We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

The IoV Technology Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access

The IoV Technology Essay Sample

Beyond the potential benefits of the IoV, there are challenges and concerns that need to be given attention. Sensors used by the vehicles and traffic control infrastructures, collects information about road and traffic status. Therefore these sensors and/or actuators must be robust in order to reliably delver information to the system that requires sophisticated data mining strategies. Another thing to look into also is the area along real time information such as: car positions, destinations and schedules that are significant parameters in car system operations.

Generally, the constraints and issues associated with IoV can be summarized based on the extent of efficiency, robustness and effectiveness of the technologies categorized as: (1) embedded System Technology (sensors and Actuators); (2) Infotainment and Telematics Technology (the connected capabilities of car to duplicate entertainment and features of drivers ) and (3) The V2X Technologies

Embedded System Technology associated to IoV includes but not limited to GPS, Digital Communication Module (DCM) and other sensors and actuators that are used in car system physical operations and control. Just the like of DCM, it is responsible in for communicating information wirelessly to telematics service providers (TSP) or the authorize maker itself. Also car requires navigation services and that it needs GPS to ascertain its location. Thus, the timeliness, reliability and accuracy of information captured and generated by sensors and actuators are very important. Fortunately enough, embedded system technologies are already on its finest level. Having this, presumptions risk associated with actual used of these technologies in IoV can be disregarded.

The near-ubiquity of mobile phones and the rapid rise of smart-phones prompted the introduction of “infotainment and telematics” applications as used in vehicle operations. These applications were built on a driver’s “brought-in” phone. These technology services can be categorized into two – (1) Software providers and (2) third-party content and app providers. Considering that this services are manage by third party system then the issue along (1) security and privacy and (2) communication gateways (communication protocols, bandwidth, speed, etc) will arise.

V2X Technologies refers to multiple sensors embedded not only in the vehicle itself but in all manner of Smart devices across the IoT landscape – from wearable and Dedicated Short-range Communications Devices to Smart-Home gadgets to infrastructure– that can communicate with and share data with the vehicle through what is being called V2X integration. On this scenario, the breadth of devices and sensors available create a tremendous scale of data based on a wide scope of detected events. And as such IoV being part of IoT systems, can communicate the generated data to a common platform where it may be aggregated with data originating from sources, including third-party content and social media. These data would then be and analyzed and correspondingly generates information that would deliver to the vehicle or other designated output devices. Note, that this triangulation of data coming from these myriad devices is lies the greatest issues of privacy and security.

In addition, in V2X operation the data representation, transmission and analysis is very complex. The operation usually involves cooperation and collaboration between multiple stakeholders from multiple industry sectors. For this case, such operation requires communications and connectivity thus there is a need establishment of a common communication and network protocol. Note that when multiple connection exist then a bottleneck in communication may also arise which will result to a bottleneck in communication affecting the quality of service.

In conclusion problems associated in IoV implementation revolves along communication technologies which can be summarized as: (1) Security and Privacy (including data ownership) and (2) communication infrastructure i.e. networks and protocols, bandwidth and speed.

II. IOV IMPLEMENTATION SCHEME

IoV architecture and its implementation mechanism can be categorized into 3 levels as (1) Physical Level, (2) Network and Data Transport Level and (3) the Application Level of implementation. Note that this categorization is in conformity with the standard network layer level as shown in figure 3.

Physical level implementation refers to the physical level of IoV operation such as, sensor detection, actuators response and control, vehicle communication and network connectivity. Specific vehicle operation on this level includes detection of possible collision, control of vehicle braking system and control of auto driving system.

Network and Data Transport level implementation, deals on communication and network connection processes from and between another vehicle, roadside infrastructure units and other IoT communication facilities used for long range data transmission. This particular level also concerns about the network and routing protocols, data transmission speed, and other parameters under network and data transport layer of standard OSI network model.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Peculiarities of various assignment types

The educational process is diverse and full of interesting writing tasks which help students develop their academic abilities. Different assignments types are created by professionals in order to enhance students’ level of analytical, critical and writing skills and to vary the learning process. As a student, you will encounter numerous tasks of diverse complexities throughout your student life. Sometimes, maybe, too complicated! They have different peculiarities, structural...

Making decisions in health and social care

Critically analyses the concepts, features, and importance of costs and accounting in making decisions in health and social care Cost accounting is a method used in accounting to capture a company’s or organisation’s production costs. It assesses the input costs of every step in production, fixed costs like depreciation of capital equipment. Cost accounting measures and records costs individually then compare the input results via...

Сhildren development

Physical development 7-12 years By the age of 7 a child enjoys things such as bike riding and rollerblading they are now able to tie and untie shoelaces without adult help, they are now starting to understand what rules are and are able to follow simple rules. At 8-12 years a child improves the physical skills that they have already developed and start to see...

Forex international trading market

Introduction Forex exchange is on the rise in Namibia; resulting in more people wanting to learn how to trade to try to increase their income so that they can enhance their standard of living. Forex Foreign exchange identifies the process of converting domestic currency into international banknotes at particular exchange rates (Bofah, 2017, para.1). As the number of foreigners in Namibia is increasing, more Namibians...

Aristotelian idea of God

This image produced in 1544 shows emerging's of the Judeo-Christians and Aristotelian's traditions. Aristotle was very interested in the idea of motion and said “The world is in a constant state of motion and change”. An example of how the world is changing is the growth of trees and plants. Aristotle believed in a prime mover, which is the being which creates change in the...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member