0% found this document useful (0 votes)
136 views64 pages

IOE Questions

The document contains a sample exam with multiple choice and descriptive questions about Internet of Things (IoT) topics. The multiple choice questions cover concepts like RFID tags, sensors, antennas, localization techniques, networking protocols, and more. The descriptive questions ask about illustrating the working of an RFID tag, describing localization techniques, and explaining how energy efficiency is maintained in MAC protocols through preamble sampling.

Uploaded by

Ninja Training
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views64 pages

IOE Questions

The document contains a sample exam with multiple choice and descriptive questions about Internet of Things (IoT) topics. The multiple choice questions cover concepts like RFID tags, sensors, antennas, localization techniques, networking protocols, and more. The descriptive questions ask about illustrating the working of an RFID tag, describing localization techniques, and explaining how energy efficiency is maintained in MAC protocols through preamble sampling.

Uploaded by

Ninja Training
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 64

Sample Questions

Information Technology

Subject Name:Internet of Everything Semester: VIII

Multiple Choice Questions


Choose the correct option for following questions. All the
Q1.
Questions carry equal marks
1. Which RFID tag does not need an embedded power?

Option A: Active
Option B: Passive
Option C: Semi-Passive
Option D: Semi-Active

2. The basic IoT Functions are identifying, sensing and _________.


Option A: Addressing
Option B: Communicating
Option C: Routing
Option D:
Actuating. Not Confirmed
3. Alkaline batteries have a _____________life as compared to Lithium
batteries
Option A: Longer
Option B: Shorter
Option C: Equal
Option D: Resistant

4. ____________ act as primary devices to collect data from the


environment.
Option A: Machines
Option B: Antenna
Option C: Sensors
Option D: Switch

5. The frequency corresponding to the maximum voltage across the


primary coil in RFID is known as the ________.
Option A: Recurring Frequency
Option B: Resulting Frequency
Option C: Reserved Frequency
Option D: Resonant Frequency

6. In a Monostatic Antenna the Isolator has _______ Ports.


Option A: 1
Option B: 2
Option C: 3
Option D: 4

7. In passive Tag Class 2 is _____

Option A: Read Only


Option B: Read/Write
Option C: Read, Write once
Option D: Write once

8. The sensor nodes can communicate among themselves using


_____________.

Option A: X-Rays
Option B: Radio signals
Option C: Microwaves
Option D: Sound Waves

9. In Mobile IP, the __________stores the permanent information of the


mobile users.
Option A: HLR
Option B: VLR
Option C: SLR
Option D: PLR

10. Hadoop Ecosystem does not  includes ___________

Option A: Oozie
Option B: Yarn
Option C: Hive
Option D: Zoo

11. _______ applications come under “Retail “ for IoT?


Option A: Smart grids
Option B: Smart roads
Option C: Inventory management
Option D: Renewable energy system

12. What is the advantage of Dynamic Binary Tree Slotted ALOHA?


Option A:
Easy Frame Adjustment. Not Confirmed
Option B: Memory less
Option C: Improved Efficiency
Option D: Fast slotting

13. A good bar code reader can read


Option A: Only one bar code at a time
Option B: Two barcodes at once
Option C: Many barcodes at once
Option D: Many barcodes, at the same time, from a distance of several feet
14. MQTT topics are
Option A: Simple floating point
Option B: Simple integer
Option C: Simple symbol
Option D: Simple string. (C or D)

15. _____ localization algorithm works according to the last known or


estimated location by using velocity or acceleration.
Option A: Dead reckoning
Option B: Scene analysis
Option C: Proximity
Option D: Hybrid

16. Hadoop run on ______


Option A: Mac
Option B: Cross-platform
Option C: Linux
Option D: Linux + Windows

17. ZigBee is based on the following standard


Option A: IEEE802.15.1
Option B: IEEE803.15.6
Option C: IEEE802.15.4
Option D: IEEE801.15.4

18. The L2 handover latency is between


Option A: 68.74ms and 396.76 ms
Option B: 58.74ms and 390.76 ms
Option C: 55.74ms and 396.76 ms
Option D: 58.74ms and 396.76 ms

19. The license of Hadoop distributed is under


Option A: Commercial
Option B: Sun microsystems
Option C: Mozilla
Option D: Apache

