48
SEPTEMBER, 2015 INTERNET OF THINGS CHAPTER 1 INTRODUCTION “With a trillion sensors embedded in the environment—all connected by computing systems, software, and services—it will be possible to hear the heartbeat of the Earth, impacting human interaction with the globe as profoundly as the Internet has revolutionized communication.”- Peter Hartwell The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will change Everything, including ourselves. This may seem like a bold statement, but consider the impact the Internet already has had on education, communication, business, science, government, and humanity. Clearly, the Internet is one of the most important and powerful creations in all of human history. Now consider that IoT represents the next evolution of the Internet, taking a huge leap in its ability to gather, analyze, and distribute data that we can turn into information, knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important. Already, IoT projects are under way that promise to close the gap between poor and rich, improve distribution of the world’s resources to those who need them most, and help us understand our planet so we can be more proactive and less reactive. Even so, several barriers exist that Dept. of ECE 1

iot report 3 (2)

Embed Size (px)

Citation preview

Page 1: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 1

INTRODUCTION

“With a trillion sensors embedded in the environment—all connected by computing

systems, software, and services—it will be possible to hear the heartbeat of the Earth, impacting

human interaction with the globe as profoundly as the Internet has revolutionized

communication.”- Peter Hartwell

The Internet of Things (IoT), sometimes referred to as the Internet of Objects, will

change Everything, including ourselves. This may seem like a bold statement, but consider the

impact the Internet already has had on education, communication, business, science, government,

and humanity. Clearly, the Internet is one of the most important and powerful creations in all of

human history. Now consider that IoT represents the next evolution of the Internet, taking a huge

leap in its ability to gather, analyze, and distribute data that we can turn into information,

knowledge, and, ultimately, wisdom. In this context, IoT becomes immensely important.

Already, IoT projects are under way that promise to close the gap between poor and rich,

improve distribution of the world’s resources to those who need them most, and help us

understand our planet so we can be more proactive and less reactive. Even so, several barriers

exist that threaten to slow IoT development, including the transition to IPv6, having a common

set of standards, and developing energy sources for millions even billions of minute sensors.

However, as businesses, governments, standards bodies, and academia work together to

solve these challenges, IoT will continue to progress. The goal of this paper, therefore, is to

educate you in plain and simple terms so you can be well versed in IoT and understand its

potential to change everything we know to be true today.

Over the last few years the Internet of Things (IoT) has gained significant attention from

both industry and academia. Since the term was introduced in the late 1990s many solutions have

been introduced to the IoT marketplace by different types of organizations, ranging from start-

Dept. of ECE 1

Page 2: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

ups, academic institutions, government organizations and large enterprise. IoT's popularity is

governed by both the value that it promises to create and market growth and predictions. It

allows `people and things to be connected Anytime, Anyplace, with Anything and Anyone,

ideally using Any path/network and Any service'. Such technology will help to create `a better

world for human beings', where objects around us know what we like, what we want, and what

we need and act accordingly without explicit instructions. Context-aware communications and

computing are key to enable the intelligent interactions such as those the IoT paradigm envision.

Fig: 1.1 a) Smart oven

b) Smart fridge

c) Smart washing machine

(All are network connected)

Dept. of ECE 2

Page 3: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 2

LITERATURE SURVEY

The emerging importance of network connected object is described in [1]. Since the term

was introduced in the late 1990s many solutions have been introduced to the IoT marketplace by

different types of organizations, ranging from start-ups, academic institutions, government

organizations and large enterprises.

The main principle of connecting everything including humans and other objects through

any network or path or service is described in [4].Things that can be connected through various

equipments like RFID, sensors, nanotech and smart-tech equipments.

Context-aware communications and computing are keys to enable the intelligent

interactions such as those the IoT paradigm envisions. Context-Aware information and

computing methods are described in [5]. Context-awareness can be defined as the ability of a

system to provide relevant information or services to users using context information where

relevance depends on the user's task. Context-aware communications and computing have been

researched extensively since early 2000s and several surveys have been conducted in this field.

According to BCC Research's 2011 market report on sensors, the global market for

sensors was around $56.3 billion in 2010. In 2011, it was around $62.8 billion. It is expected to

increase to $91.5 billion by 2016, at a compound annual growth rate of 7.8%. One of the

techniques for connecting everyday objects into networks is the radio frequency identification

(RFID) technology is given in [9]. In RFID, the data carried by the chip attached to an object is

transmitted via wireless links. RFID has the capability to convert dump devices into

comparatively smart objects. RFID systems can be used wherever automated labeling,

identification, registration, storage, monitoring, or transport is required to increase efficiency and

effectiveness. According to Frost & Sullivan (2011), the global RFID market was valued at from

$3 billion to $4 billion in 2009. The RFID market will grow by 20% per year through 2016 and

reach a volume of approximately from $6.5 billion to almost $9 billion.

