Model Set 2 Iot Answer Key
Model Set 2 Iot Answer Key
What does the following line of code do?sudo apt-get install python-rpi.gpio
6. (a) It installs the (b)It installs the (c)Both (a) and (b) (d) Neither (a) nor [AP] CO3
Raspberry Pi GPIO Python essentials for (b)
library GPIO
Which of the following is a primary function of data analytics in IoT?
7. a)Data storage b) Data extraction for c) Battery life d) Increasing data [AP] CO4
optimization decision-making extension redundancy
Which of the following is a commonly used Big Data Analytics tool?
8. [RE] CO4
a) Apache Kafka large d) Adobe Photo
b) Tableau c) MS Word
datasets shop
Hadoop plays an increasingly big role in the collection, storage, and processing of IoT
data due to its highly scalable nature and its ability to work with large volumes of
data.Many organizations have adopted Hadoop clusters for storage and processing of
17. data and have looked for complimentary software packages to add additional [UN] CO4
functionality to their distributed Hadoop clusters.
Hadoop in 2011, many projects have been developed to add incremental functionality to
Hadoop and have collectively become known as the Hadoop ecosystem. Hadoop now
comprises more than 100 software projects under the Hadoop umbrella, Each of these
individual projects is a unique piece of the overall data management solution.
Differentiate Structured vs Unstructured Data.
Device Manufacturers
Connectivity Providers
Platform Providers
19. Application Developers [RE] CO5
Data Analysts and AI Providers
· End Users
(OR)
(b) Explain in detail about Iot Network architecture and design with the
requirements driving specific architectural Changes for IoT . (14)
[UN] CO1
The architecture of IoT depends upon its functionality and implementation in different
sectors. Still, there is a basic process flow based on which IoT is built.
1.Sensing Layer : The sensing layer is the first layer of the IoT architecture and is
responsible for collecting data from different sources.
This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters.
These devices are connected to the network layer through wired or wireless
communication protocols.
2.Network Layer :The network layer of an IoT architecture is responsible for
providing communication and connectivity between devices in the IoT system. It
includes protocols and technologies that enable devices to connect and communicate
with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as
4G and 5G.
3.Data processing Layer : The data processing layer of IoT architecture refers to the
software and hardware components that are responsible for collecting, analyzing, and
interpreting data from IoT devices. This layer is responsible for receiving raw data [UN] CO1
from the devices, processing it, and making it available for further analysis or action.
4.Application Layer The application layer of IoT architecture is the topmost layer
that interacts directly with the end-user.
It is responsible for providing user-friendly interfaces and functionalities that enable
users to access and control IoT devices.
This layer includes various software and applications such as mobile apps, web portals,
and other user interfaces that are designed to interact with the underlying IoT
infrastructure.
Drivers Behind New Network Architectures Challenge:
1.Security
2.Devices and networks constrained by power cpu memory and link speed
3.Massive volume of data generated
4.Support for legacy services
5.Need for data to be analyzed real time
a)ii) Point out the Communication criteria and Access Technologies for connecting
smart Objects. (7)
Communication criteria
Range:
Frequency Bands:
Power Consumption:
Topology:
Constrained Devices:
Constrained-Node Networks:
Short range:
The classical wired example is a serial cable.
Wireless short-range technologies supporting tens of meters of maximum distance
between two devices.
Examples: IEEE 802.15.1 Bluetooth
IEEE 802.15.7 Visible Light communication
These short-range communication methods are found in only a minority of IoT
installations.
Medium range:
This range is the main category of IoT access technologies.
In the range of tens to hundreds of meters, many specifications and implementations are
available.
EX:The maximum distance is generally less than 1 mile between two devices,
IEEE 802.15.4, and 802.15.4g WPAN. Wired technologies such as IEEE 802.3
Ethernet and IEEE 1901.2 Narrowband Power Line Communications (PLC)
Long range:
Distances greater than 1 mile between two devices require long-range technologies.
Wireless examples are cellular (2G, 3G, 4G) and some applications of outdoor IEEE
802.11 Wi-Fi and Low-Power Wide-Area (LPWA) technologies.
LPWA communications have the ability to communicate over a large area without
consuming much power. These technologies are therefore ideal for battery-powered IoT
sensors.
frequency band: [AN] CO2
IoT access technologies, the frequency bands leveraged by wireless communications are
split between 1.licensed and 2. unlicensed bands.
Licensed spectrum is generally applicable to IoT long-range access technologies .
Allocated to communications infrastructures deployed by services providers, public
services broadcasters, and utilities. It provides gurantees
Unlicensed spectrum is usually simpler to deploy than licensed .
it does not require a service provider. However, it can suffer from more interference
because other devices may be competing for the same frequency in a specific area.
It does not provides gurantees. unlicensed spectrum for the industrial, scientific, and
medical (ISM) portions of the radio bands.
Power node:
A powered node has a direct connection to a power source or Battery power source.
Battery-powered nodes bring much more flexibility to IoT devices. These nodes are often
classified by the required lifetimes of their batteries.
IoT wireless access technologies needs of low power consumption and connectivity for
battery-powered nodes. This has led to the evolution of a new wireless environment
known as Low-Power Wide-Area (LPWA).
Topology:
Three main topology schemes are used in IOT networks
1. star 2.mesh 3.peer-to-peer.
long-range and short-range technologies, a star topology is prevalent, as seen with
cellular, LPWA, and Bluetooth networks. Star topologies utilize a single central base
station or controller to allow communications with endpoints.
medium-range technologies, a star, peer-to-peer, or mesh topology is common
Peer-to-peer topologies allow any device to communicate with any other device as long
as they are in range of each other. Obviously, peer-to-peer topologies
rely on multiple full-function devices.
Peer-to-peer topologies enable more complex formations, such as a mesh networking
topology.
Classes of Constrained NODES:
Class 0:This class of nodes is severely constrained, with less than 10 KB of memory and
less than 100 KB of Flash processing and storage capability. These nodes are typically
battery powered.
They do not have the resources required to directly implement an IP stack and associated
security mechanisms.
example :Class 0 node is a push button that sends 1 byte of information when changing its
status. suited to new unlicensed LPWA wireless technology
Class 1:While greater than Class 0, the processing and code space characteristics
(approximately 10 KB RAM and approximately 100 KB Flash) of Class 1 are still lower
than expected for a complete IP stack implementation.
Nodes can implement an optimized stack specifically designed for constrained nodes,
such as Constrained Application Protocol (CoAP).
(OR)
(b) Describe Physical and MAC Layer Topology and security of IEEE 802.15.4 and
Tabulate the Protocol Stacks Utilizing IEEE 802.15.4 . (14)
IEEE 802.15.4: IEEE 802.15.4 is a wireless access technology for low-cost and low
data-rate devices that are powered or run on batteries. In addition to being low cost
and offering a reasonable battery life, this access technology enables easy installation
using a compact protocol stack while remaining both simple and flexible. IEEE
802.15.4 is commonly found in the following types of deployments
Home and building automation
o Automotive networks
o Industrial wireless sensor networks
o Interactive toys and remote controls
Standardization and Alliances: IEEE 802.15.4 or IEEE 802.15 Task Group 4
defines low-data-rate PHY and MAC layer specifications for wireless personal area
networks (WPAN).
Physical Layer: The 802.15.4 standard supports an extensive number of PHY options
that range from 2.4 GHz to sub-GHz frequencies in ISM bands.
o 2.4 GHz, 16 channels, with a data rate of 250 kbps
o 915 MHz, 10 channels, with a data rate of 40 kbps.
o 868 MHz, 1 channel, with a data rate of 20 kbps
IEEE 802.15.4-2015 introduced additional PHY communication options. They are:
o OQPSK PHY: This is DSSS PHY, employing offset quadrature phase-shift
keying (OQPSK) modulation. OQPSK is a modulation technique that uses
four unique bit values that are signalled by phase changes.
o BPSK PHY: This is DSSS PHY, employing binary phase-shift keying
(BPSK) modulation. BPSK specifies two unique phase shifts as its data
encoding scheme.
o ASK PHY: This is parallel sequence spread spectrum (PSSS) PHY,
employing amplitude shift keying (ASK) and BPSK modulation. PSSS is an
advanced encoding scheme that offers increased range, throughput, data rates,
and signal integrity compared to DSSS.
MAC Layer: The IEEE 802.15.4 MAC layer manages access to the PHY channel by
defining how devices in the same area will share the frequencies allocated. At this
layer, the scheduling and routing of data frames are also coordinated. The 802.15.4
MAC layer performs the following tasks:
o Network beaconing for devices acting as coordinators
o PAN association and disassociation by a device
o Device security
o Reliable link communications between two peer MAC entities
The MAC layer achieves these tasks by using various predefined frame
Topology: IEEE 802.15.4–based networks can be built as star, peer-to-peer, or mesh
topologies. Mesh networks tie together many nodes. This allows nodes that would be
out of range if trying to communicate directly to leverage intermediary nodes to
transfer communications
[UN] CO2
23. (a) i) Illustrate in detail about Raspberry Pi GPIO Acess and Sending and Receiving
Signals Using GPIO pins . (7)
Raspberry Pi GPIO Access and Sending/Receiving Signals Using GPIO Pins
The General Purpose Input/Output (GPIO) pins on a Raspberry Pi provide a way to
interface with external devices like LEDs, sensors, motors, and other hardware. These
pins enable sending signals (output) and receiving signals (input), allowing Raspberry Pi
to control or sense the external environment.
GPIO Basics :Numbering Systems:
Raspberry Pi GPIO pins can be referenced using:
BCM (Broadcom chip-specific numbering): Based on the SoC pin numbers.
BOARD: Refers to the physical pin numbers on the Raspberry Pi header.
GPIO Header:
Most Raspberry Pi models have a 40-pin GPIO header. Some pins are for specific
purposes like power (3.3V, 5V, GND), while others are programmable as input/output.
accessing GPIO Pins
Setting Up the GPIO Library:
Use the RPi.GPIO Python library for GPIO access. Install it using:
sudo apt-get install python3-rpi.gpio
Configuring Pins:
Pins must be configured as input or output based on their intended use.
GPIO.setmode(GPIO.BCM) # Set pin numbering system (BCM or BOARD)
GPIO.setup(pin, GPIO.OUT) # Configure a pin as output
GPIO.setup(pin, GPIO.IN) # Configure a pin as input
Sending Signals Using GPIO Pins (Output)
Sending a signal means controlling external devices by setting GPIO pins to HIGH
(3.3V) or LOW (0V).
Example: Blink an LED
python
Copy code
import RPi.GPIO as GPIOimport time [AP] CO3
(OR)
b) i) Explain Raspberry Pi hardware with the help of diagram. (7)
Specs of the Computer: – The computer has a quad-core ARM processor that
doesn’t support the same instruction as an X86 desktop CPU. It has 1GB of
RAM, One HDMI port, four USB ports, one Ethernet connection, Micro SD slot
for storage, one combined 3.5mm audio/videoport, and a Bluetooth connection. It
has got a series of input and output pins that are used for making projects like
– home security camera, encrypted door lock, etc.
Versatility of Raspberry Pi: – It is indeed a versatile computer and can be
utilized by people from all age groups, it can be used for watching videos on
YouTube, watching movies, and programming in languages like Python, Scratch,
and many more. As mentioned above it has a series of I/O pins that give this
board the ability to interact with its environment and hence can beutilized to build
really cool and interactive projects.
Examples of projects: – It can be turned into a weather station by connecting
some instruments to it for check the temperature, wind speed, humidity etc… It
can be turned into a home surveillance system due to its small size; by adding
some cameras to it the security network will be ready. If you love reading books
it can also become a storage device for storing thousands of eBooks and also you
can access them through the internet by using this device.
Build Physical Projects With Python on the Raspberry Pi
The Raspberry Pi is one of the leading physical computing boards on the market.
From hobbyists building DIY projects to students learning to program for the first time,
people use the RaspberryPi every day to interact with the world around them. Python
comes built in on the Raspberry Pi, so you can take your skills and start building your
own Raspberry Pi projects today.
building DIY projects to students learning to program for the first time, people
use the RaspberryPi every day to interact with the world around them. Python
comes built in on the Raspberry Pi, so you can take your skills and start building
your own Raspberry Pi projects today.
The Raspberry Pi is a single-board computer developed by the Raspberry Pi
Foundation, a UK- based charity organization. Originally designed to provide
young people with an affordable computing option to learn how to program, it
has developed a massive following in the maker and DIY communities because
of its compact size, full Linux environment, and general-purpose input–output
(GPIO) pins.
www.EnggTree.co
m
b)ii) Write a Simple Arduino Program to blink a LED with 500 msec delay in
between ON and OFF. (7)
// C++ code
void setup()
{
pinMode(13, OUTPUT);
}
void loop() [AP] CO3
{
digitalWrite(13, HIGH);
delay(500); // Wait for 500 millisecond(s)
digitalWrite(13, LOW);
delay(500); // Wait for 500 millisecond(s)
}
24. (a) Examinethe need for Network Analytic and discuss on flexible Net flow
Architecture. (14)
Application traffic monitoring and profiling: Monitoring and profiling can be used to
gain a detailed time-based view of IoT access services, such as the application layer
protocols,including MQTT, CoAP, and DNP3.
Capacity planning: Flow analytics can be used to track and anticipate IoT traffic growth
and help in the planning of upgrades when deploying new locations or services by
analyzing captured data over a long period of time.
Security analysis: Because most IoT devices typically generate a low volume of traffic
and always send their data to the same server(s), any change in network traffic behaviour
may indicate a cyber security event, such as a denial of service (DoS) attack. Security can
be enforced by ensuring that no traffic is sent outside the scope of the IoT domain.
Accounting: In field area networks, routers or gateways are often physically isolated
andleverage public cellular services and VPNs for backhaul.
Deployments may have thousands of gateways connecting the last-mile IoT
infrastructure over a cellular network. Flow monitoring can thus be leveraged to analyze
and optimize the billing, in complement with other dedicated applications, such as Cisco
Jasper, with a broader scope than just monitoring data flow.
Data warehousing and data mining: Flow data can be warehouse for later retrieval and
analysis in support of proactive analysis of multiservice IoT infrastructures and
applications.
FNF is a flow technology developed by Cisco Systems that is widely deployed all over
the world. Key advantages of FNF are as follows:
Flexibility, scalability, and aggregation of flow data Ability to monitor a wide range of
packet information and produce new information about network behaviour:
Enhanced network anomaly and security detection Convergence of multiple accounting
technologies into one accounting mechanism
FNF Flow Monitor (Net Flow cache):
It describes the NetFlow cache or information stored in the cache.
The Flow Monitor contains the flow record definitions with key fields (used to create a
flow, unique per flow record:match statement)
non-key fields (collected with the flow as attributes or characteristics of a flow) within
the cache.
FNF flow record:
A flow record is a set of key and non-key Net Flow field values used to characterize
flows in the Net Flow cache.
Flow records may be predefined for ease of use or customized and user defined.
A typical predefined record aggregates flow data and allows users to target common
applications for Net Flow.
User-defined records allow selections of specific key or non-key fields in the flow
record.
FNF Exporter: (sending the export ,transport for the export ,properties for the export)
There are two primary methods for accessing Net Flow data:
1.Using the show commands at the command-line interface (CLI),
2. using an application reporting tool.
Net Flow Export to the Net Flow reporting collector.
The Flexible Net Flow Exporter allows the user to define where the export can be sent,
the type of transport for the export, and properties for the export. Multiple exporters can
be configured per Flow Monitor.
Flow export timers: Timers indicate how often flows should be exported to the collection
and reporting server.
Net Flow export format: This simply indicates the type of flow reporting format.
Net Flow server for collection and reporting:
This is the destination of the flow export. It is often done with an analytics tool that looks
for anomalies in the traffic patterns.
(OR)
(b) Illustrate in detail about Formal Risk Analysis structures Octave and Fair. (14)
[AN] CO4
2. Robust Infrastructure
Description: Establish a reliable network infrastructure, including high-speed
internet, IoT gateways, and cloud computing platforms.
Contribution: Enables real-time data collection and processing, essential for
dynamic service management.
3. Interoperability Standards
Description: Develop standards for communication protocols, data formats, and
device compatibility.
Contribution: Ensures seamless integration of diverse IoT systems, reducing
operational silos and enabling holistic city management.
(OR)
b)Examine the security challenges in smart city IoT deployments. What should a
Smart City Security Architecture include to ensure data privacy and system
integrity?
Security Challenges in Smart City IoT Deployments
Data Privacy:
IoT devices in smart cities collect vast amounts of personal and sensitive data (e.g., from
health monitors, traffic systems, and surveillance). This data is at risk of unauthorized
access, theft, or misuse, which can compromise the privacy of residents.
Device Vulnerabilities:
Many IoT devices have limited processing power and inadequate security measures,
making them vulnerable to attacks like hacking, malware, and data breaches. These
devices can be exploited to gain access to the entire smart city infrastructure. Network
Security:
IoT devices communicate over various networks, and these communication channels can
be targeted for man-in-the-middle attacks, eavesdropping, or denial-of-service attacks.
Securing these networks is crucial for maintaining the integrity of the entire system.
Scalability of Security Solutions:
As smart city deployments grow, it becomes challenging to scale security solutions
effectively. A large number of connected devices increases the attack surface, making it
harder to monitor and secure every endpoint.
Interoperability and Integration Issues: [EV] CO5
Different IoT systems, devices, and platforms often operate on different protocols,
which can lead to integration challenges. This lack of standardization makes it harder to
ensure consistent security across the entire smart city ecosystem.
Lack of Regular Updates and Patch Management:
IoT devices may not receive regular software updates or patches, leaving them exposed
to newly discovered vulnerabilities. Ensuring timely updates is a challenge in
maintaining a secure environment.
Smart City Security Architecture: Key Components
1. End-to-End Encryption
2. Device Authentication and Identity Management
3. Secure Communication Channels
4. Access Control and Role-Based Authorization
5. Continuous Monitoring and Threat Detection
6. Data Privacy Policies
7. Automated Patch Management
8. Decentralized Security
9. Incident Response Plan
10. Security Audits and Compliance