SlideShare ist ein Scribd-Unternehmen logo
1 von 64
Downloaden Sie, um offline zu lesen
IoT Introduction
Francesco Felicetta
f.felicetta@elis.org
What do these have in common?
Analog Digital &
Isolated
Digital &
Connected
https://www.youtube.com/watch?v=ydZxuU84MyE
2
3rd Wave of IT Transformation
3
IoT: Some historical facts
1999
The term “Internet of Things” is used.
By Kevin Ashton (MIT) during a presentation about on RFID technology made to
Procter & Gamble (P&G).The phrase referred to a future world where all types of
electronic devices link to each other via the Internet.
2004
The number of active mobile-connected devices surpasses the number of people
in the world
2000 LG announces it's first Internet refrigerator plans.
4
2017
Amazon’s Alexa stole the show at CES in a bid to become the Internet of Things
operating system. Amazon Alexa present in a lot of devices and products including
Ford cars, LG's new refrigerator, and Huawei's Mate 9 smartphone.
5
IoT Market Forecast - McKinsey
How many Things?
6
20-50 Billion devices will be connected by 2020
Hype Cycle for Emerging Technologies, 2015
Source Gartner, August 2015 7
Hype Cycle for Emerging Technologies, 2016
Source Gartner, August 2016 8
Hype Cycle for Emerging Technologies, 2017
Source Gartner, August 2017 9
Google trends for «Internet of Things»
http://www.google.com/trends/
10
IoT is accelerating:
Hundreds of real deployments mapped out
http://www.iotwf.com/
11
The IoT year 2016 in review
12
IoT and Digital Agenda For Europe
Internet of Things seeks to merge physical and virtual
worlds creating 'smart environments' to improve
citizens lives.The European Commission supports IoT
innovation and future deployment.
https://www.youtube.com/watch?v=kq8wcjQYW90&list=PLD4B1B7AB8011CFB7&index=2
http://ec.europa.eu/digital-agenda/en/internet-things 13
What is the Internet of Things?
The Internet of Things (IoT) is the network of
physical objects that contain embedded technology
to communicate and sense or interact with their
internal states or the external environment.*
*Source: Gartner 14
Some IoT tagline
Intelligent Systems
Smarter Planet
Industrial Internet
Networked Society Internet of Everything
Internet of Things
and Services
15
IoT Enablers 1/2
 Sensor
– measures physical parameters, such as temperature, sound, and
light
– maps a physical quantity into an electrical signal
 Actuator
– modifies physical parameters
– maps an electrical signal into a physical quantity
16
IoT Enablers 2/2
Smartphone
Embedded Systems
Connectivity
Smart Objects
Computing
17
Sensors…
Sensor: From Low Power to No Power
Energy harvesting is the process of capturing and converting
ambient energy – light, vibration, thermal and radio waves –
into electricity for a wide range of applications.
19
Smart Objects 1/2
20
Arduino Platform
21
Connectivity 1/3
 Example of short range wireless protocols:
22
Connectivity 2/3
 Example of Low Power Wide Area Networks:
– LoRaWAN
• Uses free unlicensed spectrum (below 1GHz)
• Outdoor Range ~< 11Km
• Data Rate ~< 50Kbps
• Battery life ~>10 years
– NB-IoT (Narrowband IoT)
• Uses Licensed Spectrum (Better QoS)
• Outdoor Range ~< 15Km
• Data Rate ~< 150Kbps
• Battery life ~>10 years
23
Connectivity 3/3
IoT
applications
represent
key use
cases for 5G
24
Just Connecting Things isn’t enough
25
Cisco Vision: Internet of Everything
26
From Intranet of Things…
 M2M Solution
 Vertical solutions implemented in silos
 Dedicated Networks /Protocols (case of
proprietary communication stacks)
27
…Towards the Internet of Things 1/2
 The emergence of horizontal platforms will be a
key component of the future IoT ecosystem.
 This will allow a transition to a true Internet of
Things, where all “things” can be directly
accessible from any other point in the Internet
 Advanteges:
– Any Application to any device
– Cost efficiency
– Large Developer Community
– New services
28
…Towards the Internet of Things 2/2
 Convergence on Standards
29
To IP or not to IP: that is the question…
30
The IPv6 IoT protocols
31
Constraint-based
routing
 6LoWPAN (IETF RFC)
– IPv6 over Low power Wireless Personal Area Networks
 RPL (IETF RFC)
– Routing Protocol for Low Power and Lossy Networks
 CoAP
– Constrained Application Protocol
IoT – Some Technology push
 The increasing role of smart devices
– Driven in-part by a sensible price decline, sensors and actuators are
being embedded in engineered equipment that are deployed in
several sectors.
 Enhanced communication infrastructure
– The ability to connect anything anytime is helping make IoT a reality.
32
IoT Requires Distributed Computing
33
Cost of Computing Power Equal to an iPad2
If the typical worker in 1982 wanted to purchase something
with computing power of an iPad2, it would have cost more
