IOE Questions
IOE Questions
Information Technology
Option A: Active
Option B: Passive
Option C: Semi-Passive
Option D: Semi-Active
Option A: X-Rays
Option B: Radio signals
Option C: Microwaves
Option D: Sound Waves
Option A: Oozie
Option B: Yarn
Option C: Hive
Option D: Zoo
Option D: Losses
Option B: n-2
Option C: n(n-1)/2
Option D: n(n+1)
Option A: 1D architecture
Option B: 2D architecture
Option C: 3D architecture
Option D: 4D architecture
27 CoAP provides which of the following requirements?
Option A: Multicast support and simplicity
Option B: Low overhead and multicast support
Option C: Simplicity and low overhead
Option D: Multicast support, Low overhead and Simplicity
28 Publish command message is sent from _________
Option A: Only publisher to broker
Option B: Only broker to publisher
Option C: Publisher to broker and broker to publisher
Option D: Server to Client
29 What is the purpose of supply chain management?
Option A: Increase the production level
Descriptive Questions
Q2 10 marks each
i. The reader continuously emits RF carrier signals, and keeps observing the received RF signals for
data.
ii. The presence of a tag (for our discussion, we consider only passive tag) modulates the rf field, and
the same is detected by the reader.
iii. The passive tag absorbs a small portion of the energy emitted by the reader, and starts sending
modulated information when sufficient energy is acquired from the rf field generated by the reader.
Note that the data modulation (modulation for 0s and 1s) is accomplished by either direct modulation
or FSK or Phase modulation.
iv. The reader demodulates the signals received from the tag antenna, and decodes the same for further
processing.
2
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the base
station called cells. When more than one base station detects presence of a
mobile client in its operating area, it is possible to apply additional techniques for
more accurate localization, e.g. triangulation. In the article proximity detection for
the localization technique of a moving wireless client was chosen.
3
Illustrate how Energy-efficiency in MAC protocols
is maintained. Highlight preamble sampling
protocol.
The fundamental way of saving power or enhancing energy efficiency is to
minimize the energy wastage and MAC protocols maintains Energy-efficiency by
using S-MAC which is specifically designed MAC layer protocol for energy
effectiveness in wireless sensor networks.SMAC maintains Energy-efficiency in
MAC protocols by
6
With a neat diagram. briefly highlight the RFID
Middleware and its Components.
7
Categorize reader driven anti-collision algorithms with
8
brief explanations of each category.
Compare the Apache Spark and Apache storm frameworks
with neat diagrams and highlight the difference between
the two frameworks
9
List the features of CoAP and explain the different
messaging modes of CoAP.
CoAP has the following main features:
Working of MIP
Fig: Working of MIP
Working of Mobile IP
Agent Discovery
In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the
network using the ICMP Router Discovery Protocol (IRDP).
Registration
The registration phase is responsible for informing the current location of the
home agent and foreign agent for the correct forwarding of packets.
Tunneling
This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.
Issues in Mobile IP
(1) "Triangle routing" Problem
The Communication Host (CH) has to send packets to the Mobile Host (MH) via
the Home Agent (HA), while the MH sends packets directly to the CH. As the
communication in the two directions follows different routes, the problem of
"triangle routing" arises, which leads to low efficiency especially when the MH is
far away from the HA and the CH is near to the MH.
IEEE 802.11
IEEE 802.11 standard, popularly known as WiFi, lays down the architecture and
specifications of wireless LANs (WLANs). WiFi or WLAN uses high-frequency
radio waves instead of cables for connecting the devices in LAN. Users connected
by WLANs can move around within the area of network coverage.
Working
● Wi-Fi uses radio waves to transmit information between your device and a
router via frequencies. Two radio-wave frequencies can be used, depending
on the amount of data being sent: 2.4 gigahertz and 5 gigahertz. The higher
the frequency, the greater the amount of data transmitted per second.
● The two Wi-Fi frequency When you access the Internet on your device, it
converts the information you’ve requested into binary code, The
frequencies travel across the radio channels mentioned earlier and are
received by the Wi-Fi router that your device is connected to.
● The router then converts the frequencies back into binary code and
translates the code into the Internet traffic that you requested, and the
router receives that data through a hardwired Internet cable.
● The process repeats itself until you have loaded this article—or anything
that requires the Internet.
Issues in 802.11
Working of Mobile IP
The working of Mobile IP can be described in 3 phases:
Agent Discovery
In the Agent Discovery phase, the mobile nodes discover their Foreign and Home
Agents. The Home Agent and Foreign Agent advertise their services on the
network using the ICMP Router Discovery Protocol (IRDP).
Registration
The registration phase is responsible for informing the current location of the
home agent and foreign agent for the correct forwarding of packets.
Tunneling
This phase is used to establish a virtual connection as a pipe for moving the data
packets between a tunnel entry and a tunnel endpoint.
13
15
https://www.hindawi.com/journals/js/2020/8749764/
18
Localization Techniques
Scene Analysis
Scene analysis - this method is based on dividing the surrounding area into the
smaller areas. In the particular points, the basic parameters of the radio signal
(e.g. a radio signal strange - RSS) are measured and stored into the database.
Based on created maps, a mobile node may estimate its position by comparing the
RSS with the information stored in the database. An example of this technique is
the Map Matching used in the technique called Fingerprinting
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the base
station called cells. When more than one base station detects presence of a
mobile client in its operating area, it is possible to apply additional techniques for
more accurate localization, e.g. triangulation. In the article proximity detection for
the localization technique of a moving wireless client was chosen.
Explain 10 most emerging technologies in IoT
the top 10 emerging IoT technologies are:
1. IoT Security. Security technologies will be required to protect IoT devices and
platforms from both information attacks and physical tampering, to encrypt their
communications, and to address new challenges such as impersonating "things"
or denial-of-sleep attacks that drain batteries. IoT security will be complicated by
the fact that many "things" use simple processors and operating systems that may
not support sophisticated security approaches.
2. IoT Analytics. IoT business models will exploit the information collected by
"things" in many ways, which will demand new analytic tools and algorithms. As
data volumes increase over the next five years, the needs of the IoT may diverge
further from traditional analytics.
3. IoT Device (Thing) Management. Long-lived nontrivial "things" will require
management and monitoring, including device monitoring, firmware and software
updates, diagnostics, crash analysis and reporting, physical management, and
security management. Tools must be capable of managing and monitoring
thousands and perhaps even millions of devices.
20
Explain the Types of Wireless Sensor Network?
21
Explain the working principle of UHF RFID System
working principle of UHF RFID System
Consider in UHF, the distance between the reader and the tag is few meters so
coupling between the reader and coil will be the far field coupling. RFID reader
continuously sends the waves at a particular frequency towards the tag. In
response, the tag is sending weak signal to RFID reader. This week signal will be
22
sent back to RFID reader which is known as back scattered signal. The Intensity of
the back scattered signal is depending upon the load matching across the coil. By
changing the condition of load we can change intensity of back scattered signal. If
we can change the condition of data that is stored in RFID tag then data can be
send back to RFID reader. In far field coupling RFID and tag is few so initial stage
signal send by reader should be strong.
Explain the impact of RFID Technology in SCM and Logistic
Application.
impact of RFID Technology in SCM and Logistic Application.
1.RFID Improves Visibility
RFID allows companies to track their supply chain workflow, which will provide
23 When used properly, the generated data can help streamline these areas of the
2.Improves Productivity
The main pain point of using barcodes is that you must see it in order to scan it.
This results in a fair amount of wasted time walking to the product, locating the
barcode, and scanning with the equipment. RFID eliminates this by using radio
frequencies to help ‘ping’ the location of the product. RFID tags significantly
associated with labor and can improve the overall facility productivity.
With RFID, companies can see exactly how much of their products they have on
hand. This type of real-time tracking gives them a better timeline of when to
reorder to bolster inventory. It also helps them find the optimal inventory level so
there is no excess product sitting on the shelves, wasting money for storage.
While adjusting inventory levels may not seem like a profit driver, keeping proper
inventory levels can help a company save between 20-30 percent on its
4.Higher Accuracy
RFID tagging also helps companies with inventory control by keeping track of any
moving products that are not authorized to do so. This is especially important with
mere appearance or knowledge that RFID tags are attached can reduce the
potential of theft.
Q3 5 marks each
1
RFID Reader
RFID Tag
RFID Middleware
RFID Reader
RFID Tag
RFID Middleware
3
1.Tags
RFID tags are what stores and transmits the data that needs to be deciphered.
The tags can be attached to assets to send data to the antenna. The microchip
embedded in the tag is what stores the tag's ID and programmable data related
to the asset. This stored data is then transferred to the reader through
antennas.
2.Antennas
3.Readers
RFID readers are connected to the antenna and receive data from the RFID
tag. The reader is what receives and converts the radio waves into digital data
on a computer database.
There are two types of readers. There are Fixed Readers and Mobile Readers.
Fixed readers are typically mounted to walls or other objects and stay in one
location to read data stored in a tag. Mobile readers can be installed or carried
anywhere it is needed.
4.Computer Database
The RFID system requires a computer database to process data stored in tags.
This software can program tags, manage devices and data, remote monitoring
and hardware configuration.
a. Chef Case
Scene Analysis
Scene analysis - this method is based on dividing the surrounding area into the
smaller areas. In the particular points, the basic parameters of the radio signal
(e.g. a radio signal strange - RSS) are measured and stored into the database.
Based on created maps, a mobile node may estimate its position by comparing
the RSS with the information stored in the database. An example of this
technique is the Map Matching used in the technique called Fingerprinting
Proximity Method
Proximity detection is one of the simplest and oldest techniques. It is based on
determining whether the mobile node is in within the base station at a known
position.Location of mobile client is then limited to the operation area of the
base station called cells. When more than one base station detects presence
of a mobile client in its operating area, it is possible to apply additional
techniques for more accurate localization, e.g. triangulation. In the article
proximity detection for the localization technique of a moving wireless client
was chosen.
6
Describe the mobility and handover management
systems in short.
Mobility Management
With the convergence of the Internet and wireless mobile communications and
with the rapid growth in the number of mobile subscribers, mobility
management emerges as one of the most important and challenging problems
for wireless mobile communication over the Internet. Mobility management
enables the serving networks to locate a mobile subscriber’s point of
attachment for delivering data packets (i.e. location management), and
maintain a mobile subscriber’s connection as it continues to change its point of
attachment (i.e. handoff management).
Handover management
Handover management is the process by which a mobile node keeps its
connection active when it moves from one access point to another. There are
three stages in a handover process. First, the initiation of handover is triggered
by either the mobile device, or a network agent, or the changing network
conditions. The second stage is for a new connection generation, where the
network must find new resources for the handoff connection and perform any
additional routing operations. Finally, data-flow control needs to maintain the
delivery of the data from the old connection path to the new connection path
according to the agreed-upon QoS guarantees.
The design of handover management techniques in all-IP based
next-generation wireless networks must address the following issues:
(i) signaling overhead and power requirement for processing handover
messages should be minimized,
(ii) QoS guarantees must be made,
(iii) network resources should be efficiently used, and
(iv) the handover mechanism should be scalable, reliable and robust.
7
IoT gateway offers certain level of security for the network and
transmitted data with higher order encryption techniques. It acts as a
middle layer between devices and cloud to protect the system from
malicious attacks and unauthorized access.
3. Cloud
Internet of things creates massive data from devices, applications and
users which has to be managed in an efficient way. IoT cloud offers
tools to collect, process, manage and store huge amount of data in
real time. Industries and services can easily access these data
remotely and make critical decisions when necessary.
4. Analytics
Big enterprises use the massive data collected from IoT devices and
utilize the insights for their future business opportunities. Careful
analysis will help organizations to predict trends in the market and
plan ahead for a successful implementation.
5. User interface
User interfaces are the visible, tangible part of the IoT system which
can be accessible by users. Designers will have to make sure a well
designed user interface for minimum effort for users and encourage
more interactions.
Figure 1: Received power using Friis model for WiFi transmission at f=2.4 GHz and f=5 GHz
10