CS8081-Internet of Things
CS8081-Internet of Things
com
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
QUESTION BANK
VII SEMESTER
CS8081-INTERNET OF THINGS
Regulation - 2017
Prepared by
QUESTION BANK
12. Give IoT Data Management and Compute Stack. Understand BTL-2
16. Analyze the purpose of Sensors, Actuators and Smart Objects. Analyze BTL-4
20. Formulate the communication criteria used for connecting smart objects. Create BTL-6
PART B
1. Describe the IoT enabling Technologies with suitable explanations. Understand BTL-2
2. Illustrate the oneM2M IoT standardized architecture and explain the Apply BTL-3
layers with neat diagram
3. Analyze in detail the Hierarchy followed in Edge, Fog and Cloud with Analyze BTL-4
suitable illustration.
4. (i) List the “things” in IoT and explain briefly. (6) Remember BTL-1
(ii) Describe the process of Connecting Smart Objects.(7)
5. Compare in detail the OneM2M IoT Architecture and IoTWF standardized Analyze BTL-4
reference model.
6. Summarize in detail IoT data management and Compute stack. understand BTL-2
13. Demonstrate the Simplified IoT Architecture and Core IoT Functional Apply BTL-3
Stack with neat diagram.
14. (i) Generalize the various enabling technologies of IoT. (7) Create BTL-6
(ii) Formulate the evolutionary trend of IoT with necessary illustration. (6)
PART C
1. Analyze the challenges and requirements faced by the IoT systems, Analyze BTL-4
which paved way to network architecture and compare the two best
known architecture supported by OneM2M and IoTWF.
2. Prepare a detailed analysis of smart objects and their architecture Create BTL-6
thereby elaborating the design limitations and role within IoT Networks.
3. Develop a narration on IoT Access technologies that plays a major role Create BTL-6
in market. Give suitable examples explaining the technologies.
4. Measure the different types of physical conditions for denoting the Evaluate BTL-5
various types of sensors and tabulate them.
UNIT II IoT PROTOCOLS
IoT Access Technologies: Physical and MAC layers, topology and Security of IEEE 802.15.4, 802.15.4g,
802.15.4e, 1901.2a, 802.11ah and LoRaWAN – Network Layer: IP versions, Constrained Nodes and
Constrained Networks – Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and
Lossy Networks – Application Transport Methods: Supervisory Control and Data Acquisition – Application
Layer Protocols: CoAP and MQTT
PART A
1. Define IEEE 802.15.4 Remember BTL-1
PART B
1. (i)Tabulate the protocol stacks utilizing IEEE 802.15.4. (5) Remember BTL-1
(ii) Describe on IEEE 802.15.4g and IEEE 802.15.4e. (8)
2. Analyze in detail LoRa WAN technology, illustrating the layers , MAC Analyze BTL-4
format and Architecture.
3. Compare and contrast the physical and MAC layers of IoT Access Evaluate BTL-5
technologies with suitable illustrations.
4. Discuss the following: Understand BTL-2
(i) Optimizing IP for IoT: (6)
(ii) Need for Optimization Constrained nodes and Networks. (7)
5. Examine the following with neat illustration Remember BTL-1
(i) 1901.2a, (6)
(ii) 802.11ah (7)
6. Demonstrate in detail about IP versions and Optimizing IP for IoT. Apply BTL-3
7. Summarize the Application Transport Methods: Supervisory Control and Understand BTL-2
Data Acquisition.
8. Describe about Application Layer Protocols: Remember BTL-1
(i) CoAP (7)
(ii) MQTT (6)
9. Tabulate the main characteristics of Access Technologies and the variation Remember BTL-1
in each of them.
10. Discuss in detail about Application transport method and Application layer Understand BTL-2
protocol.
11. Analyze in detail Supervisory Control and Data Acquisition with suitable Analyze BTL-4
illustration.
12. Demonstrate Routing over Low Power and Lossy Networks with Apply BTL-3
suitable explanation.
13. Generalize in detail about: Create BTL-6
(i) Optimizing IP for IoT (6)
(ii) 6LoWPAN to 6Lo (7)
14. Analyze Lossy Networks and RoLL in detail. Analyze BTL-4
PART C
1. Analyze in detail the IoT Application protocol and their characteristics Analyze BTL-4
with suitable illustration.
