Top Banner
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN 6969989 UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC
27

INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN 6969989 UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.

Dec 25, 2015

Download

Documents

Kory Snow
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • Slide 1
  • INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN 6969989 UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC
  • Slide 2
  • Whats Internet of Things 1 Architecture 2 Challenges and Limitations of IoT 346 Future of IoT 857 IOT vision Technologies For IOT RFID: Anti-collision Algorithm Proposed Algorithm
  • Slide 3
  • WHAT IS IOT?
  • Slide 4
  • According to research more than 30 billion devices will be wirelessly connected to the internet by 2020.
  • Slide 5
  • Better Relationship Between Human and Nature. Universal transport & internetworking. Improve the resource utilization ratio. Dynamic control of industry and daily life. IoT is recognized as one of the most important areas of the future Internet.
  • Slide 6
  • Slide 7
  • Slide 8
  • A radio-frequency identification system uses tags or labels attached to the objects to be identified. RFID Widely used in Transport and Logistics. Tracking of persons and animals. Tracking of goods. RFID inserted in passports. RFID can help detect and retrieve stolen cars.
  • Slide 9
  • Multiple tags in the read range cause collision. Anti-collision technology is useful in avoiding collision. Current anti-collision algorithms: Binary Search Method and Slotted Aloha. These have high current efficiency, but the system performance deteriorates with the increase of the tags.
  • Slide 10
  • Reader broadcasts identification loop. Tags in the range choose a time slot. Reader records non- collision tags which are out in this collision cycle. Reader starts a new cycle and repeats until all tags are read. Reader Tags
  • Slide 11
  • FRAME - SLOTTED ALOHA
  • Slide 12
  • N Number of tags C k Number of collision time slots C 0 Number of idle time slots C 1 Identified time slots F Frame length Working time: T = F i Efficiency: = C i 1 / T i Initialize F, C 0, C 1, C k and N; Start F i identify cycle Tag N i generates a random number; Save the statistics C 0, C 1 and C k C k > 0 N i+1 = N i C 1 C 0 /F i < T 2 F i+1 = F i / 2 C 0 /F i > T 1 F i+1 = F i * 2 F i+1 = F i Calculate T and Yes No YesNo YesNo
  • Slide 13
  • Assume that there are 32 tags to be read in the Readers range Cycle 1 starts with: F=30; C 1 =0; C K =0; C 0 =0; Tag identified C 1 =1 Collision C K =1 Tag identified C 1 =2 Idle timeslot C 0 =1 Collision C K =2 After the first cycle: C 0 = 10, C K = 12 and C 1 = 8 Then, the cycles continue until all tags are read
  • Slide 14
  • Since the frame length of time slotted ALOHA is fixed, identifying efficiency is low. There are chances for unused time slots. Proposed system: Dynamic adjustment method of frame length into time slotted ALOHA. Key Points: Frame Length Adjustment. Grouping of tags. Tags are grouped and DFSA is applied on each group, with group length M = N/ > i.e. M = N/256.
  • Slide 15
  • Initialize Frame Length F, Group Number M Start Clear Tag Counter, set Slot Counter = N Corresponding tag counter + 1 Random number from tag = One of the time slot number? If tag counter > 1, C 2 +1 If tag counter = 1, then C 1 + 1 Slot counter - 1 Slot counter = 0? C 2 = 0? Reset frame length Reset the group number End Yes No Yes No
  • Slide 16
  • Assume that there are 758 tags to be read in the Readers range As per the algorithm, reader creates groups with 256 as the group size, hence group size M = 3 Within each group, DFSA is applied as shown earlier and all tags are read 12 3
  • Slide 17
  • Comparison of time slots Comparison of throughput
  • Slide 18
  • APPLICATIONS APPLICATIONS TRAFFIC MONITORINGINTELLIGENT HOME Smart Parking Monitoring of parking spaces availability in the city. Green Houses Control micro-climate conditions to maximize the production of fruits and vegetables and its quality. Indoor Air Quality Monitoring of toxic gas and oxygen levels inside chemical plants to ensure workers and goods safety. Water Leakages Detection of liquid presence outside tanks and pressure variations along pipes.
  • Slide 19
  • THE CHALLENGES OF IOT 1.Technological Standardization in most areas are still in fragmented state. 2.Managing and fostering rapid innovation is a challenge for the governments. 3.Privacy and security. 4.Absence of governance. How to convince users that the IoT technology will protect their data and privacy when tracking How to convince users that the IoT technology will protect their data and privacy when tracking Potential Solutions Legal & Regulatory Technical Control Social Ethic Market Self-regulation
  • Slide 20
  • Daily Life Traffic Issue Production Logistics Retailing Resource & Power Control So far important focus on sensors and architectures. Standardization. New considerations on : Identification. Privacy and Security. Users Interface.
  • Slide 21
  • QUESTIONS AND ANSWERS 1.a. Assume that an RFID reader is trying to read the tags in its range. After a cycle of identification, assume that there is C 1 successful time slots, C 0 idle time slots and C K conflict time slots. Can you estimate the number of tags in the readers range (approximately)? Answer: There are at least C 1 + 2*C K number of tags. (this question can be tricked with 2 nd or 3 rd identification cycle) 1.b. Assume that there are 80 tags in the RFID readers range that are to be read. Assume that in the first conflicting cycle, there are 30 identified time slots, 10 idle time slots. Identify the number of conflicting time slots in this first identification cycle (approximately). Answer: In the first cycle, we know that: Total number of tags = 80; Number of identified time slots = C 1 = 30; Idle time slots = C 0 = 10; Hence, Number of unidentified tags = 50 Number of unidentified tags = at least 2 * C K (Collision time slots) Hence, C K = 25 (approximately)
  • Slide 22
  • QUESTIONS AND ANSWERS 2. Assume that in an RFID infrastructure there were 40 tags to be read. The reader was operated for three identification cycles with the frame size 30. In the first identification cycle, there were 8 collision time slots and 8 idle time slots. In the second identification cycle, there were 10 collision time slots and 10 idle time slots and in the third, 3 collision time slots and 14 idle time slots. Calculate the system efficiency. Answer: Identified time slots: In the first cycle: C K = 8 and C 0 = 8. Hence, C 1 = Total time slots (C K +C 0 ) = 14. Likewise, in second cycle: C 1 = 10. In third cycle: C 1 = 13 System efficiency = C 1 / Total frame length Hence, System efficiency = 37/90 = 41.1%
  • Slide 23
  • QUESTIONS AND ANSWERS 3. In IoT architecture, there are three layers: Service layer, Network layer and Context-aware layer. The sub layers of these layers are shown in the picture below, Can you name the layers to which these sub layers belong and mention the functions of at least two layers? 1 3 2
  • Slide 24
  • QUESTIONS AND ANSWERS Answer: Following are the layers to which those sub layers belong: 1.Service Layer 2.Context aware layer 3.Network layer All sub layers are shown in the next slide. Hence the question can be tricked with other sub layers. Functions: 1.Service Layer: Performs restructuring, cleaning and combining of complex data Provides the following services: Directory service, market-to-market service, Quality of Service, facility management, etc. Transforms information to content and provides good user interface 2.Context aware Layer: Perceives and collects information from the physical world Includes wireless sensor networks, tags and reader-writers and RFID system
  • Slide 25
  • QUESTIONS AND ANSWERS 3.Network Layer: Includes access network and core network Provides transparent data transmission capacity Provides an efficient, reliable and trusted network infrastructure platform to upper layer 2 3 11 1 2 All sub layers and the layer numbers those belong to
  • Slide 26
  • QUESTIONS???
  • Slide 27
  • THANK YOU