0% found this document useful (0 votes)
84 views5 pages

IOT Model Answer End-Semester

Uploaded by

yashrajput1816
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views5 pages

IOT Model Answer End-Semester

Uploaded by

yashrajput1816
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SET-A

TE (Computer Engineering)
Elective I: Internet of Things & Embedded System
(2019 Pattern) (Semester-V) (310245- A)

Time: 2½ Hours] [Max. Marks: 70]

Instructions to the candidates:


1) Solve Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6, Q.7 or Q.8.
2) Assume suitable data if necessary.
3) Neat diagrams must be drawn wherever necessary.
4) Figures to the right indicates full marks

Solution & Marking Scheme

Q1. a) Which are the various steps in IOT design methodology? 6


Ans: - 1) Flow diagram – 1 mark
2) 1 Steps - ½ mark
i) Purpose & Requirements Specification, ii) Process Specification, iii) Domain Model
Specification, iv) Information Model Specification, v) Service Specifications, vi) IoT
Level Specification, vii) Functional View Specification, viii) Operational View
Specification, ix) Device & Component Integration, x) Application Development.
b) Demonstrate the use of RFID with the help of suitable IoT application. 6
Ans: - 1) Demonstration Diagram 2 marks
2) IOT application 4 marks.
c) Explain M2M communication in detail. 5
Ans: - 1) diagram 1 mark
2) M2M – Internet of Device – 1 mark
3) M2M – Every day of Life – 1 mark
4) M2M – Business & city infrastructure e – 1 mark
5) M2M – Six pillars – 1 mark
OR
Q2. a) Describe device and component integration for IOT based home automation system. 6
Ans: - 1) Description of device and component integration – 2 marks
2) Description of communication model used in home automation – 2 marks
3) Description of communication API used in home automation – 2 marks
b) Demonstrate the working of push- pull communication model using diagram with 6
suitable application.
Ans: - 1) Diagram of push- pull communication model – 2 marks
2) Working – 2 marks
3) application – 2 marks
c) What are horizontal and vertical of IOT applications? 5
Ans: - 1) 2 application each – 4 marks
2) Definition of each – 1 mark
Q3. a) What is 6LoWPAN? 6LoWPAN and EPC standardization. 6
Ans: - 1) 6LoWPAN – 2 marks
2) 6LoWPAN standardization – 2 marks
3) EPC Standardization – 2 marks
b) Explain SCADA protocol standardization. 6
Ans: - 1) IEEE std Architecture -3 marks
Study material provided by: Vishwajeet Londhe

Join Community by clicking below links

Telegram Channel

https://t.me/SPPU_TE_BE_COMP
(for all engineering Resources)

WhatsApp Channel
(for all tech updates)

https://whatsapp.com/channel/
0029ValjFriICVfpcV9HFc3b

Insta Page
(for all engg & tech updates)

https://www.instagram.com/
sppu_engineering_update
2) SCADA Protocol – 3 marks
c)What is MQTT and explain in detail. 6
Ans: - 1) MQTT=Definition of Message Queuing Telemetry Transport – 1 mark
2) publish-subscribe pattern and including components – 2 marks
3) Why MQTT used in IOT – 1 mark
4) MQTT security – 2 marks
OR
Q4. a) Explain LoRA based smart Irrigation system. 6
Ans: - 1) what is LoRA- LoRa is a low-power rate communication protocol – 1 mark
2) Bandwidth showing diagram – 1 mark
3) Irrigation system diagram - 1 mark
4) Description – 3 marks
b) Explain MODBUS protocol in detail. 6
Ans: - 1) Modbus is a serial communications protocol originally published by Modicon
(now Schneider Electric) in 1979 for use with its programmable logic controllers
(PLCs). - 1 mark
2) what is master slave protocol in MODBUS- 2 marks
3) Modbus Message Framing & Transmission Modes – 2 marks
4) Modbus TCP/IP – 1 mark
c) Examine that why ZigBee is popular than Wi-Fi and Bluetooth in IoT. 6
Ans: - 1) Zigbee Architecture – 2 marks
2) Zigbee Protocol Layers- 2 marks
3) ZigBee Node Types and comparisons – 2 marks
Q5. a) Define software define networking & Explain architecture of SDN. 6
Ans: - 1) The physical separation of the network control plane from the forwarding
plane, and where a control plane controls several devices. – 2 marks
2) Architecture of SDN- 2 marks
3) Description – 2 marks
b) Explain the Python Web application framework Django 6
Ans:- 1) Django: It is a free and open-source web framework, written in Python, which
follows the model-view-template (MVT) architectural pattern. 1 mark
2) Python web application – 3 marks
3) Framework diagram 2 marks

c) Describe the IOT messaging mechanisms called WAMP (AutoBahn for IOT). 6
Ans: - 1) Web application Messaging Protocol. – 2 marks
2) WAMP: AutoBahn description – 2 marks
3) AutoBahn diagram – 2 marks

OR
Q6. a) Define Cloud of Things & What is cloud communication API? 6
Ans: - 1) Cloud of Things is a service model in which data is maintained, managed,
backed up remotely and made available to users over a network (typically the
Internet). It is managed by a hosting company – 3 marks
2) Cloud Storage Application Programming Interface (API) is a method for
access to and utilization of a cloud storage system – 3 marks
b) Write a short note on cloud standardization. 6
Ans: - 1) What is Cloud Standardization? - 2 marks
2) What is main Issue? - 2 marks
3) What is roll of IOT std & Cloud computing in IOT. 2 marks
c) Explain the different cloud-based services offered by Amazon for IOT. 6
Ans: - 1) explain EC2 and Light shell services in detail. 3 marks each.
Q7. a) Examine how threat model is useful in securing IoT applications. 8
Ans: - 1) Security Threats in Smart Home Smart home services can be exposed to
cyber-attacks because majority of the service provider do not consider security
parameters at early stages. The possible security threats in a smart home are
eavesdropping, Distributed Denial of Service (DDoS) attacks and leakage of
information, etc. Smart home networks are threatened by unauthorized access.
2) Trespass: 2 marks
3) Monitoring and personal information leakage- 2 marks
4) DoS/DDoS- 2 marks
5) Falsification: - 2 marks
b) List out security requirements for IOT base systems. & Discuss some vulnerabilities in 9
IOT.
Ans: - 1) Security Requirement: - 1) Authentication, 2) data confidentiality, 3) Access
control, 4) trust Management, 5) Availability of Resources, 6) Secure
service, 7) Secure S/W Development, 8) Flexibility & Adoptability, 9)
Scalability, 10) Tamper Resistance- 4 marks
2) Vulnerabilities: - 1) Insecure web interface, 2) Ineffective authentication, 3)
insecure network services, 4) Lack of transport encryption, 5) Privacy concern,
6) Insecure cloud interface, 7) Insecure mobile interface, 8) Insufficient security
features, 9) Insufficient security features, 10) erasing all personal information. – 5 m
OR
Q8. a) Write a short note on Light weight cryptography. 8
Ans: - 1) What is Light weight Cryptography? 2 marks
2) Why it is required in IOT? - 2marks
3) explain Example of Light weight Cryptography- 2 marks
4) Use of Light weight Cryptography. – 2 marks
b) What is Activity Modelling of Threats? & Explain access control issue with respect to 9
IOT security.
Ans: - 1) Definition 2 marks, 2) 2 Steps 4 marks, 3) Example – 3 marks

You might also like