0% found this document useful (0 votes)
7 views15 pages

IAT-I Solution

The document outlines an internal assessment test for the Internet of Things course, detailing various topics such as network topologies, TCP/IP communication, the OSI model, IoT connectivity terminologies, and the characteristics of IoT systems. It includes questions on classifying network types, explaining network communication, and discussing IoT features. The assessment is structured to evaluate students' understanding of these concepts within a 90-minute timeframe.

Uploaded by

hereisazeem47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views15 pages

IAT-I Solution

The document outlines an internal assessment test for the Internet of Things course, detailing various topics such as network topologies, TCP/IP communication, the OSI model, IoT connectivity terminologies, and the characteristics of IoT systems. It includes questions on classifying network types, explaining network communication, and discussing IoT features. The assessment is structured to evaluate students' understanding of these concepts within a 90-minute timeframe.

Uploaded by

hereisazeem47
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

USN

Internal Assessment Test 1 – Oct 2023


Sub: Internet of Things Sub Code: 22ETC15H Branch:
Date: 3/10/2023 Duration: 90 min’s Max Marks: 50 Sem/Sec: I / A, B, C, D, E, F and G OBE
Answer any FIVE FULL Questions MARKS CO RBT
1 Classify network types based on physical topologies and connection types with 10 CO1 L2
schematic diagrams.

PHYSICAL TOPOLOGY
Computer networks can have the following four broad topologies—: Star, Mesh,
Bus, and Ring.
1) Star:
In a star topology, every host has a point-to-point link to a central controller or hub.
The hosts communicate with one another indirectly through the central hub. The
hub acts as the network traffic exchange.

The main advantages of the star:


1. Easy installation and fault identification within the network.

The main disadvantage:

–If the hub fails, the whole network fails.

2) Mesh:
In a mesh topology, every host is connected to every other host using a dedicated
link (in a point-to-point manner). This implies that for n hosts in a mesh, there are
a total of 𝑛(𝑛 − 1)/2 dedicated full duplex links between the hosts.
Advantages of Mesh Network
1.Robustness and Resilience of the system. Security and Privacy of the traffic as the
data is only seen by the intended recipients and not by all members of the network.

2.
Disadvantages of Mesh Network
The mesh topology is quite expensive. Mesh networks are used very selectively,
such as in backbone networks.

3) Bus:
A bus topology follows the point-to-multipoint connection. A backbone cable or
bus serves as the primary traffic pathway between the hosts. The hosts are connected
to the main bus employing drop lines or taps.
There is a restriction on the length of the bus and the number of hosts that can be
simultaneously connected to the bus due to signal loss over the extended bus.

Advantage:
Fault identification and set up of the bus topology is quite simple and
straightforward.
Disadvantage:
The topology is the difficulty in fault localization within the network.

4) Ring:

A ring topology works on the principle of a point-to-point connection. Here, each


host is configured to have a dedicated point-to-point connection with its two
immediate neighboring hosts on either side of it through repeaters at each host. The
repetition of this system forms a ring. The repeaters at each host capture the
incoming signal intended for other hosts, regenerates the bit stream, and passes it
onto the next repeater.

Advantage:
Fault identification and set up of the ring topology is quite simple and
straightforward.
Disadvantage:
The system has the high probability of a single point of failure. If even one
repeater fails, the whole network goes down.
2 Types based on connection type:
Connection types: Depending on the way a host communicates with other hosts;
computer networks are of two types: Point-to-point and Point-to-multipoint.

Point-to -point: Point-to-point connections are used to establish direct


connections between two hosts. Day-to-day systems such as a remote control
for an air conditioner or television is a point-to-point connection, where the
connection has the whole channel dedicated to it only.

