1 / 39

INTERNET OF THINGS

INTERNET OF THINGS. Introduction History of IoT About Objects/Things in the IoT The Identifier in the IoT Enabling Technologies of IoT. Introduction. The Internet of Things (IoT) is somehow a leading path to a smart world with ubiquitous computing .

kmcdonald
Download Presentation

INTERNET OF THINGS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET OF THINGS • Introduction • History of IoT • About Objects/Things in the IoT • The Identifier in the IoT • Enabling Technologies of IoT

  2. Introduction • The Internet of Things (IoT) is somehow a leading path to a smart world with ubiquitous computing . • With ubiquitous computing, computing will be embedded everywhere and programmed to act automatically with no manual triggering. • It aims to make different tasks easier for users and provide other tasks, such as easy monitoring of different phenomena surrounding us • In the IoT, daily life items are named as “things”, “objects”, or “machines” . • These are enhanced with computing and communication technology and they are joined in the communication(internet) framework. • In future 2020,Prediction 50 Billion devices in IoT and 7.6 Billion end users.

  3. Introduction • In this IoT framework, wireless and wired technologies are used for providing the communication or interaction among the things and the interactions are PERSON-TO-PERSON, PERSON-TO-MACHINE, MACHINE-TO-MACHINE and MACHINE-TO-PERSON interactions. • Some Connecting objects might be wireless, as with the radio frequency identification or sensor radio technologies that offer • Identification of items and • sensing of the environment • Connection may be wired as with Power line communication(PLC) offers data transport over electrical media SUCH AS SMART FIRDGES, SMART TVS, SMART HEATERS ETC. • Other enabling technologies for this real world networked services include • Nanotechnology, • Automatic processing and • Robotics

  4. The Internet of things is combo of : sensors IoT Connectivity People And Process

  5. Definitions of IoT • “IoT stands for a worldwide network of interconnected objects uniquely addressable based on standard communication protocols”. • “The semantic origin of the expression is composed of two words and concepts: Internet and Thing, where Internet can be defined as the world-wide network of interconnected computer networks based on standard communication protocol, the Internet suite(TCP/IP),while Thing is an object not precisely identifiable. Therefore semantically, Internet of Things means the world wide network of interconnected objects uniquely addressable , based on standard communication protocols”. (or) • The Internet of Things (IoT) is the network of physical objects like devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity—that enables these objects to collect and exchange data. • IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.

  6. "Things," in the IoT sense, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.

  7. History of IoT • The term IoT was first coined by KEVIN ASHTON in 1999. • The concept of IoT first became popular in the Auto-ID research center at the MIT [Massachusetts Institute], where an important effort was made to uniquely identify products. The result was termed EPC(electronic product code). And it was then commercialized by EPCglobal. • Radio Frequency Identification was seen as a prerequisite for the IoT at that point, if all objects and people in daily life were equipped with identifiers, computers could manage and inventory them. • A “thing” or “object” is any possible item in the real world that might join the communication chain. • The initial main objective of the IoT was to combine the communication capabilities characterized by data transmission. • This was viewed as the Internet, also known as the network of bits representing the “digital world”. • The process of automation was viewed as connecting the real or physical world, named the “network of atoms”

  8. Origin of IoT

  9. In 2005, the ITU (International Telecommunication Unit) showed interest in new telecommunication business possibilities that could be built into services around the new connectivity of environment objects to the network. • The ITU produced a comprehensive report on the IoT from technical, economical and ethical views. • It introduced a new axis in the ubiquitous networking path to complete the existing “anywhere” and “anytime” connectivity. It is the “anything” connectivity axes where the thing-to-thing or machine-to-machine interaction is added to complete the existing person-to-person and person-to-machine interaction in the possible connectivity. • Figure presents the ITU view of ubiquitous networking, adding the “anything connection” to the connectivity anywhere and anytime. ITU any place, any time and any thing vision

  10. History of IoT By connecting these new objects will raise many questions such as • The connecting technology of the so-called object • Interoperability between objects • Communication model of these connected objects • Possible interaction with the existing models(internet) • Choice of the transport model • Addressing, identifying and naming • Security and privacy

  11. About Objects/Things in the IoT • According to the American Auto ID research center description of the IoT, “things” or “objects” are described as a set of atoms. The atom is the smallest object in the IoT; as could be seen by nanotechnology, which is one of the enabling technologies of the IoT. • A network of atoms combined with a network of bits falls into what is named the IoT. It will gather a set of objects connected to the network to help in the execution of new services enabling the smart world. • So with the atom, being the smallest possible object, it is possible to classify objects based on their size and complexity, their moveable aspect and whether they are animate or inanimate, as shown in Figure.

  12. About Objects/Things in the IoT

  13. About Objects/Things in the IoT • In this terminology, classic devices such as PCs and Mobile phones are already connected objects using wired or wireless communication. • IoT will extend the connectivity and interworking of these currently existing objects with new objects connected through radio sensing or identifying technologies such as sensor or RFID networks, allowing the development of new services involving information from the environment. • This information could be either a simple identifier as with RFID or captured information as with sensors. • Different technologies can be used to interconnect objects, consumer appliances (smart fridges and smart heaters) are connected through wired technology such as power line communication through the power line. • Another concern is how to support the connectivity of heterogeneous objects, when a huge number of these objects/things will be connected by tags or sensors. Sensor networks have been used in industrial process control. • They have allowed automation of the sense and actuate processes in order to perform automatic control, maintenance and data collection operations. • A large number of potential environment monitoring applications for RFID and sensor networks are still to come. In home networking, new applications using sensor and RFID technologies will allow the automatic control of certain processes, hence minimizing human intervention.

  14. The Identifier in the IoT • IP addresses identify nodes in the Internet and serve as locators for routing. • IPv6 allows larger address space than IPv4. • In the IoT a large identification space will be needed to cover the identification of the tremendous number of connected objects. • In the IoT, where objects are addressed via identifiers stored into tags and interrogated by networked readers • At this point we need to raise the questions of: • Unifying and standardizing the identifier’s size and • structure is critical in order to allow large deployment of services relying on these new connected objects. • Since RFID technology is naturally used for identification, the standardization of the identifier stored in the RFID is the current IoT concern. • The same question is raised for any addressing schemes used in the network of objects. • In the IP based case, the problem will be more about the semantics of the identifier, scalability of the addressing space and memory size limitation of the devices addressed by the chosen address/identifier space.

  15. The Identifier in the IoT • The term “identifier” is similar to the term “name”. • A name does not change with location, in contrast to an “address”, which is intended to be used to refer to the location of a thing. • IP addresses are used to route packets between end-systems. • In Emerging IoT service we knowing that anything can be assigned an identifier – a physical object, person, place or logical object. • A wide variety of services and applications can be designed once it becomes possible to provide information associated with a tag identifier in different forms (text, audio or image). • For example: • 1. In a museum, an identifier on a tag attached to a painting could be used to find further information on the painting and the artist. • 2. In a grocery store, an identifier on a food package could be used to check that the food is safe to eat

  16. Other areas in which identifier-triggered information access could be valuable are in: – medicine/pharmaceuticals; – agriculture; – libraries; – the retail trade; – the tourist industry; – logistics; and – supply chain management

  17. Standardization means that in order to ensure interoperability of the connected objects and nodes in the IoT. • EPCglobal is first standardized the EPC identifier, followed by the International Standardization Organization (ISO). • In addition to ISO and EPCglobal, the ubiquitous ID Center (uIDcenter) has defined a generic identifier called “ucode”, which is not only intended to identify physical objects but also extended to places and digital information. • For example, if we use IP address space for identification, and if a device/thing has enough memory, we can consider IPv6 address space to be used as an identifier space of objects, since IPv6 address space is supposed to be large enough to offer up to 223 addresses in a square meter. • In the IP communication model, IP addresses play two roles: from a network point of view, they act as a locator for routing and from an application point of view they identify hosts for the duration of a communication session. • This dual role is seen to be problematic due to increasing demands for mobility and the multi-homing of end-systems.

