SlideShare a Scribd company logo
Prof. Ahmed Banafa
College of Engineering
San Jose State University
San Jose, CA , USA
 The Internet of Things (IoT) is the network of
physical objects—devices, vehicles, buildings and
other items which are embedded with electronics,
software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
 Implementing this concept is not an easy task by any
measure for many reasons including the complex
nature of the different components of the ecosystem
of IoT.
 To understand the gravity of this task, we will explain
all the five components of IoT Implementation…
 Sensors
 Networks
 Standards
 Intelligent Analysis
 Intelligent Actions
IoT implementation and Challenges
 According to (IEEE) sensors can be defined as: An
electronic device that produces electrical, optical, or
digital data derived from a physical condition or event.
 Data produced from sensors is then electronically
transformed, by another device, into information
(output) that is useful in decision making done by
“intelligent” devices or individuals (people).
Types of Sensors:
 Active Sensors
 Passive Sensors
The selection of sensors greatly impacted by many factors,
including:
 Purpose (Temperature, Motion, Bio…etc.)
 Accuracy
 Reliability
 Range
 Resolution
 Level of Intelligence (dealing with noise and
interference)
The driving forces for using sensors in IoT today are new
trends in technology that made sensors cheaper, smarter
and smaller.
IoT implementation and Challenges
Challenges facing IoT sensors:
 Power consumption
 Security
 Interoperability
 The second step of this implantation is to transmit the
signals collected by sensors over networks with all the
different components of a typical network including
routers, bridges in different topologies, including LAN,
MAN and WAN.
 Connecting the different parts of networks to the
sensors can be done by different technologies
including Wi-Fi, Bluetooth, Low Power Wi-Fi , Wi-Max,
regular Ethernet , Long Term Evolution (LTE) and the
recent promising technology of Li-Fi (using light as a
medium of communication between the different parts
of a typical network including senores)
IoT implementation and Challenges
The driving forces for wide spread network adoption in
IoT can be summarized as follows:
 High Data rate
 Low Prices of data usage
 Virtualization (X - Define Network trends )
 XaaS concept (SaaS, PaaS, and IaaS)
 IPv6 deployment
Challenges facing network implementation in IoT:
 The enormous growth in number of connected devices
 Availability of networks coverage
 Security
 Power consumption
IoT implementation and Challenges
 The third stage in the implementation process includes
the sum of all activities of handling, processing and
storing the data collected from the sensors.
 This aggregation increases the value of data by
increasing, the scale, scope, and frequency of data
available for analysis but aggregation only achieved
through the use of various standards depending on the
IoT application in used.
Types of Standards :
 Two types of standards relevant for the aggregation
process; technology standards (including network
protocols, communication protocols, and data-
aggregation standards) and regulatory standards
(related to security and privacy of data, among other
issues).
Technology Standards :
 Network Protocols (e.g.: Wi-Fi)
 Communications Protocols (e.g.: HTTP)
 Data aggregation standards (e.g.: Extraction,
Transformation, Loading (ETL))
Regulatory Standards
 Set and administrated by government agencies like
FTC, for example Fair Information Practice Principles
(FIPP) and US Health Insurance Portability and
Accountability Act (HIPAA) just to mention few.
Challenges facing the adoptions of standards within IoT
 Standard for handling unstructured data: Structured
data are stored in relational databases and queried
through SQL. Unstructured data are stored in different
types of noSQL databases without a standard querying
approach.
 Security and privacy issues: There is a need for clear
guidelines on the retention, use, and security of the
data as well as metadata (the data that describe other
data).
 Regulatory standards for data markets: Data brokers
are companies that sell data collected from various
sources. Even though data appear to be the currency of
the IoT, there is lack of transparency about, who gets
access to data and how those data are used to develop
products or services and sold to advertisers and third
parties.
 Technical skills to leverage newer aggregation tools:
Companies that are keen on leveraging big-data tools
often face a shortage of talent to plan, execute, and
maintain systems.
 The fourth stage in IoT implementation is extracting
insight from data for analysis, Analysis is driven by
cognitive technologies and the accompanying models
that facilitate the use of cognitive technologies.
 With advances in cognitive technologies’ ability to
process varied forms of information, vision and voice
have also become usable.
 On the next slide, list of selected cognitive
technologies that are experiencing increasing adoption
and can be deployed for predictive and prescriptive
analytics:
 Computer vision refers to computers’ ability to identify
objects, scenes, and activities in images
 Natural-language processing refers to computers’
ability to work with text the way humans do, extracting
meaning from text or even generating text that is
readable.
 Speech recognition focuses on accurately transcribing
human speech
Factors driving adoption intelligent analytics within the
IoT:
 Artificial intelligence models can be improved with
large data sets that are more readily avail- able than
ever before, thanks to the lower storage costs.
 Growth in crowdsourcing and open- source analytics
software: Cloud-based crowdsourcing services are
leading to new algorithms and improvements in
existing ones at an unprecedented rate.
 Real-time data processing and analysis: Analytics tools
such as complex event processing (CEP) enable
processing and analysis of data on a real-time or a
near-real-time basis, driving timely decision making
and action.
Challenges facing the adoptions of intelligent analytics
within IoT:
 Inaccurate analysis due to flaws in the data and/or
model: A lack of data or presence of outliers may lead
to false positives or false negatives, thus exposing
various algorithmic limitations
 Legacy systems’ ability to analyze unstructured data:
Legacy systems are well suited to handle structured
data; unfortunately, most IoT/business interactions
generate unstructured data
 Legacy systems’ ability to manage real- time data:
Traditional analytics software generally works on
batch-oriented processing, wherein all the data are
loaded in a batch and then analyzed
 The fifth stage deals with intelligent actions , Intelligent
actions can be expressed as M2M and M2H interfaces
for example with all the advancement in UI and UX
technologies.
Factors driving adoption of intelligent actions within the
IoT:
 Lower machine prices
 Improved machine functionality
 Machines “influencing” human actions through
behavioral-science rationale
 Deep Learning tools
Challenges facing the adoption of intelligent actions
within IoT:
 Machines’ actions in unpredictable situations
 Information security and privacy
 Machine interoperability
 Mean-reverting human behaviors
 Slow adoption of new technologies
 The Internet of Things (IoT) is an ecosystem of ever-
increasing complexity, it’s the next weave of innovation
that will humanize every object in our life, which is the
next level to automating every object in our life.
 Convergence of technologies will make IoT
implementation much easier and faster, which in turn
will improve many aspects of our life at home and at
work and in between.
IoT implementation and Challenges
Ad

