Iot Imp Question

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Unit I: Introduction to IoT

1. IoT Definition: Internet of Things (IoT) refers to the interconnection of everyday


objects, embedded with sensors, software, and network connectivity, enabling them
to collect, exchange, and act on data. Its key characteristics include automation,
scalability, and real-time interaction.
2. IoT Architecture: IoT architecture typically consists of three layers:
○ Perception Layer: Includes sensors and actuators to collect physical data.
○ Network Layer: Transmits collected data using communication protocols like
Wi-Fi or ZigBee.
○ Application Layer: Provides data visualization, processing, and
decision-making tools.
3. IoT Frameworks: These provide the structure and tools for IoT applications.
Examples include Microsoft Azure IoT Suite and Google Cloud IoT. They enable
integration, data storage, and analytics for IoT systems.
4. Functional Blocks: IoT functional blocks include sensors (for data collection),
actuators (to perform actions), communication protocols (to transmit data), and
applications (to visualize or analyze data).
5. Communication Models: IoT devices communicate through models such as:
○ Request-Response: Traditional HTTP-based interaction.
○ Publish-Subscribe: Uses brokers like MQTT for asynchronous
communication.
○ Push-Pull: Continuous data push or pull from servers.
○ Exclusive Pair: One-to-one device communication.
6. APIs: Communication APIs allow devices and software to interact. For example,
REST APIs enable IoT devices to send data over HTTP methods like GET, POST,
PUT, and DELETE.
7. Things in IoT: These are the devices connected to the IoT network, such as smart
appliances, wearable devices, or industrial machinery with sensors.
8. Protocols in IoT: Protocols like MQTT or HTTP standardize communication between
devices, ensuring seamless data transmission and reliability.

Unit II: IoT Protocols

9. Protocol Standardization: Ensures interoperability among different IoT devices by


defining consistent communication rules, e.g., HTTP, MQTT.
10. M2M Communication: Machine-to-Machine communication refers to devices
interacting directly without human intervention, commonly used in industrial
automation.
11. IEEE 802.15.4: A low-power, low-rate wireless protocol that forms the basis for
ZigBee networks, often used in sensor networks.
12. ModBus: A serial communication protocol for industrial devices to exchange data
between sensors, actuators, and controllers.
13. KNX: A protocol for building automation to control lighting, HVAC, and energy
management systems.
14. ZigBee: A wireless standard for low-power IoT networks, widely used in smart home
devices like bulbs and thermostats.
15. MQTT: A lightweight messaging protocol ideal for IoT applications requiring low
bandwidth, using publish-subscribe models.
16. REST Protocol: REST (Representational State Transfer) uses HTTP methods for
resource communication, often employed in web-based IoT services.
17. 6LoWPAN: Stands for IPv6 over Low-Power Wireless Personal Area Networks,
allowing IoT devices to connect to IP-based networks.
18. LoRa: A long-range, low-power wireless protocol, ideal for IoT applications like
agriculture or city-wide monitoring.

Unit III: IoT Platforms and Programming

19. Arduino vs. Raspberry Pi: Arduino is a microcontroller suitable for simple tasks,
while Raspberry Pi is a microcomputer capable of running an OS for complex tasks.
20. Installing Arduino IDE: Download the IDE from the official site, install it, connect the
Arduino board, and write/upload sketches to the board.
21. Interfaces:
○ Serial: Point-to-point communication between devices.
○ SPI: High-speed communication between microcontrollers and peripherals.
○ I2C: Multi-device communication using fewer wires.
22. Bluetooth Speaker with Raspberry Pi: Install Bluetooth tools, pair the device using
bluetoothctl, and redirect audio output using configuration settings.
23. Robotic Arm with Raspberry Pi: Connect the arm’s motors to GPIO pins, control
using Python code, and use a motor driver for movement precision.
24. Sensors and Actuators: Sensors detect environmental data (e.g., temperature),
and actuators act on instructions (e.g., motors). They are connected via GPIO or
serial interfaces.
25. Reading/Controlling GPIO: Use libraries like RPi.GPIO in Python to configure pins
as input or output and manipulate their states.
26. LED Blinking Program: Use GPIO setup and time.sleep() in Python to blink an
LED by toggling GPIO pin states.
27. Arduino vs. Raspberry Pi Programming: Arduino uses its IDE and C/C++, while
Raspberry Pi uses Python with extensive libraries for complex projects.

Unit IV: Cloud Platforms for IoT

28. Cloud Storage Models: Include public (AWS, Google Cloud), private (dedicated for
organizations), hybrid (combination of public/private), and community clouds.
29. WAMP Autobahn: A protocol for real-time messaging in IoT applications, enabling
communication over WebSockets.
30. Xively: A cloud platform for IoT device management, offering data collection,
visualization, and analytics.
31. Django Architecture: Follows the Model-View-Template (MVT) architecture to build
scalable web applications.
32. RESTful Web API: REST APIs allow IoT devices to exchange data with web servers
using HTTP. For example, an IoT weather station can send sensor data to a server.
33. AWS for IoT: Offers services like AWS IoT Core for device connectivity and AWS
Lambda for serverless computation in IoT projects.

Unit V: Security in IoT

34. IoT Vulnerabilities: Include weak passwords, lack of encryption, insecure firmware,
and poorly protected interfaces.
35. Security Requirements: Protect data confidentiality, integrity, availability, and
ensure authentication and access control.
36. Challenges: Limited device resources, high scalability needs, and distributed
architectures increase the complexity of securing IoT systems.
37. Threat Analysis: Involves identifying and assessing vulnerabilities in IoT systems,
such as DDoS attacks on devices.
38. Activity Modeling: Mapping user activities and identifying possible misuse or threats
in IoT workflows.
39. Key Security Elements: Include encryption for secure data, authentication to verify
users/devices, and access control to manage permissions.
40. Data/Message Security: Achieved through SSL/TLS for encrypted communication.
41. Non-repudiation: Ensures that actions (like sending data) cannot be denied, often
using digital signatures.

Unit VI: Domain-Specific Applications

42. Home Automation: IoT enables control of appliances like lights, thermostats, and
locks using mobile apps or voice commands.
43. Intrusion Detection: Sensors detect unauthorized access, triggering alerts or
alarms.
44. Smart City: IoT applications like smart parking use sensors to indicate available
spaces, while smart roads monitor traffic.
45. Health Monitoring: Wearable devices track heart rate, blood pressure, and activity
levels, sending data to healthcare providers.
46. Agriculture: IoT automates irrigation based on soil moisture sensors and predicts
weather conditions for better crop management.
47. Greenhouse Control: Sensors monitor and control temperature, humidity, and light
levels in greenhouses for optimal plant growth.
48. Weather Monitoring: IoT collects and processes real-time weather data from remote
locations.
49. Inventory Management: IoT-enabled RFID tags and sensors track stock levels and
locations in real time.
50. Indoor Air Quality: IoT monitors air pollutants and adjusts ventilation systems to
improve air quality in industries.

Project-Specific Questions

1. Ultrasonic Sensor: Uses sound waves to measure distances by calculating the time
taken for the echo to return.
2. Servo Motor: Rotates to a specific angle based on pulse-width modulation (PWM)
signals.
3. Ultrasonic Program: Uses Arduino’s pulseIn() to measure distance and calculate
it using the speed of sound.
4. Door Opener Project: Ultrasonic sensor detects proximity; servo motor
opens/closes the door based on distance.
5. LED Program: Potentiometers adjust RGB values; the values are mapped and
combined to set the LED color using PWM.
6. Challenges: Wiring sensors, programming logic, ensuring compatibility of
components, and debugging hardware issues

You might also like