U4 Flashcards

1
Q

The core idea behind IoT technology is to ?

A

connect physical devices to the Internet and enable communication between users and their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

By connecting a huge number of devices to the Internet, one often has to deal with?

A

so-called constrained devices which have physical limitations in the allocated energy, size, and memory footprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To provide these constrained devices with connectivity, IoT developers have to ?

A

implement a communication protocol stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The figure below demonstrates the widely adopted networking protocols within IoT and where they fit within the TCP/IP layers.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Many emerging networking technologies, offered by different vendors, are being adopted within the ———————–. These competing technologies mostly provide alternative implementations of the same————————.

A

IoT space

standard protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For example,

A

IEEE 802.15.4 describes the operation of low-rate wireless personal area networks (LR-WPANs) and is implemented by several competing technologies including ZigBee, Z-Wave, SNAP, and 6LoWPAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is worth mentioning that some Internet protocols, e.g., Ethernet and Wi-Fi, can be?

A

applied in the IoT framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nevertheless, new technologies are being developed specifically to?

A

meet the IoT challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The structure of a network is known as ?

A

its topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most common network topologies that are adopted within IoT are?

A

star and mesh topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In mesh topologies, IoT devices connect to ?

A

other devices within range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The nodes within a network can act as ?

A

simple sensor nodes which route traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mesh networks are more complex than networks with star topologies but?

A

have the advantage of being more resilient to failure because they do not depend on a single central gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Now, we discuss two communication patterns that are commonly used in the IoT applications.

A

Publish/Subscribe Pattern
Representational State Transfer Pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The publish/subscribe pattern concentrates on ?

A

the non-direct exchange of messages between a sender and a receiver.

As delineated below, the sender, referred to as the publisher, sends the message not directly to the receiver, but publishes it to a message-oriented middleware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This middleware is called ?

A

a broker and manages the distribution of messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A sender publishes?

A

a message to the broker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A receiver, referred to as?

A

the subscriber, can subscribe to the content/topics of interest and then will receive all messages that are relevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The broker must handle all incoming messages and distribute them correctly to?

A

all subscribed receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using this pattern enables ?

A

a loose coupling between senders and receivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In this context, loose coupling means that?

A

they do not depend on each other regarding time, space, and synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Senders and receivers do not need to?

A

know where the other end-device is located (e.g., IP address).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

They also do not need to run at the same time to receive/send————————. For synchronization, they do not need to ——————–local operations to send or receive messages.

A

a message

interrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Publish/subscribe provides three different types of message filtering:

.

A

The first filter approach is a “subject-based filtering” performed with topics hosted on the broker.

Each message published to the broker has a specific topic and each subscription of a client is related to a specific topic.

The broker distributes messages tagged with different topics. The topics are in general string with a hierarchical structure which enables limited filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In general, a huge benefit of the publish/subscribe pattern is:

A

the fact that it is loosely coupled, and thus is extremely scalable and flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The only task done by the IoT devices is ?

A

generating the content—every other step is done through a separated message broker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

the content can easily be scaled and modulated to the architecture and design of the solution.

A

The only task done by the IoT devices is generating the content—every other step is done through a separated message broker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Furthermore, the publish/subscribe pattern lends itself very well to?

A

testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A subscriber is?

A

narrowly limited to a set of events that they have requested under a certain topic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

If a failure occurs, this natural segmentation informs the provider as ?

A

to where the fault is, and which class of users is experiencing the fault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Unfortunately, decoupling is seen as a ?

A

huge disadvantage for this pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Brokers in the publish/subscribe pattern cannot effectively notify the publishers that?

A

a certain message has been sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The subscribers are entirely separated from the event and thus?

A

may not know if a message was not erroneously sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

While the system is extensible and flexible, network instability may occur with ?

A

an increase in traffic load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Such a high load will lead to ? its own difficulties when these relationships need to be modulated.

A

the aforementioned instability together with increased complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Although the relationship between the publisher and subscriber in this model may be beneficial, it also comes with?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Although the relationship between the publisher and subscriber in this model may be beneficial, it also comes with?

A

its own difficulties when these relationships need to be modulated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The Representational State Transfer (REST) pattern enables IoT applications to?

A

represent objects as resources with universal resource identifier (URI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

REST is based on the client/server architecture which relies on?

A

the HTTP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

In this context, a resource is ?

A

a source of specific information, i.e., sensor readings, identified with an URI identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Such resources can be?

A

readily manipulated by using the HTTPmethods, i.e., GET, PUT, POST, and DELETE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Using the REST architectural style allows?

A

an independent implementation of clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Such an independency leads to a stateless system, where neither the server nor the client needs to?

A

know anything about the current state of the other end-device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Standard HTTP methods are used?

A

To get the content of some object or to modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Standard HTTP methods are used?

A

To get the content of some object or to modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Standard HTTP methods are used?

A

To get the content of some object or to modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Standard HTTP methods are used?

A

To get the content of some object or to modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Standard HTTP methods are used?

A

To get the content of some object or to modify it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A request consists of ?

A

an HTTP method identifier,
a message header,
a path to a resource,
and an optional message body with data in case of a PUT or POST request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

In the request example above, a GET request is sent to a server with the specified path of the resource. In the header, the accepted content-type is defined as JSON. On the server side, a JSON file is located at the specified path. After the server gets the request, the response looks like the following:

A

Code
GET http://example.com/temperature/sensor1
Accept: application/json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The status codes are inherited from?

A

HTTP semantics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The content behind the URI can be very different, e.g.,?

A

XML, JSON, images, or PDF files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In general, REST is popular thanks to its simplicity where it builds upon existing systems and features of the Internet’s HTTP to achieve?

A

its objectives, in lieu of creating new standards, frameworks, and technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

REST-based applications can be written using?

A

any language, e.g., Java, Kotlin,.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Another advantage of REST is being a?

A

language-agnostic architectural style.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

NET, AngularJS, or JavaScript, as long as the programming language can make web-based requests using ?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Accordingly, IoT developers have the freedom to select the?

A

technologies that are well suited for their situation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

We classify these technologies into :

A

IP-based protocols
and non-IP-based technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The non-IP communication systems are?

A

optimized for cost and energy usage, whereas IP-based solutions usually have fewer constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Furthermore, we divide the non-IP-based communication systems into?

A

short-range and long-range communication systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

In general, IP represents the standard form of?

A

global communication for several reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

For instance,

A

IP stacks are provided by nearly every operating system and every medium. IP communication protocols can run on various WPAN systems, e.g., cellular, copper wire, fiber-optic, PCI Express, and satellite systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

IP stacks are provided by ?

A

nearly every operating system and every medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

IP communication protocols can run on various WPAN systems, e.g., ?

A

cellular, copper wire, fiber-optic, PCI Express, and satellite systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Furthermore, —————has withstood the test of time by users for —— years. Longevity is paramount for many industrial and field ————————— that must support devices and systems for decades.

A

TCP
40

IoT solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Aside from longevity, TCP/IP is governed by?

A

the Internet Engineering Task Force (IETF) which IETF maintains a set of open standards focused on the Internet protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

System designers can trust IP for their application?

A

the Internet Engineering Task Force (IETF) which IETF maintains a set of open standards focused on the Internet protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Additionally, IP-based networks have mostly demonstrated massive scaling to billions of users and many more devices To further enhance the scalability, IPv6 has been designed to provide?

A

a unique IP address to a virtually unlimited number of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Finally, there exist various tools to manage IP networks and devices on an IP network:

A

Modeling tools,
network sniffers,
diagnostic tools,
and various appliances exist to assist in building,
scaling,
and maintaining networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

IP addresses require a well-supported and robust transport layer, e.g., ?

A

TCP and user datagram protocol (UDP), for end-to-end communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

TCP is used for connection-oriented transmissions, whereas UDP is used for?

A

connectionless transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

UDP is naturally much simpler to implement than TCP, but ?

A

not as resilient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Both services provide segment reordering as packets are?

A

not guaranteed to be delivered in order using an IP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

TCP also provides the layer of reliability to an unreliable IP network layer using?

A

acknowledgment messages and retransmissions of lost messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Additionally, TCP provides flow control using ? a lightweight, high-speed facility for broadcasting data to various devices that may or may not be present.

A

sliding windows and congestion avoidance algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Alternatively, UDP provides?

A

a lightweight,
high-speed facility for broadcasting data to various devices that may or may not be present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

In fact, 6LoWPAN is the result of several efforts to bring IP addressability to?

A

the resource-constrained devices which do not need high bandwidth networking services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

6LoWPAN is an acronym that stands for ?

A

IPV6 over low-power WPANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The protocol can be used with?

A

other WPAN communications such as 802.15.4 as well as Bluetooth, and sub-1 GHz RF protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The main advantage of 6LoWPAN is?

A

-the simplicity of implementing sensors which have IP addressability and act as a network citizen over 3G/4G/LTE/Wi-Fi/Ethernet routers.

  • Moreover, IPV6 provides significant theoretical addressability of billions of unique addresses, thus more IoT devices can be easily connected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

6LoWPAN networks are typically?

A

mesh networks residing on the periphery of larger networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

These topologies are naturally flexible, thus?

A

allowing for disjointed networks without any binding to the Internet or other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Additionally, ad-hoc networks can form without ?

A

requiring an Internet connectivity of an edge router (Olsson, 2014).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The figure below depicts an example of an IPv6 network, including a 6LoWPAN mesh network.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

The 6LoWPAN networks operates on the edge and is connected to the IPv6 network using?

A

an edge router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

As can be seen below, three different types of nodes exist within the 6LoWPAN mesh network:

A

router nodes,
host nodes
and edge routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The router nodes forward data from?

A

one 6LoWPAN mesh node to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The host nodes in the mesh network cannot?

A

-route data in the mesh
-and are simply endpoints consuming or producing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Hosts are allowed to be?

A

in sleep states, occasionally waking to produce data or receive data cached by their parent routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

The edge router handles three actions:

A

(1) the data exchange between 6LoWPAN devices and the Internet;
(2) the local data exchange between devices inside the 6LoWPAN;
and (3) the generation and maintenance of the radio subnet (the 6LoWPAN network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

OSI model

A

This is a conceptual framework that describes functions of the networking and divides data communication into seven abstraction layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

6LoWPAN significantly changes?

A

the IoT landscape.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Without 6LoWPAN, a complex application layer gateway is required to?

A

make devices such as ZigBee and Bluetooth connect to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

6LoWPAN solves this problem through introducing?

A

an adaptation layer between the IP stack’s link and network layers to enable transmission of IPv6 datagrams over IEEE 802.15.4 radio links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

As depicted in the following figure, the stack of 6LoWPAN comprises several layers, analog to the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

At the outset, the physical layer converts data bits into————————- and received over the air. Afterward, the data link layer provides a ——————— between two directly connected ————.

A

signals transmitted

reliable link

nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Such reliability is achieved by?

A

-detecting and correcting errors that may occur in the physical layer during transmission and receiving.

-Specifically, the data link layer includes the media access layer (MAC) which provides access to the media, using protocols such as the carrier sense multiple access–collision avoidance (CSMA-CA) where the radio listens that no other IoT device is transmitting before actually sending data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

The data link layer also includes the 6LoWPAN adaptation layer which provide?

