SlideShare a Scribd company logo
INTERNET OF THINGS
PRESENTED BY:
I SAI KRISHNA (2451-16-735-327)
Contents
• Introduction
• The Internet of Things
• Applications of IoT
• Challenges and Barriers in IoT
INTRODUCTION
Typical Views of the Internet of Things
Industrial Automation Smart Health
Smart Home Smart City
What is Internet of Things
“Internet of Objects” “Machine-to-Machine Era”
(2) Internet of Things refers to the concept that the
Internet is no longer just a global network for people to
communicate with one another using computers, but it is
also a platform for devices to communicate electronically
with the world around them.”
(1) The Internet of Things, also called The Internet of
Objects, refers to a wireless network between objects,
usually the network will be wireless and self-configuring, s
uch as household appliances.
“Internet of Everything”
The Internet of Things
• The term Internet of Things
was first used by Kevin Asht
on in 1999.
• Refers to uniquely identifiab
le objects (things) and their
virtual representations in
an Internet-like structure
Characteristics
Ambient Intelligence
Flexible Structure
Event Driven
Complex Access Technologies
Semantic Sharing
Enabling Technologies
RFID Sensor Smart Tech Nano Tech
To identify
and track t
he data of
things
To collect a
nd process t
he data to d
etect the ch
anges in the
physical stat
us of things
To enhance th
e power of the
network by de
volving proces
sing capabiliti
es to different
part of the net
work.
To make the
smaller and
smaller thing
s have the a
bility to conn
ect and inter
act.
Sensing
Communication
Management
Technical Perspective
Applications of IoT
Education
Management
IoT Applicati
ons
Retail
Logistics
• Management:
– Data managem
ent
– Waste manage
ment
– Urban planning
– Production ma
nagement
– ...
• Logistics:
– Warehouse, man
agement
• Inventory control
– Port managemen
t
• ETAs, ETDs
• Ships, boats, cont
ainers, etc.
– Executable code
– …
• Retail:
– Intelligent shopp
ing
– Bar code in retai
l
– Electronic tags
– …
INTERNET OF
THINGS
• School Administration
–Attendance Management
–Voting System
–Automatic Feedback Loops
• Instructional technology
–Media
–Information management
–Foreign language learning
Smart Things Timeline
Challenges and Issues
• Issues
– Society: People, security, privacy
• A policy for people in the Internet of Things:
• Legislation
– Environmental aspects
• Resource efficiency
• Pollution and disaster avoidance
– Technological
• Architecture (edge devices, servers, discovery services, secur
ity, etc.)
• Governance, naming, identity, interfaces
• Service openness, interoperability
• Connections of real and virtual world
• Standards
IoT will inherit the drawbacks of the current in
ternet on an infinitely larger, but more invisibl
e scale
–Privacy – will be a huge issue when implementing
IoT
–Identity - Online Fragmentation of Identity
–Efficiency – speed - person loses identity and is
an IP address
–Decisions – do not delegate too much of our deci
sion making and freedom of choice to things and
machines
–Balancing
Challenges and Issues
• Transition to IPv4 – Internet protocol v6
• Estalishing a common set of standards betwee
n companies, educational systems, and nations.
– The same type of cabling,
– The same applications or programming
– The same protocol or set of rules that will apply to all
• Developing energy sources for millions -even bill
ions - of sensors.
– Wind
– Solar,
– Hydro-electric
Challenges and Issues
Iot

More Related Content

What's hot

Internet of things
Internet of thingsInternet of things
Internet of things
Sanoj Kumar
 
IOT – INTERNET OF THINGS.pptx
IOT – INTERNET OF THINGS.pptxIOT – INTERNET OF THINGS.pptx
IOT – INTERNET OF THINGS.pptx
VishwajayKadam
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
cikgushaharizan
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
krishnakumarkrishnak3
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Bebo White
 
Pooja.ppt
Pooja.pptPooja.ppt
Pooja.ppt
poojakhairnar8
 
Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICT
Amit Singh
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
Kak Yong
 
Internet of things
Internet of thingsInternet of things
Internet of things
Rohith Raj
 
An Introduction to Internet of things
An Introduction to Internet of thingsAn Introduction to Internet of things
An Introduction to Internet of things
Roby Rock
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
Incubation & Industry
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
groot83
 
Iot training
Iot trainingIot training
Iot training
aadi ducat
 
Introduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki VermaIntroduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki Verma
Livingston Technology Solution
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
Freedom to Connect
 
ARI2132 lecture 10
ARI2132 lecture 10ARI2132 lecture 10
ARI2132 lecture 10
Vanessa Camilleri
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
Casaleggio Associati
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
malvin050
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
NATHANIELPAMBEL
 

What's hot (20)

Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT – INTERNET OF THINGS.pptx
IOT – INTERNET OF THINGS.pptxIOT – INTERNET OF THINGS.pptx
IOT – INTERNET OF THINGS.pptx
 
2011 4-define-ethics-and-law
2011 4-define-ethics-and-law2011 4-define-ethics-and-law
2011 4-define-ethics-and-law
 
Krishna kumar singh
Krishna kumar singhKrishna kumar singh
Krishna kumar singh
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
 
Pooja.ppt
Pooja.pptPooja.ppt
Pooja.ppt
 
Introduction of ICT
Introduction  of ICTIntroduction  of ICT
Introduction of ICT
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
An Introduction to Internet of things
An Introduction to Internet of thingsAn Introduction to Internet of things
An Introduction to Internet of things
 
Emergence of io t
Emergence of io tEmergence of io t
Emergence of io t
 
Digital citizenship
Digital citizenship Digital citizenship
Digital citizenship
 
Iot training
Iot trainingIot training
Iot training
 
Introduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki VermaIntroduction of it by wikki verma - Wikki Verma
Introduction of it by wikki verma - Wikki Verma
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
ARI2132 lecture 10
ARI2132 lecture 10ARI2132 lecture 10
ARI2132 lecture 10
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Similar to Iot

Web of Things
Web of ThingsWeb of Things
Web of Things
Jayesh Pai
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
JauwadSyed
 
Internet of things
Internet of thingsInternet of things
Internet of things
Pragya Srivastava
 
What is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoTWhat is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoT
International Institute of Information Technology (I²IT)
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of things
Internet of things Internet of things
Internet of things
RachadESSOURI
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Internet
Internet Internet
IOT
IOTIOT
Iot on internet of things in future gen.
Iot on internet of things in future gen.Iot on internet of things in future gen.
Iot on internet of things in future gen.
shobhanrockstar
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
Nirnay Banagar
 
Presentation on internet of things
Presentation on internet of thingsPresentation on internet of things
Presentation on internet of things
MOHIT YADAV
 
Internet of Things by Sindhu TS
Internet of Things by Sindhu TSInternet of Things by Sindhu TS
Internet of Things by Sindhu TS
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Pratibha Kumari
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
chWaqasZahid
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Wafaa Rizin Ameer
 
Internet of things
Internet of thingsInternet of things
Internet of things
Shahneel Siddiqui
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
PALAK SHAH
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Amr Elaziz
 
Internet of things
Internet of thingsInternet of things
Internet of things
AJITHKUMAR RAVI
 

Similar to Iot (20)

Web of Things
Web of ThingsWeb of Things
Web of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
What is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoTWhat is IoT | The Structure of IoT | Future of IoT
What is IoT | The Structure of IoT | Future of IoT
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of things
Internet of things Internet of things
Internet of things
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Internet
Internet Internet
Internet
 
IOT
IOTIOT
IOT
 
Iot on internet of things in future gen.
Iot on internet of things in future gen.Iot on internet of things in future gen.
Iot on internet of things in future gen.
 
Internet of things-Introduction
Internet of things-IntroductionInternet of things-Introduction
Internet of things-Introduction
 
Presentation on internet of things
Presentation on internet of thingsPresentation on internet of things
Presentation on internet of things
 
Internet of Things by Sindhu TS
Internet of Things by Sindhu TSInternet of Things by Sindhu TS
Internet of Things by Sindhu TS
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Iot

  • 1. INTERNET OF THINGS PRESENTED BY: I SAI KRISHNA (2451-16-735-327)
  • 2. Contents • Introduction • The Internet of Things • Applications of IoT • Challenges and Barriers in IoT
  • 3. INTRODUCTION Typical Views of the Internet of Things Industrial Automation Smart Health Smart Home Smart City
  • 4. What is Internet of Things “Internet of Objects” “Machine-to-Machine Era” (2) Internet of Things refers to the concept that the Internet is no longer just a global network for people to communicate with one another using computers, but it is also a platform for devices to communicate electronically with the world around them.” (1) The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects, usually the network will be wireless and self-configuring, s uch as household appliances. “Internet of Everything”
  • 5. The Internet of Things • The term Internet of Things was first used by Kevin Asht on in 1999. • Refers to uniquely identifiab le objects (things) and their virtual representations in an Internet-like structure
  • 6. Characteristics Ambient Intelligence Flexible Structure Event Driven Complex Access Technologies Semantic Sharing
  • 7. Enabling Technologies RFID Sensor Smart Tech Nano Tech To identify and track t he data of things To collect a nd process t he data to d etect the ch anges in the physical stat us of things To enhance th e power of the network by de volving proces sing capabiliti es to different part of the net work. To make the smaller and smaller thing s have the a bility to conn ect and inter act.
  • 9. Applications of IoT Education Management IoT Applicati ons Retail Logistics
  • 10. • Management: – Data managem ent – Waste manage ment – Urban planning – Production ma nagement – ...
  • 11. • Logistics: – Warehouse, man agement • Inventory control – Port managemen t • ETAs, ETDs • Ships, boats, cont ainers, etc. – Executable code – …
  • 12. • Retail: – Intelligent shopp ing – Bar code in retai l – Electronic tags – …
  • 14. • School Administration –Attendance Management –Voting System –Automatic Feedback Loops • Instructional technology –Media –Information management –Foreign language learning
  • 16. Challenges and Issues • Issues – Society: People, security, privacy • A policy for people in the Internet of Things: • Legislation – Environmental aspects • Resource efficiency • Pollution and disaster avoidance – Technological • Architecture (edge devices, servers, discovery services, secur ity, etc.) • Governance, naming, identity, interfaces • Service openness, interoperability • Connections of real and virtual world • Standards
  • 17. IoT will inherit the drawbacks of the current in ternet on an infinitely larger, but more invisibl e scale –Privacy – will be a huge issue when implementing IoT –Identity - Online Fragmentation of Identity –Efficiency – speed - person loses identity and is an IP address –Decisions – do not delegate too much of our deci sion making and freedom of choice to things and machines –Balancing Challenges and Issues
  • 18. • Transition to IPv4 – Internet protocol v6 • Estalishing a common set of standards betwee n companies, educational systems, and nations. – The same type of cabling, – The same applications or programming – The same protocol or set of rules that will apply to all • Developing energy sources for millions -even bill ions - of sensors. – Wind – Solar, – Hydro-electric Challenges and Issues

Editor's Notes

  1. AI: the autonomous and intelligent entities will act in full interoperability & will be able to auto-organize themselves depending on the context, circumstances or environment. ED is to design the scheme depending on the need FS means that hundreds and thousands of nodes will be disable and will be set to run. CAT means that there’s several kinds of media such as vehicle stone that they need different access technologies. SS is the machine can rend and send by themselves. No need to tell humanbeings
  2. machine-to-machine interfaces and protocols of electronic communication microcontrollers wireless communication RFID Energy harvesting technologies sensor technology Location technology Software IPv6
  3. Logistics – Tagging items on a UPS truck (now they use barcodes to be scanned) but not real-time. Using the newer technology all is in realtime.
  4. http://blogs.princeton.edu/etc/2012/02/24/the-internet-of-things/ Education – When researching items and tagging them (Radio Frequency Identification) the data can be collected and monitored over a time period.
  5. Infor­ma­tion management: research data
  6. Legislation: mandatory that policy keeps up with technology so that citizens gain confidence in the new technology People’s momentarily context and roles can determine their attitudes towards new technology. An employee will resist his boss’ access to his or her mailbox while the same person may demand the same insight into the mailboxes of subordinates.