SlideShare a Scribd company logo
PREPARED BY:
ANERI PANDYA
Presentation Flow
What is Internet of Things?
How IoT Works?
Current Status & Future Prospect of IoT
The Future of IoT
The Potential of IoT
Few Applications of IoT
Technological Challenges of IoT
Teaching and Examination Scheme
Teaching Scheme
Theory
Hours
Practical
Hours
Total
Hours
Credit
Hours/week 3 2 5
4
Marks 100 50 150
Units
Sr.
No.
Title of the unit Hours
1. Introduction of IoT 5
2. IoT Architecture and Protocols 12
3. Enabling Technologies 10
4. Emerging Challenges 10
5. Opportunities for the Developing World 6
6. IoT Tools and Data Analytics 2
Total hours (Theory): 45
Total hours (Lab): 30
Total hours: 75
What is IoT?
What is IoT?
The Internet of Things (IoT) is the network of physical objects or "things"
embedded with electronics, software, sensors, and network connectivity, which
enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network
infrastructure, creating opportunities for more direct integration between the
physical world and computer-based systems, and resulting in improved
efficiency, accuracy and economic benefit.
“Things” in IoT sense, can refer to a wide variety of devices such as
• heart monitoring implants
• biochip transponders on farm animals
• electric clams in coastal waters
• automobiles with built-in sensors
DNA analysis devices for environmental/food/pathogen monitoring or field
operation devices that assist fire-fighters in search and rescue operations.
These devices collect useful data with the help of various existing technologies
and then autonomously flow the data between other devices.
What is IoT ?
IoT connecting everyday things
embedded with electronics ,
software and sensors to the
internet enabling them to collect
and exchange data.
IOT_UNIT-1.pptx
How IoT works?
Internet of Things is not the result of a single novel technology; instead, several
complementary technical developments provide capabilities that taken together
help to bridge the gap between the virtual and physical world.
The Structure of IoT
The IoT can be viewed as a gigantic network consisting of networks of devices and
computers connected through a series of intermediate technologies where
numerous technologies like RFIDs, wireless connections may act as enablers of this
connectivity.
Tagging Things : Real-time item traceability and addressability by RFIDs.
 Feeling Things : Sensors act as primary devices to collect data from the
environment.
 Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of
smaller things to interact and connect within the “things” or “smart devices.”
Thinking Things : Embedded intelligence in devices through sensors has formed the
network connection to the Internet. It can make the “things” realizing the intelligent
control.
The Father of IoT Kevin Ashton :
KEVIN ASHTON in 1999
coins the term “Internet of
Things” and establishes
MIT’s Auto-ID Center, A
global research network of
academic laboratories
focused on RFID and the IoT.
History of IoT:
How does IOT work?
There are four main components based on which an internet of things ecosystem works on,
1. devices or Sensors
2. Connectivity,
3. Data Processing and
4. User Interface. Lets look at each one of them one by one.
1. Sensor:
It is a device that measures physical input from its environment and converts it into data that
can be interpreted by a computer.
There are various types of sensors available now, For e.g. sensing motion, temperature,
pressure, light, sound etc.
This sensor is typically integrated with a microprocessor based embedded system which can
collate the data and connect to internet.
2. Connectivity
Several Communication Protocols and Technology used in IOT.
Depending upon Range, Power Usage, Cost, Data Rate etc. right one is used. E.g
mobile, Bluetooth, WI-FI, LoraWAN, etc.
All the collected data is sent via internet to a cloud infrastructure.
3. Data Processing
In the processing stage, a computer transforms the raw data into information.
The transformation is carried out by using different data manipulation techniques.
This process can be just aggregating from multiple devices like AC or Light. Or it can be complex
like extracting car number plates from video feed of speeding cars.
It could be classifying the data or do real time analytics and identify patterns for human
analysis.
4. User Interface
The information processed is made available to the end-user in some way, like an app which
can trigger alarm or send them notification through email or text message.
It might provide the user with actual live feed or show trends etc.
The application could also provide an interface to send instructions back as well, like resetting
the temperature or releasing water to the plants based upon moisture reading etc.
