You are on page 1of 163

Introduction to Internet of Things

Week 2

Presented By: Riya Tapwal


Under the supervision of

Prof. Sudip Misra

Indian Institute of Technology, Kharagpur, India

IIT Kharagpur Feb, 2024 1


Functionality-based IoT Protocol Organization

• Connectivity: Protocols which helps in establishing connections. (6LowPAN, RPL)


• Identification: Checks the identity of the user (using private key or password). (EPC, uCode, IPv6, URIs)
• Communication / Transport: (Protocols which helps in the communication of two devices) (WiFi,
Bluetooth, LPWAN)
• Discovery: Protocol suite for advertisement and discovery of network services (Physical Web, mDNS,
DNS-SD)
• Data Protocols: Enable devices to exchange information (MQTT, CoAP, AMQP, Websocket, Node)
• Device Management: A device can communicate updates about its location, diagnostic information, and
error codes by using the Device Management Protocol. (TR-069, OMA-DM)
• Semantic: Regulate the application-related aspects of the communicating IT systems (JSON-LD, Web
Thing Model)
• Multi-layer Frameworks: Protocols spread across various protocol stack layers (Alljoyn, IoTivity,
Weave, Homekit)

IIT Kharagpur Introduction to Internet of Things Week 2 2


MQTT

• Message Queue Telemetry Transport

• Publish-subscribe-based lightweight
messaging protocol

• Components:
• Publishers
• Subscribers
• Brokers

IIT Kharagpur Introduction to Internet of Things Week 2 3


MQTT

Connect

Disconnect

Subscribe

Unsubscribe

Publish

IIT Kharagpur Introduction to Internet of Things Week 2 4


MQTT Applications

• Facebook Messenger uses MQTT for online chat.

• Amazon Web Services use Amazon IoT with MQTT.

• Microsoft Azure IoT Hub uses MQTT as its main protocol


for telemetry messages.

• The EVRYTHNG IoT platform uses MQTT as an M2M


protocol for millions of connected products.

• Adafruit launched a free MQTT cloud service for IoT


experimenters called Adafruit IO

IIT Kharagpur Week 2


Introduction to Internet of Things
SMQTT

• Secure MQTT is an extension of MQTT which uses encryption based on lightweight attribute based
encryption.

• The main advantage of using such encryption is the broadcast encryption feature, in which one message
is encrypted and delivered to multiple other nodes, which is quite common in IoT applications.

• In general, the algorithm consists of four main stages: setup, encryption, publish and decryption

IIT Kharagpur Week 2


Introduction to Internet of Things
SMQTT

• In the setup phase, the subscribers and publishers register themselves to the broker and get a master
secret key according to their developer’s choice of key generation algorithm.

• When the data is published, it is encrypted and published by the broker which sends it to the subscribers,
which is finally decrypted at the subscriber end having the same master secret key.

• The key generation and encryption algorithms are not standardized.

• SMQTT is proposed only to enhance MQTT security features

IIT Kharagpur Week 2


Introduction to Internet of Things
CoAP

• CoAP
Constrained Application Protocol (CoAP)

The Constrained Application Protocol (CoAP) is a session layer protocol designed by IETF Constrained RESTful
Environment (CoRE) working group to provide lightweight RESTful (HTTP)
interface.

Representational State Transfer (REST) is the standard interface between HTTP client and servers.

Lightweight applications such as those in IoT, could result in significant overhead and power consumption by REST.
CoAP is designed to enable low-power sensors to use RESTful services while meeting their power constraints

IIT Kharagpur Introduction to Internet of Things Week 2 8


CoAP Layers

• CoAP architecture is divided into two main sub-layers:


• Messaging
• Request/response.

• The messaging sub-layer is responsible for reliability and duplication of messages, while the request/response sub-layer
is responsible for communication.

• Data Protocol Message Types:


• Confirmable
• Non Confirmable
• Piggyback
• Separate

IIT Kharagpur Introduction to Internet of Things Week 2 9


• CoAP: Cont…

Client Server Client Server

CON

Non Message
ACK

Confirmable Non Confirmable

IIT Kharagpur Introduction to Internet of Things Week 2 10


• CoAP: Cont…

Client Server Client Server

CON
CON

ACK
ACK+ Data
Wait
Data
ACK

Piggyback Separate

IIT Kharagpur Introduction to Internet of Things Week 2 11


CoAP Features

• Reduced overheads and parsing complexity.

• URL and content-type support.

• Support for the discovery of resources provided by known CoAP services.

• Simple subscription for a resource, and resulting push notifications.

• Simple caching based on maximum message age

IIT Kharagpur Introduction to Internet of Things Week 2 12


AMQP

Advanced Message Queuing Protocol.

Open standard for passing business messages


between applications or organizations.
Connects between systems and business processes.
It is a binary application layer protocol.
Basic unit of data is a frame

IIT Kharagpur Introduction to Internet of Things Week 2 13


AMQP: Applications

● Monitoring and global update sharing.


● Connecting different systems and processes to talk to each other.
● Allowing servers to respond to immediate requests quickly and delegate time consuming tasks for later processing.
● Distributing a message to multiple recipients for consumption.
● Enabling offline clients to fetch data at a later time.
● Introducing fully asynchronous functionality for systems.
● Increasing reliability and uptime of application deployments.

IIT Kharagpur Introduction to Internet of Things Week 2 14


XMPP

▪ XMPP – Extensible Messaging and Presence Protocol.


▪ A communication protocol for message-oriented
middleware based on XML (Extensible Markup
Language).
▪ Real-time exchange of structured data.
▪ It is an open standard protocol.
▪ Decentralization – No central server; anyone can run
their own XMPP server.
▪ Open standards – No royalties or granted permissions
are required to implement these specifications
▪ Security – Authentication, encryption, etc.
▪ Flexibility – Supports interoperability

IIT Kharagpur Introduction to Internet of Things Week 2 15


XMPP Weakness

▪ Does not support QoS.

