0% found this document useful (0 votes)
90 views13 pages

Module 1-Question-Bank

Iot 8th sem Engineering vtu question bank mod 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
90 views13 pages

Module 1-Question-Bank

Iot 8th sem Engineering vtu question bank mod 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 13
INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 1, What is IOT? What are the evolutionary phases of IOT (Genesis of IOT)? Answer: What is OT? Objects that are not currently joined to a computer network, namely the Internet, will be connected so that they can communicate and interact with people and other objects. oT is, a technology transition in which devices will allow us to sense and control the physical world by making objects smarter and connecting them through an intelligent network, When objects and machines can be sensed and controlled remotely across a network, a tighter integration between the physical world and computers is enabled. This allows for i areas of efficiency, accuracy, automation, and the enablement of advan an umbrella of various concepts, protocols, and technologies. Evolutionary phases of JOT are as follows Intomet of feed Things cose Breets Digits nieractons [J Conecing 9 Intelligent Connections: oliionary phases of 10T ess): This phase connected people to email, web services, formation is easily accessed. my (Digitize business): This phase enabled e-commerce and rancements along with collaborative engagement to drive increased fence to encompass widespread video and social media while always being connected through mobility. More and more applications are moved into the cloud. 4d, Internet of Things (Digitize the world): This phase is adding connectivity to objects and machines in the world around us to enable new services and experiences. It is connecting the unconnected. \ Department of CS & B, CEC Page 1 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 2. List and explain some of the differences between IT and OT networks and their various challenges. Answer: Differences between IT and OT networks with their challenges are: Sino Operational Technology (OT) Information Technology UT) TT supports connections to the OT monitors and controls devices and | Internet along with related data and 1 technology systems and is focused processes on physical operational systems. on the secure flow of data across an organization. ‘OT is responsible for the devices and processes acting on industrial equipment, if for IT organization a such as factory machines, meters, actuators, teny of a elecirical distribution automation devices, a SCADA (supervisory control and data » acquisition) systems, 3 _| Keep the business operating 24x7 eee 4 | Priorities are Availability, Inte rity \ Priorities. are Security, “Integrity, vailability Types of Voice, video, 5 _ | Types of Monitoring, conga am ee bulk data 5 5 Devices and users authenticated to 6 | Controlled physicatQcess to devicBs eee Can be — business impacting, . depending 7 directly impacts | industry, but workarounds may be possible (software or Network upgrades often requires an 8 rdw rly during operational | ciiage window when workers are iS not onsite; impact can be mitigated Security vulnerability are high: SXurity vulnerability are Low: OT nevworks | Continual patching of hosts is 9 are required, and the network is, isolated and often use proprietary protocols connected to Intermet and requires vigilant protection Department of CS & B, CEC Page 2 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 3. List and explain a few of the most significant challenges and problems that IoT is currently facing. Answer: Se +: scale of IT networks can be large; the scale of OT can be several orders of magnitude larger. Security: With more “things” becoming connected with other “things” is an increasingly complex issue for loT. Threat surface is now greatly’ device gets hacked, its connectivity is a major coneem. A compri launching point to attack other devices and systems. Privacy: As sensors become more prolific in our everyday lives, the data they gather will be specific to individuals and their activi his data “can range from health i @Wblishment, Data has monetary Department of CS & B, CEC Page 3 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 4. Discuss IOT and Digitization. Answer: a. ToT focuses on connecting “things,” such as objects and machines, to a computer network, such as the Intemet, b. Analysis of this data can lead to significant changes to the locations of product displays and advertising ©. Digitization encompasses the connection of “things” with the data they generate and the business insights that result. e 4. Digitization is the conversion of information into a digital format the epatext of IoT,, digitization brings together things, data, and bu: ss to mittee etworked connections more relevant and valuable. ©. Digitization is a differentiator for the businesses, an prime enabler of digitization. 