Monday, December 30, 2019

The Core Building Blocks Of An Internet Of Things

A Preliminary Literature Survey Eliasson et al., (2015) states that ‘Small embedded systems equipped with a combination of sensors and/or actuators, as well as with networking capabilities, are the core building blocks of an Internet of Things’. The major challenge in IoT is interoperability. Interoperability can be achieved by the use of many protocols some of which are proprietary while the others are open standards. All these protocols are focused to result in one and only IoT protocol. But Semle (Semle) believes that this will never be the case and that these protocols would co-exist each with their own advantages and disadvantages. The challenges for IIoT get more complex while correlating the requirements of Industrial Internet†¦show more content†¦This is because there are numerous open source tools that use HTTP, and every coding language has HTTP libraries. The role of HTTP in this application is around Representational State Transfer (REST), which is a communication model by which clients can access data on the server by sending requests (Semle, 2015). LabVIEW LabVIEW is a software package from National Instruments, which is commonly used for lab experiments are equipped for upgrade to remote operation. LabVIEW has built in functionalities that aid remote monitoring, visualization and control of the experiment (Salihbegovic and Tanovic, 2008). LabVIEW Web GUI builder facilitates to build web page for this application so that it can access using Internet browser. Security In the context of Industrial control systems, the term security refers to data security as well as protection of humans, environment and machines or devices as a result of system failure. With the introduction of information technology with industrial systems, protection against cyber attacks has become a major factor considered for the design of IIoT systems at different levels. For an industrial production system, the main objective is availability, which means any unnecessary delay due to cyber attacks or system failure would result in loss of huge revenue. This particularly consists of protection against denial-of-service attacks (Sadeghi et al., 2015). Case studies Similar application

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.