The document discusses two common IoT network architectures: oneM2M and the IoT World Forum (IoTWF) architecture. The oneM2M architecture divides functions into an application layer, services layer, and network layer. The IoTWF architecture is a seven-layer model with layers including physical devices, connectivity, edge computing, data storage and analytics, and applications. Both architectures aim to provide standardized frameworks to address challenges of designing large-scale IoT networks.
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
"A programmable, flexible and scalable network architecture will be required to support efficiently any Industrial-IoT solution. Vendor-Independent Software Defined Network will play a key role to address low latency, secure and real-time solutions. "
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Lec2.pptx
1. Dr. Muhammad Faizan Khan
Department of Information Technology
The University of Haripur
@Dr. Muhammad Faizan Khan 1
Chapter 02: IoT Network Architecture & Design
2.
Drivers Behind New Network
Architectures
@Dr. Muhammad Faizan Khan 2
Challenge Description IoT Architectural Change Required
Scale The massive scale of
IoT endpoints
(sensors) is far
beyond that of
typical IT networks
The IPv4 address space has reached exhaustion and
is unable to meet IoT’s scalability requirements.
Scale can be met only by using IPv6. IT networks
continue to use IPv4 through features like Network
Address Translation (NAT).
Security IoT devices,
especially those on
wireless sensor
networks (WSNs),
are often physically
exposed to the
world.
Security is required at every level of the IoT
network. Every IoT endpoint node on the network
must be part of the overall security strategy and
must support device-level authentication and link
encryption. It must also be easy to deploy with some
type of a zero-touch deployment model
3.
Drivers Behind New Network
Architectures
@Dr. Muhammad Faizan Khan 3
Challenge Description IoT Architectural Change Required
Devices and
networks
constrained
by power,
CPU, memory,
and link
speed
Due to the massive scale and
longer distances, the
networks are often
constrained, lossy,
and capable of supporting
only minimal data rates (tens
of bps to hundreds of Kbps)
New last-mile wireless technologies are
needed to support constrained IoT
devices over long distances. The
network is also constrained, meaning
modifications need to be made to
traditional network-layer
transport mechanisms
The massive
volume of
data generated
The sensors generate a
massive amount of data on a
daily basis, causing network
bottlenecks and slow
analytics in the cloud
Data analytics capabilities need to be
distributed throughout the IoT
network, from the edge to the cloud. In
traditional IT networks, analytics and
applications typically run only in the
cloud.
4.
Drivers Behind New Network
Architectures
@Dr. Muhammad Faizan Khan 4
Challenge Description IoT Architectural Change Required
Support
for legacy
devices
An IoT network often
comprises a collection of
modern, IP-capable
endpoints as well
as legacy, non-IP devices
that rely on serial or
proprietary protocols
Digital transformation is a long process
that may take many years, and IoT
networks need to support protocol
translation and/or tunneling mechanisms
to support legacy protocols over standards-
based protocols, such as Ethernet and IP
The need for
data to be
analyzed in
real time
Whereas traditional IT
networks perform
scheduled batch processing
of data, IoT data needs to
be analyzed and
responded to in real-time
Analytics software needs to be positioned
closer to the edge and should support real-
time streaming analytics. Traditional IT
analytics software (such as relational
databases or even Hadoop), are better
suited to batch-level analytics that
occur after the fact
5.
Comparing IoT Architectures
@Dr. Muhammad Faizan Khan 5
In the past several years, architectural standards and frameworks have
emerged to address the challenge of designing massive-scale IoT
networks.
The foundational concept in all these architectures is supporting data,
process, and the functions that endpoint devices perform.
Two of the best-known architectures are those supported by
oneM2M
IoT World Forum (IoTWF)
6.
The oneM2M IoT Standardized
Architecture
@Dr. Muhammad Faizan Khan 6
7.
The oneM2M IoT Standardized
Architecture
@Dr. Muhammad Faizan Khan 7
The oneM2M architecture divides IoT functions into three major domains:
the application layer, the services layer, and the network layer. While this
architecture may seem simple and somewhat generic at first glance, it is very
rich and promotes interoperability through IT-friendly APIs and supports a
wide range of IoT technologies.
Application Layer
Services Layer
Network Layer
8.
The oneM2M IoT Standardized
Architecture
@Dr. Muhammad Faizan Khan 8
Application Layer:
The oneM2M architecture gives major attention to connectivity between
devices and their applications. This domain includes the application-layer
protocols and attempts to standardize northbound API definitions for
interaction with business intelligence (BI) systems. Applications tend to be
industry-specific and have their own sets of data models, and thus they are
shown as vertical entities.
Service Layer:
This layer is shown as a horizontal framework across the vertical industry
applications. At this layer, horizontal modules include the physical network
that the IoT applications run on, the underlying management protocols, and
the hardware. Examples include backhaul communications via cellular,
MPLS networks, VPNs, and so on.
9.
The oneM2M IoT Standardized
Architecture
@Dr. Muhammad Faizan Khan 9
Service Layer, Cont’d:
Riding on top is the common services layer. This conceptual layer adds APIs
and middleware supporting third-party services and applications. One of the
stated goals of oneM2M is to “develop technical specifications which address
the need for a common M2M Service Layer that can be readily embedded
within various hardware and software nodes, and rely upon connecting the
myriad of devices in the field area network to M2M application servers,
which typically reside in a cloud or data center.” A critical objective of
oneM2M is to attract and actively involve organizations from M2M-related
business domains, including telematics and intelligent transportation,
healthcare, utility, industrial automation, and smart home applications, to
name just a few.
10.
The oneM2M IoT Standardized
Architecture
@Dr. Muhammad Faizan Khan 10
Network Layer:
This is the communication domain for the IoT devices and
endpoints. It includes the devices themselves and the
communications network that links them. Embodiments of this
communications infrastructure include wireless mesh technologies,
such as IEEE 802.15.4, and wireless point-to-multipoint systems,
such as IEEE 801.11ah. Also included are wired device connections,
such as IEEE 1901 power line communications.
11.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 11
In 2014 the IoTWF architectural committee (led by Cisco, IBM, Rockwell
Automation, and others) published a seven-layer IoT architectural reference
model. While various IoT reference models exist, the one put forth by the
IoT World Forum offers a clean, simplified perspective on IoT and includes
edge computing, data storage, and access. It provides a succinct way of
visualizing IoT from a technical perspective. Each of the seven layers is
broken down into specific functions, and security encompasses the entire
model.
12.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 12
13.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 13
The IoT Reference Model defines a set of levels with control flowing from the
center (this could be either a cloud service or a dedicated data center), to the
edge, which includes sensors, devices, machines, and other types of intelligent
end nodes. In general, data travels up the stack, originating from the edge,
and goes northbound to the center. Using this reference model, we are able to
achieve the following:
Decompose the IoT problem into smaller parts.
Identify different technologies at each layer and how they relate to one
another
Define a system in which different parts can be provided by different
vendors
Have a process of defining interfaces that leads to interoperability
Define a tiered security model that is enforced at the transition points
between levels.
14.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 14
Layer 1: Physical Devices & Controllers Layer;
The first layer of the IoT Reference Model is the physical devices and
controllers layer. This layer is home to the “things” in the Internet of Things,
including the various endpoint devices and sensors that send and receive
information. The size of these “things” can range from almost microscopic
sensors to giant machines in a factory. Their primary function is generating
data and being capable of being queried and/or controlled over a network.
Layer 2: Connectivity Layer;
In the second layer of the IoT Reference Model, the focus is on connectivity.
The most important function of this IoT layer is the reliable and timely
transmission of data. More specifically, this includes transmissions between
Layer 1 devices and the network and between the network and information
processing that occurs at Layer 3 (the edge computing layer).
15.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 15
Layer 2: Connectivity
Layer, Cont’d;
The connectivity layer
encompasses all networking
elements of IoT and doesn’t
really distinguish between the
last-mile network (the network
between the sensor/endpoint
and the IoT gateway), gateway,
and backhaul networks.
16.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 16
Layer 3: Edge Computing
Layer;
Edge computing is the role of Layer
3. Edge computing is often referred
to as the “fog”. At this layer, the
emphasis is on data reduction and
converting network data flows into
information that is ready for storage
and processing by higher layers. One
of the basic principles of this
reference model is that information
processing is initiated as early and as
close to the edge of the network as
possible.
17.
The IoT World Forum (IoTWF)
Standardized Architecture
@Dr. Muhammad Faizan Khan 17
18.
IT and OT Responsibilities in the IoT
Reference Model
@Dr. Muhammad Faizan Khan 18