SlideShare a Scribd company logo
By- Dr. ANUP A. S.
MITCOM
MITU, Loni
2
CHAPTER 01
Fundamentals of IOT
3
CHAPTER 01
• Introduction to IoT:
• History of IoT:
• 1999- The term "Internet of Things" was used by Kevin Ashton during his
work at P&G which became widely accepted
• 2004 - The term was mentioned in famous publications like the
Guardian, Boston Globe, and Scientific American
• 2005-UN's International Telecommunications Union (ITU) published its
first report on this topic.
• 2008- The Internet of Things was born
• 2011- Gartner, the market research company, include "The Internet of
Things" technology in their research
4
CHAPTER 01
• Definition of IOT:
“The Internet of Things (IoT) is a system of interrelated computing
devices, mechanical and digital machines, objects, animals or people
that are provided with unique identifiers and the ability to transfer
data over a network without requiring human-to-human or human-to-
computer interaction.”
CHAPTER 01
• How IoT Works
1) Sensors/Devices
2) Connectivity
3) Data Processing
4) User Interface
5
IOT Architecture:
CHAPTER 01
6
IOT Architecture:
CHAPTER 01
7
Physical Design of IOT:
CHAPTER 01
8
Physical Design of IOT:
CHAPTER 01
9
Framework of IOT:
CHAPTER 01
10
11
Characteristics of IOT:
a. Connectivity
b. Intelligence and Identity
c. Scalability
d. Dynamic and self-Adapting (Complexity)
e. Architecture
f. Safety
CHAPTER 01
12
1) Sensors Devices:
• Sensors or devices are a key component that helps you to
collect live data from the surrounding environment.
• All this data may have various levels of complexities.
• It could be a simple temperature monitoring sensor, or it
may be in the form of the video feed.
CHAPTER 01
13
2) Connectivity:
• All the collected data is sent to a cloud infrastructure.
• The sensors should be connected to the cloud using
• various mediums of communications.
• These communication mediums include mobile or
satellite networks, Bluetooth, WI-FI, WAN, etc.
CHAPTER 01
14
3) Data Processing:
• Once that data is collected, and it gets to the cloud, the
software performs processing on the gathered data.
• This process can be just checking the temperature,
reading on devices like AC or heaters.
• However, it can sometimes also be very complex like
identifying objects, using computer vision on video.
CHAPTER 01
15
4) User Interface:
• sThe information needs to be available to the end-user in some way
which can be achieved by triggering alarms on their phones or sending
them notification through email or text message.
• The user sometimes might need an interface which actively checks their
IoT system.
For example, the user has a camera installed in his home. He wants to
access video recording and all the feeds with the help of a web server.
CHAPTER 01
16
Some Examples of IoT devices.
• A light bulb that can be switched on using a smartphone app is an IoT
device, as is a motion sensor or a smart thermostat in your office or a
connected streetlight.
• An IoT device could be as fluffy as a child's toy or as serious as a
driverless truck.
• Some larger objects may themselves be filled with many smaller IoT
components, such as a jet engine that's now filled with thousands of
sensors collecting and transmitting data back to make sure it is
operating efficiently.
CHAPTER 01
17
IoT benefits to organizations
• Monitor their overall business processes;
• Improve the customer experience (CX);
• Save time and money;
• Enhance employee productivity;
• Integrate and adapt business models;
• Make better business decisions; and
• Generate more revenue.
CHAPTER 01
18
Why Is Internet of Things (IoT) so important?
• Over the past few years, IoT has become one of the most important
technologies of the 21st century.
• Now that we can connect everyday objects—kitchen appliances, cars,
thermostats, baby monitors—to the internet via embedded devices,
seamless communication is possible between people, processes, and
things.
• By means of low-cost computing, the cloud, big data, analytics, and
mobile technologies, physical things can share and collect data with
minimal human intervention
CHAPTER 01
IoT Applications
• Smart Thermostats
• Connected Cars
• Activity Trackers
• Parking Sensors
• Connect Health
• Smart City
CHAPTER 01
19
IoT Applications
• Healthcare
• Smart homes and Smart Buildings
• Mobility and Transportation
• Energy
• Smart Manufacturing
• Environment/ Smart Planet
CHAPTER 01
20
21
Challenges of Internet of Things (IoT)
• Insufficient testing and updating
• Concern regarding data security and privacy
• Software complexity
• Data volumes and interpretation
• Integration with AI and automation
• Devices require a constant power supply which is difficult
• Interaction and short-range communication
CHAPTER 01
22
Challenges of Internet of Things (IoT)
• Heterogeneity and interoperability (a variety of networks, hardware,
operating system)
• Openness: it can be extended and implemented in ways.
• Security, Privacy, and trust : in Wireless Network
• Scalability: Amount of resources and no. of users increased
• Failure Handling: Detecting, masking and tolerating failure, recovering
from failure and redundancy. IoT expected to be a systems to self
diagnose and autorepaire.
CHAPTER 01
23
Advantages of IoT
• Ability to access information from anywhere at any time on any device;
• Improved communication between connected electronic devices;
• Transferring data packets over a connected network saving time and
money; and
• Automating tasks helping to improve the quality of a business's services
and reducing the need for human intervention.
CHAPTER 01
24
Disadvantages IoT
• As the number of connected devices increases and more information is shared
between devices, the potential that a hacker could steal confidential information
also increases.
• Enterprises may eventually have to deal with massive numbers -- maybe even
millions -- of IoT devices, and collecting and managing the data from all those
devices will be challenging.
• If there's a bug in the system, it's likely that every connected device will become
corrupted.
• Since there's no international standard of compatibility for IoT, it's difficult for
devices from different manufacturers to communicate with each other.
CHAPTER 01
25
Organizational Implementation & Mgmt Challenges:
• Implementation:
• Radio-Frequency Identification (RFID)
• Wireless Sensors Network (WSN)
• Mobile Technology
CHAPTER 01
26
• Managing IoT Systems and Challenges:
• Interoperability:
• Reliability, scalability, heterogeneity and data use to mention how technical solutions might
be used to solve privacy or security problem.
• Standards:
• RFID, WSN (Can Connect with MAC ID, Unique codes, IP, EPC (Electronic Product Code)
• IPv6 (Internet Protocol Version 6)
• Privacy: Environmental Portal (Public Made)
CHAPTER 01
27
• Managing IoT Systems and Challenges:
• Security: The IoT environment presents many security challenges, including
• The heterogeneous nature of IoT devices
• The large attack surface offered by numerous IoT devices
• The Fact that simpler building blocks of the IoT, such as passive RFID Tags, are
not easily Secured
CHAPTER 01
28
CHAPTER 01
• Managing IoT Systems and Challenges:
• Trust:
• Data Management: IoT Systems produce huge databases, up to zettabytes in
size which can be considerable value to the organisations. The heterogeneous
nature of the data collected, along with its volume and complexity, presents
challenges to effective IoT data usage. (No SQL or Cloud is reducing the cost)
• Legislation and Governance:
Difference Between IoT and M2M:
(Source: www.google.com)
CHAPTER 01
29
Difference Between IoT and M2M
(Source: www.google.com)
CHAPTER 01
30
31
THANK YOU!

More Related Content

Similar to CHA_001_IOT.pptx

Internet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptxInternet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptx
SibyJames1
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Vaithyasambandham1
 
Iot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdfIot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdf
XyzXyz338506
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Tata321168
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
HimanshuKumarMohapat
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
SeokjinxxxAnime
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
ShubhamHatzade3
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptx
gagag8
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
ImpanaR2
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
AbdikeTulbe
 
Priyanshu Gupta_2201994282.pptx
Priyanshu Gupta_2201994282.pptxPriyanshu Gupta_2201994282.pptx
Priyanshu Gupta_2201994282.pptx
MrStrangeIndustries
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
Asim Rais Siddiqui
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
shubhamyadav613
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Selva914004
 
The internet of things
The internet of thingsThe internet of things
The internet of things
Augustine Micahel
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
milemadinah
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
Chapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptChapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).ppt
dawod yimer
 

Similar to CHA_001_IOT.pptx (20)

Internet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptxInternet-of-Things-ppt and Industry 4.0.pptx
Internet-of-Things-ppt and Industry 4.0.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdfIot-Internet-of-Things-presentationppt.pdf
Iot-Internet-of-Things-presentationppt.pdf
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptx
 
IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
Priyanshu Gupta_2201994282.pptx
Priyanshu Gupta_2201994282.pptxPriyanshu Gupta_2201994282.pptx
Priyanshu Gupta_2201994282.pptx
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Chapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptChapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).ppt
 
M2M_IoT_Presentation
M2M_IoT_PresentationM2M_IoT_Presentation
M2M_IoT_Presentation
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