Dept. of ECE 3

Page 4: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

``Smart city'' is a concept aimed at providing a set of new generation services and

infrastructure with the help of information and communication technologies (ICT) which is given

in [10]. Smart cities are expected to be composed of many different smart domains. Smart

transportation, smart security and smart energy management are some of the most important

components for building smart cities ,which was described in[11]. However, in term of market,

smart homes, smart grid, smart healthcare, and smart transportation solutions are expected to

generate the majority of sales. According to Markets and Markets report on Smart Cities Market

(2011 - 2016), the global smart city market is expected to cross $1 trillion by 2016.

Cloud computing is a model for enabling ubiquitous network access to a shared pool of

configurable computing resources. This was discussed in [34].

Cloud computing and storage solutions provide users and enterprises with various

capabilities to store and process their data in third-party data centers. It relies on sharing of

resources to achieve coherence and economies of scale, similar to a utility (like the electricity

grid) over a network. At the foundation of cloud computing is the broader concept of converged

infrastructure and shared services

I also collected information about the solutions from their respective websites, demo

videos, technical specifications, and consumer reviews. Understanding how context-aware

technologies are used in the IoT solutions in the industry's marketplace is vital for academics,

researchers, and industrialists so they can identify trends, industry requirements, demands, and

innovation opportunities.

Dept. of ECE 4

Page 5: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 3

FRAMERS IN IoTs

INTERNET OF THINGS: The Internet of Things (IoT) is a dynamic global information

network consisting of Internet connected objects, such as radio frequency identifications,

sensors, and actuators, as well as other instruments and smart appliances that are becoming an

integral component of the Internet.

CONTEXT: Contexts can be defined as any information that can be used to characterize the

situation of an entity.

ENTITY: An entity is a person, place, piece of software, software service or object that is

considered relevant to the interaction between a user and an application, including the user and

application themselves

CONTEXT AWARENESS: Context-awareness can be defined as the ability of a system to

provide relevant information or services to users using context information where relevance

depends on the user's task

SMART CITY: ``Smart city'' is a concept aimed at providing a set of new generation services

and infrastructure with the help of information and communication technologies (ICT).

Smart cities are expected to be composed of many different smart domains. Smart transportation,

smart security and smart energy management are some of the most important components for

building smart cities

SMART DEVICE:A smart device is an electronic device, generally connected to other devices

or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can

operate to some extent interactively and autonomously.

Dept. of ECE 5

Page 6: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

IP ADDRESS: An Internet Protocol address (IP address) is a numerical label assigned to each

device (e.g., computer, printer) participating in a computer network that uses the Internet

Protocol for communication. An IP address serves two principal functions: host or network

interface identification and location addressing.

RFID: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to

transfer data, for the purposes of automatically identifying and tracking tags attached to objects.

The tags contain electronically stored information. Some tags are powered by electromagnetic

induction from magnetic fields produced near the reader. Some types collect energy from the

interrogating radio waves and act as a passive transponder. Other types have a local power

source such as a battery and may operate at hundreds of meters from the reader. Unlike

a barcode, the tag does not necessarily need to be within line of sight of the reader and may be

embedded in the tracked object. RFID is one method for Automatic Identification and Data

Capture (AIDC).

SENSOR: A sensor is a transducer whose purpose is to sense some characteristic of its

environments. It detects events or changes in quantities and provides a corresponding output,

generally as an electrical or optical signal; for example, a thermo couple converts temperature to

an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured

temperature into expansion and contraction of a liquid which can be read on a calibrated glass

tube.

NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on

an atomic, molecular, and supramolecular scale. The earliest, widespread description of

nanotechnology referred to the particular technological goal of precisely manipulating atoms and

molecules for fabrication of macroscale products, also now referred to as molecular

nanotechnology.

Dept. of ECE 6

Page 7: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 4

EVOLUTION AND CURRENT STATUS OF IoTs

IoT’s roots can be traced back to the Massachusetts Institute of Technology (MIT), from

work at the Auto-ID Center. Founded in 1999, this group was working in the field of networked

radio frequency identification (RFID) and emerging sensing technologies. The labs consisted of

seven research universities located across four continents. These institutions were chosen by the

Auto-ID Center to design the architecture for IoT.

Before we talk about the current state of IoT, it is important to agree on a definition.

According to the Cisco Internet Business Solutions Group (IBSG), IoT is simply the point in

time when more “things or objects” were connected to the Internet than people.

Fig: 4.1 Internet of Things Was “Born” Between 2008 and 2009

Dept. of ECE 7

Page 8: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

In 2003, there were approximately 6.3 billion people living on the planet and 500 million

devices connected to the Internet.3 By dividing the number of connected devices by the world

population, we find that there was less than one (0.08) device for every person. Based on Cisco

IBSG’s definition, IoT didn’t yet exist in 2003 because the number of connected things was

relatively small given that ubiquitous devices such as smart-phones were just being introduced.

For example, Steve Jobs, Apple’s CEO, didn’t unveil the iPhone until January 9, 2007 at the

Macworld conference

Looking to the future, there will be 25 billion devices connected to the Internet by 2015

and 50 billion by 2020. It is important to note that these estimates do not take into account rapid

advances in Internet or device technology; the numbers presented are based on what is known to

be true today. Additionally, the number of connected devices per person may seem low. This is

because the calculation is based on the entire world population, much of which is not yet

connected to the Internet. By reducing the population sample to people actually connected to the

Internet, the number of connected devices per person rises dramatically.

