SlideShare a Scribd company logo
1 of 51
By Pratibha Kumari
NIT Warangal
Roll No. 144562
Generations of Internet
• First generation(Web 1.0):
• 1st generation began with the hyperlinks between the webpage
• There were only static pages
• Static web pages containing text/graphics, images and
other multimedia files, hyperlinks were used to navigate
between them
• Second generation(Web 2.0):
• Focus on power of community
• Interoperability in large heterogeneous network made of several
LANs
• Allows information sharing with a social media
• User-generated content in a virtual community
• Search for information through Keyword
• Third generation(Web 3.0):
• Also Called the Semantic Web
• Organizes information in a more logical way or natural language so that
software agents can read and use them to share and integrate.
• Search engines are much smarter and search engine will understand
who you are, what you've been doing, and where you'd like to go next.
• Smart objects
• Beyond M2M communication
Generations of Internet Contd.
How big is our internet?
• 14.3 Trillion - Webpages, live on the Internet.
• 48 Billion - Webpages indexed by Google.Inc.
• 14 Billion - Webpages indexed by Microsoft's Bing.
• 672 Exabytes - 672,000,000,000 Gigabytes (GB) of accessible data.
• Over 9,00,000 Servers - Owned by Google.Inc, the Largest in the world.
All this adds to more than 5000 exa bytes and growing
1 exabyte: 1 billion Gigabytes
It starts with a Lipstick, Funny!
• While Kevin Ashton was working at
a P&G store, a particular shade of
lipstick was missing regularly
• In the 1980s and ’90s, retailers
invested in bar code scanning
systems, but bar codes couldn’t
relay much about a product’s
location
• Then came the radio enabled
customer cards
• A thought occurred to Ashton:
What if I took the radio microchip
out of the credit card and stuck it
on the missing lipsticks?
“If we had computers that knew everything there was to
know about things—using data they gathered without
any help from us: we would be able to track and count
everything, and greatly reduce waste, loss and cost.
We would know when things needed replacing,
repairing or recalling, and whether they were fresh or
past their best.
We need to empower computers with their own means
of gathering information, so they can see, hear and
smell the world for themselves, in all its random glory.”
The Idea: by Kevin Ashton, at MIT in 2000
IoT Definition
The Internet of Things (IoT) is a scenario in
which objects, animals or people are
provided with unique identifiers and the
ability to transfer data over a network
without requiring human-to-human or
human-to-computer interaction using IP
connectivity.
Internet of Things Explained
Evolution of home, mobile and embedded
applications that will be connected to internet
enabling better compute capability, and using
data analytics to extract meaningful
information
Billions of devices are connected to internet
and soon 100s of billions of devices will be
connected
As related devices connect with each other
they can become an intelligent system of
systems
When these Intelligent systems of systems transform data
over network and cloud they can transform businesses,
our lives and our world in countless ways
What are ‘THINGS’ in IoT?
Any natural or man-made Objects
Humans
Smart Devices
Computers
Animals
Automobiles
Buildings
An Example to Begin With
From anywhere in the world, we wish
to know:
Is this chair occupied?
If yes, who is sitting in the chair?
• A unique address
• Ability to communicate
• Sensors to sense the environment
• Pressure Sensor
• RFID tag reader
• A mechanism of control
How Will we do that?
A3:h2:61:81:hb
RFID
Wireless Sensor Nodes
Barcode
Zigbee and
Smartphones
A wide range of sensing
capability is needed to
detect:
Location
Vibraion
Motion
Pressure
Temperature and
.............
To enhance the
power of network
by developing
processing
capabilities at
different parts of
the network
To make smaller
and smaller
things to have the
capability to
connect and
interact
Unique Identification of Objects
• Radio Frequency Identification (RFID)
RFID
Passive RFID tags Active RFID tags
•No Battery
•Use power of reader’s
interrogation signal to
communicate the ID to
reader
•Battery powered tags
•Can instantiate a
communication
• Wireless Sensor Networks (WSN)
– Typically a node (WSN core hardware) contains sensor
interfaces, processing units, transceiver units and power
supply.
– Nodes in a WSN need to communicate among themselves
to transmit data in single or multi-hop to a base station.
– The nodes are expected to be deployed in an ad-hoc
manner for most applications. Designing an appropriate
topology, routing and MAC layer is critical for the
scalability and longevity of the deployed network.
Unique Identification of Objects
• ZigBee
– It is a mesh network specification to create low-power PANs for
transmission distances of 10 – 100 metres
– The standard was designed to provide high data throughput in
applications where the duty cycle is low and low power
consumption is an important consideration
Unique Identification of Objects
Specifications
Based on IEEE 802.15.4 standard
Data rate of 250 kbit/s
Uses ISM radio band of 2.4 GHz
Addressing Scheme
Required features of the addressing scheme
• Uniqueness  The ability to uniquely identify ‘Things’
from all the other things
– A unique identifier(UID) is assigned to at most one object
in universe(for Global UID), or within a particular scope
– Heterogeneous nature of wireless nodes
– Variable data types
– Confluence of data from devices
• Persistence/Longevity  The lifetime of an identifier
should ideally be the same as the lifetime of the object it
identifies
• Reliability  Persistent network functioning to channel
the increasing data traffic is another challenge to IoT
– Scalability of existing network
– Addition of new devices must not hamper the
performance of network
– Reliability of data over internet
Addressing Scheme Contd.
Uniform Resource Identifier
• URI is an internet standard or resource naming and
identification
• Consists of 2 parts:
– Uniform resource Name/URN ( Higher network layers)
– Uniform Resource ocator/URL( lower layers)
URN URL
Wireless Communication
Comparison of some Wireless Standards
