<?xml version="1.0" encoding="utf-8"?>
<Item xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" Autonumber="false" id="X-ebook" TextType="CompleteItem" SchemaVersion="2.0" PageStartNumber="0" Template="Generic_A4_Unnumbered" Module="default" DiscussionAlias="Discussion" ExportedEquationLocation="" SessionAlias="" SecondColour="None" ThirdColour="None" FourthColour="None" Logo="colour" ReferenceStyle="OU Harvard" Rendering="OpenLearn" xsi:noNamespaceSchemaLocation="http://www.open.edu/openlearn/ocw/mod/oucontent/schemas/v2_0/OUIntermediateSchema.xsd" x_oucontentversion="2018080200">
                            <meta name="vle:osep" content="false"/>
                            <meta name="aaaf:olink_server" content="http://www.open.edu/openlearn/ocw"/>
                            <meta name="equations" content="mathjax"/>
                            <CourseCode>ALT_1</CourseCode>
                            <CourseTitle/>
                            <ItemID/>
                            <ItemTitle>Internet of everything</ItemTitle>
                            <FrontMatter>
                                                  <Imprint>
                                                  <Standard>
                                                  <GeneralInfo>
                                                  <Paragraph><b>About this free course</b></Paragraph>
                                                  <Paragraph>This free course is an adapted extract from the Cisco Networking Academy course IoE<i> Internet of everything</i>: .</Paragraph>
                                                  <Paragraph>This version of the content may include video, images and interactive content that may not be optimised for your device. </Paragraph>
                                                  <Paragraph>You can experience this free course as it was originally designed on OpenLearn, the home of free learning from The Open University - <a href="http://www.open.edu/openlearn/science-maths-technology/internet-everything/content-section-overview?utm_source=openlearn&amp;utm_campaign=ol&amp;utm_medium=ebook">www.open.edu/openlearn/science-maths-technology/internet-everything/content-section-overview</a></Paragraph>
                                                  <Paragraph/>
                                                  <Paragraph>There you’ll also be able to track your progress via your activity record, which you can use to demonstrate your learning.</Paragraph>
                                                  </GeneralInfo>
                                                  <Address>
                                                  <AddressLine/>
                                                  <AddressLine/>
                                                  </Address>
                                                  <FirstPublished>
                                                  <Paragraph/>
                                                  </FirstPublished>
                                                  <Copyright>
                                                  <Paragraph>Copyright © 2019 The Open University</Paragraph>
                                                  </Copyright>
                                                  <Rights>
                                                  <Paragraph/>
                                                  <Paragraph><b>Intellectual property</b></Paragraph>
                                                  <Paragraph>Unless otherwise stated, this resource is released under the terms of the Creative Commons Licence v4.0 <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB</a>. Within that The Open University interprets this licence in the following way: <a href="http://www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn">www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn</a>. Copyright and rights falling outside the terms of the Creative Commons Licence are retained or controlled by The Open University. Please read the full text before using any of the content. </Paragraph>
                                                  <Paragraph>We believe the primary barrier to accessing high-quality educational experiences is cost, which is why we aim to publish as much free content as possible under an open licence. If it proves difficult to release content under our preferred Creative Commons licence (e.g. because we can’t afford or gain the clearances or find suitable alternatives), we will still release the materials for free under a personal end-user licence. </Paragraph>
                                                  <Paragraph>This is because the learning experience will always be the same high quality offering and that should always be seen as positive – even if at times the licensing is different to Creative Commons. </Paragraph>
                                                  <Paragraph>When using the content you must attribute us (The Open University) (the OU) and any identified author in accordance with the terms of the Creative Commons Licence.</Paragraph>
                                                  <Paragraph>The Acknowledgements section is used to list, amongst other things, third party (Proprietary), licensed content which is not subject to Creative Commons licensing. Proprietary content must be used (retained) intact and in context to the content at all times.</Paragraph>
                                                  <Paragraph>The Acknowledgements section is also used to bring to your attention any other Special Restrictions which may apply to the content. For example there may be times when the Creative Commons Non-Commercial Sharealike licence does not apply to any of the content even if owned by us (The Open University). In these instances, unless stated otherwise, the content may be used for personal and non-commercial use.</Paragraph>
                                                  <Paragraph>We have also identified as Proprietary other material included in the content which is not subject to Creative Commons Licence. These are OU logos, trading names and may extend to certain photographic and video images and sound recordings and any other material as may be brought to your attention.</Paragraph>
                                                  <Paragraph>Unauthorised use of any of the content may constitute a breach of the terms and conditions and/or intellectual property laws.</Paragraph>
                                                  <Paragraph>We reserve the right to alter, amend or bring to an end any terms and conditions provided here without notice.</Paragraph>
                                                  <Paragraph>All rights falling outside the terms of the Creative Commons licence are retained or controlled by The Open University.</Paragraph>
                                                  <Paragraph>Head of Intellectual Property, The Open University</Paragraph>
                                                  </Rights>
                                                  <Edited>
                                                  <Paragraph/>
                                                  </Edited>
                                                  <Printed>
                                                  <Paragraph/>
                                                  </Printed>
                                                  <ISBN>(.epub)<br/>(.kdl)</ISBN>
                                                  <Edition>1.0</Edition>
                                                  </Standard>
                                                  </Imprint>
                                                  <Introduction>
                                                  <Title>Introduction</Title>
                                                  <Paragraph>Early in your reading you will discover that the terms 'internet of everything' and 'internet of things' are interchangeable. Many British readers will be  used to the different words being used for the same thing. In our living rooms, we can equally sit on a sofa or a settee. There is no difference between the two, we are sitting on the same thing. </Paragraph>
                                                  <Paragraph>This is the same for the internet of everything (IoE) and the internet of things. The IoE is an evolving idea, at its simplest level, we are using the internet to communicate with multiple distributed devices. In the hope that it will make our lives easier, offer new opportunities and extend the human experience. As you read this course, you will discover some of the ideas already explored with IoE as well as begin to formulate your own view how IoE could be a game changer. From smart homes to smart cities and agile manufacturing, IoE offers us some interesting opportunities.</Paragraph>
                                                  <Paragraph><i>A note about spellings: While The Open University is a UK organisation, Cisco, who originally developed this course, are based in the USA. Therefore you may notice that some of the images contain the original American spellings.</i></Paragraph>
                                                  <Box>
                                                  <Paragraph>This free course, <i>Internet of everything</i>, presents introductory material and is intended to be easily accessible for those with some basic knowledge of computer systems and how they operate.</Paragraph>
                                                  </Box>
                                                  <Paragraph>When you have read this chapter, you will have explored: </Paragraph>
                                                  <BulletedList>
                                                  <ListItem>the sheer scale of the internet </ListItem>
                                                  <ListItem>how the physical world can connect to the internet</ListItem>
                                                  <ListItem>how the internet has already changed our lives</ListItem>
                                                  <ListItem>where we (the people) fit in with the evolving internet </ListItem>
                                                  <ListItem>where we (the people) fit in with the evolving internet.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Before you start, The Open University would really appreciate a few minutes of your time to tell us about yourself and your expectations of the course. Your input will help to further improve the online learning experience. If you’d like to help, and if you haven't done so already, please fill in this <a href="https://www.surveymonkey.co.uk/r/internet_everything_open_start">optional survey</a>.</Paragraph>
                                                  </Introduction>
                                                  <Covers>
                                                  <Cover template="false" type="ebook" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_cover_ebook.jpg"/>
                                                  <Cover template="false" type="A4" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_pdfimage_19x12-6_300d.jpg"/>
                                                  </Covers>
                            </FrontMatter>
                            <Unit>
                                                  <UnitID/>
                                                  <UnitTitle>Session 1: What is the IoE?</UnitTitle>
                                                  <Session>
                                                  <Title>1.1 Internet of everything</Title>
                                                  <Paragraph>In the first session of the <i>Internet of everything</i> we will introduce you to the internet and how it is evolving into the IoE. The internet has evolved in ways that we could never have imagined. In the beginning, advancements occurred slowly. Today, innovation and communication are happening at a remarkable rate. </Paragraph>
                                                  <Paragraph>Think back 5, 10, 15 years  and consider how you and maybe others around you used the internet. What has been a game changer in their lives as well as your own? </Paragraph>
                                                  <Paragraph>From its humble beginning as the Advanced Research Projects Agency Network (ARPANET) in 1969, where it interconnected a few sites, it is now predicted that the internet will interconnect 50 billion things by 2020. The internet now provides global connections that make web surfing, social media, and smart mobile devices possible. </Paragraph>
                                                  <Paragraph>Watch how the internet emerged over the last 25 years and take a glimpse into the future!</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_1_1_1_heres_to_humanity.mp4" type="video" width="512" x_manifest="ioe_1_video_1_1_1_1_heres_to_humanity_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="694627c4">
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_1_1_1_heres_to_humanity.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_1_1_1_heres_to_humanity.jpg" x_folderhash="55f4befe" x_contenthash="6f866b8d" x_imagesrc="ioe_1_video_1_1_1_1_heres_to_humanity.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Section>
                                                  <Title>1.1.1 Evolution of the internet</Title>
                                                  <Paragraph>You may not have realised that the evolution of the internet has witnessed four distinct phases. Each phase has a more profound effect on business and society than the phase before. This course offers a combination of phases one, two and three to simply explain phase four.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 1 Four phases of the internet</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Phase 1 </language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Phase 2</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Phase 3</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Phase 4</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Connectivity</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Networked economy</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Collaborative experiences</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Internet of everything</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Digitise access to information</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Digitise business process</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Digitise interactions (business and social)</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Digitise the world, connecting</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><BulletedList><ListItem>email
</ListItem><ListItem>web browser
</ListItem><ListItem>search</ListItem></BulletedList></td>
                                                  <td class="TableLeft"><BulletedList><ListItem><language xml:lang="zh">e-commerce</language></ListItem><ListItem><language xml:lang="zh">
digital supply chain</language></ListItem><ListItem><language xml:lang="zh">
collaboration</language></ListItem></BulletedList></td>
                                                  <td class="TableLeft"><BulletedList><ListItem>social</ListItem><ListItem>
mobility</ListItem><ListItem>
cloud</ListItem><ListItem>
video</ListItem></BulletedList></td>
                                                  <td class="TableLeft"><BulletedList><ListItem>people</ListItem><ListItem>
process</ListItem><ListItem>
data</ListItem><ListItem>
things</ListItem></BulletedList></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">The first phase started over 20 years ago and is referred to as 'connectivity'. Email, web browsing and searching for content was just beginning.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The second phase started in the late 1990s and was the 'networked economy' phase. This was the birth of e-commerce and digitally connected supply chains. It changed the way we shopped and how companies reached new markets.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The third phase started in the early 2000s and is known as the 'collaborative experiences' phase. This phase is dominated by widespread use of social media, mobility, video, and Cloud computing. This phase completely transformed the world of work.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The current phase is called the 'internet of everything (IoE)'. This phase connects people, processes, data, and things, turning information into actions that create new capabilities, richer experiences, and unprecedented opportunities.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.1.2 Cisco's intelligent network</Title>
                                                  <Paragraph>As a technological society, we are entering the fourth phase of the internet, which we call the internet of everything (IoE). Cisco’s intelligent network works at the centre of the IoE.</Paragraph>
                                                  <Paragraph>Cisco has been finding new ways to communicate and collaborate for years. The benefit of the IoE is derived from the combined impact of these connections and the value this increased connectedness creates as 'everything' comes online.</Paragraph>
                                                  <Quote>
                                                  <Paragraph>The next big wave is going to be around the internet of everyting. It will be implemented by combining things with processes, with business changes, with people. And, it will drive a productivity number, and a financial number, that is just mind-boggling. 
</Paragraph>
                                                  <SourceReference>John Chambers, former CEO, Cisco Systems</SourceReference>
                                                  </Quote>
                                                  <!--<Figure><Image  src="\\dog\units_non_course\OpenLearn_OMU\cisco_ioe\1-1-3.jpg" src_uri="file:////dog/units_non_course/OpenLearn_OMU/cisco_ioe/1-1-3.jpg" webthumbnail="false" width="100%"/><Alternative>The figure is an image of John Chambers, former CEO of Cisco Systems, and a quote about the internet of everything.</Alternative></Figure>-->
                                                  </Section>
                                                  <Section>
                                                  <Title>1.1.3 The internet: the place to go</Title>
                                                  <Paragraph>Normally, when people use the term internet, they are not referring to the physical connections in the real world. Rather, they tend to think of it as a formless collection of connections. It is the 'place' people go to find or share information. It is the 21st century library, video store, and personal photo album.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-5.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-5.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="6ed63b31" x_imagesrc="1-1-5.jpg" x_imagewidth="512" x_imageheight="285"/>
                                                  <Caption>Figure 1 Simplified model of global internet traffic</Caption>
                                                  <Description>The figure is an oversimplified map of global internet traffic and shows how the continents are connected.</Description>
                                                  </Figure>
                                                  <Paragraph>In actuality, the internet is essentially a network of networks.</Paragraph>
                                                  <Paragraph>Each of us connects to the internet using a physical cable or through wireless media. Underneath this network of networks lies a very real backbone of connections that bring the world to our personal computing devices.</Paragraph>
                                                  <Paragraph>The figure is an oversimplified map of global internet traffic; however, it depicts how countries and continents are connected. View this <a href="http://www.submarinecablemap.com/">TeleGgeography map</a> that depicts the location of submarine cables.</Paragraph>
                                                  <Paragraph>After you have opened the  map, click any cable on the map to highlight that cable and see the points at which it connects with land. (Alternatively, you can select any cable from the list to the right of the map.)</Paragraph>
                                                  <Paragraph>Click any city on the map to see a list of all the cables that connect to that city.</Paragraph>
                                                  <Paragraph>A great amount of engineering, effort, and money goes into the planning and deployment of each of these cables.</Paragraph>
                                                  <Paragraph>Figure 2 is a connected map that highlights the transition to the IoE. Click on 'view larger image' to see a clearer version.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="fe108f80" x_imagesrc="1-1-6.jpg" x_imagewidth="880" x_imageheight="431" x_smallsrc="1-1-6.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6.small.jpg" x_smallwidth="512" x_smallheight="250"/>
                                                  <Caption>Figure 2 Transitioning to the IoE</Caption>
                                                  <Description>The figure is a connected map that highlights the transition to the IoE. Labels run left to right, top to bottom: 'Today, more than 99% of things in the physical world are still not connected to the internet'; 'But a phenomenon called 'the internet of everything' will wake up everything you can imagine';'By 2050 , 50 billioon intelligent things will be connected to the internet.': 'The internet of everything connects the physical world to the internet.'; 'Using micorsensors on the network, everyday objecst become connected and intelligent.'</Description>
                                                  </Figure>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.1.4 The circle story</Title>
                                                  <Paragraph>In a very short time, the internet has dramatically changed how we work, live, play, and learn. Yet, we have barely scratched the surface. Using existing and new technologies, we are connecting the physical world to the internet. It is by connecting the unconnected that we transition from the internet to the internet of everything.</Paragraph>
                                                  <Paragraph>Watch Cisco’s vision of how the internet of everything could impact your everyday life.
</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_1_2_4_the_circle_story.mp4" type="video" width="512" x_manifest="ioe_1_video_1_1_2_4_the_circle_story_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="b28e5075" x_subtitles="ioe_1_video_1_1_2_4_the_circle_story.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>This is the cat that drank the milk</Remark>
                                                  <Remark>[CAT MEOWS]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>And let in the dog that jumped on the woman--</Remark>
                                                  <Remark>[DOG BARKS]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>Who brewed the coffee--</Remark>
                                                  <Speaker>WOMAN</Speaker>
                                                  <Remark> Brew coffee</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>That woke the man, who was late for work-- </Remark>
                                                  <Speaker>MAN</Speaker>
                                                  <Remark>All right. I gotta go</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>And drove the car--</Remark>
                                                  <Speaker>ELECTRONIC VOICE</Speaker>
                                                  <Remark>Driverless mode engaged.</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>That found the parking spot--</Remark>
                                                  <Speaker>MAN</Speaker>
                                                  <Remark>Find parking space.</Remark>
                                                  <Speaker>ELECTRONIC VOICE</Speaker>
                                                  <Remark>Parking space found.</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>That alerted the door that opened the control room--</Remark>
                                                  <Speaker>MAN</Speaker>
                                                  <Remark>Hey, Bob.</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>That secured the data that directed the turbines that powered the sprinklers that watered the grass that fed the cow that made the milk that went to the store that reminded the man to buy the milk that was poured by the girl who loved the cat that drank the milk.</Remark>
                                                  <Remark>[CAT MEOWS]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>The Internet of Everything is changing everything. Cisco. Tomorrow starts here.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_1_2_4_the_circle_story.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_1_2_4_the_circle_story.jpg" x_folderhash="55f4befe" x_contenthash="485e0d5a" x_imagesrc="ioe_1_video_1_1_2_4_the_circle_story.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.1.5 People, process, data and things</Title>
                                                  <Paragraph>The IoE incorporates four pillars to make networked connections more relevant and valuable than ever before: people, process, data, and things. The information from these connections leads to decisions and actions that create new capabilities, richer experiences, and unprecedented economic opportunity for individuals, businesses, and countries.</Paragraph>
                                                  <Table class="type 2" style="topbottomrules">
                                                  <TableHead>Table 2 What is the IoE? The internet of Everything is the netowrked connection of people, process, data and things</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">People </language></b><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-6a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6a.jpg" x_folderhash="55f4befe" x_contenthash="804bbe34" x_imagesrc="1-1-6a.jpg" x_imagewidth="100" x_imageheight="101"/></Figure></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Process</language></b><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-6b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6b.jpg" x_folderhash="55f4befe" x_contenthash="8aaf14bf" x_imagesrc="1-1-6b.jpg" x_imagewidth="100" x_imageheight="102"/></Figure></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Data</language></b><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-6c.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6c.jpg" x_folderhash="55f4befe" x_contenthash="8cfdbdc1" x_imagesrc="1-1-6c.jpg" x_imagewidth="100" x_imageheight="101"/></Figure></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Things</language></b><Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-6d.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-6d.jpg" x_folderhash="55f4befe" x_contenthash="d00b02ed" x_imagesrc="1-1-6d.jpg" x_imagewidth="100" x_imageheight="100"/></Figure></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Today, most people connect socially through their web-enabled devices. As the IoE evolves, we will connect in new and valuable ways. Wearable devices and clothing are already changing how we connect.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Processes occur between all of the other pillars in the IoE. With the correct processes, connections become more valuable. These connections provide the right information, delivered to the right person, at the right time and in the most relevant way.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Data is the information generated by people and things. This data, when combined with analytics, delivers actionable information to people and machines. Better decisions are made and better results are achieved.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Things are physical objects that are connected to the internet and to each other. These devices are sensing and collecting more data, becoming context-aware, and providing more experiential information to aid both people and machines.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.1.6 Interactions of the IoE</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-1-9.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-1-9.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="81201593" x_imagesrc="1-1-9.jpg" x_imagewidth="512" x_imageheight="329"/>
                                                  <Caption>Figure 3 Interactions of the IoE</Caption>
                                                  <Description>The figure highlights the interactions of the IoE: Machine-to-People (M2P), People-to-People (P2P), and Machine-to-Machine (M2M).</Description>
                                                  </Figure>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">The interactions between the elements in the four pillars create a wealth of new information. The pillars interact in a way that establishes three main connections in the IoE environment: people communicate with people (P2P), machines communicate with people (M2P), and machines communicate with machines (M2M).</font>
</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>1.2 The value of the IoE</Title>
                                                  <Paragraph>As we become used to the internet of everything, we will need to change the way we behave and use the internet. This isn’t as difficult as it may seem. After all, many of you reading this will have experienced various changes in experience since the popularisation of the internet in the mid 1990s. Many of you have seen the emergence of webmail, online films and music, social media, messaging apps and interactive games (including Pokemon Go). Each relying on the internet and also changing the way that we use it.</Paragraph>
                                                  <Section>
                                                  <Title>1.2.1 Changing behaviours</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-2-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-2-1.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="9e3f2199" x_imagesrc="1-2-1.jpg" x_imagewidth="512" x_imageheight="349"/>
                                                  <Caption>Figure 4 Heraclitus: Change is the only constant.</Caption>
                                                  <Description>The figure is an image of Heraclitus and one of his famous quotes.</Description>
                                                  </Figure>
                                                  <Paragraph>People, businesses, and governments must constantly adapt to change.</Paragraph>
                                                  <Paragraph>In 2012, the number of internet-connected devices exceeded the number of people on earth.</Paragraph>
                                                  <Paragraph>With this increased use of technology, people are now exchanging more information, ideas, and opinions than before. The internet is changing the way we communicate, collaborate, and learn. It has changed the way we engage with others and with the products that we use.</Paragraph>
                                                  <Paragraph>People have the ability to react to current news, events, marketing pushes, and products like never before. The ability to gather information and process that information using digital processing power is available at the click of a mouse or the touch of a screen.
</Paragraph>
                                                  </Section>
                                                  <Section id="sec001_003">
                                                  <Title>1.2.2 Organisations adapt or lose competitive edge</Title>
                                                  <Paragraph>Organisations must be agile and adjust to the changing trends in technology. organisations can use this technology to streamline operational cost through the use of collaboration and automation. In addition, businesses provide more relevant offerings using real-time data gathered from customers.</Paragraph>
                                                  <Paragraph>Organisations must also modify the way they advertise and sell products to customers. Technology is changing individual behaviors, such as how they learn about products, how they compare competitors, and even their purchasing patterns. For this reason, organisations must be able to customise their advertisements and special promotions toward certain customers and cut costs with targeted advertising. Additionally, customers, as a group, can affect the bottom line of the company by expressing their comments online. organisations must be able to react quickly, to counter any negative feedback entered by customers or employees.</Paragraph>
                                                  <Paragraph>These new technologies and trends can lead to tremendous success for some organisations. For other organisations, the failure to adapt to the new trends will likely result in the loss of their competitive edge. They will fail to meet the needs and expectations of the customers they serve. Consider, for example, how internet streaming is affecting the business operations and profit margins of movie rental stores, as shown in the figure. This is also happening with music and printed media.</Paragraph>
                                                  <Paragraph>The IoE forces organisations to adapt, or settle for diminishing impact on their business and society.</Paragraph>
                                                  <InternalSection>
                                                  <Heading>Governments and technology</Heading>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">Governments are not immune to the change caused by rapid information exchange through technology. Officials can respond quickly to emergencies through real-time data. Citizens can connect through social media and gather support for change.</font></Paragraph>
                                                  </InternalSection>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.2.3 Barcelona: a smart city</Title>
                                                  <Paragraph>Governments can embrace this technological change, and benefit from it, by incorporating technology into the operation of a city. In 2011, the city council in Barcelona, Spain launched the 'Barcelona as a People City' project. This project uses technical innovations to foster economic growth and the welfare of its citizens.</Paragraph>
                                                  <Paragraph>Watch how Barcelona embraces the IoE to improve the life of its citizens, generate new business opportunities, and reduce operating expenses.

</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city.mp4" type="video" width="512" x_manifest="ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="15a5ffbd" x_subtitles="ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Remark>[ELECTRICITY ZAPPING]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>As the world continues to urbanise, with 180,000 people a day moving into cities, the competition between cities will continue to grow economically, environmentally, and even socially. The cities that embrace technology will surface as the winners.</Remark>
                                                  <Speaker>WIM ELFRINK</Speaker>
                                                  <Remark>Think about it. Only 1% of what can be connected is connected today. Imagine the possibilities. The Internet of Everything has arrived and is ready to change the world. 
                            : Cisco is extremely excited about Barcelona, because the city is utilising the Internet of Everything. By connecting its people and things to a city Wi-Fi, Barcelona is creating new services, richer experiences, and unprecedented economic opportunity for its people, for its businesses, and for its partners.</Remark>
                                                  <Speaker>TONI VIVES</Speaker>
                                                  <Remark>Barcelona is a social dream. And technology is able to make this social dream possible.</Remark>
                                                  <Speaker>MANEL SANRON</Speaker>
                                                  <Remark>We face, in Barcelona, the very same problems that every city in the world faces. So we want to tackle those problems with technology.</Remark>
                                                  <Speaker>TONI VIVES</Speaker>
                                                  <Remark>What we are trying to put in place is a common solution for all the cities of the world.</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>It is estimated that 40% of traffic in city centres is caused by cars trying to find a parking space. Now, in-ground parking sensors communicate with devices in cars to help vehicle owners quickly find an available spot.</Remark>
                                                  <Speaker>MANEL SANRON</Speaker>
                                                  <Remark>Putting sensors in parking spots allow us to get less cars, less traffic, people happy, so that the city becomes a more livable place.</Remark>
                                                  <Speaker>TONI VIVES</Speaker>
                                                  <Remark>We have to make it possible for people to understand that the internet might be changing their daily life to improve it.</Remark>
                                                  <Speaker>MANEL SANRON</Speaker>
                                                  <Remark>We transformed the experience of wasting your time waiting for the bus into a contact, a full contact with the city. People can find information on routes for the bus, plus information on the area-- business, commerce, shows.</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>Barcelona's citizens not only enjoy the smart bus stop experience but are also able to maintain their Wi-Fi connectivity while on the bus or underground train. This allows citizens to get the same sensation of connectivity as they get at home. 