2. Prepare a brief report on IEEE 802.15.4, IEEE 802.15.4g and IEEE Create BTL-6
802.15.4e, IEEE 1901.2a, IEEE 802.11ah, LoRaWAN
3. Generalize in detail about Application transport method: SCADA and Create BTL-6
Application layer protocol: CoAP and MQTT
4. Explain in detail the need for optimization and Optimizing IP for IoT: Evaluate BTL-5
From 6LoWPAN to 6Lo,
UNIT III DESIGN AND DEVELOPMENT
Design Methodology - Embedded computing logic - Microcontroller, System on Chips - IoT system
building blocks - Arduino - Board details, IDE programming - Raspberry Pi - Interfaces and Raspberry Pi
with Python Programming.
PART A
1. List the steps involved in IoT Design methodology. Remember BTL-1
5. Differentiate functional view and operational view of IoT Design Understand BTL-2
methodology.
6. Examine the integration of device and component in IoT design Apply BTL-3
methodology.
7. Compare sensors and actuators. Analyze BTL-4
18. Summarize on other IoT devices apart from Raspberry Pi. Evaluate BTL-5
20. List the essential requirements for setting up Raspberry Pi. Remember BTL-1
PART B
1. Demonstrate the key steps involved in IoT Design methodology, explain BTL-3
Apply
the steps involved in
2. (i) Summarize in detail about embedded computing. (6)
Evaluate BTL-5
(ii) Explain the microcontroller and chips involved in embedded devices.
(7)
3. Formulate on python programming for Raspberry Pi. BTL-6
Create
4. Discuss in detail the use of embedded computing in the design of IoT BTL-2
Understand
Sysems.
5. (i) Analyze in detail an exemplary device: Raspberry Pi. (6) BTL-4
Analyze
(ii) Explain in detail the Raspberry Pi interfaces. (7)
6. Illustrate the arduino board details and explain the steps for installing the BTL-3
Apply
board.
7. Discuss in detail the building blocks of IoT and its functionalities with Understand BTL-2
suitable illustration.
8. (i) List the IoT design methodology. (6) Remember BTL-1
(ii) Examine the building blocks of IoT. (7)
9. Describe the steps for designing IoT system with neat diagram. Remember BTL-1
10. (i) Examine the process of using the Integrated Development Environment
(IDE) to prepare an Arduino sketch. (7)
Remember BTL-1
(ii) Describe the steps for setting up of arduino board. (6)
11. Define IoT device and give a detailed narration of IoT device example in
Remember BTL-1
real world applications.
12. Discuss in detail the Interfacing LED and switch with Raspberry Pi as an
Understand BTL-2
example. Give the procedure.
13. Analyze the software and hardware features of Arduino board and explain
Analyze BTL-4
the procedure to install IDE.
14. Analyze the embedded computing logic and use of microcontroller in
Analyze BTL-4
embedded system with neat diagram.
PART C
1. Analyze in detail the design methodology used to implement IoT Devices, Analyze BTL-4
explain the level wise design steps with neat diagram.
2. Pointout some examples that define IoT devices and explain in brief the Evaluate BTL-5
basic building block and layers in IoT system with diagram.
3. Analyze and explain in detail Programming Raspberry Pi with python by Analyze BTL-4
giving suitable example. Also elaborate on Raspberry Pi interfaces.
4. Design a basic arduino board and explain the procedure for installing and Create BTL-6
setting up of IDE.
UNIT IV DATA ANALYTICS AND SUPPORTING SERVICES
Structured Vs Unstructured Data and Data in Motion Vs Data in Rest – Role of Machine Learning – No
SQL Databases – Hadoop Ecosystem – Apache Kafka, Apache Spark – Edge Streaming Analytics and
Network Analytics – Xively Cloud for IoT, Python Web Application Framework – Django – AWS for IoT
– System Management with NETCONF-YANG.
PART A
1. Define Machine Learning. Remember BTL-1
14. Demonstrate the use of Xively cloud for IoT. Apply BTL-3
15. Examine the role of Python Web application framework – Django. Apply BTL-3
PART B
1. Explain in detail the need of Data Analytics for IoT and brief the Analyze BTL-4
challenges faced by IoT Data Analytics.
2. Discuss in detail about Understand BTL-2
(i) Role of Machine Learning in IoT. (6)
(ii) NoSQL Databases. (7)
3. Describe in detail about Hadoop ecosystem and the two key components Remember BTL-1
with suitable illustration.
