SlideShare a Scribd company logo
1 of 102
BHARAT TANK
Assistant professor
EC-PIT
Definition
Characteristics
Architecture
Enabling Technologies
Application
Future Challenges
 The Internet of things refers to a type of
network to connect anything with the Internet
based on stipulated protocols through
information sensing equipments to conduct
information exchange and communications in
order to achieve smart recognitions, positioning,
tracing, monitoring, and administration.
 In this chapter we briefly discussed about what IOT
is, how IOT enables different technologies, about
its architecture, characteristics & applications, IOT
functional view & what are the future challenges for
IOT.
 Internet of things common definition is defining as:
Internet of things (IOT) is a network of physical objects.
 The internet is not only a network of computers, but it
has evolved into a network of device of all type and
sizes, vehicles, smart phones, home appliances, toys,
cameras, medical instruments and industrial
systems, animals, people, buildings, all
connected, all communicating & sharing information
based on stipulated protocols in order to achieve smart
reorganizations, positioning, tracing, safe & control &
even personal real time online monitoring , online
upgrade, process control & administration.
We define IOT into three categories as
below:
Internet of things is an internet of three
things:
(1)People to people,
(2) People to machine /things,
(3) Things /machine to things /machine,
Interacting through internet.
 Internet of Things (IoT) is a concept and a paradigm
that considers pervasive presence in the environment
of a variety of things/objects that through wireless and
wired connections and unique addressing schemes are
able to interact with each other and cooperate with
other things/objects to create new
applications/services and reach common goals.
 In this context the research and development
challenges to create a smart world are enormous.
 A world where the real, digital and the virtual are
converging to create smart environments that make
energy, transport, cities and many other areas more
intelligent.
 Internet of Things is a new revolution of the Internet.
 Objects make themselves recognizable and they obtain
intelligence by making or enabling context related decisions
thanks to the fact that they can communicate information
about themselves.
 They can access information that has been aggregated
by other things, or they can be components of complex
services.
 This transformation is concomitant with the emergence
of cloud computing capabilities and the transition of the
Internet towards IPv6 with an almost unlimited addressing
capacity.
 Internet of things (IoT) is a global infrastructure for the
information society, enabling advanced services
by interconnecting (physical and virtual) things based on
existing and evolving interoperable information and
communication technologies.
 With the Internet of Things the communication is extended via
Internet to all the things that surround us.
 The Internet of Things is much more than machine to
machine communication, wireless sensor networks, sensor
networks, 2G/3G/4G, GSM, GPRS, RFID, WI-FI, GPS,
microcontroller, microprocessor etc.
 These are considered as being the enabling technologies that
make “Internet of Things” applications possible.
 Enabling technologies for the Internet of Things are
considered can be grouped into three categories:
 (1) technologies that enable “things” to acquire contextual
information,
 (2) technologies that enable “things” to process contextual
information, and
 (3) technologies to improve security and privacy.
 The first two categories can be jointly understood as functional
building blocks required building “intelligence” into “things”,
which are indeed the features that differentiate the IoT from
the usual Internet.
 The third category is not a functional but rather a de facto
requirement, without which the penetration of the IoT would be
severely reduced.
 There is a heterogeneous mix of communication technologies,
which need to be adapted in order to address the needs of IoT
applications such as energy efficiency, speed, security,
and reliability.
 In this context, it is possible that the level of diversity will
be scaled to a number a manageable connectivity
technologies that address the needs of the IoT applications,
are adopted by the market, they have already proved to be
serviceable, supported by a strong technology alliance.
 Examples of standards in these categories include wired and
wireless technologies like Ethernet, WI-FI, Bluetooth, ZigBee,
GSM, and GPRS. [1, 2]
 The key enabling technologies for the Internet of Things is
presented in Figure 3.
 Internet of Things or IoT basically is connecting
Embedded System to internet. The heart of the
embedded system is a RISC family microcontroller
like PIC 16F84/Atmel 8051/ Motorola 68HC11 and
so on.
 Most important thing that differentiates these
microcontrollers with microprocessors like 8085 is
their internal read/writable memory (EPROM). So
you can develop your light weight program (in
Assembly language or using Embedded C with
software like Keil) and "burn" the program into the
hardware. These programs keep on running in a
loop.
 Interestingly in most embedded system a single
program is burn with several subroutines. So unlike
your PC, microcontroller device in an embedded
system runs a single program infinitely.
 You can connect several input and output devices with
these microcontrollers which are either memory
mapped or IO mapped. This simple hardware includes
LCD display, buzzers, keypad (numpad) or even a
printer. You connect several sensors through A/D
interface. The devices can control Higher
Power/Voltage/Current rating devices like fans, motors,
bulbs using drives devices like relay-opt coupler and
so on.
 Autonomous: That means you can build a system
specific to a particular application. For instance
some standard peripherals and a specialized
program can turn a microcontroller unit into
washing machine controller or an oven controller.
 Also embedded systems can be built specific to
the requirement. Unlike a PC which you cannot
work without a monitor, an embedded system may
not mandatorily need a display unit.
 Low Cost: The cost of the microcontroller unit is
magnitude scale lower than a full fledged
computer.
 Low Space: Obviously figure 2 show that an
embedded system takes way too little space when
you compare it with even the sleekest of laptops.
So you can put such a system in your hardware
system quite efficiently.
 Low power: Most of the common microcontrollers
out there which are popular choices for embedded
systems operate at 5V and often need 5v
regulated power supply which can be provided
through a simple 9v standard battery with voltage
regulator or directly from main by using a voltage
rectifier with filter circuit.
 Wireless sensor network refers to a group of spatially
dispersed and dedicated sensors for monitoring and recording
the physical conditions of the environment and organizing the
collected data at a central location. WSNs measure
environmental conditions like temperature, sound, pollution
levels, humidity, wind, and so on.
 These are similar to wireless ad hoc networks in the sense
that they rely on wireless connectivity and spontaneous
formation of networks so that sensor data can be transported
wirelessly. WSNs are spatially distributed autonomous sensors
to monitor physical or environmental conditions, such as
temperature, sound, pressure, etc. and to cooperatively pass
their data through the network to a main locations. The more
modern networks are bi-directional, also enabling control of
sensor activity.
The development of wireless sensor
networks was motivated by military
applications such as battlefield
surveillance; today such networks are
used in many industrial and consumer
applications, such as industrial process
monitoring and control, machine health
monitoring, and so on.
 Cloud computing is the on-demand availability of
computer system resources, especially data storage and
computing power, without direct active management by
the user.
 The term is generally used to describe data centers
available to many users over the Internet. Large clouds,
predominant today, often have functions distributed over
multiple locations from central servers.
 If the connection to the user is relatively close, it may be
designated an edge server.
 Private cloud is cloud infrastructure operated solely
for a single organization, whether managed
internally or by a third party, and hosted either
internally or externally.
 Undertaking a private cloud project requires
significant engagement to virtualize the business
environment, and requires the organization to
reevaluate decisions about existing resources.
 It can improve business, but every step in the
project raises security issues that must be
addressed to prevent serious vulnerabilities. Self-
run data centers[83] are generally capital intensive.
 A cloud is called a "public cloud" when the services
are rendered over a network that is open for public
use.
 Public cloud services may be free.[87] Technically
there may be little or no difference between public
and private cloud architecture, however, security
consideration may be substantially different for
services (a Applications, storage, and other
resources) that are made available by a service
provider for a public audience and when
communication is effected over a non-trusted
network. Generally, public cloud service providers
like Amazon Web Services (AWS)
 Hybrid cloud is a composition of two or more clouds (private,
community or public) that remain distinct entities but are
bound together, offering the benefits of multiple deployment
models.
 Hybrid cloud can also mean the ability to connect collocation,
managed and/or dedicated services with cloud resources.[61]
 Gartner defines a hybrid cloud service as a cloud computing
service that is composed of some combination of private,
public and community cloud services, from different service
providers.[89]
 A hybrid cloud service crosses isolation and provider
boundaries so that it can't be simply put in one category of
private, public, or community cloud service. It allows one to
extend either the capacity or the capability of a cloud service,
by aggregation, integration or customization with another
cloud service.
 Though service-oriented architecture advocates "everything as
a service" (with the acronyms EaaS or XaaS,[62] or simply
aas), cloud-computing providers offer their "services"
according to different models, of which the three standard
models per NIST are Infrastructure as a Service (IaaS),
Platform as a Service (PaaS), and Software as a Service
(SaaS).[61]
 These models offer increasing abstraction; they are thus often
portrayed as a layers in a stack: infrastructure-, platform- and
software-as-a-service, but these need not be related. For
example, one can provide SaaS implemented on physical
machines (bare metal), without using underlying PaaS or IaaS
layers, and conversely one can run a program on IaaS and
access it directly, without wrapping it as SaaS.
