0% found this document useful (0 votes)
106 views12 pages

CT-1 Answer Key-1

The document discusses Internet of Things (IoT) and Machine to Machine (M2M) communication. [1] IoT allows physical objects to connect to collect and exchange data over networks, incorporating technologies like advanced sensing, cloud computing and M2M communication. [2] M2M and IoT differ in technologies, architectures and applications used but both involve networking of machines and devices. [3] Standards like ETSI M2M and network functions virtualization (NFV) provide standardized security and the ability to virtualize network functions.

Uploaded by

Safa M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views12 pages

CT-1 Answer Key-1

The document discusses Internet of Things (IoT) and Machine to Machine (M2M) communication. [1] IoT allows physical objects to connect to collect and exchange data over networks, incorporating technologies like advanced sensing, cloud computing and M2M communication. [2] M2M and IoT differ in technologies, architectures and applications used but both involve networking of machines and devices. [3] Standards like ETSI M2M and network functions virtualization (NFV) provide standardized security and the ability to virtualize network functions.

Uploaded by

Safa M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CT-1 Answer Key (SET-A)

Part-A

1. Internet of Things (IoT) is the network of physical objects—devices, vehicles,


buildings and other items embedded with electronics, software, sensors, and
network connectivity—that enables these objects to collect and exchange data

2. IoT Characteristics are:


• Dynamic and self adapting
• Self- Configuring
• Interoperable Communication Protocols
• Unique Identity
• Integrated into Information Network

3. IoT not a new technology as it incorporates the following :


• Advanced M2M communication
• Autonomic networking
• Data mining
• Security and privacy
• Cloud computing
• Advanced sensing and actuation

4.
5.
6. Need for ETSI M2M are :
• Provide an M2M architecture with a generic set of capabilities for M2M services
• Provide a framework for developing services independently of the underlying
network Facilitate deployment of vertical applications
• Facilitate innovation across industries by exposing data and information and
providing services.
7. Software Defined Networking is a networking architecture that separates the
control plane from the data and centralizes the network controller

Part-B
8(a)

8(b)
9(a)

9(b)
SET-B
Part-A
1.

2. Sensors/Actuators <-------→ Arduino---------→Wireless Communication--------


Cloud
3.
4. M2M and IoT involve networking of machines and devices where they differ in
• Technologies
• System Architectures
• Types of applications
Differences between M2M and IoT are:
▪ Communication protocols
▪ Machines in M2M and things in IoT
▪ Hardware and Software emphasis
▪ Data collection and Analysis
▪ Applications

5. IoT systems can have a distributed deployments comprising of number of IoT


devices which collect data from sensors or perform actuation.
• Automating configuration
• Monitoring Operational & Statistical Data
• Improved Reliability
• System wide Configuration
• Multiple system configurations
• Retrieving and Reusing configuration

6. ETSI M2M Release 1 provides standardized security mechanism for the


reference point mId .The device/gateway needs to have keys for securing the
connection. The device/gateway is provisioned with the key M2M Root Key.
The high level procedure are to
o Perform mutual mId end point authentication
o Perform M2M Connection Key agreement
o Optionally establish a secure session over mId.
o Perform RESTful procedures over the mId
7. Network functions virtualization (NFV) defines standards for compute, storage,
and networking resources that can be used to build virtualized network
functions
Part-B

8(a)

8(b) Level 1:
Level 2:

Level 3:

Level 4:
9(a)
9(b)

You might also like