IoT Exam Model Question Paper 2023-24
IoT Exam Model Question Paper 2023-24
USN
Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE.
*Bloom’s
Module-1 Taxonomy Marks
Level
Q.01 a L1 6
Explain Evolution of IoT.
The technologies that laid the foundation of connected systems by achieving
easy integration to daily lives, popular public acceptance, and massive
benefits by using connected solutions can be considered as the founding
solutions for the development of IoT.
c 8
Explain IoT Networking Components.
L1
An IoT implementation is composed of several components, which may vary
with their application domains. Broadly classify IoT network into six types:
1) IoT node, 2) IoT router, 3) IoT LAN, 4) IoT WAN, 5) IoT gateway, and 6)
IoT proxy.
Page01of02
21CS735
(i)IoT Node: These are the networking devices within an IoT LAN. Each of
these devices is typically made up of a sensor, a processor, and a radio, which
communicates with the network infrastructure (either within the LAN or
outside it). The nodes may be connected to other nodes inside a LAN directly or
by means of a common gateway for that LAN. Connections outside the LAN
are through gateways and proxies.
(ii) IoT Router: An I oT router is a piece of networking equipment that is
primarily tasked with the routing of packets between various entities in the IoT
network; it keeps the traffic flowing correctly within the network. A router can
be repurposed as a gateway by enhancing its functionalities.
(iii) IoT LAN: The local area network (LAN) enables local connectivity within
the purview of a single gateway. Typically, they consist of short-range
connectivity technologies. IoT LANs may or may not be connected to the
Internet. Generally, they are localized within a building or an organization.
(iv) IoT WAN: The wide area network (WAN) connects various network
segments such as LANs. They are typically organizationally and geographically
wide, with their operational range lying between a few kilometers to hundreds
of kilometers. IoT WANs connect to the Internet and enable Internet access to
the segments they are connecting.
(v) IoT Gateway: An IoT gateway is simply a router connecting the IoT LAN to
a WAN or the Internet. Gateways can implement several LANs and WANs.
Their primary task is to forward packets between LANs and WANs, and the IP
layer using only layer 3.
(vi) IoT Proxy: Proxies actively lie on the application layer and performs
application layer functions between IoT nodes and other entities. Typically,
application layer proxies are a means of providing security to the network
entities under it ; it helps to extend the addressing range of its network.
OR
Q.02 a What is IoT? Write the characteristics of IoT System. L1 5
IoT is an anytime, anywhere, and anything network of Internet-connected
physical devices or systems capable of sensing an environment and affecting
the sensed environment intelligently. IoT may be considered to be made up of
connecting devices, machines, and tools; these things are made up of
sensors/actuators and processors, which connect to the Internet through
wireless technologies.
IoT systems can be characterized by the following features :
• Associated architectures, which are also efficient and scalable.
• No ambiguity in naming and addressing.
Page01of02
21CS735
• Massive number of constrained devices, sleeping nodes, mobile devices, and
non-IP devices.
• Intermittent and often unstable connectivity.
b With a neat diagram explain the interdependency technology for IoT Planes. L2 10
We can divide the IoT paradigm into four planes: services, local connectivity,
global connectivity, and processing.
Services Plane:
• The service plane is composed of two parts: 1) things or devices and 2) low-
power connectivity.
• The services offered in this layer are a combination of things and low-power
connectivity. Example, any IoT application requires the basic setup of sensing,
followed by rudimentary processing , and a low-power, low-range network,
which is mainly built upon the IEEE 802.15.4 protocol.
• The things may be wearables, computers, smartphones, household appliances,
smart glasses, factory machinery, vending machines, vehicles, UAVs, robots,
and others.
• The immediate low-power connectivity, which is responsible for connecting
the things in local implementation, may be legacy protocols such as WiFi,
Ethernet, or cellular. In contrast, modern-day technologies are mainly wireless
and often programmable such as Zigbee, RFID, Bluetooth, 6LoWPAN, LoRA,
DASH, Insteon, and others. The range of these connectivity technologies is
severely restricted; they are responsible for the connectivity between the things
of the IoT and the nearest hub or gateway to access the Internet.
