0% found this document useful (0 votes)
59 views5 pages

IOT Enabling Technologies

The document discusses the enabling technologies for the Internet of Things (IoT), highlighting the role of wireless sensor networks (WSNs), cloud computing, and big data analytics. It explains how embedded systems, which are designed for specific tasks, contribute to IoT applications by integrating various components like microprocessors, memory, and networking units. Additionally, it emphasizes the importance of low latency and high throughput in IoT applications, particularly in the context of data collection and monitoring.

Uploaded by

Ramyasri Jella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views5 pages

IOT Enabling Technologies

The document discusses the enabling technologies for the Internet of Things (IoT), highlighting the role of wireless sensor networks (WSNs), cloud computing, and big data analytics. It explains how embedded systems, which are designed for specific tasks, contribute to IoT applications by integrating various components like microprocessors, memory, and networking units. Additionally, it emphasizes the importance of low latency and high throughput in IoT applications, particularly in the context of data collection and monitoring.

Uploaded by

Ramyasri Jella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

bminaiOn WebSocket is SUl

applications that have low requests for each message.


latency or high throughputrequirements.

1.4 loT Enabling


Technologies
loT is enabled by several networks, cloud computing,
technologies includingprotocols
big data analytics, embedded wireless sensor communication
systems,
protocols, web services, mobile Internet,security protocols and architectures,
provides
and semantic search engines. This section
an overview of some of these technologies which a
play key-role in l0l
hnD Bahga &Madisetti, O 2015
nodes,
WSN applications
be service
computing,
metered
areupto
ZigBee
various physical
low-cost
environmental to
air various
of temperature,
nodes. motion structures nodes can
arcnumber
devices
with to packetS specifications
attachedexamples indoor rates of resources
as cloud
which of
at 802.15.4. of andnumber new
capability
the
data at as delivering
a deployed data of resources
of
sensors all the moisture (such of number of the
sensorsSome
the health and environmental provisioning
consist from collecton offers addition with
large computing
routing data IEEEZigBeeoutput self-organizing
Internet. data thenodes involves
theseinteraction
WSNseveral data
nodes soil points. and large
have
forthe
collect surveillance monitor as power or
analyzed. monitor sensorsuch frequency
WSNs. deploy nodes providing
involves
A haveresponsible
the
collects the various of WSNs that Cloud
conditions,to to protocols
distributed which WSNs tofrom by the monitoring some paradigm requiring
nodes WSN to to The
and at WSNs on Since
collecting GHz ability
used model.
computing
coordinator
follows:
WSNs grid data depending possible.
of
and
are inaggregated
End the use communication
2.4 networks.
of physicalRouters WSNs gases. theusevibrationtechnologies failure demand
continuousitself. computing
connects
use at
their go"without
comprises
coordinator. systems monitoring
systems
as for operates notof reconfigureCloudyou
various
systems meters
in
The described
useis WSNs
Networksand routers. that which
collecting lies is event
self-organizing on users, Appro
monitoring transformative
as
(WSN) cOordinator.
enVironmental systems
of
monitoringwireless 100 for node
ZigBee
wireless WSNs
resources
gateway the "pay
Internet.
use for
monitoring the
a as
and are data, concentration to nodeseach In can 1.4.2
Cloud
Computing Hand
WSNs
Sensor
act
monitoring systems by structure. 10 of a by
Network systems
other bridges)
by
popular
from
802.15.4. forrobust.
network in on-deman
storage
routers
alsO a quality sensing
theas health enabled powerare the users,
use
detection
data) configuration a
the can acts and moisture
Surveillance range network is over A
Wireless to loT
Sensor and grids the most WSNs computing -
monitor nodes also humidity
end-nodes air and locations. Structural(buildings, The
IEEE low-power
the andthe Thing
Weather in are
end-nodesin quality
Indoor Smart pointsthe
and network, servicesprovisione
networking
WirelessEnd Coordinatorused
Soil WSNs conditions.
conditions.
the
to
of
of on KB/s manual
services
Intern
to wSNS onebased makes Cloud
14.1used them, from " " " and
250 and the
A of is
application
Thingsresources multi-tenancy.
authors'
physical
as resources provision
virtual cloud.
systems
manage resources arethe
andprogramming
service
infrastructure systems,
service
provider
manages smart-phones.
interface
architectureboth
accessed anywhere. involv
analyze
temporal 20
such resources.
develop themselves,
on
applications manages
of as the
platforms andoperating cloud M
samethe tousers operating
software and analyt
Internet provide
computing storage in Virtual client
be from its
(see ability configure to application underlying
can of process
usingphysical provisioned
the the cloud
the andprovider terms
ability
paradigm. users, thin applications
that and
client by forms
theto deployinfrastructure.
by complete and
managing tablets
&
data B
to network,
Cloud users
mechanisms served provided underlying a independent (in manage,
Introduction the
computing users stop, the The
provided thethrough
diferent service velocity Big
heterogeneous
multiple
of can tools,
