SlideShare a Scribd company logo
1 of 7
Download to read offline
INTERNET OF THINGS (IOT)
ASSIGNMENT
UNIT – I – INTRODUCTION TO IOT
1. IOT stands for ___________.
2. IOT comprises things that have unique identities and are connected to the _________.
3. Experts forecast that by the year 2020 there will be a total of __________ devices
connected to the internet.
4. IOT devices may have __________ capability, allowing a large number of devices to
work together.
5. IOT devices may support a number of __________ communication protocol and can
communicate with other devices.
6. IOT devices have a unique identity and a unique identifier such as an ____________.
7. IOT devices can exchange data with other connected devices and applications as
____________.
8. IOT protocols consist of ________ layers.
9. Host on the same link exchange data packets over the link layer using _________
protocols.
10. _________ is a collection of wired Ethernet standards for the link layer.
11. 802.3.i is the standard for ___________ Ethernet over copper twisted-pair connections.
12. _________ is the standard for 10BASE-F Ethernet over fiber optic connections.
13. Wi-Fi stands for ______________.
14. IEEE 802.11 is a collection of ____________ standards.
15. IEEE 802.16 is a collection of ____________ standards.
16. LR-WPAN stands for ___________.
17. LR_WPAN standards form the basis of specification for high level communication
protocol such as __________.
18. Mobile communication standards of 2G including GSM and _________.
19. Mobile communication standards of 4G including __________.
20. IOT devices based on 2G/3G/4G standards can communicate over _________ networks.
21. ____________ Layer are responsible for sending IP datagrams from the source network
of the destination network.
22. ___________ Layer performs the host addressing and packet routing.
23. Host identification is done using hierarchical IP addressing scheme of __________.
24. IPv4 uses a ______ bit address scheme that allowed total of 2^32.
25. Guaranteed delivery and data integrity are handled by _________ layer protocol (as
TCP).
26. IPv6 uses a ______ bit address scheme that allowed total of 2^128.
27. WPAN stands for _______________.
28. 6LoWPAN works with the _________ link layer protocol.
29. TCP stands for _____________.
30. TCP is a connection oriented and _________ protocol.
31. TCP also provides _________ detection capability.
32. UDP stands for ___________.
33. ______ does not provide guaranteed delivery, ordering of messages and duplicate
elimination.
34. _____________ Layer protocol define how the applications interface with the lower
layer protocols to send the data over the network.
35. ________ Numbers are used for application addressing.
36. HTTP stands for _____________.
37. HTTP protocol uses _________ to identify HTTP resources.
38. CoAP stands for _____________.
39. CoAP is an application layer protocol for ____________ applications.
40. CoAP uses a client-server architecture where clients communicate with servers using
______________ datagrams.
41. _________ is designed to easily interface with HTTP.
42. __________ Protocol allows full-duplex communication over a single socket connection
for sending messages between client and server.
43. MQTT stands for ____________.
44. _____________ is a light-weight messaging protocol based on the publish-subscribed
model.
45. XMPP stands for ______________.
46. ________ is a protocol for real-time communication and streaming XML data between
network entities.
47. DDS stands for ____________.
48. DDS is a data-centric middleware standard for _________________ communication.
49. AMQP stands for _____________.
50. __________ supports both point-to-point and publisher/subscriber models, routing and
queuing.
51. AMQP broker receive messages from ___________.
52. The _____________ block handles the communication for the IOT system.
53. ___________ Block provides various functions to govern the IOT system.
54. _____________ is a communication model in which the client sends requests to the
server and the server responds to the requests.
55. _____________ model is a stateless communication model.
56. _____________ is a communication model that involves publishers, brokers, and
consumers.
57. _____________ is a communication model in which the data producers push the data
to queues and the consumers pull the data from the queues.
58. __________ helps in decoupling the messaging between the producers and consumers.
59. __________ is a bi-directional, fully duplex communication model that uses a persistent
connection between the client and server.
60. API stands for _______________.
61. REST stands for ______________.
