SlideShare a Scribd company logo
Internet of Things and
Applications
Prepared By
Mrs.Archana B T
Assistant Professor, Dept. of ECE
INTRODUCTION TO IOT
• Internet of Things (IoT) is a concept which enables communication
between internetworking devices and applications, whereby physical
objects or ‘things’ communicate through the Internet.
• The Internet is a vast global network of connected servers,
computers, tablets and mobiles that is governed by standard protocols
for connected systems. It enables sending, receiving, or
communication of information, connectivity with remote servers,
cloud and analytics platforms.
• Thing in English has number of uses and meanings. In a dictionary,
thing is a word used to refer to a physical object, an action or idea, a
situation or activity, in case when one does not wish to be precise.
unit 1 Introduction to IOT
INTRODUCTION TO IOT
• Internet of Things means a network of physical things (objects) sending,
receiving, or communicating information using the Internet or other
communication technologies and network just as the computers, tablets
and mobiles do, and thus enabling the monitoring, coordinating or
controlling process across the Internet or another data network.
unit 1 Introduction to IOT
Sensing Layer − The first stage of IoT includes
sensors, devices, actuators etc. which collect data
from the physical environment, processes it and then
sends it over the network.
Network Layer − The second stage of the IoT
consists of Network Gateways and Data Acquisition
Systems. DAS converts the analogue data (collected
from Sensors) into Digital Data. It also performs
malware detection and data management.
Data Processing Layer − The third stage of IoT is the most important stage. Here, data is pre-processed
on its variety and separated accordingly. After this, it is sent to Data Centres. Here Edge IT comes into
use.
Application Layer − The fourth stage of IoT consists of Cloud/Data Centres where data is managed and
used by applications like agriculture, defence, health care etc.
IOT ARCHITECTURE
unit 1 Introduction to IOT
•
Architectural Overview
• Functional View: Description of what the system does, and its main
functions.
• Information View: Description of the data and information that the
system handles.
• Deployment and Operational View: Description of the main real
world components of the system such as devices, network routers,
servers, etc.
unit 1 Introduction to IOT
IOT Functional View
• Device and Application functional group
• Communication functional group
• IoT Service functional group
• Virtual Entity functional group
• Process Management functional group
• Service Organization functional group
• Security functional group
• Management functional group
unit 1 Introduction to IOT
IOT Information View
• Virtual Entity context information,
• Virtual Entity descriptions
• Virtual Entity Associations
• IoT Service
• Resource Descriptions
• Device Descriptions
• Descriptions of Composed Services
• IoT Business Process Model describes
unit 1 Introduction to IOT
Deployment and Operational view
• Deployment view gives the view of deployments of FCs, such as
objects ( sensors, machines, actuators, devices ), software entities,
such as gateway, firewall, network protocols, management and service
in IoT system.
unit 1 Introduction to IOT
Advantages and Disadvantages of IoT
• Cost Reduction − IOT devices catch any problem very fast as compared
to traditional troubleshooting. It not only saves time but also saves costs
of large repairs.
• Efficiency and Productivity − An automated PDF conversion and
creation tool will remove the hustle of PDF editing and archiving.
Hence, increase in Efficiency and Productivity.
• Business Opportunities − IOT provides advanced analytics, smart utility
grids which help Small Management Businesses to provide more
valuable content and things to their customers.
unit 1 Introduction to IOT
• Customer Experience − Nowadays customer's experience is the most
valuable thing in running a business. IoT has drastically increased the
customer's experience. An example of customer experience is Home
Automation. Since everything is connected, customers need not have
to worry about appliances. One can turn off the appliance through
mobile.
• Mobility and Agility − With the help of IoT, employees can do their
work from any geographical location, anytime without any
restrictions.
unit 1 Introduction to IOT
Disadvantages
Security − The data is travelling all over the Internet. So maintaining its
privacy is still a Big Challenge. End-to-end Encryption is a must in IoT.
Compatibility − There is no International Standard for the monitoring
of the equipment.
Complexity − Most of the devices still contain some software bugs.
Each device must be able to seamlessly interact with other devices in the
network.
Safety − Suppose a patient is left unattended by a doctor. And some
notorious guy changes the prescription or Health monitoring devices
malfunctioned. Then it can result in the death of the patient.
Policies − Government authorities must take some steps to make
policies and standards related to IoT to stop the Black marketing of IoT
devices.
unit 1 Introduction to IOT
Design Principles
Basic design principles for IoT architecture design are:
• Open source
• Reuse of resources across application domains and across wide range
of applications
• Design for ensuring the privacy, security and trusted real world
services
• Scalability, performance and effectiveness
• Simplicity of management
• Design of different service delivery models
• Life cycle support
unit 1 Introduction to IOT
FOCUS ON VALUE
• Need to find out where lies a problem truly worth solving and what is the real end
user value of the solution
• Need to understand what might be the barriers of adopting the new technology
• The features that might be valuable and highly relevant for the tech early adopters
may be uninteresting for the majority of the users
TAKE A HOLISTIC VIEW
• IoT solutions typically consist of multiple devices with different capabilities so the
solution may also be provided in co-operation with multiple different service
providers.
• Need to take a holistic look across the whole system, the role of each device and
service, and the conceptual model of how user understands and perceives the
system. unit 1 Introduction to IOT
PUT SAFETY FIRST
• It is really important for users to feel, that their private data is safe,
their home, working environment and everyday objects cannot be
hacked and their loved ones are not put at risk.
• Quality assurance is critical and it should not only focus on testing the
SW, but on testing the end to end system, in a real-world context.
CONSIDER THE CONTEXT
• Depending on the physical context, the goal might be to minimize
distraction of the user
• e.g. to design devices that hold up against changing weather
conditions.
unit 1 Introduction to IOT
BUILD A STRONG BRAND
• Due to the real world context of the IoT solutions, regardless of how
carefully you design things and aim to build trust
• While designing your brand, you must keep in mind, that trust should
be a key element of the brand,
PROTOTYPE EARLY AND OFTEN
• Typically HW and SW have quite different lifespans, but as successful
IoT solution needs both the HW and SW elements, the lifespans
should be aligned
USE DATA RESPONSIBLY
• It’s necessary for the designer to understand the possibilities of data
science and how to make sense of the data. Data science provides a lot
of opportunities to reduce user friction, i.e. reducing use of time,
energy and attention or diminishing stress.
unit 1 Introduction to IOT
Needed capabilities
1. Create an enterprise data strategy
• Determining what data they have and how it relates to business goals, identifying
new data sources, ensuring overall data quality
• Understanding how spaces are used allows you to make more informed decisions
about how to grow your organization, plan development, update infrastructure,
and estimate workforce demands
2. Balance structure and flexibility to exploit new opportunities
• IoT can be used to improve existing business processes, but its actual worth is
realized when teams take the time to figure out what's failing and why, fix the
underlying issues, and align all associated processes and workflows to optimize
new IoT value
unit 1 Introduction to IOT
3 Develop specialized talent
• Hire new-skilled employees
• People who can work in an environment marked by constant change, uncertain
outcomes, and a desire to create and optimize business value
4 Harden and evolve security
• Companies must prepare for greater cyberattacks as they implement IoT programs
• The Internet of Things creates security issues. With more endpoints hackers have a
larger attack surface to deal with. The answer is to address security at a large scale
5 Continually consider consumer expectations
• consumer consent to collect only the data they require and then asking for
permission to collect more
• Companies who fail to follow this policy risk losing business if they lose
consumer trust as a result of privacy or security breaches
unit 1 Introduction to IOT
unit 1 Introduction to IOT
IOT Applications
Basics of networking
• A computer network is made up of two or more
computers that are linked together by cables (wired)
or Wi-Fi (wireless) in order to transmit, exchange, or
share data and resources
• Hardware (such as routers, switches, access points,
and cables) and software are used to create a
computer network (e.g., operating systems or
business applications).
unit 1 Introduction to IOT
Networking types
1. Wired Networks
Ethernet is the data link protocol used in wired networks. This is unlikely to alter with
the Internet of Things, as most IoT devices will be wireless
Wired advantages
• Wireless networks are slower than wired networks. Data rates were
boosted from 10 megabits per second to 1 gigabit per second on a regular
basis. The majority of residential networks use speeds of 10 to 100 Mbps.
• Wireless is less secure
unit 1 Introduction to IOT
Disadvantages
• Need to use cable, which is unattractive, difficult to install, and costly.
• It is difficult to utilize between buildings (planning etc.).
• Mobile phones and tablets are not supported.
unit 1 Introduction to IOT
2 Wireless network
• Wi-Fi is the data communication protocol used by wireless networks.
Advantages
• In general, they are easier to set up.
• It operates on both private and public networks.
• There are no cables necessary.
• Mobile phones and tablets are supported.
Disadvantages
• Networks that are wireless are slower than those that are wired.
• Range is a limitation.
• Eavesdropping is possible.
• Depending on the setup, it may not be secure.
unit 1 Introduction to IOT
Network topology
• There are a variety of methods for connecting network nodes. This
isn't usually a consideration in small networks, but it becomes
increasingly significant as networks grow larger.
• Wi-Fi, Bluetooth, and other common connection technologies are
intended to work with a specific network layout.
Common are:
• Bus
• Ring
• Mesh
• Star
• Hybrid Each
unit 1 Introduction to IOT
unit 1 Introduction to IOT
unit 1 Introduction to IOT
The following are some terms that are frequently used:
PAN - PAN (Personal Area Network) is a network that connects local devices,
such as a computer to a printer
LAN - The LAN (Local Area Network) connects devices in a single or
multiple offices
MAN - MAN (Metropolitan Area Network) is a network that connects devices
across numerous buildings, such as a campus
WAN - WAN stands for wide area network, and it connects devices across a
country or countries.
unit 1 Introduction to IOT
M2M and IoT Technology Fundamentals
• Machine-to-machine, or M2M, is a broad label that can be used to
describe any technology that enables networked devices to exchange
information and perform actions without the manual assistance of
humans.
• M2M has found applications in field such as healthcare, business, and
insurance. M2M is also the foundation for the internet of things (IoT).
• Example:
• A vending machine can message the distributor's network, or machine,
when a particular item is running low to send a refill
• In telemedicine, M2M devices can enable the real-time monitoring of
patients' vital statistics, dispensing medicine when required, or
tracking healthcare assets.
unit 1 Introduction to IOT
Key features of M2M technology include
• Low power consumption, to improve the system's ability to effectively service
M2M applications.
• A network operator that provides packet-switched service
• Monitoring abilities that provide the functionality to detect events
• Time control, meaning data can only be sent or received at specific predetermined
periods.
• Location-specific triggers that alert or wake up devices when they enter particular
areas.
• The ability to continually send and receive small amounts of data.
unit 1 Introduction to IOT
unit 1 Introduction to IOT
Packet switching
Working of M2M Communication
• The main purpose of machine-to-machine technology is to collect sensor data and
transmit it to a network
• The main components of an M2M system include sensors, RFID, a Wi-Fi or
cellular communications link, and autonomic computing software programmed to
help a network device interpret data and make decisions.