 "Infrastructure as a service" (IaaS) refers to online
services that provide high-level APIs used to
dereference various low-level details of underlying
network infrastructure like physical computing
resources, location, data partitioning, scaling, security,
backup etc.
 Facebook APP from google play store
 Linux containers run in isolated partitions of a single
Linux kernel running directly on the physical hardware.
Linux c groups and namespaces are the underlying
Linux kernel technologies used to isolate, secure and
manage the containers.
 Definition of cloud computing defines Platform as a
Service as: The capability provided to the
consumer is to deploy onto the cloud infrastructure
consumer-created or acquired applications created
using programming languages, libraries, services,
and tools supported by the provider.
 The consumer does not manage or control the
underlying cloud infrastructure including network,
servers, operating systems, or storage, but has
control over the deployed applications and possibly
configuration settings for the application-hosting
environment.
 Definition of cloud computing defines Software as a
Service as: The capability provided to the consumer is
to use the provider's applications running on a cloud
infrastructure.
 The applications are accessible from various client
devices through either a thin client interface, such as a
web browser (e.g., web-based email), or a program
interface. The consumer does not manage or control
the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual
application capabilities, with the possible exception of
limited user-specific application configuration settings.
 In the software as a service (SaaS) model, users gain
access to application software and databases. Cloud
providers manage the infrastructure and platforms that
run the applications.
 SaaS is sometimes referred to as "on-demand
software" and is usually priced on a pay-per-use basis
or using a subscription fee.[70]
 In the SaaS model, cloud providers install and operate
application software in the cloud and cloud users
access the software from cloud clients.
 Cloud users do not manage the cloud infrastructure
and platform where the application runs.
 "Big data" is a field that treats ways to analyze, systematically
extract information from, or otherwise deal with data sets that are too
large or complex to be dealt with by traditional data-processing
application software.
 Data with many cases (rows) offer greater statistical power, while
data with higher complexity (more attributes or columns) may lead to
a higher false discovery rate.[2]
 Big data challenges include capturing data, data storage, data
analysis, search, sharing, transfer, visualization, querying, updating,
information privacy and data source.
 Big data was originally associated with three key concepts: volume,
variety, and velocity.[3] Other concepts later attributed to big data are
veracity (i.e., how much noise is in the data) [4] and value.[5]
 Big data can be described by the following
characteristics:
 Volume : The quantity of generated and stored
data. The size of the data determines the value
and potential insight, and whether it can be
considered big data or not.
 Variety: The type and nature of the data. This
helps people who analyze it to effectively use the
resulting insight. Big data draws from text, images,
audio, video; plus it completes missing pieces
through data fusion.
 Velocity In this context, the speed at which the data is generated and
processed to meet the demands and challenges that lie in the path
of growth and development. Big data is often available in real-time.
Compared to small data, big data are produced more continually.
 Two kinds of velocity related to big data are the frequency of
generation and the frequency of handling, recording, and
publishing.[38]
 Veracity It is the extended definition for big data, which refers to the
data quality and the data value.[39] The data quality of captured data
can vary greatly, affecting the accurate analysis.[40] Data must be
processed with advanced tools (analytics and algorithms) to reveal
meaningful information. For example, to manage a factory one must
consider both visible and invisible issues with various components.
 Interoperability is: “the ability of two or more systems
or components to exchange data and use information”.
 This definition is interesting as provide many
challenges on how to: Get the information, Exchange
data, and • Use the information in understanding it and
being able to process it.
 Different types of interoperability are
 1.Technical interoperability,
 2.Syntactical Interoperability,
 3.Semantic Interoperability,
 4.Organizational Interoperability.
 A simple representation of interoperability is shown in
next Ppt.
A simple representation of interoperability is shown in Diagram.
 Technical Interoperability : is usually associated with
hardware/ software components, systems and platforms
that enable machine-to-machine communication to take
place. This kind of interoperability is often centered on
(communication) protocols and the infrastructure needed
for those protocols to operate.
 Syntactical Interoperability: is usually associated with
data for-mats. Certainly, the messages transferred by
communication protocols need to have a well-defined
syntax and encoding, even if it is only in the form of bit-
tables. However, many protocols carry data or content,
and this can be represented using high-level transfer
syntaxes such as HTML, XML or ASN.1.
 Semantic Interoperability is usually associated with the
meaning of content and concerns the human rather than
machine interpretation of the content. Thus,
interoperability on this level means that there is a
common understanding between people of the meaning
of the content (information) being exchanged.
 Organizational Interoperability, as the name implies, is
the ability of organizations to effectively communicate
and transfer (meaningful) data (information) even though
they may be using a variety of different information
systems over widely different infrastructures, possibly
across different geographic regions and cultures.
 In a fully interoperable environment, any IoT device
would be able to connect to any other device or system
and exchange information as desired.
 In practicality, interoperability is more complex.
 Interoperability among IoT devices and systems happens
in varying degrees at different layers within the
communications protocol stack between the devices.
 Technical interoperability ensures basic
connectivity: mechanism to established
physical & logical connection between systems,
network interoperability: to exchange data between
multiple systems across variety of networks.
 Syntactic interoperability ensures understanding of
data structure in data exchanged between
systems.
 While semantic ensures understanding of concept
contained in data structure.
 Ethernet
 WirelessHart
"Wireless-HART technology provides a robust wireless
protocol for the full range of process measurement,
control, and asset management applications."
 DigiMesh
"DigiMesh is a proprietary peer-to-peer networking
topology for use in wireless end-point connectivity
solutions.
 ISA100.11a
"ISA100.11a is a wireless networking technology
standard developed by the International Society of
Automation (ISA). The official description is "Wireless
Systems for Industrial Automation: Process Control
and Related Application"
 IEEE 802.15.4
IEEE 802.15.4 is a standard which specifies the physical layer and
media access control for low-rate wireless personal area networks
(LR-WPANs). It is maintained by the IEEE 802.15 working group.
It is the basis for the ZigBee,ISA100.11a, Wireless HART, and MiWi
specifications, each of which further extends the standard by
developing the upper layers which are not defined in IEEE 802.15.4.
Alternatively, it can be used with 6LoWPAN and standard Internet
protocols to build a wireless embedded Internet.
 NFC
Based on the standard ISO/IEC 18092:2004, using inductive coupled
devices at a center frequency of13.56 MHz. The data rate is up to
424 kbps and the rangeis with a few meters short compared to the
wireless sensor networks.
 ANT
ANT is a proprietary wireless sensor network technology
featuring a wireless communications protocol stack that
enables semiconductor radios operating in the 2.4 GHz
Industrial, Scientific and Medical allocation of the RF spectrum
("ISM band") to communicate by establishing standard rules
for co-existence, data representation, signalling,
authentication and error detection.
 Bluetooth
Bluetooth works in the 2.4 GHz ISM band and uses frequency
hopping. With a data rate up to 3 Mbps and maximum range
of 100m. Each application type which can use Bluetooth has
its own profile.
 Eddystone - A protocol specification that defines a Bluetooth
low energy (BLE) message format for proximity beacon
messages.
 ZigBee
The ZigBee protocol uses the 802.15.4 standard and operates
in the 2.4 GHz frequency range with 250 kbps. The maximum
number of nodes in the network is 1024 with a range up to 200
meter. ZigBee can use 128 bit AES encryption.
 EnOcean
EnOcean is a an energy harvesting wireless technology which
works in the frequencies of 868 MHz for europe and 315 MHz
for North America. The transmit range goes up to 30 meter in
buildings and up to 300 meter outdoor.
 WiFi
 WiMax

WiMax is based on the standard IEEE 802.16
and is intended for wireless metropolitan area
networks. The range is different for fixed
stations, where it can go up to 50 km and
mobile devices with 5 to 15 km. Wi-MAx
operates at frequencies between 2.5 GHz to
5.8 GHz with a transfer rate of 40 Mbps.
 We divide the IoT devices into two broad
categories:
 1. The wearable ones
 2.Microcontroller/Microprocessor driven embedded
IoT devices.
 Some of the embedded devices like Arduino
Lillypad are minisque and you can further utilize
them to make your own wearable solution. But in
wearable I have included hardware which are
pretty standard and IoT has only software scope
for the developer.
 At this stage we divide our IoT development into
two parallel technologies: Wearable and
Embedded.
 Developers can build apps for custom wearable
devices like Peeble, Samsung Gear or can opt to
create their own platform using embedded
solution and then can develop app for that
platform.
 Wearable Platform
 Tizen is fast becoming one of the most popular
platforms for Mobile and wearable devices. Tizen
SDK comes ported with wearable emulator which
makes it easier to develop wearable solutions for
Tizen platform.
 a large Android Wear devices are now being made
and marketed. Smart watches are getting popular by
every day. Android Wear apps can be developed and
tested in Eclipse. This Android Developer Guide
helps you in setting up Android Wear development
environment in Eclipse.
 Salesforce is another platform which is coming
up with awesome development environment,
APIs in wearable technologies.
 Their solution is extended from Peeble to Google
glass.
 Salesforce is really worth a try if you are
planning to have a serious go at wearable
technology as a career option. Checkout
Salesforce Wear page.
 Embedded Platforms
 Arduino is probably the best starting point for embedded
based IoT.
 Basic Android boards don't come with Ethernet shield
and for Arduino to be able to work as IoT device, you
need to select Android with Ethernet shield.
 Android Yun on the other hand is a board that comes
ported with ethernet shield. You can actually order a
basic board of Arduino like Arduino Decimilia or
Dueminolova and learn the hardware basics like
connecting sensors, working with actuators, serial
communication and then you can go for Ethernet shield
and look for more web based application for Arduino.
 Raspberry Pi is probably one of the best things to
happen in DIY IoT.
 A wide range of Data driven applications like Home
Automation Server to Home Multimedia server, File
Server can be developed with Pi. PI like Arduino has
general purpose IO pins.
 But seamless working with sensors is bit tedious in Pi.
 Another efficient IoT board is Intel Edition which has
integrated BLE, WiFi among host of other features. It
supports wide range of Industry standard hardware
(over 30) through 70-pin interface. What is important
is it supports wide range of platforms including
Arduino and Node.js
 Intel Galileo is another good offering by Intel which supports the
same shielding that of Arduino Uno. So it can be said to be first
Intel powered device which is Arduino compatible.
 It has among other thing a USB host controller like Raspberry Pi
which makes this an attractive hardware. Galelio also has
ethernet shield in built.
 Netduino is a .Net Micro Framework based platform where
hardware is simillar to Arduino. But Netduino has 12 bit ADC as
against 10 bit Arduino ADC channels and uses 32 bit Controller.
There are few more differences. But the reason why Arduino is a
better bet for me than Netduino is that I get an Arduino
Dueminolova for under $10 where as Netduino is about $60.
Though Netduino really has better multitasking, cost is a big
factor for DIY guy.
 Cloud Platform for IoT
Let's discuss the possibilities to beverage vending
machine once more in terms of sheer possibilities. In
the conventional vending machine you need to press a
button or put a coin to trigger the process of liquid flow,
which stops after certain quantity.
Now how about integrating PayPal or Google money
with the vending machine? How about a customer
discovering the vending machine as "website" along
with it's location and then pays online for a glass of
beverage.
Once payment is successful he gets an access token.
He can pass the token to the machine through NFC
and bingo he gets his drink.
 For instance when you have to make a device
discoverable in web, you have to assign a fixed IP
address, maintain a router and follow several
networking skills. You might not have the knowledge
and infrastructure needed for maintaining a
commercial sophisticated network for IoT.
 Yaler is a great example of what services and cloud
can bring to table. This provides connection as a
service such that your device is easily discoverable
and communicable over the web without much hassle
and take care of underneath security.
 Axeda Provides infrastructure for M2M architecture.
 OpenIoT is an open source IoT platform that provides
out of other services a unique Sensing as a Service.
 Google has already integrated location services with it's
cloud. Location extracted from your devices is silently put
in your status updates in facebook and twitter and are
also used for more personalized searches.
 So cloud APIs has a great potential in IoT in all levels of
architecture starting from firmware to hardware to more
top level architecture.
 The fundamental characteristics of the IoT are as follows
:
 Interconnectivity: With regard to the IoT, anything can
be interconnected with the global information and
communication infrastructure.
 Things-related services: The IoT is capable of
providing thing-related services within the constraints of
things, such as privacy protection and semantic
consistency between physical things and their associated
virtual things. In order to provide thing-related services
within the constraints of things, both the technologies in
physical world and information world will change.
 Heterogeneity: The devices in the IoT are heterogeneous as
based on different hardware platforms and networks. They can
interact with other devices or service platforms through
different networks.
 Dynamic changes: The state of devices change dynamically,
e.g., sleeping and waking up, connected and/or disconnected
as well as the context of devices including location and speed.
Moreover, the number of devices can change dynamically.
 Enormous scale: The number of devices that need to be
managed and that communicate with each other will be at
least an order of magnitude larger than the devices connected
to the current Internet.
 Safety: As we gain benefits from the IoT, we must
not forget about safety. As both the creators and
recipients of the IoT, we must design for safety.
This includes the safety of our personal data and
the safety of our physical well-being. Securing the
endpoints, the networks, and the data moving
across all of it means creating a security paradigm
that will scale.
 Connectivity: Connectivity enables network
accessibility and compatibility. Accessibility is
getting on a network while compatibility provides
the common ability to consume and produce
data.
 IOT architecture consists of different layers of technologies
supporting IOT. It serves to illustrate how various
technologies relate to each other and to communicate the
scalability, modularity and configuration of IOT deployments in
different scenarios.
 Figure 4 shows detailed architecture of IOT. The functionality
of each layer is described below :
 A. smart device / sensor layer:
 The lowest layer is made up of smart objects integrated with
sensors. The sensors enable the interconnection of the
physical and digital worlds allowing real-time information to be
collected and processed.
 There are various types of sensors for different purposes. The
sensors have the capacity to take measurements such as
temperature, air quality, speed, humidity, pressure, flow,
movement and electricity etc.
 B. Gateways and Networks
 Massive volume of data will be produced by these tiny
sensors and this requires a robust and high
performance wired or wireless network infrastructure
as a transport medium. Current networks, often tied
with very different protocols, have been used to
support machine-to-machine (M2M) networks and
their applications.
 With demand needed to serve a wider range of IOT
services and applications such as high speed
transactional services, context-aware applications,
etc, multiple networks with various technologies and
access protocols are needed to work with each
other in a heterogeneous configuration.
 C. Management Service Layer
 The management service renders the processing of
information possible through analytics, security controls,
process modeling and management of devices.
 One of the important features of the management service
layer is the business and process rule engines.
 IOT brings connection and interaction of objects and
systems together providing information in the form of events or
contextual data such as temperature of goods, current location
and traffic data.
 Some of these events require filtering or routing to post-
processing systems such as capturing of periodic sensory
data, while others require response to the immediate
situations such as reacting to emergencies on patient’s health
conditions.
D. Application Layer
The IoT application covers “smart”
environments/spaces in domains such as:
Transportation, Building, City, Lifestyle,
Retail, Agriculture, Factory, Supply chain,
Emergency, Healthcare, User interaction,
Culture and tourism, Environment and
Energy.
 While IOT is architected into layers, the technologies
have been categorized into three groups.
The first group of technologies impacts the
devices, microprocessor chips:
The second group comprises technologies that
support network sharing and address capacity and
latency issues:
The third group impacts the management
services that support the IOT applications:
 Physical Design of IoT is comprises specialized hardware
boards, Software systems, web APIs, protocols which together
creates a seamless environment which allows smart
embedded devices to be connected to internet such that
sensory data can be accessed and control system can be
triggered over internet.
 Also devices could be connected to internet using various
means like Wi-Fi, Ethernet and so on. Furthermore devices
may not need to be connected to internet independently.
Rather a cluster of devices could be created (for example a
sensor network) and the base station or the cluster head could
be connected to internet. This leads to more abstract
architecture for communication protocols which ranges from
high level to low level.
 Figure- shows Internet of Things (IoT) physical Architecture.
 Most interestingly; these devices must be uniquely
discovered. For unique discovery of the devices in a
Network, they need to have unique IP address.
 As number of IoT devices online is expected to
suppress 20 billion mark and that IPv4 can only
support up to 4Billion unique addresses, IoT devices
essentially have IPv6 addressing scheme.
 All these devices have either fixed or Subnet masked
IP addresses of type v6.
 Unique IP addresses makes IoT devices discoverable
in the internet as independent node.
 This is the most important concept to have in mind to
understand IoT.
 The Internet of Things concept refers to uniquely
identifiable things with their virtual representations
in an Internet-like structure and IoT solutions
comprising a number of components such as :
 (1) Module for interaction with local IoT devices.
This module is responsible for acquisition of
observations and their forwarding to remote
servers for analysis and permanent storage.
 (2) Module for local analysis and processing of
observations acquired by IoT devices.
 (3) Module for interaction with remote IoT devices,
directly over the Internet.
 This module is responsible for acquisition of
observations and their forwarding to remote
servers for analysis and permanent storage.
