Iot Module-1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

INTERNET OF THINGS

"Anything that can be connected, will be connected"


2

CONTENT
1. Introduction
2. Genesis of IOT
3. IoT and Digitization
4. IoT Impact
5. Convergence of IT and IoT
6. IoT Challenges
7. IoT Network Architecture and design
8. IoT Data Management and Compute Stack
3

INTRODUCTION – WHAT IS IOT?


• The Internet of things (IoT) is a system of interrelated computing devices, mechanical and
digital machines, objects, animals or people that are provided with unique identifiers
( UIDs ) and the ability to transfer data over a network without requiring human-to-human
or human-to-computer interaction - IoTAgenda
• A thing in the IoT can be a person with a heart monitor implant, a farm animal with a
biochip transponder, an automobile that has built-in sensors to alert the driver when tire
pressure is low or any other natural or man-made object that can be assigned an IP address
and is able to transfer data over a network.
• IoT is a sensor network of billions of smart devices that connect people, systems and other
applications to collect and share data.
4

INTRODUCTION – CONT’D
5

WHY IOT?
• Organizations in a variety of industries are using IoT to operate more efficiently, better
understand customers to deliver enhanced customer service, improve decision-making and
increase the value of the business.
6

GENESIS OF IOT
• The age of IoT is started in 2008 and 2009. In these years, more things
connected to the Internet than people in the world
7

IOT AND DIGITIZATION


 At a high level, IoT focuses on connecting ―things ‖ such as objects and machines, to a
computer network, such as the Internet.

 Digitization encompasses the connection of ―things ‖ with the data they generate and the
business insights that result.

• Example: Wi-Fi devices in Malls detecting customers, displaying offers, based on the
spends, mall is segregated, changes the location of product displays and advertising.

 Digitization: It is the conversion of information into a digital format.


8

IOT IMPACT
9

CONVERGENCE OF IT AND OT
10

IOT CHALLENGES
Challenge Description

Scale • IT networks scale is larger, The scale of OT is several orders of magnitude larger.
Example: Electrical Company has deployed tons of millions meters in service area where
they employed tens of thousands of employees for acting as IP Node using IP v6.
Security •With more “things” connected with other “things” and people security is an increasingly
complex issue for IoT. Threat surface is greatly expanded and if device gets hacked, its
connectivity is a major concern.
Privacy • A sensor become more prolific in every day lives, the data what they gather will be
specific to individuals and their activities.
• Example: Health information , Shopping patterns, transactions at retail establishments.
Big Data and Data • IoT and large number of sensors are going to trigger deluge of data that must be
Analytics handled.
11

IOT CHALLENGES
Security, privacy and data sharing issues
• Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability
to manipulate all the data, rendering it unusable. And manufacturers that don't update their
devices regularly -- or at all -- leave them vulnerable to cybercriminals.
• However, hackers aren't the only threat to the internet of things; privacy is another major
concern for IoT users. For instance, companies that make and distribute consumer IoT
devices could use those devices to obtain and sell users' personal data.
• Challenges with IIoT:
i. Security of data – same as above
ii. Reliability and stability – of IIoT sensors
iii. Connectivity of all the systems in IIoT setup – no maintenance envisioned?
iv. Blending legacy systems – IIoT is new in the market
12

IOT NETWORK ARCHITECTURE AND


DESIGN
• The unique challenges posed by IoT networks and how these challenges have driven new
architectural models.
1. Drivers Behind New Network Architectures.
2. Comparing IoT Architectures.
3. A Simplified IoT Architecture.
4. The Core IoT Functional Stack.
5. IoT Data Management and Compute Stack.
DRIVERS BEHIND NEW NETWORK ARCHITECTURE 13

The key difference between IT and IoT is the Data.


IT systems are mostly concerned with reliable and continuous
support of business application such as email, web, database, CRM
systems and so on.
IoT is all about the data generated by sensors and how that data is
used.
The essence of IoT architectures involve how data is transported,
collected, analyzed and acted upon.
COMPARING IOT ARCHITECTURES 14
A SIMPLIFIED IOT ARCHITECTURE 15
16

THE CORE IOT FUNCTIONAL


STACK
• From an architectural standpoint, several components have to work together for an IoT
network to be operational:
• “Things” layer:
• Communications network layer
• Access network sublayer
• Gateways and backhaul network sublayer
• Network transport sublayer
• IoT network management sublayer
• Application and analytics layer
17

LAYER 1: THINGS: SENSORS AND ACTUATORS LAYER


18

LAYER 2: ACCESS NETWORK SUBLAYER


IOT DATA MANAGEMENT AND COMPUTE STACK 19

• This model also has limitations. As data volume, the variety of objects connecting to the
network, and the need for more efficiency increase, new requirements appear, and those
requirements tend to bring the need for data analysis closer to the IoT system. These new
requirements include the following:
1. Minimizing latency
2. Conserving network bandwidth
3. Increasing local efficiency
20
21

FOG COMPUTING
22

• The defining characteristic of fog computing are as follows:


1. Contextual location awareness and low latency: The fog node sits as close to the IoT
endpoint as possible to deliver distributed computing.
2. Geographic distribution: In sharp contrast to the more centralized cloud, the services and
applications targeted by the fog nodes demand widely distributed deployments.
3. Deployment near IoT endpoints: Fog nodes are typically deployed in the presence of a large
number of IoT endpoints. For example, typical metering deployments often see 3000 to
4000 nodes per gateway router, which also functions as the fog computing node.
4. Wireless communication between the fog and the IoT endpoint: Although it is possible to
connect wired nodes, the advantages of fog are greatest when dealing with a large number
of endpoints, and wireless access is the easiest way to achieve such scale.
5. Use for real-time interactions: Important fog applications involve real-time interactions
rather than batch processing. Preprocessing of data in the fog nodes allows upper-layer
applications to perform batch processing on a subset of the data.
EDGE COMPUTING 23

• The Hierarchy of Edge, Fog, and Cloud


24

END

Thanks for listening

You might also like