                            Understanding that much of a city's energy waste comes from less-than-optimal use of lighting, Barcelona is installing highly-efficient streetlights which are dynamically managed to save energy, optimise maintenance, and provide a safe environment for citizens. A city-wide network of sensors provides city officials with concrete information, so that they can make decisions based on real-time data.</Remark>
                                                  <Speaker>ANIL MENON</Speaker>
                                                  <Remark>Getting information on the flow of citizens, on noise, on pollution, on traffic, on weather conditions, allows cities to streamline the city operations, reduce costs, and also improve overall sustainability-- economic sustainability, social sustainability, and environmental sustainability.</Remark>
                                                  <Speaker>TONI VIVES</Speaker>
                                                  <Remark>Barcelona can generate a blueprint of what cities can become. And this is what gives sens, full sense, to what we're doing in Barcelona right now.</Remark>
                                                  <Speaker>MANEL SANRON</Speaker>
                                                  <Remark>Technology is for people. Technology is for using it. And technology is for improving citizens' lives. We are sure that the Barcelona of the future will be even much better than it is now.</Remark>
                                                  <Speaker>WIM ELFRINK</Speaker>
                                                  <Remark>Smart cities represent places where people will want to live. By connecting the unconnected, cities will be completely transformed. These are the cities that will harness the power of the Internet of Everything.</Remark>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city.jpg" x_folderhash="55f4befe" x_contenthash="4175ed7e" x_imagesrc="ioe_1_video_1_2_1_4_barcelona_embraces_ioe_to_create_a_smart_city.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.2.4 Hyper-aware, predictive, agile</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-2-5.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-2-5.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="2b8058a5" x_imagesrc="1-2-5.jpg" x_imagewidth="880" x_imageheight="709" x_smallsrc="1-2-5.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-2-5.small.jpg" x_smallwidth="512" x_smallheight="417"/>
                                                  <Caption>Figure 5 Hyper-aware, predictive, agile</Caption>
                                                  <Description>The figure explains the three critical attributes of being considered IoE-ready: Hyper-Aware, Predictive, and Agile. Innovation as accelerates as we move from hyper-aware to agile. Under hyper-aware are the following points: Sense the location, status, and context of company assets and customers. Monitor customer sentiment and behaviors in real time. Identify market and competitive changes. Under predictive: Anticipate market transitions.Optimise performance of assets and operations. Foresee and proactively address emerging security threats. Under Agile: Achieve competitive differentiation by responding faster than rivals. Foster innovation by building 'platforms' for sustainable advantage. Respond to rapidly evolving threats </Description>
                                                  </Figure>
                                                  <Paragraph>What does it mean to be IoE-ready? IoE-ready is characterised by three critical attributes:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>
hyper-awareness – sensors can capture real-time data on products</ListItem>
                                                  <ListItem>
ability to predict – new types of data analysis tools allow an organisation to forecast future trends and behaviours</ListItem>
                                                  <ListItem>agility – increasingly accurate predictions allow organisations to be more responsive and flexible to emerging marketplace trends and threats.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Combining these three attributes allows organisations to better create, communicate, and deliver their offerings.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.2.5 IoE and industries</Title>
                                                  <Paragraph>For organisations to realise the potential value of the IoE, they must focus on the IoE-driven capabilities that most benefit their organisation. This can vary across industries.</Paragraph>
                                                  <Paragraph>Table 3 displays some of the potential uses of the IoE across multiple industries, including manufacturing, energy firms, and retail organisations.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 3 The use of the IoE in industries</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Manufacturing</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Energy firms</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Retail</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">IoE capabilities may include real-time, multidimensional data analysis, intergrated video collaboration, and remote tracking of physical assets.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">IoE capabilities may include integration of sensor data, ability to direct staff, and predictive analytics.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">IoE capabilities may include video, customer behaviour analysis, data analytics and visualisation, and location-based marketing on any device.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>The IoE affects five core priorities of an organisation (Table 4).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 4 Core priorities</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Customer experience </language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Innovation</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Employee productivity</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Asset utilisation</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Supply</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Improving customer relationships to garner more of the market.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Reducing time to market products and improving product development to meet customer needs.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Providing the ability to be more productive and scalable.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Lowering costs.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Identifying areas of waste and delay, while increasing logistical efficiency.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.2.6 Maximising IoE value</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-2-8.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-2-8.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="822fd059" x_imagesrc="1-2-8.jpg" x_imagewidth="512" x_imageheight="349"/>
                                                  <Caption>Figure 6 Venn diagram demonstrating the value-link between tools,management and practices</Caption>
                                                  <Description>Three areas that organisations must consider when implementing the IoE: Adopt and follow inclusive practices; Ivest in high-quality technology and tools; Develop effective information-management practices</Description>
                                                  </Figure>
                                                  <Paragraph>For organisations to join the IoE economy, and maximise the value of their IoE implementation, organisations must consider:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Investing in a high-quality technology infrastructure and tools</b> – A secure and reliable network infrastructure is required to support the IoE.</ListItem>
                                                  <ListItem><b>Adopting and following inclusive practices</b> – An inclusive environment is one in which the employees of that environment feel as though they are part of the change. It is an open atmosphere where individuals feel that they are included.</ListItem>
                                                  <ListItem><b>Developing effective information-management practices</b> – Management must be able to embrace and promote change. Information sharing and management must be supported, and data extracting techniques must be developed so that the right information is provided at the right time, to the right people and things.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Organisations are able to achieve a significant competitive advantage by adapting their business processes through the use of IoE technologies.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.2.7 Internet of everything and Cisco</Title>
                                                  <Paragraph>Cisco is uniquely positioned in that it has end-to-end solutions already within its product line, and is continuing to innovate to support the IoE. Cisco’s contribution to the IoE is the software, hardware, and platforms that support the internet. These platforms will enable the next phase of the IoE.</Paragraph>
                                                  <Paragraph>Watch Dave Evans, Cisco's Chief Futurist, describing how the IoE will change the world for the better by creating more relevant and valuable connections.
</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world.mp4" type="video" width="512" x_manifest="ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="c1293c8f" x_subtitles="ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world.srt">
                                                  <Transcript>
                                                  <Speaker>DAVE EVANS</Speaker>
                                                  <Remark>In just a few decades' time, the internet has fundamentally changed how we communicate, do business, retrieve information, entertain, and educate ourselves. From the few connections that made up ARPANET in 1969, the internet has evolved to become an internet of things with billions of connected devices. And, amazingly, we're just getting started. </Remark>
                                                  <Remark>We're ready to move from our current internet of things to the internet of everything. A network of networks with billions and possibly even trillions of connected objects and devices create unprecedented opportunities. This intelligent connection of people, process, data, and things will make network connections more relevant and valuable than ever before. We believe that amazing things will happen when we connect the unconnected and give a voice to things that were silent.</Remark>
                                                  <Remark>In addition to people connecting to the internet through their devices, they will be connected in more direct and valuable ways. Your health-care provider will monitor vital signs remotely, from small, washable sensors worn in your clothes. Your alarm will wake you 10 minutes earlier when traffic is congested.</Remark>
                                                  <Remark>Your home will adjust its temperature according to the weather. Your sprinkler will know when to skip watering. Groceries will know you and be tracked from field to table. Farmers will track their livestock and monitor their health.</Remark>
                                                  <Remark>Unlike raw data that devices now transmit, the connected devices and objects in the internet of everything will have new capabilities, like context awareness, increased processing power, and energy independence. They will transmit high-level information and knowledge in richer formats for better decision-making. Gartner predicts that people will become nodes on the internet, transmitting both static information and a constant stream of data.</Remark>
                                                  <Remark>Fully exploiting these new capabilities requires a distributed network as well as computing and storage platforms that can manage this explosion of devices and data. Processes will ensure that the right information is delivered to the right person at the right time in an appropriate manner. And, as more devices come online, we'll see how the exponential power of networks, sometimes called Metcalfe's Law, creates unprecedented opportunities. It will allow us to become better stewards of our finite resources by improving how we monitor, understand, and manage our environment.</Remark>
                                                  <Remark>Agricultural output, access to clean water, and efficient energy exploration and distribution are big problems that can be better managed and possibly solved with the internet of everything. The internet of everything has enormous potential. But at the end of the day, its goal should be a simple one. How can it benefit humanity? How we answer that question will determine how successful we are in this next chapter in the evolution of the internet.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world.jpg" x_folderhash="55f4befe" x_contenthash="f8c7b319" x_imagesrc="ioe_1_video_1_2_2_5_relevant_and_valuable_connections_will_change_the_world.jpg" x_imagewidth="512" x_imageheight="282"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>Learn more about the IoE at <a href="http://internetofeverything.cisco.com/">Cisco’s IoE website</a>.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>1.3 Globally connected</Title>
                                                  <Paragraph>The reality is that we are all globally connected. For many of us, our friends on social media no longer reside down our street or in our town. Humanity has become globally connected and the internet has offered us a way to stay in touch professionally and personally with like minded souls.</Paragraph>
                                                  <Paragraph>Networking technology provides this foundation, the internet is after all a network of interconnected networks. From your home network to large corporate systems the shape of the internet is continually changing and offering us new ways to interconnect technologies such as the IoE.</Paragraph>
                                                  <Section>
                                                  <Title>1.3.1 Networks are the foundation</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">Fifty billion things provide trillions of gigabytes of data. How can they work together to enhance our decision-making and interactions to improve our lives and our businesses? Enabling these connections are the networks that we use daily. These networks provide the foundation for the internet and, ultimately, the IoE.</font>
</Paragraph>
                                                  <InternalSection>
                                                  <Heading>Networks continue to evolve</Heading>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">The methods that we use to communicate continue to evolve. Whereas we were once limited to face-to-face interactions, breakthroughs in technology have significantly extended the reach of our communications. From cave paintings, to the printing press, to radio, to television, and to telepresence, each new development has enhanced our ability to communicate with others.</font></Paragraph>
                                                  </InternalSection>
                                                  <InternalSection>
                                                  <Heading>Networks of many sizes</Heading>
                                                  <Paragraph>Networks form the foundation of the IoE. Networks come in all sizes. They can range from simple networks consisting of two computers to networks connecting millions of devices.</Paragraph>
                                                  <Paragraph>Simple networks in homes enable sharing of resources, such as printers, documents, pictures, and music between a few local computers.</Paragraph>
                                                  <Paragraph>In businesses and large organisations, networks can provide products and services to customers through their connection to the internet. Networks can also be used on an even broader scale to provide consolidation, storage, and access to information on network servers. Networks allow for email, instant messaging, and collaboration among employees. In addition, the network enables connectivity to new places, giving machines more value in industrial environments.</Paragraph>
                                                  <Paragraph>The internet is the largest network in existence. In fact, the term internet means a 'network of networks'. The internet is literally a collection of interconnected private and public networks. Businesses, small office networks, and even home networks usually provide a shared connection to the internet.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 5 Four types of network</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Small home networks </language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Small office/home office networks</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Medium to large networks</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">World wide networks</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Small home networks connect a few computers to each other and the internet.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The small office/home office network enables computers to connect to a corporate network, to access resources.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Medium to large networks can have many locations with thousands of interconnected computers. These networks could include newer places in the network (PINs). Examples are plant area networks (PANs) and field area networks (FANs) that extend the reach and power of the network for new applications and devices.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The internet is a network of networks that connects hundreds of millions of computers everywhere.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </InternalSection>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.2 Components of the network</Title>
                                                  <Paragraph>The path that a message takes from source to destination can be as simple as a single cable connecting one computer to another, or as complex as a network that literally spans the globe. This network infrastructure is the platform that supports the network. It provides the stable and reliable channel over which our communications can occur.</Paragraph>
                                                  <Paragraph>Click each button in the figure to highlight the corresponding network components.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_1.3.2.1v3.zip" type="html5" height="373" width="512" id="s1_3_2" x_folderhash="55f4befe" x_contenthash="093ca27d" x_xhtml="y">
                                                  <Caption>Figure 7 Network components</Caption>
                                                  </MediaContent>
                                                  <Paragraph>Devices and media are the physical elements, or hardware, of the network. Hardware is often the visible components of the network platform such as a laptop, PC, switch, router, wireless access point, or the cabling used to connect the devices. Occasionally, some components may not be so visible. In the case of wireless media, messages are transmitted through the air using invisible radio frequency or infrared waves.</Paragraph>
                                                  <Paragraph>Network components are used to provide services and processes. These are the communication programs, called software, that run on the networked devices. A network service provides information in response to a request. Services include many of the common network applications people use every day, like email hosting services and web hosting services. Processes provide the functionality that directs and moves the messages through the network. Processes are less obvious to us but are critical to the operation of networks.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.3 End devices</Title>
                                                  <Paragraph>The following animation shows an IP packet being sent from one end device to another. Click on the full screen button to view.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/screen_1_3_2_2.mp4" type="video" width="512" x_manifest="screen_1_3_2_2_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="f78594a4">
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/poster_1_3_2_2.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/poster_1_3_2_2.jpg" x_folderhash="55f4befe" x_contenthash="6bcdb0f7" x_imagesrc="poster_1_3_2_2.jpg" x_imagewidth="512" x_imageheight="321"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>
The network devices that people are most familiar with are called end devices. All computers connected to a network that participate directly in network communication are classified as hosts. These devices form the interface between users and the underlying communication network.</Paragraph>
                                                  <Paragraph>Some examples of end devices are:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>
computers (workstations, laptops, file servers, and web servers)</ListItem>
                                                  <ListItem>nsetwork printers</ListItem>
                                                  <ListItem>VoIP phones</ListItem>
                                                  <ListItem>TelePresence endpoints</ListItem>
                                                  <ListItem>security cameras</ListItem>
                                                  <ListItem>mobile handheld devices (smartphones, tablets, PDAs, and wireless debit/credit card readers and barcode scanners)
sensors such as thermometers, weight scales, and other devices that will be connected to the IoE.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>

End devices are either the source or destination of data transmitted over the network. In order to distinguish one end device from another, each end device on a network is identified by an address. When an end device initiates communication, it uses the address of the destination end device to specify where the message should be sent.
</Paragraph>
                                                  <Paragraph>
A server is an end device that has software installed that enables it to provide information, like email or web pages, to other end devices on the network. For example, a server requires web server software to provide web services to the network. 
</Paragraph>
                                                  <Paragraph>
A client is an end device that has software installed to enable it to request and display the information obtained from a server. An example of client software is a web browser, like internet Explorer. Figure 8 provides a brief description of each. Press each plus symbol to view the end device to server interaction.
</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_1.3.2.2v3.zip" type="html5" webthumbnail="false" height="369" width="512" id="s1_3_3" x_folderhash="55f4befe" x_contenthash="5bf8a1af" x_xhtml="y">
                                                  <Caption>Figure 8 End devices</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.4 Intermediary network devices</Title>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/screen_1_3_2_3.mp4" type="video" width="512" x_manifest="screen_1_3_2_3_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="f5bcad44">
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-6.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="d441e20f" x_imagesrc="1-3-6.jpg" x_imagewidth="512" x_imageheight="310"/>
                                                  <Caption>Figure 9 Intermediary devices determine the path of the data, but do not generate or change the data content.</Caption>
                                                  <Description>The figure explains the role of intermediary devices.</Description>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>
Intermediary devices interconnect end devices. These devices provide connectivity and work behind the scenes to ensure that data flows across the network. Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork.</Paragraph>
                                                  <Paragraph>Examples of intermediary network devices are:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>switches and wireless access points (network access)</ListItem>
                                                  <ListItem>routers (internetworking)</ListItem>
                                                  <ListItem>firewalls (security).</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The management of data as it flows through the network is also a role of the intermediary device. These devices use the destination host address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.</Paragraph>
                                                  <Paragraph>
Processes running on the intermediary network devices perform these functions:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>regenerate and retransmit data signals</ListItem>
                                                  <ListItem>maintain information about what pathways exist through the network and internetwork</ListItem>
                                                  <ListItem>notify other devices of errors and communication failures</ListItem>
                                                  <ListItem>direct data along alternate pathways when there is a link failure</ListItem>
                                                  <ListItem>classify and direct messages according to quality ofsService (QoS) priorities</ListItem>
                                                  <ListItem>permit or deny the flow of data, based on security settings.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.5 Network media</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-7.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-7.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="50dd6cdb" x_imagesrc="1-3-7.jpg" x_imagewidth="880" x_imageheight="602" x_smallsrc="1-3-7.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-7.small.jpg" x_smallwidth="512" x_smallheight="352"/>
                                                  <Caption>Figure 10 Types of network connection media</Caption>
                                                  <Description>The figure shows three labled rows (copper, fiber optic, and wireless) each with two images of the respective lable.</Description>
                                                  </Figure>
                                                  <Paragraph>Communication across a network is carried over a medium, such as through a cable or through the air. The medium facilitates communication from source to destination.Modern networks primarily use three types of media to interconnect devices and to provide the pathway over which data can be transmitted. As shown in the figure, these media are:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>metallic wires within cables</ListItem>
                                                  <ListItem>glass or plastic fibres (fibre optic cable)</ListItem>
                                                  <ListItem>wireless transmission.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The signal encoding that must occur for the message to be transmitted is different for each media type. On metallic wires, the data is encoded into electrical impulses that match specific patterns. Fiber optic transmissions rely on pulses of light, within either infrared or visible light ranges. In wireless transmission, patterns of electromagnetic waves depict the various bit values.</Paragraph>
                                                  <Paragraph>Different types of network media have different features and benefits. Not all network media have the same characteristics, nor are they appropriate for the same purposes. The criteria for choosing network media are:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>the distance the media can successfully carry a signal</ListItem>
                                                  <ListItem>the environment in which the media is to be installed</ListItem>
                                                  <ListItem>the amount of data and the speed at which it must be transmitted</ListItem>
                                                  <ListItem>the cost of the media and installation.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.6 Types of networks</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-8.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-8.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="4d42371f" x_imagesrc="1-3-8.jpg" x_imagewidth="512" x_imageheight="367"/>
                                                  <Caption>Figure 11 Types of network connection media</Caption>
                                                  <Description>The figure illustrates the two most common types of network infrastructures, the Local Area Network (LAN) and the Wide Area Network (WAN). LAN includes home office comprising laptop, printer and tablet;central comprising a multilayer switch and severl desk units; branch comprising wireless access point and smartphone a printer and desk units. WAN is at the centre linked to the LANs. </Description>
                                                  </Figure>
                                                  <Paragraph>Network infrastructures can vary greatly in terms of:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>size of the area covered</ListItem>
                                                  <ListItem>number of users connected</ListItem>
                                                  <ListItem>number and types of services available.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Figure 11 illustrates the two most common types of network infrastructure:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Local area network (LAN) </b> −a network infrastructure that provides access to users and end devices in a limited area such as a home, school, office building, or campus. It provides high speed bandwidth to internal end devices and intermediary devices.</ListItem>
                                                  <ListItem><b>Wide area network (WAN) </b>− a network infrastructure that interconnects LANs over wide geographical areas such as between cities, states, provinces, countries, or continents. WANs are usually owned by an autonomous organisation, such as a corporation or a government. WANs typically provide link speeds between LANs that are slower than the link speeds within a LAN.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.7 The internet is bringing the world together</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-9.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-9.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="56b82dd5" x_imagesrc="1-3-9.jpg" x_imagewidth="880" x_imageheight="556" x_smallsrc="1-3-9.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-9.small.jpg" x_smallwidth="512" x_smallheight="346"/>
                                                  <Caption>Figure 12 Intelligent networks</Caption>
                                                  <Description>The figure is a collage of images depicting the use of technology and those connections around the world: Intelligent networks allow handheld devices to receive news and emails and to send text. Video conferencing instantly connects people around the globe. Phones connect globally to share voice, text and images. Online gaming connects thousands of people seamlessly</Description>
                                                  </Figure>
                                                  <Paragraph>Although there are benefits to using a LAN or WAN, most individuals need to communicate with a resource on another network. This network may be outside of the local network. This communication is achieved using the internet.</Paragraph>
                                                  <Paragraph>The internet is not owned by any individual or group. The internet is a worldwide collection of interconnected networks (internetworks or internet for short), cooperating with each other to exchange information using common standards. Through telephone wires, fibre optic cables, wireless transmissions, and satellite links, internet users can exchange information in a variety of forms, as shown in the figure.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.8 The converged network</Title>
                                                  <Paragraph>Modern networks are constantly evolving to meet user demands. Early data networks were limited to exchanging character-based information between connected computer systems. Traditional telephone, radio, and television networks were maintained separately from data networks. In the past, every one of these services required a dedicated network, with different communication channels and different technologies to carry a particular communication signal. Each service had its own set of rules and standards to ensure successful communication.
</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-10a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-10a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="9465ce31" x_imagesrc="1-3-10a.jpg" x_imagewidth="880" x_imageheight="655" x_smallsrc="1-3-10a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-10a.small.jpg" x_smallwidth="512" x_smallheight="346"/>
                                                  <Caption>Figure 13 Services running on multiple separate networks</Caption>
                                                  <Description>Figure 13 shows an example of three separate networks that are considered disparate, and include computer networks, telephone networks, and broadcast networks.</Description>
                                                  </Figure>
                                                  <Paragraph>Consider some schools that were cabled for a computer network 30 years ago. Classrooms were cabled for the computer network. They were also cabled for a telephone network. And, they were cabled for a video network. These networks were disparate; meaning that they could not communicate with each other, as shown in Figure 13.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-10b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-10b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="9dad5924" x_imagesrc="1-3-10b.jpg" x_imagewidth="880" x_imageheight="668" x_smallsrc="1-3-10b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-10b.small.jpg" x_smallwidth="512" x_smallheight="346"/>
                                                  <Caption>Figure 14 Converged data networks carry multiple services on one network.</Caption>
                                                  <Description>Figure 14 shows an example of a converged network, where various networks communicate on the same platform.</Description>
                                                  </Figure>
                                                  <Paragraph>Advances in technology are enabling us to consolidate these different kinds of networks onto one platform referred to as the 'converged network'. Unlike dedicated networks, converged networks are capable of delivering voice, video streams, text, and graphics between many different types of devices over the same communication channel and network structure, as shown in Figure 14. Previously separate and distinct communication forms have converged onto a common platform. This platform provides access to a wide range of alternative and new communication methods that enable people to interact directly with each other almost instantaneously.</Paragraph>
                                                  <Paragraph>On a converged network there are still many points of contact and many specialised devices, such as personal computers, phones, TVs, and tablet computers, but there is one common network infrastructure. This network infrastructure uses a common set of rules, agreements, and implementation standards.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.9 Lab: mapping the internet</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-11a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-11a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="f06bdf09" x_imagesrc="1-3-11a.jpg" x_imagewidth="880" x_imageheight="450" x_smallsrc="1-3-11a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-11a.small.jpg" x_smallwidth="508" x_smallheight="258"/>
                                                  <Caption>Figure 15 Ping output</Caption>
                                                  <Description>Figure 15 shows a command output screen with the ping command being used.</Description>
                                                  </Figure>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/1-3-11b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-11b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="4a1f12e2" x_imagesrc="1-3-11b.jpg" x_imagewidth="880" x_imageheight="450" x_smallsrc="1-3-11b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/1-3-11b.small.jpg" x_smallwidth="506" x_smallheight="255"/>
                                                  <Caption>Figure 16 Tracert output</Caption>
                                                  <Description>Figure 16 shows a command output screen with the tracert command being used.</Description>
                                                  </Figure>
                                                  <Paragraph>Would you like to see how long it takes for data to travel from your computer to a remote destination and back? In Figure 15, the ping command took an average of 20 milliseconds to receive a reply from the server at www.cisco.com.</Paragraph>
                                                  <Paragraph>Would you like to see the path that data travels to reach a destination? In Figure 16, the <b>tracert</b> command generated a path showing that data passed through seven intermediary devices on its way from source to destination.</Paragraph>
                                                  <Paragraph>Network administrators and technicians use <b>ping</b> and <b>tracert</b> to test network connectivity and resolve problems. To further explore these two utilities, download <a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49453">Lab - Mapping the internet</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.10 Packet tracer: packet switching simulation</Title>
                                                  <Paragraph>Packet Tracer is a fun, take-home, flexible software program that allows you to experiment with network behavior, build network models, and ask 'what if' questions. In this activity, you will explore how Packet Tracer serves as a modeling tool for network representations. While doing so, you will explore a simulation of how packets are created and sent across the network traveling from source device to destination device.</Paragraph>
                                                  <Paragraph>Watch this demonstration of the Packet Tracer – Packet Switching Simulation activity.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation.mp4" type="video" width="512" x_manifest="ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="ffceea70" x_subtitles="ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation.srt">
                                                  <Transcript>
                                                  <Speaker>INSTRUCTOR</Speaker>
                                                  <Remark>This Packet Tracer file is a great demonstration of the internet of everything. In this file, we have our user down here June, and she has her internet-enabled personal device. She's got a smartphone, and she also has a tablet. And they're wirelessly connected to her Cisco access point, and from there, to her internet service provider.</Remark>
                                                  <Remark>We have redundant links from her internet service provider to an internet exchange. And from an internet exchange, we have the core of the internet and all of the connections that take place from router to router in the internet core.</Remark>
                                                  <Remark>And then from there, across, let's say, continents and oceans over to the Facebook data centre over here, and Facebook web servers, Facebook 1 here and Facebook 2, let's say the Facebook web server here is located in Ireland and this other Facebook web server may be located somewhere else in Europe.</Remark>
                                                  <Remark>Now, in this activity, June is going to upload information from her phone to her Facebook account to share information with her friends. We can watch this information and the various paths that it can take to travel from her and her internet service provider across the internet to reach these Facebook web servers and back.</Remark>
                                                  <Remark>So let's try it out. We'll follow the instructions. We'll go down here to June, click on her smartphone, open up her web browser, and type in www.facebook.com, and press Go. You can see we're met with a web page, internet of everything, IoE. And we're just waiting for this graphic to load.</Remark>
                                                  <Remark>And there it is. So we have here our Facebook website where we've posted information about some restaurants that we visited or that we've rated, and we're recommending them to our friends, let's say.</Remark>
                                                  <Remark>So we'll close that. Now, our experience was instantaneous. We open up our smartphone. We open up a web browser. We put in Facebook.com, and we're greeted with a web page, and information is uploaded and downloaded in the flash of an eye, in an instant.</Remark>
                                                  <Remark>It all seems really simple and instantaneous, but in reality the path that the information has travelled from June to Facebook is fairly complex. Let's take a look.</Remark>
                                                  <Remark>We can click on this cloud representing the internet exchange and look inside. And inside, we find in internet exchange point, which is a physical infrastructure through which internet service providers exchange internet traffic between their networks. I'll click Back.</Remark>
                                                  <Remark>We can click on this cloud representing the internet core and look inside it. The internet backbone or core refers to the principal data routes between large strategically interconnected networks and core routers on the internet.</Remark>
                                                  <Remark>These data routes are hosted by commercial, government, academic, and other high-capacity network centres, the internet exchange points and network access points that interchange internet traffic between the countries, continents, and across the oceans of the world.</Remark>
                                                  <Remark>Internet service providers, often Tier 1 networks, participate in internet backbone exchange traffic by privately negotiated interconnection agreements primarily governed by the principle of settlement-free peering. And we can see these core internet backbone routers here. I'll click Back.</Remark>
                                                  <Remark>And then finally, the Facebook data centre itself, which we can click on it and see the servers that make it up-- Facebook 1, Facebook 2. I'll click Back.</Remark>
                                                  <Remark>Let's open up another Packet Tracer file where we can see all of the interconnected devices, and we can trace the information and watch packets travel as they go from June's smartphone all the way over to the Facebook web servers.</Remark>
                                                  <Remark>To do this, I'll open up another Packet Tracer file. And in this Packet Tracer file, the clouds that contain the core backbone have all been opened up, and so we can see inside them. So here's the smartphone and the tablet. Here's the internet service provider, the gateway, the router. This is June's gateway, her internet service provider.</Remark>
                                                  <Remark>And connected to the core routers of, let's say, the service provider over to the internet exchange core between service providers. And then the core of the internet right here, these are all of the strategic locations representing states, cities, travelling across continents even, countries all the way over to the Facebook gateway over here. And here is the Facebook data centre.</Remark>
                                                  <Remark>Now, the Facebook data centre, we have Facebook 1 here located in Ireland. Facebook 2, let's say, located in Europe. This is all hypothetical but worth examining. And data is travelling from Facebook 2 all the way over there. Let's watch the whole process in action as we simulate it right here in packet tracer.</Remark>
                                                  <Remark>So to do that, what I'm going to do is I'm going to click on Simulation Mode. I am going to click on Edit Philtres. And I'm going to turn off all these protocols. We're interested in the ICMP protocol and the HTTP protocol because we're going to send a ping, and maybe we'll get a web page from a web browser.</Remark>
                                                  <Remark>And then before I close this, I'm going to speed up this slider here which will move the packets a little bit faster as they jump from location to location. I'll close the Simulation panel. I'm ready to go, and I'm in simulation mode. You can see I have the Simulation tab here selected.</Remark>
                                                  <Remark>So now I'll jump over to June's phone. I'll click on June's phone, open up the command prompt, and we'll start with a ping. So what I'll do is I'll type ping www.facebook.com. I'll hit Enter. And you can see it's paused here because it's waiting for me, since we're in simulation mode, to play so we can watch the traffic happen visually.</Remark>
                                                  <Remark>So I'll minimise this. And all I have to do is go down here to Packet Tracer and click this Auto Capture Play button, and we can watch the packets travel and see the paths that they take to get from her smartphone all the way over to the Facebook web server.</Remark>
                                                  <Remark>So let's do that. So I'll click Auto Capture Play. Here's her first ping, her first ICMP packet. You can see it hits the Cisco access point, travels across the switch to her gateway, over to the internet service provider router, over to this core router here, 3, core router 4, to an edge router.</Remark>
                                                  <Remark>It's going from her service provider over to the internet exchange, which exchange traffic between service provider networks. Here's the internet exchange edge 2, and here are a bunch of ISP core routers as the data travels from, let's say, state to state, city to city, continent to continent, country to country, even across oceans as it reaches finally the Facebook gateway router, over to the Facebook data centre, into their switches.</Remark>
                                                  <Remark>And we'll see which web server replies. In fact, it is the Facebook 2 web server. And now that it's reached, an echo reply is generated, and the reply is sent back.</Remark>
                                                  <Remark>Let's see if the data takes the same path on the way back. Over to the Facebook gateway, ISP core 6-- you can see it's already taking a different path on the way back as it heads back to June's smartphone. And there it is. Hits her ISP routers, ISP gateway, LAN switch. And finally, from her wireless Cisco access point, back to her network, and onto her smartphone, and that's it.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation.jpg" x_folderhash="55f4befe" x_contenthash="56522eb5" x_imagesrc="ioe_1_video_1_3_10_packet_tracer_packet_switching_simulation.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>The video demonstration is the primary source for how to navigate the activity. However, after viewing the video, you can download the following files to investigate the activity on your own.</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49456">Packet Tracer – Packet Switching Simulation.pdf</a></ListItem>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49454">Packet Tracer – Packet Switching Simulation A.pkz</a></ListItem>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49455">Packet Tracer – Packet Switching Simulation B.pkz</a></ListItem>
                                                  </BulletedList>
                                                  <Paragraph><b>Essential note</b>: If you are new to Packet Tracer, you can watch a <a href="http://youtu.be/any2NbeSZV4">tutorial</a>. You must install Packet Tracer before you can open .pkz files. To  install Packet Tracer, return to the <a href="https://www.open.edu/openlearn/science-maths-technology/internet-everything/content-section-overview">course progress page</a> where a copy is available to download and install .</Paragraph>
                                                  <Paragraph>Packet Tracer is available for both Microsoft Windows and Linux systems. The Open University Cisco Academy team support a moderated Facebook Community helping Mac users port this application onto all versions of the Apple Mac OSX. For more information, you will need to join the <a href="https://www.facebook.com/groups/packettracermac/">community</a>.</Paragraph>
                                                  <Paragraph>Cisco also offer a <a href="https://www.netacad.com/campaign/ptdt-1">free course</a> on how to use Packet Tracer and how to obtain a free copy.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>1.3.11 Planning for the future</Title>
                                                  <Paragraph>The convergence of the different types of networks onto one platform represents the first phase in building the intelligent information network that will support the IoE. This convergence includes consolidating the applications that generate, transmit, and secure data. The underlying processes that drive this explosive growth have resulted in a network architecture that is both capable of supporting change and expansion. It is this converged network that serves as the fundamental building block for the IoE.</Paragraph>
                                                  <Paragraph>Watch the video of real-life experiences of business owners, government officials, and healthcare providers as they work towards making the IoE a reality.

