The document provides an overview of a presentation on cyber physical systems and security challenges. It introduces the speaker, Nitin Garg, and the event location, ALTTC Ghaziabad. It then outlines topics that will be covered, including where technology currently stands, industry 4.0, cyber physical system classification and description, IoT/IIoT connectivity, security issues and challenges, and the impact of COVID-19 on industry 4.0.
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
IOT is going to be very big and the fitness, health club and gym industry are no exception. To lead the adoption of IOT requires thoughtful strategy and a clear road map for implementation.
This document outlines a temperature monitoring system that includes sensors to collect temperature data, transmit it to the cloud, and display it on a user dashboard. It allows users to control connected devices like fans from the dashboard. The system aims to provide an end-to-end solution for collecting sensor data and visualizing or acting on it remotely. It also discusses revenue models including freemium options and subscriptions, as well as future enhancements like integrating additional sensors and control capabilities.
The document discusses the evolution of the internet from static Web 1.0 pages to today's dynamic Web 2.0 and upcoming Web 3.0. It defines the Internet of Things (IoT) as connecting physical objects through sensors and internet connectivity. Examples discussed include connecting devices in homes, cities, healthcare, mining and law enforcement. Challenges of IoT include bandwidth, power consumption, security and data management. Standards organizations are working to address these issues and advance IoT technologies. The future may see an "Internet of Everything" connecting people, processes, data and physical things.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
The document discusses various topics relating to industrial communication, including:
1. It describes different transmission modes like simplex, half duplex, and full duplex. It also lists some common network elements.
2. It outlines basic requirements for industrial communication software and files. It also lists some common physical layer protocols and standards.
3. It provides an overview of Modbus communication standards and terminology.
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
1st Project - Health Systems.
As a result of ageing population, increasing demand and evolving technology on healthcare systems, the progress in the Internet of Things (IoT) has a key role in suppressing all these needs, in particular, redesigning modern health care with promising technological, economic and social prospects. This paper attempts to comprehensively review the current research and development on the impact of IoT in Healthcare. Relying on a comprehensive literature review, this paper analyses the architecture of an IoT-based systems, focusing on the main components and their value to the overall system. In addition, a perspective on electronic health records and on privacy and security issues are overviewed, along with the review of clinical cases of IoT-based systems. Given IoT clear acceptability and affordability among youngers and elders, combined to a broad range of devices and machine learning techniques, it’s expected these devices will facilitate in many ways health providers’ job, as long as other topics like data protection keep side-by-side.
IST - 4th Year - 2nd Semester - Biomedical Engineering.
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
IOT is going to be very big and the fitness, health club and gym industry are no exception. To lead the adoption of IOT requires thoughtful strategy and a clear road map for implementation.
This document outlines a temperature monitoring system that includes sensors to collect temperature data, transmit it to the cloud, and display it on a user dashboard. It allows users to control connected devices like fans from the dashboard. The system aims to provide an end-to-end solution for collecting sensor data and visualizing or acting on it remotely. It also discusses revenue models including freemium options and subscriptions, as well as future enhancements like integrating additional sensors and control capabilities.
The document discusses the evolution of the internet from static Web 1.0 pages to today's dynamic Web 2.0 and upcoming Web 3.0. It defines the Internet of Things (IoT) as connecting physical objects through sensors and internet connectivity. Examples discussed include connecting devices in homes, cities, healthcare, mining and law enforcement. Challenges of IoT include bandwidth, power consumption, security and data management. Standards organizations are working to address these issues and advance IoT technologies. The future may see an "Internet of Everything" connecting people, processes, data and physical things.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
The document discusses various topics relating to industrial communication, including:
1. It describes different transmission modes like simplex, half duplex, and full duplex. It also lists some common network elements.
2. It outlines basic requirements for industrial communication software and files. It also lists some common physical layer protocols and standards.
3. It provides an overview of Modbus communication standards and terminology.
The Role of Internet-of-Things (IoT) in HealthcareLuís Rita
1st Project - Health Systems.
As a result of ageing population, increasing demand and evolving technology on healthcare systems, the progress in the Internet of Things (IoT) has a key role in suppressing all these needs, in particular, redesigning modern health care with promising technological, economic and social prospects. This paper attempts to comprehensively review the current research and development on the impact of IoT in Healthcare. Relying on a comprehensive literature review, this paper analyses the architecture of an IoT-based systems, focusing on the main components and their value to the overall system. In addition, a perspective on electronic health records and on privacy and security issues are overviewed, along with the review of clinical cases of IoT-based systems. Given IoT clear acceptability and affordability among youngers and elders, combined to a broad range of devices and machine learning techniques, it’s expected these devices will facilitate in many ways health providers’ job, as long as other topics like data protection keep side-by-side.
IST - 4th Year - 2nd Semester - Biomedical Engineering.
Automated Validation of Internet Security Protocols and Applications (AVISPA) Krassen Deltchev
This is my first B.Sc. term paper, 2006. Back in the days my English was bad, which is obvious, while reading the paper, but i still love it, cuz this was my academic starting point on the topic of IT-Security. Enjoy!
This B.Sc. term paper is presented to the
Department of Electrical Engineering and Information Sciences
of the Ruhr-University of Bochum
Chair of Network and Data Security
of the Ruhr-University of Bochum,
Horst-Görtz Institute,
Prof. Jörg Schwenk
Abstract:
The AVISPA Model Checker is a tool for automated validation and verification of security
protocols. It provides a push-button web-based software- and hardware-independent interface and
installation binaries for UNIX-based Operating Systems.
It belongs to the group of the state-of-the-art Model Checkers and uses a modular and descriptive
formal language for specifying industrial-scale security protocols.
The different back-ends of the AVISPA tool implement new optimized analysing techniques for
automated protocol verification.
Therefore the researcher/scientist can prove even bigger in their specification protocols in a short
time and in a user-friendly way.
New cryptographic attacks are explored using the AVISPA tool and the Model-Checker covers
widest range of the modern authentication internet protocols, regarding their security validation.
IoT Introduction Architecture and ApplicationsThe IOT Academy
The document provides an overview of the Internet of Things (IoT). It discusses IoT architecture including components like sensors, gateways, cloud platforms and applications. It outlines various IoT applications in different domains like manufacturing, healthcare, transportation etc. The document also discusses challenges in IoT deployment related to interoperability, security and skills. It highlights the importance of skills like embedded systems, cloud computing, data analytics for jobs in IoT domain. Finally, it gives examples of how a company called UCT is applying IoT in products like street lighting, irrigation and building automation.
The document discusses the history, definitions, purpose, applications and benefits of the Internet of Things (IoT). It describes how IoT devices capture and share data with the cloud for processing and acting on that data. Examples of IoT applications include smart homes, connected cars, agriculture and wearables. Benefits include comfort, efficiency and removing human error, while barriers are privacy, security, power and cost.
1. The document discusses the syllabus for the subject Internet of Things for the 4th year, 7th semester students. It includes the vision, mission and course outcomes of the Computer Science department.
2. The syllabus is divided into 5 units - introduction to IoT, IoT sensors and devices, IoT architectures, comparison of IoT with other technologies, and applications of IoT.
3. For each unit, the topics to be covered, number of lectures required and the lecture plan is provided along with the mapping of course outcomes to program outcomes.
The document discusses the logical design of IoT. It describes the key logical design elements including IoT functional blocks, communication models, and communication APIs. The logical design provides an abstract representation of IoT entities and processes without implementation details. The functional blocks provide capabilities for identification, sensing, actuation, communication and management. Common communication models are request-response, publish-subscribe, push-pull and exclusive pair. REST and WebSocket are examples of IoT communication APIs.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
Internet of things (IOT) connects physical to digitalEslam Nader
1) The document discusses the topic of Internet of Things (IoT). It defines IoT as a network of physical objects embedded with sensors that can collect and exchange data.
2) The document outlines some key characteristics of IoT including connectivity, data collection, communication, intelligence, and action. It also discusses how IoT works by collecting data via sensors, communicating data through networks, analyzing the data, and taking action.
3) Several potential research topics in IoT are proposed, including applying deep learning for intrusion detection in IoT networks, finding dead zones in large IoT networks, and developing governance models for machine learning algorithms within IoT.