Advantages
Minimize human effort and save time
Lead to more automation and technical optimization
Help us to reduce waste and use our natural resources effectively
Disadvantages
Security of confidential Data is a key concern
Can lead to various types of network attacks
Maintaining privacy is a challenge
Applications of IOT
Smart parking system using IoT
Gas monitoring using IoT
Water Management using IoT
Noise Tube-Crowdsourcing of pollution
Data Using smartphones.
Pedometer-Determined physical activity
How well Do I Sleep???
29
I Want to know more about myself?
30
Thought Controlled Computing
Smart City using IoT
https://www.cleverciti.com/en/smart-city
Waste management in Smart Cities
Sensors in even the holy cow!
Inthe world of IoT
,even the cows will be connected and monitored. Sensorsare implanted in
the ears of cattle. This allows farmers to monitor cows’ health and track their movements,
ensuring a healthier, more plentiful supply of milk and meat for people to consume. On
average, each cow generates about 200MB of informationper year.
26
Sensors in even the holy cow!
IoT Technologies Influencing the Smart Retail
Transformation
IOT_UNIT-1.pptx
How Smart Light Bulbs work?
Current status and future prospect of IoT
“Change is the only thing permanent in this world”
The Future of IoT 17
"The Sky's not the limit. It's only the beginning with IoT."
Unlock the Massive potential of IoT
 M2M is more recently referred to technologies that enable
communication between machines without or with minimal human
intervention.
 Point to point Communication between physical object.
 Does not follow Internet Protocol (IP)–based networks and Internet
standards.
 M2M is subset of IoT.
4
0
M2M(Machine to Machine)
M2M(Machine to Machine) Network
 M2M Device: Device capable of replying to request for data contained
within those devices or capable of transmitting data autonomously.
 M2M Area network(device Domain): Provide connectivity between
M2M Devices and M2M Gateways , e.g. personal area network.
 M2M Gateway: Equipment that uses M2M capabilities to
ensure M2M Devices inter-working and interconnection to the
communication network.
4
2
Architecture and components of M2M
 M2M Communication Networks (Network Domain): It covers the
communications between the M2M Gateway(s) and M2M application(s).
4
3
Architecture and components of M2M
An M2M area network comprises of machines (or M2Mnodes) which have
embedded hardware modules for sensing, actuation and communication.
Various communication protocols can be used for M2M local area networks such as
ZigBee, Bluetooth, Modbus, M-Bus, Wireless M-Bus, Power Line Communication
(PLC), 6LoWPAN, IEEE 802.15.4(LR-VPAN) etc.
 The communication network provides connectivity to remote M2Marea networks.
 The communication network can use either wired or wireless networks(IP-based).
While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based networks.
M2M(Machine to Machine)
M2M gateway
Since non-IP based protocols are used within M2M area networks,theM2M nodes
within one network cannot communicate with nodes in an external network.
To enable the communication between remote M2M area networks,M2M
gateways are used.
Communication in IoT vs M2M
SDN
 Software-Defined Networking (SDN) is
a networking architecture that
separates the control plane from the
data plane and centralizes the
network controller.
 Software-based SDN controllers
maintain a unified view of the network
and make configuration, management
and provisioning simpler.
 The underlying infrastructure in SDN
uses simple packet forwarding
hardware as opposed to specialized
hardware in conventional networks.
Key elements of SDN
 Centralized Network Controller
 With decoupled control and data planes and centralized network
controller, the network administrators can rapidly configure the network.
 Programmable Open APIs
 SDN architecture supports programmable open APIs for interface
between the SDN application and control layers (Northbound interface).
 Standard Communication Interface (OpenFlow)
 SDN architecture uses a standard communication interface between
the control and infrastructure layers (Southbound interface).
 OpenFlow, which is defined by the Open Networking Foundation (ONF)
is the broadly accepted SDN protocol for the Southbound interface.
NFV
 Network Function Virtualization
(NFV) is a technology that leverages
virtualization to consolidate the
heterogeneous network devices
onto industry standard high volume
servers, switches and storage.
 NFV is complementary to SDN as
NFV can provide the infrastructure
on which SDN can run.
Key elements of NFV
 Virtualized Network Function (VNF):
 VNF is a software implementation of a network function which is capable of
running over the NFV Infrastructure (NFVI).
 NFV Infrastructure (NFVI):
 NFVI includes compute, network and storage resources that are virtualized.
 NFV Management and Orchestration:
 NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of
physical and/or software resources that support the infrastructure
virtualization, and the life-cycle management of VNFs.
NFV Use Case
NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts
a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects to network services such as VoIP
and IPTV
 Security :Surveillances, Alarm systems, Access control, Car/driver
security.
 Tracking & Tracing :Order Management, Asset Tracking, Navigation,
Traffic information.
 Payment :Vending machines, Gaming machines.
 Health :
 Manufacturing :
 Facility Management :Home / building / campus automation
5
2
Application of M2M
 Low Mobility: M2M Devices do not move, move infrequently, or move
only within a certain region.
 Time Controlled :Send or receive data only at certain pre-defined periods
 Packet Switched
 Low Power Consumption:
 Online small Data Transmissions:
5
3
Features of M2M
Difference between IoT and M2M :
Basis of IoT M2M
Abbreviation Internet of Things Machine to Machine
Intelligence
Devices have objects that are responsible
for decision making
Some degree of intelligence is observed in
this.
Connection type used
The connection is via Network and using
various communication types.
The connection is a point to point
Communication protocol used
Internet protocols are used such
as HTTP, FTP, and Telnet.
Traditional protocols and communication
technology techniques are used
Data Sharing
Data is shared between other applications
that are used to improve the end-user
experience.
Data is shared with only the
communicating parties.
Internet
Internet connection is required for
communication
Devices are not dependent on the
Internet.
Type of Communication It supports cloud communication It supports point-to-point communication.
Basis of IoT M2M
Computer System
Involves the usage of both Hardware and
Software.
Mostly hardware-based technology
Scope A large number of devices yet scope is large. Limited Scope for devices.
Business Type used
Business 2 Business(B2B) and Business 2
Consumer(B2C)
Business 2 Business (B2B)
Open API support Supports Open API integrations. There is no support for Open APIs
It requires Generic commodity devices. Specialized device solutions.
Centric Information and service centric Communication and device centric.
Components
Devices/sensors, connectivity, data
processing, user interface
Device, area networks, gateway, Application
server.
Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
Plans for IoT Growth:
Increased network traffic: will your firewall / IDS / IPS be compatible and keep up?
 Increased demand for IP addresses both IPv4 and IPv6
 Increased network complexity – should these devices be isolated or segmented?
Threat Vs Opportunities
What happened when 50B machines become connected?
If misunderstood and misconfigured, IoT creates risk to our data, privacy, and
safety .
 If understood and secured, IoT will enhance communications, lifestyle, and
delivery of services.
34
Toward Ubiquity
5
9
THANK YOU….
36

More Related Content

PPTX
Introduction to IOT
PPTX
Wi-Fi Technology
PPTX
Internet of Things (IoT) - IK
PPTX
Internet of things using Raspberry Pi
PPTX
what is Internet of things(iot) & how does it work
PPTX
Applications of IOT (internet of things)
PPTX
IOT - internet of Things - August 2017
Introduction to IOT
Wi-Fi Technology
Internet of Things (IoT) - IK
Internet of things using Raspberry Pi
what is Internet of things(iot) & how does it work
Applications of IOT (internet of things)
IOT - internet of Things - August 2017

What's hot (20)

PPT
Mobile communication intro
PDF
Support Vector Machines ( SVM )
PPTX
what is IoT and basics.pptx
PPTX
Internet of things (IoT)
PDF
03 Machine Learning Linear Algebra
PPTX
ppt on WIFI
PPTX
wireless sensor networks & application :forest fire detection
PDF
iot unit1.pdf
PPTX
Internet of things
PPT
THE INTERNET OF THINGS
PPT
Intro to Model Selection
PDF
IEEE 802.11 Architecture and Services
PDF
IoT Networking
PPTX
Iot architecture
PPTX
Naive bayes
PPTX
Ppt 3 - IOT logic design
PPSX
Wi-Fi technology presentation
PPTX
Internet of things
PDF
IoT Communication Protocols
Mobile communication intro
Support Vector Machines ( SVM )
what is IoT and basics.pptx
Internet of things (IoT)
03 Machine Learning Linear Algebra
ppt on WIFI
wireless sensor networks & application :forest fire detection
iot unit1.pdf
Internet of things
THE INTERNET OF THINGS
Intro to Model Selection
IEEE 802.11 Architecture and Services
IoT Networking
Iot architecture
Naive bayes
Ppt 3 - IOT logic design
Wi-Fi technology presentation
Internet of things
IoT Communication Protocols
Ad

Similar to IOT_UNIT-1.pptx (20)

PPTX
Questions in iot
PDF
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
PPTX
IoT [Internet of Things]
PDF
Internet of things (io t)
ODP
Internet of things
PDF
OCS352-IOT -UNIT-1.pdf
PPTX
Chapter 4 - EMTE.pptx
PPTX
Internet of things-IoT.pptx
PDF
IOT Material AY(24-25) Regulation R22 Syllabus
PDF
Research Inventy : International Journal of Engineering and Science
PDF
IOT_PPT1.pdf
PPTX
Chapter 4about internet of things IoT.pptx
PDF
IOT _ Presentation by : Simran Singh.pdf
PPTX
Chapter 4 - EMTE.pptx internet of things
PDF
A Brief Review on Internet of Things
PPTX
Internet of Things.pptx
PPTX
Internet of Things - Recent developments and Trends
PDF
7CS4_IOT_Unit-1.pdf
PPTX
internet of things(Architecture and components).pptx
PPTX
Wireless networks
Questions in iot
HOME-AUTOMATION-SYSTEM-USING-INTERNET-OF-THINGS.pdf
IoT [Internet of Things]
Internet of things (io t)
Internet of things
OCS352-IOT -UNIT-1.pdf
Chapter 4 - EMTE.pptx
Internet of things-IoT.pptx
IOT Material AY(24-25) Regulation R22 Syllabus
Research Inventy : International Journal of Engineering and Science
IOT_PPT1.pdf
Chapter 4about internet of things IoT.pptx
IOT _ Presentation by : Simran Singh.pdf
Chapter 4 - EMTE.pptx internet of things
A Brief Review on Internet of Things
Internet of Things.pptx
Internet of Things - Recent developments and Trends
7CS4_IOT_Unit-1.pdf
internet of things(Architecture and components).pptx
Wireless networks
Ad

Recently uploaded (20)

PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
WRN_Investor_Presentation_August 2025.pdf
PPTX
Business Ethics - An introduction and its overview.pptx
PPTX
5 Stages of group development guide.pptx
DOCX
Business Management - unit 1 and 2
PDF
Business model innovation report 2022.pdf
PDF
Training And Development of Employee .pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
Probability Distribution, binomial distribution, poisson distribution
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPT
Data mining for business intelligence ch04 sharda
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
How to Get Funding for Your Trucking Business
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Lecture (1)-Introduction.pptx business communication
WRN_Investor_Presentation_August 2025.pdf
Business Ethics - An introduction and its overview.pptx
5 Stages of group development guide.pptx
Business Management - unit 1 and 2
Business model innovation report 2022.pdf
Training And Development of Employee .pdf
Laughter Yoga Basic Learning Workshop Manual
Roadmap Map-digital Banking feature MB,IB,AB
Probability Distribution, binomial distribution, poisson distribution
unit 1 COST ACCOUNTING AND COST SHEET
Power and position in leadershipDOC-20250808-WA0011..pdf
Data mining for business intelligence ch04 sharda
COST SHEET- Tender and Quotation unit 2.pdf
How to Get Funding for Your Trucking Business
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Unit 1 Cost Accounting - Cost sheet
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...

IOT_UNIT-1.pptx

  • 2. Presentation Flow What is Internet of Things? How IoT Works? Current Status & Future Prospect of IoT The Future of IoT The Potential of IoT Few Applications of IoT Technological Challenges of IoT
  • 3. Teaching and Examination Scheme Teaching Scheme Theory Hours Practical Hours Total Hours Credit Hours/week 3 2 5 4 Marks 100 50 150
  • 4. Units Sr. No. Title of the unit Hours 1. Introduction of IoT 5 2. IoT Architecture and Protocols 12 3. Enabling Technologies 10 4. Emerging Challenges 10 5. Opportunities for the Developing World 6 6. IoT Tools and Data Analytics 2 Total hours (Theory): 45 Total hours (Lab): 30 Total hours: 75
  • 6. What is IoT? The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy and economic benefit.
  • 7. “Things” in IoT sense, can refer to a wide variety of devices such as • heart monitoring implants • biochip transponders on farm animals • electric clams in coastal waters • automobiles with built-in sensors DNA analysis devices for environmental/food/pathogen monitoring or field operation devices that assist fire-fighters in search and rescue operations. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices.
  • 8. What is IoT ? IoT connecting everyday things embedded with electronics , software and sensors to the internet enabling them to collect and exchange data.
  • 10. How IoT works? Internet of Things is not the result of a single novel technology; instead, several complementary technical developments provide capabilities that taken together help to bridge the gap between the virtual and physical world.
  • 11. The Structure of IoT The IoT can be viewed as a gigantic network consisting of networks of devices and computers connected through a series of intermediate technologies where numerous technologies like RFIDs, wireless connections may act as enablers of this connectivity. Tagging Things : Real-time item traceability and addressability by RFIDs.  Feeling Things : Sensors act as primary devices to collect data from the environment.  Shrinking Things : Miniaturization and Nanotechnology has provoked the ability of smaller things to interact and connect within the “things” or “smart devices.” Thinking Things : Embedded intelligence in devices through sensors has formed the network connection to the Internet. It can make the “things” realizing the intelligent control.
  • 12. The Father of IoT Kevin Ashton : KEVIN ASHTON in 1999 coins the term “Internet of Things” and establishes MIT’s Auto-ID Center, A global research network of academic laboratories focused on RFID and the IoT.
  • 14. How does IOT work? There are four main components based on which an internet of things ecosystem works on, 1. devices or Sensors 2. Connectivity, 3. Data Processing and 4. User Interface. Lets look at each one of them one by one.
  • 15. 1. Sensor: It is a device that measures physical input from its environment and converts it into data that can be interpreted by a computer. There are various types of sensors available now, For e.g. sensing motion, temperature, pressure, light, sound etc. This sensor is typically integrated with a microprocessor based embedded system which can collate the data and connect to internet.
  • 16. 2. Connectivity Several Communication Protocols and Technology used in IOT. Depending upon Range, Power Usage, Cost, Data Rate etc. right one is used. E.g mobile, Bluetooth, WI-FI, LoraWAN, etc. All the collected data is sent via internet to a cloud infrastructure.
  • 17. 3. Data Processing In the processing stage, a computer transforms the raw data into information. The transformation is carried out by using different data manipulation techniques. This process can be just aggregating from multiple devices like AC or Light. Or it can be complex like extracting car number plates from video feed of speeding cars. It could be classifying the data or do real time analytics and identify patterns for human analysis.
  • 18. 4. User Interface The information processed is made available to the end-user in some way, like an app which can trigger alarm or send them notification through email or text message. It might provide the user with actual live feed or show trends etc. The application could also provide an interface to send instructions back as well, like resetting the temperature or releasing water to the plants based upon moisture reading etc.
  • 19. Advantages Minimize human effort and save time Lead to more automation and technical optimization Help us to reduce waste and use our natural resources effectively
  • 20. Disadvantages Security of confidential Data is a key concern Can lead to various types of network attacks Maintaining privacy is a challenge
  • 22. Smart parking system using IoT
  • 25. Noise Tube-Crowdsourcing of pollution Data Using smartphones.
  • 27. How well Do I Sleep???
  • 28. 29 I Want to know more about myself?
  • 30. Smart City using IoT https://www.cleverciti.com/en/smart-city
  • 31. Waste management in Smart Cities
  • 32. Sensors in even the holy cow! Inthe world of IoT ,even the cows will be connected and monitored. Sensorsare implanted in the ears of cattle. This allows farmers to monitor cows’ health and track their movements, ensuring a healthier, more plentiful supply of milk and meat for people to consume. On average, each cow generates about 200MB of informationper year. 26
  • 33. Sensors in even the holy cow!
  • 34. IoT Technologies Influencing the Smart Retail Transformation
  • 36. How Smart Light Bulbs work?
  • 37. Current status and future prospect of IoT “Change is the only thing permanent in this world”
  • 38. The Future of IoT 17 "The Sky's not the limit. It's only the beginning with IoT."
  • 39. Unlock the Massive potential of IoT
  • 40.  M2M is more recently referred to technologies that enable communication between machines without or with minimal human intervention.  Point to point Communication between physical object.  Does not follow Internet Protocol (IP)–based networks and Internet standards.  M2M is subset of IoT. 4 0 M2M(Machine to Machine)
  • 42.  M2M Device: Device capable of replying to request for data contained within those devices or capable of transmitting data autonomously.  M2M Area network(device Domain): Provide connectivity between M2M Devices and M2M Gateways , e.g. personal area network.  M2M Gateway: Equipment that uses M2M capabilities to ensure M2M Devices inter-working and interconnection to the communication network. 4 2 Architecture and components of M2M
  • 43.  M2M Communication Networks (Network Domain): It covers the communications between the M2M Gateway(s) and M2M application(s). 4 3 Architecture and components of M2M
  • 44. An M2M area network comprises of machines (or M2Mnodes) which have embedded hardware modules for sensing, actuation and communication. Various communication protocols can be used for M2M local area networks such as ZigBee, Bluetooth, Modbus, M-Bus, Wireless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4(LR-VPAN) etc.  The communication network provides connectivity to remote M2Marea networks.  The communication network can use either wired or wireless networks(IP-based). While the M2M area networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based networks. M2M(Machine to Machine)
  • 45. M2M gateway Since non-IP based protocols are used within M2M area networks,theM2M nodes within one network cannot communicate with nodes in an external network. To enable the communication between remote M2M area networks,M2M gateways are used.
  • 47. SDN  Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller.  Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler.  The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks.
  • 48. Key elements of SDN  Centralized Network Controller  With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network.  Programmable Open APIs  SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface).  Standard Communication Interface (OpenFlow)  SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface).  OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface.
  • 49. NFV  Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage.  NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run.
  • 50. Key elements of NFV  Virtualized Network Function (VNF):  VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure (NFVI).  NFV Infrastructure (NFVI):  NFVI includes compute, network and storage resources that are virtualized.  NFV Management and Orchestration:  NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs.
  • 51. NFV Use Case NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in the home. The virtualized gateway also connects to network services such as VoIP and IPTV
  • 52.  Security :Surveillances, Alarm systems, Access control, Car/driver security.  Tracking & Tracing :Order Management, Asset Tracking, Navigation, Traffic information.  Payment :Vending machines, Gaming machines.  Health :  Manufacturing :  Facility Management :Home / building / campus automation 5 2 Application of M2M
  • 53.  Low Mobility: M2M Devices do not move, move infrequently, or move only within a certain region.  Time Controlled :Send or receive data only at certain pre-defined periods  Packet Switched  Low Power Consumption:  Online small Data Transmissions: 5 3 Features of M2M
  • 54. Difference between IoT and M2M : Basis of IoT M2M Abbreviation Internet of Things Machine to Machine Intelligence Devices have objects that are responsible for decision making Some degree of intelligence is observed in this. Connection type used The connection is via Network and using various communication types. The connection is a point to point Communication protocol used Internet protocols are used such as HTTP, FTP, and Telnet. Traditional protocols and communication technology techniques are used Data Sharing Data is shared between other applications that are used to improve the end-user experience. Data is shared with only the communicating parties. Internet Internet connection is required for communication Devices are not dependent on the Internet. Type of Communication It supports cloud communication It supports point-to-point communication.
  • 55. Basis of IoT M2M Computer System Involves the usage of both Hardware and Software. Mostly hardware-based technology Scope A large number of devices yet scope is large. Limited Scope for devices. Business Type used Business 2 Business(B2B) and Business 2 Consumer(B2C) Business 2 Business (B2B) Open API support Supports Open API integrations. There is no support for Open APIs It requires Generic commodity devices. Specialized device solutions. Centric Information and service centric Communication and device centric. Components Devices/sensors, connectivity, data processing, user interface Device, area networks, gateway, Application server. Examples Smart wearables, Big Data and Cloud, etc. Sensors, Data and Information, etc.
  • 56. Plans for IoT Growth: Increased network traffic: will your firewall / IDS / IPS be compatible and keep up?  Increased demand for IP addresses both IPv4 and IPv6  Increased network complexity – should these devices be isolated or segmented?
  • 57. Threat Vs Opportunities What happened when 50B machines become connected? If misunderstood and misconfigured, IoT creates risk to our data, privacy, and safety .  If understood and secured, IoT will enhance communications, lifestyle, and delivery of services.
  • 58. 34