MODULE 2 Iot
MODULE 2 Iot
MODULE 2 Iot
Introduction
In this module, we will provide a thorough overview of what the Internet of Things is,
what it can do, and where it is going. The knowledge you gain will enable you to be part
of the IoT revolution. We will help you to plant the seeds of your IoT project ideas and
discover what you need to make them grow.
Objectives:
A Very Short
History
Of The Internet Of
Things
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
INTRODUCTION
There have been visions of smart, communicating
objects even before the global computer network
was
launched fortyfive years ago. As the Internet has
grown
to link all signs of intelligence (i.e., software)
around the
world, a number of other terms associated with
the idea
and practice of connecting everything to
everything have
made their appearance, including machineto-
machine
(M2M), Radio Frequency Identification (RFID),
context
aware computing, wearables, ubiquitous
computing, and
the Web of Things. Here are a few milestones in
the
evolution of the mashing of the physical with the
digital.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1932
Jay B. Nash writes in Spectatoritis: “Within our
grasp is the
leisure of the Greek citizen, made possible by our
mechanical slaves, which
far outnumber his twelve to fifteen per free man...
As we step into a room, at
the touch of a button a dozen light our way.
Another slave sits twentyfour
hours a day at our thermostat, regulating the heat
of our home. Another sits
night and day at our automatic refrigerator. They
start our car; run our
motors; shine our shoes; and cult our hair. They
practically eliminate time and
space by their very fleetness.”.Jay B. Nash
1949
The bar code is conceived when 27 year
old Norman Joseph Woodland draws four
lines in the sand on a Miami beach.
Woodland, who later became an IBM
engineer, received (with Bernard Silver)
the first patent for a linear bar code in
1952. More than twenty years later,
another IBMer, George Laurer, was one
of those primarily responsible for refining
the idea for use by supermarkets.
1955
Edward O. Thorp conceives of the
first wearable computer, a cigarette
packsized analog device, used for
the sole purpose of predicting
roulette
wheels. Developed further with the
help of Claude Shannon, it was
tested
in Las Vegas in the summer of 1961,
but its existence was revealed only in
1966.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
October 4, 1960
Morton Heilig receives a patent for
the firstever head
mounted display.
1967
Hubert Upton invents an analog
wearable computer with
eyeglassmounted display to aid in lip
reading. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018
1967
Hubert Upton invents an analog
wearable computer with
eyeglassmounted display to aid in lip
reading.
1977
CC Collins develops an aid to the blind, a five-
pound wearable with a head
mounted camera that converted images into a
tactile grid on a vest.
Early 1980s
Members of the CarnegieMellon
Computer Science
department install microswitches in
the Coke vending machine and
connect them to the PDP10
departmental computer so they could
see on their computer terminals how
many bottles were present in
the machine and whether they were
cold or not.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1981
While still in high school, Steve Mann
develops a backpackmounted
“wearable personal computerimaging
system and lighting kit.” CENTRO ESCOLAR UNIVERSITY
FOR INTERNAL CIRCULATION ONLY 2018
1981
While still in high school, Steve Mann
develops a backpackmounted
“wearable personal computerimaging
system and lighting kit.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1990
The Active Badge system provides a
means of locating individuals
within a building by determining the
location of their Active
Badge. This small device worn by
personnel transmits a unique infra
red signal every 10 seconds. CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1990
The Active Badge system provides a
means of locating individuals
within a building by determining the
location of their Active
Badge. This small device worn by
personnel transmits a unique infra
red signal every 10 seconds.
September 1991
Xerox PARC’s Mark Weiser
publishes “The Computer in the 21st
Century” in Scientific American, using the
terms “ubiquitous computing” and
“embodied virtuality” to describe his
vision of how “specialized elements of
hardware and software, connected by
wires, radio waves and infrared, will be so
ubiquitous that no one will notice their
presence.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018
September 1991
Xerox PARC’s Mark Weiser
publishes “The Computer in the 21st
Century” in Scientific American, using the
terms “ubiquitous computing” and
“embodied virtuality” to describe his
vision of how “specialized elements of
hardware and software, connected by
wires, radio waves and infrared, will be so
ubiquitous that no one will notice their
presence.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1993
MIT’s Thad Starner
starts using a specially
rigged computer and
headsup display as a
wearable
1993
Columbia University’s Steven Feiner,
Blair MacIntyre, and Dorée
Seligmann
develop KARMAKnowledgebased
Augmented Reality for Maintenance
Assistance. KARMA overlaid
wireframe
schematics and maintenance
instructions on top of whatever was
being repaired. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018
1993
Columbia University’s Steven Feiner,
Blair MacIntyre, and Dorée
Seligmann
develop KARMAKnowledgebased
Augmented Reality for Maintenance
Assistance. KARMA overlaid
wireframe
schematics and maintenance
instructions on top of whatever was
being repaired.
