SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Internet
Of
Things
- By Prof. Devyani Vasistha
Design Principles
of Connected
Devices
IoT
2- By Prof. Devyani Vasistha
IOT As Equation
 IoT = physical object + actuator, sensor
and controller + internet
3- By Prof. Devyani Vasistha
Design Principles of Connected
Devices
 Physical Design vs Logical Design
 Physical Design: concerned with
Shape and Look i.e. Pleasing
appearance
 Industrial Design (Product Design)
 UI design
 Digital Services
4- By Prof. Devyani Vasistha
Calm and Ambient
Technology
 Calm vs Ambient
 Cheap
 Ubicomp: Ubiquatos computing,
Universal computing
 Ambient background
 Calm technology
 Competition
 Publicity
Issues
5- By Prof. Devyani Vasistha
Ubiquitous Computing
 Ubiquitous computing (or "ubicomp")
is a concept in software engineering and
computer science where computing is
made to appear anytime and
everywhere.
 In contrast to desktop computing,
ubiquitous computing can occur using
any device, in any location, and in any
format.
6- By Prof. Devyani Vasistha
Internet Relay Chat
7- By Prof. Devyani Vasistha
8- By Prof. Devyani Vasistha
9- By Prof. Devyani Vasistha
10- By Prof. Devyani Vasistha
ISSUES
 Power
 Networking challenges
 6LoWPAN
 Configuration
 User interaction
 Technical solutions
 Good design
 Design decisions
 Large context
 Complications
 Cacophony
 Antidote
11- By Prof. Devyani Vasistha
Examples
 6LoWPAN
 Internet protocol
 Apple IPod 2001
 Portable MP3
 ITUNES
 ELIEL Saarinen’s maxim on design
12- By Prof. Devyani Vasistha
Mark Weiser and john Seely
Brown
 Calm technology engages both the
centre and the periphery of our attention
and in fact moves back and fourth
between the two.
 Live Wire
 Dangling String
13- By Prof. Devyani Vasistha
Calm Technology
14- By Prof. Devyani Vasistha
Calm Technology
15- By Prof. Devyani Vasistha
MARK WEISER AND JOHN
SEELY BROWN
“ Not all the technology need to be calm. A
calm video game will get little use; the
point is to be excited. But too much
design focuses on the object itself and
its surface features without regard for
context. We must learn to design for the
periphery so that we can most fully
command technology without being
dominated by it.”
16- By Prof. Devyani Vasistha
NOT ALL TECHNOLOGY NEED
TO BE CALM
 Twitter
 Blows bubbles
 Split-flap displays
 Dot matrix LED Display
 Olly indicater
 Glanceable displays
 Bikemap
17- By Prof. Devyani Vasistha
MAGIC AS METAPHOR
 Revolutionary aspects of technology by
Technology blogger Venkatesh Rao.
 Manufactured narmalcy field
 A technology has to make its way inside the
manufactured normalcy field.
 At the same time a technology does not stretch
the boundaries of their particular normalcy field
too far, even if the underlying technology being
employed is a huge leap ahead of the norm.
 E.g.
• (From) Mobile Phone (To) Portable Internet
Terminal
• (From)Computer as Glorified typewriter (To) GUI
Desktop
18- By Prof. Devyani Vasistha
Enchanted Effects in Devices
 From idea of WhereDial of Harry
Potter to GPS
 From idea of enchanted Mirrors of
Snow White Tale to Single-Pixel
Display
 Enchanted Umbrella
 The danger of trying use of magic to
reach beyond our capabilities enforces
need of more secure and trust worthy
control interfaces in devices to
safeguard any data they gather.
19- By Prof. Devyani Vasistha
Privacy
 Privacy: The designers of IOT Devices
need to work for the unauthorised
access of sensors or device monitoring
and reporting data to the internet.
 Keeping Secrets: In some area of
application, Leak of personal information
of a user can be dangerous and will
need measures to avoid it.
 Example: Parking app for smart phone
with Find My Car Option.
20- By Prof. Devyani Vasistha
Some more examples of
Privacy issues
 Information requested from server
through app can be a simple
unencrypted web request. (... According
to Troy Hunt)
 www.troyhunt.com/2011/09/find-my-car-
find-your-car-find.html
 A chunk of requested data with a raft of
addition information.
“ Don’t share more than you need to
provide the service.” 21- By Prof. Devyani Vasistha
“ The best way to keep a secret is to never
have it. ”-- Julian Assange (fouder of
WikiLeaks)
www.pbs.org/wgbh/pages/frontline/wikileaks/i
nterviews/julian-assange.html
i.e. Avoiding gathering or storing of data at
first place is removal of worries of
accidental disclosing of data.
Example
1. Avoid storing confidential data at place
like storing Password rather recreate new
password if forgotten.
2. Hash Cryptographic Technique: One-way
22- By Prof. Devyani Vasistha
Whose Data is it anyway?
 Public Data
 Private Data
Example: A Camera installed at public space
by a Company.
According to Adam Greenfield( A leading
practitioner at Urban Computing) “In a
public space when data is generated by
the public , then they should at least have
equal right to be ware of, and have access
to, that data. “
Point 67 at
https://speedbird.wordpress.com/2012/12/0