20. Bluetooth 5.0 promises:


Option A: 4x Speed, 2x Range, 2x Data
Option B: 6x Speed, 3x Range, 3x Data
Option C: 2x Speed, 4x Range, 8x Data
Option D: 3x Speed, 4x Range, 8x Data
21 A pure ALOHA network transmits 200 bits frames on a shared
channel of 200 kbps. What is the throughput if the system (all stations
together) produces 500 frames per second?
Option A: 156 frames

Option B: 146 frames


Option C: 92 frames
Option D: 38 frames

22 Anteena’s efficiency is given by the ratio of__________

Option A: Effective aperture to physical aperture

Option B: Physical aperture to effective aperture


Option C: Signal Power to noise power

Option D: Losses

23 In pure ALOHA, the vulnerable time is _________ the frame


transmission time.
Option A: the same as
Option B: two times
Option C: three times
Option D: half times
24 Link budget consists of calculation of_______________

Option A: Useful signal power

Option B: Interfering noise power

Option C: Signal power to noise power

Option D: Useful signal & Interfering noise power

25 If there are n devices in a mesh topology network then the total


number of duplex links are
Option A: n+2

Option B: n-2

Option C: n(n-1)/2

Option D: n(n+1)

26 Which Underwater Wireless Sensor Network architecture combined


inter cluster communication, intracluster communication,
anchor-buoyant node communication with mobile nodes.

Option A: 1D architecture
Option B: 2D architecture

Option C: 3D architecture

Option D: 4D architecture
27 CoAP provides which of the following requirements?
Option A: Multicast support and simplicity
Option B: Low overhead and multicast support
Option C: Simplicity and low overhead
Option D: Multicast support, Low overhead and Simplicity
28 Publish command message is sent from _________
Option A: Only publisher to broker
Option B: Only broker to publisher
Option C: Publisher to broker and broker to publisher
Option D: Server to Client
29 What is the purpose of supply chain management?
Option A: Increase the production level

Option B: Manage and integrate supply and demand management


Option C: Enhance the quality of a product and services
Option D: Provide satisfaction to the customer
30 Anteena’s efficiency is given by the ratio of__________
Option A: Effective aperture to physical aperture
Option B: Physical aperture to effective aperture
Option C: Signal Power to noise power
Option D: Losses

Descriptive Questions
Q2 10 marks each

Illustrate the working of Schematic of RFID tag


with a neat diagram
A simplified block schematic of an RFID tag (also called transponder) is shown in the diagram below. Various
components of the tag are as shown. Normally, the antenna is external to the tag chip, and large in size.

The operation of the RFID tag is described below:

Handshaking with the Reader (interrogator):

i. The reader continuously emits RF carrier signals, and keeps observing the received RF signals for
data.
ii. The presence of a tag (for our discussion, we consider only passive tag) modulates the rf field, and
the same is detected by the reader.
iii. The passive tag absorbs a small portion of the energy emitted by the reader, and starts sending
modulated information when sufficient energy is acquired from the rf field generated by the reader.
Note that the data modulation (modulation for 0s and 1s) is accomplished by either direct modulation
or FSK or Phase modulation.
iv. The reader demodulates the signals received from the tag antenna, and decodes the same for further
processing.

With a neat diagram briefly describe the Scene


analysis and proximity method of localization
technique.
Scene Analysis
Scene analysis - this method is based on dividing the surrounding area into the
smaller areas. In the particular points, the basic parameters of the radio signal
(e.g. a radio signal strange - RSS) are measured and stored into the database.
Based on created maps, a mobile node may estimate its position by comparing the
RSS with the information stored in the database. An example of this technique is
the Map Matching used in the technique called Fingerprinting

2
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the base
station called cells. When more than one base station detects presence of a
mobile client in its operating area, it is possible to apply additional techniques for
more accurate localization, e.g. triangulation. In the article proximity detection for
the localization technique of a moving wireless client was chosen.