Sensors and Actuators
Sensors are important for tagging, tracking,
locating, monitoring things, and for enabling
things to be aware of the environment around
them
What should the sensors detect?
Luminosity
Intensity
Temperature
Pressure
Stress
Rotary angle Pressure
Proximity
Vibration
Movement
Sound/AudioTouch
Water Levels/Leaks
PositionVelocity
Displacement
NoiseHumidity
Force
Chemicals
Where from should the power come for
the sensors?
• With
– Over 5 billion IoT devices employed today
– Expected to reach 20 billion by 2020
Power consumption for sensors is going to be huge
• Supply from power mains & battery use become impractical
• The sensor nodes should harvest energy from the environment
like
- Solar powered
- Wind energy
- Hydro energy
• Sensors should be designed for ultra low power consumption
Other requirements for sensors
• Long lifetime
• Since it is impossible to make a customized chip for
every application, a highly modular approach is
needed
• Reliability
• Scalability
• Communication and Connectivity
Some Numbers
• Sensors in an iphone
– Accelerometer,
– Gyroscope,
– Magnetometer,
– Compass,
– Proximity,
– Light,
– Moisture,
– Location (GPS), and
– Temperature.
• Sensors on a Kintex 7 board
– Temperature
– Power supply sensors
Cost of bandwidth
Cost of processing
Big Data
Smart Phones
Ubiquitous Wireless Connectivity
Scalability of IPv6
Key Drivers of IoT
Cost of sensors Scalable Cloud Computing
IoT Layered Architecture
• Sensor Layer/Edge Layer:
– The lowest layer is made up of smart objects
integrated with sensors
– Enables interconnection of the physical and digital
worlds allowing real-time information to be
collected and processed
• Access gateway layer:
– Provides a robust communication channel for the
large amount of data produced by sensors
– Also performs cross platform communication if
required.
IoT Layered Architecture Contd.
• Middleware layer:
– It is responsible for critical functions such as device
management and information processing and also
takes care of issues like data filtering, data
aggregation, semantic analysis, access control
• Application layer:
– Responsible for delivery of various applications to
different users in IoT
– The applications can be from different industry
verticals such as: manufacturing, logistics, retail,
environment, public safety, healthcare, food and drug
etc.
IoT Layered Architecture Contd.
Open Problems and Challenges to IoT
1. Standardization
• Absence of governance
• Technology standardizations is still fragmented
• Several standardization efforts are being made
– Open Interconnect Consortium: Atmel, Dell, Intel,
Samsung and Windriver
– Industrial Internet Consortium: Intel, Cisco, GE, IBM
Key Standards Emerging for Internet of Things
Lightweight protocols
for devices to work
together, communicate
OASIS MQTT, MQTT-SN
OASIS SmartGrid projects
Unique and extensible
identifiers for all those
billions of devices
Multiple new projects, XRI,
UUIDs, etc.
Demand for API access
and interoperability
SOA/Cloud orchestration
and API standardization
(AMQP, MQTT, OData)
Cybersecurity KMIP, SAML, XACML/JSON,
PKCS11, CloudAuthZ
Privacy and Policy PMRM, PbDSE, and Personal
Data Stores
2. Scalability
• Number of devices is increasing exponentially
→How can they uniquely be tagged?
→How can data generated by these devices be managed?
3. Addressing Issues
• IPv4 has already exhausted
• So we are moving towards IPv6:
• IPv6 offers
340,282,366,920,938,463,463,374,607,431,76
8,211,456 addresses
This amounts to 340 trillion, trillion,
trillion
Comparison of IP v4 with IPv6
4. New Traffic to Handle
• The characteristics of smart objects traffic in IoT is
still not known
• Since the world of physical things is extremely
diverse, each type of smart object is likely to have
different information, processing and
communication capabilities
• WSNs traffic strongly depends on application
• As objects have to function with minimal number of
resources a more extensive software infrastructure
is needed on the network and background servers
5. Security and Privacy
• Physical attack
• As the IoT connects more devices together, it
provides more decentralized entry points for
malware
• Not possible to implement complex security
schemes on low computing wireless nodes
• Authentication problem
• Data integration
Other Issues
• Managing and fostering rapid innovation
• Societal acceptance
• Resource efficiency
• Pollution and disaster avoidance
Applications
Environment
Big Belly Integrated Marine
Observing System Invisible Track
Industry Control Systems
• Supervisory Control and Data Acquisition(SCADA)
– Over a large area spanning thousands of square
kilometres, e.g., power grids, gas pipeline
• Distributed Control Systems(DCMs)
– Within one location, e.g., waste water treatment plant
• Programmable Logic Controllers
– Devices that for this SCADA and DCMs, e.g., assembly
lines
Industry Control Systems Example: Smart Grid
Smart Grids can
•Identify surges, outages,
and failure points
•Reroute power around
failure
•Accommodate new off
grid energy resources
•Perform load balancing
dynamically
Health Care
Mimo Baby Monitor Cardio MEMS Heart
Sensor Glucose Meter
Home Automation and Domotics
Transport
Smart Propane Tank MEMS based Sensors for traffic
monitoring
Technical papers
•That 'Internet of Things' In the real world, things matter more than ideas. By Kevin
Ashton -- 2001
•IEEE IoT at work by A. M. Houyou, H.-P. Huth, S. Mechs G. Völksen, H.–J. Hof, J. Gessner
(Siemens) Christos Kloukinas, Igor Siveroni (City) H. Trsek (inIT) -- 2011
•IEEE A special report on Internet of things -- 2014
•http://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the internet-
of-things-024571.php
•Sources: Cisco IBSG, 2011; U.S. Census Bureau, 2011.
•White paper on The Internet of Things and Sensors and Actuators by Vint Serf(VP and
Chief Internet Evangelist, Google) – 2012
•Internet of Things: Converging Technologies for Smart Environments and Integrated
Ecosystems by Dr. Ovidiu Vermesan and Dr. Peter Friess
•Lutz Heuser, Zoltan Nochta, Nina-Cathrin Trunk. ICT Shaping the World: A Scientific
View. ETSI, WILEY Publication.(2008)
Web pages
•www.intel.com/IoT
•www.cisco.com/iot/security
•IBM Internet of things research page
References
THANK YOU!!!

More Related Content

What's hot

iot industry automation
iot industry automationiot industry automation
iot industry automation
mansi sharma
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
vineetkathan
 
Iot ppt
Iot pptIot ppt
Iot ppt
piyuu7
 

What's hot (20)

Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT
IoTIoT
IoT
 
5g wireless technology
5g wireless technology 5g wireless technology
5g wireless technology
 
Bluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-networkBluetooth based-smart-sensor-network
Bluetooth based-smart-sensor-network
 
BSNL training seminar ppt
BSNL training seminar pptBSNL training seminar ppt
BSNL training seminar ppt
 
5G 2
5G 25G 2
5G 2
 
IoT in healthcare
IoT in healthcareIoT in healthcare
IoT in healthcare
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
5G PPT
5G PPT5G PPT
5G PPT
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
EC8004 - Wireless Networks Question Bank
EC8004 - Wireless Networks Question BankEC8004 - Wireless Networks Question Bank
EC8004 - Wireless Networks Question Bank
 
5G and Internet of Things (IoT)
5G and Internet of Things (IoT)5G and Internet of Things (IoT)
5G and Internet of Things (IoT)
 
IoT for Healthcare
IoT for HealthcareIoT for Healthcare
IoT for Healthcare
 
iot industry automation
iot industry automationiot industry automation
iot industry automation
 
Network Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile TecnologyNetwork Architecture of 5G Mobile Tecnology
Network Architecture of 5G Mobile Tecnology
 
Iot ppt
Iot pptIot ppt
Iot ppt
 

Viewers also liked

smart parking system
smart parking system smart parking system
smart parking system
Che Tna
 

Viewers also liked (15)

Ch12 the internert & mm
Ch12 the internert & mmCh12 the internert & mm
Ch12 the internert & mm
 
The Smart Wardrobe
The Smart WardrobeThe Smart Wardrobe
The Smart Wardrobe
 
Towards New Knowledge Based Policies for Development in the Arab Economies & ...
Towards New Knowledge Based Policies for Development in the Arab Economies & ...Towards New Knowledge Based Policies for Development in the Arab Economies & ...
Towards New Knowledge Based Policies for Development in the Arab Economies & ...
 
Media Streams in IOT via WebRTC
Media Streams in IOT  via WebRTCMedia Streams in IOT  via WebRTC
Media Streams in IOT via WebRTC
 
Chapter 8 - Multimedia Storage and Retrieval
Chapter 8 - Multimedia Storage and RetrievalChapter 8 - Multimedia Storage and Retrieval
Chapter 8 - Multimedia Storage and Retrieval
 
Chapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The InternetChapter 9 -Multimedia on The Internet
Chapter 9 -Multimedia on The Internet
 
Drum Duino ICLI2014 presentation
Drum Duino ICLI2014 presentationDrum Duino ICLI2014 presentation
Drum Duino ICLI2014 presentation
 
The Internet & Multimedia Integration
The Internet & Multimedia IntegrationThe Internet & Multimedia Integration
The Internet & Multimedia Integration
 
The Internet and Multimedia
The Internet and Multimedia The Internet and Multimedia
The Internet and Multimedia
 
Chapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia FundamentalsChapter 1 - Multimedia Fundamentals
Chapter 1 - Multimedia Fundamentals
 
smart parking system
smart parking system smart parking system
smart parking system
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Internet of Things

Similar to Internet of Things (20)

SmartCity IOT Big Data SPP.pptx
SmartCity IOT Big Data SPP.pptxSmartCity IOT Big Data SPP.pptx
SmartCity IOT Big Data SPP.pptx
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
iotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdfiotarchitecture-190506052723.pdf
iotarchitecture-190506052723.pdf
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
Internet of Things- Research Directions
Internet of Things- Research DirectionsInternet of Things- Research Directions
Internet of Things- Research Directions
 
Iot Report
Iot ReportIot Report
Iot Report
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 
IOT UNIT I.pptx
IOT UNIT I.pptxIOT UNIT I.pptx
IOT UNIT I.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
8_iot.pdf
8_iot.pdf8_iot.pdf
8_iot.pdf
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 

Recently uploaded

Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 

Internet of Things

  • 1. By Pratibha Kumari NIT Warangal Roll No. 144562
  • 2. Generations of Internet • First generation(Web 1.0): • 1st generation began with the hyperlinks between the webpage • There were only static pages • Static web pages containing text/graphics, images and other multimedia files, hyperlinks were used to navigate between them • Second generation(Web 2.0): • Focus on power of community • Interoperability in large heterogeneous network made of several LANs • Allows information sharing with a social media • User-generated content in a virtual community • Search for information through Keyword
  • 3. • Third generation(Web 3.0): • Also Called the Semantic Web • Organizes information in a more logical way or natural language so that software agents can read and use them to share and integrate. • Search engines are much smarter and search engine will understand who you are, what you've been doing, and where you'd like to go next. • Smart objects • Beyond M2M communication Generations of Internet Contd.
  • 4.
  • 5. How big is our internet? • 14.3 Trillion - Webpages, live on the Internet. • 48 Billion - Webpages indexed by Google.Inc. • 14 Billion - Webpages indexed by Microsoft's Bing. • 672 Exabytes - 672,000,000,000 Gigabytes (GB) of accessible data. • Over 9,00,000 Servers - Owned by Google.Inc, the Largest in the world. All this adds to more than 5000 exa bytes and growing 1 exabyte: 1 billion Gigabytes
  • 6. It starts with a Lipstick, Funny! • While Kevin Ashton was working at a P&G store, a particular shade of lipstick was missing regularly • In the 1980s and ’90s, retailers invested in bar code scanning systems, but bar codes couldn’t relay much about a product’s location • Then came the radio enabled customer cards • A thought occurred to Ashton: What if I took the radio microchip out of the credit card and stuck it on the missing lipsticks?
  • 7. “If we had computers that knew everything there was to know about things—using data they gathered without any help from us: we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory.” The Idea: by Kevin Ashton, at MIT in 2000
  • 8. IoT Definition The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction using IP connectivity.
  • 9.
  • 10. Internet of Things Explained Evolution of home, mobile and embedded applications that will be connected to internet enabling better compute capability, and using data analytics to extract meaningful information Billions of devices are connected to internet and soon 100s of billions of devices will be connected As related devices connect with each other they can become an intelligent system of systems When these Intelligent systems of systems transform data over network and cloud they can transform businesses, our lives and our world in countless ways
  • 11. What are ‘THINGS’ in IoT? Any natural or man-made Objects Humans Smart Devices Computers Animals Automobiles Buildings
  • 12. An Example to Begin With From anywhere in the world, we wish to know: Is this chair occupied? If yes, who is sitting in the chair?
  • 13. • A unique address • Ability to communicate • Sensors to sense the environment • Pressure Sensor • RFID tag reader • A mechanism of control How Will we do that? A3:h2:61:81:hb
  • 14. RFID Wireless Sensor Nodes Barcode Zigbee and Smartphones A wide range of sensing capability is needed to detect: Location Vibraion Motion Pressure Temperature and ............. To enhance the power of network by developing processing capabilities at different parts of the network To make smaller and smaller things to have the capability to connect and interact
  • 15. Unique Identification of Objects • Radio Frequency Identification (RFID) RFID Passive RFID tags Active RFID tags •No Battery •Use power of reader’s interrogation signal to communicate the ID to reader •Battery powered tags •Can instantiate a communication
  • 16. • Wireless Sensor Networks (WSN) – Typically a node (WSN core hardware) contains sensor interfaces, processing units, transceiver units and power supply. – Nodes in a WSN need to communicate among themselves to transmit data in single or multi-hop to a base station. – The nodes are expected to be deployed in an ad-hoc manner for most applications. Designing an appropriate topology, routing and MAC layer is critical for the scalability and longevity of the deployed network. Unique Identification of Objects
  • 17. • ZigBee – It is a mesh network specification to create low-power PANs for transmission distances of 10 – 100 metres – The standard was designed to provide high data throughput in applications where the duty cycle is low and low power consumption is an important consideration Unique Identification of Objects Specifications Based on IEEE 802.15.4 standard Data rate of 250 kbit/s Uses ISM radio band of 2.4 GHz
  • 18. Addressing Scheme Required features of the addressing scheme • Uniqueness  The ability to uniquely identify ‘Things’ from all the other things – A unique identifier(UID) is assigned to at most one object in universe(for Global UID), or within a particular scope – Heterogeneous nature of wireless nodes – Variable data types – Confluence of data from devices • Persistence/Longevity  The lifetime of an identifier should ideally be the same as the lifetime of the object it identifies
  • 19. • Reliability  Persistent network functioning to channel the increasing data traffic is another challenge to IoT – Scalability of existing network – Addition of new devices must not hamper the performance of network – Reliability of data over internet Addressing Scheme Contd.
  • 20. Uniform Resource Identifier • URI is an internet standard or resource naming and identification • Consists of 2 parts: – Uniform resource Name/URN ( Higher network layers) – Uniform Resource ocator/URL( lower layers) URN URL
  • 22. Comparison of some Wireless Standards
  • 23. Sensors and Actuators Sensors are important for tagging, tracking, locating, monitoring things, and for enabling things to be aware of the environment around them
  • 24. What should the sensors detect? Luminosity Intensity Temperature Pressure Stress Rotary angle Pressure Proximity Vibration Movement Sound/AudioTouch Water Levels/Leaks PositionVelocity Displacement NoiseHumidity Force Chemicals
  • 25.
  • 26. Where from should the power come for the sensors? • With – Over 5 billion IoT devices employed today – Expected to reach 20 billion by 2020 Power consumption for sensors is going to be huge • Supply from power mains & battery use become impractical • The sensor nodes should harvest energy from the environment like - Solar powered - Wind energy - Hydro energy • Sensors should be designed for ultra low power consumption
  • 27. Other requirements for sensors • Long lifetime • Since it is impossible to make a customized chip for every application, a highly modular approach is needed • Reliability • Scalability • Communication and Connectivity
  • 28. Some Numbers • Sensors in an iphone – Accelerometer, – Gyroscope, – Magnetometer, – Compass, – Proximity, – Light, – Moisture, – Location (GPS), and – Temperature. • Sensors on a Kintex 7 board – Temperature – Power supply sensors
  • 29. Cost of bandwidth Cost of processing Big Data Smart Phones Ubiquitous Wireless Connectivity Scalability of IPv6 Key Drivers of IoT Cost of sensors Scalable Cloud Computing
  • 31. • Sensor Layer/Edge Layer: – The lowest layer is made up of smart objects integrated with sensors – Enables interconnection of the physical and digital worlds allowing real-time information to be collected and processed • Access gateway layer: – Provides a robust communication channel for the large amount of data produced by sensors – Also performs cross platform communication if required. IoT Layered Architecture Contd.
  • 32. • Middleware layer: – It is responsible for critical functions such as device management and information processing and also takes care of issues like data filtering, data aggregation, semantic analysis, access control • Application layer: – Responsible for delivery of various applications to different users in IoT – The applications can be from different industry verticals such as: manufacturing, logistics, retail, environment, public safety, healthcare, food and drug etc. IoT Layered Architecture Contd.
  • 33. Open Problems and Challenges to IoT
  • 34. 1. Standardization • Absence of governance • Technology standardizations is still fragmented • Several standardization efforts are being made – Open Interconnect Consortium: Atmel, Dell, Intel, Samsung and Windriver – Industrial Internet Consortium: Intel, Cisco, GE, IBM
  • 35. Key Standards Emerging for Internet of Things Lightweight protocols for devices to work together, communicate OASIS MQTT, MQTT-SN OASIS SmartGrid projects Unique and extensible identifiers for all those billions of devices Multiple new projects, XRI, UUIDs, etc. Demand for API access and interoperability SOA/Cloud orchestration and API standardization (AMQP, MQTT, OData) Cybersecurity KMIP, SAML, XACML/JSON, PKCS11, CloudAuthZ Privacy and Policy PMRM, PbDSE, and Personal Data Stores
  • 36. 2. Scalability • Number of devices is increasing exponentially →How can they uniquely be tagged? →How can data generated by these devices be managed?
  • 37. 3. Addressing Issues • IPv4 has already exhausted • So we are moving towards IPv6: • IPv6 offers 340,282,366,920,938,463,463,374,607,431,76 8,211,456 addresses This amounts to 340 trillion, trillion, trillion
  • 38. Comparison of IP v4 with IPv6
  • 39. 4. New Traffic to Handle • The characteristics of smart objects traffic in IoT is still not known • Since the world of physical things is extremely diverse, each type of smart object is likely to have different information, processing and communication capabilities • WSNs traffic strongly depends on application • As objects have to function with minimal number of resources a more extensive software infrastructure is needed on the network and background servers
  • 40. 5. Security and Privacy • Physical attack • As the IoT connects more devices together, it provides more decentralized entry points for malware • Not possible to implement complex security schemes on low computing wireless nodes • Authentication problem • Data integration
  • 41. Other Issues • Managing and fostering rapid innovation • Societal acceptance • Resource efficiency • Pollution and disaster avoidance
  • 43. Environment Big Belly Integrated Marine Observing System Invisible Track
  • 44. Industry Control Systems • Supervisory Control and Data Acquisition(SCADA) – Over a large area spanning thousands of square kilometres, e.g., power grids, gas pipeline • Distributed Control Systems(DCMs) – Within one location, e.g., waste water treatment plant • Programmable Logic Controllers – Devices that for this SCADA and DCMs, e.g., assembly lines
  • 45. Industry Control Systems Example: Smart Grid Smart Grids can •Identify surges, outages, and failure points •Reroute power around failure •Accommodate new off grid energy resources •Perform load balancing dynamically
  • 46. Health Care Mimo Baby Monitor Cardio MEMS Heart Sensor Glucose Meter
  • 48.
  • 49. Transport Smart Propane Tank MEMS based Sensors for traffic monitoring
  • 50. Technical papers •That 'Internet of Things' In the real world, things matter more than ideas. By Kevin Ashton -- 2001 •IEEE IoT at work by A. M. Houyou, H.-P. Huth, S. Mechs G. Völksen, H.–J. Hof, J. Gessner (Siemens) Christos Kloukinas, Igor Siveroni (City) H. Trsek (inIT) -- 2011 •IEEE A special report on Internet of things -- 2014 •http://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the internet- of-things-024571.php •Sources: Cisco IBSG, 2011; U.S. Census Bureau, 2011. •White paper on The Internet of Things and Sensors and Actuators by Vint Serf(VP and Chief Internet Evangelist, Google) – 2012 •Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems by Dr. Ovidiu Vermesan and Dr. Peter Friess •Lutz Heuser, Zoltan Nochta, Nina-Cathrin Trunk. ICT Shaping the World: A Scientific View. ETSI, WILEY Publication.(2008) Web pages •www.intel.com/IoT •www.cisco.com/iot/security •IBM Internet of things research page References