More Related Content

What's hot (20)

Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
National Institute of Technology Karnataka, Surathkal
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
ShilpaKrishna6
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things: state of the art
Internet of Things: state of the artInternet of Things: state of the art
Internet of Things: state of the art
Mario Kušek
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
Zubayer Al Billal Khan
 
Smart sensor technology in healthcare & protection
Smart sensor technology in healthcare & protectionSmart sensor technology in healthcare & protection
Smart sensor technology in healthcare & protection
Amity School of Engineering & Technology
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
Monica Kambala
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
pavan penugonda
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Niranjan Kumar
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
Yash Gajera
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
Pratik Gohel
 
Raspberry Pi
Raspberry Pi Raspberry Pi
Raspberry Pi
Selvaraj Seerangan
 
Iot based health monitoring system
Iot based health monitoring systemIot based health monitoring system
Iot based health monitoring system
ShaswataMohanta
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
Samip jain
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
Ashutosh Bhardwaj
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
ShilpaKrishna6
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
Pasquale Puzio
 
Internet of Things: state of the art
Internet of Things: state of the artInternet of Things: state of the art
Internet of Things: state of the art
Mario Kušek
 
Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)Big data analysis and Internet of Things(IoT)
Big data analysis and Internet of Things(IoT)
Monica Kambala
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
Yash Gajera
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
Pratik Gohel
 
Iot based health monitoring system
Iot based health monitoring systemIot based health monitoring system
Iot based health monitoring system
ShaswataMohanta
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
Samip jain
 

Viewers also liked (20)

IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
Ahmed Banafa
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Sigma Software
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
astoria0128
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Prithwis Mukerjee
 
Challenges in the IoT
Challenges in the IoTChallenges in the IoT
Challenges in the IoT
EUBrasilCloudFORUM .
 
Io t privacy and security considerations
Io t   privacy and security considerationsIo t   privacy and security considerations
Io t privacy and security considerations
Yves Goeleven
 
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
Arun Joseph
 
3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
Eleni Trouva
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
ICT PRISTINE
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
Ahmed Banafa
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
Ahmed Banafa
 
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IOWindows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
Alex Danvy
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
ICT PRISTINE
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
ICT PRISTINE
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Key challenges facing the future of IoT
Key challenges facing the future of IoTKey challenges facing the future of IoT
Key challenges facing the future of IoT
Ahmed Banafa
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 
IoT App Development Areas And Major Challenges
IoT App Development Areas And Major ChallengesIoT App Development Areas And Major Challenges
IoT App Development Areas And Major Challenges
astoria0128
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO2
 
Io t privacy and security considerations
Io t   privacy and security considerationsIo t   privacy and security considerations
Io t privacy and security considerations
Yves Goeleven
 
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
IoT Implementation of Sensor Data Acquisition in Surveillance Applications - ...
Arun Joseph
 
3 addressingthe problem130123
3 addressingthe problem1301233 addressingthe problem130123
3 addressingthe problem130123
Eleni Trouva
 
IRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OSIRATI: an open source RINA implementation for Linux/OS
IRATI: an open source RINA implementation for Linux/OS
ICT PRISTINE
 
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQAssuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
Assuring QoS Guarantees for Heterogeneous Services in RINA Networks with ΔQ
ICT PRISTINE
 
10 myths about cloud computing
10 myths about cloud computing10 myths about cloud computing
10 myths about cloud computing
Ahmed Banafa
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
Ahmed Banafa
 
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IOWindows 10 IoT Core on Raspberry Pi 2 Usine IO
Windows 10 IoT Core on Raspberry Pi 2 Usine IO
Alex Danvy
 
Th hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neilTh hauge rina-workshop-sdn-virtualisation_neil
Th hauge rina-workshop-sdn-virtualisation_neil
ICT PRISTINE
 
The hageu rina-workshop-security-peter
The hageu rina-workshop-security-peterThe hageu rina-workshop-security-peter
The hageu rina-workshop-security-peter
ICT PRISTINE
 
Ad

Similar to IoT implementation and Challenges (20)

Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
Aashiq Ahamed N
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
IJAEMSJORNAL
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
Bob Marcus
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
Chuck Brooks
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
Cognizant
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
MuhammadAbduArRahman
 
Asset Intelligence
Asset IntelligenceAsset Intelligence
Asset Intelligence
Juliann2012
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
OdedeleIfeoluwa
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
Venkat Projects
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
RamithaDevi
 
Understanding IoT and the 5-Layer Architecture of the Internet of Things
Understanding IoT and the 5-Layer Architecture of the Internet of ThingsUnderstanding IoT and the 5-Layer Architecture of the Internet of Things
Understanding IoT and the 5-Layer Architecture of the Internet of Things
dharmendra491836
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
Gokulnath J
 
A fair survey on internet of Things
A fair survey on internet of ThingsA fair survey on internet of Things
A fair survey on internet of Things
JOHARAN M.Jo
 
IOT Material AY(24-25) Regulation R22 Syllabus
IOT Material AY(24-25) Regulation R22 SyllabusIOT Material AY(24-25) Regulation R22 Syllabus
IOT Material AY(24-25) Regulation R22 Syllabus
AyeshaNaureenKhan
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
ThomasJose43
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
Components of IOT Implementation
Components of IOT ImplementationComponents of IOT Implementation
Components of IOT Implementation
Aashiq Ahamed N
 
Security Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT InfrastructureSecurity Issues & Threats in IoT Infrastructure
Security Issues & Threats in IoT Infrastructure
IJAEMSJORNAL
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
Bob Marcus
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...Understanding the Information Architecture, Data Management, and Analysis Cha...
Understanding the Information Architecture, Data Management, and Analysis Cha...
Cognizant
 
Asset Intelligence
Asset IntelligenceAsset Intelligence
Asset Intelligence
Juliann2012
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
OdedeleIfeoluwa
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
Venkat Projects
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
RamithaDevi
 
Understanding IoT and the 5-Layer Architecture of the Internet of Things
Understanding IoT and the 5-Layer Architecture of the Internet of ThingsUnderstanding IoT and the 5-Layer Architecture of the Internet of Things
Understanding IoT and the 5-Layer Architecture of the Internet of Things
dharmendra491836
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
Gokulnath J
 
A fair survey on internet of Things
A fair survey on internet of ThingsA fair survey on internet of Things
A fair survey on internet of Things
JOHARAN M.Jo
 
