KEMBAR78
ES-IoT Unit 4 | PDF | Wi Fi | Computer Network
0% found this document useful (0 votes)
22 views32 pages

ES-IoT Unit 4

The document discusses various IoT communication models and protocols, including Request-Response, Publisher-Subscriber, Push-Pull, and Exclusive Pair models, as well as communication APIs like REST and WebSocket. It also covers specific protocols such as MQTT, CoAP, LoRaWAN, and 6LoWPAN, detailing their characteristics, advantages, and applications. Additionally, it explains Bluetooth technology and its architecture, including Piconet and Scatternet structures.

Uploaded by

bharathi02072004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views32 pages

ES-IoT Unit 4

The document discusses various IoT communication models and protocols, including Request-Response, Publisher-Subscriber, Push-Pull, and Exclusive Pair models, as well as communication APIs like REST and WebSocket. It also covers specific protocols such as MQTT, CoAP, LoRaWAN, and 6LoWPAN, detailing their characteristics, advantages, and applications. Additionally, it explains Bluetooth technology and its architecture, including Piconet and Scatternet structures.

Uploaded by

bharathi02072004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

UNIT- 4 IOT COMMUNICATION AND OPEN PLATFORMS

IoT Communication Models and APIs – IoT Communication Protocols – Bluetooth –


WiFi – ZigBee– GPS – GSM modules – Open Platform (like Raspberry Pi) – Architecture
– Programming – Interfacing – Accessing GPIO Pins – Sending and Receiving Signals
Using GPIO Pins – Connecting to the Cloud.

Communication Models in IoT (Internet of Things )

IoT devices are found everywhere and will enable circulatory intelligence in the future. For
operational perception, it is important and useful to understand how various IoT devices
communicate with each other. Communication models used in IoT have great value. The IoTs
allow people and things to be connected any time, any space, with anything and anyone,
using any network and any service.

Types of Communication Model :

1. Request & Response Model

This model follows a client-server architecture.


• The client, when required, requests the information from the server. This request is usually
in the encoded format.
• This model is stateless since the data between the requests is not retained and each request
is independently handled.
• The server Categories the request, and fetches the data from the database and its
resource representation. This data is converted to response and is transferred in an encoded
format to the client. The client, in turn, receives the response.
• On the other hand — In Request-Response communication model client sends a request
to the server and the server responds to the request. When the server receives the
request it decides how to respond, fetches the data retrieves resources, and prepares the
response, and sends it to the client.
2. Publisher-Subscriber Model

This model comprises three entities: Publishers, Brokers, and Consumers.

• Publishers are the source of data. It sends the data to the topic which are
managed by the broker. They are not aware of consumers.
• Consumers subscribe to the topics which are managed by the broker.
• Hence, Brokers responsibility is to accept data from publishers and send it to the
appropriate consumers. The broker only has the information regarding the consumer
to which a particular topic belongs to which the publisher is unaware of.
3. Push-Pull Model

The push-pull model constitutes data publishers, data consumers, and data queues.

• Publishers and Consumers are not aware of each other.


• Publishers publish the message/data and push it into the queue. The consumers,
present on the other side, pull the data out of the queue. Thus, the queue acts as the
buffer for the message when the difference occurs in the rate of push or pull of
data on the side of a publisher and consumer.
• Queues help in decoupling the messaging between the producer and consumer.
Queues also act as a buffer which helps in situations where there is a mismatch
between the rate at which the producers push the data and consumers pull the data.

4. Exclusive Pair

• Exclusive Pair is the bi-directional model, including full-duplex communication among


client and server. The connection is constant and remains open till the client sends a request
to close the connection.
• The Server has the record of all the connections which has been opened.
• This is a state-full connection model and the server is aware of all open connections.
• WebSocket based communication API is fully based on this model.
IoT Communication APIs
Generally we used Two APIs For IoT Communication. These IoT Communication APIs are:

• REST Based Communication APIs


• Web Socket Based Communication APIs
Web service can either be implemented using REST principles or using Web Socket
Protocol –

1. REST Based Communication API :

REpresentational State Transfer (REST) is a set of architectural principles by which you


can design web services and web APIs that focus on a system’s resources and how resource
states are addressed and transferred. REST APIs follow the request-response
communication model. The REST architectural constraints apply to the components,
connectors, and data elements, within a distributed hypermedia system.

