Professional Documents
Culture Documents
Source : Wikipedia
Trends and Caracteristic
Architecture
IoT system architecture, in its simplistic view, consists of three tiers: Tier 1: Devices, Tier
2: the Edge Gateway, and Tier 3: the Cloud.
Devices include networked things, such as the sensors and actuators found in IIoT
equipment, particularly those that use protocols such as Modbus, Bluetooth, Zigbee, or
proprietary protocols, to connect to an Edge Gateway.
The Edge Gateway consists of sensor data aggregation systems called Edge Gateways
that provide functionality, such as pre-processing of the data, securing connectivity to cloud,
using systems such as WebSockets, the event hub, and, even in some cases, edge analytics
or fog computing.
The final tier includes the cloud application built for IIoT using the microservices
architecture, which are usually polyglot and inherently secure in nature using HTTPS/OAuth. It
includes various database systems that store sensor data, such as time series databases or
asset stores using backend data storage systems (e.g. Cassandra, PostgreSQL).
Source : Wikipedia
Trends and Caracteristic
Network Architecture
The Internet of things requires huge scalability in the network space to handle the surge
of devices.[119] IETF 6LoWPAN would be used to connect devices to IP networks. With
billions of devices[120] being added to the Internet space, IPv6 will play a major role in
handling the network layer scalability. IETF's Constrained Application Protocol, ZeroMQ,
and MQTT would provide lightweight data transport.
Fog computing is a viable alternative to prevent such large burst of data flow through
Internet.[121] The edge devices' computation power to analyse and process data is extremely
limited. Limited processing power is a key attribute of IoT devices as their purpose is to
supply data about physical objects while remaining autonomous. Heavy processing
requirements use more battery power harming IoT's ability to operate. Scalability is easy
because IoT devices simply supply data through the internet to a server with sufficient
processing power.
Source : Wikipedia
Trends and Caracteristic
Complexity
In semi-open or closed loops (i.e. value chains, whenever a global finality can be settled)
the IoT will often be considered and studied as a complex system[123] due to the huge
number of different links, interactions between autonomous actors, and its capacity to
integrate new actors. At the overall stage (full open loop) it will likely be seen as
a chaotic environment (since systems always have finality). As a practical approach, not all
elements in the Internet of things run in a global, public space. Subsystems are often
implemented to mitigate the risks of privacy, control and reliability. For example, domestic
robotics (domotics) running inside a smart home might only share data within and be
available via a local network.
Source : Wikipedia
Trends and Caracteristic
Size and Space considerations
In semi-open or closed loops (i.e. value chains, whenever a global finality can be settled)
the IoT will often be considered and studied as a complex system[123] due to the huge
number of different links, interactions between autonomous actors, and its capacity to
integrate new actors. At the overall stage (full open loop) it will likely be seen as
a chaotic environment (since systems always have finality). As a practical approach, not all
elements in the Internet of things run in a global, public space. Subsystems are often
implemented to mitigate the risks of privacy, control and reliability. For example, domestic
robotics (domotics) running inside a smart home might only share data within and be
available via a local network.
In the Internet of Things, the precise geographic location of a thing—and also the
precise geographic dimensions of a thing—will be critical.[127] Therefore, facts about a thing,
such as its location in time and space, have been less critical to track because the person
processing the information can decide whether or not that information was important to the
action being taken, and if so, add the missing information (or decide to not take the action).
Source : Wikipedia
IoT Enablers
RFIDs
01 Uses radio waves in order to electronically track the tags attached to each
physical object
Sensor
02 Devices that are able to detect changes in an environment (ex: motion dete
ctors).
Nanotechnology
03 As the name suggests, these are extremely small devices with dimensions
usually less than a hundred nanometers
Smart Network
04 Ex: Mesh Topology
RFID
Radio-frequency identification (RFID)
uses electromagnetic fields to automatically identify
and track tags attached to objects. An RFID tag
consists of a tiny radio transponder; a radio receiver
and transmitter. When triggered by an
electromagnetic interrogation pulse from a nearby
RFID reader device, the tag transmits digital data,
usually an identifying inventory number, back to the
reader. This number can be used to inventory goods.
There are two types. Passive tags are powered by
energy from the RFID reader's interrogating radio
waves. Active tags are powered by a battery and
thus can be read at a greater range from the RFID
reader; up to hundreds of meters. Unlike a barcode,
the tag doesn't need to be within the line of sight of
the reader, so it may be embedded in the tracked
object. RFID is one method of automatic
identification and data capture (AIDC).[1]
Sensor
In the broadest definition,
a sensor is a device, module,
machine, or subsystem whose
purpose is to detect events or
changes in its environment and
send the information to other
electronics, frequently a computer
processor. A sensor is always used
with other electronics.
Nanotechnology
Smart Network