The key technology introduction and development forecast of the Internet of Things
Abstract:This paper introduces the background, definition of Internet of Things and the key technologies such as RFID technology, WSN technology of it; From the basic structure of Internet of Things, this paper emphatically analyzes the related concepts and design of RFID middleware and through to the technology of itself and analysis of market combined, I make a forecast and analysis to the future prospects of Internet of Things.
Keywords:Internet of Things; Key technology; Forecast and analysis;
1. IntroductionDue to the technical development of modern micro-electromechanical systems, microelectronics, System on Chip SOC, Nano-materials, sensors, wireless communications, computer networks, distributed information processing, wireless sensor networks (Wireless Sensor Networks, WSN) and radio frequency tags (Radio Frequency Identification RFID ) In recent years, rapid development. These two technologies are independent of each other, but there are inextricably linked, they cross each other and mutual integration, with a very broad application prospects in the military and national defense, industrial and agricultural control, urban management, biomedical, environmental monitoring, emergency many areas have a major disaster relief, counter-terrorism anti-terrorism, hazardous area, remote control, logistics management, personnel identification, automotive research and practical value, has attracted the attention of domestic and international research and industry-wide. When the deepening of the development of these technologies with today's Internet technology, Internet-based expansion and extension to form a new generation of network technology, the Internet of Things was born. The Internet of Things is a development opportunity facing humanity this century, known as the first change human life. Wide range of applications of the Internet of Things will be the information revolution, computers, the Internet and mobile communication network after another.
Technology of Internet of Things has been a widespread concern in recent years. The concept of the "Internet of Things" is on the basis of the "Internet Concepts", which refers to the types of sensors and the Internet interface between new technologies. Its purpose is to make all of the items are connected to the network to facilitate the identification and management involves identifying, sensing, information transfer and processing and other key technologies. There is no doubt that if the "Internet of Things" era, people's daily lives will have seen dramatic changes.
2. Theory of Internet of Things 2.1 Definition of Internet of Things
The Internet of Things is various sensing devices such as radio frequency identification (RFID) device, infrared sensors, global positioning systems, laser scanners and other devices and the Internet combine to form the a huge network. It refers to the types of sensors and the Internet interface in a new technology. Its purpose is to make all of the items are connected to the network to facilitate the identification and management involves identifying, sensing, information transfer and processing and other key technologies.#p#分頁標題#e#
2.2 The key technologies of Internet of Things
In 2005, the ITU published a report entitled "Internet of Things", its first author, Laura, Srivastava said: "We are now standing at the entrance of a new era of communication, in this day and age, we know the Internet will be undergoing a fundamental change in the ITU report of Things There are four key technologies: tag things RFID sensor network technology, perceive things, thinking things smart technology nanotechnology, miniature things.
2.2.1 RFID
RFID (radio frequency identification, radio frequency identification) RFID is a non-contact automatic identification technology, automatic target recognition by the RF signal and access to relevant data, the recognition process without human intervention, can work in a variety of harsh environments. RFID technology can identify the high-speed moving objects can also identify multiple tags, quick and easy operation. RFID technology and the Internet, telecommunications and other technology, can be realized goods tracking and sharing of information worldwide.
Compared with the current widespread use of automatic identification technology such as cameras, bar codes, magnetic cards, IC cards, RFID technology has many outstanding advantages: First, non-contact operation, long-distance identification (a few centimeters to tens of meters), so without human intervention to complete the identification work, the application of convenience; Second, no mechanical wear, long life, and can work in a variety of grease, dust, pollution and other harsh environments; can identify fast moving objects can also identify multiple electronic tags; the reader has a physical interface does not open directly to the end user, to ensure its own security;, data security, except the password protection of electronic tags, data portion can be used a number of algorithms to achieve security management; Sixth, there is a mutual authentication process between the reader and the tag, secure communications and storage.
Currently, RFID technology in industrial automation, object tracking, transport control and management, security and military purposes has been a wide range of applications.
(1) the basic components and how it works
The most basic RFID system consists of the following part of the composition:
① Electronic tags: The coupling components and chips, and each electronic tag has a globally unique identification number cannot be modified, cannot imitate, so to provide security. Electronic tag attached to the object to identify the target object. The electronic tags are normally saved in the agreed format of electronic data, in practical applications, the electronic tag attached to the surface of the object to be recognition.
②Reader: read (or write) the equipment of the electronic tag information can be designed for handheld or fixed.
③Antenna: wireless communication between RFID tags and readers, RF signal space propagation and the establishment of connected devices.#p#分頁標題#e#
④Middleware: a message-oriented, and can accept requests by the application software side, initiate and receive specified one or more readers, the results of data processing returns to the application software specialization software.
⑤Application Software: end-user of RFID applications-oriented interactive interface to help users complete the instruction operation of the reader, as well as middleware logic set, and step by step to RFID atomic events into use can understand the business events, and use visual interface display.
The basic working principle of the RFID technology is not complicated: the label into the magnetic field, receiving the RF signal emitted by the reader, by virtue of the induced current energy to send out product information stored on the chip (passive tags or passive tags), or active to send a frequency signal (active tags or active tags); readers to read and decode the information sent to the central information system for the data processing.
(2) RFID technology standard outlines
RFID technology standards developed by ISO and IEC. Currently available to the RF card of several radio frequency technology standard ISO/IEC10536, ISO / IEC 14443, ISO / IEC 15693 and ISO/IEC18000. The most widely used is the ISO / IEC 14443 and ISO/IEC15693, the two standards are the physical characteristics, radio frequency power and signal interface, initialization and anti-collision and the four components of the transport protocol.
2.2.2 WSN
(1) Introduction of WSN
WSN is a wireless sensor network; short for wireless sensor networks. The sensor network will be able to expand the capacity of people with the real world for remote interaction. Wireless sensor network is a new information access platform, real-time monitoring and collection of a variety of detection of objects in the distribution network within the region, and this information is sent to the gateway node in order to achieve the specified range of target detection and tracking, rapid deployment, anti-survivability characteristics of strong and has a broad application prospects. Business Week and MIT Technology Review reports predict future technological development, wireless sensor networks as the 21st century's most influential 21 technology and change the world, 10 technical one.
(2) WSN network structure
WSN network is usually divided into the physical layer, MAC layer, network layer, transport layer, application layer. The physical layer defines the physical parameters of communication in the WSN, which band, which signal modulation and demodulation. The MAC layer defines the initialization of each node, by sending and receiving beacons, request, and associate the message to complete their own network definitions, and debug strategy of the MAC frame defined at the same time, to avoid communication conflicts between multiple transmitting and receiving nodes. At the network layer to complete the logical routing information collection, send and receive network packages able to follow a different strategy, using the most optimal path to reach the target node. The transport layer provides the reliability of the parcel transfer; provide access to the application layer. The application layer will eventually integrate the collected node information processing, to meet different application needs.#p#分頁標題#e#
2.2.3 Intelligent Technology and Nanotechnology
Smart technology is to achieve some intended purpose to use the knowledge used in a variety of ways and means. Intelligent system implanted in the object, can make objects with a certain intelligence can be active or passive communication with the user, is also one of the key technologies of the Internet of Things.
Nanotechnology is the study of the structure size within the range of 0.1 to 100 nm. Nature of the material and application, the advantages of nanotechnology means that smaller and smaller objects in the Internet of things which can interact and connect. Current trends in electronic technology devices and systems smaller、faster and cooler. More faster means faster response speed; colder refers to the power of a single device. But smaller is not without limits.
3.1 Middleware Profile
Middleware is one of the basic software categories; belong to the scope of reusable software. As the name suggests, the middleware is in the middle of the operating system software with the user's application software.
Middleware in the above operating system, network and database application software lower the overall effect is in the top of the application software to run the development environment to help users with flexible, efficient development and integration of complex applications. IDC expressed in a number of middleware definition more widely accepted: middleware is an independent system software, or services program, distributed application software with this software to share resources between the different technologies, in the middle in client-server operating systems, management of computing resources and network communications.
RFID middleware is to achieve data transmission between the RFID hardware and application systems, filters, an intermediate data format conversion program, a variety of data read by the RFID reader, through the middleware extraction, decryption, filtering, format conversion, import management information systems, program interface for the operator to browse, select, modify, query and response through the application of the system. Middleware technology also reduces the difficulty of application development, developers do not need to directly face the underlying architecture, and make calls through the middleware.
RFID middleware is a message-oriented middleware; information is passed to one or more program modules in the form of a message from a program module. The messages can be asynchronously transmitted; the sender does not have to wait for a response. RFID middleware on the basis of the existing enterprise application middleware development, with its own application features to further expand and deepen the enterprise application middleware in the enterprise. Its main features are:
(1) Independence. RFID middleware independence between the RFID reader and back-end application does not depend on an RFID system and application systems, and can connect with more than one RFID reader and multiple back-end application in order to reduce architecture and its complexity.#p#分頁標題#e#
(2) Data Streams. It is the most important part of the RFID middleware, its main task is the entity object format into the information environment of virtual objects, and data processing is the most important RFID functionality. RFID middleware with data collection, filtering, integration and transmission characteristics, so that the correct object information transmitted to the enterprise back-end application systems.
(3) The processing flow. RFID middleware is a messaging middleware function is to provide a sequence of message flow, data flow design and management capabilities. The need to maintain the data transmission path, data routing and data distribution rules in the system. Data security in data transmission, including the consistency of the data to ensure that the data received by the recipient and sender. But also to ensure the security of data transmission.
3.2 middleware works
Reader continues to receive a series of EPC numbers, of which the most important of the whole process, is also the most difficult part is to deliver and manage these data. EPC numbers of Things network, the Reader will be collected to send to the Middleware, middleware for processing of these data to obtain useful data to the application system. Figure1 shows the RFID system flow chart.
相關文章
UKthesis provides an online writing service for all types of academic writing. Check out some of them and don't hesitate to place your order.