Download - Internet of Things
By Pratibha KumariNIT Warangal
Roll No. 144562
Generations of Internet• First generation(Web 1.0):
• 1st generation began with the hyperlinks between the webpage
• There were only static pages
• Static web pages containing text/graphics, images and other multimedia files, hyperlinks were used to navigate between them
• Second generation(Web 2.0): • Focus on power of community
• Interoperability in large heterogeneous network made of several LANs
• Allows information sharing with a social media
• User-generated content in a virtual community
• Search for information through Keyword
• Third generation(Web 3.0): • Also Called the Semantic Web
• Organizes information in a more logical way or natural language so thatsoftware agents can read and use them to share and integrate.
• Search engines are much smarter and search engine will understandwho you are, what you've been doing, and where you'd like to go next.
• Smart objects
• Beyond M2M communication
Generations of Internet Contd.
How big is our internet?• 14.3 Trillion - Webpages, live on the Internet.
• 48 Billion - Webpages indexed by Google.Inc.
• 14 Billion - Webpages indexed by Microsoft's Bing.
• 672 Exabytes - 672,000,000,000 Gigabytes (GB) of accessible data.
• Over 9,00,000 Servers - Owned by Google.Inc, the Largest in the world.
All this adds to more than 5000 exa bytes and growing
1 exabyte: 1 billion Gigabytes
It starts with a Lipstick, Funny!
• While Kevin Ashton was working ata P&G store, a particular shade oflipstick was missing regularly
• In the 1980s and ’90s, retailersinvested in bar code scanningsystems, but bar codes couldn’trelay much about a product’slocation
• Then came the radio enabledcustomer cards
• A thought occurred to Ashton:What if I took the radio microchipout of the credit card and stuck iton the missing lipsticks?
“If we had computers that knew everything there was to know about things—using data they gathered without any help from us: we would be able to track and count everything, and greatly reduce waste, loss and cost.We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best.We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory.”
The Idea: by Kevin Ashton, at MIT in 2000
IoT Definition
The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction using IP connectivity.
Internet of Things Explained
Evolution of home, mobile and embeddedapplications that will be connected to internetenabling better compute capability, and usingdata analytics to extract meaningfulinformation
Billions of devices are connected to internetand soon 100s of billions of devices will beconnected
As related devices connect with each otherthey can become an intelligent system ofsystems
When these Intelligent systems of systems transform data over network and cloud they can transform businesses, our lives and our world in countless ways
What are ‘THINGS’ in IoT?
Any natural or man-made Objects
Humans
Smart Devices
Computers
Animals
Automobiles
Buildings
An Example to Begin With
From anywhere in the world, we wish to know:
Is this chair occupied?
If yes, who is sitting in the chair?
How Will we do that?
• A unique address
• Ability to communicate
• Sensors to sense the environment
• Pressure Sensor
• RFID tag reader
• A mechanism of control
How Will we do that?
A3:h2:61:81:hb
RFIDWireless Sensor NodesBarcodeZigbee and Smartphones
A wide range of sensing
capability is needed to
detect:
Location
Vibraion
Motion
Pressure
Temperature and
.............
To enhance the power of network by developing processing capabilities at different parts of the network
To make smaller and smaller things to have the capability to connect and interact
Unique Identification of Objects
• Radio Frequency Identification (RFID)
RFID
Passive RFID tags Active RFID tags•No Battery •Use power of reader’s interrogation signal to communicate the ID to reader
•Battery powered tags•Can instantiate a communication
• Wireless Sensor Networks (WSN)
– Typically a node (WSN core hardware) contains sensorinterfaces, processing units, transceiver units and powersupply.
– Nodes in a WSN need to communicate among themselvesto transmit data in single or multi-hop to a base station.
– The nodes are expected to be deployed in an ad-hocmanner for most applications. Designing an appropriatetopology, routing and MAC layer is critical for thescalability and longevity of the deployed network.
Unique Identification of Objects
• ZigBee– It is a mesh network specification to create low-power PANs for
transmission distances of 10 – 100 metres
– The standard was designed to provide high data throughput inapplications where the duty cycle is low and low powerconsumption is an important consideration
Unique Identification of Objects
SpecificationsBased on IEEE 802.15.4 standardData rate of 250 kbit/sUses ISM radio band of 2.4 GHz
Addressing Scheme
Required features of the addressing scheme
• Uniqueness The ability to uniquely identify ‘Things’from all the other things
– A unique identifier(UID) is assigned to at most one objectin universe(for Global UID), or within a particular scope
– Heterogeneous nature of wireless nodes
– Variable data types
– Confluence of data from devices
• Persistence/Longevity The lifetime of an identifiershould ideally be the same as the lifetime of the object itidentifies
• Reliability Persistent network functioning to channelthe increasing data traffic is another challenge to IoT
– Scalability of existing network
– Addition of new devices must not hamper theperformance of network
– Reliability of data over internet
Addressing Scheme Contd.
Uniform Resource Identifier
• URI is an internet standard or resource naming and identification
• Consists of 2 parts:
– Uniform resource Name/URN ( Higher network layers)
– Uniform Resource ocator/URL( lower layers)
URN URL
Wireless Communication
Comparison of some Wireless Standards
Sensors and Actuators
Sensors are important for tagging, tracking,locating, monitoring things, and for enablingthings to be aware of the environment aroundthem
What should the sensors detect?
Luminosity
Intensity
Temperature
Pressure
Stress
Rotary angle Pressure
Proximity
Vibration
Movement
Sound/AudioTouch
Water Levels/Leaks
PositionVelocity
Displacement
NoiseHumidity
Force
Chemicals
Where from should the power come for the sensors?
• With– Over 5 billion IoT devices employed today
– Expected to reach 20 billion by 2020
Power consumption for sensors is going to be huge
• Supply from power mains & battery use become impractical
• The sensor nodes should harvest energy from the environment like
- Solar powered- Wind energy- Hydro energy
• Sensors should be designed for ultra low power consumption
Other requirements for sensors
• Long lifetime
• Since it is impossible to make a customized chip for every application, a highly modular approach is needed
• Reliability
• Scalability
• Communication and Connectivity
Some Numbers
• Sensors in an iphone– Accelerometer,
– Gyroscope,
– Magnetometer,
– Compass,
– Proximity,
– Light,
– Moisture,
– Location (GPS), and
– Temperature.
• Sensors on a Kintex 7 board
– Temperature
– Power supply sensors
Cost of bandwidth
Cost of processing
Big Data
Smart Phones
Ubiquitous Wireless Connectivity
Scalability of IPv6
Key Drivers of IoTCost of sensors Scalable Cloud Computing
IoT Layered Architecture
• Sensor Layer/Edge Layer:– The lowest layer is made up of smart objects
integrated with sensors
– Enables interconnection of the physical and digitalworlds allowing real-time information to becollected and processed
• Access gateway layer:– Provides a robust communication channel for the
large amount of data produced by sensors
– Also performs cross platform communication ifrequired.
IoT Layered Architecture Contd.
• Middleware layer:– It is responsible for critical functions such as device
management and information processing and alsotakes care of issues like data filtering, dataaggregation, semantic analysis, access control
• Application layer:– Responsible for delivery of various applications to
different users in IoT
– The applications can be from different industryverticals such as: manufacturing, logistics, retail,environment, public safety, healthcare, food and drugetc.
IoT Layered Architecture Contd.
Open Problems and Challenges to IoT
1. Standardization
• Absence of governance
• Technology standardizations is still fragmented
• Several standardization efforts are being made
– Open Interconnect Consortium: Atmel, Dell, Intel, Samsung and Windriver
– Industrial Internet Consortium: Intel, Cisco, GE, IBM
Key Standards Emerging for Internet of Things
Lightweight protocols for devices to work together, communicate
OASIS MQTT, MQTT-SN
OASIS SmartGrid projects
Unique and extensible identifiers for all those billions of devices
Multiple new projects, XRI, UUIDs, etc.
Demand for API access and interoperability
SOA/Cloud orchestration and API standardization (AMQP, MQTT, OData)
Cybersecurity KMIP, SAML, XACML/JSON, PKCS11, CloudAuthZ
Privacy and Policy PMRM, PbDSE, and Personal Data Stores
2. Scalability• Number of devices is increasing exponentially
→How can they uniquely be tagged?→How can data generated by these devices be managed?
3. Addressing Issues
• IPv4 has already exhausted
• So we are moving towards IPv6:
• IPv6 offers 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses
This amounts to 340 trillion, trillion,
trillion
Comparison of IP v4 with IPv6
4. New Traffic to Handle
• The characteristics of smart objects traffic in IoT isstill not known
• Since the world of physical things is extremelydiverse, each type of smart object is likely to havedifferent information, processing andcommunication capabilities
• WSNs traffic strongly depends on application
• As objects have to function with minimal number ofresources a more extensive software infrastructureis needed on the network and background servers
5. Security and Privacy
• Physical attack
• As the IoT connects more devices together, itprovides more decentralized entry points formalware
• Not possible to implement complex securityschemes on low computing wireless nodes
• Authentication problem
• Data integration
Other Issues
• Managing and fostering rapid innovation
• Societal acceptance
• Resource efficiency
• Pollution and disaster avoidance
Applications
Environment
Big Belly Integrated Marine Observing System Invisible Track
Industry Control Systems
• Supervisory Control and Data Acquisition(SCADA)
– Over a large area spanning thousands of square kilometres, e.g., power grids, gas pipeline
• Distributed Control Systems(DCMs)
– Within one location, e.g., waste water treatment plant
• Programmable Logic Controllers
– Devices that for this SCADA and DCMs, e.g., assembly lines
Industry Control Systems Example: Smart Grid
Smart Grids can •Identify surges, outages, and failure points•Reroute power around failure •Accommodate new off grid energy resources•Perform load balancing dynamically
Health Care
Mimo Baby Monitor Cardio MEMS Heart Sensor Glucose Meter
Home Automation and Domotics
Transport
Smart Propane Tank MEMS based Sensors for traffic monitoring
Technical papers•That 'Internet of Things' In the real world, things matter more than ideas. By KevinAshton -- 2001•IEEE IoT at work by A. M. Houyou, H.-P. Huth, S. Mechs G. Völksen, H.–J. Hof, J. Gessner(Siemens) Christos Kloukinas, Igor Siveroni (City) H. Trsek (inIT) -- 2011•IEEE A special report on Internet of things -- 2014•http://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the internet-of-things-024571.php•Sources: Cisco IBSG, 2011; U.S. Census Bureau, 2011.•White paper on The Internet of Things and Sensors and Actuators by Vint Serf(VP andChief Internet Evangelist, Google) – 2012•Internet of Things: Converging Technologies for Smart Environments and IntegratedEcosystems by Dr. Ovidiu Vermesan and Dr. Peter Friess•Lutz Heuser, Zoltan Nochta, Nina-Cathrin Trunk. ICT Shaping the World: A ScientificView. ETSI, WILEY Publication.(2008)
Web pages•www.intel.com/IoT•www.cisco.com/iot/security•IBM Internet of things research page
References
THANK YOU!!!