Point-to-multipoint: In a point-to-multipoint connection, more than two


hosts share the same link. This type of configuration is similar to the one-to-
many connection type. Point-to-multipoint connections find popular use in
wireless networks and IP telephony

2 Explain networked communication between two hosts following the TCP/IP suite
with a block diagram.

the Internet protocol suite predates the OSI model and provides only four levels
of abstraction:

1) Link layer, 2) Internet layer, 3) transport layer, and 4) application layer. This
collection of protocols is commonly referred to as the TCP/IP protocol suite as
the foundation technologies of this suite are transmission control protocol (TCP)
and Internet protocol (IP).
Figure 4: Networked communication between two hosts following the TCP/IP suite.

i.Link Layer: The first and base layer of the TCP/IP protocol suite is also known
as the network interface layer. This layer is synonymous with the collective physical
and data link layer of the OSI model. It enables the transmission of TCP/IP packets
over the physical medium. According to its design principles, the link layer is
independent of the medium in use, frame format, and network access, enabling it to
be used with a wide range of technologies such as the Ethernet, wireless LAN, and
the asynchronous transfer mode (ATM).

ii.Internet Layer: Layer 2 of the TCP/IP protocol suite is somewhat synonymous


to the network layer of the OSI model. It is responsible for addressing, address
translation, data packaging, data disassembly and assembly, routing, and packet
delivery tracking operations. Some core protocols associated with this layer are
address resolution protocol (ARP), Internet protocol (IP), Internet control message
protocol (ICMP), and Internet group management protocol (IGMP). Traditionally,
this layer was built upon IPv4, which is gradually shifting to IPv6, enabling the
accommodation of a much more significant number of addresses and security
measures.

iii.Transport Layer: Layer 3 of the TCP/IP protocol suite is functionally


synonymous with the transport layer of the OSI model. This layer is tasked with the
functions of error control, flow control, congestion control, segmentation, and
addressing inv an end-to-end manner; it is also independentof the underlying
network. Transmission control protocol (TCP) and user datagram protocol (UDP)
are the core protocols upon which this layer is built, which in turn enables it to have
the choice of providing connection-oriented or connectionless services between two
or more hosts or networked devices.

iv. Application Layer: The functionalities of the application layer, layer 4, of the
TCP/IP protocol suite are synonymous with the collective functionalities of the OSI
model’s session, presentation, and application layers. This layer enables an end-user
to access the services of the underlying layers and defines the protocols for the
transfer of data. Hypertext transfer protocol (HTTP), file transfer protocol (FTP),
simple mail transfer protocol (SMTP), domain name system (DNS), routing
information protocol (RIP), and simple network management protocol (SNMP) are
some of the core protocols associated with this layer.

3 What is the ISO-OSI model? Discuss the highlights of the seven layers of the 10 CO1 L2
OSI stacks.
Solution:
● OSI stands for Open Systems Interconnection. It was developed by ISO –
‘International Organization for Standardization’, in the year 1984.
● It is a 7-layer architecture with each layer having specific functionality to
perform. All these 7 layers work collaboratively to transmit the data from
one person to another across the globe.
OSI Layered Network Models:

1. Physical Layer: PDU (bit/byte)


● It is responsible for the actual physical connection between the devices.
● The physical layer contains information in the form of bits.
● The functions of the physical layer are bit synchronization, bit rate control.

2. Data Link Layer (DLL) :PDU (Data)


● The data link layer is responsible for the node-to-node delivery of the message.
● The main function of this layer is to make sure data transfer is error-free from
one node to another, over the physical layer.
● Data Link Layer is divided into two sub layers: Logical Link Control (LLC)
Media Access Control (MAC)
• The functions of the Data Link layer are : Framing: Physical addressing, Error
control, Flow Control, Access control.

3. Network Layer:
● The network layer works for the transmission of data from one host to the other
located in different networks.
● It also takes care of packet routing i.e. selection of the shortest path to transmit
the packet, from the number of routes available.
● The sender & receiver’s IP addresses are placed in the header by the network layer.
● The functions of the Network layer are : Routing: Logical Addressing:

4. Transport Layer:
● The data in the transport layer is referred to as Segments.
● The transport layer also provides the acknowledgement of the successful data
transmission and re-transmits the data if an error is found.
● Deals with Flow & Error control to ensure proper data transmission as well as
segmentation and reassembly:
● Two protocols work at the layer are TCP and UDP.

