M2M and IoT Device Characteristics Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a typical characteristic of a device in M2M and IoT?

  • Fixed power source
  • Microcontroller with limited memory
  • Communication capabilities (cellular, wireless or wired)
  • Complex User Interface with touch screen (correct)

Basic devices in M2M and IoT always have advanced user interfaces for complex interactions.

False (B)

What is the typical power consumption range for very constrained devices used in M2M and IoT applications?

milli- to micro-Watt range

A __________ is a hardware unit that can sense aspects of its environment and/or actuate tasks in its environment.

<p>device</p> Signup and view all the answers

Match the following device characteristics with their corresponding descriptions:

<p>Microcontroller = Processing unit with memory and storage Power Source = Source of energy for device operation Sensors and Actuators = Components for environmental monitoring or performing actions Execution Environment = Management of application lifecycle and API</p> Signup and view all the answers

Which of these is a capability enabled on tiny System-on-a-Chip (SoC) solutions?

<p>Hosting an entire TCP/IP stack (D)</p> Signup and view all the answers

All devices in M2M and IoT networks need a full-featured operating system.

<p>False (B)</p> Signup and view all the answers

Name two categories that devices can be grouped into.

<p>Basic Devices and Advanced Devices</p> Signup and view all the answers

Which of the following is NOT a factor contributing to the 'lossy' nature of low-rate, low-power communication technologies?

<p>High computational capabilities of devices (C)</p> Signup and view all the answers

ETSI's use cases fully encompass all potential deployment scenarios and environments for IoT systems.

<p>False (B)</p> Signup and view all the answers

What is the fundamental mechanism suggested for bridging heterogeneous physical and link layer technologies?

<p>IP connectivity</p> Signup and view all the answers

Power Line Communication (PLC) involves communicating over power, phone, or _________ lines.

<p>coax</p> Signup and view all the answers

At low frequencies, what is a typical characteristic of PLC ?

<p>Low bit rates over kilometers (B)</p> Signup and view all the answers

LAN and WLAN technologies are not relevant for M2M and IoT applications.

<p>False (B)</p> Signup and view all the answers

What is the purpose of pulsing the electrical lines in PLC?

<p>communication</p> Signup and view all the answers

Match the following communication technologies with their descriptions:

<p>PLC = Communication over power lines LAN = High bandwidth, reliable for local networking WLAN = Wireless networking for local connectivity</p> Signup and view all the answers

Which IEEE standard is specifically designed to enhance throughput and is useful for streaming multimedia?

<p>IEEE 802.11n (C)</p> Signup and view all the answers

Bluetooth Low Energy (BLE) is designed for long-range applications requiring high data rates.

<p>False (B)</p> Signup and view all the answers

What term refers to managing the active periods of the Radio Frequency Integrated Circuit (RFIC) during transmissions and listening to the medium?

<p>radio duty cycling</p> Signup and view all the answers

The IEEE 802.15.4 family of standards was used in practical research and experimentation in the field of ______.

<p>WSNs</p> Signup and view all the answers

Match the following IEEE standards with their primary purpose:

<p>IEEE 802.3 = Ethernet IEEE 802.11 = Wi-Fi IEEE 802.15.4 = Low-Rate Wireless Personal Area Networks</p> Signup and view all the answers

Which frequency band is primarily targeted by ongoing work on IEEE 802.11ac?

<p>5 GHz band (A)</p> Signup and view all the answers

IEEE 802.11ah uses collaboration to extend range and improve energy efficiency.

<p>True (A)</p> Signup and view all the answers

What is the primary application of ZigBee, according to the text?

<p>low-energy communications specifications</p> Signup and view all the answers

What is the primary goal of the PHY Amendment for Smart Utility Networks (SUN), IEEE 802.15.4g?

<p>To extend the operational coverage of networks up to tens of kilometers. (C)</p> Signup and view all the answers

6LoWPAN was developed to transport IPv4 over IEEE 802.15.4-2003 networks.

<p>False (B)</p> Signup and view all the answers

What are the three main objectives addressed by 6LoWPAN when transporting IPv6?

<p>fragmentation, reassembly, and header compression</p> Signup and view all the answers

RPL is a routing protocol for Low Power and Lossy Networks, which are characterized by high data loss rates, low data rates, and general ______.

<p>instability</p> Signup and view all the answers

Which of the following is NOT a typical link considered in the development of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks)?

<p>Fiber Optic Cables (C)</p> Signup and view all the answers

Match the following ICMPv6 messages with their functions in RPL networks:

<p>DAG Information Object (DIO) = Allows a node to discover an RPL instance, configuration parameters and parents DAG Information Solicitation (DIS) = Allows requests for DIOs from RPL nodes Destination Advertisement Object (DAO) = Propagates destination information upwards along the DODAG</p> Signup and view all the answers

CoAP (Constrained Application Protocol) is being developed as a web transfer protocol suitable for high-resource environments.

<p>False (B)</p> Signup and view all the answers

What is the main function of the Trickle Algorithm in RPL message exchange?

<p>enabler of RPL message exchange</p> Signup and view all the answers

What is a key consideration when evaluating the value of data for a business?

<p>Its potential for future applications and competitive advantages. (C)</p> Signup and view all the answers

Data processing only involves working with data that is already stored.

<p>False (B)</p> Signup and view all the answers

Name two examples of data adjustment techniques used in data processing.

<p>normalization, timestamp adjustment</p> Signup and view all the answers

Data _________ refers to residues of data remaining in electronic media even after deletion.

<p>remanence</p> Signup and view all the answers

Which of the following technologies are typically needed for processing massive amounts of M2M data?

<p>massively parallel processing DBs. (D)</p> Signup and view all the answers

Overwriting is the only technique for dealing with data remanence.

<p>False (B)</p> Signup and view all the answers

Besides databases, where else can data remanence be a concern in an M2M system?

<p>Points of action/nodes/individual devices</p> Signup and view all the answers

Match the data processing techniques with their description:

<p>Data Adjustment = Modifying data, such as normalizing data or adjusting timestamps. Data Aggregation = Combining data from multiple sources, often with mathematical functions. Data Transformation = Changing the format or representation of the data, e.g., converting units. Data Forecasting = Predicting missing or invalid data</p> Signup and view all the answers

At which levels can cross-layer interaction and cooperation be pursued in M2M and IoT technology?

<p>Both machine-to-machine and machine-to-business levels (B)</p> Signup and view all the answers

Devices in the lowest layer can only communicate with each other over short-range protocols like ZigBee and Bluetooth.

<p>False (B)</p> Signup and view all the answers

What is one type of service that some devices in the lowest layer may host?

<p>REST services</p> Signup and view all the answers

Resource-constrained devices may require auxiliary gateways for support, such as mediation of communication and ___________.

<p>protocol translation</p> Signup and view all the answers

Match the following terms with their descriptions:

<p>M2M interaction = Enables devices to interact with each other to fulfill their goals Service-oriented approach = Uses web services or REST to integrate real-world elements Cloud services = Network services providing virtualization and scalability CDN = Used to access generated data from remote locations</p> Signup and view all the answers

What is a key motivator for using enterprise services in the cloud, as mentioned in the text?

<p>Minimization of communication overhead with multiple endpoints (A)</p> Signup and view all the answers

Content Delivery Networks (CDNs) are used to restrict access to generated data from locations that are far away from the M2M infrastructure.

<p>False (B)</p> Signup and view all the answers

Besides virtualization and scalability, what are two other characteristics of the cloud that are advantageous for enterprise services?

<p>Multi-tenancy, performance</p> Signup and view all the answers

Flashcards

What are embedded processing devices?

Small, low-power embedded systems like microcontrollers with integrated networking interfaces, ideal for constrained IoT applications.

What are SoC solutions?

Small, low-power devices that often use microcontrollers with integrated networking interfaces and can support communication protocols like TCP/IP.

Define a device in the context of IoT.

A hardware unit that can sense its environment (using sensors) and/or take actions (using actuators) in its environment.

What is a microcontroller in an IoT device?

The device's central processing unit, typically a microcontroller with varying power and memory capabilities.

Signup and view all the flashcards

What is the power source of an IoT device?

The method by which the device receives power, whether it's a fixed power source, batteries, energy harvesting, or a combination.

Signup and view all the flashcards

What are sensors and actuators in an IoT device?

Components that allow the device to capture data about its surroundings (e.g., temperature, light) or to interact with the environment (e.g., turning a motor on/off).

Signup and view all the flashcards

What is the communication method of an IoT device?

The way the device communicates with other devices or networks, including wireless connections like Bluetooth or Wi-Fi, or wired connections like Ethernet.

Signup and view all the flashcards

What is the operating system of an IoT device?

Software that manages the device's operations, ranging from basic loop execution to complex real-time operating systems.

Signup and view all the flashcards

Lossy Communication in IoT

Low-rate, low-power communication technologies often face signal loss due to environmental factors, technical limitations, physical constraints of devices, and maintenance challenges.

Signup and view all the flashcards

What is PLC?

Power line communication (PLC) utilizes existing electrical power lines for data transmission.

Signup and view all the flashcards

How does PLC transmit data?

PLC operates by modulating the electrical signals on power lines, similar to sending pulses of different strengths and frequencies.

Signup and view all the flashcards

PLC for long-distance, low data rate communication

PLC can achieve long-range communication (kilometers) with low data rates (hundreds of bits per second) by using lower frequencies. This was initially used for remote metering and is being explored for smart grids.

Signup and view all the flashcards

High-speed PLC

PLC technology has been enhanced to deliver higher bandwidth communication over power lines, moving towards broadband capabilities.

Signup and view all the flashcards

PLC Standardization

Standardization efforts for PLC are ongoing, with IEEE 1901 and ITU-T G.hn being considered for smart grid applications in the United States.

Signup and view all the flashcards

Why are LAN and WLAN important in IoT?

LAN (local area network) and WLAN (wireless LAN) technologies are crucial for M2M and IoT applications due to their reliability, high bandwidth, and established infrastructure.

Signup and view all the flashcards

IoT Deployment Variety

The diversity of IoT deployment settings (factories, buildings, vehicles, etc.) necessitates flexible and adaptable technologies for communication.

Signup and view all the flashcards

Short-Range Device Communication

In M2M and IoT, the lowest layer often consists of multiple devices that communicate with each other using short-range protocols like ZigBee or Bluetooth.

Signup and view all the flashcards

Long-Range Device Communication

Devices in the lowest layer can use longer range communication protocols like Wi-Fi to connect beyond close proximity.

Signup and view all the flashcards

Device Service Hosting

Some devices may host services like REST services for communication, allowing them to be dynamically discovered by other devices.

Signup and view all the flashcards

Role of Gateways in M2M

Devices in the lower layer may have limited resources, requiring the use of gateways to mediate communication, translate protocols, and provide extra support.

Signup and view all the flashcards

M2M Interaction for Application Enablement

Machines or devices can communicate directly with each other or through infrastructure support to enable various applications and achieve their goals.

Signup and view all the flashcards

Service-Oriented Integration in M2M

A service-oriented approach to M2M integration involves direct interaction with physical elements using web services or lightweight methods like REST.

Signup and view all the flashcards

Cloud-Based Services in M2M

Many of the services interacting with M2M devices are network-based services residing in the cloud, leveraging its scalability and other benefits.

Signup and view all the flashcards

Cloud Characteristics for Enterprise Services

Enterprise services benefit from cloud characteristics like virtualization, scalability, and multi-tenancy, providing advantages for M2M applications.

Signup and view all the flashcards

IEEE 802.11

A family of standards for wireless local area networks (WLANs) commonly known as Wi-Fi. It defines the protocols for wireless communication between devices.

Signup and view all the flashcards

IEEE 802.11n

An extension of the IEEE 802.11 standard that focuses on improving data throughput, particularly for demanding applications like multimedia streaming.

Signup and view all the flashcards

IEEE 802.11ac

A newer version of Wi-Fi designed to further enhance data throughput, primarily operating in the 5 GHz band.

Signup and view all the flashcards

IEEE 802.11ah

An IEEE 802.11 standard aimed at enabling large networks with a focus on energy efficiency and extended range. It operates in the 1 GHz ISM band.

Signup and view all the flashcards

Bluetooth Low Energy (BLE)

A low-power and low-cost wireless communication technology designed for short-range applications, often used in smart devices like smartphones and wearables.

Signup and view all the flashcards

IEEE 802.15.4

A family of standards that define the physical and medium access control layers for low-power, low-rate wireless networks, often used in the Internet of Things (IoT).

Signup and view all the flashcards

ZigBee

A wireless communication protocol built on top of the IEEE 802.15.4 standard. It enables low-power, low-rate networking in applications like home automation and sensor networks.

Signup and view all the flashcards

Radio Duty Cycling

A technique used to manage the active periods of a radio transceiver during transmission and reception, optimizing energy consumption in low-power networks.

Signup and view all the flashcards

6LoWPAN

A network protocol that enables IPv6 communication over low-power wireless networks like IEEE 802.15.4, which are commonly used in IoT applications.

Signup and view all the flashcards

RPL (Routing Protocol for Low Power and Lossy Networks)

A routing protocol designed for low-power and lossy networks, often found in IoT scenarios. It uses Destination Oriented Directed Acyclic Graphs (DODAGs) for efficient data routing.

Signup and view all the flashcards

DAG Information Object (DIO)

A specific ICMPv6 message used in RPL networks to discover RPL instances, configure parameters, and find parent nodes.

Signup and view all the flashcards

CoAP (Constrained Application Protocol)

A specialized web protocol designed for constrained environments, often used in IoT and M2M applications. It's built to work with limited resources and bandwidth.

Signup and view all the flashcards

Trickle Algorithm

A technique used in RPL to efficiently manage message exchange in lossy networks. It utilizes periodic updates and back-off mechanisms to balance energy consumption and data reliability.

Signup and view all the flashcards

Destination Oriented Directed Acyclic Graph (DODAG)

A type of network topology employed by RPL. It resembles a directed tree structure, allowing routing from various points to a central sink or conversely, spreading information from the root to multiple nodes.

Signup and view all the flashcards

Data Processing in M2M

The process of analyzing and preparing M2M data for analysis, processing, and storage. This involves tasks such as data normalization, data cleansing, and data transformation. It can be applied to data at rest or in motion.

Signup and view all the flashcards

Processing In-Motion Data

The process of working with data that is actively being generated or transmitted, often coming from sensors or devices. It involves handling real-time data streams, processing them efficiently, and making adjustments as needed.

Signup and view all the flashcards

Data Normalization

Correcting inaccuracies in M2M data, such as removing duplicate entries, standardizing units of measurement, or filling in missing values with estimates. This ensures data consistency and reliability.

Signup and view all the flashcards

Estimating Missing Data

Estimating values for data that is missing or incomplete. This involves using statistical methods or intelligent algorithms to reconstruct the data based on known information.

Signup and view all the flashcards

Data Aggregation

Combining data from two or more sources or streams to create new information. Usually involves applying mathematical operations on the combined datasets.

Signup and view all the flashcards

Data Transformation

Converting data from one format to another. This can involve changing units of measurement, encoding data differently, or restructuring the data to fit a new model.

Signup and view all the flashcards

Data Remanence

The possibility that even when erased or removed, data might still be recoverable from electronic media due to residual magnetic or electrical traces. It poses a risk of unauthorized access to sensitive information.

Signup and view all the flashcards

Data Remanence Mitigation

Techniques designed to prevent data remanence, such as overwriting data multiple times, using degaussing to erase magnetic media, encrypting data, or physically destroying storage devices.

Signup and view all the flashcards

Study Notes

Negative Impacts of GVC Participation

  • Potential negative impacts encompass poor workplace conditions, compromised occupational safety and health, job insecurity, and the ease of relocating production to lower-cost countries.

GVC Development Strategies

  • Countries must assess advantages and disadvantages of GVC participation in their development strategies.
  • Promoting GVC participation should prioritize specific segments within value chains.
  • Country trade profiles and industrial capabilities should be prerequisites in determining suitable GVC development strategies.

Key Aspects for GVC Upgrading

  • GVCs should be integrated into industrial development policies by targeting specific tasks.
  • Proper framework conditions for trade and foreign direct investment (FDI), as well as essential infrastructure should be put in place.
  • Local workforce skills and capabilities' development will support successful implementation of GVC upgrading.

IoT Architectural Overview

  • IoT architecture can be described as a four- or five-layered system.
  • Four-layered architecture includes media/devices, network, service/application support, and application layers.
  • Five-layered architecture includes perception, network, middleware, application, and business layers.

Layer Functions

  • Sensor/Perception Layer: Consists of wireless devices, sensors, and RFID tags for collecting raw data like temperature, moisture, etc.
  • Network Layer: Facilitates data routing to the next layer via wired and wireless network protocols.
  • Middleware Layer: Stores information from lower layers, processes it, and makes decisions based on processed information.

Basic Building Blocks of IoT

  • "Things" of the system that collect data from the environment or output data to surroundings.
  • Sensors: Uniquely identifiable devices with a unique IP address for active real-time data collection. Examples: gas, water quality, moisture sensors.
  • Processors: Process the captured data from sensors and extract valuable information.
  • Gateways: Route processed data for proper usage. Facilitate data transfer for communication. Network connectivity like LAN, WAN, PAN is crucial.
  • Applications: Utilize the data to perform use functions such as home automation, electronic health monitoring.

Main Design Principles of IoT

  • Research: Understand customer value proposition for an IoT product and corresponding pain points.
  • Value-Centricity: Focus on genuine value of solutions. Address barriers to adoption.
  • Holistic approach: Ensure all layers of the system are well-designed and integrated to achieve successful end-user experience.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

M2M(Machine to Machine
23 questions

M2M(Machine to Machine

WorldFamousOnyx6547 avatar
WorldFamousOnyx6547
Mastering M2M and IoT
5 questions

Mastering M2M and IoT

HolyEcstasy4897 avatar
HolyEcstasy4897
Use Quizgecko on...
Browser
Browser