Write short notes on Apache Storm

3
Illustrate how Energy-efficiency in MAC protocols
is maintained. Highlight preamble sampling
protocol.
The fundamental way of saving power or enhancing energy efficiency is to
minimize the energy wastage and MAC protocols maintains Energy-efficiency by
using S-MAC which is specifically designed MAC layer protocol for energy
effectiveness in wireless sensor networks.SMAC maintains Energy-efficiency in
MAC protocols by

preamble sampling protocol


Preamble sampling , also referred to as LPL (Low Power Listening), is a key
technique used by a large number of MAC protocols to save energy in wireless
sensor networks. In preamble sampling, nodes save energy by keeping their
radios off most of the time to reduce idle listening. To receive frames, nodes
periodically wake up for a short time to sample the channel to check whether there
is an ongoing transmission on the channel. A transmission is detected when a
node finds that a preamble is being transmitted, in which case it keeps its radio on
to receive the data frame that is sent just after the preamble. The preamble is used
to indicate that a data frame will be transmitted and is long enough to make sure
that all potential receivers wake up at least once during its transmission.
Illustrate the working of RFID middleware architecture.
Give its importance
RFID Middleware
RFID Middleware Plays a significant Role in Maintaining balance between flow of
data occurring between tag readers and enterprise applications.It is Responsible
for Quality and Usability of Information.

RFID Middleware Architecture

The implementation of a middleware, in ageneral and basic way, for a RFID


system is divided into three sublayers
1. Data transmission sublayer: contains different models of tags and readers
which
identify the physical tags and readers in order to enable them to
communicate.
2. Operating sublayer: contains the middleware that makes the integration
among
the different readers with different systems. It is in this layer that various
valid tags
readers are identified and all of them are aggregated into the same
information.
3. Business sublayer: the entire infrastructure of a company that uses the
RFID system. It is characterized by a great heterogeneity due to different
types of platforms supported.
Importance of RFID Middleware
● The middleware has several functions and plays a major role in RFID
system operation and management.
● The middleware not only manages RFID readers and printers and
communicates between these devices and your business applications but
also manages, filters, aggregates and makes sense of the data coming
from the RFID tags.
● Conventional middleware is used primarily to link disparate applications,
both internally and externally, to the enterprise for:
○ Routing data using different transport protocols
○ Translating data into different formats
○ Web services

Classify the tag classes with a neat table and


explain the capabilities of each tag.

6
With a neat diagram. briefly highlight the RFID
Middleware and its Components.

7
Categorize reader driven anti-collision algorithms with
8
brief explanations of each category.
Compare the Apache Spark and Apache storm frameworks
with neat diagrams and highlight the difference between
the two frameworks

9
List the features of CoAP and explain the different
messaging modes of CoAP.
CoAP has the following main features:

10 ● Constrained web protocol fulfilling M2M requirements.


● UDP binding with optional reliability supporting unicast and multicast requests.
● Asynchronous message exchanges.
● Low header overhead and parsing complexity.
● URI and Content-type support.
● Simple proxy and caching capabilities.
● A stateless HTTP mapping, allowing proxies to be built providing access to CoAP
resources via HTTP in a uniform way or for HTTP simple interfaces to be realized
alternatively over CoAP.
● Security binding to Datagram Transport Layer Security (DTLS).
Discuss in detail the design and working of Mobile IP (MIP)
- IETF communication protocol - IEEE 802.11 - along with
its issues.
Mobile IP
Mobile IP (MIP) is one of the most popular, well known and widely adopted of
macro-mobility solutions for IP systems. It is proposed by the Internet Engineering
Task Force (IETF) to enable the mobile node to access the Internet and roam
freely between different subnets without losing the connection, offering mobility
support in the network layer, isolating higher layers from mobility issues. Mobile IP
11 has two versions, namely Mobile IPv4 (MIPv4), and Mobile IPv6 (MIPv6).
The Mobile IPv4 network architecture includes three functional entities:
1. Mobile host/node (MH/MN) A host or router changing its access point (i.e.,
moving to another subnet) without updating its IP home address.
2. Home agent (HA) A router located on the MH/MN home network.
3. Foreign agent (FA) A router located in each foreign network visited by
MH/MN, which enables the MH/MN to maintain its network connectivity.

Working of MIP
Fig: Working of MIP

Working of Mobile IP

The working of Mobile IP can be described in 3 phases:

Agent Discovery

In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the
network using the ICMP Router Discovery Protocol (IRDP).

Registration

The registration phase is responsible for informing the current location of the
home agent and foreign agent for the correct forwarding of packets.

Tunneling

This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.
Issues in Mobile IP
(1) "Triangle routing" Problem
The Communication Host (CH) has to send packets to the Mobile Host (MH) via
the Home Agent (HA), while the MH sends packets directly to the CH. As the
communication in the two directions follows different routes, the problem of
"triangle routing" arises, which leads to low efficiency especially when the MH is
far away from the HA and the CH is near to the MH.

(2) Handoff Problem


Handoff problem means that the HA sends the IP packets of the MH to the
original foreign network via the tunnel because it doesn’t know the latest Care of
Address (CoA) of the MH during the period starting when the MH leaves the
original foreign network and ending when the HA receives the new registration
address of the MH. As a result, these dropped IP packets have an influence on the
communication between the MH and the CH especially when handoff occurs
frequently or the MH is far away from the HA.

(3) Problem of Intra-Domain Movement


The frequent intra-domain movement of the MH within a small area will lead to
frequent handoff. Consequently, a great amount of registered messages are
generated in the network and the network performance is greatly affected [5].

(4) QoS Problem


In the mobile environment, it is hard to provide QoS over Mobile IP due to
dynamically varying wireless network topologies, limited network resources,
unpredictable effective bandwidth and high error rate.

IEEE 802.11

IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency
radio waves instead of cables for connecting the devices in LAN. Users connected
by WLANs can move around within the area of network coverage.

Working

● Wi-Fi uses radio waves to transmit information between your device and a
router via frequencies. Two radio-wave frequencies can be used, depending
on the amount of data being sent: 2.4 gigahertz and 5 gigahertz. The higher
the frequency, the greater the amount of data transmitted per second.
● The two Wi-Fi frequency When you access the Internet on your device, it
converts the information you’ve requested into binary code, The
frequencies travel across the radio channels mentioned earlier and are
received by the Wi-Fi router that your device is connected to.
● The router then converts the frequencies back into binary code and
translates the code into the Internet traffic that you requested, and the
router receives that data through a hardwired Internet cable.
● The process repeats itself until you have loaded this article—or anything
that requires the Internet.

Issues in 802.11

Explain the need of MIP along with its working.


12
Need of MIP
Working

Fig: Working of MIP

Working of Mobile IP
The working of Mobile IP can be described in 3 phases:

Agent Discovery

In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the
network using the ICMP Router Discovery Protocol (IRDP).

Registration

The registration phase is responsible for informing the current location of the
home agent and foreign agent for the correct forwarding of packets.

Tunneling

This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.

13

What do you mean by Resource in the REST framework?


What are the tools used for creating RESTful web services?
Resource in REST framework
A resource can be defined as a vital element to be referenced within a
client-server system. REST architecture treats all of its content as a resource,
which includes Html Pages, Images, Text Files, Videos, etc. Access to resources is
provided by the REST server where REST client is used for accessing as well as
modification of resources. All of its resources get identified via URI, which is
abbreviated as Uniform Resource Identifier.

tools used for creating RESTful web services


1. JAX-RS - Set of annotations and interfaces provided by Java.
2. Jersey - Implementation of the JAX-WS.
3. Eclipse - Integrated Development Environment (Editor)
4. Maven - Generating project structure and build tool.
5. Apache Tomcat - Used for deploying the application.
14

Explain the working of Network layer handoff in MIP and


discuss the working of passive and active scanning in the
same.
working of Network layer handoff in MIP

working of passive and active scanning in the same.


● In active scanning, mobile nodes broadcast probe request frames on each
channel, and Access Points (APs) send back probe response frames to the
mobile node. Active scanning takes between 100ms and 500ms to scan all
the channels.
● In passive scanning, mobile nodes listen to beacon frames periodically sent
by APs and measure the signal strength. Thus, the scanning time depends
on the beacon interval configured on the APs.

15

Design an IOT based application for an air pollution


monitoring system. Draw block diagram with the required
sensors and the IOT platform. Also suggest the type of
communication protocol with the justification.

https://www.hindawi.com/journals/js/2020/8749764/

List the features of CoAP and explain the different


16 messaging modes of CoAP.
similar to question 10

Discuss in detail the design and working of Mobile IP (MIP)


- IETF
17
communication protocol - IEEE 802.11 - along with its
issues.
similar to question 11
List the conventional-Measurement algorithms that can be
used for localization of the mobile object. Discuss any 3
techniques in detail.
Localization Algorithms

18

Localization Techniques
Scene Analysis
Scene analysis - this method is based on dividing the surrounding area into the
smaller areas. In the particular points, the basic parameters of the radio signal
(e.g. a radio signal strange - RSS) are measured and stored into the database.
Based on created maps, a mobile node may estimate its position by comparing the
RSS with the information stored in the database. An example of this technique is
the Map Matching used in the technique called Fingerprinting
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the base
station called cells. When more than one base station detects presence of a
mobile client in its operating area, it is possible to apply additional techniques for
more accurate localization, e.g. triangulation. In the article proximity detection for
the localization technique of a moving wireless client was chosen.
Explain 10 most emerging technologies in IoT
the top 10 emerging IoT technologies are:
1. IoT Security. Security technologies will be required to protect IoT devices and
platforms from both information attacks and physical tampering, to encrypt their
communications, and to address new challenges such as impersonating "things"
or denial-of-sleep attacks that drain batteries. IoT security will be complicated by
the fact that many "things" use simple processors and operating systems that may
not support sophisticated security approaches.
2. IoT Analytics. IoT business models will exploit the information collected by
"things" in many ways, which will demand new analytic tools and algorithms. As
data volumes increase over the next five years, the needs of the IoT may diverge
further from traditional analytics.
3. IoT Device (Thing) Management. Long-lived nontrivial "things" will require
management and monitoring, including device monitoring, firmware and software
updates, diagnostics, crash analysis and reporting, physical management, and
security management. Tools must be capable of managing and monitoring
thousands and perhaps even millions of devices.

4. Low-Power, Short-Range IoT Networks. Low-power, short-range networks will


19 dominate wireless IoT connectivity through 2025, far outnumbering connections
using wide-area IoT networks. However, commercial and technical trade-offs mean
that many solutions will coexist, with no single dominant winner.
5. Low-Power, Wide-Area Networks. Traditional cellular networks don't deliver a
good combination of technical features and operational cost for those IoT
applications that need wide-area coverage combined with relatively low bandwidth,
good battery life, low hardware and operating cost, and high connection density.
Emerging standards such as narrowband IoT will likely dominate this space.
6. IoT Processors. The processors and architectures used by IoT devices define
many of their capabilities, such as whether they are capable of strong security and
encryption, power consumption, whether they are sophisticated enough to support
an operating system, updatable firmware, and embedded device management
agents. Understanding the implications of processor choices will demand deep
technical skills.
7. IoT Operating Systems. Traditional operating systems such as Windows and
iOS were not designed for IoT applications. They consume too much power, need
fast processors, and in some cases, lack features such as guaranteed real-time
response. They also have too large a memory footprint for small devices and may
not support the chips that IoT developers use. Consequently, a wide range of
IoT-specific operating systems has been developed to suit many different
hardware footprints and feature needs.
8. Event Stream Processing. Some IoT applications will generate extremely high
data rates that must be analyzed in real time. Systems creating tens of thousands
of events per second are common, and millions of events per second can occur in
some situations. To address such requirements, distributed stream computing
platforms have emerged that can process very high-rate data streams and perform
tasks such as real-time analytics and pattern identification.
9. IoT Platforms. IoT platforms bundle many of the infrastructure components of
an IoT system into a single product. The services provided by such platforms fall
into three main categories:
1. Low-level device control and operations such as communications, device
monitoring and management, security, and firmware updates;
2. IoT data acquisition, transformation and management;
3. IoT application development, including event-driven logic, application
programming, visualization, analytics and adapters to connect to enterprise
systems.
10. IoT Standards and Ecosystems. Standards and their associated application
programming interfaces (APIs) will be essential because IoT devices will need to
interoperate and communicate, and many IoT business models will rely on sharing
data between multiple devices and organizations. Many IoT ecosystems will
emerge, and organizations creating products may have to develop variants to
support multiple standards or ecosystems and be prepared to update products
during their life span as the standards evolve and new standards and APIs
emerge.

Describe in detail about the four common methods for


measuring distance estimation technique with a diagram
and its formula.

