Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Internet of Things
1. Internet Of Things
By: Amr Samy Abd El-Aziz
E.mail:amrsamyabdelaziz@gmail.com
Embedded Mobile Systems track, ITI Ismailia
1
2. AGENDA
• Introduction
• IoT Today
• Who Push towards IoT ?
• Why Is IoT Important?
• IoT as a Network of Networks
• Building Blocks of IoT
• IoT Challenges
• Summary
2
3. “The Internet of Things (IoT)refers to uniquely identifiable objects(things)
and their virtual representations in an Internet-like structure”-Wikipedia
OR
“The Internet of Things (IoT )is simply the point in time when
more “things or objects” were connected to the Internet than
people.” – Cisco Internet Business Solutions Group (IBSG)
OR
“The Internet of Things (IoT) provides the foundational infrastructure for a
smarter planet, and offers significant growth opportunities in
IT, infrastructures and services” – IBM
Introduction 3
4. Introduction(Cont‟d)
• First application was a Coke machine ,Carnegie Melon University, in
the early of 1980s.
• First Named by Kevin Ashton (Auto-ID center at MIT ) in 1999
”If We Had Computers that Knew Everything .. Using Data They
Gathered Without Any help From us, we Would Be Able To Track And
count everything, And greatly Reduce waste, Loss And cost”.
4
7. Why Is IoT Important? (Cont‟d)
•We Evolve Because We Communicate
7
8. Why Is IoT Important? (Cont‟d)
IoT is critical for human beings
•As the planet‟s population continues to increase, it becomes even
more important for people to become stewards of the earth and its
resources.
•people desire to live healthy, fulfilling, and comfortable lives for
themselves, their families, and those they care bout
8
11. Sensing Nodes
All types of sensing nodes needed for the IoT vary widely,
depending on the applications involved :
• Sensing nodes could include a camera system for image monitoring
• Water or gas flow meters for smart energy
• Radar vision when active safety is needed
• RFID readers sensing the presence of an object or person
•Doors and locks with open/close circuits that indicate a building
intrusion;
•A simple thermometer measuring temperature
11
12. Layers of Local Embedded
Processing Nodes
•Embedded processing is at the heart of the IoT. Local processing
capability is most often provided by MCUs, hybrid
microcontrollers/microprocessors (MCUs/MPUs) or integrated MCU
devices, which can provide the “real-time” embedded processing that
is a key requirement of most IoT applications.
12
13. Communication
•The role of the communication node is to transfer information
gathered by the sensing nodes and processed by local embedded
processing nodes to the destinations identified by the local embedded
processing nodes. And, once the data is remotely processed and new
commands are generated, the communication node brings back the
new commands to the local embedded processing nodes to execute
a task.
13
16. ITU Report in 2005:
•IoT adds a new
dimension to the ICT
world (“4A Vision”) -
from „traditional‟
anytime, any place
connectivity for
anyone, the Internet
of Things brings
connectivity for
anything
Definition 16
17. Radio Spectrum
•Radio-frequency spectrum: a scarce natural
resource, increasingly in demand from a large and
growing number of services
•Can the RF spectrum handle 50 billion connected
devices?*
* GSMA estimate for 2025. The World Wireless Research Forum estimates “7
trillion wireless devices serving 7 billion people by 2017”
17
18. •How to address 50 billion
objects?
•Different technical solutions
proposed:
Electronic Product Codes
(RFID tags)
„Traditional‟ Uniform
Resource Identifiers (URI)
IPv6: address space
supports 2128 addresses
•Issues beyond technology:
Standards for numbering
and addressing schemes
(ITU-T)
Harmonization, policies,
regulation
All countries should be
involved in the
development and benefit
from the IoT
Numbering and Addressing 18
19. •IoT may also connect transportation, electricity grids
and other critical infrastructure
Security risks and concerns
•Users are concerned about privacy and socio-
ethical implications of the use of tracking and geo-
location
Security and Privacy 19