0% found this document useful (0 votes)
6 views18 pages

Unit 2

The document outlines various IoT protocols, including CoAP and MQTT, which facilitate data exchange in constrained environments and support low power consumption for devices. It also discusses M2M and WSN protocols, emphasizing standardization efforts and challenges in IoT, such as the need for unified data representation. Additionally, it highlights the importance of standardization in market development while noting potential drawbacks that may inhibit innovation.

Uploaded by

Dhamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views18 pages

Unit 2

The document outlines various IoT protocols, including CoAP and MQTT, which facilitate data exchange in constrained environments and support low power consumption for devices. It also discusses M2M and WSN protocols, emphasizing standardization efforts and challenges in IoT, such as the need for unified data representation. Additionally, it highlights the importance of standardization in market development while noting potential drawbacks that may inhibit innovation.

Uploaded by

Dhamu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 18

MUTHAYAMMAL ENGINEERING COLLEGE L-10

LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: Protocol Standardization for IoT, Efforts

Introduction : IoT protocols are a crucial part of the IoT technology stack — without them,
hardware would be rendered useless as the IoT protocols enable it to exchange data in a structured and
meaningful way. Out of these transferred pieces of data, useful information can be extracted for the end
user and thanks to it, the whole deployment becomes economically profitable, especially in terms of
IoT device management.
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:
While the existing Internet infrastructure is freely available and usable for
any IoT device, it often proves too heavy and power-consuming for most IoT use
cases. Created by the IETF Constrained RESTful Environments working group and
launched in 2013, Constrained Application Protocol (CoAP) was designed to translate
the HTTP model so that it could be used in restrictive device and network
environments.

Designed to address the needs of HTTP-based IoT systems, CoAP relies on


the User Datagram Protocol (UDP) for establishing secure communication between
endpoints. By allowing for broadcasting and multicasting, UDP is able to transmit
data to multiple hosts while retaining communication speed and low bandwidth
usage, which makes it a good match for wireless networks typically employed in
resource-constrained M2M environments. Another thing that CoAP shares with HTTP
is the RESTful architecture which supports a request/response interaction model
between application endpoints. What is more, CoAP adopts the basic HTTP get, post,
put and delete methods, thanks to which ambiguity can be avoided at the time of
interaction between clients.

CoAP features Quality of Service which is used to control the messages sent
and mark them as ‘confirmable’ or ‘nonconfirmable’ accordingly which indicates
whether the recipient should return an ‘ack’ or not. Other interesting features of CoAP
are that it supports content negotiation and resource discovery mechanism. Apart
from transferring IoT data, CoAP leverages Datagram Transport Layer Security (DTLS)
for the secure exchange of messages in the transport layer. CoAP fully addresses the
needs of an extremely light protocol in order to meet the demands of battery-
operated or low-energy devices. All in all, CoAP is a good match when it comes to
existing web service-based IoT systems.

Probably the most widely adopted standard in the Industrial Internet of Things
to date, Message Queuing Telemetry Transport is a lightweight
publication/subscription type (pub/sub) messaging protocol. Designed for battery-
powered devices, MQTT’s architecture is simple and lightweight, providing low power
consumption for devices. Working on top of TCP/IP protocol, it has been especially
designed for unreliable communication networks in order to respond to the problem
of the growing number of small-sized cheap low-power objects that have made their
appearance in the network in the recent years.

MQTT is based on subscriber, publisher and broker model. Within the model,
the publisher’s task is to collect the data and send information to subscribers via the
mediation layer which is the broker. The role of the broker, on the other hand, is to
ensure security by cross-checking the authorisation of publishers and subscribers.
MQTT offers three modes of achieving this (Quality of Service), thanks to which the
publisher has the possibility to define the quality of its message:
 QoS0 (At most once): The least reliable mode but also the fastest. The
publication is sent but confirmation is not received.
 QoS1 (At least once): Ensures that the message is delivered at least once, but
duplicates may be received.
 QoS2 (Exactly once): The most reliable mode while the most bandwidth-
consuming. Duplicates are controlled to ensure that the message is delivered only
once.

