IOE - Chapter 4

Transitioning to the Internet of Everything

1. What is the difference between IT and OT? (4.1.1.1)

2. How is most communication accomplished in OT?

3. Describe the 3 things that can be accomplished by converging IT and OT. (4.1.1.2)

4. Name and describe the most well-known type of M2M communication (4.1.2.1)

5. What does it mean to describe an M2P connection as being transactional? (4.1.2.3)

6. Collaborative solutions that leverage new and existing network infrastructure, devices, and applications are known as __________ connections (4.1.2.5)

7. Watch the video and briefly outline how supply chain management works. (4.2.1.1)

8. Watch the video and describe how the IOE was used to reduce the amount of downtime in the mining trucks (4.2.1.4)

9. What are the 7 listed technical requirements for an IOE business model? (4.2.1.5)

10. Read through these 5 possible constraints in implementing a IOE model. Which two are the most important (in your opinion) (4.2.1.6)

3 Layers of the Internet of Everything

11. Briefly summarize the 3 layers of the IOE  (4.2.2.1)

12. Give an example of responsive software. (4.2.2.2)

13. Describe how a store could use the IOE to decide on staffing (when employees start and stop work) (4.2.3.1)

14. What is interoperability and why is it crucial in an IOE system? (4.2.4.1)

15. Briefly describe: Moore's Law, Metcalfe's Law, and Reed's Law (4.2.4.2 & 4.2.4.3)

16. Describe some of the challenges with the growing amount of data being collected. (4.2.4.4)

17. What is one way to manage increasing bandwidth needs in the future? (4.2.4.6)

18. What is the most valuable asset to any organization? (4.2.4.7)

19. Besides information theft, describe another risk that a security breach can pose to an organization? (4.3.1.2)

20. What does it mean for internet security to pervasive? (4.3.1.3)

21. Name the four principles of network security architecture. (4.3.2.1)

22. Name and describe an IPS system. (4.3.2.2)

23. What is application-centric infrastructure (ACI)? (4.3.2.3)

24. What are the four 5 principles of wireless security? (4.3.2.4)

25. Describe network redundancy. (4.3.2.5)


Comments