A

adaptation from IPv6 to IEEE 802.15.4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The network layer addresses and routes data through?

A

the network over several hops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

The transport layer, e.g., TCP/IP, generates communication sessions among different applications running on?

A

end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Additionally, it allows multiple applications, on each end device, to ?

A

have their own communications channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Bluetooth is ?

A

one of the most adopted wireless technologies that is designed for short-range communication.

Many of our everyday devices implement the Bluetooth feature such as mobile phones, smart watches, sensors, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Furthermore, Bluetooth Low Energy (BLE), otherwise known as ——————————— is also a wireless communication technology that was first introduced as ——————————— in 2006. After that, the ———————————— (SIG) adopted the technology and kept developing it as ————– was introduced in the ——————————————————— version 4.0 in 2010.

A

Bluetooth Smart,

Wibree by Nokia

Bluetooth Special Interest Group

BLE

Bluetooth Core Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Although there are many wireless technologies that have been emerging in the market such as Zigbee and 6LoWPAN, BLE has?

A

drastically improved and grown exponentially more than those other technologies

due to its low power consumption

and also its prior support on many devices and smartphones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

BLE was first supported on the Android platform in?

A

API 18 (Android Jelly Bean version 4.3).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Android smartphones could interact with BLE devices which allowed them to ?

A

fetch services and even read or write data to these BLE smart devices. the expansion of BLE-integrated low-power devices such as heart rate monitors, proximity sensors, and fitness trackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

This feature had a great influence on the Android community as it helped in ?

A

the expansion of BLE-integrated low-power devices such as heart rate monitors, proximity sensors, and fitness trackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Additionally, BLE has many great features as it is?

A

extremely power efficient and has an enhanced short communication range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

The ability of BLE devices to consume low energy and to operate on coin-cell batteries for months, or sometimes years, made it a very reliable technology to be used in many IoT applications.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Technically speaking, BLE has two implementation modes:

A

-single mode.
Devices that concentrate on low power consumption and low cost, such as smart watches and heart rate sensors.

-dual mode.
Devices that can operate on both Bluetooth Classic and BLE. For example, smartphones need Classic Bluetooth to connect to a Bluetooth headset. However, BLE is also required to connect to a smart fitness tracker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The BLE Protocol Stack consists of two main parts:

A

the controller
and the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

The controller part has two layers:

A

(1) the link layer which is responsible for providing medium access, error control, flow control, and connection establishment; and

(2) the physical layer which makes sure the transmission and reception of data bits are working properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Meanwhile, the host part has three main components:

A

-the control

and adaptation protocol (L2CAP),

Generic Attribute Profile (GATT), and Generic Access Profile (GAP).

-The Generic Access Profile (GAP) provides a framework which describes the procedures and modes for data broadcasting, device discovery, and establishing connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

GAP specifies four possible roles for the BLE device to adopt:

A

Broadcaster,
Observer,
Central,
and Peripheral.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Each one of these roles will be?

A

further discussed in detail throughout this section.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Any IoT device with integrated BLE has the ability to use two communication mechanisms which are:

A

“connection” and “broadcast.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

First, the connection mechanism is ?

A

used for the establishment of a bi-directional communication to exchange data between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Two types of devices are present in this type of communication:

A

central device
and peripheral device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Basically, the main role of the central device is to? sending advertisements and responding to connection requests, if received.

A

regularly scan for advertising packets that it can connect to,
and if found, it sends a connection request to the advertising devices to begin data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

On the other hand, the peripheral device is responsible for ?

A

sending advertisements and responding to connection requests, if received.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

The following figure illustrates the connection topology between the central and peripheral roles in BLE connection scenario.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

the difference between central devices and peripheral devices?

A

Accordingly, the central devices have the privilege of connecting to more than one peripheral device at the same time, while the peripheral cannot connect to several central devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

When the two devices establish a connection, the peripheral device stops?

A

advertising more packets and begins data exchange only between these two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

After establishing the connection, the central device deals with?

A

the timing intervals
and the exchange of data procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

After establishing the connection, the central device deals with?

A

the timing intervals
and the exchange of data procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

After establishing the connection, the central device deals with?

A

the timing intervals
and the exchange of data procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

After establishing the connection, the central device deals with?

A

the timing intervals
and the exchange of data procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

The other communication mechanism is ————————. Broadcasting is a simple way to establish ———————–connection for the ————–devices to send data to central devices, if they are within the ———————.

A

broadcast

one-way
peripheral

range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

In addition, this mechanism has two discrete roles:

A

(1) broadcaster and

(2) observer.

The broadcaster role is to send advertising packets periodically to nearby listening devices while the observer can receive and collect these advertising packets sent by the broadcaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Moreover, an advertising packet is mainly composed of?

A

a 31-byte payload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

An advertising packet is mainly composed of a 31-byte payload. These bytes include:

A

device descriptive data
and other information that can be transmitted to an observer during the connection period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Additionally, this payload can be extended with an optional second packet of 31 bytes which means that ?

A

the advertising packet’s size can be up to 62 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

The figure below demonstrates the advertising process between a broadcaster (i.e., peripheral device) and an observer (i.e., central device).

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

A peripheral specifies a certain ————interval. As each interval passes, it ——————its advertising ———-. Setting long intervals reduces the energy consumption but a device only advertising itself once every ——————— is considered less responsive compared to when advertising itself every————————.

A

advertising
re-transmits

packet

circa 2 seconds

20 milliseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Additionally, if the observer wants the scan response payload which is available on the peripheral device, it can?

A

request this scan payload and the broadcasting peripheral responds with the additional data.

129
Q

The two communication mechanisms have their advantages and disadvantages. Specifically, the connection mechanism has the advantage of ?

