0% found this document useful (0 votes)
149 views

ATAL IoT Introduction

The document discusses Internet of Things (IoT) including its evolution, characteristics, architecture, components, applications and challenges. It describes how IoT has evolved from devices connecting locally to today's world where everything can connect to the internet and interact with other devices and systems. The architecture involves layers from the physical devices and network connectivity to data processing, applications and collaboration between systems and people. Key components that enable IoT are identification, sensing, communication and actuation capabilities in devices. Protocols are also important to facilitate communication between diverse systems in IoT applications.

Uploaded by

Yadvendra Bedi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views

ATAL IoT Introduction

The document discusses Internet of Things (IoT) including its evolution, characteristics, architecture, components, applications and challenges. It describes how IoT has evolved from devices connecting locally to today's world where everything can connect to the internet and interact with other devices and systems. The architecture involves layers from the physical devices and network connectivity to data processing, applications and collaboration between systems and people. Key components that enable IoT are identification, sensing, communication and actuation capabilities in devices. Protocols are also important to facilitate communication between diverse systems in IoT applications.

Uploaded by

Yadvendra Bedi
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 63

Internet of Things

Contents
• Introduction
• Evolution
• Characteristics
• Architecture
• Components
• Applications
• Challenges
Introduction
• Internet of Things(IoT)
• global infrastructure
• connects physical and virtual things around
us
• provides seamless communication and
contextual services
• solves many business problems

• Heterogeneous Devices from different


manufacturers
• Diverse protocols
• M2M, M2P, P2M, P2P
Evolution: Before IoT

Local Network Internet

https://en.wikipedia.org/wiki/Local_area_network http://www.blakeleyllp.com/
Evolution: IoT Today
• Internet of Things
• Internet of Vehicles
• Industrial IoT
• Web of Things
• Etc.

https://www.ssh.com/iot/
Evolution: Future IoT

http://www.starttoendnetworks.com/internet-of-everything/
Evolution: Previous Scenario

Technology/Application Centric Applications


https://www.progora.co.uk/Technology/Digital-Transformation
Evolution: Current Scenario

Human Centric Applications


Picture: Poikola, Antti, Kai Kuikkaniemi, and Harri Honko. 2015. “MyData – A Nordic Model for human-centered personal data management andprocessing.” Ministry of
Transport and Communications.
Characteristics
• Connectivity
• Intelligence and Identity
• Scalability
• Distributed Computing
• Dynamic Operations
• Heterogeneous Environment
• Resource Constraint Devices
• Battery Operated Devices
• Low Power Protocols
Architecture
ITU-T IoT Reference Model
ITU-T IoT Reference Model
• Four Layers
• Application layer
• Service and Application support layer
• Network layer
• Device layer

• Two Capabilities
• Management
• Security
ITU-T IoT Reference Model
• Application layer contains all IoT applications that
interact with IoT devices
• Service support and Application support layer
consists of the two capability groupings
• Generic support capabilities: common
capabilities used by different IoT applications,
such as data processing or data storage
• Specific support capabilities: specific
capabilities for the requirements of diversified
applications
ITU-T IoT Reference Model
• Network layer consists of the two capabilities:
• Networking capabilities provide relevant control
functions of network connectivity between devices
and gateways.
• Transport capabilities focus on providing
connectivity for the transport of IoT service and
application specific data information, as well as the
transport of IoT-related control and management
information.
ITU-T IoT Reference Model
• Device layer capabilities are categorized into
two kinds of capabilities
• Device Capabilities:
• Direct interaction with the communication network
(without gateways)
• Indirect interaction with the communication
network (through gateways)
• Ad-hoc networking
• Sleeping and waking-up
ITU-T IoT Reference Model
• Gateway capabilities:
• Multiple interfaces support – At device layer
through wired or wireless technologies (CAN bus,
ZigBee, Bluetooth or Wi-Fi) and At network layer
through PSTN, 2G or 3G networks, LTE, or DSL
• Protocol conversion when communications at the
device layer use different device layer protocols
and when communications involving both the
device layer and network layer use different
protocols
ITU-T IoT Reference Model
• Management capabilities
• Generic capabilities
• device management such as activation & de-
activation, diagnostics, firmware updating
• local network topology management
• traffic and congestion management such as
detection of network overflow conditions,
implementation of resource reservation
• Specific Capabilities are closely coupled with
application-specific requirements
ITU-T IoT Reference Model
• Security capabilities
• Generic capabilities
• application layer: authorization, authentication,
confidentiality and integrity protection, privacy protection,
security audit
• network layer: authorization, authentication, confidentiality,
and signalling integrity protection
• device layer: authentication, authorization, device integrity
validation, access control, data confidentiality and integrity
protection.
• Specific Capabilities are closely coupled with
application-specific requirements
IWF IoT Reference Model
IWF IoT Reference Model
Physical Devices and Controllers
• “Things” in IoT
• Endpoint devices to send and receive information
• Controllers to control multiple devices
• IoT “devices” are capable of:
• Analog to digital
conversion,
as required
• Generating data
• Being queried
or controlled over
internet
Connectivity
• Facilitates reliable, timely transmission
• Between devices (Level 1) and the network
• Across networks (east-west)
• Between the network (Level 2) and low-level information
processing occurring at Level 3
• Capabilities include
• Implementation of
various protocols
• Switching and routing
• Translation between protocols
• Security at the network level
• (Self Learning) Networking Analytics
Edge (Fog) Computing
• Focuses on North-South Communications
• Converts network data flows into information
• Data filtering, cleanup, aggregation
• Packet content inspection
• Combination of network and data level analytics
• Thresholding and Event generation
Data Accumulation
• Data in motion is converted to data at rest
• Converts network packets to database relational tables
• Achieves transition from ‘Event based’ to ‘Query based’ computing
• Reduces data through filtering and selective storing
• Capabilities Include
• Event filtering/sampling
• Event comparison
• Event joining for CEP
• Event based rule evaluation
• Event aggregation
• Northbound/southbound alerting
• Event persistence in storage
Data Abstraction
• Abstracts the data interface for applications
• Creates schemas and views of data as applications
need
• Combines data from multiple sources
• Filtering, selecting, projecting, and reformatting the
data to serve the client applications
• Reconciles differences in data shape, format,
semantics, access protocol, and security
Application
• Reporting, Analytics, and Control
• Mission-critical business applications, such as generalized ERP or
specialized industry solutions
• Mobile applications that handle simple interactions
• Business intelligence reports, where the application is the BI server
• Analytic applications that interpret data for business decisions
• System management/control center applications that control the IoT
system itself and don’t act on the data produced by it
Collaboration and Processes
• Involves people and business processes
• Applications execute business logic to empower people
• People use applications and associated data for their
specific needs.
• Applications give the right data, at the right time to do the
right thing.
• People must be able to communicate and collaborate
ITU-T vs IWF (IoT World Forum)
• Both models are complimentary
• ITU-T focusses on the device and gateway level
• It is concerned with developing standards for
interaction with IoT devices
• The IWF is concerned with broader issues of
developing the applications, middleware and
support functions.
• IWF reference model is seven layered
Things
• Physical Object
• Computing H/W + S/W + Sensors + Network
• Degree of Smartness
• Autonomous Behavior
• Decision Making
• Adaptive
• Ensure
• Trust, Privacy, Security
IoT: Components

Identi
ficatio
n
Sema Sensi
ntics ng

Servic
IoT Actua
es tion

Comp Com
utatio munic
n ation
Identification
• Naming:
• Electronics Product Code (EPC)
• Ubiquitous Code (uCode)

• Addressing:
• IPv4
• IPv6
Sensing
• Employs various sensors
• Specialized sensors for various applications
• Smart Sensors
• Wearable Sensing Devices
• Embedded Sensors
• Sense the data
• Transmit to the gateways
Actuation
• Sensor and data analytics technologies from
the IoT are used to send commands to smart
devices
• Decisions are taken on edge/cloud and passed
on to the devices to act upon
• Artificial Intelligence may be used to act
according to the context and environment
Ex: Water Level Sensor & Smart Electric Motor
Communication
Multiple radio access technology
• Connects intelligent devices at the edge
• facilitates machine to machine communication
Scope Connectivity
Cellular 3G, 4G, LTE, 5G
(In Near Future)

Short Range Wi-Fi, Bluetooth,


6LoWPAN, NGC
Medium Long Range WiMAX, Z-Wave,
ZigBee
Communication
Internet is the primary medium
• To connect to the cloud
Moving towards next generation IoT
Ex: 5G

Layer Protocols
Network Layer IPv4, IPv6, IPSec, NanoIP,
6LoWPAN
Transport Layer TCP, UDP, DTLS
Application Layer CoAP, MQTT, XMPP, HTTP,
AMQP
IoT: Protocols
IoT: Protocols Stack
IoT: Protocols Stack
IoT: Emerging Protocols

IEEE 802.15.4

6LoWPAN

RPL and IPv6


CoAP

MQTT
IoT: Communication Features

• Different underlying networks:


 abstraction of the different underlying networks (e.g.,
wired, wireless, cellular), support for different
communication modes (e.g., access point-based, p2p
fashion

• Addressing modes
 support of any cast/unicast/multicast/broadcast
transmissions, dynamic replacing of broadcast with
multicast/anycast to reduce network load
IoT: Communication Features

• Massive device transmission:


 handling simultaneous or nearly simultaneous
transmissions from huge number of devices (i.e., efficient
MAC protocols)

• High reliability:
 guarantee of connectivity/reliable transmissions based on
different solutions (e.g., link adaptation protocols,
modulation/coding schemes, multi-path establishment)
IoT: Communication Features

• Enhanced access priority:


 management of priority levels of services and
communications services (e.g., preemption
Mechanisms)

• Path Selection:
 optimization of communication paths based on
different policies (e.g., network cost, delay,
transmission failures), dynamic metric selection
IoT: Communication Features

• Mobility:
 seamless roaming and mobility, communication
management towards stationary and low-mobile devices

• Sleeping Device:
 managing communication towards sleeping devices.

• Low power consumption:


 include mechanisms for reducing energy consumption
IoT: Communication Features

• Notification and interaction:


 functions for supporting data acknowledgment, failure
notifications, and interaction mode

• Traffic Profile:
 management of data traffic with different traffic
profiles (e.g., continuous transmissions, long periods
between two data transmissions, small amount of
transmitted data, burst of data,
bidirectional/unidirectional transmissions)
IoT: Communication Features

• Time dependent traffic:


 support of data traffic with different time requirements (e.g., time-
controlled traffic, delay-tolerant traffic, extremely low-latency traffic)

• Location reporting support:


 report the device/gateway location to other devices/applications
continuously/upon request

• Secure connections:
 integrity of communications and timestamps, anonymity of identity
and location, detection of abnormal events
Computation
• Hardware:
• Smart-Things
• Arduino
• Intel Galileo
• Raspberry Pi
• Beagle Bone
• Smart Phones
• Phidgets
• Data is processed both locally and on cloud
• Wider horizon in terms of space, time and type of
information for intelligent processing
Computation
• Software:

OS Cloud
• Contiki • Nimbits
• TinyOS • Hadoop
• LiteOS • AWS-IoT
• RIoT • IBM-Watson
• Android • Cisco-IoT
Services
• Identity Related (Shipping)
• Information Aggregation (Smart Grid)
• Collaborative Aware (Smart Home)
• Ubiquitous (Smart Home)
• Smart Retail
• Smart Building
Semantics
• Resource Description Framework (RDF)
• Web Ontology Language (OWL)
• Efficient XML Interchange (EXI)
IoT: Applications
Applications: Transportation
• ConLock
• ContainerSafe
• Integration of light
sensors GPS and GSM
Applications: Smart City
• Residential E-meters
• Smart street lights
• Pipeline leak detection
• Traffic control
• Surveillance cameras
• Centralized and integrated system control
Applications: Smart Manufacturing
• Flow optimization
• Real time inventory
• Asset tracking
• Employee safety
• Predictive maintenance
• Firmware updates
Applications: Retail
• Intelligent Shopping
• Bar Code in Retail
• Electronic Tags
Applications: Management
• Data Management
• Waste Management
• Urban Planning
• Production
Management
Applications: Pharmaceuticals
• Intelligent tags for
drugs
• Drug usage tracking
• Enable the emergency
treatment to be given
faster and more
accurate
Applications: Food Processing
• Control geographical origin
• Food production
management
• Nutrition calculations
• Prevent overproduction and
shortage
• Control food quality, health
and safety.
Applications: Education
• School Administration
• Attendance Management
• Voting System
• Automatic Feedback
• Instructional Technology
• Media
• Information management
• Foreign language learning
IoT: Challenges
• Scalability
• Security
• Privacy
• Heterogeneity
• Technological standards
• Software complexity
• Costly infrastructure
Security
• Key issue in any system
• Keep the things from unauthorized access
• Security in physical access
• Network and Communications Security
• Data Security
• Application Security
• Reprogrammable chips improves security and
flexibility, and enables downstream configuration
Security
Pervasive security throughout the IoT Reference Model
IoT: Pros and Cons
Time for Questions

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy