U3 Flashcards

1
Q

M2M involves:

A

an autonomous device communicating directly to another autonomous device. In this context, autonomous refers to the ability of a node to start the communication with a neighboring node without human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In M2M, devices do ——— necessarily depend on an ———————–connection. In such cases, the devices may communicate over ——————— channels, e.g., a serial port or ————–protocol. A simple example of M2M is controlling electrical appliances, such as bulbs and fans, using ———————— from a smartphone.

A

not
Internet
non-IP-based
custom
RF or Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Alternatively, IoT may incorporate some M2M?

A

nodes, but aggregates data at an edge router or gateway connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Other scenarios implement the internet networking capabilities on each IoT device to?

A

separately deliver its data to cloud services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In fact, several technological advancements have driven the evolution from M2M to IoT, including?

A

the cloud technologies advancement,
the pervasiveness of wireless and mobile communication, the cost-effective new energy devices like lithium-ion,
and the arrival of advanced deep learning and AI tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In fact, several technological advancements have driven the evolution from M2M to IoT, including the cloud technologies advancement, the pervasiveness of wireless and mobile communication, the cost-effective new energy devices like lithium-ion, and the arrival of advanced deep learning and AI tools. In this manner, IoT is a broader term than M2M solutions as?

A

it encompasses much more technology and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DevOps engineer:

A

These engineers will work with IT developers to facilitate better coordination among operations, development, and testing functions by automating and streamlining the integration and deployment processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In general, IoT ecosystems start with sensors deployed in a certain location to ?

A

convert physical phenomena, such as movement, temperature, and pressure, into digital signals.
Such signals represent the data to be transmitted to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At this stage, the collected data traverse various ———–arriving at a ——————–. In fact, the powerful potential of IoT emerges from collecting millions of ———————–. To build such an ecosystem, we need experts from different ————————–disciplines.

A

channels
cloud service
sensory data
engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At the outset, physicists are required to?

A

develop new sensor technologies and long lifetime batteries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Embedded system engineers are necessary to?

A

drive the sensors at the edge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For data collection, we need:

A

=network engineers who are capable working in a personal area network (PAN)
= or wide area network (WAN)
=as well as a software-defined networking.
=Furthermore, data scientists are needed to develop novel data analysis and machine learning algorithms at the edge and at the cloud.
= Finally, DevOps engineers have the responsibility of deploying scalable cloud solutions in addition to fog solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Obviously, IoT architecture may comprise several technologies and connectivity solutions. Hence, there exist a myriad of design choices for cloud storage:

A

IoT security systems,
networking,
and data analytics (Lea, 2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For example,

A

selecting the wrong PAN protocol may lead to poor communication and significantly low signal quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Selecting the wrong PAN protocol may lead to? interference effects in the local area network (LAN) and WAN and how costly the loss of data is. Furthermore, a decision must be made about which Internet protocols, such as message queuing telemetry transport (MQTT), constrained application protocol (CoAP), and advanced message queuing protocol (AMQP), to adopt. In the context of data processing, a system designer must decide whether or not to apply fog computing via processing data close to its source to solve latency problems and to reduce bandwidth and communication costs.

A

poor communication and significantly low signal quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System designers have also to consider?

A

interference effects in the local area network (LAN)
and WAN and how costly the loss of data is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Furthermore, a decision must be made about which Internet protocols, such as?

A

message queuing telemetry transport (MQTT), constrained application protocol (CoAP), and advanced message queuing protocol (AMQP), to adopt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the context of data processing, a system designer must decide?

A

-whether or not to apply fog computing via processing data close to its source to solve latency problems
- and to reduce bandwidth and communication costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The figure below demonstrates the main components of IoT system architecture with several design options. Specifically, there exist five main components:

A

(1) sensing and power;
(2) data communication;
(3) Internet and routing protocols;
(4) cloud and fog computing;
and (5) IoT security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The first component involves?

A

any device that is capable sensing the world.

In many cases, a single sensor can generate a massive amount of data,

such as auditory sensing for preventative maintenance of machinery.

Other applications may only acquire a single bit of data indicating, for example, vital health data from a patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In general, sensors have widely grown in scale up to ————————- sizes with significant cost ————. To drive the sensors at the edge,————————————- power systems are required. Collections of billions of small sensors still require a ———————- amount of energy to power. Therefore, novel energy supply methods, such as ————–, have been recently developed to enable sensors to function for many years.

moving the sensory data from the edge to cloud services and data centers located, for example, at Google, Amazon, Microsoft, and IBM. Such sensors are mostly battery powered, with minimal computing and storage resources.

A

sub-nanometer
reduction
low-size and low-cost

massive
harvesting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The second component deals with?

A

moving the sensory data from the edge to cloud services and data centers located,

for example, at Google, Amazon, Microsoft, and IBM. Such sensors are mostly battery powered, with minimal computing and storage resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Owing to these resources’ constraints, there exist several communication challenges :

A

-addressing and identification. According to the concept of IoT, billions of devices are to be connected to the Internet. Accordingly, each device has to be identified through a unique address. Hence, we need a large address space and a unique address for each IoT device.

low power communication. Wireless communication typically consumes a significant amount of energy. Therefore, we need solutions that facilitate data communication with low power consumption.

routing protocols with low memory requirement and efficient communication patterns.

high-speed and non-lossy communication.

mobility of smart IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In addition to the IP-based communication (which is used by IoT devices to connect to the Internet), non-IP networks are?.

A

also used to locally connect the IoT devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Non-IP communication channels, such as Bluetooth, RFID, and NFC, are popular but?

A

limited in their range (up to a few meters). Accordingly, these facilities are limited to small PANs widely used in IoT applications such as wearables connected to smartphones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

To design successful IoT systems, preliminary tools and models have to be?

A

incorporated, such as wireless radio dynamics like range and power analysis, signal-to-noise ratio, path loss, and interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The leading communication technologies used in the IoT world are?

A

IEEE 802.15.4,
low-power Wi-Fi,
6LoWPAN,
RFID, NFC,
Sigfox, LoRaWAN,
and other proprietary protocols for wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The third component deals with?

A

bridging IoT data from sensors to the Internet through gateway routers
and supporting IP-based protocols.
Specifically, the primary role of the routers is securing, managing,
and steering the sensory data.
In fact, a single edge router can serve thousands of IoT devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IoT data needs :

A

efficient,
power-aware,
and low-latency protocols that can be easily steered and secured in and out of the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The fourth component deals with ?

A

processing the collected data by means of various aspects of cloud architectures such as SaaS, IaaS, and PaaS systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Nevertheless, not everything belongs in the ———-. There is a measurable cost in —————— data to a cloud vs. processing it at the ————(edge computing) or extending cloud services ————————into an edge router (fog computing).

A

cloud
moving all IoT
edge
downward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Thanks to the advanced analytics and rules engines, the collected sensory data are mostly turned into?

A

=a set of decisions and actionable consequences. In some scenarios, a simple rules engine,

=e.g., fuzzy logic controller, can be adopted to easily detect anomalous temperature extremes on an edge router monitoring several IoT devices.

=In other scenarios, a massive amount of structured and unstructured data may be streaming in real time to a cloud service while requiring both fast processing for predictive analytics and long-range forecasting using advanced machine learning models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Since the IoT devices are mostly in the public, in very remote areas, moving vehicles, or even inside a person, several security threats?

A

emerge. Several security primitives, such as asymmetric encryption, have been discussed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In general, sensors are:

A

devices that can monitor and measure the physical world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

As the primary source of IoT data, ——————represent the most important building block of all IoT applications. IoT sensors are mostly ————————————————————————————–. These IoT sensors come in a variety of forms and complexities, from simple ———————–to advanced ———–systems.

A

sensors

small, low cost, and constrained by battery capacity

thermocouples

video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

With the increasing popularity of smartphones, many smart IoT solutions have recently been built using smartphones because of ?

A

their embedded sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Examples of the sensors embedded in modern smartphones are:

A

accelerometers,
gyroscopes,
cameras,
microphones,
GPS,
light sensors,
and proximity sensors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In general, accelerometers sense?

A

the motion and acceleration through measuring changes in velocity of the smartphone in three dimensions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Similarly, gyroscopes precisely detect the orientation of the smartphones through measuring?

A

capacitive changes when a seismic mass moves in a particular direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Modern accelerometers and gyroscopes are?

A

-fabricated as micro-electromechanical systems (MEMS).

-MEMS sensors incorporate miniaturized mechanical structures that can spin, stretch, bend, move, or alter form which in turn affects an electrical signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The figure below shows the components and basic principle of accelerometers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

. Accelerometers use a MEMS piezoelectric to?

A

produce a voltage in response to movement.

Specifically, a central mass is attached to a spring which responds to acceleration in a certain direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

When the accelerometer experiences an acceleration, the mass deflects from its —————————-. This deflection can be measured by varying ———————-in a —————————-. Accelerometers are designed to respond to ——- dimensions (X, Y, Z) rather than ————–dimension.

A

neutral position
capacitance
MEMS circuit
multiple
one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Alternatively, gyroscopes operate slightly?

A

differently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A disk is driven to?

A

rotate a fraction of a full turn around its axis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The tilt of the disk is measured to?

A

produce a signal related to the rate of rotation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Both gyroscopes and accelerometers require?

A

power supplies and an op-amp for signal conditioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

After conditioning, the output can be directly sampled by?

A

a digital controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

These sensors can be manufactured in very small packages. For instance,

A

the Invensense MPU-6050 comprises a 6-axis gyro and accelerometer in a small 4 mm x 4 mm x 0.9 mm package with operating current of 3.8 mA, thus it is well-suited for low power sensing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Additionally, magnetometers measure?

A

the strength and/or direction of magnetic fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Additionally, magnetometers measure the strength and/or direction of magnetic fields. This can be used as ?

A

a digital compass and in applications to detect the presence of metals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Magnetometers are mostly harnessed to obtain?

A

directional information in three dimensions by being paired with accelerometers and gyroscopes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

An inertial measurement unit (IMU).

A

Magnetometers are mostly harnessed to obtain directional information in three dimensions by being paired with accelerometers and gyroscopes.

This device is called an inertial measurement unit (IMU)

IMUs are typically used to obtain location information in indoor environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

To estimate the location information in outdoor environments?

A

-GPS sensors use a network of about 30 satellites orbiting the earth at an altitude of 20,000 km.

-The location is detected using the principle of trilateration in which the intersection point among three or more circles, whose centers are the satellites, is determined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Aside from location detection, light sensors have recently been used to?

A

measure the intensity of ambient light.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Smart home applications employ such sensors to control ?

A

the lights in a room without human intervention. Furthermore, light sensors are used in many other IoT sensing activities, such as security systems, smart switches, and smart street lighting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

There exist two types of light sensors:

A

namely photoresistor and photodiodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Photoresistor varies in resistance depending on?

A

light intensity, while photodiodes convert light into an electrical current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Similarly, proximity sensors employ infrared (IR) signals to measure?

A

the distance between the sensor and a certain object.

The main idea is to emit IR signals and wait for reflections from an object. Based on the difference in time, we can calculate the distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

As an example,

A

proximity sensors can be used in applications in which we have to trigger some event when an object approaches the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

For long ranging and scanning, light detecting and ranging (LiDAR) sensors estimate the distance to an object by measuring?

A

a laser pulse reflection on the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

The emitted laser power is typically constrained for safety reasons to prevent?.

A

eye damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

LiDAR sensors are heavily used in?

A

agriculture, automated and self-driving vehicles, robotics, surveillance, and environmental studies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

They are not only capable of estimating the range but are also capable of ?

A

analyzing anything that crosses its path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

For instance,

A

they can analyze gases, atmospheres, cloud formations and compositions, particulates, the speed of moving objects, and so on.

The figure below shows the utilization of LiDAR sensors in the automated sector to estimate the distance between moving vehicles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

In this realm,:

A

Google,
known for this project as Waymo (n.d.)
and Uber (2019) are developing self-driving vehicles.

Their vehicles feature a bulky box on top of the roof which spins continuously giving 360° visibility and precise, in-depth information about the exact distance to an object to an accuracy of ±2 cm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Some smartphones have a thermometer, barometer, and humidity sensor to measure ?

A

the temperature,
atmospheric pressure,
and humidity, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

In IIoT, temperature sensors typically exist?

A

almost anywhere, e.g., smart thermostats, IoT cold storage logistics, refrigerators, and industrial machinery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

In general, there are three common temperature sensors in the IoT market:

A

thermocouples,
resistance temperature detectors (RTD), and thermistors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Thermocouples produce very small signals, e.g., microvolts in amplitude?

A

because thermocouples do not receive an excitation signal to operate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Thermocouples are well suited for?

A
  • long distance measurements with long leads
  • and are often used in industrial and high-temperature environments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Thermocouples may suffer from aging? Hence,

A

i.e., high-heat environments can reduce the accuracy sensors over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

IoT solutions must account for changes over the life of a sensor.

