The document provides an overview of a presentation on the topic of Internet of Things (IoT). It discusses what IoT is, how IoT works, the current status and future prospects of IoT, applications of IoT, and technological challenges of IoT. It outlines the presentation flow and includes sections on teaching schemes, units of the course, definitions of key concepts like IoT and how it works, examples of IoT applications, and the future potential of IoT.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
internet of things(Architecture and components).pptxvikramkagitapu
The term IoT, or Internet of Things, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
Remote sensing and monitoring are changing the mining industry for the better. These are providing innovative solutions to long-standing challenges. Those related to exploration, extraction, and overall environmental management by mining technology companies Odisha. These technologies make use of satellite imaging, aerial photography and sensors to collect data that might be inaccessible or from hazardous locations. With the use of this technology, mining operations are becoming increasingly efficient. Let us gain more insight into the key aspects associated with remote sensing and monitoring when it comes to mining.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...PaulBryant58
This article provides a comprehensive guide on how to
effectively manage the convert Accpac to QuickBooks , with a particular focus on utilizing online accounting services to streamline the process.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
2. Presentation Flow
What is Internet of Things?
How IoT Works?
Current Status & Future Prospect of IoT
The Future of IoT
The Potential of IoT
Few Applications of IoT
Technological Challenges of IoT
3. Teaching and Examination Scheme
Teaching Scheme
Theory
Hours
Practical
Hours
Total
Hours
Credit
Hours/week 3 2 5
4
Marks 100 50 150
4. Units
Sr.
No.
Title of the unit Hours
1. Introduction of IoT 5
2. IoT Architecture and Protocols 12
3. Enabling Technologies 10
4. Emerging Challenges 10
5. Opportunities for the Developing World 6
6. IoT Tools and Data Analytics 2
Total hours (Theory): 45
Total hours (Lab): 30
Total hours: 75
6. What is IoT?
The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the
physical world and computer-based systems, and resulting in improved
efficiency, accuracy and economic benefit.
7. “Things” in IoT sense, can refer to a wide variety of devices such as
• heart monitoring implants
• biochip transponders on farm animals
• electric clams in coastal waters
• automobiles with built-in sensors
DNA analysis devices for environmental/food/pathogen monitoring or field
operation devices that assist fire-fighters in search and rescue operations.
These devices collect useful data with the help of various existing technologies
and then autonomously flow the data between other devices.
8. What is IoT ?
IoT connecting everyday things
embedded with electronics ,
software and sensors to the
internet enabling them to collect
and exchange data.
9.
10. How IoT works?
Internet of Things is not the result of a single novel technology; instead, several
complementary technical developments provide capabilities that taken together
help to bridge the gap between the virtual and physical world.
11. The Structure of IoT
The IoT can be viewed as a gigantic network consisting of networks of devices and
computers connected through a series of intermediate technologies where
numerous technologies like RFIDs, wireless connections may act as enablers of this
connectivity.
Tagging Things : Real-time item traceability and addressability by RFIDs.
Feeling Things : Sensors act as primary devices to collect data from the
environment.
Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of
smaller things to interact and connect within the “things” or “smart devices.”
Thinking Things : Embedded intelligence in devices through sensors has formed the
network connection to the Internet. It can make the “things” realizing the intelligent
control.
12. The Father of IoT Kevin Ashton :
KEVIN ASHTON in 1999
coins the term “Internet of
Things” and establishes
MIT’s Auto-ID Center, A
global research network of
academic laboratories
focused on RFID and the IoT.
14. How does IOT work?
There are four main components based on which an internet of things ecosystem works on,
1. devices or Sensors
2. Connectivity,
3. Data Processing and
4. User Interface. Lets look at each one of them one by one.
15. 1. Sensor:
It is a device that measures physical input from its environment and converts it into data that
can be interpreted by a computer.
There are various types of sensors available now, For e.g. sensing motion, temperature,
pressure, light, sound etc.
This sensor is typically integrated with a microprocessor based embedded system which can
collate the data and connect to internet.
16. 2. Connectivity
Several Communication Protocols and Technology used in IOT.
Depending upon Range, Power Usage, Cost, Data Rate etc. right one is used. E.g
mobile, Bluetooth, WI-FI, LoraWAN, etc.
All the collected data is sent via internet to a cloud infrastructure.
17. 3. Data Processing
In the processing stage, a computer transforms the raw data into information.
The transformation is carried out by using different data manipulation techniques.
This process can be just aggregating from multiple devices like AC or Light. Or it can be complex
like extracting car number plates from video feed of speeding cars.
It could be classifying the data or do real time analytics and identify patterns for human
analysis.
18. 4. User Interface
The information processed is made available to the end-user in some way, like an app which
can trigger alarm or send them notification through email or text message.
It might provide the user with actual live feed or show trends etc.
The application could also provide an interface to send instructions back as well, like resetting
the temperature or releasing water to the plants based upon moisture reading etc.
19. Advantages
Minimize human effort and save time
Lead to more automation and technical optimization
Help us to reduce waste and use our natural resources effectively
32. Sensors in even the holy cow!
Inthe world of IoT
,even the cows will be connected and monitored. Sensorsare implanted in
the ears of cattle. This allows farmers to monitor cows’ health and track their movements,
ensuring a healthier, more plentiful supply of milk and meat for people to consume. On
average, each cow generates about 200MB of informationper year.
26
40. M2M is more recently referred to technologies that enable
communication between machines without or with minimal human
intervention.
Point to point Communication between physical object.
Does not follow Internet Protocol (IP)–based networks and Internet
standards.
M2M is subset of IoT.
4
0
M2M(Machine to Machine)
42. M2M Device: Device capable of replying to request for data contained
within those devices or capable of transmitting data autonomously.
M2M Area network(device Domain): Provide connectivity between
M2M Devices and M2M Gateways , e.g. personal area network.
M2M Gateway: Equipment that uses M2M capabilities to
ensure M2M Devices inter-working and interconnection to the
communication network.
4
2
Architecture and components of M2M
43. M2M Communication Networks (Network Domain): It covers the
communications between the M2M Gateway(s) and M2M application(s).
4
3
Architecture and components of M2M
44. An M2M area network comprises of machines (or M2Mnodes) which have
embedded hardware modules for sensing, actuation and communication.
Various communication protocols can be used for M2M local area networks such as
ZigBee, Bluetooth, Modbus, M-Bus, Wireless M-Bus, Power Line Communication
(PLC), 6LoWPAN, IEEE 802.15.4(LR-VPAN) etc.
The communication network provides connectivity to remote M2Marea networks.
The communication network can use either wired or wireless networks(IP-based).
While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based networks.
M2M(Machine to Machine)
45. M2M gateway
Since non-IP based protocols are used within M2M area networks,theM2M nodes
within one network cannot communicate with nodes in an external network.
To enable the communication between remote M2M area networks,M2M
gateways are used.
47. SDN
Software-Defined Networking (SDN) is
a networking architecture that
separates the control plane from the
data plane and centralizes the
network controller.
Software-based SDN controllers
maintain a unified view of the network
and make configuration, management
and provisioning simpler.
The underlying infrastructure in SDN
uses simple packet forwarding
hardware as opposed to specialized
hardware in conventional networks.
48. Key elements of SDN
Centralized Network Controller
With decoupled control and data planes and centralized network
controller, the network administrators can rapidly configure the network.
Programmable Open APIs
SDN architecture supports programmable open APIs for interface
between the SDN application and control layers (Northbound interface).
Standard Communication Interface (OpenFlow)
SDN architecture uses a standard communication interface between
the control and infrastructure layers (Southbound interface).
OpenFlow, which is defined by the Open Networking Foundation (ONF)
is the broadly accepted SDN protocol for the Southbound interface.
49. NFV
Network Function Virtualization
(NFV) is a technology that leverages
virtualization to consolidate the
heterogeneous network devices
onto industry standard high volume
servers, switches and storage.
NFV is complementary to SDN as
NFV can provide the infrastructure
on which SDN can run.
50. Key elements of NFV
Virtualized Network Function (VNF):
VNF is a software implementation of a network function which is capable of
running over the NFV Infrastructure (NFVI).
NFV Infrastructure (NFVI):
NFVI includes compute, network and storage resources that are virtualized.
NFV Management and Orchestration:
NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of
physical and/or software resources that support the infrastructure
virtualization, and the life-cycle management of VNFs.
51. NFV Use Case
NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts
a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects to network services such as VoIP
and IPTV
53. Low Mobility: M2M Devices do not move, move infrequently, or move
only within a certain region.
Time Controlled :Send or receive data only at certain pre-defined periods
Packet Switched
Low Power Consumption:
Online small Data Transmissions:
5
3
Features of M2M
54. Difference between IoT and M2M :
Basis of IoT M2M
Abbreviation Internet of Things Machine to Machine
Intelligence
Devices have objects that are responsible
for decision making
Some degree of intelligence is observed in
this.
Connection type used
The connection is via Network and using
various communication types.
The connection is a point to point
Communication protocol used
Internet protocols are used such
as HTTP, FTP, and Telnet.
Traditional protocols and communication
technology techniques are used
Data Sharing
Data is shared between other applications
that are used to improve the end-user
experience.
Data is shared with only the
communicating parties.
Internet
Internet connection is required for
communication
Devices are not dependent on the
Internet.
Type of Communication It supports cloud communication It supports point-to-point communication.
55. Basis of IoT M2M
Computer System
Involves the usage of both Hardware and
Software.
Mostly hardware-based technology
Scope A large number of devices yet scope is large. Limited Scope for devices.
Business Type used
Business 2 Business(B2B) and Business 2
Consumer(B2C)
Business 2 Business (B2B)
Open API support Supports Open API integrations. There is no support for Open APIs
It requires Generic commodity devices. Specialized device solutions.
Centric Information and service centric Communication and device centric.
Components
Devices/sensors, connectivity, data
processing, user interface
Device, area networks, gateway, Application
server.
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
56. Plans for IoT Growth:
Increased network traffic: will your firewall / IDS / IPS be compatible and keep up?
Increased demand for IP addresses both IPv4 and IPv6
Increased network complexity – should these devices be isolated or segmented?
57. Threat Vs Opportunities
What happened when 50B machines become connected?
If misunderstood and misconfigured, IoT creates risk to our data, privacy, and
safety .
If understood and secured, IoT will enhance communications, lifestyle, and
delivery of services.