Software-Engineering the Internet of Things
نویسنده
چکیده
ENIAC WAS BUILT during the Second World War, from 1943 to 1945. Many consider it the rst electronic, general-purpose, large-scale digital computer. Picture it as a room encompassing 36 racks, three printer panels, a card reader, and a card punch. Each rack used hundreds of vacuum tubes to perform a speci c function. Many racks acted as accumulators: they received pulses corresponding to the digits of a decimal number and increased accordingly the number stored in them. Others were more specialized; a 1944 oor plan has racks labeled multiplier, partial product, square rooter, denominator, multiplicand, and so on. Three function table racks, initialized through switches, could be carted around on wheels. Today we build, connect, and congure most Internet of Things (IoT) systems by linking together their sensor, actuator, and computing nodes through cloud infrastructures, mobile apps, and the sharing of security credentials. Similarly, ENIAC was programmed by setting up function tables and switches and connecting its units in the manner required for solving a particular problem, such as generating sine and cosine tables or computing artillery trajectories and shock wave re ections. As you can imagine, such programming was time-consuming and error-prone. Then, in 1948 a remarkable thing happened. Inspired by the design of EDVAC (Electronic Discrete Variable Automatic Computer), discussed over summer school lectures at the University of Pennsylvania’s Moore School, ENIAC’s designers realized they could wire it in a revolutionary way. The wiring wouldn’t solve a particular numeric program. Instead, the designers would repurpose some of ENIAC’s accumulators so that it would read instructions prescribing what actions to perform from its numeric function tables. Think of this as building a command interpreter by assembling together already existing discrete electronic components. Thus, the new wiring transformed ENIAC into a versatile storedprogram computer. Rewiring IoT infrastructures into a generalpurpose computing fabric can similarly change how modern computation interfaces with our environment.
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملA meta-heuristic clustering method to reduce energy consumption in Internet of Things
The Internet of Things (IoT) is an emerging phenomenon in the field of communication, in which smart objects communicate with each other and respond to user requests. The IoT provides an integrated framework providing interoperability across various platforms. One of the most essential and necessary components of IoT is wireless sensor networks. Sensor networks play a vital role in the lowest l...
متن کاملConceptual Modeling of the Internet of Things Implementation in Hospitals Supply Chain
Given the complexities of supply chain networks, the firms consider modern technologies as a potential factor to improve their supply chain performances. One of these technologies is the Internet of Things (IoT). Hence, the main purpose of this study has been to achieve the conceptual model of the IoT implementation in hospital supply chains. Considering the qualitative nature of the study, rel...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Software
دوره 34 شماره
صفحات -
تاریخ انتشار 2017