This presentation provides the various protocol used in internet of things environment. This presentation also provides brief information about Bluetooth Low Energy and Zigbee protocols and its applications.
This presentation provides the information about zigbee network functionalities. The procedure of Zigbee Personal Area Network creation, joining with the Personal Area Network, Allowing the device, routers to join & leave the network.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
The document discusses various components of IoT including control units, communication modules, and wireless technologies. Control units include sensors and actuators that convert physical phenomena into electrical signals. Common sensors detect humidity, temperature, motion etc. Communication modules allow connection and data transfer between IoT devices using short-range wireless technologies like Bluetooth, Zigbee and WiFi. Bluetooth supports audio/video transfer while Bluetooth Low Energy focuses on low power. Zigbee is optimized for large sensor networks with low data rates and power consumption.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows devices such as phones, laptops, headphones, and other portable devices to connect to each other and establish ad-hoc networks. Bluetooth operates in the unlicensed ISM band between 2.4-2.48 GHz using frequency hopping to prevent interference. Devices connect in a master-slave topology where one device is the master and up to seven can connect as slaves in a piconet. Bluetooth uses protocols like L2CAP, RFCOMM, and OBEX to transfer data and supports profiles for services like file transfer, synchronization, and telephony. Security in Bluetooth includes authentication, authorization, and encryption at different security levels.
This document summarizes Bluetooth Low Energy (BLE) and how it can be used to attack Internet of Things (IoT) devices. It provides an overview of the BLE protocol stack and pairing mechanisms. It then describes four case studies of attacking IoT devices via BLE, including sniffing traffic, manipulating GATT configurations, man-in-the-middle attacks, and denial of service attacks. The goal is to illustrate how understanding the BLE protocol can enable compromising IoT security.
CuTech Talks- Art of Building IoT Products event held on 9th January 2016 at Cumulations Technologies. This PPT covers the topic "IoT Protocols" presented by Nagasai Panchakarla.
This presentation provides the information about zigbee network functionalities. The procedure of Zigbee Personal Area Network creation, joining with the Personal Area Network, Allowing the device, routers to join & leave the network.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
The document discusses various components of IoT including control units, communication modules, and wireless technologies. Control units include sensors and actuators that convert physical phenomena into electrical signals. Common sensors detect humidity, temperature, motion etc. Communication modules allow connection and data transfer between IoT devices using short-range wireless technologies like Bluetooth, Zigbee and WiFi. Bluetooth supports audio/video transfer while Bluetooth Low Energy focuses on low power. Zigbee is optimized for large sensor networks with low data rates and power consumption.
Bluetooth is a wireless technology standard for exchanging data over short distances. It allows devices such as phones, laptops, headphones, and other portable devices to connect to each other and establish ad-hoc networks. Bluetooth operates in the unlicensed ISM band between 2.4-2.48 GHz using frequency hopping to prevent interference. Devices connect in a master-slave topology where one device is the master and up to seven can connect as slaves in a piconet. Bluetooth uses protocols like L2CAP, RFCOMM, and OBEX to transfer data and supports profiles for services like file transfer, synchronization, and telephony. Security in Bluetooth includes authentication, authorization, and encryption at different security levels.
This document summarizes Bluetooth Low Energy (BLE) and how it can be used to attack Internet of Things (IoT) devices. It provides an overview of the BLE protocol stack and pairing mechanisms. It then describes four case studies of attacking IoT devices via BLE, including sniffing traffic, manipulating GATT configurations, man-in-the-middle attacks, and denial of service attacks. The goal is to illustrate how understanding the BLE protocol can enable compromising IoT security.
CuTech Talks- Art of Building IoT Products event held on 9th January 2016 at Cumulations Technologies. This PPT covers the topic "IoT Protocols" presented by Nagasai Panchakarla.
harmonization of Internet of Things (IoT) devices and systems. This standard defines a method for data sharing, interoperability, and security of messages over a network, where sensors, actuators, and other devices can interoperate, regardless of underlying communication technology.
APIs enabling IoT summarizes how APIs act as the backbone that connects wireless sensors, big data, and applications in the Internet of Things. It discusses how APIs allow devices and things to be connected and interact, giving examples like Nest using APIs for its smart home products. The document also categorizes different types of web service APIs commonly used for IoT, including SOAP, XML-RPC, JSON-RPC, and REST. Finally, it briefly mentions some popular IoT platform tools and standardization efforts in the IoT/M2M space.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
LoRaWAN is an open standard for wireless communication targeted at low-power wide-area networks. It uses a proprietary radio protocol called LoRa to allow long-range communication at low bit rates. LoRaWAN defines the communication protocols and system architecture for end devices, gateways, and network servers. Key entities include end devices that communicate with gateways, network servers that coordinate communication, and application servers that interface with end user applications. [END SUMMARY]
Internet of Things requires communication to devices that are either actuators or sensors. Each actuator and sensor has an identity. Each actuator and sensor may be either directly connected to the world wide web or indirectly connected via a type of gateway.
Communication to these devices needs to be reliable. Therefore each device may implement their most suitable communication protocol.
This deck describes the main common protocols and their usage for the Internet of Things
Charles Gibbons
apicrazy.com
The document discusses wireless sensor network challenges and various wireless communication standards. It introduces Zigbee as a new low power protocol for wireless sensor networks (WSN). Zigbee is based on the IEEE 802.15.4 standard and targets applications that require low data rates, long battery life, and secure networking. It provides features like mesh networking, an extended 64-bit addressing scheme and encryption for reliable and secure communication in WSNs.
