NETWORK / INFORMATION TECHNOLOGY COMPUTER COURSE UNIT 3 DB
Verified
Added on 2023/04/07
|3
|332
|156
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORK / INFORMATION TECHNOLOGY COMPUTER COURSE UNIT 3 DB ASSIGNMENT DETAILS. USE APA FORMAT ANSWER THE BELOW 3 QUESTIONS INTERNET OF THINGS COURSE Question 1 The constraints faced by IoT devices include, size of state and buffers for RAM, available sources of power, user interface and accessibility in deployment, throughput, processing power, highly asymmetric link characteristics, cost, and physical size,code complexity for ROM or flash (Nagasai, 2017). Constrained devices are connected to special devices which look like gateways to enable communications via the internet. Question 2 To ensure a successful IoT device communications, constrained devices are connected to low power lossy networks and devices that look like gateways. For organizations to simplify the crushing, constrained devices are connected to the internet. These constrained devices communicate with other IoT cloud platforms. IEFT has published a reference handbook that puts this constrained devices into three groups. That is class 0, class 1 and class 2.All these groups have different levels of contraints. Class 0 devices have constraints in memory and thus are initially configured and connected to proxies, gateways, or servers. These connections enable devices to communicate via the internet. The category of class 1 devices have constraints in low power IoT stack and code space and
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
processing capabilities. Finally, the category of class 2 devices are less constrained devices that can perform at per with mobile devices. Reduced developmental cost and increased interoperability are achieved when using class 2 devices(An Ha, Tho Nguyen, & Zao, 2016). Question 3 During typical IoT device communications, the IoT devices use low-power wireless communication protocols for example, BLE, LPWAN which are mostly battery powered with low data rate, 802.15.4 which include Zigbee, 6LoWPAN, Thread, WirelessHART among others.
References An Ha, D., Tho Nguyen, K., & Zao, J. (2016).Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol. https://doi.org/10.1145/3011077.3011108(Accessed 3.13.19). Nagasai. (2017, February 18). Classification of IoT Devices. Retrieved March 13, 2019, from http://www.cisoplatform.com/profiles/blogs/classification-of-iot-devices(Accessed 3.13.19).