1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Internet of Things
refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors
The Internet supports the interconnectivity through what?
cloud systems
IoT is primarily driven by what?
deeply embedded devices
Deeply Embedded Devices are…
low-bandwidth, low-repetition data capture, and low bandwidth data-usage appliances
Internet has gone through roughly four generations of deployment:
Information technology (IT)
Operational technology (OT)
Personal technology
Sensor/actuator technology
Information technology (IT)
PCs, servers, routers, firewalls, and so on, bought as IT devices by enterprise IT people, primarily using wired connectivity
Operational technology (OT)
Machines/appliances with embedded IT built by non-IT companies, such as medical machinery, SCADA, process control, and kiosks, bought as appliances by enterprise OT people, primarily using wired connectivity
Personal Technology
Smartphones, tablets, and eBook readers bought as IT devices by consumers (employees) exclusively using wireless connectivity and often multiple forms of wireless connectivity
Sensor/actuator technology
Single-purpose devices bought by consumers, IT and OT people exclusively using wireless connectivity, generally of a single form, as part of larger system
Cloud-Enabled Internet of Things (CE-IoT)
Integration of Cloud and IoT
Major cloud services providers:
AWS, Azure, Google Cloud
Primary concerns for IoT:
Security and privacy
Cloud-Enabled IoT (CE-IoT)
-Seamless communication (devices-to-cloud, cloud-to-devices) -Unlimited resources → compute, storage, etc.
-Meaningful insights → Data Analytics and Visualizations
-Virtual things/devices management, access control management,
Edge Computing
convert network data flows into information that is suitable for storage and higher level processing
In many IoT deployments, ________________
massive amounts of data may be generated by a distributed network of sensors
Evaluation
evaluating data for criteria as to whether it should be processed at a higher level
Formatting
Reformatting data for consistent higher-level processing
Expanding/decoding
Handling cryptic data with additional context (such as the origin)
Distillation/reduction
Reducing and/or summarizing data to minimize the impact of data and traffic on the network and higher-level processing systems
Assessment
Determining whether data represents a threshold or alert; this could include redirecting data to additional destination
Generally fog computing devices are deployed physically near ____________
edge of the IoT network near the sensors and other data-generating devices
Fog computing represents an _______ in modern networking from cloud computing
opposite trend
Fog Computing is inspired by ____
the fact that fog tends to hover low to the ground, whereas clouds are high in the sky
Edge Computing for IoT Advantages:
-Improve response rate, and robust application performance
-Reduce latency
-Reduce operational costs and efficient resource utilization (network, compute)
-Improve business efficiency and reliability
-Scalability
Core network is also known as _____
backbone network
Core Network
connects geographically dispersed fog networks as well as providing access to other networks that are not part of the enterprise network
Core network will use __________-
high-performance router
Digital Twin
virtual representation of IoT entities
A gateway interconnects the IoT-enabled devices with the _____________
higher-level communication networks
What is the key element in providing security in an IoT deployment?
gateway
The device manufacturers focus is the ______
functionality of the device itself
The end user may have no means of patching the system or have ____________
little information about when and how to patch
IoT Application Domains
Factories
Cities
Healthcare
Retail
Energy
Security and Privacy Issues in a Smart City
-privacy leakage in data sensing
-privacy and availability in data storage and processing
-trustworthy and dependable control
IoT Security Challenges
-Resource constrained devices
Remote deployments and locations
-Heterogeneity of IoT devices
-Lack of support from manufacturers for updating firmware and patching vulnerabilities
-Highly sensitive application domain with critical infrastructures
-Trust evaluation and management
-Lack of standards and compliance
-Large amount of data and deployment
MQTT
Message Querying Telemetry Transport
MQTT Purpose
Small code footprint and ideal for constrained devices with limited storage, bandwidth, and unreliable network
MQTT Broker
-manages all the topics and subscriptions to the topics
-allows to have persistent messages stored on the broker
CoAP
an efficient RESTful protocol
CoAP is ideal for _______
constrained devices and networks