Iot Module-1
Iot Module-1
Iot Module-1
CONTENT
1. Introduction
2. Genesis of IOT
3. IoT and Digitization
4. IoT Impact
5. Convergence of IT and IoT
6. IoT Challenges
7. IoT Network Architecture and design
8. IoT Data Management and Compute Stack
3
INTRODUCTION – CONT’D
5
WHY IOT?
• Organizations in a variety of industries are using IoT to operate more efficiently, better
understand customers to deliver enhanced customer service, improve decision-making and
increase the value of the business.
6
GENESIS OF IOT
• The age of IoT is started in 2008 and 2009. In these years, more things
connected to the Internet than people in the world
7
Digitization encompasses the connection of ―things ‖ with the data they generate and the
business insights that result.
• Example: Wi-Fi devices in Malls detecting customers, displaying offers, based on the
spends, mall is segregated, changes the location of product displays and advertising.
•
IOT IMPACT
9
CONVERGENCE OF IT AND OT
10
IOT CHALLENGES
Challenge Description
Scale • IT networks scale is larger, The scale of OT is several orders of magnitude larger.
Example: Electrical Company has deployed tons of millions meters in service area where
they employed tens of thousands of employees for acting as IP Node using IP v6.
Security •With more “things” connected with other “things” and people security is an increasingly
complex issue for IoT. Threat surface is greatly expanded and if device gets hacked, its
connectivity is a major concern.
Privacy • A sensor become more prolific in every day lives, the data what they gather will be
specific to individuals and their activities.
• Example: Health information , Shopping patterns, transactions at retail establishments.
Big Data and Data • IoT and large number of sensors are going to trigger deluge of data that must be
Analytics handled.
11
IOT CHALLENGES
Security, privacy and data sharing issues
• Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability
to manipulate all the data, rendering it unusable. And manufacturers that don't update their
devices regularly -- or at all -- leave them vulnerable to cybercriminals.
• However, hackers aren't the only threat to the internet of things; privacy is another major
concern for IoT users. For instance, companies that make and distribute consumer IoT
devices could use those devices to obtain and sell users' personal data.
• Challenges with IIoT:
i. Security of data – same as above
ii. Reliability and stability – of IIoT sensors
iii. Connectivity of all the systems in IIoT setup – no maintenance envisioned?
iv. Blending legacy systems – IIoT is new in the market
12
• This model also has limitations. As data volume, the variety of objects connecting to the
network, and the need for more efficiency increase, new requirements appear, and those
requirements tend to bring the need for data analysis closer to the IoT system. These new
requirements include the following:
1. Minimizing latency
2. Conserving network bandwidth
3. Increasing local efficiency
20
21
FOG COMPUTING
22
END