62. _________ API’s follow the request-response communication protocol.
63. ___________ should not be concerned with the storage of data.
64. ___________ should not be concerned about the user interface.
65. ____________ System constraint, constrains the behavior of components.
66. ___________ Interface constraint requires that the model of communication between a
client and a server must be uniform.
67. Code on demand servers can provide ________________ for clients to execute in their
context.
68. A _____________ web service is a “web API “ implemented using HTTP and REST
principles.
69. WebSocket communication begins with a connection setup request sent by the client to
the server. This request is called ______________.
70. A WSN stands for _____________.
71. A ________ consists of a number of end-nodes and routers and a coordinator.
72. End-nodes also act as __________.
73. ____________ are responsible for routing the data packets from end-nodes to the
coordinator.
74. ________ is one of the most popular wireless technologies used by WSNs.
75. The self-organizing capability of WSN makes the network _________.
76. ______________ is a transformative computing paradigm that involves delivering
applications and services over the internet.
77. IaaS stands for ______________.
78. PaaS stands for _____________.
79. SaaS stands for _____________.
80. ____________ is defined as a collection of data sets.
81. __________ is important characteristics of big data.
82. ____________ Protocol forms the backbone of IOT systems.
83. An ___________ system is a computer systems that has computer hardware and
software embedded to perform specific tasks.
84. Embedded system run embedded operating system of ________________.
85. A __________ IOT system has a single node/device that performs sensing and/or
actuation, stores data, performs analysis and hosts the application.
86. A __________ IOT system has a single node that performs sensing and/or actuation and
local analysis.
87. ____________ IOT system used for smart irrigation.
88. A ________ IOT system has a single node.
89. __________ IOT system used for tracking package handling.
90. A _________ IOT system has multiple nodes that perform local analysis.
91. __________ IOT system has used for noise monitoring.
92. A ________ IOT system has multiple end nodes and one coordinator node.
93. _____________ Node collects data from the end nodes and send to the cloud.
94. A _________ IOT system has used for forest fire detection.
95. A __________ IOT system has multiple independent end nodes that perform sensing
and/or actuation and send data to the cloud.
96. A __________ IOT has used for weather monitoring.
97. ___________ helps in collaborate in IOT development.
98. IOT/ and cloud computing has ____________ relationship.
99. IOT levels of data are stored in ________.
100. IP stand for ______________.
Answers: 37. UPI’s
1. Internet of Things 38. Constrained application protocol
2. Internet 39. Machine-to-Machine
3. 50 billion 40. Connectionless
4. Self-configuring 41. CoAP
5. Interoperable 42. Websocket
6. IP address or URI 43. Message Queue Telemetry Model
7. Directly or indirectly 44. MQTT
8. 4 45. Extensible Messaging and
9. Link layer presence protocol
10. IEEE 802.3 46. XMPP
11. 10BASE-T 47. Data Distribution Service
12. 802.3.j 48. Device-to-Device (or)
13. Wireless Local Area Network Machine-to-Machine
14. WLAN 49. Advanced Message Queuing
15. Wireless broadband protocol
16. Low-rate Wireless Personal Area network 50. AMQP
17. zigBee 51. Publisher
18. CDMA 52. Communication
19. LTE 53. Management
20. Cellular 54. Request - Response
21. Network/internet 55. Request - Response
22. Network 56. Publish-Subscribe
23. IPv4 or IPv6 57. Push-Pull
24. 32 58. Queues
25. Upper 59. Exclusive pair
26. 128 60. Application Programming
27. Wireless Personal Area Network Interface
28. 802.15.4 61. Representation State Transfer
29. Transmission Control Protocol 62. REST
30. Stateful 63. Clients
31. Error 64. Server
32. User Datagram Protocol 65. Layered
33. UDP 66. Uniform
34. Application 67. Executable code (or) script
35. Port 68. RESTful
36. Hypertext Transfer Protocol 69. Websocket handsake
70. Wireless Sensor Network 94. Level-5
71. WSN 95. Level-
72. Routers 96. Level-6
73. Router 97. Cloud computing
74. ZigBee 98. complementary
75. Robust 99. cloud
76. Cloud computing 100. Internet protocol
77. Infrastructure-as-a-service
78. platform-as-a-service
79. software-as-a-service
80. BigZee
81. Velocity
82. Communication
83. Embedded
84. Real-time operating system
85. level-1
86. level-2
87. level-2
88. level-3
89. level-2
90. level-4
91. level-4
92. level-5
93. Coordinator
IoT Communication Models & Levels

