0% found this document useful (0 votes)
37 views42 pages

All Question Paper

Uploaded by

sudarshan shedge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views42 pages

All Question Paper

Uploaded by

sudarshan shedge
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

2

92
4

B
A1
DE

CB
Paper / Subject Code: 89281 / System Programming & Compiler Construction

8B
10
4A
C4

12
0

92

BB
DE

CB
DA

AA

10

28
C4

12
0
77

B4
DE

09
DA

A
0A

21
A
C4

E0
77

4
DA

A1
B
DA

D
0A

0C
(3 Hours) Total Marks: 80

4A
B6

C4
77
DA

1
E
EF

CB
DA

AA
4D
0A
N.B: (1) Question No. 1 is compulsory.

B6
B7

E0
77

AC

B4
DA
(2) Attempt any three questions out of the remaining five questions.

EF
8B

D
0A

0C
D
(3) Make suitable assumptions wherever necessary.

B6

C4
B7
92

77
DA

DE
=====================================================================

EF

DA
8B
10

0A
B6

C4
B7
2

92

77
DA
A1
What is three-address code? Generate three-address code for –

E
Q.1. A. 5

EF

A
8B
10

4D
0A

7D
4A

B6
B7
2

92

AC
DA
A1

A7
CB

EF
8B
10

7D
4A

B6

A0
B7
2
0

92
A1
DE

A7
CB

EF
8B

6D
10
4A
C4

A0
B7
2
0

92

FB
A1
DE

7
CB
DA

8B

D
10

0A
7E
B. Compare between Compiler and Interpreter. 5

4A

B6
C4

2
0

92
7

DA
BB
A1
DE
A7

C. Explain absolute loader. State its advantages and disadvantages. 5

CB

EF
DA

10
4A
Discuss with example ‘forward reference’.

B6
C4

D.
A0

B7
2
0

92
7

A1
DE
A7

CB

EF
DA
6D

8B
10
Q.2. A. Construct SLR parser for the following grammar and parse the input 10

4A
C4
A0

B7
2
0

2
FB

“( )( )”: S → (S)S | .

A1
DE

09
A7

CB
DA
6D

8B
7E

21
4A
B. State and explain with examples, different types of statements used in 10
C4
A0

92
FB

7
BB

A1
DE
A7

CB
assemblers with respect to system programming.
DA
6D

10
7E
28

4A
C4
A0

12
0
FB

7
BB

DE
09

A. Explain the concept of basic blocks and flow graph with example the 10
A7

CB
DA

AA
6D

Q.3.
7E
21

28

three-address code. C4
A0

0
FB

77

B4
BB
1

DE
09

B. Explain with help of a flowchart, the first pass of two-pass macro


DA

10
AA

6D

0A
7E

0C
21

28

processor. C4
FB

77
B4

DA
BB
1

DE
09

DA
AA

0A
7E
0C

21

Q.4. A. Explain the phases of a compiler. Discuss the action taken in various 10
28

B6

C4
77
B4

DA
BB
A1
DE

09

phases to compile the statement:


EF

DA
0A
0C

21
4A

28

B6
C4

a=b*c+10, where, a, b, c are of type real.


B7

77
DA
1
DE

09
CB

EF
A

AA

B. Write short note on: 10


8B

0A
21
7D

B6
C4

B7
E0

(i) Syntax-directed Translation, (ii) Macro facilities


92
B4

DA
1
A7

EF
A

AA

8B
10
4D

C
7D

Q.5. A. What is code optimization? Explain with example, the following code 10
B6
A0

B7
12
E0

92
AC

B4
A7

optimization techniques:
EF
AA

8B
10
4D

C
7D
A0

(i) Common sub-expression elimination (ii) Code motion


B7
12
E0

92
AC

4
A7

CB

AA
6D

8B

(iii) Dead code elimination (iv)Constant propagation


10
4D
7D
A0

12
E0

92
FB

B. Explain Direct Linking Loader in suitable example. 10


AC

4
A7

CB

AA
6D

10
D
E

7D

Q.6. A. Test whether following grammar is LL(1) or not. If it is LL(1), construct 10


C4
A0
B7

12
E0
B

4
A7
EF

CB

parsing table for the same:


A

AA
6D

D
7D

C4
A0
7

E0

S1AB|
B

B4
BB

A7
EF

A
6D

A1AC|0C
C
7D
28

C4
A0
B7

E0
B

B0S
09

A7
EF

A
8B

6D

4D
21

7D

C1
A0
7
92

FB

AC
BB

A7

B. Draw and explain the flowchart of Pass-I of two pass assembler with 10
6D
10

7D
28

A0
B7

suitable example.
12

FB
09

A7
AA

8B

6D

____________________
E
21

A0
B7
92

FB
B4

A1

8B

6D
10

7E
0C

4A

12

92

B
BB
CB

EF
AA

10

28

B7
12
E0

B4

09
AA

8B
4D

0C

21

27651 Page 1 of 1
92
AC

B4

A1
DE

10
0C
7D

4A
C4

12
DE

CB
DA

AA
C4

E0

DA0A77DAC4DE0CB4AA1210928BB7EFB6
77

B4
D8

C
98

9F
D5
Paper / Subject Code: 89282 / Cryptography & System Security

24
C3
87

C5
B8
D8
18

98

9F
D5
24
20

C3
87

C5
B8
D8
9E

18

98

D5
4
34

C3
7

2
2

88

B8
8
98

3D
Duration: 3hrs [Max Marks: 80]

01

79
AB

24
3 4

E2

C
88

D8
8

8
53

B
9

49

01

9
B

4
N.B. : (1) Question No 1 is Compulsory.

C3
87
9F

2
3

2
A

8
98

9E

18
C5

98
3
(2) Attempt any three questions out of the remaining five.

3D
5

87
9F
D5
(3) All questions carry equal marks.

83

2
A

C
E

8
5

8
53
B8

B9

49

01
C

9
(4) Assume suitable data, if required and state it clearly.

87
9F
5

83

2
24

A
D

18
5

3
B8

9
D8

9
C

9
5

AB

20

87
F
5

3
4
C3

9
D
1 Attempt any FOUR [20]

98

9E
2

18
C5

53
8
D8
98

AB

20
F
a Explain the relationship between Security Services and Mechanisms in detail.

3
24
3
87

59
D

9E
C

53
8

9
8
b Explain ECB and CBC modes of block cipher.
18

C
8

AB
3D

34
F
9

5
4
20

9
D
c Define non-repudiation and authentication. Show with example how it can be achieved.

98
2
C
8

3
B8
8
9E

49
18

5
98

AB
3D
d Explain challenge response-based authentication tokens.