▪ Text based communications induces higher network overheads.

▪ Binary data must be first encoded to base64 before transmission.

IIT Kharagpur Introduction to Internet of Things Week 2 16


XMPP Applications

▪ Publish-subscribe systems
▪ Signalling for VoIP
▪ Video
▪ File transfer
▪ Gaming
▪ Internet of Things applications
▪ Smart grid
▪ Social networking services

IIT Kharagpur Introduction to Internet of Things Week 2 17


Comparison

XMPP, MQTT, CoAP, and AMQP are all communication protocols, but they serve different purposes and have different characteristics. Here's a brief comparison of each:

1. XMPP (Extensible Messaging and Presence Protocol):


○ Purpose: XMPP is primarily used for real-time messaging and presence information exchange.
○ Characteristics: It is based on XML and is highly extensible, supporting features like one-to-one and multi-user chat, presence notifications, and service discovery.
○ Typical Use Cases: Instant messaging applications, presence information systems, chatbots, collaborative platforms.
○ Advantages: Decentralized architecture, extensibility, support for real-time communication.
2. MQTT (Message Queuing Telemetry Transport):
○ Purpose: MQTT is a lightweight messaging protocol designed for constrained devices and low-bandwidth, high-latency or unreliable networks.
○ Characteristics: It uses a publish-subscribe messaging pattern and is optimized for minimal overhead and efficient data transmission. It supports Quality of
Service (QoS) levels for message delivery reliability.
○ Typical Use Cases: Internet of Things (IoT) applications, telemetry and sensor data collection, home automation, real-time monitoring and control systems.
○ Advantages: Lightweight, efficient, supports various QoS levels, suitable for resource-constrained devices.
3. CoAP (Constrained Application Protocol):
○ Purpose: CoAP is a specialized protocol designed for machine-to-machine communication in constrained environments, such as IoT devices and sensor networks.
○ Characteristics: It is RESTful and uses a client-server communication model, similar to HTTP, but with optimizations for constrained networks and devices. CoAP
supports features like request-response interactions, multicast communication, and resource discovery.
○ Typical Use Cases: IoT applications, smart energy systems, industrial automation, healthcare monitoring.
○ Advantages: Lightweight, designed for constrained environments, supports RESTful interactions, efficient resource usage.
4. AMQP (Advanced Message Queuing Protocol):
○ Purpose: AMQP is a messaging protocol designed for reliable, asynchronous communication between applications and services.
○ Characteristics: It provides features like message queuing, routing, and delivery guarantees, making it suitable for enterprise messaging and distributed systems.
AMQP supports both point-to-point and publish-subscribe messaging patterns.
○ Typical Use Cases: Enterprise messaging systems, financial services, cloud computing, distributed systems.
○ Advantages: Reliable message delivery, support for complex messaging patterns, interoperability between different messaging systems.

18
IIT Kharagpur Introduction to Internet of Things Week 2
IEEE 802.15.4
Well-known standard for low data-rate WPAN.

Developed for low-data-rate monitoring and


control applications and extended-life
low-power-consumption uses.

This standard uses only the first two layers (PHY,


MAC) plus the logical link control (LLC) and
service specific convergence sub-layer (SSCS)
additions to communicate with all upper layers.

Operates in the ISM band

IIT Kharagpur Introduction to Internet of Things Week 2 19


Zigbee
Most widely deployed enhancement of IEEE 802.15.4.

The ZigBee protocol is defined by layer 3 and above. It works with the 802.15.4 layers 1 and 2.

The standard uses layers 3 and 4 to define additional communication enhancements.

These enhancements include authentication with valid nodes, encryption for security, and a data routing and forwarding
capability that enables mesh networking.

The most popular use of ZigBee is wireless sensor networks using the mesh topology

IIT Kharagpur Introduction to Internet of Things Week 2 20


Zigbee Applications

● Building automation

● Remote control (RF4CE or RF for consumer electronics)

● Smart energy for home energy monitoring

● Health care for medical and fitness monitoring

● Home automation for control of smart homes

● Light Link for control of LED lighting

● Telecom services

IIT Kharagpur Introduction to Internet of Things Week 2 21


6LoWPAN

• Low-power Wireless Personal Area Networks over IPv6.

• Allows for the smallest devices with limited processing ability to transmit information wirelessly using an Internet
protocol.

• Allows low-power devices to connect to the Internet.

• Allows IEEE 802.15.4 radios to carry 128-bit addresses of Internet Protocol version 6 (IPv6).

• Header compression and address translation techniques allow the IEEE 802.15.4 radios to access the Internet.

• IPv6 packets compressed and reformatted to fit the IEEE 802.15.4 packet format.

• Uses include IoT, Smart grid, and M2M applications.

IIT Kharagpur Introduction to Internet of Things Week 2 22


6LoWPAN

• Routing protocols in use:


LOADng

• RPL

LOADng Routing

• Derived from AODV and extended for use in IoT.


• Basic operations of LOADng include:
• Generation of Route Requests (RREQs) by a LOADng Router (originator)
for discovering a route to a destination,
• Forwarding of such RREQs until they reach the destination LOADng
Router,
• Generation of Route Replies (RREPs) upon receipt of an RREQ by the
indicated destination, and unicast hop-by-hop forwarding of these
RREPs towards the originator

IIT Kharagpur Introduction to Internet of Things Week 2 23


6LoWPAN

If a route is detected to be broken, a Route Error (RERR) message is returned to the originator of that data packet to
inform the originator about the route breakage.

Optimized flooding is supported, reducing the overhead incurred by RREQ generation and flooding.

Only the destination is permitted to respond to an RREQ.

Intermediate LOADng Routers are explicitly prohibited from responding to RREQs, even if they may have active routes to
the sought destination.

RREQ/RREP messages generated by a given LOADng Router share a single unique, monotonically increasing sequence
number

IIT Kharagpur Introduction to Internet of Things Week 2 24


RPL

Distance Vector IPv6 routing protocol for lossy and low power networks.
Maintains routing topology using low rate beaconing.
Beaconing rate increases on detecting inconsistencies (e.g. node/link in a route is down).
Routing information included in the datagram itself.
Proactive: Maintaining routing topology.
Reactive: Resolving routing inconsistencies
RPL separates packet processing and forwarding from the routing optimization objective, which helps in Low power
Lossy Networks (LLN).
RPL supports message confidentiality and integrity.
Supports Data-Path Validation and Loop Detection
Routing optimization objectives include

minimizing energy
minimizing latency
satisfying constraints (w.r.t node power, bandwidth, etc.)
RPL operations require bidirectional links.
In some LLN scenarios, those links may exhibit asymmetric properties.
It is required that the reachability of a router be verified before the router can be used as a parent

IIT Kharagpur Introduction to Internet of Things Week 2 25


RFID

 RFID is an acronym for “radio-frequency identification”


 Data digitally encoded in RFID tags, which can be read by a
reader.
 Somewhat similar to barcodes.
 Data read from tags are stored in a database by the reader.
 As compared to traditional barcodes and QR codes, RFID tag
data can be read outside the line-of-sight.
 RFID tag consists of an integrated circuit and an antenna.
 The tag is covered by a protective material which also acts as
a shield against various environmental effects.
 Tags may be passive or active.
 Passive RFID tags are the most widely used.
 Passive tags have to be powered by a reader inductively
before they can transmit information, whereas active tags have
their own power supply

IIT Kharagpur Introduction to Internet of Things Week 2 26


RFID

 Inventory management
 Asset tracking
 Personnel tracking
 Controlling access to restricted areas
 ID badging
 Supply chain management
 Counterfeit prevention (e.g. in the pharmaceutical industry)

IIT Kharagpur Introduction to Internet of Things Week 2 27


Question No: 1

• Which of the following is NOT a data and communication protocol?

a. MQTT
b. AMQP
c. Websocket
d. Alljoyn

IIT Kharagpur Introduction to Internet of Things Week 2 28


Question No: 1

• Functionality-based IoT Protocol Organization

• Connectivity: Protocols which helps in establishing connections. (6LowPAN, RPL)


• Identification: Checks the identity of the user (using private key or password). (EPC, uCode, IPv6, URIs)
• Communication / Transport: (Protocols which helps in the communication of two devices) (WiFi,
Bluetooth, LPWAN)
• Discovery: Protocol suite for advertisement and discovery of network services (Physical Web, mDNS,
DNS-SD)
• Data Protocols: Enable devices to exchange information (MQTT, CoAP, AMQP, Websocket, Node)
• Device Management: A device can communicate updates about its location, diagnostic information, and
error codes by using the Device Management Protocol. (TR-069, OMA-DM)
• Semantic: Regulate the application-related aspects of the communicating IT systems (JSON-LD, Web
Thing Model)
IIT Kharagpur Introduction to Internet of Things Week 2 29
Question No: 1

• Which of the following is NOT a data and communication protocol?

a. MQTT
b. AMQP
c. Websocket
d.
Alljoyn

IIT Kharagpur Introduction to Internet of Things Week 2 30


Question No: 2

• Which of the following AMQP frame type is used to inform the changes in state of transfer?

a. Flow
b. Disposition
c. Transfer
d. State

IIT Kharagpur Introduction to Internet of Things Week 2 31


Question No: 2

AMQP: Advanced Message Queuing Protocol

Data Protocol

Types of frames

▪ Open (connection open)


▪ Begin (session open)
▪ Attach (initiate new link)
▪ Transfer (for sending actual messages)
▪ Flow (controls message flow rate)
▪ Disposition (Informs the changes in state of transfer)
▪ Detach (terminate the link)
▪ End (session close)
▪ Close (connection close

IIT Kharagpur Introduction to Internet of Things Week 2 32


Question No: 2

• Which of the following AMQP frame type is used to inform the changes in state of
transfer?

a. Flow
b. Disposition
c. Transfer
d. State

IIT Kharagpur Introduction to Internet of Things Week 2 33


Question No: 3

• Which of the following is NOT a messaging mode of CoAP?

a. Separate
b. Pager
c. Piggyback
d. Confirmable

IIT Kharagpur Introduction to Internet of Things Week 2 34


Question No: 3

• CoAP

Constrained Application Protocol (CoAP)


Data Protocol
Message Types:
• Confirmable
• Non Confirmable
• Piggyback
• Separate

IIT Kharagpur Introduction to Internet of Things Week 2 35


Question No: 3

• CoAP: Cont…

Client Server Client Server

CON

Non Message
ACK

Confirmable Non Confirmable

IIT Kharagpur Introduction to Internet of Things Week 2 36


Question No: 3

• CoAP: Cont…

Client Server Client Server

CON
CON

ACK
ACK+ Data
Wait
Data
ACK

Piggyback Separate

IIT Kharagpur Introduction to Internet of Things Week 2 37


Question No: 3

• Which of the following is NOT a messaging mode of CoAP?

a. Separate
b. Pager
c. Piggyback
d. Confirmable

IIT Kharagpur Introduction to Internet of Things Week 2 38


Question No: 4

• The Zigbee Component “APS” stands for .

a. Application Support Sub-layer


b. Application Protocol Support
c. Application Policy Support
d. Application Protocol Sub-layer

IIT Kharagpur Introduction to Internet of Things Week 2 39


Question No: 4

APS: Application Support Sub-layer

• Interfacing and control services


• Bridge between network and other layers

IIT Kharagpur Introduction to Internet of Things Week 2 40


Question No: 4

• The Zigbee Component “APS” stands for .

a. Application Support Sub-layer


b. Application Protocol Support
c. Application Policy Support
d. Application Protocol Sub-layer

IIT Kharagpur Introduction to Internet of Things Week 2 41


Question No: 5

• Does IEEE 802.15.4 support IPv6 multicast?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 2 42


Question No: 5

• Does IEEE 802.15.4 support IPv6 multicast?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 2 43


Question No: 6

• In MQTT, a subscribes to a topic.

a. client
b. broker
c. publisher
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 2 44


Question No: 6

SUBSCRIBER
PUBLISH
PUBLISH
PUBLISHER SUBSCRIBE
BROKER
PUBLISH

SUBSCRIBE SUBSCRIBER

IIT Kharagpur Introduction to Internet of Things Week 2 45


Question No: 6

• In MQTT, a subscribes to a topic.

a. client
b. broker
c. publisher
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 2 46


Question No: 7

• Which of the following is a characteristic of XMPP protocol?

a. No interoperability
b. Closed standards
c. No central server
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 2 47


Question No: 7

XMPP

▪ XMPP – Extensible Messaging and Presence Protocol.


▪ A communication protocol for message-oriented middleware based on XML (Extensible Markup Language).
▪ Real-time exchange of structured data.
▪ It is an open standard protocol.
▪ Decentralization – No central server; anyone can run their own XMPP server.
▪ Open standards – No royalties or granted permissions are required to implement these specifications
▪ Security – Authentication, encryption, etc.
▪ Flexibility – Supports interoperability

IIT Kharagpur Introduction to Internet of Things Week 2 48


Question No: 7

• Which of the following is a characteristic of XMPP protocol?

a. No interoperability
b. Closed standards
c. No central server
d. All of the above

IIT Kharagpur Introduction to Internet of Things Week 2 49


Question No: 8

• Which of the following protocol has a component named “bindings”?

a. XMPP
b. AMQP
c. CoAP
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 2 50


Question No: 8

• AMQP Components

Exchange
•Part of Broker
• Receives messages and routes them to Queues

Queue
•Consumers receive messages from queues
• Separate queues for separate business processes

Bindings
Rules for distributing messages (who can access what message, destination of the message)

IIT Kharagpur Introduction to Internet of Things Week 2 51


Question No: 8

• Which of the following protocol has a component named “bindings”?

a. XMPP
b.
c. CoAP
AMQP
d. None of the above

IIT Kharagpur Introduction to Internet of Things Week 2 52


Question No: 9

• Is CoAP RESTful?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 2 53


Question No: 9

• Is CoAP RESTful?

a. Yes
b. No

IIT Kharagpur Introduction to Internet of Things Week 2 54


Question No: 10

• RPL routing is based upon routing protocol.

a. Enhanced Interior Gateway


b. Interior Gateway
c. Open Shortest Path First
d. Distance vector IPv6

IIT Kharagpur Introduction to Internet of Things Week 2 55


Question No: 10

• RPL routing

• Routing Protocol for Low-Power and Lossy Networks

• Proactive protocol

• IPV6 Distance vector

IIT Kharagpur Introduction to Internet of Things Week 2 56


Question No: 10

• RPL routing is based upon routing protocol.

a. Enhanced Interior Gateway


b. Interior Gateway
c. Open Shortest Path First
d. Distance vector IPv6

IIT Kharagpur Introduction to Internet of Things Week 2 57


Question No: 11

Which of the following protocol is used to implement device management for mobile devices?

a. OMA-DM
b. Websocket
c. Alljoyn
d. DNS-SD

IIT Kharagpur Introduction to Internet of Things Week 2 58


Question No: 11

Which of the following protocol is used to implement device management for mobile devices?

a. OMA-DM
b. Websocket
c. Alljoyn
d. DNS-SD

OMA-DM is a protocol specified by the Open Mobile Alliance and is often used in the context of complex structured
mobile solutions. It is often preferred by service providers to implement device management for mobile devices.

IIT Kharagpur Introduction to Internet of Things Week 2 59


Question No: 12

In LOADng, can intermediate routers respond to Route Requests (RREQs)?

a. Yes, in any case

b. Yes, only when RREQ flooding occurs

c. Yes, only if they have active routes to the sought destination

d. No

IIT Kharagpur Introduction to Internet of Things Week 2 60


Question No: 12

In LOADng, can intermediate routers respond to Route Requests (RREQs)?

a. Yes, in any case

b. Yes, only when RREQ flooding occurs

c. Yes, only if they have active routes to the sought destination

d. No

Intermediate LOADng Routers are explicitly prohibited from responding to RREQs, even if they may have active
routes to the sought destination.

IIT Kharagpur Introduction to Internet of Things Week 2 61


Question No: 13

Which of the following functions as the network bridge in IEEE 802.15.4 network?

a. PAN Coordinator

b. Router

c. Device

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 62


Question No: 13

Which of the following functions as the network bridge in IEEE 802.15.4 network?

a. PAN Coordinator

b. Router

c. Device

d. None of these

Every IEEE 802.15.4 network has a minimum of one coordinator device type who acts as the root; it also functions as
the network bridge. The coordinator performs data handling and storing operations.

IIT Kharagpur Introduction to Internet of Things Week 2 63


Question No: 14

Which of the following allow communication between Zigbee and no-Zigbee devices?

a. layer-5 application-level bridge

b. layer-7 application-level gateway

c. layer-7 application-level bridge

d. layer-5 application-level gateway

IIT Kharagpur Introduction to Internet of Things Week 2 64


Question No: 14

Which of the following allow communication between Zigbee and no-Zigbee devices?

a. layer-5 application-level bridge

b. layer-7 application-level gateway

c. layer-7 application-level bridge

d. layer-5 application-level gateway

In order to enable communication between Zigbee and no-Zigbee devices, a layer-7 application-level gateway has to
be created, which is quite complex.

IIT Kharagpur Introduction to Internet of Things Week 2 65


Question No: 15

Statement I: RFIDs are radio-frequency-based.

Statement II: RFID devices can act as both readers as well as tags.

Which one of the following is correct?

a. Statement I is true but Statement II is false

b. Statement I is false but Statement II is true

c. Both the statements are true

d. Both the statements are false

IIT Kharagpur Introduction to Internet of Things Week 2 66


Question No: 15

Statement I: RFIDs are radio-frequency-based.

Statement II: RFID devices can act as both readers as well as tags.

Which one of the following is correct?

a. Statement I is true but Statement II is false

b. Statement I is false but Statement II is true

c. Both the statements are true

d. Both the statements are false

RFIDs are primarily radio-frequency-based, which can work even when they are not visible. These devices can’t act as
both readers as well as tags.

IIT Kharagpur Introduction to Internet of Things Week 2 67


Question No: 16

In AMQP, which of the following functionality defines its component “exchange”?

a. linkage between various queues

b. receives messages from various queues

c. defines rules for message routing to various queues

d. routing the messages to various queues

IIT Kharagpur Introduction to Internet of Things Week 2 68


Question No: 16

In AMQP, which of the following functionality defines its component “exchange”?

a. linkage between various queues

b. receives messages from various queues

c. defines rules for message routing to various queues

d. routing the messages to various queues

Messages are not posted directly in the queue; rather, the user sends messages to the exchange. An exchange is
responsible for routing the messages to the various queues.

IIT Kharagpur Introduction to Internet of Things Week 2 69


Question No: 17

Which of the following is designed to have low overhead and better scalability in terms of dense networks?

a. LOADng

b. RPL

c. Both LOADng and RPL

d. AODV

IIT Kharagpur Introduction to Internet of Things Week 2 70


Question No: 17

Which of the following is designed to have low overhead and better scalability in terms of dense networks?

a. LOADng

b. RPL

c. Both LOADng and RPL

d. AODV

RPL is designed to have low overhead and better scalability in terms of dense networks.

IIT Kharagpur Introduction to Internet of Things Week 2 71


Question No: 18

Which of the following AMQP frame type controls the message flow rate?

a. Transfer

b. Flow

c. Control

d. Disposition

IIT Kharagpur Introduction to Internet of Things Week 2 72


Question No: 18

Which of the following AMQP frame type controls the message flow rate?

a. Transfer

b. Flow

c. Control

d. Disposition

“Flow” frame type controls the message flow rate.

IIT Kharagpur Introduction to Internet of Things Week 2 73


Question No: 19

Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?

a. Yes

b. No

IIT Kharagpur Introduction to Internet of Things Week 2 74


Question No: 19

Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other IP-based devices?

a. Yes

b. No

6LoWPAN allows interoperability between IEEE802.15.4-based wireless devices, as well as other IP-based devices.
6LoWPAN simply uses a bridge to enable communication between other devices.

IIT Kharagpur Introduction to Internet of Things Week 2 75


Question No: 20

Does MQTT support event-driven architecture?

a. Yes

b. No

IIT Kharagpur Introduction to Internet of Things Week 2 76


Question No: 20

Does MQTT support event-driven architecture?

a. Yes

b. No

MQTT protocol uses a publish/subscribe architecture.


Publish/subscribe is event-driven and enables messages to be pushed to clients.

IIT Kharagpur Introduction to Internet of Things Week 2 77


Question No: 21

Which of the following is the acronym for “Extensible Messaging and Presence Protocol”?

a. EMPP

b. XMLP

c. XMPP

d. XMP

IIT Kharagpur Introduction to Internet of Things Week 2 78


Question No: 21

Which of the following is the acronym for “Extensible Messaging and Presence Protocol”?

a. EMPP

b. XMLP

c. XMPP

d. XMP

IIT Kharagpur Introduction to Internet of Things Week 2 79


Question No: 22

An IoT network requires communication mechanism, which is capable of synchronous as well as asynchronous
communication. The mechanism should support both request-response, as well as publish-subscribe models. Which of
the following protocol would be best suited for such a mechanism?

a. AMQP

b. CoAP

c. MQTT

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 80


Question No: 22

An IoT network requires communication mechanism, which is capable of synchronous as well as asynchronous
communication. The mechanism should support both request-response, as well as publish-subscribe models. Which of
the following protocol would be best suited for such a mechanism?

a. AMQP

b. CoAP

c. MQTT

d. None of these

CoAP is capable of synchronous as well as asynchronous communication. It supports both request-response as well as
publish-subscribe models.

IIT Kharagpur Introduction to Internet of Things Week 2 81


Question No: 23

Which of the following technique is used to transmit data frames in Beacon-enabled IEEE 802.15.4 networks?

a. unslotted CSMA/CA

b. slotted CSMA/CA

c. unslotted CSMA/CD

d. slotted CSMA/CD

IIT Kharagpur Introduction to Internet of Things Week 2 82


Question No: 23

Which of the following technique is used to transmit data frames in Beacon-enabled IEEE 802.15.4 networks?

a. unslotted CSMA/CA

b. slotted CSMA/CA

c. unslotted CSMA/CD

d. slotted CSMA/CD

The periodic transmission of beacon messages characterizes beacon enabled networks. Here, the data frames are sent
via slotted CSMA/CA with a super-frame structure managed by a personal area network (PAN) coordinator.

IIT Kharagpur Introduction to Internet of Things Week 2 83


Question No: 24

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer

b. 16-bit unsigned integer

c. 8-bit signed integer

d. 16-bit signed integer

IIT Kharagpur Introduction to Internet of Things Week 2 84


Question No: 24

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer

b. 16-bit unsigned integer

c. 8-bit signed integer

d. 16-bit signed integer

Hop limit in 6LoWPAN packet format allows up to 8-bit unsigned integer. Decremented by 1 by each node that
forwards the packet. The packet is discarded if Hop Limit is decremented to zero.

IIT Kharagpur Introduction to Internet of Things Week 2 85


Question No: 25

In the context of XMPP, which of the following correctly defines BOSH?

a. XML streaming

b. HTTP binding

c. Both XML streaming and HTTP binding

d. Binary encoding

IIT Kharagpur Introduction to Internet of Things Week 2 86


Question No: 25

In the context of XMPP, which of the following correctly defines BOSH?

a. XML streaming

b. HTTP binding

c. Both XML streaming and HTTP binding

d. Binary encoding

IIT Kharagpur Introduction to Internet of Things Week 2 87


Question No: 26

Which of the following protocol is used to implement device management for mobile devices?

a. OMA-DM

b. Websocket

c. Alljoyn

d. DNS-SD

IIT Kharagpur Introduction to Internet of Things Week 2 88


Question No: 26

Which of the following protocol is used to implement device management for mobile devices?

a. OMA-DM

b. Websocket

c. Alljoyn

d. DNS-SD

IIT Kharagpur Introduction to Internet of Things Week 2 89


Question No: 27

In LOADng, can intermediate routers respond to Route Requests (RREQs)?

a. Yes, in any case

b. Yes, only when RREQ flooding occurs

c. Yes, only if they have active routes to the sought destination

d. No

IIT Kharagpur Introduction to Internet of Things Week 2 90


Question No: 27

In LOADng, can intermediate routers respond to Route Requests (RREQs)?

a. Yes, in any case

b. Yes, only when RREQ flooding occurs

c. Yes, only if they have active routes to the sought destination

d. No

IIT Kharagpur Introduction to Internet of Things Week 2 91


Question No: 28

Statement I – The messaging sub-layer of CoAP, is responsible for reliability and duplication of messages.

Statement II – The request/response sub-layer is responsible for communication.

Which of the above statement/statements is/are correct?

a. Only Statement I

b. Only Statement II

c. Both Statement I and II

d. Statement I Correct but Statement II Incorrect

IIT Kharagpur Introduction to Internet of Things Week 2 92


Question No: 28

Statement I – The messaging sub-layer of CoAP, is responsible for reliability and duplication of messages.

Statement II – The request/response sub-layer is responsible for communication.

Which of the above statement/statements is/are correct?

a. Only Statement I

b. Only Statement II

c. Both Statement I and II

d. Statement I Correct but Statement II Incorrect

IIT Kharagpur Introduction to Internet of Things Week 2 93


Question No: 29

Which of the following is a messaging mode in CoAP?

a. Append

b. Substitute

c. Attempt

d. Separate

IIT Kharagpur Introduction to Internet of Things Week 2 94


Question No: 29

Which of the following is a messaging mode in CoAP?

a. Append

b. Substitute

c. Attempt

d. Separate

IIT Kharagpur Introduction to Internet of Things Week 2 95


Question No: 30

Which of the following provides for the discovery of services residing locally or across a network?

a. Internet

b. SMQTT

c. XMPP

d. CoAP

IIT Kharagpur Introduction to Internet of Things Week 2 96


Question No: 30

Which of the following provides for the discovery of services residing locally or across a network?

a. Internet

b. SMQTT

c. XMPP

d. CoAP

IIT Kharagpur Introduction to Internet of Things Week 2 97


Question No: 31

AMQP is a protocol of which layer?

a. Transport Layer

b. Application Layer

c. Network Layer

d. Session Layer

IIT Kharagpur Introduction to Internet of Things Week 2 98


Question No: 31

AMQP is a protocol of which layer?

a. Transport Layer

b. Application Layer

c. Network Layer

d. Session Layer

IIT Kharagpur Introduction to Internet of Things Week 2 99


Question No: 32

Which of the following is NOT a feature of the AMQP protocol?

a. Closed Standard

b. Security

c. Reliability

d. Routing

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 32

Which of the following is NOT a feature of the AMQP protocol?

a. Closed Standard

b. Security

c. Reliability

d. Routing

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 33

There are a total of _________ number of AMQP frame types are defined that are used to initiate, control, and tear
down the transfer of messages between two peers.

a. Seven

b. Eight

c. Nine

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 33

There are a total of _________ number of AMQP frame types are defined that are used to initiate, control, and tear
down the transfer of messages between two peers.

a. Seven

b. Eight

c. Nine

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 34

The function/functions of the Queue component of the AMQP protocol is/are -

a. Receive messages and route them to queues

b. Separate queues for separate business process

c. Consumer receive messages from queues

d. Both (b) and (c)

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 34

The function/functions of the Queue component of the AMQP protocol is/are -

a. Receive messages and route them to queues

b. Separate queues for separate business process

c. Consumer receive messages from queues

d. Both (b) and (c)

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 35

In the context of XMPP, which of the following correctly defines BOSH?

a. XML streaming

b. HTTP binding

c. Both XML streaming and HTTP binding

d. Binary encoding

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 35

In the context of XMPP, which of the following correctly defines BOSH?

a. XML streaming

b. HTTP binding

c. Both XML streaming and HTTP binding

d. Binary encoding

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 36

Does MQTT support event-driven architecture?

a. Yes

b. No

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 36

Does MQTT support event-driven architecture?

a. Yes

b. No

IIT Kharagpur Introduction to Internet of Things Week 2 10


Question No: 37

Which of the following is the acronym for “Extensible Messaging and Presence Protocol”?

a. EMPP

b. XMLP

c. XMPP

d. XMP

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 37

Which of the following is the acronym for “Extensible Messaging and Presence Protocol”?

a. EMPP

b. XMLP

c. XMPP

d. XMP

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 38

An IoT network requires communication mechanism, which is capable of synchronous as well as asynchronous
communication. The mechanism should support both request-response, as well as publish-subscribe models. Which
of the following protocol would be best suited for such a mechanism?

a. AMQP

b. CoAP

c. MQTT

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 38

An IoT network requires communication mechanism, which is capable of synchronous as well as asynchronous
communication. The mechanism should support both request-response, as well as publish-subscribe models. Which
of the following protocol would be best suited for such a mechanism?

a. AMQP

b. CoAP

c. MQTT

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 39

Which of the following technique is used to transmit data frames in Beacon-enabled IEEE 802.15.4 networks?

a. unslotted CSMA/CA

b. slotted CSMA/CA

c. unslotted CSMA/CD

d. slotted CSMA/CD

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 39

Which of the following technique is used to transmit data frames in Beacon-enabled IEEE 802.15.4 networks?

a. unslotted CSMA/CA

b. slotted CSMA/CA

c. unslotted CSMA/CD

d. slotted CSMA/CD

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 40

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer

b. 16-bit unsigned integer

c. 8-bit signed integer

d. 16-bit signed integer

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 40

What is the maximum size of hop limit in 6LoWPAN packet format?

a. 8-bit unsigned integer

b. 16-bit unsigned integer

c. 8-bit signed integer

d. 16-bit signed integer

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 41

Which of the following is based on the publish-subscribe model?

a. MQTT

b. HTTP

c. HTTPS

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 41

Which of the following is based on the publish-subscribe model?

a. MQTT

b. HTTP

c. HTTPS

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 11


Question No: 41

Which of the following is based on the publish-subscribe model?

a. MQTT

b. HTTP

c. HTTPS

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 42

In MQTT, a topic to which a client is subscribed is updated in the form of messages and distributed by the _______?

a. Publishers

b. Message Broker

c. Subscribers

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 42

In MQTT, a topic to which a client is subscribed is updated in the form of messages and distributed by the _______?

a. Publishers

b. Message Broker

c. Subscribers

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 43

Which of the following is used when more than one level needs to be subscribed, such as the entire sub-tree, i.e., a
multilevel wildcard?

a. +

b. #

c. \

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 43

Which of the following is used when more than one level needs to be subscribed, such as the entire sub-tree, i.e., a
multilevel wildcard?

a. +

b. #

c. \

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 44

The CoAP protocol is designed for -.

a. Heavy Web Application

b. Publish-Subscribe Applications

c. Machine-to-Machine (M2M) applications

d. Both (a) and (b)

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 44

The CoAP protocol is designed for -.

a. Heavy Web Application

b. Publish-Subscribe Applications

c. Machine-to-Machine (M2M) applications

d. Both (a) and (b)

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 45

Which of the following statements is/are false?

Statement – I: IEEE 802.15.4 is a well-known standard for low data-rate Wireless

Personal Area Network (WPAN).

Statement – II: IEEE 802.15.4 standard operates in the ISM band.

a. Statement - II

b. Statement - I

c. Both Statement I and II

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 45

Which of the following statements is/are false?

Statement – I: IEEE 802.15.4 is a well-known standard for low data-rate Wireless

Personal Area Network (WPAN).

Statement – II: IEEE 802.15.4 standard operates in the ISM band.

a. Statement - II

b. Statement - I

c. Both Statement I and II

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 46

The IEEE 802.15.4 establishes functionalities in which layers?

a. Application and Session Layers

b. Transport and Data Link Layers

c. Network and Session Layers

d. Physical and Data Link Layers

IIT Kharagpur Introduction to Internet of Things Week 2 12


Question No: 46

The IEEE 802.15.4 establishes functionalities in which layers?

a. Application and Session Layers

b. Transport and Data Link Layers

c. Network and Session Layers

d. Physical and Data Link Layers

IIT Kharagpur Introduction to Internet of Things Week 2 13


Question No: 47

State whether the following statement is True or False.

Statement: Similar to traditional barcodes and QR codes, RFID tag data cannot be read outside the line-of-sight.

a. False

b. True

IIT Kharagpur Introduction to Internet of Things Week 2 13


Question No: 47

State whether the following statement is True or False.

