INTERNET OF THINGS Module-1: 1. Define IOT: The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. 2. Define m2m: Machine to machine (M2M) is direct communication between devices using any communications channel, including wired and wireless. It is technology to interconnect two or more divices all machines to connect with each other. M2m technology available in ore homes, ofices, shopping malls and other places. For example controlling electrical appliances like bulbs and fans using radio frequency or Bluetooth from your smartphones Introduction to Internet of Things (IoT) Internet of Things (IoT) is the networking of physical objects that contain electronics embedded within their architecture in order to communicate and sense interactions amongst each other or with respect to the external environment. In the upcoming years, IoT-based technology will offer advanced levels of services and practically change the way people lead their daily lives. Advancements in medicine, power, gene therapies, agriculture, smart cities, and smart homes are just a very few of the categorical examples where IoT is strongly established. There are four main components used in IoT: 1. Low-power embedded systems – Less battery consumption, high performance are the inverse factors play a significant role during the design of electronic systems. 2. Cloud computing – Data collected through IoT devices is massive and this data has to be stored on a reliable storage server. This is where cloud computing comes into play. The data is processed and learned, giving more room for us to discover where things like electrical faults/errors are within the system. 3. Availability of big data – We know that IoT relies heavily on sensors, especially real-time. As these electronic devices spread throughout every field, their usage is going to trigger a massive flux of big data. 4. Networking connection – In order to communicate, internet connectivity is a must where each physical object is represented by an IP address. However, there are only a limited number of addresses available according to the IP naming. Due to the growing number of devices, this naming system will not be feasible anymore. Therefore, researchers are looking for another alternative naming system to represent each physical object. There are two ways of building IoT: 1. Form a separate internetwork including only physical objects. 2. Make the Internet ever more expansive, but this requires hard-core technologies such as rigorous cloud computing and rapid big data storage (expensive). IoT Enablers – RFIDs: uses radio waves in order to electronically track the tags attached to each physical object. Sensors: devices that are able to detect changes in an environment (ex: motion detectors). Nanotechnology: as the name suggests, these are extremely small devices with dimensions usually less than a hundred nanometers. Smart networks: (ex: mesh topology). Characteristics of IoT: Massively scalable and efficient IP-based addressing will no longer be suitable in the upcoming future. An abundance of physical objects is present that does not use IP, so IoT is made possible. Devices typically consume less power. When not in use, they should be automatically programmed to sleep. A device that is connected to another device right now may not be connected in another instant of time. Intermittent connectivity – IoT devices aren’t always connected. In order to save bandwidth and battery consumption, devices will be powered off periodically when not in use. Otherwise, connections might turn unreliable and thus prove to be inefficient. Application Domains: IoT is currently found in four different popular domains: 1) Manufacturing/Industrial business - 40.2% 2) Healthcare - 30.3% 3) Security - 7.7% 4) Retail - 8.3% Modern Applications: 1. Smart Grids 2. Smart cities 3. Smart homes 4. Healthcare 5. Earthquake detection 6. Radiation detection/hazardous gas detection 7. Smartphone detection 8. Water flow monitoring A USE CASE EXAMPLE: Human stress management Measures are heart rate & GSR(Galvanic skin Response) Let’s See About Human Stress Management Refer Note Page no: 14 & 15 Define IOT Value Chain? Looking at the IOT value chains as a pyramid, at the base us all the connected devices: Phones, Fitness bands, Connecterd Cars, Smart homes, and Other Devices On the consumer side in industry, you have things like building sensors, smart cities and connected factories. M2M TOWARDS IOT – The Global Context: M2M solutions have been around for decades and are quite common in many different scenarios. While the need to remotely monitor and control assests – Personal, enterprise or other is not new, a number of concurrent things are now converging to create drivers for change not just within the technology industry, but within the wider global economy and society. Our planet is facing massive challenges – environmental, social, and economic. The changes that humanity needs to deal with in the coming decades are unprecedented, not because similar things have not happened before during our common history on this planet, but because on natural them are happening at the same time. From constraints on naturals resources to a reconfiguration of the world’s economy many people are looking to technology to assists with this issues. Essentialy, therefore, a set of megatrends are coming to create needs and capabilities, which in turn produce a set of IOT technology and business Drivers. A megatrends is a pattern or trend that will have a fundamental and global impact on society at a macro level over several generations. It is somethings that will Have a significant impact on the world in the foreseeable future. We here imply both game changers as challenges, as well as technology and science to meet these challenges. A full description of megatrends is beyond the scope of this book, and interested readers are directed to the many excellent books and reports available on this topic, including publications from the national intelligence commercial (NIC 2012), European internet foundation(EIF 2009), Frost & Sullivan Following section, we focus on the megatrends that have implications for IOT. M2M VALUE CHAIN: M2M Value chain are internal to one company or organization and gives a solution to one problem. The following are the main functions processed by M2M Value Chain. i. ii. iii. iv. v. INPUT: The input are raw material are ingrediance to make a product. PRODUCTION MANUFACTURE: ` It refers to the process through which the raw inputs became part of value chain. PROCESSING: It refers to the process by which the product is prefer for sale. Packaging: It is a process by which the product can be branded DISTRIBUTION MARKETING: It is refers to the channels to market the product. DIFFERING CHARACTERISTICS IN M2M AND IOT: SL.NO 1 2 3 4 5 M2M IOT It is a direct communication betweend the machines It is support point-to-point communication Devices do not rely on internet connection Hardware based technique Machine normally communicate with a simple That IOT is about sensor automated and internet platform It Support cloud communication Devices drely on Internet connection Hardware and Software Based Technique Many users can access at one time over the internet 6 machine at a time Devices can connected to mobile (or) other Devices can be connected to internet protocol (IP) network through the Internet Internet Big 7 Data Module-2: A MARKET PERSPECTIVE: Definition of M2M Machine to machine refers to technology that allowed both wireless and wired systems to communicate with other devices of the same type. Machine to Machine (M2M) technology allows organization to gather data from the edge of the enterprise and apply it in way that positively impact the business. exchange the information between machine that is established between central control system (server) and any type of equipment, through one or several communication networks. Global value chains A value chain describes the full range of activities that firms and workers perform to bring a product from its conception to end use and beyond, including design, production, marketing, distribution, and support to the final consumer Analyzing an industry from a global value chain (GVC) perspective permits understanding of the context of globalization on the activities contained within them by “focusing on the sequences of tangible and intangible value-adding activities, from conception and production to end use. GVC analysis therefore provides a holistic view of global industries both from the top down and from the bottom up”. M2M value chain IoT value chains The Information-Driven Global Value Chain(I-GVC) Fundamental roles within the I-GVC Inputs: Sensors, RFID, and other devices. End-Users. Data Factories. Service Providers/Data Wholesalers. Intermediaries. Resellers. The Information-Driven Global Value Chain. Inputs to the information-driven global commodity chain Sensors and other devices (e.g. RFID and NFC). End-users ->Both of these information sources input tiny amounts of data into the I-GVC chain, which are then aggregated, analyzed, repackaged, and exchanged from value chain. -> As a result, sensor devices and networks, RFIDs, mobile and consumer devices, Wi-Fi hotspots, and end-users all form part of a network of “subcontractors” in the value chain, all contributing to the increased value of the information products Sensors and radio frequency identification Sensors and RFID devices are working as inputs to the I-GVC through the capture and transmission of data necessary for the development of information products. Smart phones have also been developed that allow mobile devices to interact with sensors and RFID. This allows for a two-way interaction between a mobile terminal and the sensor technology. The data is used as one part of the input to the commodity chain, which uses it to create the information products that are eventually exchanged. In this sense, the sensor networks, and NFC and RFID technologies may be viewed as subcontractors Resellers Intermediaries Data Factories Service Providers/ Data Wholesalers End User Information Domestic and overseas input from human and sensor-based ‘subcontractors’ to the I-GVC, workers that constantly gather data for further processing and sale. End-users End-users that choose to use and participate within the digital world are now deeply embedded into the very process of production. Every human that enters a search query into a search engine, Every human that agrees to allow the mobile broadband platform to inform a service of their location, Every human that uses NFC to allow a bank to establish and confirm their identity are also functioning as subcontractors to the global information systems that form the basis of the I-GVC. Production processes of the information – driven global value chain Data factories Data factories are those entities that produce data in digital forms for use in other parts of the I-GVC. Service providers/data wholesaler: Service Providers and Data wholesalers are those entities that collect data from various sources worldwide, and through the creation of massive databases, use it to either improve their own information products or sell information products in various forms. Example: Twitter, Facebook, Google M2M TO IOT- An architectural overview: i. ii. iii. iv. European Telecommunication standard institute(ETS1) M2M International Telecommunication union (ITU) Internet Engineering Task Force Architecture fragments Open geospatial consortium architecture NETWORK DOMAIN M2M M2M Application Management M2M service capabilities Function < Core Network Network Management Access Network Function Devices & Gateway Domain M2M Service capabilities < M2M Application < M2M gateway < M2M Devices M2M Service gateway < M2M Application < M2M gateway < ETS1 M2M Reference Architecture: He is a combination of both functional and topological view and give some functional group.(FG) The device and gateway domain contains the following entities. M2M Device: M2M device contains M2M application and M2M service capabilities M2M device connects to the networks domain either directly or through and M2M gateway M2M Area Network: This is typically a LAN or PAN which provides connectively between M2M devices and M2M gateways. Eg, IEEE 802.15.1 (Bluetooth), IEEE 802.15.4 (Zig Bee) M2M Gateway: 1. Network Domain Entities: This contains M2M Applications and M2M services capabilities. It also provides services to other devices that are not visible to the network domain. i. Access Network: This network allows the devices in the devices and gateway domain to communicate with the core network. Eg, Wireless LAN W-LAN, WIMAX, XDLS, HFC ii. 2. Core Network: This network is used to provide the following function namely – IP connectivity Service and Network control, Interconnection with other network and Roming. iii. M2M Service Capabilities iv. M2M Service Application v. M2M Management Function ETS1 M2M Service Capabilities: i. Application Enablement (XAE) ii. Generic Communication (XGC) iii. Reachability, Addressing & Repository(XRAR) iv. Communication Selection (XCS) v. Remote Entity Management (XREM) vi. Security (XSEC) vii. History and Data Retention(XHDR) viii. ix. x. xi. 3. Transaction Management (XTM) Compensation broker (XCB) Telco Operator Exposure (NTOE) Internetworking Proxy (XIP) ETS1,M2M Interfaces : The following are the three main interfaces: mIa dIa mId ETS1,M2M Resource Management : ETS!,M2M Architecture assumes that application structures devices application(DA), Gateway Application(GA), Neytwork Application (NA), Exchange information by performing CRVD operation 4. (Create Read Update Delete) on a number of Resources by using REST full Architecture (Representational State Transfer) Main design Principles and needed capabilities: i. ii. iii. iv. v. vi. vii. The architecture relies on the separation of resources providing sensing and actuation from the actual devices, a set of contextual and real world entity centric services, and the users of the services. SENSEI further relies on open – ended constellation of providers and users, and also provides a reference model for different business roles. A number of design principles and guidelines are identified, and so is a set of requirements Finally, the architecture itself contains a set of key functional capabilities IOT – A refers to as the Architectural reference model(ARM) The Vision of IOT – A is, via the ARM, to establish a means to achieve a high degree of interoperability between different IOT solutions at the different system levels of communication, service and information. IOT – A provides a set of different architectural views, establishes a proposed terminology and a set of unified Requirements. An IOT Architectural outline: Functional layer and capabilities of and IOT solution Business Layer Data and Information Layer Security Management IOT Data and Services Application Layer Service Support Layer Communication Layer Resource Layer Asset Layer ASSET LAYER: Real-world objects and entities that are subject to being monitored and controlled, as well as having digital representations and identities. For example: 1. Vehicles 2. Home 3. Human 4. Buildings etc. Assets can also be of a more virtual character, being subjective representations of parts of the real world. For example: Latterroutestrickslogisticsinformationtraffic intensityroadworkroad conditionsweather situation. Assets are instrumented with embedded technologies that bridge the digital realm with the physical world, and that provide the capabilities to monitor and control the assets as well as providing identities to the assets. For examples: 1. Tags: RFID 2. Optical Codes: barcodes 3. QR (Quick Response) code. COMMUNICATION LAYER: Connectivity between the resources on one end and the different computing infrastructures that host and execute service support logic and application logic on the other end DATA AND INFORMATION LAYER: MANAGEMENT: SECURITY: DATA AND SERVICES: Standards Considerations: There are a number of standardization organizations and bodies, both proper standards Development Organization (SDO) as well as special interest groups and alliances that develop standards specifications. CONSIDERATION 1 INTEREST Different national and international bodies ratify standards by SDOs, whereas standards specifications developed by special interest group and alliances are normally agreedupon and adopted by market actors such as technology manufactures EXAMPLE International Telecommunications Union(ITU) International organization for standardization(ISO) European Telecommunication standards institute(ETSI) The European committee for electro 2 3 System standards can address 3G