This document discusses the key concepts and components of embedded IoT and physical devices. It describes the four pillars of IoT as M2M, RFID, WSN and SCADA. It then explains the Device-Connect-Manage model and provides examples of IoT physical devices like the Raspberry Pi. The document outlines the basic building blocks of an IoT device and covers interfaces and programming of the Raspberry Pi.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
This document compares connectivity standards and protocols for connecting "things" to the Internet, including ZigBee, Z-Wave, and Bluetooth. It provides overviews of each standard, discussing their protocol stacks, frequency bands used, data rates, and other key specifications. ZigBee supports mesh networking and application profiles for different industries. Z-Wave uses sub-1GHz bands and supports full mesh networking with AES encryption. Bluetooth's goal is cable replacement between mobile devices using the 2.4GHz band, and it includes Classic and Low Energy versions.
This presentation about LoRaWan was held at #sitfra SAPInsideTrack Frankfurt and shows
- LoRaWan basics,
- current IoT plan in Heidelberg & Rhein Neckar region and
- guidance on how to setup your public IoT effort.
The document discusses the ZigBee technology. It provides an overview of ZigBee, including its key characteristics such as low power consumption, low cost, high density of nodes, and simple protocol. It also discusses ZigBee's target markets such as home automation, industrial control, and healthcare. The document compares ZigBee to Bluetooth and power line communication technologies.
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139Premier Farnell
The document provides an overview of the JN5139 wireless microcontroller from Jennic Ltd. It has an IEEE 802.15.4 compliant transceiver and supports ZigBee applications. It features a 32-bit RISC processor, various peripherals including ADCs and timers, and low power characteristics making it suitable for wireless sensor networks and other applications. The document describes the microcontroller features and architecture, transceiver details, and JenNet protocol stack.
This document provides an overview of Bluetooth Low Energy (BLE) implementation including the BLE protocol stack, profiles, services and characteristics. It describes the software architecture, states and roles in BLE connections. Details are given on implementing BLE on a CC2541 development kit including defining UUIDs, adding services, handling events and using callbacks. Reference materials for BLE development are also listed.
RF Code provides real-time asset management and environmental monitoring solutions using wireless hardware and software platforms. Their solutions use radio frequency identification (RFID) tags and sensors to track physical assets and monitor environments without wires. RF Code's product portfolio includes active RFID tags for assets and sensors, wireless readers that collect tag data, and software applications for asset tracking, sensor monitoring, and data visualization. Their solutions can provide zone-level, rack-level, or room-level asset visibility for distributed assets and data centers.
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s) Zarnigar Altaf
This document compares the ZigBee and Bluetooth personal area network (PAN) standards. It explains that ZigBee is designed for low data rate, low power wireless sensor and control networks, while Bluetooth focuses on connectivity between devices like laptops and PDAs. The document outlines key differences in data rates, power consumption, packet sizes, response times, topologies, and security measures between the two standards. ZigBee is presented as better suited for applications requiring low power consumption and quick response times from small sensor devices, while Bluetooth is intended for regular data transfer between larger mobile devices.
Radio Frequency Identification Technology In IOTNikhil Patankar
RFID uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of tags with stored data and antennas, readers with antennas, and host software. Issues include technical problems, standards, interference, privacy concerns if tags can be read without consent or linked to personal information. Applications include tracking goods, persons, toll payments, baggage, and events. Wireless sensor networks use distributed autonomous sensors to monitor conditions and cooperatively share data through the network. The EPCglobal framework establishes standards for product identification and data sharing between subscribers using Electronic Product Codes and EPC Information Services. IPv6 was developed as IPv4's 32-bit address space is insufficient for the vast number of devices in the Internet of
The document discusses various topics related to Internet of Things (IoT) including IoT concepts to master, embedded systems, Arduino boards, analog and digital input/output, serial communication, cloud platforms, IoT protocols like MQTT and CoAP. It provides an overview of getting started with Arduino, interfacing sensors like PIR, and communicating with cloud platforms.
The document discusses the growth of the Internet of Things (IoT) from personal computers to smartphones and a wide range of connected devices. By 2020, it is estimated that there will be over 34 billion connected devices worldwide. While businesses and governments are major investors and users of IoT technologies, adoption by consumers has been slower due to high costs and security/privacy concerns. Infrastructure limitations and a confusing array of new networks have also slowed the IoT's development. However, investments in cybersecurity are expected to rise in response to recent hacks of IoT devices.
1. The document discusses the relationship between humans and technology in the context of the Internet of Everything. It notes that while sensors allow the measurability of humans and apps/clouds provide analysis, algorithms need to be treated with care to avoid reducing humans to mere instruments or things.
2. It warns that a lack of care with algorithms can result in "an oops" or something more serious, like technology overriding human control as in a story of a jeep with jammed electronics.
3. The document concludes by arguing that technology should align with long-term societal needs and that real conversation is with humans rather than technology itself.
harmonization of Internet of Things (IoT) devices and systems. This standard defines a method for data sharing, interoperability, and security of messages over a network, where sensors, actuators, and other devices can interoperate, regardless of underlying communication technology.
