View
594
Download
1
Category
Preview:
Citation preview
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 1
INTRODUCTION
“With a trillion sensors embedded in the environment—all connected by computing
systems, software, and services—it will be possible to hear the heartbeat of the Earth, impacting
human interaction with the globe as profoundly as the Internet has revolutionized
communication.”- Peter Hartwell
The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will
change Everything, including ourselves. This may seem like a bold statement, but consider the
impact the Internet already has had on education, communication, business, science, government,
and humanity. Clearly, the Internet is one of the most important and powerful creations in all of
human history. Now consider that IoT represents the next evolution of the Internet, taking a huge
leap in its ability to gather, analyze, and distribute data that we can turn into information,
knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.
Already, IoT projects are under way that promise to close the gap between poor and rich,
improve distribution of the world’s resources to those who need them most, and help us
understand our planet so we can be more proactive and less reactive. Even so, several barriers
exist that threaten to slow IoT development, including the transition to IPv6, having a common
set of standards, and developing energy sources for millions even billions of minute sensors.
However, as businesses, governments, standards bodies, and academia work together to
solve these challenges, IoT will continue to progress. The goal of this paper, therefore, is to
educate you in plain and simple terms so you can be well versed in IoT and understand its
potential to change everything we know to be true today.
Over the last few years the Internet of Things (IoT) has gained significant attention from
both industry and academia. Since the term was introduced in the late 1990s many solutions have
been introduced to the IoT marketplace by different types of organizations, ranging from start-
Dept. of ECE 1
SEPTEMBER, 2015 INTERNET OF THINGS
ups, academic institutions, government organizations and large enterprise. IoT's popularity is
governed by both the value that it promises to create and market growth and predictions. It
allows `people and things to be connected Anytime, Anyplace, with Anything and Anyone,
ideally using Any path/network and Any service'. Such technology will help to create `a better
world for human beings', where objects around us know what we like, what we want, and what
we need and act accordingly without explicit instructions. Context-aware communications and
computing are key to enable the intelligent interactions such as those the IoT paradigm envision.
Fig: 1.1 a) Smart oven
b) Smart fridge
c) Smart washing machine
(All are network connected)
Dept. of ECE 2
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 2
LITERATURE SURVEY
The emerging importance of network connected object is described in [1]. Since the term
was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by
different types of organizations, ranging from start-ups, academic institutions, government
organizations and large enterprises.
The main principle of connecting everything including humans and other objects through
any network or path or service is described in [4].Things that can be connected through various
equipments like RFID, sensors, nanotech and smart-tech equipments.
Context-aware communications and computing are keys to enable the intelligent
interactions such as those the IoT paradigm envisions. Context-Aware information and
computing methods are described in [5]. Context-awareness can be defined as the ability of a
system to provide relevant information or services to users using context information where
relevance depends on the user's task. Context-aware communications and computing have been
researched extensively since early 2000s and several surveys have been conducted in this field.
According to BCC Research's 2011 market report on sensors, the global market for
sensors was around $56.3 billion in 2010. In 2011, it was around $62.8 billion. It is expected to
increase to $91.5 billion by 2016, at a compound annual growth rate of 7.8%. One of the
techniques for connecting everyday objects into networks is the radio frequency identification
(RFID) technology is given in [9]. In RFID, the data carried by the chip attached to an object is
transmitted via wireless links. RFID has the capability to convert dump devices into
comparatively smart objects. RFID systems can be used wherever automated labeling,
identification, registration, storage, monitoring, or transport is required to increase efficiency and
effectiveness. According to Frost & Sullivan (2011), the global RFID market was valued at from
$3 billion to $4 billion in 2009. The RFID market will grow by 20% per year through 2016 and
reach a volume of approximately from $6.5 billion to almost $9 billion.
Dept. of ECE 3
SEPTEMBER, 2015 INTERNET OF THINGS
``Smart city'' is a concept aimed at providing a set of new generation services and
infrastructure with the help of information and communication technologies (ICT) which is given
in [10]. Smart cities are expected to be composed of many different smart domains. Smart
transportation, smart security and smart energy management are some of the most important
components for building smart cities ,which was described in[11]. However, in term of market,
smart homes, smart grid, smart healthcare, and smart transportation solutions are expected to
generate the majority of sales. According to Markets and Markets report on Smart Cities Market
(2011 - 2016), the global smart city market is expected to cross $1 trillion by 2016.
Cloud computing is a model for enabling ubiquitous network access to a shared pool of
configurable computing resources. This was discussed in [34].
Cloud computing and storage solutions provide users and enterprises with various
capabilities to store and process their data in third-party data centers. It relies on sharing of
resources to achieve coherence and economies of scale, similar to a utility (like the electricity
grid) over a network. At the foundation of cloud computing is the broader concept of converged
infrastructure and shared services
I also collected information about the solutions from their respective websites, demo
videos, technical specifications, and consumer reviews. Understanding how context-aware
technologies are used in the IoT solutions in the industry's marketplace is vital for academics,
researchers, and industrialists so they can identify trends, industry requirements, demands, and
innovation opportunities.
Dept. of ECE 4
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 3
FRAMERS IN IoTs
INTERNET OF THINGS: The Internet of Things (IoT) is a dynamic global information
network consisting of Internet connected objects, such as radio frequency identifications,
sensors, and actuators, as well as other instruments and smart appliances that are becoming an
integral component of the Internet.
CONTEXT: Contexts can be defined as any information that can be used to characterize the
situation of an entity.
ENTITY: An entity is a person, place, piece of software, software service or object that is
considered relevant to the interaction between a user and an application, including the user and
application themselves
CONTEXT AWARENESS: Context-awareness can be defined as the ability of a system to
provide relevant information or services to users using context information where relevance
depends on the user's task
SMART CITY: ``Smart city'' is a concept aimed at providing a set of new generation services
and infrastructure with the help of information and communication technologies (ICT).
Smart cities are expected to be composed of many different smart domains. Smart transportation,
smart security and smart energy management are some of the most important components for
building smart cities
SMART DEVICE:A smart device is an electronic device, generally connected to other devices
or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can
operate to some extent interactively and autonomously.
Dept. of ECE 5
SEPTEMBER, 2015 INTERNET OF THINGS
IP ADDRESS: An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer) participating in a computer network that uses the Internet
Protocol for communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
RFID: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to
transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
The tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader. Unlike
a barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
SENSOR: A sensor is a transducer whose purpose is to sense some characteristic of its
environments. It detects events or changes in quantities and provides a corresponding output,
generally as an electrical or optical signal; for example, a thermo couple converts temperature to
an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured
temperature into expansion and contraction of a liquid which can be read on a calibrated glass
tube.
NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on
an atomic, molecular, and supramolecular scale. The earliest, widespread description of
nanotechnology referred to the particular technological goal of precisely manipulating atoms and
molecules for fabrication of macroscale products, also now referred to as molecular
nanotechnology.
Dept. of ECE 6
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 4
EVOLUTION AND CURRENT STATUS OF IoTs
IoT’s roots can be traced back to the Massachusetts Institute of Technology (MIT), from
work at the Auto-ID Center. Founded in 1999, this group was working in the field of networked
radio frequency identification (RFID) and emerging sensing technologies. The labs consisted of
seven research universities located across four continents. These institutions were chosen by the
Auto-ID Center to design the architecture for IoT.
Before we talk about the current state of IoT, it is important to agree on a definition.
According to the Cisco Internet Business Solutions Group (IBSG), IoT is simply the point in
time when more “things or objects” were connected to the Internet than people.
Fig: 4.1 Internet of Things Was “Born” Between 2008 and 2009
Dept. of ECE 7
SEPTEMBER, 2015 INTERNET OF THINGS
In 2003, there were approximately 6.3 billion people living on the planet and 500 million
devices connected to the Internet.3 By dividing the number of connected devices by the world
population, we find that there was less than one (0.08) device for every person. Based on Cisco
IBSG’s definition, IoT didn’t yet exist in 2003 because the number of connected things was
relatively small given that ubiquitous devices such as smart-phones were just being introduced.
For example, Steve Jobs, Apple’s CEO, didn’t unveil the iPhone until January 9, 2007 at the
Macworld conference
Looking to the future, there will be 25 billion devices connected to the Internet by 2015
and 50 billion by 2020. It is important to note that these estimates do not take into account rapid
advances in Internet or device technology; the numbers presented are based on what is known to
be true today. Additionally, the number of connected devices per person may seem low. This is
because the calculation is based on the entire world population, much of which is not yet
connected to the Internet. By reducing the population sample to people actually connected to the
Internet, the number of connected devices per person rises dramatically.
Fig:4.2 Growth in internet connected object
For example, we know that approximately 2 billion people use the Internet today. Using
this figure, the number of connected devices per person jumps to 6.25 in 2010, instead of 1.84.
Of course, we know nothing remains static, especially when it comes to the Internet. Initiatives
and advances, such as Cisco’s Planetary Skin, HP’s central nervous system for the earth
Dept. of ECE 8
SEPTEMBER, 2015 INTERNET OF THINGS
(CeNSE), and smart dust, have the potential to add millions—even billions of sensors to the
Internet. As cows, water pipes, people, and even shoes, trees, and animals become connected to
IoT, the world has the potential to become a better place.
Currently, IoT is made up of a loose collection of disparate, purpose-built networks.
Today’s cars, for example, have multiple networks to control engine function, safety features,
communications systems, and so on. Commercial and residential buildings also have various
control systems for heating, venting, and air conditioning (HVAC); telephone service; security;
and lighting. As IoT evolves, these networks, and many others, will be connected with added
security, analytics, and management capabilities. This will allow IoT to become even more
powerful in what it can help people achieve.
Fig: 4.2 IoT as networks of network
Dept. of ECE 9
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 5
EVOLUTION OF CONTEXT AWARE TECHNOLOGY
It is important to understand the evolution of the Internet before discussing the evolution
of context-aware technologies. it is first necessary to understand the differences between the
Internet and the World Wide Web (or web),terms that are often used interchangeably.
The Internet is the physical layer or network made up of switches, routers, and other
equipment. Its primary function is to transport information from one point to another quickly,
reliably, and securely. The web, on the other hand, is an application layer that operates on top of
the Internet. Its primary role is to provide an interface that makes the information flowing across
the Internet usable.
5.1 EVOLUTION OF WEB VERSUS INTERNETThe web has gone through several distinct evolutionary stages:
Stage 1. First was the research phase, when the web was called the Advanced Research Projects
Agency Network (ARPANET). During this time, the web was primarily used by academia for
research purposes.
Stage 2. The second phase of the web can be coined “brochureware.” Characterized by the
domain name “gold rush,” this stage focused on the need for almost every company to share
information on the Internet so that people could learn about products and services.
Stage 3. The third evolution moved the web from static data to transactional information, where
products and services could be bought and sold, and services could be delivered. During this
phase, companies like eBay and Amazon.com exploded on the scene. This phase also will be
infamously remembered as the “dot-com” boom and bust.
Dept. of ECE 10
SEPTEMBER, 2015 INTERNET OF THINGS
Stage 4. The fourth stage, where we are now, is the “social” or “experience” web, where
companies like Face book, Twitter, and Group-on have become immensely popular and
profitable (a notable distinction from the third stage of the web) by allowing people to
communicate, connect, and share information (text, photos, and video) about themselves with
friends, family, and colleagues.
5.2 EVOLUTION OF INTERNETThe Internet broadly evolved in five phases as illustrated in Figure.
The evolution of Internet begins with connecting two computers together and then
moved towards creating the World Wide Web by connecting large number of computers
together. Mobile-Internet emerged when mobile devices were connected to the Internet. People's
identities were added to the Internet via social networks. Finally, the Internet of Things emerged,
comprised of everyday objects added to the Internet. During the course of these phases, the
application of context-aware communication and computing changed significantly.
Fig: 5.1 Evolution of Internet of things
In the early phase of computer networking when computers were connected to each other
in point-to-point fashion, context-aware functionalities were not widely used. Providing help to
users based on the context (of the application currently open) was one of the fundamental
context-aware interactions provided in early computer applications and operating systems.
Dept. of ECE 11
SEPTEMBER, 2015 INTERNET OF THINGS
Another popular use of context is context aware menus that help users to perform tasks
tailored to each situation in a given application. When the Internet came into being, location
information started to become critical context information. Location information (retrieved
through IP addresses) were used by services offered over the Internet in order to provide
location-aware customization to users. Once the mobile devices (phones and tablets) became a
popular and integral part of everyday life, context information collected from sensors built-in to
the devices (e.g. accelerometer, gravity, gyroscope, GPS, linear accelerometer, and rotation
vector, orientation, geomagnetic field, and proximity, and light, pressure, humidity and
temperature) were used to provide context-aware functionality. For example, built-in sensors are
used to determine user activities, environmental monitoring, health and well-being, location and
so on.
Over the last few years social networking has become popular and widely used. Context
information gathered through social networking services (e.g. Facebook, Myspace, Twitter, and
Foursquare) has been fused with the other context information retrieved through mobile devices
to build novel context-aware applications such as activity predictions, recommendations, and
personal assistance.
For example, a mobile application may offer context-aware functionalities by fusing
location information retrieved from mobile phones and recent `likes' retrieved from social media
sites to recommend nearby restaurants that a user might like. In the next phase, `things' were
connected to the Internet by creating the IoT paradigm. An example of context-aware
functionality provided in the IoT paradigm would be an Internet-connected refrigerator telling
users what is inside it, what needs to be purchased or what kind of recipes can be prepared for
dinner. When the user leaves the office, the application autonomously does the shopping and
guides the user to a particular shopping market so she or he can collect the goods it has
purchased. In order to perform such tasks, the application must fuse location data, user
preferences, activity prediction, user schedules, information retrieved through the refrigerator
(i.e. shopping list) and many more. In the light of the above examples, it is evident that the
complexity of collecting, processing and fusing information has increased over time. The amount
of information collected to aid decision making has also increased significantly.
Dept. of ECE 12
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 6
EVALUATION FRAMEWORK
6.1 CONTEXT AWARE FEATURES: This section deals with the various
evaluation framework used in Internet of Things. The evaluation framework which we
used to review IoT products in the marketplace are built upon the theoretical foundation
present in this section.