resources
pay-per-use
users
automated.
storage. a itself.
cloud
The of laptop,
tools.
be top the start.
Users and users unaware
servers, the
are development user cloud store,
toon provides underlyingg the access volume,
the services configuring platfom
access serve
The usersin resources
can and the workstations, proces
run storage. provides manages the
instance): vìrtual
users Users provides
including
is the to
is that a systenms to
of snmart-phones.
to multiple laaS on to
user difticult
whose
standard
resources and Since
use pooled providedable
to
resources These the
virtualthebased the the are
(IaaS):storage. PaaS provider application
deploying, data
offered libraries
operatingSaaS are
the for onmanages using as systems. sets
and applications
infrastructure
billed is
using areallow Computing. and
resources.
choice : suchusers and
povisioning
though (PaaS) :
(SaaS) software,
are
datait
vìnual
poviders vitual cloud that
and are Infrastructurr-as-a-Service
instances servìce databa
network cloud are software Applicationsthe of
provider developing,
network, the devices
operating
services their large
collections
tablets usersthe
access assigned and
stOrnge Platform-as-a-Service SaaS data, Data
Software-as-a-Service
to
application
Big
Analytics
the Cloud in cloud cloud
service and
applications
of cloudinterface
infrastructure. so
of the instances
nachine the application
(APIs), client traditi
of sevice servers, and is
laptops,
p eplattorm-independent
ss omputing different
browser).
over asperts povisioned
by The for underlying applicationvariety,
a r on and as
cloud [Link]
responsible
user and
or
the detined
aNessed UseNbookOmputing vìrtualcloud interfaces
machine includìng
provider.
poider.
The workstations, running using
data
the
byMulti-tenant deploy storagea
the(e.g., or
ompanion from
povided Cloud
hardVar. the The is variation
the the
of data
b 1.4.3
can
Big
and datadestination.
to packets
datatransport
formats,
connectivity sender
the
which
retransmis
andtollOWS: systems considered data
health-care
is processing is are forms
the primary
41 data
that from systemsvideo exchange
processing bands. of
data costs the different ordering
as energy insights
the network,
stations. data fast audio, enable
network
descríbed fitness be scale and and other
consumers.
lowering thesource and
to exchange
data
data to industrial, how in at
and vehicles. and data devices in
wearable
monitoring
datamassive valuable and image,
comes rateoverwhelm
helps
industrial databases to link, from
wrangling),
are of the bigrefers
industrial the
systems volume to data,
data various
of for IT,byextract of
service
allow (that
packetscontrolling
systems
and
IoT
in as tracking used moderndriven characteristic
data
Bigtext
weather such systems. traditional protocols control
(or IoT embedded the to IT, protocols not
define
about
is and of including
data. of
munging failures. devices for data need Modern
Velocity
exponentially routing is
by and include: by in network
as monitoring efficiency speeds.
generated threshold
big generated
using the the learned sequence
helps
sensors location
such important Communication
data detecting
IoT and of data, of
the
backbone and
data term varies.
data.
systems process higher
forms (that
the
cleansing,fromby
data for big
inventoryfixed
the
architectures
prOcesses,
Protocols
unstructured
you devices
1.4.4ommunication
layer
These
include
protocols.
generated datagrowing of or
it control Ap
and systems of typically, growth
another increasingly
the
frequently 1.2.2 receiver
big IoTcollected no and of
Technologies characteristics to forprotocols
of health is volumes
data by retail manage is business refers formn
protocols
section
applications. flow
schemes
examples dataIoT there exponential
processing
example, is the Ha
generated however, or
from datatheir Velocity
how determining
lost
packets),
by by
fitness Though The at structured
Variety that
store, In the
starting sensor generated
generated
monitoring improve data addressingso
and
EnablingSome data underlying architectures.
forand [Link] data A
and data,
to for generating
generated
data.
sensor
to
Communication -
Machine Volume: systems, Velocity: Variety: application
and functions lost Th
ofpackets
visualization.
Sensor Health difficult as coupling the
steps storage
to reason
DataData big such
for data encoding,sending of
loT several The as the
Other In
" " " " " "
1.4 andover
is
1.4.5 Embedded Systems
An Embedded System is acomputer system that has computer hardware and sortwae
embedded to perform specific tasks. In contrast to general purpose compuiers o poa
computers (PCs) which can perform various types of tasks, embedded systems are des1gned
toperform a specific set of tasks. Key components of an embedded system include,
microprocessor or mícrocontroller, memory (RAM, ROM, cache), networking units (Ethemet,
WiFi adapters), inputdoutput units (display, keyboard, etc.) and storage (such as flash
memory). Some embedded systems have specialized processors such as digital signal
processors (DSPs),graphics processors and aplication specific processors. Embedded
systems run embedded operating systems such as real-time operating systems (RTOS).
Embedded systems range from low-cost míniaturized devices such as digital watches to
devices such as digital cameras, point of sale terninals, vending machines, appliances (such
as washing machines),etc. In the next chapter we describe how such devices form an integral
part of loT systems.

You might also like