KCA 043 - Question Bank
KCA 043 - Question Bank
(Important Questions)
1. What is IoT? What are the different components for IoT devices? Explain
architectural view of IoT.
Ans: Internet of Things (IoT) refers to a network of interconnected physical devices that
can collect and exchange data using embedded sensors, software, and other technologies
over the Internet. These devices, often referred to as "smart devices," can range from home
appliances and wearables to industrial machines and vehicles.
The goal of IoT is to make systems more efficient, intelligent, and responsive by enabling
real-time communication and automation.
The service oriented architecture has architectural view of layers, domain and service
capabilities. The service oriented architecture has four layers namely sensing layer,
network layer, service layer and Interface layer.
1) The bottom most layer / sensing layer : Whose prime responsibility is data
sensing or taking care of the acquisition protocols.
a. Various sensing devices like RFID tags, intelligent sensors, RFID
readers, Bluetooth Low Energy (BLE) devices, wireless sensor
networks etc. constitute the sensing layer.
2) The network layer : Above the sensing layer comprises of wireless sensor
networks, Internet, mobile networks, databases, social networks and wireless
LANs.
a. It is responsible for providing communication and connectivity
between devices in the IoT system.
b. Ensures secure and reliable data transmission.
c. Commonly used in IoT include WiFi, Bluetooth, Zigbee, and cellular
networks such as 4G and 5G technology.
3) The service layer: comprises of business logic, service repository, service
division and service integration.
a. Manages services and devices, handles data processing, storage, and
decision-making.
b. Example: IoT platforms like AWS IoT Core, Google Cloud IoT, or
middleware handling service orchestration.
4) The application layer: Front end, contract, API and interface forms the
topmost layer called the Interface layer.
2. Discuss sensors and actuators are used in IoT network. Also define purposes
in detail.
Ans: Generally, sensors are used in the architecture of IOT devices.
Sensors are used for sensing things and devices etc.
Sensors are used in IoT to serve various functional and operational purposes, which enable
the digital system to understand the physical environment.
Classification of Sensors:
Passive & Active
Analog & digital
Scalar & vector
1. Passive Sensor –
Can not independently sense the input. Ex- Accelerometer, soil moisture, water level
and temperature sensors.
2. Active Sensor –
Independently sense the input. Example- Radar, sounder and laser altimeter sensors.
3. Analog Sensor –
The response or output of the sensor is some continuous function of its input
parameter. Ex- Temperature sensor, LDR, analog pressure sensor and analog hall
effect.
4. Digital sensor –
Response in binary nature. Design to overcome the disadvantages of analog sensors.
Along with the analog sensor, it also comprises extra electronics for bit conversion.
Example – Passive infrared (PIR) sensor and digital temperature sensor(DS1620).
Note : Differentiate between digital and analog sensor exam point of view (2 marks )
5. Scalar sensor –
Detects the input parameter only based on its magnitude. The answer for the sensor
is a function of magnitude of some input parameter. Not affected by the direction of
input parameters.
Example – temperature, gas, strain, color and smoke sensor.
6. Vector sensor –
The response of the sensor depends on the magnitude of the direction and
orientation of input parameter.
Example – Accelerometer, gyroscope, magnetic field and motion detector sensors.
Purpose of Sensors:
Data Collection from Environment
Sensors continuously monitor and collect data such as temperature, humidity,
motion, pressure, etc., which forms the basis for IoT intelligence.
Real-Time Monitoring
Sensors provide instant data updates which help in real-time decision-making.
Example: In a smart home, a smoke sensor instantly detects fire and sends alerts.
Automation Enablement
Sensor data is used to trigger automatic actions through actuators or systems.
Example: Light sensors turning on street lights at dusk.
Predictive Maintenance
By continuously collecting data, sensors help predict failures and optimize
maintenance schedules.
Example: Vibration sensors in manufacturing equipment.
Energy Efficiency
Sensor Type Parameter Measured Example Use Case
Purposes of actuators:
Automation of Tasks
They are used to automate repetitive tasks, reducing the need for human
intervention.
Example: Smart door locks opening when a user is nearby.
Response to Sensor Inputs
Actuators perform actions based on real-time sensor data.
Example: If a soil moisture sensor detects dryness, an actuator opens the irrigation
valve.
Controlling Mechanical Systems
In industrial IoT, actuators control machinery and robotic arms for precise
manufacturing processes.