Editor's Notes

  1. Well, Web 1.0 also known as 'dot com', first generation of web began with the hyperlinks between the webpages.Everyone has their personal own title, single person updation and can be think of informational portal. There were only static pages instead of dynamic user-generated content with framesets and tables to position and align elements on page. Webpages contains text/graphics, images and other multimedia files, hyperlinks are used to navigate between them. Web 1.0 lack of context, interaction scalability and no user data available. Web 2.0, the second generation focuses on power of community, allows information sharing with a social media, Interoperability(the ability to exchange and use information (usually in a large heterogeneous network made up of several local area networks), user-generated content in a virtual community, search for information through keywords and make user data available.Web 2.0 is lack of personalization, up to mark portability, interoperability. Examples of Web 2.0 include social networking sites, blogs, folksonomies,  video sharing sites, mashups, web applications, hosted services and wikis. Web 3.0 is Semantic web, organizes information in a more logical way or natural language so that software agents can read and use them to share and integrate. "It's a collection of data resources that are interconnected and speak the same language" In a more simple way, Semantic Web makes search engine much smarter and search engine will understand who you are, what you've been doing, and where you'd like to go next. It's like asking for personal assistance that "Find me a shop within 100 miles that are 24*7 and if any contact details available than add it to my address book
  2. Geographical information science GIS Corpous analysis is a linguistics analysis
  3. Since Ashton was young and curious and didn’t know what he shouldn’t have to worry about, it bothered him that he’d go into his local store and find that one shade of lipstick in his cosmetic line always seemed to be sold out. He checked with P&G’s supply chain people, who told him plenty of that color were in the warehouse. They suggested it was a coincidence—that Ashton happened to go into the one store that couldn’t keep that color in stock. But Ashton didn’t buy it: He wanted to know where his lipstick was, and what was happening to it. No one could tell him. In the 1980s and ’90s, retailers invested in bar code scanning systems and thought the systems gave them a grip on inventory. But bar codes couldn’t relay much about a product’s location. “This illusion of perfect information created by the bar code was just way off,” Ashton says. His notion that there had to be a more thorough way to track products intrigued P&G’s leaders in Cincinnati, and they asked him to explore the idea. About the same time, U.K. retailers began experimenting with loyalty cards embedded with a brand-new technology: a tiny “radio-enabled” chip, later called RFID. One manufacturer of the cards showed Ashton how the chips worked, noting that the small bits of data on the chips could be transferred wirelessly, without a reader. Driving in traffic, a thought occurred to Ashton: What if I took the radio microchip out of the credit card and stuck it on my lipstick? If a wireless network could pick up data on a card, it could snatch data off a chip on a lipstick package and tell the store what was on the shelves. P&G was a sponsor of the Massachusetts Institute of Technology Media Lab. (Half of corporate America was sponsoring the Media Lab at the time.) This led to meetings between P&G, Ashton and MIT, which in turn led to P&G loaning Ashton to MIT to set up the Auto-ID Center to study RFID and the potential for “smart packaging.”
  4. The IoT’s true value lies in the data the interconnected items share.
  5. IoT allows people and things to be connected anytime, anyplace with anything and anyone ideally using any network path and service
  6. A thing, in the context of the Internet of things (IoT), is an entity or physical object that has a unique identifier, an embedded system and the ability to transfer data over a network.
  7. RFID enables design of microchips for wireless data communication.. The passive RFID tags are not battery powered and they use the power of the reader’s interrogation signal to communicate the ID to the RFID reader. This has resulted in many applications particularly in retail and supply chain management. The applications can be found in transportation (replacement of tickets, registration stickers) and access control applications as well. The passive tags are currently being used in many bank cards and road toll tags which are among the first global deployments. Active RFID readers have their own battery supply and can instantiate the communication. Of the several applications, the main application of active RFID tags is in port containers [16] for monitoring cargo. A typical RFID system includes two parts: a transponder or tag which attached to the object to be identified, and an interrogator or reader which identifies the tags. Active tags incorporate a battery which supplies the power for the operation. They offer long operation distance (10-100m) and high performance but expensive, usually big size, and limited life time due to battery. On the contrary, passive tags derive the required power from a reader using either inductive coupling or electromagnetic capture and communicate by utilizing load modulation or electromagnetic backscatter. They are more widely used than active tags because of their several advantages such as low cost, small size, and unlimited life time. Inductive coupling tag can offer high data-rate in proximity operation. Backscatter passive tags offer longer operation distance. However, the returned signal power scales as the inverse fourth power of the distance which sometimes make identification difficult, especially in a dense multi-path and multi-user environment, or when the tag is nearby water, metal or organic tissues. The data rate is limited to few hundreds of kb/s and positioning accuracy is not better than 70 cm [4]. In many new applications such as wireless sensing and IoT, higher data-rate link with accurate 3D positioning capability is highly desirable.
  8. Almost always, they comprise of multiple A/D converters for sensor interfacing and more modern sensor nodes have the ability to communicate using one frequency band making them more versatile [7].
  9. ZigBee is a specification for a suite of high-level communication protocols used to create personal area networks built from small, low-power digital radios. ZigBee is based on an IEEE 802.15.4 standard. Though its low power consumption limits transmission distances to 10–100 meters line-of-sight, depending on power output and environmental characteristics,[1] ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices to reach more distant ones. ZigBee is typically used in low data rate applications that require long battery life and secure networking (ZigBee networks are secured by 128 bit symmetric encryption keys.) ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data transmissions from a sensor or input device. Applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment that requires short-range low-rate wireless data transfer. The technology defined by the ZigBee specification is intended to be simpler and less expensive than other wireless personal area networks (WPANs), such as Bluetooth or Wi-Fi.
  10. Every element that is already connected and those that are going to be connected, must be identified by their unique identification, location and functionalities. IoT faces a bottleneck at the interface between the gateway and wireless sensor devices. Furthermore, the scalability of the device address of the existing network must be sustainable. The addition of networks and devices must not hamper the performance of the network, the functioning of the devices, the reliability of the data over the network or the effective use of the devices from the user interface. Wireless sensor networks (considering them as building blocks of IoT), which run on a different stack compared to the Internet, cannot possess IPv6 stack to address individually and hence a subnet with a gateway having a URN will be required. With this in mind, we then need a layer for addressing sensor devices by the relevant gateway. At the subnet level, the URN for the sensor devices could be the unique IDs rather than human-friendly names as in the www, and a lookup table at the gateway to address this device. Further, at the node level each sensor will have a URN (as numbers) for sensors to be addressed by the gateway. The entire network now forms a web of connectivity from users (high-level) to sensors (low-level) that is addressable (through URN), accessible (through URL) and controllable (through URC).
  11. Z-Wave is a wireless communications protocol designed for home automation, specifically for remote control applications in residential and light commercial environments. Operating in 900mhz LTE, an abbreviation for Long-Term Evolution, commonly marketed as 4G LTE, is a standard for wireless communication of high-speed data for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvements Weightless is a proposed proprietary open wireless technology standard for exchanging data between a base station and thousands of machines around it using White space(frequency channels intended for TV broadcasting but currently unoccupied) with high levels of security.. Weightless technology is designed to operate in multiple licensed and licence exempt frequency spectrums. In particular it is available in two variants – Weightless-W and Weightless-N. ANT+ is a managed ANT network that uses ‘device profiles’ to define how to send data over the network in a consistent way. The target applications for the ANT+ managed network include sport, wellness, and home health. Of course in reality the ANT+ managed network is made up of many smaller networks spread around the world; these networks exist wherever a group of ANT+ sensors and receivers can be found, and are separated simply by the physical distance between them. Mostly used for health and wellness Near field communication (NFC) is a set of ideas and technology that enables smartphones and other devices to establish radiocommunication with each other by touching them together or bringing them into proximity, typically a distance of 10 cm (3.9 in) or less. Each full NFC device can work in 3 modes: NFC target (acting like a credential), NFC initiator (acting as a reader) and NFC (peer to peer.) Most of the first business models, like advertisement tags or other industrial applications, have not been successful. As with proximity card technology, near-field communication uses electromagnetic induction between two loop antennas located within each other's near field, effectively forming an air-core transformer
  12. since it is impossible to make a customized chip for each and every application, a highly modular approach is needed where systems can be constructed by combining pre-existing chips designed to be composable, while not unduly increasing power and size.
  13.  Device management: The number of sensors, gateways and devices will be extremely large and they are going to be spread over large geographical areas – often in remote, inaccessible and/or private locations. Ensuring that devices are completely automated and remotely manageable is a challenge.  Device diversity and interoperability: Take the example of a power network in a city, which is sensor enabled, and needs to be monitored continuously in near real-time. The generation, transmission, and distribution functions in such a complex network require different types of sensor devices from different vendors. As many vendors do not support any standards in their products, there are sure to be interoperability issues.  Integration of data from multiple sources: As you deploy an IoT application, you will get streams of data from different sources such as sensors, contextual data from mobile device information, and social network feeds and other web resources. It is important to note that the semantics of the data must be part of the data itself and not locked up within the application logic in different application silos.  