</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_3_3_6_true_stories_of_the_connected.mp4" type="video" width="512" x_manifest="ioe_1_video_1_3_3_6_true_stories_of_the_connected_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="31f18f18" x_subtitles="ioe_1_video_1_3_3_6_true_stories_of_the_connected.srt">
                                                  <Transcript>
                                                  <Speaker>MAN 1</Speaker>
                                                  <Remark>I work for a nonprofit organisation providing poor people first job experiences with connected technology to have a better chance in the future. </Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>[SPEAKING PORTUGUESE]</Remark>
                                                  <Speaker>MAN 3</Speaker>
                                                  <Remark>I'm a primary care physician. I take care of patients in very remote communities. Technology allows me to listen to a patient's heart 1,000 kilometres away. </Remark>
                                                  <Remark>That all sounded really good.</Remark>
                                                  <Speaker>MAN 4</Speaker>
                                                  <Remark>Before the internet of everything, dispatchers could only handle 10 or 12 messengers at a time, because of the constant verbal communications. Now, due to all of our connected software, a dispatcher can handle 30 or 40 messengers. </Remark>
                                                  <Speaker>MAN 5</Speaker>
                                                  <Remark>We installed a sensor system that records the temperature of the air, the temperature of the soil, the wetness of the leaves, and the humidity. And with that we improve the entire spectrum of agriculture.</Remark>
                                                  <Speaker>WOMAN</Speaker>
                                                  <Remark>In San Carlos, parking spaces can already talk to your phone.</Remark>
                                                  <Remark>[ELECTRONIC CHIRP]</Remark>
                                                  <Remark>Imagine a future where fire hydrants can report leaks to the fire department before something breaks.</Remark>
                                                  <Remark>[DING]</Remark>
                                                  <Speaker>MAN 4</Speaker>
                                                  <Remark>The thing that I've always waited to see is the refrigerator that knows what's inside it, so when you're at the store you can ask the refrigerator if there's enough cheese. </Remark>
                                                  <Speaker>MAN 1</Speaker>
                                                  <Remark>I think that, in the future, when I work in my office I can see my family at home to make sure that they are secure.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>[SPEAKING PORTUGUESE]</Remark>
                                                  <Speaker> MAN 3</Speaker>
                                                  <Remark>Imagine a future where the pills my patients take transmit their vitals directly to me, where I can monitor their pulse 24/7, sent from a device near the heart to the phone in my pocket.</Remark>
                                                  <Remark>[BEEPING]</Remark>
                                                  <Remark>It's about the doctor-patient relationship.</Remark>
                                                  <Speaker>WOMAN</Speaker>
                                                  <Remark>It's about creating places that are safer and more productive, even more fun.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>[SPEAKING PORTUGUESE]</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_1_3_3_6_true_stories_of_the_connected.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_1_3_3_6_true_stories_of_the_connected.jpg" x_folderhash="55f4befe" x_contenthash="36c24fd8" x_imagesrc="ioe_1_video_1_3_3_6_true_stories_of_the_connected.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>1.4 Terms and concepts practice</Title>
                                                  <Paragraph>This activity will help you to test some of the terms and concepts you've been introduced to.</Paragraph>
                                                  <Activity>
                                                  <Question/>
                                                  <Interaction>
                                                  <Matching>
                                                  <Option>
                                                  <Paragraph>converged networks </Paragraph>
                                                  </Option>
                                                  <Match x_letter="d">
                                                  <Paragraph>data, voice, and video all use the same network media</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>LAN</Paragraph>
                                                  </Option>
                                                  <Match x_letter="b">
                                                  <Paragraph>provides access to users and end devices in a limited area</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>WAN</Paragraph>
                                                  </Option>
                                                  <Match x_letter="k">
                                                  <Paragraph>interconnects LANs over a broad geographic area</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>end device</Paragraph>
                                                  </Option>
                                                  <Match x_letter="g">
                                                  <Paragraph>the source and destination of messages transmitted over a network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>intermediary</Paragraph>
                                                  </Option>
                                                  <Match x_letter="j">
                                                  <Paragraph>device connects individual hosts to the network or connects networks to each other</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>people</Paragraph>
                                                  </Option>
                                                  <Match x_letter="c">
                                                  <Paragraph>exchange information, ideas, and opinions through the use of data and technology</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>things</Paragraph>
                                                  </Option>
                                                  <Match x_letter="a">
                                                  <Paragraph>physical objects with sensors that are connected to a network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>data</Paragraph>
                                                  </Option>
                                                  <Match x_letter="h">
                                                  <Paragraph>collected and transmitted by people and connected things</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>M2M</Paragraph>
                                                  </Option>
                                                  <Match x_letter="f">
                                                  <Paragraph>machine to machine</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>M2P</Paragraph>
                                                  </Option>
                                                  <Match x_letter="e">
                                                  <Paragraph>machine to people</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>P2P</Paragraph>
                                                  </Option>
                                                  <Match x_letter="i">
                                                  <Paragraph>people to people</Paragraph>
                                                  </Match>
                                                  </Matching>
                                                  </Interaction>
                                                  </Activity>
                                                  </Session>
                                                  <Session>
                                                  <Title>1.5 Session 1 quiz</Title>
                                                  <Paragraph>Check what you have learned in Session 1.</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=49003">Session 1 quiz</a>.</Paragraph>
                                                  <Paragraph>Use 'ctrl' (cmd on a Mac) or right-click to open the quiz in a new window or tab then come back here when you're finished.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>1.6 Summary</Title>
                                                  <Paragraph>The evolution of the internet has witnessed four distinct phases:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>connectivity</ListItem>
                                                  <ListItem>networked economy</ListItem>
                                                  <ListItem>collaborative experience</ListItem>
                                                  <ListItem>the internet of everything (IoE).</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The internet is essentially a network of networks. Underneath this network of networks lies a very real backbone of connections that bring the world to our internet-enabled devices. The IoE is bringing together:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>people</ListItem>
                                                  <ListItem>process</ListItem>
                                                  <ListItem>data</ListItem>
                                                  <ListItem>things.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>There are three main connections in the IoE environment:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>people communicate with people (P2P)</ListItem>
                                                  <ListItem>machines communicate with people (M2P)</ListItem>
                                                  <ListItem>machines communicate with machines (M2M).</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The IoE brings value to organisations in these five areas:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>customer experience</ListItem>
                                                  <ListItem>innovation</ListItem>
                                                  <ListItem>employee productivity</ListItem>
                                                  <ListItem>asset utilisation</ListItem>
                                                  <ListItem>supply.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Networks provide the foundation for the internet and, ultimately, the IoE. The components of a network fall into one of three categories:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>devices</ListItem>
                                                  <ListItem>media</ListItem>
                                                  <ListItem>services.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The two most common types of networks are LAN and WAN. Consolidating different types of networks onto one platform creates a 'converged network'. Unlike dedicated networks, converged networks are capable of delivering voice, video streams, text, and graphics between many different types of devices over the same communication channel and network structure.</Paragraph>
                                                  </Session>
                            </Unit>
                            <Unit>
                                                  <UnitID/>
                                                  <UnitTitle>Session 2: Pillars of the IoE</UnitTitle>
                                                  <Session id="sess001">
                                                  <Title>2.1 The four pillars</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-1.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="7b5c8b5d" x_imagesrc="2-1-1.jpg" x_imagewidth="880" x_imageheight="506" x_smallsrc="2-1-1.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-1.small.jpg" x_smallwidth="416" x_smallheight="237"/>
                                                  <Caption>Figure 1 The four pillars</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each: People - Connecting people in more relevant, valuable ways. Process - Delivering the right information to the right person (or machine) at the right time. Data - Leveraging data into more useful information for decision making. Things - Physical devices and objects connected to the internet and each other for intelligent decision making.</Description>
                                                  </Figure>
                                                  <Paragraph>The idea of connecting things is not a new one. In fact, the internet of things (IoT) is a term that has been broadly accepted since the late 1990s. The IoT refers to the network of physical objects accessible through the internet.</Paragraph>
                                                  <Paragraph>Not all of the objects that connect to the IoT will be computing devices, but many will be. So, what is a computing device? While it may be easy to identify a desktop or a laptop computer, the line between what is and is not a computer can become blurred. Is a car a computing device? What about a watch or a television?</Paragraph>
                                                  <Paragraph>The first computing devices (computers) were huge, room-sized machines that took teams of people to build, manage and maintain. Today, they are exponentially faster and only a fraction of the size of their predecessors. For the purposes of this course, a computing device is an electronic machine that performs calculations based on a set of instructions and comprises three main components: a central processing unit (CPU), memory, and an input/output unit.</Paragraph>
                                                  <Paragraph>Based on the definition above, a digital watch is a computing device, but an analogue watch is not. The digital watch has a CPU to run its program, it has memory to store the program and other information, and it has an I/O device to allow user interaction (screen, display, buttons, sound alerts, etc.). Although the analogue watch has the I/O component, it lacks CPU and memory.</Paragraph>
                                                  <Section>
                                                  <Title>2.1.1 What are things?</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-2.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-2.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="a79800b8" x_imagesrc="2-1-2.jpg" x_imagewidth="880" x_imageheight="563" x_smallsrc="2-1-2.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-2.small.jpg" x_smallwidth="432" x_smallheight="271"/>
                                                  <Caption>Figure 2 The four pillars: things</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each, with Things highlighted. People - Connecting people in more relevant, valuable ways. Process - Delivering the right information to the right person (or machine) at the right time. Data - Leveraging data into more useful information for decision making. Things - Physical devices and objects connected to the internet and each other for intelligent decision making.</Description>
                                                  </Figure>
                                                  <Paragraph>Currently, the things pillar, highlighted in Figure 2, comprises various types of traditional computers and computing devices, such as desktops, laptops, smartphones, tablets, mainframes, and computer clusters. However, the IoT will include all types of objects, including objects and devices that are not traditionally connected. In fact, Cisco estimates that 99 percent of physical objects will one day be connected.</Paragraph>
                                                  <Paragraph>These objects contain embedded technology to interact with internal servers and the external environment. These objects are network-capable, and can communicate across a secure, reliable and available network platform. However, the IoT refers to a single technology transition; the ability to connect objects that were previously unconnected so those objects can communicate across the network.</Paragraph>
                                                  <Paragraph>The availability of data, when objects can sense and communicate, has the capability of changing how and where decisions are made, who makes the decisions, and the processes that individuals and businesses use to make those decisions. The IoE is built on the connections among people, processes, data, and things. These are the four pillars of the IoE, as shown in the figure. However, the IoE is not about these four dimensions in isolation. Each amplifies the capabilities of the other three. It is in the intersection of all of these elements that the true power of the IoE is realised.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.2 Common devices</Title>
                                                  <Paragraph>The internet connects more computing devices than just desktop and laptop computers. There are devices all around that you may interact with on a daily basis that are also connected to the internet.</Paragraph>
                                                  <Paragraph>For example, people are using mobile devices more every day to communicate and accomplish daily tasks, such as checking the weather or online banking. The table below shows more about mobile devices.</Paragraph>
                                                  <Paragraph>In the future, many of the things in your home could also connect to the internet so that they can be monitored and configured remotely. Table 1 shows more about connected household devices.</Paragraph>
                                                  <Paragraph>There are also many connected devices found in the world outside your home that provide convenience and useful or even vital information. The table below shows more about these commonly found connected devices.</Paragraph>
                                                  <Paragraph>How many of these devices do you use on a daily basis?</Paragraph>
                                                  <Table class="type 2" style="topbottomrules">
                                                  <TableHead>Table 1 Common types of devices                    </TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Smartphones </language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Tablets</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Smartwatches</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Google Glass</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft" borderleft="false"><language xml:lang="zh">Smartphones are able to connect to the internet from almost anywhere. Smartphones combine the functions of many different products together, such as a telephone, camera, GPS receiver, media player, and touch screen computer.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Tablets, like smartphones, also have the functionality of multiple devices. With the additional screen size, they are ideal for watching videos and reading magazines or books. With on-screen keyboards, users are able to do many of the things they used to do on their laptop computer, such as composing emails or browsing the web.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">A smartwatch can connect to a smartphone to provide the user with alerts and messages. Additional functions, such as heart rate monitoring and counting steps, like a pedometer, can help people who are wearing the device to track their health.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Google glass was an experimental wearable computer in the form of glasses with a tiny screen that displays information to the wearer in a similar fashion to the head-up display (HUD) of a fighter pilot. A small touch pad on the side allows the user to navigate menus while still being able to see through the Google glass.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.3 Connecting devices</Title>
                                                  <Paragraph>For the IoE to function, all of the devices that are part of the intended IoE solution must be connected together so that they can communicate. There are two ways to connect devices: wired or wirelessly.</Paragraph>
                                                  <Paragraph>In most cases, connecting devices together using cables is too costly or cumbersome to be practical. For this reason, most devices will need to send and receive data wirelessly.</Paragraph>
                                                  <Paragraph>There are many different types of wireless communication. The most common types of wireless communication are Wi-Fi, Cellular, Bluetooth, and near field communication (NFC). Some devices, such as smartphones and tablets use a combination of wireless communication methods to connect to different devices.</Paragraph>
                                                  <Paragraph>Figure 3 details how a smartphone may connect to other types of devices. Click on each of the plus signs to interact with the image.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_2.1.2.2v2.zip" type="html5" height="425" width="512" id="s2_1_3" x_folderhash="55f4befe" x_contenthash="8a360c46" x_xhtml="y">
                                                  <Caption>Figure 3 Smartphone connections</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.4 Electronics that are not on the internet</Title>
                                                  <Paragraph>According to <a href="http://www.internetworldstats.com/">Internet World Stats</a>, as of June 2012, statistical data indicates that there were approximately 2.4 billion users on the Internet. This is only 34% of the total world population.</Paragraph>
                                                  <Paragraph>The number of connected devices on the internet in 2012 exceeded the world population. This includes traditional computing devices and mobile devices, as well as new industrial and consumer devices that we think of as 'things'.</Paragraph>
                                                  <Paragraph>Although, this may seem like a lot of devices on the internet, it represents less than 1% of the objects that could be connected. Some examples of devices that are currently unconnected could include microwaves, alarm clocks, and lighting systems.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.5 Sensors</Title>
                                                  <Paragraph>Sensors are one way to collect data from non-computers. They convert physical aspects of our environment into electrical signals that can be processed by computers. Some examples are soil moisture sensors, air temperature sensors, radiation sensors, and motion sensors. Sensors of all types will play an important role in connecting what has traditionally been unconnected in the IoE.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-6.jpg" width="100%" x_folderhash="55f4befe" x_contenthash="aa9564e4" x_imagesrc="2-1-6.jpg" x_imagewidth="512" x_imageheight="342"/>
                                                  <Caption>Figure 4 Car oxygen sensor</Caption>
                                                  </Figure>
                                                  <Paragraph>Figure 4 shows an oxygen sensor. These sensors are very common in cars equipped with electronic fuel injection and are used to monitor the amount of oxygen expelled by the engine after a cycle of fuel burn. Based on that information, the fuel injection computer is able to adjust the air-fuel mixture for optimal engine performance</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.6 RFID</Title>
                                                  <Paragraph>A popular type of sensor uses radio frequency identification (RFID). RFID uses radio frequency electromagnetic fields to communicate information between small coded tags (RFID tags) and an RFID reader. Usually, RFID tags are used to identify and track what they are embedded into, such as a pet. Because the tags are small, they can be attached to virtually anything including clothing and cash. Some RFID tags carry no batteries. The energy required by the tag to transmit information is obtained from the electromagnetic signals that are sent by the RFID tag reader. The tag receives this signal and uses part of its energy to power the response.</Paragraph>
                                                  <Paragraph>The models shown in Figure 5 have a transmission range of a few meters, while other RFID tags are equipped with a battery and operate as a beacon that can broadcast information at all times. This type of RFID tag usually has a range of a few hundred meters. Unlike the bar code, RFID relies on radio-frequency; therefore, does not require line of sight to work.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-7.jpg" width="100%" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-7.jpg" x_folderhash="55f4befe" x_contenthash="2ce7353e" x_imagesrc="2-1-7.jpg" x_imagewidth="512" x_imageheight="335"/>
                                                  <Caption>Figure 5 RFID devices</Caption>
                                                  </Figure>
                                                  <Paragraph>Because of its flexibility and low power requirements, RFID tags are a great way to connect a non-computer device to an IoE solution by providing information to an RFID reader device. For example, it is now common to find car factories attaching RFID tags to the car bodies. This allows for better tracking of that car throughout the assembly line.</Paragraph>
                                                  <Paragraph>The first generation of RFID tags is 'write once read many'. This means that they can be programmed in the factory once, but cannot be modified out in the field. Newer RFID tags are 'write many read many', with integrated circuits that can last 40 to 50 years and be written to over 100,000 times. These tags can effectively store an entire history of the asset to which they are attached, such as the date of manufacture, location tracking history, multiple service cycle, and ownership.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.7 Controller</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-8.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-8.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="31a128bf" x_imagesrc="2-1-8.jpg" x_imagewidth="880" x_imageheight="564" x_smallsrc="2-1-8.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-8.small.jpg" x_smallwidth="498" x_smallheight="325"/>
                                                  <Caption>Figure 6 Controllers</Caption>
                                                  <Description>The figure is a diagram showing that the controller will send data from various sensors in common devices to a local router to the internet and to the data centre.</Description>
                                                  </Figure>
                                                  <Paragraph>Sensors can be programmed to take measurements, translate that data into signals, and then send that data to a main device called the controller. The controller is responsible for collecting data from sensors and providing an internet connection. Controllers may have the ability to make immediate decisions or they may send data to a more powerful computer for analysis. This more powerful computer might be in the same LAN as the controller or might only be accessible through an internet connection.</Paragraph>
                                                  <Paragraph>In order to reach the internet and then the more powerful computers in the data centre shown in the figure, the controller will first send data to a local router. This router interfaces between the local network and internet and can forward data between them..</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.1.8 The IoT and the IoE</Title>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot.mp4" type="video" width="512" x_manifest="ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="84b9de1a" x_subtitles="ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot.srt">
                                                  <Transcript>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>So Jim Grubb has been doing demos. Jim, we've been doing it for, what, 15 years together?</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>That's right, John.</Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>This is the most complex challenge I've ever given you to figure out how we're going to do it.</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>OK.</Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>And I want you to do it in 12 minutes or less, to take everything I've said so far, and bring it to life.</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>OK, John. Well, the first thing I want to start with is, you know, a lot of people are confusing the Internet of Things with the Internet of Everything. The Internet of Everything, of course, is a combination of all these market transitions that so well articulated, and when they all come together to give us the ability to connect people, process, data, and things. </Remark>
                                                  <Remark>It's the Internet of Things that is just the latest market transition, that is allowing us, then, to connect the 99% of the unconnected. And that's being driven by Moore's law and the continuing reduction in costs in computing and sensors. As a matter of fact, on the tip of my finger here, I have a sensor. Actually, this provides IP connectivity, this little chip. </Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>How much does it cost?</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>$0.99. Gives us IP connectivity and it has integrated Wi-Fi. And it's $0.99.</Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>Fast-forward five years?</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>Fast-forward five years-- pennies, right? And very low-powered. This still requires a significant amount of power. Forward, we're going to have sensors that are powered by the flecks of your shoe, or the chemicals in the soil, or the heat from your body, and we're going to be able to take all of that data and bring it back and make new decisions from that. </Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>So just like we're seeing with Smart Grid, you're going to actually move a lot of this intelligence right to the edge of the network. </Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>That's right.</Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>To be able to provide security, policy, et cetera--</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>That's right.</Remark>
                                                  <Speaker>JOHN T. CHAMBERS</Speaker>
                                                  <Remark>And to be able to make decisions at the edge, probably, for the vast majority of interfaces.</Remark>
                                                  <Speaker>JIM GRUBB</Speaker>
                                                  <Remark>And sometimes for machine-to-machine connections, for example.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot.jpg" x_folderhash="55f4befe" x_contenthash="b9ff10ac" x_imagesrc="ioe_1_video_2_1_3_5_cisco_live_2013_keynote_demo_ioe_vs_iot.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>In the video, Jim Grubb, Cisco's Chief Demonstration Officer, and John Chambers, Cisco’s former CEO, during the Cisco Live 2013 keynote demonstration, define the opportunity presented by the internet of things and how the internet of esverything will take advantage of these new opportunities. </Paragraph>
                                                  <Paragraph>The internet of everything is the networked connection of people, process, data and things.</Paragraph>
                                                  <Paragraph>In the video, the IoT is described as a market transition that is taking advantage of the reduced cost in connecting things to the Internet. As a result, the IoT implies a fundamental shift in the state of our present economy as we move towards connecting 50 billion devices by 2020.</Paragraph>
                                                  <Paragraph>However, the IoT is only one of several market transitions that are enabling the full potential of the IoE. For example, the following are transitions that are also enabling the IoE’s full potential:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>mobility </b>− providing access to resources from any device, at any time, and from any place</ListItem>
                                                  <ListItem><b>cloud computing</b> − providing distributed computing resources and services over a network</ListItem>
                                                  <ListItem><b>big data</b> − as the volume of data being produced is accelerating, so too is our capacity to analyse and process it</ListItem>
                                                  <ListItem><b>IPv6 </b>− expanding the current internet address space by 3.4×10^38 addresses, easily accommodating 50 billion devices by 2020, and billions upon billions more.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>The amount of value an organisation derives from IoE depends on its ability to capture transitions, such as cloud, mobility, and the IoT. For example, John highlights Smart Grid, a solution that realises the benefit of the IoE by improving energy efficiency on the electricity grid provided by utilities and where the energy is used in homes and offices.</Paragraph>
                                                  <Paragraph>IoT is about how to connect the unconnected, making things accessible by the internet. As it relates to IoT, IoE is addressing why we are connecting the unconnected.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.2 Data as a pillar</Title>
                                                  <Paragraph>Data is a key element of all computer systems – from early computing to current systems. A predominant reason for having computer systems, has been to process and transmit data. In this section, you will learn how this is accomplished and what systems are used to convert digital data into human understandable terms.</Paragraph>
                                                  <Section>
                                                  <Title>2.2.1 What is data?</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-1a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-1a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="a42a358b" x_imagesrc="2-2-1a.jpg" x_imagewidth="880" x_imageheight="540" x_smallsrc="2-2-1a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-1a.small.jpg" x_smallwidth="452" x_smallheight="274"/>
                                                  <Caption>Figure 7 The four pillars: data</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each, with Data highlighted.</Description>
                                                  </Figure>
                                                  <Paragraph>Data is a value assigned to anything that is around us. Data is everywhere. However, by itself, data can be rather meaningless. As we interpret the data, for example, by correlating or comparing, it becomes more useful. This useful data is now information. As this information is applied or understood it then becomes knowledge.</Paragraph>
                                                  <Paragraph>In electronic communication, data is represented as 1s and 0s. These discrete elements are known as bits (or binary digits). All electronic data is stored in this digital binary format. Whereas humans interpret words and pictures, computers interpret bit patterns.</Paragraph>
                                                  <Paragraph>A number of website provide free tools so you can see how letters are <a href="http://www.unit-conversion.info/texttools/convert-text-to-binary/">translated into binary code</a>. You can try this out.
