SlideShare a Scribd company logo
1 of 39
Internet
Of
Things
- By Prof. Devyani Vasistha
Design Principles
of Connected
Devices
IoT
2- By Prof. Devyani Vasistha
IOT As Equation
 IoT = physical object + actuator, sensor
and controller + internet
3- By Prof. Devyani Vasistha
Design Principles of Connected
Devices
 Physical Design vs Logical Design
 Physical Design: concerned with
Shape and Look i.e. Pleasing
appearance
 Industrial Design (Product Design)
 UI design
 Digital Services
4- By Prof. Devyani Vasistha
Calm and Ambient
Technology
 Calm vs Ambient
 Cheap
 Ubicomp: Ubiquatos computing,
Universal computing
 Ambient background
 Calm technology
 Competition
 Publicity
Issues
5- By Prof. Devyani Vasistha
Ubiquitous Computing
 Ubiquitous computing (or "ubicomp")
is a concept in software engineering and
computer science where computing is
made to appear anytime and
everywhere.
 In contrast to desktop computing,
ubiquitous computing can occur using
any device, in any location, and in any
format.
6- By Prof. Devyani Vasistha
Internet Relay Chat
7- By Prof. Devyani Vasistha
8- By Prof. Devyani Vasistha
9- By Prof. Devyani Vasistha
10- By Prof. Devyani Vasistha
ISSUES
 Power
 Networking challenges
 6LoWPAN
 Configuration
 User interaction
 Technical solutions
 Good design
 Design decisions
 Large context
 Complications
 Cacophony
 Antidote
11- By Prof. Devyani Vasistha
Examples
 6LoWPAN
 Internet protocol
 Apple IPod 2001
 Portable MP3
 ITUNES
 ELIEL Saarinen’s maxim on design
12- By Prof. Devyani Vasistha
Mark Weiser and john Seely
Brown
 Calm technology engages both the
centre and the periphery of our attention
and in fact moves back and fourth
between the two.
 Live Wire
 Dangling String
13- By Prof. Devyani Vasistha
Calm Technology
14- By Prof. Devyani Vasistha
Calm Technology
15- By Prof. Devyani Vasistha
MARK WEISER AND JOHN
SEELY BROWN
“ Not all the technology need to be calm. A
calm video game will get little use; the
point is to be excited. But too much
design focuses on the object itself and
its surface features without regard for
context. We must learn to design for the
periphery so that we can most fully
command technology without being
dominated by it.”
16- By Prof. Devyani Vasistha
NOT ALL TECHNOLOGY NEED
TO BE CALM
 Twitter
 Blows bubbles
 Split-flap displays
 Dot matrix LED Display
 Olly indicater
 Glanceable displays
 Bikemap
17- By Prof. Devyani Vasistha
MAGIC AS METAPHOR
 Revolutionary aspects of technology by
Technology blogger Venkatesh Rao.
 Manufactured narmalcy field
 A technology has to make its way inside the
manufactured normalcy field.
 At the same time a technology does not stretch
the boundaries of their particular normalcy field
too far, even if the underlying technology being
employed is a huge leap ahead of the norm.
 E.g.
• (From) Mobile Phone (To) Portable Internet
Terminal
• (From)Computer as Glorified typewriter (To) GUI
Desktop
18- By Prof. Devyani Vasistha
Enchanted Effects in Devices
 From idea of WhereDial of Harry
Potter to GPS
 From idea of enchanted Mirrors of
Snow White Tale to Single-Pixel
Display
 Enchanted Umbrella
 The danger of trying use of magic to
reach beyond our capabilities enforces
need of more secure and trust worthy
control interfaces in devices to
safeguard any data they gather.
19- By Prof. Devyani Vasistha
Privacy
 Privacy: The designers of IOT Devices
need to work for the unauthorised
access of sensors or device monitoring
and reporting data to the internet.
 Keeping Secrets: In some area of
application, Leak of personal information
of a user can be dangerous and will
need measures to avoid it.
 Example: Parking app for smart phone
with Find My Car Option.
20- By Prof. Devyani Vasistha
Some more examples of
Privacy issues
 Information requested from server
through app can be a simple
unencrypted web request. (... According
to Troy Hunt)
 www.troyhunt.com/2011/09/find-my-car-
find-your-car-find.html
 A chunk of requested data with a raft of
addition information.
“ Don’t share more than you need to
provide the service.” 21- By Prof. Devyani Vasistha
“ The best way to keep a secret is to never
have it. ”-- Julian Assange (fouder of
WikiLeaks)
www.pbs.org/wgbh/pages/frontline/wikileaks/i
nterviews/julian-assange.html
i.e. Avoiding gathering or storing of data at
first place is removal of worries of
accidental disclosing of data.
Example
1. Avoid storing confidential data at place
like storing Password rather recreate new
password if forgotten.
2. Hash Cryptographic Technique: One-way
22- By Prof. Devyani Vasistha
Whose Data is it anyway?
 Public Data
 Private Data
Example: A Camera installed at public space
by a Company.
According to Adam Greenfield( A leading
practitioner at Urban Computing) “In a
public space when data is generated by
the public , then they should at least have
equal right to be ware of, and have access
to, that data. “
Point 67 at
https://speedbird.wordpress.com/2012/12/0