mobile communication network as defined within the 3rd generation partnership project (3GPP) or standards towards the smart grid as done by the national Institute of standards and technology(NIST) Standards are emerging as a result of collaborative research involving both academia and industry technical standardization(CENELEC) System standards rely on the enabling technology components as the foundation, but as there generally are many competing technology components (eg., Protocol stacks), the adoption into a system standard is not a straightforward route Technology are selection for standardization can happen as part of requlatory or legislative process Module-3: M2M AND IOT TECHNOLOGY FUNDAMENTALS: Four fundamental components of an IoT system: 1) Sensors/Devices: Sensors or devices are a key component that helps you to collect live data from the surrounding environment. All this data may have various levels of complexities. It could be a simple temperature monitoring sensor, or it may be in the form of the video feed. A device may have various types of sensors which performs multiple tasks apart from sensing. Example, A mobile phone is a device which has multiple sensors like GPS, camera but your smartphone is not able to sense these things. 2) Connectivity: All the collected data is sent to a cloud infrastructure. The sensors should be connected to the cloud using various mediums of communications. These communication mediums include mobile or satellite networks, Bluetooth, WI-FI, WAN, etc. 3) Data Processing: Once that data is collected, and it gets to the cloud, the software performs processing on the gathered data. This process can be just checking the temperature, reading on devices like AC or heaters. However, it can sometimes also be very complex like identifying objects, using computer vision on video. 4)User Interface: The information needs to be available to the end-user in some way which can be achieved by triggering alarms on their phones or sending them notification through email or text message. The user sometimes might need an interface which actively checks their IOT system. For example, the user has a camera installed in his home. He wants to access video recording and all the feeds with the help of a web server. However, it's not always one-way communication. Depending on the IoT application and complexity of the system, the user may also be able to perform an action which may create cascading effects. For example, if a user detects any changes in the temperature of the refrigerator, with the help of IOT technology the user should able to adjust the temperature with the help of their mobile phone. DEVICES AND GATEWAYS: Devices: Introduction: A device can be characterized as having several properties, including: • Microcontroller: 8-, 16-, or 32-bit working memory and storage. • Power Source: Fixed, battery, energy harvesting, or hybrid. • Sensors and Actuators: Onboard sensors and actuators, or circuitry that allows them to be connected, sampled, conditioned, and controlled. • Communication: Cellular, wireless, or wired for LAN and WAN communication. • Operating System (OS): Main-loop, event-based, real-time, or fullfeatured OS. • Applications: Simple sensor sampling or more advanced applications. • User Interface: Display, buttons, or other functions for user interaction. • Device Management (DM): Provisioning, firmware, bootstrapping,and monitoring. • Execution Environment (EE): Application lifecycle management and Application Programming Interface (API). Device type Device types they are classified into two types.They are, Basic Device Advanced Device Basic Devices: Devices that only provide the basic services of sensor readings and/or actuation tasks, and in some cases limited support for user interaction. LAN communication is supported via wired or wireless technology, thus a gateway is needed to provide the WAN connection. Advanced Devices: In this case the devices also host the application logic and a WAN connection. They may also feature device management and an execution environment for hosting multiple applications. Gateway devices are most likely to fall into this category. Deployment scenarios for devices: Deployment can differ for basic and advanced deployment scenarios. Example deployment scenarios for basic devices include: • Home Alarms: Such devices typically include motion detectors, magnetic sensors, and smoke detectors. A central unit takes care of the application logic that calls security and sounds an alarm if a sensor is activated when the alarm is armed. The central unit also handles the WAN connection towards the alarm central. These systems are currently often based on proprietary radio protocols. • Smart Meters: The meters are installed in the households and measure consumption of, for example, electricity and gas. A concentrator gateway collects data from the meters, performs aggregation, and periodically transmits the aggregated data to an application server over a cellular connection. • Building Automation Systems (BASs): Such devices include thermostats, fans, motion detectors, and boilers, which are controlled by local facilities, but can also be remotely operated. • Standalone Smart Thermostats: These use Wi-Fi to communicate with web services. Examples for advanced devices, meanwhile, include: • Onboard units in cars that perform remote monitoring and configuration over a cellular connection. • Robots and autonomous vehicles such as unmanned aerial vehicles that can work both autonomously or by remote control using a cellular connection. • Video cameras for remote monitoring over 3G and LTE. • Oil well monitoring and collection of data points from remote devices. • Connected printers that can be upgraded and serviced remotely. Basic devices: These devices are often intended for a single purpose, such as measuring air pressure or closing a valve. In some cases several functions are deployed on the same device, such as monitoring humidity, temperature, and light level Advanced devices As mentioned earlier, the distinction between basic devices, gateways, and advanced devices is not cut in stone, but some features that can characterize an advanced device are the following: • A powerful CPU or microcontroller with enough memory and storage to host advanced applications, such as a printer offering functions for copying, faxing, printing, and remote management. • A more advanced user interface with, for example, display and advanced user input in the form of a keypad or touch screen. • Video or other high bandwidth functionsIt’s not unusual for the advanced device to also function as a gateway for local devices on the same LAN. GATEWAYS A gateway serves as a translator between different protocols, e.g. between IEEE 802.15.4 or IEEE 802.11, to Ethernet or cellular. There are many different types of gateways, which can work on different levels in the protocol layers. Most often a gateway refers to a device that performs translation of the physical and link layer, but application layer gateways (ALGs) are also common. The latter is preferably avoided because it adds complexity and is a common source of error in deployments. Some examples of ALGs include the ZigBee Gateway Device (ZigBee Alliance 2011), which translates from ZigBee to SOAP and IP, or gateways that translate from Constrained Application Protocol (CoAP) to HyperText Transfer Protocol/Representational State Transfer (HTTP/REST). For some LAN technologies, such as 802.11 and Z-Wave, the gateway is used for inclusion and exclusion of devices. This typically works by activating the gateway into inclusion or exclusion mode and by pressing a button on the device to be added or removed from the network. For very basic gateways, the hardware is typically focused on simplicity and low cost, but frequently the gateway device is also used for many other tasks, such as data management, device management, and local applications. In these cases, more powerful hardware with GNU/Linux is commonly use Local and wide area networking: Local Area Networks (LAN) Local Area Network (LAN) is a computer network, which is limited to a small office, single building, multiple buildings inside a campus etc. Typically, a Local Area Network (LAN) is a private network owned and maintained by a single organization. Below image shows a small Local Area Network (LAN) connected together using a Network Switch. The terms Local Area Network (LAN), broadcast domain and subnet are used interchangeably throughout omnisecu.com website. Do remember that a Local Area Network (LAN) is comprised of one or more broadcast domains. A Local Area Network (LAN) may contain one or more subnets also. Wide Area Networks (WAN) A Wide Area Network (WAN) spans over multiple geographic locations, which is composed of multiple LANs. It is nearly impossible for a small to medium organization (except Network Service Providers) to pull network cables between their two offices in two different countries located 1000s of kilometers away. Network Service Providers (also called as ISPs) provide the connectivity solutions for Wide Area Networks (WAN). Below image shows two Local Area Networks (LANs), located at two different geographical locations connected via Internet to create a Wide Area Network (WAN). LAN 1 is located in Chennai, India and LAN 2 is located in Manila, Philippines. The aerial distance between Chennai and Manila is about 4,400 kilometers. It is almost impossible for a small to medium business to draw cables between Chennai and Manila. We normally avail the services of an Internet Service Provider for connectivity between these two offices. Differences between LAN and WAN • A Local Area Network (LAN) is a private computer network that connects computers in small physical areas. Example: A small office, A Single building, Multiple buildings inside a campus etc. Wide Area Networks (WAN) is type of computer network to connect offices which are located in different geographical locations. Wide Area Network (WAN) depends mainly on Internet Service Providers (ISPs) for connection solutions. • Local Area Network (LAN) has higher bandwidth rates. Current Local Area Networks (LANs) runs at bandwidth speeds of 100 Mbps, 1 Gbps or 10 Gbps. Wide Area Networks (WAN) has lower bandwidth rates compared with Local Area Network (LAN). Current Wide Area Networks runs on bandwidths of 20 Mbps, 50 Mbps or 100 Mbps. • Local Area Network (LAN) bandwidth rates are almost constant. Local Area Network (LAN) bandwidth rates are dependent on characteristics of the LAN technology in use (Normally FastEthernet or Gigabit Ethernet). Since most of Wide Area Networks (WAN) connectivity solutions are dependent on Internet Service Providers (ISPs), budget related constraints affect the quality of WAN. • Most of the current Local Area Networks (LANs) use Ethernet as the LAN Standard (FastEthernet 100 Mbps, or Gigabit Ethernet 1/10 Gbps). Normally for WAN connectivity, technologies like VPN (Virtual Private Network) over Internet, or MPLS (Multi-Protocol Label Switching) are used. • Since Local Area Networks (LANs) are private networks, managed by dedicated local network administrators, Local Area Networks (LANs) are more reliable and secure than Wide Area Networks (WANs). Since Wide Area Networks (WANs) involve third-party service providers, WAN networks are less reliable and secure. • Initial set-up costs for Local Area Networks (LANs) are low as the devices required to set up the networks are cheap. Initial set-up costs for Wide Area Networks (WANs) are high, because of the devices (Routers, Firewalls etc.), cables and manpower required. • Local Area Networks (LANs) running costs are less Wide Area Networks (WANs) running costs are high. Wide Area Networks (WANs) normally have recurring monthly cost as Service Provider access fees. DATA MANAGEMENT: When customers embark on the journey to address IoT and IIoT use cases, the first hurdle they face is how to retrieve the data from the IoT systems and make it available for the analytics systems and for decision making. The ability to ingest the data from IoT systems into the data lake or into messaging systems like Apache Kafka is a key first step. In most scenarios, organizations also want to enrich and cleanse the data to ensure that bad data doesn’t get into the lake and the analysts have enriched data for their analytics. In some cases, customers want to operationalize actions in real-time on IoT-enabled devices. For example, they may want to automatically stop a painting machine if factory conditions get too warm for optimal paint adhesion—a situation that could cause major quality and warranty issues if not corrected during manufacturing. 5 must-have capabilities for IoT data management Managing data from IoT devices is an important aspect of a real-time analytics journey. To be sure your data management solution can handle IoT data demands, look for these five key capabilities: Versatile connectivity and ability to handle data variety: IoT systems have a variety of standards and IoT data adheres to a wide range of protocols (MQTT, OPC, AMQP, and so on). Also, most IoT data exists in semistructured or unstructured formats. Therefore, your data management system must be able to connect to all of those systems and adhere to the various protocols so you can ingest data from those systems. It is equally important that the solution support both structured and unstructured data. Edge processing and enrichments: A good data management solution will be able to filter out erroneous records coming from the IoT systems—such as negative temperature readings—before ingesting it into the data lake. It should also be able to enrich the data with metadata (such as timestamp or static text) to support better analytics. Big data processing and machine learning: Because IoT data comes in very large volumes, performing real-time analytics requires the ability to run enrichments and ingestion in sub-second latency so that the data is ready to be consumed in real time. Also, many customers want to operationalize ML models such as anomaly detection in real time so that they can take preventive steps before it is too late. M2M AND IOT ANALYTICS The value of big data stems from its ability to surface relevant and actionable insights at the micro level. The proliferation of Internet-connected devices presents a framework for analytics to become much more granular in nature and an opportunity to better align the frequency of reporting to the pace of business operations. While today the biggest challenge lies in managing the variety–rather than the volume or velocity–of IoT data, the general shift from batch- to event-based processing signals a growing interest in real-time / streaming analytics as a lever for IoT value creation. The need to harmonize these components without creating or simply shifting the bottlenecks that come with the management of high-velocity variable data puts pressure on connectivity providers, edge analytics platform players, and system integrators (SIs) to stand up new and distributed architectures to not only support, but also add value to data at any level. In this research analysis, ABI Research analyzes what it considers to be the most significant trends and developments related to the IoT analytics industry. The first section includes the conceptual framework supporting the research, as well as a wrap-up of recent activity. The second section consists of the updated and refined forecasts on the market’s revenues, broken down by application, region, value chain component, and analytic phase (descriptive, predictive, prescriptive). A high-level revenue projection for the overall big data and analytics market is also included at the end of the section for a view of IoT analytics in a broader industry context. The final section provides a high-level assessment of a number of relevant vendors to exemplify the different parts of the value chain. Address data drift: Data coming from IoT systems can change over time due to events such as firmware upgrades. This is called data drift or schema drift. It is important that your data management solution can automatically address data drift without interrupting the data management process. Real-time monitoring and alerting: IoT data ingestion and processing never stops. Therefore, your data management solution should provide real-time monitoring with flow visualizations to show the status of the process at any time with respect to performance and throughput. The data management solution should also provide alerts in case any issues arise during the process. KNOWLEDGE MANAGEMENT: Knowledge management (KM) systems would have to be geared more and more for real time knowledge updation. Customers buying patterns and the usage trends of equipments will come together to provide new insights for marketing and product development teams and KM specialists have the opportunity to synthesise both the data and arrive at new knowledge. Internet of Things and SMAC (social media, mobility, analytics and cloud) are forcing businesses to rethink their goals and how value is created. Businesses have to balance their goal of ‘reliability’ and move towards becoming ‘agile’ and value creation is no longer through price performance alone but will happen by focussing on revenue generation by customer experience and brand building. Sensors and embedded technology enabling transmission of real time data through wireless networks will lead to co creation of new real time knowledge with customers and vendors on a regular basis. The moot point all the commonly owned data is likely to be accessible by all the stakeholders but the advantage would go the firm which has the ability to interpret the data and convert it into real time knowledge which can be put to use for competitive advantage. Opportunities for innovation by better understanding of product usage, performance and customer experience will help create opportunities for creating and leveraging collaborative innovation platforms with customers and vendors to spot, nurture and fructify innovation ideas. In the changing world led by Internet of Things and Big Data, knowledge needs of individuals will get redefined. L&D functions have to get equipped with capabilities to deal with data, machine interface and the threats of the possibilities of machine intelligence surpassing human intelligence by rethinking methods and tools for making the talent pool get to interpret system intelligence such that human intelligence becomes even more sharper. Thus L&D teams will see a shift in their roles from being facilitators to coaches to data based interpretation of training needs and profiling of employees. Module - 4 IoT Architecture -State of the Art A reference model is a model that describes the main conceptual entities and how they are related to each other, while the reference architecture aims at describing the main functional components of a system as well as how the system works, how the system is deployed, what information the system processes, etc. An ARM is useful as a tool that establishes a common language of an M2M or IoT system. State of the art European Telecommunications Standards Institute M2M/oneM2M. The European Telecommunications Standards Institute (ETSI) in 2009 formed a Technical Committee (TC) on M2M topics aimed at producing a set of standards for communication among machines from an end-to-end viewpoint. ETSI M2M high-level architecture 1.1 ) ETSI M2M high-level architecture M2M Device: An M2M device connects to the Network Domain either directly or through an M2M Gateway Direct connection: The M2M Device is capable of performing registration, authentication, authorization, management, and provisioning to the Network Domain. Direct connection also means that the M2M device contains the appropriate physical layer to be able to communicate with the Access Network. M2M Gateway: This is the case when the M2M device does not have the appropriate physical layer, compatible with the Access Network technology, and therefore it needs a network domain proxy. The M2M Gateway acts as a proxy for the Network Domain and performs the procedures of authentication, authorization, management, and provisioning. An M2M Device could connect through multiple M2M Gateways. M2M Area Network: This is typically a local area network (LAN) or a Personal Area Network (PAN) and provides connectivity between M2M Devices and M2M Gateways M2M Gateway: The M2M Gateway contains M2M Applications and M2M Service Capabilities. The M2M Gateway may also provide services to other legacy devices that are not visible to the Network Domain. The device that provides connectivity for M2M Devices in an M2M Area Network towards the Network Domain. Access Network: The network that allows the devices in the Device and Gateway Domain to communicate with the Core Network. Core Network: IP connectivity. • Service and Network control. • Interconnection with other networks. • Roaming. M2M Service Capabilities: Functions use underlying Core Network functions, and their objective is to abstract the network functions for simpler applications. M2M Applications: M2M applications (e.g. smart metering) that utilize the M2M Service Capabilities through the open interfaces. Network Management Functions: functions to manage the Access and Core Network M2M Management Functions: Functions required to manage the M2M Service Capabilities on the Network Domain while the management of an M2M Device or Gateway is performed by specific M2M Service Capabilities. There are two M2M Management functions: M2M Service Bootstrap Function (MSBF). M2M Authentication Server (MAS): IOT ARCHITECTURE AND REFERENCE MODEL The Internet of Things (IoT) is defined as a paradigm in which objects outfitted with sensors, actuators, and processors interact with each other to serve a significant purpose. THE BASIC IOT ARCHITECTURE IS DEFINED IN FOUR STAGES.SENSOR NODES <==> GATEWAYS <==> INTERNET + CLOUD(SERVER) <==> VISUALIZATION AND CONTROL ENDPOINTS. Sensor Nodes: These are the physical things that carry sensors and actuators with it. Sensors that can record environmental conditions and transmit them over the network. Actuators can respond to commands from the network and show some mechanical response. Gateway: A noticeable predicament in connecting the thing to the internet is that not all sensor nodes can connect to the internet directly. And it is also not a good idea to connect each device directly to the internet because of the restrictions of IP address and efficiency reduction. The answer for this problem is an IoT Gateway. Which can handle interoperability of the communication protocols and can connect to various devices and the internet at the same time. note: this is not same as the Network Gateway. A Server operating on the Cloud: The gateway connects to the cloud through the internet. The Server manages all the data coming from the Gateways and all the requests coming of the Visualization and Control Endpoints. The data arriving in is also processed at the server depending on the deployment of analytics algorithms and methods at the server. The clouds serve a Web UI and API endpoints for the rest of the world to interact with it. Visualization and Control Endpoints: The are devices with input and output devices built in, such as mobile phones, remote controllers and PCs. The Web UI served and API endpoints on the cloud can be consumed by these devices to read the data, do some operations on it or to send some commands to the sensor nodes through the gateways over the internet. IOT reference model: 1. Physical Devices and Controllers: These are similar to the sensor nodes discussed earlier. The actual things in the Internet of Things. 2. Connectivity: The nodes in sensor nodes discussed earlier can be related to this. The basic device that has some connectivity radios and contains the sensors. The Network devices also fall in the same segment. 3. Edge Computing: The small level data processing at the gateway and sensor nodes is known as edge computing. Some small tasks and actuator handling can also be done here. 4. Data Accumulation: The data that is sent over the internet via gateways by the sensor nodes are acquired and stored in a database on the Cloud. 5. Data Abstraction: Normalization, filtering, expansion, aggregation of the data is done at the cloud mainly.The main aim is ti get the required and significant data out of all the data that is collected.Some small operations can be done at the Edge also. 6. Application: Analytics over the data and responding according to the data to control the actuators at the sensor nodes is one of the main applications of the IoT Architecture. 7. Collaboration and Processing: This is the final level of the IoT Reference model. The human interaction and involvement in the IoT scenario are seen as the most neglected parts. Not only the device should be smart enough to perform certain tasks but they should also have some intuitive interactions with the human. The iinvolment of People and Business processes is an essential prt of developping an interesting IoT application. MODULE-5 INTRODUCTION: 1. Functional View: Description of what the system does, and its main functions. 2. Information View: Description of the data and information that the system handles. 3. Deployment and Operational View: Description of the main real world components of the system such as devices, network routers, servers, etc. IOT FUNCTIONAL VIEW: IOT functional view contains eight types, they are: 1. 2. 3. 4. 5. 6. 7. 8. Device and Application functional group Communication functional group IOT Service functional group Virtual entity functional group Process management functional group Service Organization functional group Security functional group Management functional group 1.1. Devices and application functional group: Devices are like phone, machines. 1.2. Communication functional group: The Hop-by-Hop Communication is applicable in the case that devices and messages have to traverse the mesh from node-to-node (hop-by-hop) until they reach a gateway node which forwards the message (if needed) further to the Internet. This FC has two main interfaces: one “southbound” to/from the actual radio on the device, and one “northbound” to/from the Network FC in the Communication FG. 1.2 . IOT Service functional group: The IoT Service FC is a collection of service implementations, which interface the related and associated Resources. For a Sensor type of a Resource, the IoT Service FC includes Services that receive requests from a User and returns the Sensor Resource value in synchronous or asynchronous (e.g. subscription/notification) fashion. The IoT Service Resolution FC contains the necessary functions to realize a directory of IoT Services that allows dynamic management of IoT Service descriptions and discovery/lookup/resolution of IoT Services by other Active Digital Artifacts. 1.3 . Virtual entity functional group: The Virtual Entity FG contains functions that support the interactions between Users and Physical Things through Virtual Entity services. An example of such an interaction is the query to an IoT system of the form 1.4 . Process management functional group: It consists of two FCs: The Process Modelling FC provides that right tools for modelling a business process that utilises IoT-related services. The Process Execution FC contains the execution environment of the process models created by the Process Modelling FC and executes the created processes by utilising the Service Organisation FG in order to resolve high-level application requirements to specific IoT services 1.5 Service Organization functional group: The Service Composition FC manages the descriptions and execution environment of complex services consisting of simpler dependent services. An example of a complex composed service is a service offering the average of the values coming from a number of simple Sensor Services 1.6 Security Functional group The Identity Management FC manages the different identities of the involved Services or Users in an IoT system The The Authentication FC verifies the identity of a User and creates an assertion upon successful verification. verifies the identity of a User and creates an assertion upon successful verification. The Authorization FC manages and enforces access control policies. It provides services to manage policies (CUD), as well as taking decisions and enforcing them regarding access rights of restricted resources. The Key Exchange & Management is used for setting up the necessary security keys between two communicating entities in an IoT system. 1.7 Management functional group The Configuration FC maintains the configuration of the FCs and the Devices in an IoT system. The component collects the current configuration of all the FCs and devices, stores it in a historical database, and compares current and historical configurations. The Fault FC detects, logs, isolates, and corrects system-wide faults if possible. This means that individual component fault reporting triggers fault diagnosis and fault recovery procedures in the Fault FC.The component collects the current configuration of all the FCs and devices, stores it in a historical database, and compares current and historical configurations. The Member FC manages membership information about the relevant entities in an IoT system. The State FC is similar to the Configuration FC, and collects and logs state information from the current FCs, IOT INFORMATION VIEW: The pieces of information handled by an IoT system Virtual Entity context information, i.e. the attributes (simple or complex) as represented by parts of the IoT Information model. IoT Service output itself is another important part of information generated by an IoT system. For example, Sensor or a Tag Service. Virtual Entity descriptions in general, which contain not only the attributes coming from IoT Devices (e.g. ownership information). Virtual Entity Associations with other Virtual Entities (e.g. Room #12 is on floor#7) Resource Descriptions –> type of resource (e.g. sensor), identity, associated Services, and Devices. Device Descriptions –> device capabilities (e.g. sensors, radios). Descriptions of Composed Services –> the model of how a complex service is composed of simpler services. IoT Business Process Model describes –> the steps of a business process utilizing other IoT-related services. Management information such as state information from operational FCs used for fault/performance purposes, configuration snapshots, reports, membership information, etc. IOT DEPLOYMENT AND OPERATIONAL VIEW: ARCHITECTURE OF IOT: Overall technological advances have contributed to the fact that electronic and other devices become smarter with the ability to produce a large amount of data. In addition, the networking of computers and the Internet has enabled data exchange in both local and Geo-global environments. From the real-world perspective, including elements of use by ordinary observers such as vehicles, trains, planes, lights, clocks, parking garages … appears a common denominator in the world of smart devices and it’s called the Internet of Things (IoT). It keeps the basic idea of connecting all devices to each other. Internet of things can be understood as the natural evolution of the web because it connects information technology and many other operational technologies. This technology connects more than ordinary devices – it connects all devices that contain such a collection of sensors or any device that generates digital data including humans as an overall data producer. By connecting and networking on a shared thread, the Internet of Things is becoming a based machine that uses data streams as its fuel to build a novel ecosystem based on a few elements. Things include all sorts of existing devices that are able to produce data directly or by transforming an analog device signal into useful digital data from. Furthermore, within the ecosystem, things are actually virtual copies of objects made up of different forms of data. Data are digital representation of the various physical forms, objects and even minds thus enabled to be exchangeable, processed by machines and converted into useful information used by human beings as intelligent decisions. Humans as end node data producers and connected to the Internet become an active actor of the IoT ecosystem by leveraging process of data producing, transforming and sharing. Processes as a common connectivity and communication descriptor lead us to the overall IoT ecosystem which is able to ingest data autonomously and act as much as self-configured structure. By representing physical objects and processes by its virtual copies, the IoT ecosystem is limited by a level of fragmentation. Since this is an anomaly, even the ecosystem must be overcome in some way. It is also necessary to allow unhindered data flow and, therefore, the evaluation of the events in the system of independent decisionmaking. For this, it is necessary to define the structure, i.e. the rules of behavior and functioning of the elements within the IoT ecosystem. Since all of this already coincides and is functionally expressed through already existing technological postulates, it is easiest to define all this through a unique, i.e. the reference architecture of the IoT ecosystem. The process of forming the reference architecture of the IoT ecosystem is not at all simple. The reason for this is the high dynamism of the elements inside the system, as well as the rapid conglomeration of new solutions in terms of data processing throughout the entire cycle. In addition, the integration of artificial intelligence into building elements leads to a greater degree of activity and the occurrence of events that can be independently triggered and controlled within the system. This increases the need for efficient scaling of processes and the participation of all other information-science actors within the ecosystem. In the professional literature and also in practice, there is a more diverse review of the reference architecture of the IoT ecosystem. Starting from those proposed by various equipment manufacturers, IoT elements, platforms of both conventional IoT systems and industrial IoT, there are also references architectures proposed by various consortia and official technical-scientific bodies within governments and intergovernmental organizations. From this perspective, considering the transformation of existing business processes into the active IoT ecosystem, only some views and perspectives will be discussed without a deeper analysis of all the reference architecture and below are some simplified views of the reference architecture reviews from the software development perspective within the IoT ecosystem. The Layers of the IoT Architecture Conventional Architecture One of the basic and simplified models of the reference architecture is the so-called Conventional IoT architectural model – Three layer IoT Architecture. Perception layer belongs to the world of sensors, actuators and smart devices. At this level, data production is done. In addition to the active and passive components in this layer, the so-called “edge elements” which, along with “Things” are data producers of the IoT ecosystem. Also, communication from this Layer to the outside world is directed to the cloud environment and is managed using standard network infrastructure as well as localized RF – radio frequency networks. Network layer covered the area of gateways and routers. Here are most elements of the IoT ecosystem – physical devices or software program between clouds and controllers, sensors and smart devices. Their role is also to discover, i.e. detects intelligent devices in the perception layer and translates them into the network and establish coordination with the applications. If they are hardware devices, they are mostly Plug & Run devices with a simple configuration via a web interface. In some descriptions this layer is also called a Transport layer. Application layer is a part of the cloud and servers. Functionally, it’s usually some of Cloud services like AVS or Google Cloud, server farms, or even a local remote server company (on premise). The application layer also includes powerful servers and databases that allow large IoT applications to easily integrate, use spanking data storage services with high-speed data processing. The data thus available are easy to filter, build analytics, and API’s user-friendliness. The benefit of this is reflected in an improved and more advanced business logic. In addition, the security of the IoT ecosystem itself with advanced warning systems and real-time monitoring increases. Support layer was added to the list later as a necessity to give more effective and transparent communication between the application layer and networking layer as contains the services by using APIs. Five layer IoT Architecture Another IoT architectural model, is built as an extension of three layer approach. Two more layers are added: a Business and a Processing layer. With two new layers, IoT architecture still belongs to cloud-centric based architectural model. It turns out that most of the operations or data transfer and processing are performed on cloud or remote servers. The introduction of a business layer as a top layer is justified by the multifaceted user requirements. The complexity of the business logic in the process of creating the IoT system has sidelined the process of data management in the application layer so that the coordination of business logic is shifted to the new layer. This has led to more stable architecture in terms of the sustainability in perception of connecting different technologies and diverse business areas. An important element of improving the IoT ecosystem at the architectural level was achieved by introducing the processing layer. As data production increased, IoT systems became cumbersome and difficult to filter data. The layer is often processed, i.e. filtering mass sets of data and data from the Big Data category, in such a way that the processing layer can be found at more than one point within the IoT ecosystem, which leads to resource optimization and more efficient processing and filtering of large amounts of data which is very important for realizing real-time processing as an important factor of efficiency. Seven layer IoT architecture Seven layers of IoT architecture is the one most commonly used by users (referred by) when attempting to explain IoT ecosystem appearance and its structure. The things – in order to realize one IoT environment, i.e. the ecosystem needs to have a variety of devices, sensors and controllers that enable their interconnection. This also means that the end point of an IoT system must have connected devices – besides standard sensors, the actuators also include smartphones, microcontrollers, computers, etc. Layer two – Connectivity/Edge represents the environment and the place where all connections are made before the exchange of data within the IoT ecosystem. It defines all communication protocols, and establishes a network for Edge computing. Therefore, this type of architecture tells us that this is a distributed architecture and that data are processed on the edge of the network. The third layer, global infrastructure, is usually a layer that relies on cloud infrastructure. This is because most IoT solutions rely on the integration of cloud services. Observed from the business perspective, this is an inevitable solution in recent times because the cloud provides a complete upgrade to the customer’s perspective. The fourth layer, the data ingestion, the data entry layer. This is inevitably thought of Big Data, as well as the cleansing and data store. Also, data streaming processes are present in this layer as a building element of data ingestion. Layer five belongs to the data analysis. This is of course related to the processing of data in order to prepare the report, data mining, the implementation of machine learning, etc. In the sixth layer, the so-called application layer, user applications is stored depends on the purpose and needs of the user. Different context-elements are also thing-specific and it is therefore necessary to have a defined application layer, otherwise they cannot be standardized within the IoT ecosystem. On the other hand, this means that this layer is where the integration of users and objects from the lowest layer of architecture takes place. In some studies on the IoT architecture, this layer is also called application integration layer where the same layer can be viewed as a service layer with the implementation of the UI at the top. The seventh layer is represented by people and processes. This includes all business entities as consortium of IoT ecosystems and, at the same time, the actors involved in decision making on the basis of data obtained from the IoT ecosystem, with the help of all the structures that were previously mentioned in architecture. Real-World Design Constraints Devices and Networks: The devices that form networks in the M2M Area Network domain must be selected, or designed, with certain functionality suitable to IoT applications. The devices must have an energy source (e.g. batteries), computational capability (e.g. an MCU), appropriate communications interface (e.g. a Radio Frequency Integrated Circuit (RFIC) and front end RF circuitry), memory (program and data), and sensing (and/or actuation) capability. These must be integrated in such a way that the functional requirements of the desired application can be satisfied with additional nonfunctional requirements Functional Requirements: 1. Specific sensing and actuating capabilities 2. Sensing principle and data requirements: Sometimes continuous sampling of sensing data is required. For some applications, sampling after specific intervals is required. 3. The parameters like higher network throughput, data loss, energy use, etc are decided based on sensing principle. Sensing and communications field: The sensing field is to be considered for sensing in local area or distributed sensing. The distance between sensing points is also important factor to be considered. The physical environment has an implication on the communications technologies selected and the reliability of the system in operation thereafter. Devices must be placed in close enough proximity to communicate. Where the distance is too great, routing devices may be necessary. Programming and embedded intelligence: Devices in the IoT are heterogeneous such as various computational architectures, including MCUs (8-, 16-,32bit, ARM, 8051, RISC, Intel, etc.), signal conditioning (e.g. ADC), and memory (ROM, S/F/D) RAM, etc.), communications media, peripheral components (sensors, actuators, buttons, screens, LEDs), etc. In every case, an application programmer must consider the hardware selected or designed, and its capabilities. Application-level logic decides the sampling rate of the sensor, the local processing performed on sensor readings, the transmission schedule (or reporting rate), and the management of the communications protocol stack, among other things. The programmers have to reconfigure and reprogram devices in case of change in devices in IoT application. Power: Power is essential for any embedded or IoT device. Depending on the application, power may be provided by the mains, batteries, or hybrid power sources. Power requirements of the application are modeled prior to deployment. This allows the designer to estimate the cost of maintenance over time. Gateway: Gateway devices or proxies are selected according to need of data transitions. Nonfunctional requirements: The non-functional requirements are technical and non-technical. 1. Regulations: • For applications that require placing nodes in public places, prior permissions are important. • Radio Frequency (RF) regulations limit the power with which transmitters can broadcast. 2. Ease of use, installation, maintenance, accessibility: • This relates to positioning, placement, site surveying, programming, and physical accessibility of devices for maintenance purposes. 3. Physical constraints: • Integration of additional electronics into existing system • Suitable packaging • Kind and size of antenna • Type of power supply Financial cost: Financial cost considerations are as follows: • Component Selection: Typically, the use of these devices in the M2M Area Network domain is to reduce the overall cost burden. However, there are research and development costs likely to be incurred for each individual application in the IoT that requires device development or integration. Developing devices in small quantities is expensive. • Integrated Device Design: Once the energy, sensors, actuators, computation, memory, power, connectivity, physical, and other functional and nonfunctional requirements are considered, it is likely that an integrated device must be produced. Data representation and visualization: Each IoT application has an optimal visual representation of the data and the system. Data that is generated from heterogeneous systems has heterogeneous visualization requirements. There are currently no satisfactory standard data representation and storage methods that satisfy all of the potential IoT applications. IoT on Industrial Automation Internet of things is proving to be a game changer for many automation companies. Industrial automation companies utilize IoT solutions can realize new advantages. The Internet of Things (IoT) assists to generate new technologies to resolve problems, improve operations and enhance productivity. The IoT can be described as the connection of only known electronic devices using Internet ‘data plumbing’ involving Internet Protocol (IP), web services and cloud computing. Impact of IoT on Industrial Automation is very high and it empowers us to utilize tablet computers, smart phones, realistic systems and cloud storage of data and so on. Let us see the effect of Internet of Things (IoT) on Industrial Automation: • Internet of Things (IoT) • Internet of things products • Internet of things devices • IoT Gateway Devices • Industrial IoT Development Kits Internet of Things (IoT) The Internet of Things (IoT) plays an important role in the industrial automation as it is begining to explore and apply IoT concepts and technology. IoT helps to make system well organized and system architectures that are essential, reasonable and flexible. The main aim is to generate cooperative communications and interaction from manufacturing field input or output involving actuators, robotics, analyzers etc to improve flexibility and enhanced manufacturing. Using IoT, the industrial automation has leveraged commercial technologies in extensive applications and these examples involve PLCs replacing edges of relays. Internet of things products Internet of Things is the next large technology turn and it is simply internet connected devices that are able to collect data. Many Internet of Things products are good enough smooth into the patterns of daily life by clarifying routine tasks. IoT products are available in different ways and they can be utilized in various verticals. Using IoT products, business and consumer lives can be more absolute than ever. Internet of things devices Internet of things devices can be utilized in different fields and they may deviate from home automation and functionality of your house. IoT Devices such as smoke detectors, thermostats, smart music systems, smart light bulbs come under this category. On another side, IoT devices are also present in the association with the human body, where we can talk about fitness trackers, smart body scales etc. IoT Gateway Devices IoT Gateway devices behave as a connection bridge between IoT Sensor Network and Cloud Server. IoT Gateway devices are appearing as essential elements in bringing next-generation devices to the IoT. They assist to merge protocols for networking, helps to analyze storage and edge analytics on the data and make possible data flow safely between edge devices and the cloud. Industrial IoT Development Kits Industrial IoT Development Kits produces a complete, high quality design environment for engineers and solution architects to dramatically speed up the growth and delivery of IoT applications. Using these kits, any development/industrial environment can be rapidly revolved into a production set unit. The IoT Development Kit targets a variety of IoT application requirements by supplying a range of various hardware platforms, spanning from very dense, low-power ARM-based designs to strong multi-core, new generation gateways. Machinery Automation In easy terms Machinery automation has been into reality since more than 70 years. The concept is to analyze, activate and control different machineries in various industries. It includes industries such as automobile, textile, agriculture, chemical food and beverages, cement and other infrastructure evolution, manufacturing, shipping, pharmaceutical, transportation and many more. The concept is constantly fulfilling large number of real world use-cases, controlling various levels of challenges and continuously benefiting this generation. Fundamental building blocks of Machinery Automation with IoT are as follows: – Wireless network with ideal connectivity – Cloud storage – Operation center – Data processing – Inventive hardware – Improved sensors network Success calculating criteria’s of machinery automation with IoT arrangement are as follows: – Security – Performance – Efficiency – Scalability and Customization – Renewability – Intelligence and Add-Value – Predictive measurement and analysis – Contribution towards Eco system Advantages – Real time data can save time and money! – It’s Cloud! – Acquire anywhere, anytime and it’s safer! – Develops standardization! – Minimizes downtime – Data integration is secure and visibility is higher – Helps to realize your production processes better > supply better > increase performance > minimizes cost > improve efficiency > scale higher!