M2M Benefits
• Reduced costs by minimizing equipment maintenance and downtime
• Boosted revenue by revealing new business opportunities for servicing
products in the field
• Improved customer service by proactively monitoring and servicing equipment
before it fails or only when it is needed.
unit 1 Introduction to IOT
unit 1 Introduction to IOT
M2M requirements
• Scalability - The M2M system should be able to continue to function
efficiently as more connected objects are added.
• Anonymity - The M2M system must be able to hide the identity of an
M2M device when requested, subject to regulatory requirements.
• Logging - M2M systems must support the recording of important
events, such as failed installation attempts, service not operating, or the
occurrence of faulty information.
unit 1 Introduction to IOT
unit 1 Introduction to IOT
IoT/M2M systems layers
Layer 1: M2M Application Domain
• Integration, Collaboration, and M2M Application Services
• Application (Reporting, Analysis, Control)
Layer 2: Network Domain
• M2M server, device identity, device and device-network management
• Uni-cast and multicast message delivery
Layer 3: M2M device communication domain
• M2M Devices Domain Communication
• Gateway
• Physical devices and Controllers (the things in IoT) [Sensors,
machines, devices, Intelligent Edge nodes of Different Types
unit 1 Introduction to IOT
Devices and Gateways
unit 1 Introduction to IOT
• IoT Gateway is a system for facilitating IoT communication, which is
typically device-to-device or device-to-cloud
• Gateway allows to communicate with devices maintaining security
and providing an admin interface to perform simple tasks.
unit 1 Introduction to IOT
IoT Gateway feature set
• Facilitating communication with non-internet connected devices
• Data caching, buffering and streaming
• Data pre-processing, filtering and optimization
• Device to Device communications/M2M
• Networking features and hosting live data
• Security – manage user access and network security features
• Device configuration management
• System diagnostics
unit 1 Introduction to IOT
Data management
• Data management is the process of reducing a large amount of data to
the most relevant information
• Intelligent things can gather, transmit, and analyze data, but
aggregating data and drawing inferences, trends, and patterns will
require a tool.
• Embedded system and device developers and manufacturers must
create a data management framework that is interoperable with all
software and hardware involved in data collection, administration, and
distribution.
unit 1 Introduction to IOT
Requirement for data management
• Scalability
• Organizations should consider whether their current network and
infrastructure can handle massive data volumes in the long run. They
should also consider which storage solution is best for them: cloud,
data center, data stored at the edge, or a hybrid model
• Data gravity
• Value is created by volume
• Data gravity develops when the volume of IoT data expands. As data
volumes increase, other applications or services can extract value from
it.
unit 1 Introduction to IOT
• Integration
• Wired and wireless devices, processors and storage, services,
platforms, and apps are all available to help you turn your connection
into value
• This includes real-time processing of operational data, secure
integration of components and connections within an IoT
environment, and security safeguards that enable enterprises to
connect, harvest, share, and manage data across the whole IoT
network.
• Data management challenges
• It's critical to keep data safe from unauthorized access and alteration
unit 1 Introduction to IOT
• Why IoT data management
• Product development
IoT data management can help you recognize and use patterns, which
can then be used in the decision-making process to improve product
design and development.
• Facilitate resource and system efficiency
Data management allows you to have a better understanding of how
customers interact with your products in a consumer IoT context
unit 1 Introduction to IOT
• Predict wear and tear of assets
You can utilize the data to see if devices and/or people are acting in
unusual ways and create predictions based on that information
unit 1 Introduction to IOT
Business Process in IOT
• Business process is a series of activities or a collection of inter related
structured activities, task or process
• A BP serves a particular goal or specific result or service product
Distributed Business Process is a collection of logically interrelated business
process
• It reduces the complexity and enables faster responses and smaller
processing load at the central BP system
unit 1 Introduction to IOT
• Business Intelligence is a process which a business service to extract
new facts and knowledge and the undertake better decisions
• New facts and knowledge follow from the earlier results of data
processing, aggregation and analysing those results
unit 1 Introduction to IOT
unit 1 Introduction to IOT
unit 1 Introduction to IOT
https://youtu.be/ktcRXyE8SaY
• Everything as a Service (XaaS):
• refers to the services and apps that users can request on the Internet
• cloud computing terminology
• SaaS (Software-as-a-Service)
• PaaS (Platform-as-a-Service)
• IaaS (Infrastructure –as-a-Service)
• Communication-as-a-Service (CaaS)
VoIP (voice over IP or Internet telephony),
IM (instant messaging)
video conference software
• Security-as-a-Service (SECaaS)
Anti-virus software, encryption, authentication,
intrusion detection systems, and other services may
be provided.
• Healthcare-as-a-Service (HaaS)
• Online consultations with doctors
• Health monitoring 24/7
• Medicine delivery at your doorstep
• Lab samples collection even at home and delivery of results as soon as they
are ready
• Access to your medical records 24/7
• Transportation-as-a-Service (TaaS)
• Mobility and flexibility of traveling over various
distances are important trends in modern civilization.
• Car sharing - You can rent a car from any location using
a special app and drive wherever you need to go, paying
for the time you use the car or the distance you travel.
• Uber taxi services - You hire a cab through an app that
estimates the cost of the journey ahead of time). In the
near future, Uber plans to test flying taxis and selfdriving
planes.