Local connectivity plane:
• The local connectivity is responsible for distributing Internet access to
multiple local IoT deployments.
• Provides services such as address management, device management, security,
sleep scheduling, and others. Example, in a smart home environment, the first
floor and the ground floor may have local IoT implementations, which have
Page01of02
21CS735
various things connected to the network via low-power, low-range connectivity
technologies. The traffic from these two floors merges into a single router or a
gateway. The total traffic intended for the Internet from a smart home leaves
through a single gateway or router, which may be assigned a single global IP
address This helps in the significant conservation of already limited global IP
addresses.
• The local connectivity plane falls under the purview of IoT management as it
directly deals with strategies to use/reuse addresses based on things and
applications. The modern-day “edge computing” paradigm is deployed in
conjunction with these first two planes: services and local connectivity.
Global connectivity plane:
• The plane of global connectivity plays a significant role in enabling IoT in the
real sense by allowing for worldwide implementations and connectivity
between things, users, controllers, and applications.
• This plane also falls under the purview of IoT management as it decides how
and when to store data, when to process it, when to forward it, and in which
form to forward it.
• The Web, datacenters, remote servers, Cloud, and others make up this plane.
The paradigm of “fog computing” lies between the planes of local connectivity
and global connectivity. It often serves to manage the load of global
connectivity infrastructure by offloading the computation nearer to the source
of the data itself, which reduces the traffic load on the global Internet.
Processing plane: The final plane of processing can be considered as a top-up
of the basic IoT networking framework. The continuous rise in the usefulness
and penetration of IoT in various application areas such as industries,
transportation, healthcare, and others are the result of this plane.
• The members in this plane may be termed as IoT tools, simply because they
wring-out useful and human-readable information from all the raw data that
flows from various IoT devices and deployments.
• The various sub-domains of this plane include intelligence, conversion
learning cognition algorithms, visualization and analysis .
• Various computing paradigms such as “big data”, “machine learning”, and
others, fall within the scope of this domain.
c Explain Addressing Strategies in IoT. L1 5
The first three blocks are designated as the global prefix, which is globally
unique. The next block is designated as the subnet prefix, which identifies the
subnet of an interface/gateway through which LANs may be connected to the
Page01of02
21CS735
Internet. Finally, the last four blocks (64 bits) of hexadecimal addresses are
collectively known as the interface identifier (IID). IIDs may be generated
based on MAC (media access control) identifiers of devices/nodes or using
pseudo-random number generator algorithms. The IPv6 addresses can be
divided into seven separate address types,
(i)Global Unicast (GUA): These addresses are assigned to single IoT
entities/ interfaces; they enable the entities to transmit traffic to and from the
Internet In regular IoT deployments, these addresses are assigned to
gateways, proxies, or WANs.
(ii) Multicast: These addresses enable transmission of messages from a
single networked entity to multiple destination entities simultaneously.
(iii) Link Local (LL): The operational domain of these addresses are valid
only within a network segment such as LAN. These addresses may be
repeated in other network segments/LANs, but are unique within that single
network segment.
(iv) Unique Local (ULA): Similar to LL addresses, ULA cannot be routed
over the Internet. These addresses may be repeated in other network
segments/LANS but are unique within that single network segment.
(v) Loopback: It is also known as the localhost address. Typically, these
addresses are used by developers and network testers for diagnostics and
system checks.
(vi) Unspecified: Here, all the bits in the IPv6 address are set to zero and the
destination address is not specified.
(vii) Solicited-node Multicast: It is a multicast address based on the IPv6
address of an IoT node or entity.
Module-2
Q.03 a With a neat diagram explain the working mechanism of actuator. L1 6
An actuator can be considered as a machine or system’s component that can
affect the movement or control the said mechanism or the system. Control
systems affect changes to the environment or property they are controlling
through actuators. The system activates the actuator through a control signal,
which may be digital or analog. It elicits a response from the actuator, which
is in the form of some form of mechanical motion. The control system of an
actuator can be a mechanical or electronic system, a software-based system
(e.g., an autonomous car control system), a human, or any other input. A
remote user sends commands to a processor. The processor instructs a motor
controlled robotic arm to perform the commanded tasks accordingly. The
processor is primarily responsible for converting the human commands into
sequential machine-language command sequences, which enables the robot to
move. The robotic arm finally moves the designated boxes, which was its
assigned task.
Page01of02
21CS735
conventional components for hobby projects and day-to-day applications, but
it is not suitable for industrial processes. Regular temperature sensors have a
very low-temperature sensing range, as well as relatively low accuracy and
precision. The use of these sensors in industrial applications, where a
precision of up to 3–4 decimal places is required, cannot be facilitated by
these sensors.
• Industrial sensors are typically very sophisticated, and as a result, very
costly. However, these industrial sensors have very high accuracy and
precision score, even under harsh operating conditions.
(iii)Energy :
• The energy consumed by a sensing solution is crucial to determine the
lifetime of that solution and the estimated cost of its deployment.
• If the sensor or the sensor node is so energy inefficient that it requires
replenishment of its energy sources quite frequently, the effort in maintaining
the solution and its cost goes up; whereas its deployment feasibility goes
down.
• Consider a scenario where sensor nodes are deployed on the top of glaciers.
Once deployed, access to these nodes is not possible. If the energy
requirements of the sensor nodes are too high, such a deployment will not last
long, and the solution will be highly infeasible as charging or changing of the
energy sources of these sensor nodes is not an option.
(iv)Device Size :
• Modern-day IoT applications have a wide penetration in all domains of life.
Most of the applications of IoT require sensing solutions which are so small
that they do not hinder any of the regular activities that were possible before
the sensor node deployment was carried out.
• Larger the size of a sensor node, larger is the obstruction caused by it,
higher is the cost and energy requirements, and lesser is its demand for the
bulk of the IoT applications.
• Consider a simple human activity detector. If the detection unit is too large
to be carried or too bulky to cause hindrance to regular normal movements,
the demand for this solution would be low. It is because of this that the onset
of wearables took off so strongly. The wearable sensors are highly energy-
efficient, small in size, and almost part of the wearer’s regular wardrobe.
c With a neat diagram explain scalar and Multimedia sensing techniques. L1 4
1)Scalar sensing:
• Scalar sensing encompasses the sensing of features that can be quantified
simply by measuring changes in the amplitude of the measured values with
respect to time.
• Quantities such as ambient temperature, current, atmospheric pressure,
rainfall, light, humidity, flux, and others are considered as scalar values as
they normally do not have a directional or spatial property assigned with
them.
• The sensors used for measuring these scalar quantities are referred to as
scalar sensors, and the act is known as scalar sensing.
2) Multimedia sensing :
• Multimedia sensing encompasses the sensing of features that have a spatial
variance property associated with the property of temporal variance.
• Unlike scalar sensors, multimedia sensors are used for capturing the changes
Page01of02
21CS735
in amplitude of a quantifiable property concerning space (spatial) as well as
time (temporal).
• Quantities such as images, direction, flow, speed, acceleration, sound, force,
mass, energy, and momentum have both directions as well as a magnitude.
Additionally, these quantities follow the vector law of addition and hence are
designated as vector quantities. They might have different values in different
directions for the same working condition at the same time.
• The sensors used for measuring these quantities are known as vector
sensors.
Module-3
Q.05 a List and explain common data types in IoT applications. L1 5
1)Structured data :
• These are typically text data that have a pre-defined structure. These are
primarily created by using length-limited data fields such as phone numbers,
social security numbers, and other such information.
• Structured data are associated with relational database management systems
(RDBMS).
• Even if the data is human or machine generated, these data are easily
searchable by querying algorithms as well as human generated queries.
• Common usage of this type of data is associated with flight or train
reservation systems, banking systems, inventory controls, and other similar
systems.
• Established languages such as Structured Query Language (SQL) are used for
accessing these data in RDBMS.
• However, in the context of IoT, structured data holds a minor share of the total
generated data over the Internet.
2) Unstructured data:
• In simple words, all the data on the Internet, which is not structured, is
categorized as unstructured.
• These data types have no pre-defined structure and can vary according to
applications and data-generating sources.
• Some of the common examples of human-generated unstructured data
include text, emails, videos, images, phone recordings, chats, and others.
• Some common examples of machine-generated unstructured data include
sensor data from traffic, buildings, industries, satellite imagery, surveillance
videos, and others.
• As already evident from its examples, this data type does not have fixed
formats associated with it, which makes it very difficult for querying algorithms
to perform a look-up.
• Querying languages such as NoSQL are generally used for this data type.
b With a neat diagram explain offsite processing topology. L1 10
OR
Q.06 a With a neat diagram explain onsite processing topology. L1 5
• The on-site processing topology signifies that the data is processed at the
source itself.
• This is crucial in applications that have a very low tolerance for latencies.
These latencies may result from the processing hardware or the network (during
transmission of the data for processing away from the processor).
• Applications such as those associated with healthcare and flight control
systems (realtime systems) have a breakneck data generation rate. These
additionally show rapid temporal changes that can be missed (leading to
Page01of02
21CS735
catastrophic damages) unless the processing infrastructure is fast and robust
enough to handle such data.
Page01of02
21CS735
clock circuits, connections to USB and ethernet, inbuilt wireless access
capabilities, and others helps in defining the robustness and usability of a
processor or IoT device in various application scenarios.
c Write a short note on offload location and offload decision making. L1 7
Offload location:
The choice of offload location decides the applicability, cost, and
sustainability of the IoT application and deployment. The offload location
divided into four types:
• Edge: Offloading processing to the edge implies that the data processing is
facilitated to a location at or near the source of data generation itself.
Offloading to the edge is done to achieve aggregation, manipulation,
bandwidth reduction, and other data operations directly on an IoT device.
• Fog: Fog computing is a decentralized computing infrastructure that is
utilized to conserve network bandwidth, reduce latencies, restrict the amount
of data unnecessarily flowing through the Internet, and enable rapid mobility
support for IoT devices. The data, computing, storage and applications are
shifted to a place between the data source and the cloud resulting in
significantly reduced latencies and network bandwidth usage.
• Remote Server: A simple remote server with good processing power may
be used with IoT based applications to offload the processing from resource
constrained IoT devices. Rapid scalability may be an issue with remote
servers, and they may be costlier and hard to maintain in comparison to
solutions such as the cloud.
• Cloud: Cloud computing is a configurable computer system, which can get
access to configurable resources, platforms, and high-level services through a
shared pool hosted remotely. Cloud enables massive scalability of solutions as
they can enable resource enhancement allocated to a user or solution in an on-
demand manner, without the user having to go through the pains of acquiring
and configuring new and costly hardware.
Offload decision making :
The choice of where to offload and how much to offload is one of the major
deciding factors in the deployment of an offsite-processing topology-based
IoT deployment architecture. Some of these approaches are as follows.
• Naive Approach: This approach is typically a hard approach, without too
much decision making. It can be considered as a rule-based approach in
which the data from IoT devices are offloaded to the nearest location based on
the achievement of certain offload criteria. Although easy to implement, this
approach is never recommended, especially for dense deployments, or
deployments where the data generation rate is high, or the data being
offloaded in complex to handle (multimedia or hybrid data types). Generally,
statistical measures are consulted for generating the rules for offload decision
making.
• Bargaining based approach: This approach, although a bit processing-
intensive during the decision-making stages, enables the alleviation of
network traffic congestion, enhances service QoS (quality of service)
parameters such as bandwidth, latencies, and others. At times, while trying to
maximize multiple parameters for the whole IoT implementation, in order to
provide the most optimal solution or QoS, not all parameters can be treated
with equal importance. Bargaining based solutions try to maximize the QoS
by trying to reach a point where the qualities of certain parameters are
reduced, while the others are enhanced. Example: Game theory .
