SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Internet ofThings
(IoT)
Done By: Saleh Alrkiyan
eng.alrkiyan@gmail.com
https://linkedin.com/in/salrkiyan
1
Internet ofThings
The next wave in the era of computing will be outside the realm of the
traditional desktop. In the Internet of Things (IoT), many of the objects that
surround us will be on the network in one form or another. Radio Frequency
Identification (RFID) and sensor network technologies will rise to meet this
new challenge, in which information and communication systems are
invisibly embedded in the environment around us.
2
3
WhyWe need IoT?
■ Transport Systems
– Traffic lights, Gas stations
■ Industrial Applications
– Investigate the quality of product
■ Medical and Healthcare Systems
– Improve patient state better
■ Building and Home Automation
– Air condition , Security lock lightening,Telephone System
4
IoT Elements
a) Hardware - made up of sensors, actuators and embedded communication hardware.
b) Middleware - on demand storage and computing tools for data analytics.
c) Presentation - novel easy to understand visualization and interpretation tools which
can be widely accessed on different platforms and which can be designed for different
applications.
5
Radio Frequency Identification (RFID)
RFID technology is a major breakthrough in the embedded communication paradigm
which enables design of microchips for wireless data communication.They help in
automatic identification of anything they are attached to acting as an electronic barcode.
The passive RFID tags are not battery powered and they use the power of the reader‘s
interrogation signal to communicate the ID to the RFID reader.
6
Wireless Sensor Networks (WSN)
Is a collection of sensors that are used in the transfer or follow a specific physical
phenomenon (such as temperature, humidity, vibration, light, etc ...) and then transfer the
information on the phenomenon wirelessly to the center of data processing for use
without the need for the presence of human in the place of the phenomenon physical.
7
Addressing schemes
■ The ability to uniquely identify “Things” is critical for the success of IoT.This will not
only allow us to uniquely identify billions of devices but also to control remote devices
through the Internet.The few most critical features of creating a unique address are:
uniqueness, reliability, persistence and scalability.
■ Every element that is already connected and those that are going to be connected,
must be identified by their unique identification, location and functionalities.
8
Data storage and analytics
■ One of the most important outcomes of this emerging field is the creation of an
unprecedented amount of data. Storage, ownership and expiry of the data become
critical issues.
■ The internet consumes up to 5% of the total energy generated today and with these
types of demands, it is sure to go up even further.
■ The data have to be stored and used intelligently for smart monitoring and actuation.
9
Applications of IoT
 Personal and Home.
 Enterprise.
 Utilities.
 Mobile.
10
Personal and Home
■ The sensor information collected is used only by the individuals who directly own the
network. UsuallyWi-Fi is used as the backbone enabling higher bandwidth data (video)
transfer as well as higher sampling rates (Sound).
■ Ubiquitous healthcare has been envisioned for the past two decades. IoT gives a
perfect platform to realize this vision using body area sensors and IoT backend to
upload the data to servers.
11
12
Enterprise
■ We refer to the "Network ofThings” within a work environment as an enterprise based
application. Information collected from such networks are used only by the owners
and the data may be released selectively. Environmental monitoring is the first
common application which is implemented to keep a track of the number of occupants
and manage the utilities within the building (e.g., HVAC, lighting).
13
Utilities
■ It is already being used by utility companies (smart meter by electricity supply
companies) for resource management in order to optimise cost vs. profit.
■ These are made up of very extensive networks (usually laid out by large organisation
on regional and national scale) for monitoring critical utilities and efficient resource
management.
■ The backbone network used can vary between cellular,WiFi and satellite
communication.
14
Mobile
■ Smart transportation and smart logistics are placed in a separate domain due to the
nature of data sharing and backbone implementation required. Urban traffic is the
main contributor to traffic noise pollution and a major contributor to urban air quality
degradation and greenhouse gas emissions.
■ Important application in mobile IoT domain is efficient logistics management.This
includes monitoring the items being transported as well as efficient transportation
planning.The monitoring of items is carried out more locally, say, within a truck
replicating enterprise domain but transport planning is carried out using a large scale
IoT network.
15
Architecture of IoT
■ Overall architecture followed at the initial stages of IoT research will have a severe
bearing on the field itself and needs to be investigated. Most of the work relating to
IoT architecture has been from the wireless sensor networks perspective.
16
Secure reprogrammable networks and
Privacy
■ Security will be a major concern wherever networks are deployed at large scale.There
can be many ways the system could be attacked - disabling the network availability;
pushing erroneous data into the network; accessing personal information; etc.
■ The three physical components of IoT - RFID,WSN and cloud are vulnerable to such
attacks.
■ Against outsider attackers, encryption ensures data confidentiality, whereas message
authentication codes ensure data integrity and authenticity.
17
New protocols
■ The protocols at the sensing end of IoT will play a key role in complete realisation.
■ They form the backbone for the data tunnel between sensors and the outer world. For
the system to work efficiently, and energy efficient MAC protocol and appropriate
routing protocol are critical.
■ An individual sensor can drop out for a number of reasons, so the network must be
self-adapting and allow for multi-path routing. Multi-hop routing protocols are used in
mobile ad hoc networks and terrestrial WSNs.
18
Conclusion
The proliferation of devices with communicating actuating capabilities is bringing closer
the vision of an Internet ofThings, where the sensing and actuation functions seamlessly
blend into the background and new capabilities are made possible through access of rich
new information sources.
19
20