 (4) Module for application specific data analysis and
processing. This module is running on an application
server serving all clients. It is taking requests from
mobile and web clients and relevant IoT observations
as input, executes appropriate data processing
algorithms and generates output in terms of knowledge
that is later presented to users.
 (5)User interface (web or mobile): visual
representation of measurements in a given
context (for example on a map) and interaction with
the user, i.e. definition of user queries.
The development of enabling technologies
such as semiconductor electronics,
communications, sensors, smart phones,
embedded systems, cloud networking,
network virtualization and software will be
essential to allow physical devices to
operate in changing environments &
to be connected all the time everywhere.
 There are key challenges and implications today
that need to be addressed before mass adoption of
IOT can occur.
 A. Privacy and Security
 As the IoT become a key element of the Future
Internet and the usage of the Internet of Things for
large-scale, partially mission-critical systems
creates the need to address trust and security
functions adequately. New challenges identified for
privacy, trust and reliability are: • providing trust
and quality- of-information in shared information
models to enable re-use across many applications.
Providing secure exchange of data
between IoT devices and consumers of
their information.
 Providing protection mechanisms for
vulnerable devices.
Table 2 shows various security & privacy
requirement at different layers of IOT.
 B. Cost versus Usability
 IOT uses technology to connect physical
objects to the Internet.
 For IOT adoption to grow, the cost of
components that are needed to support
capabilities such as sensing, tracking and
control mechanisms need to be relatively
inexpensive in the coming years.
 C. Interoperability (Portability)
 In the traditional Internet, interoperability is the most
basic core value; the first requirement of Internet
connectivity is that “connected” systems be able to
“talk the same language” of protocols and
encodings. Different industries today use different
standards to support their applications.
 With numerous sources of data and heterogeneous
devices, the use of standard interfaces between these
diverse entities becomes important.
 This is especially so for applications that supports
cross organizational and various system boundaries.
Thus the IOT systems need to handle high degree of
interoperability.
D. Data Management
Data management is a crucial aspect in
the Internet of Things. When considering a
world of objects interconnected and
constantly exchanging all types of
information, the volume of the generated
data and the processes involved in the
handling of those data become critical.
E. Device Level Energy Issues
One of the essential challenges in IoT is
how to interconnect “things” in an
interoperable way while taking into account
the energy constraints, knowing that the
communication is the most energy
consuming task on devices.
 Potential applications of the IoT are numerous and
diverse, permeating into practically all areas of
every-day life of individuals, enterprises, and
society as a whole.
 The IoT application covers “smart”
environments/spaces in domains such as:
Transportation, Building, City, Lifestyle, Retail,
Agriculture, Factory, Supply chain, Emergency,
Healthcare, User interaction, Culture and
tourism, Environment and Energy.
 Below are some of the IOT applications
 A. IOsL (Internet of smart living):
 Remote Control Appliances: Switching on and off remotely
appliances to avoid accidents and save energy,
 Weather: Displays outdoor weather conditions such as humidity,
temperature, pressure, wind speed and rain levels with ability to
transmit data over long distances,
 Smart Home Appliances: Refrigerators with LCD screen telling
what’s inside, food that’s about to expire, ingredients you need to
buy and with all the information available on a Smartphone app.
Washing machines allowing you to monitor the laundry remotely,
and. Kitchen ranges with interface to a Smartphone app allowing
remotely adjustable temperature control and monitoring the oven’s
self-cleaning feature,
 Safety Monitoring: cameras, and home alarm systems making
people feel safe in their daily life at home,
 Intrusion Detection Systems: Detection of window and door
openings and violations to prevent intruders,
 Energy and Water Use: Energy and water supply consumption
monitoring to obtain advice on how to save cost and resources, &
many more…
 B. IOsC ( Internet of smart cities):
 Structural Health: Monitoring of vibrations and material conditions
in buildings, bridges and historical monuments,
 Lightning: intelligent and weather adaptive lighting in street lights,
 Safety: Digital video monitoring, fire control management, public
announcement systems,
 Transportation: Smart Roads and Intelligent High-ways with
warning messages and diversions according to climate conditions
and unexpected events like accidents or traffic jams,
 Smart Parking: Real-time monitoring of parking spaces availability
in the city making residents able to identify and reserve the closest
available spaces,
 Waste Management: Detection of rubbish levels in containers to
optimize the trash collection routes. Garbage cans and recycle bins
with RFID tags allow the sanitation staff to see when garbage has
been put out.
 C. IOsE (Internet of smart environment):
 Air Pollution monitoring: Control of CO2 emissions of
factories, pollution emitted by cars and toxic gases generated
in farms,
 Forest Fire Detection: Monitoring of combustion gases and
preemptive fire conditions to define alert zones,
 Weather monitoring: weather conditions monitoring such as
humidity, temperature, pressure, wind speed and rain,
Earthquake Early Detection,
 Water Quality: Study of water suitability in rivers and the sea
for eligibility in drinkable use,
 River Floods: Monitoring of water level variations in rivers,
dams and reservoirs during rainy days,
 Protecting wildlife: Tracking collars utilizing GPS/GSM
modules to locate and track wild animals and communicate
their coordinates via SMS.
 D. IOsI (Internet of smart industry):
 Explosive and Hazardous Gases: Detection of gas
levels and leakages in industrial environments,
surroundings of chemical factories and inside mines,
Monitoring of toxic gas and oxygen levels inside
chemical plants to ensure workers and goods safety,
Monitoring of water, oil and gas levels in storage
tanks and Cisterns,
 Maintenance and repair: Early predictions on
equipment malfunctions and service maintenance
can be automatically scheduled ahead of an actual
part failure by installing sensors inside equipment to
monitor and send reports.
 E. IOsH (Internet of smart health):
 Patients Surveillance: Monitoring of conditions of patients
inside hospitals and in old people’s home,
 Medical Fridges: Control of conditions inside freezers storing
vaccines, medicines and organic elements,
 Fall Detection: Assistance for elderly or disabled people living
independent,
 Dental: Bluetooth connected toothbrush with Smartphone
app analyzes the brushing uses and gives information on the
brushing habits on the Smartphone for private information or
for showing statistics to the dentist,
 Physical Activity Monitoring: Wireless sensors placed
across the mattress sensing small motions, like breathing and
heart rate and large motions caused by tossing and turning
during sleep, providing data available through an app on the
Smartphone.
F. IOsE (internet of smart energy):
 Smart Grid: Energy consumption monitoring and
management, Wind Turbines/ Power house: Monitoring and
analyzing the flow of energy from wind turbines & power
house, and two-way communication with consumers’ smart
meters to analyze consumption patterns,
 Power Supply Controllers: Controller for AC-DC power
supplies that determines required energy, and improve
energy efficiency with less energy waste for power
supplies related to computers, telecommunications, and
consumer electronics applications,
 Photovoltaic Installations: Monitoring and optimization of
performance in solar energy plants
 G. IOsA (internet of smart agriculture):
 Green Houses: Control micro-climate conditions to maximize the
production of fruits and vegetables and its quality,
 Compost: Control of humidity and temperature levels in alfalfa,
hay, straw, etc. to prevent fungus and other microbial contaminants,
 Animal Farming/Tracking: Location and identification of animals
grazing in open pastures or location in big stables, Study of
ventilation and air quality in farms and detection of harmful gases
from excrements, Offspring Care: Control of growing conditions of
the offspring in animal farms to ensure its survival and health,
 field Monitoring: Reducing spoilage and crop waste with better
monitoring, accurate ongoing data obtaining, and management of
the agriculture fields, including better control of fertilizing,
electricity and watering.
 The IoT application area is very diverse and
IoT applications serve different users.
 Different user categories have different
driving needs. From the IoT perspective there
are three important user categories:
 (1) The individual citizens,
 (2) Community of citizens (citizens of a city, a
region, country or society as a whole),
 (3) The enterprises.
 [1] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter
FriessEU, Belgium, “Internet of Things: Converging
Technologies for Smart Environments and Integrated
Ecosystems”, river publishers’ series in communications,
2013.
 [2] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter
FriessEU, Belgium, “Internet of Things–From Research and
Innovation to Market Deployment”, river publishers’ series in
communications, 2014.
 [3] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, et al.,
“Internet of Things Strategic Research Agenda”, Chapter 2 in
Internet of Things -Global Technological and Societal Trends,
River Publishers, 2011.
 [4] Martin Serrano, Insight Centre for Data Analytics,
Ireland ,Omar Elloumi, Alcatel Lucent, France, Paul Murdock,
Landis+Gyr, Switzerland, “ALLIANCE FOR INTERNET OF
THINGS INNOVATION, Semantic Interoperability” , Release
2.0, AIOTI WG03 – loT Standardisation,2015.