IOT Material AY(24-25) Regulation R22 Syllabus
IOT Material AY(24-25) Regulation R22 SyllabusIOT Material AY(24-25) Regulation R22 Syllabus
IOT Material AY(24-25) Regulation R22 Syllabus
AyeshaNaureenKhan
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
Ad

More from Ahmed Banafa (20)

IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
Ahmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
Ahmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
IoT and Covid 19
IoT and Covid 19IoT and Covid 19
IoT and Covid 19
Ahmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
Ahmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
Ahmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
Ahmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
Ahmed Banafa
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
Ahmed Banafa
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
Quantum Computing and AI
Quantum Computing and AIQuantum Computing and AI
Quantum Computing and AI
Ahmed Banafa
 
The convergence of IoT and Quantum Computing
The convergence of IoT and Quantum ComputingThe convergence of IoT and Quantum Computing
The convergence of IoT and Quantum Computing
Ahmed Banafa
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
Quantum Teleportation
Quantum TeleportationQuantum Teleportation
Quantum Teleportation
Ahmed Banafa
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
Ahmed Banafa
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
Ahmed Banafa
 
8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited8 key tech trends in a post covid-19 world edited
8 key tech trends in a post covid-19 world edited
Ahmed Banafa
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
Ahmed Banafa
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
Ahmed Banafa
 
Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths  Quantum Computing and Blockchain: Facts and Myths
Quantum Computing and Blockchain: Facts and Myths
Ahmed Banafa
 
Ten Blockchain Applications
Ten Blockchain ApplicationsTen Blockchain Applications
Ten Blockchain Applications
Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
Ahmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
Ahmed Banafa
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
Ahmed Banafa
 

Recently uploaded (20)

Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
What's going on with IPv6? presented by Geoff Huston
What's going on with IPv6? presented by Geoff HustonWhat's going on with IPv6? presented by Geoff Huston
What's going on with IPv6? presented by Geoff Huston
APNIC
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
How to Switch Hosting Providers in Vancouver Without Any Downtime
How to Switch Hosting Providers in Vancouver Without Any DowntimeHow to Switch Hosting Providers in Vancouver Without Any Downtime
How to Switch Hosting Providers in Vancouver Without Any Downtime
steve198109
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
data science data stoger Presentation1.pptx
data science data stoger Presentation1.pptxdata science data stoger Presentation1.pptx
data science data stoger Presentation1.pptx
sandeepsherkhane830
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
final project for icpna b08 if someone want.pptx
final project for icpna b08 if someone want.pptxfinal project for icpna b08 if someone want.pptx
final project for icpna b08 if someone want.pptx
ESTEFANOANDREYGARCIA
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Virtualization Trends Streamlining Operations in Telecom with David Bernard ...
Virtualization Trends  Streamlining Operations in Telecom with David Bernard ...Virtualization Trends  Streamlining Operations in Telecom with David Bernard ...
Virtualization Trends Streamlining Operations in Telecom with David Bernard ...
David Bernard Ezell
 
Understanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep WebUnderstanding the Tor Network and Exploring the Deep Web
Understanding the Tor Network and Exploring the Deep Web
nabilajabin35
 
What's going on with IPv6? presented by Geoff Huston
What's going on with IPv6? presented by Geoff HustonWhat's going on with IPv6? presented by Geoff Huston
What's going on with IPv6? presented by Geoff Huston
APNIC
 
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC -Policy Development Process, presented at Local APIGA Taiwan 2025
APNIC
 
How to Switch Hosting Providers in Vancouver Without Any Downtime
How to Switch Hosting Providers in Vancouver Without Any DowntimeHow to Switch Hosting Providers in Vancouver Without Any Downtime
How to Switch Hosting Providers in Vancouver Without Any Downtime
steve198109
 
Computers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers NetworksComputers Networks Computers Networks Computers Networks
Computers Networks Computers Networks Computers Networks
Tito208863
 
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHostingTop Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
Top Vancouver Green Business Ideas for 2025 Powered by 4GoodHosting
steve198109
 
data science data stoger Presentation1.pptx
data science data stoger Presentation1.pptxdata science data stoger Presentation1.pptx
data science data stoger Presentation1.pptx
sandeepsherkhane830
 