APIs enabling IoT summarizes how APIs act as the backbone that connects wireless sensors, big data, and applications in the Internet of Things. It discusses how APIs allow devices and things to be connected and interact, giving examples like Nest using APIs for its smart home products. The document also categorizes different types of web service APIs commonly used for IoT, including SOAP, XML-RPC, JSON-RPC, and REST. Finally, it briefly mentions some popular IoT platform tools and standardization efforts in the IoT/M2M space.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
LoRaWAN is an open standard for wireless communication targeted at low-power wide-area networks. It uses a proprietary radio protocol called LoRa to allow long-range communication at low bit rates. LoRaWAN defines the communication protocols and system architecture for end devices, gateways, and network servers. Key entities include end devices that communicate with gateways, network servers that coordinate communication, and application servers that interface with end user applications. [END SUMMARY]
Internet of Things requires communication to devices that are either actuators or sensors. Each actuator and sensor has an identity. Each actuator and sensor may be either directly connected to the world wide web or indirectly connected via a type of gateway.
Communication to these devices needs to be reliable. Therefore each device may implement their most suitable communication protocol.
This deck describes the main common protocols and their usage for the Internet of Things
Charles Gibbons
apicrazy.com
The document discusses wireless sensor network challenges and various wireless communication standards. It introduces Zigbee as a new low power protocol for wireless sensor networks (WSN). Zigbee is based on the IEEE 802.15.4 standard and targets applications that require low data rates, long battery life, and secure networking. It provides features like mesh networking, an extended 64-bit addressing scheme and encryption for reliable and secure communication in WSNs.
This document discusses the key concepts and components of embedded IoT and physical devices. It describes the four pillars of IoT as M2M, RFID, WSN and SCADA. It then explains the Device-Connect-Manage model and provides examples of IoT physical devices like the Raspberry Pi. The document outlines the basic building blocks of an IoT device and covers interfaces and programming of the Raspberry Pi.
The document discusses various protocols and security aspects related to IoT. It provides details on protocols such as IEEE 802.15.4, BACnet, Modbus, KNX, Zigbee etc. It also outlines vulnerabilities in IoT like unauthorized access, information corruption, DoS attacks. Key elements of IoT security discussed are identity establishment, access control, data security, non-repudiation and availability. Security requirements and models for IoT are also mentioned.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
Internet of Things: Comparison of Protocols & StandardsAshu Joshi
This document compares connectivity standards and protocols for connecting "things" to the Internet, including ZigBee, Z-Wave, and Bluetooth. It provides overviews of each standard, discussing their protocol stacks, frequency bands used, data rates, and other key specifications. ZigBee supports mesh networking and application profiles for different industries. Z-Wave uses sub-1GHz bands and supports full mesh networking with AES encryption. Bluetooth's goal is cable replacement between mobile devices using the 2.4GHz band, and it includes Classic and Low Energy versions.
This presentation about LoRaWan was held at #sitfra SAPInsideTrack Frankfurt and shows
- LoRaWan basics,
- current IoT plan in Heidelberg & Rhein Neckar region and
- guidance on how to setup your public IoT effort.
The document discusses the ZigBee technology. It provides an overview of ZigBee, including its key characteristics such as low power consumption, low cost, high density of nodes, and simple protocol. It also discusses ZigBee's target markets such as home automation, industrial control, and healthcare. The document compares ZigBee to Bluetooth and power line communication technologies.
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139Premier Farnell
The document provides an overview of the JN5139 wireless microcontroller from Jennic Ltd. It has an IEEE 802.15.4 compliant transceiver and supports ZigBee applications. It features a 32-bit RISC processor, various peripherals including ADCs and timers, and low power characteristics making it suitable for wireless sensor networks and other applications. The document describes the microcontroller features and architecture, transceiver details, and JenNet protocol stack.
This document provides an overview of Bluetooth Low Energy (BLE) implementation including the BLE protocol stack, profiles, services and characteristics. It describes the software architecture, states and roles in BLE connections. Details are given on implementing BLE on a CC2541 development kit including defining UUIDs, adding services, handling events and using callbacks. Reference materials for BLE development are also listed.
RF Code provides real-time asset management and environmental monitoring solutions using wireless hardware and software platforms. Their solutions use radio frequency identification (RFID) tags and sensors to track physical assets and monitor environments without wires. RF Code's product portfolio includes active RFID tags for assets and sensors, wireless readers that collect tag data, and software applications for asset tracking, sensor monitoring, and data visualization. Their solutions can provide zone-level, rack-level, or room-level asset visibility for distributed assets and data centers.
COMPARISON OF SHORT RANGE WIRELESS NETWORKS (PAN’ s) Zarnigar Altaf
This document compares the ZigBee and Bluetooth personal area network (PAN) standards. It explains that ZigBee is designed for low data rate, low power wireless sensor and control networks, while Bluetooth focuses on connectivity between devices like laptops and PDAs. The document outlines key differences in data rates, power consumption, packet sizes, response times, topologies, and security measures between the two standards. ZigBee is presented as better suited for applications requiring low power consumption and quick response times from small sensor devices, while Bluetooth is intended for regular data transfer between larger mobile devices.
