999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

The Internet of Things and Ubiquitous Intelligence(1)

2011-12-30 01:43:59
ZTE Communications 2011年1期

(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications)

1 Introduction

1.1 Technical Characteristics of the Internet of Things and Sensor Networks

I nspired by new technologies in computing,microelectronics,communications networking,and man-machine interaction,society has shifted its focus from network connection services to ubiquitous information services.With this shift,the Internet of Things has developed rapidly.However,as its technical connotations and denotations are continuously evolving,there is currently no uniform,integral,or accurate definition.People are defining the Internet of Things differently during its different stages of development.On November 17,2005,the ITU releasedITU Internet Report 2005:The Internet of Things[1],where the Internet of Things was defined as Radio Frequency Identification(RFID)-based thing-to-thing and thing-to-person Internet.But as sensor networks have matured and modern service technologies and new services have emerged,traditional definitions of the Internet of Things no longer satisfy technical and application requirements.

The Internet of Things is generally thought to be a network integrating information collection(using wireless sensor networks),information transmission(using the Internet and telecom,radio,and TV networks),new services and applications based on information service networks are also part of the Internet of Things.Generally speaking,the Internet of Things has typical characteristics:

(1)Ubiquitous information capturing.The sensor network is the engine of the Internet of Things and is at the tip of information sensing and processing.What makes sensor networks distinct from other networks is their capacity to collect massive amounts of diverse information on environment and events in close proximity.This information is obtained from various perspectives and for multiple parameters.The diversity of information,mass quantity of information,and complexity of relationships between information is unprecedented.With node identification,sensor devices can assign specific locations and identifications to a piece of information,which allows the information to be used in future applications.

(2)Reliable information transmission.In the Internet of Things,information categories become much richer and differentiation in Quality of Service(QoS)becomes more complicated than in existing networks.Information service rather than connection service will be a basic operation feature of the Internet of Things.As an infrastructure and support environment for a ubiquitous information society,ubiquitous networks will be an important objective in developing information communication networks.Reliable and effective transmission technologies are required in existing networks for providing ubiquitous and intelligent services and providing people with rich real-world information.

(3)Efficient information applications.The major difference between the Internet of Things and existing networks is ubiquitous intelligence.The richness that comes with masses of sensing information and reliable information transmission is essential for providing diverse services using the Internet of Things.Processing and utilizing mass sensing information can provide enterprises and the general public with new service modes and experiences—especially ubiquitous services,business operation modes,and management systems that can adapt to context.

This lecture discusses three important components of the Internet of Things:Sensor network collection of information,ubiquitous network-based information transmission,and new service technologies and businesses using collected information.This part focuses on the sensor network.

1.2 Development Background of the Sensor Network

Since the middle of the 20th century,computing technologies and network technologies have together given rise to many new application modes and technical means.But all these fall into the category of traditional person-to-person or person-to-machine interaction.With the rapid development of communication technologies,embedded computing technologies,and microelectronic technologies,the manufacturing costs of electronic products has been steadily decreasing,as predicted by Moore’s Law.In the 1990s,the first microintelligent sensor was put into use that had sensing,computing,and communication capabilities and was suitable for different environments.Using the microsensor as the network node—Wireless Sensor Network(WSN)technology—completely changed the way information is acquired[2].

WSN is a potential network.Many simple nodes can be randomly deployed in remote locations and under adverse conditions.In a self-organizing network,all nodes work cooperatively to monitor,sense,and collect information in complicated environments or to monitor objects within the network’s distribution area and process the information.In this way,nodes obtain detailed and accurate information and then send it to interested observers.Because it is a bridge between the objective physical world and subjective sensing world,WSN is a new information acquisition and processing technology,a revolution in information sensing and collection.

Now,WSN is a hot research topic in network communications and information processing in the U.S.,and efforts to develop it are being stepped up.In its Information and Communication Technologies(ICT)Seventh Framework Programme(FP7)started in 2007,the European Union lists WSN as an important research area in network embedded control systems.In South Korea,the IT839 strategy makes ubiquitous sensor networking one of the three key infrastructures.In Japan,both e-JAPAN and U-JAPAN strategies have sensor networking as a goal for creating a next-generation Information and Communication Technology(ICT)society by 2010.

2 Key Technologies of the Sensor Networks

2.1 Nodes

Nodes are the basis for WSN research and application.All protocols,mechanisms,and algorithms related to WSN must be implemented via nodes.Therefore,node design and implementation determine functions,performance,and investment across the entire network.Most WSNs use general embedded platforms as their nodes;for example,Crossbow’s Mica-and Telos-series nodes.These platforms use common CPUs to connect peripheral devices—such as sensors and RF chips—in order to form sensor nodes.Node functions are developed mainly by software.On the one hand,node functions,supported by TinyOS and other operating systems,are relatively easy to develop.On the other,node development is limited because of fixed hardware and node size,and cost.Also,power consumption cannot be reduced through physical design.Nodes have limited processing capability and it is difficult to develop sophisticated programs to counter this.

Most WSN applications rely on critical performance indexes for achieving low power consumption,low cost,small size,easy deployment,and reliability.One practical approach to meeting these demands is to employ System on Chip(SoC)nodes.Highly integrated technology and good physical design can reduce size,cost,and power consumption of nodes,and architecture designed especially for WSN improves its computing efficiency and capability.This is a trend for future node technologies.

2.2 Network Protocol and Networking

In WSN,the protocol stack design determines the self-organization mode and communication performance of network nodes.It also determines interconnection and access methods of heterogeneous networks.Protocol stack design ensures effective energy,scalability and reliable transmission in WSN when there are limited network resources.WSN protocol stack and working technologies fall roughly into two categories:Non IP-based protocol stack and IP-based protocol stack.

Two examples of non IP-based protocol stacks are Zigbee and Sensor-Net.Zigbee is a low consumption,low power,reliable wireless network standard from the Zigbee Alliance[3].Sensor-Net is an architecture especially designed for the sensor network[4].It adopts cross-layer design for energy management,system management,time synchronization,discovery,and security.Inter-layer cooperation allows better management and control.

At present,there are only a few IP-based protocol stacks,including NanoStack,PhyNet,and IPv6 micro sensor router.NanoStack is an embedded sensor network software project based on IPv6 over Low power Wireless Personal Area Networks(6LoWPAN)[5].This protocol stack contains User Datagram Protocol/Internet Control Message Protocol(UDP/ICMP),6LoWPAN IPv6 protocol,and IEEE 802.15.4 Media Access Control(MAC)protocol.Because IPv6 allows for much larger packet capacity than the maximum frame capacity specified in IEEE 802.15.4,an adaptation layer is added between the network and data link layers to splice and reorganize IP packets.In this way,low-rate transmission requirements of Wireless Personal Area Networks(WPAN)can be met.PhyNet protocol stack is an industrial solution based on the IETF’s 6LoWPAN.It is used for implementing IP-based communication in WPAN.This protocol stack takes the 6LoWPAN standard as its core and supports IEEE 802.15.4 physical layer and MAC layer protocols.

In addition,WSN must support interconnection with other networks for sharing and processing information.Further study into the architecture and self networking technologies of WSN is required.

2.3 Information Processing

Information processing technologies of the sensor network are diverse,ranging from embedded,lightweight information processing technology within a node to distributed network information processing technology between nodes.On the one hand,WSN is cheap,has high observation precision,and can integrate heterogeneous sensor information.These advantages lay the foundation for implementing an ideal information processing technology.On the other hand,with low power consumption,heterogeneous interconnection,ubiquitous cooperation,and limited nodes,WSN has some technical drawbacks for information processing.The progress of research on core information processing technologies for the sensor network is as follows:

·Signal processing,information identification,and information extract technologies within a node:These technologies are used to guarantee the accuracy of signal collection and sensing.Especially for sensor networks with limited nodes,embedded and lightweight signal processing,information identification,and extract technologies are necessary.Node signal processing technology and information identification,information extraction,and application of technology are closely related.These technologies need to tune the node degree of intelligence and lightweight signal processing algorithms constrained by the node resource.

·Distributed cooperative processing technologies between the nodes:The goal of these technologies is to improve a node’s intelligence in estimating its surroundings and identifying attributes.Such technologies include cooperative technology among distributed nodes and multisensor information integration technology.With limited resources,a node in the sensor network can only sense local information.Hence,all nodes in the network must cooperate with each other to obtain global information.In a multisensor system,information is extremely diverse,the quantity of information is massive,and relationships between information are complex.Therefore,multisensor information integration technology is the key for information processing in WSN.

·Information compression and coding technologies.These can greatly improve the transmission performance of a multihop link and bring about effective,reliable signal transmission.Packet compression is an effective low consumption communication technology that reduces the length of a packet by information redundancy.It can shorten end-to-end transmission delay of a data packet and reduce conflict in accessing shared channels.