than the 360 years worth of wages.
34
Cloud Computing
“Cloud computing is a model for
enabling ubiquitous, convenient, on-
demand network access to a shared pool
of configurable resources (e.g.,
networks, servers, storage, applications,
and services) that can be rapidly
provisioned and released with minimal
management effort or service provider
interaction“
NIST Definition
35
Cloud Services & associated “users”
Software as a Service
(SaaS)
Platform as a Service
(PaaS)
Infrastructure as a Service
(IaaS)
Developers
End Users
System Admin
36
Cloud Services & Responsibilities
37
Cloud– Provisioning Model
Service-Oriented approach
 Self-Service, Automated Provisioning
 Rapid provisioning (simple deployment)
 Elasticity (capacity on demand)
 Optimized provisioning & ops cost
 ….
38
Some Benefits of a Cloud Service
 Eliminate many of the complex constraints of traditional
computing enviroment including space, time of
deployment….
 Follow the model of «Pay as you go»: convert capital cost
(Capex) to operational expences (Opex)
 Avoid the risk of under-utilization and saturation of the
resources
39
Probably you need….
…adjustable capacity
Usage Pattern: Cloud Approach
40
Case: Animoto peaks using AWS
From 40 to 5000 server in 3 days
41
https://aws.amazon.com/it/solutions/case-studies/start-ups/
Amazon AWS is only for start-up?
http://aws.amazon.com/solutions/case-studies/
Some companies using AWS
42
IoT Applications: Consumer & Industrial
Consumer IoT
Industrial IoT
• may ultimately dwarf the consumer side
in potential business and socioeconomic
impacts.
• Will transform many industries:
manufacturing, oil and gas, agriculture,
transportation and healthcare. …
such as smart homes, connected cars and
consumer wearables like wristband activity
trackers.
The IoT opens up many players to create new business opportunities in
the consumer and Industrial markets
43
IoT Applications and Cloud Computing
Some IoT applications
probably are not
compatible with
the assumptions
of Cloud Centric
Architectures
44
Cloud-Centric Architectures
Assumption #1
45
Cloud-Centric Architectures
Assumption #2
47
Cloud-Centric Architectures
Assumption #3
49
Cloud Computing & IoT
50
Fog Computing
 Fog is like Cloud Computing but closer to the Things
 Geographical distribution and proximity to end-users
and devices allows for improved service quality and
speed at the network edge.
 Needed for applications that demand real-time and
predictable latency Industrial automation, sensor
network management, real-time actuation
51
Internet of Things - Applications
52
SMARTCITY
SMART HOME & BUILDING
SMART CAR
…….
Smart City: Barcelona Cisco’s Case Study
53
Some Smart Devices for home automation
Netatmo Welcome
Connected security
camera. Face recognition
to allow you to know who
is in your house.
Honeywell Evohome
is an intelligent heating
system with ‘Smart Zoning’
that allows for room by room
temperature control..
Philips HUE
connected bulbs and bridge
let you to take full control of
your lighting.
Wi-Fi Smart Plug
allows you to turn your
devices on or off, wherever
you are
54
Integrate services of multiple vendor
 Services are the apps and devices we use every day
 IFTTT Applets bring our services together to create
new experiences
55
Vehicle-to-Everything (V2X)
56
 V2X, is a wireless technologies aimed at increasing road safety
and improve traffic management, introducing a new concept of
intelligent transport system (ITS), capable to reduce
environmental impact.
More Smarts, More Risk
 If every IoT device has some sort of operating system and
memory, it becomes a potential subject for hacking or
inadvertent misconfiguration.
57
2014: Receive an email from a Fridge ???
 100,000 devices used to take part in the spam campaign.
 The attack is believed to be one of the first to exploit the lax
security on devices that are part of the "internet of things".
58
2015: Be aware of your PRIVACY
59
2016: Mirai Botnet: IoT DDoS attack
 Bringed down sites/services including Twitter, Paypal,
Netflix, CNN… and many others in Europe and the US.
 Orchestrated using the Mirai botnet, a network of devices
infected with self-propagating malware
 Estimated 100,000 malicious endpoints: mainly IoT
Devices!
60
2018: Using a thermometer to hack...
61
Discover Insecure IoT Devises
 Using Shodan to Find Devices Exposed on the Internet
 Shodan is of particular use for security research
around the Internet of Things, since there will soon
be billions of devices online that:
– have specific vulnerabilities that need to be fixed
http://www.shodan.io 62
Hacked also U.S. Public Utility….
63
1. IoT: very huge market and interest
2. Technology: there isn’t a unique solution
3. IoT Challanges: Must be addressed
IoT Introduction
Key Messages
64

Weitere ähnliche Inhalte

Was ist angesagt?

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationAreej Qasrawi
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging TechnologiesSeminar Links
 
Internet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected WorldInternet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected WorldJag Randhawa
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsQian JIN
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Akanksha Prasad
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basicMathan kumar
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Tarika Verma
 

Was ist angesagt? (20)

IoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation ApplicationIoT and Cloud Computing in Automation Application
IoT and Cloud Computing in Automation Application
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
internet of things
internet of thingsinternet of things
internet of things
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 
Internet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected WorldInternet of things - Business Opportunities in the Connected World
Internet of things - Business Opportunities in the Connected World
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
AUGMENTED REALITY
AUGMENTED REALITYAUGMENTED REALITY
AUGMENTED REALITY
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
Wot
WotWot
Wot
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Ähnlich wie Introduction to Internet of Things (IoT)

WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
IoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingIoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingHeiko Koziolek
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceMichelle Holley
 
IoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentIoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentVincent Lau
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptxEshwar Prasad
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoTAhmed Banafa
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalElliot Charles Willcox
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Ankur Pipara
 
Introduction About IoT
Introduction About IoTIntroduction About IoT
Introduction About IoTAsmaa Ibrahim
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningDr.R. Gunavathi Ramasamy
 
Internet of Things & Logistics ECO 270416 Final
Internet of Things & Logistics ECO 270416 FinalInternet of Things & Logistics ECO 270416 Final
Internet of Things & Logistics ECO 270416 FinalErik Cotman
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 

Ähnlich wie Introduction to Internet of Things (IoT) (20)

Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT challenges for Smart Manufacturing
IoT challenges for Smart ManufacturingIoT challenges for Smart Manufacturing
IoT challenges for Smart Manufacturing
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 
IoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentIoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in Deployment
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
SPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 FinalSPHER NET full presentation - v1.1 Final
SPHER NET full presentation - v1.1 Final
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Introduction About IoT
Introduction About IoTIntroduction About IoT
Introduction About IoT
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 
Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
 
Internet of Things & Logistics ECO 270416 Final
Internet of Things & Logistics ECO 270416 FinalInternet of Things & Logistics ECO 270416 Final
Internet of Things & Logistics ECO 270416 Final
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Introduction to Internet of Things (IoT)

  • 2. What do these have in common? Analog Digital & Isolated Digital & Connected https://www.youtube.com/watch?v=ydZxuU84MyE 2
  • 3. 3rd Wave of IT Transformation 3
  • 4. IoT: Some historical facts 1999 The term “Internet of Things” is used. By Kevin Ashton (MIT) during a presentation about on RFID technology made to Procter & Gamble (P&G).The phrase referred to a future world where all types of electronic devices link to each other via the Internet. 2004 The number of active mobile-connected devices surpasses the number of people in the world 2000 LG announces it's first Internet refrigerator plans. 4 2017 Amazon’s Alexa stole the show at CES in a bid to become the Internet of Things operating system. Amazon Alexa present in a lot of devices and products including Ford cars, LG's new refrigerator, and Huawei's Mate 9 smartphone.
  • 6. How many Things? 6 20-50 Billion devices will be connected by 2020
  • 7. Hype Cycle for Emerging Technologies, 2015 Source Gartner, August 2015 7
  • 8. Hype Cycle for Emerging Technologies, 2016 Source Gartner, August 2016 8
  • 9. Hype Cycle for Emerging Technologies, 2017 Source Gartner, August 2017 9
  • 10. Google trends for «Internet of Things» http://www.google.com/trends/ 10
  • 11. IoT is accelerating: Hundreds of real deployments mapped out http://www.iotwf.com/ 11
  • 12. The IoT year 2016 in review 12
  • 13. IoT and Digital Agenda For Europe Internet of Things seeks to merge physical and virtual worlds creating 'smart environments' to improve citizens lives.The European Commission supports IoT innovation and future deployment. https://www.youtube.com/watch?v=kq8wcjQYW90&list=PLD4B1B7AB8011CFB7&index=2 http://ec.europa.eu/digital-agenda/en/internet-things 13
  • 14. What is the Internet of Things? The Internet of Things (IoT) is the network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.* *Source: Gartner 14
  • 15. Some IoT tagline Intelligent Systems Smarter Planet Industrial Internet Networked Society Internet of Everything Internet of Things and Services 15
  • 16. IoT Enablers 1/2  Sensor – measures physical parameters, such as temperature, sound, and light – maps a physical quantity into an electrical signal  Actuator – modifies physical parameters – maps an electrical signal into a physical quantity 16
  • 17. IoT Enablers 2/2 Smartphone Embedded Systems Connectivity Smart Objects Computing 17
  • 19. Sensor: From Low Power to No Power Energy harvesting is the process of capturing and converting ambient energy – light, vibration, thermal and radio waves – into electricity for a wide range of applications. 19
  • 22. Connectivity 1/3  Example of short range wireless protocols: 22
  • 23. Connectivity 2/3  Example of Low Power Wide Area Networks: – LoRaWAN • Uses free unlicensed spectrum (below 1GHz) • Outdoor Range ~< 11Km • Data Rate ~< 50Kbps • Battery life ~>10 years – NB-IoT (Narrowband IoT) • Uses Licensed Spectrum (Better QoS) • Outdoor Range ~< 15Km • Data Rate ~< 150Kbps • Battery life ~>10 years 23
  • 25. Just Connecting Things isn’t enough 25
  • 26. Cisco Vision: Internet of Everything 26
  • 27. From Intranet of Things…  M2M Solution  Vertical solutions implemented in silos  Dedicated Networks /Protocols (case of proprietary communication stacks) 27
  • 28. …Towards the Internet of Things 1/2  The emergence of horizontal platforms will be a key component of the future IoT ecosystem.  This will allow a transition to a true Internet of Things, where all “things” can be directly accessible from any other point in the Internet  Advanteges: – Any Application to any device – Cost efficiency – Large Developer Community – New services 28
  • 29. …Towards the Internet of Things 2/2  Convergence on Standards 29
  • 30. To IP or not to IP: that is the question… 30
  • 31. The IPv6 IoT protocols 31 Constraint-based routing  6LoWPAN (IETF RFC) – IPv6 over Low power Wireless Personal Area Networks  RPL (IETF RFC) – Routing Protocol for Low Power and Lossy Networks  CoAP – Constrained Application Protocol
  • 32. IoT – Some Technology push  The increasing role of smart devices – Driven in-part by a sensible price decline, sensors and actuators are being embedded in engineered equipment that are deployed in several sectors.  Enhanced communication infrastructure – The ability to connect anything anytime is helping make IoT a reality. 32
  • 33. IoT Requires Distributed Computing 33
  • 34. Cost of Computing Power Equal to an iPad2 If the typical worker in 1982 wanted to purchase something with computing power of an iPad2, it would have cost more than the 360 years worth of wages. 34
  • 35. Cloud Computing “Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction“ NIST Definition 35
  • 36. Cloud Services & associated “users” Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Developers End Users System Admin 36
  • 37. Cloud Services & Responsibilities 37
  • 38. Cloud– Provisioning Model Service-Oriented approach  Self-Service, Automated Provisioning  Rapid provisioning (simple deployment)  Elasticity (capacity on demand)  Optimized provisioning & ops cost  …. 38
  • 39. Some Benefits of a Cloud Service  Eliminate many of the complex constraints of traditional computing enviroment including space, time of deployment….  Follow the model of «Pay as you go»: convert capital cost (Capex) to operational expences (Opex)  Avoid the risk of under-utilization and saturation of the resources 39
  • 40. Probably you need…. …adjustable capacity Usage Pattern: Cloud Approach 40
  • 41. Case: Animoto peaks using AWS From 40 to 5000 server in 3 days 41 https://aws.amazon.com/it/solutions/case-studies/start-ups/
  • 42. Amazon AWS is only for start-up? http://aws.amazon.com/solutions/case-studies/ Some companies using AWS 42
  • 43. IoT Applications: Consumer & Industrial Consumer IoT Industrial IoT • may ultimately dwarf the consumer side in potential business and socioeconomic impacts. • Will transform many industries: manufacturing, oil and gas, agriculture, transportation and healthcare. … such as smart homes, connected cars and consumer wearables like wristband activity trackers. The IoT opens up many players to create new business opportunities in the consumer and Industrial markets 43
  • 44. IoT Applications and Cloud Computing Some IoT applications probably are not compatible with the assumptions of Cloud Centric Architectures 44
  • 46.
  • 48.
  • 51. Fog Computing  Fog is like Cloud Computing but closer to the Things  Geographical distribution and proximity to end-users and devices allows for improved service quality and speed at the network edge.  Needed for applications that demand real-time and predictable latency Industrial automation, sensor network management, real-time actuation 51
  • 52. Internet of Things - Applications 52 SMARTCITY SMART HOME & BUILDING SMART CAR …….
  • 53. Smart City: Barcelona Cisco’s Case Study 53
  • 54. Some Smart Devices for home automation Netatmo Welcome Connected security camera. Face recognition to allow you to know who is in your house. Honeywell Evohome is an intelligent heating system with ‘Smart Zoning’ that allows for room by room temperature control.. Philips HUE connected bulbs and bridge let you to take full control of your lighting. Wi-Fi Smart Plug allows you to turn your devices on or off, wherever you are 54
  • 55. Integrate services of multiple vendor  Services are the apps and devices we use every day  IFTTT Applets bring our services together to create new experiences 55
  • 56. Vehicle-to-Everything (V2X) 56  V2X, is a wireless technologies aimed at increasing road safety and improve traffic management, introducing a new concept of intelligent transport system (ITS), capable to reduce environmental impact.
  • 57. More Smarts, More Risk  If every IoT device has some sort of operating system and memory, it becomes a potential subject for hacking or inadvertent misconfiguration. 57
  • 58. 2014: Receive an email from a Fridge ???  100,000 devices used to take part in the spam campaign.  The attack is believed to be one of the first to exploit the lax security on devices that are part of the "internet of things". 58
  • 59. 2015: Be aware of your PRIVACY 59
  • 60. 2016: Mirai Botnet: IoT DDoS attack  Bringed down sites/services including Twitter, Paypal, Netflix, CNN… and many others in Europe and the US.  Orchestrated using the Mirai botnet, a network of devices infected with self-propagating malware  Estimated 100,000 malicious endpoints: mainly IoT Devices! 60
  • 61. 2018: Using a thermometer to hack... 61
  • 62. Discover Insecure IoT Devises  Using Shodan to Find Devices Exposed on the Internet  Shodan is of particular use for security research around the Internet of Things, since there will soon be billions of devices online that: – have specific vulnerabilities that need to be fixed http://www.shodan.io 62
  • 63. Hacked also U.S. Public Utility…. 63
  • 64. 1. IoT: very huge market and interest 2. Technology: there isn’t a unique solution 3. IoT Challanges: Must be addressed IoT Introduction Key Messages 64