This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
This document discusses IoT network architecture and design. It explores drivers for new network architectures like scale, security, constrained devices, data, and legacy support. It compares the oneM2M and IoT World Forum IoT architectures, which divide functions into layers like applications, services, and networks. It also presents a simplified IoT architecture with two stacks: the data management and compute stack, and the core functional stack consisting of things, communications networks, and applications.
The document provides an overview of the Internet of Things (IoT). It discusses the evolution of IoT from local networks to today's interconnected world and envisions a future where everything is connected. The key characteristics of IoT including connectivity, intelligence, scalability and heterogeneous environments are described. Two reference models for IoT architecture are presented - the ITU-T model with four layers and the IWF model with seven layers. The main components of IoT like identification, sensing, actuation, communication and computation are explained. Popular applications of IoT across various industries like transportation, smart cities, manufacturing, retail and more are listed. Finally, the challenges of IoT especially around security, privacy and complexity are covered.
This document provides an introduction to IoT including definitions and key characteristics. It discusses the four layers of an IoT architecture: sensing, network, data processing, and application. Common IoT protocols at each layer like MQTT, CoAP, and HTTP are also outlined. The document then covers microprocessors, comparing CISC and RISC architectures. Microcontrollers are defined as specialized microprocessors used in embedded systems. ARM is highlighted as a popular architecture for IoT devices due to its low power consumption and integrated components.
The document discusses the introduction to Internet of Things (IoT), including its definition, applications, characteristics such as being dynamic and self-adapting, self-configuring, using interoperable communication protocols, having a unique identity, and being integrated into information networks; it also discusses the physical design of IoT devices and protocols as well as the logical design including devices, communication, services, management, security, and applications.
This document provides an overview of Internet of Things (IoT) fundamentals and architectures. It discusses the evolution of IoT and enabling technologies. Two standardized IoT architectures are described: oneM2M, which focuses on IoT services and platforms, and defines layers for applications, services and networks. The IoT World Forum architecture defines seven layers including physical devices, connectivity, edge computing and cloud processing. Alternative simplified models and the roles of fog/edge computing are also introduced. The document outlines common IoT building blocks like sensors, actuators and smart objects.
The chapter discusses Internet of Things (IoT), defining it as the networking of smart devices that can sense and communicate with one another without human interaction. It describes the key features of IoT including artificial intelligence, connectivity, sensors, engagement, and small device use. It explains the history and architecture of IoT, including its layers of sensing, networking, data processing, and applications. It also covers the advantages and disadvantages of IoT, as well as examples of consumer, enterprise, and industrial IoT devices and networks.
This document provides an introduction to the Internet of Things (IoT). It defines IoT as connecting sensing devices to the internet and using data analytics. It then outlines the key enabling technologies that have driven IoT development, including cheap computing systems, wireless connectivity, cloud storage and services, and data science tools. Finally, it provides example IoT scenarios in areas like delivery logistics, smart homes, healthcare, transportation and more to illustrate real-world IoT applications.
This document provides an overview of the course "18BME18 INTERNET OF THINGS FOR BIOMEDICAL ENGINEERS". The course aims to discuss IoT concepts, interpret wireless sensor network protocols, illustrate IoT applications in healthcare using tools and embedded systems. The document outlines the various units that will be covered, including IoT and M2M communication models, functional blocks, and protocols. It also compares IoT with M2M and describes software-defined networking.
This document discusses IoT network architecture and design. It explores drivers for new network architectures like scale, security, constrained devices, data, and legacy support. It compares the oneM2M and IoT World Forum IoT architectures, which divide functions into layers like applications, services, and networks. It also presents a simplified IoT architecture with two stacks: the data management and compute stack, and the core functional stack consisting of things, communications networks, and applications.
The document provides an overview of the Internet of Things (IoT). It discusses the evolution of IoT from local networks to today's interconnected world and envisions a future where everything is connected. The key characteristics of IoT including connectivity, intelligence, scalability and heterogeneous environments are described. Two reference models for IoT architecture are presented - the ITU-T model with four layers and the IWF model with seven layers. The main components of IoT like identification, sensing, actuation, communication and computation are explained. Popular applications of IoT across various industries like transportation, smart cities, manufacturing, retail and more are listed. Finally, the challenges of IoT especially around security, privacy and complexity are covered.
This document provides an introduction to IoT including definitions and key characteristics. It discusses the four layers of an IoT architecture: sensing, network, data processing, and application. Common IoT protocols at each layer like MQTT, CoAP, and HTTP are also outlined. The document then covers microprocessors, comparing CISC and RISC architectures. Microcontrollers are defined as specialized microprocessors used in embedded systems. ARM is highlighted as a popular architecture for IoT devices due to its low power consumption and integrated components.
The document discusses the introduction to Internet of Things (IoT), including its definition, applications, characteristics such as being dynamic and self-adapting, self-configuring, using interoperable communication protocols, having a unique identity, and being integrated into information networks; it also discusses the physical design of IoT devices and protocols as well as the logical design including devices, communication, services, management, security, and applications.
This document provides an overview of Internet of Things (IoT) fundamentals and architectures. It discusses the evolution of IoT and enabling technologies. Two standardized IoT architectures are described: oneM2M, which focuses on IoT services and platforms, and defines layers for applications, services and networks. The IoT World Forum architecture defines seven layers including physical devices, connectivity, edge computing and cloud processing. Alternative simplified models and the roles of fog/edge computing are also introduced. The document outlines common IoT building blocks like sensors, actuators and smart objects.
The chapter discusses Internet of Things (IoT), defining it as the networking of smart devices that can sense and communicate with one another without human interaction. It describes the key features of IoT including artificial intelligence, connectivity, sensors, engagement, and small device use. It explains the history and architecture of IoT, including its layers of sensing, networking, data processing, and applications. It also covers the advantages and disadvantages of IoT, as well as examples of consumer, enterprise, and industrial IoT devices and networks.
This document provides an introduction to the Internet of Things (IoT). It defines IoT as connecting sensing devices to the internet and using data analytics. It then outlines the key enabling technologies that have driven IoT development, including cheap computing systems, wireless connectivity, cloud storage and services, and data science tools. Finally, it provides example IoT scenarios in areas like delivery logistics, smart homes, healthcare, transportation and more to illustrate real-world IoT applications.
The document discusses Internet of Things (IoT) concepts including:
1. It defines IoT and describes its key characteristics such as being dynamic, self-configuring, using interoperable communication protocols, and devices having unique identities.
2. It explains the physical and logical design of IoT including things in IoT, IoT protocols, functional blocks, and communication models and APIs.
3. It discusses enabling technologies for IoT like wireless sensor networks, cloud computing, big data analytics, embedded systems, and communication protocols.
The document provides a detailed overview of foundational aspects of IoT from definitions to enabling technologies.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxtaruian
Basics of Networking: Introduction, Network Types, Layered network models.
Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components.
Introduction to IoT Technologies - The need to know basicsJaco Bester
This document provides an introduction to Internet of Things (IoT) technologies. It discusses what IoT is, its application areas, and key aspects like platforms, security, analytics, device management, event stream processing, hardware, operating systems, standards, and low-power IoT networks. Specific technologies covered include Amazon Web Services IoT, Azure IoT Suite, Zigbee, Sigfox, and LoRa. The document aims to explain the basics needed to understand IoT.
It consists of definition of iot,physical and logical design of iot,fundamental blocks of iot , communication model of iot ,what is things in internet of things means, communication APIs of iot.This are some of the main contents of this ppt
The document outlines the syllabus for a course on Internet of Things (IoT) essentials. It covers 5 units: (1) an introduction to IoT including definitions, characteristics and protocols; (2) IoT design methodology and architecture; (3) elements and challenges of building IoT devices; (4) cloud offerings for IoT; and (5) applications of IoT such as retail, healthcare, transportation and smart cities. It also lists experiments and references books related to learning IoT.
The document provides an overview of the Internet of Things (IoT). It defines IoT and discusses its key components including sensors, connectivity, artificial intelligence, active engagement, and small devices. The document then discusses IoT architecture including sensing, network, data processing, and application layers. It also outlines some common applications of IoT such as smart homes, smart cities, and smart farming. Finally, the document discusses some of the advantages and challenges of implementing IoT systems.
This document discusses networks, fog, and cloud computing in the context of IoT fundamentals. It describes how IoT devices connect to networks using various wireless technologies. It explains that fog computing processes data at the edge to reduce burden on networks while cloud computing provides scalable resources over the internet. It also addresses security and privacy concerns around the large amounts of data generated by IoT including storage, transmission, encryption, and device management.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
The document discusses the key concepts of IoT including its definition, characteristics, physical and logical design, protocols, levels and deployment templates. Specifically, it defines IoT as a global network of devices with sensing/actuation and communication capabilities. It describes the various components of an IoT system including devices, resources, controllers, databases, services, analytics and applications. Finally, it outlines six levels of IoT systems with increasing complexity from single device/node to multiple interconnected devices and centralized control.
The document discusses key topics related to the Internet of Things (IoT) including:
1. It defines IoT and lists its main characteristics as intelligence, connectivity, enormous scale, dynamic nature, heterogeneity, sensing, and security.
2. It describes the physical design of IoT including IoT devices and protocols used for communication between devices and cloud servers.
3. It outlines the logical design of IoT including functional blocks, common communication models like request-response, publish-subscribe, and push-pull, as well as communication APIs.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
The document provides an introduction to IoT, including definitions, characteristics, physical and logical designs, communication protocols, and deployment models. It defines IoT as a global network of devices with sensing/actuation and communication capabilities. The physical components are "things" like sensors and devices. Logically, IoT systems use models like publish-subscribe and request-response. Deployment is classified into 6 levels based on the network topology and where data is stored and processed.
iot.pptx related to technology which existVINODN33
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
he extensive set of applications for IoT devices[31] is often divided into consumer, commercial, industrial, and infrastructure spaces.[32][33]
Consumers
A growing portion of IoT devices is created for consumer use, including connected vehicles, home automation, wearable technology, connected health, and appli
This document provides an overview of an Internet of Things course for the 2018-2019 academic year. It includes 5 units that will cover topics such as IOT protocols, the web of things, network dynamics applications, resource management, smart grids, and electrical vehicle charging. The course objectives are for students to understand IOT protocols, applications of the web of things, and network dynamics. The document lists 4 textbooks that will be used and provides descriptions of the topics that will be covered in each unit.
The document discusses the emergence of the Internet of Things (IoT). It describes how IoT has evolved from early technologies like automated teller machines and smart meters to modern applications across various domains. It also outlines the key characteristics of IoT and the complex interdependencies between IoT and related technologies like machine-to-machine communication, cyber physical systems, and the web of things. Finally, it explains the four planes that enable IoT - services, local connectivity, global connectivity, and processing - and how technologies like edge/fog computing facilitate IoT implementation.
This document outlines the details of an Internet of Things course, including:
- The course code, semester, prerequisites, and objectives which include understanding IoT from various perspectives.
- Five course outcomes related to describing, determining, comparing, concluding, and designing aspects of IoT.
- A syllabus made up of five units covering topics such as IoT architecture, levels, domains, M2M, and design methodology.
- Information on textbooks, references, evaluation methods involving assignments and tests, and motivation for the course focusing on IoT's widespread applications and research.
This document provides an introduction to Internet of Things (IoT). It defines IoT and discusses its key characteristics such as being dynamic and self-adapting. The document outlines various IoT applications and technologies that enable it. It also describes the physical design of IoT including sensors, actuators and example device architectures. Finally, it discusses important communication protocols used at different layers of the OSI model for IoT including Bluetooth, WiFi, IPv6 and MQTT.
The document discusses internet of things (IoT) connectivity models. It describes the OSI and TCP/IP networking models and how they are used to illustrate device communication in layered architectures. It also discusses simplified IoT architectures involving connections from devices to devices, clouds, gateways and applications. Privacy and security challenges are presented, such as the risk of metadata exposure. Standardization efforts are important to ensure interoperability among emerging IoT technologies.
This document outlines a course on IoT - Sensors and Devices. The course aims to expose students to fundamental concepts of microcontrollers and interfacing to help implement IoT in real-time. The course contains 6 units that cover IoT fundamentals, analyzing microcontroller usage, using sensors and actuators for requirements, communication protocols, cloud services, and conducting experiments safely and effectively. The course description provides more details on establishing a strong foundation for IoT implementation.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Weitere ähnliche Inhalte
Ähnlich wie IoT-CT internet of thing master séminaire cours.pdf
The document discusses Internet of Things (IoT) concepts including:
1. It defines IoT and describes its key characteristics such as being dynamic, self-configuring, using interoperable communication protocols, and devices having unique identities.
2. It explains the physical and logical design of IoT including things in IoT, IoT protocols, functional blocks, and communication models and APIs.
3. It discusses enabling technologies for IoT like wireless sensor networks, cloud computing, big data analytics, embedded systems, and communication protocols.
The document provides a detailed overview of foundational aspects of IoT from definitions to enabling technologies.
This document discusses Internet of Things (IoT). It defines IoT and explains that IoT allows internet connectivity and computing capability to extend to various objects and devices. It describes key characteristics of IoT including use of sensors, connectivity models like device-to-device and device-to-cloud, applications across various domains like healthcare, transportation, utilities and more. It also outlines advantages and disadvantages of IoT as well as security and other challenges in deploying IoT solutions at scale.
Introduction to IoT (Basics of Networking & Emergence of IoT).pptxtaruian
Basics of Networking: Introduction, Network Types, Layered network models.
Emergence of IoT: Introduction, Evolution of IoT, Enabling IoT and the Complex Interdependence of Technologies, IoT Networking Components.
Introduction to IoT Technologies - The need to know basicsJaco Bester
This document provides an introduction to Internet of Things (IoT) technologies. It discusses what IoT is, its application areas, and key aspects like platforms, security, analytics, device management, event stream processing, hardware, operating systems, standards, and low-power IoT networks. Specific technologies covered include Amazon Web Services IoT, Azure IoT Suite, Zigbee, Sigfox, and LoRa. The document aims to explain the basics needed to understand IoT.
It consists of definition of iot,physical and logical design of iot,fundamental blocks of iot , communication model of iot ,what is things in internet of things means, communication APIs of iot.This are some of the main contents of this ppt
The document outlines the syllabus for a course on Internet of Things (IoT) essentials. It covers 5 units: (1) an introduction to IoT including definitions, characteristics and protocols; (2) IoT design methodology and architecture; (3) elements and challenges of building IoT devices; (4) cloud offerings for IoT; and (5) applications of IoT such as retail, healthcare, transportation and smart cities. It also lists experiments and references books related to learning IoT.
The document provides an overview of the Internet of Things (IoT). It defines IoT and discusses its key components including sensors, connectivity, artificial intelligence, active engagement, and small devices. The document then discusses IoT architecture including sensing, network, data processing, and application layers. It also outlines some common applications of IoT such as smart homes, smart cities, and smart farming. Finally, the document discusses some of the advantages and challenges of implementing IoT systems.
This document discusses networks, fog, and cloud computing in the context of IoT fundamentals. It describes how IoT devices connect to networks using various wireless technologies. It explains that fog computing processes data at the edge to reduce burden on networks while cloud computing provides scalable resources over the internet. It also addresses security and privacy concerns around the large amounts of data generated by IoT including storage, transmission, encryption, and device management.
INTRODUCTION TO INTERNET OF THINGS
Evolution of Internet of Things – Enabling Technologies – IoT Architectures: oneM2M, IoT World Forum (IoTWF) and Alternative IoT Models – Simplified IoT Architecture and Core IoT Functional Stack – Fog, Edge and Cloud in IoT
The Internet of Things (IoT) is a network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity that allow these objects to collect and exchange data.
Why IoT?
With the development of technologies like M2M (machine-to-machine communication) and widespread of Internet, communication over long distance became possible.
This useful exchange of information across the globe with minimal human intervention led to an innovative concept called Internet of Things (IoT) where objects represent themselves as a digitally forming large network of connected devices that can communicate over the internet.
Components comprising IoT
IoT Hardware – These include sensors, micro-controller devices for control, servers, an edge or gateway.
IoT software – It includes mobile and web applications that are responsible for data collection, device integration, real-time analysis and application and process extension.
IoT Lifecycle
Collect: The life cycle of IoT starts with collecting data from different sources deployed in a particular region. These sources could be any sensors or device capable of transmitting data connected to a gateway. Data are efficiently collected and passed forward through a communication channel for analysis.
Communicate: This phase involves secure and reliable transfer of data. Routers, switches and firewall technologies play a vital role in establishing communication between devices. The Data is sent to the cloud or other data centers using the internet which is our major means of communication in IoT.
Analysis: This phase is an important part of the IoT lifecycle. In this phase data collected from different sensor devices are collected and analysed based on the use case to extract some useful output/information.
Action: This is the final stage of IoT lifecycle. Information obtained by the analysis of sensor data is acted upon and proper actions and measures are taken based on the analysis result.
The document discusses the key concepts of IoT including its definition, characteristics, physical and logical design, protocols, levels and deployment templates. Specifically, it defines IoT as a global network of devices with sensing/actuation and communication capabilities. It describes the various components of an IoT system including devices, resources, controllers, databases, services, analytics and applications. Finally, it outlines six levels of IoT systems with increasing complexity from single device/node to multiple interconnected devices and centralized control.
The document discusses key topics related to the Internet of Things (IoT) including:
1. It defines IoT and lists its main characteristics as intelligence, connectivity, enormous scale, dynamic nature, heterogeneity, sensing, and security.
2. It describes the physical design of IoT including IoT devices and protocols used for communication between devices and cloud servers.
