1 / 27

INTERNET OF THINGS

INTERNET OF THINGS. CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC. SUBBAIYA VASU UDAYARAJAN 6969989 UOTTAWA. CONTENTS. What’s Internet of Things. 1. IOT vision. 2. Architecture. Technologies For IOT. 3. 7. 5. RFID: Anti-collision Algorithm.

Télécharger la présentation

INTERNET OF THINGS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INTERNET OF THINGS CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC SUBBAIYA VASU UDAYARAJAN 6969989 UOTTAWA

  2. CONTENTS What’s Internet of Things 1 IOT vision 2 Architecture Technologies For IOT 3 7 5 RFID: Anti-collision Algorithm Future of IoT 4 6 8 Proposed Algorithm Challenges and Limitations of IoT

  3. WHAT IS IOT?

  4. According to research more than 30 billion devices will be wirelessly connected to the internet by 2020.

  5. IOT VISSION • Better Relationship Between Human and Nature. • Universal transport & internetworking. • Improve the resource utilization ratio. • Dynamic control of industry and daily life. • IoT is recognized as one of the most important areas of the future Internet.

  6. ARCHITECTURE

  7. OVERVIEW OF TECHNOLOGIES FOR IOT

  8. RFID A radio-frequency identification system uses tags or labels attached to the objects to be identified. • Widely used in Transport and Logistics. • Tracking of persons and animals. • Tracking of goods. • RFID inserted in passports. • RFID can help detect and retrieve stolen cars.

  9. RFID: ANTI-COLLISION ALGORITHM • Multiple tags in the read range cause collision. • Anti-collision technology is useful in avoiding collision. • Current anti-collision algorithms: Binary Search Method and Slotted Aloha. • These have high current efficiency, but the system performance deteriorates with the increase of the tags.

  10. ANTI-COLLISION PROCESS Reader Reader broadcasts identification loop. Tags in the range choose a time slot. Reader records non-collision tags which are out in this collision cycle. Reader starts a new cycle and repeats until all tags are read. Tags

  11. FRAME - SLOTTED ALOHA

  12. DYNAMIC FRAME SLOTTED TIME ALOHA (DFSA) N – Number of tags Ck – Number of collision time slots C0 – Number of idle time slots C1 – Identified time slots F – Frame length Initialize F, C0, C1, Ck and N; Start Fi identify cycle Ni+1 = Ni – C1 C0/Fi > T1 Tag Ni generates a random number; Save the statistics C0, C1 and Ck No Yes Ck > 0 Yes Fi+1 = Fi / 2 No C0/Fi < T2 No Yes Calculate T and  Working time: T = ∑ Fi Efficiency:  = ∑ Ci1/ Ti Fi+1 = Fi Fi+1 = Fi * 2

  13. DYNAMIC FRAME SLOTTED TIME ALOHA Assume that there are 32 tags to be read in the Reader’s range After the first cycle: C0 = 10, CK = 12 and C1 = 8 Tag identified C1=1 Tag identified C1=2 Collision CK=1 Idle timeslot C0=1 Collision CK=2 Cycle 1 starts with: F=30; C1=0; CK=0; C0=0; Then, the cycles continue until all tags are read

  14. PROBLEMS AND THE PROPOSED SOLUTION • Since the frame length of time slotted ALOHA is fixed, identifying efficiency is low. • There are chances for unused time slots. • Proposed system: Dynamic adjustment method of frame length into time slotted ALOHA. • Key Points: • Frame Length Adjustment. • Grouping of tags. • Tags are grouped and DFSA is applied on each group, with group length M = N/<<frame length>> i.e. M = N/256.