5. Session Layer:
● This layer is responsible for the establishment of connection, maintenance of
sessions, authentication, and also ensures security.
● The functions of the session layer are : Session establishment, maintenance, and
termination: Synchronization: Dialog Controller:
6. Presentation Layer:
● The data from the application layer is extracted here and manipulated as per the
required format to transmit over the network.
● The functions of the presentation layer are : Translation: Encryption/ Decryption:
Compression:
7. Application Layer:
● This layer serves as a window for the application services to access the network
and for displaying the received information to the user.
● The functions of the Application layer are : FTAM-File transfer access and
management Mail Services Directory Services
4 What are the various IoT connectivity terminologies? 10 CO L2
Solution: 1
IoT connectivity is the means by which an IoT device, which can be anything
from a simple sensor in a factory to a self-driving vehicle and encompasses
applications from streetlights to robots, connects to the cloud, other devices and
integration points such as IoT gateways.It is the IoT connectivity that brings value
from IoT by communicating their data to enable action to be taken, services to be
delivered and revenue generated
1. Ethernet

The Ethernet is defined as the type of system that is used for reliably connecting the
things to form the local area network. The systems are connected via the internet to
form the cluster. The Ethernet system is mostly used in organizations, buildings,
offices, and many other places. The Ethernet combines several nodes to a similar
network. As the systems are connected by the hardwire therefore no issue of security
in Ethernet.

2. Wi-Fi

The Wi-Fi is another wireless system that is used for providing internet services to
the devices. In the Wi-Fi system, the dependency of the hard-wiring system is not
there and the communication is done wireless. The Wi-Fi technology is
comparatively faster to Ethernet. From the wi-fi system, all types of devices like
smartphones, computers, laptops, and other systems can easily be connected to the
internet and can also communicate among themselves without the use of any wire
but in a certain area. The Wi-Fi system is the most used frequent technology for
wireless communication as the hotspots are created for device connection.

3. LPWAN

The full form of LPWAN is Low power wide area network.The range for the
LPWAN system is around 10 KM. The rate of data transfer is often slow but if the
requirement is not there a high-speed internet is not required. The major area of use
of this device is in remote and agricultural applications.

4. Cellular

The cellular is the most prominent technology that is used to cover all the areas as
the coverage area of cellular technology is vast. The cost of the cellular system is
comparatively higher to other systems but for a long-range, the cellular system is the
best option. The user needs to get the services from the provider as own network
cannot be established and it requires a government license. The benefits provided by
the cellular system compensate for the price of cellular technology. An example of
an IoT cellular network can be LTE. As the world is heading towards 5G technology,
IoT technology will evolve very fast. The cellular network is a type of
communication network in which the final link is always wireless as the customer
phone is connected with the network wirelessly. The cellular network enables the
facility for the user to call someone, send text messages, and use other services very
easily using the cellular network.
5. Satellite

As the cellular network is used for covering maximum are but when there is the
requirement to cover the desolate areas the satellite system is used. The satellite
system is used for IoT applications like shipping logistics. The satellite provides
signals to ship to navigate in the sea. The satellite system is not accessible for a
normal person as the system is very costly and can be afforded by large organizations
only. The satellite system is also used by the defense system as they require signals
from all over the globe.

6. Bluetooth

Bluetooth is another type of wireless medium that has a very small range of around
100 meters. Bluetooth is used in connecting phones with laptops or with speakers
and other devices. The power consumption for Bluetooth technology is very less
compared to other systems. As the technology is evolving daily the range of
Bluetooth is getting extended in the next version of the system.
5 Summarize the characteristic features of IoT systems. 10 CO L3
2
Solutions:

The Internet of Things (IoT) is the network of physical objects that contain
embedded technology to communicate and sense or interact with their internal
states or the external environment.

Figure 6: The three characteristic features-anytivme, anywhere, and anything-


highlight the robustness and dynamic nature of IoT.
IoT is an anytime, anywhere, and anything-network of Internet-connected
physical devices or systems capable of sensing an environment and affecting the
sensed environment intelligently. This is generally achieved using low-power
and low-form-factor embedded processors on-board the “things” connected to
the Internet. In other words, IoT may be considered to be made up of connecting
devices, machines, and tools; these things are made up of sensors/actuators and
processors, which connect to the Internet through wireless technologies.