</Paragraph>
                                                  <Paragraph>The advantage of using digital coding is that it can be stored more efficiently and can be transmitted over long distances without the quality becoming degraded.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.2 Management of data</Title>
                                                  <Paragraph>Computers generally lack the contextual awareness and intuitiveness of humans. As a result it is important to consider the following two states of data: structured and unstructured.</Paragraph>
                                                  <Paragraph><b>Structured data</b></Paragraph>
                                                  <Paragraph>Structured data refers to data that is entered and maintained in fixed fields within a file or record. Structured data is easily entered, classified, queried, and analysed by a computer. For example, when you submit your name, address, and billing information to a website, you are creating structured data. The structure will force a certain format for entering the data to minimise errors and make it easier for a computer to interpret it. Figure 8 represents different types of data being stored in specified locations so that computer programs can then locate the data.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_2.2.1.2v2.zip" type="html5" width="512" height="425" id="s2_2_2" x_folderhash="55f4befe" x_contenthash="30ba55e1" x_xhtml="y">
                                                  <Caption>Figure 8 Locating data</Caption>
                                                  <Description>This is an animated figure. A funnel appear with items of communication falling into it. Out of the spout fall bits of data forming a 'wall'. An arrow then points to various types of graphs. </Description>
                                                  </MediaContent>
                                                  <Paragraph><b>Unstructured data</b></Paragraph>
                                                  <Paragraph>Unstructured data lacks the organisation found in structured data. Unstructured data is raw data. It does not possess the scaffolding that identifies the value of the data. Unstructured data lacks a set way of entering or grouping the data, and then analysing the data. Examples of unstructured data include the content of photos, audio and video files.</Paragraph>
                                                  <Paragraph>Structured and unstructured data are valuable assets to individuals, organisations, industries, and governments. Like other assets, the information gathered from both structured and unstructured data has measurable value. However, the value of that data can increase or decrease depending on how that data is managed. Even the best data loses value over time.</Paragraph>
                                                  <Paragraph>It is important for organisations to take all forms of data (structured, unstructured, and semi-structured) and determine ways to format that data so it can be managed and analysed.</Paragraph>
                                                  <Paragraph>To understand the management of data, it is important to understand concepts such as data storage and the transportation of data.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.3 Data storage</Title>
                                                  <Paragraph>When referring to storage space, we use the term bytes (B). A single byte is a combination of 8 bits. Other measurements include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>kilobytes (KB)</b> − approximately one thousand (10^3) bytes</ListItem>
                                                  <ListItem><b>megabytes (MB)</b> − approximately one million (10^6) bytes</ListItem>
                                                  <ListItem><b>gigabytes (GB)</b> − approximately one billion (10^9) bytes</ListItem>
                                                  <ListItem><b>terabytes (TB)</b> − approximately one trillion (10^12) bytes</ListItem>
                                                  <ListItem><b>petabytes (PB)</b> − approximately one quadrillion (10^15) bytes</ListItem>
                                                  <ListItem><b>exabytes (EB)</b> − approximately one quintillion (10^18) bytes.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph><i>If you have never seen this symbol before ^ it is a common shorthand for a mathematical power. A power is a number that is multiplied by itself a number of times. For example 10 to the power of 2 (10^2) is 10*10 which is 100, again 10 to the power of 4 (10^4) is 10*10*10*10 or 10,000.</i></Paragraph>
                                                  <Paragraph>Over the years, the amount of available storage space has increased exponentially. For example, not long ago the storage space of hard drives was typically measured in megabytes. Today, terabyte hard drives are common.</Paragraph>
                                                  <Paragraph>There are three primary types of data storage:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Local data</b> refers to data that is accessed directly, by local devices. Hard disks, USB flash drives, and CDs/DVDs are examples of local data storage. See Table 3 for more information.</ListItem>
                                                  </BulletedList>
                                                  <Table class="type 2">
                                                  <TableHead>Table 3 Types of local data storage</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Optical drives</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">USB flash drives</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Hard drives</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">External hard drives</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft" borderright="false"><language xml:lang="zh">An optical drive is used to write data onto a CD or DVD. These portable storage devices are inexpensive and easy to label and store.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">USB flash drives are removable and rewritable. These portable storage devices can hold gigabytes of data.</language></td>
                                                  <td class="TableLeft">Hard drives come pre-installed on most desktop or laptop computers. These devices store data on magnetic platters. They can store large amounts of data, 1 terabyte or more.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">External hard drives that are enclosed in a case and are usually attached to your computer via a USB or Firewire port.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <BulletedList>
                                                  <ListItem><b>Centralised data</b> is stored and shared from a single centralised server. This information can be accessed remotely by multiple devices over the network or the internet. Using a centralised data server can result in bottlenecks and inefficiencies, and can become a single point of failure.</ListItem>
                                                  </BulletedList>
                                                  <BulletedList>
                                                  <ListItem><b>Distributed data</b> is managed by a central database management system (DBMS). Distributed data is data that is replicated and stored in multiple locations. This allows for easy and efficient sharing of data. Distributed data is accessed through the use of local and global applications. With a distributed system, there is no single source of failure. Should one site lose power, users are still able to access data from the other sites. See Figure 9.<Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-3.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-3.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="d6b22971" x_imagesrc="2-2-3.jpg" x_imagewidth="320" x_imageheight="286"/><Caption>Figure 9 Distributed data</Caption><Description>The figure shows a visual representation of distributed data.</Description></Figure></ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.4 Internet service providers</Title>
                                                  <Paragraph>In centralised and distributed data storage environments, data must be transported over the network or internet.</Paragraph>
                                                  <Paragraph>Devices that forward data across the internet must use an internet service provider (ISP). An ISP supplies the connections to allow internet access to individuals and businesses, and can also interconnect with other ISPs. Networks connect to an ISP at a point of presence (POP).</Paragraph>
                                                  <Paragraph>Within an ISP, a network of high-speed routers and switches move data between the various POPs. Multiple links interconnect the POPs to provide alternate routes for data in the event that one link fails or becomes overloaded with traffic.</Paragraph>
                                                  <Paragraph>To send information beyond the boundaries of an ISP network, packets are forwarded to other ISPs. As shown in the animation, the internet is made up of high-speed data links that interconnect multiple ISPs together. These interconnections are part of the very large, high-capacity network known as the internet backbone.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/screen_2_2_3_3.mp4" type="video" width="512" x_manifest="screen_2_2_3_3_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="f41678b7">
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/screen_2_2_3_3.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/screen_2_2_3_3.jpg" x_folderhash="55f4befe" x_contenthash="6a015e70" x_imagesrc="screen_2_2_3_3.jpg" x_imagewidth="512" x_imageheight="327">
                   </Image>
                                                  <Caption>Figure 10 Internet service providers</Caption>
                                                  <Description>The figure is a topology that is showing that the internet is made up of high-speed data links that interconnect multiple ISPs together.</Description>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.5 IP addressing</Title>
                                                  <Paragraph>Packets that cross the internet must be internet protocol (IP) packets. Each IP packet must contain a valid source and destination IP address. Without valid address information, packets will not reach the destination host and return packets will not make it back to the original source. The IP protocol defines the structure of the source and destination IP addresses. It specifies how these addresses are used in routing of packets from one host or network to another.</Paragraph>
                                                  <Paragraph>Currently, the internet uses IPv4 (IP version 4), but is transitioning to IPv6 (IP version 6). IPv6 allows for greater access and scalability with more available IP addresses and other features.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-5.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-5.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="67b46db0" x_imagesrc="2-2-5.jpg" x_imagewidth="469" x_imageheight="320"/>
                                                  <Caption>Figure 11 IP addressing</Caption>
                                                  <Description>The figure is a topology that illustrates how www.cisco.com is translated into the IP address for the destination. </Description>
                                                  </Figure>
                                                  <Paragraph>The IP address is similar to the mailing address of a person. It is known as a logical address because it is logically assigned based on the host location. This process is similar to the local government assigning a street address based on the logical description of the city, village, or neighborhood. It would be impossible to remember all of the IP addresses for all of the servers hosting services on the internet. Instead, there is an easier way to locate servers by associating a name with an IP address. In the figure, servers on the internet translate the name <a href="http://www.cisco.com/">www.cisco.com</a> to the IP address for the destination.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.6 IP packets</Title>
                                                  <Paragraph>Whether playing an internet video game, chatting with a friend, sending email, or searching the Web, the data being sent and received is carried in the form of IP packets. Before being sent on the internet, data is divided into IP packets. Packet size is between 64 to 1500 bytes for Ethernet networks. Downloading a single song that is 3 MB would require over 2000 packets of 1500 bytes each.</Paragraph>
                                                  <Paragraph>On networks, each byte of data is transmitted one bit at a time. Network bandwidth, or data transfer rate, is expressed in bits per second. For example, a one megabit (1,000,000 bits) connection means that data can be theoretically transmitted at one megabit per second (1 Mb/s).</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.7 IP address management</Title>
                                                  <Paragraph>On the internet, each IP address must be unique. The Internet Assigned Numbers Authority (IANA) is responsible for controlling the distribution of IP addresses so that there is no duplication. IANA allocates blocks of IP addresses to one of five regional internet registries (RIRs). ISPs obtain blocks of IP addresses from the RIR in their geographic region. It is the responsibility of the ISPs to manage these addresses and assign them to customer networks and end users’ devices and networks.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-7.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-7.jpg" width="100%" x_folderhash="55f4befe" x_contenthash="e86dba82" x_imagesrc="2-2-7.jpg" x_imagewidth="512" x_imageheight="392"/>
                                                  <Caption>Figure 12 Regional internet registries: ARIN (USA, Canada); LACNIC (Latin America); AFRINIC (Africa); RIPE NCC (Europe and North Asia); APNIC (Southern Asia and the Pacific)</Caption>
                                                  </Figure>
                                                  <Paragraph>The ISP determines where to forward the traffic. Packets are passed from router to router, possibly through multiple ISP networks, until they reach their final destination. Routers in each of the ISPs use the destination address of the IP packets to choose the best path through the internet. The packet switching is transparent to the user, as they only see what was sent and received.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.8 More connections equals more data</Title>
                                                  <Paragraph>Why all the concern about data? Within the last decade, the volume of data that was produced in a year is now produced in a week. That amounts to over 20 exabytes of data produced a week. Data continues to grow exponentially as more of the unconnected become connected</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-8.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-8.jpg" width="100%" webthumbnail="true" x_folderhash="55f4befe" x_contenthash="9574f5be" x_imagesrc="2-2-8.jpg" x_imagewidth="880" x_imageheight="571" x_smallsrc="2-2-8.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-8.small.jpg" x_smallwidth="512" x_smallheight="313"/>
                                                  <Caption>Figure 13 The time line illustrates that as time has progressed the number of connected devices has surpassed the world’s population</Caption>
                                                  <Description>The figure shows three bars with figures above each other and a timeline at the bottom with dates 2003, 2010, 2015 and 2020. The top bar shows world population with values for each date respectively: 6.3 billion, 6.8 billion, 7.2 billion, 7.6 billion. The second bar shows connected devices with values for each date respectively: 500 million, 12.5 billion, 25 billion, 50 billion. The bar above the timeline shows connected devices per person with values above each date respectively: 0.08 (between 2003 and 2010 there became more devices than people), 1.84, 3.47, 6.58.</Description>
                                                  </Figure>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.9 Data in motion</Title>
                                                  <Paragraph>Typically, data is viewed as information that has been collected over time. For example, it may have been collected through various transactions that represent an organisation’s order-processing. This data has value to the organisation and is historical in nature. This is static data that we call 'data at rest'.</Paragraph>
                                                  <Paragraph>However, as the accelerated growth for large quantities of data continues, much of this data's value is lost almost as quickly as it is created. Devices, sensors, and video deliver this growing source of new data on a constant basis. This data provides maximum value while it is interacting in real-time. We call this 'data in motion'.</Paragraph>
                                                  <Paragraph>This influx of new data opportunities is providing new paths to improve our world, from solving global health issues to improving education. There is incredible potential for intelligent solutions to collect, manage, and evaluate data at the speed of human communications. As a result, the internet of everything will increasingly become about 'data in motion'. Watch Cisco’s vision of bringing the evolution of data to the IoE.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data.mp4" width="512" type="video" x_manifest="ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="56d436dc" x_subtitles="ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data.srt">
                                                  <Transcript>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>It's been said that stories are just data with a soul. But what does data look like in a story that is still being written? It's data in motion, generated by all of us and everything around us, together. And it's most valuable the moment it is created. </Remark>
                                                  <Remark>So while insights from our past will continue to guide us forward, we will move beyond the way we record and react and set a new course that connects pinpoints of intelligence with the people and machines that take action. Sensors will talk to doctors so a coach can heal on the sidelines rather than in the hospital, while the intelligent network lets a son's proudest moment reach his biggest fan without being lost in the crowd. Data in motion will move us from an event to an insight in only a moment, allowing us to use everything we already have to create amazing things we've never imagined. </Remark>
                                                  <Remark>And it's only the beginning. As new people, processes, and things come together on the internet of everything, the importance of our data will be measured not by what it says but by what we can do with it, in a moment of truth, in our greatest story yet. To learn more, visit www.cisco.com/go/datainmotion.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data.jpg" x_folderhash="55f4befe" x_contenthash="92dd7f37" x_imagesrc="ioe_1_video_2_2_3_2_data_in_motion_the_evolution_of_data.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.10 Managing big data</Title>
                                                  <Paragraph>A driving factor of this growth of information is the number of devices connected to the internet, and the number of connections between those devices. But this is just the beginning. New devices are being connected to the internet daily, creating an abundance of new content.</Paragraph>
                                                  <Paragraph>With this amount of information, organisations must learn how to manage data and also, how to manage 'big data'.</Paragraph>
                                                  <Paragraph>There are three primary dimensions of big data that must be accounted for: volume, variety, and velocity.</Paragraph>
                                                  <Paragraph>Volume describes the amount of data being transported and stored. Variety describes the type of data it is. Velocity describes the rate at which this data is moving. Data cannot move without infrastructure. The swiftness of infrastructure (input/output, bandwidth, and latency) and the ability to rapidly enable optimal resources (network, CPU, memory and storage) directly affects the velocity of data.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.11 Big data analytics</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-11.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-11.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="cb35dda9" x_imagesrc="2-2-11.jpg" x_imagewidth="880" x_imageheight="523" x_smallsrc="2-2-11.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-11.small.jpg" x_smallwidth="481" x_smallheight="296"/>
                                                  <Caption>Figure 14 Global mobile data traffic growth/top-line</Caption>
                                                  <Description>The figure shows that over a five year period of time that they number of exabytes per month increased nearly 11-fold.</Description>
                                                  </Figure>
                                                  <Paragraph>Big data applications receive information from a wide array of data sources, including PCs, smartphones, tablets, machines, sensors, social media, and multimedia applications.  Much of this growth in data is due to mobile devices, as shown in the figure. Mobility enables anytime, anywhere, any device, and any content-user engagement.</Paragraph>
                                                  <Paragraph>Big data refers to the way in which organisations collect and analyse vast stores of data for insights that can help identify trends, predict behaviour, and empower decision makers. It considers:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>how much data is generated</ListItem>
                                                  <ListItem>how this data is identified and managed as an asset to the organisation</ListItem>
                                                  <ListItem>how this data is turned into usable information</ListItem>
                                                  <ListItem>how organisations use this data to make decisions.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Ask yourself, what happens when we share information or an opinion about a business on a social network? How is this information propagated? Who gets this information? And more importantly, how are businesses reacting and using this information to create new customer connections?</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.12 Big data analytics (cont.)</Title>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_3_5_big_data_big_deal.mp4" type="video" width="512" x_manifest="ioe_1_video_2_2_3_5_big_data_big_deal_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="81160b50" x_subtitles="ioe_1_video_2_2_3_5_big_data_big_deal.srt">
                                                  <Transcript>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>Enormous amounts of data are being generated every day. And most companies are collecting, storing, and analysing that data.</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  <Remark>Their goal? Transform data into strategic information and discoveries. Two out of three IT managers say big data will be a priority for their company in 2013 and for the next five years. But there are challenges.</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  <Remark>And there are concerns.</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  <Remark>Big data is just the beginning. Data from devices, sensors, and monitors often provide the most value while interacting in real time. Cisco calls this "data in motion." It enables actions and decisions to be made instantly.</Remark>
                                                  <Remark>For example, think of machine-to-machine communication. And by 2017 more than 1.7 billion machine-to-machine connections are expected. We are just starting to realise the true potential of data.</Remark>
                                                  <Remark>[TYPING]</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_3_5_big_data_big_deal.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_2_2_3_5_big_data_big_deal.jpg" x_folderhash="55f4befe" x_contenthash="70eb4909" x_imagesrc="ioe_1_video_2_2_3_5_big_data_big_deal.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>Big data applications must be able to gather this data and structure it in a way that can create value for organisations. For example, big data applications must account for changing data sources and trends, such as:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>mobility</b> − mobile devices, events, sharing, and sensor integration</ListItem>
                                                  <ListItem><b>data access and consumption</b> − internet, interconnected systems, social networking, and access models</ListItem>
                                                  <ListItem><b>ecosystem capabilities</b> − major changes in the information processing model and the availability of an open source framework</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>As a result, the cost and complexity of these models has increased, prompting changes in the way big data is stored, analysed, and accessed. Organisations must adjust their current data models to accommodate big data. As a result, organisations are increasingly using virtualisation and cloud computing to support their big data needs.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.13 Virtualisation</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-2-13.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-13.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="0c0a3587" x_imagesrc="2-2-13.jpg" x_imagewidth="880" x_imageheight="595" x_smallsrc="2-2-13.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-2-13.small.jpg" x_smallwidth="481" x_smallheight="308"/>
                                                  <Caption>Figure 15 Virtual machines</Caption>
                                                  <Description>The figure shows a computer that is running as a virtual machine fro Windows, Linux or Mac OS operating systems.</Description>
                                                  </Figure>
                                                  <Paragraph>Historically, each computer has its own operating system, applications, and dedicated hardware components. Now, using software emulation, several virtual computers can run on a single physical computer. This means each virtual computer has its own operating system, applications, and dedicated hardware components. This is known as virtualisation in computing. Each virtual machine, shown in the figure, operates independently.</Paragraph>
                                                  <Paragraph>In the corporate world, a single physical infrastructure can run multiple virtual infrastructures. By virtualising the servers and networks, companies can reduce operational and administrative costs. The operational savings can come from the reduction in power and cooling requirements and the number of physical machines. A virtual server can be added to support additional applications.</Paragraph>
                                                  <Paragraph>You can also use virtualisation for your personal computing needs. You can try a new operating system on your computer without damaging your current system. You can browse the internet safely with your virtual machine. The virtual machine can be deleted if anything goes wrong.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.14 Cloud computing</Title>
                                                  <Paragraph>Cloud computing is another way to manage, store, and access data.</Paragraph>
                                                  <Paragraph>Cloud computing involves large numbers of computers connected through a network. Cloud computing providers rely heavily on virtualisation to deliver their services. It can also reduce the operational costs by using resources more efficiently. These companies provide four distinct categories of services. The table below outlines each category in more detail</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 4 Categories of cloud computing services</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">SaaS</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">PaaS</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">IaaS</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">ITaas</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft" borderleft="false"><language xml:lang="zh">Software as a Service: Applications delivered over the web to the end users.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Platform as a Service: Tools and services used to deliver the applications.</language></td>
                                                  <td class="TableLeft">Infastructure as a Service: Hardware and software to the power servers, storage, networks and operating systems.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">IT as a Service: IT professionals support applications, platforms and infastructure.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>Cloud computing allows the users to access their data anywhere and at any time. You are probably already using some form of Cloud computing if you use web-based email services.</Paragraph>
                                                  <Paragraph>Cloud computing also enables organisations to streamline their IT operations by subscribing only to needed services. By using Cloud computing, the organisations may also eliminate the need for onsite IT equipment, maintenance, and management. Cloud computing reduces costs for organisations. It reduces equipment costs, energy costs, physical plant requirements, and support personnel training needs.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.15 Data centres</Title>
                                                  <Paragraph>Data centres are a critical enabler of cloud computing. A data centre is a facility that provides the necessary services to host the largest computing environments in existence today. Its main function is to provide business continuity by keeping the computing services available because most organisations are dependent on their IT operations.</Paragraph>
                                                  <Paragraph>To provide the necessary level of service, several factors must be considered in a data centre deployment:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Location</b> – Data centres should be located where there is reduced risk of natural disasters and sufficiently distanced from areas with high traffic of people (e.g. airports, malls, etc.) and areas of strategic importance to governments and utilities (e.g. refineries, dams, nuclear reactors, etc.)</ListItem>
                                                  <ListItem><b>Security</b> – A data centre should extend tight controls over physical access and on-site personnel.</ListItem>
                                                  <ListItem><b>Electrical</b> – There should be sufficient access to electrical power with backup power consisting of uninterruptible power supplies, battery banks, and electrical generators.</ListItem>
                                                  <ListItem><b>Environmental</b> – A tightly controlled physical environment that maintains appropriate temperature and humidity. It should also include sophisticated fire suppression systems.</ListItem>
                                                  <ListItem><b>Network</b> – The network infrastructure should be scalable and reliable with redundant connectivity.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Currently, there are over 3000 data centres in the world that offer general hosting services (IaaS) to individuals and organisations. There are many more data centres that are owned and operated by private industries for their own use.</Paragraph>
                                                  <Paragraph>Watch the <a href="http://www.youtube.com/watch?v=r1Nt1z5uM44">Youtube video</a> for more information and a detailed tour of the Cisco Data Center in Allen, Texas.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.16 Clouds</Title>
                                                  <Paragraph>Cloud computing uses a shared pool of computing resources (e.g., networks, servers, storage, applications, and services) to provide on-demand network access. Using virtualisation in data centre environments, Cloud computing can be rapidly scaled with minimal management and effort.</Paragraph>
                                                  <Paragraph>The National Institute of Standards and Technology (NIST) has defined four types of cloud deployment models:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>private</ListItem>
                                                  <ListItem>public</ListItem>
                                                  <ListItem>community</ListItem>
                                                  <ListItem>hybrid.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>A private cloud is created exclusively for a single organisation. The infrastructure could be physically located on or off site, and may be owned by a separate provider. The private cloud provides services only to members of the single organisation.</Paragraph>
                                                  <Paragraph>A public cloud is created for use by the general public. The infrastructure is physically located on the provider’s site, but may be owned by one or multiple organisations that could include businesses, academic institutions, or governments.</Paragraph>
                                                  <Paragraph>A community cloud is created for exclusive use by a specific community. The community consists of multiple organisations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). The infrastructure could be physically located on or off site, and may be owned by a separate provider or by one or more of the organisations in the community. The differences between public clouds and community clouds are the functional needs that have been customised for the community. For example, healthcare organisations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Organisations can share the implementation effort of these requirements across a common cloud deployment.</Paragraph>
                                                  <Paragraph>A hybrid cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that are unique entities. These entities are bound together by technology that enables data and application portability. This portability allows an organisation to maintain a single perspective of a cloud solution while taking advantage of the strengths available from different cloud providers. For example, geography (location to end users), bandwidth, policy or law requirements, security, and cost are all features that may differentiate providers. A hybrid cloud offers the flexibility to adjust and react to these provider services, on demand.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.17 Three critical cloud conversations</Title>
                                                  <Paragraph>Cloud computing has already helped organisations make significant changes to their infrastructures. This process will become more pervasive as organisations take advantage of the IoE and assess big data needs. Organisations must leverage a variety of clouds. They will need an infrastructure and IT staff able to blend those clouds, and they will need to determine which cloud model might be best for each service.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 5 Clouds</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><language xml:lang="en-US">The IoE requires a variety of cloud models</language></td>
                                                  <td><language xml:lang="en-US">All cloud models must work together seamlessly</language></td>
                                                  <td><language xml:lang="en-US">Enterprises must keep their options open</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><Paragraph><language xml:lang="en-US">Organisations need maximum flexibility to efficiently and reliably connect people and things:</language></Paragraph><BulletedList><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">private</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">public</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">community</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">hybrid.</language></ListItem></BulletedList></td>
                                                  <td class="TableLeft"><Paragraph><language xml:lang="en-US">When selecting cloud solution providers, integration and consistency across all models is a critical factor. </language></Paragraph><Paragraph><language xml:lang="en-US">Cloud solution providers must offer:</language></Paragraph><BulletedList><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">security</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">compliance</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">performance.</language></ListItem></BulletedList></td>
                                                  <td><Paragraph><language xml:lang="en-US">The IoE is an evolving marketplace and organisations must evolve with it.</language></Paragraph><Paragraph><language xml:lang="en-US">Choice is critical</language></Paragraph><Paragraph><language xml:lang="en-US">Avoid getting locked in to one provider or one methodology.</language></Paragraph><Paragraph><language xml:lang="en-US">Need expert advice to capitalise on the evolution of the cloud.</language></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><Paragraph><language xml:lang="en-US">Organisations need a flexible infrastructure that: </language></Paragraph><BulletedList><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">adapts</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">speeds service introduction</language></ListItem><ListItem><language xml:lang="en-US"/><language xml:lang="en-US">ensures governance and financial reporting for each model.</language></ListItem></BulletedList></td>
                                                  <td class="TableLeft"/>
                                                  <td/>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.2.18 Lab: install a Linux virtual machine (optional)</Title>
                                                  <Paragraph>Virtualisation is a critical factor in cloud computing and data centres. You can experience virtualisation on your own PC by installing a virtual computer.</Paragraph>