9F
5

83
4
34

87

8D
82
E2

C5

53
Explain buffer overflow attack.

B9
e
8

B
D
B9

49

01

9F
79

5
24

3A
3

D
3

2
3A

8C
88

C5
B8
D8
8

F5
B9

2 a Elaborate the steps of key generation using the RSA algorithm. In RSA system the
9

[10]
01

79
F5

D5
24
4

59
3

public key (E, N) of user A is defined as (7,187). Calculate Ф(N) and private key ‘D’.
3A

C
88
59

8
8
8

9E

5C
8

B
3D
9

01
5C

9
F5

AB

What is the cipher text for M=10 using the public key.

4
4

8D
82
3

E2

8C
88
59
8D

8
3

4B
3D
9

49

1
5C

9
5

b Discuss DES with reference to following points [10]


4B

AB

87
F

82
3

E2

8C
9
8D

8
82

1. Block size and key size

18
5

3D
B9

9
5C

79
5
4B
3D

20
F

[Link] of expansion permutation


3
A

8C
88
9
8D

9E
82
8C

C5

53

[Link] of S-box
9

01

79
4B

AB
3D

34
F
79

D5

[Link] keys and semi weak keys E2

88
9

98
82
8C
88

C5

3
B8

01
F5

5. Possible attacks on DES


B
3D

34
01

79

D5

E2
24

3A
59

8
2

8C
88

B9
8
9E

49
5C

F5
B
3D
01

79

3 a What goals are served using a message digest? Explain using MD5. [10]
83
4
4

3A
59
8D
2
83

8C
88

B9
8
9E

b What is DDOS attack? Explain how is it launched.


C

[10]
5
B
3D
B9

01

F
79

D5
4
4

3A
59
2
83

2
3A

C
88

B8
8
9E

F5
8

3D
9

9
F5

4 a Why are digital certificates and signatures required? What is the role of digital signature [10]
D5
AB

24
4

20

87

59
83

8C

B8

in digital certificates? Explain any one digital signature algorithm.


8
9E

18

5C
53

3D
9

9
AB

24
4

20

b How does PGP achieve confidentiality and authentication in emails? [10]


7
F

8D
83

8C
88
59

8
9E
53

4B
3D
9

1
5C

79
AB

20
F

82
83

State the rules for finding Euler’s phi function. Calculate


8C
88
59
D

5 a [10]
9E
53
B8

3D
9

01
5C

79

φ(11)
AB

34

a.
F

E2

8C
88
59
D

8
53

φ(49)
B8

01
5C

b.
79
AB

4
F

E2
4

88
59
D

φ(240)
8
82

53

c.
B8

B9

01
5C
D

4
F

83

E2
4

A
C3

b Explain Kerberos. Why is it called as SSO? [10]


59
D
82

3
B8

B9

49
5C

5
98

83
4

3A
C3

9
D
82

6 a Enlist the various functions of the different protocols of SSL. Explain the phases of [10]
B8

B9
C

5
8

F
79

D5
4

handshake protocol.
3A
C3

59
82
8

8
18

5C

F5
8

b How is security achieved in Transport and Tunnel modes of IPSEC? Explain the role of [10]
4B
D
79
20

C3

59
D
2

AH and ESP.
8

8
D8
9E

18

5C
8

4B
79

____________________________
20

8D
2
8C
8

D8
E

18

4B
49

9
20

3
87

82
3

8C
98

18

3D
49

9
AB

28998 Page 1 of 1
20

87
3

8C
98

18
53

49

79
AB

20
83

88
E
53

B9

53AB98349E20188798C3D824B8D5C59F
49

01
7

FF

X
B
37
Y4
Paper / Subject Code: 89282 / Cryptography & System Security

47

FF
X2
B4
37

7Y

B4
47

FF

X
X2

23

47

FF
7Y

B4
FF

FX

7Y

B4
3

47
X2
B4

23

47
7Y

4
47

X
B

7Y
F

23

47

FF
Duration: 3Hours [Max Marks : 80]

7Y

23
X
B

B4
23

47

FF

FX
7

Y
23

47

37
FX

B4

4F
X
7

7Y

X2
N.B : (1) Question No 1 is Compulsory.

4F

23

47

FF

7B
3

FF
(2) Attempt any three questions out of the remaining five.

FX
7B

2
4

Y4
X
7B
7

B4
Y4
(3) All questions carry equal marks.

4F

FF

37
2

Y4

47
X
7B
37
(4) Assume suitable data, if required and state it clearly.

X2
4
FF

B
7

7Y

4
X2

47

FF

7B
Y

X2
4

23
FF

B
37

7Y

B4

Y4
47

FF

FX
1 Attempt any FOUR [20]
X2
B4

23

47

37
7Y

B4

4F
47

FF

FX

X2
a Explain Euclidean Algorithm.

23

47

7B
37
7Y

B4

4F

FF
X

Y4
23

b Explain RC4 stream cipher.


47

FF

FX
B
37

2
B4
7

FX
37
FX

7Y

2
4

Y4

47
FX
7B

c Differentiate between SHA-1 and MD5

X2
B4

4F
4F

37

7Y
2

Y4

47

FF

7B
FX
7B

d Explain worms and viruses

X2
4

23
7B
37

7Y

B4

Y4
Y4

FF

FX
X2
B4

Discuss RSA as a digital signature algorithm.


Y4

23

47

37
37

B4

4F
7

X
37

7Y

X2
X2

Y4

2 a Explain Diffie Hellman key agreement algorithm. Also discuss the possible [10]
47

7B
X2
B4

4F

FF
FF

7Y

attacks on it. Consider the example where A and B decide to use the Diffie

X2

Y4
3

FF

7B

B4
X2
B4

Y4

23

Hellman algorithm to share a key. They choose p=23 and g=5 as the public

FF

37
B4

Y4

47
47

FF

FX
7

parameters. Their secret keys are 6 and 15 respectively. Compute the secret key

X2
B4
3

47

37

7Y
7Y

X2
4

4F

that they share


47

FF
B

X2

23
23

47

7B
7

b Explain Advanced Encrypted Standards (AES) in detail. [10]


B4
4F

FF

FX
7
FX

7Y

Y4

23

47
FX
B

B4

3 a Explain cryptographic hash functions with properties of secure hash function. [10]

4F
4F

23

47

FX
37

7Y
F

47

7B
X
7B

X2
4

4F

23
FF

7B
37

7Y

Y4
b What is ICMP flood attack? Explain in detail. [10]
Y4

FF

FX
7B
2
B4

Y4

23

37
X

B4

Y4

4F

4 a Explain Public Key Distribution in detail. [10]


47

FF

FX
7

X2
23

47

7B
37
Y

4F

b Encrypt the string “The Key is hidden under the door” with Play fair cipher using
FF

[10]
X
7B
37

7Y

X2

Y4
FF

7B

the keyword “domestic”.


B4
2

Y4

23

FF

37
X

B4

Y4

47

5 a What are the different components of IDS? List and explain different approaches
FF

FX

[10]
37

X2
B4
47

37

7Y
X2

of IDS.
4F

47

FF
7Y

X2

23
FF

b Explain Needham-schroeder authentication protocol.


7B

[10]
7Y

B4
23

FF

FX
B4

Y4

23

47
FX

6 a Write a short note on [10]


B4

4F
47

FX
37

7Y
4F

1. Packet Sniffing.
47

7B
Y

X2

4F

23
7B
37

7Y

2. ARP spoofing.
Y4
FF

FX
7B
Y4

b Discuss various attacks on Digital signatures.


23

[10]
37
B4

Y4

4F
FX
37

X2
47

B
37
2

4F

47

FF
FX

7Y

X2
7B

7Y

B4

_____________
4F

23

FF
Y4

23

47
FX
7B

B4

FX
37

7Y
4F

47
X2

4F

23
7B

7Y
FF

FX
7B
Y4

3
X2
B4

Y4

4F
37

55415 Page 1 of 1
47

FF

7B
37
2
FX

7Y

X2
B4

Y4
23

47

FF

37
FX

7Y

X2
B4

X237Y47B4FFX237Y47B4FFX237Y47B4FFX237Y47B4FF
6
FD

47

A3
6A

4D
Paper / Subject Code: 89283 / Mobile Computing

5D
49

6A
DB

7F
AC

6A

4D
D4

A
9F

6A
DB
24

7F
C4

A5
AB

4D
D4
9F
A

B6
4

7F
C4
D2

A5
2

D
AB

4
F
4A
76

B6
Duration: 3hrs [Max Marks:80]

5D
9
C4
2
4A

B2

FD
D

6A

4
4A
76
9F

2A

D
9

DB
C4

5
4A

2
A3

6D

6A
AB
N.B. : (1) Question No 1 is Compulsory.

9F
A
F
6A

DB
24
9

C4
(2) Attempt any three questions out of the remaining five.

D2
A
A3
4D

B
F4

F
4A
6
(3) All questions carry equal marks.

A
6A

49
7
F

D2
4A

B2
47

AC
(4) Assume suitable data, if required and state it clearly.

4D

AA

9F
76
5D

A
F

24
9

4
D2
D6

A
47

A3
6A

AC
AB
F4

6
5D

F4

6A
DB
1 Attempt any FOUR [20]

A7

24
9

D2
47

A3
6A

4D

B
F4
9F

76
D
a Explain concept of frequency reuse with clustering. 5

2A
A
DB

39
C4

D6

4A
7
6A

6D

AB
D4

AA
9F
4A

b Explain in short wireless LAN security threats. 5

9F
DB

A7
F
C4

A5

D2
2

6
47

A3
AB

4D
c What is spread spectrum? 5

F4
9F
4A

B6

76
D

6A
F

39
C4
D2

5
2

4A
FD

47
6A
d Describe use of Cellular IP. 5
AB

4D

AA
4A
6

9F
9
A7

7F
4
D2

A5
2

D6
D
e Explain in short voice over LTE. 5

A3
AC
AB
F4

D4
9F
6

F4

6A
A7

B
4
39

C4
D2

A5
2

FD

47
AB
AA

4D
F4

4A
6

B6

5D
9
A7

2 a Explain in short different algorithm used for authentication and privacy in GSM. [10]
39

7F
4
D2
D6

B2

FD
C

6A
AA

F4

D4
4A
6
F4

b What is the use of different interfaces used in global system for mobile [10]
9
A7

DB
39

C4
2

A5
D6

2
47

AB
AA

F4

9F
A
communication (GSM) with diagram?
76
5D

B6
F4

4
39

C4
D2
D6

B2
47

FD
6A

AA

4A
6
5D

F4

9F

A
DB

49
7

2
D6

B2
47

A3
6A

AC
D

3 a Explain hidden station and exposed station problem with solution in WLAN. [10]
F4
9F

76
D

F4

A
6A
DB

24
39
C4

A5

D2
A
47

b How is packet delivery achieved to and from mobile node? [10]


4D

AB
AA

4
9F
4A

B6

6
5D

9F

A7
7F
C4

D2
2

6
FD

A3
6A
AB

D
D4

F4
4A

76
4
49

A
DB

4 a Explain snooping TCP and mobile TCP with their merits and demerits. [10]
F

39
D2

5
B2

4A
47
C

6A

4D

AA
F
4A
2A

9F
49

b Explain the process of registration in Mobile IP. [10]


DB

7F
A5
B2

A3
C
6D

D
D4
F
4A

B6
2A

F4
49

6A
A7

A5
B2

47
C
6D

4D
4

9F

5 a Explain protocol architecture of IEEE 802.11 with diagram. [10]


4A

B6
9F

2A

5D
A7

7F
4
B2
A3

D
AC
6D

6A

b How IP mobility is achieved in wireless network. [10]


F4

D4
9F
2A
A7

B
24
39

A5
D
AC
6D

AB
AA

F4

9F

B6
A7

24
39

C4
D2
6

6 a Explain different components used in LTE architecture with diagram. [10]


FD
4D

AB
AA

F4

4A
76

49
F

39

b Which components are new in GPRS as compared to GSM? What is there [10]
D2
6

4A

B2
47

AC
4D

AA

76
F

2A

purpose?
7F

24
39
6

4A

6D
4D

AB
D4

AA

A7
7F

39
A5

D2
D6
D4

AA

F4
B6

____________________________________
76
4
7F

39
A5

D6

4A
FD

D4

AA
B6

F
7F

39
5

6
D

6A

4D
D4

AA
9F

DB

7F
4

D6
AC

6A

D4
F

28390 Page 1 of 1
4
49

DB
4

7F
A5
B2

AC

D4
F

B6
49
24

5
D
AC

6A
AB

76D2AB24AC49FDB6A5D47F4D6AA39F4A
9F
3

23
8

48
Y5
X2
F4
Paper / Subject Code: 89283 / Mobile Computing

BX
EF
37
8B
5E

48
Y5
X2

2
F4
7Y

BX
EF
37
8B
5E
23

48
Y5
X2
F4
Y
BX

EF
7

7
B
E
3

3
48

8
5

5
Duration: 3hrs [Max Marks: 80]

X2
F4
7Y

Y
BX
EF

37
B
E
3
8
Y5

8
5
2

X2
4

F4
Y

Y
BX
N.B.: (1) Question No 1 is Compulsory.

EF
37

37

37
8B
5E
48
(2) Attempt any three questions out of the remaining five.