A

better privacy and security, as the data packets are received and read by only the two connected devices which is different from broadcasting, as it enables any device in the listening range to scan its data.

129
Q

The two communication mechanisms have their advantages and disadvantages. Specifically, the connection mechanism has the advantage of ?

A

better privacy and security, as the data packets are received and read by only the two connected devices which is different from broadcasting, as it enables any device in the listening range to scan its data.

130
Q

Therefore, the use of the broadcast mechanism in some applications that include the transmission of sensitive information is?

A

not preferable.

131
Q

Nonetheless, broadcasting is suitable for applications that require?

A

sending small amounts of data or sending it to multiple devices.

132
Q

Nonetheless, broadcasting is suitable for applications that require?

A

sending small amounts of data or sending it to multiple devices.

133
Q

In addition, the connection mechanism conceivably has less?

A

power consumption, as the devices connected to peripherals can increase the delay between connection intervals as well as limiting the transmission of data to just when the data is updated or changed.

134
Q

On the other hand, broadcasting devices only?

A

advertise their data continuously whether there is an observer listening.

135
Q

The Generic Attribute Profile (GATT) defines?

A

the procedure of transferring data back and forth between two BLE devices.

136
Q

Specifically, GATT defines?

A

the way of how central and peripheral devices can exchange data based on services and characteristics.

137
Q

Furthermore, it sets the rules and guidelines that BLE devices have to follow in order to?

A

be able to discover, read, and write data of the respected connected devices.

138
Q

The Attribute Protocol (ATT) is the basis of?

A

GATT data exchange procedure where it stores services and characteristics in a look-up table.

139
Q

Furthermore, GATT deals with:

A

the peripheral device
as a server,
while the IoT device that act as a central device
is referred to as a client.

140
Q

The server holds the ATT look-up table containing ?

A

both service and characteristic definitions, and the GATT client sends requests to this server.

141
Q

When establishing a connection between central and peripheral devices, the transaction starts?

A

from the central device. Afterward, the central device waits for the peripheral’s response.

142
Q

The peripheral device suggests a “————————–” to the central device, and the central device tries to —————–every connection interval to check if any new data is ——————–.

A

connection interval

reconnect

available

142
Q

The peripheral device suggests a “————————–” to the central device, and the central device tries to —————–every connection interval to check if any new data is ——————–.

A

connection interval

reconnect

available

143
Q

The first level of the GATT Data hierarchy is?

A

the profile which is composed of services created by Bluetooth SIG or peripheral designers to identify the application present in the server.

144
Q

For instance,

A

-a heart rate profile contains heart rate and device information services.
-Each service may contain several characteristics, e.g., a heart rate monitor service could include a heart rate measurement characteristic.
- Additionally, each characteristic consists of a piece of user data called the characteristic value which contains the actual application data,
-as well as metadata that describe the characteristic value.
-The last component is the characteristic properties which decide what operation can be executed on the associated characteristic value.

145
Q

In what follows, we provide a brief explanation of each property:

A

-read.
This property is used when a GATT client asks for a specific characteristic to be obtained from the GATT server. Therefore, the GATT server sends the desired data to the GATT client.
-write.
This property is used when the GATT client assigns a new value to a specific characteristic stored in the GATT server.
-notify/indicate.
If the GATT server needs to send data to the GATT client, the GATT server must notify the client and wait for a response from the client. The GATT client cannot directly obtain data from a server. Instead, the server must subscribe to the client’s characteristic data and the GATT client may write back the needed data to the GATT server.

146
Q

In wireless communication, mobile cellular network technologies, such as ?

A

4G networks,
cover great areas
and are used ubiquitously,
being developed to serve users with high data rates.

147
Q

However, a primary disadvantage of these cellular networks when?

A

being used in IoT applications is the high energy consumption that is needed to achieve these high data rates over a greater range.

148
Q

Wi-Fi was also developed to achieve high data rates, but only ?

A

covering small areas of up to a few tens of meters.

149
Q

To assure the high data rates, Wi-Fi also needs ?

A

a high energy consumption to operate.

150
Q

A much lower energy consumption is addressed by?

A

technologies such as BLE or ZigBee.

In contrast, these technologies are based mostly on top of mesh networks

and therefore need network routing.

151
Q

To fill the gap of these communication technologies, LPWANs have been adopted in?

A

many modern IoT applications.

152
Q

Together with similar approaches like Sigfox and Ingenu RPMA, LoRa was developed to achieve?

A

low-power consumption over large ranges.

153
Q

The main goal of LoRa is to build ?

A

IoT applications on top of long-ranging devices that have a low power consumption and can therefore last up to 10 or 20 years.

154
Q

In contrast to wireless technologies like BLE and Zigbee, the topology of LoRa/LoRaWAN is?

A

shaped as a star-of-stars instead of a mesh.

155
Q

LoRa devices communicate directly to one (or more) gateway(s) and not routed over other LoRa devices?

A

in contrast to wireless technologies like BLE and Zigbee, the topology of LoRa/LoRaWAN is shaped as a star-of-stars instead of a mesh.

156
Q

The great advantage of this topology is that there is?

A

no need for costly forwarding messages over nodes to the gateways.

157
Q

Through a backbone network, such as Ethernet, the gateways are connected to a central network server?

A

The great advantage of this topology is that there is no need for costly forwarding messages over nodes to the gateways.

158
Q

Such topology highly improves the energy efficiency since?

A

there is no forwarding mechanism needed on the LoRa nodes themselves.

159
Q

Below, the protocol stack of LoRaWAN is depicted, including :

A

the various layers.

160
Q

LoRa PHY is?

A

the physical layer of the LoRa network. LoRa operates in sub-gigahertz unlicensed bands at 868 MHz in Europe, 915 Mhz in the United States, and at 433 Mhz in Asia and it can be used in both acknowledged and unacknowledged modes.

161
Q

It uses chirp spread spectrum (CSS) as its?

A

modulation technique.

162
Q

CSS differentiates between ?

A

upchirps and downchirps corresponding to 1 and 0.

163
Q

The transmission frequency is increased inside a predefined bandwidth for ?

A

an upchirp, and decreased accordingly for a downchirp.

164
Q

The time interval of each chirp can be configured by using?

A

different spreading factors (SFs).

165
Q

The SFs are integer values between ?

A

7 and 12, and they manipulate the chirp duration.

166
Q

The data frames sent over the wireless connection start with ?

A

a preamble and a start of frame delimiter (SFD) which are used to synchronize a sender and receiver.

167
Q

The preamble is, for example, ?

A

built up with eight following upchirps.

168
Q

The following part of the frame is?

A

the PHY Header which probably contains information about the payload length.

169
Q

After the PHY Header, the frame contains a cyclic redundancy check (CRC)?

A

which checks for possible errors in the payload data, followed by the payload data.

170
Q

Aside from the physical layer, LoRaWAN medium-access control (MAC) protocol runs on?

A

the network server and is based on the ALOHA protocol.

171
Q

It can be further configured to allow listening before talking?

A

Because Aside from the physical layer, LoRaWAN medium-access control (MAC) protocol runs on the network server and is based on the ALOHA protocol.

172
Q

The payload of a data frame in a LoRa PHY message includes:

A

-the MAC header of length one byte,
the MAC payload
and a 4-byte long code to ensure message integrity.

173
Q

The MAC payload is then further partitioned into ?

A

device address,
a few control features and the payload which can vary between 227–242 bytes for a low spreading factor 7 and for a high spreading factor of 8 between 36 and 51 bytes.

174
Q

In terms of activation and security, the data link layer (and also the layers above) of LoRa is called ?

A

LoRaWAN.

175
Q

Packets that are sent via PHY are forwarded from?

A

the gateway to a network server.

176
Q

Since the network is a star topology, routing is?

A

not
required on the network.

177
Q

The backhaul connection between the gateway and the network server is?

A

an IP-based connection, e.g., 3G and Ethernet.

178
Q

The network server is used to ?

A

authenticate the LoRa nodes and builds a connection when a newly arrived nodes which enters the range of the gateway.

179
Q

The network server additionally forwards the payload to?

A

one or more application server.

180
Q

Both connections from LoRa end-device to network server and from the network server to the application server are?

A

end-to-end secured by session keys.

181
Q

There are two techniques provided for a LoRa node to join a network:

A

Over-the-Air Activation (OTAA)

and Activation by Personalization (ABP).

182
Q

OTAA uses an Application ID together with an Application Key and the Device ID to?

A

authenticate the LoRa device.

183
Q

LoRaWAN has three device classes to address the trade-off between?

A

the battery lifetime and the downlink network communication latency.

184
Q

LoRaWAN has three device classes:

A

Class A devices
Class B devices
Class C devices

185
Q

Class A devices

A

=Class A devices schedule their up- and downlink transmissions depending on the need for transmission by the LoRa device.
=For every uplink transmission, two windows of short downlink transmissions are opened.
=The time in which a transmission can be sent is called the “duty-cycle” and is given in percentage of time.
=Class A devices are the most power saving option of the three device classes, as it is mostly not possible to send downlink messages from the network server to the end-node.

186
Q

Class B devices

A

Class B devices additionally serve with another receive window that is opened corresponding to the synchronized time of the gateway.

187
Q

Finally, Class C devices

A

are always listening except during data transmission.

188
Q

Besides LoRa, Sigfox is currently accepted as?

A

an efficient LPWAN technology.

189
Q

Furthermore, Ingenu RPMA claims that it has gained?

A

momentum in recent years.

190
Q

Sigfox is another long-range wireless technology that has?

A

already been developed earlier than LoRa/LoRaWAN in 2009.

191
Q

In general, Sigfox has similar characteristics as LoRa but ?

A

differs especially in technological details.

192
Q

For the physical transmission, each message is:

A

100 Hz wide and transferred at 100
or 600 bits per second data rate, depending on the region.

193
Q

Sigfox covers higher ranges then?

Battery lifetime strongly depends on?

A

LoRa, namely 10 km in urban areas and up to 50 km in rural regions.

the frequency of sending messages.

194
Q

For example,

A

using a 3.6 V lithium AA-cell battery, the lifetime can vary from six years while sending ten times a day to more than ten years while transmitting once a day.

195
Q

If there are more messages sent a day, the battery lifetime can?

A

shrink to a few months.

196
Q

A little later than LoRa and Sigfox, the company Ingenu published its LPWAN technology called?

A

“RPMA.”

197
Q

Ingenu RPMA, in contrast to the other two LPWAN technologies, does not work on ?

A

sub-gigahertz frequency bands, but on 2.4 GHz.

198
Q

,Accordingly, Ingenu RPMA has the advantage of being independent on the region, i.e.,?

A

the frequency does not change from Europe to the United States or Asia.

199
Q

the frequency does not change from? to?

A

Europe to the United States or Asia.

200
Q

Ingenu adopts the Code Division Multiple Access (CDMA) modulation technique which?

A

allows transmission of multiple senders within the same time slot.

201
Q

The following table compares important measures of ?

A

LoRa/LoRaWAN, Sigfox, and Ingenu RPMA.

202
Q

Sigfox comes out with a high range but ?

A

lacks in data transmission rate.

It also does not provide the highest maximum battery lifetime.

203
Q

LoRa/LoRaWAN has slightly better values in all the metrics except?

A

the coverage range.

204
Q

However, the long battery life depends on?

A

the device class used by the LoRa device.

205
Q

In general, Ingenu RPMA outperforms in all of the listed categories where it provides?

A

-a relatively intermediate coverage range.

-Moreover, it provides the highest data rates and battery life.

-It also does not depend on regional differences in the frequency bands.

206
Q

However, LoRa/LoRaWAN and Sigfox have already gained ?

A

a large group of companies and researchers working with their technologies.

207
Q

Comparison of LPWAN Technologies

A
208
Q

IoT technology is currently spreading in all domains. With an increasing number of IoT devices getting connected to the Internet, the requirements for ?

A

communication protocols also increase.

209
Q

This section elaborates on some common communication protocols in the application layer, also referred to as?

A

messaging protocols,
in IoT architectures,
including message queuing telemetry transport (MQTT),
representational state transfer (RESTful), and constrained application protocol (CoAP).

210
Q

These protocols must interoperate with many kinds of electronic devices with ?

A

different hardware specifications.

211
Q

MQTT is a messaging protocol, built on?

A

top of the TCP protocol that aims at connecting embedded devices and networks with applications and middleware.

212
Q

Using TCP requires to establish a connection before ?

A

exchanging information, the connection operation typically uses various routing mechanism, e.g., one-to-one, one-to-many, many-to-many.

213
Q

In fact, MQTT is an optimal connection protocol for the IoT applications with?

A

resource-constrained devices that use unreliable or low bandwidth links.

214
Q

MQTT utilizes the publish/subscribe pattern to provide?

A

transition flexibility and simplicity of implementation.

215
Q

As introduced, using the publish/subscribe pattern the sender does not transmit the message directly to?

A

a receiver but via an MQTT message broker.

216
Q

In this manner, the complexity of the MQTT protocol resides on?

A

the message broker which manages all subscriptions
and the publishing of new messages to the topics.

217
Q

In general, the MQTT message format comprises a?

Similarly, the payload component contains the data being sent and it does not always present in an MQTT message, i.e., the connect message does not include a payload component. The minimum packet size is 2 bytes with a single byte control field and a single byte packet length field, i.e., the disconnect message is only 2 bytes. The size of the variable header can be up to 12 bytes.

A

2-byte fixed header, a variable header, and a payload.

218
Q

The fixed header always presents in all MQTT messages while the variable header is?

A

not
always present in an MQTT message where its size depends on the message type and the QoS level.

219
Q

It can contain additional information, including:

A

-QoS level,

-connect flags providing additional parameter such as a username or password for access to a broker,

-keep alive defines the maximum time between two control packets sent by the client; if the limit is reached, the broker closes the connection to this client,

-topic name describes the specific topic for subscribing or publishing, and

-packet identifier to explicit identify each packet.

220
Q

MQTT messages may have some additional features, such as?

A

the “retained” message, the “Last WILL and Testament,” and the “persistent sessions.”

221
Q

These features can be activated through?

A

flags in the variable header of the “connect” messages.

222
Q

For storing the last published message of a topic at the server, the retained messages feature must be?

A

activated.

223
Q

Accordingly, the broker always stores?

A

the newest message of a topic on the server so as to be able to retransmit the message if a client lost the connection.

224
Q

If a client subscribes to a specific topic, this stored message is?

A

published to the client as the current value.

225
Q

The “Last WILL and Testament” feature enables MQTT clients to store a so-called ?

A

WILL message at the broker.

226
Q

The client can save this message for all topics it publishes. If the broker abnormally loses the connection to a publisher, then ?

A

the broker sends this WILL message to all subscribers of the concerning topics.

227
Q

This message is useful in case of?

A

failure of a device to inform all others that depend on it about the failure.

228
Q

Finally, the persistent sessions are ?

A

a broker-side feature.

229
Q

If a client reconnects to a broker for a certain topic after a connection loss, it receives ?

A

all missed messages from this topic.

230
Q

In addition, the client does not need to re-subscribe on topics because?

A

in the session on the broker all subscriptions are saved.

231
Q

MQTT offers three QoS levels for?

A

the reliable delivery of messages.

232
Q

The first level is referred to?

A

as QoS level 0 and it realizes an “at most once” delivery approach.

233
Q

In the QoS level 0, the sender of a message does not wait for?

A

an acknowledgment of the receiver.

234
Q

it does not perform message retransmission?

A

The sender does not know whether the message was delivered correctly.

235
Q

Therefore, this QoS level is called ?

A

fire and forget and is the most lightweight QoS level within MQTT.

236
Q

The second level, referred to as?

A

QoS level 1, enables an “at least once” delivery.

237
Q

QoS level 1 guarantees that a message is ?

A

delivered at least one time to the receiver.

238
Q

In this level, the MQTT messages get expanded by ?

A

a variable header in which an extra packet identifier is stored to identify every single message.

239
Q

The QoS level 2 is the highest level of service in MQTT in which each message ?

A

is received only once by the intended receivers.

240
Q

QoS 2 is considered the safest, but?

A

slowest, QoS level within MQTT.

241
Q

To provide such a guarantee, at least two request/response flows (i.e., a four-part handshake) between?

A

a sender and a receiver are needed.

242
Q

In this context, the sender and receiver use the packet identifier of the original PUBLISH message to coordinate?

A

a successful delivery of the MQTT message.

243
Q

When a receiver, i.e., broker, gets a QoS 2 PUBLISH packet from a sender, i.e., publisher, it replies to?

A

the sender with a PUBREC packet that acknowledges the PUBLISH packet.

244
Q

If the sender did not get a PUBREC packet from the receiver within a specific time, then?

A

it sends the PUBLISH packet again with a duplicate flag until it receives an acknowledgment.

245
Q

Once the sender receives a PUBREC packet, then?

A

the sender stores it and responds with a message-release PUBREL packet which includes the data to be transmitted.

