IoT – Internet of Things
While the Internet connects people, the IoT connects everything to everything.
IoT stands for Internet of Things, but perhaps it would be more correct to define it as Internet of Objects. In fact, there are intelligent objects (so-called“smart objects“) at the base of the Internet of Things. And we are not just talking about computers, smartphones and tablets, but above all the objects that surround us in our homes, at work, in the cities, in our daily lives. The Internet of Things was born right here: from the idea of bringing the objects of our daily experience into the digital world.
Today, it is estimated that there are more than 10 billion IoT devices connected to the Internet, and that this number is expected to double every two years.
The IoT has evolved with the advent and convergence of various technologies, real-time analytics, machine learning, asset sensors, and embedded systems. The traditional fields of embedded systems, wireless sensor networks, control systems, home and building automation, and others contribute to the growth of IoT.
In the consumer market, IoT technology is associated with the concept of the “smart home,” including devices and appliances (such as light fixtures, thermostats, home security systems and cameras, and other home appliances) that can be controlled via devices such as smartphones.
IoT-connected smart devices are vulnerable to cyber threats. And to minimize these security breaches, it is important to use the right protocols.
IoT communication protocols are modes of communication that ensure optimal security of the data being exchanged between IoT-connected devices.
We can connect IoT devices via an IP network or a non-IP network, with implications for range, power, and memory usage.
Connections over IP networks are complex and consume more memory and power from IoT devices, although range is not an issue. Non-IP networks like Bluetooth require less memory and power, but have a range limitation.
For interaction between devices, a medium is required; preferably a common language that all devices in a given IoT ecosystem are able to understand. IoT protocols provide just such a means.
IoT network protocols are designed to connect medium to high-power devices over the network. IoT network protocols enable data communication within the scope of the network. HTTP,
LoRaWAN
bluetooth, zigbee are some of the popular IoT networking protocols.
IoT data protocols are designed to connect low-power IoT devices. Without any connection to the Internet, they are able to provide end-to-end communication with hardware, even though connectivity in IoT data protocols can be done over a wired or cellular network. MQTT, CoAP, AMQP, XMPP are some of the popular IoT data protocols.
MQTT
is a lightweight messaging protocol for sending simple data streams from sensors to applications and middleware. It works on top of the TCP/IP network to provide reliable but simple data streams. It can work with any network that provides orderly, lossless, bidirectional connections. The MQTT protocol comprises 3 key elements: subscriber, publisher and a broker.
It is the best choice for wireless networks that face occasional bandwidth restrictions or unreliable connections. Facebook has used MQTT in Facebook Messenger for online chatting.
This lightweight and robust protocol is the ideal and currently most popular solution for equipment connectivity and sensor applications in the Internet of Things.
Connected devices, expanding networks, vast amounts of data, in short, this is the Internet of Things. From smart cities and smart cars to smart stethoscopes and dog collars, the world is becoming more interconnected every day.
“What the Internet of Things is really about is information technology that can gather its own information,” said British technology pioneer Kevin Ashton a few years ago. “Often, what it does with that information is not say something to a human being, it just does something.”
The IoT has evolved with the advent and convergence of various technologies, real-time analytics, machine learning, asset sensors, and embedded systems. The traditional fields of embedded systems, wireless sensor networks, control systems, home and building automation, and others contribute to the growth of IoT.
Among the numerous applications of IoT technology, we can mention:
The term Internet of Things appeared in 1999. But the idea of connected devices had been around longer, at least since the 1970s. At that time, the idea was often called “embedded internet”. The term “Internet of Things” was coined by Kevin Ashton in 1999 during his work at Procter & Gamble. Ashton, who worked in supply chain optimization, wanted to draw senior management’s attention to an interesting new technology called RFID. Because the Internet was the hottest trend in 1999 and because it somehow made sense, he called his presentation the “Internet of Things”.
Although Kevin sparked the interest of some P&G executives, the term Internet of Things did not receive much attention in the next 10 years.
The concept of IoT began to gain some popularity in the summer of 2010. Information leaked out that Google’s StreetView service not only took 360-degree photos, but also stored tons of data from people’s Wifi networks. People were debating whether this was the beginning of a new Google strategy to not only index the internet, but also index the physical world.
In the same year, the Chinese government announced that it would make the Internet of Things a strategic priority in its Five-Year Plan.
In 2011, Gartner, the market research firm that invented the famous “hype-cycle for emerging technologies” included a new emerging phenomenon in its list: “The Internet of Things”.
The following year, the theme of Europe’s largest Internet conference, LeWeb, was the “Internet of Things. At the same time, popular technology-focused magazines such as Forbes, Fast Company, and Wired have started using IoT as their vocabulary to describe the phenomenon.
In October 2013, IDC published a report stating that the Internet of Things would be an $8.9 trillion market by 2020.
The term Internet of Things hit the mass market consciousness when, in January 2014, Google announced the purchase of Nest for $3.2 billion. At the same time, the Consumer Electronics Show (CES) in Las Vegas was held under the theme IoT.
IoT-connected smart devices are vulnerable to cyber threats. And to minimize these security breaches, it is important to use the right protocols.
LoRa is a wireless technology, just like Wi-Fi, LTE, NB-IoT, and others. Its potential is infinite and it was created for its application in IoT.
LoRa is derived fromLong Rangewireless communication.
Among many of its advantages is the wide coverage range and low power consumption it provides.
It is the perfect choice for solutions that require low data bandwidth and long-lasting standalone operation.
Subscribe to our Newsletter
Você precisa fazer login para comentar.