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1994
Xerox EuroPARC’s Mik Lamming and Mike Flynn
demonstrate the ForgetMeNot, a
wearable device that communicates via wireless
transmitters and records interactions with
people and devices, storing the information in a
database.CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1994
Xerox EuroPARC’s Mik Lamming and Mike Flynn
demonstrate the ForgetMeNot, a
wearable device that communicates via wireless
transmitters and records interactions with
people and devices, storing the information in a
database.
1994
Steve Mann develops a wearable
wireless webcam,
considered the first example of
lifelogging. CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION
ONLY 2018
1994
Steve Mann develops a wearable
wireless webcam,
considered the first example of
lifelogging.
September 1994
The term ‘contextaware’
is first used by B.N. Schilit and
M.M. Theimer in
“Disseminating active map
information to mobile hosts,”
Network, Vol. 8, Issue 5. CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
September 1994
The term ‘contextaware’
is first used by B.N. Schilit and
M.M. Theimer in
“Disseminating active map
information to mobile hosts,”
Network, Vol. 8, Issue 5.
1995
Siemens sets up a dedicated
department inside its mobile
phones business unit to develop and
launch a GSM data module
called “M1” for machinetomachine
(M2M) industrial applications,
enabling machines to communicate
over wireless networks. The first
M1 module was used for point of sale
(POS) terminals, in vehicle
telematics, remote monitoring and
tracking and tracing applications. CENTRO
ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
1995
Siemens sets up a dedicated
department inside its mobile
phones business unit to develop and
launch a GSM data module
called “M1” for machinetomachine
(M2M) industrial applications,
enabling machines to communicate
over wireless networks. The first
M1 module was used for point of sale
(POS) terminals, in vehicle
telematics, remote monitoring and
tracking and tracing applications.
CENTRO ESCOLAR UNIVERSITY
December 1995
FOR INTERNAL CIRCULATION ONLY 2018
December 1995
FOR INTERNAL CIRCULATION ONLY 2018
1999
The AutoID (for Automatic
Identification) Center is
established at MIT. Sanjay
Sarma, David Brock and
Kevin Ashton turned RFID into
a networking technology
by linking objects to the
Internet through the RFID tag.
1999
Neil Gershenfeld writes in When Things
Start to Think:
“Beyond seeking to make computers
ubiquitous, we should
try to make them unobtrusive.... For all
the coverage of the
growth of the Internet and the World Wide
Web, a far
bigger change is coming as the number of
things using the
Net dwarf the number of people. The real
promise of
connecting computers is to free people,
by embedding the
means to solve problems in the things
around us.”
January 1, 2001
David Brock, codirector of MIT’s AutoID
Center, writes in a white paper
titled “The Electronic Product Code
(EPC): A Naming Scheme for Physical
Objects”: “For over twentyfive years, the
Universal Product Code (UPC or
‘bar code’) has helped streamline retail
checkout and inventory
processes... To take advantage of [the
Internet’s] infrastructure, we
propose a new object identification
scheme, the Electronic Product Code
(EPC), which uniquely identifies objects
and facilitates tracking throughout
the product life cycle.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
April 2002
Jim Waldo writes in “Virtual Organizations,
Pervasive Computing, and an Infrastructure for
Networking at the Edge,” in the Journal of
Information Systems Frontiers: “...the Internet is
becoming the communication fabric for devices to
talk to services, which in turn talk to other
services. Humans are quickly becoming a minority
on the Internet, and the majority
stakeholders are computational entities that are
interacting with other computational entities
without human intervention.”CENTRO ESCOLAR UNIVERSITY FOR
INTERNAL CIRCULATION ONLY 2018
April 2002
Jim Waldo writes in “Virtual Organizations,
Pervasive Computing, and an Infrastructure for
Networking at the Edge,” in the Journal of
Information Systems Frontiers: “...the Internet is
becoming the communication fabric for devices to
talk to services, which in turn talk to other
services. Humans are quickly becoming a minority
on the Internet, and the majority
stakeholders are computational entities that are
interacting with other computational entities
without human intervention.”