20
Explain the Types of Wireless Sensor Network?

21
Explain the working principle of UHF RFID System
working principle of UHF RFID System
Consider in UHF, the distance between the reader and the tag is few meters so
coupling between the reader and coil will be the far field coupling. RFID reader
continuously sends the waves at a particular frequency towards the tag. In
response, the tag is sending weak signal to RFID reader. This week signal will be
22
sent back to RFID reader which is known as back scattered signal. The Intensity of
the back scattered signal is depending upon the load matching across the coil. By
changing the condition of load we can change intensity of back scattered signal. If
we can change the condition of data that is stored in RFID tag then data can be
send back to RFID reader. In far field coupling RFID and tag is few so initial stage
signal send by reader should be strong.
Explain the impact of RFID Technology in SCM and Logistic
Application.
impact of RFID Technology in SCM and Logistic Application.
1.RFID Improves Visibility

RFID allows companies to track their supply chain workflow, which will provide

more usable data with manufacturing equipment, inventory, asset management,

and company processes.

23 When used properly, the generated data can help streamline these areas of the

supply chain through automation.

2.Improves Productivity

The main pain point of using barcodes is that you must see it in order to scan it.

This results in a fair amount of wasted time walking to the product, locating the

barcode, and scanning with the equipment. RFID eliminates this by using radio

frequencies to help ‘ping’ the location of the product. RFID tags significantly

reduce the time needed to locate, and track products.


Furthermore, the reduction in time spent locating goods helps to reduce costs

associated with labor and can improve the overall facility productivity.

3.Provides Real-Time Inventory Tracking

With RFID, companies can see exactly how much of their products they have on

hand. This type of real-time tracking gives them a better timeline of when to

reorder to bolster inventory. It also helps them find the optimal inventory level so

there is no excess product sitting on the shelves, wasting money for storage.

While adjusting inventory levels may not seem like a profit driver, keeping proper

inventory levels can help a company save between 20-30 percent on its

warehousing and storage costs.

4.Higher Accuracy

When RFID is implemented into warehousing and storage systems, it usually

results in a major improvement in product picking.According to Cybra.com,

manufacturers and distributors who implemented RFID technology into their

supply chain saw an 80 percent improvement in shipping and picking accuracy.

This type of improvement saves companies a good amount of money as a result of

fewer shipping and packing errors.

5.Reduce Loss, Theft, and Shrink

RFID tagging also helps companies with inventory control by keeping track of any

moving products that are not authorized to do so. This is especially important with

high-value products like computers, televisions, and automobiles. Sometimes the

mere appearance or knowledge that RFID tags are attached can reduce the

potential of theft.
Q3 5 marks each
1

List and explain the RFID applications?


By providing a cheap, efficient, and reliable way to collect and store data, RFID
offers limitless possibilities for current and future use. The list below highlights
applications of of RFID technology:

● Product Tracking – RFID tags are increasingly used as a cost-effective


way to track inventory and as a substitute for barcodes. For instance,
bookstores such as Barnes & Noble use RFID to identify books to be
removed from shelves and returned to publishing houses.
● Toll Road Payments – Highway toll payment systems, such as E-Z
Pass in the eastern states, uses RFID technology to electronically
collect tolls from passing cars. Instead of stopping at the toll booth, cars
pass directly through in the E-Z Pass lane and the toll is automatically
deducted from a pre-paid card.
● Passports – A number of countries, including Japan, the United States,
Norway, and Spain incorporate RFID tags into passports to store
information (such as a photograph) about the passport holder and to
track visitors entering and exiting the country.
● Identification – RFID chips can be implanted into animals and people
to track their movements, provide access to secure locations, or help
find lost pets.
● Libraries – Libraries use RFID tags in books and other materials to
track circulation and inventory, store product information (such as titles
and authors), and to provide security from theft. Because RFID tags
can be scanned without physically touching the item, checking books in
and out, plus doing laborious tasks such as shelf inventory, can be
accomplished quickly and efficiently using RFID technology.
● Shipping – Large shipments of materials, such as retail goods, often
utilize RFID tags to identify location, contents, and movement of goods.
Wal-mart is one of the largest consumers of this technology to assist in
tracking shipments of merchandise.
● Other uses – RFID tags are employed in numerous other ways,
including implantation in Saguaro cacti to discourage black-market
traders, placement in car tires to transmit road condition information to
the onboard computer, and placement around cities (such as Tokyo) to
transmit tourist information to visitor cell phones.
2

Write short note on

RFID Reader

RFID Tag

RFID Middleware

RFID Reader
RFID Tag
RFID Middleware
3

List and explain the components of RFID


Main Components of RFID Technology

1.Tags

RFID tags are what stores and transmits the data that needs to be deciphered.
The tags can be attached to assets to send data to the antenna. The microchip
embedded in the tag is what stores the tag's ID and programmable data related
to the asset. This stored data is then transferred to the reader through
antennas.

2.Antennas

Antennas are necessary elements in an RFID system because they transmit


the RFID tag’s data to the reader. Without some type of RFID antenna, whether
integrated or standalone, the RFID reader cannot correctly send and receive
signals to RFID tags.

3.Readers

RFID readers are connected to the antenna and receive data from the RFID
tag. The reader is what receives and converts the radio waves into digital data
on a computer database.

There are two types of readers. There are Fixed Readers and Mobile Readers.
Fixed readers are typically mounted to walls or other objects and stay in one
location to read data stored in a tag. Mobile readers can be installed or carried
anywhere it is needed.
4.Computer Database

The RFID system requires a computer database to process data stored in tags.
This software can program tags, manage devices and data, remote monitoring
and hardware configuration.

Write Short note on

a. Chef Case

b. Case study on Puppet


Chef Case
Case study on Puppet
5

List and explain all three different localization


techniques with a neat diagram.
Localization Techniques

Scene Analysis
Scene analysis - this method is based on dividing the surrounding area into the
smaller areas. In the particular points, the basic parameters of the radio signal
(e.g. a radio signal strange - RSS) are measured and stored into the database.
Based on created maps, a mobile node may estimate its position by comparing
the RSS with the information stored in the database. An example of this
technique is the Map Matching used in the technique called Fingerprinting
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the
base station called cells. When more than one base station detects presence
of a mobile client in its operating area, it is possible to apply additional
techniques for more accurate localization, e.g. triangulation. In the article
proximity detection for the localization technique of a moving wireless client
was chosen.
6
Describe the mobility and handover management
systems in short.
Mobility Management
With the convergence of the Internet and wireless mobile communications and
with the rapid growth in the number of mobile subscribers, mobility
management emerges as one of the most important and challenging problems
for wireless mobile communication over the Internet. Mobility management
enables the serving networks to locate a mobile subscriber’s point of
attachment for delivering data packets (i.e. location management), and
maintain a mobile subscriber’s connection as it continues to change its point of
attachment (i.e. handoff management).
Handover management
Handover management is the process by which a mobile node keeps its
connection active when it moves from one access point to another. There are
three stages in a handover process. First, the initiation of handover is triggered
by either the mobile device, or a network agent, or the changing network
conditions. The second stage is for a new connection generation, where the
network must find new resources for the handoff connection and perform any
additional routing operations. Finally, data-flow control needs to maintain the
delivery of the data from the old connection path to the new connection path
according to the agreed-upon QoS guarantees.
The design of handover management techniques in all-IP based
next-generation wireless networks must address the following issues:
(i) signaling overhead and power requirement for processing handover
messages should be minimized,
(ii) QoS guarantees must be made,
(iii) network resources should be efficiently used, and
(iv) the handover mechanism should be scalable, reliable and robust.
7

What does NETCONF-YANG mean, explain the device


managements of the same.

Device Management using NETCONF YANG

For device management, we use the Network Configuration Protocol


(NETCONF). Network Configuration Protocol (NETCONF) is a session-based
network management protocol. NETCONF allows retrieving state or
configuration data and manipulating configuration data on network devices [8].
Figure 4 shows a generic IoT system management architecture based on
NETCONF. NETCONF works on SSH transport protocol and ensures reliable
delivery of messages. For framing request and response messages NETCONF
uses XML-encoded Remote Procedure Calls (RPCs). For retrieving and editing
configuration data from network devices, various operations are provided by
NETCONF. Configuration and state data in NETCONF is encoded in XML.
NETCONF uses a data modeling language called YANG [9] for defining the
schema of the configuration and state data. YANG modules define the
configuration data, state data and RPC calls. NETCONF provides a clear
separation of the configuration and state data. The configuration data is stored
on a NETCONF configuration datastore on the NETCONF server (which runs
on the IoT device). The management application (which acts as a NETCONF
client), establishes a NETCONF session with the server. NETCONF clients
send requests to the server for editing the configuration data or retrieving the
current configuration. A Management System is used to send NETCONF
messages for configuring the IoT device. The man-agement applications use a
management API to start NETCONF sessions, read state data, read/write
configuration data, and invoke RPCs. Transaction Manager is respon-sible for
executing all the NETCONF transactions. The Rollback manager is used to
rollback a current configuration to its original state. The Configuration validator
en-sures the validity of the resulting configurations after applying different
transactions. For reading configuration data from the configuration datastore, a
configuration API is used. The configuration API also allows writing operational
data to the operational da-tastore. The Data Provider API is used for reporting
device statistics and operational data
8

Explain the major components of IoT with suitable


diagram in short
major components of IoT

1. Smart devices and sensors – Device


connectivity
Devices and sensors are the components of the device connectivity
layer. These smart sensors are continuously collecting data from the
environment and transmit the information to the next layer.

