The document discusses various Internet of Things (IoT) technologies including sensors, wireless standards, device management, authentication, data analytics and standards bodies. It provides overviews of Bluetooth Low Energy, 6LoWPAN, LTE-MTC, Zigbee, ANT+, EnOcean and other wireless technologies. It also discusses full IoT stacks, big data and streaming technologies, and key standards organizations.
Multiple protocols have been positioned as “the” application-layer messaging protocol for the Internet of Things (IoT) and Machine-to-Machine (M2M) communication. In fact, these protocols address different aspects of IoT messaging and are complementary more than competitive (other than for mindshare). This presentation compares two of these protocols, MQTT and DDS, and shows how they are designed and optimized for different communication requirements.
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
** Edureka IoT Training: https://www.edureka.co/iot-certification-training**
This Edureka tutorial video on "Iot Technology" will help you grasp the outline of Internet of Things, and let you relate to how it is revolutionizing the world today. This IoT tutorial helps you learn the following topics:
1. Vision of IoT
2. “Things” in IoT
3. IoT Technology Stack
4. IoT Ecosystem
5. IoT Demo – Media Center using Raspberry Pi
6. Prospects & Scopes
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Multiple protocols have been positioned as “the” application-layer messaging protocol for the Internet of Things (IoT) and Machine-to-Machine (M2M) communication. In fact, these protocols address different aspects of IoT messaging and are complementary more than competitive (other than for mindshare). This presentation compares two of these protocols, MQTT and DDS, and shows how they are designed and optimized for different communication requirements.
The Internet of Things is bringing a massive surge of smart, connected devices that will enable new services and efficiencies across industries. This requires wireless technologies to scale up or down depending on the application performance needs—to connect virtually anything. And now, LTE is evolving for low-throughput, delay-tolerant IoT use cases. The new narrowband LTE technologies (eMTC & NB-IoT) will deliver lower complexity, longer battery life, and deeper coverage for wide-area IoT applications.
** Edureka IoT Training: https://www.edureka.co/iot-certification-training**
This Edureka tutorial video on "Iot Technology" will help you grasp the outline of Internet of Things, and let you relate to how it is revolutionizing the world today. This IoT tutorial helps you learn the following topics:
1. Vision of IoT
2. “Things” in IoT
3. IoT Technology Stack
4. IoT Ecosystem
5. IoT Demo – Media Center using Raspberry Pi
6. Prospects & Scopes
AWS IoT is a managed cloud platform that allows connected IoT devices to easily and securely interact with cloud applications and other devices. In this session, we will discuss how constrained devices can leverage the AWS IoT service to send data to the cloud and receive commands back to the device using the protocol of their choice. We will discuss how devices can connect securely using MQTT and HTTP protocols, and how developers and businesses can leverage the AWS IoT Rules Engine, Thing Shadows, and accelerate prototype development using AWS IoT Device SDKs. Finally, we will cover new features released since the launch of AWS IoT including integration with Amazon Machine Learning and Amazon ElasticSearch Service.
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
Presentation by Ivan Landen, CEO of Blue Wireless in 5G Asia 2018 Singapore. This slides cover :
- Technology evolution from 3G, 4G, LTE to 5G
- Business models and outlook for the future
- The changing role of Infrastructure providers and MVNOs Service Providers
- Enterprise adoption of LTE/5G WAN services
For more information, follow us at :
https://www.bluewireless.com
https://www.linkedin.com/company/blue-ventures-asia
https://www.facebook.com/bluewirelessasia/
https://twitter.com/bluewireless_sg
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
IoT how it works, IoT Perspectives, IoT technologies, IoT architecture, IoT protocols, IoT applications, sensor as service model, IoT data flow, IoT functional view, IoT analogy, IoT taxanomy of research
IoT design considerations
It is all about connectivity
Connectiviteit is altijd een uitdaging voor IoT sensors. De afweging tussen snelheid, bandbreedte, zekerheid, bereik en batterijduur kan je veel uitzoekwerk opleveren. Daarbij geven veel leveranciers van connectiviteit niet het volledige beeld omdat bepaalde oplossingen niet goed in hun infrastructuur of commerciële propositie passen. In deze sessie gaan we in op de mogelijkheden en toepasbaarheid van verschillende soorten connectiviteit. Denk dan aan LoRa, Sigfox, NB-IoT, LTE-M, Private 4G / LTE.
Industry 4.0 (IIoT) is changing the face of manufacturing like never before. Global situation of tariff war and re-shoring are catalysts driving this change in addition to technology adaption.
Check out this Comparative Analysis between Industry 4.0 (IIoT) and SCADA systems to understand the basic differences between the two.
The next industrial revolution, sometimes referred to as Industry 4.0, is already ongoing, fueled by technology advancements in big data, automation and cyber physical systems. To achieve their full potential, these new processes and operating models require high-performance connectivity. Ultra-reliable low latency communication (URLLC) is a new set of 5G NR capabilities, expected for 3GPP Release 16, that can enable operators and enterprises to address a diverse range of high-performance industrial use-cases. This webinar will investigate 5G NR, including the support for private industrial networks and URLLC capabilities. Using the "factory of the future" concept as an example, it will show how 5G NR can help to transform industrial IoT by making it more dynamic, flexible and adaptable to market demand.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
The internet of things (IoT) is the internetworking of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
Presentation by Ivan Landen, CEO of Blue Wireless in 5G Asia 2018 Singapore. This slides cover :
- Technology evolution from 3G, 4G, LTE to 5G
- Business models and outlook for the future
- The changing role of Infrastructure providers and MVNOs Service Providers
- Enterprise adoption of LTE/5G WAN services
For more information, follow us at :
https://www.bluewireless.com
https://www.linkedin.com/company/blue-ventures-asia
https://www.facebook.com/bluewirelessasia/
https://twitter.com/bluewireless_sg
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
IoT how it works, IoT Perspectives, IoT technologies, IoT architecture, IoT protocols, IoT applications, sensor as service model, IoT data flow, IoT functional view, IoT analogy, IoT taxanomy of research
IoT design considerations
It is all about connectivity
Connectiviteit is altijd een uitdaging voor IoT sensors. De afweging tussen snelheid, bandbreedte, zekerheid, bereik en batterijduur kan je veel uitzoekwerk opleveren. Daarbij geven veel leveranciers van connectiviteit niet het volledige beeld omdat bepaalde oplossingen niet goed in hun infrastructuur of commerciële propositie passen. In deze sessie gaan we in op de mogelijkheden en toepasbaarheid van verschillende soorten connectiviteit. Denk dan aan LoRa, Sigfox, NB-IoT, LTE-M, Private 4G / LTE.
Industry 4.0 (IIoT) is changing the face of manufacturing like never before. Global situation of tariff war and re-shoring are catalysts driving this change in addition to technology adaption.
Check out this Comparative Analysis between Industry 4.0 (IIoT) and SCADA systems to understand the basic differences between the two.
The next industrial revolution, sometimes referred to as Industry 4.0, is already ongoing, fueled by technology advancements in big data, automation and cyber physical systems. To achieve their full potential, these new processes and operating models require high-performance connectivity. Ultra-reliable low latency communication (URLLC) is a new set of 5G NR capabilities, expected for 3GPP Release 16, that can enable operators and enterprises to address a diverse range of high-performance industrial use-cases. This webinar will investigate 5G NR, including the support for private industrial networks and URLLC capabilities. Using the "factory of the future" concept as an example, it will show how 5G NR can help to transform industrial IoT by making it more dynamic, flexible and adaptable to market demand.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
The internet of things (IoT) is the internetworking of physical devices, vehicles, buildings and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.
A 60-slide survey of the Internet of things: market philosophy and theory. Philosophy: Horizontal IoT platforms are stupid. Build something people love. You earn the right for others to base their business upon yours with deeply entrenched vertical value. Making: a survey of a few elements to crafting connected products. Local connectivity, Intelligence, internet connectivity, and – if you insist – IoT platforms.
IoT Standards are Stupid, Just Ship SomethingJordan Husney
This was a talk I delivered at IoT Europe 2014
The market isn't slow, you are – the number of devices being attached to the internet is increasing sharply: from 80 things per second last year to an expected 100 things per second this year. Early movers like NEST are being consolidated, while there are hundreds of new entrants into the marketplace. Despite the lack of horizontal "grand unification" standards there are successful vertical platforms. In consumer home there are NEST, Withings, Belkin, Quirky, etc. – plus many distinct offerings in commercial/industrial
Interrogate the market by shipping – with sharp development cost decreases, it's never been easier to engage in ever smarter, ever more emergent business models. Certainly, greater values will be unlocked by standards and ubiquitous interoperability, but there is plenty of value to unlock in bringing greater efficiency or greater utility to your customers now. Most importantly, it's about building organizational muscle to be able to address the market as it continues to heat up (connected devices are not going away!) – and not wait to play a game of catch up. The only fatal mistake is inaction
How to start – build a lean product practice, emphasize doing over debating. Test, learn, iterate, and scale. Build remote upgrade-ability into products and create simple platform APIs to encourage unexpected combinations and partnerships. Use success to inform standards, not the other way around.
LTE MTC: Optimizing LTE Advanced for Machine Type CommunicationsQualcomm Research
LTE MTC will significantly increase battery life, reduce cost/complexity, and enhance coverage by optimizing LTE Advanced for machine-type communications. These optimizations will empower innovative machine-to-machine (M2M) services across a wide range of use cases that demand the ubiquitous coverage, high reliability, and robust security of 4G LTE connectivity, without the high data rate requirements of mobile broadband.
For more information, please visit www.qualcomm.com/lte-mtc.
Download the presentation here: https://www.qualcomm.com/media/documents/files/lte-mtc-optimizing-lte-advanced-for-machine-type-communications.pdf
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
Exploring transparency a design choice within an organization, how to enable it, and why it may necessary to succeed in the internet age by Jordan Husney, CEO of Parabol (https://parabol.co)
Pci mod3,6,30 analysis and auto optimizationShuangquan Lei
This presentation introduce a network optimization platform, and with this application, system will support you to find 4G LTE cells which have PCI MOD(3), MOD(6) and MOD(30) collision, and then can generate candidate value list by big data analysis.
Please send email to me if this application can make your work more effective.
my email address: lei.shuangquan@gmail.com
Zach Shelby, Director of Technology for IoT at ARM and previously the co-founder of Sensinode gives and an in-depth tutrorial of the Constrained Application Protocol (CoAP) for the Internet of Things. Updates to this tutorial made on April 30th, 2014.
The lOT (Internet of Things) is a network of Internet-enabled objects, together with web services that interact with these objects. IoT enables the connected devices to communicate and interact with each other, transferring zillions of data each moment. This presentation speaks about the various protocols that keep IoT a trending topic. It gives a short glimpse about the heights that will be scaled by IoT in the near future and the ways in which it can transform the human lives. The presentation also enlists the various security threats faced by IoT and comes up with a reliable secure model for IoT.
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
These are the slides used at the CIE-IEEE 2017 Tech Symposium at University of Texas at Dallas. Ed Hightower presente brief history of IoT, who are key players in the Low Power WAN space and how all this could enable Smart Cities and Smart Health.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
3. Internet of Things
• Gartner predicts 25 billion
‘connected’ devices by 2020
• Instigated by nexus of four
forces - social, mobile, cloud
and information
• Business verticals -
Automotive, consumer,
general business, vertical
business
• Many independent break
throughs - Wearables,
Mobile health monitoring,
Big Data, Data sciences,
autonomous vehicles, etc.
Source: Gartner
Inspiring TED talk <> http://goo.gl/NrxGCl
4. Full Stack - IoT
Aggregators Mobile App/
Visualization
6lowpan
Wifi/BLE
4G LTE
Machine Learning
&
CRM Integration
7. BLE explained…
Bluetooth low energy wireless technology is an open low energy, short-range radio technology.
Some Key Benefits:
• Low power consumption
• Connectivity to mobile phones
• Small size and Low cost
• Multi-vendor interoperability
• Globally availability, license free
BLE is a connectionless, always OFF technology, with small silicon footprint and low cost having a robust through frequency
hopping compared to other wireless technologies. Security is through 128-bit AES encryption and can be for low power
consumption with no competitors.
Connections involve two separate roles:
• Central (master)
• Peripheral (slave)
Protocols: Building blocks used by all devices conform to the Bluetooth specification, protocols are the layers that implement
the different packet formats, routing, multiplexing, encoding,etc.
Profiles: “Vertical slices” of functionality covering either basic modes of operation required by all devices or specific use cases.
9. 6lowPAN explained…
6lowPAN ==> Low-power RF + IPv6 = The Wireless Embedded Internet or IP on IEEE 802.15.4
The benefits of 6LoWPAN include:
• Open, long-lived, reliable standards
• Easy learning-curve
• Transparent Internet integration
• Network maintainability
• Global scalability
• End-to-end data flows
A 6loWPAN system contains one or more WPANs (Wireless Personal Area Networks) connected to the Internet via a
wired bus such as an Ethernet or wired IP bus .
The main components of a 6LoWPAN system:
• Wireless Cluster: A WPAN (which may be one of many in the system).
• Wired Bus: A bus (e.g. Ethernet) to which the wireless clusters are connected.
• Border-Router: A device used to connect a wireless cluster to the wired bus.
• Host: A device, such as a PC or workstation, with an IP connection to the system.
- A Remote Access Terminal used to access the 6LoWPAN system remotely via the Internet.
- A Data Management Centre on the wired bus, used to configure and interrogate the 6LoWPAN system.
Thread is a special protocol for home automation. In addition to bringing mesh to 6LoWPAN, adds a layer of security,
enables point-to-point communications, and provides schemes for optimizing battery life. Thread borrows from the
proprietary Nest protocol called Weave, which also is based on 6LoWPAN and also adds “special sauce”.
10. LTE MTC
3GPP LTE Rel.13 release has many goals:
• Wide service spectrum
• Support of device volumes
• Low cost connected devices
• Long battery life
• Enhanced coverage
Architectural changes:
• Congestion and overload control for M2M
devices
• M2M device triggering for provisioning
• Addressing and Identifiers - IPv4/IPv6 addresses
• Charging requirements and data collection
• Security requirements
• Remote M2M device management,
management of M2M devices using Open
Mobile Alliance Device Management (OMA-DM)
or over-the-air (OTA)
www.3gpp.org
11. LTE MTC explained…
In 2014, the number of mobile connected devices exceeded the world’s population. Device
growth will continue; according to Ericsson, by 2020, 90 percent of the world’s population
over six years old will own a mobile phone.
• LTE Category-0 introduced for M2M/IoT - with a peak speed of 1Mbps.
• Cat-0 defines narrower bandwidths and reductions in complexity reducing cost and
power consumption
• Provide extended coverage for MTC devices in challenging locations
• Serve very large numbers of devices per cell by optimizing signaling of small data
transmission
• UEPCOP: Power saving (or dormant) state and extended DRX cycle (Idle and
connected)
• SDDTE: Data over Non Access Stratum (NAS) signaling over control plane,
connectionless approaches over user plane and keeping handsets in connected mode
for small data transmission
• A new UE Power Saving Mode has been introduced (mostly a NAS feature) with some
description added in the Access Stratum spec for Idle mode (TS 36.304).
• For Signaling Overhead Reduction, new CN assistance information for eNB parameters
tuning has been introduced, as captured in the Stage 2 and Stage 3 specifications (TS
36.300, 36.413, 36.423).
12. Zigbee
• ZigBee 3.0 is based on IEEE 802.15.4,
which operates at 2.4 GHz
• ZigBee is reliable and robust using
multi-hop mesh networking to
eliminate points of failure
• ZigBee is low-power allowing battery-
operated devices
• ZigBee is scalable and supports
networks of thousands of nodes and
mesh networks
• ZigBee is secure and uses a variety of
security mechanisms such as
AES-128 encryption, etc.
• ZigBee is global and is built on 2.4
GHz which is available for unlicensed
worldwide.
http://www.zigbee.org/
13. Zigbee explained…
ZigBee is a suite of high-level communication protocols used to create personal area networks built
from small, low-power digital radios.
ZigBee devices are of three types:
ZigBee Coordinator (ZC): The most capable device, the Coordinator forms the root of the network
tree and might bridge to other networks. There is exactly one ZigBee Coordinator in each network
since it is the device that started the network originally. It stores information about the network,
including acting as the Trust Center & repository for security keys.
ZigBee Router (ZR): As well as running an application function, a Router can act as an intermediate
router, passing on data from other devices.
ZigBee End Device (ZED): Contains just enough functionality to talk to the parent node (either the
Coordinator or a Router); it cannot relay data from other devices. This relationship allows the node
to be asleep a significant amount of the time thereby giving long battery life. A ZED requires the
least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC.
ZigBee protocols support beacon and non-beacon enabled networks. In non-beacon-enabled
networks, an unslotted CSMA/CA channel access mechanism is used. ZigBee Routers typically
have their receivers continuously active, requiring a more robust power supply. However, this allows
for heterogeneous networks in which some devices receive continuously, while others only transmit
when an external stimulus is detected.
14. ANT+
ANT+ (pronounced ant plus) is a sub-system of the base ANT protocol (a proprietary wireless technology)
designed and marketed by the ANT+ Alliance, a division of Dynastream Innovations Inc. ANT+ is designed for
the interoperable collection and transfer of sensor data as well as the integration of remote control systems
such as indoor lighting, phone control, etc.
ANT+ mainly focuses on operations that include sport, wellness, home care and remote control.
It is used for data-transfer for a number of devices:
• heart rate monitors
• cadence sensors
• cycling power meters
• activity monitors
• calorimeters
• body mass index measuring devices
• blood pressure monitors
• blood glucose meters
• position tracking
• weight measuring devices
• temperature sensors
• fitness equipment
http://www.thisisant.com/
15. ANT+ explained…
ANT™ is a practical wireless sensor network protocol
running in the 2.4 GHz ISM band. Designed for ultra-low
power, ease of use, efficiency and scalability.
• ANT easily handles peer-to-peer, star, connected star,
tree and fixed mesh topologies.
• ANT provides reliable data communications, flexible
and adaptive network operation and cross-talk
immunity.
• ANT protocol stack is extremely compact, requiring
minimal microcontroller resources and considerably
reduces system costs.
• ANT provides carefree handling of the Physical,
Network and Transport OSI layers.
• It incorporates key low-level security features that
form the foundation for user-defined sophisticated
network security implementations.
• ANT ensures adequate user control while considerably
lightening computational burden in providing a simple
yet effective wireless networking solution.
16. EnOcean
EnOcean is based on the energetically efficient exploitation of slight mechanical
motion and other potentials from the environment, such as indoor light and
temperature differences, using the principles of energy harvesting.
• Maintenance-free sensor solutions
• Bidirectional communication even with self-powered sensors
• Easy Programming of customer-specific software
• Easy-to-integrate
• Interoperability of end-products
www.enocean.com/en/home/
17. Energy harvesting wireless standard from EnOcean
High reliability
Use of regulated frequency ranges with highest air time availability (approved for
pulsed signals only) - 868 MHz according to R&TTE regulation EN 300220 and 315
MHz according to FCC regulation CFR-47 Part 15
Multiple telegram transmission with checksum
Short telegrams (approx. 1 ms) for little probability of collision
Long range: up to 30 meters in buildings and 300 meters in free field
Repeater available for range extension
One-way and bidirectional communication
Low energy need High data transmission rate for sensor information of 125 kbit/s
Small data overhead
ASK modulation
Interoperability Wireless protocol defined and integrated in modules
Sensor profiles specified and implemented by users
Unique transmission ID (32 bits)
Coexistence with other wireless systems No interference with DECT, WLAN, PMR systems, etc
System design verified in industrial environment
19. Mobile device management (MDM) is an industry term for the administration of
mobile devices, such as smartphones, tablet computers, laptops, etc. MDM is
usually implemented with the use of a third party product that has management
features for particular vendors of mobile devices.
There are two major types of MDM implementations:
• On-premises Solution
• Cloud-based Solution
Device Management Specifications:
• The Open Mobile Alliance (OMA) specified a platform-independent device
management protocol called OMA Device Management. The specification meets
the common definitions of an open standard, meaning the specification is freely
available and implementable and most widely used.
• Smart message is text SMS-based provisioning protocol (ringtones, calendar
entries but service settings also supported like: ftp, telnet, SMSC number, email
settings, etc...)
• OMA Client Provisioning is a binary SMS-based service settings provisioning
protocol.
• Nokia-Ericsson OTA is binary SMS-based service settings provisioning protocol,
designed mainly for older Nokia and Ericsson mobile phones.
20. OMA-DM Lightweight M2M
OMA Device Management is a device management
protocol specified by the Open Mobile Alliance
(OMA) Device Management (DM) Working Group
and the Data Synchronization (DS) Working Group.
OMA DM was originally developed by The SyncML
Initiative Ltd, an industry consortium formed by
many mobile device manufacturers.
Device management is intended to support the
following uses:
• Provisioning – Configuration of the device
(including first time use), enabling and disabling
features
• Device Configuration – Allow changes to settings
and parameters of the device
• Software Upgrades – Provide for new software
and/or bug fixes to be loaded on the device,
including applications and system software
• Fault Management – Report errors from the
device, query about status of device
http://openmobilealliance.org/
21. LWM2M standard solves a set of technological challenges that have appeared as the M2M market has matured and the Internet of Things
makes constrained devices more accessible to device management and end-to-end service enablement. In this section we summarize the
benefits of LWM2M:
• Greater market growth and cost efficiency for the whole industry through a decoupling of devices, device management and services
technologies.
• Service providers, OEMs and end users benefit from the uniform management of constrained devices.
• LWM2M can often provide a 10x increase in efficiency over OMA-DM.
• Better time to market for M2M services as well as devices and infrastructures through standard components available from an ecosystem
of vendors.
• LWM2M is complementary to existing device management solutions like OMA DM and Broadband Forum TR-69, and greatly extends the
range of devices that can be securely managed.
• The LWM2M data model and the open OMA naming authority registry for Objects provide easily accessible and reusable semantics for
both device management and application data for the whole Internet of Things industry.
• By providing a single solution for device management and application data, LWM2M both simplifies systems and allows for new and
innovative M2M services.
• Complete security and security lifecycle management appropriate for constrained devices solves one of the most pressing problems in
the M2M industry.
• The scope of LWM2M defines only the device to service network interface, allowing easy integration into existing device management
and M2M services, as well as larger backend system standards such as oneM2M.
22. TR-069
TR-069 is the document number of the
technical report, defined by the Broadband
Forum, that specifies the “CPE WAN
Management Protocol”. It assumes that the all
CPE can obtain an IP address in order to
communicate with an ACS and can interact
with a single ACS at a time.
• Auto-Configuration and Dynamic Service
Provisioning Device Agnostics
• Software/Firmware Image Management
• Software Module Management
• Status and Performance Monitoring
• Diagnostics
• Positioning in the End-to-End Architecture
• Security Goals
• Architectural Goals
https://www.broadband-forum.org/cwmp.php
23. TR-069 explained
The CPE WAN Management Protocol comprises several components that
are unique to this protocol, and makes use of several standard protocols.
The protocol stack defined by the CPE WAN Management Protocol below.
25. IoT can only be realized if,
• Many and varied interactions between users, things, cloud
services and applications can be authenticated.
• User delegated consent will be necessary for any scenario
where potentially privacy sensitive data is collected and
analyzed (wearables, home automation, health, etc).
• APIs can help protect sensitive data going to and from
medical devices, smart grids and meters, cars, thermostats,
appliances and other connected devices
• Integrate and aggregate partner APIs, no matter what
interface protocols or authentication schemes they use
• Open up API access to big data resources to enable new
customer services, improve operational efficiency or create
new revenue opportunities
26. OAUTH 2.0
http://oauth.net/2/
OAuth is an open standard for authorization that enables client applications to
access server resources on behalf of a specific Resource Owner. OAuth also
enables Resource Owners (users) to authorize limited third-party access to their
resources without sharing credentials. For e.g.. a Gmail user could allow LinkedIn/
Flickr to have access to their list of contacts without sharing her/his Gmail
username and password.
27. OAUTH 2.0 explained
OAuth 2.0 is an IETF standard authentication & authorization framework for
securing application access to RESTful APIs
• OAuth allows a Client (an application that desires information) to send an API
query to a Resource Server (RS), the application hosting the desired
information, such that the RS can authenticate that the message was indeed
sent by the Client.
• The Client authenticates to the RS through the inclusion of an access token on
its API call—a token previously provided to the Client by an Authorization Server
(AS).
• In those scenarios that the API in question protects access to a User’s identity
attributes, it may be the case that the access token will only be issued by the AS
after the User has explicitly given consent to the Client accessing those
attributes.
28. CoAP 2.0
The Constrained Application Protocol (CoAP/RFC
7252) is a specialized web transfer protocol for use
with constrained nodes and constrained networks in
the Internet of Things.
• CoAP transactions provide reliable UDP
messaging
• CoAP methods resemble HTTP method requests
and responses
• CoAP method calls may involve multiple CoAP
transactions
• Roles at the transaction layer may change during a
method request / response execution
http://coap.technology/
29. CoAP explained
CoAP is designed for machine-to-machine (M2M) applications such as smart
energy and building automation and consists of robust foundations for IoT.
• Constrained machine-to-machine web protocol
• Representational State Transfer (REST) architecture
• Simple proxy and caching capabilities
• Asynchronous transaction support
• Low header overhead and parsing complexity
• URI and content-type support
• UDP binding (may use IPSec or DTLS)
• Reliable unicast and best-effort multicast support
• Built-in resource discovery
30. MQTT
MQTT is an "Internet of Things" connectivity
protocol. Designed exclusively as a lightweight
publish/subscribe messaging transport using small
code footprint and came from IBM's MQ message
queuing product line.
• MQTT messages are delivered asynchronously
(“push”) through publish subscribe architecture.
• Ideal for constrained networks (low bandwidth,
high latency, data limits, and fragile connections)
• Quality of Service (QoS) for MQTT
• MQTT client abnormal disconnect notification
• MQTT clients are very simple to implement http://mqtt.org/
31. MQTT explained …
MQTT runs over TCP/IP, or over other network protocols that provide ordered, lossless, bi-directional
connections. Its features include:
• Use of the publish/subscribe message pattern which provides one-to-many message distribution and
decoupling of applications.
• A messaging transport that is agnostic to the content of the payload.
• Three qualities of service for message delivery:
• "At most once", where messages are delivered according to the best efforts of the operating environment.
Message loss can occur. This level could be used, for example, with ambient sensor data where it does not
matter if an individual reading is lost as the next one will be published soon after.
• "At least once", where messages are assured to arrive but duplicates can occur.
• "Exactly once", where message are assured to arrive exactly once. This level could be used, for example,
with billing systems where duplicate or lost messages could lead to incorrect charges being applied.
• A small transport overhead and protocol exchanges minimized to reduce network traffic.
• A mechanism to notify interested parties when an abnormal disconnection occurs.
33. BIG & FAST Data
Map, Reduce & Shuffle
“If Hadoop is an Ocean, Streams are the Firehose”
34. Streaming Data
Stream processing in a big data paradigm, which is related to SIMD (single
instruction, multiple data), that allows some applications to more easily exploit a
limited form of parallel processing.
• Handles data at high velocity
• Processing in near real-time
• Data has to be processed fast, so that a firm can react to changing business
conditions in real time, think nano-second trading.
• This is required for trading, fraud detection, system monitoring, Oil & Natural
Gas industry and many other verticals.
35. Streaming Data …
For some use cases ( e.g. stock
markets, traffic, surveillance, patient
monitoring) the value of insights
degrade very quickly with time.
e.g. stock markets and speed of light
or Credit card fraud detection
We need technology that can
produce outputs fast
• Static Queries, but need very fast
output (Alerts, Realtime control)
• Dynamic and Interactive Queries
( Data exploration)
36. Real-time Analytics Tools
Stream Processing
• Program a set of processors and wire them up, data flows though the graph.
• A middleware framework handles data flow, distribution, and fault tolerance (e.g. Apache Storm,
Samza)
• Processors may be in the same machine or multiple machines
Complex Event Processing
• Event-pattern detection and abstraction
• Event filtering, aggregation and transformation
• Modeling event hierarchies
• Detecting relationships (such as causality, membership or timing) between events
• Abstracting event-driven processes
Micro-Batch
• Process data in small batches, and then combine results for final results (e.g. Spark)
• Works for simple aggregates, but tricky to do this for complex operations
• Can do it with MapReduce, not the same SLA
OLAP Style in-memory processing
• Supports interactive queries
• Indexes data to make them them readily accessible to respond to queries fast. (e.g. Apache Drill)
• Tools like Druid, VoltDB and SAP Hana can do this with all data in memory
37. Machine Learning & Insights
Internet of Things applications involve massive data sets, far too big for any human
to reasonably keep track of, analyze, and interpret. Machine learning and predictive
modeling steps in at various levels- from cloud services down to individual devices,
to solve the complexity of applications.
Machine Learning algorithms hunt for interesting signals in the noise, run
simulations, creates and verifies predictive models, and offers insights in the form
of “prescriptive intelligence.”
38. Machine learning techniques that need exploration for IIoT,
Connected Home and various IoT applications:
• Supervised and unsupervised learning
• Neural Networks
• Machine Learning System Design
• Clustering
• Anomaly Detection
• Recommendation Systems
• Large-Scale Machine learning systems
• Programming paradigms and Languages for machine learning
• Computation at the edge or Computation at the core
41. Add value to IoT Chain
Enable'
• Enable (or Provision) devices to connect to the wireless Internet.
integrate • Integrate into mobile operator networks, everywhere in the world.
Define'
• Define use cases and map out business and operational requirements for every stage of the product lifecycle.
integrate
• Integrate new Internet of Things business with existing infrastructure.
configure
• Configure application programming interfaces (APIs) to meet unique business need and requirement of each and every mobile
operator
Deliver'
• Deliver the new applications and services to the market