Four Pillars of IoT.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Distributed Data Processing
Chapter 5 Middleware and IoT
Ch. 7. Architecture Standardization for WoT
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
SCADA and Telemetry Presented By:.
Network Components 101 Travis Hill.
Ch. 1. The Third ICT Wave The Third ICT Wave.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
IoT, Big Data and Emerging Technologies
Topics of presentation
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
6. Protocol Standardization for IoT 1.  TCP/IP  HTML and HTTP  The difference between the Internet and the World Wide Web The Internet is the term.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
TWOJA CYFROWA PRZYSZŁOŚĆ. JUŻ DZISIAJ. Christoph F. Strnadl CTO Central & Eastern Europe 11 May 2016.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
Internet of Things (IoT)
Internet of Things – Getting Started
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
BLUETOOTH LOW ENERGY Kieon Seong. Introduction  Chap 1. What is Bluetooth Low Energy? Difference Between Classic Bluetooth Device Types Design Goals.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
INTERNET OF THINGS A SEMINAR By SHIKHA M A seminar by Shikha m.
Lecture 7: Internet of Things
Internet Of Things (IoT)
A brief introduction to IoT gateway
English for Advance Learners I
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Internet of Things 1.
Smart Building Solution
Possible options of using DDS in oneM2M
UNIT II –Part 2.
Francisco da Silva, Senior Councillor, Huawei
VANET.
DT80 range Modbus capability
1st Draft for Defining IoT (1)
Smart Building Solution
How SCADA Systems Work?.
Location Information Services
#01 Client/Server Computing
The Internet of Things (IoT) and Analytics
Bluetooth Based Smart Sensor Network
Wireless Ad-Hoc Networking
Adhoc and Wireless Sensor Networks
Dependable, secure and time-aware sensor networks - Overview
Mobile Computing.
Lecture 4: Internet of Things
Principles/Paradigms Of Pervasive Computing
Advance Metering Infrastructure (AMI) system awareness Training
Unit 11- Computer Networks
Substation Automation System
Wireless Ad Hoc Networks
Nenad Stefanovic and Danijela Milosevic
Cloud-Enabling Technology
Sensor Networks – Motes, Smart Spaces, and Beyond
Instructor: Mort Anvari
Global megatrends (relevant for our business)
Enabling the business-based Internet of Things and Services
Internet of Things (IoT)
Mobile Commerce and Ubiquitous Computing
Utilizing the Network Edge
#01 Client/Server Computing
Presentation transcript:

Four Pillars of IoT

The Horizontal, Verticals, and Four Pillars It is very important to sort out those vertical applications and identify common underpinning technologies that can be used across the board, so that interconnecting, interrelating, and synergized grand integration and new creative, disruptive applications can be achieved. One of the common characteristics of the Internet of Things is that objects in a IoT world have to be instrumented, interconnected, before anything can be intelligently processed and used anywhere, anytime, anyway, and anyhow, which are the 5A and 3I characteristics. To achieve such 5A and 3I capabilities, some common, horizontal, general-purpose technologies, standards, and platforms, especially middleware platforms based on common data representations just like the three-tiered application server middleware, HTML language, and HTTP protocol in the Internet/web arena, have to be established to support various vertical applications cost effectively, and new applications can be added to the platform unlimitedly.

Most of the vertical applications of IoT utilize common technologies from the networking level and middleware platform to the application level, such as standard wired and wireless networks, DBMS, security framework, web-based three-tiered middleware, multitenant PaaS, SOA interfaces, and so on. Service management platforms (SMPs) allow for the essential connectivity management, intelligent rate-plan management, and customer self-service capability that are today’s fundamental prerequisites for providing a successful, managed M2M service. Telenor Objects (Telenor Norway) aims to provide layered and horizontal architecture for connecting devices and application.

The six pillars of M2M are as follows: The key benefits of horizontal standard-based platforms will be faster and less costly application development and more highly functional, robust, and secure applications. The six pillars of M2M are as follows: Remote monitoring is a generic term most often representing supervisory control, data acquisition, and automation of industrial assets. RFID is a data-collection technology that uses electronic tags for storing data. A sensor network monitors physical or environmental conditions, with sensor nodes acting cooperatively to form/maintain the network. The term smart service refers to the process of networking equipment and monitoring it at a customer’s site so that it can be maintained and serviced more effectively. Telematics to the integration of telecommunications and infomatics, but most often it refers to tracking, navigation, and entertainment applications in vehicles. Telemetry is usually associated with industrial, medical-, and wildlife-tracking applications that transmit small amounts of vehicles data. A four-pillar graphic is introduced for the broader IoT universe. The four pillars of IoT are M2M, RFID, WSNs and SCADA (supervisory control and data acquisition) M2M uses devices to capture events, via a network connection to a central server, that translates the captured events into meaningful information.