Advantages of REST API:

• Simplicity: REST APIs are relatively simple to design and implement, making them a
popular choice for building APIs for web applications.
• Flexibility: REST APIs can be used to support a wide range of applications and
services, from simple web applications to complex enterprise systems.
• Caching: REST APIs can leverage caching to improve performance and reduce server
load.
• Stateless: REST APIs are stateless, meaning that each request is processed
independently of any previous requests, making them easy to scale and distribute.

Disadvantages of REST API:

• Limited real-time support: REST APIs do not support real-time communication between
the server and client, making them less suitable for applications that require real-time
updates.
• Performance overhead: REST APIs require more overhead than WebSocket APIs, as each
request and response must contain all the necessary information to complete the request.
• Complexity: REST APIs can be complex to design and implement for large, distributed
systems.

2. Web Socket Based Communication APIs :

Web Socket APIs allow bi-directional, full-duplex communication between clients and servers.
It follows the exclusive pair communication model. This Communication API does not require
a new connection to be set up for each message to be sent between clients and servers. Once
the connection is set up the messages can be sent and received continuously without any
interruption. WebSocket APIs are suitable for IoT Applications with low latency or high
throughput requirements.
Advantages of WebSocket API:

• Real-time communication: WebSocket APIs enable real-time communication between


the server and client, making them ideal for applications that require real-time updates.
• Efficiency: WebSocket APIs are more efficient than REST APIs for real-time
applications, as they use a persistent connection to enable bidirectional communication.
• Scalability: WebSocket APIs are highly scalable, as they can support thousands of
connections per server.
• Reduced overhead: WebSocket APIs have lower overhead than REST APIs, as they use
a single connection to transmit data.

Disadvantages of WebSocket API:

• Complexity: WebSocket APIs are more complex to design and implement than REST
APIs, requiring additional programming skills and knowledge.
• Security: WebSocket APIs can be vulnerable to security threats if not properly secured.
• Compatibility: WebSocket APIs are not supported by all browsers, requiring fallback
mechanisms for older browsers.

Similarities between REST API and WebSocket API:

• Both REST API and WebSocket API are used to build APIs for web applications.
• Both REST API and WebSocket API are standardized interfaces that enable
communication between the server and client.
• Both REST API and WebSocket API can be customized to suit the specific needs of a
particular application or system.
• Both REST API and WebSocket API can be secured using various authentication and
encryption methods.
Difference between Rest API and Web Socket API :

S.NO. REST API WEB SOCKET API

It is Stateless protocol. It will not store It is Stateful protocol. It will store the
1.
the data. data.

It is Bi-directional. Messages can be


It is Uni-directional. Only either
2. received or sent by both server or
server or client will communicate.
client.

3. It is Request-response model. It is Full duplex model.

HTTP request contains headers like It is suitable for real-time applications.


4.
head section, title section. It does not have any overhead.

New TCP connection will be set up


5. Only Single TCP connection.
for each HTTP request.

Both horizontal and vertical scaling


(we can add many resources and Only vertical scaling (we can add
6.
number of users both horizontally and resources only vertically).
vertically).

It depends upon the HTTP methods to It depends upon the IP address and
7.
retrieve the data.. port number to retrieve the data

It is slower than web socket regarding web socket transmits messages very
8.
the transmission of messages. fastly than REST API.

It does not need memory or buffers to It requires memory and buffers to


9.
store the data. store the data.
MQTT

Message Queuing Telemetry Transport (MQTT): The message query telemetry transport
protocol is a communication-based protocol that is used for IoT devices. This protocol is based
on the publish-subscribe methodology in which clients receive the information through a
broker only to the subscribed topic. A broker is a mediator who categorizes messages into
labels before being delivered.

Characteristics of the Protocol

• Light-weight and reliable: The MQTT message is compact, which can realize stable
transmission on severely limited hardware equipment and network with low bandwidth
and high delay.

• Publish/subscribe mode: Based on the publish/subscribe mode, the advantage of


publishing and subscribing mode is that the publisher and subscriber are decoupled:
Subscribers and publishers do not need to establish a direct connection or be online at the
same time.

• Created for the IoT: It provides comprehensive IoT application features such as heartbeat
mechanism, testament message, QoS quality level

• Better ecosystem: It covers all-language platform's clients and SDKs, and it has mature
Broker server software, which can support massive Topic and ten-million-level device
access and provide rich enterprise integration capabilities.

CoAP
Constrained Application Protocol (COAP): The constrained application protocol is a client
server-based protocol. With this protocol, the COAP packet can be shared between different
client nodes which are commanded by the COAP server. The server is responsible to share the
information depending on its logic but has not acknowledged it. This is used with the
applications which support the state transfer model.

Characteristics of the Protocol


CoAP refers to many design ideas of HTTP, and it also improves many design details and adds
many practical functions according to the specific situation of limited resource-limited devices.

• It is based on message model


• Based on UDP Protocol, transport layer supports restricted devices
• It uses request/response model similar to HTTP request, and HTTP is text format, while
CoAP is binary format, which is more compact than HTTP
• It supports two-way communication

• It has the characteristics of light-weight and low power consumption


• It supports reliable transmission, data re-transmission, and block transmission to ensure
reliable arrival of data
• It supports IP multicast
• It supports observation mode
• It supports asynchronous communication

LoRaWAN
LoRaWAN refers to Long Rage Wide Area Network which is a wide area network protocol.
It is an optimized low-power consumption protocol design to support large-scale public
networks with millions of low-power devices. A single operator operates the LoRaWAN. The
LoRaWAN network is a bi-directional communication for IoT application with low cost,
mobility, and security..

An end device can connect to a network with LoRa WAN in two ways:

• Over-the-air Activation (OTAA): A device has to establish a network key and an application
session key to connect with the network.
• Activation by Personalization (ABP): A device is hardcoded with keys needed to communicate
with the network, making for a less secure but easier connection.

Properties of LoRaWAN protocol

o Standard: LoRaWAN
o Frequency: Various
o Range: 2-5km (urban environment), 15km (suburban environment)
o Data Rates: 0.3-50 kbps.
6LoWPAN
The 6LoWPAN protocol refers to IPv6 Low Power Personal Area Network which uses a
lightweight IP-based communication to travel over low data rate networks. It has limited
processing ability to transfer information wirelessly using an internet protocol. So, it is mainly
used for home and building automation. The 6LoWPAN protocol operates only within the 2.4
GHz frequency range with 250 kbps transfer rate. It has a maximum length of 128-bit header
packets.

6LowPAN Security Measure


Security is a major issue for 6LowPAN communication Protocol. There are several attacks
issues at the security level of 6LoWPAN which aim is to direct destruction of the network.
Since it is the combination of two systems, so, there is a possibility of attack from two sides
that targets all the layer of the 6LoWPAN stack (Physical layer, Data link layer, Adaptation
layer, Network layer, Transport layer, Application layer).

Basic Requirements of 6LoWPAN:

1. The device should be having sleep mode in order to support the battery saving.
2. Minimal memory requirement.
3. Routing overhead should be lowered.

Features of 6LoWPAN:

1. It is used with IEEE 802.15,.4 in the 2.4 GHz band.


2. Outdoor range: ~200 m (maximum)
3. Data rate: 200kbps (maximum)
4. Maximum number of nodes: ~100

Advantages of 6LoWPAN:

1. 6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.
2. It delivers low-cost and secure communication in IoT devices.
3. It uses IPv6 protocol and so it can be directly routed to cloud platforms.
4. It offers one-to-many and many-to-one routing.
5. In the network, leaf nodes can be in sleep mode for a longer duration of time.

Disadvantages of 6LoWPAN:

1. It is comparatively less secure than Zigbee.


2. It has lesser immunity to interference than that Wi-Fi and Bluetooth.
3. Without the mesh topology, it supports a short range.

Applications of 6LoWPAN:

1. It is a wireless sensor network.


2. It is used in home-automation,
3. It is used in smart agricultural techniques, and industrial monitoring.
4. It is utilised to make IPv6 packet transmission on networks with constrained power and
reliability resources possible.

Difference between COAP and MQTT protocols:

Basis of COAP MQTT

Message Queuing Telemetry


Constrained Application Protocol
Abbreviation Transport

Communication
It uses Request-Response model. It uses Publish-Subscribe model
Type

This uses both Asynchronous and


This uses only Asynchronous
Messaging Mode Synchronous.

Transport layer This mainly uses User Datagram This mainly uses Transmission
protocol protocol(UDP) Control protocol(TCP)
Basis of COAP MQTT

It has 4 bytes sized header It has 2 bytes sized header


Header size

No it does not uses REST


Yes it uses REST principles
RESTful based principles

It supports and best used for live


It does not has such support
Persistence support data communication

It provides by adding labels to the


It has no such feature.
Message Labelling messages.

It is used in Utility area networks It is used in IoT applications


Usability/Security and has secured mechanism. and is secure

Effectiveness in LNN is
Effectiveness in LNN is low.
Effectiveness excellent.

Communication Communication model is one- Communication model is many-


Model one. many.

Bluetooth

Bluetooth is universal for short-range wireless voice and data communication. It is a Wireless
Personal Area Network (WPAN) technology and is used for exchanging data over smaller
distances. This technology was invented by Ericson in 1994. It operates in the unlicensed,
industrial, scientific, and medical (ISM) band from 2.4 GHz to 2.485 GHz. Maximum devices
that can be connected at the same time are 7. Bluetooth ranges up to 10 meters. It provides
data rates up to 1 Mbps or 3 Mbps depending upon the version. The
spreading technique that it uses is FHSS (Frequency-hopping spread spectrum). A Bluetooth
network is called a piconet and a collection of interconnected piconets is called scatternet.

Bluetooth Architecture:

The architecture of Bluetooth defines two types of networks:


1. Piconet
2. Scatternet

M-master
S-slave

Piconet:
Piconet is a type of Bluetooth network that contains one primary node called the master node
and seven active secondary nodes called slave nodes. Thus, we can say that there is a total of
8 active nodes which are present at a distance of 10 meters.
The communication between the primary and secondary nodes can be one-to-one or one-to-
many. Possible communication is only between the master and slave; Slave- slave
communication is not possible. It also has 255 parked nodes, these are secondary nodes and
cannot take participation in communication unless it gets converted to the active state.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet can act as master or
we can say primary in another piconet. This kind of node can receive a message
from a master in one piconet and deliver the message to its slave in the other piconet where
it is acting as a master. This type of node is referred to as a bridge node. A station cannot be
mastered in two piconets.

Advantage:

• It is a low-cost and easy-to-use device.


• It can also penetrate through walls.
• It creates an Ad-hoc connection immediately without any wires.
• It is used for voice and data transfer.

Disadvantages:

• It can be hacked and hence, less secure.


• It has a slow data transfer rate: of 3 Mbps.
• It has a small range: 10 meters.
• Bluetooth communication does not support routing.
• The issues of handoffs have not been addressed.

Applications:

• It can be used in laptops, and in wireless PCs, printers.


• It can be used in wireless headsets, wireless PANs, and LANs.
• It can connect a digital camera wirelessly to a mobile phone.
• It can transfer data in terms of videos, songs, photographs, or files from one cell phone
to another cell phone or computer.
• It is used in the sectors of Medical health care, sports and fitness, Military.

WIFI - Wireless Fidelity:

Wifi is also known as Wireless Fidelity.


We are all familiar with Wi-Fi, which is available on our mobile phones, laptops, or wherever Wi-Fi
is supported. Wi-Fi is a wireless networking technology that allows devices to connect
to the internet without cable
wirelessly to a network or to other computer or mobile device. A circular radio frequency range
is used to transmit data in Wi-Fi.

It uses radio waves to transmit data between your device and a router.

Wireless Fidelity (Wi-Fi) is a generic term for the wireless network in the communication norm.
Wifi operates like a local area network without the use of a wire or cables.

WLANstands for WirelessLocal Area Network. IEEE802.11 is the rule for


communication. WiFi uses the Physical Data Link Layer (PDLL) to operate.

Key components:

Router :It sends wifi signals. To your devices.

Modem: It brings internet from the ISP(internet service provider)

Wifi Adapter:it is inside your phone or laptop and catches the wifi

Access point:It helps to increase the wifi range in big areas

Types or Kinds of Wifi

Wi-Fi has numerous kinds or standards. Here, the names of the standards are defined.

o Wi-Fi-1 (802.11b, launched in 1999) - This version has link speed from 2Mb/s to 11
Mb/s over 2.4 GHz frequency band
o Wi-Fi-2 (802.11a) launched in 1999. After a month of releasing the previous version,
802.11a, was released, and it provides upto 54 Mb/s link speed over the 5 GHz band
o Wi-Fi-3 (802.11g) was launched in 2003. In this version, the speed was risen up to 54
to 108 Mb/s over 2.4 GHz
o 802.11i launched in 2004. This is equivalentto802.11g, but only the security feature
was enhanced in this version
o 802.11e launched in 2004. This is also the same as 802.11g; only Voice over Wireless
LAN and multimedia streaming are included.
o Wi-Fi-4 (802.11n) launched in 2009. This version holds up both 2.4 GHz and 5 GHz
radio frequencies, and it provides up to 72 to 600 Mb/s speed.
o Wi-Fi-5 (802.11ac) launched in 2014. It supports a speed of 1733 Mb/s in the 5 GHz
band.

Advantages of WIFI

The advantages of Wi-Fi include

o A versatile network connection and the absence of complicated wiring requirements


for installation.
o Everywhere in the Wi-Fi range can access it
o Independent users are not required to obtain regulatory approval.
o In addition, Wi-Fi Extenders make it possible to expand the network.
o It's easy and quick to set up.
o Only the SSID and password need to be configured.
o As part of its security measures, Wi-Fi networks encrypt radio signals using WPA
encryption.
o It is also more affordable.
o Hotspots are another feature that it offers.
o Roaming is supported as well.

Wi-Fi Disadvantages
o Mobile phones, laptops, and other devices with batteries consume a lot of power when
using Wi-Fi.
o Even when encryption is in place, security issues can still arise.
o Wi-Fi can be attacked and accessed in the same way that recognised devices become
unidentified to the router.
o In comparison to a direct cable connection, the speed is slower.
o People can be harmed by it because it emits radiation like cell phones.
o Thunderstorms, for example, can interfere with Wi-Fi signals.
o Because it lacks a firewall, unauthorised access to Wi-Fi is possible.
o Since a router is required to access the internet via Wi-Fi, we can't access the internet
if the power goes out.

Zigbee

Zigbee is a low power, low data rate (250kbps) wireless protocol used primarily for Home
automation and industrial control, building automation,sensor data collection etc..Zigbee
devices have a range (1 hop) of 80 to 100m.
Devices can be split into:
1.Full Function Device (FFD)- Can communicates with all node types and can
operate in one of three modes:
2.Zigbee Coordinator Device: It communicates with routers. This device is used for
connecting the devices.
3.Zigbee Router: It is used for passing the data between devices.
4.ZigbeeEnd Device: It is the device that is going to be controlled.

There must be 1 coordinator on a Zigbee network.


Reduced Function Device (RFD): Can only talk to a single
FFD. These are end nodes. Example a smart lock,switch ect

Types of ZigBee Devices:


. Zigbee Coordinator Device: It communicates with routers. This device is used for
connecting the devices.

• Zigbee Router: It is used for passing the data between devices.


• Zigbee End Device: It is the device that is going to be controlled.

General Characteristics of Zigbee Standard:

• Low Power Consumption


• Low Data Rate (20- 250 kbps)
• Short-Range (75-100 meters)
• Network Join Time (~ 30 msec)
• Support Small and Large Networks (up to 65000 devices (Theory); 240 devices
(Practically))
• Low Cost of Products and Cheap Implementation (Open Source Protocol)
• Extremely low-duty cycle.
• 3 frequency bands with 27 channels.

Operating Frequency

1. Channel 0: 868 MHz (Europe)


2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)

Features of Zigbee:

1. Stochastic addressing: A device is assigned a random address and announced.


Mechanism for address conflict resolution. Parents node don’t need to maintain
assigned address table.
2. Link Management: Each node maintains quality of links to neighbors. Link
quality is used as link cost in routing.
3. Frequency Agility: Nodes experience interference report to channel manager,
which then selects another channel
4. Asymmetric Link: Each node has different transmit power and sensitivity. Paths
may be asymmetric.
5. Power Management: Routers and Coordinators use main power. End Devices
use batteries.
Advantages of Zigbee:
1. Designed for low power consumption.
2. Provides network security and application support services operating on the top of
IEEE.
3. Zigbee makes possible completely networks homes where all devices are able to
communicate and be
4. Use in smart home
5. Easy implementation
6. Adequate security features.
7. Low cost: Zigbee chips and modules are relatively inexpensive, which makes it a cost-
effective solution for IoT applications.
8. Mesh networking: Zigbee uses a mesh network topology, which allows for devices to
communicate with each other without the need for a central hub or router. This makes it
ideal for use in smart home applications where devices need to communicate with each
other and with a central control hub.
9. Reliability: Zigbee protocol is designed to be highly reliable, with robust mechanisms
in place to ensure that data is delivered reliably even in adverse conditions.
Disadvantages of Zigbee :

1. Limited range: Zigbee has a relatively short range compared to other wireless
communications protocols, which can make it less suitable for certain types of applications
or for use in large buildings.
2. Limited data rate: Zigbee is designed for low-data-rate applications, which can make
it less suitable for applications that require high-speed data transfer.
3. Interoperability: Zigbee is not as widely adopted as other IoT protocols, which can make
it difficult to find devices that are compatible with each other.
4. Security: Zigbee’s security features are not as robust as other IoT protocols, making it
more vulnerable to hacking and other security threats.

Zigbee Applications:

1. Home Automation
2. Medical Data Collection
3. Industrial Control Systems
4. meter reading system
5. light control system
6. Commercial
7. Government Markets Worldwide
8. Home Networking.
GPS
Global Positioning System (GPS) is a navigation system based on satellite. It has created the
revolution in navigation and position location. It is mainly used in positioning, navigation,
monitoring and surveying applications.

GPS receiver basically consists of three components:

• An Antenna ( tuned to the frequencies transmitted by the satellites).


• Receiver processor.
• Highly Stable Clock ( Commonly a Crystal oscillator).
• Receiving Antenna receives the satellite signals. It is mainly, a circularly polarized
antenna.
• Low Noise Amplifier (LNA) amplifies the weak received signal
• Down converter converts the frequency of received signal to an Intermediate
Frequency (IF) signal.
• IF Amplifier amplifies the Intermediate Frequency (IF) signal.
• ADC performs the conversion of analog signal, which is obtained from IF amplifier to
digital. Assume, the sampling & quantization blocks are also present in ADC (Analog
to Digital Converter).
• DSP (Digital Signal Processor) generates the C/A code.
• Microprocessor performs the calculation of position and provides the timing signals
in order to control the operation of other digital blocks. It sends the useful information
to Display unit in order to display it on the screen.

Usage of GPS:
There are five most uses of the GPS.

• Location:- with the help of GPS we can find the exact position of the object.
• Navigation:– we can navigate one location to another with the help of GPS.GPS
technology is also useful for Transportation Management and breathing of Ship at
docks.
• Tracking: -with the help of GPS we can Monitor object movement like speed, distance,
position.
• Mapping:– GPS also helps in creating maps of the World.
• Timing:- GPS also provides the estimated time for reaching destination measurement
its depend on speed and object movement.

GSM
GSM stands for Global System for Mobile Communication. GSM is an open and digital
cellular technology used for mobile communication. It uses 4 different frequency bands of
850 MHz, 900 MHz, 1800 MHz and 1900 MHz . It uses the combination of FDMA and
TDMA.
GSM is having 4 different sizes of cells are used in GSM :

1. Macro : In this size of cell, Base Station antenna is installed.


2. Micro : In this size of cell, antenna height is less than the average roof level.
3. Pico : Small cells’ diameter of few meters.
4. Umbrella : It covers the shadowed (Fill the gaps between cells) regions.

Features of GSM are :

1. Supports international roaming


2. Clear voice clarity
3. Ability to support multiple handheld devices.
4. Spectral / frequency efficiency
5. Low powered handheld devices.
6. Ease of accessing network
7. International ISDN compatibility.
8. Low service cost.
9. New features and services.

1. BSS : BSS stands for Base Station Subsystem. BSS handles traffic and signaling
between a mobile phone and the network switching subsystem. BSS having two
components BTS and BSC.
2. NSS : NSS stands for Network and Switching Subsystem. NSS is the core network of GSM.
That carried out call and mobility management functions for mobile phone present in
network. NSS have different components like VLR, HLR and EIR.
3. OSS : OSS stands for Operating Subsystem. OSS is a functional entity which the network
operator monitor and control the system. OMC is the part of OSS. Purpose of OSS is to
offer the customer cost-effective support for all GSM related maintenance services.
Suppose there are 3 Mobile stations which are connected with the tower and that tower is
connected to BTS through TRX, then further connected to BSC and MSC. Let’s understand
the functionality of different components.

1. MS : MS stands for Mobile System. MS comprises user equipment and software needed for
communication with a mobile network. Mobile Station (MS) = Mobile Equipment(ME) +
Subscriber Identity Module (SIM). Now, these mobile stations are connected to tower and that
tower connected with BTS through TRX. TRX is a transceiver which comprises transmitter
and receiver. Transceiver has two performance of sending and receiving.
2. BTS : BTS stands for Base Transceiver Station which facilitates wireless communication
between user equipment and a network. Every tower has BTS.
3. BSC : BSC stands for Base Station Controller. BSC has multiple BTS. You can consider
the BSC as a local exchange of your area which has multiple towers and multiple towers have
BTS.
4. MSC : MSC stands for Mobile Switching Center. MSC is associated with communication
switching functions such as call setup, call release and routing. Call tracing, call forwarding all
functions are performed at the MSC level.
Services of GSM:

• Telephony services or teleservices


• Data services or bearer services
• Supplementary services

Advantages:

Compatibility: GSM is widely used around the world, so it is compatible with many different
networks and devices.
Security: GSM offers enhanced security features such as authentication, encryption and
confidentiality, which helps to protect the user’s privacy and data.
Efficient use of bandwidth: GSM uses a time-division multiplexing (TDM) technique which
enables many users to share the same frequency channel at different times, making it an
efficient use of the available bandwidth.
Roaming: GSM allows users to roam internationally and use their mobile phones in other
countries that use the same GSM standard.
Wide range of features: GSM supports a wide range of features, including call forwarding,
call waiting, voicemail, conference calling, and more.

Disadvantages:

Limited coverage: GSM networks may have limited coverage in some remote areas, which
can make it difficult for users to make calls or access the internet.
Network congestion: GSM networks may become congested during peak hours, which can
lead to dropped calls or poor call quality.
Security vulnerabilities: Although GSM offers enhanced security features, it is still
vulnerable to certain types of attacks, such as eavesdropping and spoofing.
Data transfer speed: GSM networks offer relatively slow data transfer speeds compared to
newer technologies such as 3G and 4G.
Limited capacity: GSM networks have a limited capacity for handling large volumes of data,
which can be a disadvantage for users who require high-speed internet access or other data-
intensive applications.
Single Board Computers -Raspberry-Pi

Raspberry Pi is developed by Raspberry Pi Foundation in the United Kingdom. The Raspberry


Pi is a series of powerful, small single-board computers.

Raspberry Pi is launched in 2012 and there have been several iterations and variations released
since then.

Various versions of Raspberry Pi have been out till date. All versions consist of a
Broadcom system on a chip (SoC) with an integrated ARM-compatible CPU and on-chip
graphics processing unit (GPU).

Block Diagram of Raspberry Pi

• A low-cost, credit-card-sized minicomputer.

• Plugs into a computer monitor or TV.

• Uses a standard keyboard and mouse.

• Use for explore computing as for programmings like Scratch and Python
languages.

• Capable as a normal desktop computer to browsing the internet and playing


high-definition video, to making spreadsheets, word-processing, and playing
games.”
• Allowing interface sensors and actuators through the general purpose IO
pins

• Supports Python out of box

The following diagram shows some main blocks of Raspberry Pi:

:-
Raspberry Pi mainly consists of the following blocks:
• Processor: Raspberry Pi uses Broadcom BCM2835 system on chip which is an ARM
processor and Video core Graphics Processing Unit (GPU). It is the heart of the
Raspberry Pi which controls the operations of all the connected devices and handles
all the required computations.
Processor and Ram
• Based on an ARM processor.

• The latest version of Raspberry Pi (model B, revision 2) comes with a 700 MHz low-
power ARM 1176JZ-F processor And a 512 MB SD Ram..

• HDMI: High Definition Multimedia Interface is used for transmitting video or digital
audio data to a computer monitor or to digital TV. This HDMI port helps Raspberry Pi
to connect its signals to any digital device such as a monitor digital TV or display
through an HDMI cable.
• GPIO ports: General Purpose Input Output ports are available on Raspberry Pi which
allows the user to interface various I/P devices.
• Audio output: An audio connector is available for connecting audio output devices
such as headphones and speakers.
• USB ports: This is a common port available for various peripherals such as a mouse,
keyboard, or any other I/P device. With the help of a USB port, the system can be
expanded by connecting more peripherals.
• Two USB 2.0 USB ports on Raspberry pi can provide a current of up to 100 mA.

• For connecting devices that draw a current of more than 100 mA, an external USB-
powered hub is required.
• SD card: The SD card slot is available on Raspberry Pi. An SD card with an operating
system installed is required for booting the device.
• Ethernet: The ethernet connector allows access to the wired network, it is available
only on the model B of Raspberry Pi.
• Standard RJ45 Ethernet port.

• Connect an ethernet cable or USB Wi-Fi adaptor to provide internet connectivity.

• Power supply: A micro USB power connector is available onto which a 5V power
supply can be connected.
• Camera module: Camera Serial Interface (CSI) connects the Broadcom processor to
the Pi camera.
• Display: Display Serial Interface (DSI) is used for connecting LCD to Raspberry Pi
using 15 15-pin ribbon cables. DSI provides a high-resolution display interface that is
specifically used for sending video data.
Raspberry pi Connecting to the Cloud

Connecting a Raspberry Pi to the cloud allows you to access and manage your Raspberry Pi
remotely, exchange data with cloud services, and perform various tasks such as data logging,
remote control, and automation. Here's a general overview of how to connect a Raspberry Pi
to the cloud:

1. Select a Cloud Service Provider: Choose a cloud service provider that fits your needs. Some
popular options include AWS (Amazon Web Services), Microsoft Azure, Google Cloud
Platform, and various IoT-focused platforms like AWS IoT, Azure IoT, or Google Cloud IoT.
Each has its own set of features, pricing, and capabilities.
2. Set Up Your Raspberry Pi: Ensure your Raspberry Pi is set up correctly, connected to the
internet, and running an appropriate operating system like Raspbian (now called Raspberry Pi
OS).
3. Install Necessary Software: Depending on your chosen cloud platform, you may need to
install specific libraries or SDKs on your Raspberry Pi. For example, if you're using AWS, you
would install the AWS SDK for Python (Boto3). If you're using Azure, you might use the
Azure IoT SDK or Azure Python SDK.
4. Create Cloud Resources: Create the necessary resources on your cloud platform. For
example, if you're using AWS IoT, you'd create an IoT Thing, a policy, and certificates.
5. Connect to the Cloud: Write code on your Raspberry Pi to connect to your cloud platform of
choice. This typically involves using the SDK you installed earlier and providing the necessary
authentication credentials (e.g., API keys, certificates, or access tokens).
6. Publish and Subscribe to Topics (MQTT): Many IoT applications use the publish-
subscribe model for communication. MQTT (Message Queuing Telemetry Transport) is a
common protocol for this purpose. You can publish data from your Raspberry Pi to specific
MQTT topics and subscribe to topics to receive commands or data from the cloud.
7. Data Handling and Processing: Once your Raspberry Pi is connected, you can send and
receive data between the Raspberry Pi and the cloud. You may want to implement data
processing, storage, or analytics depending on your project's requirements.
8. Security Considerations: Ensure proper security practices. Use secure connections (HTTPS,
MQTT over TLS), secure your IoT devices and cloud resources, and regularly update your
Raspberry Pi's software to patch any security vulnerabilities.
9. Monitoring and Management: Set up monitoring and management tools provided by your
cloud platform to keep an eye on your Raspberry Pi's health and performance. This might
include dashboards, alerts, and logging.
10. Scale and Optimize: As your project grows, you may need to scale your cloud resources and
optimize your code and infrastructure for performance and cost-efficiency.

You might also like