Having found wide application in such IoT devices as electric meters, vehicles,
detectors, and industrial or sanitary equipment, MQTT responds well to the
following needs:
 Minimum bandwidth use
 Operation over wireless networks
 Low energy consumption
 Good reliability if necessary
 Little processing and memory resources

Video Content / Details of website for further learning (if any):


https://networklessons.com/cisco/evolving-technologies/iot-standards-and-protocols

Important Books/Journals for further learning including the page nos.:


Honbo Zhou,” The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press,2012.pp-
2169-214.

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-11
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: M2M and WSN Protocols

Introduction : Most M2M applications are developed today in a highly customized fashion •
High-level M2M architecture from M2M Standardization Task Force (MSTF) does include fixed &
other non cellular wireless networks • Means it’s generic, holistic IoT architecture even though it is
M2M architecture • M2M and IoT sometimes are used interchangeably in the United States
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

M2M standards activities include:

• Data transport protocol standards - M2MXML, JavaScript Object Notation (JSON), BiTXML,
WMMP, MDMP
• Extend OMA DM to support M2M devices protocol management objects
• M2M device management, standardize M2M gateway
• M2M security and fraud detection
• Network API’s M2M service capabilities
• Remote management of device behind gateway/firewall
• Open REST-based API for M2M applications

The IEEE 1451 family of standards includes the following:


1451.0-2007 Common Functions, Communication Protocols,and TEDS Formats
1451.1-1999 Network Capable Application Processor Information Model
1451.2-1997 Transducer to Microprocessor Communication Protocols & TEDS Formats
1451.3-2003 Digital Communication & TEDS Formats for Distributed Multi- drop Systems
1451.4-2004 Mixed- mode Communication Protocols & TEDS Formats
1451.5-2007 Wireless Communication Protocols & TEDS Formats
1451.7-2010 Transducers to Radio Frequency Identification
(RFID) Systems Communication Protocols and TEDS Formats

The goal of the IEEE 1451 family of standards is to allow the access of transducer data through
a common set of interfaces whether the transducers are connected to systems or networks via a wired
or wireless means. IEEE p1451.3 is XML based and allows the manufacturer to change the contents.

The Semantic Sensor Web (SSW) [105] is an approach to annotating sensor data with spatial,
temporal, and thematic semantic metadata based on OGCSWE (Sensor Web Enablement). The
following data-Encoding specifications have been produced by OGSWE Working Group.

Video Content / Details of website for further learning (if any):


https://www.youtube.com/watch?v=tXqQ_1DUsJE

Important Books/Journals for further learning including the page nos.:


Honbo Zhou,” The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press,2012.pp-
182-187.

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-12
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: SCADA and RFID Protocols

Introduction : IEEE created a standard specification, called Std C37.1™, for SCADA and
automation systems The processing is now distributed, and functions that used to be done at the control
center can now be done by the intelligent electronic devices (IED) that is, M2M between devices.

Prerequisite knowledge for Complete understanding and learning of Topic:


 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

Supervisory Control And Data Acquisition

The ISA100 was developed by the standards committee of the Industrial Society for Automation
formed to define procedures for implementing wireless systems in the automation and control
environment with a focus on the field level

OPC, which stands for Object Linking and Embedding (OLE) for Process Control standard
specification developed by an industrial automation industry task force (IAITF) The standard specifies
the communication of real- time plant data between control devices from different manufacturers OPC
was designed to provide a common bridge for Windows- based software applications and process
control hardware

• One of the IoT pillars to represent the whole industrial automation arena
• IEEE created standard specification called Std C37.1™, for SCADA & automation systems in
2007
• In recent years, network-based industrial automation has greatly evolved
• With the use of intelligent electronic devices (IEDs), or IoT devices in our terms, in substations
and power stations

The processing is now distributed


• Functions that used to be done at control center can now be done by IED i.e. M2M between devices
• Due to restructuring of electric industry, traditional vertically integrated electric utilities are replaced
by many entities such as
• GENCO (Generation Company),
• TRANSCO (Transmission Company),
• DISCO (Distribution Company),
• ISO (Independent System Operator), etc.

