The document discusses the potential applications of Internet of Things (IoT) technologies in libraries. Some key points:
- IoT allows physical objects like sensors, devices, and other items to be connected through networks and be able to collect and transfer data. This enables libraries to track resources, automate processes, and enhance user experiences.
- Potential IoT applications in libraries include library management systems, digital platforms, e-resource access tools, mobile apps, security/monitoring systems, and interactive learning experiences using smart objects.
- Libraries are starting to use IoT technologies like sensors, magic mirrors, pressure pads, and cloud-based apps to record user data, provide virtual tours, track resource availability, and
This tutorial gives overview of the data science pipeline for analyzing IoT network data. It contains references to scientific articles to learn more about algorithms, visualizations and IoT systems. The tutorial was presented at ACM Richard Tapia 2018.
This tutorial gives overview of the data science pipeline for analyzing IoT network data. It contains references to scientific articles to learn more about algorithms, visualizations and IoT systems. The tutorial was presented at ACM Richard Tapia 2018.
Why use a Network Simulator for research ?
Introduction to NetSim
Introduction to IoT
IoT Technologies – 802.15.4, 6LowPAN
Designing IoT scenario using NetSim
Analyzing Metrics
Protocol Code editing
Areas of R & D in IoT
Q & A Session
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
More Related Content
Similar to Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
Why use a Network Simulator for research ?
Introduction to NetSim
Introduction to IoT
IoT Technologies – 802.15.4, 6LowPAN
Designing IoT scenario using NetSim
Analyzing Metrics
Protocol Code editing
Areas of R & D in IoT
Q & A Session
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Similar to Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf (20)
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Week 8 - Module 19 - PPT- Internet of Things for Libraries.pdf
1. Internet of Things for Libraries
Dr. Parveen Babbar
Deputy Librarian, JNU
Email: parveenbabbar@gmail.com
2. Internet of Things (IoT)
• Internet of Things is a system of interrelated computing devices or objects which
have the ability to transfer the data over a network without requiring any human to
human or human to computer interaction uniquely addressable, based on standard
communication protocol.
• It is a giant network of connected things, capturing the data about the way they are
used and the environment around them.
• When we speak about the “Things” in IoT, these are objects not precisely
identifiable.
• The sensors are used in the devices and objects and these feed the data to various
IoT platforms.
• Further, IoT platforms are used to gather the pinpointed information, detect
patterns.
• Thus, with the above process the IoT helps the organizations and institutions in
reducing the cost through improved processes efficiency, asset utilization and
productivity.
Source: IBM, What is the Internet of Things? https://www.ibm.com/blogs/internet-of-things/what-is-the-iot/
3. Different Names of IoT
• Internet of Everything
• Smarter Planet
• Machine to Machine (M2M)
• The Fog
• Tsensors (Trillion Sensors)
• The Industrial Internet
• Industry 4.0
• Internet of Things (IoT)
4. Reasons of IoT
Data deluge : The explosion of the amount of data collected and exchanged is one of the major
reason why IoT came in existence. Forecasts indicate that in the year 2015 more than 220 Exabytes
of data are stored. So we need novel mechanisms to find, fetch, and transmit data.
There is decrease in energy required to operate intelligent devices. The search will be for a zero
level of entropy where the device or system will have to harvest its own energy.
Miniaturization of devices: the devices are becoming increasingly smaller.
Autonomic management: the devices/systems of future will have self-management, self-healing,
and self-configuration capabilities.
IPv6 as an integration layer: allows to exploit the potential of IPv6 and related standards.
Source: Tata Consultancy Services. http://gisfi.org/pdf/june_21_23_10/Internet_of_Things.ppt
5. Internet of Things Enablers
• Energy
• Intelligence
• Communication
• Integration
• Interoperability
• Standards
Source: Tata Consultancy Services. http://gisfi.org/pdf/june_21_23_10/Internet_of_Things.ppt
Image Source: The Internet of Things, 2012, New Horizons, Edited by: Ian G Smith,
Technical Editors: Ovidiu Vermesan Peter Friess Anthony Furness http://www.internet-of-
things-research.eu/pdf/IERC_Cluster_Book_2012_WEB.pdf
6. IoT
• Internet for Devices
• Internet for M2M communication
• Internet for Non Human
7. Threat vs. Opportunity
• If misunderstood and misconfigured, IoT poses risk
to our data, privacy, and safety.
• If understood and secured, IoT will enhance
communications, lifestyle, and delivery of services.
8. How are the networks changing?
• Extensions
– More nodes, more connections
– Any TIME, Any PLACE + Any THING
– M2M, IoT
• Billions of interconnected devices,
• Everybody is connected.
• Expansions
– Broadband
– LTE, 5G
• Enhancements
– Smart networks
– Data-centric and content-oriented networking
– Context-aware (autonomous) systems
Source: University of Surrey. IoT,
http://personal.ee.surrey.ac.uk/Personal/P.Barnaghi/teaching/EEEM048/2015/EEEM048_Lecture1_Introduction.ppt
9. Technology Trend
Re -Source: university of Surrey. IoT,
http://personal.ee.surrey.ac.uk/Personal/P.Barnaghi/teaching/EEEM048/2015/EEEM048_Lecture1_Introduction.ppt
10. Architectural Trends
• The following issues are important for IoT standardization
Designing Web Services
Designing Messaging Services
Designing Common Data Exchange Formats
Using Internet Protocol Layers or an IP proxy layer
• The architectural framework needs to incorporate all the desired aspects such as
scalability, flexibility, adaptability etc.
• The components, and interfaces for various building blocks such as device interfaces,
data formats, networking standards and protocols, service platforms and application
interfaces are to be defined in IoT standards.
Source: Tata Consultancy Services. http://gisfi.org/pdf/june_21_23_10/Internet_of_Things.ppt
11. Data Lifecycle
Source: The IET Technical Report, Digital Technology Adoption in the Smart Built Environment: Challenges and opportunities of data driven systems for building,
community and city-scale applications,
http://www.theiet.org/sectors/built-environment/resources/digital-technology.cfm
Stage-1 Data Collection
Context- metadata, ID,
location, time
Validation – format,
range, source
Verification –accuracy,
consistency, integrity
Stage-2 Data Analytics
Compute- Store, index,
aggregate, structure
Correlate- benchmark,
profile, informed decision
Compliance- quality,
control, governance,
skills/competence
Stage-3 Data Use/
Reuse
Own use/sharing –
trust, access, value
Action- interface,
visualization,
application
Secondary use-
risks/precaution,
rights/ licenses
Interaction/ Feedback/ Control
12. • Sensors:
– They are mainly input components
– They sense and collect surrounding information
– Basically three types:
• Passive, omnidirectional (e.g. mic)
• Passive, narrow-beam sensor (e.g. PIR)
• Active sensors (e.g. sonar, radar, etc.)
• Actuators:
– They are mainly output components
– They alter the surrounding.
– Some examples:
• Adding lighting, heat, sound, etc.
• Controlling motors to move objects
• Displaying messages
• and others…
Sensors & Actuators
13. • We can turn almost every object into a “thing”.
• A “thing” still looks much like an embedded system currently.
• A “thing” generally consists of four main parts:
– Sensors & actuators
– Microcontroller
– Communication unit
– Power supply
• A “thing” has the following properties:
– It’s usually powered by battery. This implies limited source of energy.
– It’s generally small in size and low in cost. This limits their computing capability.
– It doesn’t usually perform complicated tasks.
• Power consumption is the main design issue.
Things
14. • A “thing” always feature communications for “team working”
• The Role of Communications
– Providing a data link between two nodes
• Communication type:
– Wireline (e.g. copper wires, optical fibers)
– Wireless (e.g. RF, IR). RF-based communication is the most popular
choice (and also our focus)
• Popular RF-based communication solutions:
– IEEE 802.15.4
– IEEE 802.11 (or Wi-Fi)
– Bluetooth
– Near Field Communication (NFC), e.g. RFID
Communications
15. • The Roles of Networks
– Managing nodes (discovery, join, leave, etc).
– Relaying data packets from the source to the destination node in the network.
• Networks are a distributed system. All nodes need to perform networking
related tasks.
• RF-based Network in IoT is usually a Wireless Multi-hop Network.
– Wireless Sensor Networks
– Mobile Wireless Ad hoc Networks
– Wireless Mesh Networks
– Vehicular Ad Hoc Networks
– and many others...
• Main concern: Reliability & Performance
Networks
16. • The Internet serves as a wide area networking for
a local network.
• The Internet uses TCP/IP. This implies that things
must also support TCP/IP.
• Gateway (or sink)
The Internet
The Internet
Gateway
Data link
Network
17. IoT Protocol Stacks
Source: LOGANATHAN V, Welcome to the Workshop on IoT & Cloud Computing the Coexistence . Available at
https://slideplayer.com/slide/13103760/ and http://www.ismuniv.com/wp-content/uploads/2015/12/coexistance.ppt
IoT Stack Web Stack
TCP/IP Model IoT Applications and Device
Management
Web Applications
Data Format Binary, JSON, CBOR HTML, XML, JSON
Application
Layer
CoAP, MQTT, XMPP,AMQP HTTP, DHCP, DNS, TLS/SSL
Transport Layer UDP, DTLS TCP, UCP
Internet Layer IPv6/IP Routing and
6LoWPAN
IPv6, IPv4, IPSec
Network Layer IEEE 802.15.4 MAC, IEEE
802.15.4 PHY/ Physical Radio
Ethernet (IEEE 802.3), DSL, ISDN,
Wireless LAN (IEEE 802.11), Wi-Fi
18. Protocol Stack
Network (IP)
IEEE 802.15.4
PHY/MAC
TCP/UDP
Application
Network (IP)
IEEE 802.15.4
PHY/MAC
TCP/UDP
Application
IEEE 802.15.4
PHY/MAC
Network (IP)
IEEE 802.3
(Ethernet)
Network (IP)
IEEE 802.3
(Ethernet)
TCP/UDP
Application
Wireless
Medium
The
Internet
Thing Thing
Gateway
Server
19. Enabling Technologies: Wireless technologies
Latency ~2.5 ms ~20 ms
Peak Current ~ 12.5 mA ~ 40 mA
Data Rate ~305 kbps ~100 kbps
Power Efficiency ~0.153 μW/bit ~185.9 μW/bit
Range 280 m 100 m
Network Topology Star Network Mesh Network
Source: http://ftp.onem2m.org/Meetings/TP/2015%20meetings/20150720_TP18_Philadelphia/TP-2015-0764-ITU-T_presentation_to_oneM2M_SC27.PPT
20. System Models and Applications of IoT
Applications: Smart Cities, Smart Homes, Smart Libraries,
Healthcare, Smart Grid
Physical-Cyber-Social Systems
Machine-to-machine communications
System Models and Standards
21. IoT Architecture
• “Physical” components / capabilities
– Sensors / Actuators
– Compute, store, communicate data
• Additional “logical” Components
– Security and dependability composition
– Time bound composition
– Cross-ownership service composition
– Policy negotiation and governance
– Federated orchestration
• Objectives
– Predictable scalability, stability, correctness, time-to-complete
Source: Rudra Datta, NCSU . Available at http://dutta.csc.ncsu.edu/iot_spring17/wrap/architecture.ppt
22. IoT Threats
• Default, weak, and hardcoded credentials
• Firmware and OS are difficult to update
• Lack of vendor support for repairing vulnerabilities
• Web interface vulnerability
• Open ports can be vulnerable
• Error in Coding
• Distributed Denial-of-Service
• Physical theft and tampering
Source: Christopher Giles, Governance Risk Compliance Specialist, The Internet of Things (IoT) Security Considerations
for Higher Education. https://www.utdallas.edu/infosecurity/files/IoT-by-UT-Dallas-022416.pptx
23. IoT Data-Challenges
• Multi-modal and diverse
• Noisy and unfinished
• Dependent on Time and Location
• Dynamic and varies in quality
• Crowed sourced data can be unreliable
• Requires real-time analysis
• Privacy and security
• Data can be biased
24. IoT Governance, Privacy and Security
Challenges
• The IoT’s diversity in devices, services and protocols, present challenges unseen and
unprecedented in the modern communication
• Governance and Privacy Concerns
• Security Challenges
• Autonomy
• Computational Constraints
• Discovery
• Trust Relationships
• It does not have any international compatibility standard.
• It can be highly complex resulting in failure.
• Reduced safety for users.
• Internet of Things device may take control of life in due course of time with
increasing AI technology.
Source: Kizza , Chapter 24: Internet of Things (IoT): Growth, Challenges and Security: Guide to Computer Network Security
https://www.utc.edu/faculty/joseph-kizza/docs/guide4notes/chapter24.ppt
25. IoT in Libraries
• Data of Social Media used in Libraries
• E-platforms like e-resources subscriptions used by the users
• Devices used by the users like laptops, tablets, smartphones, scanners, printers
etc.
• Library gate can be enabled with high-end sensors and are providers of IoT
• IoT, online connectivity to the membership counters
• Catalogues and OPACs are the potential IoTs for the libraries
• Fire detection and prevention devices are also potential IoTs of the libraries
• Mobile Apps and Mobile Referencing are based on IoTs
• Tracking movement of Resources and Inventory in Libraries
• Assistive Technologies used in Libraries
• Virtual and Digital Libraries are based on IoTs
26. Potential Areas of IoT in Libraries
• Library automation software – LMS
• Library management tools – all the applications
• Digitisation technology – digital libraries and virtual platforms
• Tools for search- Discovery and Federated Search provided
• Access to e-resources and publisher content
• Preservation and Digitization platforms
• Internet and Wi-Fi of Libraries
• Library websites and other electronic marketing tools, including social
media
• Mobile Applications used by Libraries
• Other digital means of communications like SMS, emails etc
Source: Bansal, Alka; Arora, Dipti; and Suri, Alka, "Internet of Things: Beginning of New Era for Libraries" (2018). Library
Philosophy and Practice (e-journal). 2081. http://digitalcommons.unl.edu/libphilprac/2081
27. Conclusion
• Libraries are now using Magic Mirror consisting of camera, sensor with Wi-Fi
enabled provides interaction between people and computers to record the data of the
users
• Pressure pad sensor consisting of a thin sheet sensor pad enabled with Wi-Fi
technology is connected to processing unit which records and controls the systems
and users activities.
• Cloud based applications are also used by the libraries which are attached to IoT
apps
• Mobile apps are now used to have the virtual tour of the library on their mobile
devices thus can be based on IoT
• Online mobile apps are used to keep and track the availability of the book on the
respective shelves or check the other resource availability despite the location
wherever they are. These are also connected to IoTs to provide the data.
• Smart books, gaming, augmented reality, and object-based learning are have
potential for IoTs in Libraries.
Source: Ashwini Nag1 and Dr. Khaiser Nikam. Internet Of Things Applications In Academic Libraries. International Journal of
Information Technology and Library Science. ISSN 2349-235X Volume 5, Number 1 (2016), pp. 1-7.
https://www.ripublication.com/ijitls16/ijitlsv5n1_01.pdf