tag:blogger.com,1999:blog-59173834522520645822024-02-19T14:44:14.273-08:00Lightning IOTA digital magazine covering all things about the Internet of Things(IoT)Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comBlogger17125tag:blogger.com,1999:blog-5917383452252064582.post-81727166353763325492022-09-15T02:44:00.004-07:002022-09-15T02:50:09.893-07:00How Will 5G Impact IoT And Edge Computing?<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/09/how-will-5g-impact-iot-and-edge.html"},"headline":"How Will 5G Impact IoT And Edge Computing?","description":"By offering a secure, dependable, low-latency, high-speed network, 5G technology has a significant potential to digitally change companies in the industrial, healthcare, retail, smart cities, railroads, transportation, ports, mining, and energy sectors.","image":["https://blogger.googleusercontent.com/img/a/AVvXsEha1sVFp3xtcgCgTCVNe4MyVQRao1pcDWUdOGMDcAbeGyWD3C7K4lv7oL5ZToLOYY0hShUXEcGODPqklCD-jF1f07LU1jXdWo3xbNI1NnbgRSqIhOkyu3XC9AmArzABT45UObnrVo1Z2jkm0wODgRV_iQhWrQ7Tm1_XWEmVQj8DNanYnDJnl10XPgHl=w400-h229","https://blogger.googleusercontent.com/img/a/AVvXsEjfZN-tj3SuE5Lh3VdbgKf_uLFUT3K6EqjEYZRVbCl1hGouZGCDUhgP_Y6FX8FIE0Zns5_gndoRYtp4UXUus-ne9CX40YOUPoWM7rWP6FbuRk30TU7k6jtxCSticlpqZxkedctx5fg0lnSGL1jLd_-yG4_ZPA5cEkHMXtF99Gu65ysdb5HJMRtsIk1G=w337-h400","https://blogger.googleusercontent.com/img/a/AVvXsEgtAIa-hq1tYrjSawFmTN3j5rM9CMhrYz3qs9V2zdPj1NG780BRTApac9AagwK9_xkl4XZkR80PgtVJ4C9kEaBbO5j9L7ddDeidTDZftTIVcSB7obHXx2IKIHz_uKTaepbZr9loZCDjEW9wMfAwdybxuPAFM_EWn-ukANKFtscvcLmQc_V_nmKq-9VT","https://blogger.googleusercontent.com/img/a/AVvXsEiX_cEgia2bz7JdYGnkSX933n_CbbaFQLmvRp2KNJgPdKaoMjw7B2zdRjNXFdHbMPL-7DeVHEDEgnEtF7PdEHZhV9ZEkdTGvBzEYeATwMWKPNqfsqnR_jmO7qrEp2YTUR9XO6m6A6idAK2jn8vnjKHRYM6Y7lwwKswqyxu8DxapuqvDu5yzh_TjWqdl=w400-h217","https://blogger.googleusercontent.com/img/a/AVvXsEhs6t1MDsS5GKD40La_cU0fvUnhqi2UBE37kfY2329bpA3BfKoRa8jyTQm8ZJu9IBYJNeBxNTp8BXuT6dJ8Pci5_9lRQCSCq-Y4KANoj-OTbmbYN3xU16cJaJz34UKBgEr_LV8cLWnm0L-JtL_CmbgEX53AEo3u2vseifPT610DPGrpJ9HaDglkPgZQ","https://blogger.googleusercontent.com/img/a/AVvXsEiHyD7YoClRNTt4GrwnJaG6u4tnlQKw6ujjdmsvL4rBw8p4wincfHfPPKSbISlxWM1rWiSzehLRPPc-paXCZgn1pGNgO_Bkbccb41mLD02J9GXQXJf8GzQjPzdpp65tpFSA6b-bNy6ZuogQbRbOQZP4scxMENyJMNBrakYoZnMogpoqlblPGWcknQnD","https://blogger.googleusercontent.com/img/a/AVvXsEi75_4ahZdVEqdbyTzuwodVd3DlEcT1hRNw2WRBY38QnuC7efjEN2YXiBh4uHO1bxH9rudIIkJsF2F2tQSseTTlli88eLB9a6bElFVBSUia6YEYf5hwjW5gM8hp0_IGrr_esYPLr8huWagP3YLYL_cVP-ic61Iz0IiCANJaE1h4Ibej3gc--Y0CjImV=w400-h352","https://blogger.googleusercontent.com/img/a/AVvXsEjG9ePwpCCmMaSDIgno3-OOP6Mug4Ag9CkNY01N_piM-53fCT2oEDGBvtUZEQZxVs32oLRBMmNGGz8f4CRlzNtsYnN9wIumGBSIRa2YJTvGUVHm9KFVvrlvzoXr-C_yX_ozNM5Fyjgfv0OHhCKOQUmW-BW9mXv-snA30uPFWTlztO43irweevYYwCp-=w387-h400","https://blogger.googleusercontent.com/img/a/AVvXsEjEJFGDC-AIsTBMY0bsV1HeQH0VlWDGNkP5MX0GZ4t-Gm5wDV1leZ6zRyF1xzFuxHcWioIVnIXmGxMJEfrE81EYQorgUmLOOv3WVVf18raDXex4bXlE89q5OAd5iFYLCdDthuFBlvaPRm8ApP6MjjEx6cy18EnXm6av1j59rsfIRAvDLgFNY0X_LaYC=w400-h246","https://blogger.googleusercontent.com/img/a/AVvXsEgVtmT-h9AHl1uzkfcRhKzTHn1aUyNZ1Ze39OWfsZ9to2j7tWaAjTW4mW4V7eahY47Z7jTxVPsNlURfCPzkmlbQuS6ZrZf8kfUy6yGifH4y3G3AV4Cou6Ga-cqQMpOk79NDqkrTYJJItqIDoSBsIxwHC-CQKboGFHT1GBF70phIHr6B4Zzmyb1rp2cJ=w400-h139","https://blogger.googleusercontent.com/img/a/AVvXsEjUW2NZevG-nInS_Rx4z0r196SvFx1uKev7i3tIfwL8sLP_9qzBzAoT8RWyTlTzWfUtu1tJPJ7HWYALi9budjcoovc644Npa306y1ioLaisqpdKrUw12gVkSfPSNPIWgphCBqOmND7szYkxhV1Oojh1sE-N7xu1snblX-9eiSGWunwTcuASG-7iOoSx=w375-h400","https://blogger.googleusercontent.com/img/a/AVvXsEjagDsnNVu8RRYMvGVKwPlmw8z0LePwURTs2y3gGg3Ir_8tlRxhu5v14G40OP6YJP7qAc4qryWjw4o7ROGK0B2KMSZadBdcuwQlPo4fmpcRlBGP9RcIRzYj7V7JjCoNKUVIZ9w_eUb1puJi4I9Pua_k0rKjD7ynrngaX5zz0OOjUcLb0hej2P2JXb2K=w400-h175","https://blogger.googleusercontent.com/img/a/AVvXsEg8iIpiijGG2R1dcg8GVpgt0Chp3K7aVQntxieY_N-K1JICy6fVmy4Z26ETwvu_qk-tBoYMglzKMxlemz_NKijgkXasIRgFLdmQCH4yBH63fb9ONPFnke3HdLYPO96yynBqiNPCoSyvOihHdMae6iwY088Eq7w4pixSTk39UaSTBwMtMpaliVAxVHyT=w400-h225","https://blogger.googleusercontent.com/img/a/AVvXsEiqLxa1Gdkzmti_ue_bT_tVf0ExX2XDqmPJef7wy1mEjvKHRmqzkMDBn_7lAO_Hhz3ZhQdVkri8bAuYbzCOyW3kO7W7CxkZgIkefE6y5gnlLZD8nWE6MYBNG6u8KvIzv7cRGa2GAGj3FcnNMh3maxnXcY_lPyWbgaaCxyr8_uA_uusAFzrSIn9n7qXr=w400-h311"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.linkedin.com/in/jaikrishnaponnappan/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":"2022-09-15","dateModified":"2022-09-15"}</script><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEha1sVFp3xtcgCgTCVNe4MyVQRao1pcDWUdOGMDcAbeGyWD3C7K4lv7oL5ZToLOYY0hShUXEcGODPqklCD-jF1f07LU1jXdWo3xbNI1NnbgRSqIhOkyu3XC9AmArzABT45UObnrVo1Z2jkm0wODgRV_iQhWrQ7Tm1_XWEmVQj8DNanYnDJnl10XPgHl" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="469" data-original-width="820" height="229" src="https://blogger.googleusercontent.com/img/a/AVvXsEha1sVFp3xtcgCgTCVNe4MyVQRao1pcDWUdOGMDcAbeGyWD3C7K4lv7oL5ZToLOYY0hShUXEcGODPqklCD-jF1f07LU1jXdWo3xbNI1NnbgRSqIhOkyu3XC9AmArzABT45UObnrVo1Z2jkm0wODgRV_iQhWrQ7Tm1_XWEmVQj8DNanYnDJnl10XPgHl=w400-h229" width="400" /></a></div><br /><br /></div><br /><br /><p></p><p><b>5G that is private compared to a public 5G network, with 5G New Radio allows quality-of-service-based priority access. </b></p><h3 style="text-align: left;"><span style="color: red;">By offering a secure, dependable, low-latency, high-speed network, this has a significant potential to digitally change companies in the industrial, healthcare, retail, smart cities, railroads, transportation, ports, mining, and energy sectors.</span></h3><p>The term "private 5G" refers to a dedicated, independent, private network that is installed and operated on a company's premises; alternatively, it may refer to a portion of the publicly deployed 5G that has been QOS enabled, or it can refer to a mix of on-premises and off-site networks.</p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjfZN-tj3SuE5Lh3VdbgKf_uLFUT3K6EqjEYZRVbCl1hGouZGCDUhgP_Y6FX8FIE0Zns5_gndoRYtp4UXUus-ne9CX40YOUPoWM7rWP6FbuRk30TU7k6jtxCSticlpqZxkedctx5fg0lnSGL1jLd_-yG4_ZPA5cEkHMXtF99Gu65ysdb5HJMRtsIk1G" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="851" data-original-width="717" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEjfZN-tj3SuE5Lh3VdbgKf_uLFUT3K6EqjEYZRVbCl1hGouZGCDUhgP_Y6FX8FIE0Zns5_gndoRYtp4UXUus-ne9CX40YOUPoWM7rWP6FbuRk30TU7k6jtxCSticlpqZxkedctx5fg0lnSGL1jLd_-yG4_ZPA5cEkHMXtF99Gu65ysdb5HJMRtsIk1G=w337-h400" width="337" /></a></div><br /><br /><p></p><h3 style="text-align: left;">The 5G spectrum utilized might be licensed, lightly licensed, or unlicensed depending on the use case. </h3><p>Private spectrums like Citizens Broadband Radio Service enable businesses to create their own private 5G networks for privately installed 5G networks in the U.S.</p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgtAIa-hq1tYrjSawFmTN3j5rM9CMhrYz3qs9V2zdPj1NG780BRTApac9AagwK9_xkl4XZkR80PgtVJ4C9kEaBbO5j9L7ddDeidTDZftTIVcSB7obHXx2IKIHz_uKTaepbZr9loZCDjEW9wMfAwdybxuPAFM_EWn-ukANKFtscvcLmQc_V_nmKq-9VT" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="766" data-original-width="462" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEgtAIa-hq1tYrjSawFmTN3j5rM9CMhrYz3qs9V2zdPj1NG780BRTApac9AagwK9_xkl4XZkR80PgtVJ4C9kEaBbO5j9L7ddDeidTDZftTIVcSB7obHXx2IKIHz_uKTaepbZr9loZCDjEW9wMfAwdybxuPAFM_EWn-ukANKFtscvcLmQc_V_nmKq-9VT" width="145" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><span style="color: red;">Wi-Fi is unlikely to be replaced by private 5G. </span></h3><p><b>Private 5G, on the other hand, may allow real-time deterministic use cases that weren't previously feasible owing to a lack of dependability, determinism, low latency, and high speed — particularly for IoT and edge computing use cases.</b></p><p><br /></p><h2 style="text-align: left;"><span style="color: red;">Key Factors Providing 5G Technology with Momentum. </span></h2><div><b><br /></b></div><div style="text-align: center;"><b><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiX_cEgia2bz7JdYGnkSX933n_CbbaFQLmvRp2KNJgPdKaoMjw7B2zdRjNXFdHbMPL-7DeVHEDEgnEtF7PdEHZhV9ZEkdTGvBzEYeATwMWKPNqfsqnR_jmO7qrEp2YTUR9XO6m6A6idAK2jn8vnjKHRYM6Y7lwwKswqyxu8DxapuqvDu5yzh_TjWqdl" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="463" data-original-width="850" height="217" src="https://blogger.googleusercontent.com/img/a/AVvXsEiX_cEgia2bz7JdYGnkSX933n_CbbaFQLmvRp2KNJgPdKaoMjw7B2zdRjNXFdHbMPL-7DeVHEDEgnEtF7PdEHZhV9ZEkdTGvBzEYeATwMWKPNqfsqnR_jmO7qrEp2YTUR9XO6m6A6idAK2jn8vnjKHRYM6Y7lwwKswqyxu8DxapuqvDu5yzh_TjWqdl=w400-h217" width="400" /></a></div><br /><br /></b></div><div><b><br /></b></div><ul style="text-align: left;"><li><b>A large number of use cases are made possible by 5G's improved mobile broadband, Ultra Reliable Low Latency Communications (URLLC), and huge Machine Type Communications characteristics.</b></li><li>Time-sensitive networking (TSN) provided by URLLC with 5G Release 16 provides dependable, low-latency IoT in industrial automation and sectors like healthcare and logistics. </li><li><b>Benefits are also offered by other aspects including service, policy orchestration, administration, and corporate integration.</b></li></ul><p></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhs6t1MDsS5GKD40La_cU0fvUnhqi2UBE37kfY2329bpA3BfKoRa8jyTQm8ZJu9IBYJNeBxNTp8BXuT6dJ8Pci5_9lRQCSCq-Y4KANoj-OTbmbYN3xU16cJaJz34UKBgEr_LV8cLWnm0L-JtL_CmbgEX53AEo3u2vseifPT610DPGrpJ9HaDglkPgZQ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="526" data-original-width="665" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEhs6t1MDsS5GKD40La_cU0fvUnhqi2UBE37kfY2329bpA3BfKoRa8jyTQm8ZJu9IBYJNeBxNTp8BXuT6dJ8Pci5_9lRQCSCq-Y4KANoj-OTbmbYN3xU16cJaJz34UKBgEr_LV8cLWnm0L-JtL_CmbgEX53AEo3u2vseifPT610DPGrpJ9HaDglkPgZQ" width="303" /></a></div><br /><br /><p></p><p><br /></p><h3 style="text-align: left;"><span style="color: red;">The simplicity of implementation, administration, and related costs become crucial criteria for any revolutionary technology to be broadly adopted. </span></h3><p>Here is where privately delivered, managed 5G can completely transform the game.</p><p></p><ul style="text-align: left;"><li>Due in large part to vendor products that assist in the planning, implementation, and management of private 5G networks on-premises, the difficulty of deploying a private 5G network for businesses has greatly lessened. </li><li>These companies provide SIM management, access points, 5G core, and system orchestration and management as a whole. </li></ul><p></p><p><b>Additionally, some companies provide managed private 5G services.</b></p><p></p><ul style="text-align: left;"><li>With privately installed 5G, the required hardware, software, licensing, and cabling may be significantly reduced as compared to business Wi-Fi installations, with the additional advantage of predictable performance with low latency, lower power-to-coverage ratio, and higher speed.</li></ul><p></p><p><br /></p><h2 style="text-align: left;"><b><span style="color: red;">There are several use cases that may be made possible by the IoT and edge computing working together over private 5G.</span></b></h2><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiHyD7YoClRNTt4GrwnJaG6u4tnlQKw6ujjdmsvL4rBw8p4wincfHfPPKSbISlxWM1rWiSzehLRPPc-paXCZgn1pGNgO_Bkbccb41mLD02J9GXQXJf8GzQjPzdpp65tpFSA6b-bNy6ZuogQbRbOQZP4scxMENyJMNBrakYoZnMogpoqlblPGWcknQnD" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="463" data-original-width="915" height="162" src="https://blogger.googleusercontent.com/img/a/AVvXsEiHyD7YoClRNTt4GrwnJaG6u4tnlQKw6ujjdmsvL4rBw8p4wincfHfPPKSbISlxWM1rWiSzehLRPPc-paXCZgn1pGNgO_Bkbccb41mLD02J9GXQXJf8GzQjPzdpp65tpFSA6b-bNy6ZuogQbRbOQZP4scxMENyJMNBrakYoZnMogpoqlblPGWcknQnD" width="320" /></a></div><br /><br /><p></p><h3 style="text-align: left;">Applications in Healthcare</h3><p><br /></p><p><b>A hospital that offers linked care via the internet of medical things might profit from private 5G as well.</b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi75_4ahZdVEqdbyTzuwodVd3DlEcT1hRNw2WRBY38QnuC7efjEN2YXiBh4uHO1bxH9rudIIkJsF2F2tQSseTTlli88eLB9a6bElFVBSUia6YEYf5hwjW5gM8hp0_IGrr_esYPLr8huWagP3YLYL_cVP-ic61Iz0IiCANJaE1h4Ibej3gc--Y0CjImV" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="1489" data-original-width="1694" height="352" src="https://blogger.googleusercontent.com/img/a/AVvXsEi75_4ahZdVEqdbyTzuwodVd3DlEcT1hRNw2WRBY38QnuC7efjEN2YXiBh4uHO1bxH9rudIIkJsF2F2tQSseTTlli88eLB9a6bElFVBSUia6YEYf5hwjW5gM8hp0_IGrr_esYPLr8huWagP3YLYL_cVP-ic61Iz0IiCANJaE1h4Ibej3gc--Y0CjImV=w400-h352" width="400" /></a></div><br /><br /><p></p><p>A private 5G network may enable remote patient monitoring, for instance, by allowing different health sensors to broadcast low-latency, high-frequency sensor streams to the team of physicians and nurses through an IoT platform.</p><p>Fast file transfers between medical equipment, such an MRI machine and a CT scanner, are another benefit of private 5G. </p><p><b>This is crucial in emergency cases when a patient's CT or MRI must be examined prior to taking any further action and where time is of the importance.</b></p><p><br /></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjG9ePwpCCmMaSDIgno3-OOP6Mug4Ag9CkNY01N_piM-53fCT2oEDGBvtUZEQZxVs32oLRBMmNGGz8f4CRlzNtsYnN9wIumGBSIRa2YJTvGUVHm9KFVvrlvzoXr-C_yX_ozNM5Fyjgfv0OHhCKOQUmW-BW9mXv-snA30uPFWTlztO43irweevYYwCp-" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="879" data-original-width="850" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEjG9ePwpCCmMaSDIgno3-OOP6Mug4Ag9CkNY01N_piM-53fCT2oEDGBvtUZEQZxVs32oLRBMmNGGz8f4CRlzNtsYnN9wIumGBSIRa2YJTvGUVHm9KFVvrlvzoXr-C_yX_ozNM5Fyjgfv0OHhCKOQUmW-BW9mXv-snA30uPFWTlztO43irweevYYwCp-=w387-h400" width="387" /></a></div><br /><br /><p></p><h3 style="text-align: left;">Industrial Applications in Manufacturing</h3><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjEJFGDC-AIsTBMY0bsV1HeQH0VlWDGNkP5MX0GZ4t-Gm5wDV1leZ6zRyF1xzFuxHcWioIVnIXmGxMJEfrE81EYQorgUmLOOv3WVVf18raDXex4bXlE89q5OAd5iFYLCdDthuFBlvaPRm8ApP6MjjEx6cy18EnXm6av1j59rsfIRAvDLgFNY0X_LaYC" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="631" data-original-width="1024" height="246" src="https://blogger.googleusercontent.com/img/a/AVvXsEjEJFGDC-AIsTBMY0bsV1HeQH0VlWDGNkP5MX0GZ4t-Gm5wDV1leZ6zRyF1xzFuxHcWioIVnIXmGxMJEfrE81EYQorgUmLOOv3WVVf18raDXex4bXlE89q5OAd5iFYLCdDthuFBlvaPRm8ApP6MjjEx6cy18EnXm6av1j59rsfIRAvDLgFNY0X_LaYC=w400-h246" width="400" /></a></div><br /><br /><p></p><p><b>Consider a manufacturing facility with cameras installed on the assembly line to look for mechanical flaws in the components being produced.</b></p><p>The edge computing infrastructure may directly operate the cameras and related AI/computer vision model that identifies flaws. </p><p>An edge cluster's benefit allows businesses to run more sophisticated, computationally costly models for precise fault identification or to add to the camera's real-time intelligence.</p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgVtmT-h9AHl1uzkfcRhKzTHn1aUyNZ1Ze39OWfsZ9to2j7tWaAjTW4mW4V7eahY47Z7jTxVPsNlURfCPzkmlbQuS6ZrZf8kfUy6yGifH4y3G3AV4Cou6Ga-cqQMpOk79NDqkrTYJJItqIDoSBsIxwHC-CQKboGFHT1GBF70phIHr6B4Zzmyb1rp2cJ" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="228" data-original-width="659" height="139" src="https://blogger.googleusercontent.com/img/a/AVvXsEgVtmT-h9AHl1uzkfcRhKzTHn1aUyNZ1Ze39OWfsZ9to2j7tWaAjTW4mW4V7eahY47Z7jTxVPsNlURfCPzkmlbQuS6ZrZf8kfUy6yGifH4y3G3AV4Cou6Ga-cqQMpOk79NDqkrTYJJItqIDoSBsIxwHC-CQKboGFHT1GBF70phIHr6B4Zzmyb1rp2cJ=w400-h139" width="400" /></a></div><br /><br /><p></p><p><b>A simpler AI model that performs early detection tasks may be used by the camera. </b></p><p>Then, a more complicated model may be performed by the AI model on the real-time video stream connected to an edge cluster to provide additional accuracy and insights. </p><p>When TSN is used in conjunction, real-time decisions to remove the flawed product may be conveyed to other parts of the manufacturing line, often through a synchronized robot.</p><p><b>Consider autonomous mobile robots with cameras for logistically detecting items in the same setting. </b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjUW2NZevG-nInS_Rx4z0r196SvFx1uKev7i3tIfwL8sLP_9qzBzAoT8RWyTlTzWfUtu1tJPJ7HWYALi9budjcoovc644Npa306y1ioLaisqpdKrUw12gVkSfPSNPIWgphCBqOmND7szYkxhV1Oojh1sE-N7xu1snblX-9eiSGWunwTcuASG-7iOoSx" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="587" data-original-width="551" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEjUW2NZevG-nInS_Rx4z0r196SvFx1uKev7i3tIfwL8sLP_9qzBzAoT8RWyTlTzWfUtu1tJPJ7HWYALi9budjcoovc644Npa306y1ioLaisqpdKrUw12gVkSfPSNPIWgphCBqOmND7szYkxhV1Oojh1sE-N7xu1snblX-9eiSGWunwTcuASG-7iOoSx=w375-h400" width="375" /></a></div><br /><br /><p></p><p>Mobile robots may perform navigation-related intelligence tasks while a real-time video feed is supplied to the edge computing infrastructure for cutting-edge AI models to identify different sorts of items and inventories.</p><p><br /></p><h3 style="text-align: left;"><span style="color: red;">5G's Problems to Solve</span></h3><p><br /></p><p>The promise of private 5G for corporate use cases including IoT and edge computing is not without issues that the market has to solve; a production-level system needs several touchpoints.</p><p>Service providers, system integrators, and IT teams are required for the planning, deployment, verification, and management of private 5G networks.</p><p><br /></p><h3 style="text-align: left;">Edge computing combines software and hardware. </h3><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjagDsnNVu8RRYMvGVKwPlmw8z0LePwURTs2y3gGg3Ir_8tlRxhu5v14G40OP6YJP7qAc4qryWjw4o7ROGK0B2KMSZadBdcuwQlPo4fmpcRlBGP9RcIRzYj7V7JjCoNKUVIZ9w_eUb1puJi4I9Pua_k0rKjD7ynrngaX5zz0OOjUcLb0hej2P2JXb2K" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="373" data-original-width="850" height="175" src="https://blogger.googleusercontent.com/img/a/AVvXsEjagDsnNVu8RRYMvGVKwPlmw8z0LePwURTs2y3gGg3Ir_8tlRxhu5v14G40OP6YJP7qAc4qryWjw4o7ROGK0B2KMSZadBdcuwQlPo4fmpcRlBGP9RcIRzYj7V7JjCoNKUVIZ9w_eUb1puJi4I9Pua_k0rKjD7ynrngaX5zz0OOjUcLb0hej2P2JXb2K=w400-h175" width="400" /></a></div><br /><p></p><p>Particularly for real-time, mission-critical systems, each of these components might fail, thus they must be maintained and updated essentially without any downtime. </p><p>Edge installations must be managed by administrators using containers or VM orchestration.</p><p>By offering a virtual edge computing platform for application developers, public cloud providers and managed open source suppliers are both tackling this market. </p><p><b>Developers may find it simpler now that public cloud companies are beginning to offer edge infrastructure that is ready to go and runs the same software as their public cloud.</b></p><p><br /></p><h2 style="text-align: left;"><span style="color: red;">The Trend/Direction of Private 5G and IoT</span></h2><p><br /></p><p><b>The industry has to create a thorough roadmap if private 5G, IoT, and edge are to succeed. </b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEg8iIpiijGG2R1dcg8GVpgt0Chp3K7aVQntxieY_N-K1JICy6fVmy4Z26ETwvu_qk-tBoYMglzKMxlemz_NKijgkXasIRgFLdmQCH4yBH63fb9ONPFnke3HdLYPO96yynBqiNPCoSyvOihHdMae6iwY088Eq7w4pixSTk39UaSTBwMtMpaliVAxVHyT" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="548" data-original-width="975" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEg8iIpiijGG2R1dcg8GVpgt0Chp3K7aVQntxieY_N-K1JICy6fVmy4Z26ETwvu_qk-tBoYMglzKMxlemz_NKijgkXasIRgFLdmQCH4yBH63fb9ONPFnke3HdLYPO96yynBqiNPCoSyvOihHdMae6iwY088Eq7w4pixSTk39UaSTBwMtMpaliVAxVHyT=w400-h225" width="400" /></a></div><br /><br /><p></p><p>Many of these solutions need constant upkeep and improvements.</p><p></p><ul style="text-align: left;"><li>In order to utilize private 5G and IoT efficiently, organizations interested in edge computing and IoT installations must cope with the large number of suppliers, integrators, and service providers they must work with.</li></ul><ul style="text-align: left;"><li>This is due to the fact that investigating and installing sensors, robotics, gateways, edge infrastructure, edge virtualization and orchestration frameworks, private 5G infrastructure, and SIM management needs the involvement of many suppliers and specialized knowledge. </li></ul><div style="text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiqLxa1Gdkzmti_ue_bT_tVf0ExX2XDqmPJef7wy1mEjvKHRmqzkMDBn_7lAO_Hhz3ZhQdVkri8bAuYbzCOyW3kO7W7CxkZgIkefE6y5gnlLZD8nWE6MYBNG6u8KvIzv7cRGa2GAGj3FcnNMh3maxnXcY_lPyWbgaaCxyr8_uA_uusAFzrSIn9n7qXr" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="665" data-original-width="857" height="311" src="https://blogger.googleusercontent.com/img/a/AVvXsEiqLxa1Gdkzmti_ue_bT_tVf0ExX2XDqmPJef7wy1mEjvKHRmqzkMDBn_7lAO_Hhz3ZhQdVkri8bAuYbzCOyW3kO7W7CxkZgIkefE6y5gnlLZD8nWE6MYBNG6u8KvIzv7cRGa2GAGj3FcnNMh3maxnXcY_lPyWbgaaCxyr8_uA_uusAFzrSIn9n7qXr=w400-h311" width="400" /></a></div><br /><br /></div><div><br /></div><p></p><p><b>For IoT and remote device management, businesses must also take edge computing software into account. </b></p><p></p><ul style="text-align: left;"><li>AI infrastructure may combine commercial off-the-shelf technologies with GPUs for AI acceleration, depending on the use case.</li></ul><ul style="text-align: left;"><li>Working with various suppliers is challenging, but it is made easier by having a system integrator who can serve as a single point of contact. </li></ul><ul style="text-align: left;"><li>To integrate, implement, and maintain the IoT solutions on private 5G, the system integrator must work on-site and collaborate closely with the 5G provider, IoT and edge computing software vendor, any infrastructure OEMs, and the organization's IT staff.</li></ul><ul style="text-align: left;"><li>Proofs of concept are easy to show and are a vital initial step, but it might take some time and money to develop a fully integrated production-grade system that satisfies the use cases specified in the service-level agreement. </li></ul><ul style="text-align: left;"><li>Additionally, the system has to be monitored and updated continually after it is online.</li></ul><p></p><p><br /></p><p><b>It's crucial for service providers, solution providers, and system integrators to remain focused on bringing one or two use cases to full production rather than becoming distracted by the hype or enormous potential that 5G may provide. </b></p><p>Enterprises can fully benefit from what private 5G and IoT have to offer if they have the proper service providers, technologies, and business use cases.</p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><br /></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-3568023375728200562022-09-15T01:58:00.006-07:002022-09-15T02:02:34.445-07:00How Will IoT Impact Virtual Realty And The Metaverse?<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/09/how-will-iot-impact-virtual-realty-and.html"},"headline":"How Will IoT Impact Virtual Realty And The Metaverse?","description":"When we include in the Metaverse and the surge in IoT use that will go along with it, we have a perfect storm of increasing complexity and growing threat vectors that may be exploited, which may result in breaches, business interruption, and significant expenditures.","image":["https://blogger.googleusercontent.com/img/a/AVvXsEgOAhl34mHnFEZ9htXmqEe18yp_QdJZ7ISka1ZjsaI-Z1yPcQRF0RUJrJ8EPT0nnKxHMAVM-J4He2xfO6Y2auCekvBxDVhlHFwGsnb54xN1k6eVxkUH9IxiUSPi1_hXHo_GHCDO4FOWI3lcdGWjOrGCueBLpyRaeCUMKBBbfa76l5GP-aiwVdTBqzv2=w400-h179","https://blogger.googleusercontent.com/img/a/AVvXsEiG3l1g2KVAkn9hHX_Je7fmJhe4wP2K3iDjawDtzReZHbdSdMDm7gFh1P6M1IrEmLckwL4z9YDhPDYVlRx1qyJ2XgYgk3UF0d2pEjg9iA8Mu-YuLCWLIwlZOA6H09bojlYFZhBKDjxGX09qWCaQO0x-hsWKF7_LAxQxhItVf3DqnkoevLRCY-00-tuH=w400-h191","https://blogger.googleusercontent.com/img/a/AVvXsEi65ohXM53fj_2HykqPcIZup4bpxkmqb1AmpZS-7USCX3U5vZ0fViThQwRfuUGT6GXyZnHQxOomycUl63aTZtUNV7xnV6hu7TmAgYqOzaeWKJcKEQlroJMFNcz-znxNNN9wDKd1smsrBCPmrZHOhvB57H7bOvrxGYPcUJG4VN1P0qwxBd2ZhJkPZxhK","https://blogger.googleusercontent.com/img/a/AVvXsEi54S7viZ6s6SmHGfFG-7saUIv_fmai0nhm8o6nFcKvR3CNSTLUHjcPugIewaFZ5UYwy39_-RAv8YNQPaiJ6X97eiDGddQGX4KxzG8ap86WoGueR79DDPJovUHMXVPd_J3R4oqvl6YxR12Fkutm5me5Hu6jTmkje0gRHaE5g4NTsvFttOJP20t4h5ps=w400-h185"],"author":{"@type":"Person","name":"Jai Krishna Ponnappan","url":"https://www.linkedin.com/in/jaikrishnaponnappan/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":"2022-09-15","dateModified":"2022-09-15"}</script><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgOAhl34mHnFEZ9htXmqEe18yp_QdJZ7ISka1ZjsaI-Z1yPcQRF0RUJrJ8EPT0nnKxHMAVM-J4He2xfO6Y2auCekvBxDVhlHFwGsnb54xN1k6eVxkUH9IxiUSPi1_hXHo_GHCDO4FOWI3lcdGWjOrGCueBLpyRaeCUMKBBbfa76l5GP-aiwVdTBqzv2" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="503" data-original-width="1128" height="179" src="https://blogger.googleusercontent.com/img/a/AVvXsEgOAhl34mHnFEZ9htXmqEe18yp_QdJZ7ISka1ZjsaI-Z1yPcQRF0RUJrJ8EPT0nnKxHMAVM-J4He2xfO6Y2auCekvBxDVhlHFwGsnb54xN1k6eVxkUH9IxiUSPi1_hXHo_GHCDO4FOWI3lcdGWjOrGCueBLpyRaeCUMKBBbfa76l5GP-aiwVdTBqzv2=w400-h179" width="400" /></a></div><br /><br /></div><p></p><h3 style="text-align: left;"><span style="color: red;">Future market outlook is anticipated to shift with the introduction of the internet of things on Metaverse. </span></h3><p>The Metaverse Market will profit greatly from the IoT's wide range of capabilities in the future years. </p><p><b>The market size for the metaverse was predicted to reach USD 124.04 billion in 2022 and USD 1655.29 billion in 2030, with a growth rate of 38.25 percent CAGR.