 [5] IoT: https://dzone.com/articles/the-internet-of-things-
gateways-and-next-generation.
 [6] [http://www.reloade.com/blog/2013/12/6characteristics-
within-internet-things-iot.php].
 [7] Martín Serrano, Payam Barnaghi, Francois Carrez
Philippe Cousin, Ovidiu Vermesan, Peter Friess,
“Internet of Things Semantic Interoperability: Research
Challenges, Best Practices, Recommendations and Next
Steps”, European research cluster on the internet of
things, IERC,2015.
 [8] Karen Rose, Scott Eldridge, Lyman Chapin, “The
Internet of Things: An Overview Understanding the Issues
and Challenges of a More Connected World”, The Internet
Society (ISOC), 2015.
 [9] H. van der Veer, A.Wiles, “Achiveing Technical
Interoperability —the ETSI Approach”, ETSI White Paper
No.3, 3rd edition, April 2008,
http://www.etsi.org/images/files/ETSI
WhitePapers/IOP%20whitepaper%20Edition%203%20fi
nal.pdf
 [10] ITU-T, Internet of Things Global Standards Initiative,
http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx
 [11] http://tblocks.com/internet-of-things
 [12] https://www.ida.gov.sg/~/media/Files/Infocomm%20Lan
dscape/Technology/TechnologyRoadmap/InternetOfThin
gs.pdf

More Related Content

Similar to Unit_1_IOT_INTRO.pptx

111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docxjesusamckone
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThingsKimmiegrif
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionRoopaDNDandally
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfKanagarajanSwamiappa
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...IJCSIS Research Publications
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...ijmnct
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industryAgitAjey
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applicationsCSITiaesprime
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 

Similar to Unit_1_IOT_INTRO.pptx (20)

111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx111Blockchain-Outside ofCurrenciesDigital currencies w.docx
111Blockchain-Outside ofCurrenciesDigital currencies w.docx
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
Emergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, EvolutionEmergence of IoT,Introduction, Evolution
Emergence of IoT,Introduction, Evolution
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
theiva
theivatheiva
theiva
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
A Review on Privacy and Security Challenges in the Internet of Things (IoT) t...
 
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
MULTI-ACCESS EDGE COMPUTING ARCHITECTURE AND SMART AGRICULTURE APPLICATION IN...
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Internet of things: review, architecture and applications
Internet of things: review, architecture and applicationsInternet of things: review, architecture and applications
Internet of things: review, architecture and applications
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 

Recently uploaded

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Unit_1_IOT_INTRO.pptx

  • 2.
  • 4.  The Internet of things refers to a type of network to connect anything with the Internet based on stipulated protocols through information sensing equipments to conduct information exchange and communications in order to achieve smart recognitions, positioning, tracing, monitoring, and administration.  In this chapter we briefly discussed about what IOT is, how IOT enables different technologies, about its architecture, characteristics & applications, IOT functional view & what are the future challenges for IOT.
  • 5.  Internet of things common definition is defining as: Internet of things (IOT) is a network of physical objects.  The internet is not only a network of computers, but it has evolved into a network of device of all type and sizes, vehicles, smart phones, home appliances, toys, cameras, medical instruments and industrial systems, animals, people, buildings, all connected, all communicating & sharing information based on stipulated protocols in order to achieve smart reorganizations, positioning, tracing, safe & control & even personal real time online monitoring , online upgrade, process control & administration.
  • 6. We define IOT into three categories as below: Internet of things is an internet of three things: (1)People to people, (2) People to machine /things, (3) Things /machine to things /machine, Interacting through internet.
  • 7.
  • 8.  Internet of Things (IoT) is a concept and a paradigm that considers pervasive presence in the environment of a variety of things/objects that through wireless and wired connections and unique addressing schemes are able to interact with each other and cooperate with other things/objects to create new applications/services and reach common goals.  In this context the research and development challenges to create a smart world are enormous.  A world where the real, digital and the virtual are converging to create smart environments that make energy, transport, cities and many other areas more intelligent.
  • 9.  Internet of Things is a new revolution of the Internet.  Objects make themselves recognizable and they obtain intelligence by making or enabling context related decisions thanks to the fact that they can communicate information about themselves.  They can access information that has been aggregated by other things, or they can be components of complex services.  This transformation is concomitant with the emergence of cloud computing capabilities and the transition of the Internet towards IPv6 with an almost unlimited addressing capacity.
  • 10.  Internet of things (IoT) is a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.  With the Internet of Things the communication is extended via Internet to all the things that surround us.  The Internet of Things is much more than machine to machine communication, wireless sensor networks, sensor networks, 2G/3G/4G, GSM, GPRS, RFID, WI-FI, GPS, microcontroller, microprocessor etc.  These are considered as being the enabling technologies that make “Internet of Things” applications possible.
  • 11.  Enabling technologies for the Internet of Things are considered can be grouped into three categories:  (1) technologies that enable “things” to acquire contextual information,  (2) technologies that enable “things” to process contextual information, and  (3) technologies to improve security and privacy.  The first two categories can be jointly understood as functional building blocks required building “intelligence” into “things”, which are indeed the features that differentiate the IoT from the usual Internet.  The third category is not a functional but rather a de facto requirement, without which the penetration of the IoT would be severely reduced.
  • 12.  There is a heterogeneous mix of communication technologies, which need to be adapted in order to address the needs of IoT applications such as energy efficiency, speed, security, and reliability.  In this context, it is possible that the level of diversity will be scaled to a number a manageable connectivity technologies that address the needs of the IoT applications, are adopted by the market, they have already proved to be serviceable, supported by a strong technology alliance.  Examples of standards in these categories include wired and wireless technologies like Ethernet, WI-FI, Bluetooth, ZigBee, GSM, and GPRS. [1, 2]  The key enabling technologies for the Internet of Things is presented in Figure 3.
  • 13.
  • 14.
  • 15.  Internet of Things or IoT basically is connecting Embedded System to internet. The heart of the embedded system is a RISC family microcontroller like PIC 16F84/Atmel 8051/ Motorola 68HC11 and so on.  Most important thing that differentiates these microcontrollers with microprocessors like 8085 is their internal read/writable memory (EPROM). So you can develop your light weight program (in Assembly language or using Embedded C with software like Keil) and "burn" the program into the hardware. These programs keep on running in a loop.
  • 16.  Interestingly in most embedded system a single program is burn with several subroutines. So unlike your PC, microcontroller device in an embedded system runs a single program infinitely.  You can connect several input and output devices with these microcontrollers which are either memory mapped or IO mapped. This simple hardware includes LCD display, buzzers, keypad (numpad) or even a printer. You connect several sensors through A/D interface. The devices can control Higher Power/Voltage/Current rating devices like fans, motors, bulbs using drives devices like relay-opt coupler and so on.
  • 17.
  • 18.  Autonomous: That means you can build a system specific to a particular application. For instance some standard peripherals and a specialized program can turn a microcontroller unit into washing machine controller or an oven controller.  Also embedded systems can be built specific to the requirement. Unlike a PC which you cannot work without a monitor, an embedded system may not mandatorily need a display unit.  Low Cost: The cost of the microcontroller unit is magnitude scale lower than a full fledged computer.
  • 19.  Low Space: Obviously figure 2 show that an embedded system takes way too little space when you compare it with even the sleekest of laptops. So you can put such a system in your hardware system quite efficiently.  Low power: Most of the common microcontrollers out there which are popular choices for embedded systems operate at 5V and often need 5v regulated power supply which can be provided through a simple 9v standard battery with voltage regulator or directly from main by using a voltage rectifier with filter circuit.
  • 20.  Wireless sensor network refers to a group of spatially dispersed and dedicated sensors for monitoring and recording the physical conditions of the environment and organizing the collected data at a central location. WSNs measure environmental conditions like temperature, sound, pollution levels, humidity, wind, and so on.  These are similar to wireless ad hoc networks in the sense that they rely on wireless connectivity and spontaneous formation of networks so that sensor data can be transported wirelessly. WSNs are spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main locations. The more modern networks are bi-directional, also enabling control of sensor activity.
  • 21. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on.
  • 22.
  • 23.  Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.  The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers.  If the connection to the user is relatively close, it may be designated an edge server.
  • 24.
  • 25.
  • 26.  Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third party, and hosted either internally or externally.  Undertaking a private cloud project requires significant engagement to virtualize the business environment, and requires the organization to reevaluate decisions about existing resources.  It can improve business, but every step in the project raises security issues that must be addressed to prevent serious vulnerabilities. Self- run data centers[83] are generally capital intensive.
