How to Troubleshoot Apps for the Modern Connected Worker
Internet of things(iot)
1. INTERNET OF THINGS
Department of Computer Science and Engineering
Guru Nanak Dev University Regional Campus
Gurdaspur
1
2. INTRODUCTION
The Internet of Things involves the technology in which things around us
communicate each other through network. Chips and sensors that identify
things and also enable them to communicate each other.
The concept of IoT basically connecting any device with an on and off switch
to the Internet .
The IoT creates an intelligent, invisible network fabric that can be sensed,
controlled and programmed.
In “Internet of Things” a “thing” could be
Real/physical Entity
Digital/virtual Entity
that exists and move in space and time and is capable of being identified.
2
3. How the things identified ?
Things are commonly identified either by assigned
Identification numbers
Names
Location addresses
“Internet of Things” to refer to the general idea of things, especially everyday
objects that are
Readable
Recognizable,
Locatable
Addressable
Controllable
via the Internet.
3
4. Connected Devices to Internet Increases
In 2010, the number of everyday physical objects and devices connected to the
Internet was around 12.5 billion. Cisco forecasts that this figure is expected to
double to 25 billion in 2015 as the number of more smart devices per person
increases, and to a further 50 billion by 2020.
4
7. SENSOR LAYER
Sensor Layer
Its lowest layer is made up of smart objects integrated with sensors.
The sensors enable the interconnection of the physical and digital worlds
allowing real-time information to be collected and processed.
The sensors have the capacity to take measurements such as temperature, air
quality, movement and electricity.
Sensor can measure the physical property and convert it into signal that can
be understood by an instrument.
Types of Sensor:
•Environmental sensors
•Body sensors
•Home appliance sensors
7
8. GATEWAYS & NETWORK LAYER
Gateways and Network Layer
Gateway is the network point that act as an entrance for another networks.
Massive volume of data will be produced by these tiny sensors .
This requires a robust and high performance wired or wireless network
infrastructure as a transport medium.
Current networks tied with very different protocols, have been used to
support machine-to-machine (M2M) networks and their applications.
These networks can be in the form of a
• Private
•Public or hybrid models
that are built to support the communication requirements for latency,
bandwidth or security.
8
9. MANAGEMENT SERVICE LAYER
Management Service Layer
This layer manages the data and maintain the data security .
Data management is the ability to manage data information flow.
With data management in this layer, information can be accessed, integrated
and controlled.
The important features of this layer is the business and process rule engines.
This layer renders the processing of information possible through
•Analytics
•Security controls
•Process modeling
•Management of devices
9
10. APPLICATION LAYER
Application Layer:
There are various applications from various sectors that can leverage on IoT.
Environment
Transportation
Energy
Healthcare
Retail
Fleet Management
Asset Management
Supply Chain
People Tracking
Surveillance
10
12. SMART CITIES
Smart Parking Monitoring of parking spaces availability in the city.
Structural health Monitoring of vibrations and material conditions in buildings,
bridges and historical monuments.
Smartphone Detection Detect iPhone and Android devices and in general any
device which works with WiFi or Bluetooth interfaces.
Traffic Congestion Monitoring of vehicles and pedestrian levels to optimize
driving and walking routes.
Smart Lighting Intelligent and weather adaptive lighting in street lights.
Waste Management Detection of rubbish levels in containers to optimize the
trash collection routes.
Smart Roads Intelligent Highways with warning messages and diversions
according to climate conditions and unexpected events like accidents or traffic
jams.
12
14. SMART ENVIRONMENT
Forest Fire Detection Monitoring of combustion gases and preemptive fire
conditions to define alert zones.
Air Pollution Control of CO2 emissions of factories, pollution emitted by cars
and toxic gases generated in farms.
Snow Level Monitoring Snow level measurement to know in real time the
quality of ski tracks and allow security corps avalanche prevention.
Landslide Prevention Monitoring of soil moisture, vibrations and earth
density to detect dangerous patterns in land conditions.
Earthquake Early Detection Distributed control in specific places of tremors.
14
16. SMART INDUSTRIES
M2M Applications Machine auto-diagnosis and assets control.
Indoor Air Quality Monitoring of toxic gas and oxygen levels inside chemical
plants to ensure workers and goods safety.
Temperature Monitoring Control of temperature inside industrial and medical
fridges with sensitive merchandise.
Ozone Presence Monitoring of ozone levels during the drying meat process in
food factories.
Vehicle Auto-diagnosis Information collection from Can Bus to send real time
alarms to emergencies or provide advice to drivers.
16
18. SMART HEALTH
Medical Fridges Control of conditions inside freezers storing vaccines ,
medicines and organic elements.
Continuous patient monitoring It requires the use of medical body sensors to
monitor vital body conditions such as heartbeat, temperature and sugar levels.
Smart Pills They can be used to confirm that a patient has taken his or her
prescribed medication, and can measure the effects of the medication.
Elderly Family Member Monitoring It creates the freedom for the elderly to
move around safely outdoors.
Ultraviolet Radiation Measurement of UV sun rays to warn people not to be
exposed in certain hours.
18
21. Challenges and Future Trends
•Security:
In the domain of security the challenges are:
(a)securing the architecture of IoT– security to be ensured at design time and
execution time.
(b) proactive identification and protection of IoT from arbitrary attacks and
‘abuse .
(c) proactive identification and protection of IoT from malicious software.
•Privacy:
In the domain of user privacy, the specific challenges are:
(a) control over personal information (data privacy) and control over
individual’s physical location and movement(location privacy).
(b) need for privacy enhancement technologies and relevant protection laws.
(c) standards, methodologies and tools for identity management of users and
objects.
21
22. Challenges and Future Trends
Trust:
In the domain of trust, some of the specific challenges are:
(a) Need for easy and natural exchange of critical, protected and sensitive
data—e.g. smart objects will communicate on behalf of users / organizations
with services they can trust.
(b) trust has to be a part of the design of IoT and must be built in.
Network Foundation:
Imitations of the current Internet architecture in terms of mobility, availability,
manageability and scalability are some of the major barriers to IoT.
Managing heterogeneity:
Managing heterogeneous applications, environments and devices constitute a
major challenge.
22
23. CONCLUSION
When we look at today’s state of the art technologies, we get a clear indication
of how the IoT will be implemented on a universal level in the coming years.
We have large number of challenges to implement IoT applications at large
scale.
In the next few years, addressing these challenges will be a powerful driving
force for networking and communication research in all fields.
23