Fig: 6.1 Context aware features
Dept. of ECE 13
SEPTEMBER, 2015 INTERNET OF THINGS
1. Presentation: Contexts can be used to decide what information and services need to be
presented to the user. Let us consider a smart environment scenario. When a user enters a
supermarket and takes their smart phones out, what they want to see are their shopping lists.
Context-aware mobile applications need to connect to kitchen appliances such as smart
refrigerators at home to retrieve the shopping lists and present them to the users. This provides
the idea of presenting information based on contexts such as location, time, etc. By definition,
IoT promises to provide any service, at anytime, anyplace, with anything and anyone, ideally
using any path/network.
2. Execution: Automatic execution of services is also a critical feature in the IoT paradigm. Let
us consider a smart home environment. When a user starts driving home from his/her office, the
IoT application employed in the house should switch on the air condition system and switch on
the coffee machine to be ready to use by the time the user steps into the house. These actions
need to be taken automatically based on the context. In it, machine-to-machine communication is
a significant part of the IoT.
3. Tagging: In the IoT paradigm, there will be a large number of sensors attached to the
everyday objects. These objects will produce large volumes of sensory data that have to be
collected, analyzed, fused and interpreted. Sensory data produced by a single sensor will not
provide the necessary information that can be used to fully understand the situation. Therefore,
data collected through multiple sensors need to be fused together. In order to accomplish the
sensor data fusion task, contexts need to be collected. Contexts need to be tagged together with
the sensory data to be processed and understood later. Therefore, context annotation plays a
significant role in context-aware computing research. Here, the tagging operation is also
identified as annotation.
6.2 DATA FLOW IN IoTsFigure 6.2 visualizes how data is being collected, transferred, processed, and how context
is discovered and annotated in typical IoT solutions. It is important to note that not all solutions
may use the exactly the same data flow. Each solution may use part of the architecture in their
own solution. I had refer to this common data flow architecture in this seminar t demonstrate
Dept. of ECE 14
SEPTEMBER, 2015 INTERNET OF THINGS
how each solution may design their data flows. Our objective is to identify major strategies that
are used by IoT products to offer context-aware functionalities.
Fig: 6.2 High level data flow in IoTs
6.2.1 ENABLING TECHNOLOGIES IN DATA FLOW OF IoTs
1. RFIDS: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to
transfer data, for the purposes of automatically identifying and tracking tags attached to objects.
The tags contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
Dept. of ECE 15
SEPTEMBER, 2015 INTERNET OF THINGS
source such as a battery and may operate at hundreds of meters from the reader. Unlike
a barcode, the tag does not necessarily need to be within line of sight of the reader and may be
embedded in the tracked object. RFID is one method for Automatic Identification and Data
Capture (AIDC).
RFID tags are used in many industries. For example, an RFID tag attached to an
automobile during production can be used to track its progress through the assembly line; RFID-
tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in
livestock and pets allows positive identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and
people, the possibility of reading personally-linked information without consent has raised
serious privacy concerns
Fig: 6.3 Enabling technologies in RFIDs
2. SENSORS: A sensor is a transducer whose purpose is to sense (that is, to detect) some
characteristic of its environments. It detects events or changes in quantities and provides a
corresponding output, generally as an electrical or optical signal; for example, a thermo
couple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a
sensor; it converts the measured temperature into expansion and contraction of a liquid which
can be read on a calibrated glass tube.
Dept. of ECE 16
SEPTEMBER, 2015 INTERNET OF THINGS
Sensors are used in everyday objects such as touch-sensitive elevator buttons (tactile
sensor) and lamps which dim or brighten by touching the base, besides innumerable applications
of which most people are never aware. With advances in micro machinery and easy-to-use micro
controller platforms, the uses of sensors have expanded beyond the more traditional fields of
temperature, pressure or flow measurement, for example into MARG sensors. Moreover, analog
sensors such as potentiometers and force-sensing resistors are still widely used. Applications
include manufacturing and machinery, airplanes and aerospace, cars, medicine and robotics. A
sensor's sensitivity indicates how much the sensor's output changes when the input quantity
being measured changes. For instance, if the mercury in a thermometer moves 1 cm when the
temperature changes by 1 °C, the sensitivity is 1 cm/°C (it is basically the slope Dy/Dx assuming
a linear characteristic).
A proximity sensor is a sensor able to detect the presence of nearby objects without any
physical contact. A proximity sensor often emits an electromagnetic field or a beam
of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return
signal. The object being sensed is often referred to as the proximity sensor's target. Different
proximity sensor targets demand different sensors. For example, a capacitive or photoelectric
sensor might be suitable for a plastic target; an inductive proximity sensor always requires a
metal target. The maximum distance that this sensor can detect is defined "nominal range". Some
sensors have adjustments of the nominal range or means to report a graduated detection distance.
Proximity sensors can have a high reliability and long functional life because of the
absence of mechanical parts and lack of physical contact between sensor and the sensed object.
Proximity sensors are commonly used on smart phones to detect (and skip) accidental
touch screen taps when held to the ear during a call. They are also used in machine vibration
monitoring to measure the variation in distance between a shaft and its support bearing. This is
common in large steam turbines, compressors, and motors that use sleeve-type bearings.
3.NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on
an atomic, molecular, and supramolecular scale. The earliest, widespread description of
nanotechnology referred to the particular technological goal of precisely manipulating atoms and
molecules for fabrication of macroscale products, also now referred to as molecular
nanotechnology. A more generalized description of nanotechnology was subsequently
Dept. of ECE 17
SEPTEMBER, 2015 INTERNET OF THINGS
established by the National Nanotechnology Initiative, which defines nanotechnology as the
manipulation of matter with at least one dimension sized from 1 to 100 nanometers.
4.SMART-TECH: A smart device is an electronic device, generally connected to other devices
or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can
operate to some extent interactively and autonomously. It is widely believed that these types of
devices will outnumber any other forms of smart computing and communication in a very short
time, in part, acting as a useful enabler for the Internet of Things. Several notable types of smart
devices as of the time of this writing are smart-phones (like the Apple iPhone or most of the
devices running Android operating system), tablets (like the Apple iPad ), smart-watches, smart
bands and smart keychains .The term can also refer to a ubiquitous computing device: a device
that exhibits some properties of ubiquitous computing including–although not necessarily–
artificial intelligence.
Dept. of ECE 18
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 7
IoT PRODUCTS
7.1 MIMO: Mimo has built a smart nursery system, where parents learn new insights about
their baby through connected products like the Mimo Smart Baby Monitor. In this product, turtle
is the device that collects all primary contextual information. Then, the data is transferred to an
intermediary device called lilypad. Such offloading strategy allows to reduce the turtle's weight
at minimum level and to increase the battery life. The communication and processing capabilities
are offloaded to the lilypad device that can be easily recharged when necessary. We can see
Mimo Smart Baby Monitor uses some parts of the data flow architecture as we presented in Fig.
Cloud services perform the additional processing functionality, and the summarized data is
pushed to the mobile devices for context presentation. In the user interface side, parents are
presented mostly the secondary context information such as baby movement and baby's sleeping
status. Accelerometers are used to discover such secondary context information by using pattern
recognition techniques.
Fig: 7.1 MIMO system
Dept. of ECE 19
SEPTEMBER, 2015 INTERNET OF THINGS
7.2. SENSE AWARE ITEMS: Sense-Aware is a solution developed to support real-time
shipment tracking. As illustrated in Figure it collects and processes contextual information such
as location, temperature, light, relative humidity and biometric pressure, to enhance the visibility
and transparency of the supply chain. Sense-Aware uses both the hardware and software
components in their sensor-based logistic solution. Such data collection allows different parties
to engage in supply chain to monitor the movement of goods in real-time and accurately knows
the quality of the transported goods, and plan their processes effectively and efficiently.
Secondary context is any information that can be computed by using primary context. it can be
computed by using the sensor data fusion operations, or data retrieval operations such as web
service calls (e.g. identify the distance between two sensors by applying sensor data fusion
operations on two raw GPS sensor values).
Fig: 7.2 Sense Aware system using smart devices
7.3 BLOSSOM: Blossom is a smart watering products that can be self-programmed based on
real-time weather data, and it gives the user control over the phone, thus lowering the water bill
up to 30%. In this kind of scenario, the product may autonomously perform the actions (i.e. open
and close sprinklers), based on the contextual information. Another reaction mechanism used by
IoT solutions is to provide recommendations
7.4 NEST: Nest is capable of learning users' schedules and the temperatures they prefer. It
keeps users comfortable and saves energy when they are away.
7.5 MAID: MAID has a personalization engine that continuously learns about the users. It
learns what users cook regularly, tracks users activity by using the data collected from
smartphones and smart watches. Then, it will provide recommendations for a healthy and
Dept. of ECE 20
SEPTEMBER, 2015 INTERNET OF THINGS
balanced diet. MAID also recommends users to work out or to go for a run based on the calories
they consume each day.
7.6 FiLIP: In FiLIP users send location-aware triggers to make sure children are staying within
the safe area. FiLIP uses a unique blend of GPS, GSM, and Wi-Fi technologies to allow parents
to locate their children by using the most accurate location information, both indoors and
outdoors. Parents can create a virtual radius around a location, such as home, school or a friend's
house. A notification will be sent to the parent's smart-phone when FiLIP detects that their
children have entered or left a safe zone.
7.7FITBIT: Fitbit is a device that can be worn on multiple body parts in order to tracks steps
taken, stairs climbed, calories burned, hours slept, distance traveled, and quality of sleep. This
device collects data and presents it to the users through mobile devices and web interfaces. A
variety of different charts, graphs, icons and other types of graphical elements are heavily used to
summarise and present the analyzed meaningful and actionable data to the users. Such
visualization strategies are commonly encouraged in human computer interaction (HCI)
domains, specially due to the fact that `a picture is worth a thousand words.'
Dept. of ECE 21
SEPTEMBER, 2015 INTERNET OF THINGS
CHAPTER 8
DISCUSSION ON IoTs PERFORMANCEThis section discuss about the applications or advantages, disadvantages, challenges and
remedies and future on Internet of Things.
8.1 APPLICATIONS:
Fig: 8.1 Applications
When we crossed the threshold of connecting more objects than people to the Internet, a
huge window of opportunity opened for the creation of applications in the areas of automation,
sensing, and machine-to-machine communication. In fact, the possibilities are almost endless.
The following examples highlight some of the ways IoT is changing people’s lives for the better.
8.1.1MANAGEMENT: Management field applications include data management, waste
management, and urban planning and production management.
8.1.2 LOGISTICS: Warehouse management, inventory control, port management etc are
mainly concentrated in logistic areas.
Dept. of ECE 22
SEPTEMBER, 2015 INTERNET OF THINGS
8.1.3 RETAILS: Intelligent shopping, barcodes in retails and electronic tags in equipment
make shopping more clear, easier and perfect.
8.1.4 PHARMACEUTICALS: Pharmaceutical applications of IoTs include intelligent
treatment tags for drugs, drug usage tracking, providing pharmaceutical websites and help in
providing emergency treatment as fast as possible.
8.1.5 FOOD: Food production management and nutrition calculation can be done with the help
of IoTs. It also prevent overproduction and hence shortage of food and control food quality,
health and safety.
8.1.6 SCHOOL ADMINISTRATION: Attendance management, voting systems during
school election and automatic feedback system on classes can be implemented using IoT
principles.
8.1.7 INSTRUCTIONAL TECHNOLOGIES: In the field of media, information
management and foreign language learning also IoTs have various applications.
8.2 CHALLENGES AND BARRIERS TO IoTSeveral barriers, however, have the potential to slow the development of IoT. The three
largest are the deployment of IPv6, power for sensors, and agreement on standards.
8.2.1 DEPLOYMENT OF IPv6: The world ran out of IPv4 addresses in February 2010.
While no real impact has been seen by the general public, this situation has the potential to slow
IoT’s progress since the potentially billions of new sensors will require unique IP addresses. In
addition, IPv6 makes the management of networks easier due to auto configuration capabilities
and offers improved security features.
8.2.2 SENSOR ENERGY: For IoT to reach its full potential, sensors will need to be self-
sustaining. Imagine changing batteries in billions of devices deployed across the planet and even
into space. Obviously, this isn’t possible. What’s needed is a way for sensors to generate
electricity from environmental elements such as vibrations, light, and airflow. In a significant
Dept. of ECE 23
SEPTEMBER, 2015 INTERNET OF THINGS
breakthrough, scientists announced a commercially viable nanogenerator—a flexible chip that
uses body movements such as the pinch of a finger to generate electricity—at the 241st National
Meeting & Exposition of the American Chemical Society in March 2011.
8.3 DISADVANTAGES Three of the main concerns that accompany the Internet of Things are the breach of
privacy, over-reliance on technology, and the loss of jobs. When anything is put on the internet
it will always be there. Of course there are security measures that are taken to protect
information, but there is always the possibility of hackers breaking into the system and stealing
the data. For example, Anonymous is a group of individuals that hacked into federal sites and
released confidential information to the public. Meanwhile the government is supposed to have
the highest level of security, yet their system was easily breached. Therefore, if all of our
information is stored on the internet, people could hack into it, finding out everything about
individuals lives. Also, companies could misuse the information that they are given access
to. This is a common mishap that occurs within companies all the time. Just recently Google got
caught using information that was supposed to be private. Information, such as the data
collected and stored by IoT, can be immensely beneficial to companies.
The privacy issues also leads to the question of who will control the Internet of
Things? If there is only one company, that could potentially lead to a monopoly hurting
consumers and other companies. If there are multiple companies that are given access to the
information acquired, doesn’t that breach consumers privacy? Also, where is the information
going to be stored? Phone service suppliers such as Verizon and AT&T are no longer offering
unlimited data usage for mobile phones because it is too costly, yet by 2020 it is expected that 50
billion devices will be connected, collecting and storing data.
Another argument against IoT is the over-reliance on technology. As time has
progressed, our current generation has grown up with the readily availability of the internet and
technology in general. However, relying on technology on a day to day basis, making decisions
by the information that it gives up could lead to devastation. No system is robust and fault-
free. We see glitches that occur constantly in technology, specifically involving the
internet. Depending on the amount that an individual relies on the information supplied could be
detrimental if the system collapses. The more we entrust and the more dependent we are on the
Internet could lead to a potentially catastrophic event if it crashes.
Dept. of ECE 24
SEPTEMBER, 2015 INTERNET OF THINGS
Finally the connecting of more and more devices to the Internet will result in the loss of
jobs. The automation of IoT “will have a devastating impact on the employment prospects of
less-educated workers”. For example, people who evaluate inventory will lose their jobs because
devices can not only communicate between each other, but transmit that information to the
owner. We already are witnessing jobs being lost to automated machines, such as the checkout
line in supermarkets and even ATM’s. These disadvantages can be largely devastating to society
as a whole, as well as individuals and consumers.
8.4 THE FUTURE OF IoT
In the near future the Internet and wireless technologies will connect different sources of
information such as sensors, mobile phones and cars in an ever tighter manner. The number of
devices which connect to the Internet is – seemingly exponentially – increasing. These billions of
components produce consume and process information in different environments such as logistic
applications, factories and airports as well as in the work and everyday lives of people. The
society need new, scalable, and compatible and secure solutions for both the management of the
ever broader, complexly-networked Internet of Things, and also for the support of various
business models.
The aim of our Internet of Things Strategic Research Agenda is both to create framework
for study within the given field and also to clearly define the central research objectives.
Dept. of ECE 25
SEPTEMBER, 2015 INTERNET OF THINGS
CONCLUSION
Anyone who says that Internet has fundamentally changed society may be right, but at
the same time, the greatest transformation actually still lies ahead of us. Several new
technologies are now converging in a way that means the internet is on the brink of a substantial
expansion as object large and small get connected and assume their own web identity.
Following on from internet of computers, when our servers and personal computers were
connected to a global network and internet and mobile network, when it was the turn of
telephone and other equipments, the next phase of development is Internet of things, where
more or less anything will be connected and managed in the virtual world. This revolution will
be the web’s largest enlargement ever and will have sweep in effects on every industry and all of
our everyday lives.
Already, IoT projects are under way that promise to close the gap between poor and rich,
improve distribution of the world’s resources to those who need them most, and help us
understand our planet so we can be more proactive and less reactive. Even so, several barriers
exist that threaten to slow IoT development, including the transition to IPv6, having a common
set of standards, and developing energy sources for millions—even billion of minute sensors.
However, as businesses, governments, standards bodies, and academia work together to solve
these challenges, IoT will continue to progress. The goal of this paper, therefore, is to educate
you in plain and simple terms so you can be well versed in IoT and understand its potential to
change everything we know to be true today.
Dept. of ECE 26
SEPTEMBER, 2015 INTERNET OF THINGS
REFERENCES
IEEE PAPERS:
[1] L. Atzori, A. Iera, and G. Morabito, ``The Internet of Things: A survey,'' Comput. Netw., vol.
54, no. 15, pp. 2787_2805, Oct. 2010. [Online].
Available: http://dx.doi.org/10.1016/j.comnet.2010.05.010
[2] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ``Context aware computing for
the Internet of Things: A survey,'' IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414_454,
Jan. 2013.
[3] A. Zaslavsky, C. Perera, and D. Georgakopoulos, ``Sensing as a service and big data,'' in
Proc. Int. Conf. Adv. Cloud Comput. (ACC), Bangalore, India, Jul. 2012, pp. 21_29.
[4] H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelf_é, ``Vision and challenges for realising
the Internet of Things,'' European Commission Information Society and Media, Luxembourg,
Tech. Rep., Mar. 2010. [Online]. Available: http://www.internet-of-things-research.eu/
pdf/IoT_Clusterbook_March_2010.pdf, accessed Oct. 10, 2011.
[5] G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith,and P. Steggles, ``Towards a
better understanding of context andcontext-awareness,'' in Proc. 1st Int. Symp. Handheld
UbiquitousComput.(HUC),1999,pp.304_307.[Online].Available: http://dl.acm.org/citation.cfm?
id=647985.743843
[11] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, ``Internet of Things for smart
cities,'' IEEE Internet Things J., vol. 1, no. 1, pp. 22_32, Feb. 2014.
[34] S. Cirani et al., ``A scalable and self-con_guring architecture for service discovery in the
Internet of Things,'' IEEE Internet Things J., vol. 1, no. 5, pp. 508_521, Oct. 2014.
Dept. of ECE 27
SEPTEMBER, 2015 INTERNET OF THINGS
JOURNALS AND BOOKS:
1. The Internet of Things How the Next Evolution of the Internet Is Changing Everything-by
Dave Evans
2. Fortune at the Bottom of the Pyramid: Eradicating Poverty Through Profits-Dr. C.K.Prahalad
3. The Economist, 2010
WEBSITES:
1. Wikipedia, 2011.
2. Cisco IBSG, 2011.
3 U.S. Census Bureau, 2010; Forrester Research, 2003.
4. Wikipedia, 2010.
5. Cisco IBSG, 2010; U.S. Census Bureau, 2010.
6. While no one can predict the exact number of devices connected to the Internet at any given
time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a
generally agreed-upon number of connected devices at a point in time (500 million in 2003)
provides an estimate that is appropriate for the purposes of this paper. Sources: “Internet Growth
Follows Moore's Law Too,” Lisa Zyga, PhysOrg.com, January 14, 2009,
http://www.physorg.com/news151162452.html; George Colony, Forrester Research founder and
chief executive officer, March 10, 2003, http://www.infoworld.com/t/platforms/forrester-ceo-
web-services-next-it-storm-873
7. “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla-
Rubio and Simon Willis, Cisco IBSG, March 2009,
http://www.cisco.com/web/about/ac79/docs/pov/Planetary_Skin_POV_vFINAL_spw _jc_2.pdf
8. World Internet Stats: Usage and Population Statistics, June 30, 2010.
9. Cisco, 2010; HP, 2010.
Dept. of ECE 28
SEPTEMBER, 2015 INTERNET OF THINGS
VIVA VOCE
1. Which was the first network using TCP/IP protocol?
The Advanced Research Projects Agency Network (ARPANET) was an early packet
switching network and the first network to implement the protocol suite TCP/IP. Both
technologies became the technical foundation of the Internet. ARPANET was initially funded by
the Advanced Research Projects Agency (ARPA, later Defense Advanced Research Projects
Agency, DARPA ) of the United States Department of Defense.
2. What is an INTERNET PROTOCOL (IP) address?
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer, printer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
3. What is an RFID?
Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking tags attached to objects. The tags
contain electronically stored information. Some tags are powered by electromagnetic
induction from magnetic fields produced near the reader. Some types collect energy from the
interrogating radio waves and act as a passive transponder. Other types have a local power
source such as a battery and may operate at hundreds of meters from the reader.
4. What is the significance of cloud computing?
Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the
effectiveness of the shared resources. Cloud resources are usually not only shared by multiple
users but are also dynamically reallocated per demand. This can work for allocating resources to
users. For example, a cloud computer facility that serves European users during European
business hours with a specific application (e.g., email) may reallocate the same resources to
serve North American users during North America's business hours with a different application
Dept. of ECE 29
SEPTEMBER, 2015 INTERNET OF THINGS
(e.g., a web server). This approach should maximize the use of computing power thus reducing
environmental damage as well since less power, air conditioning, rack space, etc. are required for
a variety of functions. With cloud computing, multiple users can access a single server to retrieve
and update their data without purchasing licenses for different applications.
5. What is proximity sensor?
A proximity sensor is a sensor able to detect the presence of nearby objects without any physical
contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic
radiation (infrared, for instance), and looks for changes in the field or return signal. The object
being sensed is often referred to as the proximity sensor's target. Different proximity sensor
targets demand different sensors. For example, a capacitive or photoelectric sensor might be
suitable for a plastic target; an inductive proximity sensor always requires a metal target. The
maximum distance that this sensor can detect is defined "nominal range". Some sensors have
adjustments of the nominal range or means to report a graduated detection distance. Proximity
sensors can have a high reliability and long functional life because of the absence of mechanical
parts and lack of physical contact between sensor and the sensed object.
6. What are nanogenerators?
Nanogenerators are a flexible chip that uses body movements such as the pinch of a finger to
generate electricity.
7. Give and explain an application of context aware information in medical science?
Context-aware mobile agents are a best suited host implementing any context-aware
applications. Modern integrated voice and data communications equips the hospital staff with
smart phones to communicate vocally with each other, but preferably to look up the next task to
be executed and to capture the next report to be noted.
However, all attempts to support staff with such approaches are hampered till failure of
acceptance with the need to look up upon a new event for patient identities, order lists and work
schedules. Hence a well suited solution has to get rid of such manual interaction with a tiny
screen and therefore serves the user with
automated identifying actual patient and local environment upon approach,
automated recording the events with coming to and leaving off the actual patient,
Dept. of ECE 30
SEPTEMBER, 2015 INTERNET OF THINGS
automated presentation of the orders or service due on the current location
8. Describe about the frequency of operation of RF ID?
RFID is considered as a non specific short range device. It can use frequency band without
license; Nevertheless it has to be complaint with local regulations (FCC,ETSI etc).
Low freq: 125 KHz-134 KHz
High freq: 13.56 MHz
Ultra high freq: 860 MHz-960 MHz
Super high freq: 2.45GHz
9. Describe about IPv4?
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232)
possible unique addresses. IPv4 reserves some addresses for special purposes such as private
networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4
addresses are canonically represented in dot-decimal notation, which consists of four decimal
numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents
a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be
presented in various hexadecimal, octal, or binary representations.
Dept. of ECE 31
Recommended