SlideShare a Scribd company logo
1 of 41
Prof. Ahmed Banafa
College of Engineering
San Jose State University
San Jose, CA , USA
 The Internet of Things (IoT) is the network of
physical objects—devices, vehicles, buildings and
other items which are embedded with electronics,
software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
 Implementing this concept is not an easy task by any
measure for many reasons including the complex
nature of the different components of the ecosystem
of IoT.
 To understand the gravity of this task, we will explain
all the five components of IoT Implementation…
 Sensors
 Networks
 Standards
 Intelligent Analysis
 Intelligent Actions
 According to (IEEE) sensors can be defined as: An
electronic device that produces electrical, optical, or
digital data derived from a physical condition or event.
 Data produced from sensors is then electronically
transformed, by another device, into information
(output) that is useful in decision making done by
“intelligent” devices or individuals (people).
Types of Sensors:
 Active Sensors
 Passive Sensors
The selection of sensors greatly impacted by many factors,
including:
 Purpose (Temperature, Motion, Bio…etc.)
 Accuracy
 Reliability
 Range
 Resolution
 Level of Intelligence (dealing with noise and
interference)
The driving forces for using sensors in IoT today are new
trends in technology that made sensors cheaper, smarter
and smaller.
Challenges facing IoT sensors:
 Power consumption
 Security
 Interoperability
 The second step of this implantation is to transmit the
signals collected by sensors over networks with all the
different components of a typical network including
routers, bridges in different topologies, including LAN,
MAN and WAN.
 Connecting the different parts of networks to the
sensors can be done by different technologies
including Wi-Fi, Bluetooth, Low Power Wi-Fi , Wi-Max,
regular Ethernet , Long Term Evolution (LTE) and the
recent promising technology of Li-Fi (using light as a
medium of communication between the different parts
of a typical network including senores)
The driving forces for wide spread network adoption in
IoT can be summarized as follows:
 High Data rate
 Low Prices of data usage
 Virtualization (X - Define Network trends )
 XaaS concept (SaaS, PaaS, and IaaS)
 IPv6 deployment
Challenges facing network implementation in IoT:
 The enormous growth in number of connected devices
 Availability of networks coverage
 Security
 Power consumption
 The third stage in the implementation process includes
the sum of all activities of handling, processing and
storing the data collected from the sensors.
 This aggregation increases the value of data by
increasing, the scale, scope, and frequency of data
available for analysis but aggregation only achieved
through the use of various standards depending on the
IoT application in used.
Types of Standards :
 Two types of standards relevant for the aggregation
process; technology standards (including network
protocols, communication protocols, and data-
aggregation standards) and regulatory standards
(related to security and privacy of data, among other
issues).
Technology Standards :
 Network Protocols (e.g.: Wi-Fi)
 Communications Protocols (e.g.: HTTP)
 Data aggregation standards (e.g.: Extraction,
Transformation, Loading (ETL))
Regulatory Standards
 Set and administrated by government agencies like
FTC, for example Fair Information Practice Principles
(FIPP) and US Health Insurance Portability and
Accountability Act (HIPAA) just to mention few.
Challenges facing the adoptions of standards within IoT
 Standard for handling unstructured data: Structured
data are stored in relational databases and queried
through SQL. Unstructured data are stored in different
types of noSQL databases without a standard querying
approach.
 Security and privacy issues: There is a need for clear
guidelines on the retention, use, and security of the
data as well as metadata (the data that describe other
data).
 Regulatory standards for data markets: Data brokers
are companies that sell data collected from various
sources. Even though data appear to be the currency of
the IoT, there is lack of transparency about, who gets
access to data and how those data are used to develop
products or services and sold to advertisers and third
parties.
 Technical skills to leverage newer aggregation tools:
Companies that are keen on leveraging big-data tools
often face a shortage of talent to plan, execute, and
maintain systems.
 The fourth stage in IoT implementation is extracting
insight from data for analysis, Analysis is driven by
cognitive technologies and the accompanying models
that facilitate the use of cognitive technologies.
 With advances in cognitive technologies’ ability to
process varied forms of information, vision and voice
have also become usable.
 On the next slide, list of selected cognitive
technologies that are experiencing increasing adoption
and can be deployed for predictive and prescriptive
analytics:
 Computer vision refers to computers’ ability to identify
objects, scenes, and activities in images
 Natural-language processing refers to computers’
ability to work with text the way humans do, extracting
meaning from text or even generating text that is
readable.
 Speech recognition focuses on accurately transcribing
human speech
Factors driving adoption intelligent analytics within the
IoT:
 Artificial intelligence models can be improved with
large data sets that are more readily avail- able than
ever before, thanks to the lower storage costs.
 Growth in crowdsourcing and open- source analytics
software: Cloud-based crowdsourcing services are
leading to new algorithms and improvements in
existing ones at an unprecedented rate.
 Real-time data processing and analysis: Analytics tools
such as complex event processing (CEP) enable
processing and analysis of data on a real-time or a
near-real-time basis, driving timely decision making
and action.
Challenges facing the adoptions of intelligent analytics
within IoT:
 Inaccurate analysis due to flaws in the data and/or
model: A lack of data or presence of outliers may lead
to false positives or false negatives, thus exposing
various algorithmic limitations
 Legacy systems’ ability to analyze unstructured data:
Legacy systems are well suited to handle structured
data; unfortunately, most IoT/business interactions
generate unstructured data
 Legacy systems’ ability to manage real- time data:
Traditional analytics software generally works on
batch-oriented processing, wherein all the data are
loaded in a batch and then analyzed
 The fifth stage deals with intelligent actions , Intelligent
actions can be expressed as M2M and M2H interfaces
for example with all the advancement in UI and UX
technologies.
Factors driving adoption of intelligent actions within the
IoT:
 Lower machine prices
 Improved machine functionality
 Machines “influencing” human actions through
behavioral-science rationale
 Deep Learning tools
Challenges facing the adoption of intelligent actions
within IoT:
 Machines’ actions in unpredictable situations
 Information security and privacy
 Machine interoperability
 Mean-reverting human behaviors
 Slow adoption of new technologies
 The Internet of Things (IoT) is an ecosystem of ever-
increasing complexity, it’s the next weave of innovation
that will humanize every object in our life, which is the
next level to automating every object in our life.
 Convergence of technologies will make IoT
implementation much easier and faster, which in turn
will improve many aspects of our life at home and at
work and in between.
IoT implementation and Challenges

More Related Content

What's hot

Iot ppt
Iot pptIot ppt
Iot ppt
piyuu7
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

What's hot (20)

Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Iot and cloud computing
Iot and cloud computingIot and cloud computing
Iot and cloud computing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Internet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutionsInternet of things - challenges scopes and solutions
Internet of things - challenges scopes and solutions
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Iot
IotIot
Iot
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
10 min IoT ppt
10 min IoT ppt10 min IoT ppt
10 min IoT ppt
 
iot seminar topic
iot seminar topic iot seminar topic
iot seminar topic
 
Introduction of iot
Introduction of iotIntroduction of iot
Introduction of iot
 

Viewers also liked

IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
EUBrasilCloudFORUM .
 
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
Arun Joseph
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 

Viewers also liked (20)

IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
 
Io t privacy and security considerations
Io t   privacy and security considerationsIo t   privacy and security considerations
Io t privacy and security considerations
 
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
 
3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
 
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
 
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IOWindows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
 

Similar to IoT implementation and Challenges

Asset Intelligence
Asset IntelligenceAsset Intelligence
Asset Intelligence
Juliann2012
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
RamithaDevi
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
GovadaDhana
 

Similar to IoT implementation and Challenges (20)

Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Asset Intelligence
Asset IntelligenceAsset Intelligence
Asset Intelligence
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
 
A fair survey on internet of Things
A fair survey on internet of ThingsA fair survey on internet of Things
A fair survey on internet of Things
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
IOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation levelIOT_UNIT-1_Presentation which is basic presentation level
IOT_UNIT-1_Presentation which is basic presentation level
 
Intrusion detection systems for internet of thing based big data: a review
Intrusion detection systems for internet of thing based big data:  a reviewIntrusion detection systems for internet of thing based big data:  a review
Intrusion detection systems for internet of thing based big data: a review
 

More from Ahmed Banafa

More from Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 

Recently uploaded (20)

VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

IoT implementation and Challenges

  • 1. Prof. Ahmed Banafa College of Engineering San Jose State University San Jose, CA , USA
  • 2.  The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
  • 3.  Implementing this concept is not an easy task by any measure for many reasons including the complex nature of the different components of the ecosystem of IoT.
  • 4.  To understand the gravity of this task, we will explain all the five components of IoT Implementation…
  • 5.  Sensors  Networks  Standards  Intelligent Analysis  Intelligent Actions
  • 6.
  • 7.  According to (IEEE) sensors can be defined as: An electronic device that produces electrical, optical, or digital data derived from a physical condition or event.  Data produced from sensors is then electronically transformed, by another device, into information (output) that is useful in decision making done by “intelligent” devices or individuals (people).
  • 8. Types of Sensors:  Active Sensors  Passive Sensors
  • 9. The selection of sensors greatly impacted by many factors, including:  Purpose (Temperature, Motion, Bio…etc.)  Accuracy  Reliability  Range  Resolution  Level of Intelligence (dealing with noise and interference)
  • 10. The driving forces for using sensors in IoT today are new trends in technology that made sensors cheaper, smarter and smaller.
  • 11.
  • 12. Challenges facing IoT sensors:  Power consumption  Security  Interoperability
  • 13.  The second step of this implantation is to transmit the signals collected by sensors over networks with all the different components of a typical network including routers, bridges in different topologies, including LAN, MAN and WAN.
  • 14.  Connecting the different parts of networks to the sensors can be done by different technologies including Wi-Fi, Bluetooth, Low Power Wi-Fi , Wi-Max, regular Ethernet , Long Term Evolution (LTE) and the recent promising technology of Li-Fi (using light as a medium of communication between the different parts of a typical network including senores)
  • 15.
  • 16. The driving forces for wide spread network adoption in IoT can be summarized as follows:  High Data rate  Low Prices of data usage  Virtualization (X - Define Network trends )  XaaS concept (SaaS, PaaS, and IaaS)  IPv6 deployment
  • 17. Challenges facing network implementation in IoT:  The enormous growth in number of connected devices  Availability of networks coverage  Security  Power consumption
  • 18.
  • 19.  The third stage in the implementation process includes the sum of all activities of handling, processing and storing the data collected from the sensors.
  • 20.  This aggregation increases the value of data by increasing, the scale, scope, and frequency of data available for analysis but aggregation only achieved through the use of various standards depending on the IoT application in used.
  • 21. Types of Standards :  Two types of standards relevant for the aggregation process; technology standards (including network protocols, communication protocols, and data- aggregation standards) and regulatory standards (related to security and privacy of data, among other issues).
  • 22. Technology Standards :  Network Protocols (e.g.: Wi-Fi)  Communications Protocols (e.g.: HTTP)  Data aggregation standards (e.g.: Extraction, Transformation, Loading (ETL))
  • 23. Regulatory Standards  Set and administrated by government agencies like FTC, for example Fair Information Practice Principles (FIPP) and US Health Insurance Portability and Accountability Act (HIPAA) just to mention few.
  • 24. Challenges facing the adoptions of standards within IoT  Standard for handling unstructured data: Structured data are stored in relational databases and queried through SQL. Unstructured data are stored in different types of noSQL databases without a standard querying approach.
  • 25.  Security and privacy issues: There is a need for clear guidelines on the retention, use, and security of the data as well as metadata (the data that describe other data).
  • 26.  Regulatory standards for data markets: Data brokers are companies that sell data collected from various sources. Even though data appear to be the currency of the IoT, there is lack of transparency about, who gets access to data and how those data are used to develop products or services and sold to advertisers and third parties.
  • 27.  Technical skills to leverage newer aggregation tools: Companies that are keen on leveraging big-data tools often face a shortage of talent to plan, execute, and maintain systems.
  • 28.  The fourth stage in IoT implementation is extracting insight from data for analysis, Analysis is driven by cognitive technologies and the accompanying models that facilitate the use of cognitive technologies.
  • 29.  With advances in cognitive technologies’ ability to process varied forms of information, vision and voice have also become usable.  On the next slide, list of selected cognitive technologies that are experiencing increasing adoption and can be deployed for predictive and prescriptive analytics:
  • 30.  Computer vision refers to computers’ ability to identify objects, scenes, and activities in images  Natural-language processing refers to computers’ ability to work with text the way humans do, extracting meaning from text or even generating text that is readable.  Speech recognition focuses on accurately transcribing human speech
  • 31. Factors driving adoption intelligent analytics within the IoT:  Artificial intelligence models can be improved with large data sets that are more readily avail- able than ever before, thanks to the lower storage costs.
  • 32.  Growth in crowdsourcing and open- source analytics software: Cloud-based crowdsourcing services are leading to new algorithms and improvements in existing ones at an unprecedented rate.
  • 33.  Real-time data processing and analysis: Analytics tools such as complex event processing (CEP) enable processing and analysis of data on a real-time or a near-real-time basis, driving timely decision making and action.
  • 34. Challenges facing the adoptions of intelligent analytics within IoT:  Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of outliers may lead to false positives or false negatives, thus exposing various algorithmic limitations
  • 35.  Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to handle structured data; unfortunately, most IoT/business interactions generate unstructured data
  • 36.  Legacy systems’ ability to manage real- time data: Traditional analytics software generally works on batch-oriented processing, wherein all the data are loaded in a batch and then analyzed
  • 37.  The fifth stage deals with intelligent actions , Intelligent actions can be expressed as M2M and M2H interfaces for example with all the advancement in UI and UX technologies.
  • 38. Factors driving adoption of intelligent actions within the IoT:  Lower machine prices  Improved machine functionality  Machines “influencing” human actions through behavioral-science rationale  Deep Learning tools
  • 39. Challenges facing the adoption of intelligent actions within IoT:  Machines’ actions in unpredictable situations  Information security and privacy  Machine interoperability  Mean-reverting human behaviors  Slow adoption of new technologies
  • 40.  The Internet of Things (IoT) is an ecosystem of ever- increasing complexity, it’s the next weave of innovation that will humanize every object in our life, which is the next level to automating every object in our life.  Convergence of technologies will make IoT implementation much easier and faster, which in turn will improve many aspects of our life at home and at work and in between.