Fig:4.2 Growth in internet connected object

For example, we know that approximately 2 billion people use the Internet today. Using

this figure, the number of connected devices per person jumps to 6.25 in 2010, instead of 1.84.

Of course, we know nothing remains static, especially when it comes to the Internet. Initiatives

and advances, such as Cisco’s Planetary Skin, HP’s central nervous system for the earth

Dept. of ECE 8

Page 9: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

(CeNSE), and smart dust, have the potential to add millions—even billions of sensors to the

Internet. As cows, water pipes, people, and even shoes, trees, and animals become connected to

IoT, the world has the potential to become a better place.

Currently, IoT is made up of a loose collection of disparate, purpose-built networks.

Today’s cars, for example, have multiple networks to control engine function, safety features,

communications systems, and so on. Commercial and residential buildings also have various

control systems for heating, venting, and air conditioning (HVAC); telephone service; security;

and lighting. As IoT evolves, these networks, and many others, will be connected with added

security, analytics, and management capabilities. This will allow IoT to become even more

powerful in what it can help people achieve.

Fig: 4.2 IoT as networks of network

Dept. of ECE 9

Page 10: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 5

EVOLUTION OF CONTEXT AWARE TECHNOLOGY

It is important to understand the evolution of the Internet before discussing the evolution

of context-aware technologies. it is first necessary to understand the differences between the

Internet and the World Wide Web (or web),terms that are often used interchangeably.

The Internet is the physical layer or network made up of switches, routers, and other

equipment. Its primary function is to transport information from one point to another quickly,

reliably, and securely. The web, on the other hand, is an application layer that operates on top of

the Internet. Its primary role is to provide an interface that makes the information flowing across

the Internet usable.

5.1 EVOLUTION OF WEB VERSUS INTERNETThe web has gone through several distinct evolutionary stages:

Stage 1. First was the research phase, when the web was called the Advanced Research Projects

Agency Network (ARPANET). During this time, the web was primarily used by academia for

research purposes.

Stage 2. The second phase of the web can be coined “brochureware.” Characterized by the

domain name “gold rush,” this stage focused on the need for almost every company to share

information on the Internet so that people could learn about products and services.

Stage 3. The third evolution moved the web from static data to transactional information, where

products and services could be bought and sold, and services could be delivered. During this

phase, companies like eBay and Amazon.com exploded on the scene. This phase also will be

infamously remembered as the “dot-com” boom and bust.

Dept. of ECE 10

Page 11: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

Stage 4. The fourth stage, where we are now, is the “social” or “experience” web, where

companies like Face book, Twitter, and Group-on have become immensely popular and

profitable (a notable distinction from the third stage of the web) by allowing people to

communicate, connect, and share information (text, photos, and video) about themselves with

friends, family, and colleagues.

5.2 EVOLUTION OF INTERNETThe Internet broadly evolved in five phases as illustrated in Figure.

The evolution of Internet begins with connecting two computers together and then

moved towards creating the World Wide Web by connecting large number of computers

together. Mobile-Internet emerged when mobile devices were connected to the Internet. People's

identities were added to the Internet via social networks. Finally, the Internet of Things emerged,

comprised of everyday objects added to the Internet. During the course of these phases, the

application of context-aware communication and computing changed significantly.

Fig: 5.1 Evolution of Internet of things

In the early phase of computer networking when computers were connected to each other

in point-to-point fashion, context-aware functionalities were not widely used. Providing help to

users based on the context (of the application currently open) was one of the fundamental

context-aware interactions provided in early computer applications and operating systems.

Dept. of ECE 11

Page 12: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

Another popular use of context is context aware menus that help users to perform tasks

tailored to each situation in a given application. When the Internet came into being, location

information started to become critical context information. Location information (retrieved

through IP addresses) were used by services offered over the Internet in order to provide

location-aware customization to users. Once the mobile devices (phones and tablets) became a

popular and integral part of everyday life, context information collected from sensors built-in to

the devices (e.g. accelerometer, gravity, gyroscope, GPS, linear accelerometer, and rotation

vector, orientation, geomagnetic field, and proximity, and light, pressure, humidity and

temperature) were used to provide context-aware functionality. For example, built-in sensors are

used to determine user activities, environmental monitoring, health and well-being, location and

so on.

Over the last few years social networking has become popular and widely used. Context

information gathered through social networking services (e.g. Facebook, Myspace, Twitter, and

Foursquare) has been fused with the other context information retrieved through mobile devices

to build novel context-aware applications such as activity predictions, recommendations, and

personal assistance.

