Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understanding & Use of the Internet

Similar presentations


Presentation on theme: "Understanding & Use of the Internet"— Presentation transcript:

1 Understanding & Use of the Internet
Future of the Internet Spring 2012 G. F Khan, PhD

2 Introduction Internet is now approximately 41 years of age.
No technology has evolved so much in so little time. Particularly, in the past fifteen years or so, it has completely reinvented itself. Now we not only shop, bank, work and meet people online but we share what we are doing at any given moment (e.g. Twitter, Face book) We read, listen and watch everything. What is NEXT?

3 Next Internet of Things?

4 Future of the Internet PAST  Present  Future
Present: Internet of computers Future: Internet of things?

5 Convergence of telecommunication, informatics and electronics
Internet of things Definitions: “Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to connect and communicate within social, environmental, and user contexts.” “Interconnected objects having an active role in what might be called the Future Internet.” Wikipedia: In computing, the Internet of Things refers to a, usually wireless and self-configuring, network between objects, such as household appliances Semantically: “A world-wide network of interconnected objects uniquely addressable, based on standard communication protocols.” Convergence of telecommunication, informatics and electronics

6 Next Internet Revolution:
Other terminologies Ambient Intelligence Ubiquitous computing Machine-To-Machine Pervasive computing Everyware ADUN: Appliance Defined Ubiquitous Network Invisible computing Next Internet Revolution: From networking of human beings to networking of things

7 Towards the Internet of Things: the Post PC-era

8 Future Internet Current: Web 2.0 Future Web 3.0 User created contents
Mostly network of computers Future Web 3.0 The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.

9 Why “Real” Information is so Important?
Improve Productivity Save Resources Enable New Knowledge Increase Comfort Enhance Safety & Security Preventing Failures Improve Food & H20 Protect Health High-Confidence Transport

10 Four important technological enablers
RFID: a simple, unobtrusive and cost-effective system of identification and communication Sensor technologies: detection of changes in the physical status of things Smart technologies: embedded intelligence in the things themselves Cloud Computing: smaller and smaller things having the ability to interact and connect

11 1. RFID Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. The Internet of Things consists of objects that are ‘tagged’ with RFID that communicate their position, history, and other information to an RFID reader or wireless network. An RFID tag used for electronic toll collection.

12 How RFID works? Example from supply chain in future store.

13 RFID Three components: Frequencies: LF: 125kHz HF: 13.56MHz
Transponder or tag consisting of a coupling element (coil or antenna) and an electronic chip. No need of power source since the tag take the energy from the EM field emitted by the readers. Interrogator or reader Middleware which forwards the data to another system such as a database, a PC or robot control system Frequencies: LF: 125kHz HF: 13.56MHz UHF: MHz Lack of established international standard, except EPC EPC: Electronic Product Code

14 Verichip: Implantable RFID

15 Possible uses Access management Tracking of goods and RFID in retail
Tracking of persons and animals Toll collection and contactless payment Machine readable travel documents Airport baggage tracking logistics etc

16 Example: T-money In South Korea, T-money cards can be used to pay for public transport. It can also be used in most convenience stores and vending machines in subways as cash. 90% of cabs in Seoul accept card payment, including most major credit cards and the T-money card.

17 RFID: More than barcode
Unique identification of individual items, allowing databases of specific item/location information to be generated, giving each item its own identity for real-time identification and tracking. Data capture without the need for line of sight or physical manipulation. Tags can be passive, semi-passive or active, and also read-only, read/write or read/write/re-write. Privacy-Enhancing Technologies can be used to kill or block tags. Ex: biometric passport "privacy-enhancing technologies" : te rappeler l'exemple du passeport biométrique : lecture obligatoire de la piste optique 'barcode’ pour en extraire la clé de cryptage de la liaison RFID, donc impossible de lire "au vol" ton passeport fermé dans ta poche

18 2. Sensor technologies

19 2. Sensor technologies Bridge between physical and virtual worlds
Sensors: Collect data from the environment « Two heads are better than one »: Intelligence of a single sensor increases exponentially when used in a network Wireless Sensor Networks (WSN): low cost, flexibility Sensor node: small, low-power, includes sensor, power-supply, data storage, µP, low-power radio, ADCs, data transceivers and controllers RFID sensor tag: combining RFID and sensor

20 Sensor technologies Major challenges:
Possibility for nodes to self-organize themselves into a network Power constraint Size reduction Memory and storage capacity Limited processing speed and communication bandwith

21 Example: Pigeonblog – An alternative way to participate in environmental air pollution data gathering Urban homing pigeons equipped with GPS enabled electronic air pollution sensing devices capable of sending real-time location based air pollution and image data to an online mapping/blogging environment.

22 Pigeonblog Social Impact
Pigeons tell about quality of air we breath Importance of pigeons shifts from a common nuisance to a participant in life and death discussions about the state of the micro-local environment

23 3. Smart technologies/systems
Any conventional material or thing that can react to external stimuli may be called « smart thing » Smart materials: passive, active and autonomous Smart clothing and wearable computing Smart homes Smart vehicles Robotics

24 Smart technologies/systems Ubiquitous computing
This is is also described as pervasive computing, ambient intelligence, or invisible computing Computer will become invisible due to small size Everywhere e.g. beneath your cloths and even skin

25 Examples: Smart home Smart refrigerator can order eggs and vegetables
Smart cabinet connected to the internet can order your health medicines

26 Japanese vision of ubiquitous sensor networks

27 Cloud computing

28 Cloud computing Cloud computing refers to the on-demand provision of computational resources (data, software) via a computer network, rather than from a local computer. Users can submit a task, such as word processing, to the service provider, without actually possessing the software or hardware

29 Cloud computing The consumer's computer may contain very little software or data (perhaps a minimal operating system and web browser only. Examples thinkfree.com Dropbox.com

30 IoT Challenges Energy: Harvesting, conservation & consumption
New and more efficient and compact energy storage: batteries, fuel cells, and printed/polymer batteries, supercapacitors… New energy generation devices coupling energy transmission methods or energy harvesting/scavenging using energy conversion.

31 IoT Challenges Intelligence:
Capabilities of context awareness and inter-machine communication: sensing ane localization Communication capabilities: multi-standard & multi-protocol compatibility Integration of memory and processing power Ultra low power design: from processors/microcontrollers cores, signal processing & sensors to base stations Capacity of resisting harsh environments Affordable security New class of simple and affordable IoT-centric smart systems Intelligence vs Size & cost trade-off

32 IoT Challenges Interoperability: Future tags must integrate different communication standards and protocols that operate at different frequencies and allow different architectures, centralized or distributed, and be able to communicate with other networks unless global, well defined standards emerge. Standards: Without clear and recognized standards such as the TCP5/IP6 in the Internet world, the expansion of the Internet of Things beyond RFID solutions cannot reach a global scale. Sustainable fully global, energy efficient communication standards that are security and privacy centered and are using compatible or identical protocols at different frequencies are therefore needed. Manufacturability: Costs must be lowered to less than one cent per tag, and production must reach extremely high volumes, while the whole production process must have a very limited impact on the environment. TinyOS est un système d’exploitation open-source conçu pour des réseaux de capteurs sans-fil. Il respecte une architecture basée sur une association de composants, réduisant la taille du code nécessaire à sa mise en place. Cela s’inscrit dans le respect des contraintes de mémoires qu’observent les réseaux de capteurs. Pour autant, la bibliothèque de composant de TinyOS est particulièrement complète puisqu’on y retrouve des protocoles réseaux, des pilotes de capteurs et des outils d’acquisition de données. L’ensemble de ces composants peut être utilisé tel quel, il peut aussi être adapté à une application précise. En s’appuyant sur un fonctionnement événementiel, TinyOS propose à l’utilisateur une gestion très précise de la consommation du capteur et permet de mieux s’adapter à la nature aléatoire de la communication sans fil entre interfaces physiques.

33 IoT Challenges Security and Privacy Control: Big Brother?
Widespread adoption of any object identification system: need for special long-term security protection installed. Network Infrastructure Creation and Evolution Efficient migration from the Internet / Efficient use of the existing infrastructures Accommodate functionally-improved objects and technologies in the future

34 The purpose of IoT should be
Provide a bridge between physical and virtual worlds Via instrumented and managed sensorized physical environment Support pervasive computing From wireless devices to supercomputers From wireless channels to all optical light-paths Enable further innovations in S&E research Create a social world in which we would want to live Be worthy of our society’s trust

35 Conclusion Internet Of Things : fusion of the real, virtual and digital worlds, creating a map of the physical world within the virtual space Innovative technologies and approaches will be required to make IOT a reality Innovation will come from convergence of sciences and technologies Internet des Objets: fusion des mondes réel, virtuel et numérique pour créer une cartopgraphie du monde physique dans l’espace virtuel Pour que le concept devienne une réalité il va falloir dévelooper des technologies et des approches innovantes Cette innovation viendra de la convergence des sciences et technologies de l’informatique, des télécommunications et de l’électronique Cette fertilisation croisée des disciplines permet que > 2 L’IOT est une vraie opportunité pour le LAAS de mettre en oeuvre son interdisciplinarité.

36 Next Lecture E-government

37 Thank You Questions & Comments


Download ppt "Understanding & Use of the Internet"

Similar presentations


Ads by Google