User-based devices that communicate, consume content, and create and publish content for other people to utilise have dominated our current version of the Internet. The developing Internet of Things (IoT) is about to change that.
While it will include the “old” Internet of user-based devices, it is very different for one simple reason: people will not operate billions of new devices connected and tracked at the periphery of the network. These devices may be semi- or even fully automated, and they will vastly outnumber the human-operated devices in a short period of time.
Like the old Internet, this IoT will continue to include data, voice and video. But it will also contain new assets that will take the Internet from being a network of human-operated devices to a network containing many nonhuman-operated devices - the “things” of IoT.
The IoT contains a variety of technical systems and devices that go by different names, but all fall under the broader IoT umbrella because these systems all share common technology, and often common infrastructure. It’s helpful to review the terminology being used in order to better understand the relationship between these tools and the IoT.
Machine-to-machine (M2M) systems are part of the IoT, and M2M, like many of the terms to follow, can be seen as a catchall term. The current generation of M2M applications includes both fully automated and semi-automated systems. For example, some of today’s most commonly labelled M2M systems include point-of-sale (POS) and automated vehicle location (AVL) services. POS devices are semi-automated, in that people must initiate and authorise the transactions (ideally), while AVL is an automated system for reporting the geospatial coordinates of assets like trucks and delivery vehicles.
One notable characteristic of current M2M systems is that they are largely unidirectional in data flow or service requests. POS devices, for example, initiate a transaction with central transaction processing systems, but are usually not equipped or intended to support incoming commands. The advantage of the unidirectional nature of these early M2M systems is that exploitation opportunities are more limited: physical access to the remote endpoints is required, while network-based attacks are lower in probability.
Connected devices is also a catchall term for things other than servers and PCs that are entering the network. Like M2M, they can be automated or semi-automated, but connected devices are more likely to communicate with each other bi-directionally, rather than transmitting but not receiving.
Connected devices tend to envision both a centralised management infrastructure and/ or a situation where devices communicate on a peer-to-peer basis, without ever referencing back to any centralised system or server. This peer-to-peer communication offers big advantages in terms of speed of decision-making and reduced loads on networks, but limits potential for oversight and safety controls.
From smart appliances and smart houses to smart cities, so much of our world now is intelligent and interconnected, thanks to the IoT. Smart cities, for example, envision using IoT technology to improve the efficiency of services, from transportation systems to hospitals to energy and water supply. These systems will use unimagined combinations of peer-to-peer and client-server based decision-making, ubiquitous networking and massive amounts of high-assurance bandwidth to move all this data back and forth.
Perhaps the distinguishing feature of the “smart” discussion versus M2M and connected devices is that it tends to be more conceptual and less technical in nature. “Smart” is part of the IoT and will evolve as a notion, with small smart systems joining other small smart systems to create larger smart systems.
Ubiquitous Computing (UC) is the most abstract and conceptual term synonymous with the IoT. Devices and systems that use UC are completely connected and constantly available. In order to realise this pervasive UC paradigm, a wide range of technologies must be combined, such as industrial sensor networks, multi-medium networking, RFID, M2M, mobile computing, human-computer interaction, and wearable computers.
Though the UC concept involves a variety of technologies, the essence of UC involves the intelligence about, and knowledge of, our surroundings (also referred to as context awareness). By knowing their surroundings, including the dynamic geospatial relationships involving human users and their tools (cars, elevators, medical devices, and even each other), UC systems can offer useful customised services that drive increased personal and business efficiency.
Value-added distributor, Networks Unlimited distributes and trains its partners and customers in the African region to become certified to manage complex projects by effectively installing and utilising the Fortinet range of fast and secure cyber security solutions – especially in the growing IoT era.