SlideShare una empresa de Scribd logo
1 de 25
A Brief Review on: Evolution of
Communication Technologies
Presentation On
Presented By:
Radha R. Mahalle
1st Year M.tech (ESC)
Id:16055017
Guided By:
Prof. S.S. Mathurkar
Assistant Prof.
(Electronic and telecommu.
Dept.)
Government College of Engineering, Amravati
(An autonomous Institute of Government of Maharashtra)
Courtesy: Reference[11]
Contents
o Introduction
o Literature Review
o Types of Communication channels
o Wired communication Technology
o Wireless communication Technology
o M2M Communication Technology
o Internet of Things
o Future Scope
o Conclusion
o References
Introduction
o The transfer of data between point to point or multipoint communication is
done by using transmitter and receiver.
o Examples of such: optical fiber, copper wires, wireless communication
channels ,etc.
o Data is represented as an electromagnetic signal, such as voltage,
microwave, etc.
Fig: Block Diagram of Communication
System
Transmitter Channel Receiver
Noise
Sr No Paper Title Author Year of
Publication
Conclusion
1 Comparisons of
wired and wireless
network:
A Review
1.Navpreet Kaur
2.Sangeeta
Monga
2014 The wired Computer Networks
provide a secure and faster means
of connectivity but the need of
mobility i.e. anywhere, anytime and
anyone access is tilting the network
users towards wireless technology.
Wireless technology has high
mobility.
2. Comparative Study
of Communication
Technologies for
Power Optimized
Automation
Systems: A
Review and
Implementation
Amol Baviskar,
Jaypal Baviskar,
Swapnil Wagh,
Afshan Mulla,
Piyush Dave
2015 The paper summarizes all the
specifications and features provided
by ZigBee, UWB, Bluetooth, Wi-
Fi, GSM, Z-Wave and Insteon
technologies. It gives information
about applications which are
specific to automation sector and
provides suitable
standards to be deployed
Literature Review
Sr
No.
Paper Title Author Name Year of
Publication
Conclusion
3 The Evolution of
M2M into IoT
1. Mahbubul
Alam
2. Rasmus H.
Nielsen
3. Neeli R.
Prasad
2013 In this Some of the considerations
to be made when moving from
M2M and into the
commercialization of IoT as it is
envisioned.
4. A Survey on IOT
Architecture,
Protocols,
Applications,
Security, Privacy,
Real-world
Implementation and
future trends.
1. Surapon
Kraijak,
2. Panwit
Tuwanut1
2015 The paper describes the evolution
and how important of IoT in daily
life, the generic architecture, its
most widely used protocols,
numerous possible applications,
future trends.
5 Internet of Things:
Comparative Study
on Classification
Algorithms (k-NN,
Naive Bayes and
Case based
Reasoning)
1. Roshna
Chettri
2. Shrijana
Pradhan
3. Lekhika
Chettri
November
2015
Among three algorithm that have
been discussed case base
reasoning is better according to
study as case base reasoning
reduces the computational time
and solve more complicated cases
and also work with the huge data .
Types Of Communication Channel
Communication Channel
Wireless ChannelWired Channel
o A channel is way to convey a message
o It refers to either a physical transmission such as a wire or to a logical
connection over a multiplexed medium such as a radio channel
o Modes of transmission are: simplex, half duplex or full duplex
o Types of transmission are: parallel and serial
Wired communication technology
o Wired technology is more associated
with wired communication i.e. it uses the
wired channel
o Wired communication refers to the
transmission of data over a wire-based
communication technology.
