0% found this document useful (0 votes)
35 views16 pages

IoT-DB Important Questions

The document discusses communication models, architecture, and components of IoT. It describes three main communication models - publisher-subscriber, push-pull, and exclusive pairs. It outlines a four layer IoT architecture consisting of sensing, network, processing, and application layers. It also lists the major components of IoT as devices, gateways, cloud, analytics, and user interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views16 pages

IoT-DB Important Questions

The document discusses communication models, architecture, and components of IoT. It describes three main communication models - publisher-subscriber, push-pull, and exclusive pairs. It outlines a four layer IoT architecture consisting of sensing, network, processing, and application layers. It also lists the major components of IoT as devices, gateways, cloud, analytics, and user interfaces.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

UNIT – I: IoT- Introduction and it’s components

1. Explain communication model in IOT.


ANS- Effective communication in IoT enables devices to share data, receive instructions,
and respond to requests in a timely and accurate manner. This is critical for the successful
implementation of IoT solutions across various industries. There are several communication
models that can be used in the Internet of Things (IoT) ecosystem, depending on the
requirements of the use case. Main communication models used in IoT are –

I. Publisher-Subscriber Model –
This model comprises three entities: Publishers, Brokers, and Consumers.
• Publishers are the source of data. It sends the data to the topic which are managed by
the broker. They are not aware of consumers.
• Consumers subscribe to the topics which are managed by the broker.
• Hence, Brokers responsibility is to accept data from publishers and send it to the
appropriate consumers. The broker only has the information regarding the consumer to
which a particular topic belongs to which the publisher is unaware of.

II. Push-Pull Model –


The Push-Pull communication model consists of three entities: data publishers, data
consumers, and data queues. Publishers and consumers are not aware of each other.
Publishers push messages or data into the queue, and consumers on the other end pull data
out of the queue. The queue acts as a buffer for messages when there is a difference in the
rate of data push or pull by the publisher and consumer.
III. Exclusive Pair –

Exclusive Pairs are communication models that provide full-duplex, bidirectional


communication between a client and server. These models are designed for constant or
continuous connections between the two entities.
Once a connection is established, both the client and server can exchange messages with
each other. As long as the client does not request to close the connection, it remains open,
and the server is aware of every open connection. This enables the client and server to
communicate seamlessly and in real-time.
2. Explain IOT architecture.
ANS- IoT architecture refers to the tangle of components such as sensors, actuators, cloud
services, Protocols, and layers that make up IoT networking systems. The complexity and
number of architectural layers vary according to the specific business task at hand. A four-
layer architecture is the standard and most widely accepted format.

1. Sensing Layer –
The sensing layer is the first layer of the IoT architecture and is responsible for
collecting data from different sources. This layer includes sensors and actuators that
are placed in the environment to gather information about temperature, humidity,
light, sound, and other physical parameters. These devices are connected to the
network layer through wired or wireless communication protocols.
2. Network Layer –
Network layers provide an overview of how data is moved throughout the application.
This layer contains Data Acquiring Systems (DAS) and Internet/Network gateways. A
DAS performs data aggregation and conversion functions (collecting and aggregating
data from sensors, then converting analog data to digital data, etc.). It is necessary to
transmit and process the data collected by the sensor devices. That’s what the network
layer does. It allows these devices to connect and communicate with other servers,
smart devices, and network devices. As well, it handles all data transmissions for the
devices.

3. Processing Layer –
The processing layer is the brain of the IoT ecosystem. Typically, data is analyzed,
pre-processed, and stored here before being sent to the data center, where it is accessed
by software applications that both monitor and manage the data as well as prepare
further actions. This is where Edge IT or edge analytics enters the picture.

4. Application Layer –
User interaction takes place at the application layer, which delivers application-
specific services to the user. An example might be a smart home application where
users can turn on a coffee maker by tapping a button in an app or a dashboard that
shows the status of the devices in a system. There are many ways in which the Internet
of Things can be deployed such as smart cities, smart homes, and smart health

3. Explain Components/Elements of IOT.


ANS- When we talk about the “components” of IoT, we’re referring to the hardware and
software that make up an IoT device or system.

The hardware component refers to the physical devices that are connected to the internet.
These can be anything from sensors and cameras to cars and industrial machines.

The software component, on the other hand, is the set of programs and algorithms that run on
these devices and enable them to collect and analyze data, make decisions, and carry out
actions.

Major Components of IOT:


These are explained as following below.