Radio Frequency Identification Technology In IOTNikhil Patankar
RFID uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of tags with stored data and antennas, readers with antennas, and host software. Issues include technical problems, standards, interference, privacy concerns if tags can be read without consent or linked to personal information. Applications include tracking goods, persons, toll payments, baggage, and events. Wireless sensor networks use distributed autonomous sensors to monitor conditions and cooperatively share data through the network. The EPCglobal framework establishes standards for product identification and data sharing between subscribers using Electronic Product Codes and EPC Information Services. IPv6 was developed as IPv4's 32-bit address space is insufficient for the vast number of devices in the Internet of
The document discusses various topics related to Internet of Things (IoT) including IoT concepts to master, embedded systems, Arduino boards, analog and digital input/output, serial communication, cloud platforms, IoT protocols like MQTT and CoAP. It provides an overview of getting started with Arduino, interfacing sensors like PIR, and communicating with cloud platforms.
The document discusses the growth of the Internet of Things (IoT) from personal computers to smartphones and a wide range of connected devices. By 2020, it is estimated that there will be over 34 billion connected devices worldwide. While businesses and governments are major investors and users of IoT technologies, adoption by consumers has been slower due to high costs and security/privacy concerns. Infrastructure limitations and a confusing array of new networks have also slowed the IoT's development. However, investments in cybersecurity are expected to rise in response to recent hacks of IoT devices.
1. The document discusses the relationship between humans and technology in the context of the Internet of Everything. It notes that while sensors allow the measurability of humans and apps/clouds provide analysis, algorithms need to be treated with care to avoid reducing humans to mere instruments or things.
2. It warns that a lack of care with algorithms can result in "an oops" or something more serious, like technology overriding human control as in a story of a jeep with jammed electronics.
3. The document concludes by arguing that technology should align with long-term societal needs and that real conversation is with humans rather than technology itself.
The panel discussion focused on careers in big data and the Internet of Everything. The moderator was Cherrie K. Fisher from AT&T and the panelists were Jennifer Jao from Toyota North America, Theresa Newton from IBM, Jennifer Bell who is a consultant, Rachel Unruh from Texas A&M, and Kayleen Helms from Intel Corporation. They discussed opportunities and challenges in these emerging fields.
This document discusses the growth of IoT connectivity and its benefits for businesses. It notes that the cost of sensors, bandwidth, processing, and storage have declined significantly in the last 10 years, enabling more widespread IoT adoption. Only 1% of things are currently connected, but that is projected to grow to 3 trillion connected things by 2020. A new global low-power wireless network dedicated to IoT devices can provide long-range connectivity at very low cost and power consumption. This network is being rolled out across countries to support various IoT applications in sectors like smart cities, utilities, healthcare, agriculture and more. Thinxtra is the exclusive operator of this SIGFOX network for Australia and New Zealand.
Connecting everything to the Internet of Things - even a TPRMarkus Van Kempen
The document discusses connecting a temperature and pressure reader (TPR) to the Watson IoT platform to monitor and get notifications on the device's status. It involves using Bluetooth to send the TPR's paper level, flow, and temperature readings to the IoT platform, then displaying the data on a dashboard and having Watson TextToSpeech and SpeechToText translate voice commands to check the TPR status. The demo also uses hardware components like an IR emitter and piezo, connected via cable and resistors, to represent the simulated TPR device.
The document discusses the history and concept of the Internet of Things (IoT). It defines IoT as the interconnectivity of physical devices, vehicles and buildings that are embedded with sensors, software and network connectivity to collect and exchange data without human interaction. Examples are provided of how IoT enables devices to automate tasks like turning on alarms, making coffee and setting temperatures. The document then covers the technical aspects of how IoT is implemented and how connected devices can work autonomously. It also discusses how IoT can provide benefits for businesses in areas like manufacturing, buildings, the environment and more.
The Internet of Things - Software is eating the world, Industry, and everythi...Martin Spindler
Slides for a talk I gave in Munich on Dec. 2nd, 2016, on invitation of Harvey Nash. Talking about the Impact of Software and the Internet of Things on several industries and some common fallacies when trying to come up with strategies surrounding IoT.
The impact of the Internet of Things (IoT) on telcos, datacenter, and utilitiesTom Raftery
This talk describes how the Internet of Things (IoT) is causing an explosion of data, and the implications this will have on the telco, utility and data centre industries.
I explain the slides one-one in this blog post https://tomraftery.com/2016/06/07/the-internet-of-things-trends-for-the-telecoms-data-centre-and-utility-industries/
Internet of Things Innovations & Megatrends Update 12/14/16Mark Goldstein
Mark Goldstein, President, International Research Center (http://www.researchedge.com/) presented an Internet of Things Innovations & Megatrends Update to the IEEE Computer Society Phoenix Chapter (http://ewh.ieee.org/r6/phoenix/compsociety/) on Wednesday, December 14, 2016 bringing up to date his presentation to the Chapter a year earlier. His long-form presentation explores the next Internet wave, the Internet of Things (IoT), expected to connect tens of billions of new sensors and devices in the coming years. Waves of change will roll through home, business, government, industrial, medical, transportation, and other complex ecosystems. This presentation examines how IoT will be implemented and monetized creating new business models from pervasive sensor deployments and data gathering, accompanied by new privacy and security risks. And it explores IoT’s roadblocks and operational challenges, emerging standards and protocols, gateway and wireless integration, and big data strategies and opportunities.
The next big discovery after the .com boom is the internet of things. It is the technique to impart the ability to the non-living objects or our daily life gadgets to sense and understand from our surrounding environment.