Enhancing System Efficiency
By quickly reacting to system commands, actuators ensure the system operates
optimally and efficiently.
Safety and Emergency Response
Actuators can be used in safety systems to shut down equipment or open emergency
exits when triggered.
Example: Gas leakage detected → actuator closes the gas valve.
3. Describe the conceptual framework using equation which gives the steps
at various levels or layers in IoT system.
Ans: The following equation describes a simple conceptual framework of IoT:
Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things ………… 1
Equation 1:
It conceptually describes the IoT consists of an internetwork of devices and
physical objects wherein a number of objects can gather the data at remote
locations and communicate to units managing, acquiring, organising and
analysing the data in the processes and services.
A general framework consists of the number of devices communicating data to a
data centre or an enterprise or a cloud server. The IoT framework of IoT used in
number of applications as well as in enterprise and business processes is therefore,
in general, more complex than the one represented by Equation 1.
The equation below conceptually represents the actions and communication of data at
successive levels in IoT consisting of internetworked devices and objects.
Gather + Enrich + Stream + Manage + Acquire + Organise and Analyse = Internet of Things with
connectivity to data centre, enterprise or cloud server……….2
Equation 2:
It is an IoT conceptual framework for the enterprise processes and services, based on a
suggested IoT architecture given by Oracle.
The steps are as as follows:
1. At level 1 data of the devices (things) using sensors or the things gather the pre data
from the internet.
2. A sensor connected to a gateway, functions as a smart sensor (smart sensor refers to a
sensor with computing and communication capacity).
The data then enriches at level 2, for example, by transcoding at the gateway.
Transcoding means coding or decoding before data transfer between two entities.
3. A communication management subsystem sends or receives data streams at level 3.
4. Device management, identity management and access management subsystems
receive the device’s data at level 4.
5. A data store or database acquires the data at level 5.
6. Data routed from the devices and things organizes and analyses at level 6.
For example, data is analyzed for collecting business intelligence in business processes.
The equation below is an alternative conceptual representation for a complex system.
It is based on IBM IoT conceptual framework.
The equation shows the actions and communication of data at successive levels in IoT.
The framework manages the IoT services using data from internetwork of the devices and
objects, internet and cloud services, and represents the flow of data from the IoT devices
for managing the IoT services using the cloud server.
Equation 3:
It represents a complex conceptual framework for IoT using cloud-platform based
processes and services.
The steps are as follows:
1. Levels 1 and level 2 consist of a sensor network to gather and consolidate the data.
First level - gathers the data of the things (devices) using sensors circuits. The sensor
connects to a gateway. Data then consolidates at the second level.
For example, transformation at the gateway at level 2.
2. The gateway at level 2 communicates the data streams between levels 2 and 3. The
system uses a communication-management subsystem at level 3.
3. An information service consists of connect, collect, assemble and manage
subsystems at levels 3 and 4. The services render from level 4.
4. Real time series analysis, data analytics and intelligence subsystems are also at levels 4
and 5. A cloud infrastructure, a data store or database acquires the data at level 5.
4. Express how to organizing and analytics in IoT/M2M. Also differentiate M2M and IoT.
Ans: Organizing refers to how data and devices are structured, managed, and prepared for
analysis.
Steps in Organizing:
Analytics in IoT/M2M:
Analytics involves extracting insights from the collected data to enable automation,
prediction, and decision-making.
For example, temperature readings from sensors are more valuable when paired with
the exact time and location of the measurement.
Integration with External Data
Combining IoT data with external data sources, such as weather data, traffic
information, or social media feeds,
For instance, aggregating energy usage data from multiple smart meters
For example, predictive maintenance algorithms can analyze data from machinery
sensors to predict when maintenance is needed.
Adding Metadata
Enhancing raw data with metadata, which provides additional details about the data,
such as the source, format, or quality.
Data consolidation:
Data integration is the process of combining data from multiple sources into a
unified database.
This process is essential for achieving a comprehensive view of the data, improving
data quality, and enabling more effective analysis.
collected from various IoT devices, sensors, and systems into a centralized database
or data warehouse
Key aspects of data consolidation
Data Aggregation
Gathering data from different IoT devices and sources, such as sensors, machines,
and external databases, and combining it into a single dataset.
This step ensures that all relevant data is available in one place for analysis.
Data Cleaning
Identifying and correcting errors, inconsistencies, and duplicates in the collected
data.
Data cleaning is crucial to ensure that the consolidated dataset is accurate, reliable,
and ready for analysis.
