Lecture 3 - Communcation Models Flashcards

1
Q

What are the IoT Requirements for Various Applications

A

Reliability
Latency
Mobility
Security
Power
Protocol Message Size
Frequency of Interactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Relationship between Capacity and Bandwidth (Hz)

A

*The Nyquist formula provides a relationship between capacity and bandwidth under idealized conditions where noise is not considered.
* C(bps) = 2B * log(base2) *M (Nyquist)
* C is the capacity in bits per second, B is the frequency bandwidth in Hertz, and M is the number of levels a single symbol can take on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Device-to-Cloud communication

A

IOT device connects firstly to an internet cloud service like an application service provider to exchange data and control message traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Communiucation Models - Device-to-Cloud Communications: Nest Learning Thermostat,

A
  • In the case of the Nest Learning Thermostat, the device transmits data to a cloud database where the data can be used to analyze home energy consumption.
  • Further, this cloud connection enables the user to obtain remote access to their thermostat via a smart phone or Web interface, and it also supports software updates to the thermostat.
  • Frequently, the device and cloud service are from the same vendor.
  • If proprietary data protocols are used between the device and the cloud service, the device owner or user may be tied to a specific cloud service, limiting or preventing the use of alternative service providers. This is commonly referred to as “vendor lock-in’’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Communiucation Models - Device-to-Gateway Model: Transport Layer Security

A
  • Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Communiucation Models - Device-to-Gateway Model: Datagram Transport Layer Security

A
  • Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram based applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Communiucation Models - Device-to-Gateway Model

A

*In the device-to-gateway model, or more typically, the device-to-application-layer gateway (ALG) model, the IoT device connects through an ALG service as a conduit to reach a cloud service.
* This means that there is application software operating on a local gateway device, which acts as an intermediary between the device and the cloud service and provides security and other functionality such as data or protocol translation
* Several forms of this model are found in consumer devices. In many cases, the local gateway device is a smart phone running an app to communicate with a device and relay data to a cloud service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Communiucation Models - Device-to-Gateway Model; What is it used for?

A
  • This is often the model employed with popular consumer items like personal fitness trackers. These devices do not have the native ability to connect directly to a cloud service, so they frequently rely on smart phone app software to serve as an intermediary gateway to connect the fitness device to the cloud
  • The other form of this device-to-gateway model is the emergence of “hub” devices in home automation applications.
  • These are devices that serve as a local gateway between individual IoT devices and a cloud service, but they can also bridge the interoperability gap between devices themselves.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Communiucation Models - Back-End Data-Sharing Model

A
  • Back-End Data-Sharing essentially extends the single device-to-cloud communication model so that IoT devices and sensor data can be accessed by authorized third parties.
  • Under this model, users can export and analyze smart object data from a cloud service in combination with data from other sources and further send it to other services for aggregation and analysis.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is *Constrained Application Protocol (CoAP) (under Back-End Data Sharing)

A

*Constrained Application Protocol (CoAP) is an Internet Application Protocol for constrained devices (defined in RFC 7228). It enables those constrained devices to communicate with the wider Internet using similar protocols.
*The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is OAuth (under Back-End Data Sharing)

A
  • OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords
  • This mechanism is used by companies such as Google, Facebook, Microsoft and Twitter to permit the users to share information about their accounts with third party applications or websites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly