The difference between the Internet of Things and cloud computing

[ Huaqiang Security Network News ] As mentioned, the Internet of Things and cloud computing are comparable in many aspects. For example, cloud computing has three layers of SPI (SaaS, PaaS, IaaS), and Internet of Things also has DCM (ie, perception). Layer three, layer, transport layer, application layer). The US NIST (National Institute of Standards and Technology) divides the cloud computing deployment model into a shared cloud, a private cloud, a community cloud, and a hybrid cloud. The existence of the Internet of Things is divided into an intranet, a private network, and an external network; As with computing, the IoT deployment model is divided into Public IoT, Private IoT, Community IoT, and Hybrid IoT.
With reference to the NIST (National Institute of Standards and Technology), this paper proposes an Internet of Things definition and architecture specification recommendations, hoping to unify the industry thinking, so that we have a common language and reference in the dialogue of the Internet of Things, Play a role in attracting jade.
cloud computing
Internet of Things Interpretation
The Internet of Things concept refers to Ubiquitous end devices and facilities, including devices with "intrinsic intelligence" such as sensors, mobile terminals, industrial systems, building control systems, and homes. Intelligent facilities, video surveillance systems, etc., and items with "Enabled" such as RFID-attached assets (Assets), individuals or vehicles carrying wireless terminals, etc. Various wireless and/or wired long-distance and/or short-range communication networks enable interoperability (M2M) and application integration (Grand Integration). The Internet of Things can be based on cloud computing SaaS and other modes of operation, in the intranet (Intranet), private network (Extranet/VPN) or Internet (Internet) environment, using appropriate information security mechanisms to provide security and control (privacy protection) And even personalized real-time online monitoring, location and traceability, alarm linkage, scheduling command, plan management, process control, remote maintenance, online upgrades, statistical reports, decision support, leadership Dashboard and other management and service functions, to achieve " "Things" "efficient, energy-saving, safe, environmentally friendly" "pipe, control, camp" integrated services.
Four types of deployment
Private Internet of Things (PrivateIoT): Provides services to a single organization. It may be implemented and maintained by an organization or its trusted third parties. It exists mainly in the Intramise intranet (Intranet) or outside the organization (OffPremise) ).
Public Internet of Things (Public IoT): Provides services to the public or large user groups based on the Internet. It is generally operated and operated by an organization (or a third party it commissions, in a few cases).
Community IoT: Provide services to an associated “community” or community (such as a sub-committee of a city government: public security bureau, transportation bureau, environmental protection bureau, urban management bureau, etc.). It may be operated and operated by two or more organizations, mainly in the intranet and private network (Extranet/VPN).
Hybrid IoT: It is a combination of two or more of the above-mentioned Internet of Things, but there is a unified operation and maintenance entity in the background.
Ten basic functions
The most basic feature of the Internet of Things is the provision of "Ubiquitous Connectivity" with ten basic functions.
Online monitoring: This is the most basic function of the Internet of Things. The Internet of Things business is generally focused on centralized monitoring and supplemented by control.
Positioning traceability: generally based on GPS (or other satellite positioning, such as Beidou) and wireless communication technology, or rely solely on the positioning of wireless communication technologies, such as mobile base station based positioning, RTLS and so on.
Alarm linkage: mainly provides event alarms and prompts, and sometimes provides linkage function based on workflow or rule engine (Rule'sEngine).
Command and dispatch: command, dispatch, and dispatch functions based on time scheduling and event response rules.
Plan management: Dispose of events generated by things based on pre-defined regulations or regulations.
Security and privacy: Due to the importance of IoT ownership attributes and privacy protection, IoT systems must provide corresponding security mechanisms.
Remote maintenance: This is a service that IoT technology can provide or enhance, mainly for enterprise product after-sales networking services.
Online upgrade: This is a means to ensure the normal operation of the IoT system itself, and is also one of the means of automatic after-sales service of enterprise products.
Leading the desktop: mainly refers to the Dashboard or BI personalized portal. After the multi-layer filtering and refining the real-time information, the responsible person can realize the “clear” of the whole situation.
Statistical decision-making: refers to the function of data mining and statistical analysis of networked information, providing decision support and statistical reporting.
Four technical forms
RFID: RFID is an "enable" technology that transforms the conventional "instrumented" (IBM "3I" description) into a connection object to the Internet of Things. The related EPC/UID and PNL/ONS technologies can also be used as a "unified identification" reference technology for the entire IoT system.
Sensor network: WSN, OSN, BSN and other technologies are the terminal nervous system of the Internet of Things, mainly solving the "last 100 meters" connection problem. The end of the sensor network generally refers to a micro-sensing system smaller than the M2M end, such as Mote.
M2M: Focus on the interconnection and centralized management of mobile terminals, mainly in the Internet of Things business of Telco (communication operator), with business models such as MVNO (mobile virtual network operator) and MMO (M2M mobile operator).
Integration of two technologies: refers to the informationization upgrade of industrial automation and control systems. Enterprises in industrial control, building control and other industries are the main driving force for the integration of the two, and can also include industrial applications such as smart grid.

ISO standard reinforced GCL is a kind of special used for artificial lake water, landfill, underground garage, the roof garden, pool, oil and chemical storage area such as seepage prevention of geosynthetic materials, it is made of high dilatability of sodium base bentonite filling between the special composite Geotextile and non-woven fabric, with acupuncture law into bentonite seepage control pad can form many small fiber space, is bentonite particles can not be like a direction, when under the influence of water within the mat forming uniform density of colloidal membrane, prevent the leakage of water.

GCL PET (1)

Usage:
It is used to prevent water leakages in areas of artificial lakes, waste disposal fields, underground garage, top building gardens, reservoirs, oil warehouses, and chemicals accumulating fields.
GCL with film

Features:
1. Improved leakage performance
2. Permanent waterproof performance
3. Simple construction and short time limit for a project.
4. Not influenced by air temperature.
5. A kind of green material and good to environmental protection.
6. More versatile than compacted clay 
7. Increased airspace and liner efficiency 
Ce Iso Of Gcl

Powder Waterproof Blanket

Powder Waterproof Blanket,Gcl Water-Proof Blanket,Waterproofing Waterproof Blanket,Api Waterproof Blanket

Shandong Tianhai New Materials Engineering Co., Ltd , https://www.chinatinhy.com