SlideShare a Scribd company logo
1 of 22
IoT-M2M
DR. AMAR NATH
Internet of Things : IOT VS M2M
Internet of things : IOT is known as the internet of things where things are said to be the
communicating devices that can interact with each other using a communication media.
usually every day some new devices are being integrated which uses iot devices for its
function. these devices use various sensors and actuators for sending and receiving data
over the internet. it is an ecosystem where the devices share data through a
communication media known as the internet.
2. Machine to machine : this is commonly known as machine to machine
communication. it is a concept where two or more than two machines communicate with
each other without human interaction using a wired or wireless mechanism.
M2M is an technology that helps the devices to connect between devices with/without
using internet. m2m communications offer several applications such as security, tracking
and tracing, manufacturing and facility management.
It is a technology
that allows devices
without the use of
the internet to
connect between
devices.
Wireless Media Access Issues in Internet of
Things
When it comes to communication using a wireless medium, there is always a concern about the
interference due to other present wireless communication technologies. Wireless means
communication and message transfer without the use of physical medium, i.e., wires.
The very important issues which are observed are: Half Duplex operation, Time-varying channel,
and Burst channel errors.
1. Half Duplex operation:
Half-duplex transmission means when the sender and receiver both are capable of sharing data but
one at a time. In wireless transmission, it is difficult to receive data when the transmitter is sending
the data because during transmission a large amount or a large fraction of signal energy is leaked
while broadcasting.
The magnitude of the transferred signal and received signal differs a lot. Due to which collision
detection is even not possible by the sender, as the intensity of the transferred signal is larger than
the received one.
Hence, this causes the problem of collision and the prime focus should be to minimize the collision
2. Time-varying channel :
Time-varying channels include the three mechanisms for radio signal propagations, they
are Reflection, Diffraction, and Scattering.
•Reflection –
This occurs when a propagating wave carrying information intrudes on an object that has
very large dimensions than the wavelength of the wave.
•Diffraction –
This occurs when the radio path between the transmitter and the receiver are collided by
the surface with sharp edges. This is a phenomenon which causes the diffraction of the
wave from the targeted position.
•Scattering –
This occurs when the medium through from the wave is traveling consists of some objects
which have dimensions smaller than the wavelength of the wave.
While transmitting the signal by the node these are time shifted and this is called multipath
propagation. While when this node signals intensity is dropped below a threshold value,
then this is termed as fade. As a result, Handshaking strategy is widely used so as a
healthy communication can be set up.
3. Burst channel errors :
Burst channel errors are called as a contiguous sequence of symbols, which are
received in a communication channel, in which the first and last symbols has an
error and there is no evidence of contiguous sub-sequence of corrected
received symbols.
When time-varying channels are used, then signals strengths are introduced
due to which errors are observed in transmission.
Medium access control (MAC) protocol
Medium access control (MAC) layer protocols that are used in IoT are as follows;
For short range coverage protocols, the following are considered:
Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE
802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote
Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah.
For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-
M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied.
What is the sensor deployment?
Sensor deployment is performed to achieve objectives like increasing
coverage, strengthening connectivity, improving robustness, or
increasing the lifetime of a given WSN. Therefore, a sensor deployment
method must be carefully designed to achieve such objective functions
without exceeding the available budget
What is node discovery in IOT?
The node discovery command sends out a broadcast to every node in
the personal area network (PAN) ID. Each node in the PAN sends a
response back to the requesting node.
Data aggregation & dissemination
Data Aggregation technique is used to increase the lifetime of a
network by collecting information in an energy efficient manner.
Data Aggregation is the process of one or more sensor nodes and detects the
information result from the other sensor nodes.
The aim of the data aggregation is removes data redundancy and improves
the energy lifetime in wireless sensor network.
Therefore, reducing the number of data packets transmitted over the network
because of aggregation need less power as compare to multiple packets
sending having same data.
Data Aggregation Approaches
a) Cluster Based Approach:
Cluster Based Approach is defined as the hierarchical approach in which whole network is
separated into various cluster.
Each cluster has cluster heads and which does cluster choose from members.
The main role of cluster head aggregate data received from cluster members locally and then
transmits the result to base station.
The cluster head can share information with the sink directly via long range transmissions or
multi hopping using other cluster heads.
Tree Based Approach:
Tree Based Approach is actually defining aggregation concept which is used to
make aggregation tree.
This tree define as minimum spanning tree in which sink node act as root and
source node act as leaves.
Data start flowing from leave nodes up to root nodes.
The main disadvantage of this approach is data packet loss at any level of tree,
which may cause failure of the whole network
Multipath Approach:
Multipath Approach: This approach is used to overcome the drawbacks of tree
based approach.
Accordingly, to this approach, each and every node could send data packets over
multiple paths using multiple neighbors in the aggregation tree.
So a data packet sends from source to destination using multiple paths with the
help of intermediate nodes.
The example of this approach like ring topology. Overhead is the disadvantage of
this approach.
Hybrid Approach:
Hybrid Approach: The Hybrid Approach is the mixture of cluster based approach,
multipath approach and tree based approach.
This approach is mainly used for adaptively for optimal performance of their data
aggregation.
Data Dissemination
Data Dissemination is the process in which sensor nodes are collecting the data
and communicate to the base station or any other interested node.
The source node is generating the data and the information to be reported is
known as event. Those nodes which are interested in event and seek information
are known as sink. So in this whole process data are routed in sensor network.
It is two steps process; in first step interested nodes are broadcast to their neighbor
nodes in the network and in second step nodes after receiving the request nodes
sends requesting data.
Data Dissemination Approach
Flooding: If the destination node is not receive the data packet or specified
number of hops is not reached.
Then each node broadcast the gathered data until the packet is reached to their
destination node.
The main advantage of flooding is not requiring costly topology maintain or
route discovery, but it faces several problems like implosion, overlap, and
resource blindness.
Gossiping:
Gossiping:
The gossiping is the version of flooding approach. In this
approach, the packet is sent to a single neighbor chosen from the
neighbor table randomly instead of broadcasting each packet to
the entire neighbor.
This process can take a long time from completion.
Gossiping avoids the problem faced in flooding approach like
implosion.
SPIN: (Sensor Protocol for Information via Negotiation)
SPIN: (Sensor Protocol for Information via Negotiation) this is the enhancement of
flooding protocols based on data centric routing.
Flooding has mainly three problems like: implosion, overlap and resource blindness. To
overcome these issues the spin family protocols uses three type of messages ADV, REQ,
DATA. SPIN uses three types of messages, ADV, REQ and DATA.
The ADV message is broadcasted by a node which has some data. This message is
broadcasted by the node. This message will say about the type of data contained by the
advertising node.
The nodes which are interested in the event to transmit REQ message for DATA. After
receiving the REQ message, source node sends a DATA message to interested node. In
this way, data can reach to all interested node in entire network.
This technique prevents the issues' of implosion, overlap, and resource blindness which is
faced by flooding.
thank you
experiment links—IOT WITH PACKET TRACER
1. https://www.youtube.com/watch?v=sqU4jx9R5xw&t=2s
do this
https://www.youtube.com/watch?v=KwhrRyWPv64
and
https://www.youtube.com/watch?v=VJYNkI3XXDg

