Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
43 views22 pages

Model Set 2 Iot Answer Key

The document is an examination paper for the IV Year MTech Computer Science and Engineering course at Erode Sengunthar Engineering College, focusing on the Internet of Things (IoT). It includes multiple-choice questions, short answer questions, and essay-type questions covering various aspects of IoT, such as architecture, technologies, data processing, and smart applications. The exam is structured into three parts, assessing knowledge and understanding of IoT concepts and their practical applications.

Uploaded by

karpagamrathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views22 pages

Model Set 2 Iot Answer Key

The document is an examination paper for the IV Year MTech Computer Science and Engineering course at Erode Sengunthar Engineering College, focusing on the Internet of Things (IoT). It includes multiple-choice questions, short answer questions, and essay-type questions covering various aspects of IoT, such as architecture, technologies, data processing, and smart applications. The exam is structured into three parts, assessing knowledge and understanding of IoT concepts and their practical applications.

Uploaded by

karpagamrathan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 22

ERODE SENGUNTHAR ENGINEERING COLLEGE

(An Autonomous Institution , Affiliated to Anna


University)
IV Year-MTech Computer Science and Engineering
MODEL EXAMINATION
Credit: 3 21CS702 - INTERNET OF THINGS R-2021
Date : 13.11.2024 SET-II(Answer Key) Maximum marks: 100
ANSWER ALL THE
Time: 9.40 a.m.–12.40 p.m. Duration: 3 hrs
QUESTIONS
Q.N Part- A ( 8 x 1 = 8 Marks) Bloo COs
Which of the following technologies have unified and has resulted in the evolution of
IoT?
1. (a) High-power [UN] CO1
(b) Super Computing (c) Engine
embedded systems Technology d) None of these

Which of the following are the enables of IoT?


2. [RE] CO1
a) RFID b)Nanotechnology c) Sensors d) All of these

In Mobile WSN, the Data Mules


3. (a) Collect the data b) Goes to the sink [UN] CO2
c) Both (a) and (b) d) Neither (a) nor
from sensor nodes and delivers the (b)
collected data
Zigbee commonly uses __________data rate.
4. [RE] CO2
a) 250 Mbps b) 260 kbps c) 260 Mbps d)None of these

Arduino Uno board has ______ number of PWM pins?


5. [RE] CO3
a) 9 b) 4 c) 8 d) None of these

What does the following line of code do?sudo apt-get install python-rpi.gpio
6. (a) It installs the (b)It installs the (c)Both (a) and (b) (d) Neither (a) nor [AP] CO3
Raspberry Pi GPIO Python essentials for (b)
library GPIO
Which of the following is a primary function of data analytics in IoT?
7. a)Data storage b) Data extraction for c) Battery life d) Increasing data [AP] CO4
optimization decision-making extension redundancy
Which of the following is a commonly used Big Data Analytics tool?
8. [RE] CO4
a) Apache Kafka large d) Adobe Photo
b) Tableau c) MS Word
datasets shop

Smart city is an _____________ system.


9. [RE] CO5
a) local b) rural c) home d) urban
Which of the following is a key component of a Smart City IoT Security Architecture?

10. b) Data encryption [UN] CO5


a) Increased d) Reduced number of
and privacy c) Limited public
citizen IoT devices in public
protection Wi-Fi networks
surveillance spaces
mechanisms
Q.N Bloo
Part- B ( 7 x 2 = 14 Marks) m’s COs
o
What does IOT and digitization mean? Level
IOT focuses on connecting things such as object and machines to a computer network
such as internet.
Digitization:
Generally It Encompasses the connection of things with data.
11. Its simplest form conversion of information into digital format. [UN] CO1
Digitization happening in one form to another form several decades.
Example: Photography industry has been digitized.
Video we are using DVD ,CD But now with digitization Streamimg video downloading
video files. Transport industry digitization. the taxi services uber,ola use digital
technology to allow people to get ride.
List and explain some of the differences between IT and OT networks and their
various challenges.

12. [RE] CO1

Formulate on constrained nodes and constrained networks.


Constrained Nodes: These refer to devices with limited computational power, memory,
and energy, often seen in IoT environments. For example, low-power microcontrollers or
sensors that can only handle simple tasks due to resource limitations. These nodes need
optimized protocols and lightweight software to function effectively in IoT networks.
13. Constrained Networks: These networks consist of devices with limited bandwidth, [AP] CO2
intermittent connectivity, high packet loss, or low data rates. Such networks are designed
to support constrained nodes and typically operate in environments like low-power wide-
area networks (LPWAN) or wireless sensor networks (WSN), where efficiency and low
resource consumption are critical.
Distinguish IEEE 802.15.4g and IEEE 802.15.4e.
IEEE 802.15.4g: This standard focuses on low-data-rate, long-range wireless networks,
particularly for Smart Utility Networks (SUN) like smart metering and industrial
applications. It is optimized for outdoor, large-scale networks with data rates up to 1
Mbps. It uses different frequency bands such as sub-GHz (900 MHz), which provides
better coverage and range.
IEEE 802.15.4e: This extension of IEEE 802.15.4 introduces additional MAC (Media
14. Access Control) layer functionalities aimed at improving reliability, low latency, and [UN] CO2
energy efficiency in industrial environments. It includes techniques like Time Slotted
Channel Hopping (TSCH) and deterministic delay, making it suitable for industrial
automation and wireless sensor networks.