246
Q

After the receiver gets the PUBREL packet, it can forward the message to?

A

any subscriber and responds to the sender with a publish-complete PUBCOMP packet.

247
Q

The intuition behind this step is to?

A

avoid processing the message a second time.

248
Q

If a packet gets lost, the sender is responsible to ?

A

retransmit the message within a reasonable amount of time.

249
Q

Although MQTT enables :

lightweight communication
and an efficient distribution of messages, ?

A

it relies on the TCP/IP network stack.

250
Q

WSNs are typically utilized in IoT applications such as :

A

industrial automation or transportation business.

251
Q

To connect those sensor networks to existing MQTT based systems, MQTT-SN has been designed as?

A

an extension to the typical MQTT.

252
Q

This protocol extension is optimized for?

A

low-cost and low-power devices and constrained networks, such as WSNs

253
Q

Basically, MQTT-SN (MQTT for Sensor Networks) supports all features of MQTT, but MQTT-SN is aimed at?

A

embedded devices on non-TCP/IP networks, such as ZigBee.

254
Q

This gateway is connected to the nodes in?

A

the WSN with MQTT-SN and to the main message broker with MQTT.

255
Q

Such gateways translate between MQTT-SN and MQTT, and exchange messages between ?

A

a device and an MQTT broker.

256
Q

Such gateways translate between MQTT-SN and MQTT, and exchange messages between ?

A

a device and an MQTT broker.

256
Q

Such gateways translate between MQTT-SN and MQTT, and exchange messages between ?

A

a device and an MQTT broker.

257
Q

To this end, a gateway discovery mechanism enables sensor nodes to?

A

automatically find gateways.

258
Q

An MQTT-SN-supported WSN typically consists of two main components:

A

an MQTT-SN client and an MQTT-SN Gateway.

259
Q

On the client side, MQTT-SN enables?

A

the sensor/actuator to publish data and connect to a gateway.

260
Q

In this context, there are two different types of gateways. The first type is?

A

the transparent gateway which can serve only one MQTT-SN client and maintains a connection to the MQTT broker.

261
Q

This approach can lead to ?

A

scalability problems where each client requires a dedicated gateway.

262
Q

The second type is?

A

the aggregating gateway which holds many connections to different MQTT-SN clients.

263
Q

It has only one connection to the MQTT broker and preprocesses the messages on the gateway to ?

A

reduce the message overhead.

264
Q

Furthermore, a gateway can be directly integrated in?

A

a MQTT broker, or it can be a stand-alone.

265
Q

Furthermore, MQTT-SN supports ?

A

point-to-point data transfer service and broadcast service.

266
Q

The first service enables the transport of messages?

A

between two endpoints based on their network address as unicast services.

267
Q

The second service ensures that a message sent by a WSN node can be received by?

A

all other nodes within its transmission range.

268
Q

A network protocol which supports broadcast service is needed because?

A

clients need to discover reachable gateways.

269
Q

MQTT-SN also supports multiple gateway connection for clients which means ?

A

devices have access to multiple gateways at the same time.

270
Q

In case of a connection loss to one gateway, a client can then?

A

send its messages to the other gateways.

271
Q

RESTful web services implement the REST architecture which is based on?

A

the request/response model.

272
Q

RESTful relies basically on ?

A

the HTTP protocols for exchanging messages using the GET, PUT, POST, and DELETE methods.

273
Q

A server implementing RESTful provides access to resources such as:

A

text files, images, or videos.

274
Q

Each resource, e.g., certain sensors or phenomenon, has its ?

A

unique URI identifier which is exposed by the server.

274
Q

Each resource, e.g., certain sensors or phenomenon, has its ?

A

unique URI identifier which is exposed by the server.

275
Q

The basic protocol of RESTful Web services consists of three parts:

A

(1) the connection establishment,
(2) the request with a response,
and (3) the connection closing.

276
Q

The connection establishment uses a three-way handshake which is?

A

a three-step method that requires both the client and server to exchange SYN (synchronize) and ACK (acknowledge) packets before actual data communication begins.

277
Q

After the connection is established, a request is ?

A

sent to the server which responds with the requested data and a status code. To close the connection, the client initiates again a three-way handshake.

278
Q

RESTful web services are commonly used in?

A

web applications.

279
Q

However, when being used by resources-constrained networks, it offers?

A

some major disadvantages.

280
Q

Generally, HTTP does not have a limit for?

A

the message size and the message header, knowing that each node must exchange three messages to set up a connection, according to the TCP transport protocol.

281
Q

For a constrained node with a limited bitrate for sending and receiving messages, it is a big challenge to?

A

send real-time HTTP requests.

282
Q

Furthermore, for each request all control information must be sent to?

A

the server because RESTful is stateless.

283
Q

This overhead increases the size of ?

A

every message as well as the time for transmission.

284
Q

In a larger network with many nodes, this overhead can impact the network ?

A

performance because of the number of messages.

284
Q

In a larger network with many nodes, this overhead can impact the network ?

A

performance because of the number of messages.

284
Q

In a larger network with many nodes, this overhead can impact the network ?

A

performance because of the number of messages.

285
Q

As a result, a real-time exchange of information is no longer ?

A

sustainable.

286
Q

Although TCP provides reliable delivery of??

A

large amounts of data which is an advantage in connections that do not have strict latency requirements, it creates challenges in resource-constrained environments.

287
Q

For sporadically sending small amounts of data, we need to?

A

set up a TCP connection that takes a long time and produces unnecessary overhead.

288
Q

To summarize, HTTP and TCP as part of ?

A

a RESTful web service provide no ideal solution as a communication protocol for the constrained networks.

289
Q

Instead, an alternative build-upon-REST protocol is ?

A

designed and presented in the next section.

290
Q

The Constrained Application Protocol (CoAP) is a lightweight protocol designed for ?

A

the special requirements of constrained environments.

291
Q

The headers, methods, and status codes are all binary encoded, thus?

A

reducing the protocol overhead in comparison with many protocols.

292
Q

Moreover, CoAP runs over the less complex UDP transport protocol instead of?

A

TCP, thus reducing the overhead.

293
Q

With UDP, messages can be exchanged without?

A

establishing a connection between the clients and the servers.

294
Q

Such an overhead reduction comes at the expense of ?

A

degrading the reliability.

295
Q

degrading the reliability.

A
295
Q

degrading the reliability.

A
296
Q

CoAP relies on a structure that is divided into two logically different layers?

A

, namely request/response
and message layer.

297
Q

The former layer implements the RESTful paradigm and allows for?

A

CoAP clients to use the same methods as HTTP when sending requests.

298
Q

In fact, CoAP provides the basic RESTful services to?

A

IoT devices and is generalized as a “compressed” HTTP.

299
Q

CoAP realizes a subset of ?

A

the REST methods with HTTP.

300
Q

CoAP realizes a subset of ?

A

the REST methods with HTTP.

301
Q

CoAP realizes a subset of ?

A

the REST methods with HTTP.

302
Q

This subset consists of?

A

the basic methods GET, PUT, POST, and DELETE.

303
Q

It is fully interoperable with REST through?

A

proxies/gateways
and can support the request/response
as well as the publish/subscribe design pattern.

304
Q

This means that CoAP requests can be converted to ?

A

HTTP requests, which are more conversant to the rest of the Web.

305
Q

Messages in CoAP are exchanged using?

A

HTTP and URI relying on the UDP as the transport protocol.

306
Q

HTTP and URI relying on the ————–as the transport protocol. These features of
—enable ————————–message exchanges and a low header overhead because the sender of a message does not have to wait until a message is —————————–.

A

UDP
CoAP
asynchronous

acknowledged

307
Q

A CoAP URI usually has the following format:

A

Code
coap://example.com:5683/sensors/temp.json

308
Q

As a response to the GET request, the server sends?

replacing the prefix HTTP with the prefix CoAP.

A

a JSON file containing temperature values.

309
Q

Obviously, the only CoAP query format differs from the HTTP requests in only

A

replacing the prefix HTTP with the prefix CoAP.

310
Q

The second structural layer, referred to as?

A

the message layer, is mainly designed for retransmitting lost packets.

311
Q

This layer defines four types of messages:

A

CON (confirmable),
NON (non-confirmable),
ACK (acknowledgable),
and RST (reset).

312
Q

The CON messages are used for ensuring?

A

reliable communication,
and they demand an acknowledgement from the receiver side with an ACK message.

313
Q

Such a feature is beneficial for marking ?

A

whether the messages need the acknowledgment.

314
Q

On the other hand, NON messages are sent without being monitored whether they are received. Non-confirmable messages are used, for example, for periodic publishing of sensor data.

A
315
Q

On the other hand, NON messages are sent without being ———-whether they are ——————— Non-confirmable messages are used, for example, for periodic publishing of—————————.

A

monitored
received.
sensor data

316
Q

CoAP has an additional feature that can be used to ———————the request/response model. Such a feature enables clients to continue receiving changes on a ——————————- from the server by adding an “—————” option to a GET request. With this option, server adds the client to the list of observers for the specific resource, which will allow the client to receive the notifications when——————————–changes.

A

enhance

requested resource

observe

resource state

317
Q

In lieu of relying on repetitive polling to check for changes in resource state, setting an observe flag in a CoAP client’s GET request allows?

A

an interaction much closer to publish-subscribe with server notifying a client when there are changes.

318
Q

The core of IoT system architecture is ?

A

the possibility of data communication and exchange.

319
Q

To connect heterogeneous devices the problems related to the physical limitations in terms of available energy, size and memory must be ?

A

dealt.

320
Q

To provide connectivity, a communication protocol stack is?

A

to be adopted.

321
Q

A widely adopted reference model is the ————–model, which introduces 4 layers: —————————————————– responsible for the hardware addressing and the physical transmission of data; ———————————- responsible for the logical transmission of data over the network; —————————————-, responsible for the end-to-end communication and lossless, error-free delivery of data; ————————-, responsible for the node-to-node communication and for the user-interface. Several protocols exist for each layer of the TCP/IP stack.

A

TCP/IP

the network access and physical layer,

the internet layer,

the transport layer

the application layer

322
Q

The physical limitations of IoT devices ask for the development of new technologies and protocols which for instance?

A

enable the communication of devices with limited energy sources.

323
Q

State-of-the-art IoT communication technologies can be classified in two categories:

A

IP-based (e.g., WLAN, 6LoWPAN)
and non IP-based (e.g., Bluetooth, ZigBee, LoRaWAN).

324
Q

Several communication protocols are available at the application layer, like:

A

MQTT, RESTful and CoAP.

325
Q

MQTT, RESTful and CoAP. Such protocols are able to interoperate with?

A

various devices based on different hardware platforms.

326
Q

MQTT makes use of the publish/subscribe pattern and provides an?

A

optimal protocol for resource-constrained devices typical of IoT.

327
Q

The RESTful architecture is based on?

A

a request/response pattern: a server provides the access to the resources, each having a unique identifier

328
Q

Due to its stateless nature, the RESTful architecture is?

A

not optimized for resource-constrained devices and for real-time exchange of information.

329
Q

The constrained application protocol (CoAP) is ?

A

a lightweight protocol designed for the specific requirements of constrained environments.

330
Q

One of the main characteristics of CoAP ist that it runs over the UDP transport layer protocol, which is simpler than?

A

the TCP protocol. As a consequence, the reliability is worsened.