We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

The IoV Technology

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Beyond the potential benefits of the IoV, there are challenges and concerns that need to be given attention. Sensors used by the vehicles and traffic control infrastructures, collects information about road and traffic status. Therefore these sensors and/or actuators must be robust in order to reliably delver information to the system that requires sophisticated data mining strategies. Another thing to look into also is the area along real time information such as: car positions, destinations and schedules that are significant parameters in car system operations.

Generally, the constraints and issues associated with IoV can be summarized based on the extent of efficiency, robustness and effectiveness of the technologies categorized as: (1) embedded System Technology (sensors and Actuators); (2) Infotainment and Telematics Technology (the connected capabilities of car to duplicate entertainment and features of drivers ) and (3) The V2X Technologies

Embedded System Technology associated to IoV includes but not limited to GPS, Digital Communication Module (DCM) and other sensors and actuators that are used in car system physical operations and control. Just the like of DCM, it is responsible in for communicating information wirelessly to telematics service providers (TSP) or the authorize maker itself. Also car requires navigation services and that it needs GPS to ascertain its location. Thus, the timeliness, reliability and accuracy of information captured and generated by sensors and actuators are very important. Fortunately enough, embedded system technologies are already on its finest level. Having this, presumptions risk associated with actual used of these technologies in IoV can be disregarded.

The near-ubiquity of mobile phones and the rapid rise of smart-phones prompted the introduction of “infotainment and telematics” applications as used in vehicle operations. These applications were built on a driver’s “brought-in” phone. These technology services can be categorized into two – (1) Software providers and (2) third-party content and app providers. Considering that this services are manage by third party system then the issue along (1) security and privacy and (2) communication gateways (communication protocols, bandwidth, speed, etc) will arise.

V2X Technologies refers to multiple sensors embedded not only in the vehicle itself but in all manner of Smart devices across the IoT landscape – from wearable and Dedicated Short-range Communications Devices to Smart-Home gadgets to infrastructure– that can communicate with and share data with the vehicle through what is being called V2X integration. On this scenario, the breadth of devices and sensors available create a tremendous scale of data based on a wide scope of detected events. And as such IoV being part of IoT systems, can communicate the generated data to a common platform where it may be aggregated with data originating from sources, including third-party content and social media. These data would then be and analyzed and correspondingly generates information that would deliver to the vehicle or other designated output devices. Note, that this triangulation of data coming from these myriad devices is lies the greatest issues of privacy and security.

In addition, in V2X operation the data representation, transmission and analysis is very complex. The operation usually involves cooperation and collaboration between multiple stakeholders from multiple industry sectors. For this case, such operation requires communications and connectivity thus there is a need establishment of a common communication and network protocol. Note that when multiple connection exist then a bottleneck in communication may also arise which will result to a bottleneck in communication affecting the quality of service.

In conclusion problems associated in IoV implementation revolves along communication technologies which can be summarized as: (1) Security and Privacy (including data ownership) and (2) communication infrastructure i.e. networks and protocols, bandwidth and speed.

II. IOV IMPLEMENTATION SCHEME

IoV architecture and its implementation mechanism can be categorized into 3 levels as (1) Physical Level, (2) Network and Data Transport Level and (3) the Application Level of implementation. Note that this categorization is in conformity with the standard network layer level as shown in figure 3.

Physical level implementation refers to the physical level of IoV operation such as, sensor detection, actuators response and control, vehicle communication and network connectivity. Specific vehicle operation on this level includes detection of possible collision, control of vehicle braking system and control of auto driving system.

Network and Data Transport level implementation, deals on communication and network connection processes from and between another vehicle, roadside infrastructure units and other IoT communication facilities used for long range data transmission. This particular level also concerns about the network and routing protocols, data transmission speed, and other parameters under network and data transport layer of standard OSI network model.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59