SlideShare una empresa de Scribd logo
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
Please Contact us for more information, thank you.
Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096
What is the 5 Commonly Used Internet of Things
Technologies?
Today, we talk about the 5 wireless technologies commonly used in the Internet of Things
technologies. Do you know what are they?
One of the most common misconceptions about the Internet of Things is that it's only about
connected devices. In reality, the term Internet of Things/IoT applies to anything or everything
that can be connected to the Internet, including people and ecosystems.
For example, smartwatches are an example of an IoT device, and so are wearable fitness trackers.
Even tablets that support wireless capabilities can be considered IoT devices.
Each of them has its own unique software and hardware components that allow it to send data
(over the Internet) to and receive data from other devices and sources, while also operating
independently as a unit with built-in processing power.
All these different devices are connected together through a network, and they can then
communicate with each other and even collect data from their surroundings and operate
autonomously accordingly (a process called machine learning).
Let's see what emerging technologies are available for use in the Internet of Things technologies.
Internet of Things technologies 1. Network protocols
TCP/IP
Most IoT devices use this protocol to transmit data. It is not the only choice, but it is probably the
most popular, thanks in large part to its reliability and ease of scalability.
Mesh network
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
Please Contact us for more information, thank you.
Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096
In this configuration, data transmitted by one of the devices is relayed through other devices until
it reaches its destination.
This is important for many IoT applications because it means that when a node in the network
topology fails or becomes unserviceable, this architecture allows a "hopping" approach to form a
new route and deliver the data to the transmission destination.
Low-power WAN
Another type of private network that allows smart meters and other low-power devices to
transmit data over relatively long distances (about 10 km).
Bluetooth Low Energy
A more energy-efficient version of traditional Bluetooth, BLE sends very little data over short
distances - a good choice for applications that do not store large amounts of data or do not
require extremely fast transmission speeds.
Internet of Things technologies 2. Beacons
A beacon is a sensor device that transmits data (usually a low-power Bluetooth or BLE signal) to a
mobile application, enabling the transmission of dynamic information in physical space.
One of the most common uses of beacon technology is indoor navigation, which can help
employees navigate through unfamiliar buildings or help shoppers navigate through large malls.
Beacons can also be used to provide directions based on proximity in large areas, even those
without Wi-Fi, such as open stadiums or concert venues.
Another application of beacons is to push location-based notifications. For example, when you
walk near a Starbucks, you might receive a notification on your phone of its coupons.
This kind of interaction has huge implications for the retail industry, and beacons are one of the
technologies that enable brick-and-mortar retailers to counter their online competitors with new
concepts such as "retail as entertainment".
Internet of Things technologies 3. Machine learning
Machine learning is an emerging technology that allows computers to act autonomously without
instructions. In the last decade, machine learning has provided us with self-driving cars, practical
speech recognition, effective web searches, and a great understanding of the human genome.
Machine learning is so pervasive today that you may use it dozens of times in a day without
realizing it. Many researchers believe this is the best way to move toward human-level artificial
intelligence.
Internet of Things technologies 4. Connected Technology
When you think of the Internet of Things, the first thing that comes to mind is a smart home with
lights activated by voice commands, or a smart factory in which machines communicate with
each other to alert human employees of maintenance needs.
These scenarios show that connectivity technologies are critical to the IoT world. The following
Internet of Things technologies play a key role in enabling this connectivity.
Wi-Fi
This is one of the most commonly used wireless communication protocols today, especially in
personal devices such as laptops, smartphones, and fitness bracelets. Due to its popularity, it's
easy to see why it plays an important role in the IoT world.
C&T RF Antennas Inc
https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/
Please Contact us for more information, thank you.
Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096
Bluetooth
This technology was originally invented as an alternative cable for portable personal devices such
as keyboards, mice, and headsets.
This short-range wireless transmission protocol is also used in healthcare applications, such as
wearables for medical monitoring and smart medical devices that connect wirelessly to
smartphones for data collection.
NFC (Near Field Communication)
Although similar to RFID (Radio Frequency Identification), NFC works through electromagnetic
induction rather than radio waves. Two devices can share information with each other when they
are close together (20 cm or more). Today NFC is very popular in mobile payment.
Internet of Things technologies 5. Sensors
IoT sensors are usually miniature devices that collect and transmit data such as temperature,
humidity, air quality, and activity. Although the size of these sensors is small, their impact on the
IoT is significant.
The key to the success of IoT sensors is that they must be low cost, low power, and can be easily
integrated into devices or objects that are already in use.
There are more opportunities ahead, especially in sensing technology, as current systems often
require more computing power from edge devices (i.e., where the sensors are located).
The Internet of Things technologies is combined with many different technologies. It is an
ecosystem of physical objects that use embedded sensors, processors, and communications
hardware to collect and exchange data.
Besides this What is the 5 Commonly Used Internet of Things Technologies article, you may also
be interested in the below articles?
What is the difference between WIFI and WLAN?
Summary of 41 Basic Knowledge of LTE
What Spectrum Is Used In 5G?
What Is Wi-Fi 7?
How To Choose 2.4G And 5G?
What Is The 5G Network Slicing?
What Are The IoT Antenna Types?
How to Choose the Best Antenna for Lora?

Más contenido relacionado

Similar a What is the 5 Commonly Used Internet of Things Technologies.pdf

Wireless networks
Wireless networks Wireless networks
Wireless networks
Shellychoudhary1
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
Puneet Mishra
 
IOT - Thesis Report about Home Automation System
IOT - Thesis Report about Home Automation SystemIOT - Thesis Report about Home Automation System
IOT - Thesis Report about Home Automation System
SH Rajøn
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
Dr.R. Gunavathi Ramasamy
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
vishal choudhary
 
Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)
Octal Info Solution Pte Ltd
 
Iot
IotIot
Trends and technological and social innovations in innovation
Trends and technological and social innovations in innovationTrends and technological and social innovations in innovation
Trends and technological and social innovations in innovation
David Cardenas
 
1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
aravind Guru
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Marjuk Ahmed Siddiki
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
SumanPramanik7
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Iotppt
IotpptIotppt
Iotppt
Richa Pandey
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
MulukenTamrat2
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam25
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
Md.Imtiaz Ahmed
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
AnkitaVerma776806
 

Similar a What is the 5 Commonly Used Internet of Things Technologies.pdf (20)

Wireless networks
Wireless networks Wireless networks
Wireless networks
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
IOT - Thesis Report about Home Automation System
IOT - Thesis Report about Home Automation SystemIOT - Thesis Report about Home Automation System
IOT - Thesis Report about Home Automation System
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)Introduction to IoT (Internet of Things)
Introduction to IoT (Internet of Things)
 
Iot
IotIot
Iot
 
Trends and technological and social innovations in innovation
Trends and technological and social innovations in innovationTrends and technological and social innovations in innovation
Trends and technological and social innovations in innovation
 
1. IoT.pptx
1. IoT.pptx1. IoT.pptx
1. IoT.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Iotppt
IotpptIotppt
Iotppt
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
IOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdfIOT VIVA QUESTION.pdf
IOT VIVA QUESTION.pdf
 

Más de Antenna Manufacturer Coco

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
Antenna Manufacturer Coco
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
Antenna Manufacturer Coco
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
Antenna Manufacturer Coco
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
Antenna Manufacturer Coco
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
Antenna Manufacturer Coco
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
Antenna Manufacturer Coco
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
Antenna Manufacturer Coco
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
Antenna Manufacturer Coco
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
Antenna Manufacturer Coco
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Antenna Manufacturer Coco
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
Antenna Manufacturer Coco
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
Antenna Manufacturer Coco
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
Antenna Manufacturer Coco
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
Antenna Manufacturer Coco
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
Antenna Manufacturer Coco
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
Antenna Manufacturer Coco
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
Antenna Manufacturer Coco
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
Antenna Manufacturer Coco
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
Antenna Manufacturer Coco
 

Más de Antenna Manufacturer Coco (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
What are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdfWhat are LPWAN Technologies Listed In IoT.pdf
What are LPWAN Technologies Listed In IoT.pdf
 
Top 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdfTop 14 IoT Trends to Emerge in 2023.pdf
Top 14 IoT Trends to Emerge in 2023.pdf
 
Comparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdfComparison of GSM and NB-IoT Coverage Capability.pdf
Comparison of GSM and NB-IoT Coverage Capability.pdf
 
What Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdfWhat Are NB-IoT Technology And Its Features.pdf
What Are NB-IoT Technology And Its Features.pdf
 
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdfLoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
LoRa Alliance Extends LoRaWAN Standard to Support IoT Applications.pdf
 
What is A Private 5G Network.pdf
What is A Private 5G Network.pdfWhat is A Private 5G Network.pdf
What is A Private 5G Network.pdf
 
What is LPWAN.pdf
What is LPWAN.pdfWhat is LPWAN.pdf
What is LPWAN.pdf
 
What is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdfWhat is 5G LAN How Does It Work.pdf
What is 5G LAN How Does It Work.pdf
 
Internal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdfInternal Antenna VS. External Antenna.pdf
Internal Antenna VS. External Antenna.pdf
 
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdfYagi Antenna Design and 433MHz Antenna Design Example.pdf
Yagi Antenna Design and 433MHz Antenna Design Example.pdf
 
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
55 Different Types of Antennas With Examples Used in Wireless Communication.pdf
 
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdfWiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
WiFi vs. Cellular, Is WiFi Better Than Cellular.pdf
 
Mobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdfMobile networks’ evolution from 1G to 5G.pdf
Mobile networks’ evolution from 1G to 5G.pdf
 
What is DTU.pdf
What is DTU.pdfWhat is DTU.pdf
What is DTU.pdf
 
What is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdfWhat is a DTU and What Does it Do.pdf
What is a DTU and What Does it Do.pdf
 
New Technology in Farming Applications.pdf
New Technology in Farming Applications.pdfNew Technology in Farming Applications.pdf
New Technology in Farming Applications.pdf
 
What is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdfWhat is the Difference Between LTE and Wifi.pdf
What is the Difference Between LTE and Wifi.pdf
 
Wifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdfWifi vs LTE Technology.pdf
Wifi vs LTE Technology.pdf
 
Comparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdfComparison of 7 Common Positioning Technologies.pdf
Comparison of 7 Common Positioning Technologies.pdf
 

Último

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Último (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

What is the 5 Commonly Used Internet of Things Technologies.pdf

  • 1. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ Please Contact us for more information, thank you. Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096 What is the 5 Commonly Used Internet of Things Technologies? Today, we talk about the 5 wireless technologies commonly used in the Internet of Things technologies. Do you know what are they? One of the most common misconceptions about the Internet of Things is that it's only about connected devices. In reality, the term Internet of Things/IoT applies to anything or everything that can be connected to the Internet, including people and ecosystems. For example, smartwatches are an example of an IoT device, and so are wearable fitness trackers. Even tablets that support wireless capabilities can be considered IoT devices. Each of them has its own unique software and hardware components that allow it to send data (over the Internet) to and receive data from other devices and sources, while also operating independently as a unit with built-in processing power. All these different devices are connected together through a network, and they can then communicate with each other and even collect data from their surroundings and operate autonomously accordingly (a process called machine learning). Let's see what emerging technologies are available for use in the Internet of Things technologies. Internet of Things technologies 1. Network protocols TCP/IP Most IoT devices use this protocol to transmit data. It is not the only choice, but it is probably the most popular, thanks in large part to its reliability and ease of scalability. Mesh network
  • 2. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ Please Contact us for more information, thank you. Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096 In this configuration, data transmitted by one of the devices is relayed through other devices until it reaches its destination. This is important for many IoT applications because it means that when a node in the network topology fails or becomes unserviceable, this architecture allows a "hopping" approach to form a new route and deliver the data to the transmission destination. Low-power WAN Another type of private network that allows smart meters and other low-power devices to transmit data over relatively long distances (about 10 km). Bluetooth Low Energy A more energy-efficient version of traditional Bluetooth, BLE sends very little data over short distances - a good choice for applications that do not store large amounts of data or do not require extremely fast transmission speeds. Internet of Things technologies 2. Beacons A beacon is a sensor device that transmits data (usually a low-power Bluetooth or BLE signal) to a mobile application, enabling the transmission of dynamic information in physical space. One of the most common uses of beacon technology is indoor navigation, which can help employees navigate through unfamiliar buildings or help shoppers navigate through large malls. Beacons can also be used to provide directions based on proximity in large areas, even those without Wi-Fi, such as open stadiums or concert venues. Another application of beacons is to push location-based notifications. For example, when you walk near a Starbucks, you might receive a notification on your phone of its coupons. This kind of interaction has huge implications for the retail industry, and beacons are one of the technologies that enable brick-and-mortar retailers to counter their online competitors with new concepts such as "retail as entertainment". Internet of Things technologies 3. Machine learning Machine learning is an emerging technology that allows computers to act autonomously without instructions. In the last decade, machine learning has provided us with self-driving cars, practical speech recognition, effective web searches, and a great understanding of the human genome. Machine learning is so pervasive today that you may use it dozens of times in a day without realizing it. Many researchers believe this is the best way to move toward human-level artificial intelligence. Internet of Things technologies 4. Connected Technology When you think of the Internet of Things, the first thing that comes to mind is a smart home with lights activated by voice commands, or a smart factory in which machines communicate with each other to alert human employees of maintenance needs. These scenarios show that connectivity technologies are critical to the IoT world. The following Internet of Things technologies play a key role in enabling this connectivity. Wi-Fi This is one of the most commonly used wireless communication protocols today, especially in personal devices such as laptops, smartphones, and fitness bracelets. Due to its popularity, it's easy to see why it plays an important role in the IoT world.
  • 3. C&T RF Antennas Inc https://ctrfantennasinc.com/ https://lcantennas.com/ https://pcbantennas.com/ Please Contact us for more information, thank you. Contact Person: Coco Lu cocolu@ctrfantennas.com (+86)13412239096 Bluetooth This technology was originally invented as an alternative cable for portable personal devices such as keyboards, mice, and headsets. This short-range wireless transmission protocol is also used in healthcare applications, such as wearables for medical monitoring and smart medical devices that connect wirelessly to smartphones for data collection. NFC (Near Field Communication) Although similar to RFID (Radio Frequency Identification), NFC works through electromagnetic induction rather than radio waves. Two devices can share information with each other when they are close together (20 cm or more). Today NFC is very popular in mobile payment. Internet of Things technologies 5. Sensors IoT sensors are usually miniature devices that collect and transmit data such as temperature, humidity, air quality, and activity. Although the size of these sensors is small, their impact on the IoT is significant. The key to the success of IoT sensors is that they must be low cost, low power, and can be easily integrated into devices or objects that are already in use. There are more opportunities ahead, especially in sensing technology, as current systems often require more computing power from edge devices (i.e., where the sensors are located). The Internet of Things technologies is combined with many different technologies. It is an ecosystem of physical objects that use embedded sensors, processors, and communications hardware to collect and exchange data. Besides this What is the 5 Commonly Used Internet of Things Technologies article, you may also be interested in the below articles? What is the difference between WIFI and WLAN? Summary of 41 Basic Knowledge of LTE What Spectrum Is Used In 5G? What Is Wi-Fi 7? How To Choose 2.4G And 5G? What Is The 5G Network Slicing? What Are The IoT Antenna Types? How to Choose the Best Antenna for Lora?