0% found this document useful (0 votes)
8 views1 page

Assignment 2

The document outlines an assignment on IoT architecture and protocols, specifically focusing on 6LoWPAN, 6TiSCH, RPL, MQTT, and CoAP. It presents a series of questions related to each protocol that students must answer, covering topics such as connectivity, communication mechanisms, and security. The submission deadline for the assignment is April 15, 2025.

Uploaded by

dwij1209
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views1 page

Assignment 2

The document outlines an assignment on IoT architecture and protocols, specifically focusing on 6LoWPAN, 6TiSCH, RPL, MQTT, and CoAP. It presents a series of questions related to each protocol that students must answer, covering topics such as connectivity, communication mechanisms, and security. The submission deadline for the assignment is April 15, 2025.

Uploaded by

dwij1209
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Assignment-2

202046714: IOT Architecture & Protocols

Answer any three questions from following topics on 6LoWPAN, 6tTiSCH, RPL,MQTT and CoAP

6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks)


(1) How does 6LoWPAN enable IPv6 connectivity on resource-constrained devices?
(2) What are the key header compression techniques used in 6LoWPAN and how do they reduce overhead?
(3) What is the role of adaptation layer in 6LoWPAN architecture?
(4) How does 6LoWPAN handle packet fragmentation and reassembly?
(5) How does 6LoWPAN integrate with other IoT protocols in a complete stack?
6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4e)
(6) How does 6TiSCH combine IPv6 networking with the Time-Slotted Channel Hopping (TSCH) MAC layer?
(7) What are the mechanisms 6TiSCH uses to ensure deterministic communication?
(8) How does the 6TiSCH scheduling function work to allocate timeslots?
(9) What is the minimal 6TiSCH configuration and when is it applied?
(10) How does 6TiSCH address reliability and latency requirements in industrial IoT applications?
(11) What are the key di erences between 6TiSCH and traditional 6LoWPAN deployments?
RPL (Routing Protocol for Low-Power and Lossy Networks)
(12) How does RPL build and maintain Destination-Oriented Directed Acyclic Graphs (DODAGs)?
(13) What are the di erent RPL control messages (DIO, DAO, DIS) and their functions?
(14) How does RPL's Objective Function a ect routing decisions?
(15) What are the di erences between storing and non-storing modes in RPL?
(16) How does RPL handle mobility and network dynamics in IoT deployments?
(17) What are the main security vulnerabilities in RPL and how can they be mitigated?
MQTT (Message Queuing Telemetry Transport)
(18) How does MQTT's publish-subscribe model di er from traditional client-server communication?
(19) What are the di erent Quality of Service (QoS) levels in MQTT and when should each be used?
(20) How does MQTT broker handle client connections, subscriptions, and message distribution?
(21) What are the security mechanisms available in MQTT?
(22) What are di erent message types of MQTT?
(23) What are the implications of using MQTT in bandwidth-constrained environments?

CoAP (Constrained Application Protocol)


(24) How does CoAP implement REST principles in constrained environments?
(25) What are the di erences between CoAP's confirmable and non-confirmable messages?
(26) How does CoAP's observe option enable resource monitoring?
(27) What is the role of DTLS in securing CoAP communications?
(28) How does CoAP handle resource discovery?
(29) What are di erent message types of CoAP?
(30) What are the pros and cons of CoAP compared to MQTT for IoT applications?

Submission Date

15/4/2025

You might also like