Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
444 views6 pages

Ect458 Scheme

Uploaded by

shanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
444 views6 pages

Ect458 Scheme

Uploaded by

shanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

0400ECT458102301

DRAFT Scheme of Valuation/Answer Key


(Scheme of evaluation (marks in brackets) and answers of problems/key)
APJ ABDUL KALAM TECHNOLOGICAL UNIVERSITY
EIGHTH SEMESTER B.TECH DEGREE(S) EXAMINATION, OCTOBER 2023(2019
SCHEME)
Course Code: ECT458
Course Name: INTERNET OF THINGS
Max. Marks: 100 Duration: 3 Hours

PART A
Answer all questions, each carries 3 marks. Marks

1 1. Dynamic & Self-Adapting (1 mark) (3)


2. Self-Configuring (1/2 mark)
3. Interoperable Communication Protocols (1/2 mark)
4. Unique Identity (1/2 mark)
5. Integrated into Information Network (1/2 mark)
2 • IoT Level-1: Home Automation (3)
• IoT Level-2: IoT system for smart irrigation
• IoT Level-3: IoT system for tracking package handling
• IoT Level-4: IoT system for noise monitoring
• IoT Level-5: IoT system for system for forest fire detection
• IoT Level-6: IoT system for weather monitoring
(1/2 mark each)
3 Network devices in conventional network architectures are getting exceedingly complex (3)
with the increasing number of distributed protocols being implemented and the use of
proprietary hardware and interfaces. In the conventional network architecture the control
plane and data plane are coupled. Control plane is the part of the network that carries the
signalling and routing message traffic while the data plane is the part of the network that
carries the payload data traffic. SDN attempts to create network architectures that are
simpler, inexpensive, scalable, agile and easy to manage. Network devices become
simple with SDN as they do not require implementations of a large number of protocols.
Any three points (1 mark each)
4 Smart objects are any physical objects that contain embedded technology to sense (3)
and/or interact with their environment in a meaningful way by being interconnected and
enabling communication among themselves or an external agent. (1 mark)
A smart object is a device that has the following four defining characteristics:-Processing
unit ,Sensors and/or actuators, Communication device ,Power source (1/2 mark each= 2
Marks)
5 Explain ZigBee stack architecture. (3)

Page 1of 6
0400ECT458102301

6 Internet of Things will largely be built on the Internet Protocol suite.In coping with the (3)
integration of non-IP devices, it may need to deal with the limits at the device and
network levels that IoT often imposes. Therefore, optimizations are needed at various
layers of the IP stack to handle the restrictions that are present in IoT networks.
7 1. Serial: The serial interface on Raspberry Pi has receive (Rx) and transmit (Tx) (3)
pins for communication with serial peripherals.
2. SPI: Serial Peripheral Interface (SPI) is a synchronous serial data protocol used
for communicating with one or more peripheral devices.
3. I2C: The I2C interface pins on Raspberry Pi allow you to connect hardware
modules. I2C interface allows synchronous data transfer with just two pins -SDA
(data line) and SCL (clock line).
(1 mark each)
8 A characteristic of virtualized environment is that it enables applications and services to (3)
execute in an independent execution environment. Each one of them stores and executes
in isolation on the same platform, though in fact, it may actually execute or access to a
set of data centers or servers or distributed services and computing systems.
Applications need not be aware of the platform, just Internet connectivity to the
platform, called cloud platform, is required.The storage is called cloud storage. The
computing is called cloud computing. The services are called cloud services in line with
the web services which host on web servers. Virtualization of storage means user
application or service accesses physical storage using abstract database interface or file
system or logical drive or disk drive, though in fact storage may be accessible using
multiple interfaces or servers.

9 The security tomography means finding attack vulnerable sections/subsections from the (3)
observations for behaviours using a finite number of objects or threats in a complex set
of subsystems.

10 A smart city IoT infrastructure is a four-layered architecture.Data flows from devices at (3)
the street layer to the city network layer and connect to the data center layer, where the
data is aggregated, normalized, and virtualized. The data center layer provides
information to the services layer, which consists of the applications that provide
services to the city.

PART B
Answer one full question from each module, each carries 14 marks.

Page 2of 6
0400ECT458102301

Module I
11 a) Figure (3 Marks)+ Explanation (3 Marks) (6)
An IoT system comprises of a number of functional blocks that provide the system the
capabilities for identification, sensing, actuation, communication, and management.

• Device : An IoT system comprises of devices that provide sensing, actuation,


monitoring and control functions.
• Communication : The communication block handles the communication for the
IoT system. (various protocols used for communication by loT)
• Services : An IoT system uses various types of IoT services such as services for
device monitoring, device control services, data publishing services and
services for device discovery.
• Management : Management functional block provides various functions to
govern the IoT system.
• Security : Security functional block secures the IoT system and by providing
functions such as authentication, authorization, message and content integrity,
and data security.
• Application : IoT applications provide an interface that the users can use to
control and monitor various aspects of the IoT system. Applications also allow
users to view the system status and view or analyze the processed data.
b) The different communication models used in IoT. (2 Marks each) (8)
• Request-Response communication model
• Publish-Subscribe communication model
• Push-Pull communication model
• Exclusive Pair communication model
OR

Page 3of 6
0400ECT458102301

12 a) (9)

link layer (3 marks), network layer (2 marks),, transport layer(1 mark), and application layer
protocols (3 marks),.
b) Logical design of an IoT system refers to an abstract representation of the entities and processes (5)
without going into the low-level specifics of the implementation. (2 marks).
It includes: IOT functional blocks, IOT communication models, IOT communication API (3
Marks)
Module II
13 a) 1. Communication Protocols (8)
2. Machines in M2M vs Things in IoT
3. Hardware vs Software Emphasis
4. Data Collection & Analysis
(2 marks each)
b) Figure (3 Marks)+ Explanation (3 Marks) (6)
OR
14 a) 1. Range: Examines the importance of signal propagation and distance. (8)
2. Frequency Bands: Describes licensed and unlicensed spectrum, including sub-GHz
frequencies.
3. Power Consumption: Discusses the considerations required for devices connected to a
stable power source compared to those that are battery powered.
4. Topology: Highlights the various layouts that may be supported for connecting multiple
smart objects.
5. Constrained Devices: Details the limitations of certain smart objects from a connectivity
perspective.
6. Constrained-Node Networks: Highlights the challenges that are often encountered with
networks connecting smart objects.
b) Explanation (6 marks) (6)
Module III
15 a) Explanation IEEE 802.15.4 physical layer (4 marks), MAC layer and security (9)
implementation with the help of frame formats (5 marks),
b) The features of RPL explanation (5)

Page 4of 6
0400ECT458102301

OR
16 a) Explanation NB-IoT-Network layer (5)
b) Explanation LoraWAN architecture (4 marks). (9)
Description of the physical layer and MAC layer of LoraWAN (5marks)
Module IV
17 a) DaaS, IaaS, PaaS, SaaS (2 marks each) (8)
b) Low-cost, allows interfacing sensors and actuators through the general purpose (6)
I/O pins, small size, - 2 marks
Components - Processor & RAM, USB, HDMI and ethernet port, GPIO pins,
status LED, audio out, Camera Serial Interface - 4 marks
OR
18 a) A "Thing" in Internet of Things (IoT) can be any object that has a unique identifier and (9)
which can send/receive data (including user data) over a network (e.g., smart phone,
smart TV, computer, refrigerator, car, etc. ).IoT devices are connected to the Internet
and send information about themselves or about their surroundings (e.g. information
sensed by the connected sensors) over a network (to other devices or servers/storage) or
allow actuation upon the physical entities/environment around them remotely. (3 marks)
Functional blocks (4 marks)
1. Sensing:Sensors can be either on-board the IoT device or attached to the device.
2. Actuation: IoT devices can have various types of actuators attached that allow
taking actions upon the physical entities in the vicinity of the device.
3. Communication: Communication modules are responsible for sending collected
data to other devices or cloud-based servers/storage and receiving data from
other devices and commands from remote applications.
4. Analysis & Processing: Analysis and processing modules are responsible for
making sense of the collected data
Examples: (2 marks) Any two
1. A home automation device that allows remotely monitoring the status of
appliances and controlling the appliances.
2. An industrial machine which sends information abouts its operation and health
monitoring data to a server.
3. A car which sends information about its location to a cloud-based service.
4. A wireless-enabled wearable device that measures data about a person such as
the number of steps walked and sends the data to a cloud-based service.

Page 5of 6
0400ECT458102301

b) (5)

Module V
19 a) Use cases analysis enables requirements analyses. Use cases are key feature of many (6)
models and frameworks for processes development. Examples of use cases need are
boot process protection, secure software, firmware update, stored data encryption and
integrity protection. Data storage need protection from hackers. (3 marks)
Misuse cases define the required behaviour of components under development which
should not happen. That highlights the threats to enable designing of new use cases for
prevention of attack and find out what should not happen.Example of misuse cases
requirements are identity misuse cases and non-repudiation. (3 marks)
b) (8)

OR
20 a) Explain Smart City Security Architecture (6)
b) Figure (4 marks) Explanation (4 marks) (8)
****

Page 6of 6

You might also like