For example, a mobile application may offer context-aware functionalities by fusing

location information retrieved from mobile phones and recent `likes' retrieved from social media

sites to recommend nearby restaurants that a user might like. In the next phase, `things' were

connected to the Internet by creating the IoT paradigm. An example of context-aware

functionality provided in the IoT paradigm would be an Internet-connected refrigerator telling

users what is inside it, what needs to be purchased or what kind of recipes can be prepared for

dinner. When the user leaves the office, the application autonomously does the shopping and

guides the user to a particular shopping market so she or he can collect the goods it has

purchased. In order to perform such tasks, the application must fuse location data, user

preferences, activity prediction, user schedules, information retrieved through the refrigerator

(i.e. shopping list) and many more. In the light of the above examples, it is evident that the

complexity of collecting, processing and fusing information has increased over time. The amount

of information collected to aid decision making has also increased significantly.

Dept. of ECE 12

Page 13: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 6

EVALUATION FRAMEWORK

6.1 CONTEXT AWARE FEATURES: This section deals with the various

evaluation framework used in Internet of Things. The evaluation framework which we

used to review IoT products in the marketplace are built upon the theoretical foundation

present in this section.

Fig: 6.1 Context aware features

Dept. of ECE 13

Page 14: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

1. Presentation: Contexts can be used to decide what information and services need to be

presented to the user. Let us consider a smart environment scenario. When a user enters a

supermarket and takes their smart phones out, what they want to see are their shopping lists.

Context-aware mobile applications need to connect to kitchen appliances such as smart

refrigerators at home to retrieve the shopping lists and present them to the users. This provides

the idea of presenting information based on contexts such as location, time, etc. By definition,

IoT promises to provide any service, at anytime, anyplace, with anything and anyone, ideally

using any path/network.

2. Execution: Automatic execution of services is also a critical feature in the IoT paradigm. Let

us consider a smart home environment. When a user starts driving home from his/her office, the

IoT application employed in the house should switch on the air condition system and switch on

the coffee machine to be ready to use by the time the user steps into the house. These actions

need to be taken automatically based on the context. In it, machine-to-machine communication is

a significant part of the IoT.

3. Tagging: In the IoT paradigm, there will be a large number of sensors attached to the

everyday objects. These objects will produce large volumes of sensory data that have to be

collected, analyzed, fused and interpreted. Sensory data produced by a single sensor will not

provide the necessary information that can be used to fully understand the situation. Therefore,

data collected through multiple sensors need to be fused together. In order to accomplish the

sensor data fusion task, contexts need to be collected. Contexts need to be tagged together with

the sensory data to be processed and understood later. Therefore, context annotation plays a

significant role in context-aware computing research. Here, the tagging operation is also

identified as annotation.

6.2 DATA FLOW IN IoTsFigure 6.2 visualizes how data is being collected, transferred, processed, and how context

is discovered and annotated in typical IoT solutions. It is important to note that not all solutions

may use the exactly the same data flow. Each solution may use part of the architecture in their

own solution. I had refer to this common data flow architecture in this seminar t demonstrate

Dept. of ECE 14

Page 15: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

how each solution may design their data flows. Our objective is to identify major strategies that

are used by IoT products to offer context-aware functionalities.

Fig: 6.2 High level data flow in IoTs

6.2.1 ENABLING TECHNOLOGIES IN DATA FLOW OF IoTs

1. RFIDS: Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to

transfer data, for the purposes of automatically identifying and tracking tags attached to objects.

The tags contain electronically stored information. Some tags are powered by electromagnetic

induction from magnetic fields produced near the reader. Some types collect energy from the

interrogating radio waves and act as a passive transponder. Other types have a local power

Dept. of ECE 15

Page 16: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

source such as a battery and may operate at hundreds of meters from the reader. Unlike

a barcode, the tag does not necessarily need to be within line of sight of the reader and may be

embedded in the tracked object. RFID is one method for Automatic Identification and Data

Capture (AIDC).

RFID tags are used in many industries. For example, an RFID tag attached to an

automobile during production can be used to track its progress through the assembly line; RFID-

tagged pharmaceuticals can be tracked through warehouses; and implanting RFID microchips in

livestock and pets allows positive identification of animals.

Since RFID tags can be attached to cash, clothing, and possessions, or implanted in animals and

people, the possibility of reading personally-linked information without consent has raised

serious privacy concerns

Fig: 6.3 Enabling technologies in RFIDs

2. SENSORS: A sensor is a transducer whose purpose is to sense (that is, to detect) some

characteristic of its environments. It detects events or changes in quantities and provides a

corresponding output, generally as an electrical or optical signal; for example, a thermo

couple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a

sensor; it converts the measured temperature into expansion and contraction of a liquid which

can be read on a calibrated glass tube.

Dept. of ECE 16

Page 17: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

Sensors are used in everyday objects such as touch-sensitive elevator buttons (tactile

sensor) and lamps which dim or brighten by touching the base, besides innumerable applications

of which most people are never aware. With advances in micro machinery and easy-to-use micro

controller platforms, the uses of sensors have expanded beyond the more traditional fields of

temperature, pressure or flow measurement, for example into MARG sensors. Moreover, analog

sensors such as potentiometers and force-sensing resistors are still widely used. Applications

include manufacturing and machinery, airplanes and aerospace, cars, medicine and robotics. A

sensor's sensitivity indicates how much the sensor's output changes when the input quantity

being measured changes. For instance, if the mercury in a thermometer moves 1 cm when the

temperature changes by 1 °C, the sensitivity is 1 cm/°C (it is basically the slope Dy/Dx assuming

a linear characteristic).