More Related Content

What's hot

Password authentication in cloud
Password authentication in cloudPassword authentication in cloud
Password authentication in cloudIJERA Editor
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
 
Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...IJECEIAES
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling saltingMauryasuraj98
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesIGEEKS TECHNOLOGIES
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
 
Soft handover scheme for wsn nodes using media independent handover functions
Soft handover scheme for wsn nodes using media independent handover functionsSoft handover scheme for wsn nodes using media independent handover functions
Soft handover scheme for wsn nodes using media independent handover functionsAlexander Decker
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesLeMeniz Infotech
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESnexgentechnology
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractSoftroniics india
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 

What's hot (20)

Password authentication in cloud
Password authentication in cloudPassword authentication in cloud
Password authentication in cloud
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
 
Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Seminar
SeminarSeminar
Seminar
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions11.soft handover scheme for wsn nodes using media independent handover functions
11.soft handover scheme for wsn nodes using media independent handover functions
 
Soft handover scheme for wsn nodes using media independent handover functions
Soft handover scheme for wsn nodes using media independent handover functionsSoft handover scheme for wsn nodes using media independent handover functions
Soft handover scheme for wsn nodes using media independent handover functions
 
IJSRED-V2I3P52
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
User defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based servicesUser defined privacy grid system for continuous location-based services
User defined privacy grid system for continuous location-based services
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
User defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstractUser defined privacy grid system for continuous location based services abstract
User defined privacy grid system for continuous location based services abstract
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 

Similar to IoT Communication Models & Levels

Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hydKishore5511
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdfvenui2
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterIJCSIS Research Publications
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networkseSAT Journals
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2rahulmonikasharma
 
Secure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: ReviewSecure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: Reviewrahulmonikasharma
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformIRJET Journal
 

Similar to IoT Communication Models & Levels (20)

IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
Chapter09
Chapter09Chapter09
Chapter09
 
chapter 3.pdf
chapter 3.pdfchapter 3.pdf
chapter 3.pdf
 
chapter 3.docx
chapter 3.docxchapter 3.docx
chapter 3.docx
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compiler
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 
Simulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited MetarouterSimulation for Data Security Improvement in Exploited Metarouter
Simulation for Data Security Improvement in Exploited Metarouter
 
Remote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networksRemote temperature and humidity monitoring system using wireless sensor networks
Remote temperature and humidity monitoring system using wireless sensor networks
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Ijetcas14 424
Ijetcas14 424Ijetcas14 424
Ijetcas14 424
 
Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2Performance Analysis of Wired, Wireless and Optical Network using NS2
Performance Analysis of Wired, Wireless and Optical Network using NS2
 
Secure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: ReviewSecure Transaction Model for NoSQL Database Systems: Review
Secure Transaction Model for NoSQL Database Systems: Review
 
chapter 5.docx
chapter 5.docxchapter 5.docx
chapter 5.docx
 
chapter 5.pdf
chapter 5.pdfchapter 5.pdf
chapter 5.pdf
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 

More from Dr.M.Karthika parthasarathy

IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...Dr.M.Karthika parthasarathy
 
Unit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxUnit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxDr.M.Karthika parthasarathy
 

More from Dr.M.Karthika parthasarathy (20)

IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
IoT Enabled Wireless Technology Based Monitoring and Speed Control of Motor U...
 
Linux Lab Manual.doc
Linux Lab Manual.docLinux Lab Manual.doc
Linux Lab Manual.doc
 
Unit 2 IoT.pdf
Unit 2 IoT.pdfUnit 2 IoT.pdf
Unit 2 IoT.pdf
 
Unit 3 IOT.docx
Unit 3 IOT.docxUnit 3 IOT.docx
Unit 3 IOT.docx
 
Unit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptxUnit 1 Introduction to Artificial Intelligence.pptx
Unit 1 Introduction to Artificial Intelligence.pptx
 
Unit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docxUnit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docx
 
Introduction to IoT - Unit II.pptx
Introduction to IoT - Unit II.pptxIntroduction to IoT - Unit II.pptx
Introduction to IoT - Unit II.pptx
 
IoT Unit 2.pdf
IoT Unit 2.pdfIoT Unit 2.pdf
IoT Unit 2.pdf
 
Chapter 3 heuristic search techniques
Chapter 3 heuristic search techniquesChapter 3 heuristic search techniques
Chapter 3 heuristic search techniques
 
Ai mcq chapter 2
Ai mcq chapter 2Ai mcq chapter 2
Ai mcq chapter 2
 
Introduction to IoT unit II
Introduction to IoT  unit IIIntroduction to IoT  unit II
Introduction to IoT unit II
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
Overview of Deadlock unit 3 part 1
Overview of Deadlock unit 3 part 1Overview of Deadlock unit 3 part 1
Overview of Deadlock unit 3 part 1
 
Examples in OS synchronization for UG
Examples in OS synchronization for UG Examples in OS synchronization for UG
Examples in OS synchronization for UG
 
