SlideShare a Scribd company logo
1
5A and 3i
To achieve such 5A (anything, anywhere, anytime, anyway,
anyhow) and 3I (instrumented, interconnected, and
intelligent) capabilities, some common, horizontal, general-
purpose technologies, standards, and platforms, especially
middleware platforms based on common data
representations just like the three-tiered application server
middleware, HTML language, and HTTP protocol in the
Internet/web arena, have to be established to support
various vertical applications cost effectively,
six pillars of M2M
1) Remote monitoring
2) RFID
3) sensor network
4) smart service
5) Telematics
6) Telemetrics
The four pillars of IoT
1) M2M(Machine to Machine Communication)
2) RFID
3) WSN(wireless sensor networks)
4) SCADA (supervisory control and data
acquisition)
iot with cloud
M2M: The Internet of Devices
Consumer Electronics Offerings
◾ Personal navigation devices
◾ eReaders
◾Digital picture frames
◾ People-tracking devices
◾ Pet-tracking devices
◾ Home security monitors
◾ Personal medical devices
M2M: The Internet of Devices
M2M: The Internet of Devices
What is M2M?
M2M uses devices (such as an in-vehicle gadget) to
capture events (such as an engine disorder), via a network
(mostly cellular wireless networks, sometimes wired or
hybrid) connection to a central server (software program),
that translates the captured events into meaningful
information (alert failure to be fixed).
Strategy Analytics identifies five key barriers to
scaling the global M2M market
1. Lack of a low-cost local access media that can
be implemented on a global basis
2. The fragmented nature of both the technology
vendors and the solutions they provide
M2M: The Internet of Devices
3. Lack of any single killer application that can
consolidate the market and drive demand forward
4. The increased costs associated with
development and integration because of the
complex nature of M2M solutions
5. Management’s inability to express the benefits
of M2M in anything other than cost savings,
rather than exploiting and encouraging the service
enablement capacity of mobile M2M
Architecture of M2M
iot with cloud
M2M: The Internet of Devices
1) Service enablement is a middleware layer that facilitates the creation of
applications
2) A significant percentage of the functionality of the middleware comes from
the charging, mediation, service management, and network management
solutions that are being deployed in next-generation networks.
3) value chain of M2M business, which can be separated into two parts: the
first relating to devices and the second to application development and
service delivery
4) The broad intersection between these two parts represents the means by
which devices are procured and integrated into M2M solutions and
services
iot with cloud
M2M:The Internet of Devices
1) The M2M device market share of chipset vendors including TI,
Infineon, ST-Ericsson, Qualcomm, and others, and module
vendors including Enfora, Infone, Kyocera, Murata, Mobicom,
Novatel, Panasonic, Semco, Siemens, Sierra Cellular, Simcom,
Telit, Wavecom, and others
2) As MNOs become more directly involved with M2M application
service providers (ASPs), some MNOs such as Sprint, AT&T,
Verizon Wireless, China Mobile, China Telecom, China Unicom,
Orange, Rogers Communications, Telenor, Telefonica, NTT
DOCOMO, and others are actively deploying M2M-based services
1) Many are deploying key network elements, specifically mobile packet
gateway, specifically for their M2M operations, separate from their
general mobile data infrastructure. Key benefits of doing this are that it
simplifies internal business operations and optimizes use of the network
2) A mobile virtual network operator is a communications service provider
that does not use its own infrastructure to provide connectivity but
leases out infrastructure from one or more cellular network carriers to
offer a more competitive mobile connectivity plan
3) MVNOs active in the M2M market are also increasingly deploying
mobile packet gateways and similar equipment to interconnect with
their MNO partners’ radio infrastructure
Examples of MVNO:Sprint, T-Mobile, and U.S. Cellular
RFID: The Internet of Objects
1) The term Internet of Things was first used by
Kevin Ashton, co-founder and executive
director of the Auto-ID Center
2) An RFID tag is a simplified, low-cost, disposable
contactless smartcard.