If your job is to make things for the web, and the company you work for doesn’t build fitness trackers, or robots, or smart light bulbs, or a cloud service that aims to connect all these things, you could be forgiven for not caring all that much about today's Internet of Things. My aim with this talk is to shift the conversation away from things and back to people. In doing so, I hope to also arm you with tools to better understand, and find your place, within this complex but fascinating landscape.
First presented at Generate Conference in San Francisco on July 15, 2016.
Purpose: The slides provide an overview on the Internet of Things trend
Content: Summary information about the Internet of Things marketplace, including trends drivers, spending trends, industry business cases, and adoption challenges. Also included are links to additional resources.
How To Use This Report: This report is best read/studied and used as a learning document. You may want to view the slides in slideshow mode so you can easily follow the links
Available on Slideshare: This presentation (and other HorizonWatch Trend Reports for 2016) will be available publically on Slideshare at http://www.slideshare.net/horizonwatching
Please Note: This report is based on internal IBM analysis and is not meant to be a statement of direction by IBM nor is IBM committing to any particular technology or solution.
As an introduction to the different aspects of the Internet of Things, this presentation covers everything from terminology and history to applications and explanation of different layers of IoT.
This was presented on July 27th 2016 at Monenco Iran.
Lee Rainie will present findings from Pew Research Center’s report titled "The Internet of Things Will Thrive by 2025" to the American Bar Association Section of Science & Technology law on March 30, 2016. The report presents the views of hundreds of “technology builders and analysts” on the question of whether Internet of Things will have widespread and beneficial effects on the everyday lives of the public.
The document discusses 7 ways that companies are using Internet of Things (IoT) technology to gain insights and streamline operations. 1) Weka Health Care uses smart refrigerators equipped with sensors to remotely monitor vaccine storage temperatures. 2) Thyssenkrupp Elevator technicians use IoT sensors and augmented reality headsets to perform predictive maintenance on elevators. 3) Sandvik Coromant digitized expert knowledge and combined it with machine learning to provide personalized technical support to customers.
Chelsea Burns conducted an inquiry project to determine which cereal stays crunchiest in milk the longest out of Frosted Flakes, Apple Jacks, Cocoa Krispies, Pops, and Froot Loops. She put each cereal in a separate bowl with milk and observed them over time. She found that Frosted Flakes became soggy the fastest while Pops stayed crunchiest the longest. Based on this, she concluded that "gun-puffed" cereals like Pops maintain crunchiness in milk longer than "oven-puffed" or cooked cereals like Frosted Flakes.
Ultra-wideband (UWB) is a short-range, high-bandwidth wireless technology that can provide data transmission rates up to 480 Mbps. It operates by transmitting short pulses across a wide spectrum of frequency bands between 3.1-10.6 GHz. UWB offers advantages over other wireless technologies like Bluetooth and WiFi by providing faster data transfer speeds, better multipath performance, and precise localization capabilities. Potential applications of UWB include wireless USB, high quality video transmission, and radar/imaging systems.
A computer network allows computers to share resources and exchange information. There are several types of networks including local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) that span large geographical areas. Networks provide benefits like resource sharing, reliability, reduced costs, and improved communication. They connect using various wired and wireless technologies and different network topologies.
Understanding IT Network Security for Wireless and Wired Measurement Applicat...cmstiernberg
The document discusses network security considerations for merging IT and engineering networks. It provides an overview of common network security technologies for wired and wireless networks, including firewalls, VLANs, QoS, 802.11i/WPA2 encryption and authentication for wireless, and 802.15.4 security incorporated in ZigBee networks. The document emphasizes that properly implementing these security standards is critical to realizing the benefits of convergence while managing risks to process control and measurement systems.
The document discusses basic networking concepts including LANs, wireless LANs, network hardware, common network media, and Ethernet specifications. It defines a LAN as a group of computers and devices sharing resources within a small geographic area. Wireless LANs transmit over the air using unlicensed frequencies. Common network hardware includes hubs, switches, bridges, routers and network interface cards. Wired networks typically use copper or fiber optic cable, while wireless networks transmit over radio frequencies. The document provides examples of LAN implementations in home and business configurations.
The document summarizes the key aspects of ZigBee, a wireless networking standard targeted for low-power devices. It describes ZigBee's technical goals of low data rates, long battery life, and secure networking. It also outlines ZigBee's device types, network formation process, and traffic modes including beacon-enabled and non-beacon modes.
The document discusses the system design of multiprotocol IoT. It provides an overview of IoT capabilities and architecture, covering multiple protocols at both the application and lower layers. Requirements for IoT "Things" are outlined, such as functional modes, power consumption, and security considerations. Challenges for designing low-power IoT Things are also examined, along with potential solutions.
ZigBee is a wireless networking technology built on the IEEE 802.15.4 standard designed for low-power devices. It enables reliable, cost-effective networks for applications that require low data rates, long battery life, and secure networking. ZigBee is ideal for remote control and automation applications due to its low power consumption and long battery life. The technology uses small, low-power digital radios based on IEEE 802.15.4 and allows self-healing networks to be formed from transceivers. ZigBee networks are secured with 128-bit AES encryption and can connect thousands of devices together wirelessly.
This document provides an overview of computer networks and local area network (LAN) protocols. It discusses the uses of computer networks for business applications, home networks, mobile users, and some social issues. It then describes the structure of LANs and the key protocols involved, including the medium access control and logical link control sublayers. Specific LAN standards covered include Ethernet, IEEE 802.3, wireless LANs, bridges, switches, and virtual LANs.
