2. Internet of Things : IOT VS M2M
Internet of things : IOT is known as the internet of things where things are said to be the
communicating devices that can interact with each other using a communication media.
usually every day some new devices are being integrated which uses iot devices for its
function. these devices use various sensors and actuators for sending and receiving data
over the internet. it is an ecosystem where the devices share data through a
communication media known as the internet.
2. Machine to machine : this is commonly known as machine to machine
communication. it is a concept where two or more than two machines communicate with
each other without human interaction using a wired or wireless mechanism.
M2M is an technology that helps the devices to connect between devices with/without
using internet. m2m communications offer several applications such as security, tracking
and tracing, manufacturing and facility management.
3. It is a technology
that allows devices
without the use of
the internet to
connect between
devices.
4.
5.
6.
7. Wireless Media Access Issues in Internet of
Things
When it comes to communication using a wireless medium, there is always a concern about the
interference due to other present wireless communication technologies. Wireless means
communication and message transfer without the use of physical medium, i.e., wires.
The very important issues which are observed are: Half Duplex operation, Time-varying channel,
and Burst channel errors.
1. Half Duplex operation:
Half-duplex transmission means when the sender and receiver both are capable of sharing data but
one at a time. In wireless transmission, it is difficult to receive data when the transmitter is sending
the data because during transmission a large amount or a large fraction of signal energy is leaked
while broadcasting.
The magnitude of the transferred signal and received signal differs a lot. Due to which collision
detection is even not possible by the sender, as the intensity of the transferred signal is larger than
the received one.
Hence, this causes the problem of collision and the prime focus should be to minimize the collision
8. 2. Time-varying channel :
Time-varying channels include the three mechanisms for radio signal propagations, they
are Reflection, Diffraction, and Scattering.
•Reflection –
This occurs when a propagating wave carrying information intrudes on an object that has
very large dimensions than the wavelength of the wave.
•Diffraction –
This occurs when the radio path between the transmitter and the receiver are collided by
the surface with sharp edges. This is a phenomenon which causes the diffraction of the
wave from the targeted position.
•Scattering –
This occurs when the medium through from the wave is traveling consists of some objects
which have dimensions smaller than the wavelength of the wave.
While transmitting the signal by the node these are time shifted and this is called multipath
propagation. While when this node signals intensity is dropped below a threshold value,
then this is termed as fade. As a result, Handshaking strategy is widely used so as a
healthy communication can be set up.
9. 3. Burst channel errors :
Burst channel errors are called as a contiguous sequence of symbols, which are
received in a communication channel, in which the first and last symbols has an
error and there is no evidence of contiguous sub-sequence of corrected
received symbols.
When time-varying channels are used, then signals strengths are introduced
due to which errors are observed in transmission.
10. Medium access control (MAC) protocol
Medium access control (MAC) layer protocols that are used in IoT are as follows;
For short range coverage protocols, the following are considered:
Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE
802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote
Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah.
For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-
M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied.
11. What is the sensor deployment?
Sensor deployment is performed to achieve objectives like increasing
coverage, strengthening connectivity, improving robustness, or
increasing the lifetime of a given WSN. Therefore, a sensor deployment
method must be carefully designed to achieve such objective functions
without exceeding the available budget
12. What is node discovery in IOT?
The node discovery command sends out a broadcast to every node in
the personal area network (PAN) ID. Each node in the PAN sends a
response back to the requesting node.
13. Data aggregation & dissemination
Data Aggregation technique is used to increase the lifetime of a
network by collecting information in an energy efficient manner.
Data Aggregation is the process of one or more sensor nodes and detects the
information result from the other sensor nodes.
The aim of the data aggregation is removes data redundancy and improves
the energy lifetime in wireless sensor network.
Therefore, reducing the number of data packets transmitted over the network
because of aggregation need less power as compare to multiple packets
sending having same data.
14. Data Aggregation Approaches
a) Cluster Based Approach:
Cluster Based Approach is defined as the hierarchical approach in which whole network is
separated into various cluster.
Each cluster has cluster heads and which does cluster choose from members.
The main role of cluster head aggregate data received from cluster members locally and then
transmits the result to base station.
The cluster head can share information with the sink directly via long range transmissions or
multi hopping using other cluster heads.
15. Tree Based Approach:
Tree Based Approach is actually defining aggregation concept which is used to
make aggregation tree.
This tree define as minimum spanning tree in which sink node act as root and
source node act as leaves.
Data start flowing from leave nodes up to root nodes.
The main disadvantage of this approach is data packet loss at any level of tree,
which may cause failure of the whole network
16. Multipath Approach:
Multipath Approach: This approach is used to overcome the drawbacks of tree
based approach.
Accordingly, to this approach, each and every node could send data packets over
multiple paths using multiple neighbors in the aggregation tree.
So a data packet sends from source to destination using multiple paths with the
help of intermediate nodes.
The example of this approach like ring topology. Overhead is the disadvantage of
this approach.
17. Hybrid Approach:
Hybrid Approach: The Hybrid Approach is the mixture of cluster based approach,
multipath approach and tree based approach.
This approach is mainly used for adaptively for optimal performance of their data
aggregation.
18. Data Dissemination
Data Dissemination is the process in which sensor nodes are collecting the data
and communicate to the base station or any other interested node.
The source node is generating the data and the information to be reported is
known as event. Those nodes which are interested in event and seek information
are known as sink. So in this whole process data are routed in sensor network.
It is two steps process; in first step interested nodes are broadcast to their neighbor
nodes in the network and in second step nodes after receiving the request nodes
sends requesting data.
19. Data Dissemination Approach
Flooding: If the destination node is not receive the data packet or specified
number of hops is not reached.
Then each node broadcast the gathered data until the packet is reached to their
destination node.
The main advantage of flooding is not requiring costly topology maintain or
route discovery, but it faces several problems like implosion, overlap, and
resource blindness.
20. Gossiping:
Gossiping:
The gossiping is the version of flooding approach. In this
approach, the packet is sent to a single neighbor chosen from the
neighbor table randomly instead of broadcasting each packet to
the entire neighbor.
This process can take a long time from completion.
Gossiping avoids the problem faced in flooding approach like
implosion.
21. SPIN: (Sensor Protocol for Information via Negotiation)
SPIN: (Sensor Protocol for Information via Negotiation) this is the enhancement of
flooding protocols based on data centric routing.
Flooding has mainly three problems like: implosion, overlap and resource blindness. To
overcome these issues the spin family protocols uses three type of messages ADV, REQ,
DATA. SPIN uses three types of messages, ADV, REQ and DATA.
The ADV message is broadcasted by a node which has some data. This message is
broadcasted by the node. This message will say about the type of data contained by the
advertising node.
The nodes which are interested in the event to transmit REQ message for DATA. After
receiving the REQ message, source node sends a DATA message to interested node. In
this way, data can reach to all interested node in entire network.
This technique prevents the issues' of implosion, overlap, and resource blindness which is
faced by flooding.
22. thank you
experiment links—IOT WITH PACKET TRACER
1. https://www.youtube.com/watch?v=sqU4jx9R5xw&t=2s
do this
https://www.youtube.com/watch?v=KwhrRyWPv64
and
https://www.youtube.com/watch?v=VJYNkI3XXDg