1. Things or Device
These are fitted with sensors and actuators. Sensors collect data from the environment
and give to gateway where as actuators performs the action (as directed after
processing of data).
2. Gateway
The sensors give data to Gateway and here some kind of pre-processing of data is
even done. It also acts as a level of security for the network and for the transmitted
data.

3. Cloud
The data after being collected is uploaded to cloud. Cloud in simple terms is
basically a set of servers connected to internet 24*7.

4. Analytics
The data after being received in the cloud processing is done . Various algorithms
are applied here for proper analysis of data (techniques like Machine Learning etc
are even applied).

5. User Interface
User Interface, also known as UI in the Internet of Things (IoT) and provides an
interface by which the users can interact with the applications and systems. Here
are some of the key points in the user interface of IoT (Internet of Things): Data
Visualization, User-Friendly Design, Personalization, Remote Management,
Integration, Authentication, and Security.

4. Benefits and features with its advantages of IOT application.


ANS-
i. Benefits of IoT application:

The technology has a significant impact on both common people and professionals work.
The IoT has several benefits and perks which can help enterprise, common people to make
their life easy. Some of the benefits are highlighted below:

1. Achieve Customer-Centricity
• For any business or any organization, customer satisfaction is a very critical factor that
needs to be always focused.
• When using the IoT technology the devices are interacted and improve business
functions. As the feedback is collected from customers by using IoT devices help to
improve services and increase the level of customer satisfaction. The product
shortcomings can be highlighted easily and can be solved.
2. Gathering Rich Data
• For any type of organization, the data is termed as the most important weapon. The
organizations are extensively using the IoT models and methodologies in their
businesses for gathering a huge chunk of data about customers and company products.
• By collecting this information the organizations perform different analysis and do
deep understanding so that they can improve their product quality so that their
business can be expanded and can earn more profit. It can be understood better by
example.
3. Enhanced Security Measures
• The IoT enables the access control system to provide additional security to the
organization and common people. The use of IoT technology in surveillance can help
to improve security standards in the organization and also help to track any suspicious
activity. In the organization it can be useful to track the activities of an employee, can
be used to maintain their daily record.
4. Reduction in Operational Cost
• Every organization tries to reduce their operational cost but only that enterprise
becomes successful which uses maximum use of IoT solutions for their purpose. There
is a need for constant connection to the smart device and organization so that
operational costs can be reduced for the organization.
5. Use of Smart Devices
• Across all enterprises, the use of smart devices has increased the insignificant amount
and it is accepted by the organizations. There is an advancement in smart device
applications and used in different sectors like transportation, hospitality, healthcare,
and education.

ii. Features of IoT application:

Any IoT device comes up with the following features:

1. Connectivity
In the case of IoT, the most important feature one can consider is connectivity. Without
seamless communication among the interrelated components of the IoT ecosystems (i.e.,
sensors, compute engines, data hubs, etc.), it is impossible to execute any proper business
use case. IoT devices can be connected over Radio waves, Bluetooth, Wi-Fi, Li-Fi, etc.
2. Sensing
In everyday life, humans are good at figuring out what's happening around us by using our
past experiences. Similarly, in IoT, we need to gather information from our surroundings to
understand what's going on. To do this, we use various sensors like those that measure things
like light, pressure, or location. For example, in cars, sensors can help detect light levels,
pressure changes, speed, and even objects around the vehicle.
3. Scale
When we talk about scale in IoT, we mean how easily we can adjust the size of our systems,
either making them bigger or smaller as needed. So, it's important for companies to design
their IoT systems in a way that can handle these changes, both now and in the future,
depending on how much they need to use them.

4. Dynamic Nature
For any IoT use case, the first and foremost step is to collect and convert data so that
business decisions can be made out of it. In this whole process, various components of
IoT need to change their state dynamically. For example, the input of a temperature sensor
will vary continuously based on weather conditions, locations, etc. IoT devices should be
designed with this keeping in mind.

5. Intelligence
In almost every IoT use case in today’s world, the data is used to make important business
insights and drive important business decisions. We develop machine learning/ deep learning
models on top of this massive data to obtain valuable insights.

6. Energy
Ecosystems demand a lot of energy from end components to connectivity and analytics
layers. While designing an IoT ecosystem, we need to consider design methodology such
that energy consumption is minimal.

