【Part 6】The Internet of Things

我们的目标:
  • 原则:物联网
  • 架构
  • 应用
  • RFID
概述:
  • 概念
  • 组件
  • 物联网架构
  • 应用
  • 关键技术
  • Zigbee的
  • RFID
  • 物联网中间件

1、物联网的概念

物联网:物联网
  • 这是一个放大的互联网
  • 通过信息传感设备(RFID,二维码,红外传感器,GPS,激光扫描仪等)实现智能识别,定位,跟踪,监控和管理
  • 任何人都可以随时随地获得连接
  • 事物对事物互联网
  • 在物联网中,事物之间,人与事物,人与人之间可以相互沟通
  • 麻省理工的想法:RFID +互联网
物联网与互联网
  • 互联网是物联网的核心或基础设施
  • 物联网是互联网的延伸

2、物联网的组件

物联网包括随时随地连接到互联网的东西。
聪明的东西
  • 智能对象:集成传感器和设备的日常物体
  • 这些对象通过固定和无线网络连接到互联网
  • 有一个身份证明 - 通过互联网“表现出来”
  • 任何对象都可以是数据源
网关
  • 接入设备
互联网

3、物联网的组织

物联网前端

  • WSN
  • WMN
  • WLAN
  • ...
后端
  • 云端系统
核心
  • 互联网

4、物联网中的数据流


整体感应
  • 前端
可靠的运输
  • 无线网络和互联网
智能处理和控制
  • 后端

5、物联网架构


3层架构
  • 应用程序层
  • 网络层
  • 感应层

5.1、感知层

传感器
RFID:由电子标签和阅读器组成
  • 射频识别
  • 电子标签
二维码和红外线
功能
  • 信息、传感
  • 局部化
  • 识别
5.2、网络层和应用层

网络层用于信息传输
移动通信网络
  • 蜂窝网络,各种无线网络
互联网
  • IPV4,IPV6
应用层支持各种应用程序
应用层包括应用支持平台和应用服务
  • 中间件
  • 云计算
  • 大数据和服务

6、物联网应用领域


第三个IT浪潮
3个主要应用领域
  • 公共服务、工业和农业、公共管理
特定的域
  • 智能交通、智能架构、智能家居、防灾、环境监测、智能物流、食品安全跟踪、工业控制,电力控制、金融服务...
6.1、物联网的应用特点
多源信息、多种信息格式、动态内容、大量的信息、需要大规模应用
6.2、物联网产业链
2020年达到5000亿人民币

6.3、关键技术
感应和识别
无线网络和访问互联网
  • 无线传输:WLAN,WSN,Zigbee,bluetoolth,UWB ......
  • 特设施工
物联网服务和管理
应用开发
6.3.1、感应和识别
自动识别
  • 条形码识别
  • RFID
  • 磁性识别,电路识别
  • 音频和图像识别
  • 生物特征识别
感知:将物理,化学和生物量转化为数字信号
  • 温度,压力,距离,速度...
定位
  • 卫星定位
  • 无线电定位
  • 感应定位
6.3.2、物联网联网

物联网由无线网络和有线网络组成
短距离有线网络
  • 局域网,现场总线
长途有线网络
  • 互联网,PSTN
短距离无线网络
  • WPAN(蓝牙,ZigBee),WLAN,WMAN
长距离无线网络
  • 细胞元的(蜂窝网)
6.3.3、物联网服务和管理
物联网的服务和管理实施涉及以下技术
  • 物联网操作系统
  • 中间件
  • 物联网数据库
  • 云计算
  • 语义网络
  • 数据挖掘和智能决策
  • 物联网安全和隐私保护
6.3.4、应用开发
物联网应用程序开发涉及:
工程设计
嵌入式系统设计
  • 感应层硬件和软件
通信协议和QoS控制
应用软件设计
  • 监测和控制
  • 智能信息处理
  • 服务
系统集成

7、Zigbee

Zigbee:IEEE 802.15.4
  • 短距离无线通信技术
  • LRWPAN:低速无线个人区域网络
  • 20,40,250Kbps:868MHz频段,915MHz的,2.4GHz的
  • 1〜100米
  • 低功耗
  • 成本低,延迟低
多种协议
  • Zigbee2004,Zigbee2006,Zigbee 2007 / Pro
组织:协调员,路由器和终端
拓扑
  • 星型,树型,网状
应用
  • 家电控制
  • 门卫
  • 汽车监控
  • ...

8、RFID(Radio Frequency Identification)


RFID:射频识别
  • 一种自动识别技术
  • 非接触式双向无线数据通信
  • 可以识别对象并获取数据
RFID系统组成
  • 电子标签
  • RFID阅读器
  • 计算机网络
特点
  • 可以识别高速移动物体
  • 并行识别
  • 寿命长
8.1、RFID分类
基于频率
  • 低频:3-300KHz,一般为125K,133K和225K
  • 中高频:3〜30MHz,一般为13.56M
  • 超高频和微波:915M,2.45G和5.08GHz
基于功率
  • 活性    电池寿命:3〜10年
  • 被动    距离短,速度低
基于数据写入
  • 固件
  • 现场有线写作
  • 现场无线写字

...

8.2、RFID工作原理
      阅读器以特殊频率发送无线电信号,当电子标签进入工作区时,会产生感应电流,感应电流激活电子标签以使其数据通过内部天线传输。阅读器接收调制后的数据并解调,然后发送给计算机,计算机根据预先设定的规则识别ID和过程以及控制。

9、IoT软件

物联网只是通过各种接入网络将智能设备和RFID产品连接到互联网
  • 这不是新生儿
  • 这是一个巨大的整合:M2M应用集成
在3层架构中,每个架构都包含相关软件
  • 感应层软件:嵌入式软件和中间件
  • 网络层软件
  • 应用层软件:服务器软件,中间件和应用软件

10、IoT 中间件


中间件:平台和应用程序之间的通用服务软件
  • 大量生产
  • 高复用
  • 支持标准协议
  • 屏蔽操作系统和硬件复杂
RFID中间件
  • 桥接RFID和应用程序
  • 掩蔽异质低层:设备,数据格式
  • 互操作
  • 预处理数据
    --过滤,聚合,转移
嵌入式中间件

  • 2
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security Learn to Design, Implement and secure your IoT infrastructure The Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people’s well-being. An architectural guide is necessary if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that’s a single device or millions of devices. This book encompasses the entire spectrum of IoT solutions, from sensors to the cloud. We start by examining modern sensor systems and focus on their power and functionality. After that, we dive deep into communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, we explore IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, SigFox, and LoRaWAN. Next, we cover edge routing and gateways and their role in fog computing, as well as the messaging protocols of MQTT and CoAP. With the data now in internet form, you’ll get an understanding of cloud and fog architectures, including the OpenFog standards. We wrap up the analytics portion of the book with the application of statistical analysis, complex event processing, and deep learning models. Finally, we conclude by providing a holistic view of the IoT security stack and the anatomical details of IoT exploits while countering them with software defined perimeters and blockchains. What You Will Learn Understand the role and scope of architecting a successful IoT deployment, from sensors to the cloud Scan the landscape of IoT technologies that span everything from sensors to the cloud and everything in between See the trade-offs in choices of protocols and communications in IoT deployments Build a repertoire of skills and the vernacular necessary to work in the IoT space Broaden your skills in multiple engineering domains necessary for the IoT architect
Internet of Things (IoT) is the third wave of Internet and is supposed to have a potential to connect about 28 billion items by 2020, ranging from bracelets to cars. The term “IoT,” which was rst proposed by Kevin Ashton, a British technologist, in 1999, has the potential to impact everything from new product opportunities to shop oor optimization to fac- tory worker ef ciency gains that will power top-line and bottom-line gains. It is believed that IoT will improve energy ef ciency, remote monitoring, and control of physical assets and productivity through applications as diverse as home security to condition monitor- ing on the factory oor. Now IoT has been used in markets in the eld of health care, home appliances and buildings, retail markets, energy and manufacturing companies, mobility and transportation, logistics companies, and by media. Equipments are becoming more digitized and more connected, establishing networks between machines, humans, and the Internet, leading to the creation of new ecosystems that enable higher productivity, better energy ef ciency, and higher pro tability. Sensors help to recognize the state of things, by which they gain the advantage of anticipating human needs based on the information collected per context. These intelligent devices not only gather information from their environment but are also capable of taking deci- sions without human intervention. IoT technology is being used in our day-to-day life for unlocking the door without a key; in card recognizers, automatic locks, vehicle detecting systems, toll payment system; and for tracking animals, access control, payment systems, contactless smart cards, anti-theft devices, steering column reader, etc. The IoT building blocks will come from those that are web-enabled devices, providing common platforms on which they can communicate, and develop new applications to capture new users. In this background, this book is an attempt to present updated information on the recent trends on the issues involved, highlighting the challenges involved, and source the solutions for some of these challenges. The book comprises 14 chapters. The chapterwise description of contents in the volume is as follows. For seamless visual tracking of passengers traveling in a vehicle, the visual light trans- mission (VLT) and visual light re ectance (VRT) values of the glass windows used in the vehicle should be at a particular value. All vehicle manufacturers follow certain standards. But the vehicle owner/user generally buys window-tinting lms from the gray market and pastes the same on the glass windows, which in turn hamper the visibility, thereby preventing the law enforcement authorities from having a clear view of those traveling in the vehicle. In Chapter 1, a proposal for the automatic detection of tint level for vehi- cles is presented. The system has been designed using ordinary cameras that work in the visible region of the electromagnetic spectrum. The system is capable of identifying a vehicle’s registered number using algorithms developed for this purpose. Various ltering techniques are applied to nd the level of tint from the captured camera images. Using three different techniques, namely, color segmentation, contour detection, and histogram analysis, the tint level of windshield/window region is estimated. Thus, the IoT system recognizes the numbers on the number plate and can fetch the contact details of the owner from the database. It also communicates the same information to the owner with details on and extent of tint level violation along with documentary evidence.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值