3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
Web Thinking for Connected
Devices
 Aim behind Internet of Things should to
get the mindset of the web and create
devices which are of the web rather than
those which just exist on the web.
 Of the web vs On the web.
 Strict vs Lenient
 Postel’s law
 Interact with other services
 Small Pieces, Loosely Joined
 First-Class Citizens on the Internet
 Graceful Degradation
24- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 If you are building all the components of
a service, it makes sense not to couple
them too tightly.
 Example: Internet is a collection of
services and machines controlled from a
central location, is an example of small
pieces, loosely joined.
 Architects of a Service: where each
piece should be designed to do one thing
well and not rely too much on tight
integration with separate component it
uses. 25- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 More Generalised Component: Try to
make components more generalised so
that they can serve other systems which
requires similar fuctions.
 Reuse and Repurpose: Generalised
component will help to reuse and
repurpose the components to build new
capabilities.
 Existing Standard and Protocol: Use
existing standard and protocols as much
as possible than inventing your own.
 http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
First-Class Citizens on the
Internet
 First-Class: One that has an identity
independent on any other item.
 First-Class Citizen: Digital Information
is the First-Class Citizen in the
networked environment.
 Securing the IoT by treating devices as
first-class citizens is the only approach
that takes into account the intricate, and
ever-growing web of relationships
between devices, people, and services.
27- By Prof. Devyani Vasistha
How can IoT devices of all kinds be made
secure in a way that ensures consumer’s
privacy and protection from malicious actors?
 The answer lies in a simple, unified
approach, one that can ensure that
connected devices are as secure as
possible: they must be treated as first-class
citizens.
 Similar to how human identity is verified
through either a passport, a driver’s licence,
or an ID card depending on the situation,
treating a device as a first-class citizen
means requiring the same level of identity
authentication.
 These credentials can be baked into the
device at the manufacturing stage, and used
to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
Graceful Degradation
 Graceful degradation is the ability of a
computer, machine, electronic system or
network to maintain limited functionality
even when a large portion of it has been
destroyed or rendered inoperative.
 The purpose of graceful degradation is to
prevent catastrophic failure.
 Ideally, even the simultaneous loss of
multiple components does not cause
downtime in a system with this feature.
 In graceful degradation, the operating
efficiency or speed declines gradually as an
increasing number of components fail.
29- By Prof. Devyani Vasistha
30- By Prof. Devyani Vasistha
Affordances
“ Affordances provide strong clues to the
operations of things . Plates are for
pushing. Knobs are for turning. Slots are
for inserting things into. Balls are for
throwing or bouncing. When affordances
are taken advantage of, the user knows
what to do just by looking: no picture,
label, or instruction is required. Complex
things may require explanation, but
simple things should not. When simple
things need pictures, labels, or
instructions, the design has failed. “ –
The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
Affordances
 Affordance is a fundamental aspect of
interaction design.
 Be it software design or physical object
design or even business design, the
designers explicitly or implicitly think
about how the users and actors of the
system behave/perform based on
various influencing factors (stimuli).
 Depending upon the specific application
of the concept and the context, the path
to arriving at the right set of affordances
could vary.
32- By Prof. Devyani Vasistha
Affordances
 When affordances are done right, the
product/service/business process
(referred to as P-S-BP, hence forth) is a
pleasure to work with.
 When done poorly, the usability and
adoption of the P-S-BP suffers greatly.
33- By Prof. Devyani Vasistha
Affordances
 Example: Digital transformation and
IOT re-design the user experiences
such as:
 A retail bank may develop a mobile app
that provides a unified, consistent,
Omni-channel across all their business
lines that this customer does business
with.
 A retail store may seamlessly blend
mobile, desktop and in-store experience
of the customer as they move across 34- By Prof. Devyani Vasistha
Affordances
35- By Prof. Devyani Vasistha
36- By Prof. Devyani Vasistha
37- By Prof. Devyani Vasistha
38- By Prof. Devyani Vasistha
THANK YOU.
- DEVYANI VASISTHA
All Pictures used in presentation are taken
from Google.
- By Prof. Devyani Vasistha 39