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation TemplateSmart Mobile App Pitch Deck丨AI Travel App Presentation Template
Smart Mobile App Pitch Deck丨AI Travel App Presentation Template
yojeari421237
 
highend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptxhighend-srxseries-services-gateways-customer-presentation.pptx
highend-srxseries-services-gateways-customer-presentation.pptx
elhadjcheikhdiop
 
(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security(Hosting PHising Sites) for Cryptography and network security
(Hosting PHising Sites) for Cryptography and network security
aluacharya169
 
White and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptxWhite and Red Clean Car Business Pitch Presentation.pptx
White and Red Clean Car Business Pitch Presentation.pptx
canumatown
 
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...Mobile database for your company telemarketing or sms marketing campaigns. Fr...
Mobile database for your company telemarketing or sms marketing campaigns. Fr...
DataProvider1
 
Perguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolhaPerguntas dos animais - Slides ilustrados de múltipla escolha
Perguntas dos animais - Slides ilustrados de múltipla escolha
socaslev
 
IT Services Workflow From Request to Resolution
IT Services Workflow From Request to ResolutionIT Services Workflow From Request to Resolution
IT Services Workflow From Request to Resolution
mzmziiskd
 
5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx5-Proses-proses Akuisisi Citra Digital.pptx
5-Proses-proses Akuisisi Citra Digital.pptx
andani26
 
Determining Glass is mechanical textile
Determining  Glass is mechanical textileDetermining  Glass is mechanical textile
Determining Glass is mechanical textile
Azizul Hakim
 
final project for icpna b08 if someone want.pptx
final project for icpna b08 if someone want.pptxfinal project for icpna b08 if someone want.pptx
final project for icpna b08 if someone want.pptx
ESTEFANOANDREYGARCIA
 
Best web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you businessBest web hosting Vancouver 2025 for you business
Best web hosting Vancouver 2025 for you business
steve198109
 
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 SupportReliable Vancouver Web Hosting with Local Servers & 24/7 Support
Reliable Vancouver Web Hosting with Local Servers & 24/7 Support
steve198109
 
Virtualization Trends Streamlining Operations in Telecom with David Bernard ...
Virtualization Trends  Streamlining Operations in Telecom with David Bernard ...Virtualization Trends  Streamlining Operations in Telecom with David Bernard ...
Virtualization Trends Streamlining Operations in Telecom with David Bernard ...
David Bernard Ezell
 

