eBook - ePub
The Internet of Everything
Advances, Challenges and Applications
This is a test
- 184 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
The Internet of Everything
Advances, Challenges and Applications
Book details
Book preview
Table of contents
Citations
About This Book
In the era before IoT, the world wide web, internet, web 2.0 and social media made people's lives comfortable by providing web services and enabling access personal data irrespective of their location. Further, to save time and improve efficiency, there is a need for machine to machine communication, automation, smart computing and ubiquitous access to personal devices. This need gave birth to the phenomenon of Internet of Things (IoT) and further to the concept of Internet of Everything (IoE).
This book aims to present different aspects of IoE, challenges faced by IoE and its applications, divided into 8 chapters. This multifaceted coverage of the various verticals and IoT layers is the main attraction of this book.
Frequently asked questions
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoâs features. The only differences are the price and subscription period: With the annual plan youâll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access The Internet of Everything by Nilanjan Dey, Gitanjali Shinde, Parikshit Mahalle, Henning Olesen in PDF and/or ePUB format, as well as other popular books in Informatica & Intelligenza artificiale (IA) e semantica. We have over one million books available in our catalogue for you to explore.
Information
1.1 Introduction
Recently, the wireless network has allured much concentration from researchers because of the technological growth of wireless communication. The wireless network can be categorized into two types: infrastructured and infrastructure-less. In infrastructured wireless networks, the wireless mobile nodes communicate with access points that are attached to the fixed infrastructure. Nowadays, we already have over a dozen widespread infrastructured wireless networks in use: global system for mobile communications, universal mobile telecommunications service, wireless local loop, wireless local area network and others. In infrastructure-less or ad hoc wireless network, the wireless mobile nodes function as routers to confirm connectivity among the mobile nodes. These wireless mobile nodes establish a spontaneous network to interchange information without relying on any preexistent fixed infra-infrastructure. Various infrastructure-less networks are available, which include mobile ad hoc networks (MANET), wireless sensor networks (WSN), vehicular ad hoc networks (VANET) and flying ad hoc networks (FANET) [lâ3]. A WSN is an infrastructure-less network of physically scattered self-governing devices using sensors to observe physical or environmental conditions. Furthermore, in the Internet of things (IoT), the WSNs become greatly popular [4]. VAHNET is an infrastructure-less network of smart vehicles set up with wireless devices [5]. FANET is an infrastructure-less network of a group of tiny flying vehicles equipped with camera, sensor and GPS [6]. The MANET is the most commonly used cost-effective infrastructure-less network. The wireless mobile nodes in MANET establish communication by forming a self-configurable and continuously evolving network [7]. The continuously changing and self-evolving feature of MANETs makes them most suitable for emergency communications. In emergency situations, during natural calamities such as earthquake, flood, tsunami and hurricanes, or man-made calamities such as terrorist attack and bomb blasts, the quick infrastructured network could be completely disrupted. Eventually, the rapid response and coordinated assistance become saturated and unmanageable. The MANET plays a vital role in the smooth conduction of rescue operations after the natural or man-made calamities [8].
Furthermore, through the advent of sensor-enabled smart mobile devices, MANETs have become a crucial element in the framework of smart city and IoT scenarios [9]. In addition, incorporation of multiple inputâmultiple output (MIMO) technology with MANET can enhance the performance of communication process in hazardous surroundings [10]. The framework of IoT with the keystone as an identity of wireless mobile computing devices has become the foundation for incorporating security methods such as authentication and authorization [11, 12]. The diverse applications of MANET received potential attention toward efficient network creation in MANET. The continuously evolving and uncertain behavior of MANETs makes routing a more interesting facet to emphasize upon [13]. Broadcasting is the most fundamental operation used for routing in MANET. Flooding is the elementary operation used for broadcasting in MANET. In flooding, when a node gets the broadcast packet relay on the packet to all its neighbors; in return, these neighbors get a broadcast packet relay on the packet to its neighbors. This process of relaying on the packet sustains until all reachable nodes in the network get the packet. The packets flood the network gradually and hence cause redundant broadcasts, collisions and contention problem in the network. Such a severe problem is collectively known as broadcast storm problem (BSP) [14]. The fundamental solution on BSP is to minimize the number of redundant packets. There are several enhanced schemes that inhibit some nodes from broadcasting the packets through the network with the aim to reduce the impact of BSP. The flooding is simple to implement but it suffers not only from BSP and also incurs high energy consumption in the network.
The continuous mobilit...
Table of contents
- Title Page
- Copyright
- Contents
- Introduction
- 1âAdaptive routing for emergency communication via MANET
- 2âPartial face recognition using image fusion
- 3âThreat analysis and attack modeling for machine-to-machine communication toward Internet of things
- 4âSecurity issues and trust management schemes in Internet of things
- 5âUsersâ privacy at online social networks in Indian context: comprehensive multiaged group survey and discussion
- 6âEarly prediction of breast cancer from mammogram images using classification methods: a comparison
- 7âDeep brain monitoring using implantable sensor and microcontroller: a review
- 8âEnhancement path assured transfer protocol to transmit urgent data