SlideShare ist ein Scribd-Unternehmen logo
1 von 31
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 1
CHAPTER 1
INTRODUCTION
“With a trillion sensors embedded in the environment—all connected by computing
systems, software, and services—it will be possible to hear the heartbeat of the Earth, impacting
human interaction with the globe as profoundly as the Internet has revolutionized
communication.”- Peter Hartwell
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will
change Everything, including ourselves. This may seem like a bold statement, but consider the
impact the Internet already has had on education, communication, business, science, government,
and humanity. Clearly, the Internet is one of the most important and powerful creations in all of
human history. Now consider that IoT represents the next evolution of the Internet, taking a huge
leap in its ability to gather, analyze, and distribute data that we can turn into information,
knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.
Already, IoT projects are under way that promise to close the gap between poor and rich,
improve distribution of the world’s resources to those who need them most, and help us
understand our planet so we can be more proactive and less reactive. Even so, several barriers
exist that threaten to slow IoT development, including the transition to IPv6, having a common
set of standards, and developing energy sources for millions even billions of minute sensors.
However, as businesses, governments, standards bodies, and academia work together to
solve these challenges, IoT will continue to progress. The goal of this paper, therefore, is to
educate you in plain and simple terms so you can be well versed in IoT and understand its
potential to change everything we know to be true today.
Over the last few years the Internet of Things (IoT) has gained significant attention from
both industry and academia. Since the term was introduced in the late 1990s many solutions have
been introduced to the IoT marketplace by different types of organizations, ranging from start-
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 2
ups, academic institutions, government organizations and large enterprise. IoT's popularity is
governed by both the value that it promises to create and market growth and predictions. It
allows `people and things to be connected Anytime, Anyplace, with Anything and Anyone,
ideally using Any path/network and Any service'. Such technology will help to create `a better
world for human beings', where objects around us know what we like, what we want, and what
we need and act accordingly without explicit instructions. Context-aware communications and
computing are key to enable the intelligent interactions such as those the IoT paradigm envision.
Fig: 1.1 a) Smart oven
b) Smart fridge
c) Smart washing machine
(All are network connected)
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 3
CHAPTER 2
LITERATURE SURVEY
The emerging importance of network connected object is described in [1]. Since the term
was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by
different types of organizations, ranging from start-ups, academic institutions, government
organizations and large enterprises.
The main principle of connecting everything including humans and other objects through
any network or path or service is described in [4].Things that can be connected through various
equipments like RFID, sensors, nanotech and smart-tech equipments.
Context-aware communications and computing are keys to enable the intelligent
interactions such as those the IoT paradigm envisions. Context-Aware information and
computing methods are described in [5]. Context-awareness can be defined as the ability of a
system to provide relevant information or services to users using context information where
relevance depends on the user's task. Context-aware communications and computing have been
researched extensively since early 2000s and several surveys have been conducted in this field.
According to BCC Research's 2011 market report on sensors, the global market for
sensors was around $56.3 billion in 2010. In 2011, it was around $62.8 billion. It is expected to
increase to $91.5 billion by 2016, at a compound annual growth rate of 7.8%. One of the
techniques for connecting everyday objects into networks is the radio frequency identification
(RFID) technology is given in [9]. In RFID, the data carried by the chip attached to an object is
transmitted via wireless links. RFID has the capability to convert dump devices into
comparatively smart objects. RFID systems can be used wherever automated labeling,
identification, registration, storage, monitoring, or transport is required to increase efficiency and
effectiveness. According to Frost & Sullivan (2011), the global RFID market was valued at from
$3 billion to $4 billion in 2009. The RFID market will grow by 20% per year through 2016 and
reach a volume of approximately from $6.5 billion to almost $9 billion.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 4
``Smart city'' is a concept aimed at providing a set of new generation services and
infrastructure with the help of information and communication technologies (ICT) which is given
in [10]. Smart cities are expected to be composed of many different smart domains. Smart
transportation, smart security and smart energy management are some of the most important
components for building smart cities ,which was described in[11]. However, in term of market,
smart homes, smart grid, smart healthcare, and smart transportation solutions are expected to
generate the majority of sales. According to Markets and Markets report on Smart Cities Market
(2011 - 2016), the global smart city market is expected to cross $1 trillion by 2016.
Cloud computing is a model for enabling ubiquitous network access to a shared pool of
configurable computing resources. This was discussed in [34].
Cloud computing and storage solutions provide users and enterprises with various
capabilities to store and process their data in third-party data centers. It relies on sharing of
resources to achieve coherence and economies of scale, similar to a utility (like the electricity
grid) over a network. At the foundation of cloud computing is the broader concept of converged
infrastructure and shared services
I also collected information about the solutions from their respective websites, demo
videos, technical specifications, and consumer reviews. Understanding how context-aware
technologies are used in the IoT solutions in the industry's marketplace is vital for academics,
researchers, and industrialists so they can identify trends, industry requirements, demands, and
innovation opportunities.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 5
CHAPTER 3
FRAMERS IN IoTs
INTERNET OF THINGS: The Internet of Things (IoT) is a dynamic global information
network consisting of Internet connected objects, such as radio frequency identifications,
sensors, and actuators, as well as other instruments and smart appliances that are becoming an
integral component of the Internet.
CONTEXT: Contexts can be defined as any information that can be used to characterize the
situation of an entity.
ENTITY: An entity is a person, place, piece of software, software service or object that is
considered relevant to the interaction between a user and an application, including the user and
application themselves
CONTEXT AWARENESS: Context-awareness can be defined as the ability of a system to
provide relevant information or services to users using context information where relevance
depends on the user's task
SMART CITY: ``Smart city'' is a concept aimed at providing a set of new generation services
and infrastructure with the help of information and communication technologies (ICT).
Smart cities are expected to be composed of many different smart domains. Smart transportation,
smart security and smart energy management are some of the most important components for
building smart cities
SMART DEVICE:A smart device is an electronic device, generally connected to other devices
or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can
operate to some extent interactively and autonomously.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 6
IP ADDRESS: An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
RFID: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to
transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
The tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader. Unlike
a barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
SENSOR: A sensor is a transducer whose purpose is to sense some characteristic of its
environments. It detects events or changes in quantities and provides a corresponding output,
generally as an electrical or optical signal; for example, a thermo couple converts temperature to
an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured
temperature into expansion and contraction of a liquid which can be read on a calibrated glass
tube.
NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on
an atomic, molecular, and supramolecular scale. The earliest, widespread description of
nanotechnology referred to the particular technological goal of precisely manipulating atoms and
molecules for fabrication of macroscale products, also now referred to as molecular
nanotechnology.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 7
CHAPTER 4
EVOLUTION AND CURRENT STATUS OF IoTs
IoT’s roots can be traced back to the Massachusetts Institute of Technology (MIT), from
work at the Auto-ID Center. Founded in 1999, this group was working in the field of networked
radio frequency identification (RFID) and emerging sensing technologies. The labs consisted of
seven research universities located across four continents. These institutions were chosen by the
Auto-ID Center to design the architecture for IoT.
Before we talk about the current state of IoT, it is important to agree on a definition.
According to the Cisco Internet Business Solutions Group (IBSG), IoT is simply the point in
time when more “things or objects” were connected to the Internet than people.
Fig: 4.1 Internet of Things Was “Born” Between 2008 and 2009
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 8
In 2003, there were approximately 6.3 billion people living on the planet and 500 million
devices connected to the Internet.3 By dividing the number of connected devices by the world
population, we find that there was less than one (0.08) device for every person. Based on Cisco
IBSG’s definition, IoT didn’t yet exist in 2003 because the number of connected things was
relatively small given that ubiquitous devices such as smart-phones were just being introduced.
For example, Steve Jobs, Apple’s CEO, didn’t unveil the iPhone until January 9, 2007 at the
Macworld conference
Looking to the future, there will be 25 billion devices connected to the Internet by 2015
and 50 billion by 2020. It is important to note that these estimates do not take into account rapid
advances in Internet or device technology; the numbers presented are based on what is known to
be true today. Additionally, the number of connected devices per person may seem low. This is
because the calculation is based on the entire world population, much of which is not yet
connected to the Internet. By reducing the population sample to people actually connected to the
Internet, the number of connected devices per person rises dramatically.
Fig:4.2 Growth in internet connected object
For example, we know that approximately 2 billion people use the Internet today. Using
this figure, the number of connected devices per person jumps to 6.25 in 2010, instead of 1.84.
Of course, we know nothing remains static, especially when it comes to the Internet. Initiatives
and advances, such as Cisco’s Planetary Skin, HP’s central nervous system for the earth
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 9
(CeNSE), and smart dust, have the potential to add millions—even billions of sensors to the
Internet. As cows, water pipes, people, and even shoes, trees, and animals become connected to
IoT, the world has the potential to become a better place.
Currently, IoT is made up of a loose collection of disparate, purpose-built networks.
Today’s cars, for example, have multiple networks to control engine function, safety features,
communications systems, and so on. Commercial and residential buildings also have various
control systems for heating, venting, and air conditioning (HVAC); telephone service; security;
and lighting. As IoT evolves, these networks, and many others, will be connected with added
security, analytics, and management capabilities. This will allow IoT to become even more
powerful in what it can help people achieve.
Fig: 4.2 IoT as networks of network
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 10
CHAPTER 5
EVOLUTION OF CONTEXT AWARE TECHNOLOGY
It is important to understand the evolution of the Internet before discussing the evolution
of context-aware technologies. it is first necessary to understand the differences between the
Internet and the World Wide Web (or web),terms that are often used interchangeably.
The Internet is the physical layer or network made up of switches, routers, and other
equipment. Its primary function is to transport information from one point to another quickly,
reliably, and securely. The web, on the other hand, is an application layer that operates on top of
the Internet. Its primary role is to provide an interface that makes the information flowing across
the Internet usable.
5.1 EVOLUTION OF WEB VERSUS INTERNET
The web has gone through several distinct evolutionary stages:
Stage 1. First was the research phase, when the web was called the Advanced Research Projects
Agency Network (ARPANET). During this time, the web was primarily used by academia for
research purposes.
Stage 2. The second phase of the web can be coined “brochureware.” Characterized by the
domain name “gold rush,” this stage focused on the need for almost every company to share
information on the Internet so that people could learn about products and services.
Stage 3. The third evolution moved the web from static data to transactional information, where
products and services could be bought and sold, and services could be delivered. During this
phase, companies like eBay and Amazon.com exploded on the scene. This phase also will be
infamously remembered as the “dot-com” boom and bust.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 11
Stage 4. The fourth stage, where we are now, is the “social” or “experience” web, where
companies like Face book, Twitter, and Group-on have become immensely popular and
profitable (a notable distinction from the third stage of the web) by allowing people to
communicate, connect, and share information (text, photos, and video) about themselves with
friends, family, and colleagues.
5.2 EVOLUTION OF INTERNET
The Internet broadly evolved in five phases as illustrated in Figure.
The evolution of Internet begins with connecting two computers together and then
moved towards creating the World Wide Web by connecting large number of computers
together. Mobile-Internet emerged when mobile devices were connected to the Internet. People's
identities were added to the Internet via social networks. Finally, the Internet of Things emerged,
comprised of everyday objects added to the Internet. During the course of these phases, the
application of context-aware communication and computing changed significantly.
Fig: 5.1 Evolution of Internet of things
In the early phase of computer networking when computers were connected to each other
in point-to-point fashion, context-aware functionalities were not widely used. Providing help to
users based on the context (of the application currently open) was one of the fundamental
context-aware interactions provided in early computer applications and operating systems.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 12
Another popular use of context is context aware menus that help users to perform tasks
tailored to each situation in a given application. When the Internet came into being, location
information started to become critical context information. Location information (retrieved
through IP addresses) were used by services offered over the Internet in order to provide
location-aware customization to users. Once the mobile devices (phones and tablets) became a
popular and integral part of everyday life, context information collected from sensors built-in to
the devices (e.g. accelerometer, gravity, gyroscope, GPS, linear accelerometer, and rotation
vector, orientation, geomagnetic field, and proximity, and light, pressure, humidity and
temperature) were used to provide context-aware functionality. For example, built-in sensors are
used to determine user activities, environmental monitoring, health and well-being, location and
so on.
Over the last few years social networking has become popular and widely used. Context
information gathered through social networking services (e.g. Facebook, Myspace, Twitter, and
Foursquare) has been fused with the other context information retrieved through mobile devices
to build novel context-aware applications such as activity predictions, recommendations, and
personal assistance.
For example, a mobile application may offer context-aware functionalities by fusing
location information retrieved from mobile phones and recent `likes' retrieved from social media
sites to recommend nearby restaurants that a user might like. In the next phase, `things' were
connected to the Internet by creating the IoT paradigm. An example of context-aware
functionality provided in the IoT paradigm would be an Internet-connected refrigerator telling
users what is inside it, what needs to be purchased or what kind of recipes can be prepared for
dinner. When the user leaves the office, the application autonomously does the shopping and
guides the user to a particular shopping market so she or he can collect the goods it has
purchased. In order to perform such tasks, the application must fuse location data, user
preferences, activity prediction, user schedules, information retrieved through the refrigerator
(i.e. shopping list) and many more. In the light of the above examples, it is evident that the
complexity of collecting, processing and fusing information has increased over time. The amount
of information collected to aid decision making has also increased significantly.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 13
CHAPTER 6
EVALUATION FRAMEWORK
6.1 CONTEXT AWARE FEATURES: This section deals with the various
evaluation framework used in Internet of Things. The evaluation framework which we
used to review IoT products in the marketplace are built upon the theoretical foundation
present in this section.
Fig: 6.1 Context aware features
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 14
1. Presentation: Contexts can be used to decide what information and services need to be
presented to the user. Let us consider a smart environment scenario. When a user enters a
supermarket and takes their smart phones out, what they want to see are their shopping lists.
Context-aware mobile applications need to connect to kitchen appliances such as smart
refrigerators at home to retrieve the shopping lists and present them to the users. This provides
the idea of presenting information based on contexts such as location, time, etc. By definition,
IoT promises to provide any service, at anytime, anyplace, with anything and anyone, ideally
using any path/network.
2. Execution: Automatic execution of services is also a critical feature in the IoT paradigm. Let
us consider a smart home environment. When a user starts driving home from his/her office, the
IoT application employed in the house should switch on the air condition system and switch on
the coffee machine to be ready to use by the time the user steps into the house. These actions
need to be taken automatically based on the context. In it, machine-to-machine communication is
a significant part of the IoT.
3. Tagging: In the IoT paradigm, there will be a large number of sensors attached to the
everyday objects. These objects will produce large volumes of sensory data that have to be
collected, analyzed, fused and interpreted. Sensory data produced by a single sensor will not
provide the necessary information that can be used to fully understand the situation. Therefore,
data collected through multiple sensors need to be fused together. In order to accomplish the
sensor data fusion task, contexts need to be collected. Contexts need to be tagged together with
the sensory data to be processed and understood later. Therefore, context annotation plays a
significant role in context-aware computing research. Here, the tagging operation is also
identified as annotation.
6.2 DATA FLOW IN IoTs
Figure 6.2 visualizes how data is being collected, transferred, processed, and how context
is discovered and annotated in typical IoT solutions. It is important to note that not all solutions
may use the exactly the same data flow. Each solution may use part of the architecture in their
own solution. I had refer to this common data flow architecture in this seminar t demonstrate
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 15
how each solution may design their data flows. Our objective is to identify major strategies that
are used by IoT products to offer context-aware functionalities.
Fig: 6.2 High level data flow in IoTs
6.2.1 ENABLING TECHNOLOGIES IN DATA FLOW OF IoTs
1. RFIDS: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to
transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
The tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 16
source such as a battery and may operate at hundreds of meters from the reader. Unlike
a barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
RFID tags are used in many industries. For example, an RFID tag attached to an
automobile during production can be used to track its progress through the assembly line; RFID-
tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in
livestock and pets allows positive identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and
people, the possibility of reading personally-linked information without consent has raised
serious privacy concerns
Fig: 6.3 Enabling technologies in RFIDs
2. SENSORS: A sensor is a transducer whose purpose is to sense (that is, to detect) some
characteristic of its environments. It detects events or changes in quantities and provides a
corresponding output, generally as an electrical or optical signal; for example, a thermo
couple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a
sensor; it converts the measured temperature into expansion and contraction of a liquid which
can be read on a calibrated glass tube.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 17
Sensors are used in everyday objects such as touch-sensitive elevator buttons (tactile
sensor) and lamps which dim or brighten by touching the base, besides innumerable applications
of which most people are never aware. With advances in micro machinery and easy-to-use micro
controller platforms, the uses of sensors have expanded beyond the more traditional fields of
temperature, pressure or flow measurement, for example into MARG sensors. Moreover, analog
sensors such as potentiometers and force-sensing resistors are still widely used. Applications
include manufacturing and machinery, airplanes and aerospace, cars, medicine and robotics. A
sensor's sensitivity indicates how much the sensor's output changes when the input quantity
being measured changes. For instance, if the mercury in a thermometer moves 1 cm when the
temperature changes by 1 °C, the sensitivity is 1 cm/°C (it is basically the slope Dy/Dx assuming
a linear characteristic).
A proximity sensor is a sensor able to detect the presence of nearby objects without any
physical contact. A proximity sensor often emits an electromagnetic field or a beam
of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return
signal. The object being sensed is often referred to as the proximity sensor's target. Different
proximity sensor targets demand different sensors. For example, a capacitive or photoelectric
sensor might be suitable for a plastic target; an inductive proximity sensor always requires a
metal target. The maximum distance that this sensor can detect is defined "nominal range". Some
sensors have adjustments of the nominal range or means to report a graduated detection distance.
Proximity sensors can have a high reliability and long functional life because of the
absence of mechanical parts and lack of physical contact between sensor and the sensed object.
Proximity sensors are commonly used on smart phones to detect (and skip) accidental
touch screen taps when held to the ear during a call. They are also used in machine vibration
monitoring to measure the variation in distance between a shaft and its support bearing. This is
common in large steam turbines, compressors, and motors that use sleeve-type bearings.
3.NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on
an atomic, molecular, and supramolecular scale. The earliest, widespread description of
nanotechnology referred to the particular technological goal of precisely manipulating atoms and
molecules for fabrication of macroscale products, also now referred to as molecular
nanotechnology. A more generalized description of nanotechnology was subsequently
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 18
established by the National Nanotechnology Initiative, which defines nanotechnology as the
manipulation of matter with at least one dimension sized from 1 to 100 nanometers.
4.SMART-TECH: A smart device is an electronic device, generally connected to other devices
or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can
operate to some extent interactively and autonomously. It is widely believed that these types of
devices will outnumber any other forms of smart computing and communication in a very short
time, in part, acting as a useful enabler for the Internet of Things. Several notable types of smart
devices as of the time of this writing are smart-phones (like the Apple iPhone or most of the
devices running Android operating system), tablets (like the Apple iPad ), smart-watches, smart
bands and smart keychains .The term can also refer to a ubiquitous computing device: a device
that exhibits some properties of ubiquitous computing including–although not necessarily–
artificial intelligence.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 19
CHAPTER 7
IoT PRODUCTS
7.1 MIMO: Mimo has built a smart nursery system, where parents learn new insights about
their baby through connected products like the Mimo Smart Baby Monitor. In this product, turtle
is the device that collects all primary contextual information. Then, the data is transferred to an
intermediary device called lilypad. Such offloading strategy allows to reduce the turtle's weight
at minimum level and to increase the battery life. The communication and processing capabilities
are offloaded to the lilypad device that can be easily recharged when necessary. We can see
Mimo Smart Baby Monitor uses some parts of the data flow architecture as we presented in Fig.
Cloud services perform the additional processing functionality, and the summarized data is
pushed to the mobile devices for context presentation. In the user interface side, parents are
presented mostly the secondary context information such as baby movement and baby's sleeping
status. Accelerometers are used to discover such secondary context information by using pattern
recognition techniques.
Fig: 7.1 MIMO system
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 20
7.2. SENSE AWARE ITEMS: Sense-Aware is a solution developed to support real-time
shipment tracking. As illustrated in Figure it collects and processes contextual information such
as location, temperature, light, relative humidity and biometric pressure, to enhance the visibility
and transparency of the supply chain. Sense-Aware uses both the hardware and software
components in their sensor-based logistic solution. Such data collection allows different parties
to engage in supply chain to monitor the movement of goods in real-time and accurately knows
the quality of the transported goods, and plan their processes effectively and efficiently.
Secondary context is any information that can be computed by using primary context. it can be
computed by using the sensor data fusion operations, or data retrieval operations such as web
service calls (e.g. identify the distance between two sensors by applying sensor data fusion
operations on two raw GPS sensor values).
Fig: 7.2 Sense Aware system using smart devices
7.3 BLOSSOM: Blossom is a smart watering products that can be self-programmed based on
real-time weather data, and it gives the user control over the phone, thus lowering the water bill
up to 30%. In this kind of scenario, the product may autonomously perform the actions (i.e. open
and close sprinklers), based on the contextual information. Another reaction mechanism used by
IoT solutions is to provide recommendations
7.4 NEST: Nest is capable of learning users' schedules and the temperatures they prefer. It
keeps users comfortable and saves energy when they are away.
7.5 MAID: MAID has a personalization engine that continuously learns about the users. It
learns what users cook regularly, tracks users activity by using the data collected from
smartphones and smart watches. Then, it will provide recommendations for a healthy and
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 21
balanced diet. MAID also recommends users to work out or to go for a run based on the calories
they consume each day.
7.6 FiLIP: In FiLIP users send location-aware triggers to make sure children are staying within
the safe area. FiLIP uses a unique blend of GPS, GSM, and Wi-Fi technologies to allow parents
to locate their children by using the most accurate location information, both indoors and
outdoors. Parents can create a virtual radius around a location, such as home, school or a friend's
house. A notification will be sent to the parent's smart-phone when FiLIP detects that their
children have entered or left a safe zone.
7.7FITBIT: Fitbit is a device that can be worn on multiple body parts in order to tracks steps
taken, stairs climbed, calories burned, hours slept, distance traveled, and quality of sleep. This
device collects data and presents it to the users through mobile devices and web interfaces. A
variety of different charts, graphs, icons and other types of graphical elements are heavily used to
summarise and present the analyzed meaningful and actionable data to the users. Such
visualization strategies are commonly encouraged in human computer interaction (HCI)
domains, specially due to the fact that `a picture is worth a thousand words.'
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 22
CHAPTER 8
DISCUSSION ON IoTs PERFORMANCE
This section discuss about the applications or advantages, disadvantages, challenges and
remedies and future on Internet of Things.
8.1 APPLICATIONS:
Fig: 8.1 Applications
When we crossed the threshold of connecting more objects than people to the Internet, a
huge window of opportunity opened for the creation of applications in the areas of automation,
sensing, and machine-to-machine communication. In fact, the possibilities are almost endless.
The following examples highlight some of the ways IoT is changing people’s lives for the better.
8.1.1MANAGEMENT: Management field applications include data management, waste
management, and urban planning and production management.
