Module 2
Module 2
Module 2
03/26/2023
Challenges
– the connecting technology of the so-called objects;
– the interoperability between objects;
– the communication model of these connected objects;
– the possible interaction with the existing models, such as the Internet;
– the choice of the transport model;
– the addressing, identifying and naming;
– the security and privacy;
– the economic impact and the telecommunication value chain evolution.
Ubiquitous networking
Most of the Internet services were designed to satisfy person-to-person interaction, such as email and
phone service.
The traffic transported through the Internet is currently generated by people; either voice or data. New
services were then developed around person-to-machine and machine-to-person interactions, such as
video-on-demand or content distribution services.
Finally, in order to provide tasks and process automation, new services will be developed around the
machine-to-person, machine-to-machine or thing-to-thing and any other possible interactions
The identifier in the IoT
unifying and standardizing the identifier.
IP addresses identify nodes in the Internet and serve as locators for routing. IPv6 allows larger address space
than IPv4.
In the IoT a large identification space will be needed to cover the identification of the tremendous number of
connected objects.
Size of the identifier??
RFID technology is naturally used for identification, the standardization of the identifier stored in the RFID is
the current IoT concern.
The same question is raised for any addressing schemes used in the network of objects.
In the IP based case, the problem will be more about the semantics of the identifier, scalability of the addressing
space and memory size limitation of the devices addressed by the chosen address/identifier space.
Other addressing schemes??
Identifier for name and address??
Anything can be assigned an identifier – a physical object, person, place or logical object.
Forms of identifier??
Areas in which identifier-triggered information access could be valuable are in:
– medicine/pharmaceuticals;
– agriculture;
– libraries;
– the retail trade;
– the tourist industry;
– logistics; and
– supply chain management
ONS identifier
Identification technology
RFID
RFID systems consist of four main components:
– a transponder or a tag to carry data
– microwave antenna or coil and a microchip data located on the object to be identified
– an interrogator or reader. Compared with tags, readers are larger, more expensive and power-hungry.
– middleware, which forwards the data to another system, such as a database, a personal computer or robot
control system, depending on the application.
Near field communication (NFC)
NFC is a short-range wireless technology that enables easy and convenient interaction between devices.
NFC will use the RFID communication system but limit the reading range to few centimeters.
This can be used for applications requiring a secure RFID reading process. It is also an extension of proximity-
card technology (contactless ISO 14443).
It combines the interface of a smartcard and a reader in one device.
NFC technology enables RFID reader-only, tag-only, and smart-card-only solutions.
IoT-oriented stress analysis solution.
Capillary networks and their inside view.
Sensors can be classified according to the parameters they measure
– mechanical (e.g. position, force, pressure, etc.);
– thermal (e.g. temperature, heat flow);
– electrostatic or magnetic fields;
– radiation intensity (e.g. electromagnetic, nuclear);
– chemical (e.g. humidity, ion, gas concentration);
– biological (e.g. toxicity, presence of biological organisms), etc.;
– military – enemy tracking or battlefield surveillance.