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learningPrivacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learning
Arindam Banerjee
 

Was ist angesagt? (20)

Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Energy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsEnergy Efficiency in Internet of Things
Energy Efficiency in Internet of Things
 
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentationAccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
AccML, co-located with HiPEAC 2021_Pedro Trancoso presentation
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
INDUSTRIAL INTERNET OF THINGS
INDUSTRIAL INTERNET OF THINGSINDUSTRIAL INTERNET OF THINGS
INDUSTRIAL INTERNET OF THINGS
 
IOT
IOTIOT
IOT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Internet of Things (Indoor Localization and iBeacons)
Internet of Things (Indoor Localization and iBeacons)Internet of Things (Indoor Localization and iBeacons)
Internet of Things (Indoor Localization and iBeacons)
 
Internet of things a survey on enabling technologies, protocols and applicat...
Internet of things  a survey on enabling technologies, protocols and applicat...Internet of things  a survey on enabling technologies, protocols and applicat...
Internet of things a survey on enabling technologies, protocols and applicat...
 
Internet of Things and i's Applications
Internet of Things and i's ApplicationsInternet of Things and i's Applications
Internet of Things and i's Applications
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT) Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
Privacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learningPrivacy aware analytics at edge using federated learning
Privacy aware analytics at edge using federated learning
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Missing Link to iOT Computing: Rain RFID
Missing Link to iOT Computing: Rain RFIDMissing Link to iOT Computing: Rain RFID
Missing Link to iOT Computing: Rain RFID
 
Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 

Andere mochten auch

20141216 멜팅팟 부산 세션 i - microsoft 사물인터넷
20141216 멜팅팟 부산   세션 i - microsoft 사물인터넷20141216 멜팅팟 부산   세션 i - microsoft 사물인터넷
20141216 멜팅팟 부산 세션 i - microsoft 사물인터넷
영욱 김
 
Project presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detectorProject presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detector
PETER ASIGRI
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

Andere mochten auch (13)

20141216 멜팅팟 부산 세션 i - microsoft 사물인터넷
20141216 멜팅팟 부산   세션 i - microsoft 사물인터넷20141216 멜팅팟 부산   세션 i - microsoft 사물인터넷
20141216 멜팅팟 부산 세션 i - microsoft 사물인터넷
 
MOBILE MONITORNG SYSTEM FOR SMART HOMES
MOBILE  MONITORNG  SYSTEM FOR SMART HOMES MOBILE  MONITORNG  SYSTEM FOR SMART HOMES
MOBILE MONITORNG SYSTEM FOR SMART HOMES
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...innovative railway track surveying with sensors and controlled by wireless co...
innovative railway track surveying with sensors and controlled by wireless co...
 
Project presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detectorProject presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detector
 
Ppt
PptPpt
Ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Ähnlich wie Internet of Things

TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
Kimmiegrif
 

Ähnlich wie Internet of Things (20)

Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Iot Report
Iot ReportIot Report
Iot Report
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdfHOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Chapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptxChapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptx
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...IRJET-The Internet of Things Applications for Challenges and Related Future T...
IRJET-The Internet of Things Applications for Challenges and Related Future T...
 
Chapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).pptChapter -4- Internet of Things (IoT).ppt
Chapter -4- Internet of Things (IoT).ppt
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
TheInternetofThings
TheInternetofThingsTheInternetofThings
TheInternetofThings
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Kürzlich hochgeladen

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Kürzlich hochgeladen (20)

Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 

Internet of Things

  • 1. Internet ofThings (IoT) Done By: Saleh Alrkiyan eng.alrkiyan@gmail.com https://linkedin.com/in/salrkiyan 1
  • 2. Internet ofThings The next wave in the era of computing will be outside the realm of the traditional desktop. In the Internet of Things (IoT), many of the objects that surround us will be on the network in one form or another. Radio Frequency Identification (RFID) and sensor network technologies will rise to meet this new challenge, in which information and communication systems are invisibly embedded in the environment around us. 2
  • 3. 3
  • 4. WhyWe need IoT? ■ Transport Systems – Traffic lights, Gas stations ■ Industrial Applications – Investigate the quality of product ■ Medical and Healthcare Systems – Improve patient state better ■ Building and Home Automation – Air condition , Security lock lightening,Telephone System 4
  • 5. IoT Elements a) Hardware - made up of sensors, actuators and embedded communication hardware. b) Middleware - on demand storage and computing tools for data analytics. c) Presentation - novel easy to understand visualization and interpretation tools which can be widely accessed on different platforms and which can be designed for different applications. 5
  • 6. Radio Frequency Identification (RFID) RFID technology is a major breakthrough in the embedded communication paradigm which enables design of microchips for wireless data communication.They help in automatic identification of anything they are attached to acting as an electronic barcode. The passive RFID tags are not battery powered and they use the power of the reader‘s interrogation signal to communicate the ID to the RFID reader. 6
  • 7. Wireless Sensor Networks (WSN) Is a collection of sensors that are used in the transfer or follow a specific physical phenomenon (such as temperature, humidity, vibration, light, etc ...) and then transfer the information on the phenomenon wirelessly to the center of data processing for use without the need for the presence of human in the place of the phenomenon physical. 7
  • 8. Addressing schemes ■ The ability to uniquely identify “Things” is critical for the success of IoT.This will not only allow us to uniquely identify billions of devices but also to control remote devices through the Internet.The few most critical features of creating a unique address are: uniqueness, reliability, persistence and scalability. ■ Every element that is already connected and those that are going to be connected, must be identified by their unique identification, location and functionalities. 8
  • 9. Data storage and analytics ■ One of the most important outcomes of this emerging field is the creation of an unprecedented amount of data. Storage, ownership and expiry of the data become critical issues. ■ The internet consumes up to 5% of the total energy generated today and with these types of demands, it is sure to go up even further. ■ The data have to be stored and used intelligently for smart monitoring and actuation. 9
  • 10. Applications of IoT  Personal and Home.  Enterprise.  Utilities.  Mobile. 10
  • 11. Personal and Home ■ The sensor information collected is used only by the individuals who directly own the network. UsuallyWi-Fi is used as the backbone enabling higher bandwidth data (video) transfer as well as higher sampling rates (Sound). ■ Ubiquitous healthcare has been envisioned for the past two decades. IoT gives a perfect platform to realize this vision using body area sensors and IoT backend to upload the data to servers. 11
  • 12. 12
  • 13. Enterprise ■ We refer to the "Network ofThings” within a work environment as an enterprise based application. Information collected from such networks are used only by the owners and the data may be released selectively. Environmental monitoring is the first common application which is implemented to keep a track of the number of occupants and manage the utilities within the building (e.g., HVAC, lighting). 13
  • 14. Utilities ■ It is already being used by utility companies (smart meter by electricity supply companies) for resource management in order to optimise cost vs. profit. ■ These are made up of very extensive networks (usually laid out by large organisation on regional and national scale) for monitoring critical utilities and efficient resource management. ■ The backbone network used can vary between cellular,WiFi and satellite communication. 14
  • 15. Mobile ■ Smart transportation and smart logistics are placed in a separate domain due to the nature of data sharing and backbone implementation required. Urban traffic is the main contributor to traffic noise pollution and a major contributor to urban air quality degradation and greenhouse gas emissions. ■ Important application in mobile IoT domain is efficient logistics management.This includes monitoring the items being transported as well as efficient transportation planning.The monitoring of items is carried out more locally, say, within a truck replicating enterprise domain but transport planning is carried out using a large scale IoT network. 15
  • 16. Architecture of IoT ■ Overall architecture followed at the initial stages of IoT research will have a severe bearing on the field itself and needs to be investigated. Most of the work relating to IoT architecture has been from the wireless sensor networks perspective. 16
  • 17. Secure reprogrammable networks and Privacy ■ Security will be a major concern wherever networks are deployed at large scale.There can be many ways the system could be attacked - disabling the network availability; pushing erroneous data into the network; accessing personal information; etc. ■ The three physical components of IoT - RFID,WSN and cloud are vulnerable to such attacks. ■ Against outsider attackers, encryption ensures data confidentiality, whereas message authentication codes ensure data integrity and authenticity. 17
  • 18. New protocols ■ The protocols at the sensing end of IoT will play a key role in complete realisation. ■ They form the backbone for the data tunnel between sensors and the outer world. For the system to work efficiently, and energy efficient MAC protocol and appropriate routing protocol are critical. ■ An individual sensor can drop out for a number of reasons, so the network must be self-adapting and allow for multi-path routing. Multi-hop routing protocols are used in mobile ad hoc networks and terrestrial WSNs. 18
  • 19. Conclusion The proliferation of devices with communicating actuating capabilities is bringing closer the vision of an Internet ofThings, where the sensing and actuation functions seamlessly blend into the background and new capabilities are made possible through access of rich new information sources. 19
  • 20. 20

Hinweis der Redaktion

  1. The current IPv4 may support to an extent where a group of cohabiting sensor devices can be identified geographically, but not individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device identification problems; however, the heterogeneous nature of wireless nodes, variable data types, concurrent operations and confluence of data from devices exacerbates the problem further
  2. It is important to develop artificial intelligence algorithms which could be centralized or distributed based on the need.
  3. The information from the networks in this application domain are usually for service optimisation rather than consumer consumption.
  4. We are referring architecture to overall IoT where the user is at the center and will enable the use of data and infrastructure to develop new applications.
  5. Encryption, however, does not protect against insider malicious attacks, to address which non-cryptographic means are needed, particularly in WSNs. Also, periodically, new sensor applications need to be installed, or existing ones need to be updated. This is done by remote wireless reprogramming of all nodes in the network.
  6. The evolution of the next generation mobile system will depend on the creativity of the users in designing new applications. IoT is an ideal emerging technology to influence this domain by providing new evolving data and the required computational resources for creating revolutionary apps.