SlideShare a Scribd company logo
Internet
Of
Things
- By Prof. Devyani Vasistha
Design Principles
of Connected
Devices
IoT
2- By Prof. Devyani Vasistha
IOT As Equation
 IoT = physical object + actuator, sensor
and controller + internet
3- By Prof. Devyani Vasistha
Design Principles of Connected
Devices
 Physical Design vs Logical Design
 Physical Design: concerned with
Shape and Look i.e. Pleasing
appearance
 Industrial Design (Product Design)
 UI design
 Digital Services
4- By Prof. Devyani Vasistha
Calm and Ambient
Technology
 Calm vs Ambient
 Cheap
 Ubicomp: Ubiquatos computing,
Universal computing
 Ambient background
 Calm technology
 Competition
 Publicity
Issues
5- By Prof. Devyani Vasistha
Ubiquitous Computing
 Ubiquitous computing (or "ubicomp")
is a concept in software engineering and
computer science where computing is
made to appear anytime and
everywhere.
 In contrast to desktop computing,
ubiquitous computing can occur using
any device, in any location, and in any
format.
6- By Prof. Devyani Vasistha
Internet Relay Chat
7- By Prof. Devyani Vasistha
8- By Prof. Devyani Vasistha
9- By Prof. Devyani Vasistha
10- By Prof. Devyani Vasistha
ISSUES
 Power
 Networking challenges
 6LoWPAN
 Configuration
 User interaction
 Technical solutions
 Good design
 Design decisions
 Large context
 Complications
 Cacophony
 Antidote
11- By Prof. Devyani Vasistha
Examples
 6LoWPAN
 Internet protocol
 Apple IPod 2001
 Portable MP3
 ITUNES
 ELIEL Saarinen’s maxim on design
12- By Prof. Devyani Vasistha
Mark Weiser and john Seely
Brown
 Calm technology engages both the
centre and the periphery of our attention
and in fact moves back and fourth
between the two.
 Live Wire
 Dangling String
13- By Prof. Devyani Vasistha
Calm Technology
14- By Prof. Devyani Vasistha
Calm Technology
15- By Prof. Devyani Vasistha
MARK WEISER AND JOHN
SEELY BROWN
“ Not all the technology need to be calm. A
calm video game will get little use; the
point is to be excited. But too much
design focuses on the object itself and
its surface features without regard for
context. We must learn to design for the
periphery so that we can most fully
command technology without being
dominated by it.”
16- By Prof. Devyani Vasistha
NOT ALL TECHNOLOGY NEED
TO BE CALM
 Twitter
 Blows bubbles
 Split-flap displays
 Dot matrix LED Display
 Olly indicater
 Glanceable displays
 Bikemap
17- By Prof. Devyani Vasistha
MAGIC AS METAPHOR
 Revolutionary aspects of technology by
Technology blogger Venkatesh Rao.
 Manufactured narmalcy field
 A technology has to make its way inside the
manufactured normalcy field.
 At the same time a technology does not stretch
the boundaries of their particular normalcy field
too far, even if the underlying technology being
employed is a huge leap ahead of the norm.
 E.g.
• (From) Mobile Phone (To) Portable Internet
Terminal
• (From)Computer as Glorified typewriter (To) GUI
Desktop
18- By Prof. Devyani Vasistha
Enchanted Effects in Devices
 From idea of WhereDial of Harry
Potter to GPS
 From idea of enchanted Mirrors of
Snow White Tale to Single-Pixel
Display
 Enchanted Umbrella
 The danger of trying use of magic to
reach beyond our capabilities enforces
need of more secure and trust worthy
control interfaces in devices to
safeguard any data they gather.
19- By Prof. Devyani Vasistha
Privacy
 Privacy: The designers of IOT Devices
need to work for the unauthorised
access of sensors or device monitoring
and reporting data to the internet.
 Keeping Secrets: In some area of
application, Leak of personal information
of a user can be dangerous and will
need measures to avoid it.
 Example: Parking app for smart phone
with Find My Car Option.
20- By Prof. Devyani Vasistha
Some more examples of
Privacy issues
 Information requested from server
through app can be a simple
unencrypted web request. (... According
to Troy Hunt)
 www.troyhunt.com/2011/09/find-my-car-
find-your-car-find.html
 A chunk of requested data with a raft of
addition information.
“ Don’t share more than you need to
provide the service.” 21- By Prof. Devyani Vasistha
“ The best way to keep a secret is to never
have it. ”-- Julian Assange (fouder of
WikiLeaks)
www.pbs.org/wgbh/pages/frontline/wikileaks/i
nterviews/julian-assange.html
i.e. Avoiding gathering or storing of data at
first place is removal of worries of
accidental disclosing of data.
Example
1. Avoid storing confidential data at place
like storing Password rather recreate new
password if forgotten.
2. Hash Cryptographic Technique: One-way
22- By Prof. Devyani Vasistha
Whose Data is it anyway?
 Public Data
 Private Data
Example: A Camera installed at public space
by a Company.
According to Adam Greenfield( A leading
practitioner at Urban Computing) “In a
public space when data is generated by
the public , then they should at least have
equal right to be ware of, and have access
to, that data. “
Point 67 at
https://speedbird.wordpress.com/2012/12/0
3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
Web Thinking for Connected
Devices
 Aim behind Internet of Things should to
get the mindset of the web and create
devices which are of the web rather than
those which just exist on the web.
 Of the web vs On the web.
 Strict vs Lenient
 Postel’s law
 Interact with other services
 Small Pieces, Loosely Joined
 First-Class Citizens on the Internet
 Graceful Degradation
24- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 If you are building all the components of
a service, it makes sense not to couple
them too tightly.
 Example: Internet is a collection of
services and machines controlled from a
central location, is an example of small
pieces, loosely joined.
 Architects of a Service: where each
piece should be designed to do one thing
well and not rely too much on tight
integration with separate component it
uses. 25- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 More Generalised Component: Try to
make components more generalised so
that they can serve other systems which
requires similar fuctions.
 Reuse and Repurpose: Generalised
component will help to reuse and
repurpose the components to build new
capabilities.
 Existing Standard and Protocol: Use
existing standard and protocols as much
as possible than inventing your own.
 http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
First-Class Citizens on the
Internet
 First-Class: One that has an identity
independent on any other item.
 First-Class Citizen: Digital Information
is the First-Class Citizen in the
networked environment.
 Securing the IoT by treating devices as
first-class citizens is the only approach
that takes into account the intricate, and
ever-growing web of relationships
between devices, people, and services.
27- By Prof. Devyani Vasistha
How can IoT devices of all kinds be made
secure in a way that ensures consumer’s
privacy and protection from malicious actors?
 The answer lies in a simple, unified
approach, one that can ensure that
connected devices are as secure as
possible: they must be treated as first-class
citizens.
 Similar to how human identity is verified
through either a passport, a driver’s licence,
or an ID card depending on the situation,
treating a device as a first-class citizen
means requiring the same level of identity
authentication.
 These credentials can be baked into the
device at the manufacturing stage, and used
to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
Graceful Degradation
 Graceful degradation is the ability of a
computer, machine, electronic system or
network to maintain limited functionality
even when a large portion of it has been
destroyed or rendered inoperative.
 The purpose of graceful degradation is to
prevent catastrophic failure.
 Ideally, even the simultaneous loss of
multiple components does not cause
downtime in a system with this feature.
 In graceful degradation, the operating
efficiency or speed declines gradually as an
increasing number of components fail.
29- By Prof. Devyani Vasistha
30- By Prof. Devyani Vasistha
Affordances
“ Affordances provide strong clues to the
operations of things . Plates are for
pushing. Knobs are for turning. Slots are
for inserting things into. Balls are for
throwing or bouncing. When affordances
are taken advantage of, the user knows
what to do just by looking: no picture,
label, or instruction is required. Complex
things may require explanation, but
simple things should not. When simple
things need pictures, labels, or
instructions, the design has failed. “ –
The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
Affordances
 Affordance is a fundamental aspect of
interaction design.
 Be it software design or physical object
design or even business design, the
designers explicitly or implicitly think
about how the users and actors of the
system behave/perform based on
various influencing factors (stimuli).
 Depending upon the specific application
of the concept and the context, the path
to arriving at the right set of affordances
could vary.
32- By Prof. Devyani Vasistha
Affordances
 When affordances are done right, the
product/service/business process
(referred to as P-S-BP, hence forth) is a
pleasure to work with.
 When done poorly, the usability and
adoption of the P-S-BP suffers greatly.
33- By Prof. Devyani Vasistha
Affordances
 Example: Digital transformation and
IOT re-design the user experiences
such as:
 A retail bank may develop a mobile app
that provides a unified, consistent,
Omni-channel across all their business
lines that this customer does business
with.
 A retail store may seamlessly blend
mobile, desktop and in-store experience
of the customer as they move across 34- By Prof. Devyani Vasistha
Affordances
35- By Prof. Devyani Vasistha
36- By Prof. Devyani Vasistha
37- By Prof. Devyani Vasistha
38- By Prof. Devyani Vasistha
THANK YOU.
- DEVYANI VASISTHA
All Pictures used in presentation are taken
from Google.
- By Prof. Devyani Vasistha 39

More Related Content

What's hot

Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
udhayakumarc1
 
Calm technology
Calm technologyCalm technology
Calm technology
मुदित जैन
 
Unit 4
Unit 4Unit 4
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
Raspberry Pi
Raspberry Pi Raspberry Pi
Raspberry Pi
Selvaraj Seerangan
 
Iot projects 2021-2022
Iot projects 2021-2022Iot projects 2021-2022
Iot projects 2021-2022
MSR PROJECTS
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Niranjan Kumar
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
Syed Mustafa
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
Lippo Group Digital
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
FabMinds
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
FabMinds
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
Hitesh Mohapatra
 
Prototyping Embedded Devices_Internet of Things
Prototyping Embedded Devices_Internet of ThingsPrototyping Embedded Devices_Internet of Things
Prototyping Embedded Devices_Internet of Things
alengadan
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
Syed Mustafa
 
Hiperlan
HiperlanHiperlan
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
AmberSinghal1
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
Yash Gajera
 

What's hot (20)

Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Calm technology
Calm technologyCalm technology
Calm technology
 
Unit 4
Unit 4Unit 4
Unit 4
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Raspberry Pi
Raspberry Pi Raspberry Pi
Raspberry Pi
 
Iot projects 2021-2022
Iot projects 2021-2022Iot projects 2021-2022
Iot projects 2021-2022
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Internet of Things - module 1
Internet of Things -  module 1Internet of Things -  module 1
Internet of Things - module 1
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Prototyping Embedded Devices_Internet of Things
Prototyping Embedded Devices_Internet of ThingsPrototyping Embedded Devices_Internet of Things
Prototyping Embedded Devices_Internet of Things
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 

Similar to IOT - Design Principles of Connected Devices

Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon Amsterdam
CLICKNL
 
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
Md Saylab
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docx
raju957290
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
MdShahinAlam25
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
ITB - UNIT 5.pdf
ITB - UNIT 5.pdfITB - UNIT 5.pdf
ITB - UNIT 5.pdf
SOMASUNDARAM T
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
jeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
odiliagilby
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
Davor Dokonal
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
LouisFrederickRakoto
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Brian Pichman
 
Tech trends
Tech trendsTech trends
Tech trends
Raoul Gomes
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
IRJET Journal
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
ugushe
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptx
AlthafMk2
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
SoonChinFhong
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18
Neeraj Gupta
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
Claire Rowland
 

Similar to IOT - Design Principles of Connected Devices (20)

Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon Amsterdam
 
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ITB - UNIT 5.pdf
ITB - UNIT 5.pdfITB - UNIT 5.pdf
ITB - UNIT 5.pdf
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech Hold
 
Tech trends
Tech trendsTech trends
Tech trends
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 

IOT - Design Principles of Connected Devices

  • 1. Internet Of Things - By Prof. Devyani Vasistha
  • 3. IOT As Equation  IoT = physical object + actuator, sensor and controller + internet 3- By Prof. Devyani Vasistha
  • 4. Design Principles of Connected Devices  Physical Design vs Logical Design  Physical Design: concerned with Shape and Look i.e. Pleasing appearance  Industrial Design (Product Design)  UI design  Digital Services 4- By Prof. Devyani Vasistha
  • 5. Calm and Ambient Technology  Calm vs Ambient  Cheap  Ubicomp: Ubiquatos computing, Universal computing  Ambient background  Calm technology  Competition  Publicity Issues 5- By Prof. Devyani Vasistha
  • 6. Ubiquitous Computing  Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.  In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. 6- By Prof. Devyani Vasistha
  • 7. Internet Relay Chat 7- By Prof. Devyani Vasistha
  • 8. 8- By Prof. Devyani Vasistha
  • 9. 9- By Prof. Devyani Vasistha
  • 10. 10- By Prof. Devyani Vasistha
  • 11. ISSUES  Power  Networking challenges  6LoWPAN  Configuration  User interaction  Technical solutions  Good design  Design decisions  Large context  Complications  Cacophony  Antidote 11- By Prof. Devyani Vasistha
  • 12. Examples  6LoWPAN  Internet protocol  Apple IPod 2001  Portable MP3  ITUNES  ELIEL Saarinen’s maxim on design 12- By Prof. Devyani Vasistha
  • 13. Mark Weiser and john Seely Brown  Calm technology engages both the centre and the periphery of our attention and in fact moves back and fourth between the two.  Live Wire  Dangling String 13- By Prof. Devyani Vasistha
  • 14. Calm Technology 14- By Prof. Devyani Vasistha
  • 15. Calm Technology 15- By Prof. Devyani Vasistha
  • 16. MARK WEISER AND JOHN SEELY BROWN “ Not all the technology need to be calm. A calm video game will get little use; the point is to be excited. But too much design focuses on the object itself and its surface features without regard for context. We must learn to design for the periphery so that we can most fully command technology without being dominated by it.” 16- By Prof. Devyani Vasistha
  • 17. NOT ALL TECHNOLOGY NEED TO BE CALM  Twitter  Blows bubbles  Split-flap displays  Dot matrix LED Display  Olly indicater  Glanceable displays  Bikemap 17- By Prof. Devyani Vasistha
  • 18. MAGIC AS METAPHOR  Revolutionary aspects of technology by Technology blogger Venkatesh Rao.  Manufactured narmalcy field  A technology has to make its way inside the manufactured normalcy field.  At the same time a technology does not stretch the boundaries of their particular normalcy field too far, even if the underlying technology being employed is a huge leap ahead of the norm.  E.g. • (From) Mobile Phone (To) Portable Internet Terminal • (From)Computer as Glorified typewriter (To) GUI Desktop 18- By Prof. Devyani Vasistha
  • 19. Enchanted Effects in Devices  From idea of WhereDial of Harry Potter to GPS  From idea of enchanted Mirrors of Snow White Tale to Single-Pixel Display  Enchanted Umbrella  The danger of trying use of magic to reach beyond our capabilities enforces need of more secure and trust worthy control interfaces in devices to safeguard any data they gather. 19- By Prof. Devyani Vasistha
  • 20. Privacy  Privacy: The designers of IOT Devices need to work for the unauthorised access of sensors or device monitoring and reporting data to the internet.  Keeping Secrets: In some area of application, Leak of personal information of a user can be dangerous and will need measures to avoid it.  Example: Parking app for smart phone with Find My Car Option. 20- By Prof. Devyani Vasistha
  • 21. Some more examples of Privacy issues  Information requested from server through app can be a simple unencrypted web request. (... According to Troy Hunt)  www.troyhunt.com/2011/09/find-my-car- find-your-car-find.html  A chunk of requested data with a raft of addition information. “ Don’t share more than you need to provide the service.” 21- By Prof. Devyani Vasistha
  • 22. “ The best way to keep a secret is to never have it. ”-- Julian Assange (fouder of WikiLeaks) www.pbs.org/wgbh/pages/frontline/wikileaks/i nterviews/julian-assange.html i.e. Avoiding gathering or storing of data at first place is removal of worries of accidental disclosing of data. Example 1. Avoid storing confidential data at place like storing Password rather recreate new password if forgotten. 2. Hash Cryptographic Technique: One-way 22- By Prof. Devyani Vasistha
  • 23. Whose Data is it anyway?  Public Data  Private Data Example: A Camera installed at public space by a Company. According to Adam Greenfield( A leading practitioner at Urban Computing) “In a public space when data is generated by the public , then they should at least have equal right to be ware of, and have access to, that data. “ Point 67 at https://speedbird.wordpress.com/2012/12/0 3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
  • 24. Web Thinking for Connected Devices  Aim behind Internet of Things should to get the mindset of the web and create devices which are of the web rather than those which just exist on the web.  Of the web vs On the web.  Strict vs Lenient  Postel’s law  Interact with other services  Small Pieces, Loosely Joined  First-Class Citizens on the Internet  Graceful Degradation 24- By Prof. Devyani Vasistha
  • 25. Small Pieces, Loosely Joined  If you are building all the components of a service, it makes sense not to couple them too tightly.  Example: Internet is a collection of services and machines controlled from a central location, is an example of small pieces, loosely joined.  Architects of a Service: where each piece should be designed to do one thing well and not rely too much on tight integration with separate component it uses. 25- By Prof. Devyani Vasistha
  • 26. Small Pieces, Loosely Joined  More Generalised Component: Try to make components more generalised so that they can serve other systems which requires similar fuctions.  Reuse and Repurpose: Generalised component will help to reuse and repurpose the components to build new capabilities.  Existing Standard and Protocol: Use existing standard and protocols as much as possible than inventing your own.  http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
  • 27. First-Class Citizens on the Internet  First-Class: One that has an identity independent on any other item.  First-Class Citizen: Digital Information is the First-Class Citizen in the networked environment.  Securing the IoT by treating devices as first-class citizens is the only approach that takes into account the intricate, and ever-growing web of relationships between devices, people, and services. 27- By Prof. Devyani Vasistha
  • 28. How can IoT devices of all kinds be made secure in a way that ensures consumer’s privacy and protection from malicious actors?  The answer lies in a simple, unified approach, one that can ensure that connected devices are as secure as possible: they must be treated as first-class citizens.  Similar to how human identity is verified through either a passport, a driver’s licence, or an ID card depending on the situation, treating a device as a first-class citizen means requiring the same level of identity authentication.  These credentials can be baked into the device at the manufacturing stage, and used to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
  • 29. Graceful Degradation  Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.  The purpose of graceful degradation is to prevent catastrophic failure.  Ideally, even the simultaneous loss of multiple components does not cause downtime in a system with this feature.  In graceful degradation, the operating efficiency or speed declines gradually as an increasing number of components fail. 29- By Prof. Devyani Vasistha
  • 30. 30- By Prof. Devyani Vasistha
  • 31. Affordances “ Affordances provide strong clues to the operations of things . Plates are for pushing. Knobs are for turning. Slots are for inserting things into. Balls are for throwing or bouncing. When affordances are taken advantage of, the user knows what to do just by looking: no picture, label, or instruction is required. Complex things may require explanation, but simple things should not. When simple things need pictures, labels, or instructions, the design has failed. “ – The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
  • 32. Affordances  Affordance is a fundamental aspect of interaction design.  Be it software design or physical object design or even business design, the designers explicitly or implicitly think about how the users and actors of the system behave/perform based on various influencing factors (stimuli).  Depending upon the specific application of the concept and the context, the path to arriving at the right set of affordances could vary. 32- By Prof. Devyani Vasistha
  • 33. Affordances  When affordances are done right, the product/service/business process (referred to as P-S-BP, hence forth) is a pleasure to work with.  When done poorly, the usability and adoption of the P-S-BP suffers greatly. 33- By Prof. Devyani Vasistha
  • 34. Affordances  Example: Digital transformation and IOT re-design the user experiences such as:  A retail bank may develop a mobile app that provides a unified, consistent, Omni-channel across all their business lines that this customer does business with.  A retail store may seamlessly blend mobile, desktop and in-store experience of the customer as they move across 34- By Prof. Devyani Vasistha
  • 35. Affordances 35- By Prof. Devyani Vasistha
  • 36. 36- By Prof. Devyani Vasistha
  • 37. 37- By Prof. Devyani Vasistha
  • 38. 38- By Prof. Devyani Vasistha
  • 39. THANK YOU. - DEVYANI VASISTHA All Pictures used in presentation are taken from Google. - By Prof. Devyani Vasistha 39