3) RFID tags include a chip that stores a static
number (ID) and attributes of the tagged
object and an antenna that enables the chip to
transmit the store number to a reader
RFID: The Internet of Objects
1) When the tag comes within the range of the
appropriate RF reader, the tag is powered by
the reader’s RF field and transmits its ID and
attributes to the reader
2) An RFID system involves hardware known as
readers and tags, as well as RFID software or
RFID middleware
3) RFID tags can be active, passive, or semipassive
RFID: The Internet of Objects
1) Passive RFID does not use a battery, while an
active has an on-board battery that always
broadcasts its signal.
2) A semipassive RFID has a small battery on
board that is activated when in the presence of
a RFID reader.
RFID: The Internet of Objects
RFID: The Internet of Objects
SAMPLE APPLICATIONS
Product Tracking – RFID tags are increasingly used as a cost-effective way to
track inventory and as a substitute for barcodes.
Toll Road Payments – Highway toll payment systems
Passports incorporate RFID tags into passports to store information (such as a
photograph) about the passport holder and to track visitors entering and
exiting the country.
Identification – RFID chips can be implanted into animals and people to track
their movements, provide access to secure locations
Libraries – Libraries use RFID tags in books and other materials to track
circulation and inventory, store product information (such as titles and
authors), and to provide security from theft
Shipping – Large shipments of materials, such as retail goods, often utilize RFID
tags to identify location, contents, and movement of goods. Wal-mart
 A transducer is an electronic device that
converts energy from one form to another
 Common examples include microphones,
loudspeakers, thermometers, and
antenna
WSN: The Internet of Transducers
1) Definition:A Wireless sensor network can be defined as
a network of devices that can communicate the
information gathered from a monitored field through
wireless links.
2) A Sensor is a device that responds and detects some
type of input from both the physical or environmental
conditions, such as pressure, heat, light, etc
WSN: The Internet of Transducers
WSN: The Internet of Transducers
1) A sink, on the other hand, collects data from sensors
2) The sink may communicate with the end-user via direct
connections, the Internet, satellite, or any type of
wireless links
3) Sensor node: sense target events, gather sensor
readings, manipulate information, send them to gateway
via radio link ◾ Base station/sink: communicate with
sensor nodes and user/operator ◾ Operator/user: task
manager, send query
WSN: The Internet of Transducers
1) Types of Sensor
a. Thermal
b. Electromagnetic
c. Mechanical
d. chemical
e. Optical radiation
WSN: The Internet of Transducers
1) In practice, special cases of WSNs are encountered
such as wireless multimedia sensor networks (WMSNs),
underwater wireless sensor networks (UWSNs),
wireless underground sensor networks (WUSNs),
wireless body sensor networks (WBSNs) and wireless
sensor-actor networks (WSANs)
WSN: The Internet of Transducers
1) In practice, special cases of WSNs are encountered
such as wireless multimedia sensor networks (WMSNs),
underwater wireless sensor networks (UWSNs),
wireless underground sensor networks (WUSNs),
wireless body sensor networks (WBSNs) and wireless
sensor-actor networks (WSANs)
WSN: The Internet of Transducers
1) Multimedia Wireless Sensor Networks
The emergence of integrated complementary metal–oxide–
semiconductor camera sensors and integrated
microphones, with low power consumption and even low
cost, has allowed the development of a subfield in WSN
research that is called wireless multimedia sensor networks
(WMSNs)
WSN: The Internet of Transducers
1) Multimedia WSNs
WSN: The Internet of Transducers
1) WMSNs are characterized by their capability of
collecting multimedia, mainly video and audio streams,
as well as still images, from the environment
2) One of the potential applications is real-time multimedia
surveillance, both in private areas and in critical
infrastructures that are susceptible to terrorist attacks,
such as airports or public sport centers
WSN: The Internet of Transducers
1) Compared with traditional surveillance systems, visual WSNs allow extending area
monitoring by scaling the number of cameras
2) Typically, these kinds of networks are deployed in a preplanned manner, to
guarantee full coverage and to make easier the information processing
3) In the case of supervised video monitoring, information has to be transmitted
from the visual sensors to a central controller, where it can be analyzed from
either a human operator or an automatic system
4) The challenges with the multimedia WSN include high energy consumption, high
bandwidth requirements, data processing, and compressing techniques
WSN: The Internet of Transducers
2.Under Water WSNs
1) More than 70% of the earth is occupied with water
2) These networks consist of several sensor nodes and
vehicles deployed underwater
3) Autonomous underwater vehicles are used for gathering
data from these sensor nodes
4) A challenge of underwater communication is a long
propagation delay, bandwidth and sensor failures.
