0% found this document useful (0 votes)
9 views16 pages

Iot Pyq 2023

The document discusses various aspects of Internet of Things (IoT) technologies, focusing on protocols such as MQTT and BLE, as well as Zigbee technology. It outlines the advantages and disadvantages of these protocols, their architectures, and applications in real-world scenarios. Additionally, it covers the master-slave configuration in computing and provides a brief overview of the components of IoT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views16 pages

Iot Pyq 2023

The document discusses various aspects of Internet of Things (IoT) technologies, focusing on protocols such as MQTT and BLE, as well as Zigbee technology. It outlines the advantages and disadvantages of these protocols, their architectures, and applications in real-world scenarios. Additionally, it covers the master-slave configuration in computing and provides a brief overview of the components of IoT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

h ps://t.

me/wbdetc
INTERNET OF THINGS _BROAD QUESTIONS & ANSWER (2023)

2. A) Draw and explain MQTT publish - subscribe pa ern. 4


MQTT publish-subscribe model explained :
All in all, the concept of the MQTT publish-subscribe pa ern or simply MQTT pub-sub includes three types of
par es:
 publisher – a client (device) that posts informa on on a self-chosen topic.
 MQTT broker – a party that receives packets from publishers, checks for se ngs, and then forwards
them to subscribers.
 subscriber – a client (device) that is interested in the informa on on a certain topic.
At first glance, everything looks clear since one client publishes, and the other client receives. However, the
publisher does not send informa on directly to the subscriber.
B) What are advantages and disadvantages in MQTT? 4
Benefits or advantages of MQTT protocol :
Following are the benefits or advantages of MQTT protocol:
➨The MQTT protocol payload can carry any type of data such as binary, ascii text etc. The receiver need to
interpret and decode as per format used by the transmi er. Hence MQTT is packet agnos c.
➨It uses packet of low size and hence can be used for low bandwidth applica ons.
➨It offers lower ba ery power consump on.
➨It is reliable protocol as it uses QoS op ons to provide guaranteed delivery.
➨Due to its publish/subscribe model, It is scalable.
➨It offers de-coupled design as it is easy to decouple the device and server.
➨A publishing device can send data to server at any me regardless of its state.
Drawbacks or disadvantages of MQTT protocol :

➨MQTT uses TCP protocol which requires more processing power and more memory. TCP uses handshake
protocol which requires frequent wake up and communica on me intervals. This affects ba ery
consump on. Moreover TCP connected devices tend to keep sockets open for each other which adds
memory/power requirements.
➨Centralized broker limits the scalability as each client devices take up some overhead. In order to avail
scalability, local broker hub is used.
➨Centralized broker can be point of failure as client connec ons with broker are open all the me.
➨It is not easy to implement compare to HTTP.
➨It does not support advanced features such as flow control.
➨In MQTT protocol, clients must have to support TCP/IP.

2. A) Draw and discuss BLE protocol task. 5


What is the BLE :
Bluetooth Low Energy (Bluetooth LE,
colloquially BLE, formerly marketed as
Bluetooth Smart) is a wireless personal area
network technology designed and marketed
by the Bluetooth Special Interest Group
(Bluetooth SIG) aimed at novel applica ons
in the healthcare, fitness, beacons, security,
and home entertainment .
Let us understand func ons of different layers of this BLE protocol stack.
• Physical Layer :
• The transmi er uses GFSK modula on and operates at unlicensed 2.4 GHz frequency band.
• Using this PHY layer, BLE offers data rates of 1 Mbps (Bluetooth v4.2)/2 Mbps (Bluetooth v5.0).
• It uses frequency hopping transceiver.
• Two modula on schemes are specified to deliver 1 Msym/s and 2 Msym/s.
• Two PHY layer variants are specified viz. uncoded and coded.
• A Time Division Duplex (TDD) topology is employed in both of the PHY modes.

• Link Layer : This layer sits above the Physical layer. It is responsible for adver sing, scanning, and
crea ng/maintaining connec ons. The role of BLE devices changes in peer to peer (i.e. Unicast) or broadcast
modes. The common roles are Adver ser/Scanner (Ini ator),
Slave/Master or Broadcaster/Observer. Link layer states are
defined in the figure below. 
The device will be in any one of these states which include
Standby state, Adver sing state, Scanning state, Ini a ng
state, Connec on State and Synchroniza on state.