• Benefits of XaaS
• Scalability
• Cost and time effectiveness
• Focus on core competencies
• The high quality of services
• Better customer services
• Role of Cloud in IoT
• The Internet of Things (IoT) generates a large amount
of data, which is referred to as big data
• Cloud computing, with its various models and
implementation platforms, assists businesses in
managing and analyzing data, hence improving the
overall efficiency and effectiveness of IoT systems.
• Cloud Platform for Device Lifecycle Management
• Cloud services (SaaS) enable businesses to create apps and software
that link devices and enable device registration, onboarding, remote
device upgrades, and remote device diagnosis in a fraction of the time
while lowering operating and support expenses.
• Internet Cloud+ clients =User application/services
• Cloud platform usages for M2M/IoT
• Data storage
• Data connected to Application Programming Interface(API) for application
• Data connect to the services
• Application/services integrate the data with the enterprise application/services
and gets analysed
unit 1 Introduction to IOT
Data collection/storage and computing using
cloud
Methods for data collection and storage
• Devices/sensor networks data collection at the device web servers
• Local files
• Dedicated data store at coordinating node
• Local edge node distributed DBMS files for M2M/IoT devices
network
• Internet connected server
• Internet connected distributed DBMS nodes at an enterprise server or
at data centre
unit 1 Introduction to IOT
M2M /IoT device connected PaaS Cloud
unit 1 Introduction to IOT
• CISCO IoT PaaS(CIOT)
• It allows a developer to work in familiar Linux Applications
environment
• It provides network connectivity, cyber and physical security and data
analytics
• CISCO Fog provides an ecosystem with the ability to transfer sensor
data and perform control functions with distributed network nodes
unit 1 Introduction to IOT
AWS IoT PaaS
unit 1 Introduction to IOT
• Amazon simple storage service(S3)
• It is a scalable , high speed, web based cloud storage service designed
for online backup and archiving of data and application on AWS
unit 1 Introduction to IOT
TCS Connected universe PaaS
• Connected Universe Platform(CUP) offers connectivity to customers,
Mobile app, etc
• CUP provides data processing functions and data analytics in BPs,
intelligence and knowledge discovery
• It is a scalable platform for sensor data storage and real time data
processing
• It makes it easy to develop and deploy software applications
unit 1 Introduction to IOT
Security Aspects in IoT
• Five functional components of security are defined in IoT
• Identity Management
• Authentication
• Authorisation
• Key exchange and management
• Trust and reputation
unit 1 Introduction to IOT
• Identity Management
• Source of message need to specify an identity when sending message
• Messages can be from sensors, actuators, platforms etc and needed to
connect to several applications/services
• MAC address specify the identity of computing device platform
• Universal Resource Identifier(URL) can be used in internet
• In IoT applications Object identifiers are used
• E.g.: Type of things (ATM,RFID)
• Instance identifier VIN(Vehicle Identify Number)
unit 1 Introduction to IOT
Authentication
• A hash function gives irreversible result after many operations on
input
• The operations generate a 128 or 256 bit hash value using
authentication data and secret keys as input
• Receiver end receives the hash value and compares with stored value
• If both are equal then sender is authenticated
unit 1 Introduction to IOT
Authorisation
• Access control allows only authorised device or application /service to
a resource such as web API input, IoT device, Sensor or actuator data
• Data authorisation model
• Access Control List for coarse grain access control
• Role based access control for fine grain access control
• Attribute based access control for other capability based system
access control
unit 1 Introduction to IOT
Key Exchange and Management
• Key of sender messages need to be known to receiver for accessing the
received data
• The key need to be exchange before the communication of
authentication code, authorisation command encrypted message
unit 1 Introduction to IOT
• Message Integrity
• When communication takes place the message should remains
unchanged
• Encrypted data after decrypting should be identical to one before
encryption
unit 1 Introduction to IOT
Do not put any sensitive business or personal information in the cloud.
• No passwords should be stored on your IoT device or in the cloud.
• Installing malware without first validating its legitimacy is a bad
idea.
• Always get third-party software from reputable and trustworthy
sources.
• Do not be in a hurry to start utilizing your IoT gadget; instead,
protect it with anti-malware and anti-virus software.
• If feasible, change the password on your IoT device on a frequent
basis to boost security.
• If your home network is less secure than your office network, don't
bring any important business material home to rework.
unit 1 Introduction to IOT
Do not keep sensitive information on readily hacked storage devices or
in public storage facilities.
Furthermore, avoid using a public WiFi network for such tasks. • Turn
down unneeded IoT devices in
• your home network since they are exposed to hackers. When not in
use, for example, turn off IoT-enabled thermostats. •
• When you don't need internet connectivity, turn off the wifi on your
smartphone. This is because it has been discovered that passwords and
location information from
•
unit 1 Introduction to IOT
smartphone-based fitness apps can be easily leaked through public wifi
networks.
• Companies in the business, finance, and banking sectors should keep
and retain data until it is needed. To reduce the risk of hacking, they
should be erased after they are no longer needed
unit 1 Introduction to IOT
unit 1 Introduction to IOT
•
Regular software fixes for smart watches, IoT sensors, IoT gadgets,
and healthcare apps on smartphones should be provided by IoT
service providers.
This improves the security of IoT devices.
These fixes should be able to handle the most recent and
contemporary malware and viruses.