8.1.2 LOGISTICS: Warehouse management, inventory control, port management etc are
mainly concentrated in logistic areas.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 23
8.1.3 RETAILS: Intelligent shopping, barcodes in retails and electronic tags in equipment
make shopping more clear, easier and perfect.
8.1.4 PHARMACEUTICALS: Pharmaceutical applications of IoTs include intelligent
treatment tags for drugs, drug usage tracking, providing pharmaceutical websites and help in
providing emergency treatment as fast as possible.
8.1.5 FOOD: Food production management and nutrition calculation can be done with the help
of IoTs. It also prevent overproduction and hence shortage of food and control food quality,
health and safety.
8.1.6 SCHOOL ADMINISTRATION: Attendance management, voting systems during
school election and automatic feedback system on classes can be implemented using IoT
principles.
8.1.7 INSTRUCTIONAL TECHNOLOGIES: In the field of media, information
management and foreign language learning also IoTs have various applications.
8.2 CHALLENGES AND BARRIERS TO IoT
Several barriers, however, have the potential to slow the development of IoT. The three
largest are the deployment of IPv6, power for sensors, and agreement on standards.
8.2.1 DEPLOYMENT OF IPv6: The world ran out of IPv4 addresses in February 2010.
While no real impact has been seen by the general public, this situation has the potential to slow
IoT’s progress since the potentially billions of new sensors will require unique IP addresses. In
addition, IPv6 makes the management of networks easier due to auto configuration capabilities
and offers improved security features.
8.2.2 SENSOR ENERGY: For IoT to reach its full potential, sensors will need to be self-
sustaining. Imagine changing batteries in billions of devices deployed across the planet and even
into space. Obviously, this isn’t possible. What’s needed is a way for sensors to generate
electricity from environmental elements such as vibrations, light, and airflow. In a significant
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 24
breakthrough, scientists announced a commercially viable nanogenerator—a flexible chip that
uses body movements such as the pinch of a finger to generate electricity—at the 241st National
Meeting & Exposition of the American Chemical Society in March 2011.
8.3 DISADVANTAGES
Three of the main concerns that accompany the Internet of Things are the breach of
privacy, over-reliance on technology, and the loss of jobs. When anything is put on the internet
it will always be there. Of course there are security measures that are taken to protect
information, but there is always the possibility of hackers breaking into the system and stealing
the data. For example, Anonymous is a group of individuals that hacked into federal sites and
released confidential information to the public. Meanwhile the government is supposed to have
the highest level of security, yet their system was easily breached. Therefore, if all of our
information is stored on the internet, people could hack into it, finding out everything about
individuals lives. Also, companies could misuse the information that they are given access
to. This is a common mishap that occurs within companies all the time. Just recently Google got
caught using information that was supposed to be private. Information, such as the data
collected and stored by IoT, can be immensely beneficial to companies.
The privacy issues also leads to the question of who will control the Internet of
Things? If there is only one company, that could potentially lead to a monopoly hurting
consumers and other companies. If there are multiple companies that are given access to the
information acquired, doesn’t that breach consumers privacy? Also, where is the information
going to be stored? Phone service suppliers such as Verizon and AT&T are no longer offering
unlimited data usage for mobile phones because it is too costly, yet by 2020 it is expected that 50
billion devices will be connected, collecting and storing data.
Another argument against IoT is the over-reliance on technology. As time has
progressed, our current generation has grown up with the readily availability of the internet and
technology in general. However, relying on technology on a day to day basis, making decisions
by the information that it gives up could lead to devastation. No system is robust and fault-
free. We see glitches that occur constantly in technology, specifically involving the
internet. Depending on the amount that an individual relies on the information supplied could be
detrimental if the system collapses. The more we entrust and the more dependent we are on the
Internet could lead to a potentially catastrophic event if it crashes.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 25
Finally the connecting of more and more devices to the Internet will result in the loss of
jobs. The automation of IoT “will have a devastating impact on the employment prospects of
less-educated workers”. For example, people who evaluate inventory will lose their jobs because
devices can not only communicate between each other, but transmit that information to the
owner. We already are witnessing jobs being lost to automated machines, such as the checkout
line in supermarkets and even ATM’s. These disadvantages can be largely devastating to society
as a whole, as well as individuals and consumers.
8.4 THE FUTURE OF IoT
In the near future the Internet and wireless technologies will connect different sources of
information such as sensors, mobile phones and cars in an ever tighter manner. The number of
devices which connect to the Internet is – seemingly exponentially – increasing. These billions of
components produce consume and process information in different environments such as logistic
applications, factories and airports as well as in the work and everyday lives of people. The
society need new, scalable, and compatible and secure solutions for both the management of the
ever broader, complexly-networked Internet of Things, and also for the support of various
business models.
The aim of our Internet of Things Strategic Research Agenda is both to create framework
for study within the given field and also to clearly define the central research objectives.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 26
CONCLUSION
Anyone who says that Internet has fundamentally changed society may be right, but at
the same time, the greatest transformation actually still lies ahead of us. Several new
technologies are now converging in a way that means the internet is on the brink of a substantial
expansion as object large and small get connected and assume their own web identity.
Following on from internet of computers, when our servers and personal computers were
connected to a global network and internet and mobile network, when it was the turn of
telephone and other equipments, the next phase of development is Internet of things, where
more or less anything will be connected and managed in the virtual world. This revolution will
be the web’s largest enlargement ever and will have sweep in effects on every industry and all of
our everyday lives.
Already, IoT projects are under way that promise to close the gap between poor and rich,
improve distribution of the world’s resources to those who need them most, and help us
understand our planet so we can be more proactive and less reactive. Even so, several barriers
exist that threaten to slow IoT development, including the transition to IPv6, having a common
set of standards, and developing energy sources for millions—even billion of minute sensors.
However, as businesses, governments, standards bodies, and academia work together to solve
these challenges, IoT will continue to progress. The goal of this paper, therefore, is to educate
you in plain and simple terms so you can be well versed in IoT and understand its potential to
change everything we know to be true today.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 27
REFERENCES
IEEE PAPERS:
[1] L. Atzori, A. Iera, and G. Morabito, ``The Internet of Things: A survey,'' Comput. Netw., vol.
54, no. 15, pp. 2787_2805, Oct. 2010. [Online].
Available: http://dx.doi.org/10.1016/j.comnet.2010.05.010
[2] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ``Context aware computing for
the Internet of Things: A survey,'' IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414_454,
Jan. 2013.
[3] A. Zaslavsky, C. Perera, and D. Georgakopoulos, ``Sensing as a service and big data,'' in
Proc. Int. Conf. Adv. Cloud Comput. (ACC), Bangalore, India, Jul. 2012, pp. 21_29.
[4] H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelf_é, ``Vision and challenges for realising
the Internet of Things,'' European Commission Information Society and Media, Luxembourg,
Tech. Rep., Mar. 2010. [Online]. Available: http://www.internet-of-things-research.eu/
pdf/IoT_Clusterbook_March_2010.pdf, accessed Oct. 10, 2011.
[5] G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith,and P. Steggles, ``Towards a
better understanding of context andcontext-awareness,'' in Proc. 1st Int. Symp. Handheld
UbiquitousComput.(HUC),1999,pp.304_307.[Online].Available:
http://dl.acm.org/citation.cfm?id=647985.743843
[11] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, ``Internet of Things for smart
cities,'' IEEE Internet Things J., vol. 1, no. 1, pp. 22_32, Feb. 2014.
[34] S. Cirani et al., ``A scalable and self-con_guring architecture for service discovery in the
Internet of Things,'' IEEE Internet Things J., vol. 1, no. 5, pp. 508_521, Oct. 2014.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 28
JOURNALS AND BOOKS:
1. The Internet of Things How the Next Evolution of the Internet Is Changing Everything-by
Dave Evans
2. Fortune at the Bottom of the Pyramid: Eradicating Poverty Through Profits-Dr. C.K.Prahalad
3. The Economist, 2010
WEBSITES:
1. Wikipedia, 2011.
2. Cisco IBSG, 2011.
3 U.S. Census Bureau, 2010; Forrester Research, 2003.
4. Wikipedia, 2010.
5. Cisco IBSG, 2010; U.S. Census Bureau, 2010.
6. While no one can predict the exact number of devices connected to the Internet at any given
time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a
generally agreed-upon number of connected devices at a point in time (500 million in 2003)
provides an estimate that is appropriate for the purposes of this paper. Sources: “Internet Growth
Follows Moore's Law Too,” Lisa Zyga, PhysOrg.com, January 14, 2009,
http://www.physorg.com/news151162452.html; George Colony, Forrester Research founder and
chief executive officer, March 10, 2003, http://www.infoworld.com/t/platforms/forrester-ceo-
web-services-next-it-storm-873
7. “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla-
Rubio and Simon Willis, Cisco IBSG, March 2009,
http://www.cisco.com/web/about/ac79/docs/pov/Planetary_Skin_POV_vFINAL_spw _jc_2.pdf
8. World Internet Stats: Usage and Population Statistics, June 30, 2010.
9. Cisco, 2010; HP, 2010.
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 29
VIVA VOCE
1. Which was the first network using TCP/IP protocol?
The Advanced Research Projects Agency Network (ARPANET) was an early packet
switching network and the first network to implement the protocol suite TCP/IP. Both
technologies became the technical foundation of the Internet. ARPANET was initially funded by
the Advanced Research Projects Agency (ARPA, later Defense Advanced Research Projects
Agency, DARPA ) of the United States Department of Defense.
2. What is an INTERNET PROTOCOL (IP) address?
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
3. What is an RFID?
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The tags
contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader.
4. What is the significance of cloud computing?
Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the
effectiveness of the shared resources. Cloud resources are usually not only shared by multiple
users but are also dynamically reallocated per demand. This can work for allocating resources to
users. For example, a cloud computer facility that serves European users during European
business hours with a specific application (e.g., email) may reallocate the same resources to
serve North American users during North America's business hours with a different application
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 30
(e.g., a web server). This approach should maximize the use of computing power thus reducing
environmental damage as well since less power, air conditioning, rack space, etc. are required for
a variety of functions. With cloud computing, multiple users can access a single server to retrieve
and update their data without purchasing licenses for different applications.
5. What is proximity sensor?
A proximity sensor is a sensor able to detect the presence of nearby objects without any physical
contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic
radiation (infrared, for instance), and looks for changes in the field or return signal. The object
being sensed is often referred to as the proximity sensor's target. Different proximity sensor
targets demand different sensors. For example, a capacitive or photoelectric sensor might be
suitable for a plastic target; an inductive proximity sensor always requires a metal target. The
maximum distance that this sensor can detect is defined "nominal range". Some sensors have
adjustments of the nominal range or means to report a graduated detection distance. Proximity
sensors can have a high reliability and long functional life because of the absence of mechanical
parts and lack of physical contact between sensor and the sensed object.
6. What are nanogenerators?
Nanogenerators are a flexible chip that uses body movements such as the pinch of a finger to
generate electricity.
7. Give and explain an application of context aware information in medical science?
Context-aware mobile agents are a best suited host implementing any context-aware
applications. Modern integrated voice and data communications equips the hospital staff with
smart phones to communicate vocally with each other, but preferably to look up the next task to
be executed and to capture the next report to be noted.
However, all attempts to support staff with such approaches are hampered till failure of
acceptance with the need to look up upon a new event for patient identities, order lists and work
schedules. Hence a well suited solution has to get rid of such manual interaction with a tiny
screen and therefore serves the user with
 automated identifying actual patient and local environment upon approach,
 automated recording the events with coming to and leaving off the actual patient,
SEPTEMBER, 2015 INTERNET OF THINGS
Dept. of ECE 31
 automated presentation of the orders or service due on the current location
8. Describe about the frequency of operation of RF ID?
RFID is considered as a non specific short range device. It can use frequency band without
license; Nevertheless it has to be complaint with local regulations (FCC,ETSI etc).
Low freq: 125 KHz-134 KHz
High freq: 13.56 MHz
Ultra high freq: 860 MHz-960 MHz
Super high freq: 2.45GHz
9. Describe about IPv4?
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232)
possible unique addresses. IPv4 reserves some addresses for special purposes such as private
networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4
addresses are canonically represented in dot-decimal notation, which consists of four decimal
numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents
a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be
presented in various hexadecimal, octal, or binary representations.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to 6G, prepare now training
Introduction to 6G, prepare now trainingIntroduction to 6G, prepare now training
Introduction to 6G, prepare now trainingTonex
 
5G By Rajkiran
5G By Rajkiran5G By Rajkiran
5G By RajkiranRaj Kiran
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsGunjan Panara
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Kunal Adhikari
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT ImplementationAashiq Ahamed N
 
5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation 5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation Rick Stomphorst
 
Introduction to 6G Technology
Introduction to 6G Technology Introduction to 6G Technology
Introduction to 6G Technology JOSE T Y
 
6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications3G4G
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Internet of things
Internet of thingsInternet of things
Internet of thingsVikrant Negi
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptNishant Kayal
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksEbin Ephrem Elavathingal
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basicMathan kumar
 

Was ist angesagt? (20)

Iot Report
Iot ReportIot Report
Iot Report
 
Introduction to 6G, prepare now training
Introduction to 6G, prepare now trainingIntroduction to 6G, prepare now training
Introduction to 6G, prepare now training
 
5G By Rajkiran
5G By Rajkiran5G By Rajkiran
5G By Rajkiran
 
Internet of Things(IoT) & Applications
Internet of Things(IoT) & ApplicationsInternet of Things(IoT) & Applications
Internet of Things(IoT) & Applications
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
 
5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation 5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation
 
Introduction to 6G Technology
Introduction to 6G Technology Introduction to 6G Technology
Introduction to 6G Technology
 
6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications6G Training Course Part 3: 6G Use Cases & Applications
6G Training Course Part 3: 6G Use Cases & Applications
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Z wave
Z waveZ wave
Z wave
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
Healthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor NetworksHealthcare Monitoring Using Wireless Sensor Networks
Healthcare Monitoring Using Wireless Sensor Networks
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
IOT report
IOT reportIOT report
IOT report
 

Andere mochten auch

Presentation IOT Robot
Presentation IOT RobotPresentation IOT Robot
Presentation IOT RobotVatsal N Shah
 
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...Eugene Siow
 
project report on IoT
project report on IoTproject report on IoT
project report on IoTAnshul Sahu
 
pick-and-place-robot
pick-and-place-robotpick-and-place-robot
pick-and-place-robotSuchit Moon
 
ARDUINO BASED TIME AND TEMPERATURE DISPLAY
ARDUINO BASED TIME AND TEMPERATURE DISPLAY ARDUINO BASED TIME AND TEMPERATURE DISPLAY
ARDUINO BASED TIME AND TEMPERATURE DISPLAY ajit kumar singh
 
웨어러블 디바이스를 활용한 개인용 지능형 로봇
웨어러블 디바이스를 활용한 개인용 지능형 로봇웨어러블 디바이스를 활용한 개인용 지능형 로봇
웨어러블 디바이스를 활용한 개인용 지능형 로봇Circulus
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyshaikraheem
 
Sixth sense report
Sixth sense reportSixth sense report
Sixth sense reportRAJASHREE B
 
Sixth sense technology 04
Sixth  sense technology 04Sixth  sense technology 04
Sixth sense technology 04akki_hearts
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technologyNiraj Bharambe
 
Sixth sense tecnology.
Sixth sense tecnology.Sixth sense tecnology.
Sixth sense tecnology.Appam Sushma
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTJISMI JACOB
 
Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar ReprtVikrant Negi
 

Andere mochten auch (20)

Report IOT Robot
Report IOT RobotReport IOT Robot
Report IOT Robot
 
Presentation IOT Robot
Presentation IOT RobotPresentation IOT Robot
Presentation IOT Robot
 
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...
Patching Mr Robot: Mitigating IoT-Related Cyber-Social-Disasters by getting F...
 
project report on IoT
project report on IoTproject report on IoT
project report on IoT
 
pick-and-place-robot
pick-and-place-robotpick-and-place-robot
pick-and-place-robot
 
ARDUINO BASED TIME AND TEMPERATURE DISPLAY
ARDUINO BASED TIME AND TEMPERATURE DISPLAY ARDUINO BASED TIME AND TEMPERATURE DISPLAY
ARDUINO BASED TIME AND TEMPERATURE DISPLAY
 
웨어러블 디바이스를 활용한 개인용 지능형 로봇
웨어러블 디바이스를 활용한 개인용 지능형 로봇웨어러블 디바이스를 활용한 개인용 지능형 로봇
웨어러블 디바이스를 활용한 개인용 지능형 로봇
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Sixth sense report
Sixth sense reportSixth sense report
Sixth sense report
 
IOT in healthcare
IOT in healthcareIOT in healthcare
IOT in healthcare
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Sixth sense technology 04
Sixth  sense technology 04Sixth  sense technology 04
Sixth sense technology 04
 
Nodejs vatsal shah
Nodejs vatsal shahNodejs vatsal shah
Nodejs vatsal shah
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Sixth sense tecnology.
Sixth sense tecnology.Sixth sense tecnology.
Sixth sense tecnology.
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
SIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORTSIXTH SENSE TECHNOLOGY REPORT
SIXTH SENSE TECHNOLOGY REPORT
 
Internet of things Seminar Reprt
Internet of things Seminar ReprtInternet of things Seminar Reprt
Internet of things Seminar Reprt
 

Ähnlich wie iot report 3 (2)

WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 enKarel Van Isacker
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSIJCNCJournal
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewIJERA Editor
 
Application OF IoT in Military Service
Application OF IoT in Military ServiceApplication OF IoT in Military Service
Application OF IoT in Military Serviceijtsrd
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsTELKOMNIKA JOURNAL
 
Internet of Things (IoT): More than Smart “Things”
Internet of Things (IoT): More than Smart “Things”Internet of Things (IoT): More than Smart “Things”
Internet of Things (IoT): More than Smart “Things”Ahmed Banafa
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxcetabac
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxSampath737246
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptxssuser2cc0d4
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldMarc Jadoul
 
Smart Cities and IoT whitepaper
Smart Cities and IoT whitepaperSmart Cities and IoT whitepaper
Smart Cities and IoT whitepaperRichard Hatheway
 

Ähnlich wie iot report 3 (2) (20)

Livre blanc iot
Livre blanc iotLivre blanc iot
Livre blanc iot
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Internet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controllingInternet of things iot based real time gas leakage monitoring and controlling
Internet of things iot based real time gas leakage monitoring and controlling
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
The Internet of Things (IoT): An Overview
The Internet of Things (IoT): An OverviewThe Internet of Things (IoT): An Overview
The Internet of Things (IoT): An Overview
 
Application OF IoT in Military Service
Application OF IoT in Military ServiceApplication OF IoT in Military Service
Application OF IoT in Military Service
 
New Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and SolutionsNew Trends in Internet of Things, Applications, Challenges, and Solutions
New Trends in Internet of Things, Applications, Challenges, and Solutions
 
Internet of Things (IoT): More than Smart “Things”
Internet of Things (IoT): More than Smart “Things”Internet of Things (IoT): More than Smart “Things”
Internet of Things (IoT): More than Smart “Things”
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
Iot report
Iot reportIot report
Iot report
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter world
 
Smart Cities and IoT whitepaper
Smart Cities and IoT whitepaperSmart Cities and IoT whitepaper
Smart Cities and IoT whitepaper
 

iot report 3 (2)

  • 1. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 1 CHAPTER 1 INTRODUCTION “With a trillion sensors embedded in the environment—all connected by computing systems, software, and services—it will be possible to hear the heartbeat of the Earth, impacting human interaction with the globe as profoundly as the Internet has revolutionized communication.”- Peter Hartwell The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will change Everything, including ourselves. This may seem like a bold statement, but consider the impact the Internet already has had on education, communication, business, science, government, and humanity. Clearly, the Internet is one of the most important and powerful creations in all of human history. Now consider that IoT represents the next evolution of the Internet, taking a huge leap in its ability to gather, analyze, and distribute data that we can turn into information, knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important. Already, IoT projects are under way that promise to close the gap between poor and rich, improve distribution of the world’s resources to those who need them most, and help us understand our planet so we can be more proactive and less reactive. Even so, several barriers exist that threaten to slow IoT development, including the transition to IPv6, having a common set of standards, and developing energy sources for millions even billions of minute sensors. However, as businesses, governments, standards bodies, and academia work together to solve these challenges, IoT will continue to progress. The goal of this paper, therefore, is to educate you in plain and simple terms so you can be well versed in IoT and understand its potential to change everything we know to be true today. Over the last few years the Internet of Things (IoT) has gained significant attention from both industry and academia. Since the term was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by different types of organizations, ranging from start-
  • 2. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 2 ups, academic institutions, government organizations and large enterprise. IoT's popularity is governed by both the value that it promises to create and market growth and predictions. It allows `people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using Any path/network and Any service'. Such technology will help to create `a better world for human beings', where objects around us know what we like, what we want, and what we need and act accordingly without explicit instructions. Context-aware communications and computing are key to enable the intelligent interactions such as those the IoT paradigm envision. Fig: 1.1 a) Smart oven b) Smart fridge c) Smart washing machine (All are network connected)
  • 3. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 3 CHAPTER 2 LITERATURE SURVEY The emerging importance of network connected object is described in [1]. Since the term was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by different types of organizations, ranging from start-ups, academic institutions, government organizations and large enterprises. The main principle of connecting everything including humans and other objects through any network or path or service is described in [4].Things that can be connected through various equipments like RFID, sensors, nanotech and smart-tech equipments. Context-aware communications and computing are keys to enable the intelligent interactions such as those the IoT paradigm envisions. Context-Aware information and computing methods are described in [5]. Context-awareness can be defined as the ability of a system to provide relevant information or services to users using context information where relevance depends on the user's task. Context-aware communications and computing have been researched extensively since early 2000s and several surveys have been conducted in this field. According to BCC Research's 2011 market report on sensors, the global market for sensors was around $56.3 billion in 2010. In 2011, it was around $62.8 billion. It is expected to increase to $91.5 billion by 2016, at a compound annual growth rate of 7.8%. One of the techniques for connecting everyday objects into networks is the radio frequency identification (RFID) technology is given in [9]. In RFID, the data carried by the chip attached to an object is transmitted via wireless links. RFID has the capability to convert dump devices into comparatively smart objects. RFID systems can be used wherever automated labeling, identification, registration, storage, monitoring, or transport is required to increase efficiency and effectiveness. According to Frost & Sullivan (2011), the global RFID market was valued at from $3 billion to $4 billion in 2009. The RFID market will grow by 20% per year through 2016 and reach a volume of approximately from $6.5 billion to almost $9 billion.
  • 4. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 4 ``Smart city'' is a concept aimed at providing a set of new generation services and infrastructure with the help of information and communication technologies (ICT) which is given in [10]. Smart cities are expected to be composed of many different smart domains. Smart transportation, smart security and smart energy management are some of the most important components for building smart cities ,which was described in[11]. However, in term of market, smart homes, smart grid, smart healthcare, and smart transportation solutions are expected to generate the majority of sales. According to Markets and Markets report on Smart Cities Market (2011 - 2016), the global smart city market is expected to cross $1 trillion by 2016. Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. This was discussed in [34]. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services I also collected information about the solutions from their respective websites, demo videos, technical specifications, and consumer reviews. Understanding how context-aware technologies are used in the IoT solutions in the industry's marketplace is vital for academics, researchers, and industrialists so they can identify trends, industry requirements, demands, and innovation opportunities.
  • 5. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 5 CHAPTER 3 FRAMERS IN IoTs INTERNET OF THINGS: The Internet of Things (IoT) is a dynamic global information network consisting of Internet connected objects, such as radio frequency identifications, sensors, and actuators, as well as other instruments and smart appliances that are becoming an integral component of the Internet. CONTEXT: Contexts can be defined as any information that can be used to characterize the situation of an entity. ENTITY: An entity is a person, place, piece of software, software service or object that is considered relevant to the interaction between a user and an application, including the user and application themselves CONTEXT AWARENESS: Context-awareness can be defined as the ability of a system to provide relevant information or services to users using context information where relevance depends on the user's task SMART CITY: ``Smart city'' is a concept aimed at providing a set of new generation services and infrastructure with the help of information and communication technologies (ICT). Smart cities are expected to be composed of many different smart domains. Smart transportation, smart security and smart energy management are some of the most important components for building smart cities SMART DEVICE:A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can operate to some extent interactively and autonomously.
  • 6. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 6 IP ADDRESS: An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. RFID: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC). SENSOR: A sensor is a transducer whose purpose is to sense some characteristic of its environments. It detects events or changes in quantities and provides a corresponding output, generally as an electrical or optical signal; for example, a thermo couple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured temperature into expansion and contraction of a liquid which can be read on a calibrated glass tube. NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on an atomic, molecular, and supramolecular scale. The earliest, widespread description of nanotechnology referred to the particular technological goal of precisely manipulating atoms and molecules for fabrication of macroscale products, also now referred to as molecular nanotechnology.
  • 7. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 7 CHAPTER 4 EVOLUTION AND CURRENT STATUS OF IoTs IoT’s roots can be traced back to the Massachusetts Institute of Technology (MIT), from work at the Auto-ID Center. Founded in 1999, this group was working in the field of networked radio frequency identification (RFID) and emerging sensing technologies. The labs consisted of seven research universities located across four continents. These institutions were chosen by the Auto-ID Center to design the architecture for IoT. Before we talk about the current state of IoT, it is important to agree on a definition. According to the Cisco Internet Business Solutions Group (IBSG), IoT is simply the point in time when more “things or objects” were connected to the Internet than people. Fig: 4.1 Internet of Things Was “Born” Between 2008 and 2009
  • 8. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 8 In 2003, there were approximately 6.3 billion people living on the planet and 500 million devices connected to the Internet.3 By dividing the number of connected devices by the world population, we find that there was less than one (0.08) device for every person. Based on Cisco IBSG’s definition, IoT didn’t yet exist in 2003 because the number of connected things was relatively small given that ubiquitous devices such as smart-phones were just being introduced. For example, Steve Jobs, Apple’s CEO, didn’t unveil the iPhone until January 9, 2007 at the Macworld conference Looking to the future, there will be 25 billion devices connected to the Internet by 2015 and 50 billion by 2020. It is important to note that these estimates do not take into account rapid advances in Internet or device technology; the numbers presented are based on what is known to be true today. Additionally, the number of connected devices per person may seem low. This is because the calculation is based on the entire world population, much of which is not yet connected to the Internet. By reducing the population sample to people actually connected to the Internet, the number of connected devices per person rises dramatically. Fig:4.2 Growth in internet connected object For example, we know that approximately 2 billion people use the Internet today. Using this figure, the number of connected devices per person jumps to 6.25 in 2010, instead of 1.84. Of course, we know nothing remains static, especially when it comes to the Internet. Initiatives and advances, such as Cisco’s Planetary Skin, HP’s central nervous system for the earth
  • 9. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 9 (CeNSE), and smart dust, have the potential to add millions—even billions of sensors to the Internet. As cows, water pipes, people, and even shoes, trees, and animals become connected to IoT, the world has the potential to become a better place. Currently, IoT is made up of a loose collection of disparate, purpose-built networks. Today’s cars, for example, have multiple networks to control engine function, safety features, communications systems, and so on. Commercial and residential buildings also have various control systems for heating, venting, and air conditioning (HVAC); telephone service; security; and lighting. As IoT evolves, these networks, and many others, will be connected with added security, analytics, and management capabilities. This will allow IoT to become even more powerful in what it can help people achieve. Fig: 4.2 IoT as networks of network
  • 10. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 10 CHAPTER 5 EVOLUTION OF CONTEXT AWARE TECHNOLOGY It is important to understand the evolution of the Internet before discussing the evolution of context-aware technologies. it is first necessary to understand the differences between the Internet and the World Wide Web (or web),terms that are often used interchangeably. The Internet is the physical layer or network made up of switches, routers, and other equipment. Its primary function is to transport information from one point to another quickly, reliably, and securely. The web, on the other hand, is an application layer that operates on top of the Internet. Its primary role is to provide an interface that makes the information flowing across the Internet usable. 5.1 EVOLUTION OF WEB VERSUS INTERNET The web has gone through several distinct evolutionary stages: Stage 1. First was the research phase, when the web was called the Advanced Research Projects Agency Network (ARPANET). During this time, the web was primarily used by academia for research purposes. Stage 2. The second phase of the web can be coined “brochureware.” Characterized by the domain name “gold rush,” this stage focused on the need for almost every company to share information on the Internet so that people could learn about products and services. Stage 3. The third evolution moved the web from static data to transactional information, where products and services could be bought and sold, and services could be delivered. During this phase, companies like eBay and Amazon.com exploded on the scene. This phase also will be infamously remembered as the “dot-com” boom and bust.
  • 11. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 11 Stage 4. The fourth stage, where we are now, is the “social” or “experience” web, where companies like Face book, Twitter, and Group-on have become immensely popular and profitable (a notable distinction from the third stage of the web) by allowing people to communicate, connect, and share information (text, photos, and video) about themselves with friends, family, and colleagues. 5.2 EVOLUTION OF INTERNET The Internet broadly evolved in five phases as illustrated in Figure. The evolution of Internet begins with connecting two computers together and then moved towards creating the World Wide Web by connecting large number of computers together. Mobile-Internet emerged when mobile devices were connected to the Internet. People's identities were added to the Internet via social networks. Finally, the Internet of Things emerged, comprised of everyday objects added to the Internet. During the course of these phases, the application of context-aware communication and computing changed significantly. Fig: 5.1 Evolution of Internet of things In the early phase of computer networking when computers were connected to each other in point-to-point fashion, context-aware functionalities were not widely used. Providing help to users based on the context (of the application currently open) was one of the fundamental context-aware interactions provided in early computer applications and operating systems.