  • 27.  A cloud is called a "public cloud" when the services are rendered over a network that is open for public use.  Public cloud services may be free.[87] Technically there may be little or no difference between public and private cloud architecture, however, security consideration may be substantially different for services (a Applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network. Generally, public cloud service providers like Amazon Web Services (AWS)
  • 28.  Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models.  Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources.[61]  Gartner defines a hybrid cloud service as a cloud computing service that is composed of some combination of private, public and community cloud services, from different service providers.[89]  A hybrid cloud service crosses isolation and provider boundaries so that it can't be simply put in one category of private, public, or community cloud service. It allows one to extend either the capacity or the capability of a cloud service, by aggregation, integration or customization with another cloud service.
  • 29.  Though service-oriented architecture advocates "everything as a service" (with the acronyms EaaS or XaaS,[62] or simply aas), cloud-computing providers offer their "services" according to different models, of which the three standard models per NIST are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).[61]  These models offer increasing abstraction; they are thus often portrayed as a layers in a stack: infrastructure-, platform- and software-as-a-service, but these need not be related. For example, one can provide SaaS implemented on physical machines (bare metal), without using underlying PaaS or IaaS layers, and conversely one can run a program on IaaS and access it directly, without wrapping it as SaaS.
  • 30.  "Infrastructure as a service" (IaaS) refers to online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc.  Facebook APP from google play store  Linux containers run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux c groups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers.
  • 31.  Definition of cloud computing defines Platform as a Service as: The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.  The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
  • 32.  Definition of cloud computing defines Software as a Service as: The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure.  The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
  • 33.  In the software as a service (SaaS) model, users gain access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications.  SaaS is sometimes referred to as "on-demand software" and is usually priced on a pay-per-use basis or using a subscription fee.[70]  In the SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients.  Cloud users do not manage the cloud infrastructure and platform where the application runs.
  • 34.
  • 35.  "Big data" is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.  Data with many cases (rows) offer greater statistical power, while data with higher complexity (more attributes or columns) may lead to a higher false discovery rate.[2]  Big data challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy and data source.  Big data was originally associated with three key concepts: volume, variety, and velocity.[3] Other concepts later attributed to big data are veracity (i.e., how much noise is in the data) [4] and value.[5]
  • 36.  Big data can be described by the following characteristics:  Volume : The quantity of generated and stored data. The size of the data determines the value and potential insight, and whether it can be considered big data or not.  Variety: The type and nature of the data. This helps people who analyze it to effectively use the resulting insight. Big data draws from text, images, audio, video; plus it completes missing pieces through data fusion.
  • 37.  Velocity In this context, the speed at which the data is generated and processed to meet the demands and challenges that lie in the path of growth and development. Big data is often available in real-time. Compared to small data, big data are produced more continually.  Two kinds of velocity related to big data are the frequency of generation and the frequency of handling, recording, and publishing.[38]  Veracity It is the extended definition for big data, which refers to the data quality and the data value.[39] The data quality of captured data can vary greatly, affecting the accurate analysis.[40] Data must be processed with advanced tools (analytics and algorithms) to reveal meaningful information. For example, to manage a factory one must consider both visible and invisible issues with various components.
  • 38.  Interoperability is: “the ability of two or more systems or components to exchange data and use information”.  This definition is interesting as provide many challenges on how to: Get the information, Exchange data, and • Use the information in understanding it and being able to process it.  Different types of interoperability are  1.Technical interoperability,  2.Syntactical Interoperability,  3.Semantic Interoperability,  4.Organizational Interoperability.  A simple representation of interoperability is shown in next Ppt.
  • 39. A simple representation of interoperability is shown in Diagram.
  • 40.  Technical Interoperability : is usually associated with hardware/ software components, systems and platforms that enable machine-to-machine communication to take place. This kind of interoperability is often centered on (communication) protocols and the infrastructure needed for those protocols to operate.  Syntactical Interoperability: is usually associated with data for-mats. Certainly, the messages transferred by communication protocols need to have a well-defined syntax and encoding, even if it is only in the form of bit- tables. However, many protocols carry data or content, and this can be represented using high-level transfer syntaxes such as HTML, XML or ASN.1.
  • 41.  Semantic Interoperability is usually associated with the meaning of content and concerns the human rather than machine interpretation of the content. Thus, interoperability on this level means that there is a common understanding between people of the meaning of the content (information) being exchanged.  Organizational Interoperability, as the name implies, is the ability of organizations to effectively communicate and transfer (meaningful) data (information) even though they may be using a variety of different information systems over widely different infrastructures, possibly across different geographic regions and cultures.
  • 42.
  • 43.
  • 44.  In a fully interoperable environment, any IoT device would be able to connect to any other device or system and exchange information as desired.  In practicality, interoperability is more complex.  Interoperability among IoT devices and systems happens in varying degrees at different layers within the communications protocol stack between the devices.
  • 45.  Technical interoperability ensures basic connectivity: mechanism to established physical & logical connection between systems, network interoperability: to exchange data between multiple systems across variety of networks.  Syntactic interoperability ensures understanding of data structure in data exchanged between systems.  While semantic ensures understanding of concept contained in data structure.
  • 46.  Ethernet  WirelessHart "Wireless-HART technology provides a robust wireless protocol for the full range of process measurement, control, and asset management applications."  DigiMesh "DigiMesh is a proprietary peer-to-peer networking topology for use in wireless end-point connectivity solutions.  ISA100.11a "ISA100.11a is a wireless networking technology standard developed by the International Society of Automation (ISA). The official description is "Wireless Systems for Industrial Automation: Process Control and Related Application"
  • 47.  IEEE 802.15.4 IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks (LR-WPANs). It is maintained by the IEEE 802.15 working group. It is the basis for the ZigBee,ISA100.11a, Wireless HART, and MiWi specifications, each of which further extends the standard by developing the upper layers which are not defined in IEEE 802.15.4. Alternatively, it can be used with 6LoWPAN and standard Internet protocols to build a wireless embedded Internet.  NFC Based on the standard ISO/IEC 18092:2004, using inductive coupled devices at a center frequency of13.56 MHz. The data rate is up to 424 kbps and the rangeis with a few meters short compared to the wireless sensor networks.
  • 48.  ANT ANT is a proprietary wireless sensor network technology featuring a wireless communications protocol stack that enables semiconductor radios operating in the 2.4 GHz Industrial, Scientific and Medical allocation of the RF spectrum ("ISM band") to communicate by establishing standard rules for co-existence, data representation, signalling, authentication and error detection.  Bluetooth Bluetooth works in the 2.4 GHz ISM band and uses frequency hopping. With a data rate up to 3 Mbps and maximum range of 100m. Each application type which can use Bluetooth has its own profile.
  • 49.  Eddystone - A protocol specification that defines a Bluetooth low energy (BLE) message format for proximity beacon messages.  ZigBee The ZigBee protocol uses the 802.15.4 standard and operates in the 2.4 GHz frequency range with 250 kbps. The maximum number of nodes in the network is 1024 with a range up to 200 meter. ZigBee can use 128 bit AES encryption.  EnOcean EnOcean is a an energy harvesting wireless technology which works in the frequencies of 868 MHz for europe and 315 MHz for North America. The transmit range goes up to 30 meter in buildings and up to 300 meter outdoor.
  • 50.  WiFi  WiMax  WiMax is based on the standard IEEE 802.16 and is intended for wireless metropolitan area networks. The range is different for fixed stations, where it can go up to 50 km and mobile devices with 5 to 15 km. Wi-MAx operates at frequencies between 2.5 GHz to 5.8 GHz with a transfer rate of 40 Mbps.
  • 51.  We divide the IoT devices into two broad categories:  1. The wearable ones  2.Microcontroller/Microprocessor driven embedded IoT devices.  Some of the embedded devices like Arduino Lillypad are minisque and you can further utilize them to make your own wearable solution. But in wearable I have included hardware which are pretty standard and IoT has only software scope for the developer.
  • 52.
  • 53.  At this stage we divide our IoT development into two parallel technologies: Wearable and Embedded.  Developers can build apps for custom wearable devices like Peeble, Samsung Gear or can opt to create their own platform using embedded solution and then can develop app for that platform.
  • 54.  Wearable Platform  Tizen is fast becoming one of the most popular platforms for Mobile and wearable devices. Tizen SDK comes ported with wearable emulator which makes it easier to develop wearable solutions for Tizen platform.  a large Android Wear devices are now being made and marketed. Smart watches are getting popular by every day. Android Wear apps can be developed and tested in Eclipse. This Android Developer Guide helps you in setting up Android Wear development environment in Eclipse.
