0% found this document useful (0 votes)
2 views13 pages

Question Bank

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 13

KARPAGA VINAYAGA COLLEGEOF ENGINEERING

AND TECHNOLOGY

DEPARTMENT OF

COMPUTER SCIENCE AND ENGINEERING

QUESTION BANK

II SEMESTER

INTERNET OF THINGS
SRM VALLIAMMAI ENGINEERING COLLEGE
SRM Nagar, Kattankulathur – 603 203.

DEPARTMENT OF CSE
QUESTION BANK
SUBJECT : CP5292 - INTERNET OF THINGS
SEM / YEAR: II Sem / I Year

UNIT I - INTRODUCTION

Internet of Things -Domain Specific IoTs -IoT and M2M -Sensors for IoT Applications–
Structure of IoT - IoT Map Device- IoT System Management with NETCONF-YANG

PART – A
Q. Questions BT Competence
No Level
Illustrate the evolutionary trend towards building a IoT? BTL 3 Applying
1

List and explain in brief about Features of IoT? BTL 1 Remembering


2

Describe the applications of IoT? BTL 1 Remembering


3

Define IoT and how its works. BTL 1 Remembering


4

Analyze the physical design of IoT. BTL 4 Analyzing


5

Give the basic operations in IoT. BTL 3 Applying


6

List out various IoT Protocol. BTL 1 Remembering


7

Differentiate web of things and IoT. BTL 4 Analyzing


8

Examine whether M2M and IoT are same? BTL 3 Applying


9

Explain why indexes are created in physical database design? BTL 2 Understanding
10

Differentiate between Logical and physical design. BTL 2 Understanding


11

Formulate the IoT maturity levels. BTL 6 Creating


12

Summarize the IOT communication models. BTL 5 Evaluating


13

Highlight the importance of Domain specific IoTs. BTL 2 Understanding


14
How IoT communications APIs are classified? BTL 1 Remembering
15
Tabulate the different levels of Machine to Machine BTL 4 Analyzing
16
communication.
What constitutes the IOT platform? BTL 1 Remembering
17

Bring out the IOT enabling technologies. BTL 2 Understanding


18

Summarize the difference between IOT and M2M BTL 5 Evaluating


19

Generalize the diagrammatic representation SDN architecture.. BTL 6 Creating


20

PART-B

i) Explain in detail about IoT levels. and deployment templates(6)


ii) Explain the significance of each level in detail. (7) BTL 1 Remembering
1

i) Explain physical design in detail with an example (6) BTL 2 Understanding


2 ii) Explain the IoT protocols with block diagram (7)

i) Write about the IoT enabling technologies (7) BTL 3 Applying


3 ii) Explain the Categories of enabling technologies in detail (6)

BTL 1 Remembering
4 Explain in Logical design of IOT? Illustrate with diagram.(13)

Analyze in Deployment templates in detail (13) BTL 4 Analyzing


5

6 Explain Domain specific IoT with an example (13) BTL 5 Evaluating

Generalize the IoT communication APIs


7 BTL 6 Creating
i) REST –based communication APIs(7)
ii) Web Socket-based Communication APIs(6)
Explain in detail about M2M (13) BTL 2 Understanding
8
i) Explain the application of M2M (3)
9 ii) Differentiate M2M and IOT.(10) BTL 4 Analyzing

i) Demonstrate in detail about software defined Networking.(7)


10 ii)Illustrate in detail about the architecture of SDN (6) BTL 1 Remembering
Describe the link layer. (7)
11 Explain in detail about the Transport layer. (6) BTL 1 Remembering

Illustrate with a neat sketch, about the architecture of NFV (13)


12 BTL 3 Applying
Brief the IoT platform design Methodology in detail (13)
13 BTL 4 Analyzing
14 Describe in detail IOT communications models. (13) BTL 2 Understanding

PART-C

Explain
1 i) Characteristics of IOT (7) BTL 5 Evaluating
ii) wireless sensor networks(8)

2 Generalize on Big data analytics and embedded systems. (15) BTL 6 Creating

3 Explain in detail about the applications of IOT.(15) BTL 5 Evaluating

Elaborate the following.


4 i) role of coordinator in wireless sensor network (8) BTL 6 Creating
ii) role of coordinator in an Iot system.(7)

UNIT II - IoT ARCHITECTURE, GENERATIONS AND PROTOCOLS

IETF architecture for IoT - IoT reference architecture -First Generation – Description &
Characteristics–Advanced Generation – Description & Characteristics–Integrated IoT
Sensors – Description & Characteristics
PART – A

Q. BT
Questions Competence
No Level
BTL1
1 Define Scalability Remembering
BTL3
2 Illustrate the Three categories of IoT risks Applying
BTL1
3 List the Attack Categorization For IoT Process Phases Remembering
BTL2
4 Summarize Connectivity. Understanding
BTL3
5 Classify the perception layer in IoT. Applying
BTL6
6 Explain Security in NB-IoT and LTE-M Creating
BTL5
7 Compare object abstraction with data abstraction. Evaluating
BTL4
8 Analyze IoT Security Threats and Attacks Analyzing
BTL2
9 What is the purpose of business layer? Understanding
BTL1
10 List the Attack Categorization According to IoT Architecture Remembering
BTL2
11 Differentiate BLE and RFID Understanding
BTL2
12 What do you mean by functional model of IOT? Understanding
BTL1
13 Define Zigbee Security. Remembering
BTL4
14 Point out main security requirements in IoT scenarios Analyzing

Deduce why RFID Securityis needed? BTL5


15 Evaluating
BTL1
16 Define Communication model. Remembering
BTL1
17 Name the Security in LPWAN. Remembering
BTL3
18 Illustrate few examples on home automation Applying
BTL4
19 Analyze various types of communication technologies. Analyzing
BTL6
20 Formulate the features Security in NFC. Creating

PART-B

BTL 1
1 Describe the Security Role in the IoT Development. ( 13 ) Remembering

BTL2
2 Write in detail about the IoT Architecture.. ( 13 ) Understanding
BTL3
3 Explain the IOT component in detail. ( 13 ) Applying

i) Analyze the security challenges. (6) BTL4


4 Analyzing
ii) Explain the security risks. (7)
Describe the
BTL 1
5 (i) Zigbee Security (6) Remembering
(ii) RFID Securityis (7)
Examine the hardware’s needed for preventing intrusions BTL 3
6 insmart Appliances. Applying
i) Discuss Intrusion Detection. (6) BTL 5
7 Evaluating
ii) Explain Smoke Detectors.(7)

BTL
8 Explain in detail about the security threats and attacks.s13) Creating
6
BTL1
9 Describe Attack Categorization For IoT Process Phases.(13) Remembering

BTL 4
10 What are the IoT Security Requirements? Discuss in detail(13) Analyzing

i) Tabulate the Attack Categorization According to IoT


Architecture (7) BTL 1
11 Remembering
ii) Examine the Security Threats at the Sensing/Perception
Layer. (6)

i) Express how the Security Threats the Network and Service


BTL 2
12 Support Layers. (7) Understanding
ii) Discuss Data Confidentiality in IoT. (6)

BTL 4
13 What is Trust and Security from a Device Perspective.(13) Analyzing

Discuss in detail privacy in IOT. (13) BTL2


14 Understanding
PART-C

Discuss in detail about how the IOT is applied in various BTL 6


1 applications. (15) Creating

Evaluate the strategic to follow in the implementation of the


following using IoT techniques BTL 5
2 i) Smart Environment (7) Evaluating
ii) Surveillance (8)

3 Formulate how IoT is implemented in (15)


(i) Machine Diagnosis
(ii) Indoor Air quality Monitoring BTL 6
Creating

4 Evaluate Security in IoT Networks.(15) BTL5


Evaluating

UNIT III - IoT PROTOCOLS AND TECHNOLOGY


SCADA and RFID Protocols - BACnet Protocol -Zigbee Architecture - 6LowPAN - CoAP
-Wireless Sensor Structure–Energy Storage Module–Power Management Module–RF
Module–Sensing Module

PART – A
Q. Questions BT Competence
No Level
1 Define IoT standardization. BTL 1 Remembering
Distinguish between identification and discovery in IoT protocol
2 BTL 2 Understanding
stack.
3 Mention data protocols. BTL 1 Remembering

4 Define Multilayer framework. BTL 1 Remembering

5 Summarize the salient features of M2M protocol. BTL 6 Creating

6 Show the difference of M2M and WSN protocols. BTL 3 Applying

7 List the requirements of RFID protocols in IoT? BTL 2 Understanding

8 Why do we need a SCADA protocol? BTL 4 Analyzing

9 How does the data acquisition works in SCADA? BTL 5 Evaluating

10 Compare standardization with innovation in IoT. BTL 4 Analyzing

11 Demonstrate the issues with IoT standardization. BTL 3 Applying

12 Discuss the unified data standards. BTL 2 Understanding

13 List the sensor standards in unified data standards. BTL 1 Remembering

14 Give the low-rate wireless personal area networks (LR-WPANs). BTL 1 Remembering

15 Describe the convergence sub layer. BTL 2 Understanding

16 How the BACNet protocol works? BTL 3 Applying

17 Formulate the features of Modbus and give the object types. BTL 6 Creating

18 Where zigbee is used and point the zigbee addressing mode? BTL 1 Remembering

19 Discuss what COAP is. BTL 5 Evaluating


Why do we need IoT security? BTL 4 Analyzing
20

PART-B
List the Protocol standardization of IoT and give the current status
1 BTL 1 Remembering
of standardization.( 13 )
Analyze the uses of
i) M2M and WSN protocols. (4)
2 BTL 4 Analyzing
ii) SCADA protocols. (4)
iii) RFID protocols. (5)
Describe the architecture of SCADA and RFID Protocols in
3 detail.What does the IEEE standard explained about? BTL 2 Understanding
(13)
i) List the advantages and disadvantages of Unified data
4 standards. (6) BTL 1 Remembering
ii) Identify the uses of machine generated data. (7)

i) Summarize the IoT protocols-IEEE 802.15.4(6)


5 BTL 2 Understanding
ii) Describe the layered approach of LR-WPANs. (7)

6 Give the importance of BACNet protocol in detail(13) BTL 6 Creating


i) Illustrate in detail about the Modbus. (6)
7 ii) Examine in detail protocol version of Modbus.(7) BTL 3 Applying

i) Point out the importance of Zigbee.(6)


8 BTL 4 Analyzing
ii) Explain in detail about the architecture of Zigbee. (7)

9 What is IoT security? Describe the challenges of that in detail.(13) BTL 1 Remembering

i) Differentiate WSN PROTOCOL AND m2M PROTOCOL.


10 (7) BTL 2 Understanding
ii) Discuss vulnerabilities of IoT. (6)

11 Illustrate the security requirements of IoT in detail. (13) BTL 3 Applying

i) Explain the security architecture of IoT (6)


12 BTL 4 Analyzing
ii) Analyze the Threat modeling and analysis in detail. (7)

13 Explain in detail about IoT security tomography(13) BTL 5 Evaluating


14 What do you mean by use cases and misuse cases.(13) BTL 1 Remembering

PART-C

Compare how the zigbee is used in home automation and medical


1 BTL 5 Evaluating
device data collection. (15)

2 Discuss the need of IoT security management system.(15) BTL 6 Creating


Evaluate and contrast the merits and demerit of Modbus in real
3 BTL 5 Evaluating
time system with examples.(15)
Test the significant benefit of using the following service in IoT
i) DoS attack. (5)
4 BTL 6 Creating
ii) Theft of Resources. (5)
iii) Information Disclosure. (5)

UNIT IV - CLOUD ARCHITECTURE BASIC


The Cloud types; IaaS, PaaS, SaaS.- Development environments for service development;
Amazon, Azure, Google Appcloud platform in industry

PART-A
Q. BT
Questions Competence
No Level
1 Analyze on features of Raspberry PI. BTL 4 Analyzing

2 Define Raspberry PI. BTL 1 Remembering

3 Examine how the system on chip. BTL 3 Applying

4 Summarize the benefits of SoC. BTL 2 Understanding

5 List out the steps used in internet gateway device. BTL 1 Remembering

6 Write the significant of IoT systems. BTL 6 Creating

7 Define Logical design using python. BTL 1 Remembering


Analyze how complex is the logical design with Python for an
8 BTL 4 Analyzing
application?.
9 Illustrate the building blocks of IoT device. BTL 3 Applying
10 Name any four services offered by Raspberry Pi. BTL 1 Remembering

11 Justify how a linux Os is useful in IoT. BTL 5 Evaluating

12 Differentiate Raspberry with Arduino. BTL 2 Understanding

13 What are the interfaces in Raspberry? BTL 2 Understanding

14 Name the different IoT platforms. BTL 6 Creating

15 Analyze how programming raspberry pi works. BTL 4 Analyzing

16 Define Arduino and write the feature of Arduino. BTL 1 Remembering

17 Generalize as to how Arduino works. BTL 6 Creating

18 What is the purpose of actuators in IoT? BTL 2 Understanding

19 Name the Need For sensors in IoT. BTL 1 Remembering

20 Demonstrate Event –driven industrial IoT systems? BTL 3 Applying

PART-B

1 Describe the procedure of Building IOT with RASPERRY PI. BTL 1 Remembering
What are the physical devices and end points? (13)

i) List the features in IoT systems (7)


2 BTL 1 Remembering
ii) Describe Logical design using python in detail. (6)

i) Summarize the IoT physical Devices in detail. (6)


3 BTL 2 Understanding
ii) Discuss on Endpoints in IoT. (7)
4 Draw and explain the building blocks of IoT device (13) BTL 3 Applying

i) Explain the concepts involved in Raspberry Pi. (7)


5 BTL 4 Analyzing
ii) Classify the operating systems used for raspberry pi. (6)

6 Evaluate the Raspberry Pi board in detail with neat sketch. (13)


BTL 5 Evaluating

i) Generalize the Linux on Raspberry Pi. (6)


7 ii) Design the functional building blocks in Raspberry Pi BTL 6 Creating
Interfaces. (7)
What is Analog discovery? Describe in detail about how it
8 interconnect and interface with logic gates with a suitable diagram. BTL 1 Remembering
(13)
Discuss contrast scripting and compiled programming languages
9 BTL 2 Understanding
and their applications to the raspberry Pi.(13)
i) Classify the various types of programming languages for
10 raspberry.(6) BTL 3 Applying
ii) Show how will it is used in IoT.(7)
Illustrate Programming Raspberry Pi with Python with
11 BTL 4 Analyzing
examples.(13)
12 Examine the other IoT platforms of IoT. (13) BTL 1 Remembering
13 Discuss in detail about Arduino with neat sketch. (13) BTL 2 Understanding
Give a detailed note on Advantage of Arduino in building the IoT
14 BTL 4 Analyzing
systems.
PART-C
Evaluate the performance of Raspberry Pi with suitable
1 illustrations. Illustrate the design issues for Raspberry Pi BTL 5 Evaluating
interfaces.(15)
Formulate the significant use of Raspberry Pi
2 i) Smart cities. (8) BTL 6 Creating
ii) Industrial appliances. (7)
Choose any one IoT Platforms and List its benefits with examples.
3 BTL 5 Creating
(15)
Construct the Design of Smart home with Raspberry Pi and other
4 BTL 6 Creating
hardware devices with neat sketch.

UNIT V – U N I T V - I O T P R O J E C T S O N R A S P B E R R Y P i
Building IoT with RASPBERRY Pi- Creating the sensor project - Preparing Raspberry Pi -
Clayster libraries – Hardware Interacting with the hardware - Interfacing the hardwareInternal
representation of sensor values - Persisting data - External representation of sensor
values - Exporting sensor data

PART-A
Q. Questions BT Competence
No Level
Give the characteristics of python?
1 BTL 2 Understanding

2 Define Chef. BTL 1 Remembering

3 Summarize the several key tools for building applications. BTL 2 Understanding
4 List the chef framework.. BTL 1 Remembering

Illustrate the diagram for setting up three-tier deployment with


5 BTL 3 Applying
chef

6 Summarize Hadoop cluster. BTL 5 Evaluating

7 Define Thingworx BTL 1 Remembering

8 Write about storm cluster. BTL 6 Creating

9 Identify the need of NETCONF tool. BTL 2 Understanding

10 Differentiate NETCONF and YANG. BTL 4 Analyzing

11 Write a brief note on SecuRemote. BTL 6 Creating


12 Mention how Smart irrigation is managed with NETCONF- BTL 5 Evaluating
13 Illustrate IOT Solution Development Kit. BTL 3 Applying

14 Discuss about Puppet tool BTL 2 Understanding

15 Tabulate the various tools in IOT. BTL 1 Remembering

16 Compare Puppet and Chef tool. BTL 4 Analyzing

17 Show the deployment model for Puppet.. BTL 3 Applying


Discuss the commands to install and run VNC server on Raspberry
18 BTL 1 Remembering
pi.
List the steps for IOt device Management with
19 BTL 1 Remembering
NETCONF-YANG .
20 Point the steps to install and run VNC server on Raspberry pi. BTL 4 Analyzing

PART-B

Examine in detail the following


(i)Chef tool.(7)
1 BTL 3 Applying
(ii)Setting up chef tool.(6)

i) Define Multi-tier Application Deployment with chef.


2 BTL 1 Remembering
ii) Discuss in detail about Applications of IoT.(7)

3 Explain the installation of python(13) BTL 1 Remembering


i) Demonstrate with a neat diagram the setting up a Hadoop
4 Cluster.(6) BTL 3 Applying
ii) Demonstrate the chef recipe for setting up hosts.(7)

i) Analyze the setting up an Apache Storm Cluster with


5 Chef(7) BTL 4 Analyzing
ii) Explain setting up Zookeeper..(6)

(i) Describe the key concept of Puppet


6 BTL 4 Analyzing
(ii) Describe the setting up puppet server and client(13)

i) Compose in detail about SecuRemote Cloud Services.(6)


7 BTL 6 Creating
ii) Generalize Iot Solution Development Kit.(7)

8 Evaluate the concepts involved in Software Tools of IoT.(13 ) BTL 5 Evaluating


Express in detail about the need of IoT management tools.(13)
9 BTL 2 Understanding

i) Summarize on the basic concepts of Multi-tier


Deploymant.(6)
10 BTL 2 Understanding
ii) Evaluate how to create the haproxy class which contains a
package resource for installing haproxy.(7)

11 Describe in detail about the NETCONF-YANG . (13) BTL 1 Remembering

i) Analyze in detail the strps for IOt device Management with


12 NETCONF-YANG ..(6) BTL 4 Analyzing
ii) Compare the various tools in IoT.(7)

Describe how smart Irrigation IoT System with NETCONF-


13 YANG (13) BTL 1 Remembering

Write detailed note on Managing Home Intrusion Detection IoT


14 BTL 2 Understanding
with NETCONF-YANG (13)

PART-C

1 Summarize BLE/ANT Certified Modules. (15) BTL 5 Evaluating


2 (i)Discuss the Smart Appcessory Devices and Beacons
(ii)SecuRemote IoT Evaluation Kit. BTL 6 Creating

3 Formulate how to Implement IoT with python with python (15)


BTL6 Creating

Evaluate and summarize in detail Wireless Module Developers Kit. Evaluating


4 BTL 5
(15)

You might also like