June 2002
Glover Ferguson, chief scientist for Accenture,
writes in “Have Your Objects
Call My Objects” in the Harvard Business Review:
“It’s no exaggeration to
say that a tiny tag may one day transform your
own business. And that day
may not be very far off.”.CENTRO ESCOLAR UNIVERSITY FOR
INTERNAL CIRCULATION ONLY 2018
June 2002
Glover Ferguson, chief scientist for Accenture,
writes in “Have Your Objects
Call My Objects” in the Harvard Business Review:
“It’s no exaggeration to
say that a tiny tag may one day transform your
own business. And that day
may not be very far off.”.
January 2003
Bernard Traversat et al. publish “Project JXTAC:
Enabling a
Web of Things” in HICSS '03 Proceedings of the
36th Annual
Hawaii International Conference on System
Sciences. They
write: “The opensource Project JXTA was initiated
a year ago to
specify a standard set of protocols for ad hoc,
pervasive, peerto
peer computing as a foundation of the upcoming
Web of
Things.”
CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
October 2003
Sean Dodson writes in the Guardian: ”Last month,
a controversial network to connect many of
the millions of tags that are already in the world
(and the billions more on their way) was
launched at the McCormick Place conference
centre on the banks of Lake Michigan. Roughly
1,000 delegates from across the worlds of retail,
technology and academia gathered for the
launch of the electronic product code (EPC)
network. Their aim was to replace the global
barcode with a universal system that can provide
a unique number for every object in the
world. Some have already started calling this
network ‘the internet of things’.”CENTRO ESCOLAR UNIVERSITY
FOR INTERNAL CIRCULATION ONLY 2018
October 2003
Sean Dodson writes in the Guardian: ”Last month,
a controversial network to connect many of
the millions of tags that are already in the world
(and the billions more on their way) was
launched at the McCormick Place conference
centre on the banks of Lake Michigan. Roughly
1,000 delegates from across the worlds of retail,
technology and academia gathered for the
launch of the electronic product code (EPC)
network. Their aim was to replace the global
barcode with a universal system that can provide
a unique number for every object in the
world. Some have already started calling this
network ‘the internet of things’.”
August 2004
Sciencefiction writer Bruce Sterling introduces
the concept of “Spime” at SIGGRAPH,
describing it as “a neologism for an imaginary
object that is still speculative. A Spime also
has a kind of person who makes it and uses
it, and that kind of person is somebody called
a ‘Wrangler.’ ... The most important thing to
know about Spimes is that they are precisely
located in space and time. They have histories.
They are
recorded, tracked, inventoried, and always
associated with a story... In the future, an object's
life begins
on a graphics screen. It is born digital. Its design
specs accompany it throughout its life. It is
inseparable
from that original digital blueprint, which rules the
material world. This object is going to tell you – if
you
ask – everything that an expert would tell you
about it. Because it WANTS you to become an
expert.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
August 2004
Sciencefiction writer Bruce Sterling introduces
the concept of “Spime” at SIGGRAPH,
describing it as “a neologism for an imaginary
object that is still speculative. A Spime also
has a kind of person who makes it and uses
it, and that kind of person is somebody called
a ‘Wrangler.’ ... The most important thing to
know about Spimes is that they are precisely
located in space and time. They have histories.
They are
recorded, tracked, inventoried, and always
associated with a story... In the future, an object's
life begins
on a graphics screen. It is born digital. Its design
specs accompany it throughout its life. It is
inseparable
from that original digital blueprint, which rules the
material world. This object is going to tell you – if
you
ask – everything that an expert would tell you
about it. Because it WANTS you to become an
expert.”
September 2004
G. Lawton writes in “Machinetomachine
technology gears up for growth” in
Computer: “There are many more machines—
defined as things with mechanical,
electrical, or electronic properties—in the world
than people. And a growing number
of machines are networked... M2M is based on
the idea that a machine has more
value when it is networked and that the network
becomes more valuable as more
machines are connected.”