Weitere ähnliche Inhalte

Was ist angesagt?

IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesPrakash Honnur
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoTAbhishek Das
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) ReportHitesh Kumar Singh
 
Internet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIInternet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIArti Parab Academics
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfMD.ANISUR RAHMAN
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxMeghaShree665225
 

Was ist angesagt? (20)

security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT Levels and Deployment Templates
IoT Levels and Deployment TemplatesIoT Levels and Deployment Templates
IoT Levels and Deployment Templates
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
 
Internet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit IIInternet of Things, TYBSC IT, Semester 5, Unit II
Internet of Things, TYBSC IT, Semester 5, Unit II
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
IOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdfIOT and its communication models and protocols.pdf
IOT and its communication models and protocols.pdf
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 

Ähnlich wie IOT - Design Principles of Connected Devices

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamCLICKNL
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxraju957290
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...LouisFrederickRakoto
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldBrian Pichman
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxAlthafMk2
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfSoonChinFhong
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18Neeraj Gupta
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopClaire Rowland
 

Ähnlich wie IOT - Design Principles of Connected Devices (20)

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon Amsterdam
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ITB - UNIT 5.pdf
ITB - UNIT 5.pdfITB - UNIT 5.pdf
ITB - UNIT 5.pdf
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech Hold
 
Tech trends
Tech trendsTech trends
Tech trends
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
 

Kürzlich hochgeladen

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Kürzlich hochgeladen (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