Four Pillars and Networks RFID uses radio waves to transfer data from an electronic tag attached to an object to a central system through a reader for the purpose of identifying and tracking the object. A WSN consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. SCADA is an autonomous system based on closed-loop control theory or a smart system or a CPS data connects, monitors, and controls equipment via network in a facility such as a plant or a building. Harbor Research defines smart systems as a new generation of systems architecture that provides real-time awareness based on inputs from machines, people, video streams, maps, new feeds, sensors, and more that integrate people, processes, and knowledge to enable collective awareness and decision making. Four Pillars of IoT and Their Relevance to Networks Four Pillars and Networks Short-Range Wireless Long-Range Wireless Short-Range Wired Lon-Range Wired RFID Yes Some No WSN M2M SCADA

3.2 M2M: The Internet of Devices The four pillars of IoT paradigms and related networks IoT is the glue that fastens the four pillars through a common set of best practices, networking methodology, and middleware platform. 3.2 M2M: The Internet of Devices Two of the six pillars, remote monitoring and smart service, are features or functions of an IoT system rather pillars. Most of the M2M market research reports assume M2M modules are simply just cellular modules. IoT M2M RFID WSN SCADA

Application Areas for Cellular M2M, p. 67 There is overlap between M2M and the consumer electronics applications. The consumer electronics offerings include the following: Personal navigation devices eReaders Digital picture frames People-tracking devices Pet-tracking devices Home security monitors Personal medical devices

The typical architecture of an M2M system from BiTX. Service 1 2 3 4 5 The M2M Application (the front end) The M2M Middleware (the brains of the system) The Network Infrastructure (the transport) Wireless Wired The M2M Gateway (the interpreter) The Remote Assets S N 6 M2M communication protocol 7 Asset-specific protocol N S Network adapter Gateway Manager Vertical Applications Service Enablememt Middleware (APIs over Internet) Reduce complexities with regard to fragmented connectivity, device standards, application information protocols, and device management. Based on and extend connectivity. Connectivity

RFID: The Internet of Objects An RFID tag is a simplified, low-cost, disposable contactless smartcard. RFID tags include a chip that stores a static number (ID) and attributes of the tagged object and an antenna that enables the chip to transmit the store number to a reader. An RFID system involves hardware known as readers and tags, as well as RFID software or RFID middleware.

3.4 WSN: The Internet of Transducers WSN is more for sensing and information-collecting purposes. Other networks include body sensor network (BSN), visual or video sensor network (VSN), vehicular sensor networks, underwater (acoustic) sensor networks, interplanetary sensor networks, fieldbus networks, and others. The extended scope of WSN is the USN, or ubiquitous sensor network, a network of intelligent sensors that could one day become ubiquitous.

The architecture of a typical sensor network Sensor node: sense target events, gather sensor readings, manipulate information, send them to gateway via radio link Base station/sink: communicate with sensor nodes and user/operator Operator/user: task manager, send query Routing and energy saving are required.

WSNs are meant to be deployed in large numbers in various environments, including remote and hostile regions, with ad hoc communications as key. For this reasons, algorithms and protocols need to address the following issues. Lifetime maximization Robustness and fault tolerance Self-configuration Middleware for WSN, the middle-level primitive between the software and the hardware, can help bridge the gap and remove impediments.

Context-aware system based on WSN Mobile sensor networks (MSNs) are WSNs in which nodes can move under own control or under the control of the environment.

3.5 SCADA: The Internet of Controllers SCADA (supervisory control and data acquisition) is a type of industrial control system (ICS). Industrial control systems are computer controlled systems that monitor and control industrial processes that exist in the physical world An existing SCADA system usually consists of the following subsystems: HMI (human-machine interface) RTU (remote terminal units) PLSs (programmable logic controllers) DCSs (distributed control systems) M2M, WSN, smart systems, CPS, and others all have overlaps of scope with SCADA.

Middleware-based SCADA system