• Learning based approach: The learningbased approaches generally rely on
past behavior and trends of data flow through the IoT architecture. The
optimization of QoS parameters is pursued by learning from historical trends
and trying to optimize previous solutions further and enhance the collective
behavior of the IoT implementation. The memory requirements and
processing requirements are high during the decision-making stages. The
most common example of a learning-based approach is machine learning.
Page01of02
21CS735
Module-4
Q.07 a Explain the IEEE 802.15.4. L1 8
• The IEEE 802.15.4 standard represents the most popular standard for low data
rate wireless personal area networks (WPAN).
• This standard was developed to enable monitoring and control applications
with lower data rate and extend the operational life for uses with low-power
consumption.
• This standard uses only the first two layers—physical and data link—for
operation along with two new layers above it: 1) logical link control (LLC) and
2) servicespecific convergence sublayer (SSCS). The additional layers help in
the communication of the lower layers with the upper layers.
• The IEEE 802.15.4 standard was curated to operate in the ISM (industrial,
scientific, and medical) band.
• The direct sequence spread spectrum (DSSS) modulation technique is used for
communication purposes, enabling a wider bandwidth of operation with
enhanced security by the modulating pseudo-random noise signal. This
standard exhibit high tolerance to noise and interference and offers better
measures for improving link reliability.
• Typically, the low-speed versions of the IEEE 802.15.4 standard use binary
phase shift keying (BPSK), whereas the versions with high data rate implement
offset quadrature phase shift keying (O-QPSK) for encoding the message to be
communicated.
• Carrier sense multiple access with collision avoidance (CSMA-CA) is the
channel access method used for maintaining the sequence of transmitted signals
and preventing deadlocks due to multiple sources trying to access the same
channel.
• The transmission, for most cases, is line of sight (LOS), with the standard
transmission range varying between 10 m to 75 m. The best-case transmission
range achieved outdoors can be up to 1000 m.
• This standard typically defines two networking topologies: 1) Star and 2)
mesh.
• There are seven variants identified with in IEEE 802.15.4—A, B. C, D, E, F,
and G. Variants A/B are the base versions, C is assigned for China, and D for
Japan. Variants E, F, and G are assigned respectively for industrial applications,
active RFID (radio frequency identification) uses, and smart utility systems.
• The IEEE 802.15.4 standard supports two types of devices: 1) reduced
function device (RFD) and 2) full function devices (FFD). FFDs can talk to all
types of devices and support full protocol stacks. However, these devices are
costly and energy consuming due to increased requirements for support of full
stacks.
b Explain the protocol stack of Zigbee and Describe the Zigbee Network layer. L2 5
Page01of02
21CS735
Physical Layer: This layer is tasked with transmitting and receiving signals,
and Performing modulation and demodulation operations on them,
respectively. The Zigbee physical layer consists of 3 bands made up of 27
channels: the 2.4 GHz band has 16 channels at 250 kbps the 868.3 MHz has
one channel at 20 kbps; and the 902-928 MHz has ten channels at 40 kbps.
MAC Layer: This layer ensures channel access and reliability of data
transmission. CSMACA is used for channel access and intra-channel
interference avoidance. This layer handles communication synchronization
using beacon frames.
Network Layer: This layer handles operations such as setting up the network,
connecting and disconnecting the devices, configuring the devices, and
routing.
Application Support Sub-Layer: This layer handles the interfacing services,
control services, bridge between network and other layers, and enables the
necessary services to interface with the lower layers. This layer is primarily
tasked with data management services and is responsible for service-based
device matching.
Application Framework: Two types of data services are provided by the
application framework: provision of a key-value pair and generation of
generic messages. A key-value pair is used for getting attributes within the
application objects, whereas a generic message is a developer-defined
structure.
c What is RFID? Explain its working. L1 7
• RFID stands for radio frequency identification.
• This technology uses tags and readers for communication. RFID tags have
data encoded onto them digitally. The RFID readers can read the values
encoded in these tags without physically touching them.
• RFIDs are functionally similar to barcodes as the data read from tags are
stored in a database. However, RFID does not have to rely on, line of sight
operation, unlike barcodes.