• HCI : It provides communica on between controller and


host through standard interface types. This HCI layer can be
implemented either using API or by interfaces such as
UART/SPI/USB. Standard HCI commands and events are
defined in the bluetooth specifica ons.

• L2CAP :This layer offers data encapsula on services to upper layers. This allows logical end to end data
communica on.

• SMP :This security Manager layer provides methods for device pairing and key distribu ons. It offers services
to other protocol stack layers in order to securely connect and exchange data between BLE devices.
GAP : This layer directly interfaces with applica on layer and/or profiles on it. It handles device discovery and
connec on related services for BLE device. It also takes care of ini a on of security features.

• GATT : This layer is service framework which specifies sub-procedures to use ATT. Data communica ons
between two BLE devices are handled through these sub-procedures. The applica ons and/or profiles will use
GATT directly.

• ATT : This layer allows BLE device to expose certain pieces of data or a ributes.

•Applica on Layer :
• The BLE protocol stack layers interact with applica ons and profiles as desired. Applica on interoperability in
the Bluetooth system is accomplished by Bluetooth profiles.
• The profile defines the ver cal interac ons between the layers as well as the peer-to-peer interac ons of
specific layers between devices.
• A profile composed of one or more services to address par cular use case. A service consists of
characteris cs or references to other services.
• Any profiles/applica ons run on top of GAP/GATT layers of BLE protocol stack. It handles device discovery
and connec on related services for the BLE device.
References:-

➤BLUETOOTH CORE SPECIFICATION Version 5.1

B) Discuss master - slave configura on ? 3


Master-Slave Architecture stands as a fundamental design principle. It revolu onizes system coordina on by
delega ng tasks among central and subordinate units. From database management to content delivery
networks, Master-Slave Architecture shapes modern compu ng. In this ar cle, we will explore its key
components, data flow mechanisms, and real-world applica ons.
What is Master-Slave Architecture?
Master-Slave Architecture is a design in compu ng where one central unit, called the master, controls and
directs the opera on of mul ple subordinate units, known as slaves. In this setup, the master node governs
and delegates tasks to the slave nodes, which execute the assigned tasks and report back to the master. This
architecture is commonly used in distributed systems to manage resources efficiently and streamline data
processing.
 In Master-Slave Architecture, the master node serves as the central coordinator, overseeing the overall
opera on of the system.
 Slave nodes, on the other hand, carry out specific tasks assigned by the master, such as data
processing, computa on, or storage.
 Communica on between the master and slave nodes is typically uni-direc onal, with the master
issuing commands and the slaves execu ng them.
 This architecture enables parallel processing and load balancing, as tasks can be distributed across
mul ple slave nodes, thereby improving system performance and scalability.
In Master-Slave Architecture, the primary components are :
 Master Node: Master node is the central unit in the architecture responsible for coordina ng and
managing the overall opera on of the system. It receives requests, delegates tasks to slave nodes, and
collects results.
 Slave Node(s): Slave nodes are the subordinate units that execute tasks assigned by the master node.
They perform computa ons, process data, or handle specific func ons as instructed.
 Communica on Protocol: It is a set of rules and conven ons governing the exchange of informa on
between the master and slave nodes. It ensures reliable and efficient communica on, enabling
seamless coordina on within the architecture.
 Task Distribu on Mechanism: This mechanism facilitates the alloca on of tasks from the master to the
slave nodes, ensuring efficient u liza on of resources.
 Feedback Mechanism: It enables slave nodes to report task execu on status and results back to the
master, ensuring synchroniza on and error handling.
Real-World Examples of Master-Slave Architecture
Real-World Examples of Master-Slave Architecture demonstrate its versa lity and applicability across
various industries and domains.
 Database Management: Systems like MySQL employ master-slave replica on for data redundancy and
scalability.
 Content Delivery Networks (CDNs): CDNs u lize master-slave setups to efficiently distribute content
across geographically dispersed servers.
 Parallel Processing: High-performance compu ng clusters use master-slave architecture to divide
computa onal tasks among mul ple nodes.
 Network Infrastructure: Networking devices like routers and switches implement master-slave
configura ons for efficient traffic rou ng and management.
 Distributed Compu ng: Pla orms such as Apache Hadoop leverage master-slave architecture for
processing vast amounts of data across mul ple nodes.

