Question Bank IoT Architecture and Protocols.docx-1
Question Bank IoT Architecture and Protocols.docx-1
Unit 1:
1. What communication protocols are used in your IoT architecture?
2. Can you justify the role of data management in IoT architecture?
3. What are the technical design constraints for the implementation of IoT Architecture.
4. Why Privacy and security are main concern for any IoT Application?
5. What do you mean by Everything as a Service (XaaS)?
6. If a device has addressing size of 8 bits in the binary form (0,1), then what is the value of possible
addresses.
7. Explain LAN, HAN, NAN, FAN and WAN.
8. Compare the different type of communication protocols used WAN.
9. What are the selection criteria involved for IoT communication protocols?
10. Discuss the challenges and solutions associated with enabling seamless M2M interactions.
11. What Processors are used in your IoT architecture?
12. Can you justify the role of data privacy and security in IoT architecture?
13. Explain the role of Machine-to-Machine (M2M) communication in IoT networks with an example
Unit 2:
1. Compare and contrast the Functional View and Information View in software architecture.
2. Explain the importance of considering Deployment and Operational Views in the early stages of
system design.
3. Discuss the role of Deployment View in ensuring the scalability and reliability of a software
system.
4. What is the primary purpose of the Functional View in software architecture?
5. Define the term "Logical" in the context of IoT architecture.
6. Briefly explain the significance of Real-World Design Constraints in system design.
7. What are the roles of functional and information view of the IoT?
8. Explain Publish/Subscribe model for information exchange in IoT.
9. What are the roles of operational and information view of the IoT?
10. Explain Request/Response model for information exchange in IoT.
11. What is the purpose of perception layer in IoT Architecture.
12. What is the purpose of network layer in IoT Architecture.
13. What is the purpose of application layer in IoT Architecture.
Unit 3:
1. What do you mean by routing and encapsulation protocols?
2. Explain IEEE 802.11 and IEEE 802.15 data link layer protocols.
3. Explain slot frame structure for IEEE 802.11 protocol.
4. What do you mean by Time Division Multiple Access in Wireless HART data link layer protocol?
5. Draw and explain Wireless HART and Z-wave data link layer protocols.
6. What do you mean by DASH7 protocol.
7. Compare IPV4 and IPV6 network layer protocols.
8. Explain 6LoWPAN protocol.
9. Explain Routing Protocol for Low-Power and Lossy Networks (RPL).
10. Explain RPL, CORPL and CARP.
11. What are the advantages of LTE communication over 4G.
12. Explain the working principle of RFID protocol and write some examples of that.
13. What do you mean by Inquiry, Paging and Connection stages for Bluetooth connectivity for data
sharing.
14. What are the advantages of Zigbee communication over Bluetooth.
15. Explain the working principle of NFC protocol and write some examples of that.
16. What is the mode of operations for Bluetooth connectivity for data sharing.
17. Compare the WirelessHART and ZWave protocols in the IoT data link layer.
Unit 4:
1. What do you mean by IoT transport & session layer protocols?
2. Explain Transport Layer (TCP,UDP)-(TLS, DTLS) protocols.
3. Explain CoAP and XMPP application layer protocol.
4. Explain MQTT application layer protocol
5. Explain AMQP application layer protocol.
6. Compare AMQP and MQTT application year protocols.
7. What is the role of broker and subscribers in MQTT.
8. What is the role of broker and subscribers in AMQP.
9. Compare IoT transport Layer protocols.
10. Explain confirmable, non-confirmable, separate and piggyback messaging mode.
Unit 5:
1. What does oneM2M stand for, and what is its primary role in IoT architecture?
2. Define the term "MAC802.15.4" and explain its significance in IoT communication.
3. Briefly describe the Service Layer in the context of oneM2M.
4. Discuss the importance of security considerations in the MAC802.15.4 protocol for IoT devices.
5. What are the restrictions for Routing Protocol for Low Power and Lossy Networks.
6. Explore the significance of the Service Layer in ensuring interoperability in heterogeneous IoT
environments.
7. Discuss the importance of security protocols in IoT.
8. Explain the concept of 6LoWPAN and its role in enabling IPv6 communication in IoT networks.
9. Compare the advantages and disadvantages of RPL as a routing protocol in IoT networks.
10. Investigate the role of the Application Layer in supporting diverse IoT applications, including
smart homes.
11. Investigate the role of the Application Layer in supporting diverse IoT applications, including
smart health care.
12. Investigate the role of the Application Layer in supporting diverse IoT applications, including
smart transportation.
13. Investigate the role of the Application Layer in supporting diverse IoT applications, including
smart industry.