WSN: The Internet of Transducers
Underwater, WSNs are equipped with a limited battery that
cannot be recharged or replaced
The issue of energy conservation for underwater WSNs
involves the development of underwater communication
and networking techniques.
3.Under Ground WSNs
1) Wireless underground sensor networks (WUSNs), which are
characterized by the fact that the sensors are buried
underground, located in caves or mines or embedded within
dense soil or rock have been proposed to monitor conditions in
these environments.
WSN: The Internet of Transducers
iot with cloud
1) The WSNs networks consist of several sensor nodes that are
hidden in the ground to monitor underground conditions.
2) To relay information from the sensor nodes to the base station,
additional sink nodes are located above the ground
3) The underground wireless sensor networks deployed into the
ground are difficult to recharge
4) In addition to this, the underground environment makes wireless
communication a challenge due to the high level of attenuation and
signal loss
WSN: The Internet of Transducers
4.wireless body sensor networks (WBSNs)
1. A Wireless Body Sensor Network (WBSN) defines an autonomous system
which is used to monitor the daily life activities of a person.
2. It consists of intelligent sensor nodes which do not hamper the daily life
activities and are useful in detecting chronic diseases like heart attack, asthma
etc
Types
1.Managed
2. Autonomous WBSN
3. Intelligent WBSN
Characteristics
a) Energy Efficient
b) Heterogeneous
c) Cost Effective
d) Simple
Advantages
1.No wires
2.Energy Efficient and user friendly
3.Support user mobility
SENSOR NODE
A WBSN consists of tiny devices that perform
communication. Mainly there are three types of devices in a
WBSN
1.Sensor nodes :A sensor node performs three mains tasks:
signal detection, signal digitization/coding/controlling for
communication that involves multiple access and finally
transmitting the data through a transceiver wirelessly
Commercially Available Sensors
ECG Sensor:The electrical activity of heart is
represented in the form of a graph which is known as
ECG and is used for the diagnosis of any heart disease
and to see how well are medicines given for heart are
working
Blood Pressure:This sensor is used for measuring
systolic and diastolic blood pressure
CO2 Gas Sensor:It is used to keep track of the change in the level of
blood during respiration
Humidity and Temperature Sensors:These sensors measure
humidity of the surroundings of a person and also his body
temperature
EEG Sensor:This sensor is used for measuring the electrical activity
that occurs inside the brain
Pulse Oximetry :This sensor measures the oxygen saturation
2. Actuator Node: These nodes perform operation by getting data
from the sensor nodes or by interacting with the user and getting
data from it directly
3. Personal Devices: These devices are similar to sensor nodes and
their task is to collect information which has been collected by the
sensor nodes and actuator nodes
Software:task scheduling, memory management and power
optimization
WBSN Architecture
A WBAN consists of small sensor nodes which are
heterogeneous in nature
Figure depicts several sensor nodes which are placed over
the human body for performing different functions
Protocol Stack:It mainly consists of the PHY layer, MAC layer
and Network layer
Topology:Topology refers to the arrangement of
sensor nodes in a network
PHY Layer Issues
1.Band Selection
2.Data Rates
3.Interoperability
4.Fault Tolerance
5.Interference
MAC layer Issues
1. Reliability
2. Control Packets Overhead
3. Dynamic Channel Assignment
4. Idle listening:
5. Scheduling
Routing Issues
1. Varying Data Needs
2. Resource Constraints:
3. Overheating
4. Mobility
5. Attentuation
SCADA: The Internet of Controllers
1. Building automation systems (BAS) would become fully integrated with
communication and human interface practices and standards widely employed
for information technology systems.
2. SCADA (supervisory, control and data acquisition) systems, as the core
technology of the controls–IT convergence, will evolve and take the center
stage.
3. it is an industrial computer-based control system employed to gather and
analyze the real-time data to keep track, monitor and control industrial
equipments in different types of industries
SCADA was generally referring to industrial control systems (ICSs): computer
systems that monitor and control industrial, infrastructure, or facility-based processes
as follows
1. Industrial processes include those of manufacturing, production, power generation,
fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes
2. Infrastructure processes may be public or private and include water treatment and
distribution, wastewater collection and treatment, oil and gas pipelines, electrical power
transmission and distribution, wind farms, civil defense siren systems, and large
transportation systems
3. Facility processes occur in both public and private facilities, including buildings, airports,
ships, and space stations. They monitor and control HVAC, access, and energy
consumption using PLCs (programmable logic controllers) and DCSs (distributed control
systems) via the OPC (OLE for process control) middleware
An existing SCADA system usually consists of the following
subsystems
1. Human–machine interface (HMI)
2. Remote terminal units (RTUs)
3. PLCs
4. DCSs
5. M2M (telemetry), WSN, smart systems
SCADA
iot with cloud
1. A SCADA system could be a layer between the top-layer business systems
such as ERP, WMS, SCM, CRM, EAM (enterprise asset management), PIMS
(plant information management system), EMI (enterprise manufacturing
intelligence), LIMS (laboratory information management system), and
other applications and the lower layer DCS, PLC, RTU, MES
(manufacturing execution system), SIS (supervisory information system in
plant level), and others
2. A traditional SCADA system is a client/server system
3. New technological developments have turned C/S SCADA systems into
middleware-backed, web-based, three-tiered open systems with SOA
capabilities
1. Consider the application of SCADA in power systems for operation
and control
2. SCADA in power system can be defined as the power distribution
application which is typically based on the software package.
3. The electrical distribution system consists of several substations;
these substations will have multiple numbers of controllers, sensors
and operator-interface points
SCADA in power system
1. In general, for controlling and monitoring a substation in real time
(PLCs) Programmable Logic Controllers, Circuit breakers and Power
monitors are used.
2. Data is transmitted from the PLCs and other devices to a computer-
based-SCADA node located at each substation. One or more
computers are located at different centralized control and monitoring
points

More Related Content

DOCX
Rfid based traffic controller using gsm
PDF
517675287-2-4-pillers-of-iot. Scada, wsn, m2m, rfid
PPTX
4 pillers of iot
PPTX
Internet of Things and its Enabling Technologies - RFID
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
PDF
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
PDF
A Brief Review on Internet of Things
Rfid based traffic controller using gsm
517675287-2-4-pillers-of-iot. Scada, wsn, m2m, rfid
4 pillers of iot
Internet of Things and its Enabling Technologies - RFID
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
A Brief Review on Internet of Things

Similar to iot with cloud (20)

PPTX
Module 2 M2M, SDN, VNF.pptx...............
DOCX
Global IoT Technology and Digital transformation
PPTX
Internet of Things (IoT)
PDF
Energy aware routing for wireless sensor networks
PPTX
CHAPTER 2 - MOBILE COMPUTING TECHNOLOGIES.pptx
PPTX
Introduction to IoT Unit - I PRESENTATION.pptx
PPTX
Internet of Things
PPTX
IoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
PPTX
Wireless applications in various areas
PDF
533 450-457
PDF
A0550110
PDF
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
PDF
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
PDF
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
PDF
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
PDF
Survey of Security and Privacy Issues of Internet of Things
PPTX
Rfid montaser hamza iraq
DOCX
Abs smartdust network for tactical border surveillance system to detect, clas...
PPTX
Iot architecture
PPTX
M2M technology in IOT
Module 2 M2M, SDN, VNF.pptx...............