A proximity sensor is a sensor able to detect the presence of nearby objects without any

physical contact. A proximity sensor often emits an electromagnetic field or a beam

of electromagnetic radiation (infrared, for instance), and looks for changes in the field or return

signal. The object being sensed is often referred to as the proximity sensor's target. Different

proximity sensor targets demand different sensors. For example, a capacitive or photoelectric

sensor might be suitable for a plastic target; an inductive proximity sensor always requires a

metal target. The maximum distance that this sensor can detect is defined "nominal range". Some

sensors have adjustments of the nominal range or means to report a graduated detection distance.

Proximity sensors can have a high reliability and long functional life because of the

absence of mechanical parts and lack of physical contact between sensor and the sensed object.

Proximity sensors are commonly used on smart phones to detect (and skip) accidental

touch screen taps when held to the ear during a call. They are also used in machine vibration

monitoring to measure the variation in distance between a shaft and its support bearing. This is

common in large steam turbines, compressors, and motors that use sleeve-type bearings.

3.NANOTECH: Nanotechnology ("nanotech") is the manipulation of matter on

an atomic, molecular, and supramolecular scale. The earliest, widespread description of

nanotechnology referred to the particular technological goal of precisely manipulating atoms and

molecules for fabrication of macroscale products, also now referred to as molecular

nanotechnology. A more generalized description of nanotechnology was subsequently

Dept. of ECE 17

Page 18: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

established by the National Nanotechnology Initiative, which defines nanotechnology as the

manipulation of matter with at least one dimension sized from 1 to 100 nanometers.

4.SMART-TECH: A smart device is an electronic device, generally connected to other devices

or networks via different wireless protocols such as Bluetooth, NFC, Wi-Fi, 3G, etc., that can

operate to some extent interactively and autonomously. It is widely believed that these types of

devices will outnumber any other forms of smart computing and communication in a very short

time, in part, acting as a useful enabler for the Internet of Things. Several notable types of smart

devices as of the time of this writing are smart-phones (like the Apple iPhone or most of the

devices running Android operating system),  tablets (like the Apple iPad ), smart-watches, smart

bands and smart keychains .The term can also refer to a ubiquitous computing device: a device

that exhibits some properties of ubiquitous computing including–although not necessarily–

artificial intelligence.

Dept. of ECE 18

Page 19: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 7

IoT PRODUCTS

7.1 MIMO: Mimo has built a smart nursery system, where parents learn new insights about

their baby through connected products like the Mimo Smart Baby Monitor. In this product, turtle

is the device that collects all primary contextual information. Then, the data is transferred to an

intermediary device called lilypad. Such offloading strategy allows to reduce the turtle's weight

at minimum level and to increase the battery life. The communication and processing capabilities

are offloaded to the lilypad device that can be easily recharged when necessary. We can see

Mimo Smart Baby Monitor uses some parts of the data flow architecture as we presented in Fig.

Cloud services perform the additional processing functionality, and the summarized data is

pushed to the mobile devices for context presentation. In the user interface side, parents are

presented mostly the secondary context information such as baby movement and baby's sleeping

status. Accelerometers are used to discover such secondary context information by using pattern

recognition techniques.

Fig: 7.1 MIMO system

Dept. of ECE 19

Page 20: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

7.2. SENSE AWARE ITEMS: Sense-Aware is a solution developed to support real-time

shipment tracking. As illustrated in Figure it collects and processes contextual information such

as location, temperature, light, relative humidity and biometric pressure, to enhance the visibility

and transparency of the supply chain. Sense-Aware uses both the hardware and software

components in their sensor-based logistic solution. Such data collection allows different parties

to engage in supply chain to monitor the movement of goods in real-time and accurately knows

the quality of the transported goods, and plan their processes effectively and efficiently.

Secondary context is any information that can be computed by using primary context. it can be

computed by using the sensor data fusion operations, or data retrieval operations such as web

service calls (e.g. identify the distance between two sensors by applying sensor data fusion

operations on two raw GPS sensor values).

Fig: 7.2 Sense Aware system using smart devices

7.3 BLOSSOM: Blossom is a smart watering products that can be self-programmed based on

real-time weather data, and it gives the user control over the phone, thus lowering the water bill

up to 30%. In this kind of scenario, the product may autonomously perform the actions (i.e. open

and close sprinklers), based on the contextual information. Another reaction mechanism used by

IoT solutions is to provide recommendations

7.4 NEST: Nest is capable of learning users' schedules and the temperatures they prefer. It

keeps users comfortable and saves energy when they are away.

7.5 MAID: MAID has a personalization engine that continuously learns about the users. It

learns what users cook regularly, tracks users activity by using the data collected from

smartphones and smart watches. Then, it will provide recommendations for a healthy and

Dept. of ECE 20

Page 21: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

balanced diet. MAID also recommends users to work out or to go for a run based on the calories

they consume each day.