  • 55.  Salesforce is another platform which is coming up with awesome development environment, APIs in wearable technologies.  Their solution is extended from Peeble to Google glass.  Salesforce is really worth a try if you are planning to have a serious go at wearable technology as a career option. Checkout Salesforce Wear page.
  • 56.  Embedded Platforms  Arduino is probably the best starting point for embedded based IoT.  Basic Android boards don't come with Ethernet shield and for Arduino to be able to work as IoT device, you need to select Android with Ethernet shield.  Android Yun on the other hand is a board that comes ported with ethernet shield. You can actually order a basic board of Arduino like Arduino Decimilia or Dueminolova and learn the hardware basics like connecting sensors, working with actuators, serial communication and then you can go for Ethernet shield and look for more web based application for Arduino.
  • 57.  Raspberry Pi is probably one of the best things to happen in DIY IoT.  A wide range of Data driven applications like Home Automation Server to Home Multimedia server, File Server can be developed with Pi. PI like Arduino has general purpose IO pins.  But seamless working with sensors is bit tedious in Pi.  Another efficient IoT board is Intel Edition which has integrated BLE, WiFi among host of other features. It supports wide range of Industry standard hardware (over 30) through 70-pin interface. What is important is it supports wide range of platforms including Arduino and Node.js
  • 58.  Intel Galileo is another good offering by Intel which supports the same shielding that of Arduino Uno. So it can be said to be first Intel powered device which is Arduino compatible.  It has among other thing a USB host controller like Raspberry Pi which makes this an attractive hardware. Galelio also has ethernet shield in built.  Netduino is a .Net Micro Framework based platform where hardware is simillar to Arduino. But Netduino has 12 bit ADC as against 10 bit Arduino ADC channels and uses 32 bit Controller. There are few more differences. But the reason why Arduino is a better bet for me than Netduino is that I get an Arduino Dueminolova for under $10 where as Netduino is about $60. Though Netduino really has better multitasking, cost is a big factor for DIY guy.
  • 59.  Cloud Platform for IoT Let's discuss the possibilities to beverage vending machine once more in terms of sheer possibilities. In the conventional vending machine you need to press a button or put a coin to trigger the process of liquid flow, which stops after certain quantity. Now how about integrating PayPal or Google money with the vending machine? How about a customer discovering the vending machine as "website" along with it's location and then pays online for a glass of beverage. Once payment is successful he gets an access token. He can pass the token to the machine through NFC and bingo he gets his drink.
  • 60.  For instance when you have to make a device discoverable in web, you have to assign a fixed IP address, maintain a router and follow several networking skills. You might not have the knowledge and infrastructure needed for maintaining a commercial sophisticated network for IoT.  Yaler is a great example of what services and cloud can bring to table. This provides connection as a service such that your device is easily discoverable and communicable over the web without much hassle and take care of underneath security.  Axeda Provides infrastructure for M2M architecture.  OpenIoT is an open source IoT platform that provides out of other services a unique Sensing as a Service.
  • 61.  Google has already integrated location services with it's cloud. Location extracted from your devices is silently put in your status updates in facebook and twitter and are also used for more personalized searches.  So cloud APIs has a great potential in IoT in all levels of architecture starting from firmware to hardware to more top level architecture.
  • 62.
  • 63.
  • 64.
  • 65.  The fundamental characteristics of the IoT are as follows :  Interconnectivity: With regard to the IoT, anything can be interconnected with the global information and communication infrastructure.  Things-related services: The IoT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency between physical things and their associated virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information world will change.
  • 66.  Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware platforms and networks. They can interact with other devices or service platforms through different networks.  Dynamic changes: The state of devices change dynamically, e.g., sleeping and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.  Enormous scale: The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet.
  • 67.  Safety: As we gain benefits from the IoT, we must not forget about safety. As both the creators and recipients of the IoT, we must design for safety. This includes the safety of our personal data and the safety of our physical well-being. Securing the endpoints, the networks, and the data moving across all of it means creating a security paradigm that will scale.  Connectivity: Connectivity enables network accessibility and compatibility. Accessibility is getting on a network while compatibility provides the common ability to consume and produce data.
  • 68.
  • 69.
  • 70.  IOT architecture consists of different layers of technologies supporting IOT. It serves to illustrate how various technologies relate to each other and to communicate the scalability, modularity and configuration of IOT deployments in different scenarios.  Figure 4 shows detailed architecture of IOT. The functionality of each layer is described below :  A. smart device / sensor layer:  The lowest layer is made up of smart objects integrated with sensors. The sensors enable the interconnection of the physical and digital worlds allowing real-time information to be collected and processed.  There are various types of sensors for different purposes. The sensors have the capacity to take measurements such as temperature, air quality, speed, humidity, pressure, flow, movement and electricity etc.
  • 71.  B. Gateways and Networks  Massive volume of data will be produced by these tiny sensors and this requires a robust and high performance wired or wireless network infrastructure as a transport medium. Current networks, often tied with very different protocols, have been used to support machine-to-machine (M2M) networks and their applications.  With demand needed to serve a wider range of IOT services and applications such as high speed transactional services, context-aware applications, etc, multiple networks with various technologies and access protocols are needed to work with each other in a heterogeneous configuration.
  • 72.  C. Management Service Layer  The management service renders the processing of information possible through analytics, security controls, process modeling and management of devices.  One of the important features of the management service layer is the business and process rule engines.  IOT brings connection and interaction of objects and systems together providing information in the form of events or contextual data such as temperature of goods, current location and traffic data.  Some of these events require filtering or routing to post- processing systems such as capturing of periodic sensory data, while others require response to the immediate situations such as reacting to emergencies on patient’s health conditions.
  • 73. D. Application Layer The IoT application covers “smart” environments/spaces in domains such as: Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain, Emergency, Healthcare, User interaction, Culture and tourism, Environment and Energy.
  • 74.  While IOT is architected into layers, the technologies have been categorized into three groups. The first group of technologies impacts the devices, microprocessor chips: The second group comprises technologies that support network sharing and address capacity and latency issues: The third group impacts the management services that support the IOT applications:
  • 75.  Physical Design of IoT is comprises specialized hardware boards, Software systems, web APIs, protocols which together creates a seamless environment which allows smart embedded devices to be connected to internet such that sensory data can be accessed and control system can be triggered over internet.  Also devices could be connected to internet using various means like Wi-Fi, Ethernet and so on. Furthermore devices may not need to be connected to internet independently. Rather a cluster of devices could be created (for example a sensor network) and the base station or the cluster head could be connected to internet. This leads to more abstract architecture for communication protocols which ranges from high level to low level.  Figure- shows Internet of Things (IoT) physical Architecture.
  • 76.
  • 77.  Most interestingly; these devices must be uniquely discovered. For unique discovery of the devices in a Network, they need to have unique IP address.  As number of IoT devices online is expected to suppress 20 billion mark and that IPv4 can only support up to 4Billion unique addresses, IoT devices essentially have IPv6 addressing scheme.  All these devices have either fixed or Subnet masked IP addresses of type v6.  Unique IP addresses makes IoT devices discoverable in the internet as independent node.  This is the most important concept to have in mind to understand IoT.
  • 78.  The Internet of Things concept refers to uniquely identifiable things with their virtual representations in an Internet-like structure and IoT solutions comprising a number of components such as :  (1) Module for interaction with local IoT devices. This module is responsible for acquisition of observations and their forwarding to remote servers for analysis and permanent storage.  (2) Module for local analysis and processing of observations acquired by IoT devices.  (3) Module for interaction with remote IoT devices, directly over the Internet.
  • 79.  This module is responsible for acquisition of observations and their forwarding to remote servers for analysis and permanent storage.  (4) Module for application specific data analysis and processing. This module is running on an application server serving all clients. It is taking requests from mobile and web clients and relevant IoT observations as input, executes appropriate data processing algorithms and generates output in terms of knowledge that is later presented to users.  (5)User interface (web or mobile): visual representation of measurements in a given context (for example on a map) and interaction with the user, i.e. definition of user queries.
  • 80. The development of enabling technologies such as semiconductor electronics, communications, sensors, smart phones, embedded systems, cloud networking, network virtualization and software will be essential to allow physical devices to operate in changing environments & to be connected all the time everywhere.
  • 81.
  • 82.
  • 83.  There are key challenges and implications today that need to be addressed before mass adoption of IOT can occur.  A. Privacy and Security  As the IoT become a key element of the Future Internet and the usage of the Internet of Things for large-scale, partially mission-critical systems creates the need to address trust and security functions adequately. New challenges identified for privacy, trust and reliability are: • providing trust and quality- of-information in shared information models to enable re-use across many applications.