o Examples include telephone networks,
cable television or internet access, and
fiber-optic communication
Courtesy: Reference[10]
o Advantages
1.Security-it offers a more secure connection
2. Reliability-offers a more reliable connection
3. High Speed Communication e.g: Cat5 ethernet cabling runs at
100Mbps or 1Gbps speed
o Disadvantages
1. Large Number of physical Connections Required
2. More expensive to set up
3. More time consuming
o The term wireless refers to the
communication over a distance without
requiring wires, cables.
o Information is transmitted through air,
without requiring any cables by using
electro-magnetic waves like radio
frequencies, infrared, satellite etc.
o There are many wireless communication
technologies such as wifi, bluetooth, zig-
bee, wi-max etc
courtesy: Mtz&Rdz´s company
Wireless communication technology
o Comparison of Wireless Technologies
Parameter Bluetooth Zig-Bee Wi-fi Wi-Max
IEEE Standard IEEE
802.15.1
IEEE
802.15.4
IEEE 802.11
a/b/g
IEEE
802.16
Frequency Band 2.4 GHz 2.4 GHz 2.4 GHz to
5 GHz
2 - 11GHz ;
10 – 66GHz
Speed 0.75 Mbps 250 Kbps 54Mbps Up to
80Mbps
Access
Technique
TDMA CSMA-CA CSMA-CA SOFDMA
Rang 10Meter 10 to 20
Meters
100Meter 50Km
o A machine-to-machine (M2M)
refers direct connections between
devices (e.g., sensors, vending
machines ,vehicles ,etc).
o Cellular wireless technologies will be
a potential candidate for providing the
last mile M2M connectivity.
o Example: Telemedicine is a common
area in which the M2M is uses. courtesy: Reference [9]
M2M Technology
o The Internet of things is the interworking of
physical devices, vehicles ,buildings and other
items embedded with electronics, software,
sensors, actuators, and network connectivity that
enable these objects to collect and exchange data.
o The IoT is Based On the M2M Connections
between the various devices, sensors, software
etc.
Courtesy: Reference[ 7]
Internet of Things(IoT)
Fig: The Five layer architecture of IoT
Business Layer
Middleware Layer
Network Layer
Perception Layer
Application Layer
o Architecture of IoT :
o IoT Protocols
Most frequently used protocols for making Machine-to-Machine
(M2M) communication in IoT are:
1. MQTT (Message Queue Telemetry Transport)
• MQTT is a subscribes messaging transport protocol. The protocol runs
over TCP/IP or over other network protocol that provided ordered,
lossless, bi-directional connections.
• It provides Features of one-to-many message distribution
• It also required less bandwidth and low power as compare to the http
2. CoAP (Constraint Application Protocol)
• CoAP is a specialized web transfer protocol for use with constrained
nodes and constrained networks
• CoAP provides a request and response interaction model between
application end points
• CoAP is designed to friendly interface with HTTP for integration with
the Web while meeting specialized requirements such as multicast
support, very low overhead and simplicity for constrained
environments
o Algorithms for IoT
The Algorithms used for computing of data in IoT are:
1. K-nearest neighbors algorithm
2. Case Based Reasoning
3. Naive Bayes
1. K-nearest neighbors algorithm
• KNN is an non parametric lazy algorithm.
• K decides how many neighbors influence in the classification, this is
usually an odd number
Name Acid durability
(X1)
Strength
(X2)
Class
Type-1 7 7 Bad
Type-2 7 4 Bad
Type-3 3 4 Good
Type-4 1 4 Good
Task: For Type-5 Tissue, Find Class
for Acid durability(X) = 3
Strength(Y)=7
Example:
Step1: Calculate Distance
Formula: D=squrt((X1-X)²+(X2-Y)²), Where, X=3 and Y=7
Name Acid durability
(X1)
Strength
(X2)
Distance(D)=squrt((X1-X)²+(X2-Y)²)
Type-1 7 7 Squrt((7-3)²+(7-7)²)=4
Type-2 7 4 5
Type-3 3 4 3
Type-4 1 4 3.6
Distance Rank It is included in 3
nearest Neighbor
4 3 Yes
5 4 No
3 1 Yes
3.6 2 Yes
Step2: Determine Nearest Neighbor
Now Cosider K=3
Name Acid
durability
(X1)
Strength
(X2)
Distance Rank It is included
in 3 nearest
Neighbor
Category Z
Type-1 7 7 4 3 Yes Bad
Type-2 7 4 5 4 No ---
Type-3 3 4 3 1 Yes Good
Type-4 1 4 3.6 2 Yes Good
Step3: Gather the Category Z of the nearest neighbor
Step4: Use simple majority of the category of the nearest neighbor
We have seen that there are two goods and one bad, the prediction is
based on the. Therefore the type-5 tissue is belongs to Class-Good.
Future Scope
o IoT will derive the future technology, with various innovation and creative
product.
o The IoT can be used different sectors, the IoT based smart home will save
power consumption up to 10%
o Following subsection show three example of the IoT trend will matter:
- Low power sensing unit
- High Efficiency in connectivity
- Reliable communication
Conclusions
o Wired technology is more secure, reliable, cheaper and has higher data
transmission rates over wireless technology but one huge advantage that
has made wireless technology popular is mobility
o M2M provides connectivity between the various devices for exchanging
the data, using wired and wireless technologies.
o M2M technology is base of the IoT, if the IoT is tree then the roots of that
tree are nothing but the M2M
o We can implements the IoT in various application such as smart city, smart
parking, smart hospital, smart home etc
References
 Papers:
[1] Navpreet Kaur, Sangeeta Monga(2014) Comparison of Wired and
Wireless Network :A Review Kaur et al., International Journal of Advanced
Engineering Technology E-ISSN 0976-3945 Int J Adv Engg Tech/Vol.
V/Issue II/April-June,2014/34-35
[2] Amol Baviskar, Jaypal Baviskar, Swapnil Wagh, Afshan Mulla, Piyush
Dave (2015) Comparative Study of Communication Technologies for Power
Optimized Automation Systems: A Review and Implementation. 2015 Fifth
International Conference on Communication Systems and Network
Technologies.
[3] Mahbubul Alam, Rasamus H. Nielsen, Neeli R Prasad (2013)
The Evolution Of M2M into IoT . First International Black Sea Conference
on Communications and Networking (BlackSeaCom)
[4] Surapon Kraijak, Panwit Tuwanut(2015) A survey on IoT architectures,
protocols, applications, security, privacy, real world implementation and
future trends. 11th International Conference on Wireless Communications,
Networking and Mobile Computing (WiCOM 2015).
[5] Roshna Chettri ,Shrijana Pradhan, Lekhika Chettri (2015) Internet of
Things: Comparative Study on Classification Algorithms (k-NN, Naive Bayes
and Case based Reasoning) International Journal of Computer Applications
(0975 – 8887) Volume 130 – No.12, November 2015.
 Website:
[6] http://www.postscapes.com/internet-of-things-protocols/#iot-architecture-
graphics on dated-10/12/2016
[7] https://en.wikipedia.org/wiki/Internet_of_things#Applications on dated-
07/12/2016
[8] https://en.wikipedia.org/wiki/Machine_to_machine on dated- 07/12/2016
[9] http://www.libelium.com/smart_cars_m2m_accident_prevention/ on dated
13/12/2016
[10] http://www.expertsmind.com/blog/post/ict-the-extend-synonym-of-
information-technology-in-education-732.aspx On dated-13/12/2016
[11] http://bizblog.simplex-it.com/4624/effective-project-communications-
webinar/ on dated-13/12/2016
Thank
You

