May Jun 2024
May Jun 2024
8
23
PB3781 [Total No. of Pages : 2
ic-
[6262]-39
tat
T.E. (Computer Engineering)
1s
INTERNET OF THINGS & EMBEDDED SYSTEMS
9:5
(2019 Pattern) (Semester-I) (310245 A) (Elective- I)
02 91
9:4
Time : 2½ Hours] [Max. Marks : 70
0
40
8/0 13
Instructions to the candidates:
1) Answer Q.1 or Q.2, Q.3 or Q.4, Q.5 or Q.6 and Q.7 or Q.8.
0
2) Draw neat & labelled diagrams if necessary.
5/2
.23 GP
8
C
23
ic-
Q1) a) Discuss the various steps in IoT design methodology? [6]
16
tat
b) Demonstrate the use of RFID with the help of suitable IoT application.
8.2
1s
[6]
.24
9:5
91
49
OR
01
02
Q2) a) Describe device and component integration for IoT based home
5/2
GP
8
23
diagram with suitable application. [6]
.23
tat
8.2
1s
.24
9:5
91
9:4
30
OR
8/0
CE
c) Examine that why ZigBee is popular than Wi-Fi and Bluetooth in IoT.
8.2
[6]
.24
P.T.O.
49
Q5) a) Define software define networking & Explain architecture of SDN. [6]
8
23
b) Write a short note on cloud standardization. [6]
ic-
c) Describe the IoT messaging mechanisms called WAMP (Auto Bahn for
tat
IoT). [6]
1s
OR
9:5
02 91
Q6) a) Define Cloud of Things & What is cloud communication API? [6]
9:4
0
40
b) Explain the Python Web application framework Django. [6]
8/0 13
c) Explain the different cloud-based services offered by Amazon for IoT.
0
5/2
[6]
.23 GP
E
82
8
Q7) a) Write a short note on Light weight cryptography. [6]
C
23
ic-
b) What is Activity Modelling of Threats? & Explain access control issue
16
tat
8.2
1s
c) What are the different vulnerabilities of IoT and how to handle? [5]
.24
9:5
OR
91
49
9:4
Q8) a) Examine how threat model is useful in securing IoT applications. [6]
30
40
b) List out security requirements for IoT base systems. & Discuss some
01
02
8
23
.23
ic-
16
tat
8.2
1s
.24
9:5
91
49
9:4
30
40
01
02
5/2
GP
8/0
CE
82
.23
16
8.2
.24
49
[6262]-39 2