1 / 37

Understanding & Use of the Internet Future of the Internet Spring 2011 G. F Khan, PhD

Understanding & Use of the Internet Future of the Internet Spring 2011 G. F Khan, PhD. Introduction. Internet is now approximately 41 years of age. No technology has evolved so much in so little time. Particularly, in the past fifteen years or so, it has completely reinvented itself.

liona
Download Presentation

Understanding & Use of the Internet Future of the Internet Spring 2011 G. F Khan, PhD

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Understanding & Use of the Internet Future of the Internet Spring 2011 G. F Khan, PhD

  2. Introduction • Internet is now approximately 41 years of age. • No technology has evolved so much in so little time. • Particularly, in the past fifteen years or so, it has completely reinvented itself. • Now we not only shop, bank, work and meet people online but • we share what we are doing at any given moment (e.g. Twitter, Face book) • We read, listen and watch everything. • What is NEXT?

  3. Next • Internet of Things? • http://www.youtube.com/watch?v=sfEbMV295Kk&feature=related

  4. Future of the Internet • PAST  Present  Future • Present: Internet of computers • Future: Internet of things?

  5. Internet of things Definitions: • “Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts.” • “Interconnected objects having an active role in what might be called the Future Internet.” • Wikipedia: In computing, the Internet of Thingsrefers to a, usuallywirelessand self-configuring, network betweenobjects, such as householdappliances Semantically: • “A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols.” Convergence of telecommunication, informatics and electronics

  6. Other terminologies • Ambient Intelligence • Ubiquitouscomputing • Machine-To-Machine • Pervasivecomputing • Everyware • ADUN: Appliance DefinedUbiquitous Network • Invisible computing • Next Internet Revolution: • Fromnetworking of humanbeings to networking of things

  7. Towards the Internet of Things: the Post PC-era

  8. Future Internet • Current: Web 2.0 • User created contents • Mostly network of computers • Future Web 3.0 • The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. • Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.

  9. Save Resources Improve Productivity Protect Health Improve Food & H20 Why “Real” Information is so Important? Enable New Knowledge Increase Comfort Enhance Safety & Security Preventing Failures High-Confidence Transport

  10. Four important technological enablers • RFID: a simple, unobtrusive and cost-effective system of identification and communication • Sensor technologies: detection of changes in the physicalstatus of things • Smart technologies: embedded intelligence in the thingsthemselves • Cloud Computing: smaller and smallerthingshaving the ability to interact and connect

  11. 1. RFID • Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. • The Internet of Things consists of objects that are ‘tagged’ with RFID that communicate their position, history, and other information to an RFID reader or wireless network. An RFID tag used for electronic toll collection.

  12. How RFID works? • Example from supply chain in future store. • http://www.youtube.com/watch?v=4Zj7txoDxbE

  13. RFID • Three components: • Transponder or tag consisting of a coupling element (coil or antenna) and an electronic chip. No need of power source since the tag take the energy from the EM field emitted by the readers. • Interrogator or reader • Middleware which forwards the data to another system such as a database, a PC or robot control system • Frequencies: • LF: 125kHz • HF: 13.56MHz • UHF: 800-600MHz • Lack of established international standard, except EPC

  14. Verichip: Implantable RFID

  15. Possible uses • Access management • Tracking of goods and RFID in retail • Tracking of persons and animals • Toll collection and contactless payment • Machine readable travel documents • Airport baggage tracking logistics • etc

  16. Example: T-money • In South Korea, T-money cards can be used to pay for public transport. • It can also be used in most convenience stores and vending machines in subways as cash. • 90% of cabs in Seoul accept card payment, including most major credit cards and the T-money card.

  17. RFID: More than barcode • Unique identification of individual items, allowing databases of specific item/location information to be generated, giving each item its own identity for real-time identification and tracking. • Data capture without the need for line of sight or physical manipulation. • Tags can be passive, semi-passive or active, and also read-only, read/write or read/write/re-write. • Privacy-Enhancing Technologies can be used to kill or block tags. Ex: biometric passport

  18. 2. Sensor technologies • http://www.youtube.com/watch?v=v25PCV_IJCw

  19. 2. Sensor technologies • Bridge between physical and virtual worlds • Sensors: Collect data from the environment • « Two heads are better than one »: Intelligence of a single sensor increases exponentially when used in a network • Wireless Sensor Networks (WSN): low cost, flexibility • Sensor node: small, low-power, includes sensor, power-supply, data storage, µP, low-power radio, ADCs, data transceivers and controllers • RFID sensor tag: combining RFID and sensor

  20. Sensor technologies • Major challenges: • Possibility for nodes to self-organizethemselvesinto a network • Power constraint • Size reduction • Memory and storagecapacity • Limited processing speed and communication bandwith

  21. Example:Pigeonblog – An alternative way to participate in environmental air pollution data gathering • Urban homing pigeons equippedwith GPS enabledelectronic air pollution sensingdevices capable of sending real-time location based air pollution and image data to an online mapping/bloggingenvironment. http://www.beatrizdacosta.net/pigeonblog.php

  22. Pigeonblog Social Impact • Pigeons tell about quality of air we breath • Importance of pigeons shifts from a common nuisance to a participant in life and death discussions about the state of the micro-local environment

  23. 3. Smart technologies/systems • Any conventional material or thing that can react to external stimuli may be called « smart thing » • Smart materials: passive, active and autonomous • Smart clothing and wearable computing • Smart homes • Smart vehicles • Robotics

  24. Smart technologies/systemsUbiquitous computing • This is is also described as pervasive computing, ambient intelligence, or invisible computing • Computer will become invisible due to small size • Everywhere e.g. beneath your cloths and even skin

  25. Examples: Smart home • Smart refrigerator can order eggs and vegetables • Smart cabinet connected to the internet can order your health medicines • http://www.youtube.com/watch?v=2mxocMgUrvo&feature=related • http://www.youtube.com/watch?v=9DJr8QwgLEA&feature=related

  26. Japanese vision of ubiquitous sensor networks

  27. Cloud computing • http://www.youtube.com/watch?v=QJncFirhjPg

  28. Cloud computing • Cloud computing refers to the on-demand provision of computational resources (data, software) via a computer network, rather than from a local computer. • Users can submit a task, such as word processing, to the service provider, without actually possessing the software or hardware

  29. Cloud computing • The consumer's computer may contain very little software or data (perhaps a minimal operating system and web browser only. • Examples • thinkfree.com • Dropbox.com

  30. IoT Challenges • Energy: Harvesting, conservation & consumption • New and more efficient and compact energy storage: batteries, fuel cells, and printed/polymer batteries, supercapacitors… • New energy generation devices coupling energy transmission methods or energy harvesting/scavenging using energy conversion.

  31. IoT Challenges • Intelligence: • Capabilities of context awareness and inter-machine communication: sensing ane localization • Communication capabilities: multi-standard & multi-protocol compatibility • Integration of memory and processing power • Ultra low power design: from processors/microcontrollers cores, signal processing & sensors to base stations • Capacity of resisting harsh environments • Affordable security • New class of simple and affordable IoT-centric smart systems • Intelligence vs Size & cost trade-off

  32. IoT Challenges • Interoperability: Future tags must integrate different communication standards and protocols that operate at different frequencies and allow different architectures, centralized or distributed, and be able to communicate with other networks unless global, well defined standards emerge. • Standards: Without clear and recognized standards such as the TCP5/IP6 in the Internet world, the expansion of the Internet of Things beyond RFID solutions cannot reach a global scale. • Sustainable fully global, energy efficient communication standards that are security and privacy centered and are using compatible or identical protocols at different frequencies are therefore needed. • Manufacturability: Costs must be lowered to less than one cent per tag, and production must reach extremely high volumes, while the whole production process must have a very limited impact on the environment.

  33. IoT Challenges • Security and Privacy Control: Big Brother? • Widespread adoption of anyobject identification system: need for special long-termsecurity protection installed. • Network Infrastructure Creation and Evolution • Efficient migration from the Internet / Efficient use of the existing infrastructures • Accommodatefunctionally-improvedobjects and technologies in the future

  34. The purpose of IoT should be • Provide a bridge between physical and virtual worlds • Via instrumented and managed sensorized physical environment • Support pervasive computing • From wireless devices to supercomputers • From wireless channels to all optical light-paths • Enable further innovations in S&E research • Create a social world in which we would want to live • Be worthy of our society’s trust

  35. Conclusion • Internet Of Things: fusion of the real, virtual and digital worlds, creating a map of the physical world within the virtualspace • Innovative technologies and approacheswillberequired to make IOT a reality • Innovation will come from convergence of sciences and technologies

  36. Next Lecture • E-government

  37. Thank You Questions & Comments

More Related