Global IoT Technology and Digital transformation
Internet of Things (IoT)
Energy aware routing for wireless sensor networks
CHAPTER 2 - MOBILE COMPUTING TECHNOLOGIES.pptx
Introduction to IoT Unit - I PRESENTATION.pptx
Internet of Things
IoT Based Disaster Detection and Early Warning Device By Shweta Gaikwad
Wireless applications in various areas
533 450-457
A0550110
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Smartdust Network for Tactical Border Surveillance Using Multiple Signatures
Ieeepro techno solutions ieee 2013 embedded project smartdust network for...
Survey of Security and Privacy Issues of Internet of Things
Rfid montaser hamza iraq
Abs smartdust network for tactical border surveillance system to detect, clas...
Iot architecture
M2M technology in IOT

Recently uploaded (20)

PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
System and Network Administration Chapter 2
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
AI in Product Development-omnex systems
PPTX
Introduction to Artificial Intelligence
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
medical staffing services at VALiNTRY
Softaken Excel to vCard Converter Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Transform Your Business with a Software ERP System
System and Network Administration Chapter 2
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Upgrade and Innovation Strategies for SAP ERP Customers
2025 Textile ERP Trends: SAP, Odoo & Oracle
Odoo POS Development Services by CandidRoot Solutions
wealthsignaloriginal-com-DS-text-... (1).pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Odoo Companies in India – Driving Business Transformation.pdf
AI in Product Development-omnex systems
Introduction to Artificial Intelligence
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
How to Migrate SBCGlobal Email to Yahoo Easily
medical staffing services at VALiNTRY

iot with cloud

  • 1. 1
  • 2. 5A and 3i To achieve such 5A (anything, anywhere, anytime, anyway, anyhow) and 3I (instrumented, interconnected, and intelligent) capabilities, some common, horizontal, general- purpose technologies, standards, and platforms, especially middleware platforms based on common data representations just like the three-tiered application server middleware, HTML language, and HTTP protocol in the Internet/web arena, have to be established to support various vertical applications cost effectively,
  • 3. six pillars of M2M 1) Remote monitoring 2) RFID 3) sensor network 4) smart service 5) Telematics 6) Telemetrics
  • 4. The four pillars of IoT 1) M2M(Machine to Machine Communication) 2) RFID 3) WSN(wireless sensor networks) 4) SCADA (supervisory control and data acquisition)
  • 6. M2M: The Internet of Devices Consumer Electronics Offerings ◾ Personal navigation devices ◾ eReaders ◾Digital picture frames ◾ People-tracking devices ◾ Pet-tracking devices ◾ Home security monitors ◾ Personal medical devices
  • 7. M2M: The Internet of Devices
  • 8. M2M: The Internet of Devices What is M2M? M2M uses devices (such as an in-vehicle gadget) to capture events (such as an engine disorder), via a network (mostly cellular wireless networks, sometimes wired or hybrid) connection to a central server (software program), that translates the captured events into meaningful information (alert failure to be fixed).