5. Explain the benefits of. iP impact. Answer: Connected Roadways: Confected roadwa¥s is the term associated with both the driver and driverless cars fully i {HUCrrounding transportation infrastructure. Currenf Challenges Being Addressed by Connected Roadways are i) Safety: lo and the enablement of connected vehicle technologies will empower drivers with the tools they need to anticipate potential crashes and significantly reduce the number of lives lost each year ii) Mobility: Connected vehicle mobility applications can enable system operators and drivers to make more informed decisions, which can, in tum, reduce travel delays. Department of CS & B, CEC Page 4 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 iii) Environment: Connected vehicle environmental applications will give all travellers the real-time information they need to make “green” transportation choices. Example: Google’s Self-Driving Car. IoT is going to allow self-drivis ig Vehicles to better interact with the transportation system around them through bidirectional data exchanges while also providing important data to the riders, Connected Factory: The main challenges facing manufacturing in a f Ament today include the following: e i) Accelerating new product and service introductionWadfneet SPBfomer and market opportunities. ii) Increasing plant production, quality, an © while decreasing cost. iii) Mitigating unplanned downtime, iv) Securing factories from yb v) Improving worker produgfivit IOT can provide solutions, technologies and archi f control rooms and the plant floor. Department of CS & B, CEC Page 5 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 Pee ee le ey) ON etn eed Industry 1.0: Mechanical Assistance (Lale 18 Century The four industrial revolutions ‘Smart Connected Buildings: The function of a building is to sensors are spread. throughout ‘are used to influence the building ‘management system’s (BMS)s); low into a room. Another promising loT technology in the smart co “digital ceiling.” a digital ceiling environment, every lighting fixture is directly nei Sm: ¥ Sensors can be placed on animals and even insects just as easily as on machin ith respect to animals focuses on what is often referred to as the “connected cow.” A sensor is placed in a cow’s ear. The sensor monitors various health aspects of the cow as well as its location and transmits the data wirelessly for analysis by the farmer. Another application of IoT to organisms involves the placement of sensors on roaches. An electronic backpack attaches to a roach. This backpack communicates with the roach through parts of its body. The electronic backpack uses wireless communication to a controller and. can be “driven” remotely. Department of CS & B, CEC Page 6 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 6. List and explain the requirements driving specific architectural Changes for IoT. OR List and explain the Drivers behind New Network Architectures. Answer: ‘Ghatonge Description aT Rreitoctral Change Required — See The massive a of oT ead) The it adres spe is reached points sensor fs far beyond exhaustion and is unable to meet oT e thatoftypkalT etworks.—scalablity requirements Seale canbe met ‘nly By using Pv. Trnctworks continue {ors tea though feats ike Network ‘Address Tension (NAN, SecariyToT dees copeiiy hone Scary equine at every clo) the IT network. Bry ToT endpoint (WSN are often physically node onthe network must be pat of exposed othe word the oneal secur staeey and musty suppor device-level authentication and link encryption f mst also be easy to deploy with some type of azer>touch plone model =v DDevicesand Due wo the massive scale and New lnm witclesechnologis ae networks longer distances, the networks needed to support constrained ToT devices constrained are often constrained lossy, over lng distances. The network is also by power, and.capable of supporting only constrained, meaning mexfications need (CPU, mes minimal data rates ens of bps to be made to taditional networklayer ‘ory.and ink to hundreds of Kbps. ‘Mansport mechanisms. speed ‘Themassive The sensor gncratea massive Data analytics capabilities need to Be volume of amount of data ona daly basis, distributed thoughout the loT network, dca gencr- casing network bottlenecks from the edge tothe cp In trations ated and slow anaytics inthe cloud. TT networks, analytics and applications typically rum only inthe cloud Sepport An oT network often com Digital transformation ia long process forlegacy prises collection of modern, that may take many years, and IoTnet- devices TP-capable endpoints as well works ned to support protocol tans aslegacy,nomIP devices that tion and/oe tunneling mechanisms to rely on serial or proprietary suppor egacy protocols over standards: protocols based protocols, suchas Ethernet and I “The need for Whereas wadtional “Analytics software needs to be pos datato be networks perform scheduled__ toned close tothe edge and should analyzed in batch processing of data, [oT support real-time steaming analytics realtime data needs ro he analyzed and_Tradtional analytics software (sch as responded tin realtime, relational datahases or even Hadoop) re Detter suited wo batevevl analytics that ‘occur after the fast Department of CS & B, CEC Page 7 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 7. With a neat diagram explain the oneM2M IoT Standardized Architecture. oe = a = Poptcanone yer | [Series Layer: Network Layer: 2*Grartenery | | one ncides common | | pepacaton ako + Assettaairg | | sovceehotzotal tamewort| | he APt to commune + Fletitanagement| | supporting Rests APs toeencore Min laments of neM2M ogra Artes ‘The oneM2M architecture divides IoT functjons inl sjor domains: the application layer, the services layer, and the network layers Applications layer: The oneM2M {ajor attention to connectivity between devices and their applications. #fhis MomaMinclides the application-layer protocols and attempts to standardize nor nitions for interaction with business intelligence (dustry-specific and have their own sets of data ‘underlying management protocols, and the hardware. Examples 1unications via cellular, MPLS networks, VPNs. includes WE devices themselves and the communications network that links them. Embodiments of this communications infrastructure include wireless mesh technologies, such as IEEE 802.15.4, and wireless point-to-multipoint systems, such as IEEE 801.11ah Department of CS & B, CEC Page 8 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 8. With a neat block diagram illustrate The IoT World Forum (loTWF) Standardized Architecture. ail Connactty (Gorman 8 Peceming Uns) Physical Devices & Controliers Enetimrae mis) eoo; ished Bfthe lof World Forum e first layer of the loT Reference layer, his layer is home to the “things” in the Layer 1: Physical Devices and Cont Model is the physical devices and gantro Internet of Things, including th 's and sensors that send and receive information. Layer 2: Connecti on connectivit La + Commiinigafions between Layer 1 Devices + Reliable Delivery of Information across the Network + Switching and Routing + Translation between Protocols + Network Level Security Department of CS & B, CEC Page 9 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 Layer 3: Edge Computing Layer: At this layer, the emphasis is on data reduction and converting network data flows into information that is ready for storage and processing by higher layers. Layer 3 Functions: + Evaluate and Reformat Data for Processing at Higher Levels + Filter Data to Reduce Traffic Higher Level Processing + Assess Data for Alerting, Notification, or Other Actions Upper Layers: Layers 4-7: The upper layers deal with handling and progessingaie 1oTodata generated by the bottom layer. Ze loT Reference Model Layer —_ Functions Layer 4:Data accumulation Captures data and stores itso itis usable by applications layer when necessary. Converts event-based data to query-based processing. Layer 5: Data abstraction layer Reconciles multiple data formats and ensures consistent ‘semantics from various sources. Confirms that the data set is complete and consolidates data into one place or multiple data stores using virtualization. Layer 6: Applications layer Interprets data using software applications. Applications ‘may monitor, control, and provide reports based on the analysis of the data. Layer 7: Collaboration and ‘Consumes and shares the application information. processes layer Collaborating on and communicating loT information often, requires multiple steps, and it is what makes oT useful. This layer can change business processes and delivers the benefits of 1oT. p of a diagram explain extended simplified IOT ‘chitecture. core tor {oT Data Management Functional Stack ‘and Compute stack ‘Appteatons ‘cous a aaa ca Tangs: Sensors ae Department of CS & B, CEC Page 10 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 a. This framework is presented as two parallel stacks: The loT Data Management and Compute Stack and the Core loT Funetional Stack. b, IoT model includes core layers including “things,” a communications network, and. applications, The framework separates the core IoT and data management into parallel and aligned stacks, allowing to carefully examine the functions of both the network and the applications at each stage of a complex IoT system. 4. The presentation of the Core loT Functional Stack in three layers is leant to simplify the IoT architecture into its most foundational building blocks. 10. Write a short n¢ Stack with Fog IOT tend to data analysis closer to the IoT system, These new Data Management and Compute requirements izing latency, Conserving network bandwidth, Increasing local ted problems need to be addressed like © Net The volume of data transmitted over the backhaul can be high Big data is getting bigger. The solution to the challenges mentioned in the previous section is to distribute data ‘management throughout the [oT system, as close to the edge of the IP network as possible. The best-known embodiment of edge services in loT is fog computing. Any device with ‘computing, storage, and network connectivity can be a fog node. Department of CS & B, CEC Page 11 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 Hundreds Data Center/Cioud Transactional Response Times Thousands Backhaul ‘and Sensors ‘Smart Objects Low Power, Low Banawidth ‘The IoT Data Management and Compute\ Fog Computing An advantage of this structure control from the closest possible sitting as close to the loT fog node has context pnts ogre The Contextual lgcation awareness and low latency: The fog node sits as close to the loT feristic of fog computing are as follows: endpoint as possible to deliver distributed computing. Geographic distribution: The services and applications targeted by the fog nodes demand widely distributed deployments. Deployment near IoT endpoints: Fog nodes are typically deployed in the presence of a large number of IoT endpoints. Department of CS & B, CEC Page 12 INTERNET OF THINGS TECHNOLOGY (15CS81) MODULE 1 Wireless communication between the fog and the loT endpoint: Although it is possible to connect wired nodes, the advantages of fog are greatest when dealing with a large number of endpoints, and wireless access is the easiest way to achieve such scale, Use for real-time interactions: Important fog applications involve real-time interactions rather than batch processing. Pre-processing of data in the fog nodes allows upper-layer applications to perform batch processing on a subset of the data, OF Department of CS & B, CEC Page 13

You might also like