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
The document summarizes the capabilities and features of the SpiderCloud Wireless Services Node, which is an enterprise small cell platform that supports both 3G and LTE radio access. The Services Node can control up to 100 small cell radio nodes across an area of over 1 million square feet, with a single platform that simplifies configuration, mobility management, and backhaul integration. It provides carrier-grade security, quality of service controls, and capabilities for self-optimizing networks and applications.
This document provides an overview of important networking concepts. It discusses data communication components and various transmission mediums including Ethernet, Fast Ethernet, Gigabit Ethernet, LocalTalk, Token Ring, FDDI, ATM, and wireless technologies. It also describes common network hardware such as hubs, switches, bridges, repeaters, routers, and NICs. Finally, it covers common network media including twisted pair, coaxial, fiber optic, and wireless and discusses specifications for Ethernet and optical fiber.
This is a ppt about the recent trends in tech and wireless communication. As the is good document to read we are requesting to study the wireless communal harmony and peace to you. Aster that I have a great day and I will be available from June to September to December to February to the same here to visit our frequently asked questions about HTML5.
And ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha Akshar cholk Thai ne na jato ko bhi 6 baje uthta hai ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye 5.
Bluetooth is a wireless technology standard that was created in 1998 to provide wireless connectivity between devices over short distances. It uses short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz and employs frequency hopping spread spectrum technology to enable communication between multiple devices. Bluetooth devices can operate in piconets with one master device and up to seven active slave devices, and multiple piconets can be joined together to form scatternets. Bluetooth supports both synchronous voice links and asynchronous data links between devices.
The document discusses several key protocols used in IoT applications:
1. Bluetooth, Zigbee, WirelessHART and Z-Wave are discussed as short-range wireless protocols suitable for personal area networks.
2. Long-range wide area network protocols discussed include LoRaWAN, LTE-M and NB-IoT which are designed for low-power wide area networks supporting millions of devices over large areas.
3. IEEE 802.11ah is presented as an alternative for energy-efficient WiFi designed for IoT applications in the sub-1GHz spectrum to provide longer range than typical WiFi.
Telecommunications and Network Security PresentationWajahat Rajab
This document provides an overview of telecommunications and network security concepts. It discusses data network types like LANs, WANs, intranets and extranets. It describes the OSI reference model and its layers. Wireless network technologies like FHSS, DSSS and OFDM are explained. Security issues with early WLAN standards like WEP are covered. Improved security protocols like WPA and WPA2 are also summarized. Common network attacks such as DNS poisoning, SYN floods, ARP poisoning and DDoS attacks are defined. Finally, the document outlines virtual private network concepts and components of intrusion detection systems and firewalls.
The document provides information about wireless networks and standards including IEEE 802.11 (Wi-Fi), Bluetooth, and WiMAX. It discusses the goals and architecture of wireless LANs and PANs, as well as standards like IEEE 802.11, Bluetooth, and their protocols. Key topics covered include the IEEE 802.11 standard including physical layer specifications and MAC architecture, Bluetooth architecture and piconet/scatternet topologies, and protocols in the Bluetooth and IEEE 802.11 stacks.
The document discusses the OSI model and networking fundamentals. It defines the seven layers of the OSI model from the physical layer to the application layer. It also compares the OSI model to the TCP model. The physical layer defines cables and physical components. The data link layer provides error-free transmission using frames and MAC addresses. The network layer uses IP addresses for routing. The transport layer segments messages and ensures reliable delivery. The session, presentation and application layers establish communication sessions and enable user applications.
This document discusses various WAN technologies and protocols. It covers circuit switching, message switching, packet switching, connection-oriented and connectionless services. Specific technologies covered include X.25, Frame Relay, ATM, ISDN, broadband ISDN, FDDI, satellite communication, polling, and ALOHA.
The document defines IoT as a global network of physical objects with sensors, actuators and connectivity that allows these objects to connect, interact and exchange data. It describes key characteristics of IoT including dynamic self-configuration, standard communication protocols, unique identities, and integration into information networks. The document also outlines the general physical design of IoT devices and some common link layer communication protocols used in IoT like Ethernet, WiFi, 6LoWPAN and various mobile standards. Finally, it notes that the network/internet layer is responsible for routing IP packets between networks using protocols like IPv4, IPv6 and 6LoWPAN.
Similar to Internet of Things Protocol - Session 2 (20)
This document outlines a C language programming course that will cover topics such as programming environments, data types, loops, functions, bit manipulation, linked lists, stacks, queues, trees, and sorting. The course will be taught over 12 sessions totaling 24 hours, with each session focusing on a different topic. Students will also complete a mini project assignment to enhance their programming skills. Upon completing the course, students will have learned the fundamentals of C programming and be able to develop Linux-based systems.
This presents the basic data types of python programming. Data types like Number, Strings, Lists, Tuples, Dictionary and etc. Also it presents the information about arithmetic, relational. bit-wise and assignment operators
This presents the installation procedure of python installer and also it provides the information about the basic input & output handling. This also presents the different arithmetic operators and relational operators.
This internship proposal outlines training programs in embedded systems, IoT, and software development. It provides 10 training plans for students in electronics and computer science, covering topics like C/C++, embedded systems, wireless technologies, Linux, computer vision, and cloud computing. The training includes both theoretical and practical components, with students completing a final year project. Interns can choose between 4-week daily or 12-week weekend schedules. The cost is INR 10,000 per student.
This document discusses WiFi technology, wireless devices, and wireless security. It provides an overview of WiFi including that it uses 2.4GHz and 5.8GHz bands and SSIDs to identify networks. Common wireless devices are access points, stations, routers, and repeaters. Basic security methods are disabling SSID broadcast and using MAC address filtering, but WPA2 is recommended. Instructions are given for configuring an ESP32 as a WiFi station to scan for networks and as a soft AP.
This helps to quick start with the NVDK-ESP32 Development Kit. This demonstrates the brief introduction about NVDK-ESP32, Esperrif IoT Development Framework environment setup, IDF Folder structure, OpenOCD setup, JTAG Debugger setup and communication with the board. Also it demonstrates procedure of loading application binaries and playing with xtensa-esp32-elf-gdb.
GPIO (General Purpose Input Output) pins on a microprocessor can be configured as either inputs or outputs and can be enabled or disabled. As inputs, the pins can be read to determine high or low voltage levels, and as outputs, the pins can be written to drive high or low voltages. GPIO pins can also be configured to trigger interrupts on certain voltage changes to help trigger program responses. The functionality of GPIO pins is controlled through various registers that determine pin directions, read pin states, set output states, and configure interrupt behavior.
This presents the information about Yocto BSP layer and its structure definitions. Also it provides the information about yocto bsp layer structure of UDOO NEO board and it also contains the source walk through of BSP layer.
Yocto is an open source project that provides tools and methods to create custom Linux-based systems for embedded devices. It uses a build system and configuration files to generate a customized root filesystem containing packages and tools specific to the target hardware. Users can create their own software layers and recipes to build new packages or customize existing ones.
This presentation briefs about the Open computer vision based image processing. This also provides the information about image, video reading writing and displaying. This presentation provides information about image basic parameters, image representation, playing with pixels, Image Color Space, Changing color spaces and operation over images. This presents the information about the Image Transformation techniques, Image Thresholding techniques, Image smoothening techniques, Image gradients and Canny Edge detection algorithms.
This presentation briefs about machine learning technologies, its various learning methodologies, its types. Also it briefs about the Open Computer Vision, Graphics Processing Unit and CUDA Frameworks.
This document provides an overview of Linux device drivers. It discusses what a device driver is, the Linux driver architecture, different driver classes like character and block drivers, kernel modules, driver initialization and cleanup functions, compiling and loading modules, module parameters, differences between modules and applications, and key concepts like major/minor numbers and file operations.
This presentation is about apache mynewt real time operating system. This also provides the bluetooth low energy api used for various profiles like Generic Attribute, Generic Access Profiles and etc
This presentation provides the information about bluetooth low energy concepts and architecture. This also provides information about various bluetooth low energy profiles and characteristics.
This presentation provides brief information about NXP i.MX6 Multi media processor & peripherals. Also this provides about the interfaces present in UDOO-NEO board. This gives brief introduction about the various peripheral interfaces like I2C, SPI, LVDS, DDR, EMMC, SD Card, RGB LCD, HDMI, Ethernet, etc.
This presentation provides an brief introduction about arduino hardware & its block diagram, integrated development environment, sketches, and USB programming. This also provides the arduino functions for digital input / output, inter intergrated circuit, serial peripheral interface, universal asynchronous serial interfaces.
This presentation provides the Hardware Architecture details to understand the Embedded Linux Fundamentals. This also briefs about various hardware & respective interface details of MarsBoard.
This presentation provides an brief introduction about the Embedded LInux using NXP I.MX6 Processor. This gives information about embedded linux architecture & components.
This presentation provides brief introduction about Hardware design basics. This also briefs about Hardware Design Process like Hardware Architecture Design, Schematics Design, PCB Layout Design. Introduction about KiCAD, open source EDA automation suite.
The document discusses Internet of Things (IoT) architecture and topologies. It describes how IoT connects physical devices via the internet, enabling them to send and receive data. Key components include IoT devices, gateways that facilitate communication between devices and the cloud, and the IoT cloud platform that stores and processes device data. The document outlines common IoT architectures, technologies, protocols, issues, and provides examples of IoT applications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
3. Bluetooth Low Energy
• Short Range communication technology
• Key for wearable IoT products
• Not designed for file transfer, more suitable
for small chunks of data
• Range : 50 – 150 meters
• Offer significantly reduced power
consumption
• Access internet via 6LowPAN directly
5. BLE – Physical Layer
• 2.4 GHz Industrial Scientific Medical Band
• 40 Radio channels with 2 MHz spacing
• Channel Types
– Advertising Channel
• Device discovery, connection establishment and broadcast
transmission
• Three channels assigned with center frequencies
– Data channel
• Bi directional communication between connected devices
• Adaptive Frequency hopping to avoid face interferences and
wireless propagation issues.
• 37 data channels available for communication.
6. BLE – Link Layer
• To broadcast data, it transmits data in advertising
channel through advertising channels
• Advertiser
– Device that transmits the advertising packets
– Advertising event : Transmission takes place in intervals.
– Sequentially uses each advertising channel
• Scanner
– Device only aim at receiving data through advertising
channel
• Data communication
– Requires them to connect to each other
7. BLE – Link Layer …
Standby Initiating
Advertising
(Advertiser)
Scanning
( Scanner )
Connected
Conn Failed
Initiate
Success
Master
Success
Slave
Conn Lost
Disconnection
8. BLE – L2CAP Layer
• Optimized, simplified protocol based on classic
bluetooth
• Data services handled in best approach without
retransmission and flow control
• Multiplex the data of higher three layers protocols,
ATT, SMP and Link Layer Signaling
• Segmentation and reassembly are not used
• Upper layer protocol data fits into max L2CAP
payload size – 23 bytes.
9. BLE – ATT Layer
• Defines communication between two devices, which are
server & client
• Server contains set of attributes
• Attribute is a data structure that stores information managed
by GATT.
• Client or Server will be decided by GATT, is independent of
master & slave in link layer
• Client will access server attributes
• Server will also send two types of messages
– Notifications
– Indications
• Request / response and Indication / Confirmation follow
blocked communication
10. BLE – GATT Layer
• A framework uses ATT for device discovery
• Exchanges the characteristics from one device to
another
• Characteristics
– Set of data includes value and properties
• Data related to services and characteristics stored in
attributes.
• For ex: server with temperature sensor
– Attributes of the sensor
– Attributes of temperature measurement
– Attributes of measurement units
11. BLE – Security Layer
• Protects information exchange between two
connected devices
• Security Modes
– LE Security Mode 1
– LE Security Mode 2
• Provides security functionality at Link Layer and ATT
• Link Layer
– Supports encryption & authentication using Cipher Block
Chain Message Code ( CCM ).
– 4 Byte Message Integrity Check ( MIC )
• Encryption will be applied to PDU & MIC
12. BLE - GAP
• Highest level of BLE Stack
• Specifies
– device roles, modes
– Procedures for discovery of devices and services
• Roles
– Broadcaster, Observer, Peripheral and Central
• Broadcaster
– Only broadcast data
– Does not support connections
• Observer
– Complimentary of the Broadcaster
• Central
– In charge for initiating & managing multiple connections
• Peripheral
– Uses a Single connection with a device in central role.
• Device Support multiple roles, but only one at a given time.
13. BLE – Application Profiles
• Blood Pressure
• Proximity
• Heart Rate
• Phone Alert
• Alert Notification
• Fine Me
• Humidity
• iBeacon
• Health Thermometer
• Glucose meter
• Temperature
• Time
• Pressure
14. BLE – Performance Points
• Power Consumption
• Latency
• Maximum Pico Net Size
• Data Throughput
15. Some BLE Chips / Modules
• NXP KW4x
• TI CC254x, CC26xx
• Nordic nRF518xx
• BT832 – Bluetooth 5.0
• Microchip RN4020
• Silabs Bluetooth Smart
16. Zigbee
• Based on 802.15.4 specification
• Creates Personal Area Networks with small, low power
digital radios
• Simpler & less expensive than wireless PANs like
Bluetooth or WiFi
• Transmission distance of 10 – 100 meters
• Used in short range low range wireless data transfer
applications
• Transmits data over long distance by using mesh
networks
• Secured with Symmetric Encryption Key
18. Zigbee Co Ordinator
• Forms root of network tree and bridge to
other networks
• One specific ZC in each network since it the
device started
• Stores information about the network
• Acts as Trust center & repository for security
keys
19. Zigbee Router ( ZR )
• Acts as a intermediate router
• Passes data from other devices
• Can also capable to running application along
with routing.
20. Zigbee End Device
• Contains limited to functionality to talk with
parent node like Co Ordinator or Router.
• Cannot relay data from other devices
• This makes the device asleep for a significant
amount of time
• Device will consume less power, thereby
giving long battery life.
• Requires least processing power & memory.
22. Zigbee PHY / MAC Layer
• PHY Layer
– IEEE 802.15.4 for low rate WPANs
– Frequency : 2.40 GHz
– Data rate : 250 Kbps
– Channels : 11 - 26
• Mac Layer
– Uses Carrier Sense Multiple Access / Collision
Avoidance ( CSMA / CA )
– Transmits beacons for synchronization
– Provides reliable communication
23. Zigbee Network Layer
• Supports both star and tree networks and generic
mesh networking
• Assigns 16 bit network addresses
• Provides the following functions,
– Network initialization
– Manages ZED joining or leaving the network
– Routes the network packets
– Route Discovery of one hop neighbors
– Receives and send network data packets
– Neighbor discovery
24. Application Support Sublayer
• Provides needed services for application objects (
endpoints ) and ZDO
– Binding tables
– Message forwarding between devices
– Group address and management
– Address mapping between 64 bit addresses and 16 bit network
address
– Fragmentation and reassembly
• Provides interface with network layer for data transfer like
request, confirm and response
• Provides communication for application by defining a
unified communication structure like a profile, cluster or
endpoint
• Application Support Data Entity
• Application Support Management Entity
25. Zigbee Device Object ( ZDO )
• Does the overall device management
• Initializes APS Sub layer and Network layer
• Configures the operating mode ( Co Ordinator,
Router or Device )
• Device and its application services discovery
• Handles the binding requests
• Supports security management
26. Zigbee Application
• Home Automation / Smart Home
• Smart Building automation
• PC & Peripherals
• Personal & Healthcare
• Industrial Automation
• Toys & Gaming Terminal
27. Some Zigbee Chips / Modules
• Xbee module
• NXP KW2x , MC1323x
• TI Simple Link
• Silabs EFR32xx