IoT 2M Answers
IoT 2M Answers
IoT 2M Answers
• The MAC layer of IEEE 802.15.4 defines various protocols and mechanisms for
channel access, addressing, frame formatting, and error detection.
• It supports two main operation modes: beacon-enabled mode and non-
beacon-enabled mode.
• In beacon-enabled mode, the network coordinator periodically transmits
beacon frames to synchronize and schedule communication with other
devices in the network.
•
Power Management:
Low Power Consumption: Zigbee is optimized for energy efficiency, allowing devices to
operate on battery power for extended periods,
Mesh Networking: Zigbee supports mesh networking, where devices can relay data
through intermediate nodes.
Low Data Rate: Zigbee is designed for low-data-rate communication, typically ranging
from 20 to 250 kbps
Built-in Support for UDP: CoAP operates over UDP (User Datagram Protocol) by default,
which is a connectionless and lightweight transport protocol. UDP's simplicity and low
overhead make it more suitable than TCP
Native Support for Resource Discovery: CoAP includes built-in support for resource
discovery, allowing clients to discover available resources on a CoAP server without relying
on external mechanisms
Tags and Elements: XML documents are composed of tags, which represent elements in
the document's structure. Tags come in pairs: an opening tag ("<element>")
Hierarchy: XML documents have a hierarchical structure, with elements nested within
each other to represent relationships between data
Root Element: Every XML document has a single root element that serves as the top-
level container for all other elements in the document.
13. Explain CoaP and its advantages.
Built-in Support for Resource Discovery: CoAP includes built-in support for resource
discovery, allowing clients to discover available resources on CoAP servers without relying on
external mechanisms
Proxying and Caching: CoAP supports proxying and caching mechanisms, allowing
intermediate nodes to cache frequently accessed resources and act as proxies for clients and
servers
Scalable
MQTT implementation requires a minimal amount of code that consumes very little power in
operations. The protocol also has built-in features to support communication with a large number
of IoT devices. Hence, you can implement the MQTT protocol to connect with millions of these
devices.
Reliable
Many IoT devices connect over unreliable cellular networks with low bandwidth and high latency.
MQTT has built-in features that reduce the time the IoT device takes to reconnect with the cloud.
It also defines three different quality-of-service levels to ensure reliability for IoT use cases— at
most once (0), at least once (1), and exactly once (2).
Secure
MQTT makes it easy for developers to encrypt messages and authenticate devices and users
using modern authentication protocols, such as OAuth, TLS1.3, Customer Managed Certificates,
and more.