2.4 Security

Due to resource limits,WSN has more security challenges than traditional networks.A low consumption security solution designed for WSN should take into account optimal loads for communication and computing,distribution and update of secure keys,security authentication and anticapture of nodes,and scalability in secure key management.The goal of WSN security technologies is to ensure information security during node communication.

Key management is a basic but important step in security management.To improve security and antiattack performance of the network,a key management mechanism needs to be implemented.Current research into attacks against sensor networks focuses mainly on secure routing technologies.In China,researchers have been studying specific key management protocols—which are still theoretical models—rather than studying sensor network security from a systematic perspective.Moreover,research on secure routing technologies is concentrated on stability and simulation of routing algorithms.Although some security models and objectives have been proposed,there is still no secure routing approach that is feasible for sensor networks.

In China,research into security models for sensor networks has been focused on particular scenarios rather than on a general security solution.Therefore,one area that requires systematic study is general security models for sensor networks,including secure communication protocols,secure key management,secure routing,and access control.

(To be continued)

[1]International Telecommunication Union(2005)ITU Internet Report 2005:The Internet of Things.Geneva:ITU.[Online].Available:http://www.itu.int/pub/S-POL-IR.IT-2005/e

[2]I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E.Cayirci,“A survey on sensor networks,”IEEE Communications Magazine,no.8,Aug.2002.

[3]ZigBee Alliance.[Online].Available:http://www.zigbee.org/

[4]J.Polastre,J.Hui,P.Levis et al.,“A unifying link abstraction for wireless sensor networks,”inProc.3rd ACM Conf.Embedded Networked Sensor System(Sensys05),San Diego,CA,2005,pp.

[5]“IPv6 over low power WPAN,”datatracker.ietf.org.[Online].Available:http://datatracker.ietf.org/wg/6lowpan/charter/

主站蜘蛛池模板: 婷婷中文在线| 国产白浆一区二区三区视频在线| 国产凹凸一区在线观看视频| 制服丝袜国产精品| 亚洲aaa视频| 狠狠操夜夜爽| 激情六月丁香婷婷| 久久6免费视频| 国产在线视频自拍| 97国产成人无码精品久久久| 免费 国产 无码久久久| 91久久精品国产| 91精品国产丝袜| 国产网友愉拍精品| 国产91色在线| 丁香婷婷久久| 国产乱人伦AV在线A| 亚亚洲乱码一二三四区| 欧美日韩中文国产va另类| 成人亚洲天堂| 被公侵犯人妻少妇一区二区三区| 成人噜噜噜视频在线观看| 无码有码中文字幕| 91口爆吞精国产对白第三集| 午夜视频在线观看区二区| 婷婷色中文| 亚洲欧美日韩天堂| 在线观看国产黄色| 乱人伦视频中文字幕在线| 国产SUV精品一区二区| 国产美女91呻吟求| 无码中文字幕加勒比高清| 波多野结衣无码AV在线| 青青操国产| 亚洲性日韩精品一区二区| 成人午夜视频网站| 日韩精品免费在线视频| 麻豆国产原创视频在线播放 | 成人a免费α片在线视频网站| 先锋资源久久| 日本精品影院| 亚洲精品中文字幕午夜| 婷婷色丁香综合激情| 国产亚洲精久久久久久无码AV| 欧美在线综合视频| 亚洲AV电影不卡在线观看| 久久精品一卡日本电影| 久久毛片网| 国产成人亚洲综合A∨在线播放| 综合网久久| 中文字幕1区2区| 国内精品91| 丝袜无码一区二区三区| 成人伊人色一区二区三区| 亚洲国产av无码综合原创国产| 天天激情综合| 996免费视频国产在线播放| 久久免费精品琪琪| 亚洲人成网站色7799在线播放| 又粗又硬又大又爽免费视频播放| 99re在线免费视频| 情侣午夜国产在线一区无码| 国产午夜在线观看视频| 久久semm亚洲国产| 蜜桃视频一区二区| 无码久看视频| 爱做久久久久久| 99视频在线免费| 91美女在线| 少妇高潮惨叫久久久久久| 色综合久久88| 亚洲AV无码不卡无码| 国产乱人乱偷精品视频a人人澡| 播五月综合| 国产小视频免费观看| 麻豆国产原创视频在线播放| 欧美人在线一区二区三区| 亚洲成网站| 午夜啪啪网| 在线国产你懂的| 女同国产精品一区二区| 日本高清免费一本在线观看|