CHA_001_IOT.pptx

  • 1. By- Dr. ANUP A. S. MITCOM MITU, Loni
  • 3. 3 CHAPTER 01 • Introduction to IoT: • History of IoT: • 1999- The term "Internet of Things" was used by Kevin Ashton during his work at P&G which became widely accepted • 2004 - The term was mentioned in famous publications like the Guardian, Boston Globe, and Scientific American • 2005-UN's International Telecommunications Union (ITU) published its first report on this topic. • 2008- The Internet of Things was born • 2011- Gartner, the market research company, include "The Internet of Things" technology in their research
  • 4. 4 CHAPTER 01 • Definition of IOT: “The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to- computer interaction.”
  • 5. CHAPTER 01 • How IoT Works 1) Sensors/Devices 2) Connectivity 3) Data Processing 4) User Interface 5
  • 8. Physical Design of IOT: CHAPTER 01 8
  • 9. Physical Design of IOT: CHAPTER 01 9
  • 11. 11 Characteristics of IOT: a. Connectivity b. Intelligence and Identity c. Scalability d. Dynamic and self-Adapting (Complexity) e. Architecture f. Safety CHAPTER 01
  • 12. 12 1) Sensors Devices: • Sensors or devices are a key component that helps you to collect live data from the surrounding environment. • All this data may have various levels of complexities. • It could be a simple temperature monitoring sensor, or it may be in the form of the video feed. CHAPTER 01
  • 13. 13 2) Connectivity: • All the collected data is sent to a cloud infrastructure. • The sensors should be connected to the cloud using • various mediums of communications. • These communication mediums include mobile or satellite networks, Bluetooth, WI-FI, WAN, etc. CHAPTER 01
  • 14. 14 3) Data Processing: • Once that data is collected, and it gets to the cloud, the software performs processing on the gathered data. • This process can be just checking the temperature, reading on devices like AC or heaters. • However, it can sometimes also be very complex like identifying objects, using computer vision on video. CHAPTER 01
  • 15. 15 4) User Interface: • sThe information needs to be available to the end-user in some way which can be achieved by triggering alarms on their phones or sending them notification through email or text message. • The user sometimes might need an interface which actively checks their IoT system. For example, the user has a camera installed in his home. He wants to access video recording and all the feeds with the help of a web server. CHAPTER 01
  • 16. 16 Some Examples of IoT devices. • A light bulb that can be switched on using a smartphone app is an IoT device, as is a motion sensor or a smart thermostat in your office or a connected streetlight. • An IoT device could be as fluffy as a child's toy or as serious as a driverless truck. • Some larger objects may themselves be filled with many smaller IoT components, such as a jet engine that's now filled with thousands of sensors collecting and transmitting data back to make sure it is operating efficiently. CHAPTER 01
  • 17. 17 IoT benefits to organizations • Monitor their overall business processes; • Improve the customer experience (CX); • Save time and money; • Enhance employee productivity; • Integrate and adapt business models; • Make better business decisions; and • Generate more revenue. CHAPTER 01
  • 18. 18 Why Is Internet of Things (IoT) so important? • Over the past few years, IoT has become one of the most important technologies of the 21st century. • Now that we can connect everyday objects—kitchen appliances, cars, thermostats, baby monitors—to the internet via embedded devices, seamless communication is possible between people, processes, and things. • By means of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical things can share and collect data with minimal human intervention CHAPTER 01
  • 19. IoT Applications • Smart Thermostats • Connected Cars • Activity Trackers • Parking Sensors • Connect Health • Smart City CHAPTER 01 19
  • 20. IoT Applications • Healthcare • Smart homes and Smart Buildings • Mobility and Transportation • Energy • Smart Manufacturing • Environment/ Smart Planet CHAPTER 01 20
  • 21. 21 Challenges of Internet of Things (IoT) • Insufficient testing and updating • Concern regarding data security and privacy • Software complexity • Data volumes and interpretation • Integration with AI and automation • Devices require a constant power supply which is difficult • Interaction and short-range communication CHAPTER 01
  • 22. 22 Challenges of Internet of Things (IoT) • Heterogeneity and interoperability (a variety of networks, hardware, operating system) • Openness: it can be extended and implemented in ways. • Security, Privacy, and trust : in Wireless Network • Scalability: Amount of resources and no. of users increased • Failure Handling: Detecting, masking and tolerating failure, recovering from failure and redundancy. IoT expected to be a systems to self diagnose and autorepaire. CHAPTER 01
  • 23. 23 Advantages of IoT • Ability to access information from anywhere at any time on any device; • Improved communication between connected electronic devices; • Transferring data packets over a connected network saving time and money; and • Automating tasks helping to improve the quality of a business's services and reducing the need for human intervention. CHAPTER 01
  • 24. 24 Disadvantages IoT • As the number of connected devices increases and more information is shared between devices, the potential that a hacker could steal confidential information also increases. • Enterprises may eventually have to deal with massive numbers -- maybe even millions -- of IoT devices, and collecting and managing the data from all those devices will be challenging. • If there's a bug in the system, it's likely that every connected device will become corrupted. • Since there's no international standard of compatibility for IoT, it's difficult for devices from different manufacturers to communicate with each other. CHAPTER 01
  • 25. 25 Organizational Implementation & Mgmt Challenges: • Implementation: • Radio-Frequency Identification (RFID) • Wireless Sensors Network (WSN) • Mobile Technology CHAPTER 01
  • 26. 26 • Managing IoT Systems and Challenges: • Interoperability: • Reliability, scalability, heterogeneity and data use to mention how technical solutions might be used to solve privacy or security problem. • Standards: • RFID, WSN (Can Connect with MAC ID, Unique codes, IP, EPC (Electronic Product Code) • IPv6 (Internet Protocol Version 6) • Privacy: Environmental Portal (Public Made) CHAPTER 01
  • 27. 27 • Managing IoT Systems and Challenges: • Security: The IoT environment presents many security challenges, including • The heterogeneous nature of IoT devices • The large attack surface offered by numerous IoT devices • The Fact that simpler building blocks of the IoT, such as passive RFID Tags, are not easily Secured CHAPTER 01
  • 28. 28 CHAPTER 01 • Managing IoT Systems and Challenges: • Trust: • Data Management: IoT Systems produce huge databases, up to zettabytes in size which can be considerable value to the organisations. The heterogeneous nature of the data collected, along with its volume and complexity, presents challenges to effective IoT data usage. (No SQL or Cloud is reducing the cost) • Legislation and Governance:
  • 29. Difference Between IoT and M2M: (Source: www.google.com) CHAPTER 01 29
  • 30. Difference Between IoT and M2M (Source: www.google.com) CHAPTER 01 30