3. It outlines the logical design of IoT including functional blocks, common communication models like request-response, publish-subscribe, and push-pull, as well as communication APIs.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
The document provides an introduction to IoT, including definitions, characteristics, physical and logical designs, communication protocols, and deployment models. It defines IoT as a global network of devices with sensing/actuation and communication capabilities. The physical components are "things" like sensors and devices. Logically, IoT systems use models like publish-subscribe and request-response. Deployment is classified into 6 levels based on the network topology and where data is stored and processed.
iot.pptx related to technology which existVINODN33
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.[1][2][3][4][5] The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network[6] and be individually addressable.[7][8]
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, and increasingly powerful embedded systems, as well as machine learning.[9] Older fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things.[10] In the consumer market, IoT technology is most synonymous with "smart home" products, including devices and appliances (lighting fixtures, thermostats, home security systems, cameras, and other home appliances) that support one or more common ecosystems and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. IoT is also used in healthcare systems.[11]
he extensive set of applications for IoT devices[31] is often divided into consumer, commercial, industrial, and infrastructure spaces.[32][33]
Consumers
A growing portion of IoT devices is created for consumer use, including connected vehicles, home automation, wearable technology, connected health, and appli
This document provides an overview of an Internet of Things course for the 2018-2019 academic year. It includes 5 units that will cover topics such as IOT protocols, the web of things, network dynamics applications, resource management, smart grids, and electrical vehicle charging. The course objectives are for students to understand IOT protocols, applications of the web of things, and network dynamics. The document lists 4 textbooks that will be used and provides descriptions of the topics that will be covered in each unit.
The document discusses the emergence of the Internet of Things (IoT). It describes how IoT has evolved from early technologies like automated teller machines and smart meters to modern applications across various domains. It also outlines the key characteristics of IoT and the complex interdependencies between IoT and related technologies like machine-to-machine communication, cyber physical systems, and the web of things. Finally, it explains the four planes that enable IoT - services, local connectivity, global connectivity, and processing - and how technologies like edge/fog computing facilitate IoT implementation.
This document outlines the details of an Internet of Things course, including:
- The course code, semester, prerequisites, and objectives which include understanding IoT from various perspectives.
- Five course outcomes related to describing, determining, comparing, concluding, and designing aspects of IoT.
- A syllabus made up of five units covering topics such as IoT architecture, levels, domains, M2M, and design methodology.
- Information on textbooks, references, evaluation methods involving assignments and tests, and motivation for the course focusing on IoT's widespread applications and research.
This document provides an introduction to Internet of Things (IoT). It defines IoT and discusses its key characteristics such as being dynamic and self-adapting. The document outlines various IoT applications and technologies that enable it. It also describes the physical design of IoT including sensors, actuators and example device architectures. Finally, it discusses important communication protocols used at different layers of the OSI model for IoT including Bluetooth, WiFi, IPv6 and MQTT.
The document discusses internet of things (IoT) connectivity models. It describes the OSI and TCP/IP networking models and how they are used to illustrate device communication in layered architectures. It also discusses simplified IoT architectures involving connections from devices to devices, clouds, gateways and applications. Privacy and security challenges are presented, such as the risk of metadata exposure. Standardization efforts are important to ensure interoperability among emerging IoT technologies.
This document outlines a course on IoT - Sensors and Devices. The course aims to expose students to fundamental concepts of microcontrollers and interfacing to help implement IoT in real-time. The course contains 6 units that cover IoT fundamentals, analyzing microcontroller usage, using sensors and actuators for requirements, communication protocols, cloud services, and conducting experiments safely and effectively. The course description provides more details on establishing a strong foundation for IoT implementation.
Ähnlich wie IoT-CT internet of thing master séminaire cours.pdf (20)
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
2. 2
Outline
1.- Things and Connections
2.- Sensors, Actuators, and Microcontrollers
3.- Software is Everywhere
4.- Networks, Fog and Cloud Computing
5.- Digitization of the Business
6.- Create an IoT Solution
3. 3
What are Things?
1. The Internet of Things
The Presence of IoT in Today's World
• The IoT is all around us.
• The IoT helps individuals to improve quality of life.
• The IoT also helps industries to become more efficient.
IoT Solutions
• The rapid IoT growth has introduced new challenges.
• IoT System reduces the complexities of digitization.
• Six Pillars of the Cisco IoT System are:
• Network Connectivity
• Fog Computing
• Cybersecurity and Physical Security
• Data Analytics
• Management and Automation
• Application Enablement Platform
4. 4
What are Things?
Building Blocks of an IoT System
Overview of a Controlled System
• Feedback loops are used to provide real-time information to its controller based
on current behavior.
• In a closed loop, feedback is continuously being received by the controller from
its sensors.
• The controller continuously analyzes and processes information and use
actuators to modify conditions.
Sensors
• A sensor is a device that can be used to measure a physical property by
detecting some type of information from the physical world.
• A sensor may be connected to a controller either directly or remotely.
5. 5
What are Things?
Building Blocks of an IoT System (Cont.)
Actuators
• An actuator is a basic motor that can be used to control a system.
• Can be hydraulic, electric or pneumatic.
• can be responsible for transforming an electrical signal into physical output.
Controllers
• Responsible for collecting data from sensors and providing network connectivity.
• Controllers may have the ability to make immediate decisions.
• May also send data to remote and more powerful computer for
analysis.
IoT Process Flow
• A simple IoT system includes sensors connecting, through a wireless or wired
connection, to actuators or controllers.
• Some devices can have more than one function.
6. 6
What are Connections?
Models of Communication
Models of Communication
• Layered networking models are used to illustrate how a network operates.
Benefits include:
• Assists in protocol design.
• Fosters competition.
• Promotes technology or capability independence.
• Provides a common language to describe networking
functions and capabilities.
7. 7
What are Connections?
Models of Communication (cont’d)
Standardization
• The challenge for the IoT is to ensure these emerging IoT devices can connect
securely and reliably to the Internet and to each other.
• Consistent, secure, and commonly recognized technologies and standards is needed.
• Organizations such as the Industrial Internet Consortium (IIC), OpenFog
Consortium, and the Open Connectivity Foundation, are helping to develop
standard architectures and
frameworks.
8. 8
What are Connections?
Models of Communication (Cont.)
TCP and OSI Models
• Both OSI and TCP/IP models are used to describe
network connections and often used interchangeably.
• The TCP/IP model is commonly referred to as the Internet
model.
• The OSI model provides an extensive list of functions and
services that can occur at each layer.
IoT World Forum Reference Model
• Developed as a common framework to guide and to help
accelerate IoT deployments.
• Like the OSI model, the IoT Reference Model has seven
parts, instead of layers.
• Its intent is to provide common terminology and help
clarify how information flows and is processed for a unified
IoT industry.
• It is also endorsed by the Industrial Internet
Consortium (IIC).
10. 10
What are Connections?
Models of Communication (Cont.)
Simplified IoT Architecture
• Several architectures exist to help facilitate the design and creation of IoT systems: OSI
model, TCP/IP model, and the IoT World Forum Reference model have been presented
as examples.
• A simpler approach is based on connection levels. The levels are:
• Device-to-Device: ex. sensors and actuators in a LAN
• Device-to-Cloud: ex. devices with an IP connects to the cloud
• Device-to-Gateway-to-Cloud: ex. when device do not have IP and need a gateway
• Device-to-Gateway-to-Cloud-to-Application: ex. data is combined and analyzed
11. 11
What are Connections?
Layers of Connections
Connections Within Networks
• Connections can have different contexts.
• Power connections, circuit connections or
network connections.
Physical Connections
• Relate to the media and cable type.
• Common media types include copper,
fiber optics and wireless.
12. 12
What are Connections?
Layers of Connections (cont’d)
• Communication requires protocols to establish the rules of
communications.
• Data Link protocols:
• Allow the upper layers to access the media
• Prepare network data for the physical network
• Control how data is placed and received on the media
• Exchange frames between nodes over a physical network media,
such as copper or fiber-optic
• Receive and directing packets to an upper layer protocol
• Perform error detection
• The most popular data link layer connection used in wired
networks is Ethernet.
• Other data link protocols include wireless standards such as IEEE
802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and cellular 3G or 4G
networks.
• LPWAN (Low Power Wide Area Networks): Lora/LoRaWAN, Sigfox
and native IoT communications such as NB-IoT/LTEM-M are examples
of emerging IoT supporting technologies.
13. 13
What are Connections?
Layers of Connections (Cont.)
Application Connections and IoT Protocols
• The IoT supports many types of connections.
• Devices must use the same application layer protocols to connect.
• The application will vary depending on the devices and type of connection involved.
• IoT devices use CoAP (Constrained Application Protocol) and MQTT (Message
Queuing Telemetry Transport) and MQTT-SN (sensor network)
14. 14
Common IoT Protocols
IoT Devices are often embedded devices designed to work in sub-optimal conditions.
These devices require specialized protocols to function with low power and limited
connectivity.
• MQTT, COAP and REST are newer application protocols, created to support IoT
devices that connect in the myriad of different types of remote configurations.
• MQTT is a lightweight messaging protocol with minimal overhead that provides high
data integrity and security for remote environments.
• REST or RESTful web services is a type of API designed to make it easier for
programs to interact over the Internet.
• CoAP is, primarily, a one-to-one protocol for transferring state information between
client and server over UDP
What are Connections?
Layers of Connections (Cont.)
15. 15
What are Connections?
Impact of Connections on Privacy and Security
IoT systems should be designed with security and privacy in mind from the beginning
• Suggestions and design considerations concerning privacy include:
• Transparency: People should know what types of personal data are being collected
• Data Collection and Use: only the necessary, hiding the identification
• Data Access: who is able to access personal data collected
Challenges for Securing IoT Devices
Network security is a critical factor when deploying IoT devices.
• Some IoT network security impacting factors and challenges include:
• Increasing Number of Devices
• Non-Traditional Location of Devices: in the car, lampposts, …
• Changing Type and Quantity of Gathered Data
• Lack of Upgradeability
16. 16
2.-Sensing the Environment
Sensors
Devices that detect an event from the physical
environment and respond with electrical or optical
signals as output.
Examples: potentiometer, Flex sensor, Photo resistor and
Temperature sensor.
18. 18
Examples- Sensors and the PT Microcontroller (MCU)
Sensors Actuators
A
A
MCU—similar to Arduino
19. 19
3.- Lending Intelligence: processing, decisions and APIs
Decisions can be as simple as triggering an
alarm or as complex as facial recognition.
Software APIs
Application Program Interface (API) is a set of
routines and software tools that facilitate one
application communicating with another.
Different types of APIs exist: operating system
APIs, application APIs, website APIs.
APIs allow applications to communicate, share
data, or ask for specific services from another
application.
IOT Devices and Data Processing
• A common IoT application uses sensors to collect data.
• Data is often not useful until it has been processed. Collected data is often transported
and stored in the cloud for processing at a later date.
IoT Devices Make Decisions
• Software must be written and uploaded onto IoT devices to allow them to make
decisions.
20. 20
Programming
Lending Intelligence – cont’d: REST API
REST API requests trigger responses in well-defined formats such as XML or
JSON.
XML or JSON are data formats, a simply a way to store and exchange data in a
structured format:
• JavaScript Object Notation (JSON)
• eXtensible Markup Language (XML)
REST API
• REST (Representational State Transfer) APIs use HTTP based calls between
applications to access and manipulate information stored on powerful databases
using POST, PUT, GET and DELETE, as well as applications can easily communicate
with other applications and web services (especially cloud services).
• Web resources use to be identified using a Universal Resource Locator (URL). Now
resources can be any entity or thing that can be addressed: today’s step goal, house
temperature setting, glucose setting.
• A unique Uniform Resource Identifier (URI) can identify an entity. A URI typically
begins with a slash (/steps)
21. 21
The Raspberry Pi, a Single Board Computer (SBC)
Raspberry Pi (RPi) Hardware
The Raspberry Pi and its Ports
The Pi is a small and inexpensive computer.
It has a number of USB ports that can be used to connect various devices including
keyboards, mice, external drives and cameras.
The Pi includes an 10/100Mbps Ethernet port and 40 GPIO pins (3.3 and 5 v),
operating at 3.3V.
Other Pi ports include an audio out, a micro SD card slot, and a micro USB (used for
power) connector.
• The RPi3 also adds:
• 1.2 Ghz 64-bit quad-core ARMv8 CPU
• 802.11n Wireless LAN
• Bluetooth 4.1, Bluetooth Low Energy (BLF)
• Other: RPi Zero without Ethernet, WiFi.
• The Pi can run a number of operating systems,
including Linux and Windows.
RPi3B
22. 22
The Raspberry Pi, a Single Board Computer (SBC)
Uses of the Raspberry Pi
Artificial Raspberry Pi Pancreas
Dana Lewis and her husband used a Raspberry Pi
to build an artificial pancreas.
It was possible due to the Pi’s small size and low
power requirements.
4Borg Pi Robot
PiBorg is an affordable robot kit built around a
Raspberry Pi.
It is both fun and educational.
• Controlling the Arduino Through the Pi
While the Pi is powerful, it may not be the best option
for all projects.
The Pi doesn’t include analog GPIO pins.
The Pi is not real-time.
The Pi’s power requirements and size may be too large,
depending on the application.
To adjust to these limitations, an Arduino may be used.
23. 23
Connecting Things to the Network
The Role of the Network: size and features
A Personal Area Network (PAN) is a type of network that usually spans a few meters
around an individual and is often used in IoT. Ex Bluetooth.
A Local Area Network (LAN) is a type of network infrastructure that spans a small
geographical area and is used to connect end devices. Ex Ethernet, WiFi
A LAN is normally a high-speed network under the control of a single administrative
entity.
A Wide Area Network (WAN) is a type of network infrastructure that spans a wide
geographical area and is used to connect WANs. Ex GSM, 4G
A WAN is normally a low-speed network and may include portions from different
Internet Service Providers (ISPs)
LANs often connect machines in the factory plant.
• WAN devices have evolved to create Low
PowerWide Area Networks (LPWAN) for use in
IOT environments: Lora, Sigfox, NBIoT, LTE-M
24. 24
Connecting Things to the Network
The Role of the Network (Cont.): devices and media
Network Devices
Network devices are devices that connect to each other through a network.
End devices are either the source or destination of a message transmitted over the
network. Example: IoT devices, phone, host, …
Intermediary devices connect the individual end devices to the network and can
connect multiple individual networks to form an internetwork. Example: switch, router,
Access Point (AP),…
Network addresses are used to uniquely identify devices on a network, IPv4 or IPv6.
• Network media provide the physical channel over which the message travels from
source to destination.
25. 25
Connecting Things to the Network
The Role of the Network (Cont.): protocols
Network Protocols
Devices must conform to common protocols before they can communicate.
Two very important network protocols are Ethernet and IP.
Ethernet rules enable communication between local devices.
IP enable communication between remote devices.
Basic Routing
Network packets must often transverse several networks to get to the destination.
Routing is the process of directing a network packet to its destination.
Routers are intermediary network devices that perform routing.
LANs, WANs and the Internet (a basic scheme)
• Single router designs are common in (Small Office
Home Office) SOHO.
• The single router connects SOHO devices to the
Internet.
• The single router is the default gateway for all SOHO
devices.
26. 26
Connecting Things to the Network
The Role of the Network (Cont.): IoT protocols and
security
IoT Protocols
IoT devices use CoAP (Constrained Application Protocol) and MQTT (Message Queuing
Telemetry Transport) and MQTT-SN (sensor network)
Securing the Network
• IoT devices are integrated into all aspects of
daily life.
• IoT applications carry traceable signatures
and carry confidential data.
• IoT devices must adhere to a secure
framework (Authentication, Authorization,
Network Enforced Policy, Secure Analytics)
27. 27
Connecting Things to the Network
4.- Wireless Technologies
Wireless connectivity is the biggest growth area.
New protocols created/updated to support diverse IoT devices: ZigBee, Bluetooth, 4G/5G,
LoRaWAN, WIFI
Protocols created for short, medium, and wide ranges
Low-Power Wide-Area Networks (LPWAN) is designed to support long range
communications for low bit rate devices such as sensors, actuators, and controllers
29. 29
Connecting Things to the Network
Wireless Technologies (cont’d)
ZigBee
A low-energy, low-power, low-data rate wireless protocol specification used to create
Personal Area Networks (PAN), based on IEEE802.15.4
Areas of utilization: home automation, medical device data collection, and other low-
power low-bandwidth needs
250 kbps transfer rate best suited for intermittent data transmissions (<100m)
Every ZigBee data request uses an Application Profile Identification Number.
Application Profile ID numbers - 16-bit
numbers that relate to public profiles,
manufacturing profiles, or private profiles.
ZigBee version 1.2 has a number of serious
and exploitable security vulnerabilities.
Most of these protocol design flaws relate
to attempts to make it easier for the
end-user to add a ZigBee device to the
ZigBee network.
Example: Digi Xbee that integrates radio, micropython, etc
30. 30
Connecting Things to the Network
Wireless Technologies (cont’d)
Bluetooth
Wireless protocol used for data communication over short distances (PAN), based on
IEEE802.15.5.1
Supported by almost all mobile devices and accessories - the defacto standard for
audio between mobile devices.
Bluetooth Low Energy (BLE) - very popular because of the smartphone industry and
new applications in healthcare, fitness, and beacons.
Operates in the 2.4 GHz ISM band
Has a very fast connection rate (milliseconds) and a very high data rate (1 Mbps,
<100m).
The BLE device then goes into “sleep mode” until a connection is reestablished -
lengthens the battery life for several years.
Beacons use BLE technology - positioned on buildings,
in coffee shops, and on light posts to provide location
services.
31. 31
Connecting Things to the Network
Wireless Technologies (cont’d)
4G/5G
Cellular-based data networks designed to take advantage of communications over large
geographic areas with two scenarios in ranges 1km-10km.
• High mobility bandwidth (trains and cars) of 4G system is 100 Mbps
• Low mobility (pedestrians and stationary users) of 4G systems is 1 Gbps
4G provides support for voice, IP telephony, mobile Internet access, video calling,
gaming services, cloud computing, high-definition mobile TV, and mobile 3D TV.
Long Term Evolution (LTE) and WiMAX (IEEE 802.16e) are two popular 4G systems.
LTE 4G technology release 13e includes LPWAN technology:
• NarrowBand IoT (NB-IoT, 250 kbps, 1.6-10s latency, half duplex)
• LTEM-M (1 Mbps, 10-15 ms latency)
Next Generation Mobile Networks
Alliance defining the standards and
requirements for 5G: seamless communication
32. 32
Connecting Things to the Network
Wireless Technologies (cont’d)
LoRaWAN
Wireless technology designed to provide wireless WAN connections to
power constricted devices.
Targets key requirements of the Internet of Things such as secure bi-
directional communication, mobility and localization services.
Architecture is often an extended star topology in which gateways relay
messages between end-devices and a central network server is located in
the backend.
Data rates range from 0.3 kbps to 50 kbps (1 km- 10 km)
Security is built into the LoRaWAN standard, implemented in a multi-layer
encryption scheme.
Unique keys are used in the Application, Network, and Device layers.
Sigfox: 140 packets with 12 Bytes a day.
33. 33
Connecting Things to the Network
Fog and Cloud Services
Cloud Computing Model provides
On-demand access to a shared pool of configurable
computing resources.
Resources can be made available quickly with
minimal management effort.
Cloud service providers use data centers for
their cloud services and cloud-based resources.
“Pay-as-you-go” model treats computing and
storage expenses as a utility.
Enables access to organizational data and
applications anywhere and at any time
Reduces cost for equipment, energy, physical plant
requirements, and personnel training needs
Cloud services offered: Infrastructure as a Service (IaaS), Platform and mobile Platform
as a Service (PaaS) (mPaaS), Software as a Service (SaaS)
Virtualization is the key
34. 34
Connecting Things to the Network
Fog and Cloud Services (cont’d)
Cloud Services
Cloud customers have access to a shared pool of configurable computing resources that
can be rapidly provisioned and released with minimal management effort.
Extends functionality of an IoT system: data processing and storage done in the cloud
instead of in the IoT devices.
Data and resources - always available to any device in the system as long as the device
has Internet connectivity
Cloud service providers are also very serious
about security, ensuring customer data is
kept safe and secure..
Examples of cloud services:
• Amazon AWS
• IFTTT (If This Then That)
• Zapier
• Built.io
• Webex Teams
36. 36
Connecting Things to the Network
Fog and Cloud Services (cont’d)
Fog Computing Model
Distributed computing infrastructure closer to the network edge.
Edge devices run applications locally and make immediate decisions
Reduces the data burden on networks as raw data not sent over network connections.
Enhances security - keeping sensitive data from being transported beyond the edge where
it is needed.
Fog applications monitor or analyze real-time
data from network-connected things and then
take action such as locking a door, changing
equipment settings, applying the brakes on a
train, zooming in with a video camera,
The action can involve machine-to-machine
(M2M) communications and machine-to-people
(M2P) interaction
It is foreseen that 40% of IoT-created data
will be processed in the fog by 2018
Containers are interesting alternative in the fog.
Ex docker swarm, Kubernetes, etc.
37. 37
Connecting Things to the Network
Big Data (cont’d)
Data Growth
Number of sensors and other IoT end devices growing exponentially
and collecting a constant stream of data.
Consumer behavior is changing requires anytime, anywhere, on-
demand access.- fitness monitors, smartphones, medical devices
Smart cities and smart grids, connected trains, cars – growing in
frequency
Problems arise in terms
of the requirements for
storage, analysis, and
security
38. 38
Connecting Things to the Network
Big Data (cont’d)
Big data is data that is so vast and complex it is difficult to store,
process, and analyze using traditional data storage and analytics
applications.
Typically characterized in three dimensions: volume, velocity,
and variety
Volume - the amount of data being transported and stored
Velocity - the rate at which this data is generated
Variety - the type of data, which is rarely in a state that is
perfectly ready for processing and
analysis
Apache Hadoop, Webex Teams, Cassandra,
and Kafka – examples of open source
projects dealing with Big Data
39. 39
Connecting Things to the Network
Security Concerns in the IoT
Data Storage
IoT devices may store data for a period of time before sending it out for
processing. – especially for devices that do not maintain constant connections to
their gateways or controllers.
It is critical that all IoT storage devices encrypt data for storage to avoid data
tampering or theft
Self-encrypting drives have encryption capability built into the drive controller -
encryption and decryption done by the drive itself, independent of the operating
system.
Self-encrypting flash memory –
manufacturers beginning to release
new devices with self-encrypting
flash memory
40. 40
Connecting Things to the Network
Security Concerns in the IoT (cont’d)
Data Transmission
If data is not properly secured through encryption, it can be intercepted, captured or
manipulated while in transit. One alternative is local processing in the fog!
Modern encryption algorithms may require more processing power than what
is available in the IoT device.
As well as physical security, IoT devices must be able to protect its own firmware and
the data it transmits. Ensure that IoT devices are running the latest version of their
firmware and protocols.
Servers, cloud endpoints,
intermediary devices should also
be secured and use strong
encryption algorithms before
communicating with IoT devices.
41. 41
IoT System Overview
Connecting Things
Allows for things to be accessible over the Internet that historically have not been,
such as home appliances, cars, sensors, and more.
Industrial applications require a higher degree of reliability
The Converged Network and Things
Many things are currently connected using a loose
collection of independent networks.
Independent networks are harder to incorporate into the IoT.
Networks that would benefit from convergence: cars and
residential and office buildings (Heating, Ventilation,
Air Conditioning (HVAC), telephone service, security,
and lighting).
A converged network is a powerful network that includes
comprehensive security, analytics, and management
capabilities.
42. 42
The Cisco IoT System
IoT System Overview (cont’d)
Connecting and Digitizing Industry
M2M enables communication between machines.
M2M occurs in cars with temperature and oil
sensors communicating with an onboard
computer.
Challenges to Connecting Things
• How to integrate millions of things from different
vendors?
• How to integrate new things into the existing network infrastructure?
• How to secure these new devices, each configured with varying levels of security?
M2M
43. 43
The Cisco IoT System
IoT System Overview (Cont.)
Remember the Six Pillars of the Cisco IoT System
Uses a set of new and existing products and technologies to reduce the complexity of
digitization.
Network Connectivity, Fog Computing, Security, Data Analytics, Management and
Automation, Application Enablement Platform.
Supporting the IoT in Industry
Network connectivity equipment varies depending on the type of network.
Cisco IoT network connectivity pillar identifies devices that can be used to provide IoT
connectivity to home networks and various industries.
Industrial IoT Devices
Industrial routers, Industrial switches, Industrial wireless, embedded networks.
These devices can support a variety of communication interfaces such as Ethernet,
serial, cellular, WiFi, RF mesh, and LoRoWAN.
44. 44
The Cisco IoT System
IoT Security in several planes
Control Plane, Data Plane, Management Plane
Data plane is activities done to receive data from other devices and to forward them to
the next device
Control plane is the brains of the device, used to make forwarding decisions.
Management Plane allows connection to modify a configuration or update software
running on a device.
Securing the Control, Data, and Management Planes in IoT
Securing the data plane relates to secure data as it crosses network devices.
Securing the control plane relates to securing the network device itself with tools such as
passwords and data encryption.
Securing the management plane is secured by updating
software and firmware with the latest patches.
45. 45
The Cisco IoT System
IoT Security (Cont.)
Securing the Control, Data, and Management Planes in IoT (cont’d)
A few recommendations:
• Make sure the new IoT device can be easily updated.
• Buy from a reputable manufacturer.
• Segment IoT devices to a different network or
VLAN.
• Check for updates regularly.
• Default usernames/passwords must be changed
• Limit management access od devices to trusted
sources
• Turn off all unnecessary services
Securing Things Using the Cisco IoT System
The IoT introduces new attack vectors (relying in someone else)
IoT System security pillar offers scalable cybersecurity solutions.
These cybersecurity solutions include:
Operational Technology (OT) Security, IoT Network Security, IoT Physical Security
46. 46
Industrial IoT Applications
5.- IoT Industries and Markets
Integrated Solutions
The IoT creates new opportunities for the interaction and
relationship between a variety of connected devices.
The IoT is about the integration of devices as a whole
system, a holistic approach.
The integration of devices and systems creates new business
opportunities and customer experiences.
The Industrial Internet
Integration of complex machinery, sensors and
software.
Example: driverless car uses data from different
systems to be driven safely
Most common application is predictive maintenance.
Sensors is trains, planes, and large equipment keep
track of hours of operation, machine output,
environmental factors and determine when it
needs maintenance.
47. 47
IoT Systems in the Real World
Connected Healthcare
Challenges in Healthcare
• Increasingly aging population.
• High-demand services.
• Shortages in key medical specialties.
• Rising healthcare costs.
Care-At-A-Distance Solutions (Cisco)
Care-at-a-distance value propositions:
Cisco Extended Care
Cisco TelePresence for Healthcare
Cisco WebEx for Healthcare
48. 48
IoT Systems in the Real World
Connected Healthcare (Cont.)
Cisco Clinical Workflow Solutions
Cisco Virtual Patient Observation
Cisco Patient Connect
Cisco Healthcare Intelligent Contact Center
Cisco Context-Aware (Location-Aware) Healthcare
Digital Media Suite for Healthcare
Cisco Healthcare Management Solutions
Cisco also provides healthcare provider
management solutions:
Cisco Services for Connected Health
Cisco Medical-Grade Network
49. 49
IoT Systems in the Real World
Smart Cities
Challenges faced by modern cities
• Overcrowding
• Increasing pollution
• Increasing traffic congestion
• Inadequate parking
• Inefficient use of street lighting, water, and waste
management
• Need for continued growth
• Pressure to provide safer and more secure cities
• Budget and resource constraints
Cisco Smart+Connected Solutions
Customer segments of a city include its citizens, visitors,
industry partners, businesses, and municipal operations.
Smart cities must address the needs of these segments.
Smart city value propositions:
Lighting, Operations Centers, Parking, Safety and
Security, Traffic, Wi-Fi.
50. 50
IoT Systems in the Real World
Smart Cities (Cont.)
Smart City – Hamburg (Germany), Santander &Valencia (Spain)
The city of Hamburg, Germany has transformed itself into a smart city.
Cisco Smart+Connected Wi-Fi (Cisco solution)
Connects people, data, devices, processes, and city services.
Value propositions provided by the Cisco Smart+Connected Wi-Fi to customer
segments include:
Citizen Services, City Services, Business Services, City commerce,
Infrastructure Management Services.
51. 51
IoT Systems in the Real World
Smart Cities (Cont.)
Cisco Smart+Connected Lighting Solutions
A standards-based system for gathering a wide variety of data
from the environment.
Collects levels for humidity, CO2 and O2, UVA and UVB light,
particulate matter, motion and seismic activity, video, sound, and
more.
Drastically reduce city energy consumption.
Improve citizen vehicle compliance.
Enhance situational awareness, real-time collaboration, and
decision making across city agencies
Add intelligent, sensor-based IoT innovations to transportation,
utilities, public safety, and environmental monitoring.
Cisco Smart+Connected Parking and Traffic Solutions
Smart cities can simplify parking and improve traffic flow.
The Cisco Smart+Connected Parking solution provides citizens
with real-time information about available parking.
Also allows them to book spaces in advance using mobile
applications.
52. 52
IoT Systems in the Real World
Smart Grids
Challenges in Energy
Rapid increase in consumption is putting a
strain on energy providers in many
countries.
There is also an increasing pressure to use
low-carbon energy sources instead of fossil
fuels.
Different ways of thinking about power and
the way that it is consumed are needed.
IoT Solutions for the Power Grid
Utilities need a more modern and agile
electric grid.
Smart grid provides more complex
interconnections between the producers,
storage facilities, and consumers of
electricity.
Smart grid brings the notion of the consumers
generating power for themselves and to the
grid.
53. 53
IoT Systems in the Real World
Smart Grids (Cont.)
Cisco Smart Grid Solutions
Cisco provides many smart grid solutions
including:
Grid Blocks Architecture
Connected Grid Services
Field Area Network
Transmission and Substation
Grid Security
Grid Operations
54. 54
IoT Systems in the Real World
Connected Manufacturing
Challenges in Manufacturing
Manufacturing must continually integrate new innovative
technology into the existing plant infrastructure.
Multiple siloed operational technology networks become
a problem.
Diversity in networks increases cost and complexity.
That lack of integration leads to a broad range of
issues, including:
• Inefficient operations
• Slow response times both in the factory and in the
market
• Poor quality control
• High overhead
• Compromised security
55. 55
IoT Systems in the Real World
Connected Manufacturing (Cont.)
IoT Solutions for Manufacturing
IoT solutions connect the right people to the right information.
Connected sensors provide a unique level of visibility into the factory
operations and supply chain flow.
Collected data contributes to identifying trends and relationships,
revealing opportunities for improvement.
For example, car companies now use sensor data to decide if
conditions are favorable to paint a car.
Cisco Manufacturing Solutions
Cisco provides the following IoT manufacturing value propositions:
• Cisco Connected Factory
• Cisco Connected Machines
• Cisco Secure Ops
• Cisco Connected Supply Chain
• Cisco Communications and Collaboration Tools