A

Thermocouples may suffer from aging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Alternatively, RTDs require an excitation current to operate?

A

They operate within a narrow range of temperatures but have much better accuracy than thermocouples.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

RTDs’ application in industry is limited?

A

Because RTDs are rarely used above 600˚C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Finally, thermistors are resistors that ?

A

change based on temperature and are suitable where a high resolution is needed for a narrow temperature range.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Thermistors are heavily used in:

A

medical devices,
scientific equipment,
food handling equipment,
incubators,
and home appliances such are thermostats.
The following table summarizes the main

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

differences between the three types of temperature sensors.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Comparison between the three types of temperature sensors

A

Thermocouples -180 to 2,320
Resistance temperature detectors -200 to 500
Thermistors -90 to 130

Thermocouples Fast (microseconds)
Resistance temperature detectors Slow (seconds)
Thermistors Slow (seconds)

Thermocouples Low
Resistance temperature detectors Medium
Thermistors High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

In general, wearable sensors are equipped with?

A

medical sensors that are capable measuring different parameters, e.g., the heart rate, pulse, blood pressure, body temperature, respiration rate, and blood glucose levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Such wearables comprise —————————————————————————. In fact, smart watches and fitness trackers recently became popular as companies such as Apple, Samsung, and Sony (2016) are————————– innovative features, such as connectivity with smartphones, sensors such as an ——————————–.

A

smart watches, wristbands, monitoring patches, and smart textiles

incorporating

accelerometer, and heart rate monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In the same category, smart patches are pasted on ?

A

the skin to continuously monitor vital health parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

All the electronic components are?

A

embedded in these rubbery structures, and they are stretchable, disposable, and relatively cheap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

The figure below demonstrates a microneedle containing a smart insulin patch that is designed to sense elevated blood glucose levels.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

It responds to abnormal glucose levels by?

A

releasing insulin. In fact, such smart patches offer people with diabetes a less-painful and more-reliable way to manage their condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

RFID is?

A

an identification technology which consists of two main components: a tag and a reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

The tag is?

A

a small chip with an antenna to periodically,
or upon interrogation,
transmit short,
digital,
radio frequency (RF) messages.
Such messages typically contain a unique identification code as well as some data stored in the tag’s memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

To read the information encoded on a tag,?

A

the RFID reader emits a signal to the tag using an antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

The tag responds with the information written in its ———————– and the reader will then ———————-the read results to an—————— computer program.

A

memory

transmit
RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Furthermore, it measures the received signal strength (RSSI) of the received RF signal which is ?

A

an indicator of the range from tag to reader.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

There exist two types of RFID tags:

A

active and passive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Active tags have ?

A

a power source and passive tags do not have any power source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Passive ?

A

tags draw power from the electromagnetic waves emitted by the reader and are thus cheap and have a long lifetime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

RFID sensors are employed in ?

A

many IoT applications, such as inventory management, supply chain management, asset tracking, access control, identity authentication, and object tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

For instance,

A

an RFID tag is attached to the front of vehicles. When the vehicle reaches a barricade on which there is a reader, it reads the tag data and decides whether it is an authorized vehicle. If the vehicle is found to be authorized, the barricade opens automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

In such an application, RFID cards are?

A

issued to the people who can then be identified by an RFID reader and given access accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Modern smartphones include:

A

powerful microphones and camera sensors for capturing audio and visual information, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Readings from both sensors can be?

A

=analyzed to detect various types of contextual information,

=such as the surrounding environment and users’ activities.

= Furthermore, sound and vibration measurements are common in IIoT and predictive maintenance applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

For instance,

A

an industrial machine that rotates or mixes a load of material in chemical manufacturing needs precise leveling. A microphone can typically be used to monitor the health and safety of such equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Video cameras and vision systems are ?

A

smart sensors that have substantial processing power in the form of high-end processors, digital signal processors, FPGAs, and custom ASICs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

In modern vision systems, one of two types of sensing elements is used:

A

charge-coupled devices (CCD) or complementary metal-oxide (CMOS) devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

In charge-coupled devices (CCD) the charge is moved from?

A

the sensor to the edge of the chip to be sampled sequentially via an analog-to-digital converter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

CCDs create:

A

high-resolution
and low-noise images.
Nevertheless, they consume considerable amount of power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

In the latter type, individual pixels contain transistors to?

A

sample the charge and allow each pixel to be read individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

CMOS sensors are more common in the IoT market?

A

since they consume little power. However, they are mostly susceptible to noise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

The figure below demonstrates the various components of a typical CMOS camera and the various processing steps.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

In general, CMOS sensors are integrated into ?

A

a silicon die that appears as a two-dimensional array of transistors arranged in rows and columns over a silicon substrate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

A sensor starts with a ————-that observes a scene. Afterward, an image ————————————— is used to expose the captured image to a series of steps to ————————————-the image several times into a usable digital image.

A

lens

signal processor (ISP)

filter, normalize, and convert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

The amount of data passing through?

A

a camera sensor at a conservative 60 frames per second and 1080p resolution is massive.
Hence, it is not recommended to stream this massive data to the cloud for processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

As previously mentioned, most IoT applications require ?

A

the incorporation of several sensors to obtain higher-level inferences, thus making precise decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

sensor fusion.

A

The process of combining readings from different sensors is referred to as sensor fusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

For instance,

A

a single temperature sensor has no clue of what causes a rapid temperature change since it has no contextual awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Nevertheless, by combining these temperature readings with location detection and light intensity sensors, the IoT system could infer that a large number of people are congregating in a certain area while the sun is shining. In such a scenario, the IoT system may?

A

decide to increase air circulation in a smart building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

In general, there exist two major modes of sensor fusion:

A

centralized and de-centralized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

In the centralized mode,

A

the raw data is streamed and aggregated to a central service, e.g., cloud-based service, where fusion is performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

In the de-centralized mode,

A

the data is correlated at the sensor or close, e.g., edge or fog nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Autonomous vehicles stand as a prominent example of

A

de-centralized sensor fusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

In fact, sensor fusion widely helps in?

A

constructing a hypothesis about the state of the environment the vehicle is in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Above, an autonomous vehicle is depicted where ? Such inferred data leaves drivers safe since the autonomous vehicle becomes fully prepared for all road scenarios.

A

readings from five different sensors are fused together to track stationary and moving objects which is an important feature of autonomous driving technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

In this scenario, data streams from several sensors are combined to?

A

estimate the position, velocity, trajectory, and class of objects, i.e., other vehicles and pedestrians.

