SlideShare une entreprise Scribd logo
1  sur  43
Télécharger pour lire hors ligne
IOT <> ENABLING ECOSYSTEMS
HARISH VADADA
Summary
• Introduction - IoT <> ecosystem, developments

• Complete Stack 

• Sensors & Wireless Technologies

• Machine-to-machine BLE, 6lowPAN, LTE MTC

• Wearables - ANT+, Zigbee, EnOcean

• Device Management

• OMA Lightweight M2M, TR069

• Authentication Technology

• CoAP, OATH 2.0, MQTT

• Big Data, Streaming Technologies

• Streaming Analytics & Actionable Intelligence

• Standards bodies

• Thread, Alseen Alliance, OneM2M, Industrial Internet Consortium, Open
Interconnect Consortium, Internet Protocol for Smart Objects (IPSO) Alliance
Internet of Things
• Gartner predicts 25 billion
‘connected’ devices by 2020

• Instigated by nexus of four
forces - social, mobile, cloud
and information

• Business verticals -
Automotive, consumer,
general business, vertical
business

• Many independent break
throughs - Wearables,
Mobile health monitoring,
Big Data, Data sciences,
autonomous vehicles, etc.
Source: Gartner
Inspiring TED talk <> http://goo.gl/NrxGCl
Full Stack - IoT
Aggregators Mobile App/
Visualization
6lowpan
Wifi/BLE
4G LTE
Machine Learning
&
CRM Integration
WIRELESS SENSORS LAST
MILE TECHNOLOGIES
Bluetooth & BLE
www.Bluetooth.org
BLE explained…
Bluetooth low energy wireless technology is an open low energy, short-range radio technology.

Some Key Benefits:

• Low power consumption

• Connectivity to mobile phones

• Small size and Low cost

• Multi-vendor interoperability

• Globally availability, license free

BLE is a connectionless, always OFF technology, with small silicon footprint and low cost having a robust through frequency
hopping compared to other wireless technologies. Security is through 128-bit AES encryption and can be for low power
consumption with no competitors.

Connections involve two separate roles:

• Central (master)

• Peripheral (slave)

Protocols: Building blocks used by all devices conform to the Bluetooth specification, protocols are the layers that implement
the different packet formats, routing, multiplexing, encoding,etc.

Profiles: “Vertical slices” of functionality covering either basic modes of operation required by all devices or specific use cases.
6lowPAN
http://datatracker.ietf.org/wg/6lowpan/documents/
http://threadgroup.org/
6lowPAN explained…
6lowPAN ==> Low-power RF + IPv6 = The Wireless Embedded Internet or IP on IEEE 802.15.4

The benefits of 6LoWPAN include:

• Open, long-lived, reliable standards

• Easy learning-curve

• Transparent Internet integration

• Network maintainability

• Global scalability

• End-to-end data flows

A 6loWPAN system contains one or more WPANs (Wireless Personal Area Networks) connected to the Internet via a
wired bus such as an Ethernet or wired IP bus . 

The main components of a 6LoWPAN system:

• Wireless Cluster: A WPAN (which may be one of many in the system).

• Wired Bus: A bus (e.g. Ethernet) to which the wireless clusters are connected.

• Border-Router: A device used to connect a wireless cluster to the wired bus.

• Host: A device, such as a PC or workstation, with an IP connection to the system. 

- A Remote Access Terminal used to access the 6LoWPAN system remotely via the Internet.

- A Data Management Centre on the wired bus, used to configure and interrogate the 6LoWPAN system.

Thread is a special protocol for home automation. In addition to bringing mesh to 6LoWPAN, adds a layer of security,
enables point-to-point communications, and provides schemes for optimizing battery life. Thread borrows from the
proprietary Nest protocol called Weave, which also is based on 6LoWPAN and also adds “special sauce”.
LTE MTC
3GPP LTE Rel.13 release has many goals:

• Wide service spectrum

• Support of device volumes

• Low cost connected devices

• Long battery life

• Enhanced coverage

Architectural changes:

• Congestion and overload control for M2M
devices

• M2M device triggering for provisioning

• Addressing and Identifiers - IPv4/IPv6 addresses 

• Charging requirements and data collection

• Security requirements 

• Remote M2M device management,
management of M2M devices using Open
Mobile Alliance Device Management (OMA-DM)
or over-the-air (OTA)
www.3gpp.org
LTE MTC explained…
In 2014, the number of mobile connected devices exceeded the world’s population. Device
growth will continue; according to Ericsson, by 2020, 90 percent of the world’s population
over six years old will own a mobile phone.

• LTE Category-0 introduced for M2M/IoT - with a peak speed of 1Mbps.

• Cat-0 defines narrower bandwidths and reductions in complexity reducing cost and
power consumption

• Provide extended coverage for MTC devices in challenging locations

• Serve very large numbers of devices per cell by optimizing signaling of small data
transmission

• UEPCOP: Power saving (or dormant) state and extended DRX cycle (Idle and
connected)

• SDDTE: Data over Non Access Stratum (NAS) signaling over control plane,
connectionless approaches over user plane and keeping handsets in connected mode
for small data transmission

• A new UE Power Saving Mode has been introduced (mostly a NAS feature) with some
description added in the Access Stratum spec for Idle mode (TS 36.304).

• For Signaling Overhead Reduction, new CN assistance information for eNB parameters
tuning has been introduced, as captured in the Stage 2 and Stage 3 specifications (TS
36.300, 36.413, 36.423).
Zigbee
• ZigBee 3.0 is based on IEEE 802.15.4,
which operates at 2.4 GHz 

• ZigBee is reliable and robust using
multi-hop mesh networking to
eliminate points of failure 

• ZigBee is low-power allowing battery-
operated devices 

• ZigBee is scalable and supports
networks of thousands of nodes and
mesh networks

• ZigBee is secure and uses a variety of
security mechanisms such as
AES-128 encryption, etc.

• ZigBee is global and is built on 2.4
GHz which is available for unlicensed
worldwide.
http://www.zigbee.org/
Zigbee explained…
ZigBee is a suite of high-level communication protocols used to create personal area networks built
from small, low-power digital radios.

ZigBee devices are of three types:

ZigBee Coordinator (ZC): The most capable device, the Coordinator forms the root of the network
tree and might bridge to other networks. There is exactly one ZigBee Coordinator in each network
since it is the device that started the network originally. It stores information about the network,
including acting as the Trust Center & repository for security keys.

ZigBee Router (ZR): As well as running an application function, a Router can act as an intermediate
router, passing on data from other devices.

ZigBee End Device (ZED): Contains just enough functionality to talk to the parent node (either the
Coordinator or a Router); it cannot relay data from other devices. This relationship allows the node
to be asleep a significant amount of the time thereby giving long battery life. A ZED requires the
least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC.

ZigBee protocols support beacon and non-beacon enabled networks. In non-beacon-enabled
networks, an unslotted CSMA/CA channel access mechanism is used. ZigBee Routers typically
have their receivers continuously active, requiring a more robust power supply. However, this allows
for heterogeneous networks in which some devices receive continuously, while others only transmit
when an external stimulus is detected.
ANT+
ANT+ (pronounced ant plus) is a sub-system of the base ANT protocol (a proprietary wireless technology)
designed and marketed by the ANT+ Alliance, a division of Dynastream Innovations Inc. ANT+ is designed for
the interoperable collection and transfer of sensor data as well as the integration of remote control systems
such as indoor lighting, phone control, etc. 

ANT+ mainly focuses on operations that include sport, wellness, home care and remote control. 

It is used for data-transfer for a number of devices:

• heart rate monitors

• cadence sensors

• cycling power meters

• activity monitors

• calorimeters

• body mass index measuring devices

• blood pressure monitors

• blood glucose meters

• position tracking

• weight measuring devices

• temperature sensors

• fitness equipment
http://www.thisisant.com/
ANT+ explained…
ANT™ is a practical wireless sensor network protocol
running in the 2.4 GHz ISM band. Designed for ultra-low
power, ease of use, efficiency and scalability.

• ANT easily handles peer-to-peer, star, connected star,
tree and fixed mesh topologies. 

• ANT provides reliable data communications, flexible
and adaptive network operation and cross-talk
immunity. 

• ANT protocol stack is extremely compact, requiring
minimal microcontroller resources and considerably
reduces system costs.

• ANT provides carefree handling of the Physical,
Network and Transport OSI layers. 

• It incorporates key low-level security features that
form the foundation for user-defined sophisticated
network security implementations. 

• ANT ensures adequate user control while considerably
lightening computational burden in providing a simple
yet effective wireless networking solution.
EnOcean
EnOcean is based on the energetically efficient exploitation of slight mechanical
motion and other potentials from the environment, such as indoor light and
temperature differences, using the principles of energy harvesting.

• Maintenance-free sensor solutions

• Bidirectional communication even with self-powered sensors 

• Easy Programming of customer-specific software 

• Easy-to-integrate

• Interoperability of end-products
www.enocean.com/en/home/
Energy harvesting wireless standard from EnOcean
High reliability
Use of regulated frequency ranges with highest air time availability (approved for
pulsed signals only) - 868 MHz according to R&TTE regulation EN 300220 and 315
MHz according to FCC regulation CFR-47 Part 15
Multiple telegram transmission with checksum
Short telegrams (approx. 1 ms) for little probability of collision
Long range: up to 30 meters in buildings and 300 meters in free field
Repeater available for range extension
One-way and bidirectional communication
Low energy need High data transmission rate for sensor information of 125 kbit/s
Small data overhead
ASK modulation
Interoperability Wireless protocol defined and integrated in modules
Sensor profiles specified and implemented by users
Unique transmission ID (32 bits)
Coexistence with other wireless systems No interference with DECT, WLAN, PMR systems, etc
System design verified in industrial environment
DEVICE MANAGEMENT
STANDARDS
Mobile device management (MDM) is an industry term for the administration of
mobile devices, such as smartphones, tablet computers, laptops, etc. MDM is
usually implemented with the use of a third party product that has management
features for particular vendors of mobile devices. 

There are two major types of MDM implementations:

• On-premises Solution

• Cloud-based Solution

Device Management Specifications:
• The Open Mobile Alliance (OMA) specified a platform-independent device
management protocol called OMA Device Management. The specification meets
the common definitions of an open standard, meaning the specification is freely
available and implementable and most widely used.

• Smart message is text SMS-based provisioning protocol (ringtones, calendar
entries but service settings also supported like: ftp, telnet, SMSC number, email
settings, etc...)

• OMA Client Provisioning is a binary SMS-based service settings provisioning
protocol.

• Nokia-Ericsson OTA is binary SMS-based service settings provisioning protocol,
designed mainly for older Nokia and Ericsson mobile phones.
OMA-DM Lightweight M2M
OMA Device Management is a device management
protocol specified by the Open Mobile Alliance
(OMA) Device Management (DM) Working Group
and the Data Synchronization (DS) Working Group.
OMA DM was originally developed by The SyncML
Initiative Ltd, an industry consortium formed by
many mobile device manufacturers. 

Device management is intended to support the
following uses:

• Provisioning – Configuration of the device
(including first time use), enabling and disabling
features

• Device Configuration – Allow changes to settings
and parameters of the device

• Software Upgrades – Provide for new software
and/or bug fixes to be loaded on the device,
including applications and system software

• Fault Management – Report errors from the
device, query about status of device
http://openmobilealliance.org/
LWM2M standard solves a set of technological challenges that have appeared as the M2M market has matured and the Internet of Things
makes constrained devices more accessible to device management and end-to-end service enablement. In this section we summarize the
benefits of LWM2M:

• Greater market growth and cost efficiency for the whole industry through a decoupling of devices, device management and services
technologies.

• Service providers, OEMs and end users benefit from the uniform management of constrained devices.

• LWM2M can often provide a 10x increase in efficiency over OMA-DM.

• Better time to market for M2M services as well as devices and infrastructures through standard components available from an ecosystem
of vendors.

• LWM2M is complementary to existing device management solutions like OMA DM and Broadband Forum TR-69, and greatly extends the
range of devices that can be securely managed.

• The LWM2M data model and the open OMA naming authority registry for Objects provide easily accessible and reusable semantics for
both device management and application data for the whole Internet of Things industry.

• By providing a single solution for device management and application data, LWM2M both simplifies systems and allows for new and
innovative M2M services.

• Complete security and security lifecycle management appropriate for constrained devices solves one of the most pressing problems in
the M2M industry.

• The scope of LWM2M defines only the device to service network interface, allowing easy integration into existing device management
and M2M services, as well as larger backend system standards such as oneM2M.
TR-069
TR-069 is the document number of the
technical report, defined by the Broadband
Forum, that specifies the “CPE WAN
Management Protocol”. It assumes that the all
CPE can obtain an IP address in order to
communicate with an ACS and can interact
with a single ACS at a time.

• Auto-Configuration and Dynamic Service
Provisioning Device Agnostics

• Software/Firmware Image Management

• Software Module Management

• Status and Performance Monitoring

• Diagnostics

• Positioning in the End-to-End Architecture

• Security Goals

• Architectural Goals
https://www.broadband-forum.org/cwmp.php
TR-069 explained
The CPE WAN Management Protocol comprises several components that
are unique to this protocol, and makes use of several standard protocols.
The protocol stack defined by the CPE WAN Management Protocol below.
AUTHENTICATION & APIS
IoT can only be realized if,

• Many and varied interactions between users, things, cloud
services and applications can be authenticated. 

• User delegated consent will be necessary for any scenario
where potentially privacy sensitive data is collected and
analyzed (wearables, home automation, health, etc). 

• APIs can help protect sensitive data going to and from
medical devices, smart grids and meters, cars, thermostats,
appliances and other connected devices

• Integrate and aggregate partner APIs, no matter what
interface protocols or authentication schemes they use

• Open up API access to big data resources to enable new
customer services, improve operational efficiency or create
new revenue opportunities
OAUTH 2.0
http://oauth.net/2/
OAuth is an open standard for authorization that enables client applications to
access server resources on behalf of a specific Resource Owner. OAuth also
enables Resource Owners (users) to authorize limited third-party access to their
resources without sharing credentials. For e.g.. a Gmail user could allow LinkedIn/
Flickr to have access to their list of contacts without sharing her/his Gmail
username and password.
OAUTH 2.0 explained
OAuth 2.0 is an IETF standard authentication & authorization framework for
securing application access to RESTful APIs

• OAuth allows a Client (an application that desires information) to send an API
query to a Resource Server (RS), the application hosting the desired
information, such that the RS can authenticate that the message was indeed
sent by the Client.

• The Client authenticates to the RS through the inclusion of an access token on
its API call—a token previously provided to the Client by an Authorization Server
(AS).

• In those scenarios that the API in question protects access to a User’s identity
attributes, it may be the case that the access token will only be issued by the AS
after the User has explicitly given consent to the Client accessing those
attributes.
CoAP 2.0
The Constrained Application Protocol (CoAP/RFC
7252) is a specialized web transfer protocol for use
with constrained nodes and constrained networks in
the Internet of Things. 

• CoAP transactions provide reliable UDP
messaging

• CoAP methods resemble HTTP method requests
and responses

• CoAP method calls may involve multiple CoAP
transactions

• Roles at the transaction layer may change during a
method request / response execution
http://coap.technology/
CoAP explained
CoAP is designed for machine-to-machine (M2M) applications such as smart
energy and building automation and consists of robust foundations for IoT.

• Constrained machine-to-machine web protocol

• Representational State Transfer (REST) architecture

• Simple proxy and caching capabilities

• Asynchronous transaction support

• Low header overhead and parsing complexity

• URI and content-type support

• UDP binding (may use IPSec or DTLS)

• Reliable unicast and best-effort multicast support

• Built-in resource discovery
MQTT
MQTT is an "Internet of Things" connectivity
protocol. Designed exclusively as a lightweight
publish/subscribe messaging transport using small
code footprint and came from IBM's MQ message
queuing product line.

• MQTT messages are delivered asynchronously
(“push”) through publish subscribe architecture. 

• Ideal for constrained networks (low bandwidth,
high latency, data limits, and fragile connections)

• Quality of Service (QoS) for MQTT

• MQTT client abnormal disconnect notification

• MQTT clients are very simple to implement http://mqtt.org/
MQTT explained …
MQTT runs over TCP/IP, or over other network protocols that provide ordered, lossless, bi-directional
connections. Its features include:

• Use of the publish/subscribe message pattern which provides one-to-many message distribution and
decoupling of applications.

• A messaging transport that is agnostic to the content of the payload.

• Three qualities of service for message delivery:

• "At most once", where messages are delivered according to the best efforts of the operating environment.
Message loss can occur. This level could be used, for example, with ambient sensor data where it does not
matter if an individual reading is lost as the next one will be published soon after.

• "At least once", where messages are assured to arrive but duplicates can occur.

• "Exactly once", where message are assured to arrive exactly once. This level could be used, for example,
with billing systems where duplicate or lost messages could lead to incorrect charges being applied.

• A small transport overhead and protocol exchanges minimized to reduce network traffic.

• A mechanism to notify interested parties when an abnormal disconnection occurs.
BIG DATA FOR INTERNET OF
THINGS
BIG & FAST Data
Map, Reduce & Shuffle
“If Hadoop is an Ocean, Streams are the Firehose”
Streaming Data
Stream processing in a big data paradigm, which is related to SIMD (single
instruction, multiple data), that allows some applications to more easily exploit a
limited form of parallel processing.

• Handles data at high velocity

• Processing in near real-time

• Data has to be processed fast, so that a firm can react to changing business
conditions in real time, think nano-second trading.

• This is required for trading, fraud detection, system monitoring, Oil & Natural
Gas industry and many other verticals.
Streaming Data …
For some use cases ( e.g. stock
markets, traffic, surveillance, patient
monitoring) the value of insights
degrade very quickly with time. 

e.g. stock markets and speed of light
or Credit card fraud detection

We need technology that can
produce outputs fast 

• Static Queries, but need very fast
output (Alerts, Realtime control) 

• Dynamic and Interactive Queries
( Data exploration)
Real-time Analytics Tools
Stream Processing
• Program a set of processors and wire them up, data flows though the graph. 

• A middleware framework handles data flow, distribution, and fault tolerance (e.g. Apache Storm,
Samza)

• Processors may be in the same machine or multiple machines 

Complex Event Processing
• Event-pattern detection and abstraction

• Event filtering, aggregation and transformation

• Modeling event hierarchies

• Detecting relationships (such as causality, membership or timing) between events

• Abstracting event-driven processes

Micro-Batch
• Process data in small batches, and then combine results for final results (e.g. Spark)

• Works for simple aggregates, but tricky to do this for complex operations 

• Can do it with MapReduce, not the same SLA

OLAP Style in-memory processing
• Supports interactive queries 

• Indexes data to make them them readily accessible to respond to queries fast. (e.g. Apache Drill) 

• Tools like Druid, VoltDB and SAP Hana can do this with all data in memory
Machine Learning & Insights
Internet of Things applications involve massive data sets, far too big for any human
to reasonably keep track of, analyze, and interpret. Machine learning and predictive
modeling steps in at various levels- from cloud services down to individual devices,
to solve the complexity of applications.



Machine Learning algorithms hunt for interesting signals in the noise, run
simulations, creates and verifies predictive models, and offers insights in the form
of “prescriptive intelligence.”
Machine learning techniques that need exploration for IIoT,
Connected Home and various IoT applications:

• Supervised and unsupervised learning

• Neural Networks

• Machine Learning System Design

• Clustering

• Anomaly Detection

• Recommendation Systems

• Large-Scale Machine learning systems

• Programming paradigms and Languages for machine learning

• Computation at the edge or Computation at the core
STANDARD BODIES
http://threadgroup.org/ https://allseenalliance.org/
http://www.onem2m.org/ http://www.iiconsortium.org/ http://openinterconnect.org/
http://www.ipso-alliance.org/
Add value to IoT Chain
Enable'
•  Enable (or Provision) devices to connect to the wireless Internet.
integrate •  Integrate into mobile operator networks, everywhere in the world.
Define'
•  Define use cases and map out business and operational requirements for every stage of the product lifecycle.
integrate
•  Integrate new Internet of Things business with existing infrastructure.
configure
•  Configure application programming interfaces (APIs) to meet unique business need and requirement of each and every mobile
operator
Deliver'
•  Deliver the new applications and services to the market
Periodic table of the IoT industry by CB Insights
Q & A
—> harish.vadada@ieee.org

Contenu connexe

Tendances

Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overviewengIT
 
Getting started with YANG
Getting started with YANGGetting started with YANG
Getting started with YANGCoreStack
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT SolutionsIan Skerrett
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoTAmit Dev
 
18CSL58 DBMS LAB Manual.pdf
18CSL58 DBMS LAB Manual.pdf18CSL58 DBMS LAB Manual.pdf
18CSL58 DBMS LAB Manual.pdfSyed Mustafa
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
6Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_20166Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_2016Pascal Thubert
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An IntroductionRavindra Dastikop
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNAAli Layth
 
Machinekit - Build Real Time Systems with Python
Machinekit - Build Real Time Systems with PythonMachinekit - Build Real Time Systems with Python
Machinekit - Build Real Time Systems with PythonAlexander Rössler
 

Tendances (20)

Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
IoT 2019 overview
IoT 2019 overviewIoT 2019 overview
IoT 2019 overview
 
Android - Android Intent Types
Android - Android Intent TypesAndroid - Android Intent Types
Android - Android Intent Types
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Vlan
Vlan Vlan
Vlan
 
Getting started with YANG
Getting started with YANGGetting started with YANG
Getting started with YANG
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 
IoT Smart Home
IoT Smart HomeIoT Smart Home
IoT Smart Home
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 
18CSL58 DBMS LAB Manual.pdf
18CSL58 DBMS LAB Manual.pdf18CSL58 DBMS LAB Manual.pdf
18CSL58 DBMS LAB Manual.pdf
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
IoT
IoTIoT
IoT
 
6Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_20166Tisch telecom_bretagne_2016
6Tisch telecom_bretagne_2016
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Internet of Things- An Introduction
Internet of Things- An IntroductionInternet of Things- An Introduction
Internet of Things- An Introduction
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
 
Machinekit - Build Real Time Systems with Python
Machinekit - Build Real Time Systems with PythonMachinekit - Build Real Time Systems with Python
Machinekit - Build Real Time Systems with Python
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 

En vedette

Business frameworks for Product fit analysis
Business frameworks for Product fit analysisBusiness frameworks for Product fit analysis
Business frameworks for Product fit analysisHarish Vadada
 
Parabol Angel Pitch Deck
Parabol Angel Pitch DeckParabol Angel Pitch Deck
Parabol Angel Pitch DeckJordan Husney
 
Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected ProductsJordan Husney
 
IoT Standards are Stupid, Just Ship Something
IoT Standards are Stupid, Just Ship SomethingIoT Standards are Stupid, Just Ship Something
IoT Standards are Stupid, Just Ship SomethingJordan Husney
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbookBenjamin Cabé
 
Open Source and Open Standards
Open Source and Open StandardsOpen Source and Open Standards
Open Source and Open StandardsJonathan Jeon
 
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...Tilastokeskus
 
IP based standards for IoT
IP based standards for IoTIP based standards for IoT
IP based standards for IoTMichael Koster
 
LTE MTC: Optimizing LTE Advanced for Machine Type Communications
LTE MTC: Optimizing LTE Advanced for Machine Type CommunicationsLTE MTC: Optimizing LTE Advanced for Machine Type Communications
LTE MTC: Optimizing LTE Advanced for Machine Type CommunicationsQualcomm Research
 
Iot Toolkit and the Smart Object API - Architecture for Interoperability
Iot Toolkit and the Smart Object API - Architecture for InteroperabilityIot Toolkit and the Smart Object API - Architecture for Interoperability
Iot Toolkit and the Smart Object API - Architecture for InteroperabilityMichael Koster
 
Lte network chart_poster
Lte network chart_posterLte network chart_poster
Lte network chart_posterDipeshHShah
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012Thierry Lestable
 
What is transparency?
What is transparency?What is transparency?
What is transparency?Jordan Husney
 
Pci mod3,6,30 analysis and auto optimization
Pci mod3,6,30 analysis and auto optimizationPci mod3,6,30 analysis and auto optimization
Pci mod3,6,30 analysis and auto optimizationShuangquan Lei
 
ARM CoAP Tutorial
ARM CoAP TutorialARM CoAP Tutorial
ARM CoAP Tutorialzdshelby
 
LTE Reviews - PCI Analysis
LTE Reviews - PCI AnalysisLTE Reviews - PCI Analysis
LTE Reviews - PCI Analysispaulo_campolina
 