Common sensors are:

● Temperature sensors and thermostats


● Pressure sensors
● Humidity / Moisture level
● Light intensity detectors
● Moisture sensors
● Proximity detection
● RFID tags
2. Gateway
IoT Gateway manages the bidirectional data traffic between different
networks and protocols. Another function of gateway is to translate
different network protocols and make sure interoperability of the
connected devices and sensors.

Gateways can be configured to perform pre-processing of the


collected data from thousands of sensors locally before transmitting it
to the next stage. In some scenarios, it would be necessary due to
compatibility of TCP/IP protocol.

IoT gateway offers certain level of security for the network and
transmitted data with higher order encryption techniques. It acts as a
middle layer between devices and cloud to protect the system from
malicious attacks and unauthorized access.

3. Cloud
Internet of things creates massive data from devices, applications and
users which has to be managed in an efficient way. IoT cloud offers
tools to collect, process, manage and store huge amount of data in
real time. Industries and services can easily access these data
remotely and make critical decisions when necessary.

Cloud system integrates billions of devices, sensors, gateways,


protocols, data storage and provides predictive analytics. Companies
use these analytics data for improvement of products and services,
preventive measures for certain steps and build their new business
model accurately.

4. Analytics

Analytics is the process of converting analog data from billions of


smart devices and sensors into useful insights which can be
interpreted and used for detailed analysis. Smart analytics solutions
are inevitable for IoT system for management and improvement of the
entire system.
One of the major advantages of an efficient IoT system is real time
smart analytics which helps engineers to find out irregularities in the
collected data and act fast to prevent an undesired scenario. Service
providers can prepare for further steps if the information is collected
accurately at the right time.

Big enterprises use the massive data collected from IoT devices and
utilize the insights for their future business opportunities. Careful
analysis will help organizations to predict trends in the market and
plan ahead for a successful implementation.

Information is very significant in any business model and predictive


analysis ensures success in concerned area of business line.

5. User interface
User interfaces are the visible, tangible part of the IoT system which
can be accessible by users. Designers will have to make sure a well
designed user interface for minimum effort for users and encourage
more interactions.

Modern technology offers much interactive design to ease complex


tasks into simple touch panels controls. Multicolor touch panels have
replaced hard switches in our household appliances and the trend is
increasing for almost every smart home devices.

User interface design has higher significance in today’s competitive


market, it often determines the user whether to choose a particular
device or appliance. Users will be interested to buy new devices or
smart gadgets if it is very user friendly and compatible with common
wireless standards.

Explain Friis EM wave propagation equation in free


space
Friis free space propagation model is used to model the line-of-sight (LOS) path
loss incurred in a free space environment, devoid of any objects that create
absorption, diffraction, reflections, or any other characteristic-altering
phenomenon to a radiated wave. It is valid only in the far field region of the
transmitting antenna [1] and is based on the inverse square law of distance
which states that the received power at a particular distance from the transmitter
decays by a factor of square of the distance.

Figure 1: Received power using Friis model for WiFi transmission at f=2.4 GHz and f=5 GHz

The Friis equation for received power is given by

where, Pr is the received signal power in Watts expressed as a function of


separation distance (d meters) between the transmitter and the receiver, Pt is the
power of the transmitted signal’s Watts, Gt and Gr are the gains of transmitter
and receiver antennas when compared to an isotropic radiator with unit gain, λ is
the wavelength of carrier in meters and L represents other losses that is not
associated with the propagation loss. The parameter L may include system
losses like loss at the antenna, transmission line attenuation, loss at various
filters etc. The factor L is usually greater than or equal to 1 with L=1 for no such
system losses.

10

Explain the Algorithm steps of Triangulation

You might also like