Introduction/IOT/Sangeetha K/CSE/SNSCT
IDENTIFICATION OF IoT OBJECTS AND SERVICE
▪ Definition
various types of identifiers with different purposes.
Identification codes can be classified as
(i) object IDs (OIDs)
radio frequency identification (RFID)/
electronic product code (EPC),
content ID,
telephone number, and uniform resource identifier
(URI)/uniform resource locator (URL);
(ii) communication IDs.
media access control (MAC) address, network layer/IP address, and
session/protocol ID
Introduction/IOT/Sangeetha K/CSE/SNSCT
▪ It is also desirable as well as feasible for all end-point network locations and/or
intermediary-point network locations to have a durable, unique network address (NAdr)
Every object then has a tuple (OID, NAdr) that is always unique, although the second
entry of the tuple may change with time, location, or situation
*non-variable, or mostly static environment,, to assign the OID to be identical to the
NAdr where the object is expected to attach to the network; that is, the object inherits
the tuple (NAdr, NAdr)
Introduction/IOT/Sangeetha K/CSE/SNSCT 4
Introduction/IOT/Sangeetha K/CSE/SNSCT
RFID Senso
r
Smart
Tech
Nano
Tech
To identify
and track
the data of
things
To collect and
process the
data to detect
the changes
in the physical
status of
things
To enhance the
power of the
network by
evolving
processing
capabilities to
different part of
the network.
To make the
smaller and
smaller things
have the
ability to
connect and
interact.
Enabling Technologies
Introduction/IOT/Sangeetha K/CSE/SNSCT
Benefits of IoT
IoT offers a number of benefits to organizations, enabling them
to:
1. Monitor their overall business processes;
2. Improve the customer experience;
3. Save time and money;
4. Enhance employee productivity;
5. Integrate and adapt business models;
6. Make better business decisions;
7. Generate more revenue.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Consumer and enterprise IoT applications
Source:
https://internetofthi
ng
sagenda.techtarge
t.c
om/definition/Inter
net
-of-Things-IoT
Introduction/IOT/Sangeetha K/CSE/SNSCT
The Smart World of the future – using IoT
Source:
https://www.forbes.
c
om/sites/jacobmor
ga
n/2014/05/13/simp
le-
explanation-interne
t-
things-that-anyone-
can-
understand/#ef243
3f
1d091
Introduction/IOT/Sangeetha K/CSE/SNSCT
ITU-T Views
International Telecommunications Union – Telecommunications
The ITU-T is in the process of identifying a common way to
define/describe the IoT.
Infrastructure View - Internet as an infrastructure provide a number
of technological capabilities.
Concept View - Internet as an concept provide an array of data
exchange and linkage services.
View A: IoT is just a concept (conceptual aspects of definition)
View B: IoT is an infrastructure: The IoT refers to an infrastructure.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Sample: consumer IoT products & Services
1. Helmet Concussion Sensor
2. Medical Alert Watch
3. Smart Fitness Clothing and Smart Running Shoes
4. One-Button Product Purchases: “Order at the click of a button!” Amazon has taken that
phrase literally and produced physical branded buttons called Amazon Dash that link to
products in your home. Say you run out of laundry powder. You can press your Dash button
for Tide and Amazon will reorder your Tide Powder product for you. No need to sign onto the
Web, fumble with payment methods, or retype credit card numbers.
5. Garden Sensors
6. Smart Televisions
Introduction/IOT/Sangeetha K/CSE/SNSCT
Helmet concussion sensor
https://www.amazon.com/Shoc
k
box-LM2004-EXT-MultiSport-
Helmet-
Sensor/dp/B00DVHA1LM?impr
T
oken=NXcTrCppNfgrAo2MA1K
7
i
g&slotNum=2&SubscriptionId
=A
KIAIO22DD3AFUSKXUKQ&tag=
makeusw-
20&linkCode=xm2&camp=20
25
&creative=165953&creativeAS
IN
=B00DVHA1LM
Introduction/IOT/Sangeetha K/CSE/SNSCT
Amazon DASH
https://www.a
m
azon.com/b?ie
= UTF8&node=
17 729534011
IoT things
presentation
Introduction/IOT/Sangeetha K/CSE/SNSCT
Kinsa thermometer
Monitoring
your
temperature
and can call
your doctor as
necessary
Introduction/IOT/Sangeetha K/CSE/SNSCT
Connected car story
Source:
https://www.businessinsider.com/connected-c
ar-
statistics-manufacturers-2015-2?IR=T
The connected car is equipped with internet
connections and software that allow people to
stream music, look up movie times, be alerted
of traffic and weather conditions, and even
power driving-assistance services such as self-
parking.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Shopping
Experience
S
(2) When shopping in the market, the
goods
(1) When entering the doors, scanners
will identify the tags on her clothing.