</b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiG3l1g2KVAkn9hHX_Je7fmJhe4wP2K3iDjawDtzReZHbdSdMDm7gFh1P6M1IrEmLckwL4z9YDhPDYVlRx1qyJ2XgYgk3UF0d2pEjg9iA8Mu-YuLCWLIwlZOA6H09bojlYFZhBKDjxGX09qWCaQO0x-hsWKF7_LAxQxhItVf3DqnkoevLRCY-00-tuH" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="505" data-original-width="1057" height="191" src="https://blogger.googleusercontent.com/img/a/AVvXsEiG3l1g2KVAkn9hHX_Je7fmJhe4wP2K3iDjawDtzReZHbdSdMDm7gFh1P6M1IrEmLckwL4z9YDhPDYVlRx1qyJ2XgYgk3UF0d2pEjg9iA8Mu-YuLCWLIwlZOA6H09bojlYFZhBKDjxGX09qWCaQO0x-hsWKF7_LAxQxhItVf3DqnkoevLRCY-00-tuH=w400-h191" width="400" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><span style="color: red;">Hundreds of gadgets, including thermostats, voice-activated speakers, and medical equipment, are connected to a variety of data via the Internet of Things (IoT), which was initially introduced in 1999. </span></h3><p><b>As it easily links the 3D world to a variety of physical things, IoT is now positioned to transform the Metaverse.</b> </p><p>IRIS Software Group, one of the most well-known and prominent private software companies in the UK, provides software solutions and services that dramatically increase operational compliance, efficiency, and accuracy.</p><p>As the Metaverse gains popularity and new applications and access points appear alongside it, the identity environment will significantly grow, providing more entrance opportunities for potential bad market participants. </p><p><b>Already, 84% of business leaders agree that their organization maintains a lot more digital identities now than it did ten years ago (up to 10x). </b></p><p>In addition, 95% of businesses claim they struggle to keep track of all the identities that are now associated with their business (human and machine). </p><p>When we include in the Metaverse and the surge in IoT use that will go along with it, we have a perfect storm of increasing complexity and growing threat vectors that may be exploited, which may result in breaches, business interruption, and significant expenditures.</p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi65ohXM53fj_2HykqPcIZup4bpxkmqb1AmpZS-7USCX3U5vZ0fViThQwRfuUGT6GXyZnHQxOomycUl63aTZtUNV7xnV6hu7TmAgYqOzaeWKJcKEQlroJMFNcz-znxNNN9wDKd1smsrBCPmrZHOhvB57H7bOvrxGYPcUJG4VN1P0qwxBd2ZhJkPZxhK" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="456" data-original-width="1016" height="144" src="https://blogger.googleusercontent.com/img/a/AVvXsEi65ohXM53fj_2HykqPcIZup4bpxkmqb1AmpZS-7USCX3U5vZ0fViThQwRfuUGT6GXyZnHQxOomycUl63aTZtUNV7xnV6hu7TmAgYqOzaeWKJcKEQlroJMFNcz-znxNNN9wDKd1smsrBCPmrZHOhvB57H7bOvrxGYPcUJG4VN1P0qwxBd2ZhJkPZxhK" width="320" /></a></div><br /><br /><p></p><h3 style="text-align: left;"><span style="color: red;">Top IoT features that may Benefit Virtual Realty:</span></h3><p><br /></p><p><b><span style="font-size: medium;">a.) Real-world training that is strengthened on both sides:</span></b></p><p>Due to the scope and authenticity of training on extreme real-world situations (such as severe weather or cyber events) that can be done through virtual simulations using digital twins in the Metaverse, we are able to develop and test training methods using the IoT in situations where we are unable to do so in the real world. </p><p>IoTrain-sim will help, as virtual metaverse settings improve to more closely mirror reality, in educating humans and AI/software to collaborate to better spot faults and decrease the damage in real life.</p><p><br /></p><p><span style="font-size: medium;"><b>b.) More effective long-term planning and its immediate response:</b></span></p><p>As the metaverse system fills up with digital replicas of real-world items, it will resemble our actual world more and more (such as cars, buildings, factories, and people). </p><p><b>This system-of-systems complex virtual simulation will allow us to run many long-term planning scenarios, find the best designs for our energy, transportation, and healthcare systems, and dynamically operate these strategies as the actual world changes (e.g., more renewable sources, new diseases, population migrations or demographic changes). </b></p><p>These simulations will help teams of people adapt to current events and resolve a problem using long-term planning as well as weekly, daily, or monthly planning. </p><p>AI will then be used to analyze the results and improve the response in the future.</p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi54S7viZ6s6SmHGfFG-7saUIv_fmai0nhm8o6nFcKvR3CNSTLUHjcPugIewaFZ5UYwy39_-RAv8YNQPaiJ6X97eiDGddQGX4KxzG8ap86WoGueR79DDPJovUHMXVPd_J3R4oqvl6YxR12Fkutm5me5Hu6jTmkje0gRHaE5g4NTsvFttOJP20t4h5ps" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="500" data-original-width="1080" height="185" src="https://blogger.googleusercontent.com/img/a/AVvXsEi54S7viZ6s6SmHGfFG-7saUIv_fmai0nhm8o6nFcKvR3CNSTLUHjcPugIewaFZ5UYwy39_-RAv8YNQPaiJ6X97eiDGddQGX4KxzG8ap86WoGueR79DDPJovUHMXVPd_J3R4oqvl6YxR12Fkutm5me5Hu6jTmkje0gRHaE5g4NTsvFttOJP20t4h5ps=w400-h185" width="400" /></a></div><br /><p></p><h3 style="text-align: left;"><span style="color: red;">To make the virtual as real-time and lifelike as possible, brands are powering the Metaverse with a range of cutting-edge technology. </span></h3><p><b>AR, VR, Blockchain, AI, and IoT are some of these technologies. </b></p><p>Due to current IoT development, sensors, cameras, and wearables are already incorporated and in use. </p><p>When these devices are linked together, the Metaverse can mirror the actual world in real-time thanks to the power of these devices. </p><p><b>A metaverse replica of a real-world place, like Samsung's 837x recreation of its 837 Washington St. experience center in New York City's Meatpacking District, may, for example, be continually and in real-time updated when things enter and leave the real-world site.</b></p><p><br /></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-90167681052379052672022-09-15T01:22:00.001-07:002022-09-15T01:34:59.263-07:00How Can IoT Data Act As The Basis For Smart Cities?<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/09/how-can-iot-data-act-as-basis-for-smart.html"},"headline":"How Can IoT Data Act As The Basis For Smart Cities?","description":"Smart cities depend on personal mobile devices, PCs, and smart gadgets in citizens' homes and workplaces to collect this data. Computers, cell phones, sensors, and modems make up these information nodes.","image":["https://blogger.googleusercontent.com/img/a/AVvXsEg4t5m8D5402bmWdrsmGmhbL9OwtLxNIh24Snl2Xpk1GIMNEsCkZoKTpdOlOqr_rcrfOwmYPW-vJk6do_ayUkwbMTIWvGyGeFtFT-9WufythXMduDG492SRyLbM_xZh2nFJ-IjvrVDZPJ8J0iL_4oCF5iCJd8qTmeRKjHiUDThvXjTvkwDbZJ0u2FeX=w400-h387","https://blogger.googleusercontent.com/img/a/AVvXsEh_etiicjjlOme3hXDsJHsjRMUKs-GJzzRWwsduhiZPCUj8S1qUYf5E8JFfIfp1BtmlSgvaDX96rIbZ15ha_Viu3v7MnBEgErJpgl-86yA54_SjVv9rq7uufujo7IeV-FEK98L31q5EGJkzxCugg9JESbucRntQblTEP89ta8v-j0LDf9xUPQq0Igb-=w400-h209","https://blogger.googleusercontent.com/img/a/AVvXsEjXfh08uRtALv3e_bjctcnojU9P4ffzfDw5iwIanXzuZo2M3ZRNdAfiuoAx6T7__dEGilEmpLiQFJlAPyI0PgSE6UKC2h15mVmKl4RWK0zK-QspJ2A6I7mu1fwln5caOhPN3_Zz0uxocrmcyenRO8WUVjQbcZt1oaHpcjmBCoHL-yRH_OsbxZKeDjHx=w400-h239","https://blogger.googleusercontent.com/img/a/AVvXsEicjQy4MAf9pOuh3OuLWgaH3z2nW24JB57Fktmbw9ehIjMwNLJy5QW1oSkcKCAb3Ped31PPPRFU3M8RW0tiKrZymhjom5G6GGBSvPvRjPsUBAN9tB2zSqLF_8p8e2pb9wWbHSybnFbm6Jq7iAipZrzNiOnrbJ6PyeN9-HvpIK7Fc8veADWVj8u8Kacu=w400-h216","https://blogger.googleusercontent.com/img/a/AVvXsEgDvGdWgwsjSELLBNtTARLOa1x4lTZinLi-16hOB1Ko_y857eaZv1Nvu3MZDF2N8e5GGI17OFQzSI1tsdazR4ACMehXpiIfHYfBzQ_h2K9520acFWfU9KnbC5FfgLNB52rFOjTORkM6s4AhN0g5AE3Vy_YpdskVFtgK3tGG7_dRhqN-URTtSjUF4xDP=w400-h270"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.linkedin.com/in/jaikrishnaponnappan/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":"2022-09-15","dateModified":"2022-09-15"}</script><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEg4t5m8D5402bmWdrsmGmhbL9OwtLxNIh24Snl2Xpk1GIMNEsCkZoKTpdOlOqr_rcrfOwmYPW-vJk6do_ayUkwbMTIWvGyGeFtFT-9WufythXMduDG492SRyLbM_xZh2nFJ-IjvrVDZPJ8J0iL_4oCF5iCJd8qTmeRKjHiUDThvXjTvkwDbZJ0u2FeX" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="521" data-original-width="538" height="387" src="https://blogger.googleusercontent.com/img/a/AVvXsEg4t5m8D5402bmWdrsmGmhbL9OwtLxNIh24Snl2Xpk1GIMNEsCkZoKTpdOlOqr_rcrfOwmYPW-vJk6do_ayUkwbMTIWvGyGeFtFT-9WufythXMduDG492SRyLbM_xZh2nFJ-IjvrVDZPJ8J0iL_4oCF5iCJd8qTmeRKjHiUDThvXjTvkwDbZJ0u2FeX=w400-h387" width="400" /></a></div><br /><br /><p></p><h2 style="text-align: left;"><span style="color: red;">Real-time traffic updates and notifications for public safety are two ways that smart cities may simplify the lives of its citizens. </span></h2><p><br /></p><p>Governments, however, must to be aware of good use case management techniques. </p><p><b>Every time we hear about "smart cities," the following questions come to mind: </b></p><p></p><ol style="text-align: left;"><li><span style="font-size: medium;">What characterizes a smart city? </span></li><li><span style="font-size: medium;">How is a city capable of intelligence? </span></li></ol><p></p><p>Big data, which is information gathered from several sources and analyzed, together with its intelligent application to better the lives of its citizens, are crucial components of a smart city. </p><p>Fast and dependable connection from all potential data sources is necessary for this kind of data collecting. </p><p><b>It's crucial to remember that although a connected city is an IoT network, it's not always a smart one. </b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEh_etiicjjlOme3hXDsJHsjRMUKs-GJzzRWwsduhiZPCUj8S1qUYf5E8JFfIfp1BtmlSgvaDX96rIbZ15ha_Viu3v7MnBEgErJpgl-86yA54_SjVv9rq7uufujo7IeV-FEK98L31q5EGJkzxCugg9JESbucRntQblTEP89ta8v-j0LDf9xUPQq0Igb-" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="526" data-original-width="1006" height="209" src="https://blogger.googleusercontent.com/img/a/AVvXsEh_etiicjjlOme3hXDsJHsjRMUKs-GJzzRWwsduhiZPCUj8S1qUYf5E8JFfIfp1BtmlSgvaDX96rIbZ15ha_Viu3v7MnBEgErJpgl-86yA54_SjVv9rq7uufujo7IeV-FEK98L31q5EGJkzxCugg9JESbucRntQblTEP89ta8v-j0LDf9xUPQq0Igb-=w400-h209" width="400" /></a></div><br /><br /><p></p><p>A smart city must be linked in order to exist, but connectivity alone does not equal "smartness," which calls for ongoing data analysis and changes based on that analysis. </p><h3 style="text-align: left;">Smart city operating systems (OSes) provide public access to a vast quantity of data and information about the city stored on a cloud server. </h3><p>Traffic cameras, road sensors, connected cars, and other linked infrastructure, such as traffic signals and roadside devices, are sources of data that they gather and exchange. </p><p>Smart cities are those that use real-time big data analysis to control traffic, offline study of mobility patterns and regions of greater density, geographical and temporal correlation to better understand city dynamics, and urban planning. </p><p>Connectivity for smart cities often relies on an IoT network that continuously produces data that is rich in information. </p><p>The simplest way to utilize this data is to just make it accessible after a little amount of data processing to convert it to a graphical format. </p><p><b>IoT data is often used to provide traffic status, which includes average speed and bottleneck places with color coding, or to alert locals to impending natural catastrophes or unfavorable weather conditions and provide information on the severity and projected locations. </b></p><p><b><br /></b></p><h3 style="text-align: left;"><span style="color: red;">Smart cities depend on personal mobile devices, PCs, and smart gadgets in citizens' homes and workplaces to collect this data. </span></h3><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjXfh08uRtALv3e_bjctcnojU9P4ffzfDw5iwIanXzuZo2M3ZRNdAfiuoAx6T7__dEGilEmpLiQFJlAPyI0PgSE6UKC2h15mVmKl4RWK0zK-QspJ2A6I7mu1fwln5caOhPN3_Zz0uxocrmcyenRO8WUVjQbcZt1oaHpcjmBCoHL-yRH_OsbxZKeDjHx" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="577" data-original-width="966" height="239" src="https://blogger.googleusercontent.com/img/a/AVvXsEjXfh08uRtALv3e_bjctcnojU9P4ffzfDw5iwIanXzuZo2M3ZRNdAfiuoAx6T7__dEGilEmpLiQFJlAPyI0PgSE6UKC2h15mVmKl4RWK0zK-QspJ2A6I7mu1fwln5caOhPN3_Zz0uxocrmcyenRO8WUVjQbcZt1oaHpcjmBCoHL-yRH_OsbxZKeDjHx=w400-h239" width="400" /></a></div><br /><br /><p></p><p>In order to gather shared municipal data, the infrastructure also incorporates networks of cameras and sensors. </p><p>Computers, cell phones, sensors, and modems make up these information nodes. </p><p><b>Although linked to an IoT network, device software poses issues with data formatting and interoperability. </b></p><p>Computers or geo-fixed warning devices like loudspeakers have typically been used to transmit this information and warning representations. </p><p>Using mobile devices to provide on-demand, close to real-time information without having to be close to a computer is the current trend. </p><p>When compared to the conventional mass warnings for a certain geographic region, such as road closures, COVID-19 notifications, or public safety issues, this feature also enables a more customized use of IoT information. </p><p><b>A significant number of potent IoT sensors that automatically cover the majority of a smart city's regions are available thanks to the abundance of sensors in smartphones and 4G/5G network technologies. </b></p><p style="text-align: center;"><b></b></p><div class="separator" style="clear: both; text-align: center;"><b><br /></b></div><div class="separator" style="clear: both; text-align: center;"><b><a href="https://blogger.googleusercontent.com/img/a/AVvXsEicjQy4MAf9pOuh3OuLWgaH3z2nW24JB57Fktmbw9ehIjMwNLJy5QW1oSkcKCAb3Ped31PPPRFU3M8RW0tiKrZymhjom5G6GGBSvPvRjPsUBAN9tB2zSqLF_8p8e2pb9wWbHSybnFbm6Jq7iAipZrzNiOnrbJ6PyeN9-HvpIK7Fc8veADWVj8u8Kacu" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="442" data-original-width="818" height="216" src="https://blogger.googleusercontent.com/img/a/AVvXsEicjQy4MAf9pOuh3OuLWgaH3z2nW24JB57Fktmbw9ehIjMwNLJy5QW1oSkcKCAb3Ped31PPPRFU3M8RW0tiKrZymhjom5G6GGBSvPvRjPsUBAN9tB2zSqLF_8p8e2pb9wWbHSybnFbm6Jq7iAipZrzNiOnrbJ6PyeN9-HvpIK7Fc8veADWVj8u8Kacu=w400-h216" width="400" /></a></b></div><b><br /><br /></b><p></p><h3 style="text-align: left;"><span style="color: red;"><a href="https://www.lightningiot.com/search?q=IoT+application">IoT application</a> cases for smart cities are beginning to change as a result of this information-rich data. </span></h3><p><b>These use cases are intended to enhance each user's experience inside a city. </b></p><p></p><ul style="text-align: left;"><li>Residents may schedule <b>coordinated electric buses or shared electric rides</b> between their travel locations after first renting an e-bike or e-scooter to make the most efficient and environmentally friendly multi-modal excursions. </li><li>In order to <b>forecast collision risk</b> and notify the driver or reduce collision risk for a self-driving car to reduce collision risk for increased safety, <b>smartphone sensors may communicate information between the vehicles and the road</b> users throughout these journeys. </li><li>If inhabitants could order a <b>self-driving vehicle</b> to pick them up right where they are, they would have additional mobility options available to them. </li><li>Additionally, people might set up <b>automatic food or good delivery</b> while they are at home. </li></ul><p></p><p><b>These use cases are only the tip of the iceberg in terms of what is feasible in a smart city and local samples of what is accessible with IoT connection. </b></p><p><b><br /></b></p><h3 style="text-align: left;">When the information-rich IoT data is utilized on a bigger scale to optimize for major events rather than just one person, governments will profit the most. </h3><p><b><br /></b></p><p><b>For instance, local authorities may cut down on traffic jams and travel times for everyone attending a big event or festival, but this requires coordinated preparation and awareness to cut down on network latency and provide locals access to real-time information. </b></p><p><br /></p><h3 style="text-align: left;"><span style="color: red;">Installation of <a href="https://www.lightningiot.com/search?q=smart+devices">smart devices</a> will drive up infrastructure costs, raise questions about longevity, and need ongoing maintenance for IoT installations in smart cities. </span></h3><p><b><br /></b></p><p><b>Governments should also address privacy concerns and ensure that any data acquired does not include <a href="https://www.lightningiot.com/search?q=PII">personally identifying information</a> (PII). </b></p><p style="text-align: center;"></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgDvGdWgwsjSELLBNtTARLOa1x4lTZinLi-16hOB1Ko_y857eaZv1Nvu3MZDF2N8e5GGI17OFQzSI1tsdazR4ACMehXpiIfHYfBzQ_h2K9520acFWfU9KnbC5FfgLNB52rFOjTORkM6s4AhN0g5AE3Vy_YpdskVFtgK3tGG7_dRhqN-URTtSjUF4xDP" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="668" data-original-width="991" height="270" src="https://blogger.googleusercontent.com/img/a/AVvXsEgDvGdWgwsjSELLBNtTARLOa1x4lTZinLi-16hOB1Ko_y857eaZv1Nvu3MZDF2N8e5GGI17OFQzSI1tsdazR4ACMehXpiIfHYfBzQ_h2K9520acFWfU9KnbC5FfgLNB52rFOjTORkM6s4AhN0g5AE3Vy_YpdskVFtgK3tGG7_dRhqN-URTtSjUF4xDP=w400-h270" width="400" /></a></div><br /><br /><p></p><p>Since homeowners may control access to PII and smartphone users will be responsible for infrastructure expenses and upkeep, using smartphone sensors as portable IoT devices can help with some of these privacy and cost problems. </p><p><b>How to provide fair access for underprivileged populations and lower-income neighborhoods, where the cost of mobile devices and internet may be a barrier to accessing smart city resources, remains a key challenge. </b></p><p>Executive and IT experts who design or <a href="https://www.lightningiot.com/search?q=deploy+IoT+devices">deploy IoT devices</a> have great prospects in smart cities, but policymakers also need to address and resolve associated societal issues.</p><p><br /></p><p><b><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><span style="font-family: Baskervville; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: Baskervville; font-size: medium;"><span>Find Jai on</span><span> </span><a href="http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><b style="color: #ffa400;"><br /></b></p><p><b style="color: #ffa400;"><br /></b></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-31107511988144067892022-04-10T02:46:00.013-07:002022-04-10T03:06:48.835-07:00Internet Of Things - IoT Technologies List.<div class="mbtTOC"> <button onclick="mbtToggle()">Table Of Contents</button> <ul id="mbtTOC"></ul> </div><script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/04/internet-of-things-iot-technologies-list.html"},"headline":"Internet Of Things - IoT Technologies List.","description":"Despite the fact that current IoT-enabling technologies are developing by the day, heterogeneity remains a huge barrier that the IoT community must overcome. This section highlights the different technologies that have made the Internet of Things possible.","image":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2MCixM4nLo197jqph1ICfy2a_WA7P_oQ-yLatALvn2PbGWK6Gk5y3VcjZjvJ_ULXMqgemcnDmd6XjJrU7vwjqie2JSpzPhIy8NZD17j6tpPJdej43sbZYXXj0SLVkXVQESUoSzOwNNpC3AXjR4kS-BmneRt_qk4q7IL99BpRo0KHJgCyT9Vhuyvc7/w400-h225/IoT-Tecnologies-List-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg","author":{"@type":"","name":"Jai Krishna Ponnappan","url":"http://technologistsinsync.com/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":""}</script><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2MCixM4nLo197jqph1ICfy2a_WA7P_oQ-yLatALvn2PbGWK6Gk5y3VcjZjvJ_ULXMqgemcnDmd6XjJrU7vwjqie2JSpzPhIy8NZD17j6tpPJdej43sbZYXXj0SLVkXVQESUoSzOwNNpC3AXjR4kS-BmneRt_qk4q7IL99BpRo0KHJgCyT9Vhuyvc7/s612/IoT-Tecnologies-List-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="344" data-original-width="612" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2MCixM4nLo197jqph1ICfy2a_WA7P_oQ-yLatALvn2PbGWK6Gk5y3VcjZjvJ_ULXMqgemcnDmd6XjJrU7vwjqie2JSpzPhIy8NZD17j6tpPJdej43sbZYXXj0SLVkXVQESUoSzOwNNpC3AXjR4kS-BmneRt_qk4q7IL99BpRo0KHJgCyT9Vhuyvc7/w400-h225/IoT-Tecnologies-List-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" width="400" /></a></span></div><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Internet-of-Things (IoT) technologies is projected to infiltrate nearly every aspect of everyday life, ranging from wearables to smart homes, healthcare to smart environments, event logistics, supply chain, and retail. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;">Despite the fact that current IoT-enabling technologies are developing by the day, heterogeneity remains a huge barrier that the IoT community must overcome. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">This section highlights the different technologies that have made the Internet of Things possible. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">1. Internet Protocol (IP). </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Internet Protocol (IP): According to Bicknell, there are two types of Internet Protocol (IP): IPv4 and IPv6. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Each of these unpredictably distinguishes IP addresses. </span></li><li><span style="font-size: medium;"><span style="font-family: Baskervville;">As a rule, an IP address references to the tends to be characterized by IPv4 alone, which accommodates 4.3 </span><span style="font-family: Baskervville;">billion places whereas IPv6 accommodates 128-bit (2128) addresses, hence allowing 4.4 x 1038 restrictive IP addresses. </span></span></li></ul><p></p><p><span style="font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">2. Barcode.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>A barcode is essentially a way of encoding characters and numbers that uses bars and gaps of varying widths in various combinations. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Palmer's Bar Code Book enables the use of alternative information transmission mechanisms. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Standardized tags are machine-readable markings attached to items that record data that may be used to identify the item. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Scanner tags are designed to be undetectable by machines. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Perusing is usually done using laser scanners, although it is also done with a camera. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">3. Wireless Fidelity.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Wireless Fidelity, sometimes known as Wi-Fi, is a systems administration breakthrough that enables communication between PCs and other devices via a wireless signal. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Wi-Fi is simply a WLAN component that adheres to IEEE standards802.11 8021.11a,802.11b, 802.11g, and 802.11n are connected with the double band. </span></li><li><span style="font-family: Baskervville; font-size: medium;">These Wi-Fi apps are converting whole metropolitan neighborhoods into Wi-Fi tunnels, which is a new norm these days. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">4. Bluetooth.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>It's a far-flung invention. This eliminates the need for cabling between devices such as PCs, PDAs, scratchpads, mobile phones, and so on. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-size: medium;"><span style="font-family: Baskervville;">It operates with a range of 10–100 meters when using the IEEE 802.15.1 </span><span style="font-family: Baskervville;">standard in this manner, making it practical. </span></span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">5. Zigbee.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>The data transmission rate of this breakthrough is 250 kbps, with a range of about 100 meters. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">This convention was created to improve the remote sensor organizations as well. </span></li><li><span style="font-size: medium;"><span style="font-family: Baskervville;">It is a remote organization convention based on the IEEE 802.15.4 </span><span style="font-family: Baskervville;">standard that explores its use in house robotization, brilliant agriculture, contemporary computerization, clinical analysis, and so on. </span></span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">6. NFC stands for Near Field Communication. </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>NFC is a collection of short-range remote technology that operates at 13.56 MHz. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">It is well-liked because NFC makes life simpler and more beneficial for consumers all over the world by facilitating transactions, the sharing of sophisticated data, and the interfacing of electronic devices. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The significant distance capabilities of NFC, which function at a range of 10 cm, are equivalent to Bluetooth and 802.11 conventions. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">7. WSNs (Wireless Sensor Networks). </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>This is a remote organization made up of just free devices with sensors attached. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Sensors are often used to monitor environmental factors such as sound, temperature, vibration, pressure, and so on. </span></li><li><span style="font-family: Baskervville; font-size: medium;">According to Arampatzis, T. et al., the WSN has a variety of devices that communicate with one another and send information from one to the next. </span></li><li><span style="font-family: Baskervville; font-size: medium;">In the IoT viewpoint, a remote sensor network is critical. </span></li><li><span style="font-family: Baskervville; font-size: medium;">IoT based on WSN has had a significant impact in a variety of areas, including medical care, manufacturing, line security, farmland observation, wilderness fire and food location, and so on.</span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">8. RFID: Radio-Frequency Identification. </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>RFID is the first step in the creation of the Internet of Things (IoT). </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Active RFID, passive RFID, and semi-passive RFID are the three types of RFID. </span></li><li><span style="font-family: Baskervville; font-size: medium;">A tag, a peruser, a receiving wire, an entry regulator, a product, and a worker are the basic components. </span></li><li><span style="font-family: Baskervville; font-size: medium;">It is monetary, appealing, and respectable, and as a result, it can be relied upon. </span></li><li><span style="font-family: Baskervville; font-size: medium;">According to RFIDWorld.ca, the world has spent $ 6.37 billion on RFID chips; however, the IoT segment of the whole sector is expected to grow. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">9. EPC stands for "Electronic Product Code." </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>It's an electronic code that's signed in bits and pieces on an RFID tag. </b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">It was first developed at MIT's Auto-ID center in 1999. </span></li><li><span style="font-family: Baskervville; font-size: medium;">"EPC Global" (2010) claims responsibility for Electronic Product Code (EPC) invention, which is used to share RFID data. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The kind of EPC, the new chronic number of items, its determinations, manufacturer data, and so on may all be stored in an EPC code. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><b style="color: #ffa400;"><span style="font-family: Baskervville; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://www.instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><span style="font-family: Baskervville; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-size: medium;"><br /></span></b></p><p><b style="color: #ffa400;"><span style="font-size: medium;"><br /></span></b></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">References and Further Reading:</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">1. L. Atzori, A. Iera, G. Morabito, The internet of things: A survey. Comput. Netw. 54, </span><span style="font-family: Baskervville;">2787–2805 (2010)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">2. H. Sundmaeker, P. Guillemin, P. Friess, S. Woelffé, Vision and Challenges for Realizing the </span><span style="font-family: Baskervville;">Internet of Things. CERP-IoT – Cluster of European Research Projects on the Internet of </span><span style="font-family: Baskervville;">Things (2010)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">3. J. Belissent, Getting Clever About Smart Cities: New Opportunities Require New Business </span><span style="font-family: Baskervville;">Models. Forrester Research (2010)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">4. J. Gómez, J.F. Huete, O. Hoyos, L. Perez, D. Grigori, Interaction system based on internet </span><span style="font-family: Baskervville;">of things as support for education. Procedia Comput. Sci. 21, 132–139 (2013). https://doi.</span><span style="font-family: Baskervville;">org/10.1016/j.procs.2013.09.019</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">5. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, </span><span style="font-family: Baskervville;">M. Mazura, M. Harrison, M. Eisenhauer, et al., Internet of things strategic research roadmap, </span><span style="font-family: Baskervville;">in Internet of Things: Global Technological and Societal Trends, ed. by O. Vermesan, P. Friess, </span><span style="font-family: Baskervville;">P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, et al., vol. 1, (River Publishers, Aalborg, </span><span style="font-family: Baskervville;">2011), pp. 9–52</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">6. M. Weiser, The computer for the 21st century. Sci. Am., 66–75 (1991) The Internet of Things: </span><span style="font-family: Baskervville;">Sizing up the Opportunity. McKinsey (2014)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">7. B.A. Li, J.J. Yu, Research and applications on the smart home based on component technologies and internet of things. Procedia Eng. 15, 2087–2092 (2011). <a href="https://doi.org/10.1016/j.">https://doi.org/10.1016/j.</a></span><span style="font-family: Baskervville;"><a href="http://proeng.2011.08.390">proeng.2011.08.390</a></span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">8. D. Moeinfar, H. Shamsi, F. Nafar, Design and implementation of a low-power active RFID for </span><span style="font-family: Baskervville;">container tracking @ 2.4 GHz frequency: Scientifc research, 2 (2012)</span></span></p><p><span style="font-family: Baskervville; font-size: medium;">9. The Bar Code Book, Palmer (1995)</span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">10. X.-Y. Chen, Z.-G. Jin, Research on key technology and applications for the internet of things. </span><span style="font-family: Baskervville;">Phys. Procedia 33, 561–566 (2012). <a href="https://doi.org/10.1016/j.phpro.2012.05.104">https://doi.org/10.1016/j.phpro.2012.05.104</a></span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">11. T. Arampatzis, et al. A survey of security issues in wireless sensors networks, in intelligent </span><span style="font-family: Baskervville;">control. Proceeding of the IEEE International Symposium on, Mediterranean Conference on </span><span style="font-family: Baskervville;">Control and Automation 2005, pp. 719–724</span></span></p><p><span style="font-family: Baskervville; font-size: medium;">12. M. Chorost, The networked pill. MIT Technol. Rev. (2008, March)</span></p><p><span style="font-family: Baskervville; font-size: medium;">13. <a href="http://www.iot.org.au/">http://www.iot.org.au/</a></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">14. O. Uviase, G. Kotonya, First workshop on architectures, languages, and paradigms for </span><span style="font-family: Baskervville;">IoT. EPTCS 264, 1–17 (2018)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">15. J. Kiljander, A. D’elia, F. Morandi, P. Hyttinen, J. Takalo-Mattila, A. YlisaukkoOja, </span><span style="font-family: Baskervville;">J.-P. Soininen, T.S. Cinotti, Semantic interoperability architecture for pervasive computing </span><span style="font-family: Baskervville;">and internet of things. IEEE Access 2, 856–873 (2014). https://doi.org/10.1109/ </span><span style="font-family: Baskervville;">ACCESS.2014.2347992</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">16. P. Guillemin, F. Berens, O. Vermesan, P. Friess, M. Carugi, G. Percivall, Internet of Things: </span><span style="font-family: Baskervville;">position paper on standardization for IoT technologies (2015). Available at <a href="http://www.">http://www.</a></span><span style="font-family: Baskervville;"><a href="http://internet-of-things-research.eu/pdf/IERC_Position_Paper_IoT_Standardization_Final.pdf">internet-of-things-research.eu/pdf/IERC_Position_Paper_IoT_Standardization_Final.pdf</a></span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">17. O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I.S. Jubert, </span><span style="font-family: Baskervville;">M. Mazura, M. Harrison, M. Eisenhauer, et al., Internet of Things Strategic Research Roadmap, </span><span style="font-family: Baskervville;">vol 1 (Rivers Publishers, Aalborg, 2011), pp. 9–52</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">18. G. Xiao, J. Guo, L. Da Xu, Z. Gong, User interoperability with heterogeneous IoT devices </span><span style="font-family: Baskervville;">through transformation. IEEE Trans. Ind. Inf. 10(2), 1486–1496 (2014). https://doi.</span><span style="font-family: Baskervville;">org/10.1109/tii.2014.2306772</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">19. S. Cheruvu, A. Kumar, N. Smith, D.M. Wheeler, IoT frameworks and complexity, in Demystifying Internet of Things Security, (Apress, Berkeley, 2020). https://doi.</span><span style="font-family: Baskervville;">org/10.1007/978-1-4842-2896-8_2</span></span></p><p><span style="font-family: Baskervville; font-size: medium;">20. M. Burhan, R.A. Rehman, B.-S. Kim, B. Khan, IoT elements, layered architectures, and security issues: A comprehensive survey. Sensors 18 (2018). <a href="https://doi.org/10.3390/s18092796">https://doi.org/10.3390/s18092796</a></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">21. D. Bicknell RFID: Moving beyond the pilot stage (2007, November 16). ComputerWeekly.</span><span style="font-family: Baskervville;">com. <a href="http://www.comp-uterweekly.com/Articles/2007/11/16/228131/rfd-moving-beyond-the-pilot-stage.htm">http://www.comp-uterweekly.com/Articles/2007/11/16/228131/rfd-moving-beyond-the-pilot-stage.htm</a>. Accessed 16, 27 Dec 2009</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">22. H. Suo, J. Wan, C. Zou, J. Liu, Security in the internet of things: A review. In Proceedings </span><span style="font-family: Baskervville;">of the 2012 International Conference on Computer Science and Electronics Engineering </span><span style="font-family: Baskervville;">(ICCSEE), Hangzhou, China, 23–25 March 2012, vol 3, pp. 648–651</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">23. D. Kozlov, J. Veijalainen; Y. Ali, Security and privacy threats in IoT architectures. In Proceedings </span><span style="font-family: Baskervville;">of the 7th International Conference on Body Area Networks, Oslo, Norway, 24–26 February </span><span style="font-family: Baskervville;">2012; ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications </span></span></p><p><span style="font-family: Baskervville; font-size: medium;">Engineering): Brussels, Belgium, 2012, pp. 256–262</span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">24. X. Xiaohui, Study on security problems and key technologies of the Internet of things. In </span><span style="font-family: Baskervville;">Proceedings of the 5th International Conference on Computational and Information Sciences </span><span style="font-family: Baskervville;">(ICCIS), Shiyan, China, 21–23 June 2013, pp. 407–410</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">25. D. Darwish, Improved layered architecture for internet of things. Int. J. Comput. Acad. Res. 4, </span><span style="font-family: Baskervville;">214–223 (2015)</span></span></p><p><span style="font-family: Baskervville; font-size: medium;">26. S. Madakam, R. Ramaswamy, S. Tripathi, Internet of things (IoT): A literature review. </span><span style="font-family: Baskervville; font-size: large;">J. Comput. Commun 3, 164 (2015) [CrossRef]</span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">27. R. Khan, S.U. Khan, R. Zaheer, S. Khan, Future internet: The internet of things architecture, possible applications, and key challenges. In Proceedings of the 2012 10th International </span><span style="font-family: Baskervville;">Conference on Frontiers of Information Technology (FIT), Islamabad, India, 17–19 December </span><span style="font-family: Baskervville;">2012, pp. 257–260</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">28. P. Sethi, S.R. Sarangi, Internet of things: Architectures, protocols, and applications. J. Electr. </span><span style="font-family: Baskervville;">Comput. Eng 2017, 9324035 (2017) [CrossRef]</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">29. S.K. Muni, B. Booba, The usage of internet of things in transportation and logistics industry, in Intelligent Computing and Innovation on Data Science, Lecture Notes in Networks </span><span style="font-family: Baskervville;">and Systems, ed. by S. L. Peng, L. Son, G. Suseendran, D. Balaganesh, vol. 118, (Springer, </span></span></p><p><span style="font-family: Baskervville; font-size: medium;">Singapore, 2020). <a href="https://doi.org/10.1007/978-981-15-3284-9_49">https://doi.org/10.1007/978-981-15-3284-9_49</a></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">30. R. Somayya Madakam, S.T. Ramaswamy, Internet of things (IoT): A literature review. </span><span style="font-family: Baskervville;">J. Comput. Commun. 3, 164–173 (May 2015). <a href="http://www.scirp.org/journal/jcc">http://www.scirp.org/journal/jcc</a></span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">31. F. Bonomi, R. Milito, P. Natarajan, J. Zhu, Fog computing: A platform for internet of things </span><span style="font-family: Baskervville;">and analytics, in Big Data and Internet of Things: A Road Map for Smart Environments, </span><span style="font-family: Baskervville;">(Springer, Berlin, 2014), pp. 169–186</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">32. Stojmenovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in </span><span style="font-family: Baskervville;">Proceedings of the Federated Conference on Computer Science and Information Systems </span><span style="font-family: Baskervville;">(FedCSIS ‘14), IEEE, Warsaw, Poland, September 2014, pp. 1–8</span></span></p><p><span style="font-family: Baskervville; font-size: large;">33. M. Aazam, E.-N. Huh, Fog computing and smart gateway-based communication for the cloud </span><span style="font-family: Baskervville; font-size: large;">of things, in Proceedings of the 2nd IEEE International Conference on Future Internet of </span><span style="font-family: Baskervville; font-size: large;">Things and Cloud (FiCloud ‘14), Barcelona, Spain, August 2014, pp. 464–470</span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">34. M. Muntjir, M. Rahul, H. Alhumiany, An analysis of internet of things (IoT): Novel architectures, modern applications, security aspects, and future scope with latest case studies. Build. </span><span style="font-family: Baskervville;">Serv. Eng. Res. Technol. 6 (2017)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">35. N. Bhumi, T. Champaneria, Study of various internet of things platforms. Int. J. Comput. Sci. </span><span style="font-family: Baskervville;">Eng. Surv. 6(6) (2015, December 2015)</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">36. A. Hakim, (IoT) System Architecture and Technologies. White Paper v1.0, Orange Expert – </span><span style="font-family: Baskervville;">Network Operations, 2018</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">37. J. Gubbi, R. Buyya, S. Marusic, M.M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29, 1645–1660 (2013) </span><span style="font-family: Baskervville;">Elsevier</span></span></p><p><span style="font-size: medium;"><span style="font-family: Baskervville;">38. H. Ning, Z. Wang, Future internet of things architecture: Like mankind neural system or social </span><span style="font-family: Baskervville;">organization framework. IEEE Commun. Lett. 15(4) (April 2011)</span></span></p><p><span style="font-size: medium;"><br /></span></p><p><b style="color: #ffa400;"><span style="font-size: medium;"><br /></span></b></p><p><b style="color: #ffa400;"><span style="font-size: medium;"><br /></span></b></p><p><b style="color: #ffa400;"><br /></b></p><script>mbtTOC();</script>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-76495953722890760982022-04-10T01:36:00.005-07:002022-04-10T01:57:19.775-07:00FUTURE OF HEALTHCARE WEARABLE IOTS FOR PERSON-CENTERED CARE. <script type="application/ld+json">{"@context":"https://schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","name":"What are Healthcare Wearables and How Do They Work?","acceptedAnswer":{"@type":"Answer","text":"Wearables are tiny electronic devices that can detect temperature, blood pressure, blood oxygen, breathing rate, sound, GPS position, elevation, physical movement, changes in direction, and the electrical activity of the heart, muscles, brain, and skin when they are worn on the body."}},{"@type":"Question","name":"What are three of the most common wearable devices?","acceptedAnswer":{"@type":"Answer","text":"Wearable technology includes your Apple Watch and Fitbit, but they aren't the only products being produced today. Smart watches, VR and AR technologies, smart jackets, and a slew of other products are all pointing us in the direction of a more connected existence."}},{"@type":"Question","name":"What are some examples of healthcare technology that can be worn?","acceptedAnswer":{"@type":"Answer","text":"Skin temperature, sweat sensors, heart rate monitors, glucose monitors, holter monitors, and other wearables for early illness diagnoses are examples. How medical wearable software works: For analysis, the cloud server receives patient health data from devices that continuously monitor the patient's vitals."}},{"@type":"Question","name":"What role will wearable medical gadgets play in the future of healthcare?","acceptedAnswer":{"@type":"Answer","text":"To increase the accuracy of clinical evaluation, wearable sensors for remote healthcare monitoring systems are being created. Electrocardiograph (EKG) sensors in wearables can monitor a patient's heart activity by detecting several physiological signals."}},{"@type":"Question","name":"What role do wearable gadgets play in healthcare?","acceptedAnswer":{"@type":"Answer","text":"Patient monitoring, surveillance, screening, diagnosis, and therapy, post-treatment, and continuous management may all be done using wearable devices. These gadgets also use real-time physiological input to verify and validate therapy efficacy."}},{"@type":"Question","name":"What do smart wearables entail?","acceptedAnswer":{"@type":"Answer","text":"Smart electronic devices (electronic devices with microcontrollers) that are worn close to and/or on the surface of the skin, where they detect, analyze, and transmit information, are known as wearable technology, wearables, fashion technology, smartwear, tech togs, streetwear tech, skin electronics, or fashion electronics."}},{"@type":"Question","name":"What is the role of IoT in healthcare?","acceptedAnswer":{"@type":"Answer","text":"Hospitals and the Internet of Things Apart from monitoring patients' health, hospitals may benefit from IoT devices in a variety of ways. Medical equipment such as wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring equipment are tracked in real time using IoT devices with sensors."}},{"@type":"Question","name":"What are smart medical gadgets, and how do they work?","acceptedAnswer":{"@type":"Answer","text":"A smart medical gadget, which is equipped with wireless IoT technology and can monitor and send important data in real time, connects physicians with patients at home or on the way to the hospital. These gadgets provide patients a lot of freedom while also allowing healthcare practitioners to keep an eye on them from afar."}},{"@type":"Question","name":"Do wearables have a positive impact on one's health?","acceptedAnswer":{"@type":"Answer","text":"Wearable technologies have shown to be beneficial in assisting patients and clinicians in developing treatment plans and tracking results. Wearable gadgets may also aid with chronic disease self-management by delivering real-time data."}},{"@type":"Question","name":"Is wearable technology a component of orthopedic health care's future?","acceptedAnswer":{"@type":"Answer","text":"Wearable technology in orthopedics might help to expedite patient-physician communication, which could help to alleviate the burden of growing health-care expenses and exhaustion caused by electronic health data."}},{"@type":"Question","name":"What is the significance of wearable technology?","acceptedAnswer":{"@type":"Answer","text":"Wearable technology allows us to measure our fitness levels, see text messages more quickly, and track our whereabouts using GPS. Best of all, most of the gadgets that enable us to do so are hands-free and portable, so we don't have to take them out of our pockets."}},{"@type":"Question","name":"What is the present state of wearable technology?","acceptedAnswer":{"@type":"Answer","text":"According to a HIMSS poll, more than half of healthcare practitioners regarded wearable technology to be beneficial in monitoring their patients. They use commercial and personal-grade wearables to manage prescriptions, check health conditions and vitals, follow post-operative patients' recovery, and track sleep."}},{"@type":"Question","name":"What exactly qualifies as wearable technology?","acceptedAnswer":{"@type":"Answer","text":"Wearable technology, often known as \"wearables,\" is a class of electronic devices that may be worn as jewelry, embedded in clothes, implanted in the user's body, or even tattooed on the skin."}},{"@type":"Question","name":"What IoT devices are utilized in the healthcare industry?","acceptedAnswer":{"@type":"Answer","text":"Devices for medical monitoring Patient monitoring using the internet. The most popular use of IoT devices in healthcare is remote patient monitoring. Glucose monitoring is a procedure that involves measuring the amount of glucose in the blood. Monitoring of the heart rate. Hand hygiene is being monitored. Monitoring depression and mood. Parkinson's disease is being monitored. Inhalers that are linked. Sensors that can be ingested."}},{"@type":"Question","name":"What are linked medical devices, and how do they work?","acceptedAnswer":{"@type":"Answer","text":"\"Connected medical devices\" are devices that can send and receive data to and from another device or the internet (for example, a heartrate monitor that sends patient heartrate data to a physician's tablet through Bluetooth)."}},{"@type":"Question","name":"What role does wearable technology have in the practice of medicine?","acceptedAnswer":{"@type":"Answer","text":"Wearable gadgets may offer reliable vitals readings, allowing clinicians to provide better treatment. Mental health monitoring is a relatively recent use for wearable technology. Wearables may monitor vital signs like heart rate, blood pressure, and body temperature, giving doctors insight into a patient's mental health."}}]}</script><script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/04/future-of-healthcare-wearable-iots-for.html"},"headline":"FUTURE OF HEALTHCARE WEARABLE IOTS FOR PERSON-CENTERED CARE.","description":"WIoT, we think, will alter healthcare practices in the next ten years, allowing for low-cost therapies, early identification of diseases, efficient therapy that can be administered remotely, and patients who don't need to visit their doctors as often.","image":["https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE7o-dHb8989grPTzkcMk1xJUfC6z0uMgl15ZWhuR7vBpEMMffEUeIdQMvowtfOX1BpgiQjkPJfFTPn2k9YOHWLrNVS0IATNm0Id784Sl_2dyajhzI9Zmryw5LBMrOnqebJEEwnPjJmyNE3cA99KHCqOdT_Ct2nKyqITKLwyqykTqxo7c-s9q3PRhm/w400-h225/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFLzWfUeH7cN55C3ZdljonGhBW6VkgqOeymPU3zkm62g-7wDhzdV71DcaX5iSEIjMhbroB6zDCCyYlJfo3d1ZYiJCICzrkLRuuyMSoDFMprmHNFLmryErzmUY9gWm6ZIe47jDMcgKJtH9ifqtfODIn8bveR-P8pI2E-49Qz_-ydV6sphnac9jxLwyG/w400-h156/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM4qnNHPtUfNm_5ywHNJiI7GzAr20eNqwYAXc_yGbTUvjVzhhKpN41wVYx-MOz7g93gH9viHljhgfzbMexuT_1Hp_EHLKHc-cylY6gicpa2NIvnMQUNRgtDKiUZ5a-n2PWDbXucImp71t6xM6GZMcZp8fyFxAV9iQkQhOrsWPuWDDXcf53_vWBlC8G/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PTAsvsAml63rMI0Rh_uZ5UQBpvX8KI_9VvnjbuhDdjfxhQpTfpU5xTRiGkVi32ZaBzipB7GYFqACt8tDv1h5pCqzw_N7WuBfUaCnS7Amqf2aDhx-P36lSWgdfsxM-4_BE7ZEeNSaVxkfGAFXr5x_Q7XYnPHjlbpeVft6_lG_mbnTwpDZnVj4JElf/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh01j1OtXL5dPjRxDvUHw610-YrSPH9BoncB7fyN3IAtqd8pjm59wFV5RAhZUMH2N6QAHSCa4Fj_AOP8QFQ4i9E-e7wJbGJCMdlT_mN0c1kcnHgoFv4sf8sn3UmMI7ypD1-49843htRj5yeTIakv4RZ3Tl2hEFxg8h2mu_Ceb93VKOERGCi5sYPUOq/w400-h400/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-6.