SlideShare une entreprise Scribd logo
1  sur  18
Bangalore Vijayakumar, Subhash Sharma
Choudhary, Shelly
Tang, Zihan
INSTRUCTOR:
BHUIYAN, MD MOINUDDIN
Content
 WHAT IS INTERNET OF THINGS
 History
 How it Works
 Application of IOT
 Current Status and prospect
 METHODOLOGY
 Research areas
 Research paper
 Literature review
 TECHNICAL DETAILS OF IOT
 Architecture layers
 New Wireless Technologies
 Criticism, Problems and Controversies
What is IOT?
 The Internet of Things(IOT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
 Iot connects physical world to the internet.
 Iot are also called as "Intelligent system of systems."
 IoT allows us to use affordable wireless technology and transmit the data into
the cloud at a component level. It also provides a place to save data as well as
management and security. ... Whatever the future holds for IoT, Smart devices
will become convoluted into our lives.
 The Internet of things (IoT) is the network of devices such as vehicles, and
home appliances that contain electronics, software, sensors, actuators, and
connectivity which allows these things to connect, interact and exchange data.
... In this example, the system does not need to be connected to the Internet.
History
 The concept of the Internet of Things first became popular in 1999,
through the Auto- ID center at MIT and related market- analysis
publications. Radio-frequency identification (RFID) was a prerequisite for
the IOT at that point. If all objects and people in daily life were equipped
and identifiers, computers could manage and inventory them. Besides
using RFID, the tagging of things may be achieved through such
technologies as near field communication, barcodes, QR codes, Bluetooth,
and digital watermarking. But the actual term “Internet of Things” was
coined by Kevin Ashton in 1999 during his work at Procter & Gamble.
Ashton who was working in supply chain optimization, wanted to attract
senior management's attention to a new exciting technology called RFID.
How it works?
There are four components of IOT system, which tell us
how it works
Sensor/devices-sensors or devices help in collecting very minute data from the surrounding
environment. All of this collected data can have various degrees of complexities ranging from a
simple temperature monitoring sensor or a complex full video feed.
Connectivity- The collected data is sent to a cloud infrastructure, but it needs a medium for
transport.
Data processing- Once the data is collected and it gets to the cloud, the software performs
processing on the acquired data.
User Interface -the information made available to the end-user in some way. This can achieve by
triggering alarms on their phones or notifying through texts or emails.
Application of IOT
Current status and prospects
 In present IOT connected devices worldwide would be 20.8 billion. The
various “things”, which include not only communication devices but also
every other physical object on the planet, are also going to be connected
to the Internet, and controlled through wireless networks. This concept,
which is referred to as the “Internet of Things (IoT)”, has attracted much
attention from many researchers in recent years.
Research Area
 IoT is intelligent decision-making on behalf
of the devices.
 As can be seen from the list, both artificial
intelligence and machine learning are
important research topics.
 These research areas focusing on IoT
decision-making will only gain more
emphasis in the future.
Research paper (IEEE)
Improving Pedestrian Safety in Cities
Using Intelligent Wearable Systems
A Comprehensive Survey on Internet of
Things (IoT) Toward 5G Wireless Systems
Internet Of Things For Smart Cities
Literature Survey
The internet of things can be developed using the LAN or WAN. The LAN network can enable the inter-
connecting between the devices in a specific area whereas, the WAN can offer a very broad geographical
domain
This technology plays a major role in the organizations. Offers ease of work, monitoring assistance,
automation and several other benefits, which add values to the organizational productivity
It would be justified to state that the interconnectivity, ease of work, convenience, adding to the
productivity in individual’s performance and eventually benefits the society as a whole.
Technical Details in IOT
Architecture layer
 In the initial, three layers architecture was
introduced.
 Then, Some researchers analyzed one more layer, a
support layer.
 According to latest researchers, there are 5 layers as
shown in Figure.
Architecture layer
 Perception Layer
Identify things and collect the information from sensors. Example of sensors: RFID, 2D barcode.
 Transport Layer
Carry and transmit the information from the physical objects.
Connect the smart things, network devices.
 Processing Layer
Collect the information sent from transport layer.
Eliminate extra information, extract the useful information.
 Application Layer
Define all applications that use the IoT. Applications: smart homes, smart cities, smart health, etc.
 Business Layer
Manage and control applications, business, user’s privacy.
Determine how information be created, stored and changed.
New Wireless Technologies in IOT
The IOT will consist of new devices:
 low power
 low cost
 Limited memory
 Over a wide variety of ranges
It is useful to discuss the technologies
into categories based on range.
New Technologies based on every range
 LAN and PAN. ( WIFI and Bluetooth)
ZigBee: short-range, low-power
6LoWPAN: easily communicate with other protocols
Thread: does not define an application layer
 MAN.
SigFox: a narrowband technology, using BPSK
Lora: a spread-spectrum technology with a wider band
 WAN. (4G and 5G)
LTE-MTC: a stripped-down version of LTE. They use the same spectrum and base stations
NB-IOT: not related to LTE, but is based on a DSSS modulation
Criticism, Problems and Controversies
SECURITY PLATFORM
FRAGMENTATIO
PRIVACY AND
CONTROL
DATA STORAGE
 Security
IOT spreads widely, cyber-attacks are likely to become an increasingly physical threat.
Conventional technical attack, including: Denial of Service Attack, Man-in-The-Middle Attack
on Network layer; Eavesdropping, Replay Attack on perception layer.
 Platform fragmentation
IOT lacks common technical standards, each with its own advantages and disadvantages,
suffers platform fragmentation.
 Privacy and Control
When user's information travels through hops in IOT network, it is vulnerable to privacy
violation by compromising nodes in network.
 Data Storage
Challenge is the storage of the bulk data generated by IOT.
REFERENCES
 https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punu
mber=6488907
 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC616
5453/
 https://learn.sparkfun.com/tutorials/connectivity-of-
the-internet-of-things
 http://www.steves-internet-guide.com/iot-wireless-
technologies/
Thank you !