More Related Content

Similar to Lect-3-M2M-IoT.pptx

Computer network notes
Computer network notesComputer network notes
Computer network notesLakshmiSamivel
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)IMRAN KHAN
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full detailsKajalSingh958233
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network Sandeep Kumar
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 

Similar to Lect-3-M2M-IoT.pptx (20)

Computer network notes
Computer network notesComputer network notes
Computer network notes
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Lesson 5 data communication and networking (136 kb)
Lesson 5   data communication and networking (136 kb)Lesson 5   data communication and networking (136 kb)
Lesson 5 data communication and networking (136 kb)
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Introduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal GargIntroduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal Garg
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full details
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
packet switching
packet switchingpacket switching
packet switching
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Class notes 1
Class notes 1Class notes 1
Class notes 1
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Lect-3-M2M-IoT.pptx

  • 2. Internet of Things : IOT VS M2M Internet of things : IOT is known as the internet of things where things are said to be the communicating devices that can interact with each other using a communication media. usually every day some new devices are being integrated which uses iot devices for its function. these devices use various sensors and actuators for sending and receiving data over the internet. it is an ecosystem where the devices share data through a communication media known as the internet. 2. Machine to machine : this is commonly known as machine to machine communication. it is a concept where two or more than two machines communicate with each other without human interaction using a wired or wireless mechanism. M2M is an technology that helps the devices to connect between devices with/without using internet. m2m communications offer several applications such as security, tracking and tracing, manufacturing and facility management.
  • 3. It is a technology that allows devices without the use of the internet to connect between devices.
  • 4.
  • 5.
  • 6.
  • 7. Wireless Media Access Issues in Internet of Things When it comes to communication using a wireless medium, there is always a concern about the interference due to other present wireless communication technologies. Wireless means communication and message transfer without the use of physical medium, i.e., wires. The very important issues which are observed are: Half Duplex operation, Time-varying channel, and Burst channel errors. 1. Half Duplex operation: Half-duplex transmission means when the sender and receiver both are capable of sharing data but one at a time. In wireless transmission, it is difficult to receive data when the transmitter is sending the data because during transmission a large amount or a large fraction of signal energy is leaked while broadcasting. The magnitude of the transferred signal and received signal differs a lot. Due to which collision detection is even not possible by the sender, as the intensity of the transferred signal is larger than the received one. Hence, this causes the problem of collision and the prime focus should be to minimize the collision
  • 8. 2. Time-varying channel : Time-varying channels include the three mechanisms for radio signal propagations, they are Reflection, Diffraction, and Scattering. •Reflection – This occurs when a propagating wave carrying information intrudes on an object that has very large dimensions than the wavelength of the wave. •Diffraction – This occurs when the radio path between the transmitter and the receiver are collided by the surface with sharp edges. This is a phenomenon which causes the diffraction of the wave from the targeted position. •Scattering – This occurs when the medium through from the wave is traveling consists of some objects which have dimensions smaller than the wavelength of the wave. While transmitting the signal by the node these are time shifted and this is called multipath propagation. While when this node signals intensity is dropped below a threshold value, then this is termed as fade. As a result, Handshaking strategy is widely used so as a healthy communication can be set up.
  • 9. 3. Burst channel errors : Burst channel errors are called as a contiguous sequence of symbols, which are received in a communication channel, in which the first and last symbols has an error and there is no evidence of contiguous sub-sequence of corrected received symbols. When time-varying channels are used, then signals strengths are introduced due to which errors are observed in transmission.
  • 10. Medium access control (MAC) protocol Medium access control (MAC) layer protocols that are used in IoT are as follows; For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT- M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied.