121
Q

The combined sensor readings in this application are as follows:

A

Ultrasonic sensors—to detect obstacles in the immediate vicinity
GPS—to calculate longitude, latitude, speed, and course
Speed and angle sensors—to measure speed and wheel rotation
LiDAR—to allow obstacles to be correctly identified
Camera—to detect, classify, and determine the distance from objects

122
Q

The readings from these sensors are transmitted to?

A

a receiving equipment, such as an onboard processing unit.

123
Q

One example of the fusion algorithms that can be implemented on a vehicle’s processing unit is known a ?

A

“Kalman filter.”

124
Q

Kalman filters work by ?

A

modeling the expected behavior of the sensors in response to movement, taking into account noise and distortions, and comparing this with what actually happens in order to iteratively refine the model until it accurately reflects the true behavior.

125
Q

To this end, Kalman filters rely on both?

A

the probability theory and the collected measurements.

126
Q

In general, a Kalman filter is an iterative process that uses two steps, referred to as?

A

predict and update.

127
Q

Kalman filter

A

For simplicity, the mathematical formulas for the ‘predict’ and ‘update’ steps have been omitted.

128
Q

For example

A

the control system of an autonomous vehicle may want to track a neighboring vehicle.
In the predict step, a Kalman filter forecasts the current position of this neighboring vehicle based on the previous position.
Moreover, it also computes the uncertainty in the predicted value.

129
Q

An example of uncertainty may occur when?

A

the prediction model assumes that the neighboring vehicle is moving with a constant velocity due to zero acceleration. However, the neighboring vehicle will have acceleration, i.e., its speed will fluctuate from time to time.

130
Q

the prediction model assumes that the neighboring vehicle is moving with ?

A

a constant velocity due to zero acceleration. However, the neighboring vehicle will have acceleration, i.e., its speed will fluctuate from time to time.

131
Q

To refine its prediction, a Kalman filter exploits?

A

the various measurements from the attached sensors in the update step.

132
Q

It calculates the difference between the predicted value and the measured values and then decides?

A

which value to keep through estimating the Kalman gain.

133
Q

The output from the update step is ?

A

again fed back to the predict step and the process continues until the difference between the predicted value and the measured value approaches zero.

134
Q

On one hand, Kalman filters can detect scenarios where?

A

data from one of the sensors is unreliable and should be ignored.

135
Q

On the other hand, Kalman filters suffer from ?

A

a relatively slow reaction in the case of rapidly changing situations.

Moreover, they assume that both the system and measurement models’ equations are both linear which is not realistic in many real-life situations.

136
Q

To overcome this shortcoming, other algorithms, such as ?

A

extended Kalman filter,
unscented Kalman filter,
and particle filter, must be adopted.

137
Q

In general, power management is a significant component of any successful —————————————. Most IoT devices are empowered using ——————— with limited energy ——————————. Accordingly, the expected lifetime of such devices is widely ————————————–.

A

IoT deployment

batteries
budget

limited

138
Q

Accordingly, the expected lifetime of such devices is widely limited. To extend the lifetime, system designers must either?

A

adopt a method for collecting energy from the environment, i.e., energy harvesting,

or adopt an energy conservation method to wisely consume the available energy.

139
Q

The most common energy storage facility for IoT devices is ?

A

either a battery or a supercapacitor.

140
Q

To select the most suitable energy source, system designers have to consider several aspects, including:

A

(1) battery energy capacity;
(2) how the battery’s energy will vary over time as it is discharged;
(3) is the IoT sensor in a thermally constrained environment that can affect the battery lifetime and reliability;
(4) is the battery deployed in an accessible place where it can be replaced; and finally (5) the maximum allowed weight of the battery.

141
Q

These days, several types of batteries are on the market, including?

A

lithium-ion (Li-ion),
nickel-cadmium,
and nickel-hydride batteries.

142
Q

Li-ion batteries become the standard form of?

A

power in mobile devices thanks to their high energy density.

143
Q

In a Li-ion battery, :

A

lithium-ions physically move from the negative electrode to the positive.

During recharge, the ions move back to the negative region.

144
Q

To predict the lifetime of a battery, Peukert’s law is vastly accepted by many IoT system designers?

A

Peukert’s law approximately estimates the change in capacity of batteries at different rates of discharge.

145
Q

According to Peukert’s law, the lifetime of a battery is?

A

equal to where t = c/ln is the capacity of the battery,

I represents the discharge current, and n is Peukert’s exponent.

As the rate of discharge increases, the battery’s available capacity decreases.

As the exponent n increases, we move further from a perfect battery to one that discharges faster as the current increases.

146
Q

In fact, the discharging rate differs for different types of batteries. Figure 3.8 depicts a comparison between three well-known battery types, including Li-ion, lead acid, and Ni-Cd. As shown in the figure, Li-ion provides a nearly constant voltage over its life but has a steep drop toward the end of its storage capacity. Alternatively, lead acid and Ni-Cd have less voltage potential and a curvilinear degradation in power.

A
147
Q

Supercapacitors are another form of energy storage in IoT applications. In a supercapacitor, energy is?

A

stored electrostatically on a plate, and does not involve any sort of chemical transfer of energy like Li-ion batteries.

148
Q

One of the most important advantages of supercapacitors over batteries is?

A

their fast charging time, i.e., they can charge to their full potential in seconds.

Moreover, it is straightforward in supercapacitors to predict the remaining time power will be available.

149
Q

In general, energy-harvesting devices efficiently
capture,
accumulate,
store,
condition,
and manage
this energy to ?

A

energize the deployed nodes.

150
Q

energy-harvesting devices are increasingly attractive alternatives to ?

A

costly batteries which have a relatively limited lifetime.

151
Q

Energy is usually everywhere in the various wireless sensor network (WSN) environments. This energy is available in the form of:

A

-mechanical energy—from sources such as vibration, mechanical stress, and strain.
-thermal energy—waste energy from furnaces, heaters, and friction sources.

-light energy—captured from sunlight or room light via photo sensors, photo diodes, or solar panels.

-electromagnetic energy—from inductors, coils, and transformers.

-natural energy—from the environment such as wind, water flow, ocean currents, and solar.

-human body—a combination of mechanical and thermal energy naturally generated from bio-organisms or through actions such as walking and sitting.

-other energy—e.g., from chemical and biological sources.

152
Q

An energy harvesting system typically requires an
energy source
and two other key electronic components. ?

A

First, an energy conversion device, such as a piezoelectric element, translates the energy into electrical form.

Second, an energy harvesting module captures, stores, and manages the power for the device.

153
Q

The selection between these energy sources highly depends on ?

A

the IoT application requirements and constraints.

154
Q

However, IoT applications which leverage harvested energy to power their electronic components may have difficulties?

A

since the power availability may vary over time.

155
Q

Furthermore, the available harvested power could be limited although ——–the —————energy. The limited energy problem occurs due to the low ———————— of most energy conversion ———.

A

not
surrounding
conversion efficiency
devices

156
Q

Characteristics of various energy sources

A

Energy Source:
1-solar
Harvesting technology Conversion efficiency Amount of harvested energy
solar cells 15% 15 mW/cm2

2-finger motion
Harvesting technology Conversion efficiency Amount of harvested energy

piezoelectric 11% 2.1 mW

3-exhalation
Harvesting technology Conversion efficiency Amount of harvested energy

breath masks 40% 0.4 W

4-blood pressure
Harvesting technology Conversion efficiency Amount of harvested energy

micro-generator 40% 0.37 W

157
Q

A prominent example of an energy transducer is?

A

the piezoelectric device.

Piezoelectric devices have been widely used as vibration sensors, but they can also be used to generate power.

158
Q

The core idea is ?

A

to convert the mechanical strains to energy through motion, vibration, or even sound.

159
Q

piezoelectric harvesters are suitable for very small systems with some form of energy collection and storage?

A

As shown in the table above, piezoelectric harvesters produce currents on the order of milli-watts.

160
Q

Similarly, RF energy harvesting has been used for years in the form of?

A

RFID tags.

161
Q

RFID exploits the near-field communication to send ?

A

RF power from the readers to RFID tags thanks to their proximity.

Alternatively, far-field applications involve harvesting energy from broadcast transmissions, e.g., televisions, cell signals, and radio.

162
Q

The main limitation of such technology emerges due to:

A
  • the rapid drop of power efficiency over distance.

-Moreover, active radiation is highly undesirable for health-related reasons. Below, we discuss some of the well-known methods for conserving the allocated energy.

163
Q

During the design time, system designers must consider several power contributors while deciding upon the budget of the power source to be used. Examples of such contributors are:

A

the active sensor power (if any),
frequency of data collection,
wireless radio communication strength and power,
frequency of communication, microcontroller power as a function of core frequency,
passive component power,
energy loss from leakage or power supply inefficiency,
and power reserve for actuators and motors.

164
Q

Taking these energy contributors into account during the design time leads to ?

A

the development of what is currently called as green IoT (G-IoT).

165
Q

In other words, G-IoT is a ————— of ————————————- in which energy efficiency is a major key during the ——————————phases.

A

subset
IoT applications
design and development

166
Q

In this context, G-IoT tackles the main energy consumers in the different components of IoT systems, e.g.,

A

sensing, communication, and data analytics.

167
Q

For sensing, several strategies can be adopted to ?

A

avoid wasting energy.

168
Q

For instance, IoT sensors can be adjusted to ?

A

work only whenever necessary, while spending most of their lifetime in a sleep mode.

169
Q

To this end, efficient scheduling algorithms must be adopted to?

A

trigger the sensors in a timely manner.

170
Q

Moreover, the communication protocols need to be flexible enough to deal with?

A

the network dynamicity which results from the frequent activation/deactivation of these IoT devices.

171
Q

Another solution for the energy problem can be?

A

the local processing of the sensory readings at the sensors.

The core idea is to trade off processing for communication knowing that radio communication mostly consumes much more energy than data processing.

172
Q

Accordingly, it is important to reduce the amount of data that must be reported to ?

A

the cloud services by means of fusion, compression, inference, or prediction algorithms.

173
Q

As a new way of sensing the signal with a much lower number of linear measurements provided that?

A

the underlying signal is sparse, “compressive sensing” is also able to enhance energy efficiency.

174
Q

In the field of green communication, cognitive radio (CR) stands as?

A

the most efficient method for improving the performance of wireless communication.

175
Q

Why reducing the energy required for retransmissions. Specifically, CR systems enable various IoT devices from sharing the same communication channel?

A

because the most efficient method for improving the performance of wireless communication.

176
Q

To this end, CR systems are aware of their ———–and can change their ———of operation (e.g., —————————————————————————) via software and hardware manipulation. Accordingly, they can improve ———————————– efficiency and minimize the problem of spectrum ———————–.

A

environment
modes
operating frequency, modulation scheme, waveform, and transmitting power

spectrum-usage

over-crowdedness

177
Q

Sensors typically generate a massive amount of?

A

data in most IoT applications.

178
Q

the cloud services cannot process big data generated from a myriad of IoT applications?

A

Transporting this big data to the cloud for processing could be a difficult task.

Specifically, sending all these data to the cloud requires excessively high network bandwidth.

Moreover, the cloud services are still limited in their capacity

179
Q

the cloud services cannot process big data generated from a myriad of IoT applications . To overcome these challenges:

A

fog computing comes into play.

180
Q

The term fog computing was coined by ?

A

Cisco in 2012.

181
Q

Through this technology, several services can be efficiently provided to?

A

the IoT users, such as data processing and storage.

182
Q

The core idea behind fog computing is?

A

to provide data processing and storage capabilities close to the sensors instead of sending them to the cloud.

183
Q

In this manner, fog computing:

A

-improves efficiency and performance,
-and reduces the amount of data transferred to the cloud for processing, analysis, and storage.

184
Q

In fact, processing and storing data on edge processors, close to the sensors, highly reduces?

A

network traffic and latency.

185
Q

The figure below delineates fog computing as an intermediary layer between?

A

the cloud and end devices.

186
Q

Such fog devices bring processing, storage, and networking services closer to ?

A

the end devices themselves.

187
Q

In fact, any device with computing, storage, and network connectivity can be?

A

a fog node,
e.g.,
industrial controllers, switches, routers, embedded servers, and video surveillance cameras.

188
Q

In general, the primary characteristics of fog computing are summarized as follows:

A

-location awareness. Fog computing supports location awareness in which fog nodes can be deployed in different locations.

-geographical distribution. In contrast to the centralized cloud, the services and applications provided by the fog are distributed and can be deployed anywhere.

-support for mobility. One of the important aspects of fog applications is the ability to connect directly to mobile devices and therefore enable mobility methods.

-real-time interactions. Fog computing applications provide real-time interactions between fog nodes rather than the batch processing employed in the cloud.

-interoperability. Fog nodes are designed by different manufacturers, thus coming in different forms. They can interoperate and work with different domains and across different service providers.

189
Q

The fog computing hierarchy is ?

A

one in which a network of fog nodes and the cloud services are connected and they are divided into logical or physical tiers .

190
Q

The fog computing hierarchy is composed primarily of three main tiers:

A

such that each tier assigns special duties to its corresponding devices.

In other words, each tier holds special responsibilities different from the others.

191
Q

Generally, the lower tiers, which are the ones closest to the IoT devices, are ?

A

the ones responsible for the latency-sensitive data,
and as you go up the hierarchy, the responsibility is directed more toward bigger, memory-consuming, and latency-insensitive data.

192
Q

The three tiers are as follows:

A

a-monitoring and control. This is the closest tier to the IoT devices. Its main function is to react upon generated data from the sensors and change the state of the device based on that received data. It has very low storage capability and geographically covers a very local area, but it offers the fastest servicing among all tiers. Several terminal nodes read different physical parameters and act upon them in real time. They can sense problems and command actuators to respond effectively to these problems. Moreover, each terminal node can share its absolute geographical location so that they can support location-based services.

b-operational support. It is composed of nodes that are usually called aggregation nodes. Their primary function is to aggregate the streamed data from the tier below them for data analytics, filtering, compression, transformation, and responsive actions in near real time. Each aggregation node collects its data from one or more lower-level fog nodes, depending on the application. They have more storage power than the lower-level fogs and cover a larger area, but their latency is therefore higher. Devices that comprise this tier are usually smart intermediate devices with some storage, computation, routing, and packet forwarding abilities, such as routers and switches.

c-business support. It is the tier closest to the cloud service or even the cloud core itself. Its main function is to turn aggregated data into useful knowledge to provide enterprise level services for businesses, as it has got the highest storage and analytical abilities. This tier is the centralized tier to which all the fog nodes of all the tiers below are connected and to which they transmit their data. It is composed of many high-end servers and data centers capable of fulfilling its duties. Nevertheless, its designated nature implicates the highest latency in the whole hierarchy. For that reason, data is transmitted there only when necessary which characterizes the efficiency of fog computing in terms of resource allocation and packet forwarding. The following table summarizes the different features of the three tiers.

193
Q

Fog computing tiers

A

see the table

194
Q

The hierarchy is designed to be ?

A

scalable according to the business needs, in terms of storage, network connectivity, and analytical services.

195
Q

A given business model does not necessarily need to implement a three-tier architecture. In other words?

A

the three main functions fulfilled by the three main tiers do not necessarily need to be implemented in separate devices.

Some use cases may require all three of them to be done in the cloud.

Other use cases may require only the monitoring and control tier to be implemented in the fog and the other two tiers in the cloud, and so on.

196
Q

The architecture is designed to be?

A

totally flexible in terms of which functions should be performed by, or deployed on, which devices.

197
Q

The following figure shows four different scenarios that require four different deployments of the hierarchy.

A
198
Q

The three tiers of the stack must be deployed on fog nodes?

A

The first scenario is entirely cloud-independent.
Such a use case is assumed to be extremely latency-sensitive.

199
Q

In this context, incorporating the cloud is without a doubt irrational. Examples for such a scenario are:

A

health care systems, ATM banking systems, and armed forces combat systems.

200
Q

Such applications need to be designed as deadline-critical systems.

A

Apparently, in all three examples we are dealing with humans’ lives.

Another possible reason for using this scenario is the unavailability of the cloud within a particular geographical location, which would make it impossible to involve the cloud.

201
Q

The second and third scenarios are hybrids of both?

A

fog nodes and the cloud.

202
Q

The second and third scenarios are more common in ?

A

the IoT domain.

203
Q

The second scenario exploits —————- in the first and second tier, while the third scenario uses them only in the—————. This implies that the second scenario is suitable for the more ——————- use case as compared to the third scenario.

A

fog nodes
first tier

latency-sensitive

204
Q

The second scenario supports several use cases, including :

A

commercial building management, commercial solar panel monitoring,
and retail,

205
Q

whereas the third scenario supports use cases such as?

A

commercial uninterruptible power supply (UPS) device monitoring,

mobile network acceleration,

and content delivery networks (CDNs) for Internet acceleration.

206
Q

The fourth scenario, on the contrary, is ?

A

totally fog-independent,

where it might not be feasible or economical to use the fog in such use cases.

207
Q

Examples of such cases include ?

A

agriculture,
connected cars,
and remote weather stations.

208
Q

It is worth mentioning that while those three tiers form the basis of the fog computing architecture, businesses can?

A

add more layers to the hierarchy if they sense the need for extra intelligence in their system.

209
Q

businesses can add more layers to the hierarchy if they sense the need for extra intelligence in their system?

A

-The more layers they add, the deeper the data mining and analysis and, thus, more intelligence.

210
Q

Moreover, fog nodes are built with an intelligence that sometimes, if a fog node is busy with processing data, could?

A

redirect the newly received data to other fog nodes.

211
Q

The other fog nodes can be?

A

in the same tier or even in a higher tier.

212
Q

Each fog node is equipped with this intelligence and insight to determine?

A

whether to redirect data to another fog node or to the cloud in the higher tiers.

213
Q

In the basic mode, the terminal nodes are deployed on?

A

the sensors embedded in IoT devices, where they can sense and share their geographical location.

214
Q

The localized terminal nodes are ?

A

-grouped together to form a location-based logical virtual cluster (VC) that is seen as one unit by the tier above.

-Each VC gets connected to its geographically nearest fog instance (FI), and through edge gateways, data transmission is possible between both tiers.

215
Q

The second tier in the hierarchy is ?

A

composed of fog-aggregation nodes that can be deployed on networking devices that bear some computing, analytical, and storage feature, e.g., routers and switches.

216
Q

Each device embodying a fog node is referred to as an ?

A

FI. Each FI can analyze, process, and store some amount of data, depending on its designated function within the hierarchy.

217
Q

Through fog gateways, FIs become able to transfer?

A

data to the next and final tier, the cloud tier.

218
Q

Each fog gateway can be connected to one or more cloud gateway which are?

A

additionally connected to the mesh of cloud data centers (DCs).

219
Q

These DCs are designed to handle?

A

huge data in terms of processing power and permanent storage with their superb computational, analytical, and storage capabilities.

220
Q

Alternatively, the SDN-based architecture is designed to ensure?

A

the system flexibility .

221
Q

This is a kind of networking whose basic concept is to?

A

adapt a control plane within the network that separates control functions from data-forwarding functions.

222
Q

This is a kind of networking whose basic concept is to adapt a control plane within the network that separates control functions from data-forwarding functions. This separation helps:

A

both facilitate packet forwarding within the network (i.e., making it more efficient, flexible, and scalable) and provide better quality of service (QoS) management for enterprises.

223
Q

An SDN is typically composed of a data plane, in which switches forward the data packets, and the control plane which carries?

A

the network controller and management operator to control how the devices in the data plane operate.

224
Q

Through an application programming interface (API) that the controller provides, the control panel is?

A

programmed to function in a desired way affecting the whole network.

225
Q

The SDN-based architecture is depicted below. The core idea is?

A

to exploit the massive number of cellular base stations (BSs) deployed in the mobile network on a global level.

226
Q

These BSs could be utilized in?

A

an IoT network to form the means for implementing a more flexible fog computing architecture.

227
Q

Each BS could be directly connected to?

A

a fog node that aggregates data from local devices, processes some of it, and sends the rest through an SDN-cellular core to the cloud.

228
Q

Each BS group of a particular location could be connected to ?

A

an edge device in the network core.

229
Q

This edge device can also be connected to?

A

a fog node to aggregate data from the localized base stations that are connect to it.

230
Q

The SDN-based architecture adopts ?

A

OpenFlow switches in the network, and an OpenFlow controller operates all the base stations and switches via the OpenFlow Protocol—an SDN protocol developed by the open networking foundation (ONF) in 2011.

231
Q

The OpenFlow controller manages ?

A

the forwarding plane of the base stations and the switches while monitoring the network traffic.

232
Q

The controller can be reprogrammed through an API by businesses to ?

A

add or remove features to or from the network, thus providing flexibility of functioning.

233
Q

Before delving into the various platforms, it is necessary to define some factors for properly selecting the most suitable hardware platform for the targeted IoT application. Such factors include:

A

the processor speed,
memory requirement,
networking facilities,
and power consumption.

234
Q

The processor speed indicates?

A

how fast it can process the captured sensor readings.

235
Q

Naturally, a faster processor speed means?

A

that it can execute instructions more quickly.

236
Q

The clock speed is still the ————————————for raw computing power, but it is —————the only one. A comparison among various ——————————-can be done using the millions of —————-per second (MIPS) metric.

A

simplest proxy
not

platforms

instructions

237
Q

Some processors may?

A

lack hardware support for floating-point calculations.

238
Q

If the code involves a lot of complicated mathematics, a by-the-numbers slower processor with hardware floating-point support could be?

A

faster than a slightly higher performance processor without it.

239
Q

Generally, the processor speed is used as ?

A

one of a number of factors when comparing similar systems.

240
Q

Microcontrollers tend to be clocked at speeds in the tens of MHz, whereas system on chip (SoC) runs

A

at hundreds of MHz or possibly low GHz.

241
Q

If the IoT application does not require heavyweight processing—for example, if it needs only networking and basic sensing—then ?

A

some sort of microcontroller will be fast enough.

242
Q

If the device will be crunching lots of data—for example?

A

processing video in real time—then SoC platforms are recommended.

243
Q

Aside from the processor speed, the memory footprint is?

A

another important factor for selecting the most suitable IoT platform.

244
Q

In this context, random access memory (RAM) provides ?

A

the working memory for the system.

245
Q

If an IoT platform has more RAM, the device may be able to perform more?

A

processing or have more flexibility over your choice of coding algorithm.

246
Q

It is difficult to give exact guidelines to the amount of RAM that may be required by ?

A

the IoT platform, as it will vary from one application to another.

However, microcontrollers with less than 1 KB of RAM are unlikely to be of interest,

and if you want to run standard encryption protocols, system designers will need at least 4 KB, preferably more.

247
Q

For SoC boards, particularly if the system designers plan to run Linux as the operating system, at least ——————— is recommended.

A

256 MB

248
Q

The IoT platforms are also expected to?

A

be connected to the Internet.

249
Q

Wired Ethernet is?

A

often the simplest technique—generally plug and play—and cheapest, but it requires a physical cable.

250
Q

Wireless solutions obviously avoid that requirement but?

A

introduce a more complicated configuration.

251
Q

Wi-Fi is the most widely deployed solution to provide an existing infrastructure for connections, but ?

A

it can be more expensive and less optimized for power consumption than some of its competitors.

252
Q

Other short-range wireless options can offer better power-consumption profiles or?

A

costs than Wi-Fi, but usually with the trade-off of lower bandwidth.

253
Q

ZigBee is?

A

one such alternative technology, aimed particularly at sensor networks and scenarios such as home automation.

254
Q

The recent Bluetooth LE protocol (also known as Bluetooth 4.0) has?

A

a very low power-consumption profile similar to ZigBee’s and could see more rapid adoption due to its insertion into standard Bluetooth chips included in phones and laptops.

255
Q

There is an existing Bluetooth standard as another possible choice?

A

For remote or outdoor deployment,
little beats use the mobile phone networks.
For higher data rates,
data connections, such as 3G, and LTE communication networks can be used.

256
Q

In terms of energy consumption, faster processors are?

A

typically more power hungry than slower ones.

257
Q

For the IoT devices which might be portable or rely on an unconventional power supply (e.g., batteries, solar power), power consumption could be?

A

an issue.

258
Q

For the IoT devices which might be portable or rely on an unconventional power supply (e.g., batteries, solar power), power consumption could be an issue. Even with access to main electricity, it may be necessary to consider ?

A

because lower consumption may be a desirable feature. Nevertheless, processors might have a minimal power-consumption sleep mode.

259
Q

power-consumption sleep mode can enable the system designers to use?

A

a faster processor to quickly execute tasks and then return to the low-power sleep mode.

260
Q

Accordingly, the utilization of powerful processors may not be?

A

a disadvantage even in a low-power embedded device.

261
Q

In general, IoT hardware can be classified into two broad categories:

Now, we discuss some of the most popular platforms and boards that can be used by IoT developers for initial prototyping, creating smart objects, and developing projects and products.

A

(1) wearable devices and gadgets and

(2) embedded systems and boards, as depicted below.

In the former category, many preassembled standard hardware applications, ranging from smart shoes to glasses, are available.

262
Q

The scope of IoT development in this category is limited to ———————. On the other hand, both the hardware and software aspects are open for system ————————-under the ———————systems and boards category.

A

software

designers

embedded

263
Q

ESP8266 is?

A

a popular Wi-Fi solution for connecting an edge to the Internet. It has two primary versions with different capabilities.

264
Q

The first version is?

A

the generic ESP8266 module which can be easily interfaced with various microcontrollers.
It has 1 MB of flash memory, works on the 802.11 b/g/n protocol, and supports Wi-Fi Direct (P2P) and soft-access point.

265
Q

It comes with an integrated transmission-control protocol/Internet protocol stack and a self-calibrated RF antenna which allows it to?

A

operate under almost all conditions.

266
Q

The second module is?

A

=the SparkFun Blynk Board which is an ESP8266-based board with nine general-purpose input/output (GPIO) pins supporting serial-peripheral interface (SPI) and inter-IC (I2C) communication protocols.

=It has an onboard lithium-polymer (Li-Po) battery connector and charging port.

=It also comes with onboard Future Technology Devices International for reprogramming, red-green-blue light-emitting diode (RGB LED), analog-to-digital converter (ADC), and temperature and humidity sensor.

= It can automatically connect to Blynk Cloud and can be controlled with the Blynk app which is available for both the iOS and Android operating systems.

267
Q

The second module Despite being relatively costly, this module has been heavily used for?

A

home automation applications.

268
Q

Arduino boards are?

A

another popular type of IoT platform capable of performing tasks from blinking an LED to publishing material online to handling heavy networking tasks.

269
Q

In general, Arduino has a broad range of boards, from simple—————————–boards to products for ———————-, three-dimensional (3D) printing, and much more. For supporting IoT applications, the Arduino —-is supported with onboard Wi-Fi (IEEE 802.11 b/g/n) and Ethernet (IEEE 802.3 10/100Mb/s).

A

8-b microcontroller
wearables

Yun

270
Q

It has an ATmega32u4 with a clock speed of 16 Mhz and an Atheros AR9331 (MIPS @ 400 MHz) which backs a Linux distribution called OpenWrt-Yun. It also includes a Li-Po charging circuit and comes with Cryptochip for secure communication. Thanks to these features, these modules have been used in several IoT applications, such as?

A

computationally complex applications and algorithms,

high-speed communications,
telemetry hubs that gather data wirelessly from sensor nodes,

and many other IoT-based applications.

271
Q

Raspberry Pi mainly has two different generations.

A

The first generation,
referred to as “Raspberry Pi 2,” comes with a single-board computer that has a quad-core, a graphics processing unit, 1 GB of RAM, 40 GPIO pins, 4 USB 2.0 ports, 1 Ethernet port, 1 HDMI connector, and 1 micro-SD card slot.

Alternatively, the second generation,
called Raspberry Pi 3, is ten times faster than Raspberry Pi 2. It is powered with a 1.2-GHz 64-b quad-core ARM CPU and has integrated 802.11n wireless LAN and Bluetooth 4.1. With the addition of onboard wireless LAN and Bluetooth capability, it will be even more useful for developing IoT applications.

272
Q

Raspberry Pi can run many operating systems, including:

A

Raspbian Linux,
Ubuntu Mate,
and Windows 10 IoT Core.

273
Q

It also provides full support for such programming languages as ?

A

C/C++, Python, and JavaScript.

274
Q

Raspberry Pi boards for IoT projects are ?

A

an excellent choice.

However, additional hardware is required for interfacing with analog inputs such as potentiometers, photocells, and joysticks, as ADC is not available onboard.

Moreover, the board consumes slightly more power compared to earlier versions and gets a bit warmer when used in the overclocking mode for a longer time.

275
Q

Developers using Raspberry Pi have come up with many intriguing IoT projects, such as?

A

Rebroadcast Internet Radio and an Internet weather station.

276
Q

The manufacturer comes with? Once cloudBit is connected to Wi-Fi, it starts sending data from other littleBits modules to the cloud without a need for programming. Moreover, it is supported by many APIs. The ease with which every module can be magnetically attached to others makes it very popular among IoT developers.

A

almost 60 interchangeable modules that are attached to each other magnetically in billions of possible combinations.

277
Q

The manufacturer comes with?

A

almost 60 interchangeable modules that are attached to each other magnetically in billions of possible combinations.

278
Q

The cloudBit is one of?

A

the 60 bits or modules. It comes with a Linux-based system on a Freescale ARM processor with 64 MB of RAM. It makes use of an 802.11 b/g/n USB adapter for networking.

279
Q

Once cloudBit is connected to Wi-Fi, it starts?

A

sending data from other littleBits modules to the cloud without a need for programming.

Moreover, it is supported by many APIs.

280
Q

The ease with which every module can be magnetically attached to others makes it ?

A

very popular among IoT developers.

281
Q

The main components of a typical IoT system architecture are:

A

sensors, data communication, internet and routing protocols, cloud and fog computing, IoT security.

282
Q

Developing an IoT application requires a very multidisciplinary know-how ranging from sensor technologies to machine learning?

A

Because the main components of a typical IoT system architecture are: sensors, data communication, internet and routing protocols, cloud and fog computing, IoT security.

283
Q

Sensors denote any device which can?

A

generate data by sensing the world.

284
Q

Depending on the application, the generated amount can be?

A

huge or small.

285
Q

novel energy supply methods such as energy harvesting should be adopted.

A

To be affordable, sensors need to be low-size and low-costs. Moreover, they need power to operate.

286
Q

The data communication refers to ?

A

the moving of generated data, usually from sensor nodes, to dislocated cloud services and data centers.

287
Q

There is an heterogeneous technology base to?

A

perform data communication.

288
Q

The adoption of the right one yields?

A

a better data quality and performance of the overall IoT system.

289
Q

The adoption of the right one yields?

A

a better data quality and performance of the overall IoT system.

289
Q

The adoption of the right one yields?

A

a better data quality and performance of the overall IoT system.

290
Q

Internet and routing protocols target the bridging of data from sensors to the Internet through?

A

gateway routers and devices supporting IP-based protocols.

291
Q

IoT data need efficient low-latency protocols that can be?

A

steered and secured in and out of the could.

292
Q

Cloud and fog computing deal with ?

A

processing the collected data.

293
Q

Here a tradeoff between two approaches is to be found based on?

A

the application scenario and the available computing resources.

294
Q

On the one hand, all data can be?

A

moved to the cloud for further processing.

On the other hand, the data can be processed at the edge (edge computing)

or extending cloud services downward into an edge router (fog computing).

295
Q

In many applications a local processing can be?

A

meaningful to easily and fast detect some patterns in the data.

296
Q

In many applications a local processing can be?

A

meaningful to easily and fast detect some patterns in the data.

297
Q

Security is ?

A

the last important component of an IoT system architecture.

298
Q

Technologies such as blockchain and software-defined perimeters can enhance?

A

the robustness of the IoT application against attacks.