  • 9. Strategy Analytics identifies five key barriers to scaling the global M2M market 1. Lack of a low-cost local access media that can be implemented on a global basis 2. The fragmented nature of both the technology vendors and the solutions they provide
  • 10. M2M: The Internet of Devices 3. Lack of any single killer application that can consolidate the market and drive demand forward 4. The increased costs associated with development and integration because of the complex nature of M2M solutions 5. Management’s inability to express the benefits of M2M in anything other than cost savings, rather than exploiting and encouraging the service enablement capacity of mobile M2M
  • 13. M2M: The Internet of Devices 1) Service enablement is a middleware layer that facilitates the creation of applications 2) A significant percentage of the functionality of the middleware comes from the charging, mediation, service management, and network management solutions that are being deployed in next-generation networks. 3) value chain of M2M business, which can be separated into two parts: the first relating to devices and the second to application development and service delivery 4) The broad intersection between these two parts represents the means by which devices are procured and integrated into M2M solutions and services
  • 15. M2M:The Internet of Devices 1) The M2M device market share of chipset vendors including TI, Infineon, ST-Ericsson, Qualcomm, and others, and module vendors including Enfora, Infone, Kyocera, Murata, Mobicom, Novatel, Panasonic, Semco, Siemens, Sierra Cellular, Simcom, Telit, Wavecom, and others 2) As MNOs become more directly involved with M2M application service providers (ASPs), some MNOs such as Sprint, AT&T, Verizon Wireless, China Mobile, China Telecom, China Unicom, Orange, Rogers Communications, Telenor, Telefonica, NTT DOCOMO, and others are actively deploying M2M-based services
  • 16. 1) Many are deploying key network elements, specifically mobile packet gateway, specifically for their M2M operations, separate from their general mobile data infrastructure. Key benefits of doing this are that it simplifies internal business operations and optimizes use of the network 2) A mobile virtual network operator is a communications service provider that does not use its own infrastructure to provide connectivity but leases out infrastructure from one or more cellular network carriers to offer a more competitive mobile connectivity plan 3) MVNOs active in the M2M market are also increasingly deploying mobile packet gateways and similar equipment to interconnect with their MNO partners’ radio infrastructure Examples of MVNO:Sprint, T-Mobile, and U.S. Cellular
  • 17. RFID: The Internet of Objects 1) The term Internet of Things was first used by Kevin Ashton, co-founder and executive director of the Auto-ID Center 2) An RFID tag is a simplified, low-cost, disposable contactless smartcard. 3) RFID tags include a chip that stores a static number (ID) and attributes of the tagged object and an antenna that enables the chip to transmit the store number to a reader
  • 18. RFID: The Internet of Objects
  • 19. 1) When the tag comes within the range of the appropriate RF reader, the tag is powered by the reader’s RF field and transmits its ID and attributes to the reader 2) An RFID system involves hardware known as readers and tags, as well as RFID software or RFID middleware 3) RFID tags can be active, passive, or semipassive RFID: The Internet of Objects
  • 20. 1) Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts its signal. 2) A semipassive RFID has a small battery on board that is activated when in the presence of a RFID reader. RFID: The Internet of Objects
  • 21. RFID: The Internet of Objects SAMPLE APPLICATIONS Product Tracking – RFID tags are increasingly used as a cost-effective way to track inventory and as a substitute for barcodes. Toll Road Payments – Highway toll payment systems Passports incorporate RFID tags into passports to store information (such as a photograph) about the passport holder and to track visitors entering and exiting the country. Identification – RFID chips can be implanted into animals and people to track their movements, provide access to secure locations Libraries – Libraries use RFID tags in books and other materials to track circulation and inventory, store product information (such as titles and authors), and to provide security from theft Shipping – Large shipments of materials, such as retail goods, often utilize RFID tags to identify location, contents, and movement of goods. Wal-mart
  • 22.  A transducer is an electronic device that converts energy from one form to another  Common examples include microphones, loudspeakers, thermometers, and antenna WSN: The Internet of Transducers
  • 23. 1) Definition:A Wireless sensor network can be defined as a network of devices that can communicate the information gathered from a monitored field through wireless links. 2) A Sensor is a device that responds and detects some type of input from both the physical or environmental conditions, such as pressure, heat, light, etc WSN: The Internet of Transducers
  • 24. WSN: The Internet of Transducers
  • 25. 1) A sink, on the other hand, collects data from sensors 2) The sink may communicate with the end-user via direct connections, the Internet, satellite, or any type of wireless links 3) Sensor node: sense target events, gather sensor readings, manipulate information, send them to gateway via radio link ◾ Base station/sink: communicate with sensor nodes and user/operator ◾ Operator/user: task manager, send query WSN: The Internet of Transducers
  • 26. 1) Types of Sensor a. Thermal b. Electromagnetic c. Mechanical d. chemical e. Optical radiation WSN: The Internet of Transducers
  • 27. 1) In practice, special cases of WSNs are encountered such as wireless multimedia sensor networks (WMSNs), underwater wireless sensor networks (UWSNs), wireless underground sensor networks (WUSNs), wireless body sensor networks (WBSNs) and wireless sensor-actor networks (WSANs) WSN: The Internet of Transducers
  • 28. 1) In practice, special cases of WSNs are encountered such as wireless multimedia sensor networks (WMSNs), underwater wireless sensor networks (UWSNs), wireless underground sensor networks (WUSNs), wireless body sensor networks (WBSNs) and wireless sensor-actor networks (WSANs) WSN: The Internet of Transducers
  • 29. 1) Multimedia Wireless Sensor Networks The emergence of integrated complementary metal–oxide– semiconductor camera sensors and integrated microphones, with low power consumption and even low cost, has allowed the development of a subfield in WSN research that is called wireless multimedia sensor networks (WMSNs) WSN: The Internet of Transducers
  • 30. 1) Multimedia WSNs WSN: The Internet of Transducers
  • 31. 1) WMSNs are characterized by their capability of collecting multimedia, mainly video and audio streams, as well as still images, from the environment 2) One of the potential applications is real-time multimedia surveillance, both in private areas and in critical infrastructures that are susceptible to terrorist attacks, such as airports or public sport centers WSN: The Internet of Transducers
  • 32. 1) Compared with traditional surveillance systems, visual WSNs allow extending area monitoring by scaling the number of cameras 2) Typically, these kinds of networks are deployed in a preplanned manner, to guarantee full coverage and to make easier the information processing 3) In the case of supervised video monitoring, information has to be transmitted from the visual sensors to a central controller, where it can be analyzed from either a human operator or an automatic system 4) The challenges with the multimedia WSN include high energy consumption, high bandwidth requirements, data processing, and compressing techniques WSN: The Internet of Transducers
  • 33. 2.Under Water WSNs 1) More than 70% of the earth is occupied with water 2) These networks consist of several sensor nodes and vehicles deployed underwater 3) Autonomous underwater vehicles are used for gathering data from these sensor nodes 4) A challenge of underwater communication is a long propagation delay, bandwidth and sensor failures. WSN: The Internet of Transducers
  • 34. Underwater, WSNs are equipped with a limited battery that cannot be recharged or replaced The issue of energy conservation for underwater WSNs involves the development of underwater communication and networking techniques.
  • 35. 3.Under Ground WSNs 1) Wireless underground sensor networks (WUSNs), which are characterized by the fact that the sensors are buried underground, located in caves or mines or embedded within dense soil or rock have been proposed to monitor conditions in these environments. WSN: The Internet of Transducers
  • 37. 1) The WSNs networks consist of several sensor nodes that are hidden in the ground to monitor underground conditions. 2) To relay information from the sensor nodes to the base station, additional sink nodes are located above the ground 3) The underground wireless sensor networks deployed into the ground are difficult to recharge 4) In addition to this, the underground environment makes wireless communication a challenge due to the high level of attenuation and signal loss WSN: The Internet of Transducers
  • 38. 4.wireless body sensor networks (WBSNs) 1. A Wireless Body Sensor Network (WBSN) defines an autonomous system which is used to monitor the daily life activities of a person. 2. It consists of intelligent sensor nodes which do not hamper the daily life activities and are useful in detecting chronic diseases like heart attack, asthma etc Types 1.Managed 2. Autonomous WBSN 3. Intelligent WBSN
  • 39. Characteristics a) Energy Efficient b) Heterogeneous c) Cost Effective d) Simple
  • 40. Advantages 1.No wires 2.Energy Efficient and user friendly 3.Support user mobility
  • 42. A WBSN consists of tiny devices that perform communication. Mainly there are three types of devices in a WBSN 1.Sensor nodes :A sensor node performs three mains tasks: signal detection, signal digitization/coding/controlling for communication that involves multiple access and finally transmitting the data through a transceiver wirelessly
  • 43. Commercially Available Sensors ECG Sensor:The electrical activity of heart is represented in the form of a graph which is known as ECG and is used for the diagnosis of any heart disease and to see how well are medicines given for heart are working Blood Pressure:This sensor is used for measuring systolic and diastolic blood pressure
  • 44. CO2 Gas Sensor:It is used to keep track of the change in the level of blood during respiration Humidity and Temperature Sensors:These sensors measure humidity of the surroundings of a person and also his body temperature EEG Sensor:This sensor is used for measuring the electrical activity that occurs inside the brain Pulse Oximetry :This sensor measures the oxygen saturation
  • 45. 2. Actuator Node: These nodes perform operation by getting data from the sensor nodes or by interacting with the user and getting data from it directly 3. Personal Devices: These devices are similar to sensor nodes and their task is to collect information which has been collected by the sensor nodes and actuator nodes Software:task scheduling, memory management and power optimization
  • 47. A WBAN consists of small sensor nodes which are heterogeneous in nature Figure depicts several sensor nodes which are placed over the human body for performing different functions Protocol Stack:It mainly consists of the PHY layer, MAC layer and Network layer
  • 48. Topology:Topology refers to the arrangement of sensor nodes in a network
  • 49. PHY Layer Issues 1.Band Selection 2.Data Rates 3.Interoperability 4.Fault Tolerance 5.Interference
  • 50. MAC layer Issues 1. Reliability 2. Control Packets Overhead 3. Dynamic Channel Assignment 4. Idle listening: 5. Scheduling
  • 51. Routing Issues 1. Varying Data Needs 2. Resource Constraints: 3. Overheating 4. Mobility 5. Attentuation
  • 52. SCADA: The Internet of Controllers 1. Building automation systems (BAS) would become fully integrated with communication and human interface practices and standards widely employed for information technology systems. 2. SCADA (supervisory, control and data acquisition) systems, as the core technology of the controls–IT convergence, will evolve and take the center stage. 3. it is an industrial computer-based control system employed to gather and analyze the real-time data to keep track, monitor and control industrial equipments in different types of industries
  • 53. SCADA was generally referring to industrial control systems (ICSs): computer systems that monitor and control industrial, infrastructure, or facility-based processes as follows 1. Industrial processes include those of manufacturing, production, power generation, fabrication, and refining, and may run in continuous, batch, repetitive, or discrete modes 2. Infrastructure processes may be public or private and include water treatment and distribution, wastewater collection and treatment, oil and gas pipelines, electrical power transmission and distribution, wind farms, civil defense siren systems, and large transportation systems 3. Facility processes occur in both public and private facilities, including buildings, airports, ships, and space stations. They monitor and control HVAC, access, and energy consumption using PLCs (programmable logic controllers) and DCSs (distributed control systems) via the OPC (OLE for process control) middleware
  • 54. An existing SCADA system usually consists of the following subsystems 1. Human–machine interface (HMI) 2. Remote terminal units (RTUs) 3. PLCs 4. DCSs 5. M2M (telemetry), WSN, smart systems
  • 55. SCADA
  • 57. 1. A SCADA system could be a layer between the top-layer business systems such as ERP, WMS, SCM, CRM, EAM (enterprise asset management), PIMS (plant information management system), EMI (enterprise manufacturing intelligence), LIMS (laboratory information management system), and other applications and the lower layer DCS, PLC, RTU, MES (manufacturing execution system), SIS (supervisory information system in plant level), and others 2. A traditional SCADA system is a client/server system 3. New technological developments have turned C/S SCADA systems into middleware-backed, web-based, three-tiered open systems with SOA capabilities
  • 58. 1. Consider the application of SCADA in power systems for operation and control 2. SCADA in power system can be defined as the power distribution application which is typically based on the software package. 3. The electrical distribution system consists of several substations; these substations will have multiple numbers of controllers, sensors and operator-interface points
  • 59. SCADA in power system
  • 60. 1. In general, for controlling and monitoring a substation in real time (PLCs) Programmable Logic Controllers, Circuit breakers and Power monitors are used. 2. Data is transmitted from the PLCs and other devices to a computer- based-SCADA node located at each substation. One or more computers are located at different centralized control and monitoring points

Editor's Notes

  • #40: Cost Effective: