SlideShare a Scribd company logo
1 of 39
Internet
Of
Things
- By Prof. Devyani Vasistha
Design Principles
of Connected
Devices
IoT
2- By Prof. Devyani Vasistha
IOT As Equation
 IoT = physical object + actuator, sensor
and controller + internet
3- By Prof. Devyani Vasistha
Design Principles of Connected
Devices
 Physical Design vs Logical Design
 Physical Design: concerned with
Shape and Look i.e. Pleasing
appearance
 Industrial Design (Product Design)
 UI design
 Digital Services
4- By Prof. Devyani Vasistha
Calm and Ambient
Technology
 Calm vs Ambient
 Cheap
 Ubicomp: Ubiquatos computing,
Universal computing
 Ambient background
 Calm technology
 Competition
 Publicity
Issues
5- By Prof. Devyani Vasistha
Ubiquitous Computing
 Ubiquitous computing (or "ubicomp")
is a concept in software engineering and
computer science where computing is
made to appear anytime and
everywhere.
 In contrast to desktop computing,
ubiquitous computing can occur using
any device, in any location, and in any
format.
6- By Prof. Devyani Vasistha
Internet Relay Chat
7- By Prof. Devyani Vasistha
8- By Prof. Devyani Vasistha
9- By Prof. Devyani Vasistha
10- By Prof. Devyani Vasistha
ISSUES
 Power
 Networking challenges
 6LoWPAN
 Configuration
 User interaction
 Technical solutions
 Good design
 Design decisions
 Large context
 Complications
 Cacophony
 Antidote
11- By Prof. Devyani Vasistha
Examples
 6LoWPAN
 Internet protocol
 Apple IPod 2001
 Portable MP3
 ITUNES
 ELIEL Saarinen’s maxim on design
12- By Prof. Devyani Vasistha
Mark Weiser and john Seely
Brown
 Calm technology engages both the
centre and the periphery of our attention
and in fact moves back and fourth
between the two.
 Live Wire
 Dangling String
13- By Prof. Devyani Vasistha
Calm Technology
14- By Prof. Devyani Vasistha
Calm Technology
15- By Prof. Devyani Vasistha
MARK WEISER AND JOHN
SEELY BROWN
“ Not all the technology need to be calm. A
calm video game will get little use; the
point is to be excited. But too much
design focuses on the object itself and
its surface features without regard for
context. We must learn to design for the
periphery so that we can most fully
command technology without being
dominated by it.”
16- By Prof. Devyani Vasistha
NOT ALL TECHNOLOGY NEED
TO BE CALM
 Twitter
 Blows bubbles
 Split-flap displays
 Dot matrix LED Display
 Olly indicater
 Glanceable displays
 Bikemap
17- By Prof. Devyani Vasistha
MAGIC AS METAPHOR
 Revolutionary aspects of technology by
Technology blogger Venkatesh Rao.
 Manufactured narmalcy field
 A technology has to make its way inside the
manufactured normalcy field.
 At the same time a technology does not stretch
the boundaries of their particular normalcy field
too far, even if the underlying technology being
employed is a huge leap ahead of the norm.
 E.g.
• (From) Mobile Phone (To) Portable Internet
Terminal
• (From)Computer as Glorified typewriter (To) GUI
Desktop
18- By Prof. Devyani Vasistha
Enchanted Effects in Devices
 From idea of WhereDial of Harry
Potter to GPS
 From idea of enchanted Mirrors of
Snow White Tale to Single-Pixel
Display
 Enchanted Umbrella
 The danger of trying use of magic to
reach beyond our capabilities enforces
need of more secure and trust worthy
control interfaces in devices to
safeguard any data they gather.
19- By Prof. Devyani Vasistha
Privacy
 Privacy: The designers of IOT Devices
need to work for the unauthorised
access of sensors or device monitoring
and reporting data to the internet.
 Keeping Secrets: In some area of
application, Leak of personal information
of a user can be dangerous and will
need measures to avoid it.
 Example: Parking app for smart phone
with Find My Car Option.
20- By Prof. Devyani Vasistha
Some more examples of
Privacy issues
 Information requested from server
through app can be a simple
unencrypted web request. (... According
to Troy Hunt)
 www.troyhunt.com/2011/09/find-my-car-
find-your-car-find.html
 A chunk of requested data with a raft of
addition information.
“ Don’t share more than you need to
provide the service.” 21- By Prof. Devyani Vasistha
“ The best way to keep a secret is to never
have it. ”-- Julian Assange (fouder of
WikiLeaks)
www.pbs.org/wgbh/pages/frontline/wikileaks/i
nterviews/julian-assange.html
i.e. Avoiding gathering or storing of data at
first place is removal of worries of
accidental disclosing of data.
Example
1. Avoid storing confidential data at place
like storing Password rather recreate new
password if forgotten.
2. Hash Cryptographic Technique: One-way
22- By Prof. Devyani Vasistha
Whose Data is it anyway?
 Public Data
 Private Data
Example: A Camera installed at public space
by a Company.
According to Adam Greenfield( A leading
practitioner at Urban Computing) “In a
public space when data is generated by
the public , then they should at least have
equal right to be ware of, and have access
to, that data. “
Point 67 at
https://speedbird.wordpress.com/2012/12/0
3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
Web Thinking for Connected
Devices
 Aim behind Internet of Things should to
get the mindset of the web and create
devices which are of the web rather than
those which just exist on the web.
 Of the web vs On the web.
 Strict vs Lenient
 Postel’s law
 Interact with other services
 Small Pieces, Loosely Joined
 First-Class Citizens on the Internet
 Graceful Degradation
24- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 If you are building all the components of
a service, it makes sense not to couple
them too tightly.
 Example: Internet is a collection of
services and machines controlled from a
central location, is an example of small
pieces, loosely joined.
 Architects of a Service: where each
piece should be designed to do one thing
well and not rely too much on tight
integration with separate component it
uses. 25- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 More Generalised Component: Try to
make components more generalised so
that they can serve other systems which
requires similar fuctions.
 Reuse and Repurpose: Generalised
component will help to reuse and
repurpose the components to build new
capabilities.
 Existing Standard and Protocol: Use
existing standard and protocols as much
as possible than inventing your own.
 http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
First-Class Citizens on the
Internet
 First-Class: One that has an identity
independent on any other item.
 First-Class Citizen: Digital Information
is the First-Class Citizen in the
networked environment.
 Securing the IoT by treating devices as
first-class citizens is the only approach
that takes into account the intricate, and
ever-growing web of relationships
between devices, people, and services.
27- By Prof. Devyani Vasistha
How can IoT devices of all kinds be made
secure in a way that ensures consumer’s
privacy and protection from malicious actors?
 The answer lies in a simple, unified
approach, one that can ensure that
connected devices are as secure as
possible: they must be treated as first-class
citizens.
 Similar to how human identity is verified
through either a passport, a driver’s licence,
or an ID card depending on the situation,
treating a device as a first-class citizen
means requiring the same level of identity
authentication.
 These credentials can be baked into the
device at the manufacturing stage, and used
to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
Graceful Degradation
 Graceful degradation is the ability of a
computer, machine, electronic system or
network to maintain limited functionality
even when a large portion of it has been
destroyed or rendered inoperative.
 The purpose of graceful degradation is to
prevent catastrophic failure.
 Ideally, even the simultaneous loss of
multiple components does not cause
downtime in a system with this feature.
 In graceful degradation, the operating
efficiency or speed declines gradually as an
increasing number of components fail.
29- By Prof. Devyani Vasistha
30- By Prof. Devyani Vasistha
Affordances
“ Affordances provide strong clues to the
operations of things . Plates are for
pushing. Knobs are for turning. Slots are
for inserting things into. Balls are for
throwing or bouncing. When affordances
are taken advantage of, the user knows
what to do just by looking: no picture,
label, or instruction is required. Complex
things may require explanation, but
simple things should not. When simple
things need pictures, labels, or
instructions, the design has failed. “ –
The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
Affordances
 Affordance is a fundamental aspect of
interaction design.
 Be it software design or physical object
design or even business design, the
designers explicitly or implicitly think
about how the users and actors of the
system behave/perform based on
various influencing factors (stimuli).
 Depending upon the specific application
of the concept and the context, the path
to arriving at the right set of affordances
could vary.
32- By Prof. Devyani Vasistha
Affordances
 When affordances are done right, the
product/service/business process
(referred to as P-S-BP, hence forth) is a
pleasure to work with.
 When done poorly, the usability and
adoption of the P-S-BP suffers greatly.
33- By Prof. Devyani Vasistha
Affordances
 Example: Digital transformation and
IOT re-design the user experiences
such as:
 A retail bank may develop a mobile app
that provides a unified, consistent,
Omni-channel across all their business
lines that this customer does business
with.
 A retail store may seamlessly blend
mobile, desktop and in-store experience
of the customer as they move across 34- By Prof. Devyani Vasistha
Affordances
35- By Prof. Devyani Vasistha
36- By Prof. Devyani Vasistha
37- By Prof. Devyani Vasistha
38- By Prof. Devyani Vasistha
THANK YOU.
- DEVYANI VASISTHA
All Pictures used in presentation are taken
from Google.
- By Prof. Devyani Vasistha 39

More Related Content

What's hot

IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptNishant Kayal
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt sutrishnakar1995
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)FabMinds
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Prakhyath Rai
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1Syed Mustafa
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Ethics_Internet of Things
Ethics_Internet of ThingsEthics_Internet of Things
Ethics_Internet of Thingsalengadan
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 

What's hot (20)

IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Raspberry Pi
Raspberry Pi Raspberry Pi
Raspberry Pi
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Ethics_Internet of Things
Ethics_Internet of ThingsEthics_Internet of Things
Ethics_Internet of Things
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 

Similar to IOT - Design Principles of Connected Devices

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamCLICKNL
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxraju957290
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...LouisFrederickRakoto
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldBrian Pichman
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxAlthafMk2
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfSoonChinFhong
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18Neeraj Gupta
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopClaire Rowland
 

Similar to IOT - Design Principles of Connected Devices (20)

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon Amsterdam
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ITB - UNIT 5.pdf
ITB - UNIT 5.pdfITB - UNIT 5.pdf
ITB - UNIT 5.pdf
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech Hold
 
Tech trends
Tech trendsTech trends
Tech trends
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
 

Recently uploaded

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

IOT - Design Principles of Connected Devices

  • 1. Internet Of Things - By Prof. Devyani Vasistha
  • 3. IOT As Equation  IoT = physical object + actuator, sensor and controller + internet 3- By Prof. Devyani Vasistha
  • 4. Design Principles of Connected Devices  Physical Design vs Logical Design  Physical Design: concerned with Shape and Look i.e. Pleasing appearance  Industrial Design (Product Design)  UI design  Digital Services 4- By Prof. Devyani Vasistha
  • 5. Calm and Ambient Technology  Calm vs Ambient  Cheap  Ubicomp: Ubiquatos computing, Universal computing  Ambient background  Calm technology  Competition  Publicity Issues 5- By Prof. Devyani Vasistha
  • 6. Ubiquitous Computing  Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.  In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. 6- By Prof. Devyani Vasistha
  • 7. Internet Relay Chat 7- By Prof. Devyani Vasistha
  • 8. 8- By Prof. Devyani Vasistha
  • 9. 9- By Prof. Devyani Vasistha
  • 10. 10- By Prof. Devyani Vasistha
  • 11. ISSUES  Power  Networking challenges  6LoWPAN  Configuration  User interaction  Technical solutions  Good design  Design decisions  Large context  Complications  Cacophony  Antidote 11- By Prof. Devyani Vasistha
  • 12. Examples  6LoWPAN  Internet protocol  Apple IPod 2001  Portable MP3  ITUNES  ELIEL Saarinen’s maxim on design 12- By Prof. Devyani Vasistha
  • 13. Mark Weiser and john Seely Brown  Calm technology engages both the centre and the periphery of our attention and in fact moves back and fourth between the two.  Live Wire  Dangling String 13- By Prof. Devyani Vasistha
  • 14. Calm Technology 14- By Prof. Devyani Vasistha
  • 15. Calm Technology 15- By Prof. Devyani Vasistha
  • 16. MARK WEISER AND JOHN SEELY BROWN “ Not all the technology need to be calm. A calm video game will get little use; the point is to be excited. But too much design focuses on the object itself and its surface features without regard for context. We must learn to design for the periphery so that we can most fully command technology without being dominated by it.” 16- By Prof. Devyani Vasistha
  • 17. NOT ALL TECHNOLOGY NEED TO BE CALM  Twitter  Blows bubbles  Split-flap displays  Dot matrix LED Display  Olly indicater  Glanceable displays  Bikemap 17- By Prof. Devyani Vasistha
  • 18. MAGIC AS METAPHOR  Revolutionary aspects of technology by Technology blogger Venkatesh Rao.  Manufactured narmalcy field  A technology has to make its way inside the manufactured normalcy field.  At the same time a technology does not stretch the boundaries of their particular normalcy field too far, even if the underlying technology being employed is a huge leap ahead of the norm.  E.g. • (From) Mobile Phone (To) Portable Internet Terminal • (From)Computer as Glorified typewriter (To) GUI Desktop 18- By Prof. Devyani Vasistha
  • 19. Enchanted Effects in Devices  From idea of WhereDial of Harry Potter to GPS  From idea of enchanted Mirrors of Snow White Tale to Single-Pixel Display  Enchanted Umbrella  The danger of trying use of magic to reach beyond our capabilities enforces need of more secure and trust worthy control interfaces in devices to safeguard any data they gather. 19- By Prof. Devyani Vasistha
  • 20. Privacy  Privacy: The designers of IOT Devices need to work for the unauthorised access of sensors or device monitoring and reporting data to the internet.  Keeping Secrets: In some area of application, Leak of personal information of a user can be dangerous and will need measures to avoid it.  Example: Parking app for smart phone with Find My Car Option. 20- By Prof. Devyani Vasistha
  • 21. Some more examples of Privacy issues  Information requested from server through app can be a simple unencrypted web request. (... According to Troy Hunt)  www.troyhunt.com/2011/09/find-my-car- find-your-car-find.html  A chunk of requested data with a raft of addition information. “ Don’t share more than you need to provide the service.” 21- By Prof. Devyani Vasistha
  • 22. “ The best way to keep a secret is to never have it. ”-- Julian Assange (fouder of WikiLeaks) www.pbs.org/wgbh/pages/frontline/wikileaks/i nterviews/julian-assange.html i.e. Avoiding gathering or storing of data at first place is removal of worries of accidental disclosing of data. Example 1. Avoid storing confidential data at place like storing Password rather recreate new password if forgotten. 2. Hash Cryptographic Technique: One-way 22- By Prof. Devyani Vasistha
  • 23. Whose Data is it anyway?  Public Data  Private Data Example: A Camera installed at public space by a Company. According to Adam Greenfield( A leading practitioner at Urban Computing) “In a public space when data is generated by the public , then they should at least have equal right to be ware of, and have access to, that data. “ Point 67 at https://speedbird.wordpress.com/2012/12/0 3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
  • 24. Web Thinking for Connected Devices  Aim behind Internet of Things should to get the mindset of the web and create devices which are of the web rather than those which just exist on the web.  Of the web vs On the web.  Strict vs Lenient  Postel’s law  Interact with other services  Small Pieces, Loosely Joined  First-Class Citizens on the Internet  Graceful Degradation 24- By Prof. Devyani Vasistha
  • 25. Small Pieces, Loosely Joined  If you are building all the components of a service, it makes sense not to couple them too tightly.  Example: Internet is a collection of services and machines controlled from a central location, is an example of small pieces, loosely joined.  Architects of a Service: where each piece should be designed to do one thing well and not rely too much on tight integration with separate component it uses. 25- By Prof. Devyani Vasistha
  • 26. Small Pieces, Loosely Joined  More Generalised Component: Try to make components more generalised so that they can serve other systems which requires similar fuctions.  Reuse and Repurpose: Generalised component will help to reuse and repurpose the components to build new capabilities.  Existing Standard and Protocol: Use existing standard and protocols as much as possible than inventing your own.  http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
  • 27. First-Class Citizens on the Internet  First-Class: One that has an identity independent on any other item.  First-Class Citizen: Digital Information is the First-Class Citizen in the networked environment.  Securing the IoT by treating devices as first-class citizens is the only approach that takes into account the intricate, and ever-growing web of relationships between devices, people, and services. 27- By Prof. Devyani Vasistha
  • 28. How can IoT devices of all kinds be made secure in a way that ensures consumer’s privacy and protection from malicious actors?  The answer lies in a simple, unified approach, one that can ensure that connected devices are as secure as possible: they must be treated as first-class citizens.  Similar to how human identity is verified through either a passport, a driver’s licence, or an ID card depending on the situation, treating a device as a first-class citizen means requiring the same level of identity authentication.  These credentials can be baked into the device at the manufacturing stage, and used to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
  • 29. Graceful Degradation  Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.  The purpose of graceful degradation is to prevent catastrophic failure.  Ideally, even the simultaneous loss of multiple components does not cause downtime in a system with this feature.  In graceful degradation, the operating efficiency or speed declines gradually as an increasing number of components fail. 29- By Prof. Devyani Vasistha
  • 30. 30- By Prof. Devyani Vasistha
  • 31. Affordances “ Affordances provide strong clues to the operations of things . Plates are for pushing. Knobs are for turning. Slots are for inserting things into. Balls are for throwing or bouncing. When affordances are taken advantage of, the user knows what to do just by looking: no picture, label, or instruction is required. Complex things may require explanation, but simple things should not. When simple things need pictures, labels, or instructions, the design has failed. “ – The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
  • 32. Affordances  Affordance is a fundamental aspect of interaction design.  Be it software design or physical object design or even business design, the designers explicitly or implicitly think about how the users and actors of the system behave/perform based on various influencing factors (stimuli).  Depending upon the specific application of the concept and the context, the path to arriving at the right set of affordances could vary. 32- By Prof. Devyani Vasistha
  • 33. Affordances  When affordances are done right, the product/service/business process (referred to as P-S-BP, hence forth) is a pleasure to work with.  When done poorly, the usability and adoption of the P-S-BP suffers greatly. 33- By Prof. Devyani Vasistha
  • 34. Affordances  Example: Digital transformation and IOT re-design the user experiences such as:  A retail bank may develop a mobile app that provides a unified, consistent, Omni-channel across all their business lines that this customer does business with.  A retail store may seamlessly blend mobile, desktop and in-store experience of the customer as they move across 34- By Prof. Devyani Vasistha
  • 35. Affordances 35- By Prof. Devyani Vasistha
  • 36. 36- By Prof. Devyani Vasistha
  • 37. 37- By Prof. Devyani Vasistha
  • 38. 38- By Prof. Devyani Vasistha
  • 39. THANK YOU. - DEVYANI VASISTHA All Pictures used in presentation are taken from Google. - By Prof. Devyani Vasistha 39