3. A) What is the main difference between a tuple and a list in Python? 3


B) Write a program in python to generate and store in a list 20 random numbers in the
range 10 to 100. 5
 import random
 def generate_random_numbers():
 random_numbers = []
 for _ in range(20):
 random_numbers.append(random.randint(10, 100))
 return random_numbers
 # Call the func on to get your list of random numbers
 my_random_list = generate_random_numbers()
 # Print the list (op onal)
 print("Random numbers in the range 10 to 100:")
 print(my_random_list)

4. A) Draw and discuss Zigbee topology.


B) Write the advantages of Zigbee technology.
C) Write some applica on of Zigbee technology 4+2+2
What is meant by ZigBee :
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless
machine-to-machine (M2M) and internet of things (IoT) networks. Zigbee is for low-data rate, low-
power applica ons and is an open standard.
General Characteris cs of Zigbee Standard:
 Low Power Consump on
 Low Data Rate (20- 250 kbps)
 Short-Range (75-100 meters)
 Network Join Time (~ 30 msec)
 Support Small and Large Networks (up to 65000 devices
(Theory); 240 devices (Prac cally))
 Low Cost of Products and Cheap Implementa on (Open Source
Protocol)
 Extremely low-duty cycle.
Types of ZigBee Devices:
 Zigbee Coordinator Device: It communicates with routers. This device is used for connec ng the
devices.
 Zigbee Router: It is used for passing the data between devices.
 Zigbee End Device: It is the device that
is going to be controlled.
Opera ng Frequency Bands (Only one channel will be selected for use in a network):
1. Channel 0: 868 MHz (Europe)
2. Channel 1-10: 915 MHz (the US and Australia)
3. Channel 11-26: 2.4 GHz (Across the World)
Features of Zigbee:
1. Stochas c addressing: A device is assigned a random address and announced. Mechanism for address
conflict resolu on. Parents node don’t need to maintain assigned address table.
2. Link Management: Each node maintains quality of links to neighbors. Link quality is used as link cost in
rou ng.
3. Frequency Agility: Nodes experience interference report to channel manager, which then selects
another channel
4. Asymmetric Link: Each node has different transmit power and sensi vity. Paths may be asymmetric.
5. Power Management: Routers and Coordinators use main power. End Devices use ba eries.

B ) Advantages of Zigbee:
1. Designed for low power consump on.
2. Provides network security and applica on support services opera ng on the top of IEEE.
3. Zigbee makes possible completely networks homes where all devices are able to communicate and be
4. Use in smart home
5. Easy implementa on
6. Adequate security features.
7. Low cost: Zigbee chips and modules are rela vely inexpensive, which makes it a cost-effec ve solu on
for IoT applica ons.
8. Mesh networking: Zigbee uses a mesh network topology, which allows for devices to communicate
with each other without the need for a central hub or router. This makes it ideal for use in smart home
applica ons where devices need to communicate with each other and with a central control hub.
9. Reliability: Zigbee protocol is designed to be highly reliable, with robust mechanisms in place to ensure
that data is delivered reliably even in adverse condi ons.

C) Disadvantages of Zigbee :
1. Limited range: Zigbee has a rela vely short range compared to other wireless communica ons
protocols, which can make it less suitable for certain types of applica ons or for use in large buildings.
2. Limited data rate: Zigbee is designed for low-data-rate applica ons, which can make it less suitable for
applica ons that require high-speed data transfer.
3. Interoperability: Zigbee is not as widely adopted as other IoT protocols, which can make it difficult to
find devices that are compa ble with each other.
4. Security: Zigbee’s security features are not as robust as other IoT protocols, making it more vulnerable
to hacking and other security threats.
Zigbee Network Topologies:
 Star Topology (ZigBee Smart Energy): Consists of a coordinator and several end devices, end devices
communicate only with the coordinator.
 Mesh Topology (Self Healing Process): Mesh topology consists of one coordinator, several routers, and
end devices.
 Tree Topology: In this topology, the network consists of a central node which is a coordinator, several
routers, and end devices. the func on of the router is to extend the network coverage.
Architecture of Zigbee:
Zigbee architecture is a combina on of 6 layers.
1. Applica on Layer
2. Applica on Interface Layer
3. Security Layer
4. Network Layer
5. Medium Access Control Layer
6. Physical Layer

 Physical layer: The lowest two layers i.e the physical and the MAC (Medium Access Control) Layer are
defined by the IEEE 802.15.4 specifica ons. The Physical layer is closest to the hardware and directly
controls and communicates with the Zigbee radio. The physical layer translates the data packets in the
over-the-air bits for transmission and vice-versa during the recep on.
 Medium Access Control layer (MAC layer): The layer is responsible for the interface between the
physical and network layer. The MAC layer is also responsible for providing PAN ID and also network
discovery through beacon requests.
 Network layer: This layer acts as an interface between the MAC layer and the applica on layer. It is
responsible for mesh networking.
 Applica on layer: The applica on layer in the Zigbee stack is the highest protocol layer and it consists
of the applica on support sub-layer and Zigbee device object. It contains manufacturer-defined
applica ons.
6. A) What are the different component of IoT? 4
Internet of Things (IoT) is an ecosystem of connected physical objects that are accessible through the
Internet (formal defini on). So, in simple terms IOT means anything that can be connected to internet
and can be controlled / monitored using Internet from our smart devices or PCs.
These are explained as following below.
Major Components of IOT :

1. Things or Device
These are fi ed with sensors and actuators. Sensors collect data from the environment and give to
gateway where as actuators performs the ac on (as directed a er processing of data).

2. Gateway
The sensors give data to Gateway and here some kind of pre-processing of data is even done. It also
acts as a level of security for the network and for the transmi ed data.

3. Cloud
The data a er being collected is uploaded to cloud. Cloud in simple terms is basically a set of servers
connected to internet 24*7.

4. Analy cs
The data a er being received in the cloud processing is done . Various algorithms are applied here for
proper analysis of data (techniques like Machine Learning etc are even applied).

5. User Interface
User end applica on where user can monitor or control the data.

B) Discuss different sensors in IoT system. 4

There are many different types of sensors used in the Internet of Things (IoT) system, including:
 Temperature sensors: Measure the heat generated by an object or area, and are used in smart homes,
agriculture, and industrial processes
 Proximity sensors: Detect the presence of an object or person without physical contact
 Pressure sensors: Detect changes in a gas or liquid, and are used in leak tes ng and water system
manufacturing
 Water quality sensors: Monitor the quality of water
 Chemical and gas sensors: Monitor air quality for hazardous or toxic gases
 Infrared sensors: Detect or emit infrared radia on to sense changes in the surrounding area
 Smoke sensors: Detect smoke, and are commonly used in homes and businesses
 Mo on sensors: Detect physical movement in an area
 Level sensors: Detect the level of various substances, such as liquids, granular material, and powder
 Image sensors: Convert op cal images into signals, and are generally used to store or display files
electronically
 Humidity sensors: Measure the moisture content in the air, and are used in greenhouses, HVAC
systems, and weather monitoring
 Electro-op cal sensors: Use visible and infrared light detec on to measure a ributes like size, shape,
and color, and take pictures

7. A) What is Raspberry pi? Name of the different components in raspberry pi board. 2+2

 Raspberry Pi is a small single-board computer (SBC). It is a credit card-sized computer that can
be plugged into a monitor. It acts as a minicomputer by connec ng the keyboard, mouse, and
display. Raspberry Pi has an
ARM processor and 512MB
of RAM.

 The following diagram


shows the architecture of
Raspberry Pi: ->

 Raspberry Pi mainly consists of the following blocks:


 Processor: Raspberry Pi uses Broadcom BCM2835 system on chip which is an ARM processor and Video
core Graphics Processing Unit (GPU). It is the heart of the Raspberry Pi which controls the opera ons of
all the connected devices and handles all the required computa ons.
 HDMI: High Defini on Mul media
Interface is used for transmi ng video or
digital audio data to a computer monitor
or to digital TV. This HDMI port helps
Raspberry Pi to connect its signals to any
digital device such as a monitor digital TV
or display through an HDMI cable.
 GPIO ports: General Purpose Input Output
ports are available on Raspberry Pi which
allows the user to interface various I/P
devices.
 Audio output: An audio connector is
available for connec ng audio output devices such as headphones and speakers.
 USB ports: This is a common port available for various peripherals such as a mouse, keyboard, or any
other I/P device. With the help of a USB port, the system can be expanded by connec ng more
peripherals.
 SD card: The SD card slot is available on Raspberry Pi. An SD card with an opera ng system installed is
required for boo ng the device.
 Ethernet: The ethernet connector allows access to the wired network, it is available only on the model
B of Raspberry Pi.
 Power supply: A micro USB power connector is available onto which a 5V power supply can be
connected.
 Camera module: Camera Serial Interface (CSI) connects the Broadcom processor to the Pi camera.
 Display: Display Serial Interface (DSI) is used for connec ng LCD to Raspberry Pi using 15 15-pin ribbon
cables. DSI provides a high-resolu on display interface that is specifically used for sending video data.

B) What is the func on of GPIO pin? What is DSI? 2+2

 A GPIO pin designated as an output pin can be set to high (3.3V) or low (0V). Components are usually
a ached so that se ng the output to high will allow current to flow to them, while se ng the output to
low won't. A GPIO pin that is designated as an input will allow a signal to be received by the Raspberry Pi.

 DSI stands for Display Serial Interface, a high-speed serial interface between a host processor and a display
module. It's also known as MIPI DSI, which stands for mobile industry processor interface display serial
interface.

8. Draw and discuss func on five layers architecture model of IoT. 8


Internet of Things (IoT) is the networking of physical objects that contain electronics embedded within their
architecture to communicate and sense interac ons amongst each other or to the external environment.
Internet of Things (IoT) technology has a wide range of applica ons and the use of the Internet of Things is
growing so faster. In this ar cle, we are going to discuss the 5 Layer architecture of the Internet of Things.
5 Layer Architecture of IoT :
1. Percep on Layer
This is the first layer of IoT architecture. In the
percep on layer, a number of sensors and actuators
are used to gather useful informa on like
temperature, moisture content, intruder detec on,
sounds, etc. The main func on of this layer is to get
informa on from surroundings and to pass data to
another layer so that some ac ons can be done
based on that informa on.
2. Network Layer
As the name suggests, it is the connec ng layer
between percep on and middleware layer. It gets
data from percep on layer and passes data to middleware layer using networking technologies like 3G,
4G, UTMS, Wifi, infrared, etc. This is also called communica on layer because it is responsible for
communica on between percep on and middleware layer. All the transfer of data done securely keeping the
obtained data confiden al.
3. Middleware Layer
Middleware Layer has some advanced features like storage, computa on, processing, ac on taking
capabili es. It stores all data-set and based on the device address and name it gives appropriate data to that
device. It can also take decisions based on calcula ons done on data-set obtained from sensors.
4. Applica on Layer
The applica on layer manages all applica on process based on informa on obtained from middleware layer.
This applica on involves sending emails, ac va ng alarm, security system, turn on or off a device, smartwatch,
smart agriculture, etc.
5. Business Layer
The success of any device does not depend only on technologies used in it but also how it is being delivered to
its consumers. Business layer does these tasks for the device. It involves making flowcharts, graphs, analysis of
results, and how device can be improved, etc.

Advantages of IoT
 Execute mul ple tasks at a me like a computer.
 Easiest internet connec vity
 Works on GUI (Graphical User Interface) mode because of HDMI port.
 More reliable for so ware applica ons.
Disadvantages of IoT
 Security concerns and poten al for hacking or data breaches.
 Privacy issues related to the collec on and use of personal data.
 Dependence on technology and poten al for system failures.
 Limited standardiza on and interoperability among devices.

9. A) What is the embedded system? 3+5


An embedded system is a combina on of computer hardware and so ware designed for a specific
func on. Embedded systems might also func on within a larger system. These systems can be
programmable or have a fixed func onality.
Characteris cs of embedded systems
The main characteris c of embedded systems is that they're task-specific. They o en include the following
addi onal characteris cs:
 They typically consist of hardware, so ware and firmware.
 They can be embedded in a larger system to perform a specific func on, as they're built for specialized
tasks within the system, not various tasks.
 They can be either microprocessor-based or microcontroller-based -- both are integrated circuits that
give the system compute power.
 They're o en used for sensing and real- me compu ng in internet of things (IoT) devices, which are
devices that are internet-connected and don't require a user to operate.
 They can vary in complexity and func on, which affects the type of so ware, firmware and hardware
they use.
 They're o en required to perform their func on under a me constraint to keep the larger system
func oning properly.

B) Discuss role of embedded system in IoT ?


Embedded systems are at the heart of the Internet of Things. They provide the intelligence that enables
devices to communicate with each other and with the cloud. The role of embedded systems in the IoT can
be summarized as follows:
 Sensor Integra on:
Embedded systems are responsible for integra ng sensors into devices. Sensors are used to detect and
measure physical proper es such as temperature, pressure, and humidity. These sensors generate data
that is processed by the embedded system and transmi ed to other devices or the cloud.
 Communica on:
Embedded systems are responsible for communica on between devices. This communica on can be
wireless or wired, and can use a variety of protocols such as Wi-Fi, Bluetooth, and Zigbee. Embedded
systems also handle the rou ng of data between devices.
 Data Processing:
Embedded systems are responsible for processing the data generated by sensors. This processing can
include filtering, normaliza on, and aggrega on. The processed data is then transmi ed to other devices
or the cloud.
 Security:
Embedded systems are responsible for the security of devices in the IoT. This includes securing data
transmission, securing access to devices, and protec ng against cyber a acks.
 Power Management:
Embedded systems are responsible for managing the power consump on of devices in the IoT. This
includes managing the power supply, op mizing power usage, and managing ba ery life.

10.A) Write a program in python to detect the all prime number from 10 to 100 and store
them to a set. 5

 def is_prime(number):
 if number < 2:
 return False
 for i in range(2, int(number**0.5) + 1):
 if number % i == 0:
 return False
 return True
 def find_primes(start, end):
 prime_set = set()
 for num in range(start, end + 1):
 if is_prime(num):
 prime_set.add(num)
 return prime_set
 # Detect prime numbers from 10 to 100 and store them in a set
 prime_numbers_set = find_primes(10, 100)
 # Print the set (op onal)
 print("Prime numbers between 10 and 100:")
 print(prime_numbers_set)
B) Block diagram of a sensor in a WSN. 3
Wireless Sensor Network (WSN), is an infrastructure-less wireless network that is deployed in a large number
of wireless sensors in an ad-hoc manner that is used to monitor the system, physical, or environmental
condi ons.
Sensor nodes are used in WSN with the onboard processor that manages and monitors the environment in a
par cular area. They are connected to the Base Sta on which acts as a processing unit in the WSN System. The
base Sta on in a WSN System is connected through the Internet to share data. WSN can be used for
processing, analysis, storage, and mining of the data.

Wireless Sensor Network Architecture


A Wireless Sensor Network (WSN) architecture is structured into three main layers:
 Physical Layer: This layer connects sensor nodes to the base sta on using technologies like radio
waves, infrared, or Bluetooth. It ensures the physical communica on between nodes and the base
sta on.
 Data Link Layer: Responsible for establishing a reliable connec on between sensor nodes and the base
sta on. It uses protocols such as IEEE 802.15.4 to manage data transmission and ensure efficient
communica on within the network.
 Applica on Layer: Enables sensor nodes to communicate specific data to the base sta on. It uses
protocols like ZigBee to define how data is forma ed, transmi ed, and received, suppor ng various
applica ons such as environmental monitoring or industrial control.
These layers work together to facilitate the seamless opera on and data flow within a Wireless Sensor
Network, enabling efficient monitoring and data collec on across diverse applica ons.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy