Iot Architecture and Protocols Kot 601

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Printed Pages:2 Sub Code: KOT-601

Paper Id: 236560 Roll No.

B. TECH
(SEM VI) THEORY EXAMINATION 2022-23
IOT ARCHITECTURE AND PROTOCOLS
Time: 3 Hours Total Marks: 100
Note: Attempt all Sections. If require any missing data; then choose suitably.

SECTION A

1. Attempt all questions in brief. 2 x 10 = 20


(a) Give an outline of IoT architecture.
(b) Explain Everything as a Service (Xaas).
(c) What is the difference between functional & Information view.
(d) What is the requirement of IoT protocol standardization?
(e) Why do IoT system have to be self-adapting and self-configuring?
(f) Explain WirelessHART.
(g) What is Zigbee?
(h) Explain Constrained Application Protocol (CoAP).
(i) Explain the different characteristics of IoT.
90

6
22
(j) How RPL is useful in IoT implementation?
_2

3.
P1

11
SECTION B
3E

0.
2. Attempt any three of the following: 10x3=30

.2
P2

(a) Why security required in IoT? Explain in detail various security in IoTs.
25
(b) How does M2M relate to IoT? Discuss the differences between these two in
Q

detail.
|1
(c) Write in detail business model scenario for Internet of Things.
7

(d) Explain Real-World & Technical Design constraints in detail.


:0

(e) Explain Transport & Session Layer protocols.


: 55

SECTION C
08

3. Attempt any one part of the following: 10x1=10


3
02

(a) Explain the main design principles and needed capabilities of IOT.
(b) Explain the application of IoT in home automation systems.
-2
06

4. Attempt any one part of the following: 10x1=10


9-

(a) Explain MQTT protocol with example. Discuss the role of MQTT protocol in
|1

IOT?
(b) Explain IoT reference model & architecture in detail.

5. Attempt any one part of the following: 10x1=10


(a) Explain IoT Data Link & Network Layers protocol in detail.
(b) Explain 6LoWPAN and its type in detail.

QP23EP1_290 | 19-06-2023 08:55:07 | 125.20.113.226


6. Attempt any one part of the following: 10x1=10
(a) List layers of IoT protocol stack. Discuss the disadvantages of IoT?
(b) What is identity management in Internet of Things? Explain any two identity
management techniques of IoT.

7. Attempt any one part of the following: 10x1=10


(a) Explain XMPP and AMQP protocols.
(b) Write a short note on:
(i) MAC 802.15.4
(ii) Application Layer

90

6
22
_2

3.
P1

11
3E

0.
.2
P2

25
Q

|1
7
:0
: 55
08
3
02
-2
06
9-
|1

QP23EP1_290 | 19-06-2023 08:55:07 | 125.20.113.226

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy