Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
Anyone who says that the Internet has fundamentally changed society may be right, but at the same time, the greatest
transformation actually still lies ahead of us. Several new technologies are now converging in a way that means the
Internet is on the brink of a substantial expansion as objects large and small get connected and assume their own web
identity.
Smart connectivity with existing networks and context-aware computation using network resources is an
indispensable part of IoT. With the growing presence of Wi-Fi and 4G-LTE wireless Internet access, the evolution
towards ubiquitous information and communication networks is already evident. However, for the Internet of Things
vision to successfully emerge, the computing paradigm will need to go beyond traditional mobile computing scenarios
that use smart phones and portables, and evolve into connecting everyday existing objects and embedding intelligence
into our environment. For technology to disappear from the consciousness of the user, the Internet of Things
demands: a shared understanding of the situation of its users and their appliances, software architectures and
pervasive communication networks to process and convey the contextual information to where it is relevant, and the
analytics tools in the Internet of Things that aim for autonomous and smart behavior. With these three fundamental
grounds in place, smart connectivity and context-aware computation can be accomplished.
A radical evolution of the current Internet into a Network of interconnected objects that not only harvests information
from the environment (sensing) and interacts with the physical world (actuation/ command/control), but also uses
existing Internet standards to provide services for information transfer, analytics, applications, and communications.
Fueled by the prevalence of devices enabled by open wireless technology such as Bluetooth, radio frequency
identification (RFID), Wi-Fi, and telephonic data services as well as embedded sensor and actuator nodes, IoT has
stepped out of its infancy and is on the verge of transforming the current static Internet into a fully integrated Future
Internet.
The Internet revolution led to the interconnection between people at an unprecedented scale and pace. The next
revolution will be the interconnection between objects to create a smart environment. Only in 2011 did the number of
interconnected devices on the planet overtake the actual number of people. Currently there are 9 billion
interconnected devices and it is expected to reach 24 billion devices by 2020. According to the GSMA, this amounts
to $1.3 trillion revenue opportunities for mobile network operators alone spanning vertical segments such as health,
automotive, utilities and consumer electronics.
1.1 DEFINITION
The Internet of Things represents an evolution in which objects are capable of interacting with other objects.
Hospitals can monitor and regulate pacemakers long distance, factories can automatically address production line
issues and hotels can adjust temperature and lighting according to a guest's preferences, to name just a few examples.
IBM
Page 1
1.2 WSN
Wireless sensor networks (WSN), sometimes called wireless sensor and actuator networks (WSAN), are
spatially
or
environmental
conditions,
such
as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location.
The more modern networks are bi-directional, also enabling control of sensor activity. The development of
wireless sensor networks was motivated by military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications, such as industrial process monitoring and
control, machine health monitoring, and so on.
1.3 TRENDS
Internet of Things has been identified as one of the emerging technologies in IT as noted in Gartners IT Hype Cycle
(Fig. 1). A Hype Cycle is a way to represent the emergence, adoption, maturity, and impact on applications of specific
technologies. It has been forecasted that IoT will take 510 years for market adoption.
Page 2
governance
and
fundamentally
neglect
privacy
and
security
in
their
design.
IoT-A, the European Lighthouse Integrated Project has addressed for three years the Internet-of-Things Architecture,
and created the proposed architectural reference model together with the definition of an initial set of key building
blocks. Together they are envisioned as foundations for fostering the emerging Internet of Things. Using an
experimental paradigm, IoT-A combined top-down reasoning about architectural principles and design guidelines with
simulation and prototyping in exploring the technical consequences of architectural design choices.
Page 3
2.2APPLICATION LAYER:
3.1SENSING
The first step in IoT workflow is gathering information at a point of activity. This can
be information captured by an appliance, a wearable device, a wall mounted control
or any number of commonly found devices. The sensing can be biometric, biological,
environmental, visual or audible (or all the above). The unique thing in the context of
IoT is that the device doing the sensing is not one that typically gathered information
in this way. Sensing technology specific to this purpose is required.
Page 4
3.2 COMMUNICATION
This is where things start to get interesting. Many of the new IoT devices we
are seeing today are not designed for optimal communication with cloud
services. IoT devices require a means for transmitting the information sensed
at the device level to a Cloud-based service for subsequent processing. This is
where the great value inherent in IoT is created. This requires either WiFi
(wireless LAN based communications) or WAN (wide area network i.e.
cellular) communications. In addition, depending on the need short range
communication, other capabilities may also be needed. These could include
Bluetooth, ZigBee, Coalesenses, Near-field or a range of other short range
communication methods. For positioning, GPS is often required as well.
3.3 CLOUD BASED CAPTURE & CONSOLIDATION
Gathered data is transmitted to a cloud based service where the information
coming in from the IoT device is aggregated with other cloud based data to
provide useful information for the end user. The data being consolidated can
be information from other internet sources as well as from others subscribing
with similar IoT devices. Most often, there will be some data processing
required to provide useful information that is not necessarily obvious in the
raw data.
3.4 DELIVERY OF INFORMATION
The last step is delivery of useful information to the end user. That may be a
consumer, a commercial or an industrial user. It may also be another device in
the M2M workflow. The goal in a consumer use case is to provide the
information in as simple and transparent a method as possible. It requires
execution of a well thought out, designed and executed user interface that
provides an optimized experience across multiple device platforms tablets,
smartphones, desktop across multiple operating systems iOS, Android,
Windows, etc..
4. TECHNOLOGIES USED
Page 5
RFID
WSN
IPV6
CLOUD COMPUTING
SESNSOR TECHNOLOGY
Page 6
Page 7
devices by the relevant gateway. At the subnet level, the URN for the sensor devices could be the unique
IDs rather than human-friendly names as in the www, and a lookup table at the gateway to address this
device. Further, at the node level each sensor will have a URN (as numbers) for sensors to be addressed
by the gateway. The entire network now forms a web of connectivity from users (high-level) to sensors
(low-level) that is addressable (through URN), accessible (through URL) and controllable (through
URC).
4.5 Visualization
Visualization is critical for an IoT application as this allows the interaction of the user with the environment.
With recent advances in touch screen technologies, use of smart tablets and phones has become very
intuitive. For a lay person to fully benefit from the IoT revolution, attractive and easy to understand
visualization has to be created. As we move from 2D to 3D screens, more information can be provided in
meaningful ways for consumers. This will also enable policy makers to convert data into knowledge, which
is critical in fast decision making. Extraction of meaningful information from raw data is non-trivial. This
encompasses both event detection and visualization of the associated raw and modeled data, with
information represented according to the needs of the end-user.
5. APPLICATIONS:
There are several application domains which will be impacted by the emerging Internet of Things. The applications
can be classified based on the type of network availability, coverage, scale, heterogeneity, repeatability, user
involvement and impact.
Page 8
There is a huge crossover in applications and the use of data between domains. For instance, the Personal and Home
IoT produces electricity usage data in the house and makes it available to the electricity (utility) company which can
in turn optimize the supply and demand in the Utility IoT. The internet enables sharing of data between different
service providers in a seamless manner creating multiple business opportunities.
Page 9
readings which can be easily followed from anywhere creating a Tweet. Although this provides a common framework
using cloud for information access, a new security paradigm will be required for this to be fully realized.
5.2 Enterprise
We refer to the Network of Things within a work environment as an enterprise based application. Information
collected from such networks are used only by the owners and the data may be released selectively. Environmental
monitoring is the first common application which is implemented to keep track of the number of occupants and
manage the utilities within the building (e.g., HVAC, lighting).
Sensors have always been an integral part of the factory setup for security, automation, climate control, etc. This will
eventually be replaced by a wireless system giving the flexibility to make changes to the setup whenever required.
This is nothing but an IoT subnet dedicated to factory maintenance.
One of the major IoT application areas that is already drawing attention is Smart Environment IoT. There are several
test beds being implemented and many more planned in the coming years. Smart environment includes subsystems
and the characteristics from a technological perspective.
These applications are grouped according to their impact areas. This includes the effect on citizens considering health
and wellbeing issues; transport in light of its impact on mobility, productivity, pollution; and services in terms of
critical community services managed and provided by local government to city inhabitants.
Page 10
5.3 Utilities
The information from the networks in this application domain is usually for service optimization rather than consumer
consumption. It is already being used by utility companies (smart meter by electricity supply companies) for resource
management in order to optimize cost vs. profit. These are made up of very extensive networks (usually laid out by
large organization on a regional and national scale) for monitoring critical utilities and efficient resource management.
The backbone network used can vary between cellular, Wi-Fi and satellite communication.
Smart grid and smart metering is another potential IoT application which is being implemented around the world.
Efficient energy consumption can be achieved by continuously monitoring every electricity point within a house and
using this information to modify the way electricity is consumed. This information at the city scale is used for
maintaining the load balance within the grid ensuring high quality of service.
Video based IoT, which integrates image processing, computer vision and networking frameworks, will help develop
a new challenging scientific research area at the intersection of video, infrared, microphone and network technologies.
Surveillance, the most widely used camera network applications, helps track targets, identify suspicious activities,
detect left luggage and monitor unauthorized access.
Water network monitoring and quality assurance of drinking water is another critical application that is being
addressed using IoT. Sensors measuring critical water parameters are installed at important locations in order to
ensure high supply quality. This avoids accidental contamination among storm water drains, drinking water and
sewage disposal. The same network can be extended to monitor irrigation in agricultural land. The network is also
extended for monitoring soil parameters which allows informed decision making concerning agriculture.
5.4 Mobile:
Smart transportation and smart logistics are placed in a separate domain due to the nature of data sharing and
backbone implementation required. Urban traffic is the main contributor to traffic noise pollution and a major
contributor to urban air quality degradation and greenhouse gas emissions. Traffic congestion directly imposes
significant costs on economic and social activities in most cities. Supply chain efficiencies and productivity, including
just-in-time operations, are severely impacted by this congestion causing freight delays and delivery schedule failures.
Dynamic traffic information will affect freight movement, allow better planning and improved scheduling. The
transport IoT will enable the use of large scale WSNs for online monitoring of travel times, origin destination (OD)
route choice behavior, queue lengths and air pollutant and noise emissions. The IoT is likely to replace the traffic
information provided by the existing sensor networks of inductive loop vehicle detectors employed at the
intersections of existing traffic control systems. They will also underpin the development of scenario-based models
for the planning and design of mitigation and alleviation plans, as well as improved algorithms for urban traffic
control, including multi-objective control systems. Combined with information gathered from the urban traffic control
system, valid and relevant information on traffic conditions can be presented to travelers. The prevalence of Bluetooth
technology (BT) devices reflects the current IoT penetration in a number of digital products such as mobile phones,
car hands-free sets, navigation systems, etc. BT devices emit signals with a unique Media Access Identification
Page 11
(MAC-ID) number that can be read by BT sensors within the coverage area.
Readers placed at different locations can be used to identify the movement of the devices. Complemented by other
data sources such as traffic signals, or bus GPS, research problems that can be addressed include vehicle travel time
on motorways and arterial streets, dynamic (time dependent) OD matrices on the network, identification of critical
intersections, and accurate and reliable real time transport network state information. There are many privacy
concerns by such usages and digital forgetting is an emerging domain of research in IoT where privacy is a concern.
Another important application in mobile IoT domain is efficient logistics management. This includes monitoring the
items being transported as well as efficient transportation planning. The monitoring of items is carried out more
locally, say, within a truck replicating enterprise domain but transport planning is carried out using a large scale IoT
network.
Page 12
Platforms or Software where the full potential of human creativity can be tapped using them as services.
The new IoT application specific framework should be able to provide support for:
(1) Reading data streams either from sensors directly or fetch the data from databases.
(2) Easy expression of data analysis logic as functions/operators that process data streams in a transparent and
scalable manner on Cloud infrastructures
(3) If any events of interest are detected, outcomes should be passed to output streams, which are connected to a
visualization program. Using such a framework, the developer of IoT applications will able to harness the power of
Cloud computing without knowing low-level details of creating reliable and scale applications.
6. COALESENSES
6.1 INTRODUCTION
Coalesenses is a young company providing solutions for massively distributed systems with a focus on wireless
sensor networks (WSNs).
Wireless sensor networks consist of so called sensor nodes. They are tiny battery powered computers equipped
with sensors and a wireless communication interface. Deployed in large numbers at places of interest, they form
an ad hoc network and allow for a new perspective: taking the lab outside. Instead of taking the phenomenon
into a laboratory with observation equipment, sensor networks observe it in situ. It is a shift in paradigm from a
small number of solitary observers to observation quality through simple but highly redundant, cooperating
sensors.
JN5148 module
2 x PCB antenna
x uFl connected to SMA external antennaOnboard temperature, light level and humidity sensors
2 x USB cables
Flash programmer
Eclipse IDE
6.2.2Benefits
6.2.3Applications
Building Automation
Home Control
Medical
7. Routing Protocols
A routing protocol specifies how routers communicate with each other, disseminating information that enables
them to select routes between any two nodes on a computer network. Routing algorithms determine the specific
choice of route. Each router has a priori knowledge only of networks attached to it directly. A routing protocol
Page 14
shares this information first among immediate neighbors, and then throughout the network. This way, routers
gain knowledge of the topology of the network.
Although there are many types of routing protocols, three major classes are in widespread use on IP networks:
Interior gateway protocols type 1, link-state routing protocols, such as OSPF and IS-IS
Interior gateway protocols type 2, distance-vector routing protocols, such as Routing Information
Protocol, RIPv2, IGRP.
Exterior gateway protocols are routing protocols used on the Internet for exchanging routing
information between Autonomous Systems, such as Border Gateway Protocol (BGP), Path Vector Routing
Protocol.
RIP
OSPF
IS-IS
IGRP/EIGRP
Page 15
Page 16
#define ISENSE_ENABLE_QUALITY_ROUTING
Are uncommented in your config.h (if you compile the iSense firmware manually), or check the options iSense
ConfigurationFunctionalityNeighborhood Monitoringand iSense ConfigurationFunctionalityQuality Unicast
Bidirectional Routing Protocolfor your platform on the iSense web compile interface
8. BENEFITS
Page 17
1.
2.
3.
4.
5.
6.
7.
Economic growth
8.
9.
Better environment
9. CURRENT SCOPE
9.1 Smart watches
Smart watches broke new ground last year, with the popularity of the devices like the pebble and the Galaxy Gear.
More mart watches making their way in the market with better and at the feasible prices. With apples longanticipated but expected announcement of the iWatch, as the company has been ramping up its sapphire glass
production and flexible, wearable watch like patents.
Industry Innovators: Apple, Metawatch, Samsung Galaxy Gear
Fig: iWatch(Apple)
Page 18
Page 19
10. Disadvantages
The Internet of Things is a business opportunity for security firms and a great invention for every industry, everyone
could benefit from their adoption, but we must carefully evaluate the cyber threats and the level of exposure of data
managed by such useful devices.
10.1 Signaling
With connected IoT devices, reliable bidirectional signaling is essential for collecting and routing data between
devices. Thats where IoT data streams comes into play. Devices may be talking to a server to collect data, or the
server may be talking to the devices, or maybe those devices are talking to one another. No matter what the use case,
data needs to get from point A to point B quickly and reliably. You need to be 100% sure that that stream of data is
going to arrive at its destination every time.
10.2
Security
Security is a huge umbrella, but its paramount in Internet of Things connectivity. For example, what good is a smart
home if anyone can unlock your doors? Here are three specifics:
Authorization: When sending or receiving a stream of data, its essential to make sure that the IoT
device or server has proper authorization to send or receive that stream of data.
Open ports: An IoT device is dangerously vulnerable when its sitting and listening to an open port
out to the Internet. You need bidirectional communication, but you dont want to have open ports out to
the Internet.
10.3
Encryption: You need end to end encryption between devices and servers.
Presence Detection
Its important to immediately know when an IoT device drops off the network and goes offline. And when that
device comes back online, you need to know that as well. Presence detection of IoT devices gives an exact, up
Page 20
to the second state of all devices on a network. This gives you the ability to monitor your IoT devices and fix
any problems that may arise with your network.
10.5 Bandwidth
In addition to power and CPU, bandwidth consumption is another challenge for IoT connectivity. Bandwidth
on a cellular network is expensive, especially with hundreds of thousands of IoT devices on a network
sending request/response signals to your server. Thats a huge server issue and it requires a large scale server
farm handling all this data. You need a lightweight network that can seamlessly transfer data between devices
and servers.
Page 21
Page 22
10,
buf,
Radio::ISENSE_RADIO_HEADER_OPTION_NONE, NULL );
}
else
{
os_.debug("link failed....");
}
}
//sender's code..............................................................................................
//---------------------------------------------------------------------------void
iSenseDemoApplication::
receive(uint8
len,
const
uint8
buf,
ISENSE_RADIO_ADDR_TYPE
src_addr,
Page 23
len, seq_no,
12. CONCLSUSION
In conclusion, the Internet of Things is closer to being implemented than the average person would think.
Most of the necessary technological advances needed for it have already been made, and some
manufacturers and agencies have already begun implementing a small-scale version of it. The main reasons
why it has not truly been implemented is the impact it will have on the legal, ethical, security and social
fields. Workers could potentially abuse it, hackers could potentially access it, corporations may not want to
share their data, and individual people may not like the complete absence of privacy. For these reasons, the
Internet of Things may very well be pushed back longer than it truly needs to be.
IoT represents the next evolution of the Internet. Given that humans advance and evolve by turning data into
information, knowledge, and wisdom, IoT has the potential to change the world as we know it todayfor the better.
How quickly we get there is up to us.
Page 24
14.REFERENCES
www.Coalesenses.com
https://en.wikipedia.org
Page 25
http://intelligentproduct.solutions