7. Safety
One of the main features of the IoT ecosystem is security. Connectivity components pass
sensitive information from endpoints to the analytics layer in the entire flow of an IoT
ecosystem. While designing an IoT system, we must adhere to proper safety, security
measures, and firewalls to keep the data from misuse and manipulation.

iii. Advantages of IoT application:

1. Connectivity

One of the most interesting IoT advantages is to equip objects and devices with sensors and
other technologies that allow them to communicate with one another and with other systems,
this helps to create a network of connected devices.
2. Data collection

One of the greatest advantages of of the Internet of Things is the data collection feature.
Through a good IoT architecture and IoT sensing, people, organizations and startups can
collect interesting data from different tasks, company operations, and human interaction to
display it in a specific system.
3. Automation (great IoT advantage)

One important advantage of IoT is automation. By connecting devices and applications, IoT
allows for automation of tasks and processes, and thus, saving time and reducing the need for
human intervention and increasing efficiency.

4. Monitoring

Another advantage of the Internet of Things is being able to monitor and control different
processes or activities.

5. Safety

IoT security systems can use cameras, sensors, and other technologies to detect intrusions or
suspicious activity inside a building, home, or business.
When a home break in takes place, the IoT devices will alert the homeowners of the event,
and they can call the police immediately.

6.More comfort

People love IoT products because it makes certain tasks easier. People can program their
washing machines to do laundry from their phones while they are at the office. A smart
device like a vacuum cleaner can do its work during the day to maintain the floor clear of
dust. Lights, temperature, air, many aspects of the house can be controlled remotely and with
ease.

7.Healthier habits

The last of the IoT advantages we want to mention is the potential to improve healthcare. IoT
medical devices can be used to monitor and track patients’ health and wellbeing, allowing for
more effective and efficient care.
5. Explain associated technologies with IOT. (Machine to machine protocol, cloud
computing services, IOV, 3G, 4G, 5G technology).
ANS-
Associated technologies with IoT means a variety of tools and platforms that enable the
functioning and expansion of IoT ecosystems. Here's an explanation of some of the key
associated technologies:

1. Machine-to-Machine (M2M) Protocol:


• M2M protocols are communication protocols that enable devices to exchange data and
interact with each other without human intervention. These protocols define standards
for data transmission, message formats, and network connectivity, allowing IoT
devices to communicate seamlessly. Examples of M2M protocols include MQTT
(Message Queuing Telemetry Transport), CoAP (Constrained Application Protocol),
and AMQP (Advanced Message Queuing Protocol).

2. Cloud Computing Services:


• Cloud computing services provide on-demand access to computing resources such as
storage, processing power, and applications over the internet. In the context of IoT,
cloud services play a crucial role in storing, managing, and analyzing the massive
amounts of data generated by IoT devices.
3. Internet of Vehicles (IoV):
• IoV refers to the integration of vehicles with IoT technology to enable connectivity,
communication, and data exchange between vehicles, infrastructure, and other
devices. IoV enables a wide range of applications such as vehicle-to-vehicle (V2V)
communication, vehicle-to-infrastructure (V2I) communication, traffic management,
and autonomous driving. IoV technologies include sensors, telematics systems,
vehicle-to-everything (V2X) communication protocols, and cloud-based platforms for
data analysis and decision-making.
4. 3G, 4G, 5G Technology:
• 3G (Third Generation), 4G (Fourth Generation), and 5G (Fifth Generation) are
mobile communication technologies that provide wireless connectivity for IoT
devices.
• 3G technology introduced high-speed internet access and enabled mobile data
services such as web browsing, email, and multimedia streaming.
• 4G technology further improved data speeds, offering enhanced multimedia
capabilities, low latency, and support for bandwidth-intensive applications like video
conferencing and online gaming.
• 5G technology represents the next evolution in wireless communication, promising
even higher data rates, ultra-low latency, massive device connectivity, and support for
emerging technologies like augmented reality (AR), virtual reality (VR), and the
Internet of Things (IoT).
6. Explain Challenges in IOT.
ANS-

Security:
• Keeping IoT devices safe from hackers is a big concern. Devices connected to the
internet can be attacked if they're not protected properly.
• Security risks come from weak spots in the devices themselves, the systems they use,
and how they talk to each other.
• We need to make sure that IoT devices are secure by using things like passwords,
encryption, and making sure they can't be easily tampered with.
Awareness:
• Many people don't know much about IoT. They might not see why it's important to
connect everyday things like lights or refrigerators to the internet.
• This lack of awareness makes it hard for companies to make and sell IoT products, and
for people to understand their benefits.
• Businesses need to teach people about IoT and show them how it can make their lives
easier.
Interoperability:
• Making different IoT devices work together can be tough because they're made by
different companies and use different ways of talking to each other.
• We need to figure out how to make sure that all these devices can understand each
other and work together smoothly.
Business Model:
• IoT can change how businesses work by making things more automated and creating
new ways of doing business.
• But companies need to figure out how to make money from IoT. This means coming
up with smart plans for how to sell IoT products and services.
Connectivity:
• Getting IoT devices to talk to each other and to the internet is really important. We use
different kinds of technology, like Wi-Fi and Bluetooth, to make this happen.
• Each technology has its own strengths and weaknesses, so we need to pick the right
one for each situation.
Big Data:
• IoT devices create a lot of data, which can be hard to manage. This data needs to be
collected, organized, and analyzed so that it can be useful.
• Companies need experts called data scientists to help them make sense of all this data
and use it to make better decisions.

7. Explain pin configuration/pinout of Raspberry Pi 3, Arduino UNO Rev3, and


NodeMSU ESP8266-E12.
ANS- y/t
UNIT – II: Arduino Uno Rev3
8. What is sensors and actuators? explain following with technical diagram.
i. HC-SR04
ii. HC-SR501
iii. DHT11/22
iv. MQ2
v. SW-420
vi. LM393
vii. LM394
viii. LCD1602
ix. DC-MOTOR
9. WAP to blink LED light and two pole traffic light system with help of Arduino UNO.
(Material requirements, block diagram, code, output).
10. WAP to interfacing sensor (DHT11/DHT22) and actuators (LCD1602) with help of
Arduino UNO.
11. Explain Arduino UNO Rev3 Interrupt pin. And WAP to Interrupt LED bulb blinking.
12. Explain SIM800L GSM Module with working.
13. Calculate resistor of resistance and range with help of colour code system.
14. Draw circuit diagram to switch current (I) and voltage (V) with help of two-way switch.
15. Difference between Arduino UNO R3 and Arduino GIGA R1

UNIT – III: ESP 8266-12E Node MCU


16. Explain Flushing the ESP8266 board with MicroPython. And WAP to blink LED light
with help of ESP8266 board using MicroPython.
17. WAP to interfacing sensor (DHT11/DHT22) and actuators (LCD1602 I2C) with help of
ESP8266 board using MicroPython or C++ Code.
18. Explain Connecting ESP8266 board to WiFi both modes station interface (STA_IF) &
access point (AP_IF) with help of programming using MicroPython or C++ Code.
19. Explain ESP8266 Interrupt pin. And WAP to Interrupt LED bulb blinking.
20. Difference between NodeMCU ESP8266 and ESP32 boards.
21. Explain and WAP to NodeMSU ESP8266 (AP_IF or STA_IF mode) Switching LED light
on/off remotely using HTTP GET/POST method.
22. Explain Voice-based Home Automation for switching lights on/off and draw the block
diagram with respect of following terms
i. Google Assistant V2
ii. IFTTT
iii. MQTT
iv. Blynk Cloud
v. ESP8266
23. Integrated ESP8266 with the Cloud (Thingspeak.com) Service and sent sensor
(DHT11/DHT22) data with help of HTTP API GET/POST method.
UNIT – IV: Raspberry Pi 3 Model B+
24. How is Raspberry Pi different from Arduino?
25. Explain installations step by step of Raspberry Pi OS in RPi3/ RPi4 development board.
26. Explain protocol SSH(PuTTY), RDP(Remote Desktop), VNC(Real VNC) and draw the
block diagram.
27. Raspberry Pi 3 interfacing through Ethernet with PuTTY using SSH protocol and WiFi
with RealVNC using VNC protocol.
28. Explain RPi 3 both GPIO pin mode (BOARD and BCM) and WAP to the blink LED
light with help of Raspberry Pi 3 using MicroPython.

UNIT – V: Raspberry Pi 3 interfacing with Sensor


29. Explain following software installation process in Raspberry Pi OS 32bit with help of
terminal (CLI)
i. Python 3
ii. Python IDLE3
iii. Arduino IDE
iv. Thonny Python IDE
v. Mozila Firefox
30. WAP to interfacing sensor (DHT11/DHT22) and actuators (LCD1602) with help of
Raspberry Pi 3 using MicroPython.
31. Difference between Raspberry Pi 3 and Raspberry Pi 4.
32. WAP to integrated Raspberry Pi 3 with the Cloud (Thingspeak.com) Service and sent
sensor (DHT11/DHT22) data with help of HTTP API method.
33. Explain cloud Architecture based on IoT and its applications, components and cloud
platform.
34. Explain LoRaWAN/LPWAN and its applications and advantages. Describe the Reyax
RYLR896 LoRa Module.
35. Difference between Raspberry Pi OS and Ubuntu OS for RPi. Can Raspberry Pi be used
as a server?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy