SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
SLOT: B1+TB1
Programme Name & Branch : B.Tech Computer Science and Engineering
Course Code and Course Name : CSI3032 Advances in Pervasive computing.
Faculty Name(s) : Dr. Sukanta Ghosh, Dr. Manoov R & Dr. Sumalatha
Class Number(s) : VL2024250502118
Exam Duration : 90 minutes Maximum Marks: 50
General instruction(s):
Answer All Questions. For each question, answer continuously at a stretch.
Q. No Question M CO BL
1. A smart city project, "UrbanEase," aims to implement a pervasive computing 10 4 2
environment to improve urban living. To achieve these objectives, the project
envisions an ecosystem of interconnected devices, sensors, and applications
seamlessly integrated into daily life. The city planners have identified the fol-
lowing specific requirements: Transportation, Waste Management, Energy Ef-
ficiency and Public Safety. The planners have concerns about scalability, pri-
vacy, and energy efficiency while deploying in the system. In the above con-
text answer the following questions. Describe the essential hardware compo-
nents (e.g., sensors, actuators, devices) required for implementing each of the
identified goals.
a) How would context-awareness play a role in transportation up-
dates and energy optimization?
b) What measures would you implement to ensure user privacy and
prevent unauthorized access to sensitive data?
c) Suggest energy-efficient solutions for powering sensors and de-
vices in this pervasive environment.
d) How would you design the system to handle a growing number
of devices and users?
Sol. a) Context-awareness in pervasive computing systems often gather and
store information on the user’s behavior, context, habits, and planning.
This information forms the basis for the many benefits the system can
offer individual users.
User database thus leads to choose preferable transport services, helps
in add-on services, preferable route identification etc.
User database helps in automatic climate control, integrated smart
homes, integrated smart devices etc.
b) Data Encryption (End-to-End), Decentralized Data Management (Edge Com-
putting and Data Anonymization & Aggregation), Data Minimization (Collect
Only Necessary Data and User Control and Consent), Security Protocols for
IoT Devices (Device Authentication and Integrity, Patch Management), Regu-
lar Auditing and Monitoring, Privacy by Design, Public Awareness and Edu-
Page 1 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
cation, Blockchain for Data Integrity.
c) Low-Power Wireless Communication Protocols, Energy Harvesting Tech-
niques, Energy-Efficient Sensor Design, Efficient Power Management and
Energy Storage, Power-Efficient Edge Computing, Optimized Network and
Data Transmission, Smart Grid Integration, Power-Saving Software and Algo-
rithms, Smart Lighting Systems.
d) Scalable Architecture Design (Distributed and Decentralized Systems and
Cloud Integration), Data Management and Storage (Edge Computing for Lo-
cal Data Processing, Distributed Databases, Data Partitioning, Data Caching),
Network Infrastructure (5G, Network Slicing, Dynamic Load Balancing), Re-
source Allocation and Management (Elastic Resource Scaling, Edge-to-Cloud
Computing Model), Device and User Management (Autonomous Device Reg-
istration and Provisioning, Self-Healing and Fault Tolerance, User Authenti-
cation & Authorization), Real-Time Processing and Decision-Making, Secu-
rity and Privacy Measures (Data Encryption, Blockchain for Transparency and
Security), Scalable APIs and Integration, Predictive Maintenance and Optimi-
zation.
2. You are tasked with developing a pervasive computing system that integrates 10 4 2
several sensor nodes distributed across a smart city environment. These sensor
nodes continuously monitor various parameters like temperature, humidity,
traffic density, and air quality, transmitting the collected data to a central proc-
essing unit for analysis and decision-making. Given the scale of the deploy-
ment (thousands of sensor nodes) and the need for real-time data processing,
your system has to ensure that data from various sensor nodes is processed ef-
ficiently and promptly.
Describe how parallel computing can be used to process the data from these
sensor nodes in real-time. What specific parallel computing models (e.g., data
parallelism, task parallelism) would you adopt, and why?
What are the major challenges you might face in implementing parallel
computing?
How will you handle the factors – Scalability, Load Balancing and energy
efficiency?
Sol. “Parallel computing refers to the process of breaking down larger problems
into smaller, independent, often similar parts that can be executed
simultaneously by multiple processors communicating via shared memory,
the results of which are combined upon completion as part of an overall
algorithm.
The primary goal of parallel computing is to increase available computation
power for faster application processing and problem solving.”
Page 2 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
Challenges in implementing parallel computing:
Heterogeneity of Devices and Resources, Network Latency and Bandwidth
Constraints, Synchronization and Consistency Issues, Power Consumption and
Energy Efficiency, Fault Tolerance and Reliability, Scalability of the System,
Security and Privacy Concerns, Data Storage and Management, Interoperabil-
ity and Standardization.
Scalability in Parallel Computing:
Horizontal Scaling (Scaling Out), Distributed Computing and Microservices,
Elastic Load Balancing and Autoscaling
Load Balancing in Parallel Computing:
Dynamic Load Balancing, Task Offloading to Edge or Cloud, Task Scheduling
Algorithms
Energy Efficiency in Parallel Computing:
Dynamic Voltage and Frequency Scaling (DVFS), Energy-Aware Task Alloca-
tion, Energy-Aware Task Allocation, Energy Harvesting, Edge Computing for
Energy Efficiency
3. How can the concept of "user-aware" computing be integrated into HCI system 10 6 3
to create personalized and adaptive user experiences?
Also discuss the challenges and ethical considerations associated with
collecting and utilizing user data in these systems.
Sol.
Page 3 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
Physical Environments
Human Environments
CPI CPI (Sense, HCI HCI HCI
Adapt) (Cooperate) (Compete)
implicit HCI
Context-
Autonomous Intelligent UbiComp
Aware
System
Distributed ICT
CCI
ICTI
Virtual Environments
Context-Aware Interaction, Personalized Interface Adaptation, Adaptive Behavior
Based on User Input, Personalized Feedback and Recommendations, Emotion-Aware
Systems, User-Centric Security and Privacy, Health and Wellness Integration.
Challenges and ethical considerations:
Privacy Concerns, Data Security and Protection, Data Ownership and Control, Sur-
veillance and User Autonomy, Transparency and Accountability, Third-Party Data
Sharing.
4. Discuss how “Cache Coherency” is handled by “Snooping Mechanism” in mo- 5+ 6 4
bile processor SOC. 5=
10
A mobile processor manufacturing unit is going to develop a robust mobile OS.
How will you formulate the new architecture of mobile OS – describe in detail.
Sol. Mobile SOC:
Page 4 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
Snooping Mechanism: Cache Coherency:
“Snooping is the logic used to resolve the problem of cache consistency.
Snooping logic in the processor broadcasts a message over the bus each time a
word in its cache has been modified. The snooping logic also snoops on the bus
looking for such messages from other processors. When a processor detects
that another processor has changed a value at an address existing in its own
cache, the snooping logic invalidates that entry in its cache. This is called cross
invalidate. Cross invalidate reminds the processor that the value in the cache is
not valid, and it must look for the correct value somewhere else (memory or
other cache).”
5. Imagine you are part of a team tasked with designing a mobile networking sys- 10 6 3
tem for a smart city project. The goal is to provide seamless wireless connec-
tivity across various locations, such as public parks, transportation hubs, and
city buildings, ensuring that residents and visitors can access high-speed inter-
Page 5 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
net services on their smartphones, laptops, and IoT devices.
Your team decides to deploy IEEE 802.11-based wireless access points (APs)
across the city, using the 2.4 GHz and 5 GHz bands. These access points will
support mobile devices that frequently move between different coverage zones.
Discuss the architecture, characteristics and CSMA protocol in the network.
Sol.
IEEE 802.11: multiple access
▪ avoid collisions: 2+ nodes transmitting at same time
▪ 802.11: CSMA - sense before transmitting
• don’t collide with detected ongoing transmission by another
node
▪ 802.11: no collision detection!
• difficult to sense collisions: high transmitting signal, weak
received signal due to fading
• can’t sense all collisions in any case: hidden terminal, fading
• goal: avoid collisions: CSMA/CollisionAvoidance
Page 6 of 7
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
CONTINUOUS ASSESSMENT TEST - I
WINTER SEMESTER 2024-2025
---------------------------------------------------------------------------------------------------------------------------------------
IEEE 802.11 MAC Protocol: CSMA/CA
Collision Avoidance: RTS-CTS exchange
Page 7 of 7