  • 84. Providing secure exchange of data between IoT devices and consumers of their information.  Providing protection mechanisms for vulnerable devices. Table 2 shows various security & privacy requirement at different layers of IOT.
  • 85.
  • 86.  B. Cost versus Usability  IOT uses technology to connect physical objects to the Internet.  For IOT adoption to grow, the cost of components that are needed to support capabilities such as sensing, tracking and control mechanisms need to be relatively inexpensive in the coming years.
  • 87.  C. Interoperability (Portability)  In the traditional Internet, interoperability is the most basic core value; the first requirement of Internet connectivity is that “connected” systems be able to “talk the same language” of protocols and encodings. Different industries today use different standards to support their applications.  With numerous sources of data and heterogeneous devices, the use of standard interfaces between these diverse entities becomes important.  This is especially so for applications that supports cross organizational and various system boundaries. Thus the IOT systems need to handle high degree of interoperability.
  • 88. D. Data Management Data management is a crucial aspect in the Internet of Things. When considering a world of objects interconnected and constantly exchanging all types of information, the volume of the generated data and the processes involved in the handling of those data become critical.
  • 89. E. Device Level Energy Issues One of the essential challenges in IoT is how to interconnect “things” in an interoperable way while taking into account the energy constraints, knowing that the communication is the most energy consuming task on devices.
  • 90.
  • 91.  Potential applications of the IoT are numerous and diverse, permeating into practically all areas of every-day life of individuals, enterprises, and society as a whole.  The IoT application covers “smart” environments/spaces in domains such as: Transportation, Building, City, Lifestyle, Retail, Agriculture, Factory, Supply chain, Emergency, Healthcare, User interaction, Culture and tourism, Environment and Energy.  Below are some of the IOT applications
  • 92.  A. IOsL (Internet of smart living):  Remote Control Appliances: Switching on and off remotely appliances to avoid accidents and save energy,  Weather: Displays outdoor weather conditions such as humidity, temperature, pressure, wind speed and rain levels with ability to transmit data over long distances,  Smart Home Appliances: Refrigerators with LCD screen telling what’s inside, food that’s about to expire, ingredients you need to buy and with all the information available on a Smartphone app. Washing machines allowing you to monitor the laundry remotely, and. Kitchen ranges with interface to a Smartphone app allowing remotely adjustable temperature control and monitoring the oven’s self-cleaning feature,  Safety Monitoring: cameras, and home alarm systems making people feel safe in their daily life at home,  Intrusion Detection Systems: Detection of window and door openings and violations to prevent intruders,  Energy and Water Use: Energy and water supply consumption monitoring to obtain advice on how to save cost and resources, & many more…
  • 93.  B. IOsC ( Internet of smart cities):  Structural Health: Monitoring of vibrations and material conditions in buildings, bridges and historical monuments,  Lightning: intelligent and weather adaptive lighting in street lights,  Safety: Digital video monitoring, fire control management, public announcement systems,  Transportation: Smart Roads and Intelligent High-ways with warning messages and diversions according to climate conditions and unexpected events like accidents or traffic jams,  Smart Parking: Real-time monitoring of parking spaces availability in the city making residents able to identify and reserve the closest available spaces,  Waste Management: Detection of rubbish levels in containers to optimize the trash collection routes. Garbage cans and recycle bins with RFID tags allow the sanitation staff to see when garbage has been put out.
  • 94.  C. IOsE (Internet of smart environment):  Air Pollution monitoring: Control of CO2 emissions of factories, pollution emitted by cars and toxic gases generated in farms,  Forest Fire Detection: Monitoring of combustion gases and preemptive fire conditions to define alert zones,  Weather monitoring: weather conditions monitoring such as humidity, temperature, pressure, wind speed and rain, Earthquake Early Detection,  Water Quality: Study of water suitability in rivers and the sea for eligibility in drinkable use,  River Floods: Monitoring of water level variations in rivers, dams and reservoirs during rainy days,  Protecting wildlife: Tracking collars utilizing GPS/GSM modules to locate and track wild animals and communicate their coordinates via SMS.
  • 95.  D. IOsI (Internet of smart industry):  Explosive and Hazardous Gases: Detection of gas levels and leakages in industrial environments, surroundings of chemical factories and inside mines, Monitoring of toxic gas and oxygen levels inside chemical plants to ensure workers and goods safety, Monitoring of water, oil and gas levels in storage tanks and Cisterns,  Maintenance and repair: Early predictions on equipment malfunctions and service maintenance can be automatically scheduled ahead of an actual part failure by installing sensors inside equipment to monitor and send reports.
  • 96.  E. IOsH (Internet of smart health):  Patients Surveillance: Monitoring of conditions of patients inside hospitals and in old people’s home,  Medical Fridges: Control of conditions inside freezers storing vaccines, medicines and organic elements,  Fall Detection: Assistance for elderly or disabled people living independent,  Dental: Bluetooth connected toothbrush with Smartphone app analyzes the brushing uses and gives information on the brushing habits on the Smartphone for private information or for showing statistics to the dentist,  Physical Activity Monitoring: Wireless sensors placed across the mattress sensing small motions, like breathing and heart rate and large motions caused by tossing and turning during sleep, providing data available through an app on the Smartphone.
  • 97. F. IOsE (internet of smart energy):  Smart Grid: Energy consumption monitoring and management, Wind Turbines/ Power house: Monitoring and analyzing the flow of energy from wind turbines & power house, and two-way communication with consumers’ smart meters to analyze consumption patterns,  Power Supply Controllers: Controller for AC-DC power supplies that determines required energy, and improve energy efficiency with less energy waste for power supplies related to computers, telecommunications, and consumer electronics applications,  Photovoltaic Installations: Monitoring and optimization of performance in solar energy plants
  • 98.  G. IOsA (internet of smart agriculture):  Green Houses: Control micro-climate conditions to maximize the production of fruits and vegetables and its quality,  Compost: Control of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent fungus and other microbial contaminants,  Animal Farming/Tracking: Location and identification of animals grazing in open pastures or location in big stables, Study of ventilation and air quality in farms and detection of harmful gases from excrements, Offspring Care: Control of growing conditions of the offspring in animal farms to ensure its survival and health,  field Monitoring: Reducing spoilage and crop waste with better monitoring, accurate ongoing data obtaining, and management of the agriculture fields, including better control of fertilizing, electricity and watering.
  • 99.  The IoT application area is very diverse and IoT applications serve different users.  Different user categories have different driving needs. From the IoT perspective there are three important user categories:  (1) The individual citizens,  (2) Community of citizens (citizens of a city, a region, country or society as a whole),  (3) The enterprises.
  • 100.  [1] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems”, river publishers’ series in communications, 2013.  [2] Dr. Ovidiu Vermesan SINTEF, Norway, Dr. Peter FriessEU, Belgium, “Internet of Things–From Research and Innovation to Market Deployment”, river publishers’ series in communications, 2014.  [3] O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, et al., “Internet of Things Strategic Research Agenda”, Chapter 2 in Internet of Things -Global Technological and Societal Trends, River Publishers, 2011.  [4] Martin Serrano, Insight Centre for Data Analytics, Ireland ,Omar Elloumi, Alcatel Lucent, France, Paul Murdock, Landis+Gyr, Switzerland, “ALLIANCE FOR INTERNET OF THINGS INNOVATION, Semantic Interoperability” , Release 2.0, AIOTI WG03 – loT Standardisation,2015.
  • 101.  [5] IoT: https://dzone.com/articles/the-internet-of-things- gateways-and-next-generation.  [6] [http://www.reloade.com/blog/2013/12/6characteristics- within-internet-things-iot.php].  [7] Martín Serrano, Payam Barnaghi, Francois Carrez Philippe Cousin, Ovidiu Vermesan, Peter Friess, “Internet of Things Semantic Interoperability: Research Challenges, Best Practices, Recommendations and Next Steps”, European research cluster on the internet of things, IERC,2015.  [8] Karen Rose, Scott Eldridge, Lyman Chapin, “The Internet of Things: An Overview Understanding the Issues and Challenges of a More Connected World”, The Internet Society (ISOC), 2015.
  • 102.  [9] H. van der Veer, A.Wiles, “Achiveing Technical Interoperability —the ETSI Approach”, ETSI White Paper No.3, 3rd edition, April 2008, http://www.etsi.org/images/files/ETSI WhitePapers/IOP%20whitepaper%20Edition%203%20fi nal.pdf  [10] ITU-T, Internet of Things Global Standards Initiative, http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx  [11] http://tblocks.com/internet-of-things  [12] https://www.ida.gov.sg/~/media/Files/Infocomm%20Lan dscape/Technology/TechnologyRoadmap/InternetOfThin gs.pdf