  • 12. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 12 Another popular use of context is context aware menus that help users to perform tasks tailored to each situation in a given application. When the Internet came into being, location information started to become critical context information. Location information (retrieved through IP addresses) were used by services offered over the Internet in order to provide location-aware customization to users. Once the mobile devices (phones and tablets) became a popular and integral part of everyday life, context information collected from sensors built-in to the devices (e.g. accelerometer, gravity, gyroscope, GPS, linear accelerometer, and rotation vector, orientation, geomagnetic field, and proximity, and light, pressure, humidity and temperature) were used to provide context-aware functionality. For example, built-in sensors are used to determine user activities, environmental monitoring, health and well-being, location and so on. Over the last few years social networking has become popular and widely used. Context information gathered through social networking services (e.g. Facebook, Myspace, Twitter, and Foursquare) has been fused with the other context information retrieved through mobile devices to build novel context-aware applications such as activity predictions, recommendations, and personal assistance. For example, a mobile application may offer context-aware functionalities by fusing location information retrieved from mobile phones and recent `likes' retrieved from social media sites to recommend nearby restaurants that a user might like. In the next phase, `things' were connected to the Internet by creating the IoT paradigm. An example of context-aware functionality provided in the IoT paradigm would be an Internet-connected refrigerator telling users what is inside it, what needs to be purchased or what kind of recipes can be prepared for dinner. When the user leaves the office, the application autonomously does the shopping and guides the user to a particular shopping market so she or he can collect the goods it has purchased. In order to perform such tasks, the application must fuse location data, user preferences, activity prediction, user schedules, information retrieved through the refrigerator (i.e. shopping list) and many more. In the light of the above examples, it is evident that the complexity of collecting, processing and fusing information has increased over time. The amount of information collected to aid decision making has also increased significantly.
  • 13. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 13 CHAPTER 6 EVALUATION FRAMEWORK 6.1 CONTEXT AWARE FEATURES: This section deals with the various evaluation framework used in Internet of Things. The evaluation framework which we used to review IoT products in the marketplace are built upon the theoretical foundation present in this section. Fig: 6.1 Context aware features
  • 14. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 14 1. Presentation: Contexts can be used to decide what information and services need to be presented to the user. Let us consider a smart environment scenario. When a user enters a supermarket and takes their smart phones out, what they want to see are their shopping lists. Context-aware mobile applications need to connect to kitchen appliances such as smart refrigerators at home to retrieve the shopping lists and present them to the users. This provides the idea of presenting information based on contexts such as location, time, etc. By definition, IoT promises to provide any service, at anytime, anyplace, with anything and anyone, ideally using any path/network. 2. Execution: Automatic execution of services is also a critical feature in the IoT paradigm. Let us consider a smart home environment. When a user starts driving home from his/her office, the IoT application employed in the house should switch on the air condition system and switch on the coffee machine to be ready to use by the time the user steps into the house. These actions need to be taken automatically based on the context. In it, machine-to-machine communication is a significant part of the IoT. 3. Tagging: In the IoT paradigm, there will be a large number of sensors attached to the everyday objects. These objects will produce large volumes of sensory data that have to be collected, analyzed, fused and interpreted. Sensory data produced by a single sensor will not provide the necessary information that can be used to fully understand the situation. Therefore, data collected through multiple sensors need to be fused together. In order to accomplish the sensor data fusion task, contexts need to be collected. Contexts need to be tagged together with the sensory data to be processed and understood later. Therefore, context annotation plays a significant role in context-aware computing research. Here, the tagging operation is also identified as annotation. 6.2 DATA FLOW IN IoTs Figure 6.2 visualizes how data is being collected, transferred, processed, and how context is discovered and annotated in typical IoT solutions. It is important to note that not all solutions may use the exactly the same data flow. Each solution may use part of the architecture in their own solution. I had refer to this common data flow architecture in this seminar t demonstrate
  • 15. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 15 how each solution may design their data flows. Our objective is to identify major strategies that are used by IoT products to offer context-aware functionalities. Fig: 6.2 High level data flow in IoTs 6.2.1 ENABLING TECHNOLOGIES IN DATA FLOW OF IoTs 1. RFIDS: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power
  • 16. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 16 source such as a battery and may operate at hundreds of meters from the reader. Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. RFID is one method for Automatic Identification and Data Capture (AIDC). RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line; RFID- tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in livestock and pets allows positive identification of animals. Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns Fig: 6.3 Enabling technologies in RFIDs 2. SENSORS: A sensor is a transducer whose purpose is to sense (that is, to detect) some characteristic of its environments. It detects events or changes in quantities and provides a corresponding output, generally as an electrical or optical signal; for example, a thermo couple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured temperature into expansion and contraction of a liquid which can be read on a calibrated glass tube.
  • 17. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 17 Sensors are used in everyday objects such as touch-sensitive elevator buttons (tactile sensor) and lamps which dim or brighten by touching the base, besides innumerable applications of which most people are never aware. With advances in micro machinery and easy-to-use micro controller platforms, the uses of sensors have expanded beyond the more traditional fields of temperature, pressure or flow measurement, for example into MARG sensors. Moreover, analog sensors such as potentiometers and force-sensing resistors are still widely used. Applications include manufacturing and machinery, airplanes and aerospace, cars, medicine and robotics. A sensor's sensitivity indicates how much the sensor's output changes when the input quantity being measured changes. For instance, if the mercury in a thermometer moves 1 cm when the temperature changes by 1 °C, the sensitivity is 1 cm/°C (it is basically the slope Dy/Dx assuming a linear characteristic). A proximity sensor is a sensor able to detect the presence of nearby objects without any physical contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return signal. The object being sensed is often referred to as the proximity sensor's target. Different proximity sensor targets demand different sensors. For example, a capacitive or photoelectric sensor might be suitable for a plastic target; an inductive proximity sensor always requires a metal target. The maximum distance that this sensor can detect is defined "nominal range". Some sensors have adjustments of the nominal range or means to report a graduated detection distance. Proximity sensors can have a high reliability and long functional life because of the absence of mechanical parts and lack of physical contact between sensor and the sensed object. Proximity sensors are commonly used on smart phones to detect (and skip) accidental touch screen taps when held to the ear during a call. They are also used in machine vibration monitoring to measure the variation in distance between a shaft and its support bearing. This is common in large steam turbines, compressors, and motors that use sleeve-type bearings. 3.NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on an atomic, molecular, and supramolecular scale. The earliest, widespread description of nanotechnology referred to the particular technological goal of precisely manipulating atoms and molecules for fabrication of macroscale products, also now referred to as molecular nanotechnology. A more generalized description of nanotechnology was subsequently
  • 18. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 18 established by the National Nanotechnology Initiative, which defines nanotechnology as the manipulation of matter with at least one dimension sized from 1 to 100 nanometers. 4.SMART-TECH: A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can operate to some extent interactively and autonomously. It is widely believed that these types of devices will outnumber any other forms of smart computing and communication in a very short time, in part, acting as a useful enabler for the Internet of Things. Several notable types of smart devices as of the time of this writing are smart-phones (like the Apple iPhone or most of the devices running Android operating system), tablets (like the Apple iPad ), smart-watches, smart bands and smart keychains .The term can also refer to a ubiquitous computing device: a device that exhibits some properties of ubiquitous computing including–although not necessarily– artificial intelligence.
  • 19. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 19 CHAPTER 7 IoT PRODUCTS 7.1 MIMO: Mimo has built a smart nursery system, where parents learn new insights about their baby through connected products like the Mimo Smart Baby Monitor. In this product, turtle is the device that collects all primary contextual information. Then, the data is transferred to an intermediary device called lilypad. Such offloading strategy allows to reduce the turtle's weight at minimum level and to increase the battery life. The communication and processing capabilities are offloaded to the lilypad device that can be easily recharged when necessary. We can see Mimo Smart Baby Monitor uses some parts of the data flow architecture as we presented in Fig. Cloud services perform the additional processing functionality, and the summarized data is pushed to the mobile devices for context presentation. In the user interface side, parents are presented mostly the secondary context information such as baby movement and baby's sleeping status. Accelerometers are used to discover such secondary context information by using pattern recognition techniques. Fig: 7.1 MIMO system
  • 20. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 20 7.2. SENSE AWARE ITEMS: Sense-Aware is a solution developed to support real-time shipment tracking. As illustrated in Figure it collects and processes contextual information such as location, temperature, light, relative humidity and biometric pressure, to enhance the visibility and transparency of the supply chain. Sense-Aware uses both the hardware and software components in their sensor-based logistic solution. Such data collection allows different parties to engage in supply chain to monitor the movement of goods in real-time and accurately knows the quality of the transported goods, and plan their processes effectively and efficiently. Secondary context is any information that can be computed by using primary context. it can be computed by using the sensor data fusion operations, or data retrieval operations such as web service calls (e.g. identify the distance between two sensors by applying sensor data fusion operations on two raw GPS sensor values). Fig: 7.2 Sense Aware system using smart devices 7.3 BLOSSOM: Blossom is a smart watering products that can be self-programmed based on real-time weather data, and it gives the user control over the phone, thus lowering the water bill up to 30%. In this kind of scenario, the product may autonomously perform the actions (i.e. open and close sprinklers), based on the contextual information. Another reaction mechanism used by IoT solutions is to provide recommendations 7.4 NEST: Nest is capable of learning users' schedules and the temperatures they prefer. It keeps users comfortable and saves energy when they are away. 7.5 MAID: MAID has a personalization engine that continuously learns about the users. It learns what users cook regularly, tracks users activity by using the data collected from smartphones and smart watches. Then, it will provide recommendations for a healthy and
  • 21. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 21 balanced diet. MAID also recommends users to work out or to go for a run based on the calories they consume each day. 7.6 FiLIP: In FiLIP users send location-aware triggers to make sure children are staying within the safe area. FiLIP uses a unique blend of GPS, GSM, and Wi-Fi technologies to allow parents to locate their children by using the most accurate location information, both indoors and outdoors. Parents can create a virtual radius around a location, such as home, school or a friend's house. A notification will be sent to the parent's smart-phone when FiLIP detects that their children have entered or left a safe zone. 7.7FITBIT: Fitbit is a device that can be worn on multiple body parts in order to tracks steps taken, stairs climbed, calories burned, hours slept, distance traveled, and quality of sleep. This device collects data and presents it to the users through mobile devices and web interfaces. A variety of different charts, graphs, icons and other types of graphical elements are heavily used to summarise and present the analyzed meaningful and actionable data to the users. Such visualization strategies are commonly encouraged in human computer interaction (HCI) domains, specially due to the fact that `a picture is worth a thousand words.'
  • 22. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 22 CHAPTER 8 DISCUSSION ON IoTs PERFORMANCE This section discuss about the applications or advantages, disadvantages, challenges and remedies and future on Internet of Things. 8.1 APPLICATIONS: Fig: 8.1 Applications When we crossed the threshold of connecting more objects than people to the Internet, a huge window of opportunity opened for the creation of applications in the areas of automation, sensing, and machine-to-machine communication. In fact, the possibilities are almost endless. The following examples highlight some of the ways IoT is changing people’s lives for the better. 8.1.1MANAGEMENT: Management field applications include data management, waste management, and urban planning and production management. 8.1.2 LOGISTICS: Warehouse management, inventory control, port management etc are mainly concentrated in logistic areas.
  • 23. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 23 8.1.3 RETAILS: Intelligent shopping, barcodes in retails and electronic tags in equipment make shopping more clear, easier and perfect. 8.1.4 PHARMACEUTICALS: Pharmaceutical applications of IoTs include intelligent treatment tags for drugs, drug usage tracking, providing pharmaceutical websites and help in providing emergency treatment as fast as possible. 8.1.5 FOOD: Food production management and nutrition calculation can be done with the help of IoTs. It also prevent overproduction and hence shortage of food and control food quality, health and safety. 8.1.6 SCHOOL ADMINISTRATION: Attendance management, voting systems during school election and automatic feedback system on classes can be implemented using IoT principles. 8.1.7 INSTRUCTIONAL TECHNOLOGIES: In the field of media, information management and foreign language learning also IoTs have various applications. 8.2 CHALLENGES AND BARRIERS TO IoT Several barriers, however, have the potential to slow the development of IoT. The three largest are the deployment of IPv6, power for sensors, and agreement on standards. 8.2.1 DEPLOYMENT OF IPv6: The world ran out of IPv4 addresses in February 2010. While no real impact has been seen by the general public, this situation has the potential to slow IoT’s progress since the potentially billions of new sensors will require unique IP addresses. In addition, IPv6 makes the management of networks easier due to auto configuration capabilities and offers improved security features. 8.2.2 SENSOR ENERGY: For IoT to reach its full potential, sensors will need to be self- sustaining. Imagine changing batteries in billions of devices deployed across the planet and even into space. Obviously, this isn’t possible. What’s needed is a way for sensors to generate electricity from environmental elements such as vibrations, light, and airflow. In a significant
  • 24. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 24 breakthrough, scientists announced a commercially viable nanogenerator—a flexible chip that uses body movements such as the pinch of a finger to generate electricity—at the 241st National Meeting & Exposition of the American Chemical Society in March 2011. 8.3 DISADVANTAGES Three of the main concerns that accompany the Internet of Things are the breach of privacy, over-reliance on technology, and the loss of jobs. When anything is put on the internet it will always be there. Of course there are security measures that are taken to protect information, but there is always the possibility of hackers breaking into the system and stealing the data. For example, Anonymous is a group of individuals that hacked into federal sites and released confidential information to the public. Meanwhile the government is supposed to have the highest level of security, yet their system was easily breached. Therefore, if all of our information is stored on the internet, people could hack into it, finding out everything about individuals lives. Also, companies could misuse the information that they are given access to. This is a common mishap that occurs within companies all the time. Just recently Google got caught using information that was supposed to be private. Information, such as the data collected and stored by IoT, can be immensely beneficial to companies. The privacy issues also leads to the question of who will control the Internet of Things? If there is only one company, that could potentially lead to a monopoly hurting consumers and other companies. If there are multiple companies that are given access to the information acquired, doesn’t that breach consumers privacy? Also, where is the information going to be stored? Phone service suppliers such as Verizon and AT&T are no longer offering unlimited data usage for mobile phones because it is too costly, yet by 2020 it is expected that 50 billion devices will be connected, collecting and storing data. Another argument against IoT is the over-reliance on technology. As time has progressed, our current generation has grown up with the readily availability of the internet and technology in general. However, relying on technology on a day to day basis, making decisions by the information that it gives up could lead to devastation. No system is robust and fault- free. We see glitches that occur constantly in technology, specifically involving the internet. Depending on the amount that an individual relies on the information supplied could be detrimental if the system collapses. The more we entrust and the more dependent we are on the Internet could lead to a potentially catastrophic event if it crashes.
  • 25. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 25 Finally the connecting of more and more devices to the Internet will result in the loss of jobs. The automation of IoT “will have a devastating impact on the employment prospects of less-educated workers”. For example, people who evaluate inventory will lose their jobs because devices can not only communicate between each other, but transmit that information to the owner. We already are witnessing jobs being lost to automated machines, such as the checkout line in supermarkets and even ATM’s. These disadvantages can be largely devastating to society as a whole, as well as individuals and consumers. 8.4 THE FUTURE OF IoT In the near future the Internet and wireless technologies will connect different sources of information such as sensors, mobile phones and cars in an ever tighter manner. The number of devices which connect to the Internet is – seemingly exponentially – increasing. These billions of components produce consume and process information in different environments such as logistic applications, factories and airports as well as in the work and everyday lives of people. The society need new, scalable, and compatible and secure solutions for both the management of the ever broader, complexly-networked Internet of Things, and also for the support of various business models. The aim of our Internet of Things Strategic Research Agenda is both to create framework for study within the given field and also to clearly define the central research objectives.
  • 26. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 26 CONCLUSION Anyone who says that Internet has fundamentally changed society may be right, but at the same time, the greatest transformation actually still lies ahead of us. Several new technologies are now converging in a way that means the internet is on the brink of a substantial expansion as object large and small get connected and assume their own web identity. Following on from internet of computers, when our servers and personal computers were connected to a global network and internet and mobile network, when it was the turn of telephone and other equipments, the next phase of development is Internet of things, where more or less anything will be connected and managed in the virtual world. This revolution will be the web’s largest enlargement ever and will have sweep in effects on every industry and all of our everyday lives. Already, IoT projects are under way that promise to close the gap between poor and rich, improve distribution of the world’s resources to those who need them most, and help us understand our planet so we can be more proactive and less reactive. Even so, several barriers exist that threaten to slow IoT development, including the transition to IPv6, having a common set of standards, and developing energy sources for millions—even billion of minute sensors. However, as businesses, governments, standards bodies, and academia work together to solve these challenges, IoT will continue to progress. The goal of this paper, therefore, is to educate you in plain and simple terms so you can be well versed in IoT and understand its potential to change everything we know to be true today.
  • 27. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 27 REFERENCES IEEE PAPERS: [1] L. Atzori, A. Iera, and G. Morabito, ``The Internet of Things: A survey,'' Comput. Netw., vol. 54, no. 15, pp. 2787_2805, Oct. 2010. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2010.05.010 [2] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ``Context aware computing for the Internet of Things: A survey,'' IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414_454, Jan. 2013. [3] A. Zaslavsky, C. Perera, and D. Georgakopoulos, ``Sensing as a service and big data,'' in Proc. Int. Conf. Adv. Cloud Comput. (ACC), Bangalore, India, Jul. 2012, pp. 21_29. [4] H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelf_é, ``Vision and challenges for realising the Internet of Things,'' European Commission Information Society and Media, Luxembourg, Tech. Rep., Mar. 2010. [Online]. Available: http://www.internet-of-things-research.eu/ pdf/IoT_Clusterbook_March_2010.pdf, accessed Oct. 10, 2011. [5] G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith,and P. Steggles, ``Towards a better understanding of context andcontext-awareness,'' in Proc. 1st Int. Symp. Handheld UbiquitousComput.(HUC),1999,pp.304_307.[Online].Available: http://dl.acm.org/citation.cfm?id=647985.743843 [11] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, ``Internet of Things for smart cities,'' IEEE Internet Things J., vol. 1, no. 1, pp. 22_32, Feb. 2014. [34] S. Cirani et al., ``A scalable and self-con_guring architecture for service discovery in the Internet of Things,'' IEEE Internet Things J., vol. 1, no. 5, pp. 508_521, Oct. 2014.
  • 28. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 28 JOURNALS AND BOOKS: 1. The Internet of Things How the Next Evolution of the Internet Is Changing Everything-by Dave Evans 2. Fortune at the Bottom of the Pyramid: Eradicating Poverty Through Profits-Dr. C.K.Prahalad 3. The Economist, 2010 WEBSITES: 1. Wikipedia, 2011. 2. Cisco IBSG, 2011. 3 U.S. Census Bureau, 2010; Forrester Research, 2003. 4. Wikipedia, 2010. 5. Cisco IBSG, 2010; U.S. Census Bureau, 2010. 6. While no one can predict the exact number of devices connected to the Internet at any given time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a generally agreed-upon number of connected devices at a point in time (500 million in 2003) provides an estimate that is appropriate for the purposes of this paper. Sources: “Internet Growth Follows Moore's Law Too,” Lisa Zyga, PhysOrg.com, January 14, 2009, http://www.physorg.com/news151162452.html; George Colony, Forrester Research founder and chief executive officer, March 10, 2003, http://www.infoworld.com/t/platforms/forrester-ceo- web-services-next-it-storm-873 7. “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla- Rubio and Simon Willis, Cisco IBSG, March 2009, http://www.cisco.com/web/about/ac79/docs/pov/Planetary_Skin_POV_vFINAL_spw _jc_2.pdf 8. World Internet Stats: Usage and Population Statistics, June 30, 2010. 9. Cisco, 2010; HP, 2010.
  • 29. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 29 VIVA VOCE 1. Which was the first network using TCP/IP protocol? The Advanced Research Projects Agency Network (ARPANET) was an early packet switching network and the first network to implement the protocol suite TCP/IP. Both technologies became the technical foundation of the Internet. ARPANET was initially funded by the Advanced Research Projects Agency (ARPA, later Defense Advanced Research Projects Agency, DARPA ) of the United States Department of Defense. 2. What is an INTERNET PROTOCOL (IP) address? An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. 3. What is an RFID? Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. The tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader. 4. What is the significance of cloud computing? Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources. Cloud resources are usually not only shared by multiple users but are also dynamically reallocated per demand. This can work for allocating resources to users. For example, a cloud computer facility that serves European users during European business hours with a specific application (e.g., email) may reallocate the same resources to serve North American users during North America's business hours with a different application
  • 30. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 30 (e.g., a web server). This approach should maximize the use of computing power thus reducing environmental damage as well since less power, air conditioning, rack space, etc. are required for a variety of functions. With cloud computing, multiple users can access a single server to retrieve and update their data without purchasing licenses for different applications. 5. What is proximity sensor? A proximity sensor is a sensor able to detect the presence of nearby objects without any physical contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return signal. The object being sensed is often referred to as the proximity sensor's target. Different proximity sensor targets demand different sensors. For example, a capacitive or photoelectric sensor might be suitable for a plastic target; an inductive proximity sensor always requires a metal target. The maximum distance that this sensor can detect is defined "nominal range". Some sensors have adjustments of the nominal range or means to report a graduated detection distance. Proximity sensors can have a high reliability and long functional life because of the absence of mechanical parts and lack of physical contact between sensor and the sensed object. 6. What are nanogenerators? Nanogenerators are a flexible chip that uses body movements such as the pinch of a finger to generate electricity. 7. Give and explain an application of context aware information in medical science? Context-aware mobile agents are a best suited host implementing any context-aware applications. Modern integrated voice and data communications equips the hospital staff with smart phones to communicate vocally with each other, but preferably to look up the next task to be executed and to capture the next report to be noted. However, all attempts to support staff with such approaches are hampered till failure of acceptance with the need to look up upon a new event for patient identities, order lists and work schedules. Hence a well suited solution has to get rid of such manual interaction with a tiny screen and therefore serves the user with  automated identifying actual patient and local environment upon approach,  automated recording the events with coming to and leaving off the actual patient,
  • 31. SEPTEMBER, 2015 INTERNET OF THINGS Dept. of ECE 31  automated presentation of the orders or service due on the current location 8. Describe about the frequency of operation of RF ID? RFID is considered as a non specific short range device. It can use frequency band without license; Nevertheless it has to be complaint with local regulations (FCC,ETSI etc). Low freq: 125 KHz-134 KHz High freq: 13.56 MHz Ultra high freq: 860 MHz-960 MHz Super high freq: 2.45GHz 9. Describe about IPv4? In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4 addresses are canonically represented in dot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.