More Related Content

Similar to IOT TOTAL POWER POINT PRESENTATION UNITS

IoT.pptx
IoT.pptxIoT.pptx
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
HakkemB
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
ssuserec53e73
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
ssuserb7947f
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
arjun431527
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Selva914004
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
SoonChinFhong
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
Priyab Satoshi
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
murugesanarumugam
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
ssuser2cc0d4
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
AbdikeTulbe
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
Gabriella Davis
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
VijaySathappan
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
Adrian Wright
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
vidhanPoddar1
 
Introduction of Iot and Logical and Physical design of iot
Introduction of Iot and Logical and Physical design of iotIntroduction of Iot and Logical and Physical design of iot
Introduction of Iot and Logical and Physical design of iot
MayankKumar380505
 
What are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdfWhat are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdf
ashumasih3
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 

Similar to IOT TOTAL POWER POINT PRESENTATION UNITS (20)

IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Introduction of Iot and Logical and Physical design of iot
Introduction of Iot and Logical and Physical design of iotIntroduction of Iot and Logical and Physical design of iot
Introduction of Iot and Logical and Physical design of iot
 
What are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdfWhat are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdf
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

IOT TOTAL POWER POINT PRESENTATION UNITS

  • 1. Internet of Things and Applications Prepared By Mrs.Archana B T Assistant Professor, Dept. of ECE
  • 2. INTRODUCTION TO IOT • Internet of Things (IoT) is a concept which enables communication between internetworking devices and applications, whereby physical objects or ‘things’ communicate through the Internet. • The Internet is a vast global network of connected servers, computers, tablets and mobiles that is governed by standard protocols for connected systems. It enables sending, receiving, or communication of information, connectivity with remote servers, cloud and analytics platforms. • Thing in English has number of uses and meanings. In a dictionary, thing is a word used to refer to a physical object, an action or idea, a situation or activity, in case when one does not wish to be precise. unit 1 Introduction to IOT
  • 3. INTRODUCTION TO IOT • Internet of Things means a network of physical things (objects) sending, receiving, or communicating information using the Internet or other communication technologies and network just as the computers, tablets and mobiles do, and thus enabling the monitoring, coordinating or controlling process across the Internet or another data network. unit 1 Introduction to IOT
  • 4. Sensing Layer − The first stage of IoT includes sensors, devices, actuators etc. which collect data from the physical environment, processes it and then sends it over the network. Network Layer − The second stage of the IoT consists of Network Gateways and Data Acquisition Systems. DAS converts the analogue data (collected from Sensors) into Digital Data. It also performs malware detection and data management. Data Processing Layer − The third stage of IoT is the most important stage. Here, data is pre-processed on its variety and separated accordingly. After this, it is sent to Data Centres. Here Edge IT comes into use. Application Layer − The fourth stage of IoT consists of Cloud/Data Centres where data is managed and used by applications like agriculture, defence, health care etc. IOT ARCHITECTURE unit 1 Introduction to IOT
  • 5. • Architectural Overview • Functional View: Description of what the system does, and its main functions. • Information View: Description of the data and information that the system handles. • Deployment and Operational View: Description of the main real world components of the system such as devices, network routers, servers, etc. unit 1 Introduction to IOT
  • 6. IOT Functional View • Device and Application functional group • Communication functional group • IoT Service functional group • Virtual Entity functional group • Process Management functional group • Service Organization functional group • Security functional group • Management functional group unit 1 Introduction to IOT
  • 7. IOT Information View • Virtual Entity context information, • Virtual Entity descriptions • Virtual Entity Associations • IoT Service • Resource Descriptions • Device Descriptions • Descriptions of Composed Services • IoT Business Process Model describes unit 1 Introduction to IOT
  • 8. Deployment and Operational view • Deployment view gives the view of deployments of FCs, such as objects ( sensors, machines, actuators, devices ), software entities, such as gateway, firewall, network protocols, management and service in IoT system. unit 1 Introduction to IOT
  • 9. Advantages and Disadvantages of IoT • Cost Reduction − IOT devices catch any problem very fast as compared to traditional troubleshooting. It not only saves time but also saves costs of large repairs. • Efficiency and Productivity − An automated PDF conversion and creation tool will remove the hustle of PDF editing and archiving. Hence, increase in Efficiency and Productivity. • Business Opportunities − IOT provides advanced analytics, smart utility grids which help Small Management Businesses to provide more valuable content and things to their customers. unit 1 Introduction to IOT
  • 10. • Customer Experience − Nowadays customer's experience is the most valuable thing in running a business. IoT has drastically increased the customer's experience. An example of customer experience is Home Automation. Since everything is connected, customers need not have to worry about appliances. One can turn off the appliance through mobile. • Mobility and Agility − With the help of IoT, employees can do their work from any geographical location, anytime without any restrictions. unit 1 Introduction to IOT
  • 11. Disadvantages Security − The data is travelling all over the Internet. So maintaining its privacy is still a Big Challenge. End-to-end Encryption is a must in IoT. Compatibility − There is no International Standard for the monitoring of the equipment. Complexity − Most of the devices still contain some software bugs. Each device must be able to seamlessly interact with other devices in the network. Safety − Suppose a patient is left unattended by a doctor. And some notorious guy changes the prescription or Health monitoring devices malfunctioned. Then it can result in the death of the patient. Policies − Government authorities must take some steps to make policies and standards related to IoT to stop the Black marketing of IoT devices. unit 1 Introduction to IOT
  • 12. Design Principles Basic design principles for IoT architecture design are: • Open source • Reuse of resources across application domains and across wide range of applications • Design for ensuring the privacy, security and trusted real world services • Scalability, performance and effectiveness • Simplicity of management • Design of different service delivery models • Life cycle support unit 1 Introduction to IOT
  • 13. FOCUS ON VALUE • Need to find out where lies a problem truly worth solving and what is the real end user value of the solution • Need to understand what might be the barriers of adopting the new technology • The features that might be valuable and highly relevant for the tech early adopters may be uninteresting for the majority of the users TAKE A HOLISTIC VIEW • IoT solutions typically consist of multiple devices with different capabilities so the solution may also be provided in co-operation with multiple different service providers. • Need to take a holistic look across the whole system, the role of each device and service, and the conceptual model of how user understands and perceives the system. unit 1 Introduction to IOT
  • 14. PUT SAFETY FIRST • It is really important for users to feel, that their private data is safe, their home, working environment and everyday objects cannot be hacked and their loved ones are not put at risk. • Quality assurance is critical and it should not only focus on testing the SW, but on testing the end to end system, in a real-world context. CONSIDER THE CONTEXT • Depending on the physical context, the goal might be to minimize distraction of the user • e.g. to design devices that hold up against changing weather conditions. unit 1 Introduction to IOT
  • 15. BUILD A STRONG BRAND • Due to the real world context of the IoT solutions, regardless of how carefully you design things and aim to build trust • While designing your brand, you must keep in mind, that trust should be a key element of the brand, PROTOTYPE EARLY AND OFTEN • Typically HW and SW have quite different lifespans, but as successful IoT solution needs both the HW and SW elements, the lifespans should be aligned USE DATA RESPONSIBLY • It’s necessary for the designer to understand the possibilities of data science and how to make sense of the data. Data science provides a lot of opportunities to reduce user friction, i.e. reducing use of time, energy and attention or diminishing stress. unit 1 Introduction to IOT
  • 16. Needed capabilities 1. Create an enterprise data strategy • Determining what data they have and how it relates to business goals, identifying new data sources, ensuring overall data quality • Understanding how spaces are used allows you to make more informed decisions about how to grow your organization, plan development, update infrastructure, and estimate workforce demands 2. Balance structure and flexibility to exploit new opportunities • IoT can be used to improve existing business processes, but its actual worth is realized when teams take the time to figure out what's failing and why, fix the underlying issues, and align all associated processes and workflows to optimize new IoT value unit 1 Introduction to IOT
  • 17. 3 Develop specialized talent • Hire new-skilled employees • People who can work in an environment marked by constant change, uncertain outcomes, and a desire to create and optimize business value 4 Harden and evolve security • Companies must prepare for greater cyberattacks as they implement IoT programs • The Internet of Things creates security issues. With more endpoints hackers have a larger attack surface to deal with. The answer is to address security at a large scale 5 Continually consider consumer expectations • consumer consent to collect only the data they require and then asking for permission to collect more • Companies who fail to follow this policy risk losing business if they lose consumer trust as a result of privacy or security breaches unit 1 Introduction to IOT
  • 18. unit 1 Introduction to IOT IOT Applications
  • 19. Basics of networking • A computer network is made up of two or more computers that are linked together by cables (wired) or Wi-Fi (wireless) in order to transmit, exchange, or share data and resources • Hardware (such as routers, switches, access points, and cables) and software are used to create a computer network (e.g., operating systems or business applications). unit 1 Introduction to IOT Networking types 1. Wired Networks Ethernet is the data link protocol used in wired networks. This is unlikely to alter with the Internet of Things, as most IoT devices will be wireless
  • 20. Wired advantages • Wireless networks are slower than wired networks. Data rates were boosted from 10 megabits per second to 1 gigabit per second on a regular basis. The majority of residential networks use speeds of 10 to 100 Mbps. • Wireless is less secure unit 1 Introduction to IOT
  • 21. Disadvantages • Need to use cable, which is unattractive, difficult to install, and costly. • It is difficult to utilize between buildings (planning etc.). • Mobile phones and tablets are not supported. unit 1 Introduction to IOT
  • 22. 2 Wireless network • Wi-Fi is the data communication protocol used by wireless networks. Advantages • In general, they are easier to set up. • It operates on both private and public networks. • There are no cables necessary. • Mobile phones and tablets are supported. Disadvantages • Networks that are wireless are slower than those that are wired. • Range is a limitation. • Eavesdropping is possible. • Depending on the setup, it may not be secure. unit 1 Introduction to IOT
  • 23. Network topology • There are a variety of methods for connecting network nodes. This isn't usually a consideration in small networks, but it becomes increasingly significant as networks grow larger. • Wi-Fi, Bluetooth, and other common connection technologies are intended to work with a specific network layout. Common are: • Bus • Ring • Mesh • Star • Hybrid Each unit 1 Introduction to IOT
  • 25. unit 1 Introduction to IOT The following are some terms that are frequently used: PAN - PAN (Personal Area Network) is a network that connects local devices, such as a computer to a printer LAN - The LAN (Local Area Network) connects devices in a single or multiple offices MAN - MAN (Metropolitan Area Network) is a network that connects devices across numerous buildings, such as a campus WAN - WAN stands for wide area network, and it connects devices across a country or countries.
  • 27. M2M and IoT Technology Fundamentals • Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans. • M2M has found applications in field such as healthcare, business, and insurance. M2M is also the foundation for the internet of things (IoT). • Example: • A vending machine can message the distributor's network, or machine, when a particular item is running low to send a refill • In telemedicine, M2M devices can enable the real-time monitoring of patients' vital statistics, dispensing medicine when required, or tracking healthcare assets. unit 1 Introduction to IOT
  • 28. Key features of M2M technology include • Low power consumption, to improve the system's ability to effectively service M2M applications. • A network operator that provides packet-switched service • Monitoring abilities that provide the functionality to detect events • Time control, meaning data can only be sent or received at specific predetermined periods. • Location-specific triggers that alert or wake up devices when they enter particular areas. • The ability to continually send and receive small amounts of data. unit 1 Introduction to IOT
  • 29. unit 1 Introduction to IOT Packet switching
  • 30. Working of M2M Communication • The main purpose of machine-to-machine technology is to collect sensor data and transmit it to a network • The main components of an M2M system include sensors, RFID, a Wi-Fi or cellular communications link, and autonomic computing software programmed to help a network device interpret data and make decisions. M2M Benefits • Reduced costs by minimizing equipment maintenance and downtime • Boosted revenue by revealing new business opportunities for servicing products in the field • Improved customer service by proactively monitoring and servicing equipment before it fails or only when it is needed. unit 1 Introduction to IOT
  • 31. unit 1 Introduction to IOT M2M requirements • Scalability - The M2M system should be able to continue to function efficiently as more connected objects are added. • Anonymity - The M2M system must be able to hide the identity of an M2M device when requested, subject to regulatory requirements. • Logging - M2M systems must support the recording of important events, such as failed installation attempts, service not operating, or the occurrence of faulty information.
  • 34. IoT/M2M systems layers Layer 1: M2M Application Domain • Integration, Collaboration, and M2M Application Services • Application (Reporting, Analysis, Control) Layer 2: Network Domain • M2M server, device identity, device and device-network management • Uni-cast and multicast message delivery Layer 3: M2M device communication domain • M2M Devices Domain Communication • Gateway • Physical devices and Controllers (the things in IoT) [Sensors, machines, devices, Intelligent Edge nodes of Different Types unit 1 Introduction to IOT
  • 35. Devices and Gateways unit 1 Introduction to IOT
  • 36. • IoT Gateway is a system for facilitating IoT communication, which is typically device-to-device or device-to-cloud • Gateway allows to communicate with devices maintaining security and providing an admin interface to perform simple tasks. unit 1 Introduction to IOT
  • 37. IoT Gateway feature set • Facilitating communication with non-internet connected devices • Data caching, buffering and streaming • Data pre-processing, filtering and optimization • Device to Device communications/M2M • Networking features and hosting live data • Security – manage user access and network security features • Device configuration management • System diagnostics unit 1 Introduction to IOT
  • 38. Data management • Data management is the process of reducing a large amount of data to the most relevant information • Intelligent things can gather, transmit, and analyze data, but aggregating data and drawing inferences, trends, and patterns will require a tool. • Embedded system and device developers and manufacturers must create a data management framework that is interoperable with all software and hardware involved in data collection, administration, and distribution. unit 1 Introduction to IOT
  • 39. Requirement for data management • Scalability • Organizations should consider whether their current network and infrastructure can handle massive data volumes in the long run. They should also consider which storage solution is best for them: cloud, data center, data stored at the edge, or a hybrid model • Data gravity • Value is created by volume • Data gravity develops when the volume of IoT data expands. As data volumes increase, other applications or services can extract value from it. unit 1 Introduction to IOT
  • 40. • Integration • Wired and wireless devices, processors and storage, services, platforms, and apps are all available to help you turn your connection into value • This includes real-time processing of operational data, secure integration of components and connections within an IoT environment, and security safeguards that enable enterprises to connect, harvest, share, and manage data across the whole IoT network. • Data management challenges • It's critical to keep data safe from unauthorized access and alteration unit 1 Introduction to IOT
  • 41. • Why IoT data management • Product development IoT data management can help you recognize and use patterns, which can then be used in the decision-making process to improve product design and development. • Facilitate resource and system efficiency Data management allows you to have a better understanding of how customers interact with your products in a consumer IoT context unit 1 Introduction to IOT
  • 42. • Predict wear and tear of assets You can utilize the data to see if devices and/or people are acting in unusual ways and create predictions based on that information unit 1 Introduction to IOT
  • 43. Business Process in IOT • Business process is a series of activities or a collection of inter related structured activities, task or process • A BP serves a particular goal or specific result or service product Distributed Business Process is a collection of logically interrelated business process • It reduces the complexity and enables faster responses and smaller processing load at the central BP system unit 1 Introduction to IOT
  • 44. • Business Intelligence is a process which a business service to extract new facts and knowledge and the undertake better decisions • New facts and knowledge follow from the earlier results of data processing, aggregation and analysing those results unit 1 Introduction to IOT
  • 46. unit 1 Introduction to IOT https://youtu.be/ktcRXyE8SaY
  • 47. • Everything as a Service (XaaS): • refers to the services and apps that users can request on the Internet • cloud computing terminology • SaaS (Software-as-a-Service) • PaaS (Platform-as-a-Service) • IaaS (Infrastructure –as-a-Service)
  • 48. • Communication-as-a-Service (CaaS) VoIP (voice over IP or Internet telephony), IM (instant messaging) video conference software • Security-as-a-Service (SECaaS) Anti-virus software, encryption, authentication, intrusion detection systems, and other services may be provided.
  • 49. • Healthcare-as-a-Service (HaaS) • Online consultations with doctors • Health monitoring 24/7 • Medicine delivery at your doorstep • Lab samples collection even at home and delivery of results as soon as they are ready • Access to your medical records 24/7
  • 50. • Transportation-as-a-Service (TaaS) • Mobility and flexibility of traveling over various distances are important trends in modern civilization. • Car sharing - You can rent a car from any location using a special app and drive wherever you need to go, paying for the time you use the car or the distance you travel. • Uber taxi services - You hire a cab through an app that estimates the cost of the journey ahead of time). In the near future, Uber plans to test flying taxis and selfdriving planes.
  • 51. • Benefits of XaaS • Scalability • Cost and time effectiveness • Focus on core competencies • The high quality of services • Better customer services
  • 52.
  • 53. • Role of Cloud in IoT • The Internet of Things (IoT) generates a large amount of data, which is referred to as big data • Cloud computing, with its various models and implementation platforms, assists businesses in managing and analyzing data, hence improving the overall efficiency and effectiveness of IoT systems.
  • 54. • Cloud Platform for Device Lifecycle Management • Cloud services (SaaS) enable businesses to create apps and software that link devices and enable device registration, onboarding, remote device upgrades, and remote device diagnosis in a fraction of the time while lowering operating and support expenses.
  • 55. • Internet Cloud+ clients =User application/services • Cloud platform usages for M2M/IoT • Data storage • Data connected to Application Programming Interface(API) for application • Data connect to the services • Application/services integrate the data with the enterprise application/services and gets analysed unit 1 Introduction to IOT
  • 56. Data collection/storage and computing using cloud Methods for data collection and storage • Devices/sensor networks data collection at the device web servers • Local files • Dedicated data store at coordinating node • Local edge node distributed DBMS files for M2M/IoT devices network • Internet connected server • Internet connected distributed DBMS nodes at an enterprise server or at data centre unit 1 Introduction to IOT
  • 57. M2M /IoT device connected PaaS Cloud unit 1 Introduction to IOT
  • 58. • CISCO IoT PaaS(CIOT) • It allows a developer to work in familiar Linux Applications environment • It provides network connectivity, cyber and physical security and data analytics • CISCO Fog provides an ecosystem with the ability to transfer sensor data and perform control functions with distributed network nodes unit 1 Introduction to IOT
  • 59. AWS IoT PaaS unit 1 Introduction to IOT
  • 60. • Amazon simple storage service(S3) • It is a scalable , high speed, web based cloud storage service designed for online backup and archiving of data and application on AWS unit 1 Introduction to IOT
  • 61. TCS Connected universe PaaS • Connected Universe Platform(CUP) offers connectivity to customers, Mobile app, etc • CUP provides data processing functions and data analytics in BPs, intelligence and knowledge discovery • It is a scalable platform for sensor data storage and real time data processing • It makes it easy to develop and deploy software applications unit 1 Introduction to IOT
  • 62. Security Aspects in IoT • Five functional components of security are defined in IoT • Identity Management • Authentication • Authorisation • Key exchange and management • Trust and reputation unit 1 Introduction to IOT
  • 63. • Identity Management • Source of message need to specify an identity when sending message • Messages can be from sensors, actuators, platforms etc and needed to connect to several applications/services • MAC address specify the identity of computing device platform • Universal Resource Identifier(URL) can be used in internet • In IoT applications Object identifiers are used • E.g.: Type of things (ATM,RFID) • Instance identifier VIN(Vehicle Identify Number) unit 1 Introduction to IOT
  • 64. Authentication • A hash function gives irreversible result after many operations on input • The operations generate a 128 or 256 bit hash value using authentication data and secret keys as input • Receiver end receives the hash value and compares with stored value • If both are equal then sender is authenticated unit 1 Introduction to IOT
  • 65. Authorisation • Access control allows only authorised device or application /service to a resource such as web API input, IoT device, Sensor or actuator data • Data authorisation model • Access Control List for coarse grain access control • Role based access control for fine grain access control • Attribute based access control for other capability based system access control unit 1 Introduction to IOT
  • 66. Key Exchange and Management • Key of sender messages need to be known to receiver for accessing the received data • The key need to be exchange before the communication of authentication code, authorisation command encrypted message unit 1 Introduction to IOT
  • 67. • Message Integrity • When communication takes place the message should remains unchanged • Encrypted data after decrypting should be identical to one before encryption unit 1 Introduction to IOT
  • 68. Do not put any sensitive business or personal information in the cloud. • No passwords should be stored on your IoT device or in the cloud. • Installing malware without first validating its legitimacy is a bad idea. • Always get third-party software from reputable and trustworthy sources. • Do not be in a hurry to start utilizing your IoT gadget; instead, protect it with anti-malware and anti-virus software. • If feasible, change the password on your IoT device on a frequent basis to boost security. • If your home network is less secure than your office network, don't bring any important business material home to rework. unit 1 Introduction to IOT
  • 69. Do not keep sensitive information on readily hacked storage devices or in public storage facilities. Furthermore, avoid using a public WiFi network for such tasks. • Turn down unneeded IoT devices in • your home network since they are exposed to hackers. When not in use, for example, turn off IoT-enabled thermostats. • • When you don't need internet connectivity, turn off the wifi on your smartphone. This is because it has been discovered that passwords and location information from • unit 1 Introduction to IOT
  • 70. smartphone-based fitness apps can be easily leaked through public wifi networks. • Companies in the business, finance, and banking sectors should keep and retain data until it is needed. To reduce the risk of hacking, they should be erased after they are no longer needed unit 1 Introduction to IOT
  • 71. unit 1 Introduction to IOT • Regular software fixes for smart watches, IoT sensors, IoT gadgets, and healthcare apps on smartphones should be provided by IoT service providers. This improves the security of IoT devices. These fixes should be able to handle the most recent and contemporary malware and viruses.