4. Compare in detail about Apply BTL-3
(i) Structured Vs Unstruct ured Data. (6)
(ii) Data in Motion Vs Data in Rest. (7)
5. Evaluate the necessity of Apache Kafka and Apache Spark with diagram. Evaluate BTL-5
6. Express in detail Edge streaming analytics and compare it with data Understand BTL-2
analytics. Also give the functions of Edge analytics.
7. Examine the need for Network Analytics and discuss on flexible Netflow Remember BTL-1
Architecture.
8. 1. Discuss in detail about Xively cloud for IT and Illustrate Xively dashboard Understand BTL-2
device details.
9. Examine the Python Web Application framework – Django architecture Apply BTL-3
and steps to develop a django project.
10. Generalize the purpose of Amazon Web service for IoT. Create BTL-6
11. Analyze the role of various components of NETCONF-YANG and steps Analyze BTL-4
for IoT device Management with NETCONF-YANG.
12. Discuss the key components of hadoop ecosystem : HDFS and Mapreduce. Remember BTL-1
PART C
1. Generalize in detail about Apache spark and Apache kafka with data flow Create BTL-6
diagram.
2. Analyze in detail about Data Analytics in IoT and the role of Machine Analyze BTL-4
Learning with suitable illustration.
3. Evaluate the working of Xively Cloud dashboard device for IoT by giving Evaluate BTL-5
suitable necessary explanation.
4. Generalize the purpose of Python Web Application Framework – Django Create BTL-6
and Amazon Web service for IoT.
PART A
8. Relate the use of blockchain services in IBM Watson IoT platform. Apply BTL-3
10. Compose the three stages of power supply-chain in power utility industry. Create BTL-6
12. Infer how IoT data are Securely connected, managed and analysed. Analyze BTL-4
14. Tell the challenges that become even more evident as the IT and OT Remember BTL-1
networks become interconnected.
15. Give the benefits provided by The GridBlocks reference architecture to Understand BTL-2
utility operators.
16. Discuss any one usecase of smart applications of IoT. Understand BTL-2
18. Express why LED technology is used in street lighting? Understand BTL-2
PART B
1. Analyze the purpose of the Six-Pillar Approach for Cisco IoT System also Analyze BTL-4
explain the security framework.
2. Examine the Features of IBM Watson IoT platform, and brief on the Remember BTL-1
services provided in it.
3. (i) Describe an IoT strategy for connected Manufacturing. (6) Remember BTL-1
(ii) Examine the architecture for connected factory. (7)
4. Analyze in detail the architecture of Converged Plantwide Ethernet Model Analyze BTL-4
with suitable illustration.
(i)5. Examine the challenges faced for parking in cities, and explain how smart Remember BTL-1
parking provides a solution to this.
6. (i) Demonstrate the use of Power Utility Industry. (7) Apply BTL-3
(ii) Examine the IT/OT divide in Utilities. (6)
7. Illustrate the 11-Tiered Reference Architecture of Grid Blocks and the use Apply BTL-3
of reference model.
8. (i) Summarize in detail the architecture model of CPwE. (7) Understand BTL-2
(ii) Discuss on design and implementation guidance of CPwE. (6)
9. Summarize on the solution for smart lighting and explain street lighting Evaluate BTL-5
architecture in detail.
10. (i) Generalize an IoT strategy for smart city. (6) Create BTL-6
(ii) Design an smart city layered architecture and explain how security
is provided. (7)
11. Discuss the features of Cisco IoT System and explain the components and Understand BTL-2
security involved in it.
12. Describe the architecture of smart traffic control architecture and explain Understand BTL-2
the applications of smart traffic.
13. Analyze the grid block reference model and the reference architecture with Analyze BTL-4
suitable illustration.
14. (i) Define any one usecse example of smart city examples. (6) Remember BTL-1
(ii) Describe the smart city security architecture. (7)
PART C
1. Analyze the IoT platform designed by IBM Watson, explain what it can do Analyze BTL-4
to your business, and infer how IoT data are securely connected, managed
and analyzed.
2. Prepare an IoT strategy for smart city and design the layered architecture Create BTL-6
for implementing smart cities.
3. Consider any use case example of smart applications of IoT, explain the Evaluate BTL-5
architecture and technology need in building the application.
(i)4. Formulate an Industrial application of IoT system and brief on the various Create BTL-6
usecase of smart and connected cities.