7.6 FiLIP: In FiLIP users send location-aware triggers to make sure children are staying within

the safe area. FiLIP uses a unique blend of GPS, GSM, and Wi-Fi technologies to allow parents

to locate their children by using the most accurate location information, both indoors and

outdoors. Parents can create a virtual radius around a location, such as home, school or a friend's

house. A notification will be sent to the parent's smart-phone when FiLIP detects that their

children have entered or left a safe zone.

7.7FITBIT: Fitbit is a device that can be worn on multiple body parts in order to tracks steps

taken, stairs climbed, calories burned, hours slept, distance traveled, and quality of sleep. This

device collects data and presents it to the users through mobile devices and web interfaces. A

variety of different charts, graphs, icons and other types of graphical elements are heavily used to

summarise and present the analyzed meaningful and actionable data to the users. Such

visualization strategies are commonly encouraged in human computer interaction (HCI)

domains, specially due to the fact that `a picture is worth a thousand words.'

Dept. of ECE 21

Page 22: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CHAPTER 8

DISCUSSION ON IoTs PERFORMANCEThis section discuss about the applications or advantages, disadvantages, challenges and

remedies and future on Internet of Things.

8.1 APPLICATIONS:

Fig: 8.1 Applications

When we crossed the threshold of connecting more objects than people to the Internet, a

huge window of opportunity opened for the creation of applications in the areas of automation,

sensing, and machine-to-machine communication. In fact, the possibilities are almost endless.

The following examples highlight some of the ways IoT is changing people’s lives for the better.

8.1.1MANAGEMENT: Management field applications include data management, waste

management, and urban planning and production management.

8.1.2 LOGISTICS: Warehouse management, inventory control, port management etc are

mainly concentrated in logistic areas.

Dept. of ECE 22

Page 23: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

8.1.3 RETAILS: Intelligent shopping, barcodes in retails and electronic tags in equipment

make shopping more clear, easier and perfect.

8.1.4 PHARMACEUTICALS: Pharmaceutical applications of IoTs include intelligent

treatment tags for drugs, drug usage tracking, providing pharmaceutical websites and help in

providing emergency treatment as fast as possible.

8.1.5 FOOD: Food production management and nutrition calculation can be done with the help

of IoTs. It also prevent overproduction and hence shortage of food and control food quality,

health and safety.

8.1.6 SCHOOL ADMINISTRATION: Attendance management, voting systems during

school election and automatic feedback system on classes can be implemented using IoT

principles.

8.1.7 INSTRUCTIONAL TECHNOLOGIES: In the field of media, information

management and foreign language learning also IoTs have various applications.

8.2 CHALLENGES AND BARRIERS TO IoTSeveral barriers, however, have the potential to slow the development of IoT. The three

largest are the deployment of IPv6, power for sensors, and agreement on standards.

8.2.1 DEPLOYMENT OF IPv6: The world ran out of IPv4 addresses in February 2010.

While no real impact has been seen by the general public, this situation has the potential to slow

IoT’s progress since the potentially billions of new sensors will require unique IP addresses. In

addition, IPv6 makes the management of networks easier due to auto configuration capabilities

and offers improved security features.

8.2.2 SENSOR ENERGY: For IoT to reach its full potential, sensors will need to be self-

sustaining. Imagine changing batteries in billions of devices deployed across the planet and even

into space. Obviously, this isn’t possible. What’s needed is a way for sensors to generate

electricity from environmental elements such as vibrations, light, and airflow. In a significant

Dept. of ECE 23

Page 24: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

breakthrough, scientists announced a commercially viable nanogenerator—a flexible chip that

uses body movements such as the pinch of a finger to generate electricity—at the 241st National

Meeting & Exposition of the American Chemical Society in March 2011.

8.3 DISADVANTAGES            Three of the main concerns that accompany the Internet of Things are the breach of

privacy, over-reliance on technology, and the loss of jobs.  When anything is put on the internet

it will always be there.  Of course there are security measures that are taken to protect

information, but there is always the possibility of hackers breaking into the system and stealing

the data. For example, Anonymous is a group of individuals that hacked into federal sites and

released confidential information to the public. Meanwhile the government is supposed to have

the highest level of security, yet their system was easily breached.   Therefore, if all of our

information is stored on the internet, people could hack into it, finding out everything about

individuals lives.  Also, companies could misuse the information that they are given access

to.  This is a common mishap that occurs within companies all the time.  Just recently Google got

caught using information that was supposed to be private.  Information, such as the data

collected and stored by IoT, can be immensely beneficial to companies. 

            The privacy issues also leads to the question of who will control the Internet of

Things?  If there is only one company, that could potentially lead to a monopoly hurting

consumers and other companies.  If there are multiple companies that are given access to the

information acquired, doesn’t that breach consumers privacy?  Also, where is the information

going to be stored? Phone service suppliers such as Verizon and AT&T are no longer offering

unlimited data usage for mobile phones because it is too costly, yet by 2020 it is expected that 50

billion devices will be connected, collecting and storing data.