OR

The Internet of Things (IoT) is characterized by the following key features that are
mentioned below.
1. Connectivity
Connectivity is an important requirement of the IoT infrastructure. Things of IoT
should be connected to the IoT infrastructure. Anyone, anywhere, anytime can
connect, this should be guaranteed at all times. For example, the connection
between people through Internet devices like mobile phones, and other gadgets,
also a connection between Internet devices such as routers, gateways, sensors, etc.
2. Intelligence and Identity

The extraction of knowledge from the generated data is very important. For
example, a sensor generates data, but that data will only be useful if it is interpreted
properly. Each IoT device has a unique identity. This identification is helpful in
tracking the equipment and at times for querying its status.

3. Scalability

The number of elements connected to the IoT zone is increasing day by day.
Hence, an IoT setup should be capable of handling the massive expansion. The
data generated as an outcome is enormous, and it should be handled appropriately.

4. Dynamic and Self-Adapting (Complexity)

IoT devices should dynamically adapt themselves to changing contexts and


scenarios. Assume a camera meant for surveillance. It should be adaptable to work
in different conditions and different light situations (morning, afternoon, and
night).

5. Architecture

IoT Architecture cannot be homogeneous in nature. It should be hybrid, supporting


different manufacturers ‘ products to function in the IoT network. IoT is not owned
by any one engineering branch. IoT is a reality when multiple domains come
together.

6. Safety

There is a danger of the sensitive personal details of the users getting compromised
when all his/her devices are connected to the internet. This can cause a loss to the
user. Hence, data security is the major challenge. Besides, the equipment involved
is huge. IoT networks may also be at risk. Therefore, equipment safety is also
critical.

7. Self Configuring

This is one of the most important characteristics of IoT. IoT devices are able to
upgrade their software in accordance with requirements with a minimum of user
participation. Additionally, they can set up the network, allowing for the addition
of new devices to an already-existing network.

8. Interoperability

IoT devices use standardized protocols and technologies to ensure they can
communicate with each other and other systems. Interoperability is one of the key
characteristics of the Internet of Things (IoT). It refers to the ability of different
IoT devices and systems to communicate and exchange data with each other,
regardless of the underlying technology or manufacturer.
9. Embedded Sensors and Actuators

Embedded sensors and actuators are critical components of the Internet of Things
(IoT). They allow IoT devices to interact with their environment and collect and
transmit data.

10. Autonomous operation

Autonomous operation refers to the ability of IoT devices and systems to operate
independently and make decisions without human intervention. This is a crucial
characteristic of the Internet of Things (IoT) and enables a wide range of new
applications and services.

11. Data-driven

Data-driven is a key characteristic of the Internet of Things (IoT). IoT devices and
systems collect vast amounts of data from sensors and other sources, which can be
analyzed and used to make data-driven decisions.
In IoT systems, data is collected from embedded sensors, actuators, and other
sources, such as cloud services, databases, and mobile devices. This data is used
to gain insights into the environment, improve operational efficiency, and make
informed decisions.

12. Security

Security is a critical concern for the Internet of Things (IoT), as IoT devices and
systems handle sensitive data and are connected to critical infrastructure. The
increasing number of connected devices and the amount of data being transmitted
over the Internet make IoT systems a prime target for cyberattacks.

13. Ubiquity

Ubiquity refers to the widespread and pervasive presence of the Internet of Things
(IoT) devices and systems in our daily lives. The goal of IoT is to create a seamless
and interconnected world where devices and systems can communicate and share
data seamlessly and transparently.

14. Context Awareness

Context awareness refers to the ability of Internet of Things (IoT) devices and
systems to understand and respond to the environment and context in which they
are operating. This is achieved through the use of sensors and other technologies
that can detect and collect data about the environment.
6 Explain the IoT planes, various enablers of IoT, and the complex 10 CO L2
interdependencies among them with a block diagram. 2
Solution:
IoT is a paradigm built upon complex interdependencies of technologies (both
legacy and modern), which occur at various planes. we can divide the IoT
paradigm into four planes: services, local connectivity, global connectivity, and
processing. The complex interdependencies among these planes is as shown in
figure below:
.