  18. Enabling Technologies of IoT The main IoT enabling Technologies will be • Electronic identification technology such as RFID and Sensing and actuating technology such as sensors/actuators. • Communication technologies from object-to-object and from the network of objects to the existing network (wired and wireless communication networks). • Other technologies such as nanotechnology, smart technologies, robotics, location etc.

  19. Enabling Technologies of IoT • Identification technology: The first identification technology is simple barcodes, that uniquely identify items which is used for tracking the items. Later barcodes are evolved into 2D barcodes in order to contain more information about the product and more number of identifiers can be created with it. Finally 2D barcodes are evolved into electronic bar code, where with the introduction of RFID we store the identifier in the memory of the RFID tag. RFID technology will identify, track the location and provide a specific IoT application to the object. It mainly focus on answering the questions like “what(identify), which(what is the service) and where(location)?” Where the sensors answers the question “HOW?”

  20. Enabling Technologies of IoT RFID systems consists of four main components: – a transponder or a tag to carry data: • tags can be passive, semi-passive or active, based on their power source and the way they are used, as shown in Table 1.1; – microwave antenna or coil and a microchip data located on the object to be identified; – an interrogator or reader. Compared with tags, readers are larger, more expensive and power-hungry: • that can be read-only, read/write or read/write/re-write, depending on how their data is encoded; – middleware, which forwards the data to another system, such as a database, a personal computer or robot control system, depending on the application.

  21. Enabling Technologies of IoT Middleware

  22. Enabling Technologies of IoT Tags can be classified into following types

  23. Enabling Technologies of IoT The main difference between Active RFID tags and Passive RFID tags is Passive RFID : passive tags have no internal power source, so it will wait for a signal from an RFID reader. The reader sends energy to an antenna which converts that energy into an RF wave that is sent into the read zone. Once the tag is read within the read zone, the RFID tag’s internal antenna draws in energy from the RF waves. The energy moves from the tag’s antenna to the IC and powers the chip which generates a signal back to the RF system. This is called backscatter. The backscatter, or change in the electromagnetic or RF wave, is detected by the reader (via the antenna), which interprets the information. Active RFID: Active RFID systems have three essential parts – a reader or interrogator, antenna, and a tag. Active RFID tags possess their own power source – an internal battery that enables them to have extremely long read ranges as well as large memory banks. Typically, active RFID tags are powered by a battery that will last between 3 – 5 years, but when the battery fails, the active tag will need to be replaced.  The semi-passive tag does have a battery-- not for generating a response, but to power electronics that are used in conjunction with off-board sensors such as a thermal sensor. The sensor reading is incorporated into the tag return signal along with the tag serial number. 

  24. Enabling Technologies of IoT Different applications are possible with RFID technology item tracking of products in retail chains animal tracking RFID communication system can cover long distances such as in an animal tracking application where the reading distance is several kilometers. Or Near Field Communication is a short range wireless technology that enables easy and convenient interaction between devices, NFC will use the RFID communication system but limit the reading range to few centimeters.

  25. Enabling Technologies of IoT Near Field Communication: Near Field Communication is a way for your phone to interact with something in its close proximity. it operates within a radius of about 4 cm and provides a wireless connection between your device and another. This allows a two-way communication between devices. HOW NFC WORKS? Put two NFC enabled phones in close proximity with each other and let the phones do the transfer. NFC transmits or receives data via radio waves using NFC protocols. Three modes of NFC • READER/WRITER(FOR READING TAGS IN NFC POSTER) • CARD EMULATION(FOR MAKING PAYMENTS) • PEER-TO-PEER(FOR FILE TRANSFER)

  26. Enabling Technologies of IoT GETTING STARTED WITH NFC First enable NFC and android beam on your device and go to the file you wish to send, and tap the devices together. You don’t even need to select any send via option. Put the devices back-to-back and when it asks to confirm the transfer just hit “touch to beam”. Applications of NFC: Send a phone number-just navigate to the contact in your address book(it can be yours or somebody else’s) then press the phone to the recipients when your phone says “touch to beam” just tap the display. Send a picture, Send a documents Send directions To launch an app on someone else's phone, if you're using an app or playing a game that is already installed on someone else device you can launch it for them Make payment, DOWNLOAD ANDROID PAY and add your credit or debit card details then use it in any store that has a contactless payment terminal.

  27. Enabling Technologies of IoT Sensor: a sensor is an electronic device that detects, senses or measure physical stimuli from the real world environment and converts signals from stimuli into analog or digital form. Some sensors also provide actuation functionality, these are named sensors/actuators. 2. Sensing and actuating technology: Sensors are classified according to the parameters they measure: Mechanical sensor( position, force, pressure etc) thermal sensor(temperature, heatflow) electrostatic or magnetic fields radiation intensity(electromagnetic, nuclear) chemical(humidity, ion, gas concentration) biological(toxicity, presence of biological organisms) military-enemy tracking or battlefield surveillance.

  28. Enabling Technologies of IoT Sensing and actuating technology: Many scientific and research groups are working to develop more efficient and feasible sensor networks. The main technical constraints are: • Power, size, memory and storage capacity • Trade off between power and size • Interference, communication model • The environment where the sensors are deployed(underwater, landfield, etc). Many applications of sensors in different domains • Ex: military environment, healthcare, construction, commercial applications, remote monitoring of the temperature of products, home applications such as the smart home and so on.

  29. Enabling Technologies of IoT Sensing and actuating technology: Sensor classes: Based on output: analog sensors, analog output, temperature, speed, pressure, displacement, strain etc. digital sensors, digital output, on or off signals Based on data type: scalar sensor , magnitude ex-temperature sensor vector or multimedia sensors, direction and magnitude ex- camera sensor, sound, image,

  30. Enabling Technologies of IoT

  31. Enabling Technologies of IoT An actuator is a component of a machine or system that moves or controls the mechanism or the system.

  32. Enabling Technologies of IoT 3. Other Technologies: • Smart technologies, thinking and deciding technologies based on sensing and received information building the autonomous communication. • Process automation and robotics, executing the actuation and building the autonomous communications • Nanotechnology, the atom is the object, the smallest object in IoT

  33. Enabling Technologies of IoT 4. Connected objects communications: Object to object communication: Wireless based IoT services have become more popular since RFID and sensors have been able to provide information through the radio interface. Wired communication between objects will mainly be the power line communication since the home electronic appliances considered to be objects will take advantage of the electrical communication to also send information. In object-to-object communication, the interoperability is very important and building the network of objects with end-to-end communication is challenging. Ex: RFID reader to RFID tags will use a point-to-point communication model where serial communication is used at several kilobits per second and in some tech its up to megabit per second. Sensor-to-sensor communication different wireless technologies are possible for instance IEEE 802.15.4 or Zeegbee is one of the wireless technologies promoted for building wireless sensor networks. In wired scenario, objects might communicate with other objects using PLC.

  34. Enabling Technologies of IoT IP model COMMUNICATION IS POSSIBLE in the network of objects. Object or network of objects to other networks: New objects being connected to the network via technologies such as RFID, NFC, sensors to introduce real world information into the network will be first connected to the gate way where interconnection efforts will be made, and this gateway can be connected either by a wired or wireless mobile communication system. Other technologies to connect objects to the network are smart cards for automatic payments, location technologies( real time location system, global positioning system) barcodes etc. • Such technologies enable location-based services and tracking, barcode (2D) for item tracking, etc.

  35. Enabling Technologies of IoT

More Related