Connectivity

Designing with wired or wireless networks for M2M and other embedded designs and the protocols to use.

image

Designing optimal wireless base station MIMO antennae: Part 2 – A maximum likelihood receiver

In this second of a two-part series, the authors describe the design choices necessary to build a maximum likelihood receiver for a multiple input, Read More

image

What is the Internet of Things?

GeorgiaTech’s Alain Louchez makes an effort to come up with a useful definition and structure for the amorphous collection of wireless sensor Read More

image

Scalable Cloud Services for the Internet of Things through CoAP

A new IoT architecture based on the Constrained Application Protocol (CoAP) for resource-constrained devices that takes advantage of the HTML Read More

image

Home automation system design: the basics

The basics of selecting a home automation system architecture and how the use of a programmable system-on-chip approach can simplify implementation Read More

image

Pre-compliance testing for WLAN transmitters

An important element in adding wireless Internet-of-Things capabilities to your embedded design is going through the rigorous compliance testing the Read More

image

An OSGI middleware for using IoT sensor networks as a service paradigm

An OSGi-based middleware, called Sensor Node Plug-in System (SNPS), where sensors are no longer low-level devices producing raw measurement data, but Read More

image

Design and implementation of XMPP on IPv6-based Wireless Sensor Networks

Extending XMPP to wireless sensor networks based in IPv6, using a lightweight XMPP client protocol software optimized for sensor nodes with UDP Read More

image

Implementing RAID 0/1 using USB 3.0

Intel Corp.'s new server chipsets - Grantley and Brickland – make the use of USB 3.0 even more attractive and cost effective. Here’s how to do Read More

image

Sensor fusion enables sophisticated next-gen applications

The importance of sensor fusion in embedded systems employing increasing numbers of sensors. Read More

image

Static Analyzer for Detecting Privacy Leaks in Android Applications

How a static analyzer, called SCANDAL, can be used to detect privacy leaks in Android applications. Read More

image

Smart design of IoT applications using Software Platform Builder

The importance of good network aware software development tools in the age of the Internet and machine-to-machine devices. Read More

image

The Internet of Things: the next wave of our connected world

How is the Internet of Things changing the world and how developers build and deploy their designs? And what new markets and applications will it Read More

image

Getting ready for an IPv6-enabled Internet of Things

To take advantage of the transition to the Internet of Things, which requires ubiquitous Internet Protocol connectivity, embedded developers will Read More

image

Sensor fusion-based event detection in WSNs

A two-level sensor fusion-based event detection technique for wireless sensor networks that uses a fusion algorithm to gather information and reach a Read More

image

Integrating wireless sensor networks with the web

A comparison of sensor network integration into the Internet of Things, one using CoAP over 6LoWPAN and the second one using HTTP over 6LoWPAN. Read More

image

Reworking the TCP/IP stack for use on embedded IoT devices

How to use the standard TCP/IP protocol stack in real-time embedded Internet of Things applications through a proper understanding of its underlying Read More

prev

1 of 16

next
see all Connectivity

Insights view all

  • Currently no items

Collections
Tech Papers
Webinars
Courses

Internet of things (IoT) design considerations for embedded connected devices

Save & Follow 30 May 2014

This paper delves into many of the key... Read More

see all

Parts Search Datasheets.com

KNOWLEDGE CENTER