Más contenido relacionado

La actualidad más candente

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
33 9140 it immensely discriminate routing in wireless (edit lafi)
33 9140 it  immensely discriminate routing in wireless (edit lafi)33 9140 it  immensely discriminate routing in wireless (edit lafi)
33 9140 it immensely discriminate routing in wireless (edit lafi)IAESIJEECS
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensorAhmed Tememe
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingeSAT Publishing House
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...IJERA Editor
 
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
 
20190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v520190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v5俊廷 陳
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

La actualidad más candente (19)

TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
Mohamad Aziz Resume
Mohamad Aziz ResumeMohamad Aziz Resume
Mohamad Aziz Resume
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
33 9140 it immensely discriminate routing in wireless (edit lafi)
33 9140 it  immensely discriminate routing in wireless (edit lafi)33 9140 it  immensely discriminate routing in wireless (edit lafi)
33 9140 it immensely discriminate routing in wireless (edit lafi)
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Fw3510381039
Fw3510381039Fw3510381039
Fw3510381039
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
Performance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding usingPerformance analysis of ml and mmse decoding using
Performance analysis of ml and mmse decoding using
 
10
1010
10
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
 
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
 
20190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v520190725 li chun_lab_intro_v5
20190725 li chun_lab_intro_v5
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Destacado

The Evolution of Communication
The Evolution of CommunicationThe Evolution of Communication
The Evolution of Communication1CallNow
 
Communication then & now
Communication then & nowCommunication then & now
Communication then & nowUtkarsh Haldia
 
Evolution of communication technology
Evolution  of  communication  technologyEvolution  of  communication  technology
Evolution of communication technologysushruth kamarushi
 
Design for future technologies
Design for future technologiesDesign for future technologies
Design for future technologiesMelissa Tang
 
A Look Into the Future of Communication Technologies 10 Years from Now
A Look Into the Future of Communication Technologies 10 Years from NowA Look Into the Future of Communication Technologies 10 Years from Now
A Look Into the Future of Communication Technologies 10 Years from Nowkwells727
 
Guía de inicio rápido de los AirPods de Apple
Guía de inicio rápido de los AirPods de AppleGuía de inicio rápido de los AirPods de Apple
Guía de inicio rápido de los AirPods de AppleMaxMovil
 
Optical network and architecture
Optical network and architectureOptical network and architecture
Optical network and architectureRadha Mahalle
 
Development of Transportation in the World
Development of Transportation in the WorldDevelopment of Transportation in the World
Development of Transportation in the WorldJanella Mae Torres
 
The Evolution of Communication
The Evolution of CommunicationThe Evolution of Communication
The Evolution of Communication11bjmp
 
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by Vocus
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by VocusLesson 1 in Cloud – Read Instructions Carefully - session sponsored by Vocus
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by VocusAmazon Web Services
 
Huawei: Extending MBB with HetNet and SON
Huawei: Extending MBB with HetNet and SONHuawei: Extending MBB with HetNet and SON
Huawei: Extending MBB with HetNet and SONSmall Cell Forum
 
ShoreTel Connect Live Cloud r8
ShoreTel Connect Live Cloud r8ShoreTel Connect Live Cloud r8
ShoreTel Connect Live Cloud r8Michael Oleata
 
Brand Yourself Better Vocus Webinar with Stacey Miller
Brand Yourself Better Vocus Webinar with Stacey MillerBrand Yourself Better Vocus Webinar with Stacey Miller
Brand Yourself Better Vocus Webinar with Stacey MillerCision
 
2016_Connections_BD_Book_F4
2016_Connections_BD_Book_F42016_Connections_BD_Book_F4
2016_Connections_BD_Book_F4Alyssa Skinner
 

Destacado (15)

The Evolution of Communication
The Evolution of CommunicationThe Evolution of Communication
The Evolution of Communication
 
Communication then & now
Communication then & nowCommunication then & now
Communication then & now
 
Evolution of communication technology
Evolution  of  communication  technologyEvolution  of  communication  technology
Evolution of communication technology
 
Design for future technologies
Design for future technologiesDesign for future technologies
Design for future technologies
 
Airpods
AirpodsAirpods
Airpods
 
A Look Into the Future of Communication Technologies 10 Years from Now
A Look Into the Future of Communication Technologies 10 Years from NowA Look Into the Future of Communication Technologies 10 Years from Now
A Look Into the Future of Communication Technologies 10 Years from Now
 
Guía de inicio rápido de los AirPods de Apple
Guía de inicio rápido de los AirPods de AppleGuía de inicio rápido de los AirPods de Apple
Guía de inicio rápido de los AirPods de Apple
 
Optical network and architecture
Optical network and architectureOptical network and architecture
Optical network and architecture
 
Development of Transportation in the World
Development of Transportation in the WorldDevelopment of Transportation in the World
Development of Transportation in the World
 
The Evolution of Communication
The Evolution of CommunicationThe Evolution of Communication
The Evolution of Communication
 
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by Vocus
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by VocusLesson 1 in Cloud – Read Instructions Carefully - session sponsored by Vocus
Lesson 1 in Cloud – Read Instructions Carefully - session sponsored by Vocus
 
Huawei: Extending MBB with HetNet and SON
Huawei: Extending MBB with HetNet and SONHuawei: Extending MBB with HetNet and SON
Huawei: Extending MBB with HetNet and SON
 