Invented Touchscreens Discovered a Grayware VirusCENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
September 2004
G. Lawton writes in “Machinetomachine
technology gears up for growth” in
Computer: “There are many more machines—
defined as things with mechanical,
electrical, or electronic properties—in the world
than people. And a growing number
of machines are networked... M2M is based on
the idea that a machine has more
value when it is networked and that the network
becomes more valuable as more
machines are connected.”
Invented Touchscreens Discovered a Grayware Virus
October 2004
Neil Gershenfeld, Raffi Krikorian and Danny
Cohen write in “The
Internet of Things” in Scientific American: “Giving
everyday objects the
ability to connect to a data network would have a
range of benefits:
making it easier for homeowners to configure their
lights and switches,
reducing the cost and complexity of building
construction, assisting with
home health care. Many alternative standards
currently compete to do
just that—a situation reminiscent of the early days
of the Internet, when
computers and networks came in multiple
incompatible types.”
2005
A team of faculty members at the Interaction
Design Institute Ivrea (IDII) in Ivrea, Italy,
develops Arduino, a cheap and easytouse single-
board microcontroller, for their students to
use in developing interactive projects. Adrian
McEwen and Hakim Cassamally in Designing
the Internet of Things: “Combined with an
extension of the wiring software environment, it
made a huge impact on the world of physical
computing.”CENTRO ESCOLAR UNIVERSITY FOR INTERNAL CIRCULATION ONLY
2018
2005
A team of faculty members at the Interaction
Design Institute Ivrea (IDII) in Ivrea, Italy,
develops Arduino, a cheap and easytouse single-
board microcontroller, for their students to
use in developing interactive projects. Adrian
McEwen and Hakim Cassamally in Designing
the Internet of Things: “Combined with an
extension of the wiring software environment, it
made a huge impact on the world of physical
computing.”
November 2005
The International Telecommunications Union
publishes the 7th in its series of reports on the
Internet, titled “The Internet of Things.”.CENTRO ESCOLAR
UNIVERSITY FOR INTERNAL CIRCULATION ONLY 2018
November 2005
The International Telecommunications Union
publishes the 7th in its series of reports on the
Internet, titled “The Internet of Things.”.
THANK YOU!
REFERENCE:
https://www.forbes.com/sites/gilpress/2014/06/18/averyshorthistoryofthe-
internetofthings/#623b43f410deCENTRO ESCOLAR UNIVERSITY FOR INTERNAL
CIRCULATION ONLY 2018
THANK YOU!
REFERENCE:
1. SENSOR – A device that detects and responds to some type of input from the physical environment.
The input could be any of the ff: light, heat, motion, moisture, pressure or any one of a great number of
other environmental phenomena
2. ACTUATOR – a device that moves or controls some mechanism. It converts a control signal into
mechanical action such as an electrical motor. Actuators may be driven by hydraulic, pneumatic,
electric, thermal or mechanical means, as well as software. An actuator ties a control system to its
environment.
WAYS TO CATEGORIZE SENSOR:
1. Active or Passive
2. Invasive or non-invasive
3. Contact or no-contact
4. Absolute or Relative
5. Area of application
SENSOR TYPES
1. POSITION SENSOR – measures the position of an object; position measurement can be absolute
(absolute position sensor) or relative term (displacement sensor)
2. OCCUPANCY SENSOR – detects the presence of people and animals in a surveillance area
4. FORCE SENSOR – Detects whether a physical force is applied and whether the magnitude of force is
beyond threshold
5. PRESSURE SENSOR – Measures force applied by liquids or gases. Pressure is measured in terms of
force per unit area
6. ACOUSTIC SENSOR – Measures the sound levels and convert that information into digital or analog
data signals.
7. HUMIDITY SENSOR – Detects the amount of water vapor in the air or a mass.
8. FLOW SENSOR – Detects the rate of fluid flow; measure the volume (mass flow) or rate (flow velocity)
of the fluid that has passed through a system in a given period of time
11. TEMPERATURE SENSOR – Measures the amount of heat or cold that is present in the system
13. BIOSENSOR – Detects various biological elements such as organisms, tissues, cells, enzymes,
antibodies and nucleic acid
SENSORS IN SMARTPHONES
ACTUATORS -
Function: receive some type of control signal commonly an electrical signal or digital command that
triggers a physical effect, usually some type of motion, force, and etc.