5
X2

X2

X2
Y

F4
7Y
EF
(3) All questions carry equal marks.

37
8B

8B
5E
23
8
5
X2
F4

4
Y

4
7Y
BX
EF

F
37
8B
5E

5E
3
Q1. Attempt any FOUR Questions 20

8
5
2

X2
F4
7Y

4
Y

4
Y
X

F
7

7
8B

B
5E

5E

5E
23
Explain the concept of frequency reuse with clustering.

23

3
a)

X2
4
Y

F4
7Y
BX

Y
X
b) Compare LTE and LTE advanced.

F
7

37
B

8B
5E

5E
3

3
What is Hidden and Exposed station problem?
48

c)

8
2

X2
4
Y

F4
7Y
BX

BX
What are the roles of EIR and HLR entities in a GSM network?
EF

EF
d)
7

8B
5E
3

3
Discuss about the mobile services and data services in GSM.
8
Y5

8
Y5
e)
X2

2
4

4
7Y
X

X
EF

EF
37

37
B

8B

8B
E

3
48
Y5

Y5
X2

Y5
X2

X2
4

F4
F

EF
37

37
8B

Q2 a) What do you mean by Self Organizing Networks. Explain the architecture of SON. 10

37
8B

B
E

5E
5

8
5
X2

X2
F4

F4
Y

4
Y

7Y
BX
Q2 b) What is a need of Micro Mobility? Explain Cellular IP in detail. 10

EF
37

37
B
5E

8B
5E

23
8

5
2

2
F4
7Y

4
7Y

F4
Y
BX

BX
F

7
B
5E

5E

5E
23

23

Q3 a) What are the different Handover mechanism in GSM? Explain each handover mechanism 10

23
8

48

48
4
Y

Y
BX

7Y
X

BX
F

EF
7

7
B

in brief.
5E

E
3

23
48

48

8
5
2

Y5
X2
7Y

4
Y
X

BX
EF

EF

EF

Q3 b) Explain the protocol architecture of IEEE 802.11 with diagram. 10


37
B

37
B
3
48
Y5

8
5

48
Y5
X2

X2

X2
F4
Y
EF

EF
37

37

7
B

8B

8B
E

3
48
Y5

Y5
X2

Y5
X2

X2

Q4 a) Explain the GPRS architecture, explain each block in detail. 10


F4

F4
F
7

7
8B

37
8B

B
E

5E

5E
3

3
Y5

48
X2

Q4 b) Explain snooping TCP and mobile TCP with their merits and demerits. 10
2

2
4

F4

7Y

7Y
BX

BX
EF

EF
7
B

E
3

23
8

8
5

8
Y5
2

X2
4

4
7Y

F4
BX

BX
EF

37
B
5E

Q5 a) What is spread spectrum? Why is it used? Explain any one of the spread spectrum 10
E
23
8
Y5

48

48
Y5
X2
F4

Y
BX

EF

EF
37

techniques.
7

7
8B
5E

23

23
48

5
X2

Y5
7Y

F4
Y
BX

BX

Q5 b) Explain Mobile Terminated Call and Mobile Originated Call. 10


F

37
8B

37
E

5E
3

8
5

48
X2

X2
F4
Y

7Y
X

EF
37
8B

8B

8B
5E

23

Y5
X2

Q6 a) Explain the mechanism for IP packet delivery using mobile IP. 10


F4

F4
Y

F4
BX
7

37
B
E

5E

5E
3
8

Q6 b) Discuss in detail about Wi-Fi security protocol. 10


Y5

48
X2

X2
F4

7Y

7Y
EF
37

8B
E

23
8
5

Y5
X2
4
Y

F4

BX
EF
37

37
B

5E
48
5

48
X2

X2
7Y

7Y
EF

*********
EF
8B

8B
23

23
Y5

Y5
F4

F4
BX

BX
7

37
5E

5E
3
8

48
X2

X2
F4

7Y

EF
8B

8B
E

3
Y5

Y5
X2
F4

55392
F4
37

37
8B
5E

5E
X2

X2
F4
7Y

7Y
8B

8B
5E
23

23
F4
7Y
BX

BX
5E
23

X237Y5EF48BX237Y5EF48BX237Y5EF48BX237Y5EF48B
48

48
Te- if-lz=bL2-
Tt - C^"YY lre M-fr lg-l 3 f svl-zu
?t
Paper / Subject Code: 89284 I

Time: (3

NOTE: - Ql is compulsory
Solve any three from

Ql. Solve any four from


a. Compare the
b. What data is used to of
c. Explain the of
d. How AI will
e. Generate the for cat ate
f. Whatdo by
of it

L
Q2.a. prove who

read
not
3.

b. the
onto off and it IS
cargo plane I 2 and 2is
cargo be and I

a. A,T on the
15, 0, , h(F) = i0,
0. t10l
is the the

':*l!
:.r.
4

first iterative deepening search. [10]


..-'

Page 1 of 2

:
:
i
22CD 8DE2E A9 2ED2C2EE63 48 58 4DD 1 40 6 i
i!
i
I
L
i
Paper / Subject Code: 89284 /

Q4. a. Apply the alpha beta pruning on by node


max.

.*;.
a\".1

'=\
..:i":;

also tutor.

a. also
cost for
that is be
5 a
8 foot get The
J

[10]

[20]
a.
b.

L228L Page 2 of 2

22CD8DE2E, A92ED2C2EE63485B4DD 1 406


,.-it':Y
F

AA
1
2

6F
C1
6C
25
Paper / Subject Code: 89284 / Artificial Intelligence

FD

31
D0

15
2F

6F
C1
6C
25

A
7E

FD

31
D0

15
2F
F7

6F
C1
C
5
7E
3C

02

F6

FD
15
F7
8E
Time: 3 Hours Marks: 80

1
6C
5
E
C
5D

C
2
7
3
1) Q.1 is compulsory

D0

15
2F
7
E
47

F
8

C1
6C
25
7E
C
D
AA
2) Attempt any three from remaining five questions

E3

D0

5
5

2F
F7

C1
47
31

25
7E
3C
D
A

F6
F

D0
5
A

7
D6

E
47

52
Q1) Solve any four of the following:

F
1

7E
3C
3

5D
F

02
6F
C1

7
8E
a) Describe different categories of AI [5]

ED
47

CF
D

1
15

25
3

D
F

A
b) Describe the characteristics of a medical diagnosis system using the PEAS properties [5]

77
F

E3
C1
6C

D0
75
1A
D6

CF
c) Explain Goal based Agent with a block diagram [5]

8
A4
15
2F

7E
3

5D
F

E3
d) Compare and contrast propositional logic and first order logic [5]

1
6C
25

F7
D6
C

7
1

D8
e) What do you mean by hill climbing. Explain. [5]

A4
D0

5
2F

3C
3
F
1

F
1
6C

75
25

1A
7E

D6

8E
5C

4
D0

C
F7

5D
F

AA
1
52

6F

E3
C1
C
7E
3C

Q2)

47
2

F6

D8
D0

15
a) Perform α - β pruning on the following graph, clearly indicating the
F7

F3
8E

1F

AA
2

75
5
7E

α and β cuts and the final value of root node.