(4) When paying for the goods, the
microchip of
the credit card will communicate with checkout
reader.
(3) When moving the goods, the
reader will tell the staff to put a
Introduction/IOT/Sangeetha K/CSE/SNSCT
Smart farming: Use of IoT to improve agriculture
In IoT-based smart farming, a system is built for monitoring the crop field with the help of
sensors (light, humidity, temperature, soil moisture, etc.) and automating the irrigation
system. The farmers can monitor the field conditions from anywhere. This is highly
efficient compared to the
traditional/conventional approach.
In terms of environmental issues, IoT-based smart farming provides great benefits
including: and efficient water usage, and optimization of inputs and treatments.
bette
r
Therefore, smart farming based on IoT technologies enables growers and farmers to reduce
waste and enhance productivity.
Some of the IoT applications in this area are:
i. Precision farming
ii. Agricultural drones
iii. Livestock monitoring
iv. Smart greenhouses
Introduction/IOT/Sangeetha K/CSE/SNSCT
Industrial Iot (IIoT)
Industrial IoT (IIoT) focusses on the use of cyber-physical systems to monitor the physical
factory processes and make data-based automated decisions.
While the physical systems are made the intelligent using IoT, the real-time
communication, and cooperation both with each other and with humans is established via
the wireless web
IIoT brings in the concept of ‘a connected factory leads to a smart factory’.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IIoT in
Manufacturing
1. Digital/connected factory: IoT enabled machinery can transmit operational information
to the partners like original equipment manufacturers and to field engineers.
2. Facility management: The use of IoT sensors in manufacturing equipment enables
condition- based maintenance alerts.
3. Production flow monitoring: IoT in manufacturing can enable the monitoring of production
lines starting from the refining process down to the packaging of final products.
4. Inventory management: IoT applications permit the monitoring of events across a supply
chain.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IIoT in Manufacturing
5. Plant Safety and Security: IoT combined big data analysis can improve the overall workers’
safety and security in the plant. .
6. Quality control: IoT sensors collect aggregate product data and other third-party syndicated
data
from various stages of a product cycle.
7. Packaging Optimization: By using IoT sensors in products and/or packaging, manufacturers
can gain insights into the usage patterns and handling of product from multiple customers.
8. Logistics and Supply Chain Optimization: The Industrial IoT (IIoT) can provide access to real-
time supply chain information by tracking materials, equipment, and products as they move
through the supply chain.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IOT CHALLENGES
Security, privacy and data sharing issues
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to
manipulate all the data, rendering it unusable. And manufacturers that don't update their devices
regularly -- or at all -- leave them vulnerable to cybercriminals.
However, hackers aren't the only threat to the internet of things; privacy is another major concern
for IoT users. For instance, companies that make and distribute consumer IoT devices could
use those devices to obtain and sell users' personal data.
Challenges with IIoT:
i. Security of data – same as above
ii. Reliability and stability – of IIoT sensors
iii. Connectivity of all the systems in IIoT setup – no maintenance envisioned?
iv. Blending legacy systems – IIoT is new in the market
22
Introduction/IOT/Sangeetha K/CSE/SNSCT
What NEEDS TO be done?
1. Consumer education
2. Product reviews and comparisons
3. Vulnerability disclosure and vulnerability markets
4. Self-certification and voluntary codes of practice
5. Trust marks and labels like Internet Society’s Online Trust Alliance (OTA) IoT Trust
Framework
6. Government initiatives
7. Mandated security requirements
8. Mandated certification
9. Liability reform
10. Etc.
11. No intervention!?
Introduction/IOT/Sangeetha K/CSE/SNSCT 24
Introduction/IOT/Sangeetha K/CSE/SNSCT
The future of IoT
Bain & Company expects annual IoT revenue of hardware and software to exceed $450
billion by 2020.
McKinsey & Company estimates IoT will have an $11.1 trillion impact by 2025.
IHS Markit believes the number of connected IoT devices will increase 12% annually to reach
125 billion in 2030.
Gartner assesses that 20.8 billion connected things will be in use by 2020, with total spend
on IoT devices and services to reach $3.7 trillion in 2021.
By 2023, the average CIO will be responsible for more than three times as many endpoints as
this year
– Gartner
Garter forecasts that worldwide IoT Security Spending will be 3.11 billion by 2021 largely
driven by regulatory compliance.
Great improvements in the security of IoT devices driven by manufacturers’ own initiatives
as well users’ demand for better secure devices.
Global manufacturers will use analytics data recorded from connected devices to analyze
processes
and identify optimization possibilities, according to IDC and SAP.
Business Insider forecasts that by 2020, 75 percent of new
cars will come with built-in IoT connectivity.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Basic Nodal Capabilities
Remote device generally needs to have a basic protocol stack
Basic protocol supports as minimum local connectivity and
networking connectivity.
In addition some higher layer application support protocols are
generally needed
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Retransmission – Network recovers from packet loss or informs application
Recovery is immediate: on the order of RTTs, not second
Network independent of MAC/PHY
Scale – Thousands of nodes – Multiple link speed
Multicast – Throughout network – Reliable (positive Ac)
Duplicate suppression
Emergency messages – Routed and/or queued around other traffic – Other traffic slushed
as delivered
Polling of nodes
Capabilities – Discover nodes – Discover node capabilities – Deliver multisegment records
Simple publish/subscribe parsers
Security –
Strong encryption
Mutual authentication –
Protection against record/playback attacks –
Suite B ciphers
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT FRAMEWORKS
The HLSA (high level M2M system architecture) comprises of
 the device and gateway domain
 the network domain
 the applications domain.
IoT FRAMEWORKS
The device and gateway domain is composed of the following
elements:
1. M2M device: A device that runs M2M application(s) using M2M
service capabilities. M2M devices connect to network domain in the
following manners:
Case 1 “Direct Connectivity”:M2Mdevices connect to the
network domain via the access network.
Case 2 “Gateway as a Network Proxy”: The M2M device
connects to the network domain via an M2M gateway.
2. M2M area network: It provides connectivity between M2M
devices and M2M gateways
3. M2M gateway: A gateway that runs M2M application(s) using M2M service capabilities.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
The network domain is composed of the following elements:
1.Access network: A network that allows the M2M device and gateway domain to communicate with the core
network.
2. Core network: A network that provides the following :
– IP connectivity - minimum and possibly other connectivity means
– Service and network control functions
– Interconnection (with other networks)
– Roaming
3. M2M service capabilities:
– Provide M2M functions - to be shared by different applications
– Expose functions through a set of open interfaces
– Use Core Network functionalities
– Simplify and optimize application development and deployment through hiding of network specificities
The applications domain is composed of the following elements:
 M2M applications: Applications that run the service logic and use M2M service capabilities accessible via an
open interface.
 Other management functions within an overall M2M service provider domain, as follows:
 Network management functions - functions required to manage the access and core networks
 M2M management functions - required to manage M2M service capabilities in the network domain
Introduction/IOT/Sangeetha K/CSE/SNSCT
Physical Design of IoT
Things/Devices are used to build a connection, process
data, provide interfaces, provide storage, and provide
graphics interfaces in an IoT system
Protocols that are used to establish
communication between the Node devices and
servers over the internet.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Things/Devices are used to build a connection, process
data, provide interfaces, provide storage, and provide
graphics interfaces in an IoT system
Introduction/IOT/Sangeetha K/CSE/SNSCT
Protocols that are used to establish
communication between the Node devices and
servers over the internet.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Logical Design of IoT
IOT Functional Blocks
Introduction/IOT/Sangeetha K/CSE/SNSCT
IOT Communicational Model
Publish-Subscribe Communication Model
Introduction/IOT/Sangeetha K/CSE/SNSCT
Push-Pull Communication Model
IoT communication APIs
REST-based communication APIs
WebSocket based communication API
Client Server, Stateless, Cache
Full Duplex Communication
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT Levels & Deployment Templates
Developing an IoT Level Template system consists of the following components:
1. Device: These may be sensors or actuators capable of identifying, remote sensing, or
monitoring.
2. Resources: These are software components on IoT devices for accessing and processing.
storing software components or controlling actuators connected to the device. Resources
also include software components that enable network access.
3. Controller Service: It is a service that runs on the device and interacts with web services.
The controller service sends data from the device to the web service and receives
commands from the application via web services for controlling the device.
4. Database: Stores data generated from the device
5. Web Service: It provides a link between IoT devices, applications, databases, and analysis
components.
6. Analysis Component: It performs an analysis of the data generated by the lol device and
generates results in a form which are easy for the user to understand.
7. Application: It provides a system for the user to view the system status and view product
data. It also allows users to control and monitor various aspects of the IoT system.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 1
IoT system-level-l is the best example for modeling low complexity and low-cost solution where the analysis
requirement
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 2
A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is
facilitated where the data involved is big and primary analysis is not comprehensive
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 3
At this level, the application is cloud-based. A single node monitors the environment
and stores data in the cloud. This is suitable where data is comprehensive and analysis
1 computationally intensive.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 4
At this level, Multiple nodes collect information and store it in the cloud. Local and rent server
nodes are used to grant and receive information collected in the cloud from various devices.
Observer nodes can process information and use it for applications but not perform control
functions, This level is the best solution where data involvement is big, requirement analysis is
comprehensive and multiple nodes are required,
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT level 5
In this level Nodes present locally are of two types end Nodes and coordinator nodes. End nodes
collect data and perform sensing or actuation or both. Coordinator nodes collect data from end
nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for
WSN, where the data involved is big and the requirement analysis is comprehensive.
Introduction/IOT/Sangeetha K/CSE/SNSCT
IoT Level-6
At this level, the application is also cloud-based and data is stored in the cloud-like of levels.
Multiple independent end nodes perform sensing and actuation and send d to the cloud. The
analytics components analyze the data and store the results in the cloud database. The results
are visualized with a cloud-based application. The centralized controller is aware of the status
of all the end nodes and sends control commands to the nodes.
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
Introduction/IOT/Sangeetha K/CSE/SNSCT
1.Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving
W orld of M2M Communications, Wiley Publications, First Edition, 2013. (UNIT I-
IV)
2. Arsheep Bahga , Vijay Madisetti , Internet of Things: A Hands-On Approach,
Universities Press, First Edition , 2014.(UNIT I & V)
References :
06/08/2020
226
Introduction/IOT/Sangeetha K/CSE/SNSCT 28
Introduction/Data Analytics/Sangeetha K/CSE/SNSCT

More Related Content

PPTX
IoT internet of things internet of things
PPTX
IoT.pptx
PPTX
Internet Of Things: what's IOT Concept .pptx
PPTX
3 - IoT Applications.pptx
PPTX
The internet of things (io t)
PPTX
The internet of things (io t) : IoT academy
PPTX
IOT PPT.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
IoT internet of things internet of things
IoT.pptx
Internet Of Things: what's IOT Concept .pptx
3 - IoT Applications.pptx
The internet of things (io t)
The internet of things (io t) : IoT academy
IOT PPT.pptx
Internet of Things (IOT) - A guide to understanding

Similar to UNIT I-1.Introduction_7.08.24 - Copy.pptx (20)

PDF
iot pdf
PPTX
Internet of Things (IoT)
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
PDF
02_Internet-of-things-Final PPT.pdf
PPTX
19ESKCS144_Mohit_Jain_IOT.pptx
PPTX
Iot.pptx
PPTX
IoT Intro.pptx
PPTX
Internet of thinks iot sysytem agriculture .pptx
PPTX
Internet of things (IOT) Presentation-PPT
DOCX
Internet Of Things (IOT)
PDF
Introduction to Internet of Things (IoT)
PPTX
Internet of Things (IOT)-midterm.pptx
PDF
Industry 4.0: Transforming Modern Manufacturing and Beyond
PPTX
Presentation on Internet of Things
PPTX
Internet of things (IoT)