ShoreTel Connect Live Cloud r8
ShoreTel Connect Live Cloud r8ShoreTel Connect Live Cloud r8
ShoreTel Connect Live Cloud r8
 
Brand Yourself Better Vocus Webinar with Stacey Miller
Brand Yourself Better Vocus Webinar with Stacey MillerBrand Yourself Better Vocus Webinar with Stacey Miller
Brand Yourself Better Vocus Webinar with Stacey Miller
 
2016_Connections_BD_Book_F4
2016_Connections_BD_Book_F42016_Connections_BD_Book_F4
2016_Connections_BD_Book_F4
 

Similar a A Brief Review on: Evolution of Communication Technologies

Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Karen Gilchrist
 
Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocolgmeneses23
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd Iaetsd
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANijtsrd
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrayssanthoshkumarecegnit
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World ijwmn
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 

Similar a A Brief Review on: Evolution of Communication Technologies (20)

Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
 
Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocol
 
Iaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance onIaetsd evaluation ofdma & sc-ofdma performance on
Iaetsd evaluation ofdma & sc-ofdma performance on
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
SDSFLF: fault localization framework for optical communication using softwar...
SDSFLF: fault localization framework for optical  communication using softwar...SDSFLF: fault localization framework for optical  communication using softwar...
SDSFLF: fault localization framework for optical communication using softwar...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1075460
H1075460H1075460
H1075460
 
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna ArraysDesign And Analysis for Millimeter Wave Networks using Antenna Arrays
Design And Analysis for Millimeter Wave Networks using Antenna Arrays
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USESREVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
REVIEW ON MANET: EVOLUTION, CHALLENGES AND USES
 

Último

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Último (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

A Brief Review on: Evolution of Communication Technologies

  • 1. A Brief Review on: Evolution of Communication Technologies Presentation On Presented By: Radha R. Mahalle 1st Year M.tech (ESC) Id:16055017 Guided By: Prof. S.S. Mathurkar Assistant Prof. (Electronic and telecommu. Dept.) Government College of Engineering, Amravati (An autonomous Institute of Government of Maharashtra) Courtesy: Reference[11]
  • 2. Contents o Introduction o Literature Review o Types of Communication channels o Wired communication Technology o Wireless communication Technology o M2M Communication Technology o Internet of Things o Future Scope o Conclusion o References
  • 3. Introduction o The transfer of data between point to point or multipoint communication is done by using transmitter and receiver. o Examples of such: optical fiber, copper wires, wireless communication channels ,etc. o Data is represented as an electromagnetic signal, such as voltage, microwave, etc. Fig: Block Diagram of Communication System Transmitter Channel Receiver Noise
  • 4. Sr No Paper Title Author Year of Publication Conclusion 1 Comparisons of wired and wireless network: A Review 1.Navpreet Kaur 2.Sangeeta Monga 2014 The wired Computer Networks provide a secure and faster means of connectivity but the need of mobility i.e. anywhere, anytime and anyone access is tilting the network users towards wireless technology. Wireless technology has high mobility. 2. Comparative Study of Communication Technologies for Power Optimized Automation Systems: A Review and Implementation Amol Baviskar, Jaypal Baviskar, Swapnil Wagh, Afshan Mulla, Piyush Dave 2015 The paper summarizes all the specifications and features provided by ZigBee, UWB, Bluetooth, Wi- Fi, GSM, Z-Wave and Insteon technologies. It gives information about applications which are specific to automation sector and provides suitable standards to be deployed Literature Review
  • 5. Sr No. Paper Title Author Name Year of Publication Conclusion 3 The Evolution of M2M into IoT 1. Mahbubul Alam 2. Rasmus H. Nielsen 3. Neeli R. Prasad 2013 In this Some of the considerations to be made when moving from M2M and into the commercialization of IoT as it is envisioned. 4. A Survey on IOT Architecture, Protocols, Applications, Security, Privacy, Real-world Implementation and future trends. 1. Surapon Kraijak, 2. Panwit Tuwanut1 2015 The paper describes the evolution and how important of IoT in daily life, the generic architecture, its most widely used protocols, numerous possible applications, future trends. 5 Internet of Things: Comparative Study on Classification Algorithms (k-NN, Naive Bayes and Case based Reasoning) 1. Roshna Chettri 2. Shrijana Pradhan 3. Lekhika Chettri November 2015 Among three algorithm that have been discussed case base reasoning is better according to study as case base reasoning reduces the computational time and solve more complicated cases and also work with the huge data .
  • 6. Types Of Communication Channel Communication Channel Wireless ChannelWired Channel o A channel is way to convey a message o It refers to either a physical transmission such as a wire or to a logical connection over a multiplexed medium such as a radio channel o Modes of transmission are: simplex, half duplex or full duplex o Types of transmission are: parallel and serial
  • 7. Wired communication technology o Wired technology is more associated with wired communication i.e. it uses the wired channel o Wired communication refers to the transmission of data over a wire-based communication technology. o Examples include telephone networks, cable television or internet access, and fiber-optic communication Courtesy: Reference[10]
  • 8. o Advantages 1.Security-it offers a more secure connection 2. Reliability-offers a more reliable connection 3. High Speed Communication e.g: Cat5 ethernet cabling runs at 100Mbps or 1Gbps speed o Disadvantages 1. Large Number of physical Connections Required 2. More expensive to set up 3. More time consuming
  • 9. o The term wireless refers to the communication over a distance without requiring wires, cables. o Information is transmitted through air, without requiring any cables by using electro-magnetic waves like radio frequencies, infrared, satellite etc. o There are many wireless communication technologies such as wifi, bluetooth, zig- bee, wi-max etc courtesy: Mtz&Rdz´s company Wireless communication technology
  • 10. o Comparison of Wireless Technologies Parameter Bluetooth Zig-Bee Wi-fi Wi-Max IEEE Standard IEEE 802.15.1 IEEE 802.15.4 IEEE 802.11 a/b/g IEEE 802.16 Frequency Band 2.4 GHz 2.4 GHz 2.4 GHz to 5 GHz 2 - 11GHz ; 10 – 66GHz Speed 0.75 Mbps 250 Kbps 54Mbps Up to 80Mbps Access Technique TDMA CSMA-CA CSMA-CA SOFDMA Rang 10Meter 10 to 20 Meters 100Meter 50Km
  • 11. o A machine-to-machine (M2M) refers direct connections between devices (e.g., sensors, vending machines ,vehicles ,etc). o Cellular wireless technologies will be a potential candidate for providing the last mile M2M connectivity. o Example: Telemedicine is a common area in which the M2M is uses. courtesy: Reference [9] M2M Technology
  • 12. o The Internet of things is the interworking of physical devices, vehicles ,buildings and other items embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data. o The IoT is Based On the M2M Connections between the various devices, sensors, software etc. Courtesy: Reference[ 7] Internet of Things(IoT)
  • 13. Fig: The Five layer architecture of IoT Business Layer Middleware Layer Network Layer Perception Layer Application Layer o Architecture of IoT :
  • 14. o IoT Protocols Most frequently used protocols for making Machine-to-Machine (M2M) communication in IoT are: 1. MQTT (Message Queue Telemetry Transport) • MQTT is a subscribes messaging transport protocol. The protocol runs over TCP/IP or over other network protocol that provided ordered, lossless, bi-directional connections. • It provides Features of one-to-many message distribution • It also required less bandwidth and low power as compare to the http
  • 15. 2. CoAP (Constraint Application Protocol) • CoAP is a specialized web transfer protocol for use with constrained nodes and constrained networks • CoAP provides a request and response interaction model between application end points • CoAP is designed to friendly interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead and simplicity for constrained environments
  • 16. o Algorithms for IoT The Algorithms used for computing of data in IoT are: 1. K-nearest neighbors algorithm 2. Case Based Reasoning 3. Naive Bayes
  • 17. 1. K-nearest neighbors algorithm • KNN is an non parametric lazy algorithm. • K decides how many neighbors influence in the classification, this is usually an odd number Name Acid durability (X1) Strength (X2) Class Type-1 7 7 Bad Type-2 7 4 Bad Type-3 3 4 Good Type-4 1 4 Good Task: For Type-5 Tissue, Find Class for Acid durability(X) = 3 Strength(Y)=7 Example:
  • 18. Step1: Calculate Distance Formula: D=squrt((X1-X)²+(X2-Y)²), Where, X=3 and Y=7 Name Acid durability (X1) Strength (X2) Distance(D)=squrt((X1-X)²+(X2-Y)²) Type-1 7 7 Squrt((7-3)²+(7-7)²)=4 Type-2 7 4 5 Type-3 3 4 3 Type-4 1 4 3.6 Distance Rank It is included in 3 nearest Neighbor 4 3 Yes 5 4 No 3 1 Yes 3.6 2 Yes Step2: Determine Nearest Neighbor Now Cosider K=3
  • 19. Name Acid durability (X1) Strength (X2) Distance Rank It is included in 3 nearest Neighbor Category Z Type-1 7 7 4 3 Yes Bad Type-2 7 4 5 4 No --- Type-3 3 4 3 1 Yes Good Type-4 1 4 3.6 2 Yes Good Step3: Gather the Category Z of the nearest neighbor Step4: Use simple majority of the category of the nearest neighbor We have seen that there are two goods and one bad, the prediction is based on the. Therefore the type-5 tissue is belongs to Class-Good.
  • 20. Future Scope o IoT will derive the future technology, with various innovation and creative product. o The IoT can be used different sectors, the IoT based smart home will save power consumption up to 10% o Following subsection show three example of the IoT trend will matter: - Low power sensing unit - High Efficiency in connectivity - Reliable communication
  • 21. Conclusions o Wired technology is more secure, reliable, cheaper and has higher data transmission rates over wireless technology but one huge advantage that has made wireless technology popular is mobility o M2M provides connectivity between the various devices for exchanging the data, using wired and wireless technologies. o M2M technology is base of the IoT, if the IoT is tree then the roots of that tree are nothing but the M2M o We can implements the IoT in various application such as smart city, smart parking, smart hospital, smart home etc
  • 22. References  Papers: [1] Navpreet Kaur, Sangeeta Monga(2014) Comparison of Wired and Wireless Network :A Review Kaur et al., International Journal of Advanced Engineering Technology E-ISSN 0976-3945 Int J Adv Engg Tech/Vol. V/Issue II/April-June,2014/34-35 [2] Amol Baviskar, Jaypal Baviskar, Swapnil Wagh, Afshan Mulla, Piyush Dave (2015) Comparative Study of Communication Technologies for Power Optimized Automation Systems: A Review and Implementation. 2015 Fifth International Conference on Communication Systems and Network Technologies. [3] Mahbubul Alam, Rasamus H. Nielsen, Neeli R Prasad (2013) The Evolution Of M2M into IoT . First International Black Sea Conference on Communications and Networking (BlackSeaCom)
  • 23. [4] Surapon Kraijak, Panwit Tuwanut(2015) A survey on IoT architectures, protocols, applications, security, privacy, real world implementation and future trends. 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015). [5] Roshna Chettri ,Shrijana Pradhan, Lekhika Chettri (2015) Internet of Things: Comparative Study on Classification Algorithms (k-NN, Naive Bayes and Case based Reasoning) International Journal of Computer Applications (0975 – 8887) Volume 130 – No.12, November 2015.  Website: [6] http://www.postscapes.com/internet-of-things-protocols/#iot-architecture- graphics on dated-10/12/2016 [7] https://en.wikipedia.org/wiki/Internet_of_things#Applications on dated- 07/12/2016
  • 24. [8] https://en.wikipedia.org/wiki/Machine_to_machine on dated- 07/12/2016 [9] http://www.libelium.com/smart_cars_m2m_accident_prevention/ on dated 13/12/2016 [10] http://www.expertsmind.com/blog/post/ict-the-extend-synonym-of- information-technology-in-education-732.aspx On dated-13/12/2016 [11] http://bizblog.simplex-it.com/4624/effective-project-communications- webinar/ on dated-13/12/2016

Notas del editor

  1. Average speed of lan is 10mbps
  2. High performance processing unit or intelligent sensor