IoT implementation and Challenges

  • 1. Prof. Ahmed Banafa College of Engineering San Jose State University San Jose, CA , USA
  • 2.  The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
  • 3.  Implementing this concept is not an easy task by any measure for many reasons including the complex nature of the different components of the ecosystem of IoT.
  • 4.  To understand the gravity of this task, we will explain all the five components of IoT Implementation…
  • 5.  Sensors  Networks  Standards  Intelligent Analysis  Intelligent Actions
  • 7.  According to (IEEE) sensors can be defined as: An electronic device that produces electrical, optical, or digital data derived from a physical condition or event.  Data produced from sensors is then electronically transformed, by another device, into information (output) that is useful in decision making done by “intelligent” devices or individuals (people).
  • 8. Types of Sensors:  Active Sensors  Passive Sensors
  • 9. The selection of sensors greatly impacted by many factors, including:  Purpose (Temperature, Motion, Bio…etc.)  Accuracy  Reliability  Range  Resolution  Level of Intelligence (dealing with noise and interference)
  • 10. The driving forces for using sensors in IoT today are new trends in technology that made sensors cheaper, smarter and smaller.
  • 12. Challenges facing IoT sensors:  Power consumption  Security  Interoperability
  • 13.  The second step of this implantation is to transmit the signals collected by sensors over networks with all the different components of a typical network including routers, bridges in different topologies, including LAN, MAN and WAN.
  • 14.  Connecting the different parts of networks to the sensors can be done by different technologies including Wi-Fi, Bluetooth, Low Power Wi-Fi , Wi-Max, regular Ethernet , Long Term Evolution (LTE) and the recent promising technology of Li-Fi (using light as a medium of communication between the different parts of a typical network including senores)
  • 16. The driving forces for wide spread network adoption in IoT can be summarized as follows:  High Data rate  Low Prices of data usage  Virtualization (X - Define Network trends )  XaaS concept (SaaS, PaaS, and IaaS)  IPv6 deployment
  • 17. Challenges facing network implementation in IoT:  The enormous growth in number of connected devices  Availability of networks coverage  Security  Power consumption
  • 19.  The third stage in the implementation process includes the sum of all activities of handling, processing and storing the data collected from the sensors.
  • 20.  This aggregation increases the value of data by increasing, the scale, scope, and frequency of data available for analysis but aggregation only achieved through the use of various standards depending on the IoT application in used.
  • 21. Types of Standards :  Two types of standards relevant for the aggregation process; technology standards (including network protocols, communication protocols, and data- aggregation standards) and regulatory standards (related to security and privacy of data, among other issues).
  • 22. Technology Standards :  Network Protocols (e.g.: Wi-Fi)  Communications Protocols (e.g.: HTTP)  Data aggregation standards (e.g.: Extraction, Transformation, Loading (ETL))
  • 23. Regulatory Standards  Set and administrated by government agencies like FTC, for example Fair Information Practice Principles (FIPP) and US Health Insurance Portability and Accountability Act (HIPAA) just to mention few.
  • 24. Challenges facing the adoptions of standards within IoT  Standard for handling unstructured data: Structured data are stored in relational databases and queried through SQL. Unstructured data are stored in different types of noSQL databases without a standard querying approach.
  • 25.  Security and privacy issues: There is a need for clear guidelines on the retention, use, and security of the data as well as metadata (the data that describe other data).
  • 26.  Regulatory standards for data markets: Data brokers are companies that sell data collected from various sources. Even though data appear to be the currency of the IoT, there is lack of transparency about, who gets access to data and how those data are used to develop products or services and sold to advertisers and third parties.
  • 27.  Technical skills to leverage newer aggregation tools: Companies that are keen on leveraging big-data tools often face a shortage of talent to plan, execute, and maintain systems.
  • 28.  The fourth stage in IoT implementation is extracting insight from data for analysis, Analysis is driven by cognitive technologies and the accompanying models that facilitate the use of cognitive technologies.
  • 29.  With advances in cognitive technologies’ ability to process varied forms of information, vision and voice have also become usable.  On the next slide, list of selected cognitive technologies that are experiencing increasing adoption and can be deployed for predictive and prescriptive analytics:
  • 30.  Computer vision refers to computers’ ability to identify objects, scenes, and activities in images  Natural-language processing refers to computers’ ability to work with text the way humans do, extracting meaning from text or even generating text that is readable.  Speech recognition focuses on accurately transcribing human speech
  • 31. Factors driving adoption intelligent analytics within the IoT:  Artificial intelligence models can be improved with large data sets that are more readily avail- able than ever before, thanks to the lower storage costs.
  • 32.  Growth in crowdsourcing and open- source analytics software: Cloud-based crowdsourcing services are leading to new algorithms and improvements in existing ones at an unprecedented rate.
  • 33.  Real-time data processing and analysis: Analytics tools such as complex event processing (CEP) enable processing and analysis of data on a real-time or a near-real-time basis, driving timely decision making and action.
  • 34. Challenges facing the adoptions of intelligent analytics within IoT:  Inaccurate analysis due to flaws in the data and/or model: A lack of data or presence of outliers may lead to false positives or false negatives, thus exposing various algorithmic limitations
  • 35.  Legacy systems’ ability to analyze unstructured data: Legacy systems are well suited to handle structured data; unfortunately, most IoT/business interactions generate unstructured data
  • 36.  Legacy systems’ ability to manage real- time data: Traditional analytics software generally works on batch-oriented processing, wherein all the data are loaded in a batch and then analyzed
  • 37.  The fifth stage deals with intelligent actions , Intelligent actions can be expressed as M2M and M2H interfaces for example with all the advancement in UI and UX technologies.
  • 38. Factors driving adoption of intelligent actions within the IoT:  Lower machine prices  Improved machine functionality  Machines “influencing” human actions through behavioral-science rationale  Deep Learning tools
  • 39. Challenges facing the adoption of intelligent actions within IoT:  Machines’ actions in unpredictable situations  Information security and privacy  Machine interoperability  Mean-reverting human behaviors  Slow adoption of new technologies
  • 40.  The Internet of Things (IoT) is an ecosystem of ever- increasing complexity, it’s the next weave of innovation that will humanize every object in our life, which is the next level to automating every object in our life.  Convergence of technologies will make IoT implementation much easier and faster, which in turn will improve many aspects of our life at home and at work and in between.