Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

IOT SUPER IMP Questions and Solns

Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

IOT SUPER IMP Questions and Solns

VTU previous year paper analysis by YouTuber Afnan Marquee. The questions present in this
document are repeated 5+ times in previous year papers. So don't miss it by any chance! For
video explanation, check out my YouTube Channel!

Module 1
Questions
1. What does IoT and digitization mean? Elaborate.
2. Explain with a neat diagram the one M2M IoT standardized architecture and simplified
IoT architecture.
3. What are the different challenges in IoT?
4. Discuss IoTWorld Forum (IoTWF) standardized architecture
5. Explain IoT Data Management and Compute Stack.
6. Define IoT. Explain Evolution phases of Internet.
7. Compare IT and OT networks with different criterion.
8. What is Fog Node? Explain characteristics of Fog Computing Model.
9. Illustrate various access technologies with respect to distances in core IoT functional
stack.

Solutions
1. What does IoT and digitization mean? Elaborate.
2. Explain with a neat diagram the one M2M IoT standardized architecture and simplified
IoT architecture.
3. What are the different challenges in IoT?
4. Discuss IoTWorld Forum (IoTWF) standardized architecture

5. Explain IoT Data Management and Compute Stack.


Module 2
Questions
1. Characteristics and Attributes when selecting and dealing with Smart Objects
2. ZigBee (IEEE 802.15.4) - physical, MAC and security layer
3. Explain wireless sensors & actuators network communication protocol and its
limitation
4. List and explain different types of sensors
5. Write a note on LoRA WARN security.

Solutions
1. Characteristics and Attributes when selecting and dealing with Smart Objects
2. ZigBee (IEEE 802.15.4) - physical, MAC and security layer
3. Explain wireless sensors & actuators network communication protocol and its
limitation
4. List and explain different types of sensors
5. Write a note on LoRAWAN security.
Module 3
Questions
1. Discuss the various IOT application transport methods
2. Discuss 6TiSCH in detail
3. IP suite for IOT
4. Difference between adaptation & adoption
5. Discuss the need for optimization
6. Routing Protocol for Low Power and Lossy Network (RPL) with a neat diagram.
7. 6 LowPan protocol header comparison & fragmentation

Solutions
1. Discuss the various IOT application transport methods
2. Discuss 6TiSCH in detail
3. IP suite for IOT and the advantages of IP

4. Difference between adaptation & adoption

5. Discuss the need for optimization


6. Routing Protocol for Low Power and Lossy Network (RPL) with a neat diagram.
7. 6 LowPan protocol header comparison & fragmentation
Module 4
Questions
1. Explain challenges in OT security
2. Explain purdue model for control hierarchy.
3. Discuss OCTAVE and FAIR formal Risk Analysis
4. Compare Big Data and Edge Analytics and Network Analysis
5. Discuss different types of Data Analysis results with example
6. Distinguish between supervised and unsupervised machine learning
7. Explain elements of Hadoop with a neat diagram
8. What are the common applications of machine learning in IOT.
9. Discuss Hadoop Ecosystem Lambda Architecture

Solutions
1. Explain challenges in OT security
2. Explain purdue model for control hierarchy.
3. Discuss OCTAVE and FAIR formal Risk Analysis
4. Compare Big Data and Edge Analytics and Network Analysis
5. Discuss different types of Data Analysis results with example
6. Distinguish between supervised and unsupervised machine learning
7. Explain elements of Hadoop with a neat diagram
8. What are the common applications of machine learning in IOT.
9. Discuss Hadoop Ecosystem Lambda Architecture
Module 5
Questions
1. Explain the following with respect to Arduino Programming:
a. Structure
b. Variables and data types
c. Function
d. Digital I/O
2. Explain different layers of Smart City IOT architecture
3. Explain Smart City security Architecture
4. Explain Smart City traffic control Architecture
5. Write a short note on Raspberry Pi operating system and commands used.
6. Write a short note on DS 18B20 temperature sensor?
7. Write a neat sketch, explain street lighting system.
8. With a neat diagram explain, smart parking system.

Solutions
1. Explain the following with respect to Arduino Programming:
e. Structure
f. Variables and data types
g. Function
h. Digital I/O

a. Structure
B. Variables and data types
C. Function

D. Digital I/O
2. Explain different layers of Smart City IOT architecture
3. Explain Smart City security Architecture
The following are common industry elements for security on the network layer:

Firewall: A firewall is located at the edge, and it should be IPsec- and VPN-ready, and include
user- and role-based access control. It should also be integrated with the architecture to give
city operators remote access to the city data center.

VLAN: A VLAN provides end-to-end segmentation of data transmission, further protecting data
from rogue intervention. Each service/domain has a dedicated VLAN for data transmission.

Encryption: Protecting the traffic from the sensor to the application is a common requirement to
avoid data tampering and eavesdropping. In most cases, encryption starts at the sensor level.
In some cases, the sensor-to gateway link uses one type of encryption, and the
gateway-to-application connection uses another encryption (for example, a VPN).

4. Explain Smart City traffic control Architecture


5. Write a short note on Raspberry Pi operating system and commands used.
6. Write a short note on DS 18B20 temperature sensor?
7. Write a neat sketch, explain street lighting system.
8. With a neat diagram explain, smart parking system.

You might also like