Process Synchronization - Monitors
Process Synchronization - MonitorsProcess Synchronization - Monitors
Process Synchronization - Monitors
 
.net progrmming part4
.net progrmming part4.net progrmming part4
.net progrmming part4
 
.net progrmming part3
.net progrmming part3.net progrmming part3
.net progrmming part3
 
.net progrmming part1
.net progrmming part1.net progrmming part1
.net progrmming part1
 
.net progrmming part2
.net progrmming part2.net progrmming part2
.net progrmming part2
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 

IoT Communication Models & Levels

  • 1. INTERNET OF THINGS (IOT) ASSIGNMENT UNIT – I – INTRODUCTION TO IOT 1. IOT stands for ___________. 2. IOT comprises things that have unique identities and are connected to the _________. 3. Experts forecast that by the year 2020 there will be a total of __________ devices connected to the internet. 4. IOT devices may have __________ capability, allowing a large number of devices to work together. 5. IOT devices may support a number of __________ communication protocol and can communicate with other devices. 6. IOT devices have a unique identity and a unique identifier such as an ____________. 7. IOT devices can exchange data with other connected devices and applications as ____________. 8. IOT protocols consist of ________ layers. 9. Host on the same link exchange data packets over the link layer using _________ protocols. 10. _________ is a collection of wired Ethernet standards for the link layer. 11. 802.3.i is the standard for ___________ Ethernet over copper twisted-pair connections. 12. _________ is the standard for 10BASE-F Ethernet over fiber optic connections. 13. Wi-Fi stands for ______________. 14. IEEE 802.11 is a collection of ____________ standards. 15. IEEE 802.16 is a collection of ____________ standards. 16. LR-WPAN stands for ___________. 17. LR_WPAN standards form the basis of specification for high level communication protocol such as __________. 18. Mobile communication standards of 2G including GSM and _________. 19. Mobile communication standards of 4G including __________. 20. IOT devices based on 2G/3G/4G standards can communicate over _________ networks. 21. ____________ Layer are responsible for sending IP datagrams from the source network of the destination network. 22. ___________ Layer performs the host addressing and packet routing. 23. Host identification is done using hierarchical IP addressing scheme of __________. 24. IPv4 uses a ______ bit address scheme that allowed total of 2^32.
  • 2. 25. Guaranteed delivery and data integrity are handled by _________ layer protocol (as TCP). 26. IPv6 uses a ______ bit address scheme that allowed total of 2^128. 27. WPAN stands for _______________. 28. 6LoWPAN works with the _________ link layer protocol. 29. TCP stands for _____________. 30. TCP is a connection oriented and _________ protocol. 31. TCP also provides _________ detection capability. 32. UDP stands for ___________. 33. ______ does not provide guaranteed delivery, ordering of messages and duplicate elimination. 34. _____________ Layer protocol define how the applications interface with the lower layer protocols to send the data over the network. 35. ________ Numbers are used for application addressing. 36. HTTP stands for _____________. 37. HTTP protocol uses _________ to identify HTTP resources. 38. CoAP stands for _____________. 39. CoAP is an application layer protocol for ____________ applications. 40. CoAP uses a client-server architecture where clients communicate with servers using ______________ datagrams. 41. _________ is designed to easily interface with HTTP. 42. __________ Protocol allows full-duplex communication over a single socket connection for sending messages between client and server. 43. MQTT stands for ____________. 44. _____________ is a light-weight messaging protocol based on the publish-subscribed model. 45. XMPP stands for ______________. 46. ________ is a protocol for real-time communication and streaming XML data between network entities. 47. DDS stands for ____________. 48. DDS is a data-centric middleware standard for _________________ communication. 49. AMQP stands for _____________. 50. __________ supports both point-to-point and publisher/subscriber models, routing and queuing. 51. AMQP broker receive messages from ___________. 52. The _____________ block handles the communication for the IOT system. 53. ___________ Block provides various functions to govern the IOT system.
  • 3. 54. _____________ is a communication model in which the client sends requests to the server and the server responds to the requests. 55. _____________ model is a stateless communication model. 56. _____________ is a communication model that involves publishers, brokers, and consumers. 57. _____________ is a communication model in which the data producers push the data to queues and the consumers pull the data from the queues. 58. __________ helps in decoupling the messaging between the producers and consumers. 59. __________ is a bi-directional, fully duplex communication model that uses a persistent connection between the client and server. 60. API stands for _______________. 61. REST stands for ______________. 62. _________ API’s follow the request-response communication protocol. 63. ___________ should not be concerned with the storage of data. 64. ___________ should not be concerned about the user interface. 65. ____________ System constraint, constrains the behavior of components. 66. ___________ Interface constraint requires that the model of communication between a client and a server must be uniform. 67. Code on demand servers can provide ________________ for clients to execute in their context. 68. A _____________ web service is a “web API “ implemented using HTTP and REST principles. 69. WebSocket communication begins with a connection setup request sent by the client to the server. This request is called ______________. 70. A WSN stands for _____________. 71. A ________ consists of a number of end-nodes and routers and a coordinator. 72. End-nodes also act as __________. 73. ____________ are responsible for routing the data packets from end-nodes to the coordinator. 74. ________ is one of the most popular wireless technologies used by WSNs. 75. The self-organizing capability of WSN makes the network _________. 76. ______________ is a transformative computing paradigm that involves delivering applications and services over the internet. 77. IaaS stands for ______________. 78. PaaS stands for _____________. 79. SaaS stands for _____________. 80. ____________ is defined as a collection of data sets. 81. __________ is important characteristics of big data.
  • 4. 82. ____________ Protocol forms the backbone of IOT systems. 83. An ___________ system is a computer systems that has computer hardware and software embedded to perform specific tasks. 84. Embedded system run embedded operating system of ________________. 85. A __________ IOT system has a single node/device that performs sensing and/or actuation, stores data, performs analysis and hosts the application. 86. A __________ IOT system has a single node that performs sensing and/or actuation and local analysis. 87. ____________ IOT system used for smart irrigation. 88. A ________ IOT system has a single node. 89. __________ IOT system used for tracking package handling. 90. A _________ IOT system has multiple nodes that perform local analysis. 91. __________ IOT system has used for noise monitoring. 92. A ________ IOT system has multiple end nodes and one coordinator node. 93. _____________ Node collects data from the end nodes and send to the cloud. 94. A _________ IOT system has used for forest fire detection. 95. A __________ IOT system has multiple independent end nodes that perform sensing and/or actuation and send data to the cloud. 96. A __________ IOT has used for weather monitoring. 97. ___________ helps in collaborate in IOT development. 98. IOT/ and cloud computing has ____________ relationship. 99. IOT levels of data are stored in ________. 100. IP stand for ______________.
  • 5. Answers: 37. UPI’s 1. Internet of Things 38. Constrained application protocol 2. Internet 39. Machine-to-Machine 3. 50 billion 40. Connectionless 4. Self-configuring 41. CoAP 5. Interoperable 42. Websocket 6. IP address or URI 43. Message Queue Telemetry Model 7. Directly or indirectly 44. MQTT 8. 4 45. Extensible Messaging and 9. Link layer presence protocol 10. IEEE 802.3 46. XMPP 11. 10BASE-T 47. Data Distribution Service 12. 802.3.j 48. Device-to-Device (or) 13. Wireless Local Area Network Machine-to-Machine 14. WLAN 49. Advanced Message Queuing 15. Wireless broadband protocol 16. Low-rate Wireless Personal Area network 50. AMQP 17. zigBee 51. Publisher 18. CDMA 52. Communication 19. LTE 53. Management 20. Cellular 54. Request - Response 21. Network/internet 55. Request - Response 22. Network 56. Publish-Subscribe 23. IPv4 or IPv6 57. Push-Pull 24. 32 58. Queues 25. Upper 59. Exclusive pair 26. 128 60. Application Programming 27. Wireless Personal Area Network Interface 28. 802.15.4 61. Representation State Transfer 29. Transmission Control Protocol 62. REST 30. Stateful 63. Clients 31. Error 64. Server 32. User Datagram Protocol 65. Layered 33. UDP 66. Uniform 34. Application 67. Executable code (or) script 35. Port 68. RESTful 36. Hypertext Transfer Protocol 69. Websocket handsake
  • 6. 70. Wireless Sensor Network 94. Level-5 71. WSN 95. Level- 72. Routers 96. Level-6 73. Router 97. Cloud computing 74. ZigBee 98. complementary 75. Robust 99. cloud 76. Cloud computing 100. Internet protocol 77. Infrastructure-as-a-service 78. platform-as-a-service 79. software-as-a-service 80. BigZee 81. Velocity 82. Communication 83. Embedded 84. Real-time operating system 85. level-1 86. level-2 87. level-2 88. level-3 89. level-2 90. level-4 91. level-4 92. level-5 93. Coordinator