3. IOT As Equation
IoT = physical object + actuator, sensor
and controller + internet
3- By Prof. Devyani Vasistha
4. Design Principles of Connected
Devices
Physical Design vs Logical Design
Physical Design: concerned with
Shape and Look i.e. Pleasing
appearance
Industrial Design (Product Design)
UI design
Digital Services
4- By Prof. Devyani Vasistha
5. Calm and Ambient
Technology
Calm vs Ambient
Cheap
Ubicomp: Ubiquatos computing,
Universal computing
Ambient background
Calm technology
Competition
Publicity
Issues
5- By Prof. Devyani Vasistha
6. Ubiquitous Computing
Ubiquitous computing (or "ubicomp")
is a concept in software engineering and
computer science where computing is
made to appear anytime and
everywhere.
In contrast to desktop computing,
ubiquitous computing can occur using
any device, in any location, and in any
format.
6- By Prof. Devyani Vasistha
11. ISSUES
Power
Networking challenges
6LoWPAN
Configuration
User interaction
Technical solutions
Good design
Design decisions
Large context
Complications
Cacophony
Antidote
11- By Prof. Devyani Vasistha
12. Examples
6LoWPAN
Internet protocol
Apple IPod 2001
Portable MP3
ITUNES
ELIEL Saarinen’s maxim on design
12- By Prof. Devyani Vasistha
13. Mark Weiser and john Seely
Brown
Calm technology engages both the
centre and the periphery of our attention
and in fact moves back and fourth
between the two.
Live Wire
Dangling String
13- By Prof. Devyani Vasistha
16. MARK WEISER AND JOHN
SEELY BROWN
“ Not all the technology need to be calm. A
calm video game will get little use; the
point is to be excited. But too much
design focuses on the object itself and
its surface features without regard for
context. We must learn to design for the
periphery so that we can most fully
command technology without being
dominated by it.”
16- By Prof. Devyani Vasistha
17. NOT ALL TECHNOLOGY NEED
TO BE CALM
Twitter
Blows bubbles
Split-flap displays
Dot matrix LED Display
Olly indicater
Glanceable displays
Bikemap
17- By Prof. Devyani Vasistha
18. MAGIC AS METAPHOR
Revolutionary aspects of technology by
Technology blogger Venkatesh Rao.
Manufactured narmalcy field
A technology has to make its way inside the
manufactured normalcy field.
At the same time a technology does not stretch
the boundaries of their particular normalcy field
too far, even if the underlying technology being
employed is a huge leap ahead of the norm.
E.g.
• (From) Mobile Phone (To) Portable Internet
Terminal
• (From)Computer as Glorified typewriter (To) GUI
Desktop
18- By Prof. Devyani Vasistha
19. Enchanted Effects in Devices
From idea of WhereDial of Harry
Potter to GPS
From idea of enchanted Mirrors of
Snow White Tale to Single-Pixel
Display
Enchanted Umbrella
The danger of trying use of magic to
reach beyond our capabilities enforces
need of more secure and trust worthy
control interfaces in devices to
safeguard any data they gather.
19- By Prof. Devyani Vasistha
20. Privacy
Privacy: The designers of IOT Devices
need to work for the unauthorised
access of sensors or device monitoring
and reporting data to the internet.
Keeping Secrets: In some area of
application, Leak of personal information
of a user can be dangerous and will
need measures to avoid it.
Example: Parking app for smart phone
with Find My Car Option.
20- By Prof. Devyani Vasistha
21. Some more examples of
Privacy issues
Information requested from server
through app can be a simple
unencrypted web request. (... According
to Troy Hunt)
www.troyhunt.com/2011/09/find-my-car-
find-your-car-find.html
A chunk of requested data with a raft of
addition information.
“ Don’t share more than you need to
provide the service.” 21- By Prof. Devyani Vasistha
22. “ The best way to keep a secret is to never
have it. ”-- Julian Assange (fouder of
WikiLeaks)
www.pbs.org/wgbh/pages/frontline/wikileaks/i
nterviews/julian-assange.html
i.e. Avoiding gathering or storing of data at
first place is removal of worries of
accidental disclosing of data.
Example
1. Avoid storing confidential data at place
like storing Password rather recreate new
password if forgotten.
2. Hash Cryptographic Technique: One-way
22- By Prof. Devyani Vasistha
23. Whose Data is it anyway?
Public Data
Private Data
Example: A Camera installed at public space
by a Company.
According to Adam Greenfield( A leading
practitioner at Urban Computing) “In a
public space when data is generated by
the public , then they should at least have
equal right to be ware of, and have access
to, that data. “
Point 67 at
https://speedbird.wordpress.com/2012/12/0
3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
24. Web Thinking for Connected
Devices
Aim behind Internet of Things should to
get the mindset of the web and create
devices which are of the web rather than
those which just exist on the web.
Of the web vs On the web.
Strict vs Lenient
Postel’s law
Interact with other services
Small Pieces, Loosely Joined
First-Class Citizens on the Internet
Graceful Degradation
24- By Prof. Devyani Vasistha
25. Small Pieces, Loosely Joined
If you are building all the components of
a service, it makes sense not to couple
them too tightly.
Example: Internet is a collection of
services and machines controlled from a
central location, is an example of small
pieces, loosely joined.
Architects of a Service: where each
piece should be designed to do one thing
well and not rely too much on tight
integration with separate component it
uses. 25- By Prof. Devyani Vasistha
26. Small Pieces, Loosely Joined
More Generalised Component: Try to
make components more generalised so
that they can serve other systems which
requires similar fuctions.
Reuse and Repurpose: Generalised
component will help to reuse and
repurpose the components to build new
capabilities.
Existing Standard and Protocol: Use
existing standard and protocols as much
as possible than inventing your own.
http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
27. First-Class Citizens on the
Internet
First-Class: One that has an identity
independent on any other item.
First-Class Citizen: Digital Information
is the First-Class Citizen in the
networked environment.
Securing the IoT by treating devices as
first-class citizens is the only approach
that takes into account the intricate, and
ever-growing web of relationships
between devices, people, and services.
27- By Prof. Devyani Vasistha
28. How can IoT devices of all kinds be made
secure in a way that ensures consumer’s
privacy and protection from malicious actors?
The answer lies in a simple, unified
approach, one that can ensure that
connected devices are as secure as
possible: they must be treated as first-class
citizens.
Similar to how human identity is verified
through either a passport, a driver’s licence,
or an ID card depending on the situation,
treating a device as a first-class citizen
means requiring the same level of identity
authentication.
These credentials can be baked into the
device at the manufacturing stage, and used
to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
29. Graceful Degradation
Graceful degradation is the ability of a
computer, machine, electronic system or
network to maintain limited functionality
even when a large portion of it has been
destroyed or rendered inoperative.
The purpose of graceful degradation is to
prevent catastrophic failure.
Ideally, even the simultaneous loss of
multiple components does not cause
downtime in a system with this feature.
In graceful degradation, the operating
efficiency or speed declines gradually as an
increasing number of components fail.
29- By Prof. Devyani Vasistha
31. Affordances
“ Affordances provide strong clues to the
operations of things . Plates are for
pushing. Knobs are for turning. Slots are
for inserting things into. Balls are for
throwing or bouncing. When affordances
are taken advantage of, the user knows
what to do just by looking: no picture,
label, or instruction is required. Complex
things may require explanation, but
simple things should not. When simple
things need pictures, labels, or
instructions, the design has failed. “ –
The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
32. Affordances
Affordance is a fundamental aspect of
interaction design.
Be it software design or physical object
design or even business design, the
designers explicitly or implicitly think
about how the users and actors of the
system behave/perform based on
various influencing factors (stimuli).
Depending upon the specific application
of the concept and the context, the path
to arriving at the right set of affordances
could vary.
32- By Prof. Devyani Vasistha
33. Affordances
When affordances are done right, the
product/service/business process
(referred to as P-S-BP, hence forth) is a
pleasure to work with.
When done poorly, the usability and
adoption of the P-S-BP suffers greatly.
33- By Prof. Devyani Vasistha
34. Affordances
Example: Digital transformation and
IOT re-design the user experiences
such as:
A retail bank may develop a mobile app
that provides a unified, consistent,
Omni-channel across all their business
lines that this customer does business
with.
A retail store may seamlessly blend
mobile, desktop and in-store experience
of the customer as they move across 34- By Prof. Devyani Vasistha