iot introduction

Post on 20-Feb-2017

283 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Internet of Things| A Place Where Machines talk toMachines

Definition

The Internet of Things (IoT) is a scenario in which objects, animals or people

are provided with unique identifiers and the ability to transfer data over a

network without requiring human-to-human or human-to-computer interaction.

A thing, in the Internet of Things, can be a person with a heart monitor

implant, a farm animal with a bio-chip transponder, an automobile that has built-

in sensors to alert the driver when tire pressure is low -- or any other natural or

man-made object that can be assigned an IP address and provided with the

ability to transfer data over a network.

Architecture of IoT

Sensor Layer

Lowest Abstraction Layer Incorporated to measure physical quantities Interconnects the physical and digital world Collects and process the real time information

Gateway and Network Layer

Robust and High performance network infrastructure Supports the communication requirements for latency, bandwidth or security Allows multiple organizations to share and use the same network independently

Management Service Layer

Capturing of periodic sensory data Data Analytics (Extracts relevant information from massive amount of raw data) Streaming Analytics ( Process real time data) Ensures security and privacy of data.

Application Layer

Provides a user interface for using IoT. Different applications for various sectors like Transportation, Healthcare, Agriculture, Supply chains, Government, Retail etc.

Major Challenges

Big Data Explosion Countless components Security & Privacy Advanced Internet Protocol Power efficiency

Internet connected things

IOT- Enabling Technologies

RFID Sensor Smart Tech Nano Tech

To identify and track the data of things

To collect and process the data to detect the changes in the physical status of things

To enhance the power of the network by devolving processing capabilities to different part of the network.

To make the smaller and smaller things have the ability to connect and interact.

Applications of IOT

Network

Biosensor taken by people

Equipment in public placeHouse

Regional Office

Virtual EnvironmentTransportation Vehicle

Scenario: Shopping

(2) When shopping in the market, the goods will introduce themselves.

(1) When entering the doors, scanners will identify the tags on her clothing.

(4) When paying for the goods, the microchip of the credit card will communicate with checkout reader.

(3) When moving the goods, the reader will tell the staff to put a new one.

Scenario: Smart Home

Scenario: E-Healthcare

Scenario: Smart Cars

Scenario: Smart Farms

Current Scenario

Future Scenario

Major Components of IOT

Major Components of IOT: (Client Server Model)

NetworkResult

ClientServer

Client machineServer machine

Socket Programming

Minimum Requirement- Linux OS (Lib. Header iles)

Server and Client

IP and Port No.

What is Socket?

Sockets are communication points on the same or different computers to exchange data. Sockets are supported by Unix, Windows, Mac, and many other operating system.

Sockets allow communication between two different processes on the same or different machines. To be more precise, it's a way to talk to other computers using standard Unix file descriptors.

What is Socket Address?

Socket address is a combination of IP address and Port number

What is Port?

• One of the circuit connection points on a front end processor or local intelligent controller

Dest.

Host

Port

SRC

HostTCP

What is Port?At the transport layer, an address is needed to choose among

multiple processes running on the destination host called Port Number

Destination Port Number for delivery Source Port Number for reply

TCP or UDPPort Port Port Port

Process 1 Process 2 Process 3 Process 4

Port# Data

Data

Packet

Port Number Port is represented by a positive (16-bit ) integer value

between 0 and 65,535

Some ports have been reserved to support common / well known services

ftp 21/tcp telnet 23/tcp smtp 25/tcp login 513/tcp

User level process/services generally use port number value >= 1024

Socket Types

1) Stream Sockets:

Delivery in a networked environment is guaranteed. If you send through the stream socket three items "A, B, C", they will arrive in the same order - "A, B, C".

These sockets use TCP (Transmission Control Protocol) for data transmission.

If delivery is impossible, the sender receives an error indicator.

Socket Types

Datagram Sockets:

Delivery in a networked environment is not guaranteed.

They're connectionless because you don't need to have an open connection as in Stream Sockets - you build a packet with the destination information and send it out.