IOT - Design Principles of Connected Devices

  • 1. Internet Of Things - By Prof. Devyani Vasistha
  • 3. IOT As Equation  IoT = physical object + actuator, sensor and controller + internet 3- By Prof. Devyani Vasistha
  • 4. Design Principles of Connected Devices  Physical Design vs Logical Design  Physical Design: concerned with Shape and Look i.e. Pleasing appearance  Industrial Design (Product Design)  UI design  Digital Services 4- By Prof. Devyani Vasistha
  • 5. Calm and Ambient Technology  Calm vs Ambient  Cheap  Ubicomp: Ubiquatos computing, Universal computing  Ambient background  Calm technology  Competition  Publicity Issues 5- By Prof. Devyani Vasistha
  • 6. Ubiquitous Computing  Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.  In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. 6- By Prof. Devyani Vasistha
  • 7. Internet Relay Chat 7- By Prof. Devyani Vasistha
  • 8. 8- By Prof. Devyani Vasistha
  • 9. 9- By Prof. Devyani Vasistha
  • 10. 10- By Prof. Devyani Vasistha
  • 11. ISSUES  Power  Networking challenges  6LoWPAN  Configuration  User interaction  Technical solutions  Good design  Design decisions  Large context  Complications  Cacophony  Antidote 11- By Prof. Devyani Vasistha
  • 12. Examples  6LoWPAN  Internet protocol  Apple IPod 2001  Portable MP3  ITUNES  ELIEL Saarinen’s maxim on design 12- By Prof. Devyani Vasistha
  • 13. Mark Weiser and john Seely Brown  Calm technology engages both the centre and the periphery of our attention and in fact moves back and fourth between the two.  Live Wire  Dangling String 13- By Prof. Devyani Vasistha
  • 14. Calm Technology 14- By Prof. Devyani Vasistha
  • 15. Calm Technology 15- By Prof. Devyani Vasistha
  • 16. MARK WEISER AND JOHN SEELY BROWN “ Not all the technology need to be calm. A calm video game will get little use; the point is to be excited. But too much design focuses on the object itself and its surface features without regard for context. We must learn to design for the periphery so that we can most fully command technology without being dominated by it.” 16- By Prof. Devyani Vasistha
  • 17. NOT ALL TECHNOLOGY NEED TO BE CALM  Twitter  Blows bubbles  Split-flap displays  Dot matrix LED Display  Olly indicater  Glanceable displays  Bikemap 17- By Prof. Devyani Vasistha
  • 18. MAGIC AS METAPHOR  Revolutionary aspects of technology by Technology blogger Venkatesh Rao.  Manufactured narmalcy field  A technology has to make its way inside the manufactured normalcy field.  At the same time a technology does not stretch the boundaries of their particular normalcy field too far, even if the underlying technology being employed is a huge leap ahead of the norm.  E.g. • (From) Mobile Phone (To) Portable Internet Terminal • (From)Computer as Glorified typewriter (To) GUI Desktop 18- By Prof. Devyani Vasistha
  • 19. Enchanted Effects in Devices  From idea of WhereDial of Harry Potter to GPS  From idea of enchanted Mirrors of Snow White Tale to Single-Pixel Display  Enchanted Umbrella  The danger of trying use of magic to reach beyond our capabilities enforces need of more secure and trust worthy control interfaces in devices to safeguard any data they gather. 19- By Prof. Devyani Vasistha
  • 20. Privacy  Privacy: The designers of IOT Devices need to work for the unauthorised access of sensors or device monitoring and reporting data to the internet.  Keeping Secrets: In some area of application, Leak of personal information of a user can be dangerous and will need measures to avoid it.  Example: Parking app for smart phone with Find My Car Option. 20- By Prof. Devyani Vasistha
  • 21. Some more examples of Privacy issues  Information requested from server through app can be a simple unencrypted web request. (... According to Troy Hunt)  www.troyhunt.com/2011/09/find-my-car- find-your-car-find.html  A chunk of requested data with a raft of addition information. “ Don’t share more than you need to provide the service.” 21- By Prof. Devyani Vasistha
  • 22. “ The best way to keep a secret is to never have it. ”-- Julian Assange (fouder of WikiLeaks) www.pbs.org/wgbh/pages/frontline/wikileaks/i nterviews/julian-assange.html i.e. Avoiding gathering or storing of data at first place is removal of worries of accidental disclosing of data. Example 1. Avoid storing confidential data at place like storing Password rather recreate new password if forgotten. 2. Hash Cryptographic Technique: One-way 22- By Prof. Devyani Vasistha
  • 23. Whose Data is it anyway?  Public Data  Private Data Example: A Camera installed at public space by a Company. According to Adam Greenfield( A leading practitioner at Urban Computing) “In a public space when data is generated by the public , then they should at least have equal right to be ware of, and have access to, that data. “ Point 67 at https://speedbird.wordpress.com/2012/12/0 3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
  • 24. Web Thinking for Connected Devices  Aim behind Internet of Things should to get the mindset of the web and create devices which are of the web rather than those which just exist on the web.  Of the web vs On the web.  Strict vs Lenient  Postel’s law  Interact with other services  Small Pieces, Loosely Joined  First-Class Citizens on the Internet  Graceful Degradation 24- By Prof. Devyani Vasistha
  • 25. Small Pieces, Loosely Joined  If you are building all the components of a service, it makes sense not to couple them too tightly.  Example: Internet is a collection of services and machines controlled from a central location, is an example of small pieces, loosely joined.  Architects of a Service: where each piece should be designed to do one thing well and not rely too much on tight integration with separate component it uses. 25- By Prof. Devyani Vasistha
  • 26. Small Pieces, Loosely Joined  More Generalised Component: Try to make components more generalised so that they can serve other systems which requires similar fuctions.  Reuse and Repurpose: Generalised component will help to reuse and repurpose the components to build new capabilities.  Existing Standard and Protocol: Use existing standard and protocols as much as possible than inventing your own.  http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
  • 27. First-Class Citizens on the Internet  First-Class: One that has an identity independent on any other item.  First-Class Citizen: Digital Information is the First-Class Citizen in the networked environment.  Securing the IoT by treating devices as first-class citizens is the only approach that takes into account the intricate, and ever-growing web of relationships between devices, people, and services. 27- By Prof. Devyani Vasistha
  • 28. How can IoT devices of all kinds be made secure in a way that ensures consumer’s privacy and protection from malicious actors?  The answer lies in a simple, unified approach, one that can ensure that connected devices are as secure as possible: they must be treated as first-class citizens.  Similar to how human identity is verified through either a passport, a driver’s licence, or an ID card depending on the situation, treating a device as a first-class citizen means requiring the same level of identity authentication.  These credentials can be baked into the device at the manufacturing stage, and used to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
  • 29. Graceful Degradation  Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.  The purpose of graceful degradation is to prevent catastrophic failure.  Ideally, even the simultaneous loss of multiple components does not cause downtime in a system with this feature.  In graceful degradation, the operating efficiency or speed declines gradually as an increasing number of components fail. 29- By Prof. Devyani Vasistha
  • 30. 30- By Prof. Devyani Vasistha
  • 31. Affordances “ Affordances provide strong clues to the operations of things . Plates are for pushing. Knobs are for turning. Slots are for inserting things into. Balls are for throwing or bouncing. When affordances are taken advantage of, the user knows what to do just by looking: no picture, label, or instruction is required. Complex things may require explanation, but simple things should not. When simple things need pictures, labels, or instructions, the design has failed. “ – The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
  • 32. Affordances  Affordance is a fundamental aspect of interaction design.  Be it software design or physical object design or even business design, the designers explicitly or implicitly think about how the users and actors of the system behave/perform based on various influencing factors (stimuli).  Depending upon the specific application of the concept and the context, the path to arriving at the right set of affordances could vary. 32- By Prof. Devyani Vasistha
  • 33. Affordances  When affordances are done right, the product/service/business process (referred to as P-S-BP, hence forth) is a pleasure to work with.  When done poorly, the usability and adoption of the P-S-BP suffers greatly. 33- By Prof. Devyani Vasistha
  • 34. Affordances  Example: Digital transformation and IOT re-design the user experiences such as:  A retail bank may develop a mobile app that provides a unified, consistent, Omni-channel across all their business lines that this customer does business with.  A retail store may seamlessly blend mobile, desktop and in-store experience of the customer as they move across 34- By Prof. Devyani Vasistha
  • 35. Affordances 35- By Prof. Devyani Vasistha
  • 36. 36- By Prof. Devyani Vasistha
  • 37. 37- By Prof. Devyani Vasistha
  • 38. 38- By Prof. Devyani Vasistha
  • 39. THANK YOU. - DEVYANI VASISTHA All Pictures used in presentation are taken from Google. - By Prof. Devyani Vasistha 39