1)
The service plane is composed of two parts: 1) things or devices and 2)
low-power connectivity. The things may be wearables, computers,
smartphones, household appliances, smart glasses, factory machinery,
vending machines, vehicles, UAVs, robots, and other such contraptions
(which may even be just a sensor). The immediate low-power
connectivity, which is responsible for connecting the things in local
implementation, may be legacy protocols such as WiFi, Ethernet, or
cellular. In contrast, modern- day technologies are mainly wireless and
often programmable such as Zigbee, RFID, Bluetooth, 6LoWPAN,
LoRA, DASH, Insteon, and others. The range of these connectivity
technologies is severely restricted; they are responsible for the
connectivity between the things of the IoT and the nearest hub or gateway
to access the Internet.
2) The local connectivity plane is responsible for distributing Internet
access to multiple local IoT deployments. Services such as address
management, device management, security, sleep scheduling, and others
fall within the scope of this plan. “edge computing” paradigm is deployed
in conjunction with these first two planes: services and local connectivity
3) Plane of global connectivity plays a significant role in enabling IoT in the
real sense by allowing for worldwide implementations and connectivity
between things, users, controllers, and applications. This plane also falls
under the purview of IoT management as it decides how and when to store
data, when to process it, when to forward it, and in which form to forward
it.The Web, data-centers, remote servers, Cloud, and others make up this
plane. The paradigm of “fog computing” lies between the planes of local
connectivity and global connectivity.
4) The final plane of processing can be considered as a top-up of the basic
IoT networking framework. The members in this plane may be termed as
IoT tools, simply because they wring-out useful and human-readable
information from all the raw data that flows from various IoT devices and
deployments. Various computing paradigms such as “big data”, “machine
Learning”, and others, fall within the scope of this domain.

7 Discuss the evolution of IoT and provide some IoT Applications in Real Time.

The IoT, as we see it today, is a result of a series of technological paradigm shifts


over a few decades. The technologies that laid the foundation of connected systems
by achieving easy integration to daily lives, popular public acceptance, and
massive benefits by using connected solutions can be considered as the founding
solutions for the development of IoT.

Figure 7: The sequence of technological developments leading to the shaping of


the modern- day IoT.

ATM: ATMs or automated teller machines are cash distribution machines, which
are linked to a user’s bank account. ATMs dispense cash upon verification of the
identity of a user and their account through a specially coded card. These ATMs
were ubiquitous money dispensers. The first ATM became operational and
connected online for the first time in 1974.

Web: World Wide Web is a global information sharing and communication


platform. The Web became operational for the first time in 1991. Since then, it has
been massively responsible for the many revolutions in the field of computing and
communication.

Smart Meters: The earliest smart meter was a power meter, which became
operational in early 2000. These power meters were capable of communicating
remotely with the power grid. They enabled remote monitoring of subscribers’
power usage and eased the process of billing and power allocation from grids.

Connected Healthcare: Here, healthcare devices connect to hospitals, doctors, and


relatives to alert them of medical emergencies and take preventive measures.

Connected Vehicles: Connected vehicles may communicate to the Internet or with


other vehicles, or even with sensors and actuators contained within it. These
vehicles self-diagnose themselves and alert owners about system failures.

Smart Cities: This is a city-wide implementation of smart sensing, monitoring, and


actuation systems. The city-wide infrastructure communicating amongst
themselves enables unified and synchronized operations and information
dissemination. Some of the facilities which may benefit are parking,
transportation, and others.

Smart Dust: These are microscopic computers. Smaller than a grain of sand each,
they can be used in numerous beneficial ways, where regular computers cannot
operate. For example, smart dust can be sprayed to measure chemicals in the soil
or even to diagnose problems in the human body.
Smart Factories: These factories can monitor plant processes, assembly lines,
distribution lines, and manage factory floors all on their own. The reduction in
mishaps due to human errors in judgment or unoptimized processes is drastically
reduced.
UAVs: UAVs or unmanned aerial vehicles have emerged as robust public domain
solutions tasked with applications ranging from agriculture, surveys, surveillance,
deliveries, stock maintenance, asset management, and other tasks.

RealTime IoT applications: Smart Agriculture, Smart Connected Healthcare,


Smart Energy Management, Smart home/home automation, IoT in Traffic
Management and Road Toll Collection etc.

You might also like