Contenu connexe

Tendances

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
 
Energy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsEnergy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsNiclas Maier
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Akanksha Prasad
 
Iot architecture
Iot architectureIot architecture
Iot architectureAnam Iqbal
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingTonex
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)FabMinds
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platformJane Ren
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 

Tendances (20)

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Internet of Things building blocks
Internet of Things building blocksInternet of Things building blocks
Internet of Things building blocks
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Iot m2m
Iot m2mIot m2m
Iot m2m
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Energy Efficiency in Internet of Things
Energy Efficiency in Internet of ThingsEnergy Efficiency in Internet of Things
Energy Efficiency in Internet of Things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESWIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVES
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platform
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 

Similaire à Wireless networks

Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningDr.R. Gunavathi Ramasamy
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptxttyu2
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)Biniam Behailu
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsSumanPramanik7
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptxKume3
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfMurugeswariKrishnan
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxTekle12
 
Internet of things-IoT.pptx
Internet of things-IoT.pptxInternet of things-IoT.pptx
Internet of things-IoT.pptxMukulislam1
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 

Similaire à Wireless networks (20)

Iot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine LearningIot trends and technologies development in terms of Machine Learning
Iot trends and technologies development in terms of Machine Learning
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf7CS4_IOT_Unit-1.pdf
7CS4_IOT_Unit-1.pdf
 
Internet of things (io t)
Internet of things (io t)Internet of things (io t)
Internet of things (io t)
 
Io t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of thingsIo t & amp; industry 4.0,internet of things
Io t & amp; industry 4.0,internet of things
 
Chapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptxChapter 4 - EMTE.pptx
Chapter 4 - EMTE.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptx
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdfIoT & Applications Digital Notes 1 (1).pdf
IoT & Applications Digital Notes 1 (1).pdf
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Internet of Robotic Things
Internet of Robotic ThingsInternet of Robotic Things
Internet of Robotic Things
 
IoT
IoTIoT
IoT
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
 
IOT_UNIT-1.pptx
IOT_UNIT-1.pptxIOT_UNIT-1.pptx
IOT_UNIT-1.pptx
 
Internet of things-IoT.pptx
Internet of things-IoT.pptxInternet of things-IoT.pptx
Internet of things-IoT.pptx
 
IOT_PPT1.pdf
IOT_PPT1.pdfIOT_PPT1.pdf
IOT_PPT1.pdf
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Wireless networks