  15. PROPOSED ALGORITHM Start Initialize Frame Length F, Group Number M Slot counter - 1 Clear Tag Counter, set Slot Counter = N Slot counter = 0? No Random number from tag = One of the time slot number? No Yes Yes C2 = 0? Yes No Corresponding tag counter + 1 Reset frame length If tag counter > 1, C2+1 If tag counter = 1, then C1 + 1 Reset the group number End

  16. PROPOSED ALGORITHM Assume that there are 758 tags to be read in the Reader’s range As per the algorithm, reader creates groups with 256 as the group size, hence group size M = 3 Within each group, DFSA is applied as shown earlier and all tags are read 1 2 3

  17. SIMULATION RESULTS Comparison of throughput Comparison of time slots

  18. APPLICATIONS TRAFFIC MONITORING INTELLIGENT HOME Smart Parking Monitoring of parking spaces availability in the city. Green Houses Control micro-climate conditions to maximize the production of fruits and vegetables and its quality. Indoor Air Quality Monitoring of toxic gas and oxygen levels inside chemical plants to ensure workers and goods safety. Water Leakages Detection of liquid presence outside tanks and pressure variations along pipes.

  19. THE CHALLENGES OF IOT • Technological Standardization in most areas are still in fragmented state. • Managing and fostering rapid innovation is a challenge for the governments. • Privacy and security. • Absence of governance. How to convince users that the IoT technology will protect their data and privacy when tracking Potential Solutions Legal & Regulatory Technical Control Market Self-regulation Social Ethic

  20. FUTURE OF IOT Traffic Issue Production Daily Life Logistics Resource & Power Control • So far important focus on sensors and architectures. • Standardization. • New considerations on : • Identification. • Privacy and Security. • Users Interface. Retailing

  21. QUESTIONS AND ANSWERS 1.a. Assume that an RFID reader is trying to read the tags in its range. After a cycle of identification, assume that there is C1 successful time slots, C0 idle time slots and CK conflict time slots. Can you estimate the number of tags in the readers range (approximately)? Answer: There are at least C1 + 2*CK number of tags. (this question can be tricked with 2nd or 3rd identification cycle) 1.b. Assume that there are 80 tags in the RFID reader’s range that are to be read. Assume that in the first conflicting cycle, there are 30 identified time slots, 10 idle time slots. Identify the number of conflicting time slots in this first identification cycle (approximately). Answer: In the first cycle, we know that: Total number of tags = 80; Number of identified time slots = C1 = 30; Idle time slots = C0 = 10; Hence, Number of unidentified tags = 50 Number of unidentified tags = at least 2 * CK (Collision time slots) Hence, CK = 25 (approximately)

  22. QUESTIONS AND ANSWERS 2. Assume that in an RFID infrastructure there were 40 tags to be read. The reader was operated for three identification cycles with the frame size 30. In the first identification cycle, there were 8 collision time slots and 8 idle time slots. In the second identification cycle, there were 10 collision time slots and 10 idle time slots and in the third, 3 collision time slots and 14 idle time slots. Calculate the system efficiency. Answer: Identified time slots: In the first cycle: CK = 8 and C0 = 8. Hence, C1 = Total time slots – (CK+C0) = 14. Likewise, in second cycle: C1 = 10. In third cycle: C1 = 13 System efficiency = ∑C1 / Total frame length Hence, System efficiency = 37/90 = 41.1%

  23. QUESTIONS AND ANSWERS 3. In IoT architecture, there are three layers: Service layer, Network layer and Context-aware layer. The sub layers of these layers are shown in the picture below, Can you name the layers to which these sub layers belong and mention the functions of at least two layers? 1 2 3

  24. QUESTIONS AND ANSWERS • Answer: Following are the layers to which those sub layers belong: • Service Layer • Context aware layer • Network layer • All sub layers are shown in the next slide. Hence the question can be tricked with other sub layers. • Functions: • Service Layer: • Performs restructuring, cleaning and combining of complex data • Provides the following services: Directory service, market-to-market service, Quality of Service, facility management, etc. • Transforms information to content and provides good user interface • Context aware Layer: • Perceives and collects information from the physical world • Includes wireless sensor networks, tags and reader-writers and RFID system

  25. QUESTIONS AND ANSWERS • Network Layer: • Includes access network and core network • Provides transparent data transmission capacity • Provides an efficient, reliable and trusted network infrastructure platform to upper layer 1 1 All sub layers and the layer numbers those belong to 2 1 2 3

  26. QUESTIONS???

  27. THANK YOU

More Related