3C

6
5D

[10]

5C
2

F6

FD

31

A4
0
F7
8E

ED

1
47

52

6F
C1
C

1A
3C
5D
AA

02

FD
7

15
F
F7

F3
8E

MAx
D
47

2
31

C1
6C
25
E
3C

D6
5D
AA

77
6F

D0

15
F
8E

1F
47

52
F
FD

31

6C
7E
C
C
5D

5C
AA

2
B
6F

3
C1

D0

2F
7
E

C1
47

MIN
F
FD

31

D8
15

25
7E
3C
AA

F6
6F
C1
6C

D0
5

7
8E
47

52
CF
FD

31
15
2F

7E
5D
AA

02
6F

D G I
C1
6C
25

F
F7
H
8E

ED
7
FD

31

4
0

15
2F

3C

MAX
5D
A
ED

77
6F
C1
6C
25

8E
47

CF
FD
77

31
0

15
2F

D
A
ED
CF

E3
C1
6C

8
5

9
25

8 3 9
A

6 4 2 4 7 4 2 4 1 7
D6

5 8 3
7
77

31
E3

D8
A4
D0

15
2F

1F
CF

6F
D8

6C

75

J
25

K
1A
7E

L M N O P Q R S T U V W X Y Z a
5C

D
E3

A4
D0
75

2F
7

F3
F
1
CF
D8

1
6C
25

1A
7E

6
5C

D
E3

D0
75

2F
7

F3

b) What do you understand by informed and uninformed search methods? Explain in detail
1F
1
CF
D8

6C
4

25
7E

D6
5C
AA

E3

D0
75

2F

with example. [10]


7

1F
C1
CF
31

D8
4

25
7E

5C
AA

F6
6F

E3

D0
75

C1
2
CF
31

D8
4

25
7E
AA

F6

Q3)
F

E3

D0
75

7
D6

52
CF

a) Consider the following statements: [10]


31

D8
4

7E
F

AA

02
F

a) All people who are earning are happy


E3
C1

75

7
D6

ED
CF
31

b) All happy people smile


D8
4
15

AA

77
F

E3

c) Someone is earning
C1
6C

75
D6

CF
31

D8

Perform the following tasks:


4
5

AA
C1

E3
C1

i) Represent above statements in FOL


75
D6
6

31

D8
4

ii) Convert each to CNF


5
2F

AA
C1

F
C1

iii) Prove that someone is smiling using resolution technique. Draw the resolution tree
75
5

D6
02

31

4
5
2F

AA
ED

C1

F
C1
25

b) What do you understand by forward chaining and backward chaining. Explain in detail
D6
6

31
D0

5
2F

F
C1

[10]
C1
25
7E

D6
6
D0

5
2F
7

F
C1
CF

C1
25
7E

26341 Page 1 of 3
6
E3

D0

5
2F
7

C1
CF
D8

25
7E

6
E3

D0

2F
F7
8

5
7E
3C

75D8E3CF77ED0252F6C15C1FD6F31AA4
5D

02
D8 ED 6C 6F 75
E3 02 15 31 D8
CF 5 C1
F
AA E3
5D 7 7E
2F
6 D6 4 75
CF
8 C1 F 77
E3 D0
25 5 31 D8 ED
CF
7 2F
C1
F
AA E3 0 25
7E 6 D6 4 75
CF 2F
D0 C1
5 F 31 D8 77
ED 6C
3C 25 15 Q.4
F7
C1
F
AA E3 0

G1

C
2F

B
A
4 25 C1

SB
SA

SD
CF

AB
6

AG1
7E D6 7 2F

Edge
75

26341
Node
C1 F 7E FD
D0 5 31 D8 6C 6F
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA
7E 6 D6

A
C1 F 75 7 7E
2F FD 47

4
3
7
5
9
3
6
9
5
D0 5 31 D8 6C 6F 5D

Cost
25 C1 AA E3 D0 15 31
2F F 25 8E

Heuristic
6 D6 4 75
CF
7 2F
C1
FD
AA 3C
02
C1
5 F 31 D8 7E 6C 6F 47
5D F7
5 C1 AA E3 D0 15 31 7E
F 8E

F
E
2F

D
4 25 C1 D0

CF
CS
BC
BA
6 CF AA

CG2
D6 7 3C

Edge
75 2F 25

Node
FD

B
C1
5 F 31 D8 7E 6C 6F 47
5D F7 S
2F
C1 AA E3 D0 15 31 7E 6C
F D6 4 CF 25 C1 AA 8E
3C
D0 15
F 75 7 7E
2F FD 47 25 C1
F

6
5
6
7
5
6
1
2
31 D8 6C 6F 5D F7 2F
path from S to any of the goal nodes.

Cost
E3 D0 31 7E 6C D6
AA 25 5C 8E F

Heuristic
4 CF 31 AA D0 15
75 7 2F AA 1F
47
3C 2 52 C1
F

G2
5 F 7E 6C D6 F7
D8
E3 F 31 D8 7 ED 6CD0 D 6F 1 47
25 5C A E 1 3 5D
1 3 0 5

FD
DS

DE

G3
G2
G1
1

DC
CF 2 A
F 2 C

FG3
EG3
C A 8E

Edge
5

Node
77
ED
F6 D 6F 4 7 F 77 2 1 F A 3C
5D F6
C

C1 47
02 5C 31 8E ED C 1
D6
F 5 D
F7
A 3 7E

Page 2 of 3
52 1F A 3C 02 5C 1A 8E D0
F6 D 6 47 F 52 1 F A 3 C

0
0
0
8
2
7
2
2
1
C1 5D 7 F6 47 25
2

Cost
F3 7E C D6
5 F7
D

5C 1A 8E F 3 D 7E

Heuristic
1F 3
D0 15 1A 8
A4 CF 25 C1 E3 D0
7 2 F A C

75D8E3CF77ED0252F6C15C1FD6F31AA4
D6 7
F3 5 D 7E F 6 D6 47 F 25
1A 8E C 1 F 5D 7 7
2F F
D0
2 5C 3 1 8 E D
6C
1
A4 3C
F7 52 1F A E 3C 02
75 F D A4 5
Paper / Subject Code: 89284 / Artificial Intelligence

D8 7E 6C 6F 75 F7 2F
E3 D0 15 3 1A D 8E
7E 6C
CF 25 C1 D0 15
77 2F FD A4 3C
F 2 5 C1
ED 6C 6 75D 7 2 F6 F
G3

F3 7E
E

02 15
C1 1AA 8E3 D0 C 15
52 25
F6 FD
6F 4 75
CF
7 2F
C1
FD
C1 D8 7E 6C
5C 31 D0 15 6F
AA E3

b) What is planning in AI? Discuss partial order planning and hierarchical planning in detail [10]
[10]
a) For the given graph, the table below indicates the path costs and the heuristic values. S is the
start node and G1, G2 and G3 are the goal nodes. Perform A* search to find the shortest distance

1F CF 25 C1
D6 47 77 2F FD
F3 5D ED 6C 6F
1A 8E 15 31
A4 3C 02
52 C 1 AA
75 F7 F6 FD
D8 7E C1 6F
E3
C
D0
25 5 C1 31
A
D8 ED 6C 6F 75
E3 02 15 31 D8
CF 5 C1
F
AA E3
5D 7 7E
2F
6 D6 4 75
CF
8 C1 F 77
E3 D0
25 5 31 D8 ED
CF
7 2F
C1
F
AA E3 0 25
7E 6 D6 4 75
CF 2F
D0 C1
5 F 31 D8 77
ED 6C
3C 25 15
F7 2F
C1
F
AA E3 0 25
Q 5)
7E 6 D6 4 75
CF
7 2F
C1

26341
C1 F 7E FD
D0 5 31 D8 6C 6F
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA
7E 6 D6 75 7 2F FD
D0 C1
5 F 31 D8 7E 6C 6F 47
5D
25 C1 AA E3 D0 15 31
2F F 4 CF 25 C1 AA 8E
6 D6 75 7 2F FD 3C
02
C1
5 F 31 D8 7E 6C 6F 47
5D F7

a) Applications of AI
5 C1 AA E3 D0 15 31 7E
F 8E

b) Simulated annealing
2F 4 CF 25 C1 AA D0
6 D6 75 7 2F FD 3C 25 Q.6 Write short notes on :
C1
5 F 31 D8 7E 6C 6F 47
5D F7 2F
C1 AA E3 D0 15 31 7E 6C
F D6 4 CF 25 C1 AA 8E
3C
D0 15
F 75
D8 7 7E
2F
6C
FD 47 F7 25
2F
C1
F
31 D0 1 6F 5D 7E 6C D6
AA E3 5C 31 8E F
4 CF 25 AA D031 15
75 7 2F 1F
47
3C 2 AA
52 C1
D8 7E 6C
F
D6
5 7 F F7 D F
E3 D0 5C 1 31 D8 ED 6C 6F 47
5D
A E 1 3
a) Explain the concept of genetic programming

CF 25 1 3 0 5 1
77 2 F D A 4 C 2 5 C 1 A 8E
ED
F6
C1 6F 7 5D F 77 2 F6 F A 47
3C
02 5C 31 8E ED C 1
D6
F 5 D
F7
A 3 7E

Page 3 of 3
**************
52 1F A 3C 02 5C 1A 8E D0
F6 D 6 47 F 7
52 1 F A 3 C 25
C1 F3 5D 7E F6 D6 47 F7 2
5C 1A 8E C F 5 D
1F A4 3
D0
25
15
C1 3 1A 8
7E
D0
CF 2 A E3
7 F C

75D8E3CF77ED0252F6C15C1FD6F31AA4
D6 7
F3 5 D 7E F 6 D6 47 F 25
1A 8E C 1 F 5D 7 7
2F
D0
2 5C 3 1 8 E D
6C
1
A4 3C A E
components: initial state, actions, successor function, goal test, path cost.

F7 52 1F 3C 02
75 F D A4 5
Paper / Subject Code: 89284 / Artificial Intelligence

D8 7E 6C 6F 75 F7 2F
E3 D0 15 3 1A D 8E
7E 6C
CF 25 C1 D0 15
77 2F FD A4 3C
F 2 5 C1
ED 6C 6 F3 75D 7 2 F6 F
15 7E C
02
52 C1 1AA 8E3 D0 15
F6 FD 4 CF 25 C1
C1 6F 75
D8 7 7E
2F
6C
FD
5C 31 D0 15 6F
AA E3
[20]
[10]
[10]
b) What is formulation of a problem. Formulate the Wumpus world problem in terms of following

1F CF 25 C1
D6 47 77 2F FD
F3 5D ED 6C 6F
1A 8E 15 31
A4 3C 02
52 C 1 AA
75 F7 F6 FD
D8 7E C1 6F
E3
C
D0
25 5 C1 31
A
4
23

23
3D

3D
Y6
Paper / Subject Code: 89284 / Artificial Intelligence

FX

FX
4F

4F
37
3D

3D
Y6

Y6
X2

2
FX
4F

4F
37

37
DF

3D
Y6

Y6
X2

X2
3
4F

4F
7

7
DF

DF
(3 Hours) [Total Marks: 80]

3
Y6

6
X2

X2
F3

F3

7Y
7
DF

DF
64
Note: i) Question no. 1 is compulsory

4
3

3
6
X2

X2
7Y

F3

7Y

3
ii) Attempt any three from remaining

Y
4F

7
DF

DF
4
23
iii) Assume necessary data

23

23
6

6
Y

F3

7Y
FX

F3
FX

FX
37

64

64
23
3D

D
2

7Y
1 (a) Explain the Learning Agent with suitable block diagram.

F3
5

7Y
FX

F3
FX
4F

64

64
23

3
D

D
Y6

X2
3

7Y
(b) Give difference between Informed Search and Uninformed search

3
5

Y
FX

3
F

F
37

F
7
DF
4

64

64
3

3
Algorithms.

D
Y6
X2

X2

X2
3

F3

Y
4F
7

37
DF

37
DF

DF
(c) Give PEAS and state space description for “Automobile Driver Agent”

64
3
5

6
X2

X2

X2
F3

F3

7Y

F3
37
DF

DF

DF
64

64

64
3
(d) Explain different quantifiers with example. 5
X2

2
7Y

F3

7Y

F3

3
X

X
4F
37
F

DF
4

64
23

3
D

2 (a) Explain various properties of task environment with suitable examples 10

3D
Y6

Y6
2

X2
3

7Y
FX

FX

F3
F

4F
7

37
DF
4
3

64
3
3D

3D

(b) What is Game Playing Algorithm? Draw a game tree for Tic-Tac-Toe 10
6

6
2

X2

X2
7Y

7Y
FX

7Y
4F

problem.