The RFID protocols and data formats are relatively well defined, mostly by EPCglobal
(Electronic Product Code) The standard for contactless smart card communications is ISO/ IEC 14443
allows for communications at distances up to 10 cm. ISO/ IEC 15693, which allows communications at
distances up to 50 cm International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC).

Wireless sensor systems have the potential to help industry use energy and materials more efficiently,
lower production costs, and increase productivity. Although wireless technology has taken a major leap
forward with the boom in wireless personal communications, applications for industrial field device
Systems must meet distinctly different challenges.
Video Content / Details of website for further learning (if any):
https://www.youtube.com/watch?v=vUk8EA0FHLo

Important Books/Journals for further learning including the page nos.:


Honbo Zhou,” The Internet of Things in the Cloud: A Middleware Perspective”, CRC Press,2012.pp-
187-193.

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-13
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols Date


of Lecture:

Topic of Lecture: Issues with IoT Standardization

Introduction : Standardization is like a double- edged sword: critical to market development, but
it may threaten innovation and inhibit change when standards are accepted by the market. Different
consortia, forums, and alliances have been doing standardization •. Even within the same segment,
there are more than one consortium or forum doing standardization . ICT standardization is a highly
decentralized activity.
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

It should be noted that not everything about standardization is positive

• Standardization is like a double-edged sword:


• Critical to market development
• But it may threaten innovation and inhibit change when standards are accepted by the market
• Standardization and innovation are like yin & yang
• They could be contradictory to each other in some cases, even though this observation is debatable

Different consortia, forums and alliances have been doing standardization in their own limited scope
• For example, 3GPP covers only cellular wireless networks while EPCglobal’s middleware covers
only RFID events
• Even within same segment, there are more than one consortium or forum doing standardization
without enough communication with each other
• Some are even competing with each other

Some people believe that the IoT concept is well established


• However, some gray zones remain in the definition, especially which technology should be included
• Following two issues for IoT standardization in particular and ICT standardization in general may
never have answers:
ICT standardization is a highly decentralized activity. How can the individual activities of the network
of extremely heterogeneous standards setting bodies be coordinated? 2. It will become essential to
allow all interested stakeholders to participate in the standardization process toward the IoT and to
voice their respective requirements and concerns. How can this be achieved?
HTML/HTTP combination of data format and exchange protocol is the foundation pillar of WWW •
Described great number of data standards and protocols proposed for four pillar domains of IoT •
Many issues still impede the development of IoT and especially WoT vision

Video Content / Details of website for further learning (if any)


https://www.forbes.com/sites/danielnewman/2017/02/28/the-case-for-standardizing-
iot/
Important Books/Journals for further learning including the page nos.:
Net Reference

Course
Faculty

MUTHAYAMMAL ENGINEERING COLLEGE


LECTURE HANDOUTS
L-14
(An Autonomous Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
IT IV / VI
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II-IoT Protocols


Date of Lecture:

Topic of Lecture: Unified Data Standards

Introduction : Many standardization efforts have been trying to define unified data
representation, protocol for IoT
• Before IoT, Internet was actually an Internet of documents or of multimedia documents
• Two pillars of Internet including HTML/HTTP turned the Internet into WWW
• We need to turn the IoT into the WoT
• What will it take to make this to happen?
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

Today, most new protocols are built on top of XML. For OS there must be XML-based data
format standards or a metadata standard to represent the machine-generated data (MGD). Is it possible
to define such a metadata standard that covers everything?

There are many different levels of protocols • But the ones that most directly relate to business
and social issues are the ones closest to the top • so-called application protocols such as HTML/HTTP
for the web • Web has always been visual medium, but restricted • Until recently, HTML developers
were limited to CSS & JavaScript in order to produce animations • Or they would have to rely on a
plug-in like Flash.
Uses XML representation for data exchange/transfer
• Resource Description framework (RDF) can be used for modeling the information that is deployed as
web resource
• Use REST API
• ebXML can be used for e-commerce solutions
• IEEE 1451.
Video Content / Details of website for further learning (if any):
https://www.armory.io/blog/enabling-a-unified-data-model-for-your-software-development-lifecycle-
sdlc/
Important Books/Journals for further learning including the page nos.:
Net Reference

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-15
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: Protocols,IEEE 802.15.4

Introduction : Defines operation of low-rate wireless personal area networks (LR-WPANs)


• Specifies physical layer and media access control for LR-WPANs
• Maintained by IEEE 802.15 working group, which defined the standard in 2003
• Basic framework conceives a 10m communications range with a transfer rate of 250 kbit/s
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:
IEEE 802.15.4 task group began to develop a standard for LR-WPAN. • The goal of this group
was to provide a standard with ultra-low complexity, cost, and power for low-data-rate wireless
connectivity among inexpensive fixed, portable, and moving devices.

In order to achieve the low power and low cost goals established by IEEE 802.15.4 the following
approaches are taken
• Reduce the amount of data transmitted
• Reduce the transceiver duty cycle and frequency of data transmissions
• Reduce the frame overhead
• Reduce complexity
• Reduce range
• Implement strict power management mechanisms (power-down and sleep)

Video Content / Details of website for further learning (if any):


https://www.youtube.com/watch?v=TygazWNxlRI

Important Books/Journals for further learning including the page nos.:


Net Reference

Course Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-16
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: BACNet Protocol , Modbus ,KNX

Introduction : Communications protocol for Building Automation and Control (BAC) networks
• Provides mechanisms for computerized building automation devices to exchange information
• Designed to allow communication of building automation & control system for application like
Heating, Ventilating and Air-conditioning Control (HVAC)
• Lighting Control, Access Control
• Fire Detection Systems and their Associated Equipment
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

Defines a number of services that are used to communicate between building devices
• Protocol services include Who-Is, I-Am, Who-Has, IHave which are used for Device & Object
discovery
• Services such as Read-Property and Write-Property are used for data sharing
• Defines 60 object types that are acted upon by services
• Defines no. of data link/physical layers including ARCNET,
• Ethernet,
• BACnet/IP,
• BACnet/IPv6,
• Point-To-Point over RS-232,
• Master-Slave/Token-Passing over RS-485,
• ZigBee
• LonTalk

ModBus

Serial communications protocol originally published by Modicon (now Schneider Electric) in


1979
• Commonly available for connecting industrial electronic devices
• Reasons for use of Modbus in industrial environment:
• Developed with industrial applications in mind
• Openly published and royalty-free
• Easy to deploy and maintain
• Enables communication among many devices connected to the same network

Protocol Versions
Modbus RTU
• Modbus ASCII
• Modbus TCP/IP or Modbus TCP
• Modbus over TCP/IP or Modbus over TCP or Modbus RTU/IP
• Modbus over UDP
• Modbus Plus (Modbus+, MB+ or MBP)
• Pemex Modbus
• Enron Modbus

KNX Protocol

Standardized (EN 50090, ISO/IEC 14543), OSI-based network communications protocol for
automation
• Defines several physical communication media
Twisted pair wiring (inherited from the BatiBUS and EIB Instabus standards)
• Powerline networking (inherited from EIB and EHS - similar to that used by X10)
• Radio (KNX-RF)
• Infrared
• Ethernet (also known as EIBnet/IP or KNXnet/IP)
Video Content / Details of website for further learning (if any):
https://paragnachaliya.in/wp-content/uploads/2018/03/Unit4.pdf
Important Books/Journals for further learning including the page nos.:

Net Reference

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-17
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: Zigbee Architecture,Network layer , APS layer

Introduction : IEEE 802.15.4-based specification for a suite of high-level communication


protocols
• Used to create personal area networks with small, low-power digital radios
• ZigBee based applications
• Home Automation
• Medical Device Data Collection
• other low-power low-bandwidth.
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

Divided into three sections


• IEEE 802.15.4 which consists of MAC and physical layers
• ZigBee layers, which consist of the network layer, the ZigBee device object (ZDO), the application
sublayer, and security management
• Manufacturer application: Manufacturers of ZigBee devices can use the ZigBee application profile or
develop their own application profile

Network Layer
• Located between the MAC layer and application support sublayer
• Provides the following functions:
• Starting a network
• Managing end devices joining or leaving a network
• Route discovery
• Neighbor discovery

APS Layer
• Application Support Sublayer (APS)
• Provides services necessary for application objects (endpoints) and the ZigBee device object (ZDO)
• Some of services provided by the APS to the application objects for data transfer are
• Request
• Confirm
• Response

ZigBee Device Object (ZDO)


• Control and management of application objects
• Performs overall device management tasks:
• Determines the type of device in a network (for example, end device, router, or coordinator)
• Initializes the APS, network layer, and security service provider
• Performs device and service discovery
• Initializes coordinator for establishing a network
• Security management
• Network management
Video Content / Details of website for further learning (if any):
https://paragnachaliya.in/wp-content/uploads/2018/03/Unit4.pdf
Important Books/Journals for further learning including the page nos.:
Net Reference

Course
Faculty
MUTHAYAMMAL ENGINEERING COLLEGE L-18
LECTURE
(An AutonomousHANDOUTS
Institution)
(Approved by AICTE, New Delhi, Accredited by NAAC & Affiliated to Anna University)
Rasipuram - 637 408, Namakkal Dist., Tamil Nadu
IT IV / VII

Course Name with Code : 21ITC15-Internet of Things

Course Faculty : Mr.M.Dhamodaran

Unit : II- IoT Protocols


Date of Lecture:

Topic of Lecture: Security

Introduction : IoT will connect all objects around us to provide smooth communication •
Economic of scale in IoT presents new security challenges for global devices in terms of –
Authentication – Addressing – Embedded Security.
Prerequisite knowledge for Complete understanding and learning of Topic:
 Computer Architecture
 Network topologies
 Network Protocols
 Web technology
Detailed content of the Lecture:

Devices like RFID and sensor nodes have no access control functionality
• Can freely obtain or exchange information from each other
• So authentication & authorization scheme must be established between these devices to achieve the
security goals for IoT
• Privacy of things and security of data is one of the key challenges in the IoT

Vulnerabilities of IoT
• Unauthorized Access – One of the main threats is the tampering of resources by unauthorized access
– Identity-based verification should be done before granting the access rights
• Information corruption – Device credential must be protected from tampering – Secure design of
access rights, credential and exchange is required to avoid corruption

Theft of Resources – Access of shared resources over insecure channel causes theft of resources –
Results into man-in-the-middle attack
• Information Disclosure – Data is stored at different places in different forms – Distributed data must
be protected from disclosure – Context-aware access control must be enforced to regulate access to
system resources

DoS Attack – Denial of Service (DoS) – Makes an attempt to prevent authentic user from accessing
services which they are eligible for – For example, unauthorized user sends to many requests to server
– That flood the network and deny other authentic users from access to the network.

DDoS Attack – Distributed Denial of Service – Type of DoS attack where multiple compromised
systems are used to target single system causing DoS – Compromised systems – usually infected with
Trojan – Victims of a DDoS attack consist of both
• End targeted systems
• All systems maliciously used and controlled by the hacker in the distributed attack.
CyberBunker Launches “World’s Largest” DDoS Attack
• Slows down the Entire Internet • CyberBunker - Dutch web hosting company
• Caused global disruption of the web
• Slowing down internet speeds for millions of users across the world, according to BBC report

Few real examples of attacks that hit the IoT: – Carna Botnet – 4,20,000 ‘things,’ such as routers,
modems, printers were compromised – TRENDnet’s connected cameras were hacked, with feeds from
those cameras published online – Linux.Darlloz - PoC IoT worm found in the wild by Symantec,
1,00,000 compromised systems including connected things such as TVs, routers and even a fridge.
Video Content / Details of website for further learning (if any):
https://paragnachaliya.in/wp-content/uploads/2018/03/Unit4.pdf
Important Books/Journals for further learning including the page nos.:
Net Reference

Course
Faculty

You might also like