Data Transformation
Converting data from different formats and structures into a standardized format.
This step ensures that data from various sources can be easily integrated and
compared within the unified dataset.
Data Integration
Merging data from different sources while preserving its integrity and consistency.
This repository provides a single source of truth for the data, making it easier to
access, manage, and analyze
These tools should simplify the process of creating IoT applications, enabling
designers to easily prototype, iterate, and refine their ideas.
Modular and Reusable Components
Designing IoT solutions becomes easier when designers can leverage modular and
reusable components.
This allows them to quickly assemble and integrate various hardware
and software modules to create custom IoT devices and applications without
starting from scratch.
Prototyping and Simulation
Ease of designing IoT solutions is enhanced through tools that support rapid
prototyping and simulation.
Designers can create virtual prototypes of IoT devices and systems, simulate their
behavior in different scenarios.
Visualization and Interface Design
Visualization tools and interface design frameworks play a crucial role in IoT
design.
Designers should have access to tools that allow them to create intuitive user
interfaces and visualize data from IoT devices in a clear and actionable manner,
enhancing the overall user experience.
Collaboration and Integration
Collaboration tools and integration capabilities facilitate teamwork among
designers, developers, engineers, and stakeholders involved in IoT projects.
Designers should be able to seamlessly collaborate, share ideas, and integrate their
work with other team members' contributions to ensure cohesion and alignment
throughout the design process.
Documentation and Support
Comprehensive documentation and support resources are essential for designers
working on IoT projects.
Access to tutorials, guidelines, reference materials, and community forums can help
designers navigate challenges
In Internet of Things (IoT), affordability refers to the cost-effectiveness of IoT
solutions, devices, and infrastructure.
Affordability :
In Internet of Things (IoT), affordability refers to the cost-effectiveness of IoT
solutions, devices, and infrastructure.
Cost-Effective Solutions
IoT solutions should be designed and developed with a focus on minimizing costs
without compromising quality, performance, or security.
UNIT-2
(Important Questions)
1. Explain the concept and terminology of RFID technology. Illustrate the working of RFID
communication. Write its IoT application areas in detail?
Ans: Concept of RFID:
RFID (Radio Frequency Identification) is a wireless communication technology.
• It uses radio waves to automatically identify tagged objects or things.
• It transmits data from an RFID tag to an RFID reader using an antenna, enabling
accurate
and real-time tracking.
• RFID technology is capable of storing, recovering, and re-recording a vast
amount of data
(up to four million characters and thousands of bytes) on a small chip
• RFID technology is widely used in several commercial and industrial applications
to search,
identify, track, and communicate with various objects, people, items, or things.
• It automates the collection of data and reduces human effort and error.
Terminology in RFID Technology
Term Description
A small device attached to the object to be tracked. Contains a microchip
RFID Tag
and an antenna.
RFID Reader A device that emits radio waves and captures responses from RFID tags.
Antenna Sends and receives radio signals between the reader and the tag.
EPC (Electronic Product
A unique identifier stored on the tag.
Code)
Frequency Bands RFID works in LF (125–134 kHz), HF (13.56 MHz), and UHF (860–960 MHz).
Working of RFID communication:-
step-by-Step Communication Process:
1. Initiation:
The RFID reader emits radio frequency signals through its antenna.
2. Tag Activation:
When an RFID tag enters the range of the reader, it gets powered (in passive tags)
and becomes active.
3. Data Transmission:
The tag sends its stored data (like ID or product info) back to the reader via radio
waves.
4. Data Processing:
The reader forwards this data to a backend system for processing, storage, or
decision-making.
Sensing unit
Microcontroller
Communication module (transceiver)
Power source (battery or energy harvesting
Star Topology
Tree Topology
Mesh Topology
Ans: The Internet of Things (IoT) and Wireless Sensor Networks (WSN) are two
closely related technologies, but they serve different purposes and have distinct
characteristics.
Wireless Sensor Networks (WSN)
A Wireless Sensor Network (WSN) is a collection of autonomous devices that create an
ad hoc network to gather information from the physical environment.
These devices, or nodes, are typically low-powered and communicate using specific
protocols.
WSNs are used to collect data from various sources and send it to a central server or
gateway for processing.
Examples of WSN applications include monitoring environmental conditions,
infrastructure management, and healthcare.
Key Features of WSN:
o Architecture: WSNs consist of multiple sensor nodes that can be arranged in
o different topologies, such as star or hub topology. These nodes collect data and
send it to a central hub or server.
o Devices: The nodes in a WSN are small, mobile, and often battery-powered. They
use energy harvesting as their primary power source.
o Protocols: WSNs use various routing protocols, including DSR, AODV, OLSR,
and ZRP
The Internet of Things (IoT) is a network of connected devices that can communicate with each
other and the internet. IoT devices can range from smartphones and home appliances to industrial
machines and wearables. The primary goal of IoT is to connect the physical world to the internet,
enabling real-time data collection, analysis, and control1.
2. Compare the features of of Intel Galileo, Raspberry and BeagleBone boards for the IoT
applications.
Raspberry Pi is most popular due to its powerful processor, rich OS support, and large
community. It is ideal for DIY IoT, home automation, edge computing, and multimedia
IoT applications.
BeagleBone Black offers more GPIO pins and real-time control features, making it ideal
for robotics, industrial control, and low-level sensor interfacing.
3. Why we use Arduino? Discuss the different Arduino Board with their features.
Determine some differences between Arduino and Raspberry Pi.
Ans : we use an Arduino board because it provides a simple and accessible way to build
and program electronic projects. Here are the main reasons why Arduino is popular:
Arduino Nano
Microcontroller: ATmega328P
Operating Voltage: 5V
Digital I/O Pins: 22 (6 PWM)
Analog Input Pins: 8
Flash Memory: 32 KB
Features:
1. Sensing Devices:
o Typically smartphones or wearable sensors.
o Equipped with GPS, camera, microphone, accelerometer, etc.
o Used to sense environmental data (e.g., noise, temperature,
pollution).
2. Users (Participants):
o Individuals who voluntarily collect and share data.
o May be incentivized or motivated by personal, social, or civic
reasons.
3. Data Collection Applications:
o Mobile apps or platforms used to gather and submit data.
o Example: apps for reporting potholes, air quality, or traffic
congestion.
4. Communication Network:
o Data is transmitted via mobile networks, Wi-Fi, or the Internet.
o Ensures real-time or batch uploading of collected information.
5. Data Aggregation and Processing System:
o Back-end servers or cloud infrastructure to collect and process
data.
o Uses algorithms to clean, analyze, and visualize data.
6. Data Consumers:
o Government agencies, researchers, NGOs, or the general public.
o Use the data for decision-making, urban planning, or awareness.
UNIT-3
(Important Questions)
5. Examine the different issues faced during wireless medium access in IoT.
Time-varying channel :
Time-varying channels include the three mechanisms for radio signal propagations they
are Reflection, Diffraction, and Scattering.
Reflection –This occurs when a propagating wave carrying information intrudes on an
object that has very large dimensions than the wavelength of the wave.
Diffraction –This occurs when the radio path between the transmitter and the receiver
is collided by the surface with sharp edges. This is a phenomenon which causes the
diffraction of the wave from the targeted position.
Scattering –This occurs when the medium through from the wave is traveling consists
of some objects which have dimensions smaller than the wavelength of the wave.
6. Describe in detail with suitable example CoAP and MQTT protocols used in application
layer.
Ans: The application layer in IoT architecture enables devices to communicate, interpret,
and process data in a way that applications and users can understand. Two widely used
lightweight protocols at this layer are:
Characterstics of MQTT:
1. Flat-based Routing: All nodes have equal roles (e.g., SPIN, Directed Diffusion).
2. Hierarchical Routing: Nodes are organized into clusters (e.g., LEACH, TEEN).
3. Location-based Routing: Uses geographic location of nodes (e.g., GPSR).
4. IPv6-based Routing Protocols: Specifically for IoT and IP-enabled WSNs (e.g., RPL).
What is RPL?
Definition: RPL (Routing Protocol for Low-power and Lossy Networks) is a distance-
vector routing protocol standardized by the IETF (RFC 6550), designed specifically for
LLNs (Low-power and Lossy Networks) such as IoT and WSN environments.
It is a Distance Vector Routing Protocol that creates a tree-like routing topology called
the Destination Oriented Directed Acyclic Graph (DODAG), rooted towards one or more
nodes called the root node or sink node.
In an RPL Network, each node acts as a router and becomes part of a mesh network.
Routing is performed at the IP Layer. Each node examines every received IPv6 packet
and determines the next-hop destination based on the information contained in the IPv6
header.
No information from the MAC layer header is needed to perform the next determination .