In What Way Raspberry Pi is different from Arduino.


Difference Between Raspberry Pi and Arduino
Type:Raspberry Pi is a mini-computer that runs a full operating system.
Arduino is a micro controller board for running single, real-time programs.
15. Capabilities: Raspberry Pi support multitasking, networking, and high-level [AP] CO3
programming (e.g., Python).Arduino is simpler, focusing on real-time control and
hardware-level tasks (e.g., sensor control).

List the Available Models in Raspberry Pi.


List of Raspberry pi models and releases year:
1. pi 1 model B – 2012
2. pi 1 model A – 2013
3. pi 1 model B+ -2014
16. 4. pi 1 model A+ – 2014 [RE] CO3
5. Pi 2 Model B – 2015
6. Pi 3 Model B- 2016
7. Pi 3 Model B+ -2018

Discuss on Hadoop ecosystem.

Hadoop plays an increasingly big role in the collection, storage, and processing of IoT
data due to its highly scalable nature and its ability to work with large volumes of
data.Many organizations have adopted Hadoop clusters for storage and processing of
17. data and have looked for complimentary software packages to add additional [UN] CO4
functionality to their distributed Hadoop clusters.
Hadoop in 2011, many projects have been developed to add incremental functionality to
Hadoop and have collectively become known as the Hadoop ecosystem. Hadoop now
comprises more than 100 software projects under the Hadoop umbrella, Each of these
individual projects is a unique piece of the overall data management solution.
Differentiate Structured vs Unstructured Data.

18. [UN] CO4

List the key players in the IoT ecosystem.

Device Manufacturers
Connectivity Providers
Platform Providers
19. Application Developers [RE] CO5
Data Analysts and AI Providers
· End Users

Compose the use of smart traffic application.

Use of Smart Traffic Applications:


Smart traffic applications optimize traffic flow, reduce congestion, and improve safety by
20. using IoT-enabled sensors and analytics. They provide real-time traffic updates, adaptive [CR] CO5
signal control, and route optimization, enhancing commuter experience and reducing
environmental impact through lower emissions.

Part- C (5 x 14= 70 Marks)


a) Illustrate the one M2M IoT standardized architecture and explain the layers
with neat diagram. (14)
The European Telecommunications Standards Institute (ETSI) created the M2M
Technical Committee in 2008. (Machine to Machine)
One of the greatest challenges in designing an IoT architecture is dealing with the
heterogeneity of devices, software, and access methods. By developing a horizontal
platform architecture,
oneM2M is developing standards that allow interoperability at all levels of the IoT stack .
The oneM2M architecture divides IoT functions into three major domains:
application layer,
services layer,
network layer
Application Layer:
The oneM2M architecture gives major attention to connectivity
between devices and their applications.
21. This domain includes the application-layer protocols and northen bound API used here [UN] CO1
so Interoperability of devices is possible
Application entities software component that implement specific application logic such
as monitoring, controlling sensor and actuator interact with common services layer.
Services layer:
This layer is shown as a horizontal framework across the vertical
industry applications.
Device Management , data collection, data storage,security communication
management and delivary handling ,message routing ,protocol translation and
communication scheduling.
Network layer: This is the communication domain for the IoT devices and endpoints.
It includes the devices themselves and the communications network that links them.
this communications infrastructure include wireless mesh technologies, such as IEEE
802.15.4, and wireless point-to-multipoint systems, such as IEEE 801.11ah,Zigbee,wifi..
It ensures that data collected by devices transmitted to appropriate destination.

(OR)

(b) Explain in detail about Iot Network architecture and design with the
requirements driving specific architectural Changes for IoT . (14)

[UN] CO1
The architecture of IoT depends upon its functionality and implementation in different
sectors. Still, there is a basic process flow based on which IoT is built.
1.Sensing Layer : The sensing layer is the first layer of the IoT architecture and is
responsible for collecting data from different sources.
This layer includes sensors and actuators that are placed in the environment to gather
information about temperature, humidity, light, sound, and other physical parameters.
These devices are connected to the network layer through wired or wireless
communication protocols.
2.Network Layer :The network layer of an IoT architecture is responsible for
providing communication and connectivity between devices in the IoT system. It
includes protocols and technologies that enable devices to connect and communicate
with each other and with the wider internet. Examples of network technologies that are
commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular networks such as
4G and 5G.
3.Data processing Layer : The data processing layer of IoT architecture refers to the
software and hardware components that are responsible for collecting, analyzing, and
interpreting data from IoT devices. This layer is responsible for receiving raw data [UN] CO1
from the devices, processing it, and making it available for further analysis or action.
4.Application Layer The application layer of IoT architecture is the topmost layer
that interacts directly with the end-user.
It is responsible for providing user-friendly interfaces and functionalities that enable
users to access and control IoT devices.
This layer includes various software and applications such as mobile apps, web portals,
and other user interfaces that are designed to interact with the underlying IoT
infrastructure.
Drivers Behind New Network Architectures Challenge:
1.Security
2.Devices and networks constrained by power cpu memory and link speed
3.Massive volume of data generated
4.Support for legacy services
5.Need for data to be analyzed real time

(a) i) Explain the Characteristics of a Smart Object. (7)


Processing unit: A smart object has some type of processing unit for acquiring data,
processing and analyzing sensing information received by the sensor(s), coordinating
control signals to any actuators, and controlling a variety of functions on the smart
object, including the communication and power systems. The specific type of
processing unit that is used can vary greatly, depending on the specific processing
needs of different applications. The most common is a micro controller because of its
small form factor, flexibility, programming simplicity, ubiquity, low power
consumption, and low cost.
22. Sensor(s) and/or actuator(s): A smart object is capable of interacting with the [UN] CO2
physical world through sensors and actuators. As described in the previous sections, a
sensor learns and measures its environment, whereas an actuator is able to produce
some change in the physical world. A smart object does not need to contain both
sensors and actuators. In fact, a smart object can contain one or multiple sensors
and/or actuators, depending upon the application.

Communication device: The communication unit is responsible for connecting a


smart object with other smart objects and the outside world (via the network).
Communication devices for smart objects can be either wired or wireless.
Overwhelmingly, in IoT networks smart objects are wirelessly interconnected for a
number of reasons, including cost, limited infrastructure availability, and ease of
deployment.
 Power source: Smart objects have components that need to be powered. The most
significant power consumption usually comes from the communication unit of a smart
object. As with the other three smart object building blocks, the power requirements
also vary greatly from application to application. Typically, smart objects are limited
in power, are deployed for a very long time, and are not easily accessible. Smart
object relies on battery power, requires power efficiency, judicious power
management, sleep modes, ultra-low power consumption hardware.

a)ii) Point out the Communication criteria and Access Technologies for connecting
smart Objects. (7)
Communication criteria
Range:
Frequency Bands:
Power Consumption:
Topology:
Constrained Devices:
Constrained-Node Networks:

Short range:
The classical wired example is a serial cable.
Wireless short-range technologies supporting tens of meters of maximum distance
between two devices.
Examples: IEEE 802.15.1 Bluetooth
IEEE 802.15.7 Visible Light communication
These short-range communication methods are found in only a minority of IoT
installations.
Medium range:
This range is the main category of IoT access technologies.
In the range of tens to hundreds of meters, many specifications and implementations are
available.
EX:The maximum distance is generally less than 1 mile between two devices,
IEEE 802.15.4, and 802.15.4g WPAN. Wired technologies such as IEEE 802.3
Ethernet and IEEE 1901.2 Narrowband Power Line Communications (PLC)
Long range:
Distances greater than 1 mile between two devices require long-range technologies.
Wireless examples are cellular (2G, 3G, 4G) and some applications of outdoor IEEE
802.11 Wi-Fi and Low-Power Wide-Area (LPWA) technologies.
LPWA communications have the ability to communicate over a large area without
consuming much power. These technologies are therefore ideal for battery-powered IoT
sensors.
frequency band: [AN] CO2
IoT access technologies, the frequency bands leveraged by wireless communications are
split between 1.licensed and 2. unlicensed bands.
Licensed spectrum is generally applicable to IoT long-range access technologies .
Allocated to communications infrastructures deployed by services providers, public
services broadcasters, and utilities. It provides gurantees
Unlicensed spectrum is usually simpler to deploy than licensed .
it does not require a service provider. However, it can suffer from more interference
because other devices may be competing for the same frequency in a specific area.
It does not provides gurantees. unlicensed spectrum for the industrial, scientific, and
medical (ISM) portions of the radio bands.
Power node:
A powered node has a direct connection to a power source or Battery power source.
Battery-powered nodes bring much more flexibility to IoT devices. These nodes are often
classified by the required lifetimes of their batteries.
IoT wireless access technologies needs of low power consumption and connectivity for
battery-powered nodes. This has led to the evolution of a new wireless environment
known as Low-Power Wide-Area (LPWA).
Topology:
Three main topology schemes are used in IOT networks
1. star 2.mesh 3.peer-to-peer.
long-range and short-range technologies, a star topology is prevalent, as seen with
cellular, LPWA, and Bluetooth networks. Star topologies utilize a single central base
station or controller to allow communications with endpoints.
medium-range technologies, a star, peer-to-peer, or mesh topology is common
Peer-to-peer topologies allow any device to communicate with any other device as long
as they are in range of each other. Obviously, peer-to-peer topologies
rely on multiple full-function devices.
Peer-to-peer topologies enable more complex formations, such as a mesh networking
topology.
Classes of Constrained NODES:
Class 0:This class of nodes is severely constrained, with less than 10 KB of memory and
less than 100 KB of Flash processing and storage capability. These nodes are typically
battery powered.
They do not have the resources required to directly implement an IP stack and associated
security mechanisms.
example :Class 0 node is a push button that sends 1 byte of information when changing its
status. suited to new unlicensed LPWA wireless technology
Class 1:While greater than Class 0, the processing and code space characteristics
(approximately 10 KB RAM and approximately 100 KB Flash) of Class 1 are still lower
than expected for a complete IP stack implementation.
Nodes can implement an optimized stack specifically designed for constrained nodes,
such as Constrained Application Protocol (CoAP).
(OR)
(b) Describe Physical and MAC Layer Topology and security of IEEE 802.15.4 and
Tabulate the Protocol Stacks Utilizing IEEE 802.15.4 . (14)

IEEE 802.15.4: IEEE 802.15.4 is a wireless access technology for low-cost and low
data-rate devices that are powered or run on batteries. In addition to being low cost
and offering a reasonable battery life, this access technology enables easy installation
using a compact protocol stack while remaining both simple and flexible. IEEE
802.15.4 is commonly found in the following types of deployments
Home and building automation
o Automotive networks
o Industrial wireless sensor networks
o Interactive toys and remote controls
 Standardization and Alliances: IEEE 802.15.4 or IEEE 802.15 Task Group 4
defines low-data-rate PHY and MAC layer specifications for wireless personal area
networks (WPAN).
Physical Layer: The 802.15.4 standard supports an extensive number of PHY options
that range from 2.4 GHz to sub-GHz frequencies in ISM bands.
o 2.4 GHz, 16 channels, with a data rate of 250 kbps
o 915 MHz, 10 channels, with a data rate of 40 kbps.
o 868 MHz, 1 channel, with a data rate of 20 kbps
IEEE 802.15.4-2015 introduced additional PHY communication options. They are:
o OQPSK PHY: This is DSSS PHY, employing offset quadrature phase-shift
keying (OQPSK) modulation. OQPSK is a modulation technique that uses
four unique bit values that are signalled by phase changes.
o BPSK PHY: This is DSSS PHY, employing binary phase-shift keying
(BPSK) modulation. BPSK specifies two unique phase shifts as its data
encoding scheme.
o ASK PHY: This is parallel sequence spread spectrum (PSSS) PHY,
employing amplitude shift keying (ASK) and BPSK modulation. PSSS is an
advanced encoding scheme that offers increased range, throughput, data rates,
and signal integrity compared to DSSS.
MAC Layer: The IEEE 802.15.4 MAC layer manages access to the PHY channel by
defining how devices in the same area will share the frequencies allocated. At this
layer, the scheduling and routing of data frames are also coordinated. The 802.15.4
MAC layer performs the following tasks:
o Network beaconing for devices acting as coordinators
o PAN association and disassociation by a device
o Device security
o Reliable link communications between two peer MAC entities
The MAC layer achieves these tasks by using various predefined frame
Topology: IEEE 802.15.4–based networks can be built as star, peer-to-peer, or mesh
topologies. Mesh networks tie together many nodes. This allows nodes that would be
out of range if trying to communicate directly to leverage intermediary nodes to
transfer communications

[UN] CO2
23. (a) i) Illustrate in detail about Raspberry Pi GPIO Acess and Sending and Receiving
Signals Using GPIO pins . (7)
Raspberry Pi GPIO Access and Sending/Receiving Signals Using GPIO Pins
The General Purpose Input/Output (GPIO) pins on a Raspberry Pi provide a way to
interface with external devices like LEDs, sensors, motors, and other hardware. These
pins enable sending signals (output) and receiving signals (input), allowing Raspberry Pi
to control or sense the external environment.
GPIO Basics :Numbering Systems:
Raspberry Pi GPIO pins can be referenced using:
BCM (Broadcom chip-specific numbering): Based on the SoC pin numbers.
BOARD: Refers to the physical pin numbers on the Raspberry Pi header.
GPIO Header:
Most Raspberry Pi models have a 40-pin GPIO header. Some pins are for specific
purposes like power (3.3V, 5V, GND), while others are programmable as input/output.
accessing GPIO Pins
Setting Up the GPIO Library:
Use the RPi.GPIO Python library for GPIO access. Install it using:
sudo apt-get install python3-rpi.gpio
Configuring Pins:
Pins must be configured as input or output based on their intended use.
GPIO.setmode(GPIO.BCM) # Set pin numbering system (BCM or BOARD)
GPIO.setup(pin, GPIO.OUT) # Configure a pin as output
GPIO.setup(pin, GPIO.IN) # Configure a pin as input
Sending Signals Using GPIO Pins (Output)
Sending a signal means controlling external devices by setting GPIO pins to HIGH
(3.3V) or LOW (0V).
Example: Blink an LED
python
Copy code
import RPi.GPIO as GPIOimport time [AP] CO3

LED_PIN = 17 # GPIO pin connected to the LED


GPIO.setmode(GPIO.BCM) # Use BCM pin numbering
GPIO.setup(LED_PIN, GPIO.OUT) # Set LED_PIN as output
try:
while True:
GPIO.output(LED_PIN, GPIO.HIGH) # Turn LED on
time.sleep(1) # Wait for 1 second
GPIO.output(LED_PIN, GPIO.LOW) # Turn LED off
time.sleep(1)except KeyboardInterrupt:
GPIO.cleanup() # Reset GPIO settings
Receiving Signals Using GPIO Pins (Input)
Receiving signals means reading the state of an input device (e.g., a button or sensor).
Example: Detect Button Press
python
Copy code
import RPi.GPIO as GPIO

BUTTON_PIN = 18 # GPIO pin connected to the button


GPIO.setmode(GPIO.BCM)
GPIO.setup(BUTTON_PIN, GPIO.IN, pull_up_down=GPIO.PUD_UP) # Set pin as
input with a pull-up resistor
try:
while True:
if GPIO.input(BUTTON_PIN) == GPIO.LOW: # Button pressed
print("Button Pressed!")except KeyboardInterrupt:
GPIO.cleanup()
a ii) Explain in detail the Raspberry Pi Interfaces. (7)
Raspberry Pi Interfaces
The Raspberry Pi provides various interfaces for connectivity, input/output, and
communication, enabling interaction with a wide range of peripherals and devices. These
interfaces make it versatile for applications in IoT, automation, and electronics projects.
Below is a detailed explanation of the key Raspberry Pi interfaces:
1. General-Purpose Input/Output (GPIO)
 Description: A 40-pin header is available on most Raspberry Pi models for
connecting external hardware like sensors, actuators, and other electronic devices.
 Features:
o Configurable as input or output pins.
o Supports digital signal input/output.
o Voltage levels: Typically 3.3V (with a maximum current limit per pin).
o Includes ground and power pins (5V and 3.3V).
 Applications: Interfacing with LEDs, buttons, motors, and external controllers.
2. USB Ports
 Description: Standard USB ports for connecting peripherals like keyboards,
mice, storage devices, and Wi-Fi adapters.
 Features: [UN] CO3
o USB 2.0 ports (older models) and USB 3.0 ports (Raspberry Pi 4).
o Supports plug-and-play devices.
3. HDMI Interface
 Description: A full-sized or micro-HDMI port for connecting monitors or TVs.
 Features:
o Outputs high-definition video and audio.
o Supports resolutions up to 4K in Raspberry Pi 4.
 Applications: Creating media centers, digital signage, and programming
environments with visual feedback.
4. CSI (Camera Serial Interface)
 Description: A dedicated 15-pin MIPI CSI-2 connector for connecting the
Raspberry Pi Camera Module.
 Features:
o High-speed interface for capturing images and videos.
o Direct integration with the Raspberry Pi hardware for optimized
performance.
Applications: Surveillance systems, facial recognition projects, and photography.

(OR)
b) i) Explain Raspberry Pi hardware with the help of diagram. (7)

Raspberry Pi is developed by Raspberry Pi Foundation in the United Kingdom.


The Raspberry Piis a series of powerful, small single board computer
Raspberry Pi is launched in 2012 and there have been several iterations and
variations released since then.Various versions of Raspberry Pi have been out till
date. All versions consist of a Broadcom system on a chip (SoC) with an
integrated ARM-compatible CPU and on-chip graphics processing unit
(GPU).Used: It also provides a set of general purpose input/output pins
allowing you to control electronic components for physical computing and
explore the Internet of Things (IOT).
Raspberry pi Model
There have been many generations of raspberry Pi from Pi 1 to Pi 4. There is
generally a modelA and model B. Model A is a less expensive variant and it
trends to have reduced RAM and dualcores such as USB and Ethernet.
List of Raspberry pi models and releases year:
8. pi 1 model B – 2012
9. pi 1 model A – 2013
10. pi 1 model B+ -2014
11. pi 1 model A+ – 2014
12. Pi 2 Model B – 2015
13. Pi 3 Model B- 2016
23. 14. Pi 3 Model B+ -2018 [UN] CO3

Specs of the Computer: – The computer has a quad-core ARM processor that
doesn’t support the same instruction as an X86 desktop CPU. It has 1GB of
RAM, One HDMI port, four USB ports, one Ethernet connection, Micro SD slot
for storage, one combined 3.5mm audio/videoport, and a Bluetooth connection. It
has got a series of input and output pins that are used for making projects like
– home security camera, encrypted door lock, etc.
Versatility of Raspberry Pi: – It is indeed a versatile computer and can be
utilized by people from all age groups, it can be used for watching videos on
YouTube, watching movies, and programming in languages like Python, Scratch,
and many more. As mentioned above it has a series of I/O pins that give this
board the ability to interact with its environment and hence can beutilized to build
really cool and interactive projects.
Examples of projects: – It can be turned into a weather station by connecting
some instruments to it for check the temperature, wind speed, humidity etc… It
can be turned into a home surveillance system due to its small size; by adding
some cameras to it the security network will be ready. If you love reading books
it can also become a storage device for storing thousands of eBooks and also you
can access them through the internet by using this device.
Build Physical Projects With Python on the Raspberry Pi
The Raspberry Pi is one of the leading physical computing boards on the market.
From hobbyists building DIY projects to students learning to program for the first time,
people use the RaspberryPi every day to interact with the world around them. Python
comes built in on the Raspberry Pi, so you can take your skills and start building your
own Raspberry Pi projects today.
building DIY projects to students learning to program for the first time, people
use the RaspberryPi every day to interact with the world around them. Python
comes built in on the Raspberry Pi, so you can take your skills and start building
your own Raspberry Pi projects today.
The Raspberry Pi is a single-board computer developed by the Raspberry Pi
Foundation, a UK- based charity organization. Originally designed to provide
young people with an affordable computing option to learn how to program, it
has developed a massive following in the maker and DIY communities because
of its compact size, full Linux environment, and general-purpose input–output
(GPIO) pins.