MEASUREMENT OF BIO POTENTIAL USING TWO ELECTRODES AND RECORDING PROBLEMSBharathasreejaG
YOU CAN LEARN ABOUT MEASUREMENT USING TWO ELECTRODES & RECORDING PROBLEMS# NEED OF MEDICAL RECORDING # ELECTRODE TO SKIN INTERFACE # NERNST EQUATION # NOISE DURING RECORDING# MOTION ARTIFACT# ELECTRODE TO ELECTROLYTE NOISE # ELECTROLYTE TO SKIN NOISE# THERMAL NOISE# AMPLIFICATION NOISE# CABLE MOVEMENT# OTHER NOISES # CODING FOR GENERATING NOISE
The document discusses advanced process control (APC) systems and their benefits. APC systems use modeling, multivariable control, and other technologies to automatically optimize control actions and minimize process variation, unlike traditional control systems. Example applications and benefits of APC are provided for dairy manufacturing processes like milk powder production and cheese making. APC can increase throughput, yield, and energy savings while reducing variation. The last section discusses APC solutions for biofuel manufacturing processes like ethanol production.
This document discusses opportunities and challenges for the Internet of Things (IoT) and 5G networks. It provides several definitions of the IoT and describes how sensor devices are widely available. It also outlines the technology roadmap for IoT, noting how 4G and 5G networks will be important enablers. However, it notes challenges for telecommunications networks in managing diverging traffic and revenue expectations. The document discusses many potential applications of IoT across various sectors. It concludes by discussing important research challenges for IoT deployments, particularly in smart cities and smart energy grids.
SCADA (Supervisory Control & data Acquisation) PPTDeepeshK4
PowerPoint Presentation(PPT) on SCADA
This PPT includes:
* What is Scada
* Applications of Scada
* Need of Scada
* Components of Scada
* Objectives of Scada
* Why Scada is used/ Where is the SCADA system used
* What is controlled by SCADA in Power sysem
* Advantages & Disadvantages
* How SCADA works?
* Working Procedure of SCADA
Thanks for visiting my slide
Performance trends and alerts with ThingSpeak IoTAnoush Najarian
We use data analysis and visualization capabilities of ThingSpeak, our favorite Internet of Things platform to capture and analyze performance data, to help with performance monitoring and to generate alerts
This document presents a home automation project using an Arduino microcontroller, ESP8266 WiFi module, relays, and a webpage interface. The proposed system allows users to control devices in their home like lights and appliances remotely using a laptop or phone via the internet. It discusses the existing manual home control system, the project's block diagram, hardware and software requirements, advantages like convenience and security, and applications for home automation and internet of things scenarios.
This document appears to be a presentation about cyber-physical systems and Industry 4.0. It includes definitions of cyber-physical systems and Industry 4.0, examples of companies implementing Industry 4.0 solutions, discussions of the Internet of Things, impacts of new technologies on the economy, business, society and individuals, and slides on various related topics without titles like applications, history, and use cases. The presentation touches on many aspects of emerging digital technologies and their integration with physical systems and processes.
Scada protocols-and-communications-trendsSandip Roy
The document discusses SCADA protocols and communication trends. It describes how SCADA systems monitor and control processes across multiple locations using RTUs connected via local and wide area networks. Common protocols discussed include Modbus, ModbusX, DNP, ASCII, and IEEE 60870. The document also outlines legacy networks using low speeds of 300-1200 bps and how newer networks enable higher speeds of 9600 bps to meet increased data demands.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
Internet of Things Presentation to Los Angeles CTO ForumFred Thiel
What are the impacts to our systems and businesses when billions of devices start sharing data? This presentation covers some important statistics about the implications of the coming IoT wave and how it will disrupt those who are not prepared.
Automated Validation of Internet Security Protocols and Applications (AVISPA) Krassen Deltchev
This is my first B.Sc. term paper, 2006. Back in the days my English was bad, which is obvious, while reading the paper, but i still love it, cuz this was my academic starting point on the topic of IT-Security. Enjoy!
This B.Sc. term paper is presented to the
Department of Electrical Engineering and Information Sciences
of the Ruhr-University of Bochum
Chair of Network and Data Security
of the Ruhr-University of Bochum,
Horst-Görtz Institute,
Prof. Jörg Schwenk
Abstract:
The AVISPA Model Checker is a tool for automated validation and verification of security
protocols. It provides a push-button web-based software- and hardware-independent interface and
installation binaries for UNIX-based Operating Systems.
It belongs to the group of the state-of-the-art Model Checkers and uses a modular and descriptive
formal language for specifying industrial-scale security protocols.
The different back-ends of the AVISPA tool implement new optimized analysing techniques for
automated protocol verification.
Therefore the researcher/scientist can prove even bigger in their specification protocols in a short
time and in a user-friendly way.
New cryptographic attacks are explored using the AVISPA tool and the Model-Checker covers
widest range of the modern authentication internet protocols, regarding their security validation.
IoT Introduction Architecture and ApplicationsThe IOT Academy
The document provides an overview of the Internet of Things (IoT). It discusses IoT architecture including components like sensors, gateways, cloud platforms and applications. It outlines various IoT applications in different domains like manufacturing, healthcare, transportation etc. The document also discusses challenges in IoT deployment related to interoperability, security and skills. It highlights the importance of skills like embedded systems, cloud computing, data analytics for jobs in IoT domain. Finally, it gives examples of how a company called UCT is applying IoT in products like street lighting, irrigation and building automation.
The document discusses the history, definitions, purpose, applications and benefits of the Internet of Things (IoT). It describes how IoT devices capture and share data with the cloud for processing and acting on that data. Examples of IoT applications include smart homes, connected cars, agriculture and wearables. Benefits include comfort, efficiency and removing human error, while barriers are privacy, security, power and cost.
1. The document discusses the syllabus for the subject Internet of Things for the 4th year, 7th semester students. It includes the vision, mission and course outcomes of the Computer Science department.
2. The syllabus is divided into 5 units - introduction to IoT, IoT sensors and devices, IoT architectures, comparison of IoT with other technologies, and applications of IoT.
3. For each unit, the topics to be covered, number of lectures required and the lecture plan is provided along with the mapping of course outcomes to program outcomes.
The document discusses the logical design of IoT. It describes the key logical design elements including IoT functional blocks, communication models, and communication APIs. The logical design provides an abstract representation of IoT entities and processes without implementation details. The functional blocks provide capabilities for identification, sensing, actuation, communication and management. Common communication models are request-response, publish-subscribe, push-pull and exclusive pair. REST and WebSocket are examples of IoT communication APIs.
This document discusses IoT networking and quality of service (QoS) for IoT networks. It begins by describing the characteristics of IoT devices such as low processing power, small size, and energy constraints. It then discusses enabling the classical Internet for IoT devices through standards developed by the IETF, including 6LoWPAN, ROLL, and CoRE. CoRE provides a framework for IoT applications and services discovery. The document concludes by examining policies for QoS in IoT networks to guarantee intended service, covering resource utilization, data timeliness, availability, and delivery.
Internet of things (IOT) connects physical to digitalEslam Nader
1) The document discusses the topic of Internet of Things (IoT). It defines IoT as a network of physical objects embedded with sensors that can collect and exchange data.
2) The document outlines some key characteristics of IoT including connectivity, data collection, communication, intelligence, and action. It also discusses how IoT works by collecting data via sensors, communicating data through networks, analyzing the data, and taking action.
3) Several potential research topics in IoT are proposed, including applying deep learning for intrusion detection in IoT networks, finding dead zones in large IoT networks, and developing governance models for machine learning algorithms within IoT.
MEASUREMENT OF BIO POTENTIAL USING TWO ELECTRODES AND RECORDING PROBLEMSBharathasreejaG
YOU CAN LEARN ABOUT MEASUREMENT USING TWO ELECTRODES & RECORDING PROBLEMS# NEED OF MEDICAL RECORDING # ELECTRODE TO SKIN INTERFACE # NERNST EQUATION # NOISE DURING RECORDING# MOTION ARTIFACT# ELECTRODE TO ELECTROLYTE NOISE # ELECTROLYTE TO SKIN NOISE# THERMAL NOISE# AMPLIFICATION NOISE# CABLE MOVEMENT# OTHER NOISES # CODING FOR GENERATING NOISE
The document discusses advanced process control (APC) systems and their benefits. APC systems use modeling, multivariable control, and other technologies to automatically optimize control actions and minimize process variation, unlike traditional control systems. Example applications and benefits of APC are provided for dairy manufacturing processes like milk powder production and cheese making. APC can increase throughput, yield, and energy savings while reducing variation. The last section discusses APC solutions for biofuel manufacturing processes like ethanol production.
This document discusses opportunities and challenges for the Internet of Things (IoT) and 5G networks. It provides several definitions of the IoT and describes how sensor devices are widely available. It also outlines the technology roadmap for IoT, noting how 4G and 5G networks will be important enablers. However, it notes challenges for telecommunications networks in managing diverging traffic and revenue expectations. The document discusses many potential applications of IoT across various sectors. It concludes by discussing important research challenges for IoT deployments, particularly in smart cities and smart energy grids.
SCADA (Supervisory Control & data Acquisation) PPTDeepeshK4
PowerPoint Presentation(PPT) on SCADA
This PPT includes:
* What is Scada
* Applications of Scada
* Need of Scada
* Components of Scada
* Objectives of Scada
* Why Scada is used/ Where is the SCADA system used
* What is controlled by SCADA in Power sysem
* Advantages & Disadvantages
* How SCADA works?
* Working Procedure of SCADA
Thanks for visiting my slide
Performance trends and alerts with ThingSpeak IoTAnoush Najarian
We use data analysis and visualization capabilities of ThingSpeak, our favorite Internet of Things platform to capture and analyze performance data, to help with performance monitoring and to generate alerts
This document presents a home automation project using an Arduino microcontroller, ESP8266 WiFi module, relays, and a webpage interface. The proposed system allows users to control devices in their home like lights and appliances remotely using a laptop or phone via the internet. It discusses the existing manual home control system, the project's block diagram, hardware and software requirements, advantages like convenience and security, and applications for home automation and internet of things scenarios.
This document appears to be a presentation about cyber-physical systems and Industry 4.0. It includes definitions of cyber-physical systems and Industry 4.0, examples of companies implementing Industry 4.0 solutions, discussions of the Internet of Things, impacts of new technologies on the economy, business, society and individuals, and slides on various related topics without titles like applications, history, and use cases. The presentation touches on many aspects of emerging digital technologies and their integration with physical systems and processes.
Scada protocols-and-communications-trendsSandip Roy
The document discusses SCADA protocols and communication trends. It describes how SCADA systems monitor and control processes across multiple locations using RTUs connected via local and wide area networks. Common protocols discussed include Modbus, ModbusX, DNP, ASCII, and IEEE 60870. The document also outlines legacy networks using low speeds of 300-1200 bps and how newer networks enable higher speeds of 9600 bps to meet increased data demands.
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
Internet of Things is promising to be a set of technologies able to have a high impact on how people live, produce, modify and interact with the environment. Such a transformation is driven by increasing technologies capabilities of sensors/actuators, communications, general-purpose hardware, availability of software and programmability of devices. The integration of so different technologies is a problem in itself and IoT is also trying to solve cogent issues of specific problem domains, such as e-health, transportation, manufacturing, and so on. Large IoT systems (e.g., smart cities) stand on their own because the smartness requires integration of different technologies, processes and different administrative domains creating the needs to deal with a complex system. In addition to technological and problem domain specific challenges, there exist further challenges that fall in business, social and regulation realms. They can greatly impact the deployment and the success of IoT deployment. The speech aims at providing a view on some major technologies challenges of IoT and to cover a few critical business and social issues that could hamper the large deployment of IoT systems by providing some examples of implementation.
Internet of Things Presentation to Los Angeles CTO ForumFred Thiel
What are the impacts to our systems and businesses when billions of devices start sharing data? This presentation covers some important statistics about the implications of the coming IoT wave and how it will disrupt those who are not prepared.
The document discusses the Internet of Things (IoT) and its impact. It begins by quoting the World Economic Forum that we are on the brink of a technological revolution through IoT that will fundamentally change how people live and work. IoT involves connecting physical devices to the internet and to each other. This allows for collection and sharing of data from billions of smart devices. The document then discusses how IoT is being used in various industries and provides examples of IoT applications for smart farming, elderly care, smart home devices, and more. It also outlines some of the advantages and disadvantages of IoT, such as improved customer engagement but also security and privacy concerns.
This document provides an overview of an Internet of Things course for the 2018-2019 academic year. It includes 5 units that will cover topics such as IOT protocols, the web of things, network dynamics applications, resource management, smart grids, and electrical vehicle charging. The course objectives are for students to understand IOT protocols, applications of the web of things, and network dynamics. The document lists 4 textbooks that will be used and provides descriptions of the topics that will be covered in each unit.
This document provides an overview of the Internet of Things (IoT) including:
1) A definition of IoT and discussion of its vision to create a network of billions of connected devices.
2) Descriptions of the key enablers that allow IoT to function such as smart devices, communication networks, cloud computing, and sensors.
3) An outline of some of the major challenges with IoT including handling big data, security, bandwidth issues, standardization, and power consumption.
4) Examples of applications of IoT in areas like healthcare, infrastructure, automotive, and connected vehicles.
This document summarizes a seminar presentation on the Internet of Things (IoT). It first defines IoT as connecting embedded devices to the internet and integrating data analytics. It then explains how IoT works through sensors collecting data that is digitized and placed on networks for analysis and action. Finally, it discusses the importance of semantics for enabling data sharing and interoperability among billions of connected devices and some challenges of privacy, complexity, and environmental impacts.
The document discusses recent trends in information technology including virtual and augmented reality, cloud computing, 5G wireless, the Internet of Things (IoT), and big data analytics. It provides an agenda for the session covering these topics and case studies applying these technologies. Examples of how IoT is enabling industrial automation and transportation are presented. The growth of big data and opportunities it provides are also summarized. The document concludes with a discussion of how information technology is developing through artificial intelligence, machine learning, smart devices, data, and social media.
This document discusses emerging technologies related to the Internet of Things (IoT). It defines IoT as physical objects communicating via the internet, with estimates of 30-50 billion connected objects by 2020. Key areas of focus for IoT include facilities management, industrial applications, energy, healthcare, transportation, and more. The document also discusses technology trends driving IoT like automation, robotics, AI, 3D printing, and analytics. It notes issues around ethics, security, privacy and jobs related to IoT.
This document provides an overview of the Internet of Things (IoT). It defines IoT as connected devices that can collect and exchange data without human intervention. It discusses the need for IoT to improve resource utilization and integrate physical systems. The key components that enable IoT are sensors, connectivity, and processes to handle the data. IoT works by ingesting data from connected devices, transmitting it, processing and analyzing the data, and visualizing results. Applications of IoT include smart homes and cities. Challenges include security, scalability, and standardization, but solutions involve open source development and government regulations.
The document discusses Internet of Things (IoT) and its key aspects. It defines IoT as connecting physical objects through sensors and software to exchange data over the internet. IoT devices collect and share sensor data by connecting to gateways and the cloud to be analyzed with minimal human intervention. The document outlines technologies like sensors, connectivity, cloud computing and AI that enable IoT. It also discusses challenges of IoT like scalability, security, data analytics and interoperability.
1) The Internet of Things (IoT) refers to the network of physical objects or 'things' embedded with electronics, software, sensors, and connectivity to enable the collection and exchange of data.
2) IoT allows objects to be sensed and controlled remotely via existing network infrastructure, creating opportunities to directly integrate the physical world with computer systems.
3) IoT includes a wide range of devices from sensors implanted in farm animals to automobiles to environmental monitoring devices that can autonomously exchange data to improve efficiency.
The document provides an overview of the Internet of Things (IoT). It defines IoT as the network of physical objects embedded with sensors that can collect and exchange data. It describes how IoT works using technologies like RFID sensors, smart technologies, and nanotechnologies to identify things, collect data, and enhance network power. It also discusses current and future applications of IoT in various fields, technological challenges, and criticisms of IoT regarding privacy, security, and control issues.