Scale, data volume, and performance: Prepare your business to manage the scale, data volume, and velocity of IoT applications. As the number of users and devices scale, so will the amount of data that needs to be ingested, stored, and analyzed. You will have a Big Data problem on your hands, and standard architectures and platforms may be inadequate. Also, where stringent real-time performance is required, network and application level latencies may be a problem.  Flexibility and evolution of applications: You will witness sensors and devices evolving with new and improved capabilities. This will result in creation of new analytics techniques and algorithms, and new use cases and business models. You will need to quickly develop apps with minimal effort. You will need ecosystems and platforms that enable and sustain this.  Data privacy: A good bit of data collected from devices will be sensitive personal data that must be protected from unauthorized access and used only for the specific purpose for which the user has allowed that data to be collected. Users have to be provided with necessary tools that enable them to define the policies for sharing their personal data with authorized persons and applications.
  14. API application program interface
  15. Advantages of IPv6 for IoT Adoption is just a matter of time Scalability Solving the NAT barrier Multi-Stakeholder Support Multicast, anycast, mobility support, auto-configuration and address scope
  16. Nodes spend most of the time unattended.. It is easyt o physically attack them Wireless nodes have low capabilities Data Integration: data should not be modified without the system detecting it Attacks on the node(memory protection) Attacks over the internet(keyed hash method opcode
  17. BigBelly is a solar-powered trash receptacle and trash compactor that alerts sanitation crews when it is full. Waste management facilities use historical data collected from each BigBelly bin to plan their collection activities and make adjustments, such as adjusting the size of a receptacle. BigBelly systems are found throughout cities, corporate campuses, college campuses, parks, and beaches. Boston University has reduced its pickup from an average of 14 to 1.6 times a week.2 The university not only saves time, but also energy since its trash collectors are using fewer garbage bags and producing less CO2 during trash pickup. Given that household waste is expected to rise to 2.2 billion tons by 2025 from the current 1.3 tons produced now, additional tools will be needed to handle higher volumes of trash Australia’s Integrated Marine Observing System is a network of sensors along the Great Barrier Reef to collect data for researchers exploring the impact of oceanic conditions on marine ecosystems and climate change. Buoys equipped with sensors collect biological, physical, and chemical data. Data is sent to a base station on shore using a variety of wireless technologies, including microwave, satellite, and 3G mobile networks, depending on the distance to shore.6 The system has been deployed since 2010 in seven different sites along the Great Barrier Reef and has collected data integral to research on fish movement, biodiversity, and damage to coral reefs Invisible Tracck is a small device covertly placed in trees in protected forest areas to help prevent illegal logging. The devices, which are smaller than a deck of cards, alert authorities when illegally harvested trees pass within range of a mobile network. Law enforcement officials can then locate the production sites and stop these activities. Invisible Tracck is currently deployed in the Amazonian forests in Brazil, which lost an average of 3.46 million hectares of primary forest each year between 2000 and 2005.4 Many illegal deforestation activities have gone undetected because satellite range and radio frequencies are often weak in remote areas. Invisible Tracck now ensures that even the most vulnerable, remote areas of Brazil can be policed and protected
  18. The Mimo baby monitor is a body suit that monitors a baby’s body temperature, motion, and breathing patterns.39 Sensors use Bluetooth wireless communication to relay this data to a base station, which then transmits it to the Internet to be analyzed by the company’s sleep analysis software. Parents can use a mobile app on their smart phone to see their baby’s data in real-time, monitor their sleeping habits over time, and keep track of eating schedules and diaper changes. Parents can also setup the device to receive alerts on their phone if anything changes.40 The company hopes this technology will help prevent some of the 4,000 infant deaths that occur each year in the United States without any obvious cause. The CardioMEMS Heart Sensor is an implantable medical device for monitoring heart failure. Heart failure affects 5.7 million people in the United States and costs the country $34.4 billion annually in health care services, medication, and lost productivity.53 The device, which is about the size of a paper clip, is implanted into a patient’s pulmonary artery using a minimally-invasive technique and measures pulmonary arterial pressure. Data from the device is collected wirelessly and transmitted to a central database for the patient’s health care providers to review. A rise in pulmonary arterial pressure is the clearest sign of a potential problem. Until now, doctors had to use a change in weight to predict potential problems, a less accurate technique. When health care providers are alerted to a problem, they can advise a change in medication to treat the condition. In a randomized clinical trial, the CardioMEMS Heart Sensor resulted in a 30 percent reduction in hospitalization rates in heart failure patients after six months
  19. Iphone sensors include accelerometer, gyroscope, magnetometer, compass, proximity, light, moisture, location (GPS), and navigation sensors.