3900 series base station
3900 series base station3900 series base station
3900 series base stationAchmad Salsabil
 

En vedette (20)

APIs enabling IoT
APIs enabling IoT APIs enabling IoT
APIs enabling IoT
 
LTE MTC evolution
LTE MTC evolutionLTE MTC evolution
LTE MTC evolution
 
Business frameworks for Product fit analysis
Business frameworks for Product fit analysisBusiness frameworks for Product fit analysis
Business frameworks for Product fit analysis
 
Parabol Angel Pitch Deck
Parabol Angel Pitch DeckParabol Angel Pitch Deck
Parabol Angel Pitch Deck
 
Elements of Connected Products
Elements of Connected ProductsElements of Connected Products
Elements of Connected Products
 
IoT Standards are Stupid, Just Ship Something
IoT Standards are Stupid, Just Ship SomethingIoT Standards are Stupid, Just Ship Something
IoT Standards are Stupid, Just Ship Something
 
Open-source IoT cookbook
Open-source IoT cookbookOpen-source IoT cookbook
Open-source IoT cookbook
 
Open Source and Open Standards
Open Source and Open StandardsOpen Source and Open Standards
Open Source and Open Standards
 
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...
Using Passive Mobile Positioning Data for Generating Statistics: Estonian Exp...
 
IP based standards for IoT
IP based standards for IoTIP based standards for IoT
IP based standards for IoT
 
LTE MTC: Optimizing LTE Advanced for Machine Type Communications
LTE MTC: Optimizing LTE Advanced for Machine Type CommunicationsLTE MTC: Optimizing LTE Advanced for Machine Type Communications
LTE MTC: Optimizing LTE Advanced for Machine Type Communications
 
Iot Toolkit and the Smart Object API - Architecture for Interoperability
Iot Toolkit and the Smart Object API - Architecture for InteroperabilityIot Toolkit and the Smart Object API - Architecture for Interoperability
Iot Toolkit and the Smart Object API - Architecture for Interoperability
 
Lte network chart_poster
Lte network chart_posterLte network chart_poster
Lte network chart_poster
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012Supelec  M2M IoT course 1 - introduction - Part 1/2 - 2012
Supelec M2M IoT course 1 - introduction - Part 1/2 - 2012
 
What is transparency?
What is transparency?What is transparency?
What is transparency?
 
Pci mod3,6,30 analysis and auto optimization
Pci mod3,6,30 analysis and auto optimizationPci mod3,6,30 analysis and auto optimization
Pci mod3,6,30 analysis and auto optimization
 
ARM CoAP Tutorial
ARM CoAP TutorialARM CoAP Tutorial
ARM CoAP Tutorial
 
LTE Reviews - PCI Analysis
LTE Reviews - PCI AnalysisLTE Reviews - PCI Analysis
LTE Reviews - PCI Analysis
 
3900 series base station
3900 series base station3900 series base station
3900 series base station
 

Similaire à IoT Standards & Ecosystem

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”Virendra Thakur
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513Zarobiza
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security finalneerajchor
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Alidu Abubakari
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols Nagesh Rao
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17Ed Hightower
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxMeghaShree665225
 
IRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET Journal
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 

Similaire à IoT Standards & Ecosystem (20)

Internet of things for the “smart home”
Internet of things for the “smart home”Internet of things for the “smart home”
Internet of things for the “smart home”
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513249549548 spider-ds-scsn-90002-112513
249549548 spider-ds-scsn-90002-112513
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
1.pptx
1.pptx1.pptx
1.pptx
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security final
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
 
K010426371
K010426371K010426371
K010426371
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
IRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoTIRJET- Design and Implementation of Smart City using IoT
IRJET- Design and Implementation of Smart City using IoT
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 

Plus de Harish Vadada

Industrial internet of things (IIoT) - 4th industrial revolution
Industrial internet of things (IIoT) - 4th industrial revolutionIndustrial internet of things (IIoT) - 4th industrial revolution
Industrial internet of things (IIoT) - 4th industrial revolutionHarish Vadada
 
Wireless Terms & Reference
Wireless Terms & ReferenceWireless Terms & Reference
Wireless Terms & ReferenceHarish Vadada
 
IoT value chain - add value
IoT value chain - add valueIoT value chain - add value
IoT value chain - add valueHarish Vadada
 
IoT - Data to Insights
IoT - Data to InsightsIoT - Data to Insights
IoT - Data to InsightsHarish Vadada
 

Plus de Harish Vadada (8)

Industrial internet of things (IIoT) - 4th industrial revolution
Industrial internet of things (IIoT) - 4th industrial revolutionIndustrial internet of things (IIoT) - 4th industrial revolution
Industrial internet of things (IIoT) - 4th industrial revolution
 
Wireless Terms & Reference
Wireless Terms & ReferenceWireless Terms & Reference
Wireless Terms & Reference
 
APIs enable IoT
APIs enable IoTAPIs enable IoT
APIs enable IoT
 
AspirationsforIoT
AspirationsforIoTAspirationsforIoT
AspirationsforIoT
 
IoT value chain - add value
IoT value chain - add valueIoT value chain - add value
IoT value chain - add value
 
IoT - Data to Insights
IoT - Data to InsightsIoT - Data to Insights
IoT - Data to Insights
 
Connect'm
Connect'mConnect'm
Connect'm
 
Final pitch deck
Final pitch deckFinal pitch deck
Final pitch deck
 

Dernier

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Dernier (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

IoT Standards & Ecosystem

  • 1. IOT <> ENABLING ECOSYSTEMS HARISH VADADA
  • 2. Summary • Introduction - IoT <> ecosystem, developments • Complete Stack • Sensors & Wireless Technologies • Machine-to-machine BLE, 6lowPAN, LTE MTC • Wearables - ANT+, Zigbee, EnOcean • Device Management • OMA Lightweight M2M, TR069 • Authentication Technology • CoAP, OATH 2.0, MQTT • Big Data, Streaming Technologies • Streaming Analytics & Actionable Intelligence • Standards bodies • Thread, Alseen Alliance, OneM2M, Industrial Internet Consortium, Open Interconnect Consortium, Internet Protocol for Smart Objects (IPSO) Alliance
  • 3. Internet of Things • Gartner predicts 25 billion ‘connected’ devices by 2020 • Instigated by nexus of four forces - social, mobile, cloud and information • Business verticals - Automotive, consumer, general business, vertical business • Many independent break throughs - Wearables, Mobile health monitoring, Big Data, Data sciences, autonomous vehicles, etc. Source: Gartner Inspiring TED talk <> http://goo.gl/NrxGCl
  • 4. Full Stack - IoT Aggregators Mobile App/ Visualization 6lowpan Wifi/BLE 4G LTE Machine Learning & CRM Integration
  • 7. BLE explained… Bluetooth low energy wireless technology is an open low energy, short-range radio technology. Some Key Benefits: • Low power consumption • Connectivity to mobile phones • Small size and Low cost • Multi-vendor interoperability • Globally availability, license free BLE is a connectionless, always OFF technology, with small silicon footprint and low cost having a robust through frequency hopping compared to other wireless technologies. Security is through 128-bit AES encryption and can be for low power consumption with no competitors. Connections involve two separate roles: • Central (master) • Peripheral (slave) Protocols: Building blocks used by all devices conform to the Bluetooth specification, protocols are the layers that implement the different packet formats, routing, multiplexing, encoding,etc. Profiles: “Vertical slices” of functionality covering either basic modes of operation required by all devices or specific use cases.
  • 9. 6lowPAN explained… 6lowPAN ==> Low-power RF + IPv6 = The Wireless Embedded Internet or IP on IEEE 802.15.4 The benefits of 6LoWPAN include: • Open, long-lived, reliable standards • Easy learning-curve • Transparent Internet integration • Network maintainability • Global scalability • End-to-end data flows A 6loWPAN system contains one or more WPANs (Wireless Personal Area Networks) connected to the Internet via a wired bus such as an Ethernet or wired IP bus . The main components of a 6LoWPAN system: • Wireless Cluster: A WPAN (which may be one of many in the system). • Wired Bus: A bus (e.g. Ethernet) to which the wireless clusters are connected. • Border-Router: A device used to connect a wireless cluster to the wired bus. • Host: A device, such as a PC or workstation, with an IP connection to the system. - A Remote Access Terminal used to access the 6LoWPAN system remotely via the Internet. - A Data Management Centre on the wired bus, used to configure and interrogate the 6LoWPAN system. Thread is a special protocol for home automation. In addition to bringing mesh to 6LoWPAN, adds a layer of security, enables point-to-point communications, and provides schemes for optimizing battery life. Thread borrows from the proprietary Nest protocol called Weave, which also is based on 6LoWPAN and also adds “special sauce”.
  • 10. LTE MTC 3GPP LTE Rel.13 release has many goals: • Wide service spectrum • Support of device volumes • Low cost connected devices • Long battery life • Enhanced coverage Architectural changes: • Congestion and overload control for M2M devices • M2M device triggering for provisioning • Addressing and Identifiers - IPv4/IPv6 addresses • Charging requirements and data collection • Security requirements • Remote M2M device management, management of M2M devices using Open Mobile Alliance Device Management (OMA-DM) or over-the-air (OTA) www.3gpp.org
  • 11. LTE MTC explained… In 2014, the number of mobile connected devices exceeded the world’s population. Device growth will continue; according to Ericsson, by 2020, 90 percent of the world’s population over six years old will own a mobile phone. • LTE Category-0 introduced for M2M/IoT - with a peak speed of 1Mbps. • Cat-0 defines narrower bandwidths and reductions in complexity reducing cost and power consumption • Provide extended coverage for MTC devices in challenging locations • Serve very large numbers of devices per cell by optimizing signaling of small data transmission • UEPCOP: Power saving (or dormant) state and extended DRX cycle (Idle and connected) • SDDTE: Data over Non Access Stratum (NAS) signaling over control plane, connectionless approaches over user plane and keeping handsets in connected mode for small data transmission • A new UE Power Saving Mode has been introduced (mostly a NAS feature) with some description added in the Access Stratum spec for Idle mode (TS 36.304). • For Signaling Overhead Reduction, new CN assistance information for eNB parameters tuning has been introduced, as captured in the Stage 2 and Stage 3 specifications (TS 36.300, 36.413, 36.423).
  • 12. Zigbee • ZigBee 3.0 is based on IEEE 802.15.4, which operates at 2.4 GHz • ZigBee is reliable and robust using multi-hop mesh networking to eliminate points of failure • ZigBee is low-power allowing battery- operated devices • ZigBee is scalable and supports networks of thousands of nodes and mesh networks • ZigBee is secure and uses a variety of security mechanisms such as AES-128 encryption, etc. • ZigBee is global and is built on 2.4 GHz which is available for unlicensed worldwide. http://www.zigbee.org/
  • 13. Zigbee explained… ZigBee is a suite of high-level communication protocols used to create personal area networks built from small, low-power digital radios. ZigBee devices are of three types: ZigBee Coordinator (ZC): The most capable device, the Coordinator forms the root of the network tree and might bridge to other networks. There is exactly one ZigBee Coordinator in each network since it is the device that started the network originally. It stores information about the network, including acting as the Trust Center & repository for security keys. ZigBee Router (ZR): As well as running an application function, a Router can act as an intermediate router, passing on data from other devices. ZigBee End Device (ZED): Contains just enough functionality to talk to the parent node (either the Coordinator or a Router); it cannot relay data from other devices. This relationship allows the node to be asleep a significant amount of the time thereby giving long battery life. A ZED requires the least amount of memory, and therefore can be less expensive to manufacture than a ZR or ZC. ZigBee protocols support beacon and non-beacon enabled networks. In non-beacon-enabled networks, an unslotted CSMA/CA channel access mechanism is used. ZigBee Routers typically have their receivers continuously active, requiring a more robust power supply. However, this allows for heterogeneous networks in which some devices receive continuously, while others only transmit when an external stimulus is detected.
  • 14. ANT+ ANT+ (pronounced ant plus) is a sub-system of the base ANT protocol (a proprietary wireless technology) designed and marketed by the ANT+ Alliance, a division of Dynastream Innovations Inc. ANT+ is designed for the interoperable collection and transfer of sensor data as well as the integration of remote control systems such as indoor lighting, phone control, etc. ANT+ mainly focuses on operations that include sport, wellness, home care and remote control. It is used for data-transfer for a number of devices: • heart rate monitors • cadence sensors • cycling power meters • activity monitors • calorimeters • body mass index measuring devices • blood pressure monitors • blood glucose meters • position tracking • weight measuring devices • temperature sensors • fitness equipment http://www.thisisant.com/
  • 15. ANT+ explained… ANT™ is a practical wireless sensor network protocol running in the 2.4 GHz ISM band. Designed for ultra-low power, ease of use, efficiency and scalability. • ANT easily handles peer-to-peer, star, connected star, tree and fixed mesh topologies. • ANT provides reliable data communications, flexible and adaptive network operation and cross-talk immunity. • ANT protocol stack is extremely compact, requiring minimal microcontroller resources and considerably reduces system costs. • ANT provides carefree handling of the Physical, Network and Transport OSI layers. • It incorporates key low-level security features that form the foundation for user-defined sophisticated network security implementations. • ANT ensures adequate user control while considerably lightening computational burden in providing a simple yet effective wireless networking solution.
  • 16. EnOcean EnOcean is based on the energetically efficient exploitation of slight mechanical motion and other potentials from the environment, such as indoor light and temperature differences, using the principles of energy harvesting. • Maintenance-free sensor solutions • Bidirectional communication even with self-powered sensors • Easy Programming of customer-specific software • Easy-to-integrate • Interoperability of end-products www.enocean.com/en/home/
  • 17. Energy harvesting wireless standard from EnOcean High reliability Use of regulated frequency ranges with highest air time availability (approved for pulsed signals only) - 868 MHz according to R&TTE regulation EN 300220 and 315 MHz according to FCC regulation CFR-47 Part 15 Multiple telegram transmission with checksum Short telegrams (approx. 1 ms) for little probability of collision Long range: up to 30 meters in buildings and 300 meters in free field Repeater available for range extension One-way and bidirectional communication Low energy need High data transmission rate for sensor information of 125 kbit/s Small data overhead ASK modulation Interoperability Wireless protocol defined and integrated in modules Sensor profiles specified and implemented by users Unique transmission ID (32 bits) Coexistence with other wireless systems No interference with DECT, WLAN, PMR systems, etc System design verified in industrial environment
  • 19. Mobile device management (MDM) is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops, etc. MDM is usually implemented with the use of a third party product that has management features for particular vendors of mobile devices. There are two major types of MDM implementations: • On-premises Solution • Cloud-based Solution Device Management Specifications: • The Open Mobile Alliance (OMA) specified a platform-independent device management protocol called OMA Device Management. The specification meets the common definitions of an open standard, meaning the specification is freely available and implementable and most widely used. • Smart message is text SMS-based provisioning protocol (ringtones, calendar entries but service settings also supported like: ftp, telnet, SMSC number, email settings, etc...) • OMA Client Provisioning is a binary SMS-based service settings provisioning protocol. • Nokia-Ericsson OTA is binary SMS-based service settings provisioning protocol, designed mainly for older Nokia and Ericsson mobile phones.
  • 20. OMA-DM Lightweight M2M OMA Device Management is a device management protocol specified by the Open Mobile Alliance (OMA) Device Management (DM) Working Group and the Data Synchronization (DS) Working Group. OMA DM was originally developed by The SyncML Initiative Ltd, an industry consortium formed by many mobile device manufacturers. Device management is intended to support the following uses: • Provisioning – Configuration of the device (including first time use), enabling and disabling features • Device Configuration – Allow changes to settings and parameters of the device • Software Upgrades – Provide for new software and/or bug fixes to be loaded on the device, including applications and system software • Fault Management – Report errors from the device, query about status of device http://openmobilealliance.org/
  • 21. LWM2M standard solves a set of technological challenges that have appeared as the M2M market has matured and the Internet of Things makes constrained devices more accessible to device management and end-to-end service enablement. In this section we summarize the benefits of LWM2M: • Greater market growth and cost efficiency for the whole industry through a decoupling of devices, device management and services technologies. • Service providers, OEMs and end users benefit from the uniform management of constrained devices. • LWM2M can often provide a 10x increase in efficiency over OMA-DM. • Better time to market for M2M services as well as devices and infrastructures through standard components available from an ecosystem of vendors. • LWM2M is complementary to existing device management solutions like OMA DM and Broadband Forum TR-69, and greatly extends the range of devices that can be securely managed. • The LWM2M data model and the open OMA naming authority registry for Objects provide easily accessible and reusable semantics for both device management and application data for the whole Internet of Things industry. • By providing a single solution for device management and application data, LWM2M both simplifies systems and allows for new and innovative M2M services. • Complete security and security lifecycle management appropriate for constrained devices solves one of the most pressing problems in the M2M industry. • The scope of LWM2M defines only the device to service network interface, allowing easy integration into existing device management and M2M services, as well as larger backend system standards such as oneM2M.
  • 22. TR-069 TR-069 is the document number of the technical report, defined by the Broadband Forum, that specifies the “CPE WAN Management Protocol”. It assumes that the all CPE can obtain an IP address in order to communicate with an ACS and can interact with a single ACS at a time. • Auto-Configuration and Dynamic Service Provisioning Device Agnostics • Software/Firmware Image Management • Software Module Management • Status and Performance Monitoring • Diagnostics • Positioning in the End-to-End Architecture • Security Goals • Architectural Goals https://www.broadband-forum.org/cwmp.php
  • 23. TR-069 explained The CPE WAN Management Protocol comprises several components that are unique to this protocol, and makes use of several standard protocols. The protocol stack defined by the CPE WAN Management Protocol below.
  • 25. IoT can only be realized if, • Many and varied interactions between users, things, cloud services and applications can be authenticated. • User delegated consent will be necessary for any scenario where potentially privacy sensitive data is collected and analyzed (wearables, home automation, health, etc). • APIs can help protect sensitive data going to and from medical devices, smart grids and meters, cars, thermostats, appliances and other connected devices • Integrate and aggregate partner APIs, no matter what interface protocols or authentication schemes they use • Open up API access to big data resources to enable new customer services, improve operational efficiency or create new revenue opportunities
  • 26. OAUTH 2.0 http://oauth.net/2/ OAuth is an open standard for authorization that enables client applications to access server resources on behalf of a specific Resource Owner. OAuth also enables Resource Owners (users) to authorize limited third-party access to their resources without sharing credentials. For e.g.. a Gmail user could allow LinkedIn/ Flickr to have access to their list of contacts without sharing her/his Gmail username and password.
  • 27. OAUTH 2.0 explained OAuth 2.0 is an IETF standard authentication & authorization framework for securing application access to RESTful APIs • OAuth allows a Client (an application that desires information) to send an API query to a Resource Server (RS), the application hosting the desired information, such that the RS can authenticate that the message was indeed sent by the Client. • The Client authenticates to the RS through the inclusion of an access token on its API call—a token previously provided to the Client by an Authorization Server (AS). • In those scenarios that the API in question protects access to a User’s identity attributes, it may be the case that the access token will only be issued by the AS after the User has explicitly given consent to the Client accessing those attributes.
  • 28. CoAP 2.0 The Constrained Application Protocol (CoAP/RFC 7252) is a specialized web transfer protocol for use with constrained nodes and constrained networks in the Internet of Things. • CoAP transactions provide reliable UDP messaging • CoAP methods resemble HTTP method requests and responses • CoAP method calls may involve multiple CoAP transactions • Roles at the transaction layer may change during a method request / response execution http://coap.technology/
  • 29. CoAP explained CoAP is designed for machine-to-machine (M2M) applications such as smart energy and building automation and consists of robust foundations for IoT. • Constrained machine-to-machine web protocol • Representational State Transfer (REST) architecture • Simple proxy and caching capabilities • Asynchronous transaction support • Low header overhead and parsing complexity • URI and content-type support • UDP binding (may use IPSec or DTLS) • Reliable unicast and best-effort multicast support • Built-in resource discovery
  • 30. MQTT MQTT is an "Internet of Things" connectivity protocol. Designed exclusively as a lightweight publish/subscribe messaging transport using small code footprint and came from IBM's MQ message queuing product line. • MQTT messages are delivered asynchronously (“push”) through publish subscribe architecture. • Ideal for constrained networks (low bandwidth, high latency, data limits, and fragile connections) • Quality of Service (QoS) for MQTT • MQTT client abnormal disconnect notification • MQTT clients are very simple to implement http://mqtt.org/
  • 31. MQTT explained … MQTT runs over TCP/IP, or over other network protocols that provide ordered, lossless, bi-directional connections. Its features include: • Use of the publish/subscribe message pattern which provides one-to-many message distribution and decoupling of applications. • A messaging transport that is agnostic to the content of the payload. • Three qualities of service for message delivery: • "At most once", where messages are delivered according to the best efforts of the operating environment. Message loss can occur. This level could be used, for example, with ambient sensor data where it does not matter if an individual reading is lost as the next one will be published soon after. • "At least once", where messages are assured to arrive but duplicates can occur. • "Exactly once", where message are assured to arrive exactly once. This level could be used, for example, with billing systems where duplicate or lost messages could lead to incorrect charges being applied. • A small transport overhead and protocol exchanges minimized to reduce network traffic. • A mechanism to notify interested parties when an abnormal disconnection occurs.
  • 32. BIG DATA FOR INTERNET OF THINGS
  • 33. BIG & FAST Data Map, Reduce & Shuffle “If Hadoop is an Ocean, Streams are the Firehose”
  • 34. Streaming Data Stream processing in a big data paradigm, which is related to SIMD (single instruction, multiple data), that allows some applications to more easily exploit a limited form of parallel processing. • Handles data at high velocity • Processing in near real-time • Data has to be processed fast, so that a firm can react to changing business conditions in real time, think nano-second trading. • This is required for trading, fraud detection, system monitoring, Oil & Natural Gas industry and many other verticals.
  • 35. Streaming Data … For some use cases ( e.g. stock markets, traffic, surveillance, patient monitoring) the value of insights degrade very quickly with time. e.g. stock markets and speed of light or Credit card fraud detection We need technology that can produce outputs fast • Static Queries, but need very fast output (Alerts, Realtime control) • Dynamic and Interactive Queries ( Data exploration)
  • 36. Real-time Analytics Tools Stream Processing • Program a set of processors and wire them up, data flows though the graph. • A middleware framework handles data flow, distribution, and fault tolerance (e.g. Apache Storm, Samza) • Processors may be in the same machine or multiple machines Complex Event Processing • Event-pattern detection and abstraction • Event filtering, aggregation and transformation • Modeling event hierarchies • Detecting relationships (such as causality, membership or timing) between events • Abstracting event-driven processes Micro-Batch • Process data in small batches, and then combine results for final results (e.g. Spark) • Works for simple aggregates, but tricky to do this for complex operations • Can do it with MapReduce, not the same SLA OLAP Style in-memory processing • Supports interactive queries • Indexes data to make them them readily accessible to respond to queries fast. (e.g. Apache Drill) • Tools like Druid, VoltDB and SAP Hana can do this with all data in memory
  • 37. Machine Learning & Insights Internet of Things applications involve massive data sets, far too big for any human to reasonably keep track of, analyze, and interpret. Machine learning and predictive modeling steps in at various levels- from cloud services down to individual devices, to solve the complexity of applications. Machine Learning algorithms hunt for interesting signals in the noise, run simulations, creates and verifies predictive models, and offers insights in the form of “prescriptive intelligence.”
  • 38. Machine learning techniques that need exploration for IIoT, Connected Home and various IoT applications: • Supervised and unsupervised learning • Neural Networks • Machine Learning System Design • Clustering • Anomaly Detection • Recommendation Systems • Large-Scale Machine learning systems • Programming paradigms and Languages for machine learning • Computation at the edge or Computation at the core
  • 41. Add value to IoT Chain Enable' •  Enable (or Provision) devices to connect to the wireless Internet. integrate •  Integrate into mobile operator networks, everywhere in the world. Define' •  Define use cases and map out business and operational requirements for every stage of the product lifecycle. integrate •  Integrate new Internet of Things business with existing infrastructure. configure •  Configure application programming interfaces (APIs) to meet unique business need and requirement of each and every mobile operator Deliver' •  Deliver the new applications and services to the market
  • 42. Periodic table of the IoT industry by CB Insights
  • 43. Q & A —> harish.vadada@ieee.org