They use UDP (User Datagram Protocol).

Server and Client Programming Concept

- Server

Create a socket with socket () Bind the socket to an address using the bind() Listen for connections with the listen() Accept a connection with the accept() Send and Receive, use read() and write() system calls

- Client

Create a socket with the socket() Connect socket to the address of server using connect()

system call Send and receive data, use read() and write() system calls

Socket programming- Flow

socket()

connect()

send()

recv()

close()

..

.

socket()

bind()

listen()

accept()

recv()

send()

close()

wait for connection request from next client

Client Server

What is Machine to Machine (M2M) Communication?

The Machine to Machine concept(communications inter-machines) implies the association of information and communication technologies (ICT), smart and communicating objects, as well as specialized software to interact, with the enterprise’s information system, without human intervention.

What is cloud computing?

The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Clouds can be classified as public, private, and hybrid

Cloud computing types

IOT Standard Protocols

Protocols

• TCP• UDP

What Connects Internet of things…?

TCP Vs UDP

ROLE OF WIRELESS COMMUNICATION IN IOT

Bluetooth :

wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs).

Bluetooth Technologies in IOT

Bluetooth LE | Bluetooth Smart (IEEE 802.15.4)

Bluetooth Smart/ Bluetooth LE :

Bluetooth Smart is an application-friendly technology supported by every major operating system.

The technology costs less and offers flexible development architecture for creating applications to bring everyday objects like heart-rate monitors, toothbrushes, and shoes into the connected world and have them communicate with applications that reside on the Bluetooth Smart compatible smartphones, tablets, or similar devices those consumers already own.

Zigbee :ZigBee is based on an IEEE 802.15.4 standardIts low power consumption limits transmission distances to 10–100 meters line-of-sight,ZigBee devices can transmit data over long distances by passing data through a mesh network of intermediate devices to reach more distant ones.

ZigBee is typically used in low data rate applications that require long battery life and secure networking

ZigBee has a defined rate of 250 kbit/s, best suited for intermittent data transmissions from a sensor or input device.

Wi-Fi

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.

Wi-max

WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide 30 to 40 megabit-per-second data rates.

SATCOM

Satcom (which stands for "satellite communication") is an artificial satellite that is used to help telecommunication by reflecting or relaying signals into space and back down to Earth.

It is the most powerful form of radio and can cover far more distance and wider areas than other radios.

It can also communicate with words, pictures and other forms of information.

RFID

Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects.

ETHERNET

Ethernet is the most commonly used local area network technology deployed with transmission speeds heading upwards into the gigabits range.

Ethernet is the most widely installed local area network (LAN) technology.

GSM- Global System for Mobile Communication

GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.

It operates at either the 900 MHz or 1800 MHz frequency band.

GPRS- General Packet Radio Service

General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM)

GPS- Global Positioning System

The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the earth where there is an unobstructed line of sight to four or more GPS satellites

GROUPING OF STATIONS / CELLULAR NETWORK :

A cellular network or mobile network is a wireless network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.

In a cellular network, each cell uses a different set of frequencies from neighboring cells, to avoid interference and provide guaranteed bandwidth within each cell.

CELL SIGNAL ENCODING

To distinguish signals from several different transmitters, following concepts are used:

Frequency division multiple access (FDMA) Code division multiple access (CDMA)

FDMA, TDMA & CDMA

RELAY ACCESS POINT :

A wireless repeater (also called wireless range extender) takes an existing signal from a wireless router or wireless access point and rebroadcasts it to create a second network.

TARGET WAKE TIME:

Target Wake Time (TWT) is a function that permits an AP to define a specific time or set of times for individual stations to access the medium.

The STA (client) and the AP exchange information that includes an expected activity duration to allow the AP to control the amount of contention and overlap among competing STA.

The AP can protect the expected duration of activity with various protection mechanisms. 

1G, 2G, 3G and 4G(LTE) mobile networks:

LTE- Long Term Evaluation

IPv4 Vs IPv6:

Thank YouHave Fun ;)

top related