Key technologies of IoT
Key technologies of IoT

Key technologies of IoT

RFID

RFID Technology
When it comes to the Internet of things, we have to mention the radio frequency identification (RFID) technology that has attracted much attention in the development of the Internet of things. RFID is a simple wireless system, which consists of an interrogator (or reader) and many transponders (or tags). The tag is composed of coupling elements and chips. Each tag has a unique electronic code to expand the entry. It is attached to the object to identify the target object. It transmits the RF information to the reader through the antenna. The reader is the device to read the information. RFID technology enables items to “speak”. This gives the Internet of things a feature, that is, traceability. In other words, people can grasp the exact location of objects and their surrounding environment at any time. According to the retail industry analyst of Sanford C. Bernstein company, this feature brought by RFID on the Internet of things can save Wal Mart $8.35 billion a year, most of which is due to the labor cost saved because it does not need to manually view the incoming bar code. RFID helps the retail industry solve the two major problems of commodity shortage and loss (products lost due to theft and disruption of the supply chain). Wal Mart’s loss in a year alone is nearly $2 billion.
Sensor network
MEMS is the English abbreviation of micro – electro – mechanical systems. It is an integrated micro device system composed of micro sensor, micro actuator, signal processing and control circuit, communication interface and power supply. Its goal is to integrate the acquisition, processing and execution of information to form a multifunctional micro system and integrate it into a large-scale system, so as to greatly improve the automation, intelligence and reliability of the system. It is a general sensor. Because MEMS gives new life to ordinary objects, they have their own data transmission path, storage function, operating system and special applications, so as to form a huge sensor network. This enables the Internet of things to monitor and protect people through items. In the case of drunk driving, if micro sensors are implanted in the car and the car ignition key, when the drunk driver takes out the car key, the key can detect a smell of alcohol through the smell sensor, and immediately notify the car to “Stop Starting” through wireless signal, and the car will be in a rest state. At the same time, “command” the driver’s mobile phone to send text messages to his relatives and friends, inform the driver of the location, and remind relatives and friends to deal with it as soon as possible. Not only that, in the future, clothes can “tell” how much water and washing powder the washing machine puts in the most economical; The folder will “check” what important documents we forgot to bring; The label of food and vegetables will introduce whether “oneself” is really “green and safe” to customers’ mobile phones. This is the result of being “materialized” in the world of the Internet of things.
M2M system framework
M2M is the abbreviation of machine to machine / man. It is a networked application and service with intelligent interaction of machine terminals as the core. It will make the object realize intelligent control. M2M technology involves five important technical parts: machine, M2M hardware, communication network, middleware and application. Based on cloud computing platform and intelligent network, decision-making can be made according to the data obtained by sensor network, and the behavior of objects can be changed for control and feedback. When the driver enters the car or leaves the car, it can automatically read the information related to the validity of the electronic card from the driver’s antenna, and judge whether the information card is related to the validity of the electronic card in the car parking area, Check that the lane control computer displays the license plate number and driver information corresponding to the electronic car card and driver card one by one; The lane control computer automatically stores the relevant information of passing time, vehicle and driver into the database. The lane control computer judges whether it is a normal card, unauthorized card, no card or illegal card according to the read data, and makes corresponding responses and prompts accordingly. In addition, the elderly at home wear watches embedded with smart sensors, and children in other places can check whether their parents’ blood pressure and heartbeat are stable at any time through their mobile phones; When the owner of the intelligent house goes to work, the sensor automatically turns off the water, electricity, doors and windows, and sends messages to the owner’s mobile phone regularly to report the safety situation.
cloud computing
Cloud computing aims to integrate multiple relatively low-cost computing entities into a perfect system with strong computing power through the network, and enable end users to get these powerful computing services with the help of advanced business models. If computing power is compared to power generation capacity, the shift from the ancient single machine power generation mode to the centralized power supply mode of modern power plants is like the shift from the customary single machine computing mode to the cloud computing mode, and the “cloud” is like a power plant, which has a powerful computing power unmatched by a single machine. This means that computing power can also be circulated as a commodity, just like gas, water and electricity. It is easy to access and low-cost, so that users do not need to equip themselves. Unlike power transmission through power grid, computing power is transmitted through various wired and wireless networks. Therefore, a core concept of cloud computing is to continuously improve the processing capacity of “cloud”, continuously reduce the processing burden of user terminals, and finally simplify it into a simple input and output device, and enjoy the powerful computing processing capacity of “cloud” on demand. The perception layer of the Internet of things obtains a large amount of data and information. After being transmitted through the network layer, it is put on a standard platform, and then processed by high-performance cloud computing to give these data intelligence, so as to finally convert them into useful information for end users

Leave a Reply

Your email address will not be published. Required fields are marked *