SlideShare a Scribd company logo
1 of 59
CONNECT IS A SCIENCE FOUNDATION IRELAND
RESEARCH CENTRE
ONE STOP SHOP FOR NETWORKS &
COMMUNICATIONS
10 institutions, 200 researchers, 35 Companies
Unit 16
Pervasive Nation
Headquarters
HQ TEAM:
D. Christie
B. Murphy
M. Guerin
T. Farrell
D. McDonald
T. Forde
F. Smyth
INTERNET of THINGS
MAKING MEANING FROM AN INSTRUMENTED WORLD
YOU NEED TO INSTRUMENT THE WORLD TO EXTRACT DATA
YOU NEED THE DATA, TO MAKE MEANING
YOU NEED TO MAKE MEANING TO MAKE MONEYMAKE MONEY
EFFECT CHANGE
THE WORLD IS INSTRUMENTED BY
EMBEDDING SENSORS IN THE BUILT
& NATURAL ENVIRONMENT AND
CONNECTING THOSE SENSORS TO A
NETWORK.
BUT THERE THERE ARE LOADS OF
DIFFERENT NETWORKS THAT CAN BE
USED. TODAY IS ABOUT ONE
NETWORK OPTION.
ONE IMPACTFUL OPTION.
In 2017, teams will
search through more
that 20 wireless
connectivity choices and
protocols to support a
company’s diverse set of
IoT devices (Forrester)
Source: Qualcomm
MASSIVE
INTERNET OF
THINGS
OUR FOCUS
Small messages
Low Power
Long battery life
Awkward spots
Low cost points
=> LowPowerWideAreaNetwork
Massive IoT =>
LOADS OF LPWAN OPPORTUNITIES
https://www.i-scoop.eu/internet-of-things-guide/iot-spending-2020/wireless-iot-lpwan-forecasts-predictions-2017/
The total number of IoT
devices connected over
LPWANs will reach 700
million by 2021
(Business Insider)
The LPWAN services
market will reach $75
Billion by 2025 (ON
World)
MarketsanMarkets
predicts the global Low
Power Wide Area
Network market to grow
to USD 24.46 Billion by
2021
An LPWA network for IoT & an Ecosystem
The network bit ...
A national scale infrastructure that allows all stakeholders
in the IoT LPWA market and user base, to engage, learn,
interact, innovate, speculate, explore, test-at-scale, make
mistakes, evolve, find business models, and prepare at
home for global markets.
A bit more about the network
PN is an LPWAN network based on the LoRa
standard.
LORA
SIGFOX
-----
------
--
NB-IOT
MANY FLAVOURS OF LOW POWERED WIDE AREA NETWORKS – ALL WITH
DIFFERENT PROS AND CONS – PN USES LORA
SOME LORA FEATURES
Data rate = 290bps to Kbps
Payload = 51- 222 bytes
Encryption = AES128
Modulation = SS Chirp
RX bandwidth = 500-125 KHz
Link budget = 145 dB
Frequency of operation = ISM band
Interference Immunity = very high
Localization = yes
✖
✔
THE CELLULAR NETWORK
HUMAN
PHONE
BASESTATION
THE LORA NETWORK
THING
EMBEDDED SENSORS / LORA RADIO
GATEWAY
KERLINK
MULTITECH
CISCO
LORA
PERMISSIONLESS
ANY ONE CAN BUILD A NETWORK
CURRENT PN
COVERAGE
THE LORA NETWORK
THING
EMBEDDED SENSORS / LORA RADIO
GATEWAY
KERLINK
MULTITECH
CISCO
WHAT HAPPENS AFTER THE DATA HITS THE GATEWAYS?
DATA
DATA
FORWARDED, PROCESSED & STORED
The intelligence and
complexity is in the network
SERVER, which manages the
network and will filter
redundant received packets,
perform security checks,
schedule acknowledgments
through the optimal
gateway, and perform
adaptive data rate, etc.
The Application Enabling
Platform makes sense of
the data - i.e. it decodes
the data.
It contains all the hooks
which are needed to
build applications.
It also allows us to
manage all the end
devices.
davra networks
Each gateway will
forward the
received packet
from the end-node
to the cloud-based
network server via
some backhaul
(either cellular,
Ethernet, satellite,
or Wi-Fi).
CLOUD
THE NETWORK SERVER AND THE APPLICATION
ENABLING PLATFORM ARE HOSTED IN WITs
DATACENTRE
YOUR DATA CAN BE STORED ANYWHERE YOU WISH
MAIN MESSAGE - THERE IS A PROFESSIONAL
RELIABLE BACKEND THAT CAN SUPPORT LARGE
SCALE OPERATION
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
An LPWA network for IoT & an Ecosystem
The ecosystem bit ...
CONNECT
+ 130 COMPANIES
+ OTHER SFI CENTRES
+ AGENCIES
++++
ACTUATE
PERVASIVE NATION THE NETWORK
PERVASIVE NATION THE ECOSYSTEM
RESPOND
MAKE
MEANING
BUSINESSMODELS
PLAYING OUR PART IN OTHER
ECOSYSTEMS…
SMART DUBLIN
DOCKLANDS SMART DISTRICT LED
BY DUBLIN CITY COUNCIL
INTERNATIONAL LINKS
ALLIANCE
CONNECT HAS LARGE NUMBERS OF INTERNATIONAL COLLABORATIONS
WAYS TO USE
PERVASIVE
NATION
1. Use PN to gather data of interest from sources
of interest
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
TYPES OF QUESTIONS YOU MIGHT HAVE
 Does the idea work in general? / Does the idea work on LoRa?
 How accurate are these sensors?
 What density do I need?
 Can the sensors in the basement connect? (i.e. propagation issues)
 Is there interference from other sources?
 How often do I need to take readings?
 How difficult is the reality of installation?
 Are there opex issues?
 How cheaply can I do this?
 How easy is it to access my data?
 How secure is this?
 Am I collecting the right kind of data to make the meaning I need?
 Would this be a service someone would pay for?
EXAMPLE OF THE
RANGE OF SENSORS
ON OFFER.
PN TEAM HAS LOTS OF
EXPERIENCE WITH
DIFFERENT TYPES
1. Stuff that can be sensed
using off-the-shelf low cost
sensors
1.Register your devices on PN
2.Use & collect your data
DEMO LATER WILL SHOW HOW
2. Stuff that needs more
expensive bulky sensors,
not yet ready for large
volumes
1.Register your devices on PN
2.Use & collect your data
WHILE YOU
3. Carry out further research to
reduce size and cost via CONNECT or
other sources
3. Stuff you want to sense,
for which no sensors exist
1. Carry out fundamental research
with for example Tyndall@CONNECT
OPTIONS FOR SENSORS
2. Bring your own network (BYON) to PN
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
TYPES OF QUESTIONS YOU MIGHT HAVE
 How does the PN backend enable my work?
 What restrictions, if any, exist?
 Are my gateways up to the task – how do they compare with
the ones in use in PN?
 How does different backhaul scenarios effect the situation?
 What kind of new business models can I build in this context?
 Does this offer me a different kind of security?
 Are there other things I can do at the edge?
NETWORK OF NETWORKS
3. Bring your own backend (BYOB) to PN
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
PACKET
FORWARDER
PACKET
FORWARDER
PACKET
FORWARDER
PRIVATE DOMAIN
TYPES OF QUESTIONS YOU MIGHT HAVE
 The questions you have here could, for example, be
about other protocols outside of the LoRaWAN
framework. They will tend to be of internal
relevance to your organisation.
 This approach essentially cuts down on your need
to build infrastructure. You reuse infrastructure that
already exists.
4. Develop next generation gateways on PN
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
NEXT
GENERATION
GATEWAY
Testbed @ CTVR - TCDSoftware Radio
@ CONNECT
Trinity College Dublin
INTERESTING ARTICLE BY MARCUS KIRSCH https://www.linkedin.com/pulse/lora-phone-deconstruction-paradigm-marcus-
kirsch/?published=t
5. Use PN to develop new backend solutions
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
STAGING PRODUCTION
NEXT GEN NEXT GEN
6. Use PN to explore backhaul options
GATEWAY
SENSORS /
DEVICES
NETWORK
SERVER
DATA
WIT DATA CENTRE
Other
Third-
Party
Open
Source
davra networks
Other
Third-
Party
Custom
In-house
APPLICATION
ENABLING
PLATFORM
BACKHAUL
USING PN
STRATEGICALLY
USING PN as part of a research proposal
 Many research proposals call for testbeds –e.g.
large EU proposals, small SBIR proposals etc.
 We are happy that PN be included in any proposal
 Proposal needs to cover access charges
https://connectcentre.ie/wp-content/uploads/2017/05/Pervasive-Nation-Access-
Charges_April2017.pdf
 Can furnish any other details needed.
PARTING
COMMENTS
ACTUATE
PERVASIVE NATION THE NETWORK
PERVASIVE NATION THE ECOSYSTEM
RESPOND
MAKE
MEANING
BUSINESSMODELS
1
2 3

More Related Content

What's hot

MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation. MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation. MetaGeek
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderRemmy Nweke, mNGE, mNUJ, mGOCOP
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2Tori Small
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2erowell
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshowchairesj
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linuxtmavroidis
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymitylokijaja
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filtersbhasker nalaveli
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermMark John Lado, MIT
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other PowerpoinntmBlackwell
 
The internet homework
The internet homeworkThe internet homework
The internet homeworkkta2701
 

What's hot (20)

MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation. MetaGeek Chanalyzer & inSSIDer Product Explanation.
MetaGeek Chanalyzer & inSSIDer Product Explanation.
 
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defenderUsing a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
Using a VPN or and TOR by remmy nweke, fellow, cyber security policy defender
 
Electronic Communications 2
Electronic Communications 2Electronic Communications 2
Electronic Communications 2
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
Nad710 Introduction To Networks Using Linux
Nad710   Introduction To Networks Using LinuxNad710   Introduction To Networks Using Linux
Nad710 Introduction To Networks Using Linux
 
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable AnonymityThe Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
The Phantom Protocol: Generic, Decentralized, Unstoppable Anonymity
 
BasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet FiltersBasepaperControlling IP Spoofing through Interdomain Packet Filters
BasepaperControlling IP Spoofing through Interdomain Packet Filters
 
IT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for MidtermIT infrastructure and Network technologies for Midterm
IT infrastructure and Network technologies for Midterm
 
Skypepresentation
SkypepresentationSkypepresentation
Skypepresentation
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Ijecet 06 09_008
Ijecet 06 09_008Ijecet 06 09_008
Ijecet 06 09_008
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
slideshow 2
slideshow 2slideshow 2
slideshow 2
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
The internet homework
The internet homeworkThe internet homework
The internet homework
 

Similar to Pervasive nation

Network Project Report
Network Project ReportNetwork Project Report
Network Project ReportTiffany Graham
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDSMichael Boman
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docxPhilip Martin
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityAPNIC
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systemsgigamon
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxSazidHossain9
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appliTheon Jum
 
DNS Data Exfiltration Detection
DNS Data Exfiltration DetectionDNS Data Exfiltration Detection
DNS Data Exfiltration DetectionIRJET Journal
 

Similar to Pervasive nation (20)

Network Project Report
Network Project ReportNetwork Project Report
Network Project Report
 
Modules1
Modules1Modules1
Modules1
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
Network_System_Admin.docx
Network_System_Admin.docxNetwork_System_Admin.docx
Network_System_Admin.docx
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Computer 3
Computer 3Computer 3
Computer 3
 
Firewall
FirewallFirewall
Firewall
 
Network Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptxNetwork Fundamental for Malware Analysis.pptx
Network Fundamental for Malware Analysis.pptx
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Report on intranet
Report on intranetReport on intranet
Report on intranet
 
Introduction internet appli
Introduction internet appliIntroduction internet appli
Introduction internet appli
 
DNS Data Exfiltration Detection
DNS Data Exfiltration DetectionDNS Data Exfiltration Detection
DNS Data Exfiltration Detection
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Pervasive nation

  • 1.
  • 2. CONNECT IS A SCIENCE FOUNDATION IRELAND RESEARCH CENTRE ONE STOP SHOP FOR NETWORKS & COMMUNICATIONS 10 institutions, 200 researchers, 35 Companies
  • 3. Unit 16 Pervasive Nation Headquarters HQ TEAM: D. Christie B. Murphy M. Guerin T. Farrell D. McDonald T. Forde F. Smyth
  • 4. INTERNET of THINGS MAKING MEANING FROM AN INSTRUMENTED WORLD
  • 5. YOU NEED TO INSTRUMENT THE WORLD TO EXTRACT DATA YOU NEED THE DATA, TO MAKE MEANING YOU NEED TO MAKE MEANING TO MAKE MONEYMAKE MONEY EFFECT CHANGE
  • 6. THE WORLD IS INSTRUMENTED BY EMBEDDING SENSORS IN THE BUILT & NATURAL ENVIRONMENT AND CONNECTING THOSE SENSORS TO A NETWORK. BUT THERE THERE ARE LOADS OF DIFFERENT NETWORKS THAT CAN BE USED. TODAY IS ABOUT ONE NETWORK OPTION. ONE IMPACTFUL OPTION. In 2017, teams will search through more that 20 wireless connectivity choices and protocols to support a company’s diverse set of IoT devices (Forrester)
  • 8. Small messages Low Power Long battery life Awkward spots Low cost points => LowPowerWideAreaNetwork Massive IoT =>
  • 9. LOADS OF LPWAN OPPORTUNITIES https://www.i-scoop.eu/internet-of-things-guide/iot-spending-2020/wireless-iot-lpwan-forecasts-predictions-2017/ The total number of IoT devices connected over LPWANs will reach 700 million by 2021 (Business Insider) The LPWAN services market will reach $75 Billion by 2025 (ON World) MarketsanMarkets predicts the global Low Power Wide Area Network market to grow to USD 24.46 Billion by 2021
  • 10. An LPWA network for IoT & an Ecosystem
  • 11. The network bit ... A national scale infrastructure that allows all stakeholders in the IoT LPWA market and user base, to engage, learn, interact, innovate, speculate, explore, test-at-scale, make mistakes, evolve, find business models, and prepare at home for global markets.
  • 12. A bit more about the network PN is an LPWAN network based on the LoRa standard.
  • 13. LORA SIGFOX ----- ------ -- NB-IOT MANY FLAVOURS OF LOW POWERED WIDE AREA NETWORKS – ALL WITH DIFFERENT PROS AND CONS – PN USES LORA
  • 14. SOME LORA FEATURES Data rate = 290bps to Kbps Payload = 51- 222 bytes Encryption = AES128 Modulation = SS Chirp RX bandwidth = 500-125 KHz Link budget = 145 dB Frequency of operation = ISM band Interference Immunity = very high Localization = yes ✖ ✔
  • 16. THE LORA NETWORK THING EMBEDDED SENSORS / LORA RADIO GATEWAY KERLINK MULTITECH CISCO
  • 18.
  • 20.
  • 21. THE LORA NETWORK THING EMBEDDED SENSORS / LORA RADIO GATEWAY KERLINK MULTITECH CISCO
  • 22. WHAT HAPPENS AFTER THE DATA HITS THE GATEWAYS? DATA DATA FORWARDED, PROCESSED & STORED
  • 23. The intelligence and complexity is in the network SERVER, which manages the network and will filter redundant received packets, perform security checks, schedule acknowledgments through the optimal gateway, and perform adaptive data rate, etc. The Application Enabling Platform makes sense of the data - i.e. it decodes the data. It contains all the hooks which are needed to build applications. It also allows us to manage all the end devices. davra networks Each gateway will forward the received packet from the end-node to the cloud-based network server via some backhaul (either cellular, Ethernet, satellite, or Wi-Fi). CLOUD
  • 24. THE NETWORK SERVER AND THE APPLICATION ENABLING PLATFORM ARE HOSTED IN WITs DATACENTRE YOUR DATA CAN BE STORED ANYWHERE YOU WISH
  • 25. MAIN MESSAGE - THERE IS A PROFESSIONAL RELIABLE BACKEND THAT CAN SUPPORT LARGE SCALE OPERATION
  • 26. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL
  • 27. An LPWA network for IoT & an Ecosystem
  • 28. The ecosystem bit ... CONNECT + 130 COMPANIES + OTHER SFI CENTRES + AGENCIES ++++
  • 29. ACTUATE PERVASIVE NATION THE NETWORK PERVASIVE NATION THE ECOSYSTEM RESPOND MAKE MEANING BUSINESSMODELS
  • 30. PLAYING OUR PART IN OTHER ECOSYSTEMS… SMART DUBLIN DOCKLANDS SMART DISTRICT LED BY DUBLIN CITY COUNCIL
  • 31. INTERNATIONAL LINKS ALLIANCE CONNECT HAS LARGE NUMBERS OF INTERNATIONAL COLLABORATIONS
  • 33. 1. Use PN to gather data of interest from sources of interest
  • 34. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL
  • 35. TYPES OF QUESTIONS YOU MIGHT HAVE  Does the idea work in general? / Does the idea work on LoRa?  How accurate are these sensors?  What density do I need?  Can the sensors in the basement connect? (i.e. propagation issues)  Is there interference from other sources?  How often do I need to take readings?  How difficult is the reality of installation?  Are there opex issues?  How cheaply can I do this?  How easy is it to access my data?  How secure is this?  Am I collecting the right kind of data to make the meaning I need?  Would this be a service someone would pay for?
  • 36. EXAMPLE OF THE RANGE OF SENSORS ON OFFER. PN TEAM HAS LOTS OF EXPERIENCE WITH DIFFERENT TYPES
  • 37. 1. Stuff that can be sensed using off-the-shelf low cost sensors 1.Register your devices on PN 2.Use & collect your data DEMO LATER WILL SHOW HOW 2. Stuff that needs more expensive bulky sensors, not yet ready for large volumes 1.Register your devices on PN 2.Use & collect your data WHILE YOU 3. Carry out further research to reduce size and cost via CONNECT or other sources 3. Stuff you want to sense, for which no sensors exist 1. Carry out fundamental research with for example Tyndall@CONNECT OPTIONS FOR SENSORS
  • 38. 2. Bring your own network (BYON) to PN
  • 39. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL
  • 40.
  • 41. TYPES OF QUESTIONS YOU MIGHT HAVE  How does the PN backend enable my work?  What restrictions, if any, exist?  Are my gateways up to the task – how do they compare with the ones in use in PN?  How does different backhaul scenarios effect the situation?  What kind of new business models can I build in this context?  Does this offer me a different kind of security?  Are there other things I can do at the edge?
  • 43. 3. Bring your own backend (BYOB) to PN
  • 44. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL PACKET FORWARDER PACKET FORWARDER PACKET FORWARDER PRIVATE DOMAIN
  • 45. TYPES OF QUESTIONS YOU MIGHT HAVE  The questions you have here could, for example, be about other protocols outside of the LoRaWAN framework. They will tend to be of internal relevance to your organisation.  This approach essentially cuts down on your need to build infrastructure. You reuse infrastructure that already exists.
  • 46. 4. Develop next generation gateways on PN
  • 47. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL NEXT GENERATION GATEWAY
  • 48. Testbed @ CTVR - TCDSoftware Radio @ CONNECT Trinity College Dublin
  • 49. INTERESTING ARTICLE BY MARCUS KIRSCH https://www.linkedin.com/pulse/lora-phone-deconstruction-paradigm-marcus- kirsch/?published=t
  • 50. 5. Use PN to develop new backend solutions
  • 51. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL
  • 53. 6. Use PN to explore backhaul options
  • 54. GATEWAY SENSORS / DEVICES NETWORK SERVER DATA WIT DATA CENTRE Other Third- Party Open Source davra networks Other Third- Party Custom In-house APPLICATION ENABLING PLATFORM BACKHAUL
  • 55.
  • 57. USING PN as part of a research proposal  Many research proposals call for testbeds –e.g. large EU proposals, small SBIR proposals etc.  We are happy that PN be included in any proposal  Proposal needs to cover access charges https://connectcentre.ie/wp-content/uploads/2017/05/Pervasive-Nation-Access- Charges_April2017.pdf  Can furnish any other details needed.
  • 59. ACTUATE PERVASIVE NATION THE NETWORK PERVASIVE NATION THE ECOSYSTEM RESPOND MAKE MEANING BUSINESSMODELS 1 2 3

Editor's Notes

  1. HUGE AREA MEANS MANY THINGS TO MANY PEOPLE FOR US MAKING MEANING FROM AN INSTRUMENTED WORLD
  2. HUGE AREA MEANS MANY THINGS TO MANY PEOPLE FOR US MAKING MEANING FROM AN INSTRUMENTED WORLD
  3. And there fore we focus on LPWA No need to labour that with this audience as we are all here to talk about LPWA but thought it is worth flagging to you what got us to this point
  4. And there fore we focus on LPWA No need to labour that with this audience as we are all here to talk about LPWA but thought it is worth flagging to you what got us to this point
  5. We have a long history in software radio Hence we have created a software radio version of LoRa We use the USRP as a frontend …. Describe what the USRP is And we implement the LoRa functionality in software This allows us to better explore how it works and understand how things might advance in the future.
  6. And there fore we focus on LPWA No need to labour that with this audience as we are all here to talk about LPWA but thought it is worth flagging to you what got us to this point
  7. And there fore we focus on LPWA No need to labour that with this audience as we are all here to talk about LPWA but thought it is worth flagging to you what got us to this point