :
Immersive technology is an integration of virtual
content with the physical environment in a way
that allows the user to engage naturally with the
blended reality
Blockchain technology :
- Blockchain technology is a decentralized, digital
ledger that records transactions across a
network of computers. - Each block in the chain contains a number of
transactions, and every time a new transaction
occurs on the blockchain, a record of that
transaction is added to every participant's
ledger. - The decentralized nature of technology ensures
that no single entity can alter or delete previous
transactions, providing a high degree of security
and transparency
CLOUD COMPUTING :
- Cloud computing means storing and accessing the data
and programs on remote servers that are hosted on the
internet instead of the computer’s hard drive or local
server. - Cloud computing is also referred to as Internet-based
computing. - Cloud computing is the on-demand delivery of IT
resources through the internet with pay-to-use charges.
THREE MAJOR CLOUD SERVICE MODELS:
- Cloud computing services can be broken down into
three models
1. Software as a Service (SaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a Service (IaaS)
2. Platform as a Service (PaaS):
3. Infrastructure as a Service (IaaS):
Q. What is the main purpose of virtual reality technology?
- To create realistic simulations of real-world environments.
- To enhance the gaming experience.
- To improve communication and collaboration in remote teams.
- To enhance the visual effects of movies and television shows.
Q. In immersive technology, what does MR stand for?
- Mixed Reality
- Measured Reality
- More Reality
- Mirrored Realit
Q. What is a blockchain?
- A blockchain is a centralized digital ledger consisting of records
called blocks. - A blockchain is a decentralized, distributed, digital ledger consisting
of records called blocks. - A blockchain is a digital database consisting of records called class.
- It is a private ledger that no one can inspect.
Q. What is Machine learning?
- The autonomous acquisition of knowledge through the
use of computer programs - The autonomous acquisition of knowledge through the
use of manual programs - The selective acquisition of knowledge through the use
of computer programs - The selective acquisition of knowledge through the use
of manual program
Q. What is Cloud Computing?
- Cloud Computing means providing services like storage, servers,
database, networking, etc - Cloud Computing means storing data in a database
- Cloud Computing is a tool used to create an application
- None of the mentione
Grid Computing:
- Grid Computing can be defined as a network of
computers working together to perform a task that
would rather be difficult for a single machine.
- consists of a large number of computers which are
connected parallel and forms a computer cluster. This
combination of connected computers uses to solve a
complex problem.
- The task that they work on may include analyzing
huge datasets or simulating situations that require high
computing power.
- Computers on the network contribute resources like
processing power and storage capacity to the network.
A Grid computing network mainly consists of these
three types of machines:
- Control Node: A computer, usually a server or a group
of servers which administrates the whole network and
keeps the account of the resources in the network pool.
- Provider: The computer contributes its resources to
the network resource pool.
- User: The computer that uses the resources on the
networks.
What is Big Data Analytics?
- Big data analytics describes the process of uncovering trends,
patterns, and correlations in large amounts of raw data to help
make data-informed decisions.
- These processes use familiar statistical analysis techniques—like
clustering and regression—and apply them to more extensive
datasets with the help of newer tools.
- On a broad scale, data analytics technologies and techniques
give organizations a way to analyze data sets and gather new
information.
- Business intelligence (BI) queries answer basic questions about
business operations and performance.
Big data analytics tools and technology:
- Big data analytics cannot be narrowed down to a single tool or
technology. Instead, several types of tools work together to help
you collect, process, cleanse, and analyze big data. Some of the
major players in big data ecosystems are listed below.
- Hadoop is an open-source framework that efficiently stores and
processes big datasets on clusters of commodity hardware.
- NoSQL databases are non-relational data management systems
that do not require a fixed scheme, making them a great option
for big, raw, unstructured data.
Big data analytics tools and technology.
- MapReduce is an essential component to the Hadoop
framework serving two functions. The first is mapping, which
filters data to various nodes within the cluster.
- YARN stands for “Yet Another Resource Negotiator.” It is
another component of second-generation Hadoop.
Big data analytics tools and technology.
- Spark is an open source cluster computing framework that uses
implicit data parallelism and fault tolerance to provide an
interface for programming entire clusters.
- Tableau is an end-to-end data analytics platform that allows you
to prep, analyze, collaborate, and share your big data insights.
Tableau excels in self-service visual analysis, allowing people to
ask new questions of governed big data and easily share those
insights across the organization