quiz image

IoT and M2M Technology

ProdigiousQuantum avatar
ProdigiousQuantum
·
·
Download

Start Quiz

Study Flashcards

44 Questions

Which IoT ecosystem role is responsible for providing devices that offer raw data and/or content?

Device provider

What is a primary function of the network provider in the IoT ecosystem?

Integrating resources from other providers

What capability does the platform provider offer to application providers?

Integration capabilities and open interfaces

Who utilizes capabilities from the network, device, and platform providers?

Application provider

What is an application customer in the IoT ecosystem?

A user of IoT applications

What is a characteristic of IoT ecosystem players' relationships in real deployments?

Players have a variety of relationships

What drives the variety of relationships among IoT ecosystem players?

Different business models

Which provider supports and controls the IoT capabilities infrastructure?

Network provider

What can a platform provider offer to support different types of IoT applications?

Various capabilities, including data storage and processing

What is the primary factor that will contribute to the enormous scale of the IoT?

The number of devices that will be connected to the IoT

What will be the primary type of communication in the IoT?

Device-triggered communication

What are the two types of things in the Internet of Things?

Physical and virtual things

What is a critical aspect of managing the data generated by the IoT?

Interpreting the data for application purposes

What is a high-level requirement for the IoT?

Identification-based connectivity

What is the mandatory capability of a device in the IoT?

Communication

What is necessary to ensure among heterogeneous and distributed systems in the IoT?

Interoperability

What can physical things be?

Sensed, actuated, and connected

What is an example of a virtual thing?

Multimedia content

What is a key feature of autonomic networking in the IoT?

Self-management

What can devices do based on information received from the network?

Execute operations

Why is autonomic networking necessary in the IoT?

To adapt to different application domains, different communication environments, and large numbers and types of devices

What is a challenge in managing the data generated by the IoT?

Interpreting the semantics of the data

How can devices communicate with each other?

Through a gateway, without a gateway, or directly

What is the role of a gateway in device communication?

To facilitate communication between devices

What is the primary goal of identification-based connectivity in the IoT?

To establish connectivity between devices based on their identifier

What is one of the essential generic management capabilities in the IoT?

Traffic and congestion management

What type of information can be associated with things?

Both static and dynamic information

What is the relationship between physical and virtual things?

A virtual thing can exist without a physical thing

What is included in device management in IoT?

Remote device activation and de-activation

What is the purpose of traffic and congestion management in IoT?

To detect network overflow conditions

What type of security capabilities are independent of applications?

Generic security capabilities

At which layer is authorization and authentication provided in IoT?

At the application, network, and device layers

What is an example of a specific security capability in IoT?

Mobile payment security requirements

What is composed of a variety of business players in the IoT ecosystem?

IoT ecosystem

What is a characteristic of business roles in the IoT ecosystem?

Each business player plays at least one business role, but more roles are possible

What is the purpose of autonomic services provisioning in IoT?

To capture, communicate and process data automatically

What is the primary dependency of something-related communications and services in IoT?

Location information of things and/or users

What is a critical security requirement in the IoT?

Integrating different security policies and techniques

What is the primary concern of privacy protection in the IoT?

Protecting private information concerning owners or users

What is the primary goal of supporting high quality and highly secure human body related services in IoT?

To comply with laws and regulations of different countries

What is the primary benefit of autonomic services in IoT?

Automated data processing and transmission

What is the primary concern of security threats in the IoT?

Threats towards confidentiality, authenticity, and integrity

What is the primary requirement for privacy protection in the IoT?

Protecting private information during data transmission, aggregation, storage, mining, and processing

What is the primary purpose of location-based capabilities in the IoT?

To sense and track location information automatically

Study Notes

IoT Concepts

  • IoT refers to the interconnection of physical and virtual things, including objects, sensors, and devices, which are capable of being identified and integrated into communication networks.
  • Physical things exist in the physical world and can be sensed, actuated, and connected, while virtual things exist in the information world and can be stored, processed, and accessed.
  • Examples of physical things include the surrounding environment, industrial robots, goods, and electrical equipment, while examples of virtual things include multimedia content and application software.

Technical Overview of IoT

  • A physical thing can be represented in the information world via one or more virtual things (mapping), and a virtual thing can exist without any associated physical thing.
  • Devices are pieces of equipment with mandatory capabilities of communication and optional capabilities of sensing, actuation, data capture, data storage, and data processing.
  • Devices collect various kinds of information and provide it to the information and communication networks for further processing, and some devices execute operations based on information received from the networks.
  • Devices communicate with each other through the communication network via a gateway, without a gateway, or directly.

Characteristics of IoT

  • IoT has an enormous scale, with a larger number of devices that need to be managed and communicate with each other compared to the current Internet.
  • The ratio of communication triggered by devices compared to communication triggered by humans will noticeably shift towards device-triggered communication.
  • IoT requires the management of the data generated and their interpretation for application purposes, which relates to semantics of data and efficient data handling.

High-Level Requirements for IoT

  • Identification-based connectivity: IoT needs to support connectivity between a thing and the IoT based on the thing's identifier.
  • Interoperability: IoT needs to ensure interoperability among heterogeneous and distributed systems for provision and consumption of a variety of information and services.
  • Autonomic networking: IoT needs to support autonomic networking, including self-management, self-configuring, self-healing, self-optimizing, and self-protecting techniques and/or mechanisms.
  • Autonomic services provisioning: IoT needs to support services provisioning by capturing, communicating, and processing automatically the data of things based on configured rules.
  • Location-based capabilities: IoT needs to support location-based capabilities, which depend on the location information of things and/or users.
  • Security: IoT needs to ensure security, including confidentiality, authenticity, and integrity of data and services.
  • Privacy protection: IoT needs to support privacy protection, including data transmission, aggregation, storage, mining, and processing.

Security Capabilities

  • Generic security capabilities: IoT needs to support generic security capabilities, including authorization, authentication, data confidentiality, and integrity protection, privacy protection, security audit, and anti-virus.
  • Specific security capabilities: IoT needs to support specific security capabilities, which are closely coupled with application-specific requirements.

IoT Ecosystem and Business Models

  • IoT ecosystem is composed of various business players, including device providers, network providers, platform providers, application providers, and application customers.
  • Each business player plays at least one business role, but more roles are possible.
  • Business models in IoT ecosystem are based on different relationships between players, including device-centric, network-centric, platform-centric, and application-centric models.

Quiz on Internet of Things (IoT) and Machine to Machine (M2M) technology, covering its definition and applications.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

IoT Fundamentals: M2M Communications and Standards
16 questions
w5ch7
160 questions

w5ch7

ProdigiousQuantum avatar
ProdigiousQuantum
Use Quizgecko on...
Browser
Browser