Professional Documents
Culture Documents
Textbook From Internet of Things To Smart Cities Enabling Technologies 1St Edition Hongjian Sun Ebook All Chapter PDF
Textbook From Internet of Things To Smart Cities Enabling Technologies 1St Edition Hongjian Sun Ebook All Chapter PDF
https://textbookfull.com/product/smart-cities-and-homes-key-
enabling-technologies-1st-edition-mohammad-s-obaidat/
https://textbookfull.com/product/enabling-the-internet-of-things-
from-integrated-circuits-to-integrated-systems-1st-edition-
massimo-alioto-eds/
https://textbookfull.com/product/internet-of-things-enabling-
technologies-security-and-social-implications-services-and-
business-process-reengineering-santosh-kumar-pani/
https://textbookfull.com/product/enabling-the-internet-of-things-
fundamentals-design-and-applications-1st-edition-muhammad-azhar-
iqbal/
Internet of Things and the Law Legal Strategies for
Consumer Centric Smart Technologies 1st Edition Noto La
Diega
https://textbookfull.com/product/internet-of-things-and-the-law-
legal-strategies-for-consumer-centric-smart-technologies-1st-
edition-noto-la-diega/
https://textbookfull.com/product/rfid-technologies-for-internet-
of-things-1st-edition-min-chen/
https://textbookfull.com/product/internet-of-things-for-
healthcare-technologies-chinmay-chakraborty/
https://textbookfull.com/product/smart-device-recognition-
ubiquitous-electric-internet-of-things-hui-liu/
https://textbookfull.com/product/green-and-smart-technologies-
for-smart-cities-1st-edition-pradeep-tomar-editor/
From Internet of
Things to Smart Cities
Enabling Technologies
CHAPMAN & HALL/CRC
COMPUTER and INFORMATION SCIENCE SERIES
Series Editor: Sartaj Sahni
PUBLISHED TITLES
ADVERSARIAL REASONING: COMPUTATIONAL APPROACHES TO READING THE OPPONENT’S MIND
Alexander Kott and William M. McEneaney
COMPUTER-AIDED GRAPHING AND SIMULATION TOOLS FOR AUTOCAD USERS
P. A. Simionescu
DELAUNAY MESH GENERATION
Siu-Wing Cheng, Tamal Krishna Dey, and Jonathan Richard Shewchuk
DISTRIBUTED SENSOR NETWORKS, SECOND EDITION
S. Sitharama Iyengar and Richard R. Brooks
DISTRIBUTED SYSTEMS: AN ALGORITHMIC APPROACH, SECOND EDITION
Sukumar Ghosh
ENERGY-AWARE MEMORY MANAGEMENT FOR EMBEDDED MULTIMEDIA SYSTEMS:
A COMPUTER-AIDED DESIGN APPROACH
Florin Balasa and Dhiraj K. Pradhan
ENERGY EFFICIENT HARDWARE-SOFTWARE CO-SYNTHESIS USING RECONFIGURABLE HARDWARE
Jingzhao Ou and Viktor K. Prasanna
FROM ACTION SYSTEMS TO DISTRIBUTED SYSTEMS: THE REFINEMENT APPROACH
Luigia Petre and Emil Sekerinski
FROM INTERNET OF THINGS TO SMART CITIES: ENABLING TECHNOLOGIES
Hongjian Sun, Chao Wang, and Bashar I. Ahmad
FUNDAMENTALS OF NATURAL COMPUTING: BASIC CONCEPTS, ALGORITHMS, AND APPLICATIONS
Leandro Nunes de Castro
HANDBOOK OF ALGORITHMS FOR WIRELESS NETWORKING AND MOBILE COMPUTING
Azzedine Boukerche
HANDBOOK OF APPROXIMATION ALGORITHMS AND METAHEURISTICS
Teofilo F. Gonzalez
HANDBOOK OF BIOINSPIRED ALGORITHMS AND APPLICATIONS
Stephan Olariu and Albert Y. Zomaya
HANDBOOK OF COMPUTATIONAL MOLECULAR BIOLOGY
Srinivas Aluru
HANDBOOK OF DATA STRUCTURES AND APPLICATIONS
Dinesh P. Mehta and Sartaj Sahni
PUBLISHED TITLES CONTINUED
Edited by
Hongjian Sun
Durham University, UK
Chao Wang
Tongji University, Shanghai, China
Bashar I. Ahmad
University of Cambridge, UK
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity
of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized
in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying,
microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
This book is dedicated to my parents Mr Shan Sun and Ms Lijun
Chen, with love (actually they cannot read English).
But let’s see how fast they can learn English and when they are
able to understand the technologies in this book.
Hongjian Sun
Durham, United Kingdom
27 October 2016
Chao Wang
Contents
Preface xix
ix
x Contents
Chapter 4 Routing Protocol for Low Power and Lossy IoT Networks 89
Xiyuan Liu, Zhengguo Sheng, and Changchuan Yin
4.1 INTRODUCTION 90
4.2 RPL: AN OVERVIEW AND ITS KEY MECHANISMS 91
4.2.1 Routing Mechanism of RPL 91
4.2.2 Message Control Mechanism of RPL 92
4.2.3 RPL and Its Counterparts 94
4.3 RPL TOPOLOGY GENERATION METHODS 95
4.3.1 Objective Functions and Metrics 95
4.3.2 Multi-parents Consideration 97
4.4 RPL APPLICATIONS 98
4.4.1 RPL Application Overview 98
4.4.2 Application Scenarios 99
4.5 SECURITY ISSUES IN RPL 100
4.6 RPL PERFORMANCE EVALUATION IN LARGE-SCALE NETWORKS 103
4.6.1 Simulation Platforms 103
4.6.2 Framework Integration for OMNeT++ 103
4.6.3 Configuration Details 105
4.6.4 Simulation of Cross-layer RPL Routing 107
4.7 CHALLENGES AND PROSPECT 111
4.8 CONCLUSION 113
xii Contents
BIBLIOGRAPHY 113
Chapter 6 Distributed Machine Learning in Big Data Era for Smart City 151
Yuan Zuo, Yulei Wu, Geyong Min, Chengqiang Huang, and Xing Zhang
6.1 INTRODUCTION 152
6.2 THE STOCHASTIC GRADIENT DESCENT (SGD) IN PARALLELIZA-
TION 155
6.2.1 Parallelized SGD Based on MapReduce 157
6.2.2 Online SGD in Round-robin 157
6.2.3 HOGWILD! for “Lock-free” 158
6.2.4 AsySVRG for asynchronous SGD Variant 159
6.2.5 ASGD with Single-sided Communication 160
6.3 THE NEWTON METHOD IN PARALLELIZATION 160
6.3.1 A truncated Newton Method: The Trust Region Newton
Method (TRON) 162
Contents xiii
Chapter 11 Low Power Wide Area (LPWA) Networks for IoT Applications 323
Kan Zheng, Zhe Yang, Xiong Xiong, and Wei Xiang
11.1 OVERVIEW ON 5G IoT 324
11.2 OVERVIEW ON LOW POWER WIDE AREA NETWORKS (LPWANS) 326
Contents xvii
Chapter 13 Resources and Practical Factors in Smart Home and City 379
Bo Tan, Lili Tao, and Ni Zhu
13.1 INTRODUCTION 380
13.2 NOVEL USAGE OF RADIO RESOURCES 380
13.2.1 Current Situation and Challenges 380
13.2.2 Use of Outdoor Radio Signals 381
13.2.3 Use of Indoor Signals 383
13.2.4 The Trend 385
13.3 VIDEO RESOURCES 386
13.3.1 Introduction 386
13.3.2 Applications and Current Systems 387
13.3.3 Future Trends 389
13.4 PRACTICAL CONSIDERATIONS 390
13.4.1 Pervasive Sensing 390
13.4.2 Smart Cities in Reality 391
BIBLIOGRAPHY 393
Index 399
Preface
• Part II: Data Era: Data Analytic and Security. We will focus on the state-of-
the-art data analytic and security techniques;
• Part III: Towards Smart World from Interfaces to Homes to Cities. We will
discuss the design of human-machine interface that facilitates the integration
of humans to smart homes and cities, either as decision–makers or as knowledge
feeders to networks.
DISCLAIMER
We sincerely thank all contributors, who are world-leading experts in their re-
search fields, for contributing chapters to this book. Due to the time limit, there
might be errors or typos in this book, but as editors we tried our best to correct
them. If you found any errors or typos, please feel free to contact one of our editors.
Editors:
Hongjian Sun, Email: hongjian.sun@durham.ac.uk;
Chao Wang, Email: chaowang@tongji.edu.cn;
Bashar Ahmad, Email: bia23@cam.ac.uk.
xix
I
From Machine-to-Machine Communications
to Internet of Things
1
CHAPTER 1
From Machine-to-Machine
Communications to Internet
of Things: Enabling
Communication
Technologies
Hamidreza Shariatmadari
Aalto University
Sassan Iraji
Aalto University, Klick Technologies Ltd.
Riku Jäntti
Aalto University
CONTENTS
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 IoT applications and their requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 IoT connectivity landscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 IEEE 802.15.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.3.2 WiFi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3.3 Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3.4 RFID and Ambient Backscattering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.3.5 Dedicated Short Range Communications . . . . . . . . . . . . . . . . . . . . . . . . 15
1.3.6 Low Power Wide Area Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.3.7 Cellular Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4 Challenges and solutions for connectivity in 5G Era . . . . . . . . . . . . . . . . . . . . 21
1.4.1 Low-power Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.4.2 Enhanced Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.4.3 Ultra-reliable Low-latency Communications . . . . . . . . . . . . . . . . . . . . . 23
1.4.4 Massive Number of Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.4.5 Handling Small Bursts of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3
4 From Internet of Things to Smart Cities: Enabling Technologies
1.1 INTRODUCTION
The term Internet of Things (IoT) was first coined by Kevin Ashton in the late
90s, but in reality, IoT goes back a lot further than that. At the beginning it was only
a vision but today with the development of communication technologies, and in par-
ticular wireless communications, it is becoming rapidly a reality in different domains
and sectors [1]. IoT and its enabling services are revolutionizing the way we live and
creating huge growth in our economy. According to IoT paradigm, everything and ev-
eryone can be part of the Internet. This vision redefines the way people interact with
each other and objects they are surrounded by. With the development of communi-
cation technologies, billions of IoT devices are currently connected and it is expected
there will be a few tens of billions connected devices within the next five years [2]. At
the core of IoT, machine-to-machine (M2M) communications or machine-type com-
munications (MTC) plays the fundamental role by providing connectivity between
devices and servers. In that regard, it is concluded that IoT is a broader term, which
contains devices, M2M communications, and data processing [3]. Thus, IoT vision
cannot be materialized without providing efficient M2M communications.
IoT is constantly evolving by envisioning new services and applications in various
domains. The envisioned services are associated with a diverse range of communi-
cation requirements. This fact has resulted in the emergence of different wireless
communication solutions; generally, each solution satisfies a set of requirements. Al-
though the plethora of communication solutions gives the opportunity to choose a
proper solution according to the target application, it hinders the wide and fast
deployment of the application. In order to overcome such limitations, extensive ef-
forts are being undertaken to enhance the current solutions for supporting a wider
range of applications. Meanwhile, the cellular standardization forums are also try-
ing to consider the IoT vision in the development of the next generation of cellular
systems.
The goal of this chapter is to make the readers familiar with the most important
connectivity solutions for enabling M2M communications and supporting IoT appli-
cations. The remainder of the chapter is organized as follows. Section 1.2 discusses
some of the IoT services and applications, along with their requirements. Section 1.3
describes some of the existing M2M connectivity technologies and their potentials for
supporting IoT applications. Section 1.4 presents the future directions that enable a
better support of M2M communications in the cellular systems. Finally, the chapter
is concluded in Section 1.5.
• Wearables: The wearable devices can be utilized in game and leisure indus-
tries, also for the purposes of fitness, wellness, and health monitoring, which
are increasingly emerging domains.
• Utilities: There are applications that enable remote monitoring and control-
ling of user consumptions, such as water, gas, and electricity utilities. Other
important applications are related to smart grids, which can efficiently balance
between the production and consumption of electricity in large systems.
The IoT applications, including those mentioned above, have different charac-
teristics. The application characteristics imply constraints on the devices and un-
derlying communications, and also determine how the data should be gathered and
processed [3], [6], [7]. Some concerns related to the end devices are power consump-
tion, computational abilities, size, and cost. The parameters that entail constraints on
the communications include: the minimum transmission rate, transmission reliabil-
ity, the maximum tolerable latency, security, mobility, and the number of supported
devices. With increasing the number of IoT devices, the procedures of data gathering
and processing are becoming more complex. Relevant concerns are related to the level
of data processing locally, message routing, and information extraction. The system
design for IoT applications requires the joint considerations of different elements, i.e.,
device, communication technology, and data processing. For instance, the low power
consumption for the end device cannot be achieved unless the device consumes very
low energy for sensing, processing, and transmitting data.
6 From Internet of Things to Smart Cities: Enabling Technologies
The advantage of this topology is the high level of reliability as the applications can
run even if the Internet access fails. In the cloud-based network, the devices and the
server perform data exchange through the Internet, entailing all data flow is directed
to the Internet. Hence, the stable Internet connection is essential for running the
applications. This topology facilitates the scalability of application deployment as
the devices can be deployed anywhere as long as they have the Internet access. In
addition, the application can be run in a cloud server which eliminates the need of a
dedicated server.
Wireless technologies are preferred to provide connectivity for IoT devices due to
the ease of deployment, elimination of wiring cost, and mobility support. Initially,
many manufacturers developed IoT applications using their own proprietary wireless
systems. This approach has brought different technical issues, such as complexity
of system design, and lack of compatibility. For instance, products from different
manufacturers could not be easily integrated in a system. Those limitations could not
be eliminated without employing standardized wireless technologies. In part, some
standardization forums put effort to modify the existing wireless systems to support
IoT applications. In addition, several wireless solutions have emerged, optimized for
IoT applications. The rest of this section describes some of these technologies.
The MAC layer in IEEE 802.15.4 handles the access to the radio channel and
provides an interface between the service specific convergence sublayer (SSCS) and
PHY layer. It is also responsible for network synchronization, supporting device se-
curity, and providing a reliable link between two peer MAC entities. Two different
device types are defined for the IEEE 802.15.4 network: a full-function device (FFD)
that supports all network functionalities, and reduced function device (RFD) with
reduced network functionalities [8], [13]. The network can utilize star or peer-to-peer
topologies, as illustrated in Figure 1.2. In the star topology, devices can only exchange
information with a single central controller unit in the network, known as the personal
area network (PAN) coordinator. The PAN coordinator is responsible for managing
the entire network. In the peer-to-peer topology, FFD devices have additional ability
to communicate directly with each other.
The IEEE 802.15.4-2003 standard is complemented with amendments to further
enhance the performance and offer additional functionalities that are required for
some specific IoT applications. Some of these amendments are as follows.
• IEEE 802.15.4a: This amendment specifies two additional PHY layers, using
ultra-wide band (UWB) and chirp spread spectrum (CSS) [13]. The UWB PHY
enables precision ranging that can be utilized for positioning purpose. The CSS
PHY provides robust data transmission over a large distance for devices moving
at high speed, applicable for vehicular communications.
• IEEE 802.15.4b: This amendment offers the higher data rates, 200 kbps in
868 MHz and 500 kbps in 915 MHz bands.
Another random document with
no related content on Scribd:
niin on lopulta kaikki muuttuva. Työläisten voittoa ei voi ehkäistä
mikään sorto eikä väkivalta. Ei siis tarvitse toivottomaksi — tämä on
vain…
KORPI tolkuttomasti.
Murhaan yllyttämisestä?
POLIISI
POLIISI röyhkeästi.
Kaarlo…
Voi Anni — mitä tämä on? Onko kaikki totta, Anni parka? Olenko
minä murhaaja jonka elämä hukkuu hämärään vankikoppiin… —
(Katsahtaa kuin tuskasta sekopäisenä ympärilleen.) — Voi Anni…
eikö mitään… Sinnekö meidän pikku kotimme häipyi…? Ja me
puhuimme puutarhasta… missä leikkivät pienokaiset… Ei, kyllä
kuolema on parempi… — (Ääni katkeaa kuin tukehtuneena.)
KORPI
Kyllä tämä raskaalta tuntuu… sinäkin, poikaparka… — (Vaikenee
tietämättä, mitä sanoisi, miten lohduttaisi. Mutta yhtäkkiä hänen
kasvonsa kirkastuvat ja hänen matalassa, hillityssä äänessään ja
laihoilla kasvoillaan kuvastuu väkevä sisäinen innostus ja voima.)
EMIL hätäisesti.
Esirippu.
*** END OF THE PROJECT GUTENBERG EBOOK
ETUVARTIOTAISTELU ***
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.