It is often said that the age of IoT have started between the years 2008 and 2009. Why?
During this time period, the number of devices connected to the Internet eclipsed the world's population.
Set the correct order of the IoT layers:
Network
Sensing
Application
What is true for Information Technology (IT)?
Systems are: email, voice, databases, web, files, printers,...
Focused on secure flow of data across an organization.
Priorities are traditionally : 1. Security, 2. Integrity, 3. Availability
What is the technology used in passive “things”?
RFID
Who has introduced the term "Internet of Things"?
Kevin Ashton
What kind of things are there in the IoT?
Passive things
Active things
Autonomous things
What is true for Operational Technology (OT)?
Priorities are traditionally : 1. Availability, 2. Integrity, 3. Security
Monitors and controls devices and processes on physical operational systems.
Systems are: meters, actuators, automation devices, SCADA,...
the correct order of the layers in the IoTWF Architecture:
Collaboration & Processes
Data Abstraction
Data Accumulation
Edge Computing
Connectivity
Physical Devices & Controllers
Security is a driver for an IoT architecture, because IoT devices are...
physically easy accessible and widely distributed.
often connected via wireless networks that use unlicensed spectrum.
What is true for the data in the IoT?
IoT data enables businesses to deliver new services.
Analyzing the data of many devices generates new insights.
Which layer in the IoTWF Architecture markes the separation between IT and OT?
What are the main drivers for an IoT architecture?
Legacy devices and protocols.
Security.
Constrained networks.
The number of devices in an IoT network.
Constrained devices.
Amount of data generated by the IoT.
What is true for the IoT World Forum IoT Architecture?
It is a seven-layer architecture.
It decomposes the IoT problem into smaller parts.
It is created by providers of industrial automation and information technology.
What is true for the oneM2M IoT Architecture?
The applications are seen as industry-specific.
It focuses on services rather than on applications and devices.
It is created by telecom organizations.
Which of the following is true?
When implementing IoT you never have to deal with legacy protocols and interfaces.
When implementing IoT you may have to deal with legacy protocols and interfaces.
In factories, machines are replaced frequently.
In factories, machines are replaced at long intervals.
How do applications interface with the IoT devices in the oneM2M IoT framework?
Via RESTful APIs.
What do you need to consider when designing an IoT network?
Transmission range, data volume and data frequency of the smart objects.
Physical environment in which the devices are deployed.
Form factor of the smart objects.
Mobility of the smart objects.
Sort the following access technologies according to their range, starting with the shortest:
Bluetooth
Zigbee
802.11ah
LoRaWan
What type of application is SCADA?
Control application
In your IoT-system, the applications connect to the devices via HTTP. To which sublayer in our simplified IoT-architecture does HTTP belong?
IoT network management
Which kinds of analytics are used in IoT systems?
Network analytics.
Data analytics.
Edge and Fog computing can replace the Cloud.
Long-term storage of data and big-data analytics is done in the Fog close to the devices.
The most time-sensitive data is analyzed on the edge or fog node closest to the things generating the data.
The most time-sensitive data is analyzed in the cloud where the most computing power is available.
What determines the achievable range of a wireless access network?
Wireless technology.
What can be limitations of pure Cloud architectures for IoT systems?
Network bandwidth.
Latency requirements.
You want to increase the throughput and/or the achievable distance of a wireless access technology. What will be increased as well?
Power consumption.
In your IoT-system, the devices are connected via Bluetooth LE. To which sublayer in our simplified IoT-architecture does Bluetooth LE belong?
Access network
Services located in the Fog (Fog services) are:
reducing latency.
reducing network traffic.
Which protocols belong to the network management layer of our simplified IoT architecture?
CoAP
HTTP
MQTT
How can latency and network traffic be minimized?
By analyzing data close to where it is collected.
Which protocols belong to the network transport layer of our simplified IoT architecture?
TCP
UDP
What are typically factors in the choice of IoT access technologies?
Cost.
Range.
What are the enabling technologies for the IoT described by the ITU?
Nanotechnology
Smart technologies
Sensor technologies
Actuators provide the action, sensors provide the information.
A sensor measures a physical quantity and converts the measurement reading into a digital representation.
Actuators receive a control signal that triggers a physical effect.
What does the abbreviation MEMS stand for?
Micro-Electro-Mechanical System
What does the abbreviation EPC stand for?
Electronic Product Code
What are the four characteristics for defining a Smart Object?
A smart object is capable of interacting with the physical world through sensors and actuators.
A smart object can connect with other smart objects and applications in a network.
A smart object has components that need to be powered.
A smart object has some type of processing unit.
Which of the following are advantages of wireless sensor-actuator networks (SANET) over wired SANETs?
Easy introduction of new sensor-actuator nodes.
Lower implementation costs.
Greater deployment flexibility.
Better handling of dynamic topology changes.
Which of the following communication patterns do wirelessly connected smart objects typically have?
Event-driven.
Periodic.
A further development of smart things are:
Smart materials
Which of the following is true for RFID?
RFID tags can provide a unique identification.
RFID does not need a line of sight between a sensor and a tag.
EPC is the dominant standard for RFID tags.
Sensors are limited to human-like sensory data.
Actuators provide the information, sensors provide the action.
A sensor converts a digital value into a measurable physical quantity.
What does the abbreviation LPWA stand for?
Low-Power Wide-Area
Which of the following are true regarding the radio frequency spectrum?
The 2.4GHz ISM frequency band is licensed and reserved for Industrial, Scientific and Medical use only.
The 2.4GHz ISM frequency band is unlicensed and free to use.
When using licensed frequency bands you have to pay for it.
Unlicensed frequency bands are regulated, e.g. regarding transmission power or duty cycle.
Unlicensed frequency bands are free to use for everybody and unregulated.
Cellular networks use unlicensed frequency bands.
The radio spectrum is regulated by countries and organizations, such as the RTR.
When using unlicensed frequency bands you have to pay for it.
Which of the following are short-range access technologies?
Serial cable
WiFi
LoRaWAN
Visible Light Communication
Which of the following are medium-range access technologies?
Ethernet
5G
Which of the following is a sub-GHz ISM frequency band?
868MHz
433MHz
2400MHz
86,6MHz
Which of the following network topologies are used in cellular networks?
Mobile topology
Peer-to-peer topology
Star topology
Mesh topology
What is the wavelength of a 2.4GHz signal?
125mm
Which of the following are determining factors for the achievable range of a wireless technologie?
Landscape and topology
Frequency
Transmission power
Computing power
Memory constraints
Which of the following are true regarding radio transmission?
Longer wavelengths have a better ability to penetrate buildings.
With longer wavelengths a higher data rate can be achieved.
Higher frequencies have a better ability to penetrate buildings.
With shorter wavelengths a higher data rate can be achieved.
Which protocol stacks make use of IEEE 802.15.4?
6LoWPAN
ZigBee
WirelessHART
Thread & OpenThread
What layers are specified by ZigBee?
Application Support Layer
Network and Security Layer
Which of the following is true for ZigBee?
Tge ZigBee Alliance is a group of companies that maintan and publish the ZigbEE specification
ZigBee builds on teh PHY and MAC layer of IEEE 802.15.4 radio technology.
ZigBEE solutions are aimed at smart objects that have low bandwith and low power needs
When constrained devices implement an optimized IP stack and communicate directly with application servers, this is referred to as:
Adoption model
Which of the following is true for the Constrained Application Protocol (CoAP)?
Messages are exchanged by request/response.
CoAP is standardized by the IETF.
It offers reliable transmission.
It mainly uses UDP as transport layer.
Which of the following application layer protocols is a publish/subscribe protocol?
How can non-IP devices be integrated into an IP network?
By attaching the devices to a gateway that translates or tunnels the data.
Which of the following is true for the MQTT publish/subscribe framework?
Message data can be buffered, so that subscribers can access data even when the corresponding endpoints are offline.
The MQTT message broker pushes the application data to MQTT clients acting as subscribers.
It is a many-to-many communication model.
IoT endpoints act as publisher to send data to an MQTT server acting as message broker.
What are prerequisites for using web-based protocols like HTTP or Websockets in IoT?
Non-constrained nodes.
Non-constrained networks.
Which of the following is true for the Message Queuing Telemetry Transport protocol (MQTT)?
MQTT is standardized by OASIS.
It uses TCP as transport layer.
Three classes of MQTT quality of service (QoS) are defined.
Messages are exchanged by publish/subscribe.
What main functions are provided by 6LoWPAN?
IPv6 header compression
Mesh under forwarding
IPv6 packet fragmentation and reassembly
Which of the following are CoAP message types?
Reset
Acknowledgement
Non-confirmable
Confirmable
What is the purpose of the CoAP Token header field?
It correlates requests and responses.
Which of the following is a 6LoWPAN header?
Fragment Header
IPv6 Header Compression
Mesh addressing header
The 6LoWPAN headers start with identifier-bits. Which of the following is the identifier for the first fragment when using IPv6 packet fragmentation?
11000
There are two routing options when implementing the 6LoWPAN adaptation layer. Mesh under and mesh over (route over). In which layer is the routing of packets handled if mesh under is used?
6LoWPAN adaptation layer
The Modbus Serial header address field size is 1byte.
What is the maximum number of remote units that can be connected to a Modbus control unit?
247
Which of the following is true if you have to choose between IPv4 or IPv6 for a given IoT use-case?
The 6LoWPAN IP adaption layer supports IPv6 only.
Application protocols may determine the use of IPv4 or IPv6.
The first generations of cellular data services (GPRS, Edge, 3G) are based on IPv4. IPv6 must be tunneled over IPv4 when used with these technologies.
The following figure shows the direction oriented acyclic graph for a RPL network.
What is the rank of node "A"?
2
Constrained IoT devices (Class 0) do not implement a network protocol stack. What kind of functionality do you need when connecting this kind of device to an IP based network?
IoT data broker
What is the address of the Modbus Serial control unit (master)?
The control unit does not have a specific address.
Zuletzt geändertvor 7 Monaten