Study on Fog Computing and Data Concurrency in IoT. Includes an analysis of different data concurrency techniques, their principle and some recent developments in the area. Also covers the topic of Fog Computing and its development and application in IoT.
The document defines the Internet of Things (IoT) and describes its key characteristics and components. The IoT refers to the network of physical objects embedded with sensors, software and other technologies to enable them to connect and exchange data with other devices and systems over the Internet. The main purpose of IoT devices is to generate real-time data that can be analyzed to create desired business outcomes. Common IoT devices include smart watches, refrigerators, security systems and more. The technologies that enable IoT include sensors, communication protocols, and data analytics software.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
The document provides an overview of the Internet of Things (IoT). It defines IoT and discusses its key components including sensors, connectivity, artificial intelligence, active engagement, and small devices. The document then discusses IoT architecture including sensing, network, data processing, and application layers. It also outlines some common applications of IoT such as smart homes, smart cities, and smart farming. Finally, the document discusses some of the advantages and challenges of implementing IoT systems.
The document discusses Internet of Things (IoT) and Industrial Internet of Things (IIoT). It provides examples of IoT in areas like smart agriculture, energy consumption, security, and healthcare. It then describes key enabling technologies for IoT like low-power devices, Bluetooth, and the need for open connectivity standards. The document also discusses the growth of the IoT market and applications of robotics. It then focuses on defining IIoT and comparing it to IoT and M2M. The document outlines requirements and benefits of IIoT like cloud computing, analytics, and improved efficiency. Real-life examples of IIoT in industries like aviation, oil and gas are also provided.
This document provides an overview of an embedded IoT course. It defines embedded systems and IoT, and how IoT has impacted industries. The course covers IoT operating systems, development platforms, protocols, tools, and concepts through hands-on projects developing smart home and industrial IoT solutions. The best embedded IoT course is offered in Chennai by Netsui, providing job placement assistance upon completion.
The document defines key concepts related to the Internet of Things (IoT), including definitions of IoT, how IoT works, enabling technologies, and common standards. Specifically, it defines IoT as a network of physical devices connected via the internet that can sense and communicate with their environment and with other devices. It describes the main components of an IoT system including sensors, communication methods, computation technologies, and services. Finally, it provides examples of identification methods, communication protocols, hardware platforms, and semantic technologies that support IoT applications.
This document provides an overview of artificial general intelligence and related concepts. It discusses how:
- Focused artificial intelligence will likely exceed human performance in most tasks, but common sense knowledge may remain an exception.
- Networking specialized AIs could provide a foundation for artificial general intelligence, similar to how human society achieves complex tasks through communication and division of labor.
- A "conscious operating system" could play a role in directing an AI network, sensors, actuators and robots, initially programmed by humans, and potentially developing its own goals over time.
The document summarizes BSNL's decline in market share and financial performance over the past 15-20 years compared to private telecom companies in India. It notes that BSNL's market share fell from 21% in 2005 to 10% by 2022 as private players grew their share, and BSNL struggled with declining revenue, rising costs, and consistent losses. It analyzes factors like falling average revenue per user, decreasing subscribers, high employee costs, and an inability to adapt to market changes as reasons for BSNL's poor financial results compared to more agile private competitors.
This document discusses theories and concepts related to motivating employees. It covers Abraham Maslow's hierarchy of needs theory, which states that satisfied needs no longer motivate and managers should focus on meeting employees' highest level of unmet needs. It also discusses McGregor's Theory X and Y about assumptions of human nature, and Herzberg's motivation-hygiene theory about factors that lead to satisfaction versus dissatisfaction. Contemporary theories discussed include the need for achievement, reinforcement theory, and expectancy theory. The document provides tips for applying motivational concepts and addressing challenges in motivating today's diverse workforces.
The document tells a story using three pots as metaphors for how people can respond to difficulties in life. The first pot holds carrots that soften when boiled, representing people who lose their strength when facing problems. The second pot holds eggs that harden when boiled, representing people who become bitter and lose their compassion. The third pot holds coffee beans that change the water with their flavor and aroma, representing people who are able to use difficulties to better themselves and their situation. The message is that when facing hardships, people should draw strength from challenges rather than weakening or becoming hardened, and instead allow problems to enhance their skills and help others.
Emergency Communications and Disaster Mangment.pptxnitin_009
Mobile technology and IoT can help effectively manage emergency services and disasters. LTE, IoT, and 5G networks can be used for emergency communication and relief. When disasters damage networks, coordination is complicated and delays can cost lives. Public Protection and Disaster Relief (PPDR) networks allow rapid temporary network deployment. India needs to adopt a next generation broadband PPDR network using a common standard like LTE. Key issues to address include allocating dedicated spectrum such as 10MHz in 700/800MHz bands, and determining the appropriate network model.
This document provides an overview of human evolution. It discusses key topics like:
- The difference between hominids and hominoins and their relation to humans and apes.
- Early hominin species like Australopithecus that lived millions of years ago.
- The evolution of brain size and locomotion in hominins over time.
- Species in the genus Homo, including Homo habilis, H. erectus, Neanderthals, and Homo sapiens.
- Evidence that Neanderthals were adapted for cold environments but were not direct ancestors of modern humans.
This document provides an overview of artificial intelligence and its social and ethical implications. It begins with a brief history of AI, including its origins in 1956 and early developments. It then discusses issues regarding AI research and public interest, including the need for ethics codes. Next, it outlines some social implications of AI systems, such as increased dependency on machines and potential unemployment. It also considers implications if AI were to surpass human intelligence. The document closes by posing open questions about the future of AI and its role in humanity.
The document describes the process for extracting data from the MAX IOP system and importing it into the C5 GUI. It involves running scripts on the IOP to extract subscriber and configuration data into files, then running scripts on the C5 node to parse these files and generate SQL queries to create the corresponding data entities in C5, such as subscribers, hunt groups, and configurations.
The document describes the core elements of the MAX-NG network:
1) The core elements include a Session Border Controller (SBC), Class 5 soft switch (C5), Class 4 soft switch (C4), Signaling Gateway (SG), billing server (RATER), and Element Management System (EMS).
2) The SBC governs phone calls on the VOIP network and acts as a firewall. The C5 and C4 soft switches route calls within the network and to the PSTN. The SG translates between SS7 and IP signaling. The RATER determines billing rates. The EMS manages and monitors the network elements.
3) Together, these core elements allow subscribers to place calls
The document provides steps for configuring a LAGU chassis and installing the LAG application. It includes instructions for mounting partitions, configuring networking settings, installing EMS software, formatting storage, and extracting application files. It also describes how to create data in the LAG network by registering a site and node, adding nodes to an exchange, equipping frames and line cards, and generating subscriber instances through the C5 GUI.
Shelf Manager Cards are installed in controller slots in the 6-slot CACU chassis. They work in duplex mode to monitor the status of cards in the chassis and report on health parameters like temperature and fan status to the Element Management System. The Shelf Manager Cards are installed in pairs in the lower left slots of the chassis and each card has a floating IP address.
The document discusses pre-deployment activities for migrating to the MAX-NG network system. This includes a site survey, inventory of existing equipment, compacting line boards to reduce space and power usage, configuring IP addresses and connectivity to the MPLS core, and preparing data for subscriber migration. It also outlines the deployment process, including installing new MAX-NG equipment, configuring gateways and routing, and integrating with billing and provisioning systems. Suggestions for maintenance after deployment are also provided.
This document discusses emerging wireless broadband technologies and business models. It provides an overview of technologies like Bluetooth, Wi-Fi, WiMAX and 1xEV-DO and how they complement each other by offering different throughput, range and applications. It examines how public WLANs can extend 3G coverage and looks at business models operators are using for WLAN services. It also discusses the unique role of WiMAX for wireless operators and how they can provide broadband access in new areas.
The document discusses the key changes between the new ISO 9001:2015 standard and the previous ISO 9001:2008 version. Some of the major changes covered include a new high level structure with different clause numbering, a stronger focus on leadership and organizational context, risk-based management approach, objectives must include plans for achievement and evaluation, increased emphasis on communication and awareness, and fewer prescriptive requirements regarding documentation.