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDOnGgrGv6vJmkBUwk6mtpgfnLrdmywWDHXpFtl7THzKya0Lysr8-LbeXrGYCzOgUy1vrfv3yxbI5HZQLJ6nrDstBOXJhyskIjhuRDMACO7kTvGkUnD_Ls-Py5-idSJxLWGM4e4MdnGozuLYZ_BhrI4nLiDN2X9B_MVKKo9OHt__6tflFFjDXE4NSw/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.technologistsinsync.com/p/jai-krishna-ponnappan-publications.html"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":""}</script><div class="mbtTOC"> <button onclick="mbtToggle()">Table Of Contents</button> <ul id="mbtTOC"></ul> </div><p><br /></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE7o-dHb8989grPTzkcMk1xJUfC6z0uMgl15ZWhuR7vBpEMMffEUeIdQMvowtfOX1BpgiQjkPJfFTPn2k9YOHWLrNVS0IATNm0Id784Sl_2dyajhzI9Zmryw5LBMrOnqebJEEwnPjJmyNE3cA99KHCqOdT_Ct2nKyqITKLwyqykTqxo7c-s9q3PRhm/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="344" data-original-width="612" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE7o-dHb8989grPTzkcMk1xJUfC6z0uMgl15ZWhuR7vBpEMMffEUeIdQMvowtfOX1BpgiQjkPJfFTPn2k9YOHWLrNVS0IATNm0Id784Sl_2dyajhzI9Zmryw5LBMrOnqebJEEwnPjJmyNE3cA99KHCqOdT_Ct2nKyqITKLwyqykTqxo7c-s9q3PRhm/w400-h225/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg" width="400" /></a></div><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Millions of individuals all around the globe are affected by chronic illnesses such as diabetes, obesity, and cardiovascular ailments. </span></h3><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">As a result, there is a high need for a strong basis for developing wearable IoT technologies to deploy large-scale wearable sensors that are networked with distant medical infrastructure in order to improve the efficacy and effectiveness of treatment results. </span></li></ul><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: large;">Below, we describe a novel system science for WIoTs that includes operational and clinical elements to recommend future directions: </span></h3><p></p><p></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFLzWfUeH7cN55C3ZdljonGhBW6VkgqOeymPU3zkm62g-7wDhzdV71DcaX5iSEIjMhbroB6zDCCyYlJfo3d1ZYiJCICzrkLRuuyMSoDFMprmHNFLmryErzmUY9gWm6ZIe47jDMcgKJtH9ifqtfODIn8bveR-P8pI2E-49Qz_-ydV6sphnac9jxLwyG/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="240" data-original-width="612" height="156" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFLzWfUeH7cN55C3ZdljonGhBW6VkgqOeymPU3zkm62g-7wDhzdV71DcaX5iSEIjMhbroB6zDCCyYlJfo3d1ZYiJCICzrkLRuuyMSoDFMprmHNFLmryErzmUY9gWm6ZIe47jDMcgKJtH9ifqtfODIn8bveR-P8pI2E-49Qz_-ydV6sphnac9jxLwyG/w400-h156/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg" width="400" /></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Healthcare Wearable Design that is Patient-Friendly.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Consumer usability studies have influenced the design of new wearable devices. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">For example, </span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">A wrist accelerometer disguised as jewelry, or wrist-watches,</span></li><li><span style="font-family: Baskervville; font-size: medium;">The creation of interactive interfaces based on pre-existing touchscreen utilities,</span></li><li><span style="font-family: Baskervville; font-size: medium;">And the abstraction of information provided to patients that borrow from tried and tested kiosks and other similar Human-Interface systems. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Patients can engage with these systems and feel as though they can change some of the settings themselves. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">Furthermore, both<b> publicly financed health systems and commercial health insurance companies are engaged in increasing patient health and activity levels</b> via preventative healthcare efforts. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Some private insurance firms may even provide incentives to promote the usage</b> of pedometers and reward positive health outcomes at yearly exams. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM4qnNHPtUfNm_5ywHNJiI7GzAr20eNqwYAXc_yGbTUvjVzhhKpN41wVYx-MOz7g93gH9viHljhgfzbMexuT_1Hp_EHLKHc-cylY6gicpa2NIvnMQUNRgtDKiUZ5a-n2PWDbXucImp71t6xM6GZMcZp8fyFxAV9iQkQhOrsWPuWDDXcf53_vWBlC8G/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhM4qnNHPtUfNm_5ywHNJiI7GzAr20eNqwYAXc_yGbTUvjVzhhKpN41wVYx-MOz7g93gH9viHljhgfzbMexuT_1Hp_EHLKHc-cylY6gicpa2NIvnMQUNRgtDKiUZ5a-n2PWDbXucImp71t6xM6GZMcZp8fyFxAV9iQkQhOrsWPuWDDXcf53_vWBlC8G/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" width="400" /></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Patient-Physician Interaction is a term that refers to the interaction between a patient and a physician. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Doctors nowadays want to keep an eye on their patients outside of the office. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">In addition, doctors want their patients to be more proactive in their health and medical situations. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;"><b>Interconnections between wearable sensors, mobile phones, and medical infrastructure found in <a href="https://www.lightningiot.com/2021/06/4-Internet-of-Things-Communication-Models.html">WIoTs provide efficient communication</a> between doctors and patients</b>, enabling them to discuss micro-managing interventions, symptom feedback, and capacity to adapt to new therapies digitally. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Depending on the patient's interests, the amount of information given to them might vary: </span></h3><p></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PTAsvsAml63rMI0Rh_uZ5UQBpvX8KI_9VvnjbuhDdjfxhQpTfpU5xTRiGkVi32ZaBzipB7GYFqACt8tDv1h5pCqzw_N7WuBfUaCnS7Amqf2aDhx-P36lSWgdfsxM-4_BE7ZEeNSaVxkfGAFXr5x_Q7XYnPHjlbpeVft6_lG_mbnTwpDZnVj4JElf/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1PTAsvsAml63rMI0Rh_uZ5UQBpvX8KI_9VvnjbuhDdjfxhQpTfpU5xTRiGkVi32ZaBzipB7GYFqACt8tDv1h5pCqzw_N7WuBfUaCnS7Amqf2aDhx-P36lSWgdfsxM-4_BE7ZEeNSaVxkfGAFXr5x_Q7XYnPHjlbpeVft6_lG_mbnTwpDZnVj4JElf/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg" width="400" /></a></div><div class="separator" style="clear: both; text-align: center;"><br /></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;">1) <b>an application may only provide one-line actions</b> such as "walk briskly" or "run for 30 minutes today," </span></p><p><span style="font-family: Baskervville; font-size: medium;">2) <b>an application can be made more detailed by asking the patient </b>to do a 20-minute aerobic activity and a 10-minute anaerobic activity, </span></p><p><span style="font-family: Baskervville; font-size: medium;">3) in addition to the information in option 2, <b>additional reading material or online education material can be shared with the patient to inform them </b>about clinical practice or recent research, and </span></p><p><span style="font-family: Baskervville; font-size: medium;">4) <b>provide a written report to the patient</b>. On the clinician's side, the information on a specific patient may be modified to offer short and then thorough case information to assist the patient in making an intervention or treatment choice. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Clinical guidelines and a range of acceptable values may be presented to clinicians in real-time to aid them in their treatment decisions. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Healthcare Wearable <a href="https://www.lightningiot.com/2021/06/why-iot.html">IoT </a>and Personalization of Treatment. </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">WIoTs have the potential to help personalize therapy. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Each illness has its own set of symptoms, which vary in strength and spatiotemporal pattern depending on the patient. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Physicians, for example, encounter issues when reviewing drug strategies in the treatment of chronic illnesses since their patients may react differently to given medicines. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">In addition, medication adherence monitoring is another area where WIoT may assist patients. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Future research might concentrate on health pattern recognition, in which algorithms in wearable sensors and gateways can recognize a health anomaly or an imminent emergency. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Because the WIoT are in close proximity to the patient, this is feasible. </span></li></ul><p></p><h2 style="text-align: left;"><div style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><br /></span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh01j1OtXL5dPjRxDvUHw610-YrSPH9BoncB7fyN3IAtqd8pjm59wFV5RAhZUMH2N6QAHSCa4Fj_AOP8QFQ4i9E-e7wJbGJCMdlT_mN0c1kcnHgoFv4sf8sn3UmMI7ypD1-49843htRj5yeTIakv4RZ3Tl2hEFxg8h2mu_Ceb93VKOERGCi5sYPUOq/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-6.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="612" data-original-width="612" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhh01j1OtXL5dPjRxDvUHw610-YrSPH9BoncB7fyN3IAtqd8pjm59wFV5RAhZUMH2N6QAHSCa4Fj_AOP8QFQ4i9E-e7wJbGJCMdlT_mN0c1kcnHgoFv4sf8sn3UmMI7ypD1-49843htRj5yeTIakv4RZ3Tl2hEFxg8h2mu_Ceb93VKOERGCi5sYPUOq/w400-h400/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-6.jpg" width="400" /></a></div></div><div style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><span style="color: red; font-family: Baskervville; font-size: large;">Administration and Maintenance of Healthcare Wearable Systems.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Efficient daily management of wearable sensors is a challenge owing to their short battery life, which need recharging on a regular basis. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Elderly folks who experience significant health issues are expected to be the first WIoT users. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">New technologies, like as inductive quick charging, may make remembering to plug and unplug items less of a hassle. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">New techniques of intelligently sampling the sensors may also extend the life of the devices. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Standards & Requirements Of Healthcare Wearables Or WIoT.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">To make the transition from consumer electronics to medical devices, WIoT must fulfill international quality requirements. </span></h3><p><span style="font-family: Baskervville; font-size: medium;">The limitations set by the US Food and Drug Administration (FDA) apply to mainstream medical equipment, therefore wearable sensors are classed as wellness/lifestyle monitoring gadgets to avoid the FDA's strict requirements. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">The tendency is changing, and the FDA has cleared wearable sensors for use in the consumer business. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The Food and Drug Administration (FDA) has established recommendations for wireless medical devices to guarantee that they address important safety concerns connected with radio-frequency wireless systems, short and long-range communication, and secure data transfer. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The FDA and other organizations dealing with medical device regulations are expected to define WIoT in terms of regulatory compliance and usage for medical treatments during the next several years. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Regulatory standards will be generated from large-scale clinical studies since wearable sensors are powered technological equipment worn by people. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Security & Privacy Of Wearables.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDOnGgrGv6vJmkBUwk6mtpgfnLrdmywWDHXpFtl7THzKya0Lysr8-LbeXrGYCzOgUy1vrfv3yxbI5HZQLJ6nrDstBOXJhyskIjhuRDMACO7kTvGkUnD_Ls-Py5-idSJxLWGM4e4MdnGozuLYZ_BhrI4nLiDN2X9B_MVKKo9OHt__6tflFFjDXE4NSw/s612/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="408" data-original-width="612" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDOnGgrGv6vJmkBUwk6mtpgfnLrdmywWDHXpFtl7THzKya0Lysr8-LbeXrGYCzOgUy1vrfv3yxbI5HZQLJ6nrDstBOXJhyskIjhuRDMACO7kTvGkUnD_Ls-Py5-idSJxLWGM4e4MdnGozuLYZ_BhrI4nLiDN2X9B_MVKKo9OHt__6tflFFjDXE4NSw/w400-h266/Healthcare%20Wearable%20Device-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg" width="400" /></a></div><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">As the internet develops, privacy and security concerns continue to arise. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Previously, only desktop PCs were vulnerable to cyber intrusions, but today mobile phones and wearable gadgets are constantly under attack by highly-skilled, coordinated hackers. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">WIoT is concerned with data gathered from and delivered to people. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Despite the fact that data is acquired via seemingly harmless wearable sensors, it is exposed to major privacy problems. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Some wearable gadgets, for example, acquire sensitive information such as the user's exact position and movement activities, which might jeopardize the user's privacy if the information is not protected during storage or transmission. </span></li></ul><ul style="text-align: left;"><li><b><span style="font-family: Baskervville; font-size: medium;">We need robust<a href="https://www.technologistsinsync.com/2022/03/cyber-security-information-management.html"> network security</a> architecture for short- and long-range communication to limit the danger of cyber assaults on WIoT. </span></b></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Each tier of the WIoT, from <a href="https://www.technologistsinsync.com/2022/03/cyber-security-proposals-for-context.html">wearable sensors</a> to gateway devices to the cloud, should take extra efforts to protect users' <a href="https://www.lightningiot.com/2021/06/internet-of-things-security-and-privacy.html">privacy and security</a>. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">Thoughts On The Future Of Wearable IoTs In Healthcare.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">WIoT (Wearable Internet of Things) is a new technology that has the potential to change the <a href="https://www.technologistsinsync.com/2022/03/artificial-intelligence-in-medicine.html">healthcare </a>industry by providing an environment for automated telehealth interventions. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">We introduced a<a href="https://www.lightningiot.com/2022/04/architecture-wearable-device.html"> WIoT concept that outlines its architectural components, such as wearable sensors, internet-connected gateways, and cloud and big data support</a>, for unobtrusively monitoring human health and habits. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">WIoT must not only solve the technical obstacles of creating a flexible <a href="https://www.lightningiot.com/2021/06/internet-of-things-architecture.html">framework for networking, compute, storage, and visualization </a>to reach multidimensional success, but it must also strengthen its position in building clinically acceptable and operational solutions. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">WIoT, we think, will alter healthcare practices in the next ten years, allowing for low-cost therapies, early identification of diseases, efficient therapy that can be administered remotely, and patients who don't need to visit their doctors as often.</span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p><p><b><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><b style="color: #ffa400;"><span style="font-family: Baskervville; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://www.instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><b style="color: #ffa400;"><br /></b></p><p><b style="color: #ffa400;"><br /></b></p><p><b style="color: #ffa400;"><br /></b></p><p><br /></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: large;">FREQUENTLY ASKED QUESTIONS:</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What are Healthcare Wearables and How Do They Work? </span></h2><p><span style="font-family: Baskervville; font-size: medium;">Wearables are tiny electronic devices that can detect temperature, blood pressure, blood oxygen, breathing rate, sound, GPS position, elevation, physical movement, changes in direction, and the electrical activity of the heart, muscles, brain, and skin when they are worn on the body. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What are three of the most common wearable devices? </span></h2><p><span style="font-family: Baskervville; font-size: medium;">Wearable technology includes your Apple Watch and Fitbit, but they aren't the only products being produced today. Smart watches, VR and AR technologies, smart jackets, and a slew of other products are all pointing us in the direction of a more connected existence. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What are some examples of healthcare technology that can be worn? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Skin temperature, sweat sensors, heart rate monitors, glucose monitors, holter monitors, and other wearables for early illness diagnoses are examples. How medical wearable software works: For analysis, the cloud server receives patient health data from devices that continuously monitor the patient's vitals. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What role will wearable medical gadgets play in the future of healthcare? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> To increase the accuracy of clinical evaluation, wearable sensors for remote healthcare monitoring systems are being created. Electrocardiograph (EKG) sensors in wearables can monitor a patient's heart activity by detecting several physiological signals. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What role do wearable gadgets play in healthcare? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Patient monitoring, surveillance, screening, diagnosis, and therapy, post-treatment, and continuous management may all be done using wearable devices. These gadgets also use real-time physiological input to verify and validate therapy efficacy. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What do smart wearables entail? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Smart electronic devices (electronic devices with microcontrollers) that are worn close to and/or on the surface of the skin, where they detect, analyze, and transmit information, are known as wearable technology, wearables, fashion technology, smartwear, tech togs, streetwear tech, skin electronics, or fashion electronics. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What is the role of IoT in healthcare? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Hospitals and the Internet of Things Apart from monitoring patients' health, hospitals may benefit from IoT devices in a variety of ways. Medical equipment such as wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring equipment are tracked in real time using IoT devices with sensors. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What are smart medical gadgets, and how do they work? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> A smart medical gadget, which is equipped with wireless IoT technology and can monitor and send important data in real time, connects physicians with patients at home or on the way to the hospital. These gadgets provide patients a lot of freedom while also allowing healthcare practitioners to keep an eye on them from afar. </span></p><p><br /></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Do wearables have a positive impact on one's health? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Wearable technologies have shown to be beneficial in assisting patients and clinicians in developing treatment plans and tracking results. Wearable gadgets may also aid with chronic disease self-management by delivering real-time data. </span></p><p><br /></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Is wearable technology a component of orthopedic health care's future? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Wearable technology in orthopedics might help to expedite patient-physician communication, which could help to alleviate the burden of growing health-care expenses and exhaustion caused by electronic health data. </span></p><p><br /></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What is the significance of wearable technology? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Wearable technology allows us to measure our fitness levels, see text messages more quickly, and track our whereabouts using GPS. Best of all, most of the gadgets that enable us to do so are hands-free and portable, so we don't have to take them out of our pockets. </span></p><p><br /></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What is the present state of wearable technology? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> According to a HIMSS poll, more than half of healthcare practitioners regarded wearable technology to be beneficial in monitoring their patients. They use commercial and personal-grade wearables to manage prescriptions, check health conditions and vitals, follow post-operative patients' recovery, and track sleep. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What exactly qualifies as wearable technology? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Wearable technology, often known as "wearables," is a class of electronic devices that may be worn as jewelry, embedded in clothes, implanted in the user's body, or even tattooed on the skin. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What IoT devices are utilized in the healthcare industry? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Devices for medical monitoring Patient monitoring using the internet. The most popular use of IoT devices in healthcare is remote patient monitoring. Glucose monitoring is a procedure that involves measuring the amount of glucose in the blood. Monitoring of the heart rate. Hand hygiene is being monitored. Monitoring depression and mood. Parkinson's disease is being monitored. Inhalers that are linked. Sensors that can be ingested. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What are linked medical devices, and how do they work? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> "Connected medical devices" are devices that can send and receive data to and from another device or the internet (for example, a heartrate monitor that sends patient heartrate data to a physician's tablet through Bluetooth). </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">What role does wearable technology have in the practice of medicine? </span></h2><p><span style="font-family: Baskervville; font-size: medium;"> Wearable gadgets may offer reliable vitals readings, allowing clinicians to provide better treatment. Mental health monitoring is a relatively recent use for wearable technology. Wearables may monitor vital signs like heart rate, blood pressure, and body temperature, giving doctors insight into a patient's mental health.</span></p><p><br /></p><p><br /></p><p><br /></p><h2><span style="color: red; font-family: Baskervville; font-size: large;">References and Further Reading:</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul><li><span style="font-family: Baskervville; font-size: medium;">Asada HH, Shaltis P, Reisner A, Rhee S, Hutchinson RC: Mobile monitoring with wearable photoplethysmographic biosensors. IEEE Eng Med Biol Mag (2003), 22:28-40.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Batch, Bryan C., et al. "Weight loss intervention for young adults using mobile technology: Design and rationale of a randomized controlled trial—Cell Phone Intervention for You (CITY)." Contemporary clinical trials 37.2 (2014): 333-341.</span></li><li><span style="font-family: Baskervville; font-size: medium;">G. Yang, et al. "A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor and Intelligent Medicine Box," IEEE Transactions on Industrial Informatics (TII), doi: 10.1109/TII.2014.2307795, 2014.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.</span></li><li><span style="font-family: Baskervville; font-size: medium;">F. Seoane, et al. “Sensorized Garments and Textrode-Enabled Measurement Instrumentation for Ambulatory Assessment of the Autonomic Nervous System Response in the ATREC Project” vol.13, no.7, pp. 8997-9015, Jul. 2013.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. "Mobile cloud computing: A survey." Future Generation Computer Systems 29.1 (2013): 84-106.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Fortino, Giancarlo, et al. "Bodycloud: a saas approach for community body sensor networks." Future Generation Computer Systems 35 (2014): 62-79.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Market Study Report, “Wearable Computing Devices, Like Apple’s iWatch, Will Exceed 485 Million Annual Shipments by 2018”, ABI Research. Feb. 21, 2013. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Mankodiya, K., et al. "Wearable ECG module for long-term recordings using a smartphone processor." Proceedings of the 5th International Workshop on Ubiquitous Health and Wellness, Denmark. 2010.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Press Release, “FDA Clears NeuroMetrix Wearable Technology for Over-the-Counter Use in Treatment of Chronic Pain”. Jul 18, 2014. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Sharma, Vinod, et al. "SPARK: Personalized Parkinson Disease Interventions through Synergy between a Smartphone and a Smartwatch." Design, User Experience, and Usability. Springer International Publishing, 2014. 103-114.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Terry G. Mahn, “Wireless Medical Technologies: Navigating Goverment Regulation in New Medical Age”. A report on medical device regulation. Released on Nov. 2013. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Zhang, Q., Ren, L., & Shi, W. HONEY: a multimodality fall detection and telecare system. Telemedicine and e-Health, (2013): 19(5), 415-429.</span></li></ul><p><span style="font-size: medium;"><br /></span></p><p><br /></p><p></p><p><br /></p><script>mbtTOC();</script>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-55645245264964269152022-04-09T04:51:00.004-07:002022-04-09T05:18:34.674-07:00Architecture Wearable Device.<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2022/04/architecture-wearable-device.html"},"headline":"Architecture Wearable Device.","description":"The fact that wearables are constrained in size and have limited computational power should be noted, as a typical system architecture would include a gateway to the Internet (e.g., a smartphone) with a dedicated application used for configuring the device as well as processing the data received from the device.","image":["https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYs3TilY7kJAQ_CRKm79BxttxGusa4GQMhfA6VW5ZCvuQugfFXWgU3aEWoktR02LGqNb3qF2wiBSxJnM889o0naA9Dxc7zQEzutvdLxlXvxDFnrQ_KZiL3Gpx078QiQxeuFvT4ai5ULGd98SiEngmYj4V6ch80BS2cVgmVOYMVx4KQe8NeWRXy1YP-/w400-h220/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3pE36AJHE9fHlqEFlkDt6RZiM3jK9KAZD53D6194_IJUg33Y-aTr9TpFjM_4Whd8hfYVaMSSPTklPnQoSrj906lfloy8iZ-w09pDITfsySYMqxfFb0ttZyCCHY1oFXsvIyQTiv4fafrUPdAGib3rlD821F-VBVcZgfUkyQOl03aX1s9riGqtOS4jl/w400-h399/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQNHcLtmI914qMpeiuphhWwTY5_AJKsXzxud3A4Z7j1V9S6ku9LK8tKUTzSNQ58AEitXjkdwLSVjxQrdfwZH5sbUsr4yO4E16XZMo5z4OCBGyFbCD0ltih8Ar503YX9Y_5gYoP1OMX6cxzai8fC2x36pqZH70PlJRqg_kg77DprAyvRX2iQebsWJz3/w400-h181/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNNF-tzCBYw2XK1bs0T2FfeZNm_f3fx6FYcFf_liGYEPNLmL3e5mAQOEAo8SZKSdKP6GGsFbm7slMLYrX120dl11PIa_3BAkSQVPspa2KCi2iDg2U8TAi90XZkrJG6m30cVNNKSjgiVkKuU0ia4qM_OXbNSypl4y0SEv5IPU9GrdadZC3PsMFq_QB_/w400-h205/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg","https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcF9GE7u-NrnYQLx6GGKhDtTy20pnkXBXKZvz7nOb8Djzgo8Cg-Jvc_nUxVIRFz4g0yExJY3k539ASFFJrdg36N5287EwR0MTXtN_JEkkHwvLpDXH0Oo5tUEVSSU2L4xz70A7yNwaUC6ouOZtxuJylX4f03Zt9LolPCTNR2CmJLoqxTTVI8mW_u8kS/w400-h276/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.jaikrishnaponnappan.com/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":""}</script><div class="mbtTOC"> <button onclick="mbtToggle()">Table Of Contents</button> <ul id="mbtTOC"></ul> </div><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">To create complex wearable devices, one may make use of one of the<a href="https://www.lightningiot.com/2021/06/internet-of-things-architecture.html"> Internet of Things</a> designs outlined in this paper. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYs3TilY7kJAQ_CRKm79BxttxGusa4GQMhfA6VW5ZCvuQugfFXWgU3aEWoktR02LGqNb3qF2wiBSxJnM889o0naA9Dxc7zQEzutvdLxlXvxDFnrQ_KZiL3Gpx078QiQxeuFvT4ai5ULGd98SiEngmYj4V6ch80BS2cVgmVOYMVx4KQe8NeWRXy1YP-/s932/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="512" data-original-width="932" height="220" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYs3TilY7kJAQ_CRKm79BxttxGusa4GQMhfA6VW5ZCvuQugfFXWgU3aEWoktR02LGqNb3qF2wiBSxJnM889o0naA9Dxc7zQEzutvdLxlXvxDFnrQ_KZiL3Gpx078QiQxeuFvT4ai5ULGd98SiEngmYj4V6ch80BS2cVgmVOYMVx4KQe8NeWRXy1YP-/w400-h220/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-1.jpg" width="400" /></a></div><br /><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><br /></p><p><span style="font-family: Baskervville; font-size: medium;"><b>The fact that wearables are <a href="https://www.lightningiot.com/2021/06/IoT-Knowledge-Hierarchy-and-Technology-Challenges.html">constrained </a>in size and have limited <a href="https://www.technologistsinsync.com/2022/01/optical-computing-systems-to-speed-up.html">computational power</a> should be noted, as a typical system architecture would include a gateway to the <a href="https://www.jaikrishnaponnappanweb.com/2012/10/internet-governance-in-changing-world.html">Internet </a>(e.g., a <a href="https://www.technologistsinsync.com/2022/03/cyber-security-location-and-context.html">smartphone</a>) with a dedicated application used for configuring the device as well as processing the data received from the device. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">It is also possible to <b>utilize the gateway device for data visualization purposes</b>, in which case relevant processed data is converted into a graphical representation. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;"><b>A low power transceiver </b>(e.g., Bluetooth Low Energy (BLE)) is used to transmit the received data wirelessly, which is then processed in the device's memory. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">In the <b><a href="https://www.lightningiot.com/2021/06/IoT-Knowledge-Hierarchy-and-Technology-Challenges.html">Cloud, data processing</a> is more complete and analytical</b>, allowing for more <a href="https://www.technologistsinsync.com/2022/03/cyber-security-scenarios-for-context.html">informed decisions.</a> </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">When finished processing, the <b>data is <a href="https://www.lightningiot.com/2021/06/internet-of-insecure-things.html">transmitted </a>back to the wearable device for feedback</b>, with a copy of the data being stored in the data center. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Obviously, the <b>gateway is responsible for establishing network connection</b> in order to facilitate such <a href="https://www.lightningiot.com/2021/06/4-Internet-of-Things-Communication-Models.html">back-and-forth communication</a>. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;"><b>Illustration below depicts the architecture of a typical wearable device in terms of its functionality. </b></span></h2><p></p><div class="separator" style="clear: both; text-align: center;"><br /></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3pE36AJHE9fHlqEFlkDt6RZiM3jK9KAZD53D6194_IJUg33Y-aTr9TpFjM_4Whd8hfYVaMSSPTklPnQoSrj906lfloy8iZ-w09pDITfsySYMqxfFb0ttZyCCHY1oFXsvIyQTiv4fafrUPdAGib3rlD821F-VBVcZgfUkyQOl03aX1s9riGqtOS4jl/s528/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="526" data-original-width="528" height="399" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3pE36AJHE9fHlqEFlkDt6RZiM3jK9KAZD53D6194_IJUg33Y-aTr9TpFjM_4Whd8hfYVaMSSPTklPnQoSrj906lfloy8iZ-w09pDITfsySYMqxfFb0ttZyCCHY1oFXsvIyQTiv4fafrUPdAGib3rlD821F-VBVcZgfUkyQOl03aX1s9riGqtOS4jl/w400-h399/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-2.jpg" width="400" /></a></div><br /><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>It should be emphasized that wearables might be either more or less sophisticated than what is shown, depending on their purpose. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b><br /></b></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">For example, certain wearable navigators used by professional hikers link directly to a Global Positioning System (<a href="https://www.technologistsinsync.com/2021/07/atomic-clocks.html">GPS</a>), avoiding the gateway layer in the process, and so saving time. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Some early fitness trackers, on the other hand, relied only on a smartphone for processing and input, eliminating the necessity for a <a href="https://www.jaikrishnaponnappanweb.com/2012/07/disaster-recovery-virtualization-using.html">Cloud </a>service.</span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">THE ARCHITECTURE OF WEARABLE <a href="https://www.lightningiot.com/2021/06/why-iot.html">IoTS</a>.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">Creating a WIoT ecosystem in which body-worn sensors smoothly synchronize data with cloud services via the IoT infrastructure is no longer adequate; rather, it has become critical to construct independent wearable devices in order to succeed in the future. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><b>On top of the IoT architecture is now being developed a revolutionary integrative framework for the Internet of Things (IoT). </b></span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQNHcLtmI914qMpeiuphhWwTY5_AJKsXzxud3A4Z7j1V9S6ku9LK8tKUTzSNQ58AEitXjkdwLSVjxQrdfwZH5sbUsr4yO4E16XZMo5z4OCBGyFbCD0ltih8Ar503YX9Y_5gYoP1OMX6cxzai8fC2x36pqZH70PlJRqg_kg77DprAyvRX2iQebsWJz3/s1240/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="560" data-original-width="1240" height="181" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQNHcLtmI914qMpeiuphhWwTY5_AJKsXzxud3A4Z7j1V9S6ku9LK8tKUTzSNQ58AEitXjkdwLSVjxQrdfwZH5sbUsr4yO4E16XZMo5z4OCBGyFbCD0ltih8Ar503YX9Y_5gYoP1OMX6cxzai8fC2x36pqZH70PlJRqg_kg77DprAyvRX2iQebsWJz3/w400-h181/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-3.jpg" width="400" /></a></div><br /><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">The following covers all of the components of the Internet of Things architecture, as well as their interconnections, a system that would be beneficial to the healthcare business in a number of different ways. </span></p><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">Body Area Sensors.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">In the Internet of Things, wearable body area sensors (WBAS) are components that<a href="https://www.lightningiot.com/2021/06/internet-of-things-security-and-privacy.html"> unobtrusively encircle the body</a> in order to collect health-centric data. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNNF-tzCBYw2XK1bs0T2FfeZNm_f3fx6FYcFf_liGYEPNLmL3e5mAQOEAo8SZKSdKP6GGsFbm7slMLYrX120dl11PIa_3BAkSQVPspa2KCi2iDg2U8TAi90XZkrJG6m30cVNNKSjgiVkKuU0ia4qM_OXbNSypl4y0SEv5IPU9GrdadZC3PsMFq_QB_/s1047/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="537" data-original-width="1047" height="205" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNNF-tzCBYw2XK1bs0T2FfeZNm_f3fx6FYcFf_liGYEPNLmL3e5mAQOEAo8SZKSdKP6GGsFbm7slMLYrX120dl11PIa_3BAkSQVPspa2KCi2iDg2U8TAi90XZkrJG6m30cVNNKSjgiVkKuU0ia4qM_OXbNSypl4y0SEv5IPU9GrdadZC3PsMFq_QB_/w400-h205/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-4.jpg" width="400" /></a></div><br /><p></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><span style="color: red;">WBAS are primarily responsible for,</span> </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><p><span style="font-family: Baskervville; font-size: medium;">1) <b>collecting data from the body, either directly from the body through contact sensors or indirectly from the body </b>and its behaviors through peripheral sensors (see illustration above), and </span></p><p><span style="font-family: Baskervville; font-size: medium;">2) <b>preparing the data for either on-board analysis for close-loop feedback</b> or remote transmission for comprehensive analysis and decision support. </span></p></blockquote><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>WBAS, whether they are commercial products or laboratory prototypes, are bundled with tiny sensor gear, an embedded CPU with storage capabilities, power management, and optional communication circuits, depending on their intended use. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">Wearable sensors such as the <a href="https://www.gadgetreview.com/bodymedia-fit-bw-review">BodyMedia wristband</a> (<a href="https://www.jawbone.com/">Jawbone Inc., USA</a>) are examples of peripheral wearable sensors that function on algorithms that need little computing and just the bare minimum of hardware, with the purpose of encouraging users to keep an active lifestyle. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Because they are needed to give accurate, high-resolution clinical information about patients in real time, the majority of contact-type wearable sensors are equipped with adequate electronics and computational capabilities. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>In wearable technology, a novel interface between the sensor and the body is essential for efficient data collecting. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4208240/">Pulse oximetry using a<b> ring sensor</b></a>, <b><a href="https://www.mayoclinic.org/tests-procedures/holter-monitor/about/pac-20385039">chest-worn ECG monitor</a></b>, and <b><a href="https://www.researchgate.net/publication/332047677_Multifunctional_wearable_biopatch_for_real-time_monitoring_of_physiological_activities">attachable BioPatch</a></b> are only a few examples of innovative sensor sites that provide continuous access to the body's vital signs. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3><span style="color: red; font-family: Baskervville; font-size: medium;">Smart textiles are becoming more popular. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.apexmills.com/media_post/smart-textiles/">Smart textiles</a> are at the forefront of wearable electronics that are woven into the fabrics of clothing in order to offer <b>unobtrusive health monitoring for patients </b>who live in their homes, away from hospitals and physicians. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Smart clothing equipped with textile-based sensors have been proven to be effective in <b>monitoring the reaction of the autonomous nervous system. </b></span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Regardless of the end-user applications for which they are designed, WBAS are needed to fulfill worldwide quality standards in order to guarantee that they can operate for an extended period of time with the least amount of monitoring and management. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">The need for wearable sensors has prompted the downsizing of technology and the development of energy-efficient methods of lowering power consumption while maintaining clinically acceptable performance criteria. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Researchers continue to face difficulties in managing data from wearable sensors since such data must be tagged with information such as time, activity, and location. </span></p><p><br /></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">Gateways that are linked to the internet.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;"><b>Because of their low computational power and connection capacity, WBAS are seldom used as stand-alone systems in today's world. </b></span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">As a result, they must transport data to powerful computing resources, which may be either companion devices such as smartphones, tablets, and laptop PCs, or cloud computing servers that are situated in a different location. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The usage of companion devices as gateway devices is common in both cases of data transfer, and they constitute an essential class of WIoT devices that allow information to flow from sensors to the cloud or server centers for storage and further analysis. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Wearable sensors exchange data with the Gateway devices through short-range communication technologies such as Bluetooth, while heterogeneous networks such as WIFI and GSM are utilized to deliver the data to the cloud via the Gateway devices. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">The ability to retain data, execute certain pre-processing algorithms to determine whether or not the data is clinically relevant, and broadcast the data sporadically to distant servers are all capabilities of some Gateway devices. </span></h3><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">Weight scales may transfer data to a mobile smartphone, which then sends the information to a cloud-based server, allowing physicians to analyze weight control in children and adolescents. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Smartphones communicate with cloud servers in order to monitor fall detection in older people. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>Examples such as these illustrate how wearable gadgets or other devices used by the user connect with a smartphone or with a phone in order to transmit information to distant servers. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;"><b>Mobile Cloud Computing (MCC)</b> is a paradigm that optimizes<a href="https://www.lightningiot.com/2021/06/4-Internet-of-Things-Communication-Models.html"> mobile computing and networking protocols</a> in order to reduce the load of computing on smartphones in order to increase the performance and battery life of smartphones. </span></li></ul><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The Internet of Things (IoT) may reap considerable benefits from MCC since it allows for <b>data storage and analysis to take place on cloud platforms</b>. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">Support for the Cloud and <a href="https://www.jaikrishnaponnappanweb.com/2015/03/key-big-data-challenges.html">Big Data</a>.</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>It is expected that the confluence of intimate companions—wearable sensors and smartphones—will result in an unparalleled influx of medical data into cloud storage facilities. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;">As crucial as getting information from the body is the process of gaining knowledge from that information. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Patients only profit from wearing sensors when clever algorithms evaluate the data and provide recommendations on what to do as a result of the findings. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>A cloud computing infrastructure can make the administration of wearable data easier, as well as supporting sophisticated data mining, <a href="https://www.technologistsinsync.com/2022/02/artificial-intelligence-machine.html">machine learning</a>, and medical big data analytics capabilities. </b></span></p><p><span style="font-family: Baskervville; font-size: medium;">In the next years, the cloud-assisted BAS (CaBAS) will emerge as a promising technology that will enable the integration of MCC and WBAS, hence facilitating the creation of scalable, data-driven ubiquitous healthcare. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">CaBAS can provide significant benefits to the Internet of Things, as illustrated in below. </span></h3><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcF9GE7u-NrnYQLx6GGKhDtTy20pnkXBXKZvz7nOb8Djzgo8Cg-Jvc_nUxVIRFz4g0yExJY3k539ASFFJrdg36N5287EwR0MTXtN_JEkkHwvLpDXH0Oo5tUEVSSU2L4xz70A7yNwaUC6ouOZtxuJylX4f03Zt9LolPCTNR2CmJLoqxTTVI8mW_u8kS/s808/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="559" data-original-width="808" height="276" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcF9GE7u-NrnYQLx6GGKhDtTy20pnkXBXKZvz7nOb8Djzgo8Cg-Jvc_nUxVIRFz4g0yExJY3k539ASFFJrdg36N5287EwR0MTXtN_JEkkHwvLpDXH0Oo5tUEVSSU2L4xz70A7yNwaUC6ouOZtxuJylX4f03Zt9LolPCTNR2CmJLoqxTTVI8mW_u8kS/w400-h276/Wearable%20Device%20Architecture-LightningIoT-Jai-Krishna-Ponnappan-Media-5.jpg" width="400" /></a></div><br /><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">These include,</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><p><span style="font-family: Baskervville; font-size: medium;">1) <b>energy-efficient routing protocols</b> that can network smartphones and wearable sensors for handshaking and seamless data transfer, </span></p><p><span style="font-family: Baskervville; font-size: medium;">2) <b>event-based processing</b> that can reduce unwanted data processing on resource-constrained wearable sensors, and </span></p><p><span style="font-family: Baskervville; font-size: medium;">3) <b>annotated data logs</b> that can add activity-level information on top of clinical data for enhancing the accuracy of machine learning algorithms on the Cloud data set.</span></p></blockquote><p><br /></p><p><br /></p><p><b><span style="font-family: Baskervville; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p><b style="color: #ffa400;"><span style="font-family: Baskervville; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://www.linkedin.com/in/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://www.instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><p><b style="color: #ffa400;"><br /></b></p><p><br /></p><p><br /></p><h2 style="text-align: left;"><span style="color: red; font-family: Baskervville; font-size: medium;">References and Further Reading:</span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Asada HH, Shaltis P, Reisner A, Rhee S, Hutchinson RC: Mobile monitoring with wearable photoplethysmographic biosensors. IEEE Eng Med Biol Mag (2003), 22:28-40.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Batch, Bryan C., et al. "Weight loss intervention for young adults using mobile technology: Design and rationale of a randomized controlled trial—Cell Phone Intervention for You (CITY)." Contemporary clinical trials 37.2 (2014): 333-341.</span></li><li><span style="font-family: Baskervville; font-size: medium;">G. Yang, et al. "A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor and Intelligent Medicine Box," IEEE Transactions on Industrial Informatics (TII), doi: 10.1109/TII.2014.2307795, 2014.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.</span></li><li><span style="font-family: Baskervville; font-size: medium;">F. Seoane, et al. “Sensorized Garments and Textrode-Enabled Measurement Instrumentation for Ambulatory Assessment of the Autonomic Nervous System Response in the ATREC Project” vol.13, no.7, pp. 8997-9015, Jul. 2013.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Fernando, Niroshinie, Seng W. Loke, and Wenny Rahayu. "Mobile cloud computing: A survey." Future Generation Computer Systems 29.1 (2013): 84-106.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Fortino, Giancarlo, et al. "Bodycloud: a saas approach for community body sensor networks." Future Generation Computer Systems 35 (2014): 62-79.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Market Study Report, “Wearable Computing Devices, Like Apple’s iWatch, Will Exceed 485 Million Annual Shipments by 2018”, ABI Research. Feb. 21, 2013. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Mankodiya, K., et al. "Wearable ECG module for long-term recordings using a smartphone processor." Proceedings of the 5th International Workshop on Ubiquitous Health and Wellness, Denmark. 2010.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Press Release, “FDA Clears NeuroMetrix Wearable Technology for Over-the-Counter Use in Treatment of Chronic Pain”. Jul 18, 2014. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Sharma, Vinod, et al. "SPARK: Personalized Parkinson Disease Interventions through Synergy between a Smartphone and a Smartwatch." Design, User Experience, and Usability. Springer International Publishing, 2014. 103-114.</span></li><li><span style="font-family: Baskervville; font-size: medium;">Terry G. Mahn, “Wireless Medical Technologies: Navigating Goverment Regulation in New Medical Age”. A report on medical device regulation. Released on Nov. 2013. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Zhang, Q., Ren, L., & Shi, W. HONEY: a multimodality fall detection and telecare system. Telemedicine and e-Health, (2013): 19(5), 415-429.</span></li></ul><span style="font-size: medium;"><br /></span><p></p><p><br /></p><script>mbtTOC();</script>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-36150787377297328802021-06-04T17:43:00.012-07:002022-09-15T13:52:31.809-07:004 Internet of Things Communication Models<script type="application/ld+json">{"@context":"https://schema.org","@type":"Article","mainEntityOfPage":{"@type":"WebPage","@id":"https://www.lightningiot.com/2021/06/4-Internet-of-Things-Communication-Models.html"},"headline":"4 Internet of Things Communication Models","description":"The Internet Architecture Board (IAB) elucidates a regulated architectural text for how little, well-dressed IoT system items interact link in terms of their methodological communication models.","image":["https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrwduRGL8Q1kfB9qRIlm-j1Rgt4xmnqeS1IRFkJ5HyCuzqzISaVy8778mZn3S1pNJByd8czKnzEquVXD14k6HSildVjTASbi5NbzWknjPeIAgSErSyvY4WiscN1O3RYE5wq3JFaLhDkw/w400-h289/IoT-communication-model-LightningIoT-Jai-Krishna-Ponnappan.png","https://blogger.googleusercontent.com/img/a/AVvXsEgNTMU7FThNYWearQpPOqbipZ1XLCscV_vv6aetZluPEGTmKUSCngdsfT4WA5VwErlj51AT8YUMnLKIH2n_YKf7qah06lBCNjTT4vNEwcipU6WNrpRy5SXqAw168Jrx0K6QNMylCjOQHOZzwHtKB5u1m1_B26wgOVCSFCahG9wCfZAJrqPeupXwD8QM=w400-h225","https://blogger.googleusercontent.com/img/a/AVvXsEhnYHRTj5qixb2iM_4UPnJoq_4s4Q2xFVFFne-MDxE6I0UZZMvDWjcsPw68MHYDYAxKhz74Ona8BeWqa20cZfvFphifMOg7lSKfivgi8R3bJsmTmQFxbea5q2cZOoCnyoRv3A9umGy2X9bVMkPGRpt323UmOs_GR9bmtGFa9A24bsI4gXi1Y_PmUHxz=w400-h204","https://blogger.googleusercontent.com/img/a/AVvXsEgPfyjCNVUBMWXrJuENeETDXHhEUFZnv4Qq2lsFi-6KJPqbUZ2rt4AKAg3ubGQndAChRaPH52NXwXJPiE7WB5GJ16m_TH3Ac5jgG0nKfgXd8X3DawQ4t9uOfH6HAL98t43bZQmChq00CjZaVsz5Q9T14JdNK9tqhkOFipCdcOzt9SyQvbQgBIa_o8JY","https://blogger.googleusercontent.com/img/a/AVvXsEh4GqhWNrM2Czxy1EqOUf5lRnccXlO4wfA-utlLItK3_VyP2DkI2PuTCjeDxFAb4phBMQvzwDg2y6_sB1S0eoiFxmAAq01rkXZWr8Xrp65ZfaNAyBhTvnD-LtIL0qdYFeOwrPKoPbKbFEuOfzC8mZ46BR0sC0oQcu7lrukOfKzABCMOQHtunN9adzjz=w400-h225"],"author":{"@type":"","name":"Jai Krishna Ponnappan","url":"https://www.linkedin.com/in/jaikrishnaponnappan/"},"publisher":{"@type":"Organization","name":"","logo":{"@type":"ImageObject","url":""}},"datePublished":"2021-06-04","dateModified":"2022-09-15"}</script><p><span style="font-family: inherit; font-size: medium;"> </span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrwduRGL8Q1kfB9qRIlm-j1Rgt4xmnqeS1IRFkJ5HyCuzqzISaVy8778mZn3S1pNJByd8czKnzEquVXD14k6HSildVjTASbi5NbzWknjPeIAgSErSyvY4WiscN1O3RYE5wq3JFaLhDkw/s704/IoT-communication-model-LightningIoT-Jai-Krishna-Ponnappan.png" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: inherit; font-size: medium;"><img border="0" data-original-height="508" data-original-width="704" height="289" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMrwduRGL8Q1kfB9qRIlm-j1Rgt4xmnqeS1IRFkJ5HyCuzqzISaVy8778mZn3S1pNJByd8czKnzEquVXD14k6HSildVjTASbi5NbzWknjPeIAgSErSyvY4WiscN1O3RYE5wq3JFaLhDkw/w400-h289/IoT-communication-model-LightningIoT-Jai-Krishna-Ponnappan.png" width="400" /></span></a></div><span style="font-family: inherit; font-size: medium;"><br /></span><p></p><p><span style="font-family: inherit; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;"><span>4 IoT Models of Communication (</span>Internet Architecture Board)</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;">The <b><a href="https://www.iab.org/" target="_blank">Internet Architecture Board (IAB)</a></b> elucidates a regulated
