CT-1 Answer Key (SET-A)
Part-A
1. Internet of Things (IoT) is the network of physical objects—devices, vehicles,
buildings and other items embedded with electronics, software, sensors, and
network connectivity—that enables these objects to collect and exchange data
2. IoT Characteristics are:
• Dynamic and self adapting
• Self- Configuring
• Interoperable Communication Protocols
• Unique Identity
• Integrated into Information Network
3. IoT not a new technology as it incorporates the following :
• Advanced M2M communication
• Autonomic networking
• Data mining
• Security and privacy
• Cloud computing
• Advanced sensing and actuation
4.
5.
6. Need for ETSI M2M are :
• Provide an M2M architecture with a generic set of capabilities for M2M services
• Provide a framework for developing services independently of the underlying
network Facilitate deployment of vertical applications
• Facilitate innovation across industries by exposing data and information and
providing services.
7. Software Defined Networking is a networking architecture that separates the
control plane from the data and centralizes the network controller
Part-B
8(a)
8(b)
9(a)
9(b)
SET-B
Part-A
1.
2. Sensors/Actuators <-------→ Arduino---------→Wireless Communication--------
Cloud
3.
4. M2M and IoT involve networking of machines and devices where they differ in
• Technologies
• System Architectures
• Types of applications
Differences between M2M and IoT are:
▪ Communication protocols
▪ Machines in M2M and things in IoT
▪ Hardware and Software emphasis
▪ Data collection and Analysis
▪ Applications
5. IoT systems can have a distributed deployments comprising of number of IoT
devices which collect data from sensors or perform actuation.
• Automating configuration
• Monitoring Operational & Statistical Data
• Improved Reliability
• System wide Configuration
• Multiple system configurations
• Retrieving and Reusing configuration
6. ETSI M2M Release 1 provides standardized security mechanism for the
reference point mId .The device/gateway needs to have keys for securing the
connection. The device/gateway is provisioned with the key M2M Root Key.
The high level procedure are to
o Perform mutual mId end point authentication
o Perform M2M Connection Key agreement
o Optionally establish a secure session over mId.
o Perform RESTful procedures over the mId
7. Network functions virtualization (NFV) defines standards for compute, storage,
and networking resources that can be used to build virtualized network
functions
Part-B
8(a)
8(b) Level 1:
Level 2:
Level 3:
Level 4:
9(a)
9(b)