internet of things

28
Internet of Things Design Aspects By Venkat Reddy Thangella (MT2013160) Sunkari Raja Shekhar Reddy (MT2013156)

Upload: venkat-thangella

Post on 27-Jan-2015

138 views

Category:

Internet


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Internet Of Things

Internet of Things Design Aspects

By Venkat Reddy Thangella (MT2013160)

Sunkari Raja Shekhar Reddy (MT2013156)

Page 2: Internet Of Things

Introduction The term Internet of Things was first coined by Kevin Ashton in 1999 in the context of supply chain management. Communication Technologies:

– Mobile wireless communications– Internet technology – Future is IOT

Internet- Connecting world

Internet of things-Controlling the world by using internet and establishing communication between devices/sensors and making life easier.

Page 3: Internet Of Things

Introduction contd...

Here devices could be microcontrollers or sensors which Sense from environment/nature, perform some analytics and give that as output.

Internet of things is Any thing connection Any place connection Any time connection

Page 4: Internet Of Things

Why Internet of Things

It is estimated by 2020 there would be 50 billion objects/devices connected to the Internet which includes almost every electronic products.

To Make life easier Improve the resource utilization ratio Better relationship between human and nature

Page 5: Internet Of Things

Feel of IOT...

What if..

Fire accident??

What if there is sudden fire accident/short circuit at your home when you were at your work place ??

Page 6: Internet Of Things

The application of IoT

Scenario: shopping

(2) When shopping in the market, the goods will introduce themselves.

(1) When entering the doors, scanners will identify the tags on her clothing.

(4) When paying for the goods, the microchip of the credit card will communicate with checkout reader.

(3) When moving the goods, the reader will tell the staff to put a new one.

Page 7: Internet Of Things

Wireless Sensor Network A wireless sensor network (WSN) of spatially distributed

autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location.

Page 8: Internet Of Things

8

Literature Survey Building Internet of things using RFID

RFID approach is discussed.

Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges.

- Architecture of IOT, its challenges and applications is discussed.

An Internet of Things (IoT) architecture for embedded appliances.

- How embedded appliances can be connected to internet is discussed.

Page 9: Internet Of Things

Technologies used with IOT Following technologies are being considered for

implementing device to device communication in IOT:

- RFID

- BLUETOOTH

- NFC

- Wifi

- WiMax etc..

The above technologies are short ranged communication technologies.

Page 10: Internet Of Things

Device to Device Communication using RFID

RFID (Radio Frequency Identification) devices are wireless microchips used for tagging objects for automated identification

RFID can identify objects wirelessly without line-of-sight RFID systems consist of a reading device called a reader, and

one or more tags. The reader is a powerful device with ample memory and

computational resources.

Page 11: Internet Of Things

11

Open Challenges

Interoperability is an issue.

Scalability, Reliability..

What kind of data formats need to be used ?.

How many functionalities can a device perform?.

Will it support legacy systems?

Life of a Network.

Page 12: Internet Of Things

12

Addressing Issues

Addressing each device uniquely is big concern.

IPv6 provides unique addressing to the 2^128 devices.

What if some more devices added to the Internet?

How about the security of each device connected to the Internet?

Even if, we chose to use IPv6. More the header wastage involved than the data provided by the Low-end devices.

Page 13: Internet Of Things

13

Other Issues Each end-node is low-power device.

Resource constrained.

Internet Protocol Stack is used then, it needs more memory and processing power.

Life of network will go down.

Queried for information on the end-node, if it is off. Who notifies it to the requester that it is not available ?.

Page 14: Internet Of Things

14

Other Issues(continued..)

How can a end-device configured to dynamic IP- addressing? .

If collision happen, how many times it will retry for retransmission?.

How can a requester will understand the data send by end-node?. It sends only raw data, otherwise lot of analytics is needed.

Multidisciplinary nodes, variable data types, and formats.

Page 15: Internet Of Things

15

Our Approach

Page 16: Internet Of Things

16

Architecture Network Level

System Level

End Device Level

Page 17: Internet Of Things

17

IPv6 Packet Format

Page 18: Internet Of Things

Adressing Schemes

Wireless sensor networks (considering them as building blocks of IoT), which run on a different stack compared to the Internet, it cannot possess IPv6 stack to address individually and hence a subnet with a gateway having a URN will be required.

BT devices emit signals with a unique Media Access Identification (MAC-ID) number that can be read by BT sensors within the coverage area.

Page 19: Internet Of Things

19

Changes to IPv6

Page 20: Internet Of Things

Device Addressing Table

Device Address Machine Address Last updated time at central node

Device Status

IP address/ Uniform Resource Name/ other

MAC ID

Eg: 10 msec

ON/OFF

Device Address: It is the unique address(may be universally accepted) assigned by central node to all the devices paired with it.

Machine Address:It is the unique address assigned to each device by manufacturer or vendor of respective device.

Last updated time at central node:It is the most recent time At which specific device has given a response to central node. Central node maintains Last updated time of all devices individually

Device Status: This field updates automatically which intimates centralnode the status of device i.e ON/OFF or any mal functioning.

Page 21: Internet Of Things

Information table

Machine Address Information present at central node

MAC ID

eg-: 30 degrees, 20 metres

Machine Address: It is the unique address assigned to each device by manufacturer or vendor of respective devices.

Information present at central node: It is the information given by respective devices upon sensing and processing internally.

Page 22: Internet Of Things

22

Medium Access Control

Two ways,

1. Central Node Polling.

- Normal cases.

2. Threshold Crossing

- Special cases where immediate response required.

Ex: Fire Alarming, it needs to report to the fire station.

Page 23: Internet Of Things

23

Central Node Polling

Central node will make a request to the each node on periodic intervals.

Retrieve the data from the end-node(sensors) store it to the Information Table(IT).

Duration upon which data to be accessed will be decided by the Administrator(owner).

Advantages

Life of network will be high.

No data processing required at end-nodes. No synchronization

Traffic on end-node will be less.

Page 24: Internet Of Things

24

Threshold Crossing

Each node will get some threshold setting, or a special case it can access the medium for data transmission to central node.

No need to wait for central node to poll for data transmission.

Advantages

No delay.

Disadvantages

Collision probability.

Multiple transmissions may be needed.

Life of end-node will go down.

Page 25: Internet Of Things

25

Benefiting IOT

Life of network will be more.

- end-nodes will be active mode for long time.

No need of huge processing power at end-nodes.

- No need of complex algorithms required.

Security is addressed.

- All the nodes can be accessed from central node.

Mobility of end-nodes.

- No complex wiring required, and battery powered.

QoS is enabled.

- Priority can be set by the user, slot-based.

Page 26: Internet Of Things

26

Benefiting IOT(continued)

Faulty end-nodes can be detected instantly.

- Node goes off, no request can be processed.

End-user understandable data.

- Processed data, digital data.

No need of interoperability.

- All can follow one protocol.

Resource efficient.

- More processors, ADC's and Memory chips are not required.

Dynamic data diversion and easy change of behavioral parameters. - Destination address can change.

Page 27: Internet Of Things

27

References1. K. Ashton, That ‘‘Internet of Things’’ thing, RFiD Journal

(2009). H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé,

2. Vision and challenges for realizing the Internet of Things, Cluster of European Research Projects on the Internet of Things—CERP IoT, 2010.

3. J. Buckley (Ed.), The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems, Auerbach Publications, New York, 2006.[4] M. Weiser, R. Gold, The origins of ubiquitous computing research at PARC in the late 1980s, IBM Systems Journal (1999).

4. Internet of Things (IoT): A vision, architectural elements, and future directions. Jayavardhana Gubbi

Page 28: Internet Of Things

28

Thank You