Other Suitable Operating Systems for RPL Protocol
LiteOS: Based on the famous Zorin OS, it is a lightweight operating system designed for
computers with low resources. It was developed for calculators, but it has also found its
place on sensor networks.
TinyOS: Being the first operating system that was oriented for WSN, it works with
events and assigned tasks to utilize an extension of the C language, known as nesC.
T-Kernal: it is also a lightweight operating system that is known for accepting
applications as explorable images in simple instructions. Thus, it won’t matter at all
if it is written in the C++ language.
EyeOS: This OS is known for providing a desktop-like environment on the Web. It
effectively permits the users to monitor and explore a remote system by a basic search
engine.
Identification Protocols
EPC
What Is EPC?
Electronic Product Code (EPC) is used as syntax for the unique identifiers allocated to physical
objects, locations, unit loads, or other identifiable responsible for playing a part in business
operations.
EPC Global
EPC global is a GS1 venture to bring innovation and development to the industry-driven values
for the Electronic Product Code (Short form; EPC). Its main aim is to support the utilization of
Radio Frequency Identification (short form; RFID) and to permit global perceptibility of items
(EPCIS) in today’s information-rich and fast-moving trading networks. These standards have
been further developed into two areas:
EPC or RFID tags, and
EPC Information Services (EPS).
EPC global is also known for hosting GS1’s Innovation Network. The Network carries the inno-
vative spirit of EPC global through a wide range of technology solutions and business challenges.
Understanding EPC/RFID
EPCs may have various representations that include binary forms appropriate for utility on
Radio Frequency Identification (RFID) tags, and text types appropriate for sharing data between
enterprise information systems.
EPC Tag Data Standard (TDS) helps us to identify the data format of the EPC. It also facilitates
us with encodings for numbering schemes that include the GS1 keys under an EPC. Whenever
the unique EPCs are encoded onto single RFID tags, radio waves can be eectively utilized to
hold the unique identifiers at super high rates and at distance as far as 10 meters, without even
having a single contact of line-of-sight. These qualities of RFID can be considered to increase
inventory accuracy and boost supply chain visibility.
Understanding EPCIS
It allows the trading partners to provide data regarding the physical status and movement of
products as they navigate via the supply chain from B2B and lastly to the consumers. It assists
110 Internet of Things
Internet_of_Things_CH05_pp105-140.indd 110 9/3/2019 10:13:54 AM
to address the “what, where, and why” questions to suce consumer and regulatory necessities
for precise and detailed product details.
The main aim of EPCIS is to provide disparate applications to build and provide event data,
both across and within enterprises. This naturally helps the users to obtain a shared view of
digital or physical objects under a relevant business context.
EPCIS are meant to be utilized in combination with the GS1 Core Business Vocabulary
(CBV). The CBV gives descriptions of data values that may be utilized to gather the data together
defined in the standards of EPCIS.
uCode
uCode represents a unique identification number given to individual objects. uCodes are use-
ful to get digital information about objects and places. The uCode is a 128-bit fixed length
identification system. It is a mechanism that works to extend the Unicode length in units of
128 bits that has been made to fulfill the future demands so codes that are longer than 128
bits can also get defined. When uCode gets assigned to an object or a place in our real world,
the uCode is saved in a tag (this tag is known as uCode tag) like an RFID tag, bar code, or a
two-dimensional bar code.
uCode simply works as an identification number. There is no bond between the unique
number and the quality and meaning of the goal in databases. The unique quality and the
meaning can be gathered from the databases by utilizing the uCode as a key. Since uCode
is a unique identification number, it is very important to ensure that the uniqueness of
provided uCodes is well maintained. Multiple goals with the same assigned uCodes will
never work.
When the goal of an already issued code disappears, the uCode also gets cancelled. Thus,
the same code that was used before won’t be used ever again. Thus, the uniqueness of a uCode
is well ensured both over time and space.
URIs
The acronym “URI” stands for Uniform Resource Identifier. It works as a string of characters that
are utilized to identify resources or names on the internet. The URI is designed to describe the
mechanism used for accessing resources. URI identification makes it possible to interact with
the resource representation with networks utilizing specific protocols.
There are two types of URIs:
1. URL (Uniform Resource Locator): This kind of URI starts by mentioning which protocol
should be utilized to trace and use the logical or physical resource on a network. For
example: If the resource page is a web page, then the URI will start with the commonly
used protocol HTTP. However, if the resource is a file, then the URI will start with the
other protocol FTP. In other cases, if the resource is an email address, then the URI will
start with another protocol called mailto. It is a very crucial thing to know that URLs
are not persistent. Thus, in case the resource changes its location, then the URL will also
need to change towards resource’s new location.
2. URN (Uniform Resource Name): This kind of URI does not mention which protocol
should be utilized to trace and use the resource. Instead, it labels a resource with a
location-independent, persistent unique identifier. An URN helps us to identify the
resource for its whole lifecycle and won’t change ever.
Chapter 5 IoT Core Modules 111
Internet_of_Things_CH05_pp105-140.indd 111 9/3/2019 10:13:54 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.27.232