• The automatic identification and data capture (AIDC) technology can be
considered as the precursor of RFID. Similar to AIDC techniques, RFID
systems are capable of automatically categorizing objects. Categorization
tasks such as identifying tags, reading data, and feeding the read data directly
into computer systems through radio waves outline the operation of RFID
systems.
• RFID systems are made Up of three components: 1) RFID tag or smart
label, 2) RFID reader, and 3) an antenna.
• In RFID, the tags consist of an integrated circuit and an antenna, enclosed in
a protective casing to protect from wear and tear and environmental effects.
These tags can be either active or passive. Passive tags find common usage in
a variety of applications due to its low cost; however, it has to be powered
using an RFID reader before data transmission. Active tags have their own
Page01of02
21CS735
power sources and do not need external activation by readers.
• Tags are used for transmitting the data to an RFID interrogator or an RFID
reader. The radio waves are then converted to a more usable form of data by
this reader.
• A host computer system accesses the collected data on the reader by a
communication technology such as Wi-Fi or Ethernet.
• The data on the host system is finally updated onto a database. RFID
applications span across domains such as inventory management, asset
tracking, personnel tracking, and supply chain management.
OR
Q.08 a With a neat diagram explain deployment and communication architecture of L1 8
LoRa.
• LoRa or long range is a patented wireless technology for communication
developed by Cycleo of Grenoble, France for cellular-type communications
aimed at providing connectivity to M2M and IoT solutions.
• It is a sub-GHz wireless technology that operationally uses the 169 MHz, 433
MHz, 868 MHz, and 915 MHz frequency bands for communication.
• LoRa uses bi-directional communication links symmetrically and a spread
spectrum with a 125 kHz wideband for operating.
• Applications such as electric grid monitoring are typically suited for utilizing
LoRa for communications.
• Typical communication of LoRa devices ranges from 15 to 20 km, with support
for millions of devices.
c L1 7
Explain Bluetooth protocol stack.
The Bluetooth protocol stack. Link Manager Protocol (LMP), Logical Link
Control and Adaptation Protocol (L2CAP), Host Controller Interface (HCI),
Radio Frequency Communications (RFCOMM), and Service Discovery Protocol
(SDP) are some of the wellknown protocols associated with Bluetooth. These
protocols can be enumerated as follows:
(i) Link Manager Protocol: It manages the establishment, authentication, and
links configuration. LMPs consist of some protocol data units (PDU), between
which transmission occurs for availing services such as name requests, link
address requests, connection establishment, connection authentication, mode
negotiation, and data transfer.
(ii) Host Controller Interface: It enables access to hardware status and control
registers and connects the controller with the link manager. The automatic
discovery of Bluetooth devices in its proximity is one of the essential tasks of
HCI.
Page01of02
21CS735
The 6LoWPAN stack rests on top of the IEEE 802.15.4 PHY and MAC layers,
which are generally associated with low-rate wireless personal area networks
(LR-WPAN). The network layer in 6LoWPAN enabled devices (layer 3) serves
as an adaptation layer for extending IPv6 capabilities to IEEE 802.15.4 based
devices.
PHY and MAC layers: The PHY layer consists of 27 wireless channels, each
having their separate frequency band and varying data rates. The MAC layer
defines the means and methods of accessing the defined channels and use them
for communication. The 6LoWPAN MAC layer is characterized by the
following:
(i) Ipv6 Beaconing tasks for device identification. These tasks include both
beacon generation and beacon synchronization.
(ii) Channel access control is provided by CSMA/CA.
(iii) PAN membership control functions. Membership functions include
association and dissociation tasks.
Adaptation layer: As mentioned previously, 6LoWPAN accommodates and
retro-fits the IPv6 packet to the IEEE 802.15.4 packet format.
Address Format: The 6LoWPAN address format is made up of two parts: 1) the
short (16-bit) address and 2) the extended (64-bit) address. The short address is
PAN specific and is used for identifying devices within a PAN only, which
makes its operational scope highly restricted and valid within a local network
only.
Page01of02
21CS735
b Describe the LOADing routing. L1 6
• When a data packet from a local data source is received for transmission to a
destination whose routing entry is not present with it, a LOADng router sends
an RREQ over all of its LOADng interfaces. The various forward interfaces
are numbered to identify the destination from the source LOADng node.
• The destination address obtained from the local source is encoded by the
RREQ in the packet.
• Upon receiving an RREQ, the routing set that manages the routing entries at
each LOADng router updates or inserts an entry. This also makes it possible
to keep track of the reverse journey between the source and the destination.
• If the packets are intended for a local interface of a LOADng router, the
received RREQ initiates a check of the destination address, and an RREP is
sent back using the reverse route if the packets are intended for a local
interface of a LOADng router.
• If the target address is not local, it is sent in a hop-by-hop unicast manner to
other LOADng interfaces through flooding.
• When an RREP is received, the forward path toward the RREP’s origin is
noted in the routing entry, along with the LOADng router that transmitted the
message. RREQ and RREP messages are also used to update the route
metrics.
c Explain the working of MQTT. L1 7
• Message queue telemetry transport is a simple, lightweight publish subscribe
protocol, designed mainly for messaging in constrained devices and networks.
• It provides a one-to-many distribution of messages.
• MQTT works reliably and flawlessly over high latency and limited bandwidth
of unreliable networks without the need for significant device resources and
device power.
Page01of02
21CS735
messages from the broker).
MQTT is built upon the principles of hierarchical topics and works on TCP for
communication over the network. Brokers receive new messages in the form of
topics from publishers. A publisher first sends a control message along with the
data message. Once updated in the broker, the broker distributes this topic’s
content to all the subscribers of that topic for which the new message has arrived.
OR
Q.10 a What is CoAP? Describe the working of CoAP. L1 7
Constrained Application Protocol is a lightweight protocol designed for IoT,
particularly for devices with limited resources such as low processing power,
low memory, and low bandwidth. CoAP is used to enable communication
between devices in constrained environments, typically in scenarios where
traditional protocols like HTTP are too heavy.
Page01of02
21CS735
(i) Device: The existence of a vast plethora of devices and device types in an
IoT ecosystem necessitates device interoperability. Devices can be
categorized as low-end, mid-end, and highend devices based on their
processing power, energy, and communication requirements. Lowend devices
are supposed to be deployed in bulk, with little or no chance of getting their
energy supplies replenished, depending on the application scenario. These
devices rely on low-power communication schemes and radios, typically
accompanied by low-data rates. The interface of such devices with high-end
devices (e.g., smartphones, tablets) requires device-level interoperability.
(ii) Platform: The variations in the platform may be due to variations in
operating systems (Contiki, RIOT, TinyOS, OpenWSN), data structures,
programming languages (Python, Java, Android, C++), or/and application
development environment. For example, the Android platform is quite
different from the iOS one, and devices running these are not compatible with
one another.
(iii) Semantic: Semantic conflicts arise during IoT operations, mainly due to
the presence of various data models (XML, CSV, JSON), information models
(C, F, K, or different representations of the same physical quantity), and
ontologies. There is a need for semantic interoperability, especially in a WoT
environment, which can enable various agents, applications, and services to
share data or knowledge in a meaningful manner.
(iv) Syntactic: Syntactic interoperability is a necessity due to the presence of
conflicts between data formats, interfaces, and schemas. The variation in the
syntactical grammar between a sender and a receiver of information results in
massive stability issues, redundancies, and unnecessary data handling efforts.
(v) Network: The large range of connectivity solutions, both wired and
wireless, at the disposal of developers and manufacturers of IoT devices and
components, further necessitates network interoperability. Starting from the
networks and sub-networks on the ground, to the uplink connectivity
solutions, there is a need for uniformity or means of integrating to devices
enable seamless and interoperable operations.
c Describe the following standards: (i) EnOcean (ii) DLNA. L1 7
(i) EnOcean:
Page01of02
21CS735
Page02of02