SMART OBJECTS
- The building blcoks of IOT
- Transform everyday objects into a network of intelligent objects that are able to learn from and
interact with their environment in a meaningful way
- Other terms: smart sensor, smart device, IOT device, intelligent
Bahay – identify ung ped emo gawing iot device kunwari ung pinto automatoc ganon assignment 2
- sensors and actuator
- any application
- sims
MODULE 3:
This is sometimes called the client layer. Devices as you have learned in the
previous module point to the “things” in the Internet of Things. They act as
the interface between the physical and digital worlds. The devices used in the
collection, processing, storing, and transmitting data belong to this layer.
IoT Gateway Layer
This is the server-side operators. An IoT gateway is needed to perform the
pre-processing of information before they are sent to the data center. Such
pre-processing includes message filtering and aggregation. The gateway
should also act as a single point of access for monitoring the selected area of
the operational field. You don’t want to connect to every sensor with your
monitoring software; it is easier to monitor only the gateway, which in turn is
responsible for gathering all the necessary metrics from the sensors.
The software application is the heart of the gateway. The gateway software is
responsible for collecting messages from the sensors and storing them appropriately
until they can be pre-processed and sent
to the data center. It decides if the data at a given stage of processing should be
temporary, persistent, or kept in memory.
Usually, gateways are connected to the Internet using GPS, WiFi, or ethernet. Some
gateways can also work in both GPS and WiFi modes. In general, non-GPS connectivity
is preferred to send data, as it doesn’t require a subscription to a paid mobile plan.
Some gateways will be constantly connected to inexpensive local networks, but those
using GPS connectivity should be very conservative in terms of what data they send to
the data center.
Visit this link to know more about the gateway layer. https://www.i-scoop.eu/internet-of-
things-guide/iot-technology-stack-devices-gateways-platforms/Links to an external site.
IoT Platform Layer
IoT platform layer is where the business and consumer applications
and services connect. It connects the operator and client, and it is the layer
in which services and management and interconnection of the device layer
and gateway layer happen. For developers, an IoT platform provides a set of
ready-to-use features that greatly speed up the development of applications
for connected devices as well as take care of scalability and cross-device
compatibility. Modern IoT platforms provide components for frontend and
analytics, on-device data processing, and cloud-based deployment
Lesson 1 - IoT Architecture Stages
The fundamental features of a stable Internet of Things architecture include
functionality, scalability, availability, and maintainability.
In this stage, we can make use of hardware and gain necessary insights for
further analysis. Sensors collect data from the environment and turn that
data into useful information. An example of this is the specialized structures
in your cell phone that detect the directional pull of gravity and use that as
data to orient the device. Similarly, actuators also intervene to change the
physical conditions that generate the data. For example, an actuator shuts
off the power supply or adjusts the airflow valve in a system. This sensing
or actuating stage covers all sorts of devices, including industrial devices,
robotic camera systems, water-level detectors, air quality sensors, and
heart-rate monitors.
In reality, data processing takes place in every stage of IoT architecture.
However, the data that is processed at the sensor has limited use, as the
processing power available on each IoT device is limited.
In this stage, the information collected from the previous stage and are compressed to
the optimal size for further analysis. IoT deals with working with sensors and actuators
in close proximity at this point. Data Acquisition Systems (DAS), perform data
aggregation, and conversion processes.
DAS connects to the sensor network, collects outputs, and converts the analog data
into the digital data. On the other hand, the internet gateway receives the collected and
digitized data and sends it to stage 3 systems through Wi-Fi or LAN connections for
further processing. On top of this, timing conversion and structure conversion happens
at this stage.
During this stage, the data prepared in stage 2 is transferred and exposed in
the IT world. The edge IT system performs enhanced analytics along with pre-
processing such as machine learning and visual representation. Some
additional processing may also happen here before the data is entered in data
centers.
Stage 3 enables data to be captured at local sensors and at the same time
transferring the data to the remote locations. Since edge systems perform
more analysis of the data, they are usually placed in remote offices or edge
locations closer to the sensors.
Types of Internet of Things (IoT) Connectivity
The way you connect devices and sensors to your data processing module
is one of the major IoT challenges you will face in building an IoT system.
As each business case has its own goals, each Internet of Things system
has its own requirements, including the requirements to connectivity in
terms of range, latency, data throughput, etc.
There’s no universal connectivity technology that would address the needs
of different IoT use cases. There are a lot of connectivity options each with
its own characteristics, benefits, and drawbacks.
Getting
SparkFun Started
Inventor's Kit with the
for Photon ESP8266 WiFi SparkFun
Experiment Shield Hookup Blynk
Guide Guide Board
Thread is an open standard for reliable, cost-effective, low-power, wireless D2D (device
to device) communication. It was designed specifically for connected home
applications. It came into existence in 2014, when the Thread Group was formed. It now
has big organizations like Google, Samsung, Qualcomm, and ARM to design and
develop the Thread protocol. Although there is no single point of failure by architecture
in Thread networks, a single point of failure may exist due to poor network design.
Image credit from http://www.embedded-computing.com/embedded-computing-design/connecting-
people-processes-and-iot-silicon-with-a-digital-thread
You can go through the following tutorials on Bluetooth and BLE, to get a better
understanding of using them directly into your Bluetooth-based IoT project.
Understan
Simblee
ding the
Simblee LilyPad
BC127
Concepts Bluetooth Hookup
Guide
Module
Bluetooth
Bluetooth is another short-range connectivity option that allows IoT devices
and sensors to send a lot of data at high speed. It is best for connecting
small devices and sending information indoors. Similar to WiFi, it works
great both in a smart home environment and industrial IoT applications that
enable machines to continuously send status data. The biggest difference
from WiFi is lower power requirements and higher resilience to noise. BLE
or Bluetooth Low Energy is the Bluetooth technology developed for IoT
purposes.
Mesh Network
Mesh topology will work for your project if you want to have a very reliable
system. Mesh topology consists of many battery-powered devices
connected with each other and can exchange data and send data to the
Internet. This ensures that the IoT system does not stop working because
there are a lot of backup devices.
Zigbee and Thread are the two examples of mesh-based IoT connection.
These are low power, low bandwidth IoT connectivity standards with limited
range but reliable topology.
Ethernet
Ethernet is more reliable than a mesh network although it is insensitive to
interference because it is a wired. Wire connectivity provides better
security, robustness, and high data transfer speed. The range of Ethernet
is dependent on the wire length.
Cellular
3G and 4G (LTE) are the most common cellular standards. However, there
are machine to machine (M2M) standards developed specifically for IoT:
LTE-M and NB-IoT.
Satellite
Example of satellite connectivity would include utility meters that send data
to a remote server, commercials updated on digital billboards, or cars via
Internet connectivity.
There are other IoT wireless technologies used in IoT. NFC and RFID are
the two communication methods that are worth considering for some IoT
projects.
NFC · Offers a low-speed connection with · Short-range might not be
extremely simple setup many situations for it is curre
available on new Android Ph
· Can be used to bootstrap more
at Apple Pay on new iPhone
capable wireless connections
· NFC has a short-range and supports
encryption where it may be more
suitable than earlier, less private RFID
systems
network?
We say that to get information from a source we need a network, so information travels
from the source through media to destination. To better understand how these 3
network components interact with each other, let us have this example. Say you send a
message via Facebook messenger (service) through your mobile phone (source), to a
friend's mobile (destination).
This simple network has several key components:
The different media have different characteristics, which makes each better
suited to different circumstances, taking into consideration factors such as:
the environment it is traveling in
Components of a Network
In order for a message to reach its destination or intended receiver, it needs
network components to provide a stable and reliable transmission.
There are three components of a network:
1. Devices
Image is taken from https://www.educba.com/types-of-network-devices/Links to an
external site.
2. Media
metallic wires within cables - uses electric impulses
glass or plastic fiber - uses light
Wireless transmission - uses wavelengths from the electromagnetic spectrum
Just type in the URL in the text field and hit the Enter key to view its IP
address.
Name Entity
.com Commercial
.org Organization
.net Network
.edu Education
U.S national and state
.gov
government agencies