3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
Web Thinking for Connected
Devices
 Aim behind Internet of Things should to
get the mindset of the web and create
devices which are of the web rather than
those which just exist on the web.
 Of the web vs On the web.
 Strict vs Lenient
 Postel’s law
 Interact with other services
 Small Pieces, Loosely Joined
 First-Class Citizens on the Internet
 Graceful Degradation
24- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 If you are building all the components of
a service, it makes sense not to couple
them too tightly.
 Example: Internet is a collection of
services and machines controlled from a
central location, is an example of small
pieces, loosely joined.
 Architects of a Service: where each
piece should be designed to do one thing
well and not rely too much on tight
integration with separate component it
uses. 25- By Prof. Devyani Vasistha
Small Pieces, Loosely Joined
 More Generalised Component: Try to
make components more generalised so
that they can serve other systems which
requires similar fuctions.
 Reuse and Repurpose: Generalised
component will help to reuse and
repurpose the components to build new
capabilities.
 Existing Standard and Protocol: Use
existing standard and protocols as much
as possible than inventing your own.
 http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
First-Class Citizens on the
Internet
 First-Class: One that has an identity
independent on any other item.
 First-Class Citizen: Digital Information
is the First-Class Citizen in the
networked environment.
 Securing the IoT by treating devices as
first-class citizens is the only approach
that takes into account the intricate, and
ever-growing web of relationships
between devices, people, and services.
27- By Prof. Devyani Vasistha
How can IoT devices of all kinds be made
secure in a way that ensures consumer’s
privacy and protection from malicious actors?
 The answer lies in a simple, unified
approach, one that can ensure that
connected devices are as secure as
possible: they must be treated as first-class
citizens.
 Similar to how human identity is verified
through either a passport, a driver’s licence,
or an ID card depending on the situation,
treating a device as a first-class citizen
means requiring the same level of identity
authentication.
 These credentials can be baked into the
device at the manufacturing stage, and used
to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
Graceful Degradation
 Graceful degradation is the ability of a
computer, machine, electronic system or
network to maintain limited functionality
even when a large portion of it has been
destroyed or rendered inoperative.
 The purpose of graceful degradation is to
prevent catastrophic failure.
 Ideally, even the simultaneous loss of
multiple components does not cause
downtime in a system with this feature.
 In graceful degradation, the operating
efficiency or speed declines gradually as an
increasing number of components fail.
29- By Prof. Devyani Vasistha
30- By Prof. Devyani Vasistha
Affordances
“ Affordances provide strong clues to the
operations of things . Plates are for
pushing. Knobs are for turning. Slots are
for inserting things into. Balls are for
throwing or bouncing. When affordances
are taken advantage of, the user knows
what to do just by looking: no picture,
label, or instruction is required. Complex
things may require explanation, but
simple things should not. When simple
things need pictures, labels, or
instructions, the design has failed. “ –
The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
Affordances
 Affordance is a fundamental aspect of
interaction design.
 Be it software design or physical object
design or even business design, the
designers explicitly or implicitly think
about how the users and actors of the
system behave/perform based on
various influencing factors (stimuli).
 Depending upon the specific application
of the concept and the context, the path
to arriving at the right set of affordances
could vary.
32- By Prof. Devyani Vasistha
Affordances
 When affordances are done right, the
product/service/business process
(referred to as P-S-BP, hence forth) is a
pleasure to work with.
 When done poorly, the usability and
adoption of the P-S-BP suffers greatly.
33- By Prof. Devyani Vasistha
Affordances
 Example: Digital transformation and
IOT re-design the user experiences
such as:
 A retail bank may develop a mobile app
that provides a unified, consistent,
Omni-channel across all their business
lines that this customer does business
with.
 A retail store may seamlessly blend
mobile, desktop and in-store experience
of the customer as they move across 34- By Prof. Devyani Vasistha
Affordances
35- By Prof. Devyani Vasistha
36- By Prof. Devyani Vasistha
37- By Prof. Devyani Vasistha
38- By Prof. Devyani Vasistha
THANK YOU.
- DEVYANI VASISTHA
All Pictures used in presentation are taken
from Google.
- By Prof. Devyani Vasistha 39

More Related Content

What's hot

Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io tShilpaKrishna6
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt sutrishnakar1995
 
Thinking About Prototyping_Internet of Things
Thinking About Prototyping_Internet of Things Thinking About Prototyping_Internet of Things
Thinking About Prototyping_Internet of Things alengadan
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling TechnologiesPrakash Honnur
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry PiYash Gajera
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of ThingsAshutosh Bhardwaj
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Prototyping the Physical Design_Internet of Things
Prototyping the Physical Design_Internet of ThingsPrototyping the Physical Design_Internet of Things
Prototyping the Physical Design_Internet of Thingsalengadan
 

What's hot (20)

Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Wot
WotWot
Wot
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Ppt 11 - netopeer
Ppt   11 - netopeerPpt   11 - netopeer
Ppt 11 - netopeer
 
Thinking About Prototyping_Internet of Things
Thinking About Prototyping_Internet of Things Thinking About Prototyping_Internet of Things
Thinking About Prototyping_Internet of Things
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 
Challenges and application of Internet of Things
Challenges and application of Internet of ThingsChallenges and application of Internet of Things
Challenges and application of Internet of Things
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Prototyping the Physical Design_Internet of Things
Prototyping the Physical Design_Internet of ThingsPrototyping the Physical Design_Internet of Things
Prototyping the Physical Design_Internet of Things
 
Nano computing
Nano computingNano computing
Nano computing
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 

Similar to IOT - Design Principles of Connected Devices

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamCLICKNL
 
Modern Technology
Modern TechnologyModern Technology
Modern TechnologyMd Saylab
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxraju957290
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxjeffevans62972
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docxodiliagilby
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...LouisFrederickRakoto
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldBrian Pichman
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxAlthafMk2
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfSoonChinFhong
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18Neeraj Gupta
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Nikhil Dikshit
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopClaire Rowland
 

Similar to IOT - Design Principles of Connected Devices (20)

ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van KranenburgThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
ThingsConAMS - Stakeholders in a new world - Rob van Kranenburg
 
Rob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon AmsterdamRob van Kranenburg @ Thingscon Amsterdam
Rob van Kranenburg @ Thingscon Amsterdam
 
Modern Technology
Modern TechnologyModern Technology
Modern Technology
 
MKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docxMKT 230 Module Two Creating Print Advertisements Assignm.docx
MKT 230 Module Two Creating Print Advertisements Assignm.docx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ITB - UNIT 5.pdf
ITB - UNIT 5.pdfITB - UNIT 5.pdf
ITB - UNIT 5.pdf
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Written by Mark Stanislav and Tod Beardsley September 2015.docx
Written by Mark Stanislav and Tod Beardsley    September 2015.docxWritten by Mark Stanislav and Tod Beardsley    September 2015.docx
Written by Mark Stanislav and Tod Beardsley September 2015.docx
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...The Internet of Things. . While IoT has the potential to enhance our lives by...
The Internet of Things. . While IoT has the potential to enhance our lives by...
 
Trendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech HoldTrendcasting for 2019 - What Will the Tuture of Tech Hold
Trendcasting for 2019 - What Will the Tuture of Tech Hold
 
Tech trends
Tech trendsTech trends
Tech trends
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 
PROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptxPROMISING TECHNOLOGIES (alfred)ppt.pptx
PROMISING TECHNOLOGIES (alfred)ppt.pptx
 
met11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdfmet11403-chapter1_sem2_2122.pdf
met11403-chapter1_sem2_2122.pdf
 
Iot term paper_sonu_18
Iot term paper_sonu_18Iot term paper_sonu_18
Iot term paper_sonu_18
 
Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015Cognitive IoT Whitepaper_Dec 2015
Cognitive IoT Whitepaper_Dec 2015
 
UXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshopUXLx 2015: 'Designing Connected Products workshop
UXLx 2015: 'Designing Connected Products workshop
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

IOT - Design Principles of Connected Devices

  • 1. Internet Of Things - By Prof. Devyani Vasistha
  • 3. IOT As Equation  IoT = physical object + actuator, sensor and controller + internet 3- By Prof. Devyani Vasistha
  • 4. Design Principles of Connected Devices  Physical Design vs Logical Design  Physical Design: concerned with Shape and Look i.e. Pleasing appearance  Industrial Design (Product Design)  UI design  Digital Services 4- By Prof. Devyani Vasistha
  • 5. Calm and Ambient Technology  Calm vs Ambient  Cheap  Ubicomp: Ubiquatos computing, Universal computing  Ambient background  Calm technology  Competition  Publicity Issues 5- By Prof. Devyani Vasistha
  • 6. Ubiquitous Computing  Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.  In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. 6- By Prof. Devyani Vasistha
  • 7. Internet Relay Chat 7- By Prof. Devyani Vasistha
  • 8. 8- By Prof. Devyani Vasistha
  • 9. 9- By Prof. Devyani Vasistha
  • 10. 10- By Prof. Devyani Vasistha
  • 11. ISSUES  Power  Networking challenges  6LoWPAN  Configuration  User interaction  Technical solutions  Good design  Design decisions  Large context  Complications  Cacophony  Antidote 11- By Prof. Devyani Vasistha
  • 12. Examples  6LoWPAN  Internet protocol  Apple IPod 2001  Portable MP3  ITUNES  ELIEL Saarinen’s maxim on design 12- By Prof. Devyani Vasistha
  • 13. Mark Weiser and john Seely Brown  Calm technology engages both the centre and the periphery of our attention and in fact moves back and fourth between the two.  Live Wire  Dangling String 13- By Prof. Devyani Vasistha
  • 14. Calm Technology 14- By Prof. Devyani Vasistha
  • 15. Calm Technology 15- By Prof. Devyani Vasistha
  • 16. MARK WEISER AND JOHN SEELY BROWN “ Not all the technology need to be calm. A calm video game will get little use; the point is to be excited. But too much design focuses on the object itself and its surface features without regard for context. We must learn to design for the periphery so that we can most fully command technology without being dominated by it.” 16- By Prof. Devyani Vasistha
  • 17. NOT ALL TECHNOLOGY NEED TO BE CALM  Twitter  Blows bubbles  Split-flap displays  Dot matrix LED Display  Olly indicater  Glanceable displays  Bikemap 17- By Prof. Devyani Vasistha
  • 18. MAGIC AS METAPHOR  Revolutionary aspects of technology by Technology blogger Venkatesh Rao.  Manufactured narmalcy field  A technology has to make its way inside the manufactured normalcy field.  At the same time a technology does not stretch the boundaries of their particular normalcy field too far, even if the underlying technology being employed is a huge leap ahead of the norm.  E.g. • (From) Mobile Phone (To) Portable Internet Terminal • (From)Computer as Glorified typewriter (To) GUI Desktop 18- By Prof. Devyani Vasistha
  • 19. Enchanted Effects in Devices  From idea of WhereDial of Harry Potter to GPS  From idea of enchanted Mirrors of Snow White Tale to Single-Pixel Display  Enchanted Umbrella  The danger of trying use of magic to reach beyond our capabilities enforces need of more secure and trust worthy control interfaces in devices to safeguard any data they gather. 19- By Prof. Devyani Vasistha
  • 20. Privacy  Privacy: The designers of IOT Devices need to work for the unauthorised access of sensors or device monitoring and reporting data to the internet.  Keeping Secrets: In some area of application, Leak of personal information of a user can be dangerous and will need measures to avoid it.  Example: Parking app for smart phone with Find My Car Option. 20- By Prof. Devyani Vasistha
  • 21. Some more examples of Privacy issues  Information requested from server through app can be a simple unencrypted web request. (... According to Troy Hunt)  www.troyhunt.com/2011/09/find-my-car- find-your-car-find.html  A chunk of requested data with a raft of addition information. “ Don’t share more than you need to provide the service.” 21- By Prof. Devyani Vasistha
  • 22. “ The best way to keep a secret is to never have it. ”-- Julian Assange (fouder of WikiLeaks) www.pbs.org/wgbh/pages/frontline/wikileaks/i nterviews/julian-assange.html i.e. Avoiding gathering or storing of data at first place is removal of worries of accidental disclosing of data. Example 1. Avoid storing confidential data at place like storing Password rather recreate new password if forgotten. 2. Hash Cryptographic Technique: One-way 22- By Prof. Devyani Vasistha
  • 23. Whose Data is it anyway?  Public Data  Private Data Example: A Camera installed at public space by a Company. According to Adam Greenfield( A leading practitioner at Urban Computing) “In a public space when data is generated by the public , then they should at least have equal right to be ware of, and have access to, that data. “ Point 67 at https://speedbird.wordpress.com/2012/12/0 3the-city-is-here-for-you-to-use-100-easy- 23- By Prof. Devyani Vasistha
  • 24. Web Thinking for Connected Devices  Aim behind Internet of Things should to get the mindset of the web and create devices which are of the web rather than those which just exist on the web.  Of the web vs On the web.  Strict vs Lenient  Postel’s law  Interact with other services  Small Pieces, Loosely Joined  First-Class Citizens on the Internet  Graceful Degradation 24- By Prof. Devyani Vasistha
  • 25. Small Pieces, Loosely Joined  If you are building all the components of a service, it makes sense not to couple them too tightly.  Example: Internet is a collection of services and machines controlled from a central location, is an example of small pieces, loosely joined.  Architects of a Service: where each piece should be designed to do one thing well and not rely too much on tight integration with separate component it uses. 25- By Prof. Devyani Vasistha
  • 26. Small Pieces, Loosely Joined  More Generalised Component: Try to make components more generalised so that they can serve other systems which requires similar fuctions.  Reuse and Repurpose: Generalised component will help to reuse and repurpose the components to build new capabilities.  Existing Standard and Protocol: Use existing standard and protocols as much as possible than inventing your own.  http://tools.ietf.org/html/rfc4287 26- By Prof. Devyani Vasistha
  • 27. First-Class Citizens on the Internet  First-Class: One that has an identity independent on any other item.  First-Class Citizen: Digital Information is the First-Class Citizen in the networked environment.  Securing the IoT by treating devices as first-class citizens is the only approach that takes into account the intricate, and ever-growing web of relationships between devices, people, and services. 27- By Prof. Devyani Vasistha
  • 28. How can IoT devices of all kinds be made secure in a way that ensures consumer’s privacy and protection from malicious actors?  The answer lies in a simple, unified approach, one that can ensure that connected devices are as secure as possible: they must be treated as first-class citizens.  Similar to how human identity is verified through either a passport, a driver’s licence, or an ID card depending on the situation, treating a device as a first-class citizen means requiring the same level of identity authentication.  These credentials can be baked into the device at the manufacturing stage, and used to ensure the device is who (or rather, what)28- By Prof. Devyani Vasistha
  • 29. Graceful Degradation  Graceful degradation is the ability of a computer, machine, electronic system or network to maintain limited functionality even when a large portion of it has been destroyed or rendered inoperative.  The purpose of graceful degradation is to prevent catastrophic failure.  Ideally, even the simultaneous loss of multiple components does not cause downtime in a system with this feature.  In graceful degradation, the operating efficiency or speed declines gradually as an increasing number of components fail. 29- By Prof. Devyani Vasistha
  • 30. 30- By Prof. Devyani Vasistha
  • 31. Affordances “ Affordances provide strong clues to the operations of things . Plates are for pushing. Knobs are for turning. Slots are for inserting things into. Balls are for throwing or bouncing. When affordances are taken advantage of, the user knows what to do just by looking: no picture, label, or instruction is required. Complex things may require explanation, but simple things should not. When simple things need pictures, labels, or instructions, the design has failed. “ – The Design Everyday Things, MIT Press,31- By Prof. Devyani Vasistha
  • 32. Affordances  Affordance is a fundamental aspect of interaction design.  Be it software design or physical object design or even business design, the designers explicitly or implicitly think about how the users and actors of the system behave/perform based on various influencing factors (stimuli).  Depending upon the specific application of the concept and the context, the path to arriving at the right set of affordances could vary. 32- By Prof. Devyani Vasistha
  • 33. Affordances  When affordances are done right, the product/service/business process (referred to as P-S-BP, hence forth) is a pleasure to work with.  When done poorly, the usability and adoption of the P-S-BP suffers greatly. 33- By Prof. Devyani Vasistha
  • 34. Affordances  Example: Digital transformation and IOT re-design the user experiences such as:  A retail bank may develop a mobile app that provides a unified, consistent, Omni-channel across all their business lines that this customer does business with.  A retail store may seamlessly blend mobile, desktop and in-store experience of the customer as they move across 34- By Prof. Devyani Vasistha
  • 35. Affordances 35- By Prof. Devyani Vasistha
  • 36. 36- By Prof. Devyani Vasistha
  • 37. 37- By Prof. Devyani Vasistha
  • 38. 38- By Prof. Devyani Vasistha
  • 39. THANK YOU. - DEVYANI VASISTHA All Pictures used in presentation are taken from Google. - By Prof. Devyani Vasistha 39