ISO 9001 provides requirements for quality management systems to help organizations ensure customer satisfaction and compliance. ISO 14001 provides requirements for environmental management systems to help organizations minimize environmental impacts and improve performance. Both standards concern managing processes to meet objectives and can be applied to any organization. Certification is voluntary and involves an external audit to verify conformance, but many organizations benefit from implementing the standards without certification.
This document provides an overview of ISO 9000:2015, which defines quality management system fundamentals and terms. It discusses how ISO 9000:2015 is indispensable for understanding and applying ISO 9001:2015. Key changes in ISO 9001:2015 include new terms like "context of the organization", "interested parties", and "risk". ISO 9000:2015 also defines quality management principles and concepts to guide organizations.
The document provides information about ISO9001 and its applicability to the IT industry. It describes ISO9001 as an international standard for quality management systems issued by the International Organization for Standardization. The document outlines the history, benefits, and key aspects of ISO9001 such as management responsibility, quality systems, contract review, design control, and purchasing. It also compares ISO9001 to the Capability Maturity Model (CMM) and describes their similarities in areas like management responsibility, quality systems, contract review, and others.
This document summarizes key topics related to computer and internet security and privacy. It discusses types of computer crimes like hacking and different methods of securing systems through identification, access controls, and disaster recovery plans. It also covers topics like computer viruses, privacy issues with data collection, legislation, and protecting children online. The overall purpose is to explain security and privacy challenges with computers and provide guidance on best practices.
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Stone Art Hub
Stone Art Hub offers the best competitive Marble Pricing in Dubai, ensuring affordability without compromising quality. With a wide range of exquisite marble options to choose from, you can enhance your spaces with elegance and sophistication. For inquiries or orders, contact us at ☎ 9928909666. Experience luxury at unbeatable prices.
The Genesis of BriansClub.cm Famous Dark WEb PlatformSabaaSudozai
BriansClub.cm, a famous platform on the dark web, has become one of the most infamous carding marketplaces, specializing in the sale of stolen credit card data.
Navigating the world of forex trading can be challenging, especially for beginners. To help you make an informed decision, we have comprehensively compared the best forex brokers in India for 2024. This article, reviewed by Top Forex Brokers Review, will cover featured award winners, the best forex brokers, featured offers, the best copy trading platforms, the best forex brokers for beginners, the best MetaTrader brokers, and recently updated reviews. We will focus on FP Markets, Black Bull, EightCap, IC Markets, and Octa.
Industrial Tech SW: Category Renewal and CreationChristian Dahlen
Every industrial revolution has created a new set of categories and a new set of players.
Multiple new technologies have emerged, but Samsara and C3.ai are only two companies which have gone public so far.
Manufacturing startups constitute the largest pipeline share of unicorns and IPO candidates in the SF Bay Area, and software startups dominate in Germany.
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
How to Implement a Real Estate CRM SoftwareSalesTown
To implement a CRM for real estate, set clear goals, choose a CRM with key real estate features, and customize it to your needs. Migrate your data, train your team, and use automation to save time. Monitor performance, ensure data security, and use the CRM to enhance marketing. Regularly check its effectiveness to improve your business.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
Call8328958814 satta matka Kalyan result satta guessing➑➌➋➑➒➎➑➑➊➍
Satta Matka Kalyan Main Mumbai Fastest Results
Satta Matka ❋ Sattamatka ❋ New Mumbai Ratan Satta Matka ❋ Fast Matka ❋ Milan Market ❋ Kalyan Matka Results ❋ Satta Game ❋ Matka Game ❋ Satta Matka ❋ Kalyan Satta Matka ❋ Mumbai Main ❋ Online Matka Results ❋ Satta Matka Tips ❋ Milan Chart ❋ Satta Matka Boss❋ New Star Day ❋ Satta King ❋ Live Satta Matka Results ❋ Satta Matka Company ❋ Indian Matka ❋ Satta Matka 143❋ Kalyan Night Matka..
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
How MJ Global Leads the Packaging Industry.pdfMJ Global
MJ Global's success in staying ahead of the curve in the packaging industry is a testament to its dedication to innovation, sustainability, and customer-centricity. By embracing technological advancements, leading in eco-friendly solutions, collaborating with industry leaders, and adapting to evolving consumer preferences, MJ Global continues to set new standards in the packaging sector.
Best practices for project execution and deliveryCLIVE MINCHIN
A select set of project management best practices to keep your project on-track, on-cost and aligned to scope. Many firms have don't have the necessary skills, diligence, methods and oversight of their projects; this leads to slippage, higher costs and longer timeframes. Often firms have a history of projects that simply failed to move the needle. These best practices will help your firm avoid these pitfalls but they require fortitude to apply.
At Techbox Square, in Singapore, we're not just creative web designers and developers, we're the driving force behind your brand identity. Contact us today.
3. 3
About ALTTC
ADVANCED LEVEL TELECOM TRAINING CENTRE
(Premier Telecom Training Centre Of BSNL,Govt. Of India)
Awarded ITU CoE in following Excels ( 2019-2022)
• Cyber Security
• IoT (Internet Of Things)
• Wireless Broad Band(NGBN)
6. Quick Look:
• Where we are?
•Evolution In Web
•Cyber World
•What is Industry4.0
•CPS Classification & Description
•SDN In Industry 4.0
•5C Architecture of IIoT
8. 8
Internet appears everywhere in the world
It is primarily connection between people
Move from Internet of People Internet of Things
Internet of Things is a plan to connect
things also using the same medium
10. Quick Look:
Answer……….
Curiosity. Humans are curious. We questions a lot. We
are the ones who challenges the status of existing rules
and strive to build / produce something better. Such
curiosity & efforts have promised us a life where
electronic devices & machines will probably become our
best friend.Yes, its correct the vision to make machines
smart enough to reduce human labour to almost nil. The
idea of inter-connected devices where the devices are
smart enough to share information with us, to cloud
based applications and to each other (device to device).
12. Quick Look:
What Is Web?????
A network of fine threads constructed by a spider
from fluid secreted by its spinnerets, used to catch its
prey.
A complex system of interconnected elements.
In terms Of Internet Web is…….
Web pages are formatted in a language called
Hypertext Markup Language (HTML). ... The Web uses
HTTP protocol to transmit data and share information.
Browsers such as Internet Explorer, Google Chrome or
Mozilla Firefox are used to access Web documents,
or Web pages, which are connected via links.
14. India in 2021..
Immense Opportunities to explore new services and business models…
Source: Statista and Frost & Sullivan
Mobile
Internet Users
Social
Network Users
Pay TV
Subscribers
DTH Subscribers
Online
Video Viewers
IoT devices
Mobile Gamers
Internet Users
Online Video
Subscribers
Smartphones
15. Advanced Technologies Adoption to Address Challenges…
Source: Frost & Sullivan
Self
Organising
Networks
Software
Defined
Networks
(SDN)
Artificial
Intelligence
and Machine
Learning
Robotic
Process
Automation
Enable planning,
configuration, management,
optimization and self-
healing of mobile radio
access networks.
Network Function
Virtualisation (NVF)
Cloud Native
Business
Intelligence to
Artificial Intelligence
Automate non-
critical applications
and services
18. The next step in internet evolution
Source: Alcatel-Lucent
Pre-
internet
Internet of
CONTENT
Internet of
SERVICES
Internet of
PEOPLE
Internet of
THINGS
+ IP
networks
+ IT platforms
& services
+ devices
& apps
+ sensors,
more devices
& tags,
big data
“SOCIAL
MEDIA”
“WEB 2.0”
“WWW”
“HUMAN
TO
HUMAN”
• Fixed &
mobile
telephony
• SMS
• e-mail
• Information
• Entertainment
• …
• e-productivity
• e-commerce
• …
• Skype
• Facebook
• YouTube
• …
• Identification, tracking,
monitoring, metering, …
• Automation, actuation,
payment, …
• …
“MACHINE
TO
MACHINE”
+ ambient
context,
data
semantics
The Internet gave us the opportunity to connect in ways we could never have dreamed possible.
The Internet of Things will take us beyond connection to become part of a living, moving, global nervous system
20. Questions of interest
20
What is a CPS?
What are the security issues in CPS and how do they differ
from those in traditional information systems?
To what extent can a CPS be secured against cyber crime?
Are CPS/IOT/IIoT/Industry4.0/Digital Twin Same?
21. CPS
Cyber-Physical Systems comprise smart machines,
storage systems and production facilities capable of
autonomously exchanging information, triggering
actions and controlling each other independently. This
facilitates fundamental improvements to the industrial
processes involved in manufacturing, engineering,
material usage and supply chain and life cycle
management.
22. CPS
CPS is related to other popular terms including the Internet
of Things (IoT), Industry 4.0 or the Industrial Internet of
Things, but the term “CPS” is more foundational and
durable than all of these, because it does not directly
reference either implementation approaches (e.g.,
“Internet” in IoT) nor particular applications (e.g.,
“Industry” in Industry 4.0). It focuses instead of the
fundamental intellectual problem of conjoining the
engineering traditions of the cyber and phys-ical worlds
23. Cyber Physical Systems
A cyber-physical system (CPS) is a system of collaborating computational
elements controlling physical entities. CPS are physical and engineered systems
whose operations are monitored, coordinated, controlled and integrated by a
computing and communication core. They allow us to add capabilities to physical
systems by merging computing and communication with physical processes.
24. CPS
Cyber-Physical Systems (CPS) are integrations of
computation, networking, and physical processes.
Embedded computers and networks monitor and control
the physical processes, with feedback loops where
physical processes affect computations and vice versa.
The economic and societal potential of such systems is
vastly greater than what has been realized, and major
investments are being made worldwide to develop the
technology.
25. CPS
CPS integrates the dynamics of the physical processes
with those of the software and networking, providing
abstractions and modeling, design, and analysis
techniques for the integrated whole.
26. Computing Evolution
• Mainframe computing (60’s-70’s)
• Large computers to execute big data processing applications
• Desktop computing & Internet (80’s-90’s)
• One computer at every desk to do business/ personal activities
• Ubiquitous computing (00’s)
• Numerous computing devices in every place/ person
• “Invisible” part of the environment
• Millions for desktops vs. billions for embedded processors
• Cyber Physical Systems (10’s)
27. Biological Evolution
TOO SLOW!
The exponential proliferation of embedded devices (afforded by Moore’s
Law) is not matched by a corresponding increase in human ability to
consume information!
Increasing autonomy (human out of the loop)
28. What are Cyber-Physical Systems?
• Cyber – computation, communication, and control that
are discrete, logical, and switched
• Physical – natural and human-made systems governed
by the laws of physics and operating in continuous
time
• Cyber-Physical Systems – systems in which the cyber
and physical systems are tightly integrated at all
scales and levels
“CPS will transform how we interact with the physical world
just like the Internet transformed how we interact with one
another.”
33. What are Cyber-Physical Systems?
)
• Cyber-physical systems (CPSs
are physical and engineered
systems whose operations are
monitored, coordinated,
controlled and integrated by a
computing and communication
core.
• Convergence of
communication,
and control
computation,
information,
34. Why Cyber-Physical Systems?
• CPS allow us to add capabilities to physical systems
• By merging computing and communication with physical processes,
CPS brings many benefits:
• Safer and more efficient systems
• Reduce the cost of building and operating systems
• Build complex systems that provide new capabilities
• Technological and Economic Drivers
• The decreasing cost of computation, networking, and sensing
• Computers and communication are ubiquitous, enables national or global
scale CPSs
• Social and economic forces require more efficient use of national
infrastructure.
35. Characteristics of Cyber-Physical Systems
• Some defining characteristics:
• Cyber – physical coupling driven by new demands and applications
• Cyber capability in every physical component
• Large scale wired and wireless networking
• Networked at multiple and extreme scales
• Systems of systems
• New spatial-temporal constraints
• Complex at multiple temporal and spatial scales
• Dynamically reorganizing/reconfiguring
• Unconventional computational and physical substrates (Bio? Nano?)
• Novel interactions between communications/computing/control
• High degrees of automation, control loops must close at all scales
• Large numbers of non-technical savvy users in the control loop
• Ubiquity drives unprecedented security and privacy needs
• Operation must be dependable, certified in some cases
36. Characteristics Cyber-Physical Systems
• What they are not:
• Not desktop computing
• Not traditional, post-hoc embedded/real-time systems
• Not today’s sensor nets
• Goals of a CPS research program
• A new science for future engineered and monitored/controlled
physical systems (10-20 year perspective)
• Physical and cyber (computing, communication, control) design that
is deeply integrated
38. Why CPS is Significant?
• Building systems that integrate computational and physical objects requires new
systems science foundations.
• Fusion of physical and computational sciences
• Expected share of value of embedded computing components in the next five years:
• Automotive and airspace systems 30-40%
• Health/Medical equipment 33%
• Industrial automation 22%
• Telecommunications 37%
• Consumer electronics and Intelligent Homes41%
• CPS are the basic engine of innovation for a broad range of industrial sectors.
• This is the technology that transforms products, creates new markets and disrupts
the status-quo.
41. An industry is a group of companies that are related
based on their primary business activities. In modern
economies, there are dozens of industry
classifications, which are typically grouped into larger
categories called sectors.
48. 4th Industrial Revolutions
The term Industry 4.0 was first publicly introduced in 2011 as
“Industrie 4.0” by a group of representatives from different fields
(such as business, politics, and academia) under an initiative to
enhance the German competitiveness in the manufacturing
industry. The German federal government adopted the idea in its
High-Tech Strategy for 2020. Subsequently, a Working Group was
formed to further advise on the implementation of Industry 4.0.
49. From Germany to the World: Industry 4.0
IIoT by another name? That’s the essence of Industry 4.0. It
may be a measure of the importance and potential of the
new wave of technology revolutionizing manufacturing that it
has spawned so many initiatives. From Germany, a nation
with a nearly unmatched reputation in manufacturing, comes
Industry 4.0.
51. Did not exist in 2006
• iPhone
• iPad
• Kindle
• 4G
• Uber
• Airbnb
• Android
► Android
► Instagram
► Snapchat
► Whatsapp
52. Time to reach 100 Million customers
• Telephone 75 Years
• Web 7 Years
• Facebook 4 Years
• Instagram 2 Years
53. The term Industry 4.0 refers to the combination of
several major innovations in digital technology, all
coming to maturity right now, all poised to transform the
energy and manufacturing sectors.
54. These technologies include advanced robotics and artificial
intelligence; sophisticated sensors; cloud computing; the Internet
of Things; data capture and analytics; digital fabrication
(including 3D printing); software-as-a-service and other new
marketing models; smartphones and other mobile devices.
55. CPS Description & Classification
Cyber Physical Systems (CPS) are designated as essential com-
ponents of the Industrial Internet of Things (IIoT), and they
are supposed to play a key role in Industry v4.0. CPS enables
smart applications and services to operate accurately and in
real-time. They are based on the integration of cyber and
physical systems, which exchange various types of data and
sensitive information in a real-time manner. The development
of CPS is being carried out by researchers and manufacturers
alike . Given that CPS and Industry v4.0 offer a significant
economic potential , the German gross value will be boosted
by a cumulative of 267 billion Euros by 2025 upon the
introduction of CPS into Industry v4.0.
58. • First mentioned in 1999 by the MIT Auto-ID Center.
• IoT meant to “create a universal environment in which
computers understand the world without human
intervention.”
• IoT was simply the tool that would be used to merge the
worlds of bits and atoms.
• Over 15 years after its inception, IoT is now seen as a
modern, fresh concept in our connected world…with
many different definitions.
59. IoT Overview
IoT Definition
Note1 - Through the exploitation of identification, data capture, processing and
communication capabilities, the IoT makes full use of things to offer services to all
kinds of applications, whilst ensuring that security and privacy requirements are
fulfilled.
Note 2 – From a broader perspective, the IoT can be perceived as a vision with
technological and societal implications.
59
A global infrastructure for the information society, enabling advanced services by
interconnecting (physical and virtual) things based on existing and evolving
interoperable information and communication technologies
International Telecommunication Union (ITU)
65. What exactly::::::::IoT or IIoT
Formula:
IoT=IT+OT=IIoT
As the infrastructure around the world becomes
more connected via sensors, machine learning, and
analytics, the Industrial Internet of Things (IIoT) has
the potential to significantly impact businesses
worldwide.
65
68. Interoperability Information transparency
Technical assistance Decentralized decisions
Industry 4.0
Design Principles
Internet of Things (IoT)
Internet of People (IoP)
Digital plant models
virtual copy of the physical world
The ability of cyber physical systems to
physically support humans by conducting
a range of tasks.
The ability of cyber physical systems to
make decisions on their own and to
perform their tasks as autonomous as
possible.
72. Moving From Factory To Smart Factory
With the advent of Industry 4.0,
manufacturing companies are going
through a fascinating era, where the
digital wave unbolted fresh paths for
enhancing the design process, improving
the manufacturing cycle, and provide
better service to end users.
73. Moving From Factory To Smart Factory
This smart factory ecosystem is growing
continually and provide new possibilities to
improve the metrics and enhance operational
efficiency of products that are already in use.
Not limited to the product manufacturing
companies, every industry has started
adapting to digital systems to ensure upsurge
in revenue.
74. Enabler Technologies in CPS/IIoT
• Big Data
• Cloud Computing
• SDN
• Connectivity Communication Technologies
77. Big Data Is..
It is all about better Analytic on a broader
spectrum of data, and therefore
represents an opportunity to create even
more differentiation among industry
Big Data are “data sets that are so big
they cannot be handled efficiently by
common database management systems
78. Data Measures
Large – 1000 MB (1 gigabyte or GB) The Large bucket
offers 1 gigabyte and means not really having to
worry about mobile data. With four devices under a
plan, each can use 250 MB. That means 713 emails a
piece, 250 minutes of streaming music each or more
than 1390 web pages.
78
80. Where Is This “Big Data” Coming From ?
12+ TBs
of tweet data
every day
25+ TBs
of
log data
every
?
TBs
of
data
every
day
30 billion RFID
tags today
(1.3B in 2005)
4.6
billion
camera
phones
world
wide
100s of
millions
of GPS
enabled
devices
sold
annually
76 million
smart meters
in 2009…
200M by 2015
81. Few facts
The New York Stock Exchange generates about one
terabyte of new trade data per day.
81
82. Few facts
Statistic shows that 500+terabytes of new data gets
ingested into the databases of social media
site Facebook, every day. This data is mainly
generated in terms of photo and video uploads,
message exchanges, putting comments etc.
82
83. Few facts
Single Jet engine can generate 10+terabytes of data
in 30 minutes of a flight time. With many thousand
flights per day, generation of data reaches up to
many Petabytes.
83
84. Volume
of Tweets
create daily.
12+terabytes
Variety
of different
types of data.
100’s
Veracity
decision makers trust
their information.
Only 1 in 3
With Big Data, We’ve Moved into a New Era of
Analytics
trade events
per second.
5+million
Velocity
85. Types Of Big Data
Big data' could be found in three forms:
• Structured
• Unstructured
• Semi-structured
85
86. Big Data(4Vs Concepts)
86
"The goal is to turn data into information, and
information into insight.”
– Carly Fiorina, former chief executive of Hewlett-Packard Company.
87. Big Data Technologies
Cloud Computing Parallel Computing
NoSQL Databases
Machine Learning
Data Visualization
General Programming
88. Big Data Analytics For Industry 4.0
Source: ITU
88
• Descriptive Analysis
“What has happened?”
• Predictive Analysis
“ What could happen?”
• Prescriptive Analysis
“What should we do?”
94. What is CPS?(Cloud Manufacturing System)
• Resource layer. This layer belongs to the provider domain,
encompassing manufacturing resources for the complete
product lifecycle from different geographically distributed
providers.
• Perception layer. This layer is responsible for intelligently
sensing manufac- turing resources using IoT technologies,
enabling them to be connected to the cloud manufacturing
platform so as to achieve communication and interactions
between a cloud platform and real resources involved such as
remote moni- toring, prognosis, and control
95. What is CPS?(Cloud Manufacturing System)
• Virtualisation layer. This layer is responsible for virtualising
manufacturing resources and capabilities and encapsulating
them into manufacturing cloud services that can be accessed,
invoked, and deployed by using virtualisation technologies,
service-oriented technologies, and cloud computing
technologies. The manufacturing cloud services are classified
and aggregated according to specific rules and algorithms,
and different kinds of manufacturing clouds can thus be
constructed.
96. What is CPS?(Cloud Manufacturing System)
• Cloud service layer (i.e. core middleware). This layer devotes
to system, service, resource, and task management, and also
supports various service activities and applications such as
service description, registration, publication, composition,
monitoring, scheduling, and charging.
97. What is CPS?(Cloud Manufacturing System)
• Application layer. Depending on providers and their offered
manufacturing cloud services, dedicated manufacturing
application systems such as collabo- rative design,
collaborative manufacturing, collaborative simulation, and
col- laborative supply chain can be aggregated. Consumers
can browse and access these application systems for manual
or automatic service configurations. A manufacturing
resource provider provides consumers with the ability to
select from different possible part properties and
predetermined manufacturing con- straints (sizes, materials,
tolerances, etc.).
98. What is CPS?(Cloud Manufacturing System)
• Interface layer. As the name implies, this layer serves as
an interface between consumers and the cloud platform,
providing consumers with an interface for submitting
their requirements and browsing available services. The
interface supports manual selection and combination of
available services, as well as automatic cloud-generated
suggested solutions.
• Knowledge layer. This layer provides knowledge needed
in the different layers above for virtualisation and
encapsulation of resources, manufacturing domain
knowledge, process knowledge, etc.
99. What is CPS?(Cloud Manufacturing System)
• Security layer. This layer provides strategies,
mechanisms, functions and ar- chitecture for cloud
manufacturing system security .
• Communication layer. This layer provides a
communication environment for users, operations,
resources, services, etc. in the cloud manufacturing
system.
110. New Dimensions In visualization(AR)
Augmented reality (AR) is an interactive experience
of a real-world environment where the objects that
reside in the real world are enhanced by computer-
generated perceptual information, sometimes across
multiple sensory modalities,
including visual, auditory, haptic, etc
112. New Dimensions In visualization(VR)
Virtual reality(VR) is the term used to describe a
three-dimensional, computer generated
environment which can be explored and interacted
with by a person. That person becomes part of
this virtual world or is immersed within this
environment and whilst there, is able to manipulate
objects or perform a series of actions.
120. Connectivity in Industry 4.0
Source: ITU
120
• The Object Management Group’s (OMG) Data Distribution
Service for Real-Time Systems (DDS)
• OASIS’ Advanced Message Queuing Protocol (AMQP).
• MQ Telemetry Transport (MQTT), a protocol originally
developed by IBM but now an OASIS standard.
• Representational State Transfer (REST), a common style of
using HTTP for Web-based applications and not a standard.
• Constrained Application Protocol (CoAP), a software protocol
to be used in very simple electronics devices such as Wireless
Sensor Networks (WSN) that allows them to communicate
over the Internet.
128. 128
Software, the Great Enabler
• Good news: anything is possible in software!
• Bad news: anything is possible in software!
129. 129
Security Challenges in CPS
1
2
9
Despite their numerous advantages, CPS systems are
prone to various cyber and/or physical security threats,
attacks and challenges. This is due to their
heterogeneous nature, their reliance on private and
sensitive data, and their large scale deployment.
130. 130
Security Challenges in CPS
1
3
0
As such, intentional or accidental exposures of these
systems can re- sult into catastrophic effects, which
makes it critical to put in place robust security measures.
However, this could lead to unacceptable network
overhead, especially in terms of latency. Also, zero-day
vulnerabilities should be minimized with constant
software, appli- cations and operating system updates.
138. 138
Privacy is not Secrecy
Privacy is not Secrecy!
• Privacy: the ability to prevent unwanted transfer of information (via
inference or correlation) when legitimate transfers happen.
• But privacy is not secrecy!
• Privacy problem: disclosing data provides informational utility while
also enabling potential loss of privacy
– Every user is potentially an adversary
– Encryption is not a solution!
?= Eve
139. 139
Privacy versus Secrecy
Privacy vs. Secrecy!
• Privacy: the ability to prevent unwanted transfer of information (via
inference or correlation) when legitimate transfers happen.
• But privacy is not secrecy!
• Secrecy Problem: Protocols and primitives clearly distinguish a
malicious adversary vs. intended user and secret vs. non-secret
data.
– Encryption may be a solution.
140. 140
CPS Vulnerability
Are your energy, healthcare, water, shipping,
transportation systems vulnerable to network attacks?
What, if any, are the vulnerabilities in such systems?
When exploited, how might such vulnerabilities affect
people?
141. 141
CPS Control systems
Are the control systems in your large and critical CPSs
systems robust enough to withstand deception
attacks?
Are these control systems programmed to
withstand denial of service attacks?
142. 142
Surviving from Physical attacks
• What happens if we lose part, or even most
of the computing systems?
• Will redundancy alone solve the problem?
• How to measure and quantify of resilience
of current systems?
• How to ensure high availability of CPS?
143. 143
Defending Against Device Capture Attack
• Physical devices in CPS systems may be
captured, compromised and released back by
adversaries.
• How to identify and ameliorate the system
damage with trusted hardware but potentially
untrusted/modified software?
143
144. 144
Real-Time Security in CPS
• CPS often requires real-time responses to
physical processes
• Little Study on how attacks affect the real-
time properties of CPS
• How to guarantee real-time requirements
under attack?
145. 145
Concurrency in CPS
• CPS is concurrent in nature, running
both cyber and physical processes
• Little research on handling large-
scale concurrent systems
146. 146
Collaboration and Isolation
• CPS needs to effectively isolate attackers while
maintaining collaborations among different,
distributed system components
• How to avoid cascading failures while
minimizing system performance degradation?
150. 150
Safety and security in IoT
1
5
0
The intimate relationship between security and safety
concerns in OT environments cannot be understated.
Recall, in contrast, that IT security experts will reference
the traditional confidentiality, integrity, and availability
(CIA) model of threats. The goal of IT security thus
becomes putting functional or procedural controls in place
that will cost-effectively reduce the CIA-type risks to data
assets.
151. 151
Safety and security in IoT
1
5
1
OT experts have a different set of objectives in mind.
Obviously, they must deal with the goal of preventing
information leaks, malware infections, and availability
attacks; but their primary mission emphasis is on
safety. That is, to an OT security professional, the
most critical objectives involve assurance of safe,
sound operation of OT infrastructure in a manner that
avoids human casualties and lost production for
large, costly physical assets.
162. 162
Technology In Disaster Management
The CEO of the technology company, Jordi Casamada,
assures that with this solution could have avoided the
confinement in which many countries around the world
are immersed: “With our wristband, if someone
tested positive from Covid-19 we can isolate
efficiently only those who have had contact with
him and who may therefore be infected. This
wristband would act as a firewall.”
164. 164
Technology In Disaster Management
It is a wristband that works through Bluetooth technology and
that detects other wristbands like it, which are at a maximum
distance of 6 feet or 2 meters. The wristband makes contact
tracing: it registers the people it has had contact with over the
last 15 or 30 days, and when one of them has symptoms of
Covid-19 it is automatically sent to the medical center. This
information is evaluated and all the contacts of the last few
weeks are quarantined.
165. 165
Impact Of Covid 19 on Industry 4.0
Prior to the crisis, Industry 4.0 was an area of great
interest to many manufacturers.
It was an exciting topic with huge potential benefits
and was widely regarded as a ‘positive’ and future
thinking topic.
Today, many of us are focused on the here and
now. Our health and that of our family, friends and
colleagues; the ability to access the food and
supplies we need; our job security; the financial
impact on our employers, clients and partners.
166. 166
Impact Of Covid 19 on Industry 4.0
Prior to the crisis, Industry 4.0 was an area of great
interest to many manufacturers. It was an exciting topic
with huge potential benefits and was widely regarded
as a ‘positive’ and future thinking topic.
Today, many of us are focused on the here and now.
Our health and that of our family, friends and
colleagues; the ability to access the food and supplies
we need; our job security; the financial impact on our
employers, clients and partners.
167. 167
Impact Of Covid 19 on Industry 4.0
Beyond that we also have to consider the wider
economic impact and the unknown amount of time it
will take for things to return to some level of normality.
The business drivers of Industry 4.0 pre-crisis were
focused on competitive advantage, cost reduction,
productivity, sustainability and innovation. The goal was
to make well run businesses run better.
168. 168
Impact Of Covid 19 on Industry 4.0
The priorities for most manufacturers today fall into
three distinct phases:
Phase 1 – Survival
Phase 2 – Recovery
Phase 3 – Business as Usual in the new post-crisis
paradigm.
169. 169
Impact Of Covid 19 on Industry 4.0
The priorities for most manufacturers today fall into
three distinct phases:
Phase 1 – Survival
Phase 2 – Recovery
Phase 3 – Business as Usual in the new post-crisis
paradigm.
170. 170
Impact Of Covid 19 on Industry 4.0
The goal for all manufacturers will be to get to Phase
3 as soon as possible and at the lowest cost.
In defining the operating model for Phase 3 they will
factor in lessons learned from the crisis and try to build
a more resilient and agile business.
171. 171
The role of Industry 4.0 in the future
Will Help to make sure that more companies
survive.
Shorten the recovery phase and help return
businesses to normal operations as soon as possible
Provide the platform to develop new, more resilient
businesses in the medium to long term
172. 172
The role of Industry 4.0 in the future
Industry 4.0 can achieve this because many of the
capabilities it offers could have greatly reduced the
impact of this crisis on us all.
173. 173
The role of Industry 4.0 in the future
Real-time visibility into the availability of raw
materials, finished goods, WIP, people and assets
Use of artificial intelligence and machine learning to
constantly reassess and re-plan activities
Robotic process automation (RPA) to support non-
value add labour intensive activities
The use of mobile technology and augmented / virtual
reality to enable workers to perform tasks they were not
trained for more easily. This could have assisted with
skills shortages due to self-isolation or repurposing of
manufacturing
174. 174
The role of Industry 4.0 in the future
The same technologies together with digital twins and
remote support from OEM’s would improve availability
of assets
The same technologies could also have enabled
more remote and virtual working to help with the issue
of lockdown and social distancing
3D printing of spare parts that were stuck in the
supply chain
175. 175
It is undeniable that the success or failure of telecoms
depends on their adoption rate of Disrutive technology. In
2020, telecoms can attain a competitive edge, flexibility,
agility, and capacity to capture more opportunities by
adopting telecom trends. Companies can address antitrust
issues by adopting AI to enhance data security.
Conclution
Slide courtesy of Evanhoe and Associates
176. 176
• The Advanced technologies have been around for a long
time.
• Advances in communication and connectivity are allowing
the “interconnectedness” needed for IoT/IIoT
• The value is in the data not the connections
• The data allows you to make autonomous decision based
on business rules closer to the edge
It’s all about the data!
Slide courtesy of Evanhoe and Associates
177. 177
“Overall, COVID-19 will increase the rate of digital
transformation,the virtualization of trials and direct
patient interaction(Telemedicine) will become much
more commonplace; sponsors and site staff will have
access to even more metrics and data remotely than
available previously.”
Final Thoughts
178. 178
•Need to develop technologies guided by policies to
address security and privacy issues throughout the
lifecycle of the data.
•Need to understand not only the impact of AI & IoT
and its ubiquitous data collection, use and analysis,
also need to formulate appropriate laws and policies for
such activities.
Final Thoughts
181. 181
18
1
1/7/2023 Course Name / Topic Name
18
1
1/7/2023 Course Name / Topic Name
18
1
1/7/2023
Society In the Era of AI
.
182. 182
What Next……….
Technologies Always Demand Next…….
What Next.....???????
(Big Data/Machine Learning/Deep
Learning/Robotics/AI)
Where We are Moving…………
Society 5.0
Humanity 2.0
Life 3.0
183. 183
When Covid 19 will End……….??????
Question in Everybody Mind……………….