IoT & Its Applications – Vocabulary Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/57

flashcard set

Earn XP

Description and Tags

Key vocabulary terms and definitions covering fundamental concepts, protocols, architectures, hardware platforms, security, and networking technologies discussed in the IoT & Its Applications lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

58 Terms

1
New cards

Internet of Things (IoT)

A paradigm in which everyday physical objects are embedded with sensors, processors, and communication ability to exchange data over the Internet.

2
New cards

Machine-to-Machine (M2M) Communication

Direct data exchange between devices without human intervention, often viewed as the predecessor of IoT.

3
New cards

Sensor

A device that detects or measures physical properties and converts them into data for monitoring or control.

4
New cards

Actuator

A device that receives a control signal and produces a mechanical movement or other physical effect in the environment.

5
New cards

Smart Object

An IoT node combining sensors/actuators, processing, and networking to interact intelligently with its surroundings.

6
New cards

Enabling Technologies

Key technologies such as sensors, embedded processors, wired/wireless networks, cloud, and analytics that make IoT possible.

7
New cards

Fog Computing

Architecture that extends cloud services to the network edge, enabling local processing and low-latency analytics near IoT devices.

8
New cards

Edge Computing

Computation performed directly on or close to IoT endpoints to shorten response time and reduce cloud traffic.

9
New cards

Cloud Computing

On-demand network access to shared computing resources (servers, storage, applications) delivered as services over the Internet.

10
New cards

IoT World Forum (IoTWF) Reference Model

Seven-layer architecture defining control flow from cloud to edge, covering devices, connectivity, edge computing, data accumulation, data abstraction, application, and collaboration processes.

11
New cards

Core IoT Functional Stack

Layered view of IoT including Things (sensors/actuators), Communications Network, and Applications & Analytics.

12
New cards

Constrained Node

IoT device with limited power, memory, or processing resources requiring optimized protocols.

13
New cards

Constrained Network

Low-bandwidth, lossy, or high-latency network that links constrained IoT devices.

14
New cards

OSI Model

Seven-layer framework (Physical to Application) for standardizing network functions.

15
New cards

TCP/IP Model

Four-layer practical networking model (Network Access, Internet, Transport, Application) underpinning the Internet.

16
New cards

IEEE 802.15.4

Low-power, low-data-rate wireless standard forming the basis of ZigBee, 6LoWPAN, and other IoT stacks.

17
New cards

IEEE 802.11ah (Wi-Fi HaLow)

Sub-GHz Wi-Fi amendment offering long-range, low-power connectivity for IoT applications.

18
New cards

LPWAN (Low-Power Wide-Area Network)

Category of long-range, low-bit-rate wireless technologies designed for battery-powered IoT devices.

19
New cards

LoRaWAN

Unlicensed-band LPWAN protocol using chirp spread spectrum modulation for long-range, low-power IoT networking.

20
New cards

NB-IoT

3GPP narrow-band cellular technology optimized for low-power, wide-area IoT communication in licensed spectrum.

21
New cards

LTE-M

3GPP LTE variation (Cat-M1) delivering moderate data rates and mobility support for IoT devices.

22
New cards

Bluetooth Low Energy (BLE)

Short-range 2.4 GHz wireless protocol optimized for intermittent, low-power IoT data exchange.

23
New cards

ZigBee

Mesh networking protocol built on IEEE 802.15.4 for home and building automation and sensor networks.

24
New cards

NFC (Near Field Communication)

Very-short-range (≤4 cm) wireless technology for contactless payments and device pairing.

25
New cards

RFID (Radio-Frequency Identification)

Tag-and-reader system that identifies objects wirelessly using stored electronic information.

26
New cards

6LoWPAN

Adaptation layer that compresses IPv6 packets for transmission over low-power IEEE 802.15.4 networks.

27
New cards

RPL

IPv6 routing protocol designed for Low-Power and Lossy Networks in IoT deployments.

28
New cards

CoAP (Constrained Application Protocol)

Lightweight, REST-ful application protocol running over UDP for machine-to-machine IoT communication.

29
New cards

MQTT (Message Queuing Telemetry Transport)

Publish/subscribe messaging protocol over TCP designed for low-bandwidth, high-latency IoT networks.

30
New cards

SCADA

Supervisory Control and Data Acquisition system for real-time monitoring and control of industrial processes.

31
New cards

PAN (Personal Area Network)

Network covering only a few meters, e.g., wearable devices connected to a smartphone.

32
New cards

LAN (Local Area Network)

Network span up to ~100 m such as Wi-Fi within a home or factory floor.

33
New cards

FAN (Field Area Network)

Outdoor IoT network ranging tens to hundreds of meters, aggregating data from multiple local devices.

34
New cards

MAN (Metropolitan Area Network)

City-wide network covering several kilometers for applications like smart parking.

35
New cards

WAN (Wide Area Network)

Long-range communication network spanning kilometers, often using cellular or LPWAN links.

36
New cards

Data in Motion

Information actively moving across networks, often requiring real-time analytics.

37
New cards

Data at Rest

Stored information residing in databases or files, suitable for batch analytics.

38
New cards

Header Compression (6LoWPAN)

Technique that reduces IPv6/UDP header size to fit constrained-network frame limits.

39
New cards

Fragmentation (6LoWPAN)

Splitting large IPv6 packets into smaller IEEE 802.15.4 frames for transmission.

40
New cards

Mesh Addressing

6LoWPAN header option enabling multi-hop forwarding within a single IP subnet.

41
New cards

Adaptation Layer

Protocol layer that enables IP packets to traverse specific link-layer technologies (e.g., 6LoWPAN).

42
New cards

Gateway

Node that bridges IoT edge networks to backhaul or cloud networks, translating protocols and aggregating data.

43
New cards

IoT Platform

Multi-layer framework providing device management, connectivity, data storage, analytics, and application enablement.

44
New cards

Raspberry Pi

Low-cost single-board computer often used as an IoT edge gateway or prototype platform.

45
New cards

Arduino

Open-source microcontroller platform for rapid prototyping of IoT devices and sensor nodes.

46
New cards

IoT Design Methodology

Ten-step process covering purpose definition, domain & information modeling, service specs, functional & operational views, hardware integration, and application development.

47
New cards

Embedded Computing

Integration of microcontrollers, memory, and peripherals into dedicated devices performing specific IoT tasks.

48
New cards

Edge Analytics

Processing and analyzing sensor data locally at or near the IoT device to enable rapid decisions.

49
New cards

Target Wake Time (TWT)

IEEE 802.11ah feature that schedules sleep periods to save IoT device power.

50
New cards

Restricted Access Window (RAW)

802.11ah mechanism limiting channel contention by allocating time slots to device groups.

51
New cards

Personal Area Network (PAN)

Small-scale wireless network connecting devices around an individual, typically within 10 m.

52
New cards

Field Area Network (FAN)

Outdoor wireless network linking multiple neighborhood or utility devices to a common gateway.

53
New cards

Object Density per Cell

Number of smart objects served by a single gateway in a given area, affecting network design.

54
New cards

Application Layer (IoT)

Top layer where protocols like HTTP, CoAP, MQTT provide services and interfaces for user applications.

55
New cards

Transport Layer (IoT)

Layer providing end-to-end communication (e.g., TCP for reliability, UDP for low overhead).

56
New cards

Authentication (IoT Security)

Process of verifying identity of devices, users, or services, often via X.509 certificates.

57
New cards

Encryption

Technique (e.g., AES-128, TLS, DTLS) ensuring confidentiality and integrity of IoT data.

58
New cards

Port Protection

Security practice of closing or firewalling unused network ports to reduce IoT attack surface.