PPTX
The internet of things
PPTX
IOT Demystified
PPT
Unit 6 Final ppt (1).ppt
PPTX
IoT and Big Data.pptx
iot pdf
Internet of Things (IoT)
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
02_Internet-of-things-Final PPT.pdf
19ESKCS144_Mohit_Jain_IOT.pptx
Iot.pptx
IoT Intro.pptx
Internet of thinks iot sysytem agriculture .pptx
Internet of things (IOT) Presentation-PPT
Internet Of Things (IOT)
Introduction to Internet of Things (IoT)
Internet of Things (IOT)-midterm.pptx
Industry 4.0: Transforming Modern Manufacturing and Beyond
Presentation on Internet of Things
Internet of things (IoT)
The internet of things
IOT Demystified
Unit 6 Final ppt (1).ppt
IoT and Big Data.pptx
Ad

More from hodcse768718 (7)

PPTX
5.Interface-Circuits-and-Standard-IO-Interfaces.pptx
PPTX
4.Unlocking-Peak-Performance-A-Comprehensive-Guide.pptx
PPTX
7.Understanding of Secondary Storage.pptx
PPTX
3.Direct-Memory-Access-DMA-Overview.pptx
PPTX
Bus-Structures-Unlocking-System-Performance.pptx
PPTX
Input output Devices& accessing,utilization .pptx
PPTX
WPAN technologies and its wipe spread usage
5.Interface-Circuits-and-Standard-IO-Interfaces.pptx
4.Unlocking-Peak-Performance-A-Comprehensive-Guide.pptx
7.Understanding of Secondary Storage.pptx
3.Direct-Memory-Access-DMA-Overview.pptx
Bus-Structures-Unlocking-System-Performance.pptx
Input output Devices& accessing,utilization .pptx
WPAN technologies and its wipe spread usage
Ad

Recently uploaded (20)

PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PDF
Research on ultrasonic sensor for TTU.pdf
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PDF
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
PPTX
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PPTX
Wireless sensor networks (WSN) SRM unit 2
PPTX
Software-Development-Life-Cycle-SDLC.pptx
PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
Cryptography and Network Security-Module-I.pdf
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
Research on ultrasonic sensor for TTU.pdf
CS6006 - CLOUD COMPUTING - Module - 1.pptx
Artificial Intelligence_ Basics .Artificial Intelligence_ Basics .
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Wireless sensor networks (WSN) SRM unit 2
Software-Development-Life-Cycle-SDLC.pptx
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
Environmental studies, Moudle 3-Environmental Pollution.pptx
Design ,Art Across Digital Realities and eXtended Reality
Cryptography and Network Security-Module-I.pdf
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf

UNIT I-1.Introduction_7.08.24 - Copy.pptx

  • 1. Introduction/IOT/Sangeetha K/CSE/SNSCT IDENTIFICATION OF IoT OBJECTS AND SERVICE ▪ Definition various types of identifiers with different purposes. Identification codes can be classified as (i) object IDs (OIDs) radio frequency identification (RFID)/ electronic product code (EPC), content ID, telephone number, and uniform resource identifier (URI)/uniform resource locator (URL); (ii) communication IDs. media access control (MAC) address, network layer/IP address, and session/protocol ID
  • 2. Introduction/IOT/Sangeetha K/CSE/SNSCT ▪ It is also desirable as well as feasible for all end-point network locations and/or intermediary-point network locations to have a durable, unique network address (NAdr) Every object then has a tuple (OID, NAdr) that is always unique, although the second entry of the tuple may change with time, location, or situation *non-variable, or mostly static environment,, to assign the OID to be identical to the NAdr where the object is expected to attach to the network; that is, the object inherits the tuple (NAdr, NAdr)
  • 4. Introduction/IOT/Sangeetha K/CSE/SNSCT RFID Senso r Smart Tech Nano Tech To identify and track the data of things To collect and process the data to detect the changes in the physical status of things To enhance the power of the network by evolving processing capabilities to different part of the network. To make the smaller and smaller things have the ability to connect and interact. Enabling Technologies
  • 5. Introduction/IOT/Sangeetha K/CSE/SNSCT Benefits of IoT IoT offers a number of benefits to organizations, enabling them to: 1. Monitor their overall business processes; 2. Improve the customer experience; 3. Save time and money; 4. Enhance employee productivity; 5. Integrate and adapt business models; 6. Make better business decisions; 7. Generate more revenue.
  • 6. Introduction/IOT/Sangeetha K/CSE/SNSCT Consumer and enterprise IoT applications Source: https://internetofthi ng sagenda.techtarge t.c om/definition/Inter net -of-Things-IoT
  • 7. Introduction/IOT/Sangeetha K/CSE/SNSCT The Smart World of the future – using IoT Source: https://www.forbes. c om/sites/jacobmor ga n/2014/05/13/simp le- explanation-interne t- things-that-anyone- can- understand/#ef243 3f 1d091
  • 8. Introduction/IOT/Sangeetha K/CSE/SNSCT ITU-T Views International Telecommunications Union – Telecommunications The ITU-T is in the process of identifying a common way to define/describe the IoT. Infrastructure View - Internet as an infrastructure provide a number of technological capabilities. Concept View - Internet as an concept provide an array of data exchange and linkage services. View A: IoT is just a concept (conceptual aspects of definition) View B: IoT is an infrastructure: The IoT refers to an infrastructure.
  • 10. Introduction/IOT/Sangeetha K/CSE/SNSCT Sample: consumer IoT products & Services 1. Helmet Concussion Sensor 2. Medical Alert Watch 3. Smart Fitness Clothing and Smart Running Shoes 4. One-Button Product Purchases: “Order at the click of a button!” Amazon has taken that phrase literally and produced physical branded buttons called Amazon Dash that link to products in your home. Say you run out of laundry powder. You can press your Dash button for Tide and Amazon will reorder your Tide Powder product for you. No need to sign onto the Web, fumble with payment methods, or retype credit card numbers. 5. Garden Sensors 6. Smart Televisions
  • 11. Introduction/IOT/Sangeetha K/CSE/SNSCT Helmet concussion sensor https://www.amazon.com/Shoc k box-LM2004-EXT-MultiSport- Helmet- Sensor/dp/B00DVHA1LM?impr T oken=NXcTrCppNfgrAo2MA1K 7 i g&slotNum=2&SubscriptionId =A KIAIO22DD3AFUSKXUKQ&tag= makeusw- 20&linkCode=xm2&camp=20 25 &creative=165953&creativeAS IN =B00DVHA1LM
  • 14. Introduction/IOT/Sangeetha K/CSE/SNSCT Connected car story Source: https://www.businessinsider.com/connected-c ar- statistics-manufacturers-2015-2?IR=T The connected car is equipped with internet connections and software that allow people to stream music, look up movie times, be alerted of traffic and weather conditions, and even power driving-assistance services such as self- parking.
  • 15. Introduction/IOT/Sangeetha K/CSE/SNSCT Shopping Experience S (2) When shopping in the market, the goods (1) When entering the doors, scanners will identify the tags on her clothing. (4) When paying for the goods, the microchip of the credit card will communicate with checkout reader. (3) When moving the goods, the reader will tell the staff to put a
  • 16. Introduction/IOT/Sangeetha K/CSE/SNSCT Smart farming: Use of IoT to improve agriculture In IoT-based smart farming, a system is built for monitoring the crop field with the help of sensors (light, humidity, temperature, soil moisture, etc.) and automating the irrigation system. The farmers can monitor the field conditions from anywhere. This is highly efficient compared to the traditional/conventional approach. In terms of environmental issues, IoT-based smart farming provides great benefits including: and efficient water usage, and optimization of inputs and treatments. bette r Therefore, smart farming based on IoT technologies enables growers and farmers to reduce waste and enhance productivity. Some of the IoT applications in this area are: i. Precision farming ii. Agricultural drones iii. Livestock monitoring iv. Smart greenhouses
  • 17. Introduction/IOT/Sangeetha K/CSE/SNSCT Industrial Iot (IIoT) Industrial IoT (IIoT) focusses on the use of cyber-physical systems to monitor the physical factory processes and make data-based automated decisions. While the physical systems are made the intelligent using IoT, the real-time communication, and cooperation both with each other and with humans is established via the wireless web IIoT brings in the concept of ‘a connected factory leads to a smart factory’.
  • 18. Introduction/IOT/Sangeetha K/CSE/SNSCT IIoT in Manufacturing 1. Digital/connected factory: IoT enabled machinery can transmit operational information to the partners like original equipment manufacturers and to field engineers. 2. Facility management: The use of IoT sensors in manufacturing equipment enables condition- based maintenance alerts. 3. Production flow monitoring: IoT in manufacturing can enable the monitoring of production lines starting from the refining process down to the packaging of final products. 4. Inventory management: IoT applications permit the monitoring of events across a supply chain.
  • 19. Introduction/IOT/Sangeetha K/CSE/SNSCT IIoT in Manufacturing 5. Plant Safety and Security: IoT combined big data analysis can improve the overall workers’ safety and security in the plant. . 6. Quality control: IoT sensors collect aggregate product data and other third-party syndicated data from various stages of a product cycle. 7. Packaging Optimization: By using IoT sensors in products and/or packaging, manufacturers can gain insights into the usage patterns and handling of product from multiple customers. 8. Logistics and Supply Chain Optimization: The Industrial IoT (IIoT) can provide access to real- time supply chain information by tracking materials, equipment, and products as they move through the supply chain.
  • 20. Introduction/IOT/Sangeetha K/CSE/SNSCT IOT CHALLENGES Security, privacy and data sharing issues Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. And manufacturers that don't update their devices regularly -- or at all -- leave them vulnerable to cybercriminals. However, hackers aren't the only threat to the internet of things; privacy is another major concern for IoT users. For instance, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users' personal data. Challenges with IIoT: i. Security of data – same as above ii. Reliability and stability – of IIoT sensors iii. Connectivity of all the systems in IIoT setup – no maintenance envisioned? iv. Blending legacy systems – IIoT is new in the market 22
  • 21. Introduction/IOT/Sangeetha K/CSE/SNSCT What NEEDS TO be done? 1. Consumer education 2. Product reviews and comparisons 3. Vulnerability disclosure and vulnerability markets 4. Self-certification and voluntary codes of practice 5. Trust marks and labels like Internet Society’s Online Trust Alliance (OTA) IoT Trust Framework 6. Government initiatives 7. Mandated security requirements 8. Mandated certification 9. Liability reform 10. Etc. 11. No intervention!?
  • 23. Introduction/IOT/Sangeetha K/CSE/SNSCT The future of IoT Bain & Company expects annual IoT revenue of hardware and software to exceed $450 billion by 2020. McKinsey & Company estimates IoT will have an $11.1 trillion impact by 2025. IHS Markit believes the number of connected IoT devices will increase 12% annually to reach 125 billion in 2030. Gartner assesses that 20.8 billion connected things will be in use by 2020, with total spend on IoT devices and services to reach $3.7 trillion in 2021. By 2023, the average CIO will be responsible for more than three times as many endpoints as this year – Gartner Garter forecasts that worldwide IoT Security Spending will be 3.11 billion by 2021 largely driven by regulatory compliance. Great improvements in the security of IoT devices driven by manufacturers’ own initiatives as well users’ demand for better secure devices. Global manufacturers will use analytics data recorded from connected devices to analyze processes and identify optimization possibilities, according to IDC and SAP. Business Insider forecasts that by 2020, 75 percent of new cars will come with built-in IoT connectivity.
  • 25. Introduction/IOT/Sangeetha K/CSE/SNSCT Basic Nodal Capabilities Remote device generally needs to have a basic protocol stack Basic protocol supports as minimum local connectivity and networking connectivity. In addition some higher layer application support protocols are generally needed
  • 27. Introduction/IOT/Sangeetha K/CSE/SNSCT Retransmission – Network recovers from packet loss or informs application Recovery is immediate: on the order of RTTs, not second Network independent of MAC/PHY Scale – Thousands of nodes – Multiple link speed Multicast – Throughout network – Reliable (positive Ac) Duplicate suppression Emergency messages – Routed and/or queued around other traffic – Other traffic slushed as delivered Polling of nodes Capabilities – Discover nodes – Discover node capabilities – Deliver multisegment records Simple publish/subscribe parsers Security – Strong encryption Mutual authentication – Protection against record/playback attacks – Suite B ciphers
  • 28. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT FRAMEWORKS The HLSA (high level M2M system architecture) comprises of  the device and gateway domain  the network domain  the applications domain. IoT FRAMEWORKS The device and gateway domain is composed of the following elements: 1. M2M device: A device that runs M2M application(s) using M2M service capabilities. M2M devices connect to network domain in the following manners: Case 1 “Direct Connectivity”:M2Mdevices connect to the network domain via the access network. Case 2 “Gateway as a Network Proxy”: The M2M device connects to the network domain via an M2M gateway. 2. M2M area network: It provides connectivity between M2M devices and M2M gateways 3. M2M gateway: A gateway that runs M2M application(s) using M2M service capabilities.
  • 31. Introduction/IOT/Sangeetha K/CSE/SNSCT The network domain is composed of the following elements: 1.Access network: A network that allows the M2M device and gateway domain to communicate with the core network. 2. Core network: A network that provides the following : – IP connectivity - minimum and possibly other connectivity means – Service and network control functions – Interconnection (with other networks) – Roaming 3. M2M service capabilities: – Provide M2M functions - to be shared by different applications – Expose functions through a set of open interfaces – Use Core Network functionalities – Simplify and optimize application development and deployment through hiding of network specificities The applications domain is composed of the following elements:  M2M applications: Applications that run the service logic and use M2M service capabilities accessible via an open interface.  Other management functions within an overall M2M service provider domain, as follows:  Network management functions - functions required to manage the access and core networks  M2M management functions - required to manage M2M service capabilities in the network domain
  • 32. Introduction/IOT/Sangeetha K/CSE/SNSCT Physical Design of IoT Things/Devices are used to build a connection, process data, provide interfaces, provide storage, and provide graphics interfaces in an IoT system Protocols that are used to establish communication between the Node devices and servers over the internet.
  • 33. Introduction/IOT/Sangeetha K/CSE/SNSCT Things/Devices are used to build a connection, process data, provide interfaces, provide storage, and provide graphics interfaces in an IoT system
  • 34. Introduction/IOT/Sangeetha K/CSE/SNSCT Protocols that are used to establish communication between the Node devices and servers over the internet.
  • 36. Introduction/IOT/Sangeetha K/CSE/SNSCT IOT Communicational Model Publish-Subscribe Communication Model
  • 37. Introduction/IOT/Sangeetha K/CSE/SNSCT Push-Pull Communication Model IoT communication APIs REST-based communication APIs WebSocket based communication API Client Server, Stateless, Cache Full Duplex Communication
  • 39. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT Levels & Deployment Templates Developing an IoT Level Template system consists of the following components: 1. Device: These may be sensors or actuators capable of identifying, remote sensing, or monitoring. 2. Resources: These are software components on IoT devices for accessing and processing. storing software components or controlling actuators connected to the device. Resources also include software components that enable network access. 3. Controller Service: It is a service that runs on the device and interacts with web services. The controller service sends data from the device to the web service and receives commands from the application via web services for controlling the device. 4. Database: Stores data generated from the device 5. Web Service: It provides a link between IoT devices, applications, databases, and analysis components. 6. Analysis Component: It performs an analysis of the data generated by the lol device and generates results in a form which are easy for the user to understand. 7. Application: It provides a system for the user to view the system status and view product data. It also allows users to control and monitor various aspects of the IoT system.
  • 40. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT level 1 IoT system-level-l is the best example for modeling low complexity and low-cost solution where the analysis requirement
  • 41. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT level 2 A node performs sensing/actuation and local analysis. Data is stored in the cloud. this level is facilitated where the data involved is big and primary analysis is not comprehensive
  • 42. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT level 3 At this level, the application is cloud-based. A single node monitors the environment and stores data in the cloud. This is suitable where data is comprehensive and analysis 1 computationally intensive.
  • 43. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT level 4 At this level, Multiple nodes collect information and store it in the cloud. Local and rent server nodes are used to grant and receive information collected in the cloud from various devices. Observer nodes can process information and use it for applications but not perform control functions, This level is the best solution where data involvement is big, requirement analysis is comprehensive and multiple nodes are required,
  • 44. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT level 5 In this level Nodes present locally are of two types end Nodes and coordinator nodes. End nodes collect data and perform sensing or actuation or both. Coordinator nodes collect data from end nodes and send it to the cloud. Data is stored and analyzed in the cloud. This level is best for WSN, where the data involved is big and the requirement analysis is comprehensive.
  • 45. Introduction/IOT/Sangeetha K/CSE/SNSCT IoT Level-6 At this level, the application is also cloud-based and data is stored in the cloud-like of levels. Multiple independent end nodes perform sensing and actuation and send d to the cloud. The analytics components analyze the data and store the results in the cloud database. The results are visualized with a cloud-based application. The centralized controller is aware of the status of all the end nodes and sends control commands to the nodes.
  • 49. Introduction/IOT/Sangeetha K/CSE/SNSCT 1.Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving W orld of M2M Communications, Wiley Publications, First Edition, 2013. (UNIT I- IV) 2. Arsheep Bahga , Vijay Madisetti , Internet of Things: A Hands-On Approach, Universities Press, First Edition , 2014.(UNIT I & V) References : 06/08/2020 226