Notes 2
Notes 2
Notes 2
IoT comprises things that have unique identities and are connected to internet. By 2020 there will be a
total of 50 billion devices /things connected to internet. IoT is not limited to just connecting things to the internet
but also allow things to communicate and exchange data.
DEFINITION:
The Internet of Things, also called The Internet of Objects, refers to a wireless network between objects,
usually the network will be wireless and self-configuring, such as household appliances.
Wikipedia
By embedding short-range mobile transceivers into a wide array of additional gadgets and everyday items,
enabling new forms of communication between people and things, and between things themselves.
WSIS 2005
The term "Internet of Things" has come to describe a number of technologies and research disciplines that
enable the Internet to reach out into the real world of physical objects.
IoT 2008
IOT ARCHITECTURE:
There is not such a unique or standard consensus on the Internet of Things (IoT) architecture which is universally
defined. The IoT architecture differs from their functional area and their solutions. However, the IoT architecture
technology mainly consists of four major components:
Sensors/Devices
Gateways and Networks
Cloud/Management Service Layer
Application Layer
Figure 1: IoT Architecture
1. M2M:
Machine to Machine.
Enables flow of data between machines which monitors data by means of sensors and at other end extracts
the information on gathered data and processes it.
Subset of IoT.
2. RFID:
Radio Frequency Identification
Uses radio frequency to read and capture information stored on a tag attached to an object.
A tag can be read from up to several feet away and does not need to be within direct line-of-sight of the reader
to be tracked.
Uses NFC (Next Field Communication protocol), IC (Integrated Circuit) Cards, Radio Waves.
3. SCADA
Supervisory means top level.
Control means controlling things.
Data Acquisition means acquiring the data / reading the data.
SCADA is a s/w used to control the hardware i.e., PLC, drives, servers, sensors and also acquire the data
which is stored on the personal computer or Human Machine Interface (HMI).
4. WSN
Wireless Sensor Networks.
It senses and gathers data using sensors which are spatially distributed.
It collects this data into a centralized location with the help of wired / wireless connection.
DNA OF IOT
DNA Connectivity IoT subscriptions are intended for corporate data transfer between sensors, devices and
systems when mobile data transfer is required. We provide this service in 2G, 3G and 4G networks. Subscriptions
can be easily and comprehensively managed via the DNA Control Center (a user interface provided by Cisco
Jasper).
IoT subsc
for connecting IoT devices located over a wide area from large properties or factory buildings to cities or
where devices are in mobile use. IoT subscriptions
security features. The mobile network combines the reliability and continuity of an established technology with
predictable development according to mobile technology standards.
SIM cards with various physical characteristics are available to suit the different user cases and devices.
Subscriptions can be integrated into secure company-specific APN solutions, and an international roaming feature
can also be added if you want to use the connections outside Finland.
PHASE 1: EPLORATION:
The first phase of the toolkit is "exploration". This phase begins with the iteration "understand", and forms the
basis for understanding the context, problem, and users. Followed by the second iteration "discover" that is
characterized by immersion in the situation, empathizing with the users and observing them, leading to discoveries
of new ideas and insights. Having reached a level of understanding, combined with discoveries of ideas and
insights, the third iteration "define" consists of framing these insights into well- defined opportunities and needs,
pain points and positive experiences of the users. The entire process is iterative, and all these different processes
overlap and repeat throughout, and that is especially true for the "think" iteration. Here this toolkit provides you
with concrete ideation techniques and brainstorming tools which are helpful throughout the entire journey.
Finally, in the "conceptualize" iteration all the insights are gathered and ideas are examined, combined, visualized
and framed into a complete concept.
PHASE 2: EXPERIMENTATION:
Having formed a concept in the previous phase, it's now time to put it to the test. First, the "plan & engage"
activities are considered important at the beginning of experimentation, to ensure sustainable end-user
involvement. With careful planning the piloting or experimentation activities can be carried out in an engaging
manner, keeping the stakeholders involved and informed throughout the process. The following "prototype"
iteration consists of building and creating a prototype. Prototypes can take on many forms, from tangible MVPs
(Minimum Viable Products) to intangible service or experience design prototypes, but the main goal of the
prototype is always the same: to "test" it in the third iteration. The purpose of building a prototype is to find
answers, discover new insights and ideas, and to filter and measure the assumptions made. Therefore, these two
iterations are often repeated numerous times, bringing you back to the first phase of exploration for new insights,
ideas and concepts by debunking your assumptions or validating insights. Once a well-defined, tested and
validated prototype has come out from the many iterations throughout the processes, the process of "pre-launch"
has to do with analyzing, validating, distilling and orchestrating the upcoming launch of the prototype. The
"develop" iteration continues to develop, deploy and generate the prototype into a product or service.
PHASE 3: EVALUATION:
Many of the toolkits available across the various sources have focused on the previous two phases, but the third
phase of evaluation is equally important. Beginning with the first iteration "launch", the final prototypes, products
and services are realized and delivered. Very similarly, the second iteration "implement" refers to delivering to
the stakeholders, but further so, focuses on the process of fully implementing the product/service and explaining
its importance and impact for the context. The third iteration "Identify" finally identifies the outcome of the
process and ensures the ongoing sustainability of the product/service in the future. LSPs looking for tools that
serve in answering to their current needs can use the filters below to display the specific tools relating to each of
the tracks: 1. use cases, 2. co-creation, 3. prototyping & testing, 4. user research. A selection can also be made
according to the skill level, effort needed and overall level of difficulty in using the tool: beginner, intermediate,
advanced.
IOT MIDDLEWARE:
Internet of Things middleware is software that serves as an interface between components of the IoT, making
communication possible among elements that would not otherwise be capable.
Middleware connects different, often complex and already existing programs that were not originally
designed to be connected. The essence of the Internet of Things is making it possible for just about anything (any
Thing) to be connected and to communicate data over a network. Middleware is part of the architecture enabling
connectivity for huge numbers of diverse Things by providing a connectivity layer for sensors and also for the
application layers that provide services that ensure effective communications among software.
MuleSoft, Oracle, RedHat and WSO2 are among the companies that offer IoT middleware. These products
provide API management as well as basic messaging, routing and message transformation. More comprehensive
IoT platforms include middleware along with sensors and networking components.
Vendors and device manufacturers, on the other hand, should take a broader approach and invest heavily
in securing IoT management tools. Steps that should be taken include:
Proactively notifying users about devices running outdated software/OS versions.
Enforcing smart password management (e.g., mandatory default password changes).