  • 11. What is the sensor deployment? Sensor deployment is performed to achieve objectives like increasing coverage, strengthening connectivity, improving robustness, or increasing the lifetime of a given WSN. Therefore, a sensor deployment method must be carefully designed to achieve such objective functions without exceeding the available budget
  • 12. What is node discovery in IOT? The node discovery command sends out a broadcast to every node in the personal area network (PAN) ID. Each node in the PAN sends a response back to the requesting node.
  • 13. Data aggregation & dissemination Data Aggregation technique is used to increase the lifetime of a network by collecting information in an energy efficient manner. Data Aggregation is the process of one or more sensor nodes and detects the information result from the other sensor nodes. The aim of the data aggregation is removes data redundancy and improves the energy lifetime in wireless sensor network. Therefore, reducing the number of data packets transmitted over the network because of aggregation need less power as compare to multiple packets sending having same data.
  • 14. Data Aggregation Approaches a) Cluster Based Approach: Cluster Based Approach is defined as the hierarchical approach in which whole network is separated into various cluster. Each cluster has cluster heads and which does cluster choose from members. The main role of cluster head aggregate data received from cluster members locally and then transmits the result to base station. The cluster head can share information with the sink directly via long range transmissions or multi hopping using other cluster heads.
  • 15. Tree Based Approach: Tree Based Approach is actually defining aggregation concept which is used to make aggregation tree. This tree define as minimum spanning tree in which sink node act as root and source node act as leaves. Data start flowing from leave nodes up to root nodes. The main disadvantage of this approach is data packet loss at any level of tree, which may cause failure of the whole network
  • 16. Multipath Approach: Multipath Approach: This approach is used to overcome the drawbacks of tree based approach. Accordingly, to this approach, each and every node could send data packets over multiple paths using multiple neighbors in the aggregation tree. So a data packet sends from source to destination using multiple paths with the help of intermediate nodes. The example of this approach like ring topology. Overhead is the disadvantage of this approach.
  • 17. Hybrid Approach: Hybrid Approach: The Hybrid Approach is the mixture of cluster based approach, multipath approach and tree based approach. This approach is mainly used for adaptively for optimal performance of their data aggregation.
  • 18. Data Dissemination Data Dissemination is the process in which sensor nodes are collecting the data and communicate to the base station or any other interested node. The source node is generating the data and the information to be reported is known as event. Those nodes which are interested in event and seek information are known as sink. So in this whole process data are routed in sensor network. It is two steps process; in first step interested nodes are broadcast to their neighbor nodes in the network and in second step nodes after receiving the request nodes sends requesting data.
  • 19. Data Dissemination Approach Flooding: If the destination node is not receive the data packet or specified number of hops is not reached. Then each node broadcast the gathered data until the packet is reached to their destination node. The main advantage of flooding is not requiring costly topology maintain or route discovery, but it faces several problems like implosion, overlap, and resource blindness.
  • 20. Gossiping: Gossiping: The gossiping is the version of flooding approach. In this approach, the packet is sent to a single neighbor chosen from the neighbor table randomly instead of broadcasting each packet to the entire neighbor. This process can take a long time from completion. Gossiping avoids the problem faced in flooding approach like implosion.
  • 21. SPIN: (Sensor Protocol for Information via Negotiation) SPIN: (Sensor Protocol for Information via Negotiation) this is the enhancement of flooding protocols based on data centric routing. Flooding has mainly three problems like: implosion, overlap and resource blindness. To overcome these issues the spin family protocols uses three type of messages ADV, REQ, DATA. SPIN uses three types of messages, ADV, REQ and DATA. The ADV message is broadcasted by a node which has some data. This message is broadcasted by the node. This message will say about the type of data contained by the advertising node. The nodes which are interested in the event to transmit REQ message for DATA. After receiving the REQ message, source node sends a DATA message to interested node. In this way, data can reach to all interested node in entire network. This technique prevents the issues' of implosion, overlap, and resource blindness which is faced by flooding.
  • 22. thank you experiment links—IOT WITH PACKET TRACER 1. https://www.youtube.com/watch?v=sqU4jx9R5xw&t=2s do this https://www.youtube.com/watch?v=KwhrRyWPv64 and https://www.youtube.com/watch?v=VJYNkI3XXDg