architectural text for how little, well-dressed IoT system items interact link
in terms of their methodological communication models. </span></p><h3 style="text-align: left;"><span style="color: red; font-family: inherit; font-size: medium;">Here are a few
communication models that are often utilized by IoT devices and objects:</span></h3><div style="text-align: center;"><span style="color: red; font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiOsg-XsfuSl03gW8DTJ2kGthG6Z7KNSY0xv62HeFDIefzpiYHhE8d_5XQhJsLrZA0zFbDWB11H_L1dgy47NQb-YH-DcVm1LqrylCY8ao0EDAWae2BibM-DFBFlJfkqWjGv0_7V_tNQkriF6vAhNW9LNDeA6W2Qm2AbyBIDLeoKXvP8gh5CYIVziee6" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="583" data-original-width="812" height="288" src="https://blogger.googleusercontent.com/img/a/AVvXsEiOsg-XsfuSl03gW8DTJ2kGthG6Z7KNSY0xv62HeFDIefzpiYHhE8d_5XQhJsLrZA0zFbDWB11H_L1dgy47NQb-YH-DcVm1LqrylCY8ao0EDAWae2BibM-DFBFlJfkqWjGv0_7V_tNQkriF6vAhNW9LNDeA6W2Qm2AbyBIDLeoKXvP8gh5CYIVziee6=w400-h288" width="400" /></a></span></div><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p>
<h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">1. Device to Device communication</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgHDelomYGxmhfXhYoRr_eoQcmobVgngQQqTtZOdxmPZWPu3yuT04i4GGAM4yggM6VdgkpfydzF6a88vveVNMk1_DOrW36qiY41zITSdfCVXckjuAKru54yhsoTZQrk5qJRLBjQMQwS22AhppU5BAjDCQkA_Is4ReGFCyQAp-4myIkPc5GC0f9FozXe" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="268" data-original-width="284" height="240" src="https://blogger.googleusercontent.com/img/a/AVvXsEgHDelomYGxmhfXhYoRr_eoQcmobVgngQQqTtZOdxmPZWPu3yuT04i4GGAM4yggM6VdgkpfydzF6a88vveVNMk1_DOrW36qiY41zITSdfCVXckjuAKru54yhsoTZQrk5qJRLBjQMQwS22AhppU5BAjDCQkA_Is4ReGFCyQAp-4myIkPc5GC0f9FozXe" width="254" /></a></div><br /></div><span style="font-family: inherit; font-size: medium;"><br /></span><p></p>
<p class="MsoNormal"></p><ul style="text-align: left;"><li><b><span style="font-family: inherit; font-size: medium;">In the Internet of Things, the Device-to-Device communication
paradigm represents paired devices that connect and interact with each other
directly, without the need for an intermediary server. </span></b></li></ul><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;">In order to create
direct connection, these devices employ protocols such as <b><a href="https://www.bluetooth.com/" target="_blank">Bluetooth</a></b>, ZigBee,
and others. </span></li><li><span style="font-family: inherit; font-size: medium;">This communication model strictly follows one-to-one communication
protocols to share information in order to perform their respective
functionality. </span></li><li><span style="font-family: inherit; font-size: medium;">Bulb switches, door locks, washing machines, microwaves,
refrigerators, and air conditioners are examples of home-based internet of
things appliances that use device-to-device communication to transfer tiny data
packets through low-rate data needs. </span></li><li><span style="font-family: inherit; font-size: medium;">Because device-to-device statement
protocols are not well-suited, Device-to-Device communication necessitates the
deployment/selection of like category devices. </span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEiwuNwWPaR2pTkxi1m2pC6amDG6pV-TTkJtnNKOyYssKTFReHeIrlEMLz_ScHR-wZk4Xrf1lP-lHU07GYq4rXfjU6jU4iDECxJOI9cGh_ZB4naSyjctdgdXCrVVc-CpovWPqBANhueIq3aKgozFr4Gz3UQiSV4Ml2BsnfSB96XqmlYMB2NmQ-VjUkOb" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="206" data-original-width="523" height="158" src="https://blogger.googleusercontent.com/img/a/AVvXsEiwuNwWPaR2pTkxi1m2pC6amDG6pV-TTkJtnNKOyYssKTFReHeIrlEMLz_ScHR-wZk4Xrf1lP-lHU07GYq4rXfjU6jU4iDECxJOI9cGh_ZB4naSyjctdgdXCrVVc-CpovWPqBANhueIq3aKgozFr4Gz3UQiSV4Ml2BsnfSB96XqmlYMB2NmQ-VjUkOb=w400-h158" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p>
<h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">2. Device to cloud communication model</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgLoFyd9MQ2PMgOQlKlX6CmTu2HB4WUQiRYnq2BTa2-4xpXTBovtNJsyr9TsnWeJ9R87C3QoPLIt3Kx8HXXCRcn6j4JrStJYUnhC6xm7V3ACkN8YdtD2zDNnqXPiq8srCmF0jS14YWqyFvSh9N15K8JA-R2Tc8UPjMyjlk4cfSujjxzvOmCz2gFOw6S" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="1482" data-original-width="2729" height="217" src="https://blogger.googleusercontent.com/img/a/AVvXsEgLoFyd9MQ2PMgOQlKlX6CmTu2HB4WUQiRYnq2BTa2-4xpXTBovtNJsyr9TsnWeJ9R87C3QoPLIt3Kx8HXXCRcn6j4JrStJYUnhC6xm7V3ACkN8YdtD2zDNnqXPiq8srCmF0jS14YWqyFvSh9N15K8JA-R2Tc8UPjMyjlk4cfSujjxzvOmCz2gFOw6S=w400-h217" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p>
<p class="MsoNormal"></p><ul style="text-align: left;"><li><b><span style="font-family: inherit; font-size: medium;">In the Device to Cloud communication architecture, IoT
devices connect directly to a cloud service provider, who monitors data
exchange and limits message volume. </span></b></li><li><span style="font-family: inherit; font-size: medium;">Abusers may have remote access to their
states via their Smartphones, as well as install software upgrades, thanks to
the cloud connection. </span></li><li><span style="font-family: inherit; font-size: medium;">This architecture makes use of an existing wired or
wireless connection to establish a link between the device and the internet protocol
network, which then connects to the cloud service. </span></li><li><span style="font-family: inherit; font-size: medium;">The device and cloud service
must be from the same company in this case. </span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p>
<h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">3. Device to Gateway communication model</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgcw5UC-ZPxo_ESaH6LEG3fin2zAGkmwc11U2PdxaLtS1SQlVp7a0qPEGF3Yx_QAL7SgA0oj1dlK69vLzQBSVKaeHzdkbBNk39NBiNzwZy-qCd5jWOCyvCVqM96sRSu9vq-MTklZ4dAd8XBhaelhZGlnRTC5jO1uVOp6d3Ue2CwChhxM1H5qAKIr87B" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="320" data-original-width="320" height="400" src="https://blogger.googleusercontent.com/img/a/AVvXsEgcw5UC-ZPxo_ESaH6LEG3fin2zAGkmwc11U2PdxaLtS1SQlVp7a0qPEGF3Yx_QAL7SgA0oj1dlK69vLzQBSVKaeHzdkbBNk39NBiNzwZy-qCd5jWOCyvCVqM96sRSu9vq-MTklZ4dAd8XBhaelhZGlnRTC5jO1uVOp6d3Ue2CwChhxM1H5qAKIr87B=w400-h400" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p>
<p class="MsoNormal"></p><ul style="text-align: left;"><li><b><span style="font-family: inherit; font-size: medium;">In the device to gateway paradigm, an IoT device
communicates to a cloud service via an <a href="https://www.f5.com/services/resources/glossary/application-layer-gateway" target="_blank">application layer gateway</a> (ALG), which
acts as a mouthpiece. </span></b></li><li><span style="font-family: inherit; font-size: medium;">When data is being sent, application software running on
a local gateway works as an intermediate between the device and the cloud, as
well as providing security-related activities. </span></li></ul><div style="text-align: center;"><span style="font-size: medium;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhjsD9toiZkR9d9qna08ZYeYb3YtPUenC1g8r4oYzVcsryevUJ07qfvaE8e6MnjJDZ7GL0K9hgdNNhgc7mHiertSVQOatJAp-Q2zQ4xGDiFsMIvz4z2ZPb5Z1uMGgAkUye9hDAYvfo07W-h2EUTaj9F_5xQ7gSGw08HK1WQm7hZjfc-8FGiW47v7mip" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="483" data-original-width="850" height="228" src="https://blogger.googleusercontent.com/img/a/AVvXsEhjsD9toiZkR9d9qna08ZYeYb3YtPUenC1g8r4oYzVcsryevUJ07qfvaE8e6MnjJDZ7GL0K9hgdNNhgc7mHiertSVQOatJAp-Q2zQ4xGDiFsMIvz4z2ZPb5Z1uMGgAkUye9hDAYvfo07W-h2EUTaj9F_5xQ7gSGw08HK1WQm7hZjfc-8FGiW47v7mip=w400-h228" width="400" /></a></div><br /><br /></span></div><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;">The smartphone becomes a local
gateway device that runs an application to interact with other devices and send
data to the cloud. Hub devices are used in home automation applications as a
form of device to gateway paradigm, where <b>Hubs act as a local gateway between
individual IoT devices as well as a cloud service</b>. </span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjscCxCAMN2z_8MNvYysXqqnB2mimqedh4R9Wiwz_K77HlOiYfCNaFOiacPSh9cy3eiTcsILDNhkH2rXepWg1H2PFRMzaJC0sMf7lddg2JkSBAKxlJKtZkJZN8eePJCBINnkH9T125D1cCP_oi8-NxNzjUJmqwCJHMs-YVpsPCMe3N3wCAONVbsLgF5" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="479" data-original-width="700" height="274" src="https://blogger.googleusercontent.com/img/a/AVvXsEjscCxCAMN2z_8MNvYysXqqnB2mimqedh4R9Wiwz_K77HlOiYfCNaFOiacPSh9cy3eiTcsILDNhkH2rXepWg1H2PFRMzaJC0sMf7lddg2JkSBAKxlJKtZkJZN8eePJCBINnkH9T125D1cCP_oi8-NxNzjUJmqwCJHMs-YVpsPCMe3N3wCAONVbsLgF5=w400-h274" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p>
<h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">4. Back end data sharing model</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjbWltOOkOaMR6vjsZxc_jTIF-Kv4rVnBYbH60nNamfMK92nj0XDc0QMDs4FKvxUTraOu469lIhMlelYa3-oLqxWMs8RZkt_gieMkuiI9T1RQSjq_n9NdTHopoYGKUtQ4U9n80uf2VpVnsyU_qZNWfmG8_jEOdc_QsBkjNSV7CS5z1NLTeA3H7ZlXhn" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="345" data-original-width="753" height="184" src="https://blogger.googleusercontent.com/img/a/AVvXsEjbWltOOkOaMR6vjsZxc_jTIF-Kv4rVnBYbH60nNamfMK92nj0XDc0QMDs4FKvxUTraOu469lIhMlelYa3-oLqxWMs8RZkt_gieMkuiI9T1RQSjq_n9NdTHopoYGKUtQ4U9n80uf2VpVnsyU_qZNWfmG8_jEOdc_QsBkjNSV7CS5z1NLTeA3H7ZlXhn=w400-h184" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p>
<p class="MsoNormal"></p><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;"><b>Import, export, and assess smart/small device records from a
cloud service in a recipe with records from other sources using the back-end
data sharing communication architecture</b>. </span></li><li><span style="font-family: inherit; font-size: medium;">These models allow records or data
generated by separate IoT devices to be aggregated and analyzed. </span></li><li><span style="font-family: inherit; font-size: medium;">This sort of
communication protocol <b>enables data portability when it is required</b>; the abuser
may relocate their records as they move across IoT devices. </span></li><li><span style="font-family: inherit; font-size: medium;">The data sharing
approach on the back end is just as effective as the IoT system designs.</span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><o:p></o:p></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;">The ubiquitous presence of IoT devices will eventually allow for circulatory intelligence. </span></p><h3 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">Understanding how diverse IoT devices interact with one another is crucial and helpful for operational perspective. </span></h3><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;">IoT communication paradigms have a lot to offer. </span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;">The Internet of Things (IoT) <b>enables connections between people and things at any time, in any location, with anything and anybody</b> utilizing any network or service.</span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="color: red; font-family: inherit; font-size: medium;">4 Different Forms of Communication Based On Architecture</span></h2><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">1. Request and Response Framework:</span></h2><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgNTMU7FThNYWearQpPOqbipZ1XLCscV_vv6aetZluPEGTmKUSCngdsfT4WA5VwErlj51AT8YUMnLKIH2n_YKf7qah06lBCNjTT4vNEwcipU6WNrpRy5SXqAw168Jrx0K6QNMylCjOQHOZzwHtKB5u1m1_B26wgOVCSFCahG9wCfZAJrqPeupXwD8QM" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="720" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEgNTMU7FThNYWearQpPOqbipZ1XLCscV_vv6aetZluPEGTmKUSCngdsfT4WA5VwErlj51AT8YUMnLKIH2n_YKf7qah06lBCNjTT4vNEwcipU6WNrpRy5SXqAw168Jrx0K6QNMylCjOQHOZzwHtKB5u1m1_B26wgOVCSFCahG9wCfZAJrqPeupXwD8QM=w400-h225" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p><p class="MsoNormal"></p><ul style="text-align: left;"><li><b><span style="font-size: medium;"><span style="font-family: inherit;">The client-server architecture is used in this concept. </span><span style="font-family: inherit;">When necessary, the client asks the server for the information. </span><span style="font-family: inherit;">Typically, this request is in encoded form.</span></span></b></li><li><span style="font-family: inherit; font-size: medium;">Since each request is processed separately and no data is stored in between requests, this model is stateless.</span></li><li><span style="font-family: inherit; font-size: medium;">The request is classified by the server, which then retrieves the data from the database and its resource representation. </span></li><li><span style="font-family: inherit; font-size: medium;">This information is transformed into a response and sent to the client in an encoded manner. </span></li><li><span style="font-family: inherit; font-size: medium;">The answer is then given to the client.</span></li><li><span style="font-family: inherit; font-size: medium;"><b>Contrarily, in the Request-Response communication paradigm, the client makes a request to the server, and the server answers. </b></span></li><li><span style="font-family: inherit; font-size: medium;">The server chooses how to reply to the request, gathers the necessary information and resources, prepares the answer, and then transmits it to the client.</span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">2. Publisher-Subscriber Model:</span></h2><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhnYHRTj5qixb2iM_4UPnJoq_4s4Q2xFVFFne-MDxE6I0UZZMvDWjcsPw68MHYDYAxKhz74Ona8BeWqa20cZfvFphifMOg7lSKfivgi8R3bJsmTmQFxbea5q2cZOoCnyoRv3A9umGy2X9bVMkPGRpt323UmOs_GR9bmtGFa9A24bsI4gXi1Y_PmUHxz" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="321" data-original-width="630" height="204" src="https://blogger.googleusercontent.com/img/a/AVvXsEhnYHRTj5qixb2iM_4UPnJoq_4s4Q2xFVFFne-MDxE6I0UZZMvDWjcsPw68MHYDYAxKhz74Ona8BeWqa20cZfvFphifMOg7lSKfivgi8R3bJsmTmQFxbea5q2cZOoCnyoRv3A9umGy2X9bVMkPGRpt323UmOs_GR9bmtGFa9A24bsI4gXi1Y_PmUHxz=w400-h204" width="400" /></a></div><br /><br /></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p><p class="MsoNormal"></p><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;"><b>Publishers, brokers, and consumers are the three entities that make up this paradigm.</b></span></li><li><span style="font-family: inherit; font-size: medium;">The statistics are sourced from publishers. </span></li><li><span style="font-family: inherit; font-size: medium;">It transmits data to topics that the broker manages. </span></li><li><span style="font-family: inherit; font-size: medium;">Consumers are not known to them.</span></li><li><span style="font-family: inherit; font-size: medium;">Customers subscribe to the subjects that the broker manages.</span></li><li><span style="font-family: inherit; font-size: medium;">Therefore, it is the duty of brokers to take data from publishers and transmit it to the proper customers. </span></li><li><span style="font-family: inherit; font-size: medium;"><b>The only consumer information the publisher is aware of that the broker possesses is that which pertains to a certain issue.</b></span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;">3. Push-Pull Model:</span></h2><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgPfyjCNVUBMWXrJuENeETDXHhEUFZnv4Qq2lsFi-6KJPqbUZ2rt4AKAg3ubGQndAChRaPH52NXwXJPiE7WB5GJ16m_TH3Ac5jgG0nKfgXd8X3DawQ4t9uOfH6HAL98t43bZQmChq00CjZaVsz5Q9T14JdNK9tqhkOFipCdcOzt9SyQvbQgBIa_o8JY" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="720" data-original-width="1280" height="180" src="https://blogger.googleusercontent.com/img/a/AVvXsEgPfyjCNVUBMWXrJuENeETDXHhEUFZnv4Qq2lsFi-6KJPqbUZ2rt4AKAg3ubGQndAChRaPH52NXwXJPiE7WB5GJ16m_TH3Ac5jgG0nKfgXd8X3DawQ4t9uOfH6HAL98t43bZQmChq00CjZaVsz5Q9T14JdNK9tqhkOFipCdcOzt9SyQvbQgBIa_o8JY" width="320" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p><p class="MsoNormal"></p><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;"><b>Publishers, consumers, and queues of data make up the push-pull model.</b></span></li><li><span style="font-family: inherit; font-size: medium;">Consumers and Publishers are not conversant with one another.</span></li><li><span style="font-family: inherit; font-size: medium;">Publishers put the message or data onto the queue after publishing it. </span></li><li><span style="font-family: inherit; font-size: medium;">The data is retrieved from the queue by the consumers who are present on the opposite side. </span></li><li><span style="font-family: inherit; font-size: medium;"><b>As a result, when there is a discrepancy between the pace at which data is pulled or pushed by a publisher and a consumer, the queue serves as a buffer for the message.</b></span></li><li><span style="font-family: inherit; font-size: medium;">The message between the producer and the consumer may be separated with the use of queues. </span></li><li><span style="font-family: inherit; font-size: medium;"><b>Additionally, queues serve as a buffer, which is useful when the pace at which data is pulled by consumers and pushed by producers differs.</b></span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: inherit; font-size: medium;"><span>4. </span><span>Exclusive Pair:</span></span></h2><p class="MsoNormal" style="text-align: center;"><span style="font-family: inherit; font-size: medium;"></span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: inherit; font-size: medium;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEh4GqhWNrM2Czxy1EqOUf5lRnccXlO4wfA-utlLItK3_VyP2DkI2PuTCjeDxFAb4phBMQvzwDg2y6_sB1S0eoiFxmAAq01rkXZWr8Xrp65ZfaNAyBhTvnD-LtIL0qdYFeOwrPKoPbKbFEuOfzC8mZ46BR0sC0oQcu7lrukOfKzABCMOQHtunN9adzjz" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="720" data-original-width="1280" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEh4GqhWNrM2Czxy1EqOUf5lRnccXlO4wfA-utlLItK3_VyP2DkI2PuTCjeDxFAb4phBMQvzwDg2y6_sB1S0eoiFxmAAq01rkXZWr8Xrp65ZfaNAyBhTvnD-LtIL0qdYFeOwrPKoPbKbFEuOfzC8mZ46BR0sC0oQcu7lrukOfKzABCMOQHtunN9adzjz=w400-h225" width="400" /></a></span></div><span style="font-family: inherit; font-size: medium;"><br /><br /></span><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"></p><ul style="text-align: left;"><li><span style="font-family: inherit; font-size: medium;"><b>Exclusive Pair is a bi-directional approach that enables full-duplex client and server communication. </b></span></li><li><span style="font-family: inherit; font-size: medium;">Up until the client submits a request to cancel the connection, the connection is continuous and open.</span></li><li><span><span style="font-family: inherit; font-size: medium;">All connections that have been made are recorded by the server.</span></span></li><li><span><span style="font-family: inherit; font-size: medium;">The server is aware of every open connection since this is a state-full connection model.</span></span></li><li><span><span style="font-family: inherit; font-size: medium;"><b>This concept is the foundation of the whole WebSocket-based communication API.</b></span></span></li></ul><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p><b><span style="font-family: inherit; font-size: medium;"><a href="https://www.jaikrishnaponnappan.com/" target="_blank">~ Jai Krishna Ponnappan</a></span></b></p><p></p><p></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"></span></p><p><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><span>Find Jai on</span><span> </span><a href="https://href.li/?http://www.twitter.com/JaiKrisPonnapan" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Twitter </a><span>|</span><span> </span><a href="https://t.umblr.com/redirect?z=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fjaikrishnaponnappan%2F&t=OTIxZjBkZTY3OTlkMTI3YzdmY2ZlNmM3Yzk1ZDMzYTk4N2U3ODUxMCxabUs3cWpaOA%3D%3D&b=t%3ATN94RBMrvL2v43TUBoflDw&p=https%3A%2F%2Fblog.commentarybyjaikrishnaponnappan.com%2Fpost%2F678148755345883136%2Fafter-ukraine-the-united-states-must-rebuild-its&m=1&ts=1646733695" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">LinkedIn </a><span>|</span><span> </span><a href="https://href.li/?https://instagram.com/jaikrishnaponnappan/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-image: linear-gradient(rgba(68, 68, 68, 0) 50%, rgba(68, 68, 68, 0.25) 0px); background-position: 0px 1.15em; background-repeat: repeat-x; background-size: 1em 2px; border: 0px; box-sizing: border-box; cursor: pointer; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none 0px; padding: 0px 0px 0.15em; text-decoration-line: none; vertical-align: baseline;">Instagram</a></span></b></p><div><b style="color: #ffa400;"><span style="font-family: inherit; font-size: medium;"><br /></span></b></div><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><span style="font-family: inherit; font-size: medium;"><br /></span></p><p class="MsoNormal"><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-21114549564877992812021-06-04T17:17:00.003-07:002021-06-04T17:17:57.884-07:00Internet of Things Architecture<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNuVA2AdPrepNzb5voVLhYlVTxiRTB_H67eAJh5QJQfbpoRsAM6SxHIXLeAlMS5GXtkmCmOsQKV3FZRtg-f33ioFg-4MHwJrt4s79d9KWBbEv1p6La45C8wACiAirc-P_OckWEfWDmF0c/s933/IoT-Layers-Internet-of-things-Architecture-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="479" data-original-width="933" height="205" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNuVA2AdPrepNzb5voVLhYlVTxiRTB_H67eAJh5QJQfbpoRsAM6SxHIXLeAlMS5GXtkmCmOsQKV3FZRtg-f33ioFg-4MHwJrt4s79d9KWBbEv1p6La45C8wACiAirc-P_OckWEfWDmF0c/w400-h205/IoT-Layers-Internet-of-things-Architecture-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" width="400" /></span></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The Internet of Things (IoTs) is a collection of intelligent gadgets that attempts to connect them over the internet. </span></b></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Communication protocols, smart objects, security, scalability, and interoperability among heterogeneous devices are all part of the IoT architectural structure. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Things/devices may occasionally shift from their original position to other locations in real-time as a result of the surrounding environment, as well as certain adaptable designs for dynamic interaction with other devices. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The decentralized architecture allows for efficient event-driven capacity in the IoT. The Internet of Things (IoT) is defined as a physical network of networked devices that can be monitored and managed remotely. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Sensing Layer</span></h2><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Sensing, which is accomplished by intelligent sensor nodes and RFID, is the most critical duty in an IoT system. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Wireless sensor nodes or RFID tags components in the IoT system's sensing layer can quickly perceive and interchange information amongst various entities due to their architecture. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The above-mentioned improved technologies expand the IoT sense's potential by making it easier to link more and more items. </span></li><li><span style="font-family: Baskervville; font-size: medium;">For large industrial and academic networks, such as the Internet of Things, sensing and unique identification are successful stages.</span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Network layer</span></h2><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The network layer serves as a platform for all connected devices/things, allowing them to share their gathered data with other connected devices. </span></li><li><span style="font-family: Baskervville; font-size: medium;">It automatically detects and maps networks for dynamically converting network devices, with devices being allocated to responsibilities such as deployment, scheduling work modules, and connecting with other network devices as needed. </span></li><li><span style="font-family: Baskervville; font-size: medium;">In order to construct an IoT network layer, developers must consider network management technologies, such as mobile, fixed, and wireless network administration, data signal distribution, security and secrecy, and service retrieval. </span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Service layer</span></h2><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">The service layer of the Internet of Things interacts via middleware technology, which allows diverse functionality to seamlessly integrate. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The primary function of service is to include middleware requirements that have been standardized by various parties. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The middleware technology creates a cost-effective platform for IoT-based applications, with the ability to reprocess both the hardware and software platforms. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Service layer challenges such as storage management, search engines, communications, and information transportation are progressed. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The service layer in IoT includes components such as service discovery, service composition, trustworthiness management, and service APIs. </span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Interface Layer</span></h2><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">In the Internet of Things, a large number of devices were created by various sectors and firms, and they do not use the same network protocols. </span></li><li><span style="font-family: Baskervville; font-size: medium;">As a result, several challenges in device communications and information exchanges across disparate things/devices have arisen. </span></li><li><span style="font-family: Baskervville; font-size: medium;">As a result, there is a high need for an interface layer to minimize the time it takes for things to communicate, operate, connect, and detach. </span></li><li><span style="font-family: Baskervville; font-size: medium;">If there is no interface layer, the IoT will become more difficult to communicate, operate, connect, and disengage as the number of devices grows. </span></li><li><span style="font-family: Baskervville; font-size: medium;">An interface outline is a collection of service principles that also defines the relationship between applications and services.</span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-26022840684508834892021-06-04T17:04:00.006-07:002021-06-04T17:04:59.869-07:00Why IoT?<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihT4VoqPKa1NB-h2yD6pznRRsGsxx7FCS1B-ucI-1z3d3y4JSBxoPLgUL4i0HCO0ah7bdofXHs-SnjtDk3xH47jYJTEIlV9QcjIBLrJYBnaKsbu5p3eMye7hcFTVJc20hGSjKBOI0Y28w/s480/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-4.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="340" data-original-width="480" height="284" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihT4VoqPKa1NB-h2yD6pznRRsGsxx7FCS1B-ucI-1z3d3y4JSBxoPLgUL4i0HCO0ah7bdofXHs-SnjtDk3xH47jYJTEIlV9QcjIBLrJYBnaKsbu5p3eMye7hcFTVJc20hGSjKBOI0Y28w/w400-h284/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-4.webp" width="400" /></a></div><br /><p></p><p><span style="font-family: Baskervville; font-size: medium;">The internet has had a huge impact on human life and contact, ranging from professional to social interactions. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The internet of things takes it a step further by allowing communication between small/smart devices, resulting in a hybrid setup of real and virtual items. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Interoperability refers to the capacity of disparate IoT devices and services to exchange data and make use of it once it has been changed. The majority of existing IoT efforts focus only on apps and objects that address a variety of criteria, while others focus on connection and interoperability. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">This will have an impact on functionality, needless services, change management issues, and resource utilization opportunities. </span></p><p><span style="font-family: Baskervville; font-size: medium;">As a result, IoT projects must have a greater emphasis on interoperability and connection, as well as security protocols that will allow desperate devices and services to join. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">By enabling effective interoperability, IoT devices and services will be able to communicate more efficiently, delivering more capabilities and a wider range of options at a lower cost. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">There are a number of factors that might contribute to poor interoperability and connection, including:</span></p><p><span style="font-family: Baskervville; font-size: medium;"> Poor data visualization and analysis—current IoT services provide minimal emphasis on data visualization and analysis, implying incalculable system insights. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Due to insufficiently molded semantics propagating a range of badly constructed semantics and unclear semantics for services, there are now no important criteria for appropriate service context definition in IoT services. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Lack of standardized service descriptions— At this time, competent principles are required for effective IoT device services, data descriptions, and information services. </span></p><p><span style="font-family: Baskervville; font-size: medium;">In order to equip with adequate facts possession and demonstration of the IoT sector, an efficient integrating solution for heterogeneous IoT might benefit from integrated modeling techniques. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Poor device service categorization—IoT projects rely on device service categorization to categorize device services. If an examination is prepared for a service or device identification, a new path service organization must be established to offer accommodations such as dynamic innovation services.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-25993856652312259222021-06-04T16:59:00.001-07:002021-06-04T16:59:11.186-07:00What is IoT or Internet of Things Today?<p><span style="font-family: Baskervville; font-size: medium;"> </span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHekWi8rZKGYV3aQNIfs3UX18flP9wMK3KRvTRU-P1FObg3zr3EFu1gN2BZ8LeSrjlyGvCwb9HFXjAMTYvp5BJ3lX89zqoTRUtiEsVBlskDDcRQakuqe1EokCxgNY4RofzGOi31ZpA3iU/s1637/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-17.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="340" data-original-width="1637" height="83" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHekWi8rZKGYV3aQNIfs3UX18flP9wMK3KRvTRU-P1FObg3zr3EFu1gN2BZ8LeSrjlyGvCwb9HFXjAMTYvp5BJ3lX89zqoTRUtiEsVBlskDDcRQakuqe1EokCxgNY4RofzGOi31ZpA3iU/w400-h83/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-17.webp" width="400" /></span></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p class="MsoNormal"><span style="line-height: 107%;"><b><span style="font-family: Baskervville; font-size: medium;">Internet of
Things (IoTs) is one of the emerging topics in recent time in terms of
technical, social and financial consequences. </span></b></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">From the past decades, there is a
significant development in the fields of wireless communication technology,
information and communication systems, industrial designs and electromechanical
systems encouragements progress new technology named as Internet of things. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">The
most important intention of Internet of things is to connect all or any devices
to the internet or other connected devices. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">IoTs is the collection network of
home appliances, physical devices, vehicular networks and added devices fixed
with sensors, electronics, and actuators along with network connectivity which
make-possibility for mentioned objects to gather/accumulate and exchange
information/data. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><b><span style="font-family: Baskervville; font-size: medium;">IoT works as a massive network of organized things and people
allocate those gathered resources in relation to the way they are utilized and
know regarding the surrounding atmosphere. </span></b></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">Here each and everything typically
identified with its corresponding computing system however it proficient to
interoperate inside the existing internet infrastructure. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">For simplicity, IoT
has a particular circumstance that can connect a variety of things, where
everything has the capability to communicate with other connected devices. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">It
starts with the network and goes forward into everything that connected. It
allocates people and things to be in connection any-time, any-thing, any-where,
any service, and any-network path. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><b><span style="font-family: Baskervville; font-size: medium;">From the latest updates in the IoT field,
there will be more than billion things/devices continuously online and higher
than billion things/devices infrequently online by the year. </span></b></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">Kevin Ashton one
of the pioneer researcher of MIT institute AutoID Lab who made ground base work
that comes out nowadays as the Internet of Things (IoT). </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">Ashton who work
rigorously, Proctor and Gamble may progress its production because of
connecting RFID information to the internet. It is great if all objects,
devices dressed in wireless connectivity’s, identifiers; exchange a few words
each other moreover supervise through computer-based systems. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">In RFID article
Ashton stated like “if we had computers that know everything there was to know
about Things/Devices, those can accumulate data without any kind of help from
us, with help of that data/information we are able to track, calculate everything
furthermore we are capable to tremendous reduction of cost, loss, and waste. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">We
would recognize when things looked-for recalling, replacing, whether they are
fresh or Passover their best. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><b><span style="font-family: Baskervville; font-size: medium;">Here, we need to make powerful computers with
their own means of gathering information/data, so they can observe, react to
the world themselves. </span></b></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">Sensor technology and RFID facilitate computers to
observe, identify and understand the world without the involvement of human
intervention entered data”. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">At the time of Ashton statement there were many
obstacles are stated to answers but coming days more than a few obstacles has
answered/resolved. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><b><span style="font-family: Baskervville; font-size: medium;">Most importantly the cost and size of wireless equipment has
gone down extremely. Many electronic companies are in process to build Wi-Fi as
well as cellular wireless connectivity into a broad territory of devices. </span></b></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">According to ABI study, more than twenty-eight billion wireless fragments
distribute in Cellular data exposure has been enormously enhanced by means of
many networks to provide broadband speeds. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;">Moreover, battery tools, solar
recharging has been built into numerous devices. So, coming years billions of
things/devices will connect to the network. The hardware design company CISCO’s
IoT’s Group stated that across billion allied devices. </span></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="font-family: Baskervville; font-size: medium;"><span style="line-height: 107%;"><b>Internets of things
agree on devices to be sensed or else controlled distantly across offered
network communications based on that perspective it creates more possibilities
for direct incorporation of the physical world through to computer-based
systems in addition results produced in the form of accurateness,
effectiveness, financial benefits and reduces human involvement.</b></span><o:p></o:p></span></p><p class="MsoNormal"><span style="line-height: 107%;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></span></p><p class="MsoNormal"><span style="font-family: "Times New Roman",serif; font-size: 12.0pt; line-height: 107%; mso-fareast-font-family: "Times New Roman";"><br /></span></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-36899273919284752482021-06-04T16:45:00.000-07:002021-06-04T16:45:22.901-07:00Deep Learning IoT<div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">The Importance of Deep Learning for IoT. </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8WyjKeLJcn4WjM8YemMN28-ht8TU5v_uOhJmeuvBARBvntxdRSYCR7SdJO1H6fiEaQm0Wd2Yk-xbubTnPZwGNF_I56bH35GwfEDba7CCfsnk4mR5-cchbCyqfnwQj4zGWBnnuoYstdU/s887/IoT-Deep-Learning-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="397" data-original-width="887" height="179" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8WyjKeLJcn4WjM8YemMN28-ht8TU5v_uOhJmeuvBARBvntxdRSYCR7SdJO1H6fiEaQm0Wd2Yk-xbubTnPZwGNF_I56bH35GwfEDba7CCfsnk4mR5-cchbCyqfnwQj4zGWBnnuoYstdU/w400-h179/IoT-Deep-Learning-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" width="400" /></span></a></div></div><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><b><span style="font-family: Baskervville; font-size: medium;">This article provides an overview of deep learning and its applicability to IoT datasets. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Edge nodes are more capable of local computing among themselves through the network in deep learning, which is frequently referred to as fog clouding. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Deep learning, in a more technical sense, is a single or collection of algorithms that learn in layers and imitate the brain, allowing a computer to build a hierarchy of complex concepts out of basic ones. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">How Do Deep Learning Algorithms Learn and How Does a Computer Learn? </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><b><span style="font-family: Baskervville; font-size: medium;">To grasp deep learning with ease, you must first comprehend how a computer thinks and learns using a top-down method with all conceivable rules for its operations. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">However, there has been a paradigm change in favor of a bottom-up method, in which the computer may learn from labeled data and the system is appropriately trained depending on replies. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Playing chess with 32 chess pieces as primitives and 64 action squares is a good illustration of this scenario, but in the real world, deep earning provides a massive problem space with unlimited choices. Due of the dimensionality of such a large issue, the computer is difficult to learn. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The data accessible in text mining, such as sentiment analysis, identifying words, or facial recognition, is intuitive (or sparse) in nature, and the issue area is not limited; hence, representing possible combinations to have meaningful analysis is quite tough. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Deep learning is a machine learning method that is best suited to dealing with these intuitive issues that are not only difficult to learn but also have no rules and large dimensionality, in order to deal with hidden conditions without knowing the rules a priori. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Deep learning is based on how the human brain functions. This is similar to a youngster recognizing a "cat" by recognizing the cat's behavior, shape, tail, and other characteristics, and then bringing them all together for a larger concept generation as the "cat" itself. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Deep learning, in the example given above, advances through numerous levels and breaks the intuitive issue into pieces, each of which is assigned to a different layer. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The input or visible layer is the initial layer, where the input is presented, followed by a succession of hidden layers chosen at random for particular mapping with input data. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Layer-wise information progress is made in the image processing example as follows: from input, pixels to edge identification at the first hidden layer, then corners and contours at the second hidden layer, then parts of objects at the third hidden layer, and finally the entire object at the last and final hidden layer. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">We'll use deep learning to answer the following questions in an IoT scenario: </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><p><span style="font-family: Baskervville; font-size: medium;">• Intuitive deep learning applications on datasets from smart cities </span></p><p><span style="font-family: Baskervville; font-size: medium;">• Performance measurements with an intuitive component that are utilized for improved prediction </span></p></blockquote><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Using IoT datasets to supplement Deep Learning Algorithms. </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><span style="font-family: Baskervville; font-size: medium;">Despite substantial study into energy load forecasting and its appropriateness for use with neural networks, deep neural architecture appears to be the most promising in this application scenario. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Some of the developing strategies/techniques for augmenting deep learning algorithms with IoT datasets are listed below.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Time Series Data with Deep Learning Algorithms </span></h2><p><span style="font-family: Baskervville; font-size: medium;">Given that most sensor data received in an IoT environment is time series in nature, researchers are interested in using deep learning techniques for energy forecasting in order to construct a sustainable smart grid as part of the future digital world. </span></p><p><span style="font-family: Baskervville; font-size: medium;">When a deep neural network is used to analyze this high-dimensional dataset, it outperforms conventional approaches such as linear and kernelized regression algorithms and, more crucially, does not overfit. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Implications of the Internet of Things </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><span style="font-family: Baskervville; font-size: medium;">IoT has been gaining traction since 2015, but the full impact will only be felt as the year advances, with the development and deployment of a wide area network in preparation for 5G 2020 and beyond. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Given the availability of such a Tsunami of largely time series data, predictive analytics and the construction of a credible model, as well as the obstacles that come with it, will be in high demand. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The use of deep learning techniques as a practical solution to IoT data analysis will be the main focus going forward.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Consequences for Smart Cities </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><span style="font-family: Baskervville; font-size: medium;">As can be seen, smart cities are an application domain for IoT, in which digital technologies are used to improve the performance of the IoT system while reducing cost and resource usage, with the goal of active citizen engagement for effective implementation in order to find its benefit at large for self-well-being. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The applications include, but are not limited to, the energy, health, and transportation sectors. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Deep Learning as an IoT Solution </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><span style="font-family: Baskervville; font-size: medium;">Deep learning is essentially a neural network structure with several layers that is used to tackle complicated scenarios that are generated from simpler ones. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Deep learning's ability to overcome the curse of dimensionality problems without the need of rules makes it appealing in the IoT–big data situation. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The idea arose from the need to learn how to recognize a cat based on its behavior, shape, and other characteristics. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Our goal will be to see if deep learning can give any useful predictive analysis to gather relevant observations, as IoT is heavily reliant on resource-constrained computer devices.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQBgb-AstSB6dvQIulj8HLf2QbzOmxbOagxYWoQgtRvM0gWRi-iUXDQUkJHtuNXVLLXweV2AsEmxi-9-LFCVokXAWLtv17pzNifiOuzqHJ_ouYh8Th3VE5ehqPkhfKMywck_d4MdVurro/s733/IoT-Deep-Learning-Methodology-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="189" data-original-width="733" height="104" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQBgb-AstSB6dvQIulj8HLf2QbzOmxbOagxYWoQgtRvM0gWRi-iUXDQUkJHtuNXVLLXweV2AsEmxi-9-LFCVokXAWLtv17pzNifiOuzqHJ_ouYh8Th3VE5ehqPkhfKMywck_d4MdVurro/w400-h104/IoT-Deep-Learning-Methodology-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" width="400" /></span></a></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The proposed methodology of using deep learning in IoT dataset shall address some of the following questions:</span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px; text-align: left;"><p><span style="font-family: Baskervville; font-size: medium;">• The applicability of deep learning in smart cities, smart health care, etc.</span></p><p><span style="font-family: Baskervville; font-size: medium;">• What is the performance metrics for prediction?</span></p></blockquote><p><span style="font-family: Baskervville; font-size: medium;"> </span></p><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><h2 style="text-align: left;"><b><span style="font-family: Baskervville; font-size: medium;">Deep Learning with CNN</span></b></h2><div><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;">Although Deep CNN and linear neural networks are comparable in some ways, the fundamental distinction is that Deep CNN uses a “convolution” operator as a filter that can conduct complicated operations with the assistance of a convolution kernel.</span></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;"> It should be mentioned that the Gaussian kernel is used to smooth an image; the Canny kernel is used to extract picture edges and gradient characteristics; and the Gabor kernel is commonly employed as a filter in most image processing applications. </span></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;">When comparing DCNN to autoencoders and limited Boltzmann machines, it's worth noting that DCNN is designed to locate a collection of locally linked neurons, whereas the others learn from a single global weight matrix shared by two layers. </span></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;">The key idea behind DCNN is to learn data-specific kernels where low-level properties may be transferred to high-level ones and learning is done from geographically nearby neurons rather than utilizing predetermined kernels.</span></div></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><h2 style="text-align: left;"><b><span style="font-family: Baskervville; font-size: medium;">Training DCNN</span></b></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">The DCNN training procedure is divided into two phases: feed-forward and back propagation. All jobs are transferred via the input layer to the output layer in the first phase, and the error is calculated. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The back-propagation phase begins with bias and weight updates based on the error gained in the first phase, with the goal of minimizing the mistake gained in the first phase. A number of other hyperparameters, such as learning rate and momentum, are correctly set in the 0 to 1 range. </span></p><p><span style="font-family: Baskervville; font-size: medium;">A number of iterations (epochs) are also necessary for training the DCNN model in order for the error gradient to be below the minimum acceptable level. The learning rate should be selected such that the model is not overfitted or over-trained. </span></p><p><span style="font-family: Baskervville; font-size: medium;">For the optimum adaptation to conditions, the momentum value can be determined using the trial-and-error technique. It should be observed that if we choose a high learning rate and a high momentum value (around 1), there is always the possibility of skipping the minima.</span></p><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-89446137439036651392021-06-04T15:45:00.004-07:002021-06-04T15:45:57.076-07:00When Internet of Things (IoT) meets Artificial Intelligence (AI)<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWLU1IzN8FbP3wCEvvKR1dA0-2fgat9rpOu6YIzg1oQTeS9vjGqo4GoyzvC-3vVmZYuyCXoazS_9eWT3sMWInJykIeOeW-CwGRnZmj_dIAolqEUuSNIrSMbn9eyn9-2pT_WU9KuxbL0H0/s653/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-15.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="340" data-original-width="653" height="209" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWLU1IzN8FbP3wCEvvKR1dA0-2fgat9rpOu6YIzg1oQTeS9vjGqo4GoyzvC-3vVmZYuyCXoazS_9eWT3sMWInJykIeOeW-CwGRnZmj_dIAolqEUuSNIrSMbn9eyn9-2pT_WU9KuxbL0H0/w400-h209/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-15.webp" width="400" /></span></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">Machine learning, as part of AI, and the Internet of Things (IoT) have a wide range of applications in both research and industry.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">IoT Capabilities and Challenges </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">As the Internet of Things (IoT) becomes more mainstream, there is a growing requirement to comprehend the function of AI approaches in acquiring insights about the market environment and the rivals' readiness to solve the situation by then. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">In a Harvard Business Review article, it was said that IoT should be capable of handling the following four key issues: </span></b></p><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Monitoring</span></li><li><span style="font-family: Baskervville; font-size: medium;">Control </span></li><li><span style="font-family: Baskervville; font-size: medium;">Optimization </span></li><li><span style="font-family: Baskervville; font-size: medium;">Autonomy</span></li></ol><p></p><p><b><span style="font-family: Baskervville; font-size: medium;">This will help make IoT more logical for the customer's usage in a smart connected environment. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">While monitoring is required for the efficient functioning of sensor nodes in a controlled working environment, optimization is required to improve performance based on the information gathered in the first two phases. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Finally, autonomy allows IoT devices to self-diagnose and fix themselves. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Internet of Things Won't Work Without AI </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">IoT generates large data, which may be used to forecast accidents and crime using city traffic data, as well as assisting in the construction of smart homes with digitally linked household appliances and much more. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">In order to ensure that IoT meets our expectations, extracting information from the massive amounts of data produced in such IoT scenarios is a serious issue. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Dealing with such a large amount of data (even if only a sample of it) with standard methods is also expected to be excessively time intensive. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">As a result, AI approaches included into IoT data must be used to improve speed and accuracy. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The negative implications, such as all linked gadgets not functioning together in home applications, would undoubtedly upset the consumer; similarly, traffic may be mismanaged with hundreds of automobiles in queue, or health may be devastating with pacemaker malfunction, and the list goes on.</span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><b><br /></b></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-15544343672763596232021-06-04T15:36:00.007-07:002021-06-04T15:36:38.497-07:00IoT Knowledge Hierarchy and Technology Challenges<p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;">The Internet of Things (IoT) is thought to be the next phase in the evolution of the Internet. The combination of the Internet with wireless communications and embedded wireless sensor networks, according to the European Commission, will enable a paradigm shift in transforming our daily gadgets into intelligent and context-aware ones in the future years. </span></p><p><span style="font-family: Baskervville; font-size: medium;">It has found a place in practically every aspect of human existence, which can be inescapable, due to its technological frameworks, market shares, values, and revenue.</span></p><p><span style="font-family: Baskervville; font-size: medium;">It is also expected that, in the not-too-distant future, the Internet will be integrated into a variety of things, such as clothing, toothbrushes, and food packaging, with context awareness and pseudo-intelligence on processing capability among connected things; also, efficient use of limited available power necessitates new forms of communication between things and people as a result. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The knowledge hierarchy depicts how raw data is turned into actionable intelligence and then used to aid decision-making in the context of the Internet of Things. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh3O_ZGvrrE3f8XjFmg1IqTxv9x7FeYoFuQX8-cGdV-uVtaW3ldBqCXfVL0INMRLU-3ldFmrgjif61Dgg4JujA9p66zLRDGuAe95oIuWG4fEtibm6gCcvF07VKtlY3WeQTkIk-DqrrhT0/s1085/IoT-Data-Hierarchy-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="199" data-original-width="1085" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh3O_ZGvrrE3f8XjFmg1IqTxv9x7FeYoFuQX8-cGdV-uVtaW3ldBqCXfVL0INMRLU-3ldFmrgjif61Dgg4JujA9p66zLRDGuAe95oIuWG4fEtibm6gCcvF07VKtlY3WeQTkIk-DqrrhT0/w640-h118/IoT-Data-Hierarchy-LightningIoT-Jai-Krishna-Ponnappan-1.jpg" width="640" /></span></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Raw sensory data may be considered of as the bottom layer in the knowledge hierarchy process, where a vast quantity of data is collected from numerous IoT devices in terms of Exabyte (EB) or even more as time goes on. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The following layer preprocesses the raw data to provide structured, filtered, and machine-readable data that may be processed to acquire the information. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The third layer supplies us with knowledge by revealing hidden information from structured data, allowing us to take intelligent action at the conclusion of the process. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">IoT Technology Challenges </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">As the Internet of Items strives to link all of the things in a single network and create a vast quantity of data for actionable information, it faces a number of obstacles. A few of these are mentioned farther down. Integration of data from a variety of sources. </span></li><li><span style="font-family: Baskervville; font-size: medium;">The data collected from numerous sources, such as sensors, social networking feeds, and mobile devices, is all in distinct contexts; hence, integrating these forms of data is a challenge, but one that, if done well, may offer a lot of value to decision-making. Scalability is an important factor. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Dealing with the volume, diversity, velocity, and veracity of data generated by IoT presents a challenge for real-time operations to efficiently manage the data and perform meaningful analysis. Management of devices. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Even if a significant number of devices are networked (not all) with servers over a wide region and can successfully exchange data, controlling a device that is not linked to the network but is nevertheless involved in the data transmission process may face certain data connecting challenges in an IoT scenario. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Diverse Devices Making IoT devices work together is a difficulty since many firms design their products in various ways and use various standards. Flexibility is a virtue. An IoT scenario should be created in such a way that new devices and technological advancements may be accommodated without too much difficulty.</span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-31771878189674375942021-06-04T15:18:00.003-07:002021-06-04T15:18:32.120-07:00Internet of Insecure Things <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5KECC43XKto-yF8XM3AtbOqChmoNsegYxi51kAdshEm6D2sBHUng7nwL-wvNhXpyOEJ5pcUW9826QeG21p7ZkuVU7LNtIX6CvoPe17I5vgc6X0cJt9gI8H0Jk-NebqxcMkseccHhXnFE/s884/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-6.webp" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="340" data-original-width="884" height="154" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5KECC43XKto-yF8XM3AtbOqChmoNsegYxi51kAdshEm6D2sBHUng7nwL-wvNhXpyOEJ5pcUW9826QeG21p7ZkuVU7LNtIX6CvoPe17I5vgc6X0cJt9gI8H0Jk-NebqxcMkseccHhXnFE/w400-h154/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-6.webp" width="400" /></span></a></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The Internet of Things (IoT) has become a catchphrase for everyone working in this field of study due to its rapid development. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Furthermore, it is clear that the fast proliferation of sensors and gadgets, as well as their connections to the Internet of Things, has created a gold mine for big data analytics. </span></p><p><span style="font-family: Baskervville; font-size: medium;">It has a wide range of applications in the development of smart cities, where predictions of accidents and traffic flow in cities can be effectively monitored; smart health care, where the doctor can obtain useful information from the implant sensor chip in the patient's body; and industrial production, where efficient prediction of the working of machinery and smart metering can be enhanced manifolds. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The Internet of Things (IoT) is a network of physical items connected by electronics, sensors, and software in the twenty-first century. The Internet of Things now has a network of around 27 billion physical devices, and the number continues to rise. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">These devices (cars, refrigerators, televisions, and so on) may be individually identified using embedded computer systems and connected from anywhere using appropriate information and communication technology to provide better service and value. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Everything and anything around us, including equipment, buildings, gadgets, animals, and humans, is referred to as a "THING" in the Internet of Things. This technology is now used in smart health care, smart housing, smart traffic, and smart household gadgets for a better digital world. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">IoT Principles of Operation </span></h2><div><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><span style="font-family: Baskervville; font-size: medium;">IoT has an inbuilt unique identity that relies on RFID links and does not require any human or human–computer interface to function (Ashton, 2009). IPv6 addressing provides a large address space for IoT devices, allowing for active monitoring by computers with network connections and control by sensors linked to those devices. </span></p><p><span style="font-family: Baskervville; font-size: medium;">This monitoring and control may be observed in smart home applications, such as the ability to switch on the air conditioner on the way home from work. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">Internet of Insecure Things - A term used to describe a network of insecure devices. </span></h2><p><span style="font-family: Baskervville; font-size: medium;">IoT technology is a heterogeneous network of small but lightweight devices that is experiencing rapid growth; security problems must be addressed for IoT deployment so that it can adequately solve difficulties that may arise while being utilized for both personal and commercial reasons.</span></p><p><span style="font-family: Baskervville; font-size: medium;">To that end, networking capabilities are included into IoT devices with suitable encryption, and security measures such as firewalls and antivirus software are used to address security issues. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The confidentiality of the data and the privacy of the users are ensured in this manner. However, this comes with its own set of difficulties. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">For example, in our homes, we normally have a physical means of access control to determine who may enter and use the accessible artifacts, as well as a physical method of authentication to determine who can enter and use the available artifacts. </span></b></p><p><b><span style="font-family: Baskervville; font-size: medium;"><br /></span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Assume we wish to chill the room in our house by turning on the air conditioner. There are two options here: one is to do it physically by being there in the house and following the processes to turn on the air conditioner. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The other option is to turn on the air conditioning before we arrive home if we are away from home, so that the room is already cool when we arrive. </span></p><p><span style="font-family: Baskervville; font-size: medium;">In the second scenario, no one is physically present to turn on the air conditioner. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">To turn on the air conditioner even if no one is physically present in the house, the air conditioner should be connected as a networked object with access control, which requires an additional layer of security in comparison to earlier nonnetworked object concepts, to prevent any unauthorized or malicious access to such devices.</span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-88275403963592727222021-06-03T10:31:00.003-07:002021-06-03T10:31:28.810-07:00Blockchain Dimension of IoT<div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><span style="font-family: Baskervville; font-size: medium;"><br /></span><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzyn6SZU1jXr6GSygWRGzRVAkMFgH-_6Mu7IvBshUublCy_WaW3hx20Rph2UO0lILS-dYQ1vemghI2R2pjzrb2JnnKtkgCcB3k8ix6kuKuUA1lQOpfcXwgV7gdGP7dlyWLXwMK4Fn90pE/s510/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-11.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: Baskervville; font-size: medium;"><img border="0" data-original-height="340" data-original-width="510" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzyn6SZU1jXr6GSygWRGzRVAkMFgH-_6Mu7IvBshUublCy_WaW3hx20Rph2UO0lILS-dYQ1vemghI2R2pjzrb2JnnKtkgCcB3k8ix6kuKuUA1lQOpfcXwgV7gdGP7dlyWLXwMK4Fn90pE/w400-h266/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-11.webp" width="400" /></span></a></div><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><div class="separator" style="clear: both; text-align: center;"><span style="font-family: Baskervville; font-size: medium;"><br /></span></div><p><b><span style="font-family: Baskervville; font-size: medium;">Bitcoin has piqued the interest of both academics and industry, ushering in a new era of cryptocurrencies. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">The core technology for operating Bitcoin has long been thought to be blockchain. </span></p><p><span style="font-family: Baskervville; font-size: medium;">The blockchain technology employed in Bitcoin is essentially a public, distributed, and append-only record that is maintained and managed by a group of financially driven miners who do not trust one another. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Transactions (made by users) are authenticated by miners and recorded in a chain of blocks to build a trust environment. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The consensus algorithms attached to the chain are used to build blocks on a regular basis. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">This application expresses a few fundamental blockchain aspects, such as distributed ledger storage, transparent operation, and tamper-resistant records. </span></p><p><span style="font-family: Baskervville; font-size: medium;">As previously stated, the blockchain idea highlights a number of important characteristics, including decentralization, persistency, auditability, and anonymity. </span></p><p><span style="font-family: Baskervville; font-size: medium;">These characteristics underscore the fact that blockchain operates in a decentralized and open environment, such as a peer-to-peer (PP) network. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><b>To provide both persistency and auditability, blockchain makes use of cryptographic hashes and signatures.</b> </span></p><p><span style="font-family: Baskervville; font-size: medium;">Because individuals may interact with blockchain using several addresses (i.e., blockchain identities), true identities and actions can be kept hidden to some extent. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Blockchain has been used or is being used in a variety of applications since the advent of smart contracts, far beyond its initial intended intentions. Vehicular networks, the food supply chain, e-health, commercial enterprise, and industry are just a few examples. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The capability of security and privacy in blockchain is also being strengthened by combining security and privacy solutions, such as privacy protection, secure searchable encryption, secure multiparty computation, access control, and identity management. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Furthermore, fast improvements in numerous technical aspects, such as sensors, RFID (radio frequency identification), smartphones, computing and communication technologies, and network protocols, enable the Internet of Things (IoT). </span></p><p><span style="font-family: Baskervville; font-size: medium;">In the linked environment, devices and equipment communicate with one another, sending acquired data (e.g., context or human behaviors) to a control center or a database. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Smart grids, wireless sensor networks, automotive networks, smart homes, e-healthcare, cloud storage services, agricultural networks, and industrial networks are examples of typical IoT applications. </span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><b><span style="font-family: Baskervville; font-size: medium;">IoT not only connects the physical and digital worlds, but also enables multi-dimensional data to be accessed for better decision-making. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-9365745256694539012021-06-03T10:23:00.002-07:002021-06-03T10:23:36.792-07:00Internet of Things Security and Privacy<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVXIGxn_ZqDg9Zb6fJA__-Qd5-53l7lrjaasglsEcZgJoDvhpe5wuUqB-un5lJp3JnIFMYM2_JECCN8uJjNmFQ5-zCSRkfpsgK4fW_stJ1scPAtilgFAMrSP6xKEW_frEF8cCKFWzOw0s/s984/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-12.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="340" data-original-width="984" height="139" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVXIGxn_ZqDg9Zb6fJA__-Qd5-53l7lrjaasglsEcZgJoDvhpe5wuUqB-un5lJp3JnIFMYM2_JECCN8uJjNmFQ5-zCSRkfpsgK4fW_stJ1scPAtilgFAMrSP6xKEW_frEF8cCKFWzOw0s/w400-h139/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-12.webp" width="400" /></a></div><br /><p></p><p><span style="font-family: Baskervville; font-size: medium;">In the Internet of Things, security and privacy are important considerations. A huge number of devices and communication channels make up an IoT system. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">IoT systems face a variety of security and privacy concerns from both internal and external attackers, as well as classic network-related vulnerabilities and emergent threats. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Before using the blockchain approach to create a safe and effective IoT system, it is critical to understand the special security and privacy risks associated with IoT systems.</span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The majority of security risks stem from a focus on IoT data and vulnerabilities in the underlying processing and communication technology. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">Confidentiality, integrity, and authentication are some of the security considerations. </span></p><p><span style="font-family: Baskervville; font-size: medium;">These features guarantee that data contents aren't exposed to enemies, data packets aren't changed with during transmissions, and unauthorized users aren't able to access the system. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Following that, privacy concerns are heightened, coupled with an increase in consumers' waking awareness of their sensitive data. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">The label (user identification) and the information associated to the label are the two main components of privacy. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">A user is the principal entity in an IoT application, such as a vehicular network, smart grids, or e-healthcare, who contributes data packets including personal information like destinations, smart metering readings, and treatment histories. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Knowing both the identities of users and the personal information associated with them allows for the construction of privacy. Transmitting data packets without first sanitizing them might lead to privacy leakage.</span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.comtag:blogger.com,1999:blog-5917383452252064582.post-69483392241934489282021-06-03T09:37:00.003-07:002021-06-03T10:26:11.326-07:00Blockchain in the Internet Of Things<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1A6eS4SVLLxFhxTDL1ZQjz_FG_2itX8YicOpMrExtiA1gFuQpo3WukjThc1qqjzVJqzftKYZqbapNddRt0VUdSYZDy4j1_zczWjsa6QtekyrgWkpnTYCFRVHAIHB_Evjlz_nWuYjnYQI/s510/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-13.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="340" data-original-width="510" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1A6eS4SVLLxFhxTDL1ZQjz_FG_2itX8YicOpMrExtiA1gFuQpo3WukjThc1qqjzVJqzftKYZqbapNddRt0VUdSYZDy4j1_zczWjsa6QtekyrgWkpnTYCFRVHAIHB_Evjlz_nWuYjnYQI/w400-h266/Internet-Of-Things-IoT-LightningIOT-Jai-Krishna-Ponnappan-13.webp" width="400" /></a></div><br /><span style="font-family: Baskervville; font-size: medium;"><br /></span><p></p><p><span style="font-family: Baskervville; font-size: medium;">As technical communities and commercial behemoths actively march toward service-directed systems with specific application needs, blockchain applications are generating a lot of buzz. </span></p><p><span style="font-family: Baskervville; font-size: medium;">Users will be able to acquire services with more promising characteristics thanks to such platforms. </span></p><p><b><span style="font-family: Baskervville; font-size: medium;">Blockchain was first used in Bitcoin as a shaky method of completing financial transactions. </span></b></p><p><span style="font-family: Baskervville; font-size: medium;">The idea that a trusted third party is no longer required is so intriguing that various blockchain-based payment methods, such as Mixcoin, Zerocoin, and Zerocash, have been proposed. </span></p><p></p><ul style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">It is even being used by banks to reconcile banking records that have occurred between them. </span></li><li><span style="font-family: Baskervville; font-size: medium;">In a system where entities lack trust for one another, blockchain is primarily employed as an immutable ledger. </span></li><li><span style="font-family: Baskervville; font-size: medium;">Given that a centralized storage solution is proving to be ineffective and problematic. A blockchain-based solution can increase system transparency, protect records against tampering, and build trust between parties. </span></li></ul><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h2 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">On this site, we aim to research and examine five B-IoT systems that are divided into two categories: </span></h2><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">1. Blockchain-enabled cloud storage services:</span></h3><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled cloud storage services </span></li><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled cloud data preservation services </span></li><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled controlled data management </span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><h3 style="text-align: left;"><span style="font-family: Baskervville; font-size: medium;">2. Blockchain-enabled vehicular network services:</span></h3><p></p><ol style="text-align: left;"><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled vehicle electricity transaction services, </span></li><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled carpooling services, </span></li><li><span style="font-family: Baskervville; font-size: medium;">Blockchain-enabled ride-hailing services </span></li></ol><p></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><span style="font-family: Baskervville; font-size: medium;"><br /></span></p><p><br /></p>Jai Krishna Ponnappanhttp://www.blogger.com/profile/02699917895019277960noreply@blogger.com