www.EnggTree.co
m
b)ii) Write a Simple Arduino Program to blink a LED with 500 msec delay in
between ON and OFF. (7)

// C++ code
void setup()
{
pinMode(13, OUTPUT);
}
void loop() [AP] CO3
{
digitalWrite(13, HIGH);
delay(500); // Wait for 500 millisecond(s)
digitalWrite(13, LOW);
delay(500); // Wait for 500 millisecond(s)
}
24. (a) Examinethe need for Network Analytic and discuss on flexible Net flow
Architecture. (14)

Network traffic monitoring and profiling:


Flow collection from the network layer provides global and distributed near-real-time
monitoring capabilities.
IPv4 and IPv6 network wide traffic volume and pattern analysis helps administrators
proactively detect problems and quickly troubleshoot and resolve problems when they

Application traffic monitoring and profiling: Monitoring and profiling can be used to
gain a detailed time-based view of IoT access services, such as the application layer
protocols,including MQTT, CoAP, and DNP3.
Capacity planning: Flow analytics can be used to track and anticipate IoT traffic growth
and help in the planning of upgrades when deploying new locations or services by
analyzing captured data over a long period of time.
Security analysis: Because most IoT devices typically generate a low volume of traffic
and always send their data to the same server(s), any change in network traffic behaviour
may indicate a cyber security event, such as a denial of service (DoS) attack. Security can
be enforced by ensuring that no traffic is sent outside the scope of the IoT domain.
Accounting: In field area networks, routers or gateways are often physically isolated
andleverage public cellular services and VPNs for backhaul.
Deployments may have thousands of gateways connecting the last-mile IoT
infrastructure over a cellular network. Flow monitoring can thus be leveraged to analyze
and optimize the billing, in complement with other dedicated applications, such as Cisco
Jasper, with a broader scope than just monitoring data flow.
Data warehousing and data mining: Flow data can be warehouse for later retrieval and
analysis in support of proactive analysis of multiservice IoT infrastructures and
applications.
FNF is a flow technology developed by Cisco Systems that is widely deployed all over
the world. Key advantages of FNF are as follows:
Flexibility, scalability, and aggregation of flow data Ability to monitor a wide range of
packet information and produce new information about network behaviour:
Enhanced network anomaly and security detection Convergence of multiple accounting
technologies into one accounting mechanism
FNF Flow Monitor (Net Flow cache):
It describes the NetFlow cache or information stored in the cache.
The Flow Monitor contains the flow record definitions with key fields (used to create a
flow, unique per flow record:match statement)
non-key fields (collected with the flow as attributes or characteristics of a flow) within
the cache.
FNF flow record:
A flow record is a set of key and non-key Net Flow field values used to characterize
flows in the Net Flow cache.
Flow records may be predefined for ease of use or customized and user defined.
A typical predefined record aggregates flow data and allows users to target common
applications for Net Flow.
User-defined records allow selections of specific key or non-key fields in the flow
record.
FNF Exporter: (sending the export ,transport for the export ,properties for the export)
There are two primary methods for accessing Net Flow data:
1.Using the show commands at the command-line interface (CLI),
2. using an application reporting tool.
Net Flow Export to the Net Flow reporting collector.
The Flexible Net Flow Exporter allows the user to define where the export can be sent,
the type of transport for the export, and properties for the export. Multiple exporters can
be configured per Flow Monitor.
Flow export timers: Timers indicate how often flows should be exported to the collection
and reporting server.
Net Flow export format: This simply indicates the type of flow reporting format.
Net Flow server for collection and reporting:
This is the destination of the flow export. It is often done with an analytics tool that looks
for anomalies in the traffic patterns.
(OR)

(b) Illustrate in detail about Formal Risk Analysis structures Octave and Fair. (14)

OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation) from


the Software Engineering Institute at Carnegie Mellon University
FAIR (Factor Analysis of Information Risk) from The Open Group
OCTAVE :OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
Evaluation) is a well-established risk assessment methodology designed to help
organizations understand and manage their information security risks.
OCTAVE has undergone multiple iterations.
The version this section focuses on is OCTAVE Allegro, which is intended to be a
lightweight and less burdensome process to implement.

[AN] CO4

Establish Risk Measurement Criteria


In this phase, the organization defines the context for the risk assessment and sets criteria
for evaluating risks.
1.Identify the Organization’s Risk Tolerance:
Understand the organization's overall attitude toward risk, which can range from risk-
averse to risk-tolerant.
2.Define Risk Measurement Criteria:
Develop specific criteria for measuring risks. These criteria may include impact
categories such as financial, reputation, regulatory compliance, or operational disruption.
Define how to measure the severity of these impacts (e.g., minor, moderate, severe).
3.Document Critical Information:
Establish key areas of focus, including business processes, information security goals,
and overall risk appetite. This sets the foundation for evaluating and prioritizing risks
later in the process.
Phase 2: Develop an Information Asset Profile
This phase focuses on identifying and cataloging the organization's critical information
assets.
1.Identify Information Assets:
List the organization’s critical information assets (e.g., customer data, financial records,
intellectual property, operational systems) that need protection.
2.Profile Each Information Asset:For each identified information asset, document
important characteristics:
Asset description: What is it? (e.g., "customer database")
Ownership: Who is responsible for it?
Value: Why is it important? What is its significance to the organization?
Security requirements: What are the confidentiality, integrity, and availability needs of
the asset?
phase 3: Identify Threats to Information Assets:In this phase, potential threats to
each critical information asset are identified and analyzed.
1.Identify Threat Sources:Threat sources can include:
Human actors: Internal (e.g., employees) or external (e.g., hackers, competitors).
Systemic issues: Software bugs, hardware failures, or network outages.
Environmental factors: Natural disasters, fire, flood, etc.
2.Identify Threat Scenarios:
For each information asset, describe how identified threats could materialize. Example
scenarios include:
Insider threats: An employee intentionally leaks sensitive data.
External cyber attacks: A hacker gains unauthorized access to customer data. [AP] CO3
Natural disasters: A flood damages servers storing critical information.
Phase 4: Identify and Mitigate Risks:The final phase involves evaluating the
identified risks and developing strategies to mitigate them.
Evaluate Risks:
Use the threat scenarios and impact analysis to evaluate and prioritize risks. Consider
both the likelihood and severity of each risk.
Create a risk matrix or prioritization table to help visualize which risks need the most
attention based on their potential impact.
Develop Mitigation Strategies:
For high-priority risks, develop actionable mitigation plans.
Strategies may include:Technical controls: Implementing firewalls, encryption, or access
controls.
Process improvements: Updating security policies, employee training, or backup
procedures.
Incident response: Creating or enhancing response plans to minimize damage if a threat
materializes.
FAIR (Factor Analysis of Information Risk)
1. Loss Event Frequency (LEF)(LEF=TEF×Vulnerability)
This represents how often an organization expects a loss event to occur and is calculated
using:
Threat Event Frequency (TEF): The rate at which a threat agent is likely to attempt or
cause a harmful event. For example, this could be a cyber-attack attempt.
venerability (Vuln): The probability that the threat event will succeed in compromising
the system or asset in question.
To calculate vulnerability, FAIR uses two factors:
Control Strength (CS): How effective existing controls (e.g., firewalls, encryption, access
control) are in defending against the threat.
Threat Capability (TC): The threat actor’s ability to overcome the organization’s control
measures.
Vulnerability is calculated by comparing control strength and threat capability:
If threat capability exceeds control strength, the vulnerability is higher
1. Loss Event Frequency (LEF)(LEF=TEF×Vulnerability)
This represents how often an organization expects a loss event to occur and is calculated
using:
Threat Event Frequency (TEF): The rate at which a threat agent is likely to attempt or
cause a harmful event. For example, this could be a cyber-attack attempt.
Vulnerability (Vuln): The probability that the threat event will succeed in compromising
the system or asset in question.
To calculate vulnerability, FAIR uses two factors:
Control Strength (CS): How effective existing controls (e.g., firewalls, encryption, access
control) are in defending against the threat.
Threat Capability (TC): The threat actor’s ability to overcome the organization’s control
measures.
Vulnerability is calculated by comparing control strength and threat capability:
If threat capability exceeds control strength, the vulnerability is higher
1. Loss Event Frequency (LEF)(LEF=TEF×Vulnerability)
This represents how often an organization expects a loss event to occur and is calculated
using:
Threat Event Frequency (TEF): The rate at which a threat agent is likely to attempt or
cause a harmful event. For example, this could be a cyber-attack attempt.
Vulnerability (Vuln): The probability that the threat event will succeed in compromising
the system or asset in question.
To calculate vulnerability, FAIR uses two factors:
Control Strength (CS): How effective existing controls (e.g., firewalls, encryption, access
control) are in defending against the threat.
Threat Capability (TC): The threat actor’s ability to overcome the organization’s control
measures.
Vulnerability is calculated by comparing control strength and threat capability:
If threat capability exceeds control strength, the vulnerability is higher
2. Loss Magnitude (LM)
Loss Magnitude represents the probable loss or damage resulting from a loss event. FAIR
breaks down Loss Magnitude into two main categories:
Primary Loss: Direct losses from the incident, such as data breaches, system downtime,
or physical destruction. This could include costs related to forensic investigations, repair
of systems, or compensating affected parties.
Secondary Loss: Indirect or follow-on losses, such as reputational damage, legal and
regulatory fines, and customer churn due to loss of trust.
For each of these categories, FAIR allows you to calculate the financial impact based on
historical data or expert estimates.
25. a)What are the key elements of an IoT strategy for smart cities? Discuss how these
elements contribute to the efficient management of urban infrastructure and
services. (14)
Key Elements of an IoT Strategy for Smart Cities
An effective IoT strategy for smart cities encompasses various elements aimed at
optimizing urban infrastructure and service delivery. These elements contribute to
efficient management and improve the quality of life for citizens.

1. Clear Vision and Objectives


 Description: Define specific goals for the smart city, such as reducing traffic
congestion, improving energy efficiency, or enhancing public safety.
 Contribution: Aligns IoT initiatives with urban challenges and citizen needs,
ensuring a focused and impactful implementation.

2. Robust Infrastructure
 Description: Establish a reliable network infrastructure, including high-speed
internet, IoT gateways, and cloud computing platforms.
 Contribution: Enables real-time data collection and processing, essential for
dynamic service management.

3. Interoperability Standards
 Description: Develop standards for communication protocols, data formats, and
device compatibility.
 Contribution: Ensures seamless integration of diverse IoT systems, reducing
operational silos and enabling holistic city management.

4. Data Management and Analytics


 Description: Implement systems for collecting, storing, and analyzing data to
generate actionable insights.
 Contribution: Supports predictive maintenance, resource optimization, and
[UN] CO5
informed decision-making.

5. Citizen Engagement Platforms


 Description: Develop mobile apps and portals for citizen interaction, feedback,
and service access.
 Contribution: Enhances public participation and satisfaction by offering
transparent and accessible services.

6. Security and Privacy Frameworks


 Description: Implement robust cybersecurity measures, including encryption,
authentication, and access controls.
 Contribution: Protects sensitive data and builds trust among citizens and
stakeholders.

7. Public-Private Partnerships (PPPs)


 Description: Collaborate with technology providers, research institutions, and
private companies for funding and innovation.
 Contribution: Accelerates technology adoption and reduces the financial burden
on governments.

8. Scalability and Flexibility


 Description: Design systems that can adapt to future technological advancements
and increased urban demands.
 Contribution: Ensures long-term sustainability and cost-efficiency of smart city
projects.

9. Policy and Governance


 Description: Establish policies for data usage, IoT deployment, and urban
development.Contribution: Provides a regulatory
How These Elements Contribute to Efficient Management of Urban Infrastructure
and Services
1. Improved Resource Allocation: Real-time data and analytics optimize the use of
resources like water, electricity, and transportation systems.
2. Enhanced Public Safety: IoT-enabled surveillance and emergency response
systems reduce crime and ensure faster incident resolution.
3. Reduced Operational Costs: Automation and predictive maintenance lower
maintenance costs and improve infrastructure reliability.
4. Better Citizen Services: User-centric platforms increase accessibility to services,
improving overall satisfaction.
5. Sustainable Development: Green technologies and energy-efficient systems
promote environmental conservation.

(OR)
b)Examine the security challenges in smart city IoT deployments. What should a
Smart City Security Architecture include to ensure data privacy and system
integrity?
Security Challenges in Smart City IoT Deployments
Data Privacy:
IoT devices in smart cities collect vast amounts of personal and sensitive data (e.g., from
health monitors, traffic systems, and surveillance). This data is at risk of unauthorized
access, theft, or misuse, which can compromise the privacy of residents.
Device Vulnerabilities:
Many IoT devices have limited processing power and inadequate security measures,
making them vulnerable to attacks like hacking, malware, and data breaches. These
devices can be exploited to gain access to the entire smart city infrastructure. Network
Security:
IoT devices communicate over various networks, and these communication channels can
be targeted for man-in-the-middle attacks, eavesdropping, or denial-of-service attacks.
Securing these networks is crucial for maintaining the integrity of the entire system.
Scalability of Security Solutions:
As smart city deployments grow, it becomes challenging to scale security solutions
effectively. A large number of connected devices increases the attack surface, making it
harder to monitor and secure every endpoint.
Interoperability and Integration Issues: [EV] CO5
Different IoT systems, devices, and platforms often operate on different protocols,
which can lead to integration challenges. This lack of standardization makes it harder to
ensure consistent security across the entire smart city ecosystem.
Lack of Regular Updates and Patch Management:
IoT devices may not receive regular software updates or patches, leaving them exposed
to newly discovered vulnerabilities. Ensuring timely updates is a challenge in
maintaining a secure environment.
Smart City Security Architecture: Key Components
1. End-to-End Encryption
2. Device Authentication and Identity Management
3. Secure Communication Channels
4. Access Control and Role-Based Authorization
5. Continuous Monitoring and Threat Detection
6. Data Privacy Policies
7. Automated Patch Management
8. Decentralized Security
9. Incident Response Plan
10. Security Audits and Compliance

You might also like