            Another argument against IoT is the over-reliance on technology.  As time has

progressed, our current generation has grown up with the readily availability of the internet and

technology in general.  However, relying on technology on a day to day basis, making decisions

by the information that it gives up could lead to devastation.  No system is robust and fault-

free.  We see glitches that occur constantly in technology, specifically involving the

internet. Depending on the amount that an individual relies on the information supplied could be

detrimental if the system collapses.  The more we entrust and the more dependent we are on the

Internet could lead to a potentially catastrophic event if it crashes. 

Dept. of ECE 24

Page 25: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

            Finally the connecting of more and more devices to the Internet will result in the loss of

jobs.  The automation of IoT “will have a devastating impact on the employment prospects of

less-educated workers”.  For example, people who evaluate inventory will lose their jobs because

devices can not only communicate between each other, but transmit that information to the

owner.  We already are witnessing jobs being lost to automated machines, such as the checkout

line in supermarkets and even ATM’s.  These disadvantages can be largely devastating to society

as a whole, as well as individuals and consumers. 

8.4 THE FUTURE OF IoT

In the near future the Internet and wireless technologies will connect different sources of

information such as sensors, mobile phones and cars in an ever tighter manner. The number of

devices which connect to the Internet is – seemingly exponentially – increasing. These billions of

components produce consume and process information in different environments such as logistic

applications, factories and airports as well as in the work and everyday lives of people. The

society need new, scalable, and compatible and secure solutions for both the management of the

ever broader, complexly-networked Internet of Things, and also for the support of various

business models.

The aim of our Internet of Things Strategic Research Agenda is both to create framework

for study within the given field and also to clearly define the central research objectives.

Dept. of ECE 25

Page 26: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

CONCLUSION

Anyone who says that Internet has fundamentally changed society may be right, but at

the same time, the greatest transformation actually still lies ahead of us. Several new

technologies are now converging in a way that means the internet is on the brink of a substantial

expansion as object large and small get connected and assume their own web identity.

Following on from internet of computers, when our servers and personal computers were

connected to a global network and internet and mobile network, when it was the turn of

telephone and other equipments, the next phase of development is Internet of things, where

more or less anything will be connected and managed in the virtual world. This revolution will

be the web’s largest enlargement ever and will have sweep in effects on every industry and all of

our everyday lives.

Already, IoT projects are under way that promise to close the gap between poor and rich,

improve distribution of the world’s resources to those who need them most, and help us

understand our planet so we can be more proactive and less reactive. Even so, several barriers

exist that threaten to slow IoT development, including the transition to IPv6, having a common

set of standards, and developing energy sources for millions—even billion of minute sensors.

However, as businesses, governments, standards bodies, and academia work together to solve

these challenges, IoT will continue to progress. The goal of this paper, therefore, is to educate

you in plain and simple terms so you can be well versed in IoT and understand its potential to

change everything we know to be true today.

Dept. of ECE 26

Page 27: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

REFERENCES

IEEE PAPERS:

[1] L. Atzori, A. Iera, and G. Morabito, ``The Internet of Things: A survey,'' Comput. Netw., vol.

54, no. 15, pp. 2787_2805, Oct. 2010. [Online].

Available: http://dx.doi.org/10.1016/j.comnet.2010.05.010

[2] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, ``Context aware computing for

the Internet of Things: A survey,'' IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414_454,

Jan. 2013.

[3] A. Zaslavsky, C. Perera, and D. Georgakopoulos, ``Sensing as a service and big data,'' in

Proc. Int. Conf. Adv. Cloud Comput. (ACC), Bangalore, India, Jul. 2012, pp. 21_29.

[4] H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelf_é, ``Vision and challenges for realising

the Internet of Things,'' European Commission Information Society and Media, Luxembourg,

Tech. Rep., Mar. 2010. [Online]. Available: http://www.internet-of-things-research.eu/

pdf/IoT_Clusterbook_March_2010.pdf, accessed Oct. 10, 2011.

[5] G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith,and P. Steggles, ``Towards a

better understanding of context andcontext-awareness,'' in Proc. 1st Int. Symp. Handheld

UbiquitousComput.(HUC),1999,pp.304_307.[Online].Available: http://dl.acm.org/citation.cfm?

id=647985.743843

[11] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, ``Internet of Things for smart

cities,'' IEEE Internet Things J., vol. 1, no. 1, pp. 22_32, Feb. 2014.

[34] S. Cirani et al., ``A scalable and self-con_guring architecture for service discovery in the

Internet of Things,'' IEEE Internet Things J., vol. 1, no. 5, pp. 508_521, Oct. 2014.