Scalability: The protocol can accommodate such type of big networks with low power
and lossy connectivity, which makes it appropriate for a range of Internet of Things
applications.
Multipoint-to-point traffic generation: RPL offers a way to send data to a single
destination point from several devices within the LLN as per requirement.
Quality of Service (QoS) – The protocol guarantees QoS by offering various types of
methods for reliable packet delivery system and congestion control systetm.
Adaptive – RPL modifies the required routes in response to link quality and energy
availability changes in the network environment or system.
Security system: To guarantee various types of secure communication within the LLN
as per requirement, RPL incorporates techniques for integrity protection,
authentication, confidentiality, and encryption for better performance
8. What do you mean by sensor node deployment? Discuss various sensor node
deployment techniques/models/ approaches.
Ans: Sensor deployment and node discovery are two important aspects of building an IoT
system.Deployment is concerned about the set-up process of an operational sensor
network in the real world .Deployment is cumbersome and labor-intensive as bugs may
be triggered or the performance is degraded that was not observed at the time pre-
deployment.
• Here are some approaches to sensor deployment and node discovery in IoT.
Manual Deployment:
In this approach, the sensors are deployed manually by technicians or field engineers.
This involves physically installing the sensors in the desired location and configuring
them to communicate with the network.
Node discovery is also performed manually by scanning the network for new devices
and adding them to the network
Automated Deployment:
In this approach, sensors are deployed automatically using robots or drones.
The sensors are pre-configured with the network settings and are dropped off in the
desired location by the robot or drone.
Node discovery is also automated, with the sensors automatically joining the network
once they are within range.
Deterministic Deployment
Advantages:
High coverage efficiency.
Predictable network performance.
Disadvantages:
Random Deployment
Definition: Nodes are deployed randomly, often dropped from aircraft or drones.
Environment: Inaccessible, dangerous, or large-scale areas (e.g., forests, disaster
zones).
Method: No prior knowledge of terrain; nodes self-organize post-deployment.
Advantages:
Quick and easy deployment.
Suitable for emergency or military scenarios.
Disadvantages:
Possible coverage gaps or node clustering.
May require additional algorithms to reorganize the network.
Data Aggregation
Definition: Data aggregation is the process of gathering and combining data from
multiple sensor nodes to eliminate redundancy, reduce the number of transmissions,
and save energy. It is commonly used in WSNs where sensors collect similar data from
nearby environments.
Purpose:
How it works: Sensor nodes collect raw data (e.g., temperature, humidity, motion) and
forward it to a data aggregator node (e.g., a cluster head or intermediate node). The
aggregator processes the data using techniques like averaging, summing, or selecting
minimum/maximum values, and sends the summarized data to the base station.
Data Dissemination
Purpose:
Data gathering refers to the collection of sensor data from various IoT devices, typically
forwarded to a central node (e.g., gateway or cloud).
1. Data Aggregation
2. Clustering
Network is divided into clusters with a Cluster Head (CH) responsible for collecting
and aggregating data from nodes in its cluster.
Improves scalability and reduces transmission load.
Example: CH gathers data locally and sends it to the cloud.
Protocols: LEACH, HEED
3. Data Compression
Raw data is compressed before transmission using algorithms like Huffman coding
or run-length encoding.
Reduces packet size and saves energy.
Tools: TinyOS, Contiki OS support compression mechanisms.
Data is only collected and transmitted when a specific event occurs, such as
motion detection or threshold breach.
Efficient for power-constrained systems.
Example: A security sensor sends data only when motion is detected.
A mobile sink (e.g., drone or robot) moves through the network to gather data
from sensor nodes.
Reduces energy depletion near fixed sinks and balances network load.
Techniques for Data Dissemination
1. Flooding
Simple method where each node broadcasts the message to all neighbors.
Easy to implement but can cause redundancy and network congestion (broadcast
storm).
2. Interest-Based Dissemination
Only nodes that express interest in specific data will receive it.
Reduces unnecessary transmission.
3. Publish/Subscribe Mechanism
4. Multicast/Broadcast
5. Location-Based Dissemination
6. Time-Based Dissemination
• Designers also need to solve the design time problem and bring the embedded device
at the right time to the market.
Security of the system
• Systems have to be designed and implemented to be robust and reliable and have to
be secure with cryptographic algorithms and security procedures.
• It involves different approaches to secure all the components of embedded systems
from prototype to deployment.