بررسی مقایسه ای از پروتکل های اینترنت اشیا / Comparative Study of IoT Protocols

بررسی مقایسه ای از پروتکل های اینترنت اشیا Comparative Study of IoT Protocols

  • نوع فایل : کتاب
  • زبان : انگلیسی
  • ناشر : SSRN
  • چاپ و سال / کشور: 2018

توضیحات

رشته های مرتبط مهندسی فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده
مجله دومین کنفرانس بین المللی برنامه های کاربردی هوشمند و تحلیل داده ها برای شهرهای هوشمند – The second International conference on Smart Application and Data Analysis for SMART cities
دانشگاه Faculty of Sciences Ben M’sik – Casablanca – Morocco

منتشر شده در نشریه SSRN
کلمات کلیدی انگلیسی Internet of Things; IOT architecture; IoT applications; IoT protocols

Description

I. INTRODUCTION The Concept of the internet of objects appeared in the 90s, it is poised to become one of the future challenges and opens up prospects for technological and scientific developments [1]. Today, the Internet of Objects is mainly used in domains such as home automation. This is the extension of the Internet to physical objects which are not primarily intended to be connected to it. Therefore, embedded systems and smart sensors fall into this category and participate in the development of IoT. IoT’s benefits are multiple, both from the point of view of civil users and companies such gain in efficiency, savings, reliability. The importance of this domain causes a rapid evolution of the technologies, and an integration on very varied and diversified supports. The concept of “objects” aims at posing no limit as to the feasible possibilities of implementing technological tools in everyday elements. The Internet of Things is a set of tools and technologies that should be considered in every level and aspect of a connected object, modeled as a separate system. Since the Internet of Things is a set of tools and technologies, it is necessary to take into account each level and aspect of a connected object, modeled as a system in its own right [2]. The remainder of this document is organized as follows: Section II presents the different layers of the Internet of things architecture Section III, presents the different protocols that are used in the IoTs domain. In Section IV we expose the related work. Next in Section V we detail a comparative study of the protocols of the application and network layers. We conclude study Section VI. II. IOT ARCHITECTURE The internet of things gives solutions based on the integration of information technology, which refers to hardware and software used in storing, retrieving, and processing data and communications technology which includes electronic systems used for communicating between individuals or groups. The fast convergence of information and communications technology is built on three layers of technology innovation: the cloud, data and communication pipes/networks and device [3]. More than 25 Billion things are expected to be connected by 2020 which is a huge. So, the rapid evolution of connected objects needs adaptable and flexible architectures with different type and scope of application. There is no single consensus on IoT architecture, which is universally adopted. Different architectures have been proposed by different researchers [4]. The ever-increasing number of proposed architectures has not yet converged to a reference model [5]. We present an improved layered architecture of Internet of Things, as a survey. It summarizes the current development of IoT architectures in various domains systematically in Fig.1 [6], the internet of things layered architecture is illustrated as supposed by the ITU-T (International Telecommunications Union – Telecommunication Standardization Sector) and is composed of four layers; the top or first layer is the IOT application layer which contains the application user interface, the second layer is the services and application support layer, the third layer is the network layer which contains the networking and transport capabilities, the bottom layer is the device layer, which contains the gateways and the hardware and sensors and RFID tags and others. Along the four layers, the security and management capabilities and functions are distributed [7].
اگر شما نسبت به این اثر یا عنوان محق هستید، لطفا از طریق "بخش تماس با ما" با ما تماس بگیرید و برای اطلاعات بیشتر، صفحه قوانین و مقررات را مطالعه نمایید.

دیدگاه کاربران


لطفا در این قسمت فقط نظر شخصی در مورد این عنوان را وارد نمایید و در صورتیکه مشکلی با دانلود یا استفاده از این فایل دارید در صفحه کاربری تیکت ثبت کنید.

بارگزاری