Dept. of ECE 27

Page 28: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

JOURNALS AND BOOKS:

1. The Internet of Things How the Next Evolution of the Internet Is Changing Everything-by

Dave Evans

2. Fortune at the Bottom of the Pyramid: Eradicating Poverty Through Profits-Dr. C.K.Prahalad

3. The Economist, 2010

WEBSITES:

1. Wikipedia, 2011.

2. Cisco IBSG, 2011.

3 U.S. Census Bureau, 2010; Forrester Research, 2003.

4. Wikipedia, 2010.

5. Cisco IBSG, 2010; U.S. Census Bureau, 2010.

6. While no one can predict the exact number of devices connected to the Internet at any given

time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a

generally agreed-upon number of connected devices at a point in time (500 million in 2003)

provides an estimate that is appropriate for the purposes of this paper. Sources: “Internet Growth

Follows Moore's Law Too,” Lisa Zyga, PhysOrg.com, January 14, 2009,

http://www.physorg.com/news151162452.html; George Colony, Forrester Research founder and

chief executive officer, March 10, 2003, http://www.infoworld.com/t/platforms/forrester-ceo-

web-services-next-it-storm-873

7. “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla-

Rubio and Simon Willis, Cisco IBSG, March 2009,

http://www.cisco.com/web/about/ac79/docs/pov/Planetary_Skin_POV_vFINAL_spw _jc_2.pdf

8. World Internet Stats: Usage and Population Statistics, June 30, 2010.

9. Cisco, 2010; HP, 2010.

Dept. of ECE 28

Page 29: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

VIVA VOCE

1. Which was the first network using TCP/IP protocol?

The Advanced Research Projects Agency Network (ARPANET) was an early packet

switching network and the first network to implement the protocol suite TCP/IP. Both

technologies became the technical foundation of the Internet. ARPANET was initially funded by

the Advanced Research Projects Agency (ARPA, later Defense Advanced Research Projects

Agency, DARPA ) of the United States Department of Defense.

2. What is an INTERNET PROTOCOL (IP) address?

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,

computer, printer) participating in a computer network that uses the Internet Protocol for

communication. An IP address serves two principal functions: host or network

interface identification and location addressing.

3. What is an RFID?

Radio-frequency identification (RFID) is the wireless use of electromagnetic fields to transfer

data, for the purposes of automatically identifying and tracking tags attached to objects. The tags

contain electronically stored information. Some tags are powered by electromagnetic

induction from magnetic fields produced near the reader. Some types collect energy from the

interrogating radio waves and act as a passive transponder. Other types have a local power

source such as a battery and may operate at hundreds of meters from the reader.

4. What is the significance of cloud computing?

Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the

effectiveness of the shared resources. Cloud resources are usually not only shared by multiple

users but are also dynamically reallocated per demand. This can work for allocating resources to

users. For example, a cloud computer facility that serves European users during European

business hours with a specific application (e.g., email) may reallocate the same resources to

serve North American users during North America's business hours with a different application

Dept. of ECE 29

Page 30: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

(e.g., a web server). This approach should maximize the use of computing power thus reducing

environmental damage as well since less power, air conditioning, rack space, etc. are required for

a variety of functions. With cloud computing, multiple users can access a single server to retrieve

and update their data without purchasing licenses for different applications.

5. What is proximity sensor?

A proximity sensor is a sensor able to detect the presence of nearby objects without any physical

contact. A proximity sensor often emits an electromagnetic field or a beam of electromagnetic

radiation (infrared, for instance), and looks for changes in the field or return signal. The object

being sensed is often referred to as the proximity sensor's target. Different proximity sensor

targets demand different sensors. For example, a capacitive or photoelectric sensor might be

suitable for a plastic target; an inductive proximity sensor always requires a metal target. The

maximum distance that this sensor can detect is defined "nominal range". Some sensors have

adjustments of the nominal range or means to report a graduated detection distance. Proximity

sensors can have a high reliability and long functional life because of the absence of mechanical

parts and lack of physical contact between sensor and the sensed object.

6. What are nanogenerators?

Nanogenerators are a flexible chip that uses body movements such as the pinch of a finger to

generate electricity.

7. Give and explain an application of context aware information in medical science?

Context-aware mobile agents are a best suited host implementing any context-aware

applications. Modern integrated voice and data communications equips the hospital staff with

smart phones to communicate vocally with each other, but preferably to look up the next task to

be executed and to capture the next report to be noted.

However, all attempts to support staff with such approaches are hampered till failure of

acceptance with the need to look up upon a new event for patient identities, order lists and work

schedules. Hence a well suited solution has to get rid of such manual interaction with a tiny

screen and therefore serves the user with

automated identifying actual patient and local environment upon approach,

automated recording the events with coming to and leaving off the actual patient,

Dept. of ECE 30

Page 31: iot report 3 (2)

SEPTEMBER, 2015 INTERNET OF THINGS

automated presentation of the orders or service due on the current location

8. Describe about the frequency of operation of RF ID?

RFID is considered as a non specific short range device. It can use frequency band without

license; Nevertheless it has to be complaint with local regulations (FCC,ETSI etc).

Low freq: 125 KHz-134 KHz

High freq: 13.56 MHz

Ultra high freq: 860 MHz-960 MHz

Super high freq: 2.45GHz

9. Describe about IPv4?

In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232)

possible unique addresses. IPv4 reserves some addresses for special purposes such as private

networks (~18 million addresses) or multicast addresses (~270 million addresses). IPv4

addresses are canonically represented in dot-decimal notation, which consists of four decimal

numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents

a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be

presented in various hexadecimal, octal, or binary representations.

Dept. of ECE 31