Statement: Similar to traditional barcodes and QR codes, RFID tag data cannot be read outside the line-of-sight.

a. False

b. True

IIT Kharagpur Introduction to Internet of Things Week 2 132


Question No: 48

The full form of MQTT is

a. Message Queue Telemetry Transport

b. Message Query Telemetry Transport

c. Message Queue Telemedicine Transport

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 133


Question No: 48

The full form of MQTT is

a. Message Queue Telemetry Transport

b. Message Query Telemetry Transport

c. Message Queue Telemedicine Transport

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 134


Question No: 49

In MQTT, a ________________ controls the publish-subscribe messaging pattern.

a. Publishers

b. Message Broker

c. Subscribers

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 135


Question No: 49

In MQTT, a ________________ controls the publish-subscribe messaging pattern.

a. Publishers

b. Message Broker

c. Subscribers

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 136


Question No: 50

Which of the following is NOT a component of MQTT?

a. Publishers

b. Users

c. Brokers

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 137


Question No: 50

Which of the following is NOT a component of MQTT?

a. Publishers

b. Users

c. Brokers

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 138


Question No: 51

______________ is an extension of MQTT which uses lightweight attribute based encryption. It has ___________
main stages.

a. SMQTT, three

b. BMQTT, three

c. SMQTT, four

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 139


Question No: 51

______________ is an extension of MQTT which uses lightweight attribute based encryption. It has ___________
main stages.

a. SMQTT, three

b. BMQTT, three

c. SMQTT, four

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 140


Question No: 52

Which of the following is based on Request-Response model between end-points?

a. MQTT

b. CoAP

c. Both (a) and (b)

d. Neither (a) nor (b)

IIT Kharagpur Introduction to Internet of Things Week 2 141


Question No: 52

Which of the following is based on Request-Response model between end-points?

a. MQTT

b. CoAP

c. Both (a) and (b)

d. Neither (a) nor (b)

IIT Kharagpur Introduction to Internet of Things Week 2 142


Question No: 53

The two sub-layers of CoAP are -

a. Messaging and Holding

b. Messaging and Backoff

c. Messaging and Teardown

d. Messaging and Request/response

IIT Kharagpur Introduction to Internet of Things Week 2 143


Question No: 53

The two sub-layers of CoAP are -

a. Messaging and Holding

b. Messaging and Backoff

c. Messaging and Teardown

d. Messaging and Request/response

IIT Kharagpur Introduction to Internet of Things Week 2 144


Question No: 54

Which of the followingis used for real-time exchange of structured data?

a. MQTT

b. SMQTT

c. XMPP

d. CoAP

IIT Kharagpur Introduction to Internet of Things Week 2 145


Question No: 54

Which of the following is used for real-time exchange of structured data?

a. MQTT

b. SMQTT

c. XMPP

d. CoAP

IIT Kharagpur Introduction to Internet of Things Week 2 146


Question No: 55

XMPP uses the ________________ architecture.

a. Publish-subscribe

b. Client-server

c. Both (a) and (b)

d. Neither (a) nor (b)

IIT Kharagpur Introduction to Internet of Things Week 2 147


Question No: 55

XMPP uses the ________________ architecture.

a. Publish-subscribe

b. Client-server

c. Both (a) and (b)

d. Neither (a) nor (b)

IIT Kharagpur Introduction to Internet of Things Week 2 148


Question No: 56

Which of the following message delivery guarantees allow each message to be delivered certainly but also may be
delivered multiple times.

a. At-least-once

b. At-most-once

c. Exactly-once

d. Both (a) and (b)

IIT Kharagpur Introduction to Internet of Things Week 2 149


Question No: 56

Which of the following message delivery guarantees allow each message to be delivered certainly but also may be
delivered multiple times.

a. At-least-once

b. At-most-once

c. Exactly-once

d. Both (a) and (b)

IIT Kharagpur Introduction to Internet of Things Week 2 150


Question No: 57

Which of the following is/are NOT an AMQP frame type?

a. Open

b. Close

c. End

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 151


Question No: 57

Which of the following is/are NOT an AMQP frame type?

a. Open

b. Close

c. End

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 152


Question No: 58

Which of the following is/are NOT the function/functions of the Bindings component of

the AMQP protocol?

a. Receives messages and routes them to queues

b. Separate queues for separate business process

c. Consumer receive messages from queues

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 153


Question No: 58

Which of the following is/are NOT the function/functions of the Bindings component of

the AMQP protocol?

a. Receives messages and routes them to queues

b. Separate queues for separate business process

c. Consumer receive messages from queues

d. All of these

IIT Kharagpur Introduction to Internet of Things Week 2 154


Question No: 59

Which of the following is/are NOT exchange types in AMQP?

a. Direct

b. Indirect

c. Fan-out

d. Topic

IIT Kharagpur Introduction to Internet of Things Week 2 155


Question No: 59

Which of the following is/are NOT exchange types in AMQP?

a. Direct

b. Indirect

c. Fan-out

d. Topic

IIT Kharagpur Introduction to Internet of Things Week 2 156


Question No: 60

State whether the following statement is True or False.

Statement: The IEEE 802.15.4 is a well-known standard for low data-rate Wireless Personal Area Network (WPAN).

a. True

b. False

IIT Kharagpur Introduction to Internet of Things Week 2 157


Question No: 60

State whether the following statement is True or False.

Statement: The IEEE 802.15.4 is a well-known standard for low data-rate Wireless Personal Area Network (WPAN).

a. True

b. False

IIT Kharagpur Introduction to Internet of Things Week 2 158


Question No: 61

The networking topologies supported in the IEEE 802.15.4 are -

a. Only Star

b. Star and Mesh

c. Only Mesh

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 159


Question No: 61

The networking topologies supported in the IEEE 802.15.4 are -

a. Only Star

b. Star and Mesh

c. Only Mesh

d. None of these

IIT Kharagpur Introduction to Internet of Things Week 2 160


Question No: 62

State whether the following statement is True or False.

Statement: Periodic transmission of beacon messages does not occur in beacon enabled networks (IEEE 802.15.4).

a. False

b. True

IIT Kharagpur Introduction to Internet of Things Week 2 161


Question No: 62

State whether the following statement is True or False.

Statement: Periodic transmission of beacon messages does not occur in beacon enabled networks (IEEE 802.15.4).

a. False

b. True

IIT Kharagpur Introduction to Internet of Things Week 2 162


Thank
You

IIT Kharagpur Week 2 163

You might also like