4F
DF

DF
64
23

3
D

23
Y6

6
X2
3

Y
FX

F3

FX
F

4F
37

3 (a) Illustrate forward-chaining and backward-chaining algorithm with suitable 10


7

7
DF
64

64
3

23
3D

3D
6
X2

X2

example.
Y

F3

7Y
X
F
7

4F
37
DF

DF
4

64
3

23
D
6
X2

Y6
2

(b) Explain Hill Climbing Algorithm and problems that occurs in hill climbing 10
F3

F3

7Y

F3
X

FX
37
F

37
DF
64

64

64
23
D

algorithm? 3D
2

X2
7Y

F3

7Y

7Y
X

FX
F

4F
DF

DF
4

4
23

4 (a) What do you mean by Resolution? Also discuss the steps in Resolution. 10
3

3
3D
6

Y6

Y6
X2

X2
Y

3
FX

F3
F

4F
7

37
F

DF
64
3

64
3
3D

3D

Y6
2

X2

X2
Y

(b) Consider problem of changing a flat tire. The goal is to have a good spare 10
FX

F3

7Y
4F

4F
7

37
DF

DF

tire properly mounted on to the car’s axle, where the initial state has a flat
64
3
3D

23
Y6
2

X2
3

Y
FX

F3

FX
F

tire on the axle and a good spare tire in the trunk. Give the ADL
4F
37

37
F
64

64
3D

3D
Y6
X2

description for the problem and also discuss the solution


7Y

F3

7Y
X
4F

4F
37
DF

F
64
3

3
3D
6
X2

Y6
2

X2

5 (a) Explain Partial-order planning with suitable example. 10


7Y

F3

7Y
X

F
DF

37
F

DF
64

64
23

23
D

X2

(b) Define Belief Network. Describe the steps of constructing belief network 10
7Y

Y
X

3
FX
F

4F
7
DF

DF

with an example.
64
23

3
3D

Y6
X2
F3

Y
X

F3
F
7

37
F

DF
4

6 Write short notes on any Two of following:


4

64
3
D
Y6

Y6
X2

X2
F3

F3

7Y
37

37
DF

DF
64

(a) Explain different applications of AI in Healthcare, Retail and Banking. 10


64

23
X2
7Y

F3

F3

FX
37
DF
4

(b) Alpha Beta Pruning 10


4
3

3D
Y6

6
X2

X2
F3

7Y

4F
37
DF

(c) Wumpus world Environment


64

10
3
3D

Y6
X2

X2
F3

7Y

37
DF

DF
64

64
3

____________________
X2

X2
F3

3
4F
37
DF

DF
4
Y6

Y6
X2
F3

F3
37

37
DF
64

64
X2

54516 Page 1 of 1
X2
7Y

F3

7Y
DF

DF
64
23

23
7Y

F3
FX

FX
64
23

X237Y64F3DFX237Y64F3DFX237Y64F3DFX237Y64F3DF
3D

3D
j3

Paper / Subject Code: 89285 I

TE (ro,'no I Sarn V t R. -t q
Srt
(3 80I

Instructions:
e C) I 23at
1) Attempt any Four question.
2) Ali question carries equal
3) Figures to the right indicate
4) Illustrate your answers
5) Assume suitable if it. .'i*.r

Q.l A) Discuss in

parts
Q.1 B) Explain
L
Q.2 A) IOT with (1

Q.2 B) the for a

A)
in IoT
Marks)
Q.3

A)
(10 Marks)

sub (10 Marks)


Q.4

and neat for Serial DNP3


IP ofa DNP3. (10 Marks)

Differentiate between
neat any of sensors and actuators with
of (10 Marks)

Q.6 characteristics of Smart object. Give


ln (10 Marks)

6B) short on-


IOT. (10 Marks)

ii) Benefits

Page 1 of I

2C4854 A85DC28O446DC2BCFEDD 1 F27 1 5


E5

0
4

17
9
15

8C
Paper / Subject Code: 89285 / Internet of Things (DLOC)

B7
A7

EA
51

4F

49
0D

7E

7
79
15

8C

A1
6A

9B
DA

51

4F

E
39

C4
7E

79
0

15
07

B
8
A

51
6
Time: 3 hours Max. Marks: 80

F
38

9
0D
39

C4
7E

15
00
========================================================================

07

F8
A

51
17

96
Instructions:

9
D

54
3

C4
E
EA

A0
00
1) Solve any FOUR questions.

A7
7

11

8
80
17
79

96

4F
2) All question carries equal marks.

E5
D
03
A
9B

A0

15
3) Figures to the right indicate full marks.

7
7
E

70

DA
80
C4

51
9

6
4) Assume suitable additional data, if necessary and clearly state it.

1
7

39
3

E
EA
9B
F8

A0
0

7
7

1
70
54

A
80
4

51
9

96
C

0D
B7
11

03

E
EA
F8

73
Q. 1 a) Discuss IOTWF Standardized Architecture. (5 M)

7
49

6A
E5

70
54

DA
80
79
b) Explain Raspberry Pi with diagram. (5 M)

1
A7

39
11

03
EA
9B
8

0
F

07
c) Describe Zigbee protocol stack using IEEE 802.15.4. (10 M)

6A
E5
0D

70
4

9
15

38
8C

1
7
7

39
6A

EA
9B
DA

0
51

00
F

6A
39

Q.2 a) What are gateways and backhaul sub layers? (5 M)

54

80
4
7E

17
79
A0

8C
07

39
1

03
EA
b) Briefly explain Adapting SCADA for IP. (5 M)

9B
A

1
96

4F
38

07
E5
D

70
4
c) What do you mean by SoC? Also explain its applications. (10 M)

79
3

15
00

38
8C

A1
7
07

9B
DA

1
17

00
96

F
8

9E
E5

4
03

4
EA

17
3

A0

15
Q.3 a) Describe various health & lifestyle domain specific IOT. (5 M)

8C

B7
7
7
70

EA
DA
0

1
79

4F
8

b) Explain the different pin/parts of Arduino Uno board. (5 M)

49
E5
A1

39
03
9B

79
0

15

8C
A7
07

c) Describe data vs. network analytics for an IoT network. (10 M)


9E

6A
70

9B
C4

51

4F
38
A1

0D
B7

C4
7E
F8

15
00

7
49

A
Q.4 a) Write short notes on BLE. (5 M)

F8
54

DA
80

51
17
9

96
8C

B7
11

54
03

7E
A

b) Differentiate between Sensors and actuators with neat diagram.


3

A0 (5 M)
4F

07
49

E
E5

11
0

DA
17
79

96
c) What is IoT? Explain IoT blocks in detail. List out the different IOT Challenges. (10 M)
15

8
8C

E5
A7

3
A
9B

73

A0
51

00
4F

A7
9E
0D

80
C4
7E

17

96
15

Q.5 a) Explain IOT Application layer with a neat diagram. (5 M)

0D
B7
6A

3
EA
8
DA

73
51

00
F

49

b) Discuss the concept of Edge computing. 6A (5 M)


39

54

80
7E

17
79
A0

8C
07

39
11

03

c) Explain MQTT. Compare - COAP and MQTT.


A
9B

(10 M)
DA
96

4F
38

07
E
E5

70
4

9
73

A0

15
00

38
C

A1
B7
A7

F8
80

51

00

Q.6 a) Describe Architecture of Wireless Sensor Network. (5 M)


96

49

9E
D

54
03

17
73

A0

b) Explain different Energy related IOTs Domain with example. (5 M)


8C

B7
A7

11
70

EA
80

96

4F

c) What are IOT software platform? Explain in short with an example. (10 M)
9
E5
A1

0D
03

C4

79
73

5
A7
9E

6A

11
70

9B
8
80

F
5
1

0D
B7

39

***********
54
03

C4
E
EA

A7
07

6A

11
70

F8
79

38

E5
A1

0D
9

54
9B

73
00

A7
9E

6A

11
80
C4

17

E5
0D
B7

39
03
EA
F8

A7
07
49

A
70
54

79

96
38
8C

A1

0D
9B

73
00
4F

9E

6A
80
C4

7
15

1
B7

39
03
EA
F8
51

07
49

70
54
7E

79

38
8C

A1
11

9B
DA

00
4F

9E
E5

C4

17
15

B7
A7

EA
F8
51

9
0D

54

C4
7E

79
6A

11

9B
F8
DA

E5
39

54

C4

27003
A0

A7
07

11

F8
96

E5
0D

54
73

A7

3807396A0DA7E51154F8C49B79EA1700
6A

11
80
Y
4X

7Y
4X
57
37
Paper / Subject Code: 89285 / Internet of Things (DLOC)

2F

23
Y3

2F
X2
57

7Y
4X
57
37
F4
Y3

23
Y3

2F
X2
72
37

4X
57
37
35

4
2F
X2

Y3

2F
X2
Y

7
7
F4

7
37
5

F4
3

5
Y3
2
72

Y3
X2
4X

2
57
37
35

57
37
F4
F

3
2
7Y

Y3
X2
7Y
4X

72
Time: 3 Hours Max. Marks: 80

5 7
23

37
35

F4
23
Y3

2F
4X

X2
7Y
4X

72
7
7

5
3
Instructions:

2F

35

F4
23
3

F
2

Y
4X

72
1) Attempt any Four question out of six questions.

57

7Y
4X

72
37

5
Y3

F
2) All question carries equal marks.

4
3
3

2F
2
2

Y3

2F
X2
Y
4X
7
37
3) Illustrate your answers with neat sketches wherever necessary.

57
7
35

57
37
4
23
2F
X2

4) Figures to the right indicate full marks.

Y3

2F
Y

Y3
X2
4X
7
7
F4

5) Assume suitable additional data, if necessary and clearly state it.

57
37
5
3

37
F4
Y3

2F
2
72

3
X2
6) All sub-questions of the same question should be grouped together.
4X

X2
Y

2
57
37
35

57
37
F4
F

F4
Y3
X2
7Y

3
3
2
2
7

X2
7Y
4X

72
7
37
5

Q.1 (a) What is IoT? Compare with suitable criterion between Operational
23

10

5
Y3

2F

35

F4
3
Y3

F
X2
4X

Technology (OT) and Information Technology (IT).

2
72
7
7

7Y
4X

72
37
5

F4
3
2F

(b) With suitable examples, explain the types of sensors used in IoT systems. 10

35
3
2

35
23
2F
2
Y
4X

72
57

7Y
X
37

7Y
4X
7
35

F4
Y3

Q.2 (a) Explain the Smart Things: architectural classification considering Layer 1

5
10

23
2
2

23
Y3

2F
7Y
4X

72
7
37

X
Things-Sensors and Actuators Layer.
35

4X
57
37
35

4
23
2F
X2

(b) Give the Categories of IoT application protocols and their transport 10
F
7Y

Y3

2F
X2
7Y
4X

72
7
F4

methods. Describe the factors should be considered when selecting a


5
3

57
37
5

F4
23
Y3

2F
2
72

Y3

transport layer for an IoT application layer protocol.


4X

Y3
X2
X

2
57
7
35

57
7
4
23
F

37
F4
3
Y3

2F
7Y

Y3
X2
X

Q.3 (a) Discuss the application of IoT in Cities. 10


7

X2
72
57
37
5

4
23

7
F4

(b) Compare with suitable factors Microsoft Azure IoT and Google Cloud IoT 10
Y3

2F

35

F4
3
Y3
X2
4X

X2
2

used as IoT Software platforms.


7
7

7Y

72
57
37
5

F4
3
2F

F4
Y3
2

35
23
3
2
4X

72
57

Y
X

72
37

7Y

Q.4 (a) Give the function of each layer of a seven-layer IoT architectural reference 10
4X
7
35

F4
Y3

5
3
2

model published by IoTWF architectural committee.


2

23
3

2F
2
Y
4X

72
7

7Y
4X
7
5

4X

(b) Explain the Enabling IoT Technologies. 10


7
35
23
3

5
23
F
7Y

72

2F
7Y
X

72

7Y
4X
5

4
23

57

Q.5 (a) Explain Gateways and Backhaul Sublayer considering Layer 2: 10


5
3
Y3

23
Y3

2F
X2
4X

72

Y3

Communications Network Layer in IoT.


7

4X
7
7
35

4
23
2F

37
5

(b) Give the key components of a SCADA system. Describe CoAP message 10
3
2F

Y3

2F
X2
Y
X

X2

fields.
7
37
F4

57
37
5

F4

F4
Y3
X2
72

Y3
X2
2

72
57

Q.6 (a) Describe the application of IoT in Environment. 10


7
5

F4

37
F4
3
Y3

35
3
X2

(b) Compare with suitable factors Particle Photon with ESP32 used for IoT 10
72

X2
7Y

72
37

7Y
35

application development.
F4

F4
3
X2

23
3
X2
Y

7Y

72
7
7

4X
35

F4
23

35
23

2F
7Y
4X

72

7Y
4X

57
5
23
F

23
3

2F
72

Y3
7Y
4X

4X
57

_________________________________
35

37
23
2F

2F
7Y

X2
7Y
4X
7

57
5

F4
23
Y3

2F

3
7Y
4X

72

55011
57
37

35
23
Y3

2F
2
4X

7Y
4X
57
37
2F

23
Y3

2F
X2
57

4X
57
37
F4

Y3

2F
X2
72

57

X237Y3572F4X237Y3572F4X237Y3572F4X237Y3572F4
37
35

F4

You might also like