SlideShare a Scribd company logo
PREPARED BY:
ANERI PANDYA
Presentation Flow
What is Internet of Things?
How IoT Works?
Current Status & Future Prospect of IoT
The Future of IoT
The Potential of IoT
Few Applications of IoT
Technological Challenges of IoT
Teaching and Examination Scheme
Teaching Scheme
Theory
Hours
Practical
Hours
Total
Hours
Credit
Hours/week 3 2 5
4
Marks 100 50 150
Units
Sr.
No.
Title of the unit Hours
1. Introduction of IoT 5
2. IoT Architecture and Protocols 12
3. Enabling Technologies 10
4. Emerging Challenges 10
5. Opportunities for the Developing World 6
6. IoT Tools and Data Analytics 2
Total hours (Theory): 45
Total hours (Lab): 30
Total hours: 75
What is IoT?
What is IoT?
The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the
physical world and computer-based systems, and resulting in improved
efficiency, accuracy and economic benefit.
“Things” in IoT sense, can refer to a wide variety of devices such as
• heart monitoring implants
• biochip transponders on farm animals
• electric clams in coastal waters
• automobiles with built-in sensors
DNA analysis devices for environmental/food/pathogen monitoring or field
operation devices that assist fire-fighters in search and rescue operations.
These devices collect useful data with the help of various existing technologies
and then autonomously flow the data between other devices.
What is IoT ?
IoT connecting everyday things
embedded with electronics ,
software and sensors to the
internet enabling them to collect
and exchange data.
How IoT works?
Internet of Things is not the result of a single novel technology; instead, several
complementary technical developments provide capabilities that taken together
help to bridge the gap between the virtual and physical world.
The Structure of IoT
The IoT can be viewed as a gigantic network consisting of networks of devices and
computers connected through a series of intermediate technologies where
numerous technologies like RFIDs, wireless connections may act as enablers of this
connectivity.
Tagging Things : Real-time item traceability and addressability by RFIDs.
 Feeling Things : Sensors act as primary devices to collect data from the
environment.
 Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of
smaller things to interact and connect within the “things” or “smart devices.”
Thinking Things : Embedded intelligence in devices through sensors has formed the
network connection to the Internet. It can make the “things” realizing the intelligent
control.
The Father of IoT Kevin Ashton :
KEVIN ASHTON in 1999
coins the term “Internet of
Things” and establishes
MIT’s Auto-ID Center, A
global research network of
academic laboratories
focused on RFID and the IoT.
History of IoT:
How does IOT work?
There are four main components based on which an internet of things ecosystem works on,
1. devices or Sensors
2. Connectivity,
3. Data Processing and
4. User Interface. Lets look at each one of them one by one.
1. Sensor:
It is a device that measures physical input from its environment and converts it into data that
can be interpreted by a computer.
There are various types of sensors available now, For e.g. sensing motion, temperature,
pressure, light, sound etc.
This sensor is typically integrated with a microprocessor based embedded system which can
collate the data and connect to internet.
2. Connectivity
Several Communication Protocols and Technology used in IOT.
Depending upon Range, Power Usage, Cost, Data Rate etc. right one is used. E.g
mobile, Bluetooth, WI-FI, LoraWAN, etc.
All the collected data is sent via internet to a cloud infrastructure.
3. Data Processing
In the processing stage, a computer transforms the raw data into information.
The transformation is carried out by using different data manipulation techniques.
This process can be just aggregating from multiple devices like AC or Light. Or it can be complex
like extracting car number plates from video feed of speeding cars.
It could be classifying the data or do real time analytics and identify patterns for human
analysis.
4. User Interface
The information processed is made available to the end-user in some way, like an app which
can trigger alarm or send them notification through email or text message.
It might provide the user with actual live feed or show trends etc.
The application could also provide an interface to send instructions back as well, like resetting
the temperature or releasing water to the plants based upon moisture reading etc.
Advantages
Minimize human effort and save time
Lead to more automation and technical optimization
Help us to reduce waste and use our natural resources effectively
Disadvantages
Security of confidential Data is a key concern
Can lead to various types of network attacks
Maintaining privacy is a challenge
Applications of IOT
Smart parking system using IoT
Gas monitoring using IoT
Water Management using IoT
Noise Tube-Crowdsourcing of pollution
Data Using smartphones.
Pedometer-Determined physical activity
How well Do I Sleep???
29
I Want to know more about myself?
30
Thought Controlled Computing
Smart City using IoT
https://www.cleverciti.com/en/smart-city
Waste management in Smart Cities
Sensors in even the holy cow!
Inthe world of IoT
,even the cows will be connected and monitored. Sensorsare implanted in
the ears of cattle. This allows farmers to monitor cows’ health and track their movements,
ensuring a healthier, more plentiful supply of milk and meat for people to consume. On
average, each cow generates about 200MB of informationper year.
26
Sensors in even the holy cow!
IoT Technologies Influencing the Smart Retail
Transformation
How Smart Light Bulbs work?
Current status and future prospect of IoT
“Change is the only thing permanent in this world”
The Future of IoT 17
"The Sky's not the limit. It's only the beginning with IoT."
Unlock the Massive potential of IoT
 M2M is more recently referred to technologies that enable
communication between machines without or with minimal human
intervention.
 Point to point Communication between physical object.
 Does not follow Internet Protocol (IP)–based networks and Internet
standards.
 M2M is subset of IoT.
4
0
M2M(Machine to Machine)
M2M(Machine to Machine) Network
 M2M Device: Device capable of replying to request for data contained
within those devices or capable of transmitting data autonomously.
 M2M Area network(device Domain): Provide connectivity between
M2M Devices and M2M Gateways , e.g. personal area network.
 M2M Gateway: Equipment that uses M2M capabilities to
ensure M2M Devices inter-working and interconnection to the
communication network.
4
2
Architecture and components of M2M
 M2M Communication Networks (Network Domain): It covers the
communications between the M2M Gateway(s) and M2M application(s).
4
3
Architecture and components of M2M
An M2M area network comprises of machines (or M2Mnodes) which have
embedded hardware modules for sensing, actuation and communication.
Various communication protocols can be used for M2M local area networks such as
ZigBee, Bluetooth, Modbus, M-Bus, Wireless M-Bus, Power Line Communication
(PLC), 6LoWPAN, IEEE 802.15.4(LR-VPAN) etc.
 The communication network provides connectivity to remote M2Marea networks.
 The communication network can use either wired or wireless networks(IP-based).
While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based networks.
M2M(Machine to Machine)
M2M gateway
Since non-IP based protocols are used within M2M area networks,theM2M nodes
within one network cannot communicate with nodes in an external network.
To enable the communication between remote M2M area networks,M2M
gateways are used.
Communication in IoT vs M2M
SDN
 Software-Defined Networking (SDN) is
a networking architecture that
separates the control plane from the
data plane and centralizes the
network controller.
 Software-based SDN controllers
maintain a unified view of the network
and make configuration, management
and provisioning simpler.
 The underlying infrastructure in SDN
uses simple packet forwarding
hardware as opposed to specialized
hardware in conventional networks.
Key elements of SDN
 Centralized Network Controller
 With decoupled control and data planes and centralized network
controller, the network administrators can rapidly configure the network.
 Programmable Open APIs
 SDN architecture supports programmable open APIs for interface
between the SDN application and control layers (Northbound interface).
 Standard Communication Interface (OpenFlow)
 SDN architecture uses a standard communication interface between
the control and infrastructure layers (Southbound interface).
 OpenFlow, which is defined by the Open Networking Foundation (ONF)
is the broadly accepted SDN protocol for the Southbound interface.
NFV
 Network Function Virtualization
(NFV) is a technology that leverages
virtualization to consolidate the
heterogeneous network devices
onto industry standard high volume
servers, switches and storage.
 NFV is complementary to SDN as
NFV can provide the infrastructure
on which SDN can run.
Key elements of NFV
 Virtualized Network Function (VNF):
 VNF is a software implementation of a network function which is capable of
running over the NFV Infrastructure (NFVI).
 NFV Infrastructure (NFVI):
 NFVI includes compute, network and storage resources that are virtualized.
 NFV Management and Orchestration:
 NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of
physical and/or software resources that support the infrastructure
virtualization, and the life-cycle management of VNFs.
NFV Use Case
NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts
a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects to network services such as VoIP
and IPTV
 Security :Surveillances, Alarm systems, Access control, Car/driver
security.
 Tracking & Tracing :Order Management, Asset Tracking, Navigation,
Traffic information.
 Payment :Vending machines, Gaming machines.
 Health :
 Manufacturing :
 Facility Management :Home / building / campus automation
5
2
Application of M2M
 Low Mobility: M2M Devices do not move, move infrequently, or move
only within a certain region.
 Time Controlled :Send or receive data only at certain pre-defined periods
 Packet Switched
 Low Power Consumption:
 Online small Data Transmissions:
5
3
Features of M2M
Difference between IoT and M2M :
Basis of IoT M2M
Abbreviation Internet of Things Machine to Machine
Intelligence
Devices have objects that are responsible
for decision making
Some degree of intelligence is observed in
this.
Connection type used
The connection is via Network and using
various communication types.
The connection is a point to point
Communication protocol used
Internet protocols are used such
as HTTP, FTP, and Telnet.
Traditional protocols and communication
technology techniques are used
Data Sharing
Data is shared between other applications
that are used to improve the end-user
experience.
Data is shared with only the
communicating parties.
Internet
Internet connection is required for
communication
Devices are not dependent on the
Internet.
Type of Communication It supports cloud communication It supports point-to-point communication.
Basis of IoT M2M
Computer System
Involves the usage of both Hardware and
Software.
Mostly hardware-based technology
Scope A large number of devices yet scope is large. Limited Scope for devices.
Business Type used
Business 2 Business(B2B) and Business 2
Consumer(B2C)
Business 2 Business (B2B)
Open API support Supports Open API integrations. There is no support for Open APIs
It requires Generic commodity devices. Specialized device solutions.
Centric Information and service centric Communication and device centric.
Components
Devices/sensors, connectivity, data
processing, user interface
Device, area networks, gateway, Application
server.
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
Plans for IoT Growth:
Increased network traffic: will your firewall / IDS / IPS be compatible and keep up?
 Increased demand for IP addresses both IPv4 and IPv6
 Increased network complexity – should these devices be isolated or segmented?
Threat Vs Opportunities
What happened when 50B machines become connected?
If misunderstood and misconfigured, IoT creates risk to our data, privacy, and
safety .
 If understood and secured, IoT will enhance communications, lifestyle, and
delivery of services.
34
Toward Ubiquity
5
9
THANK YOU….
36

More Related Content

Similar to IOT_UNIT-1.pptx

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
laxmikanth45
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
Tekle12
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
IRJET Journal
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
Eshwar Prasad
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
Dennis Jacob
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
Gaurav Sharma
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
vikramkagitapu
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
Shellychoudhary1
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
GovadaDhana
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
spreya772
 
Iot presentation
Iot presentationIot presentation
Iot presentation
huma742446
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
csandit
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 
IoTppt_Unit1 notes which give all the notes
IoTppt_Unit1 notes which give all the notesIoTppt_Unit1 notes which give all the notes
IoTppt_Unit1 notes which give all the notes
pg5508430
 
A fair survey on internet of Things
A fair survey on internet of ThingsA fair survey on internet of Things
A fair survey on internet of Things
JOHARAN M.Jo
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
Gokulnath J
 

Similar to IOT_UNIT-1.pptx (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
IoTppt_Unit1 notes which give all the notes
IoTppt_Unit1 notes which give all the notesIoTppt_Unit1 notes which give all the notes
IoTppt_Unit1 notes which give all the notes
 
A fair survey on internet of Things
A fair survey on internet of ThingsA fair survey on internet of Things
A fair survey on internet of Things
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
HajeJanKamps
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 

IOT_UNIT-1.pptx

  • 2. Presentation Flow What is Internet of Things? How IoT Works? Current Status & Future Prospect of IoT The Future of IoT The Potential of IoT Few Applications of IoT Technological Challenges of IoT
  • 3. Teaching and Examination Scheme Teaching Scheme Theory Hours Practical Hours Total Hours Credit Hours/week 3 2 5 4 Marks 100 50 150
  • 4. Units Sr. No. Title of the unit Hours 1. Introduction of IoT 5 2. IoT Architecture and Protocols 12 3. Enabling Technologies 10 4. Emerging Challenges 10 5. Opportunities for the Developing World 6 6. IoT Tools and Data Analytics 2 Total hours (Theory): 45 Total hours (Lab): 30 Total hours: 75
  • 6. What is IoT? The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.
  • 7. “Things” in IoT sense, can refer to a wide variety of devices such as • heart monitoring implants • biochip transponders on farm animals • electric clams in coastal waters • automobiles with built-in sensors DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.
  • 8. What is IoT ? IoT connecting everyday things embedded with electronics , software and sensors to the internet enabling them to collect and exchange data.
  • 9.
  • 10. How IoT works? Internet of Things is not the result of a single novel technology; instead, several complementary technical developments provide capabilities that taken together help to bridge the gap between the virtual and physical world.
  • 11. The Structure of IoT The IoT can be viewed as a gigantic network consisting of networks of devices and computers connected through a series of intermediate technologies where numerous technologies like RFIDs, wireless connections may act as enablers of this connectivity. Tagging Things : Real-time item traceability and addressability by RFIDs.  Feeling Things : Sensors act as primary devices to collect data from the environment.  Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of smaller things to interact and connect within the “things” or “smart devices.” Thinking Things : Embedded intelligence in devices through sensors has formed the network connection to the Internet. It can make the “things” realizing the intelligent control.
  • 12. The Father of IoT Kevin Ashton : KEVIN ASHTON in 1999 coins the term “Internet of Things” and establishes MIT’s Auto-ID Center, A global research network of academic laboratories focused on RFID and the IoT.
  • 14. How does IOT work? There are four main components based on which an internet of things ecosystem works on, 1. devices or Sensors 2. Connectivity, 3. Data Processing and 4. User Interface. Lets look at each one of them one by one.
  • 15. 1. Sensor: It is a device that measures physical input from its environment and converts it into data that can be interpreted by a computer. There are various types of sensors available now, For e.g. sensing motion, temperature, pressure, light, sound etc. This sensor is typically integrated with a microprocessor based embedded system which can collate the data and connect to internet.
  • 16. 2. Connectivity Several Communication Protocols and Technology used in IOT. Depending upon Range, Power Usage, Cost, Data Rate etc. right one is used. E.g mobile, Bluetooth, WI-FI, LoraWAN, etc. All the collected data is sent via internet to a cloud infrastructure.
  • 17. 3. Data Processing In the processing stage, a computer transforms the raw data into information. The transformation is carried out by using different data manipulation techniques. This process can be just aggregating from multiple devices like AC or Light. Or it can be complex like extracting car number plates from video feed of speeding cars. It could be classifying the data or do real time analytics and identify patterns for human analysis.
  • 18. 4. User Interface The information processed is made available to the end-user in some way, like an app which can trigger alarm or send them notification through email or text message. It might provide the user with actual live feed or show trends etc. The application could also provide an interface to send instructions back as well, like resetting the temperature or releasing water to the plants based upon moisture reading etc.
  • 19. Advantages Minimize human effort and save time Lead to more automation and technical optimization Help us to reduce waste and use our natural resources effectively
  • 20. Disadvantages Security of confidential Data is a key concern Can lead to various types of network attacks Maintaining privacy is a challenge
  • 22. Smart parking system using IoT
  • 25. Noise Tube-Crowdsourcing of pollution Data Using smartphones.
  • 27. How well Do I Sleep???
  • 28. 29 I Want to know more about myself?
  • 30. Smart City using IoT https://www.cleverciti.com/en/smart-city
  • 31. Waste management in Smart Cities
  • 32. Sensors in even the holy cow! Inthe world of IoT ,even the cows will be connected and monitored. Sensorsare implanted in the ears of cattle. This allows farmers to monitor cows’ health and track their movements, ensuring a healthier, more plentiful supply of milk and meat for people to consume. On average, each cow generates about 200MB of informationper year. 26
  • 33. Sensors in even the holy cow!
  • 34. IoT Technologies Influencing the Smart Retail Transformation
  • 35.
  • 36. How Smart Light Bulbs work?
  • 37. Current status and future prospect of IoT “Change is the only thing permanent in this world”
  • 38. The Future of IoT 17 "The Sky's not the limit. It's only the beginning with IoT."
  • 39. Unlock the Massive potential of IoT
  • 40.  M2M is more recently referred to technologies that enable communication between machines without or with minimal human intervention.  Point to point Communication between physical object.  Does not follow Internet Protocol (IP)–based networks and Internet standards.  M2M is subset of IoT. 4 0 M2M(Machine to Machine)
  • 42.  M2M Device: Device capable of replying to request for data contained within those devices or capable of transmitting data autonomously.  M2M Area network(device Domain): Provide connectivity between M2M Devices and M2M Gateways , e.g. personal area network.  M2M Gateway: Equipment that uses M2M capabilities to ensure M2M Devices inter-working and interconnection to the communication network. 4 2 Architecture and components of M2M
  • 43.  M2M Communication Networks (Network Domain): It covers the communications between the M2M Gateway(s) and M2M application(s). 4 3 Architecture and components of M2M
  • 44. An M2M area network comprises of machines (or M2Mnodes) which have embedded hardware modules for sensing, actuation and communication. Various communication protocols can be used for M2M local area networks such as ZigBee, Bluetooth, Modbus, M-Bus, Wireless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4(LR-VPAN) etc.  The communication network provides connectivity to remote M2Marea networks.  The communication network can use either wired or wireless networks(IP-based). While the M2M area networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based networks. M2M(Machine to Machine)
  • 45. M2M gateway Since non-IP based protocols are used within M2M area networks,theM2M nodes within one network cannot communicate with nodes in an external network. To enable the communication between remote M2M area networks,M2M gateways are used.
  • 47. SDN  Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller.  Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler.  The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks.
  • 48. Key elements of SDN  Centralized Network Controller  With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network.  Programmable Open APIs  SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface).  Standard Communication Interface (OpenFlow)  SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface).  OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface.
  • 49. NFV  Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage.  NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run.
  • 50. Key elements of NFV  Virtualized Network Function (VNF):  VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure (NFVI).  NFV Infrastructure (NFVI):  NFVI includes compute, network and storage resources that are virtualized.  NFV Management and Orchestration:  NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs.
  • 51. NFV Use Case NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in the home. The virtualized gateway also connects to network services such as VoIP and IPTV
  • 52.  Security :Surveillances, Alarm systems, Access control, Car/driver security.  Tracking & Tracing :Order Management, Asset Tracking, Navigation, Traffic information.  Payment :Vending machines, Gaming machines.  Health :  Manufacturing :  Facility Management :Home / building / campus automation 5 2 Application of M2M
  • 53.  Low Mobility: M2M Devices do not move, move infrequently, or move only within a certain region.  Time Controlled :Send or receive data only at certain pre-defined periods  Packet Switched  Low Power Consumption:  Online small Data Transmissions: 5 3 Features of M2M
  • 54. Difference between IoT and M2M : Basis of IoT M2M Abbreviation Internet of Things Machine to Machine Intelligence Devices have objects that are responsible for decision making Some degree of intelligence is observed in this. Connection type used The connection is via Network and using various communication types. The connection is a point to point Communication protocol used Internet protocols are used such as HTTP, FTP, and Telnet. Traditional protocols and communication technology techniques are used Data Sharing Data is shared between other applications that are used to improve the end-user experience. Data is shared with only the communicating parties. Internet Internet connection is required for communication Devices are not dependent on the Internet. Type of Communication It supports cloud communication It supports point-to-point communication.
  • 55. Basis of IoT M2M Computer System Involves the usage of both Hardware and Software. Mostly hardware-based technology Scope A large number of devices yet scope is large. Limited Scope for devices. Business Type used Business 2 Business(B2B) and Business 2 Consumer(B2C) Business 2 Business (B2B) Open API support Supports Open API integrations. There is no support for Open APIs It requires Generic commodity devices. Specialized device solutions. Centric Information and service centric Communication and device centric. Components Devices/sensors, connectivity, data processing, user interface Device, area networks, gateway, Application server. Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
  • 56. Plans for IoT Growth: Increased network traffic: will your firewall / IDS / IPS be compatible and keep up?  Increased demand for IP addresses both IPv4 and IPv6  Increased network complexity – should these devices be isolated or segmented?
  • 57. Threat Vs Opportunities What happened when 50B machines become connected? If misunderstood and misconfigured, IoT creates risk to our data, privacy, and safety .  If understood and secured, IoT will enhance communications, lifestyle, and delivery of services.
  • 58. 34