  • 1. Bangalore Vijayakumar, Subhash Sharma Choudhary, Shelly Tang, Zihan INSTRUCTOR: BHUIYAN, MD MOINUDDIN
  • 2. Content  WHAT IS INTERNET OF THINGS  History  How it Works  Application of IOT  Current Status and prospect  METHODOLOGY  Research areas  Research paper  Literature review  TECHNICAL DETAILS OF IOT  Architecture layers  New Wireless Technologies  Criticism, Problems and Controversies
  • 3. What is IOT?  The Internet of Things(IOT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.  Iot connects physical world to the internet.  Iot are also called as "Intelligent system of systems."  IoT allows us to use affordable wireless technology and transmit the data into the cloud at a component level. It also provides a place to save data as well as management and security. ... Whatever the future holds for IoT, Smart devices will become convoluted into our lives.  The Internet of things (IoT) is the network of devices such as vehicles, and home appliances that contain electronics, software, sensors, actuators, and connectivity which allows these things to connect, interact and exchange data. ... In this example, the system does not need to be connected to the Internet.
  • 4. History  The concept of the Internet of Things first became popular in 1999, through the Auto- ID center at MIT and related market- analysis publications. Radio-frequency identification (RFID) was a prerequisite for the IOT at that point. If all objects and people in daily life were equipped and identifiers, computers could manage and inventory them. Besides using RFID, the tagging of things may be achieved through such technologies as near field communication, barcodes, QR codes, Bluetooth, and digital watermarking. But the actual term “Internet of Things” was coined by Kevin Ashton in 1999 during his work at Procter & Gamble. Ashton who was working in supply chain optimization, wanted to attract senior management's attention to a new exciting technology called RFID.
  • 5. How it works? There are four components of IOT system, which tell us how it works Sensor/devices-sensors or devices help in collecting very minute data from the surrounding environment. All of this collected data can have various degrees of complexities ranging from a simple temperature monitoring sensor or a complex full video feed. Connectivity- The collected data is sent to a cloud infrastructure, but it needs a medium for transport. Data processing- Once the data is collected and it gets to the cloud, the software performs processing on the acquired data. User Interface -the information made available to the end-user in some way. This can achieve by triggering alarms on their phones or notifying through texts or emails.
  • 7. Current status and prospects  In present IOT connected devices worldwide would be 20.8 billion. The various “things”, which include not only communication devices but also every other physical object on the planet, are also going to be connected to the Internet, and controlled through wireless networks. This concept, which is referred to as the “Internet of Things (IoT)”, has attracted much attention from many researchers in recent years.
  • 8. Research Area  IoT is intelligent decision-making on behalf of the devices.  As can be seen from the list, both artificial intelligence and machine learning are important research topics.  These research areas focusing on IoT decision-making will only gain more emphasis in the future.
  • 9. Research paper (IEEE) Improving Pedestrian Safety in Cities Using Intelligent Wearable Systems A Comprehensive Survey on Internet of Things (IoT) Toward 5G Wireless Systems Internet Of Things For Smart Cities
  • 10. Literature Survey The internet of things can be developed using the LAN or WAN. The LAN network can enable the inter- connecting between the devices in a specific area whereas, the WAN can offer a very broad geographical domain This technology plays a major role in the organizations. Offers ease of work, monitoring assistance, automation and several other benefits, which add values to the organizational productivity It would be justified to state that the interconnectivity, ease of work, convenience, adding to the productivity in individual’s performance and eventually benefits the society as a whole.
  • 11. Technical Details in IOT Architecture layer  In the initial, three layers architecture was introduced.  Then, Some researchers analyzed one more layer, a support layer.  According to latest researchers, there are 5 layers as shown in Figure.
  • 12. Architecture layer  Perception Layer Identify things and collect the information from sensors. Example of sensors: RFID, 2D barcode.  Transport Layer Carry and transmit the information from the physical objects. Connect the smart things, network devices.  Processing Layer Collect the information sent from transport layer. Eliminate extra information, extract the useful information.  Application Layer Define all applications that use the IoT. Applications: smart homes, smart cities, smart health, etc.  Business Layer Manage and control applications, business, user’s privacy. Determine how information be created, stored and changed.
  • 13. New Wireless Technologies in IOT The IOT will consist of new devices:  low power  low cost  Limited memory  Over a wide variety of ranges It is useful to discuss the technologies into categories based on range.
  • 14. New Technologies based on every range  LAN and PAN. ( WIFI and Bluetooth) ZigBee: short-range, low-power 6LoWPAN: easily communicate with other protocols Thread: does not define an application layer  MAN. SigFox: a narrowband technology, using BPSK Lora: a spread-spectrum technology with a wider band  WAN. (4G and 5G) LTE-MTC: a stripped-down version of LTE. They use the same spectrum and base stations NB-IOT: not related to LTE, but is based on a DSSS modulation
  • 15. Criticism, Problems and Controversies SECURITY PLATFORM FRAGMENTATIO PRIVACY AND CONTROL DATA STORAGE
  • 16.  Security IOT spreads widely, cyber-attacks are likely to become an increasingly physical threat. Conventional technical attack, including: Denial of Service Attack, Man-in-The-Middle Attack on Network layer; Eavesdropping, Replay Attack on perception layer.  Platform fragmentation IOT lacks common technical standards, each with its own advantages and disadvantages, suffers platform fragmentation.  Privacy and Control When user's information travels through hops in IOT network, it is vulnerable to privacy violation by compromising nodes in network.  Data Storage Challenge is the storage of the bulk data generated by IOT.
  • 17. REFERENCES  https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punu mber=6488907  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC616 5453/  https://learn.sparkfun.com/tutorials/connectivity-of- the-internet-of-things  http://www.steves-internet-guide.com/iot-wireless- technologies/