                                                  <Paragraph>Virtual computers that run within a physical computer system are called virtual machines. Today, entire computer networks are virtualised. Anyone with a modern computer and operating system has the ability to run virtual machines from the desktop.</Paragraph>
                                                  <Paragraph>Watch a demonstration of installing a Linux virtual machine.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine.mp4" type="video" width="512" x_manifest="ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="4a1ecf7b" x_subtitles="ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine.srt">
                                                  <Transcript>
                                                  <Speaker>INSTRUCTOR</Speaker>
                                                  <Remark>This is an introductory tutorial on virtualisation. In this tutorial, I'm going to use VMware player to create a virtual machine or virtual computer. The VMware player is free to download. All you need to do is go to the VMware.com website, register the free user account, and then you can download the VMware player software. </Remark>
                                                  <Remark>Once installed on your computer, you're ready to create a virtual machine. However, before you do that, you will need an operating system to instal on your virtual machine. This will need to be either a CD or DVD image of an operating system that you can instal or you could download a bootable image or dot ISO file that you could use to instal onto your virtual machine. </Remark>
                                                  <Remark>In this tutorial, I'm going to use a free distribution of Linux that I can download an ISO file of and instal in the virtual machine. Now, there are many different flavours or distributions of Linux. So the first thing you want to do is decide which version of Linux you'd like to instal. </Remark>
                                                  <Remark>There is Linux Mint. Here's the page for Linux Mint, LinuxMint.com. You can download different version of Linux Mint. There you see there's 32-bit and 64-bit versions here that you can download. Ubuntu is also a very popular Linux distribution. You can download either cloud server or desktop editions here. Fedora, which is Red Hat sponsored community project and a free download. CentOS, which is a server edition of Linux based on Red Hat Enterprise. </Remark>
                                                  <Remark>Or there's even smaller distributions of Linux like SliTaz, which is very interesting. SliTaz is a very small distribution, requires only 256 megabytes of RAM and can be installed on as little as 100 megabyte hard drive. This happens to be a live CD that all you need to do is download and then run in the virtual machine. And you don't even need to instal it on your virtual computer hardware. </Remark>
                                                  <Remark>So now we're ready to create our virtual machine. I'll click Create a New Virtual Machine. So now you have three choices-- instal from an installer disc, a CD or DVD drive installation disc, instal from a disc image file-- this is a dot ISO file-- or do I want to instal the operating system later? In other words, create the virtual computer hardware and then instal the operating system later. This is the choice that I usually use. So I'll just press Next. </Remark>
                                                  <Remark>You can see I've chosen Linux here already, but we could be installing Windows, Novell, Unix, Solaris, anything. Let's choose the version of Linux. As you can see, many of the popular distributions of Linux are listed here. Mint happens to not be on this list. So I'll choose a close neighbour. So I'll scroll down here to ubuntu 64-bit and use that as the version that I'll base this off of. I'll press Next, and I'll give it a title here. Mint New. </Remark>
                                                  <Remark>The location of where your virtual machine will be stored-- you can see that it's defaulting to My Documents folder in a folder called Virtual Machines. And it's created a new folder called Mint New. I'll press Next. </Remark>
                                                  <Remark>The maximum disc size that you'll need, it's recommending I use 20 gigabytes, and that's fine. I'll make that a little bit smaller. I'll change it, let's say, down to 12. I'll accept the default, which is to split the virtual disc into multiple files. All right. I'll press Next. And I can press Finish or I can customise the hardware. Let's go ahead and customise the hardware. </Remark>
                                                  <Remark>Now let's look at the settings that we have so far. For memory, it's allocating so far a gigabyte. Processors, one. If you have a multiple core system, in this case, the computer I'm using is a quad core computer, I could change this and maybe up it to, let's say, two processors. New CD DVD. This is my CD DVD drive. </Remark>
                                                  <Remark>What I'm going to do here is I'm going to change it from my physical CD DVD drive and point it to my ISO image file so that when I boot up this virtual machine, it boots right to the ISO image and starts the installation. So I'll browse for it. You can see I have a bunch of versions here, and I happen to have Linus Mint 16 Cinnamon 64-bit right here. So I'll select that. Click Open, and now that's ready to go. </Remark>
                                                  <Remark>Now, for network adapter, I have a few choices. I could leave it in network address translation mode, which is the easiest mode to use, or maybe I should choose Bridged mode. In Bridged mode, my virtual machine will pick up an IP address off of the network just like the computer that it's hosted on. I prefer this. That way, I can use my virtual machine and let it talk to other computers on the network, just as if it was an actual physical machine on the network. </Remark>
                                                  <Remark>You may need to configure which physical network adapters you're going to have this virtual machine bridge to. If you click Configure Adapters, you can see that VMware recognises all of my network adapters, my wireless NIC, Centrino Advanced-N A, G, and N, my gigabit ethernet NIC, gigabit network connection, and even my TAP win32 tunnel interface, which is a virtual NIC for VPN connections. </Remark>
                                                  <Remark>What I like to do here is specify which NIC I want this virtual computer to go out of or to bridge to. Right now, both are checkmarked, both my wireless network card and my physical gigabit ethernet network card. Sometimes if both are selected, VMware will be confused as to which NIC it's supposed to bridge to. </Remark>
                                                  <Remark>So in this case, I'm going to uncheck my wireless network interface card and leave just the gigabit ethernet port selected. And I'll click OK and click Close and Finish. And there is my new virtual computer, and it's ready to be booted up and Mint to be installed. </Remark>
                                                  <Remark>OK so I'll press Play Virtual Machine. You can see I get a message here about installing software updates. I'll click Remind Me Later and Removable Devices, I'll just click OK. And you can see that Linux Mint, the ISO file has been read, and it's about to boot up. </Remark>
                                                  <Remark>OK. Linux Mint has successfully booted. I can click into the window now and as soon as I do that, my cursor is captured by the virtual machine, and now the cursor is in the virtual machine. If I want to drag out, you can see sometimes you can just drag right out, and the cursor will be returned to the Windows Desktop. </Remark>
                                                  <Remark>Sometimes if the cursor is captured, and it doesn't drag out, what you can do is to release the cursor and get your cursor back into Windows, press Control-Alt on your keyboard. And I'm usually pressing the Control-Alt keys to the right of my spacebar to recapture the cursor in Windows. </Remark>
                                                  <Remark>So there it is Mint. You can see it's a working version of Mint. There is my NIC up here. The network adapter is in Bridge mode. Let's see if we have an internet connection by default. I'll click on Firefox browser. And looks like we do. I'll see if I can go to Google, hit Enter, and there's Google. So everything is working nicely. </Remark>
                                                  <Remark>Now, if I want to instal Mint to the virtual hard drive, all I need to do is click Instal Linux Mint, and it will actually instal Mint operating system onto the virtual disc hard drive that I created for this virtual machine. Right now, Linux Mint is operating as a live CD. In other words, it's a working operating system that you boot up to, and you can use right from the CD. So it hasn't actually been installed to the virtual disc. I'll show you what I mean. </Remark>
                                                  <Remark>If I double click here, you can see I get an Installation screen, and I can walk through the installation process. Press Continue. I'll press Continue. Erase disc and Instal Linux Mint. Now, some students get afraid of this. They think they might be installing and erasing their hard drive in Windows, but that's not the case. This is the virtual disc drive that we created for this virtual machine. </Remark>
                                                  <Remark>So I'll just click Instal Now. Choose my location. Keyboard layout. Give it a name, a username, and a password. I'm just going to choose Student, Student, Student since this is just a test instal. I can even choose login automatically or require my password to login. I'll leave it on Require My Password, even though it's just Student, Student. I can encrypt my Home folder if I want to. I'm not going to do that. </Remark>
                                                  <Remark>And as you can see, the installation process is proceeding. At the bottom of the screen, you may notice the prompt to Instal Tools. This is for VMware tools. And I recommend installing VMware tools, as it will help you to get your virtual machine to use Full Screen mode and also improves the ability to mount external drives like USB thumb drives. </Remark>
                                                  <Remark>Let's revisit our installation procedure. You can see that Mint is still installing. Its retrieving files, and it's about 2/3 of the way finished. I'll check back with it when it's finished. OK. And as you can see, the installation is complete. I can continue testing or restart Linux, and when it reboots, it will boot to the virtual hard drive where Mint has successfully been installed. </Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine.jpg" x_folderhash="55f4befe" x_contenthash="9ff908e8" x_imagesrc="ioe_1_video_2_2_18_lab_install_a_linux_virtual_machine.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>The video demonstration shows how to complete this activity. After viewing the video, you can download the <a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49457">Lab – Install a Linux Virtual Machine (Optional)</a> document to investigate the activity on your own.</Paragraph>
                                                  <Paragraph>Please be aware that virtualisation and running a Linux Virtual Machine will not work on all computers and devices being used to read this course. This optional activity is designed for desktop virtualisation using a personal computer. Another challenge you must be aware of before you commence is that virtualisation requires extra computer system memory which your own system may not have. If you have at least 2Gb (gigabytes) of memory (RAM) available this activity will work.</Paragraph>
                                                  <Paragraph>An alternative solution, if you have sufficient bandwidth on your internet connection, is to use <a href="https://susestudio.com/">SuseStudio</a>. While this is advanced, it does allow you to run a remote Linux desktop system.</Paragraph>
                                                  <Paragraph>Another alternative is to use the web browser friendly demo version of Linux Unhatched from NDG who also work in partnership with Cisco Systems. You will need to <a href="https://www.netdevgroup.com/try/unhatched">sign in</a> and you will be able to use Linux on any HTML5 compatible browser. This is unique as it is running on cloud based virtualisation. </Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.3 People as a pillar</Title>
                                                  <Paragraph>The reality is that we are all connected (like it or not) − the chances are as you are reading this course you may be connected to others via email, text (SMS) or social media. In this section you will learn about:how information adapts the way we behave, how (and why) businesses use data and the essential collaborative nature of the internet.</Paragraph>
                                                  <Section>
                                                  <Title>2.3.1 People must be connected</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-3-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-3-1.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="e04c1938" x_imagesrc="2-3-1.jpg" x_imagewidth="880" x_imageheight="493" x_smallsrc="2-3-1.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-3-1.small.jpg" x_smallwidth="429" x_smallheight="255"/>
                                                  <Caption>Figure 16 The four pillars: people</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each, with People highlighted.</Description>
                                                  </Figure>
                                                  <Paragraph>Data alone serves no purpose. A large amount of data which no one can access, serves no one. Organising that data and transforming it into useable information enables people to make better-informed decisions and take appropriate actions. This creates economic value in an economy that is enabled by the internet of everything.</Paragraph>
                                                  <Paragraph>This is why people is one of the four pillars. People are a central figure to any economic system. People interact as producers and consumers where the intent is to improve well-being by satisfying human needs. Whether the connections are people-to-people (P2P), machine-to-people (M2P), or machine-to-machine (M2M), all connections, and the data generated from those connections, are used to enhance the value for people.</Paragraph>
                                                  <Paragraph>The internet is teeming with data. Having access to the data and then taking action based upon the knowledge gained from this information is what the IoE is all about. For example, when Jack Andraka was a 15 year old high school student, he accessed information on the internet to develop a test that could detect pancreatic cancer at a much earlier stage when chances for survival are significantly better.</Paragraph>
                                                  <Paragraph>What would you do to make your world a better place?</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.3.2 Information transforms behaviour</Title>
                                                  <Quote>
                                                  <Paragraph>This [the IoE] is not about technology at all. It’s about how we change people’s lives. </Paragraph>
                                                  <SourceReference>John Chambers, former CEO Cisco Systems</SourceReference>
                                                  </Quote>
                                                  <Paragraph>Value is a measure of benefit in an economic system. It is people who determine the value of offerings through a system of exchange. It is important to highlight that while data and analytics matter, it is judgement from people that turns data into insights, and insights into IoE value.</Paragraph>
                                                  <Paragraph>The IoE enables accurate and timely information that can result in changing human behaviour for the benefit of all people. It facilitates feedback that allows people to make informed decisions that bridge the differences between actual outputs and desired outputs. This is known as a feedback loop. A feedback loop can provide real-time information based on current behaviour, and then deliver actionable information to modify that behaviour.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.3.3 How businesses use data</Title>
                                                  <Paragraph>The feedback loop is an important asset to businesses because it helps them react and plan in a constantly changing business landscape. It allows a business to have relevant and competitive offerings that address customer needs. For example, many retailers use loyalty cards to track customer purchases and identify trends. This enables retailers to promote offerings directly to the most relevant shoppers that represent the greatest potential for profit.</Paragraph>
                                                  <Paragraph>A hundred years ago businesses were focused on creating undifferentiated products, selling the same product to everyone. This was aligned with the evolution of mass production during the same time period. Equally aligned were promotional strategies for products, mass marketing using signage, pamphlets, and newspapers in hopes that people would buy the product.</Paragraph>
                                                  <Paragraph>However, a single business product or service is not likely to be needed by every person. A modern business is aware of targeted marketing that creates differentiated offerings based on customer needs. This is why businesses need access to customer data.</Paragraph>
                                                  <InternalSection>
                                                  <Heading>Micromarketing example</Heading>
                                                  <Paragraph>Target marketing is aimed at a specific group of people, separate from the market as a whole. This market may be based upon people who live in the same region, or have the same job title, or make a certain amount of money.</Paragraph>
                                                  <Paragraph>For instance, consumer data can show that a particular television programme is viewed most by people aged 40 to 65 with an annual household income of $250,000 or more. These programmes often run commercials for high-end cars because the car companies have access to the viewer data. They will pay for their commercials to run when their target market is most likely to see them.</Paragraph>
                                                  <Paragraph>Micromarketing is an even more precise version of marketing. E-commerce sites and loyalty programmes allow businesses to know more precisely what kind of product or service you may require.</Paragraph>
                                                  <Paragraph>For example, you may receive an email from an online site where you have purchased (or even browsed) before. This email may let you know about a sale on an item that is similar to something you have purchased in the past. Additionally, while browsing the web, you may notice an ad for the exact pair of shoes you were looking at online yesterday. This is not a coincidence.</Paragraph>
                                                  </InternalSection>
                                                  <InternalSection>
                                                  <Heading>Collaboration</Heading>
                                                  <Paragraph>It is through inclusive practices that enable people to contribute and collaborate effectively that better decisions will be made to maximise value. In fact, better collaboration within organisations is an area that will benefit most from the IoE. Collaboration will facilitate innovative new offerings that realise the potential of the IoE.</Paragraph>
                                                  <Paragraph>Collaboration in the IoE will make organisations more aware of customer needs and opportunities. Customers will be able to solve problems and get advice when and where it’s most convenient for them. Organisations will have new sources of information as people connect using data, voice, video, and social media.</Paragraph>
                                                  <Paragraph>Organisations using collaboration technologies will be able to predict and proactively resolve problems. They will be able to leverage social media to identify potential problems and resolve them before they become a serious issue. They will be able to identify and connect to the right expert at the right time. The expertise of highly-trained and knowledgeable employees will be more easily scaled across multiple locations.</Paragraph>
                                                  <Paragraph>With these collaboration technologies, businesses will experience the increased innovation and agility that will drive their growth. Organisations will be able to foster better relationships between employees who provide creative approaches to offerings, solutions, and processes. They will also be better able to connect decision makers, regardless of location, so that new innovations can be realised sooner.</Paragraph>
                                                  </InternalSection>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.4 Process as a pillar</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-1.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="09b1c2bc" x_imagesrc="2-4-1.jpg" x_imagewidth="880" x_imageheight="493" x_smallsrc="2-4-1.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-1.small.jpg" x_smallwidth="433" x_smallheight="255"/>
                                                  <Caption>Figure 17 The four pillars: process</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each, with Process highlighted.</Description>
                                                  </Figure>
                                                  <Paragraph>The fourth pillar is process. Processes play an important role in how the other pillars of things, data, and people work with each other to deliver value in the connected world of IoE.</Paragraph>
                                                  <Paragraph>The internet has revolutionised the way businesses manage their supply chains and the way consumers shop. Soon we will have visibility into processes we could never see before. This will provide opportunities to make these interactions faster and simpler.</Paragraph>
                                                  <Paragraph>With the correct process, connections become relevant and add value because the right information is delivered to the right person, at the right time, in the appropriate way.</Paragraph>
                                                  <Paragraph>Processes are facilitating interactions between people, things, and data. Today, the IoE brings them all together by combining machine-to-machine (M2M), machine-to-people (M2P), and people-to-people (P2P) connections, as shown in Figure 18.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4.jpg" width="100%" webthumbnail="true" x_folderhash="55f4befe" x_contenthash="4a6a1e34" x_imagesrc="2-4.jpg" x_imagewidth="880" x_imageheight="561" x_smallsrc="2-4.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4.small.jpg" x_smallwidth="512" x_smallheight="355"/>
                                                  <Caption>Figure 18 The IoE combines machine-to-machine (M2M), machine-to-people (M2P), and people-to-people (P2P) connections</Caption>
                                                  </Figure>
                                                  <Section>
                                                  <Title>2.4.1 M2M connections</Title>
                                                  <Paragraph>Machine-to-machine (M2M) connections occur when data is transferred from one machine or 'thing' to another over a network. Machines include sensors, robots, computers, and mobile devices. These M2M connections are often called the internet of things.</Paragraph>
                                                  <Paragraph>An example of M2M is a connected automobile that is signaling that a driver is almost home, which prompts the home network to adjust the home temperature and lighting.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-2.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-2.jpg" width="100%" webthumbnail="true" x_folderhash="55f4befe" x_contenthash="f7003cd4" x_imagesrc="2-4-2.jpg" x_imagewidth="880" x_imageheight="494" x_smallsrc="2-4-2.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-2.small.jpg" x_smallwidth="512" x_smallheight="353"/>
                                                  <Caption>Figure 19 M2M connections within the IoT</Caption>
                                                  </Figure>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.4.2 M2P connections</Title>
                                                  <Paragraph>Machine-to-people (M2P) connections occur when information is transferred between a machine (such as a computer, mobile device, or digital sign) and a person, as shown in Figure 20. Whether a person gets information from a database, or conducts a complex analysis, this is an M2P connection. These M2P connections facilitate the movement, manipulation, and reporting of data from machines to help people make informed judgments. The actions that people take based on their informed judgments complete an IoE feedback loop.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-3.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-3.jpg" width="100%" webthumbnail="true" x_folderhash="55f4befe" x_contenthash="c31b3a4d" x_imagesrc="2-4-3.jpg" x_imagewidth="880" x_imageheight="514" x_smallsrc="2-4-3.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-3.small.jpg" x_smallwidth="512" x_smallheight="341"/>
                                                  <Caption>Figure 20 Interactions between M2M and M2P connections.</Caption>
                                                  </Figure>
                                                  <Paragraph>Watch the video of examples of M2P connections.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences.mp4" type="video" width="512" x_manifest="ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="eccbde9f" x_subtitles="ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Speaker>SCOTT VOELLER</Speaker>
                                                  <Remark>MGM Resorts International is a recognised leader in global entertainment and hospitality. We operate 24 different properties, both domestic and international. Our mission is to engage, entertain, and inspire our guests. And we do that through a wide variety of dining and shopping and entertainment experiences. We want to deliver that at a level that has never been experienced before.</Remark>
                                                  <Remark>The Bellagio app is like a personal concierge for our guests. It allows them to find out all the information that they need about all of our properties, restaurants, dining, and shopping, with pinpoint accuracy.</Remark>
                                                  <Speaker>WOMAN 1</Speaker>
                                                  <Remark>So we're actually meeting the girls for lunch in an hour.</Remark>
                                                  <Speaker>WOMAN 2</Speaker>
                                                  <Remark>Hm, an hour, huh? What are we going to do for a whole hour?</Remark>
                                                  <Speaker>BOTH</Speaker>
                                                  <Remark>Shoes!</Remark>
                                                  <Remark>[LAUGHTER]</Remark>
                                                  <Speaker>WOMAN 2</Speaker>
                                                  <Remark>OK. Oh, perfect. There's a great shop right around the corner.</Remark>
                                                  <Speaker>WOMAN 1</Speaker>
                                                  <Remark>Look, and it also says that since I'm an I'm M Life Platinum member, I can actually save 15%. Let's go.</Remark>
                                                  <Speaker>WOMAN 2</Speaker>
                                                  <Remark>Let's go. Let's do this.</Remark>
                                                  <Speaker>WOMAN 1</Speaker>
                                                  <Remark>Let's do this. It's time.</Remark>
                                                  <Speaker>CHRISTOPHER GUMIELA</Speaker>
                                                  <Remark>The interesting thing is that this project actually started from IT. And then as us marketers came involved, we were able to partner up with IT and deliver on this enhanced customer experience through the application. They can see exactly where they are within Bellagio, where they want to go, as well as enable marketing to them, so we know that if we can communicate to them the way they want to be communicated to, which is through their phone, that we're making a step in the right direction.</Remark>
                                                  <Speaker>MAN</Speaker>
                                                  <Remark>This has been a great conference so far. Yeah, looks like the next keynote speaker starts in about 10 minutes. You know, this place is huge. But this app found me a double cappuccino, showed me exactly how to get here, and it's on the way to the Grand Ballroom.</Remark>
                                                  <Speaker>CHRISTOPHER GUMIELA</Speaker>
                                                  <Remark>New Bellagio app is definitely working. Through the Wi-Fi network and our partnership with Cisco, we're definitely able to see new revenue opportunities that we didn't have before by marketing to customers in real time, based on their location, based on their preferences, and based on, really, what they want to hear.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>We were just walking by the Cirque du Soleil box office, and we got a notification that there were available tickets for tonight.</Remark>
                                                  <Speaker>WOMAN 3</Speaker>
                                                  <Remark>We just picked up our tickets. I can't wait.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>Well, we've got a couple hours to kill, so what's next?</Remark>
                                                  <Speaker>WOMAN 3</Speaker>
                                                  <Remark>Oh, let me see.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>This new Bellagio app is lifesaving.</Remark>
                                                  <Speaker>WOMAN 3</Speaker>
                                                  <Remark>Hey, what about Hyde? It shows it's open now for cocktails.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>That would be perfect. It's right-- right--</Remark>
                                                  <Speaker>BOTH</Speaker>
                                                  <Remark>There.</Remark>
                                                  <Speaker>MAN 2</Speaker>
                                                  <Remark>Let's go.</Remark>
                                                  <Speaker>WOMAN 3</Speaker>
                                                  <Remark>Let's go. Downloading this app? It was my idea.</Remark>
                                                  <Speaker>SCOTT VOELLER</Speaker>
                                                  <Remark>You know, for us, particularly on the marketing side, to be completely aligned with IT is critical. Because it's really the technology that allows us to deliver the levels of service and engagement that we're looking for.</Remark>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences.jpg" x_folderhash="55f4befe" x_contenthash="81807fb4" x_imagesrc="ioe_1_video_2_4_1_3_mgm_resorts_international_using_cisco_connected_mobile_experiences.jpg" x_imagewidth="512" x_imageheight="289"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.4.3 P2P connections</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-4.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-4.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="4396a300" x_imagesrc="2-4-4.jpg" x_imagewidth="880" x_imageheight="473" x_smallsrc="2-4-4.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-4.small.jpg" x_smallwidth="496" x_smallheight="274"/>
                                                  <Caption>Figure 21 Venn diagram of P2P, M2P and M2M connections</Caption>
                                                  <Description>The figure shows that the highest value is generated where the three types of connections, M2M, M2P, and P2P, interconnect together.</Description>
                                                  </Figure>
                                                  <Paragraph>People-to-People (P2P) connections occur when information is transferred from one person to another. Increasingly, P2P connections happen through video, mobile devices, and social networks. These P2P connections are often called Collaboration.</Paragraph>
                                                  <Paragraph>As shown in the figure, the highest value of the IoE is realised when process facilitates the integration of M2M, M2P, and P2P connections.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.4.4 Property management case study</Title>
                                                  <Paragraph>In what ways can the combination of people, process, data, and things across a secure platform create value? Consider property management and owners, as shown in the Table 6.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 6 Combined value of the  three connections, M2M, M2P, and P2P.</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><b><language xml:lang="en-US">Connection type</language></b></td>
                                                  <td><b><language xml:lang="en-US">Value of combined connections</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td><language xml:lang="en-US">95,000 sensors and devices connected to Cisco network, including fire alarms, wireless access points, video surveillance cameras, temperature sensors, and HVAC</language></td>
                                                  <td><language xml:lang="en-US">Cut energy costs 21% in 2012, another 11% in 2013</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td><Paragraph><language xml:lang="en-US">Data from sensors and devices monitored by building managers with mobile devices</language></Paragraph><Paragraph><language xml:lang="en-US">Energy consumption analysed in real time to increase efficiency, optimise usage</language></Paragraph></td>
                                                  <td><language xml:lang="en-US">Providing network connectivity to tenants</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td><language xml:lang="en-US">Mobile employees work with tenants and respond to service request in real time via mobile devices</language></td>
                                                  <td><language xml:lang="en-US">Plans to offer integrated unified communications (UC), wireless, physical security services</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>In a commercial real estate market, a property management company must look for ways to differentiate itself from its competitors by providing unique services to tenants and increasing revenues along the way.</Paragraph>
                                                  <Paragraph>In one example, a property management company installed 95,000 sensors throughout the building on a Cisco network to track energy usage. By applying analytics applications, the company was able to track energy usage and help tenants lower their energy bills. This company also provided their building managers and other facilities employees with mobile devices to improve collaboration and service to tenants.</Paragraph>
                                                  <Paragraph>The result was a 21% reduction in energy costs in 2012.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>2.4.5 Timely and relevant information</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-6.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="d063e801" x_imagesrc="2-4-6.jpg" x_imagewidth="880" x_imageheight="411" x_smallsrc="2-4-6.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-6.small.jpg" x_smallwidth="492" x_smallheight="236"/>
                                                  <Caption>Figure 22 The internet of everything</Caption>
                                                  <Description>The figure is of water droplets being connected to other droplets is being used as a metaphor to the IoE.</Description>
                                                  </Figure>
                                                  <Paragraph>The billions of M2M, M2P, and P2P connections make possible the 'everything' in the IoE. The process pillar leverages the connections between data, things, and people to deliver the right information, to the right thing or person, at the right time. It is these billions of connections that add value.</Paragraph>
                                                  <Paragraph>A drop of water is a great metaphor for the IoE. A single drop by itself is not that significant. Yet, when combined with millions or even billions of other drops, it can change the face of our planet. Like a single drop of water, a single person, bit of data, or thing connected with billions of other people, data, and things can shape the face of our planet.</Paragraph>
                                                  <Paragraph>To convert our metaphor into a 'real-world' IoE example, consider how one tiny drop of water can begin a chain reaction that causes a big result. Monitoring systems send alerts of a sudden thundershower. Sensors talk to networks. Networks talk to traffic grids. Traffic grids talk to energy systems. All these work in concert to protect people and preserve their quality of life.</Paragraph>
                                                  <InternalSection>
                                                  <Heading>A drop of water</Heading>
                                                  <Paragraph>Environmental sensors detect an upcoming rain, and relay that information to the organisational network managing that area. Everyone involved in that network within the impacted timeframe is informed of the unexpected weather shift, and schedules are adjusted automatically.</Paragraph>
                                                  <Paragraph>A construction company's connected network shifts labour schedules and material deliveries to continue production within safe areas. soccer practices are cancelled and business meetings in outdoor venues are rescheduled indoors</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-7a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="b4a6e6e5" x_imagesrc="2-4-7a.jpg" x_imagewidth="880" x_imageheight="296" x_smallsrc="2-4-7a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7a.small.jpg" x_smallwidth="512" x_smallheight="188"/>
                                                  <Caption>Figure 23a </Caption>
                                                  <Description>An info graphic about environmental sensors and how it can be used to determine labor shifts.</Description>
                                                  </Figure>
                                                  <Paragraph>Transportation systems work in congruence to resolve traffic risks due to rain. Road sensors detect the change and initiate dispersion of water-resistant solutions to the roads to mitigate road slickness. The lighting network updates to turn on appropriate lights for increased visibility.</Paragraph>
                                                  <Paragraph>Traffic grids work together to optimise traffic flow that accounts for adjusted driving patterns based on behaviour trends.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-7b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="35c6a8e3" x_imagesrc="2-4-7b.jpg" x_imagewidth="880" x_imageheight="296" x_smallsrc="2-4-7b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7b.small.jpg" x_smallwidth="512" x_smallheight="188"/>
                                                  <Caption>Figure 23b </Caption>
                                                  <Description>An info graphic about transportation systems and the use of sensors in the road.</Description>
                                                  </Figure>
                                                  <Paragraph>Agricultural systems connected to a weather monitoring system receive information about a weather pattern change. The agricultural system makes real-time adjustments to the water system to optimise irrigation and keep proper soil moisture levels, while minimising the risk of crop destruction due to overwatering.</Paragraph>
                                                  <Paragraph>Sensors on a fruit tree's branches detect the amount of sag and alert a farmer to projected yield.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-7c.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7c.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="8e15b02e" x_imagesrc="2-4-7c.jpg" x_imagewidth="880" x_imageheight="296" x_smallsrc="2-4-7c.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7c.small.jpg" x_smallwidth="512" x_smallheight="188"/>
                                                  <Caption>Figure 23c</Caption>
                                                  <Description>An info graphic about agricultural systems using sensors for weather monitory and watering systems.</Description>
                                                  </Figure>
                                                  <Paragraph>The internet of everything will enhance our lives tremendously, as even one unassuming element will have sweeping implications for business, social interactions, and well-being in general. Amazing things will happen, and amazing experiences will be created.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-4-7d.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7d.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="11e78f78" x_imagesrc="2-4-7d.jpg" x_imagewidth="880" x_imageheight="296" x_smallsrc="2-4-7d.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-4-7d.small.jpg" x_smallwidth="512" x_smallheight="188"/>
                                                  <Caption>Figure 23d</Caption>
                                                  <Description>An info graphic about how the IoE will enhance lives daily.                  </Description>
                                                  </Figure>
                                                  </InternalSection>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.5 Terms and concepts practice</Title>
                                                  <Paragraph>This activity will help you to test some of the terms and concepts you've been introduced to.</Paragraph>
                                                  <Activity>
                                                  <Question>
                                                  <Paragraph/>
                                                  </Question>
                                                  <Interaction>
                                                  <Matching>
                                                  <Option>
                                                  <Paragraph>ISP</Paragraph>
                                                  </Option>
                                                  <Match x_letter="a">
                                                  <Paragraph>internet service provider</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>IANA</Paragraph>
                                                  </Option>
                                                  <Match x_letter="h">
                                                  <Paragraph><language xml:lang="en-US">the organisation that oversees the assignment of internet addresses</language></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>data velocity</Paragraph>
                                                  </Option>
                                                  <Match x_letter="g">
                                                  <Paragraph>the rate at which data moves on the network infrastructure</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">virtualisation</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="b">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">allows a computer to run multiple operating systems and programs at the same time</language></font></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">cloud computing</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="i">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">uses shared virtualised computing and network resources to deliver IT services across the internet</language></font></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">M2M</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="c">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">things communicating with other devices</language></font></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">feedback loop</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="d">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">allows people to make informed decisions that bridge the differences between actual outputs and desired outputs</language></font></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">RFID tag</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="f">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">an active or passive device that provides identification information when in the presence of a reader device</language></font></Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">big data</language></font></Paragraph>
                                                  </Option>
                                                  <Match x_letter="e">
                                                  <Paragraph><font val="OpenSans"><language xml:lang="en-US">refers to the way in which organisations collect and analyse vast stores of data for insights that identify trends, predict behaviour, and empower decision makers</language></font></Paragraph>
                                                  </Match>
                                                  </Matching>
                                                  </Interaction>
                                                  </Activity>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.6 Session 2 quiz</Title>
                                                  <Paragraph>Check what you have learned in Session 2.</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48934">Session 2 quiz</a></Paragraph>
                                                  <Paragraph>Use 'ctrl' (cmd on a Mac) or right-click to open the quiz in a new window or tab then come back here when you're finished.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>2.7 Summary</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/2-1-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-1.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="7b5c8b5d" x_imagesrc="2-1-1.jpg" x_imagewidth="880" x_imageheight="506" x_smallsrc="2-1-1.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/2-1-1.small.jpg" x_smallwidth="416" x_smallheight="237"/>
                                                  <Caption>Figure 24 The four pillars</Caption>
                                                  <Description>The figure depicts the four pillars of IoE and provides a description of each.</Description>
                                                  </Figure>
                                                  <Paragraph>The four pillars of the IoE are People, Process, Data, and Things.</Paragraph>
                                                  <Paragraph><b>Things</b></Paragraph>
                                                  <Paragraph>For the IoE to function, all of the devices that are part of the intended IoE solution must be connected together so that they can communicate. There are two ways in which devices can be connected; either wired or wirelessly. Devices that are not traditionally connected to the network require sensors, RFIDs, and controllers.</Paragraph>
                                                  <Paragraph><b>Data</b></Paragraph>
                                                  <Paragraph>Big Data refers to the vast amount of data generated every hour by billions of connected devices. Big Data requires new products and techniques to manage, store, and analyse it. Part of the solution to the problem of Big Data is virtualisation and Cloud computing.</Paragraph>
                                                  <Paragraph>Big Data refers to the way in which organisations collect and analyse vast stores of data for insights that can help identify trends, predict behaviour, and empower decision makers. </Paragraph>
                                                  <Paragraph><b>People</b></Paragraph>
                                                  <Paragraph>Connected people make behavioural transformations based on their access to information. Simultaneously, their changed behaviour affects the information that is generated. This is known as a feedback loop. Organisations use data generated by connected people to refine and target their marketing strategies.</Paragraph>
                                                  <Paragraph><b>Process</b></Paragraph>
                                                  <Paragraph>Processes occur between people, things, and data. Today, the IoE brings them all together by combining M2M, M2P, and P2P connections.</Paragraph>
                                                  </Session>
                            </Unit>
                            <Unit>
                                                  <UnitID/>
                                                  <UnitTitle>Session 3: Connecting the unconnected</UnitTitle>
                                                  <Session>
                                                  <Title>3.1 Introduction to connecting things</Title>
                                                  <Paragraph>Network engineering combines a range of different technologies. With different manufacturers and a multitude of systems old a new, standards are required to ensure that they are all able to communicate and remain secure. This section explores protocol standards and why we need them, what is a client server, how cloud and fog computing supports the IoE.
</Paragraph>
                                                  <Section>
                                                  <Title>3.1.1 Imagine the possibilities</Title>
                                                  <Paragraph>The internet of things (IoT) is about connecting the unconnected. It allows for things to be accessible by the internet that historically have not been. With 50 billion devices to be connected by 2020, the globe itself will be 'growing a nervous system' and have the ability to sense and respond to ever increasing amounts of data. The IoE is able to improve quality of life for people everywhere by taking advantage of these connected things and the data produced, and incorporating new processes that enable people to make better decisions and offerings.</Paragraph>
                                                  <Paragraph>The following video was filmed in 2011. Some of its predictions have already come to pass, with others well on their way! It highlights the breadth of things still unconnected and the opportunities available in this next decade. </Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_3_1_1_1_imagine_the_possibilities.mp4" type="video" width="512" x_manifest="ioe_1_video_3_1_1_1_imagine_the_possibilities_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="f869fd22" x_subtitles="ioe_1_video_3_1_1_1_imagine_the_possibilities.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Speaker>DAVE EVANS</Speaker>
                                                  <Remark>The world's about to change. 95% of everything we know as a species will be discovered in the next 50 years. This applies to medicine, physics, biology, in fact, just about every major discipline. There is a technology avalanche on the horizon that will profoundly change how we work, live, play, and learn.</Remark>
                                                  <Remark>My name is Dave Evans, Cisco's Chief Futurist and the Chief Technologist for Cisco's internet Business Solutions Group.</Remark>
                                                  <Remark>As we think about the future, we at Cisco wanted to add another perspective to the conversation, and perhaps inspire you to think differently about the world, and, in turn, financial services. </Remark>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  </Transcript>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.2 Connecting things for consumers</Title>
                                                  <Paragraph>How does connecting things impact us in our personal life? For example, consider the current structure of the average home network.</Paragraph>
                                                  <Paragraph>The home network is a LAN with devices that connect to the home router. Most likely, the router also has wireless capabilities. In this instance, the LAN provides wireless LAN (WLAN) access. Figure 1 shows a typical home WLAN with a connection to the internet through a local internet service provider (ISP). The collection of devices and connections within the ISP are not visible to the home-based customer but are critical for connectivity to the Internet.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-2a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="25c589d5" x_imagesrc="3-1-2a.jpg" x_imagewidth="880" x_imageheight="590" x_smallsrc="3-1-2a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2a.small.jpg" x_smallwidth="512" x_smallheight="363"/>
                                                  <Caption>Figure 1</Caption>
                                                  <Description>Figure 1 shows a house and a home wireless local area network (WLAN) with multiple devices that are connected including router, smart TV, laptop, gaming console, smartphone, entertainment system.</Description>
                                                  </Figure>
                                                  <Paragraph>The local ISP connects with other ISPs, allowing access to websites and content around the world. These ISPs connect to each other using various technologies that include WAN technologies, as shown in Figure 2.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-2b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="74a308c1" x_imagesrc="3-1-2b.jpg" x_imagewidth="880" x_imageheight="580" x_smallsrc="3-1-2b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2b.small.jpg" x_smallwidth="512" x_smallheight="380"/>
                                                  <Caption>Figure 2</Caption>
                                                  <Description>Figure 2 illustrates the interconnection of multiple Internet Service Providers (ISPs).</Description>
                                                  </Figure>
                                                  <Paragraph>However, the M2M connection is a network type unique to the IoT. Figure 3 depicts a series of fire alarms or home security sensors that can communicate with each other and send data through the gateway router (home router) to a server environment in the Cloud. Here data can be accumulated and analyzed.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-2c.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2c.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="9e389b73" x_imagesrc="3-1-2c.jpg" x_imagewidth="880" x_imageheight="711" x_smallsrc="3-1-2c.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-2c.small.jpg" x_smallwidth="512" x_smallheight="354"/>
                                                  <Caption>Figure 3</Caption>
                                                  <Description>Figure 3 shows a typical home WLAN with a connection to the Internet through a local ISP.</Description>
                                                  </Figure>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.3 Connecting things for industries</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">Industrial applications in the IoT require a degree of reliability and autonomy that is not as critical for the consumer environment. Some industrial applications require operations and calculations that happen too quickly to depend on human intervention. For example, if our smartphone fails to remind us of an appointment, it is inconvenient. If the braking system on a large mining truck fails, this can create catastrophic results for the individual and the organisation.</font></Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.4 The converged network and things</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-4.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-4.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="f985ca31" x_imagesrc="3-1-4.jpg" x_imagewidth="880" x_imageheight="956" x_smallsrc="3-1-4.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-4.small.jpg" x_smallwidth="512" x_smallheight="354"/>
                                                  <Caption>Figure 4 As the IoT evolves, individual networks will be connected together and will include, security, analytics and management</Caption>
                                                  <Description>The figure shows how many things are loosely connected using independent, use-specific networks that cannot be leveraged against the IoE, It includes HVAC, telephone, power, data, video, physical security. </Description>
                                                  </Figure>
                                                  <Paragraph>Many things are currently connected using a loose collection of independent, use-specific networks, as shown in the figure. As a result, they cannot be leveraged in the IoE.</Paragraph>
                                                  <Paragraph>For example, today’s cars have multiple proprietary networks to control engine function, safety features, and communications systems. Converging these systems onto a common network alone would save over 23 kg (50 lbs) of cable in a modern full-size car.</Paragraph>
                                                  <Paragraph>Other examples include commercial and residential buildings, which have various control systems and networks for heating, ventilation, and air conditioning (HVAC), telephone service, security, and lighting. These disparate networks will converge to share the same infrastructure that includes comprehensive security, analytics, and management capabilities. As the components are connected to a converged network using IoT technologies, they become even more powerful as the full breadth of the IoE is able to take advantage and help people improve their quality of life.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.5 Need for standards</Title>
                                                  <Paragraph>When two devices communicate across a network, they must first agree on a certain set of predetermined rules, or protocols. Protocols refer to the rules of communication that devices use and are specific to the characteristics of the conversation. In our day-to-day personal communication, the rules we use to communicate over one medium, like a telephone call, are not necessarily the same as the protocols for using another medium, such as sending a letter.</Paragraph>
                                                  <Paragraph>Protocols define the details of how messages are transmitted and received. Similar to how people use language to communicate, protocols contain rules for how devices communicate.</Paragraph>
                                                  <Paragraph>A group of inter-related protocols that are necessary to perform a communication function is called a protocol suite. Protocol suites help ensure interoperability between network devices. Individual protocols within a protocol suite may be vendor-specific and proprietary. Proprietary, in this context, means that one company or vendor controls the definition of the protocol and how it functions. Some proprietary protocols can be used by different organisations with permission from the owner. Others can only be implemented on equipment manufactured by the proprietary vendor.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.6 Protocol suite</Title>
                                                  <Paragraph>Networking protocol suites describe processes, such as:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>the format or structure of the message</ListItem>
                                                  <ListItem>the method by which networking devices share information about pathways with other networks</ListItem>
                                                  <ListItem>how and when error and system messages are passed between devices</ListItem>
                                                  <ListItem>the set-up and termination of data transfer sessions.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Protocol suites can be implemented in hardware or software, or a combination of both. Each layer is responsible for part of the processing to prepare data for transmission across the network.</Paragraph>
                                                  <Paragraph>One of the most common networking protocol suites is known as Transmission Control Protocol/Internet Protocol (TCP/IP). All devices that communicate across the Internet must use the TCP/IP protocol suite. Specifically, they must all use the IP protocol from the Internet layer of the stack, as this allows them to send and receive data over the Internet.</Paragraph>
                                                  <Paragraph>The TCP/IP model describes the rules that the TCP/IP protocol suite encompasses. The Internet Engineering Task Force (IETF) defines the TCP/IP model. To learn more about the layers of the TCP/IP model see Table 1.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 1 Layers of the TCP/IP model</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">This layer includes many applications that can communicate with the network including web browsers, email programs, and file sharing programs.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">TCP operates at this layer managing the conversations between, for example, web servers and web browsers. TCP is also responsible for dividing the data into segments to be sent down to the Internet layer.</language></td>
                                                  <td class="TableLeft">IP operates at this layer encapsulating each segment into a packet with source and destination addressing information.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">Ethernet is one of the primary access methods for transmitting data over a physical link. Standards, such as 802.11, define the access method for wireless devices.</language></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Application</language></b></td>
                                                  <td class="TableCentered" borderleft="false"><b><language xml:lang="zh">Transport</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Internet</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Network access</language></b></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>Objects that are IP-enabled, meaning that necessary TCP/IP software is installed, will have the ability to forward data across the Internet directly.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.7 Network connectivity</Title>
                                                  <Paragraph>The bottom layer of the TCP/IP model is network access. Network access covers the protocols that devices must use when transferring data across the network. At the network access layer, devices can be connected to the network in one of two ways: wired and wireless.</Paragraph>
                                                  <Paragraph>The most commonly implemented wired protocol is the Ethernet protocol. Ethernet uses a suite of protocols that allow network devices to communicate over a wired LAN connection. An Ethernet LAN can connect devices using many different types of wiring media (Table 2 and Figure 5)</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 2</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Category 5 cable (twisted pair)</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Coaxial (coax) cable</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Ethernet over powerline</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Category 5 is the most common wiring used in a LAN. The cable is made up of 4 pairs of wires that are twisted to reduce electrical interference.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Coaxial cable has an inner wire surrounded by a tubular insulating layer, that is then surrounded by a tubular conducting shield. Most coax cables also have an external insulating sheath or jacket.</language></td>
                                                  <td class="TableLeft">Existing power lines in a house can be used to connect devices to an Ethernet LAN.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-7a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-7a.jpg" width="100%" webthumbnail="true" x_folderhash="55f4befe" x_contenthash="e6d40821" x_imagesrc="3-1-7a.jpg" x_imagewidth="880" x_imageheight="630" x_smallsrc="3-1-7a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-7a.small.jpg" x_smallwidth="512" x_smallheight="367"/>
                                                  <Caption>Figure 5 Cables</Caption>
                                                  </Figure>
                                                  <Paragraph>There are a number of wireless network protocols available today. The characteristics of these protocols vary greatly. Figure 6 provides a few common wireless protocols and shows a visual representation of where these protocols fit in the classification spectrum. Table 3 provides more information about each of the protocols. Notice that a protocol can span multiple classifications.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-7.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-7.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="fe066e27" x_imagesrc="3-1-7.jpg" x_imagewidth="880" x_imageheight="592" x_smallsrc="3-1-7.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-7.small.jpg" x_smallwidth="512" x_smallheight="354"/>
                                                  <Caption>Figure 6</Caption>
                                                  <Description>Figure 6 is a  graph that provides information about the characteristics for a number of wireless protocols that are used today.</Description>
                                                  </Figure>
                                                  <Table class="type 2">
                                                  <TableHead>Table 3</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Weightless</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Cellular</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Proprietary</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Wi-Fi</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">NFC</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">ZigBee</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Bluetooth</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Uses the unused portions of the spectrum band in and around TV transmissions. It is a low frequency band which enables excellent propagation without needing large antennas in devices. It has relatively low output power.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">The technology behind cell phones is widespread and readily available. Cellular networks are proven, reliable, and provide coverage over vast areas. Some IoT designs are already using consumer cell phones for their connectivity.</language></td>
                                                  <td class="TableLeft">This is a communications protocol owned by a single organisation or individual.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">This is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Near Field Communications is a set of standards for establishing radio communications between devices by touching them together or bringing them into proximity, usually no more than a few inches.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">This is a specification for a suite of high-level communication protocols used to create personal area networks built from small, low-power digital radios.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Bluetooth Low Energy (BTLE) is being adopted by the health care industry for portable medical and lifestyle devices.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>In addition to these protocols, there are other network access layer protocols that are available in both wired and wireless form.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.8 Network access for currently unconnected things              </Title>
                                                  <Paragraph>For objects with extremely low power requirements, to send information across the network, several short-range wireless communication protocols exist. In some cases, these protocols are not IP-enabled and must forward information to a connected IP-enabled device, such as a controller or gateway. For example, a device that does not use TCP/IP may still communicate with another device that does using a standard, such as Institute of Electrical and Electronics Engineers (IEEE) 802.15 (Table 4).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 4</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Bluetooth</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">ZigBee</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">NFC</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">6LoWPAN</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">The Bluetooth protocol is typically used between devices that are in close range, such as a smartphone connection to a Bluetooth-enabled headset, or a Bluetooth-enabled wireless keyboard connected to a computing device.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">ZigBee is another example of an 802.15 protocol suite that uses pairing between a specified source and destination. An example is between a door sensor and a security system that sends an alert when the door is opened.</language></td>
                                                  <td class="TableLeft">Near field communication (NFC) is a standard for communicating between things in very close proximity, usually within a few inches. For example, NFC works at point of sale between an RFID tag and the reader.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">6LoWPAN arose from the need to include extremely low-powered devices with limited processing capabilities as part of IoT, for example, smart meters in a small network.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.9 Client–server model</Title>
                                                  <Paragraph>Understanding network connectivity is an important part of understanding how data is moved across the network.</Paragraph>
                                                  <Paragraph>Since the inception of the internet, the primary method that businesses use to process data has been through a client-server model. Consider the way organisations might implement file servers. End users within an organisation can store any number of files and documents on the file server, allowing end devices to conserve memory and processing power for use on local applications. By storing files on a central file server, other users within the organisation can easily access these files, which allows for greater collaboration and sharing of information. Finally, with centralised services (such as file servers), organisations can also implement centralised security and backup procedures to protect those resources.</Paragraph>
                                                  <Paragraph>With the growth of the internet and the expansion of mobile users, the client-server model is not always the most effective option. As more individuals connect from greater distances, having a centralised server may not be optimal. Those that are farther away from the server may experience greater delays and more difficulties accessing the information. These changes in requirements for organisations and individuals have led to cloud computing.</Paragraph>
                                                  <Paragraph>Figure 7 depicts the relationship between email client, web client and file client and their respective servers. Press the  plus buttons to reveal the different relationships. </Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_3.1.3.1v3.zip" type="html5" height="369" width="512" id="s3_1_9" x_folderhash="55f4befe" x_contenthash="be531917" x_xhtml="y">
                                                  <Caption>Figure 7</Caption>
                                                  <Description>The File server stores the file. Clients access the file with client software, such as Windows Explorer. The Web Server runs server software. Clients use browser software, such as Windows Internet Explorer, to access web pages on the server. The Email Server runs server software. Clients use email software, such as Microsoft Outlook, to access email on the server.</Description>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.10 Cloud computing model</Title>
                                                  <Paragraph>Cloud computing is different from the client−server model in that servers and services are dispersed all over the globe in distributed data centres. With cloud computing, there is a significant shift in workload. Cloud computing allows end users to access applications from servers located in the cloud instead of requiring an end device client.</Paragraph>
                                                  <Paragraph>In Cloud computing, data is synchronised across multiple servers, so that servers in one data centre maintain the same information as servers in another location. Organisations simply subscribe to different services within the cloud. Individual organisations are no longer responsible for maintaining the application updates, security, and backups. This becomes the responsibility of the organisation offering the cloud service.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-10.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-10.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="4fc4f755" x_imagesrc="3-1-10.jpg" x_imagewidth="880" x_imageheight="588" x_smallsrc="3-1-10.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-10.small.jpg" x_smallwidth="512" x_smallheight="345"/>
                                                  <Caption>Figure 8</Caption>
                                                  <Description>The figure illustrates how Cloud Computing provides synchronised data to multiple servers, regardless of their location. Servers shown are mobile, notebook, server, database, PC and network.. </Description>
                                                  </Figure>
                                                  <Paragraph>Microsoft Outlook is a client−server system that is typically set up for a specific organisation. End users connect to the email server using a locally installed email client. Gmail is a cloud computing program that allows users from anywhere to log into their Gmail account. A user is able to create, access, and modify emails from virtually anywhere that they have an Internet connection, over a variety of devices and operating systems. Users no longer must keep email clients up-to-date or install new features; these application updates are performed automatically on the server.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.11 Fog computing model</Title>
                                                  <Paragraph>Cloud computing has solved many problems of the traditional client–server model. Cloud computing may not be the best option for delay-sensitive applications that require an immediate, local response.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-11.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-11.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="5d27a05d" x_imagesrc="3-1-11.jpg" x_imagewidth="880" x_imageheight="602" x_smallsrc="3-1-11.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-11.small.jpg" x_smallwidth="512" x_smallheight="354"/>
                                                  <Caption>Figure 9</Caption>
                                                  <Description>The figure illustrates how fog computing takes some of the load off the cloud in regards to analysis. It shows a data centre, linked through cloud computing to the internet this links to examples of fog computing including buildings, shops, an airport and fuel station.</Description>
                                                  </Figure>
                                                  <Paragraph>The emerging wave of the IoT requires mobility support and geographical distribution, in addition to location-awareness and minimised delay. Devices in the IoT will require real-time data and quality of service mechanisms. The IoT encompasses an almost limitless number of IP-enabled devices that can monitor or measure nearly anything. However, the one thing these devices have in common is that they are distributed throughout the world.</Paragraph>
                                                  <Paragraph>One of the most significant challenges this presents is creating links between these devices and the data centres where data can be analysed, as shown in the figure. These devices can produce huge amounts of data. For example, in just 30 minutes a jet engine may produce 10 terabytes of data about its performance and condition. It would be inefficient to deliver all the data from IoT devices into the cloud to be analyzed and then forward decisions back to the edge. Instead, some of the analysis work should take place at the edge, for example, on industrial-strength Cisco routers built to work in the field.</Paragraph>
                                                  <Paragraph>Fog computing creates a distributed computing infrastructure closer to the network edge that carries out easier tasks that require a quick response. It reduces the data burden on networks. It enhances resiliency by allowing IoT devices to operate when network connections are lost. It also enhances security by keeping sensitive data from being transported beyond the edge where it is needed.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.1.12 Smart traffic light system</Title>
                                                  <Paragraph>Consider the smart traffic light system as a good use of fog computing.</Paragraph>
                                                  <Paragraph>A smart traffic light system illustrates support for real-time interactions. The system interacts locally with a number of sensors. The sensors detect the presence of pedestrians and bikers, and measure the distance and speed of approaching vehicles. The system also interacts with neighbouring lights to coordinate with traffic lights. Based on this information, the smart light sends warning signals to approaching vehicles and modifies its own cycle to prevent accidents.</Paragraph>
                                                  <Paragraph>Re-coordinating with neighbouring smart traffic light systems in the fog allows for any modification of the cycle. The data collected by the smart traffic light system is processed locally to do real-time analytics. For example, it changes the timing of the cycles in response to road conditions. The data from clusters of smart traffic light systems is sent to the cloud to analyse long-term traffic patterns.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>3.2 Introduction to configuring things</Title>
                                                  <Paragraph>The configuration of different devices is at the heart of many technological disciplines − chances are you have configured the computer/tablet/phone that you are using to read this course. In this section you will explore the different types of technologies in use, this will include: how IP (internet protocol) addresses are allocated, different end devices, sensors, actuators and controllers, which infrastructure devices are used on the internet and your network to support the IoE.</Paragraph>
                                                  <Section>
                                                  <Title>3.2.1 End devices in the IoT</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">As previously described, end devices connect to the Internet and send data across the network. Cell phones, laptops, PCs, printers, and IP phones are examples of end devices using the Internet protocol (IP). Today there are new types of end devices that collect and transmit data, but use different protocols such as IEEE 802.15 and NFC. These non-IP-enabled devices are critical enablers of the IoT.</font></Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.2 Sensors</Title>
                                                  <Paragraph>In the IoT, another type of device, called a sensor, must be connected to the data network. A sensor is an object that can be used to measure a physical property, and convert that information into an electrical or optical signal. Examples of sensors include those that can detect heat, weight, motion, pressure, and moisture.</Paragraph>
                                                  <Paragraph>Sensors are typically purchased with pre-programmed specific instructions; however, some sensors can be configured to change their degree of sensitivity or the frequency of feedback. The sensitivity setting indicates how much the sensor's output changes when the measured quantity changes. For example, a motion sensor can be calibrated to detect the motion of people, but not pets. A controller, which may include a graphical user interface (GUI), is used to change sensor settings, either locally or remotely.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 5</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Oil, gas, mining</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Cities</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Transportation</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Utilities</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Agriculture</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">Sensors detect chemical levels such as carbon monoxide, carbon dioxide, oxygen, methane, hydrogen, ammonia, and hydrogen sulfide.</language></td>
                                                  <td class="TableLeft" borderleft="false"><language xml:lang="zh">Some sensors include pressure (for parking), dust concentrations, noise, displacement of cracks, temperature, humidity, and luminosity.</language></td>
                                                  <td class="TableLeft">Sensors measure idle times, fuel usage, engine faults, and engine load.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">Sensors measure idle times, fuel usage, engine faults, and engine load.</language></td>
                                                  <td class="TableLeft"><language xml:lang="zh">Sensors detect soil moisture, leaf wetness, solar radiation, atmospheric pressure, and stem diameter.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.3 Actuators</Title>
                                                  <Paragraph>Another device that is implemented within the IoT is an actuator. An actuator is a basic motor that can be used to move or control a mechanism or system, based on a specific set of instructions. Actuators can perform a physical function to 'make things happen'. One type of industrial actuator is an electric solenoid used to control hydraulics .</Paragraph>
                                                  <Paragraph>There are three types of actuators used in the IoT:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>hydraulic </b>– uses fluid pressure to perform mechanical movement</ListItem>
                                                  <ListItem><b>pneumatic </b>– uses compressed air at high pressure to enable mechanical operation</ListItem>
                                                  <ListItem><b>electrical </b>– powered by a motor that converts electrical energy to mechanical operation.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Regardless of how the actuator causes the movement to be performed, the basic function of an actuator is to receive a signal, and based on that signal, perform a set action. Actuators are typically not able to process data. Rather, the result of the action performed by the actuator is based on a signal received. The action performed by the actuator is typically caused by a signal from the controller.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.4 Controllers in the fog</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-4.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-4.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="38b59808" x_imagesrc="3-2-4.jpg" x_imagewidth="880" x_imageheight="514" x_smallsrc="3-2-4.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-4.small.jpg" x_smallwidth="512" x_smallheight="309"/>
                                                  <Caption>Figure 10</Caption>
                                                  <Description>The figure shows a diagram illustrating that the controller can forward any information gathered from the sensors to other devices in the Fog (sensors and actuators shown).</Description>
                                                  </Figure>
                                                  <Paragraph>Sensors collect data and forward that information to the controllers. The controller can forward any information gathered from the sensors to other devices in the Fog, as shown in the figure.</Paragraph>
                                                  <Paragraph>Recall the example of a smart traffic light system. The sensors detect and report activity to the controller. The controller is able to process this data locally and determine optimal traffic patterns. Using this information the controller will send signals to actuators in the traffic lights to adjust traffic flows.</Paragraph>
                                                  <Paragraph>This is an example of M2M communication. In this scenario, the sensors, actuators, and the controller all exist within the Fog. That is, information is not forwarded beyond the local network of end devices.</Paragraph>
                                                  <Paragraph>Processing data in the fog is occurring in less traditional networking environments. New places in networking, or PINs, are created as more things in various industries connect to the network. Field Area Networks (FANs) place hardened equipment in harsh or exposed environments. Smart Grid is an example of a FAN. More detailed information is available from the Cisco website <a href="http://www.cisco.com/web/strategy/energy/field_area_network.html">Field Area Network</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.5 IP-enabled controllers</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-5.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-5.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="cadbb43c" x_imagesrc="3-2-5.jpg" x_imagewidth="880" x_imageheight="602" x_smallsrc="3-2-5.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-5.small.jpg" x_smallwidth="512" x_smallheight="356"/>
                                                  <Caption>Figure 11</Caption>
                                                  <Description>The figure is a diagram illustrating the coffee plantation scenario, where sensors collect information on soil monitoring and actuators work on irrigation irrigation, to and from the IP-enabled controller and the Cloud via the internet. </Description>
                                                  </Figure>
                                                  <Paragraph>The controller forwards information across an IP network, and allows individuals to access the controller remotely. In addition to forwarding basic information in an M2M configuration, some controllers are able to perform more complex operations. Some controllers can consolidate information from multiple sensors or perform basic analysis of data received.</Paragraph>
                                                  <Paragraph>Consider the scenario of a coffee plantation, as shown in the figure. The plantation owner wants to monitor the plants to determine the best time to harvest beans. Sensors can be used to collect information on the physical aspects of the plants, such as weather, soil conditions, and carbon dioxide levels. This information is forwarded to the controller. The controller forwards a more complete picture of the information to a network server or across the Internet to a Cloud-based service. Information gathered by the sensor nodes and controller can be further analyzed and accessible via mobile and remote devices.</Paragraph>
                                                  <Paragraph>In this scenario, the controller collects information from the sensors using the 802.15 protocol ZigBee. The controller consolidates the information received, and forwards the data to the gateway using the TCP/IP protocol suite.</Paragraph>
                                                  <Paragraph>Controllers, sensors, and actuators will contribute greatly to the expansion of things that get connected in the IoT.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.6 IP-enabled sensors</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-6.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="e6417a4a" x_imagesrc="3-2-6.jpg" x_imagewidth="880" x_imageheight="575" x_smallsrc="3-2-6.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-6.small.jpg" x_smallwidth="512" x_smallheight="337"/>
                                                  <Caption>Figure 12</Caption>
                                                  <Description>The figure shows sensors and actuators connected directly to the Cloud through a Gateway.</Description>
                                                  </Figure>
                                                  <Paragraph>Some sensors and actuators support TCP/IP, which removes the need for a controller.</Paragraph>
                                                  <Paragraph>The figure shows sensors and actuators connected directly to the cloud, through a gateway. In this example, the gateway performs the routing function necessary to give IP-enabled devices Internet connectivity. The data these devices generate can be transported to a regional or global server for analysis and further processing.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.7 Static IP addressing</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-7.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-7.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="3ee3a4db" x_imagesrc="3-2-7.jpg" x_imagewidth="880" x_imageheight="972" x_smallsrc="3-2-7.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-7.small.jpg" x_smallwidth="512" x_smallheight="562"/>
                                                  <Caption>Figure 13</Caption>
                                                  <Description>The figure shows the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box.</Description>
                                                  </Figure>
                                                  <Paragraph>For any IP-enabled device to communicate over an IP network, it must be configured with the correct IP address information. Typically, this information is configured within the device settings. You can statically, or manually, configure IP addressing, as shown in the figure for a Windows PC.</Paragraph>
                                                  <Paragraph>As we learned earlier, an IP address is similar to a street address in that it identifies a unique location across the globe. Your local postal office is your 'gateway' to the postal service, which will use its network of postal locations and transport mechanisms to deliver your letter to the proper destination address. In a network, your local postal office is called the "default gateway" with its own IP address. The default gateway is an IP address that is often assigned by the network administrator or the ISP.</Paragraph>
                                                  <Paragraph>Traditionally, devices on the Internet used IPv4 addresses. However, with an increasing Internet population and a limited number of IPv4 addresses, the transition to IPv6 (another enabler of the IoE) has begun. IPv6 has a larger 128-bit address space, providing for 340 undecillion addresses. 340 undecillion is written as the number 340, followed by 36 zeroes! IPv4 only has a theoretical maximum of 4.3 billion addresses, and those are nearly used up.</Paragraph>
                                                  <Paragraph>The IP addresses in the figure are IPv4 addresses. This is an example of an IPv6 address:</Paragraph>
                                                  <Paragraph>2001:0DB8:0000:1111:0000:0000:0000:0200</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.8 Automatic IP addressing</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-8.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-8.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="ec1eea76" x_imagesrc="3-2-8.jpg" x_imagewidth="880" x_imageheight="656" x_smallsrc="3-2-8.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-8.small.jpg" x_smallwidth="512" x_smallheight="375"/>
                                                  <Caption>Figure 14</Caption>
                                                  <Description>The figure shows the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box with the Obtain an IP Address Automatically radio button selected. This property sets the device to obtain an Ip address automatically.</Description>
                                                  </Figure>
                                                  <Paragraph>If you have never entered an IP address on any of your personal devices, it is because the IP address information is automatically assigned to any end device by the Dynamic Host Configuration Protocol for IPv4 (DHCP).</Paragraph>
                                                  <Paragraph>Imagine the amount of time it would take if every end device connected to the network required IP addressing information to be entered manually. Multiply that by every user, every mobile device, and every IP-enabled device on the network, and it becomes overwhelming. With DHCP, end users walk into areas served by a given network, plug in an Ethernet cable or enable a wireless connection, and they are immediately allocated the IP address information.</Paragraph>
                                                  <Paragraph>As shown in the figure, to configure DHCP on a Windows PC, the <b>Obtain an IP address automatically</b> option is selected. Your device is assigned information from an IP address pool and associated IP information set up on the DHCP server.</Paragraph>
                                                  <Paragraph>When deploying IPv6, there are other methods that allow a device to obtain its IPv6 addressing information. Stateless Address Autoconfiguration (SLAAC) is a method that allows a device to obtain information from an IPv6 router. Dynamic Host Configuration Protocol for IPv6 (DHCPv6) is similar to DHCP for IPv4, allowing a device to receive information from a DHCPv6 server.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.9 Role of IoT infastructure devices</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-9.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-9.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="935d910a" x_imagesrc="3-2-9.jpg" x_imagewidth="880" x_imageheight="613" x_smallsrc="3-2-9.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-9.small.jpg" x_smallwidth="512" x_smallheight="358"/>
                                                  <Caption>Figure 15</Caption>
                                                  <Description>The figure shows infrastructure devices (firewall devices, multilayer switches) are primarily responsible for moving data between the controller devices (wired and wireless routrers) and other end devices (such as cloud services).</Description>
                                                  </Figure>
                                                  <Paragraph>Infrastructure devices are primarily responsible for moving data between the controller devices and other end devices, as shown in the figure.</Paragraph>
                                                  <Paragraph>Infrastructure devices provide a variety of services including:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>wireless and wired connectivity</ListItem>
                                                  <ListItem>quality of service queuing (for example, voice data before video data)</ListItem>
                                                  <ListItem>high availability</ListItem>
                                                  <ListItem>secure transfer.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Infrastructure devices connect the individual end devices to the network, and can connect multiple individual networks to form an internetwork. The management of data as it flows through the network is a primary role of the infrastructure, or intermediary, devices. These devices use the destination end device address, in conjunction with information about the network interconnections, to determine the path that messages should take through the network.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.10 Types of routers</Title>
                                                  <Paragraph>When a source device sends a packet to a remote destination device, the help of routers and routing is needed. A router is a device that routes traffic from the local network to devices on remote networks. A router is required because end devices do not maintain information on where to forward packets to reach remote destinations. A router is an intelligent device that collects information about the location of different networks. The router uses this information to determine the best path to reach those destinations, which is known as the routing process.</Paragraph>
                                                  <Paragraph>There are many types of infrastructure routers available.</Paragraph>
                                                  <Paragraph>Regardless of their function, sise, or complexity, all router models are essentially computers. Just like computers, tablets, and smart devices, routers also require the following:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>operating systems (OS)</ListItem>
                                                  <ListItem>central processing units (CPU)</ListItem>
                                                  <ListItem>input/output (I/O) interfaces</ListItem>
                                                  <ListItem>memory.</ListItem>
                                                  </BulletedList>
                                                  <Table class="type 2">
                                                  <TableHead>Table 6 Examples of Cisco routers</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableLeft"><b><language xml:lang="zh">Cisco 819 ISR</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Cisco 500 Series Wireless WPAN Industrial Routers</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Cisco CRS Multichassis System</language></b></td>
                                                  <td class="TableCentered"><b><language xml:lang="zh">Cisco 2000 Series Connected Grid</language></b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft"><language xml:lang="zh">The Cisco 819 ISR (Integrated Services Router) gateway provides a rapidly deployable, highly available, reliable, and secure solution designed specifically for M2M applications.</language></td>
                                                  <td class="TableLeft">Cisco 500 Series Wireless Personal Area Network (WPAN) Industrial Routers (IR500) provide unlicensed 915 MHz industrial, scientific, and medical (ISM) band WPAN communications. They help to enable a diverse set of Internet of Things (IoT) applications. These include smart metering, smart grid, distribution automation, supervisory control and data acquisition (SCADA), and street lighting.</td>
                                                  <td class="TableLeft">The Cisco CRS (Career Routing System) Multichassis System is the most widely deployed multichassis router, with over 1000 systems operating at many of the world's largest network operators.</td>
                                                  <td class="TableLeft"><language xml:lang="zh">The Cisco 2000 Series Connected Grid Router is designed specifically for the harsh, rugged environments often found in the energy and utility industries.</language></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>The operating system used in Cisco devices is known as the Internetwork Operating System (IOS). Complete information on Cisco routers is available at the web page <a href="http://www.cisco.com/c/en/us/products/routers/index.html">Routers</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.11 Cisco ISR 819</Title>
                                                  <Paragraph>To provide M2M connectivity within the IoT, it is often necessary for a router to combine multiple technologies to communicate with multiple devices. The Cisco 819 ISR can combine Wi-Fi with GPS and 3G/4G WAN connectivity and location services. Combining these technologies allows the 819 ISR to function in many different environments. For example, in a transportation environment, mobile network end devices must communicate across long distances using 3G/4G networks. However, in a retail or manufacturing environment, Wi-Fi may be the best network option for stationary devices.</Paragraph>
                                                  <Paragraph>Computing capability can be built into Cisco IoT routers and switches. Cisco combines Linux with IOS, to create a distributed computing infrastructure to equip routers for Fog computing. This architecture is called IOx. IOx makes it easier to connect specialised, industry-specific systems at the edge of the network to create new sensing and control functions with Cisco routers.</Paragraph>
                                                  <Paragraph>The Cisco ISR 819 is part of a family of devices, the Cisco website has a section on the <a href="http://www.cisco.com/c/en/us/products/routers/819-integrated-services-router-isr/index.html">810</a>, which includes the 819.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.12 Small business and home routers</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">In addition to the more dedicated enterprise devices, like the Cisco IOS 819 ISR, there are also low-cost multifunction devices available for home and small business networks. These wireless routing devices offer integrated routing, switching, wireless, and security capabilities. Modern wireless routers offer a variety of features and most are designed to be functional right out of the box, using the default settings. However, it is good practice to change the initial, default configurations.</font></Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.13 Types of ports</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-14.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-14.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="cc50fcac" x_imagesrc="3-2-14.jpg" x_imagewidth="880" x_imageheight="568" x_smallsrc="3-2-14.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-14.small.jpg" x_smallwidth="512" x_smallheight="335"/>
                                                  <Caption>Figure 16</Caption>
                                                  <Description>The figure shows the Ethernet and Internet ports on a router.</Description>
                                                  </Figure>
                                                  <Paragraph>Small business and home routers typically have two primary ports:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Ethernet ports </b>– These ports connect to the internal switch portion of the router. These ports are usually labelled 'Ethernet' or 'LAN'. All devices connected to the switch ports are on the same local network.</ListItem>
                                                  <ListItem><b>Internet port </b>– This port is used to connect the device to another network. The Internet port connects the router to a different network than the Ethernet ports. This port is often used to connect to the Internet.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.14 Settings</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-14.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-14.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="cc50fcac" x_imagesrc="3-2-14.jpg" x_imagewidth="880" x_imageheight="568" x_smallsrc="3-2-14.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-2-14.small.jpg" x_smallwidth="512" x_smallheight="335"/>
                                                  <Caption>Figure 17</Caption>
                                                  <Description>The figure shows an example of how wireless router settings are configured using a GUI web interface.</Description>
                                                  </Figure>
                                                  <Paragraph>Most of these small wireless routers are configured using a GUI web interface, as shown in the figure. Settings that can be configured include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Wireless network name (SSID) – </b>Name of the WLAN network, if wireless networking is enabled. SSID stands for Service Set Identifier, which is another name for the wireless network. The SSID is, by default, broadcast to wireless clients.</ListItem>
                                                  <ListItem><b>Wireless password –</b> If wireless networking is enabled, this is the password clients use to connect to the wireless network.</ListItem>
                                                  <ListItem><b>Router password </b> –This is the password used to manage the router and, if configured, is required to access the wireless router to make configuration changes.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>For most home and small business networks, the wireless router provides DHCP services to local network clients. Clients that wirelessly connect to the wireless router are given the appropriate IP addressing information for communication to occur.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.15 Gateway</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-2-15.jpg" src_uri="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-2-15.jpg" webthumbnail="true" width="100%" x_folderhash="fa947bef" x_contenthash="ae6014de" x_imagesrc="3-2-15.jpg" x_imagewidth="880" x_imageheight="503" x_smallsrc="3-2-15.small.jpg" x_smallfullsrc="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-2-15.small.jpg" x_smallwidth="512" x_smallheight="300"/>
                                                  <Caption>Figure 18</Caption>
                                                  <Description>The figure shows that the IPv4 address of 192.168.1.1 is the default for the router.</Description>
                                                  </Figure>
                                                  <Paragraph>When IP-enabled end devices send a packet to a device on a different IP network, the devices must first forward the packet to the default gateway. Typically, the router connected to the local network segment is referred to as the default gateway. In a small business environment the default gateway is the router used to connect the LAN to the Internet.</Paragraph>
                                                  <Paragraph>In many wireless routers, the IPv4 address of 192.168.1.1 is the default for the router, as shown in the figure. This address is the default gateway address for all end devices on the local network (LAN). Wireless and wired clients that connect to the wireless router receive, via DHCP, the default gateway information and an IP address that is within the same network as the default gateway address. Local clients can then forward packets to the wireless router for routing out on to the Internet.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.2.16 Packet tracer – home IoE implementation</Title>
                                                  <Paragraph>Watch a demonstration of the Packet Tracer – Home IoE Implementation activity.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation.mp4" type="video" width="512" x_manifest="ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="97b16fab" x_subtitles="ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation.srt">
                                                  <Transcript>
                                                  <Speaker>INSTRUCTOR</Speaker>
                                                  <Remark>This packet tracer activity is an incredible example of IOE, the internet of everything, and how it is implemented in the home. The first thing that I'm going to do is I'm going to close the toolbars to make more room for the main workspace. I'll close the main toolbar, the right toolbar, and the bottom toolbar. And now we can see the workspace a little better. The main idea behind this packet tracer file is to give us an example of the different ways that the internet of everything is entering the home environment.</Remark>
                                                  <Remark>So in this file, we have a scenario in which Bob has implemented IOE solutions in his home. And he's now able to monitor and receive in real time information on his home environment. And he can react to environmental changes and get real time information on the things that are occurring inside of his home. This allows him to manage his environment better, have more security, and peace of mind.</Remark>
                                                  <Remark>So in this file, we have three clusters. We have the home over here, which we can click to go inside. We have our ISP connection. As you can see, the home is connected to the internet service provider. And then across this link here, we have a representation of the internet. This is where we find Bob. If we click on this internet cluster, we find Bob on his smartphone located in India. And from India, he's able to monitor the things happening in his home and react to them in real time. Let's examine Bob's smartphone.</Remark>
                                                  <Remark>We can follow the instructions. But before I do that, I'm going to click on Fast Forward Time, which will fast forward all of the connections and all of the devices existing and make sure that the links are all active and IP addressing has been resolved. I'll click on PDA 1, go to Desktop, Web Browser, and type in www.home.net, and press Go.</Remark>
                                                  <Remark>You can see that I'm met with a web page from Bob's internet service provider. And I can click on the link to Your Home Security and look at the master control page for Bob's home. I can see that Bob has sensors that are active in the master bedroom, the great room, bedroom number two, and the garage.</Remark>
                                                  <Remark>I can click on the diagram of Bob's home and monitor the various sensors that are working in his house. We have a lights monitor. You can see that the light are on. We have appliances-- coffeemaker, icemaker, TV, a water monitor. And you can see that the water philtre probably needs changing. We've got security cameras with three different zones, motion detectors in the garage, inside the house, and outside of the house, and smoke alarms in three different zones as well.</Remark>
                                                  <Remark>Now, these motion detectors that you see here through the web browser that Bob's accessing are actually just static images. And they're not responding in real time to changes occurring in the home. To get a sense of how IOE technology functions in the home, we need to go and explore Bob's home directly. So I'll close the web browser and Bob's smartphone and press the Back button and go into Bob's home.</Remark>
                                                  <Remark>Now, within Bob's home, we can see how Bob is taking advantage of the concept of the internet of everything, and everything being online and accessible, and how information and access to information is completely different today. We can see how the cable connection comes in from outside, hits a coaxial splitter which goes to the TV and also to a cable modem. The cable modem in turn is connected to his gateway. And we can see his router gateway device here. This is his home gateway. From his home gateway, we have connections to a controller with wire connections throughout the house as well as wireless connections to devices all over the house directly from home gateway.</Remark>
                                                  <Remark>Let's take a look at some of the smart sensors that Bob has implemented in his home. We can see that many of the common home devices and appliances are now internet-enabled. For instance, the smoke detector in the bedroom has received an IP address through DHCP. The thermostat is now an internet-enabled device. We have a light sensor, heater, coffee pot. The coffee pot has received an IP address as well. We have a garage smoke detector, internet-enabled.</Remark>
                                                  <Remark>Let's manually create some change in the environment and then see how the sensors and devices in the home respond to the change. When you open this particular packet tracer file, a second window opens as well. This is the environment window. With this pop up window, you can create change in the environment and see how the sensors in the home respond. For instance, I'll open up the thermostat again, click on Temperature.</Remark>
                                                  <Remark>And you can see the home temperature right now is 72 degrees Fahrenheit. But if I open the environment window and increase the north wind, you can see that the temperature has gone down to 67. And this in turn starts the furnace, which raises the temperature back up again. I'll increase the north wind again. The temperature begins to go down. The furnace comes on. And the temperature goes back up.</Remark>
                                                  <Remark>I'll close the thermostat, scroll up, and open the wind and water sensor, as well as the sprinkler actuator. I can increase the north wind again. Raising the wind speed, watch the water level go down. And since these are smart sensors, when the water level gets low enough, it will kick on the sprinkler actuator and start watering the grass. We can decrease the north wind, turn on the rain. Let's pretend the environment starts raining. Watch the water level rise. And when the water level gets high enough, it should activate the sprinkler, telling it to stop.</Remark>
                                                  <Remark>I'll stop the rain by pressing the Sunshine button in the environment window, and then close the sprinkler actuator, the wind and water sensor, and then scroll down to the garage area. In the garage, we can see a light actuator. I'll select it. You can see that it's wirelessly connected to the router gateway. There is the light actuator. The light is remotely controlled by the motion sensor.</Remark>
                                                  <Remark>Let's open up the environment window again and create some movement in the garage. You can see that as soon as I press the garage movement, the motion sensor detects the movement in the garage, which then in turn activates the light. I'll close this window. Let's open a smoke detector. I'll open the garage smoke detector. You can see here we have a carbon monoxide alarm. Bring back the environment window. And let's pretend that a fire occurs in the garage. By clicking on the button, fire occurs in the garage.</Remark>
                                                  <Remark>We can see almost instantly the carbon monoxide alarm level rising. And eventually, when it gets high enough, you can see the colour change from green to yellow. Carbon monoxide is going up. And eventually, it will get to a level which will signal a warning which Bob could then receive remotely on his smartphone. I'll stop the fire in the garage and close the garage smoke detector.</Remark>
                                                  <Remark>Let's help Bob configure his home gateway router. I'll click on the Home Gateway Router, go to the GUI interface. And you can see that this home gateway is a Linksys wireless router. It looks as if Bob that's just accepted the default settings. Let's see if we can help him configure it. I'll open the window a little bit more. I'll change the routers default IP address on the LAN for 192.168.0.1 to 10.10.10.1. To have the setting take effect, I'll scroll to the bottom and press Save Settings.</Remark>
                                                  <Remark>Now you can see that the IP address has taken. And the DHCP server is now handing out addresses from 10.10.10.100, handing out 50 user addresses for a range of 100 to 149. Let's go ahead and change some of the wireless settings. I'll click on Wireless. We can see that the network mode is mixed and the network name, or SSID, is set to the default, which is the word "default." I will change that to MyHomeWLAN in all caps. So now that I've set the SSID, I'll press Save Settings.</Remark>
                                                  <Remark>Let's go to Wireless Security and set up some wireless security. I'll change the security mode from disabled to WPA2 personal and use a passphrase of HomeWLAN. I'll scroll to the bottom and press Save Settings. Let's change that router access password from the default. I'll scroll up to the top, go to Administration. And you can see we have the router access password here. I'll change it to myhomeonly. And once again, myhomeonly. Scroll to the bottom and press Save Settings.</Remark>
                                                  <Remark>Now, I'll minimise the home gateway router window, scroll up, and see if the new IP address settings have taken effect on the network. I'll check the thermostat. Go to IP Configuration. And you can see the thermostat still has a 192.168.0 address. It's 192.168.0.100. It hasn't yet picked up a 10 address from the DHCP server. To solve this problem, I could go to Static and then go back to DHCP. And you can see that it's requested a new IP address. And now it's picked up a 10 address.</Remark>
                                                  <Remark>Now this would take some time to go to all these network devices and to do that manually. So what I can do is power cycle devices by clicking this button. This will restart all of the devices. You can see I get a warning that if the configurations enough it saved to the startup configuration, like on the router or on the switches, then the configurations will be lost. I'll press Yes. And all the devices are being power cycled as you can see.</Remark>
                                                  <Remark>I'll speed up the process by pressing Fast Forward Time. And you can see that the thermostat still has a 10 address. So that's good. I can check the smoke detector also. And it has also picked up a 10 address. So now my home network has a new IP addressing scheme. And the home gateway router has security settings configured.</Remark>
                                                  <Remark>Let's practise manually configuring a network sensor in the home. I'll scroll up. And you can see in bedroom one, the smoke detector, if I go to IP Configuration, does not have an IP address. And it's set to static configuration. Now, I could just press DHCP and it should pick up an IP address. But lets configure it manually. I'll go in and key in the address-- 10.10.10.50. Put in a subnet mask of 255.255.255.0. Change the default gateway to 10.10.10.1. And now the smoke detector has a correct IP addressing for the network. I'll close the window.</Remark>
                                                  <Remark>Now, there's one other thing that I need to do. Since I activated wireless security on my wireless home gateway router, my wireless devices, such as the wind and water sensor here, the sprinkler actuator, and if I scroll down, my light actuator in the garage, all of these devices had wireless connections. And they are now no longer associated with the wireless access point. That's because I turned on WPA2 security settings. And I haven't reconfigured these devices to use those security settings. So what I need to do is go in and configure each of these devices with the wireless security.</Remark>
                                                  <Remark>So I'll open the Wind and Water, go to the Config tab, click on Wireless. I'll drag open the window. And I'll put in the SSID MyHomeWLAN. I'll go down here and turn on WPA2 PSK and put in the passphrase HomeWLAN. And then scroll down, and I'll toggle between Static and DHCP. And you can see that I've picked up an IP address. I'll close the window. And you can see that the wind and water sensor has now a wireless association with the home gateway router.</Remark>
                                                  <Remark>Now I need to do this to each of my devices that wirelessly connect to the network. So I'll click on the Sprinkler Actuator, and click on Wireless, and do the same thing. Put in the SSID, WP2 with the passphrase. Toggle between Static and DHCP Client. And I've picked up an IP address. And now this has been associated. And then I'll scroll down and do the same thing in the garage.</Remark>
                                                  <Remark>And now we have associated here. There is also a home tablet that will need to wirelessly connect. And we'll see if there are any other devices here that need to. The heater, coffee maker, and some of the other devices as well also need to connect wirelessly to the network. Once I've done that, the network will be completely connected.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation.jpg" x_folderhash="55f4befe" x_contenthash="4e9ef4fc" x_imagesrc="ioe_1_video_3_2_16_packet_tracer_home_ioe_implementation.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>The video demonstration is the primary source for how to navigate the activity. However, after viewing the video, you can use the following files to investigate the activity on your own.</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49459">Packet Tracer – Home IoE Implementation.pdf</a>
                     </ListItem>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49458">Packet Tracer – Home IoE Implementation.pkz</a></ListItem>
                                                  </BulletedList>
                                                  <Paragraph><b>Essential note</b>: If you are new to Packet Tracer, you can watch a <a href="http://youtu.be/any2NbeSZV4">tutorial</a>. You must install Packet Tracer before you can open .pkz files. To  install Packet Tracer, return to the <a href="https://www.open.edu/openlearn/science-maths-technology/internet-everything/content-section-overview">course progress page</a> where a copy is available to download and install .</Paragraph>
                                                  <Paragraph>Packet Tracer is available for both Microsoft Windows and Linux systems. The Open University Cisco Academy team support a moderated Facebook Community helping Mac users port this application onto all versions of the Apple Mac OSX. For more information, you will need to join the <a href="https://www.facebook.com/groups/packettracermac/">community</a>.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>3.3 Programming</Title>
                                                  <Paragraph>Programming is at the heart of all computing technologies, programmers created the operating system and browser or reader you are using to read this course. By the end of this section you will be introduced to some basic principles and practices in programming.</Paragraph>
                                                  <Section>
                                                  <Title>3.3.1 Programming</Title>
                                                  <Paragraph>As discussed in the previous section, sensors and actuators are used abundantly in the IoT. Sensors measure a physical property and forward that information across the network. How do the sensors know what information to capture or which controller to communicate with?</Paragraph>
                                                  <Paragraph>Actuators perform actions based on a received signal. How does the actuator know which action to perform or which signals are required to activate that action?</Paragraph>
                                                  <Paragraph>Sensors must be told what to capture and where to send that data. A controller must be programmed with a set of instructions to receive that data and decide if it should process and relay that data to another device. For example, IoT end devices, such as the computer installed in a car, must be programmed to react to different road conditions. All of the devices in the IoT must be programmed, thus programming skills are critical to the success of the IoT and the IoE.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.2 Define basic programming</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-3-2.jpg" src_uri="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-3-2.jpg" webthumbnail="true" width="100%" x_folderhash="fa947bef" x_contenthash="47121a7d" x_imagesrc="3-3-2.jpg" x_imagewidth="880" x_imageheight="547" x_smallsrc="3-3-2.small.jpg" x_smallfullsrc="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-3-2.small.jpg" x_smallwidth="512" x_smallheight="312"/>
                                                  <Caption>Figure 19</Caption>
                                                  <Description>The figure shows the most common logical structures found in programming languages, such as the If/Then, For/Do, and While/Do. As follows: If/then− 'if password = 12345', true, then display 'password correct', end; false, then end; loop runs once. For/do − for count &lt;= 10, true, do display 'not 10 yet!', count = count +1, back to start; false, go to end; loop runs until count = 10. While /do − while temnperature sensor &gt; 80, true, do display 'temperatuer too high!', back to start; false, go to end: loop runsas long as sensor has temperature &gt; 80.</Description>
                                                  </Figure>
                                                  <Paragraph>What is a program?</Paragraph>
                                                  <Paragraph>A computer program is a set of instructions given to a computer, to be executed in a specific order. Because computers do not speak human languages, computer programming languages were created. These languages allow humans to write instructions in a way that computers can understand. While there are several different computer languages, all computer languages are based on logical structures.</Paragraph>
                                                  <Paragraph>The figure shows the most common logical structures found in programming languages:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>IF </b><b><i>condition</i> </b><b>THEN </b><b><i>instructions </i></b><b>(If/Then) -</b> This is one of the most common programming structures. It is used to introduce conditional code execution. The set of instructions following the THEN keyword is only executed if the <i>condition</i> given is true. If the <i>condition</i> is false, the <i>instructions</i> are never executed. For example, IF <i>password = 12345</i>, THEN display<i>'password correct'. </i>The code above would only show the 'password correct' message if a password of 12345 is entered.</ListItem>
                                                  <ListItem><b>FOR </b><b><i>expression</i> </b><b>DO </b><b><i>instructions </i></b><b>(For/Do)</b> <b>-</b> This logical structure is used to create controlled loops. The set of instructions is executed as many times as defined in<i>expression</i>. When <i>expression</i> is no longer met, the loop ends and the computer moves on to the next instruction. For example, FOR <i>count&lt;=10 </i>DO display<i> 'not 10 yet!'. </i>The program will check the value of the variable called count. As long as the count is less than or equal to 10, it will display 'not 10 yet!' on the screen. As soon as the count is greater than 10, the structure is abandoned and the computer moves on to the next line of code.</ListItem>
                                                  <ListItem><b>WHILE </b><b><i>condition</i> </b><b>DO </b><b><i>instructions </i></b><b>(While/Do) -</b> The WHILE logical structure is also used to create controlled loops, but in a different way. WHILE executes <i>instructions</i> as long as the<i>condition</i> is true. When the <i>condition</i> is no longer true, the structure is abandoned and the computer moves on to the next line of code. For example, WHILE temperature sensor&gt; 80DO<i>show 'temperature too high!' </i>on screen<i>. </i>The message 'temperature too high!' will display repeatedly until the value of the temperature sensor is less than or equal to 80.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Logical conditions like these are the building blocks of computer programs.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.3 Types of programs</Title>
                                                  <Paragraph>Different programs perform different tasks. For example, there are programs to measure and report temperature, programs governing traffic lights, and programs that allow us to interact with computers and devices.</Paragraph>
                                                  <Paragraph>Sometimes a program category is so common that it receives its own name. A few categories include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Firmware −</b> Firmware contains the instructions that the device performs as it boots up. This might be the only software on the device or it may contain instructions to load a more robust operating system. Examples of devices that use firmware include watches, printers, TV sets, sensors, cell phones, routers, and switches. Firmware usually has a considerably smaller set of functionalities and is therefore much smaller in size.</ListItem>
                                                  <ListItem><b>Operating systems −</b> These are programs written to allow humans to interact with a computer. Examples of operating systems are Windows, Mac OS, Linux, Apple iOS, Android, and Cisco IOS, as shown in the figure.</ListItem>
                                                  <ListItem><b>Applications −</b> These are programs designed and written to perform a specific task or service. Word processors, image editing tools, spreadsheet editors, collaboration tools, data analysis and monitoring tools are all considered applications.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.4 Programming languages</Title>
                                                  <Paragraph>There are many different computer languages used to write computer programs, for example C++ and Java. For example, the C language is a popular computer programming language. Entire operating systems were written in C. It was initially developed between 1969 and 1973, however, its evolution into the object-oriented C++ and later to C# kept this language relevant.</Paragraph>
                                                  <Paragraph>Java (not be confused with JavaScript) is another popular object-oriented programming language. Released by Sun in 1995, Java focuses on multiple platforms designed to require as few implementation dependencies as possible. The WORA (write once, run anywhere) acronym is often identified as a characteristic of Java. Due mostly to its multiplatform aspect, Java is widely used on the web.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.5 JavaScript programming example</Title>
                                                  <Paragraph>To give you a better understanding of computer programs, it is useful to analyse some JavaScript code.</Paragraph>
                                                  <Paragraph>JavaScript is a scripting language used primarily in web applications. For example, consider a fictional web application called Cisco Coffee. This application is designed to act as a monitoring tool, or dashboard, for a coffee farm. Figure 18 shows a coffee farm.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-3-5a.jpg" src_uri="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-3-5a.jpg" webthumbnail="true" width="100%" x_folderhash="fa947bef" x_contenthash="d2307b4f" x_imagesrc="3-3-5a.jpg" x_imagewidth="880" x_imageheight="544" x_smallsrc="3-3-5a.small.jpg" x_smallfullsrc="//dog/units_non_course/OpenLearn_OMU/cisco_ioe/3-3-5a.small.jpg" x_smallwidth="512" x_smallheight="315"/>
                                                  <Caption>Figure 20</Caption>
                                                  <Description>The figure is a picture of a coffee farm with labels pointing out where the sunlight, moisture, and temperature sensors are located.</Description>
                                                  </Figure>
                                                  <Paragraph>In this scenario, many sensors are installed in various locations in the coffee field, close to the coffee bean plants. These sensors report data back to a central station. This station uses the Cisco Coffee web interface to allow users to monitor the field.</Paragraph>
                                                  <Paragraph>Three types of sensors are installed: temperature, sunlight, and soil moisture. If the temperature drops below 77°F, a warning is presented on the interface screen. If the coffee plants are exposed to too much sunlight, a different warning is presented. If the soil becomes too wet or too dry, a different warning is shown.</Paragraph>
                                                  <Paragraph>The following JavaScript snippets are used to implement these tests.</Paragraph>
                                                  <Box>
                                                  <ComputerDisplay>
                                                  <Paragraph><font val="Times New Roman">if (temp &lt; 77) {</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman"> document.getElementById("logArea").innerHTML =</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">"WARNING: Field temperature dropped below 77F.";</font><font val="Times New Roman"><br/></font><font val="Times New Roman">}</font></Paragraph>
                                                  </ComputerDisplay>
                                                  <Paragraph><font val="Times New Roman">If the temperature drops below 77 degrees, then trigger an alert.</font></Paragraph>
                                                  <ComputerDisplay>
                                                  <Paragraph><font val="Times New Roman">if (sun &gt; 17000) {</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">document.getElementById("logArea").innerHTML =</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">"WARNING: There's too much sunlight on the coffee plants.";</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">}</font></Paragraph>
                                                  </ComputerDisplay>
                                                  <Paragraph>If the sunlight is greater than 17000 lux, then trigger an alert.</Paragraph>
                                                  <ComputerDisplay>
                                                  <Paragraph><font val="Times New Roman">if (if ((moist &amp;lt; 5) || (moist &gt; 20)) {</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">document.getElementById("logArea").innerHTML =</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">"WARNING: Field moisture level is out of the optimal range."</font></Paragraph>
                                                  <Paragraph><font val="Times New Roman">}</font></Paragraph>
                                                  </ComputerDisplay>
                                                  <Paragraph>If the moisture is less than 5 or greater than 20, then trigger an alert.</Paragraph>
                                                  </Box>
                                                  <Paragraph>Warnings provide an opportunity for feedback loops. For example, if the soil moisture level is low, it might be necessary to activate the irrigation system and alert the farmer who may be aware of other circumstances and can make an appropriate decision. The farmer might decide to intervene and turn off the irrigation system because rain is in the forecast. Regardless of how the irrigation occurs, the sensor reporting soil moisture should begin showing more desirable levels, completing the feedback loop.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.6 The Cisco Coffee JavaScript application</Title>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_3.3.2.2.zip" type="html5" height="450" width="512" id="s3_3_6" x_folderhash="55f4befe" x_contenthash="19ca4d5b" x_xhtml="y">
                                                  <Caption>Figure 21</Caption>
                                                  </MediaContent>
                                                  <!--height increased to 450 as 425 caused interactive to cut off.-->
                                                  <Paragraph>The figure shows a simulated version of the Cisco Coffee JavaScript application currently running in your browser. If you click <b>Show Real Data</b>, you will see a status message that says, 'No sensors found'. That is because there are no actual sensors attached to the application. The application is generating fictitious sensor data. While the entirety of the code is out of the scope of this course, feel free to open the file and analyse it on your own to see how much you understand.</Paragraph>
                                                  <Paragraph>You can view the source by right-clicking anywhere in the figure and choosing an option similar to <b>View Source </b>or <b>View Frame Source,</b>depending on the browser. Scroll down to the section in the code that starts with <b>Script</b>. Lines that began with a double forward slash (<b>//</b>) denote comments. The comments provide a brief explanation of the code. If you would like to investigate this JavaScript application further, you can download the following files:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49460">Lab – Cisco Coffee JavaScript Application (Optional).pdf</a></ListItem>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49461">Cisco Coffee JavaScript Files.zip</a></ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>3.3.7 Learn about Scratch</Title>
                                                  <Paragraph>Scratch is a programming language developed by the Lifelong Kindergarten Group at the MIT Media Lab. It has an active online community to help you create your own interactive stories, games, and animations.</Paragraph>
                                                  <Paragraph>You can learn more about Scratch or <a href="http://scratch.mit.edu/">try it yourself</a>. There are a number of video tutorials available on the website to help you get started. Scratch may look like a toy, but it is a great tool to improve your logical thinking skills, which is one of the building blocks of computer programming.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>3.4 Terms and concepts practice</Title>
                                                  <Paragraph>This activity will help you to test some of the terms and concepts you've been introduced to.</Paragraph>
                                                  <Activity>
                                                  <Question>
                                                  <Paragraph/>
                                                  </Question>
                                                  <Interaction>
                                                  <Matching>
                                                  <Option>
                                                  <Paragraph>actuator </Paragraph>
                                                  </Option>
                                                  <Match x_letter="f">
                                                  <Paragraph>a motor that can be used to move or control a mechanism or system according to a specific set of instructions</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>Bluetooth</Paragraph>
                                                  </Option>
                                                  <Match x_letter="j">
                                                  <Paragraph>a short-range wireless communication protocol suite that transmits data via low-powered radio waves</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>Cloud computing </Paragraph>
                                                  </Option>
                                                  <Match x_letter="g">
                                                  <Paragraph>... servers and services are dispersed all over the globe in distributed database centres</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>sensor</Paragraph>
                                                  </Option>
                                                  <Match x_letter="e">
                                                  <Paragraph>a 'thing' that measures a physical property and converts that data into an electrical signal</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>controller</Paragraph>
                                                  </Option>
                                                  <Match x_letter="i">
                                                  <Paragraph> ... forwards data gathered from sensors to other devices on an M2M network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>Java </Paragraph>
                                                  </Option>
                                                  <Match x_letter="h">
                                                  <Paragraph>a popular object-oriented programming language that works on multiple platforms</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>TCP/IP </Paragraph>
                                                  </Option>
                                                  <Match x_letter="d">
                                                  <Paragraph>... required for devices that communicate directly across the Internet</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>small business or home business wireless router </Paragraph>
                                                  </Option>
                                                  <Match x_letter="a">
                                                  <Paragraph>connects devices on a local LAN with the internet</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>Linux </Paragraph>
                                                  </Option>
                                                  <Match x_letter="b">
                                                  <Paragraph>an operating system that allows humans to interact with computers</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>6LoWPAN </Paragraph>
                                                  </Option>
                                                  <Match x_letter="c">
                                                  <Paragraph>IPv6-based low power wireless communication protocol</Paragraph>
                                                  </Match>
                                                  </Matching>
                                                  </Interaction>
                                                  </Activity>
                                                  </Session>
                                                  <Session>
                                                  <Title>3.5 Session 3 quiz</Title>
                                                  <Paragraph>Check what you have learned in Session 3.</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48848">Session 3 quiz</a></Paragraph>
                                                  <Paragraph>Use 'ctrl' (cmd on a Mac) or right-click to open the quiz in a new window or tab then come back here when you're finished.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>3.6 Summary</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/3-1-4.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-4.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="f985ca31" x_imagesrc="3-1-4.jpg" x_imagewidth="880" x_imageheight="956" x_smallsrc="3-1-4.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/3-1-4.small.jpg" x_smallwidth="512" x_smallheight="354"/>
                                                  <Caption>Figure 22</Caption>
                                                  <Description>The figure shows how many things are loosely connected using independent, use-specific networks that cannot be leveraged against the IoE.</Description>
                                                  </Figure>
                                                  <Paragraph>The IoT is made up of a loose collection of disparate, use-specific networks. The M2M connection is a network type that is unique to the IoT.</Paragraph>
                                                  <Paragraph>Protocols refer to the rules of communication that devices use and are specific to the characteristics of the conversation. A group of inter-related protocols is called a protocol suite, which helps ensure interoperability between network devices.</Paragraph>
                                                  <Paragraph>Cloud computing is a type of client-server model in which servers and services are dispersed all over the globe in distributed data centres. Fog computing extends cloud computing and services to the edge of the network.</Paragraph>
                                                  <Paragraph>End devices, sensors, RFID tags, and actuators can use controllers that are in the fog. This frees up bandwidth in the network for other uses. These controllers can use Cisco IOx. These IP-enabled controllers are able to forward information across an IP network, and allow individuals to access the controller remotely. Some controllers are able to consolidate information from multiple sensors or perform basic analysis of data received.</Paragraph>
                                                  <Paragraph>Infrastructure devices are primarily responsible for moving data between the controller devices and other end devices across the network.</Paragraph>
                                                  <Paragraph>Sensors must be told what data to capture and where to send that data. A controller must be programmed to receive that data and decide if it should relay a message to another device.</Paragraph>
                                                  <Paragraph>All of these functions rely on programs. A computer program is a set of instructions given to a computer, to be executed in a specific order. Because computers do not speak human languages, computer programming languages were created. These languages allow humans to write instructions in a way that computers can understand.</Paragraph>
                                                  </Session>
                            </Unit>
                            <Unit>
                                                  <UnitID/>
                                                  <UnitTitle>Session 4: Transitioning to the IoE</UnitTitle>
                                                  <Session>
                                                  <Title>4.1 The IoE connections</Title>
                                                  <Paragraph>The IoT is focused on connecting the unconnected, primarily the 'things' of the IoE. Connecting the unconnected requires a convergence between an organisation’s operational technology (OT) and the information technology (IT) systems those organisations have in place.</Paragraph>
                                                  <Paragraph>OT is defined as an organisation's industrial control and automation infrastructure. This includes the hardware (such as sensors and end devices) and the software that is used to control and monitor the manufacturing equipment and processes. Most communication in OT is accomplished between machines.</Paragraph>
                                                  <Paragraph>IT systems refer to the network infrastructure, telecommunications, and software applications that are used to process information and allow the exchange of that information between humans.</Paragraph>
                                                  <InternalSection>
                                                  <Heading>Converging IT and OT</Heading>
                                                  <Paragraph>By converging IT and OT systems in an IoE solution, organisations can create better products, achieve cost and risk reductions, and improve performance, flexibility and efficiency. Figure 1 shows the control centre of a modern train system that monitors the status of routes and train operations. With IoE solutions, organisations can implement a simple, smart, and secure approach that allows organisations to:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Simplify the infrastructure (simple)</b> – Seamlessly converge IT and OT infrastructure to reduce operational costs and increase process efficiencies.</ListItem>
                                                  <ListItem><b>Create intelligence and agility (smart)</b> − Use application-centric analytics so applications can run at peak performance and gain information from the infrastructure for new services.</ListItem>
                                                  <ListItem><b>Deliver end-to-end security (secure)</b> − The converged infrastructure defends against attacks and responds to threats intelligently and dynamically.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>To implement IoE solutions, organisations must examine and account for three distinct connection types: M2M, M2P, and P2P.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-1-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-1-1.jpg" width="100%" x_folderhash="55f4befe" x_contenthash="caf5816e" x_imagesrc="4-1-1.jpg" x_imagewidth="512" x_imageheight="341"/>
                                                  <Caption>Figure 1</Caption>
                                                  </Figure>
                                                  </InternalSection>
                                                  <Section>
                                                  <Title>4.1.1 M2M connections</Title>
                                                  <Paragraph>Critical components of modern M2M systems include sensors, actuators, and controllers. They must have a network communications link and programming that instructs a device how to interpret data, and based on predefined parameters, forward that data.Figure 2 shows M2M connections working in an auto plant.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-1-2.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-1-2.jpg" width="100%" x_folderhash="55f4befe" x_contenthash="3a6fa9e9" x_imagesrc="4-1-2.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  <Caption>Figure 2</Caption>
                                                  </Figure>
                                                  <Paragraph>M2M connections are typically present in tracking physical assets, optimizing operations through sensor data and monitoring systems or machines remotely. The most well-known type of M2M communication is telemetry, which is used to transmit performance measurements gathered from monitoring instruments in remote locations. Products with built-in M2M communication capabilities are often marketed as being 'smart products'.</Paragraph>
                                                  <Paragraph>Currently, M2M does not have a standardised connected device platform. These devices communicate using proprietary protocols that are device- or task-specific, and are unable to communicate across other platforms. However, as M2M connections become more prevalent, the need for agreed upon standards will become more crucial.</Paragraph>
                                                  <Paragraph>M2M communication is an important aspect in many industries, including retail, manufacturing, public service and service provider industries. Table 1 provides some examples. As technology continues to evolve, and new connection types become available, new sources of value will emerge.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 1 M2M interactions</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><font val="Times New Roman">Sector</font></td>
                                                  <td><font val="Times New Roman">Connections</font></td>
                                                  <td><font val="Times New Roman">Impacts</font></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Retail</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Shelf sensors</font></Paragraph><Paragraph><font val="Times New Roman">Parking-space sensors</font></Paragraph><Paragraph><font val="Times New Roman">Infrared motion sensors</font></Paragraph><Paragraph><font val="Times New Roman">Weight mats</font></Paragraph><Paragraph><font val="Times New Roman">Environmental sensors (light, temperature)</font></Paragraph><Paragraph><font val="Times New Roman">Door sensors</font></Paragraph><Paragraph><font val="Times New Roman">Mobile payments</font></Paragraph><Paragraph><font val="Times New Roman">Energy meters</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Inventory visibility</font></Paragraph><Paragraph><font val="Times New Roman">Automated ordering process</font></Paragraph><Paragraph><font val="Times New Roman">Flexible payment options</font><font val="Times New Roman"><br/></font><font val="Times New Roman">Energy optimisation</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Manufacturing</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Converged IP factory network</font></Paragraph><Paragraph><font val="Times New Roman">Sensors (vibration, HVAC, lighting)</font></Paragraph><Paragraph><font val="Times New Roman">Actuators</font></Paragraph><Paragraph><font val="Times New Roman">Sensor-to-ERP connectivity</font></Paragraph><Paragraph><font val="Times New Roman">Input/output machines</font></Paragraph><Paragraph><font val="Times New Roman">Process operation controls</font></Paragraph><Paragraph><font val="Times New Roman">Product packaging</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Remote asset monitoring</font></Paragraph><Paragraph><font val="Times New Roman">Predictive maintenance</font></Paragraph><Paragraph><font val="Times New Roman">Flexible production</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Public sector</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Smart buildings</font></Paragraph><Paragraph><font val="Times New Roman">Smart lighting</font></Paragraph><Paragraph><font val="Times New Roman">Smart payments</font></Paragraph><Paragraph><font val="Times New Roman">Intelligent public transit</font></Paragraph><Paragraph><font val="Times New Roman">Smart grid</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Improved citizen/employee/student experience</font></Paragraph><Paragraph><font val="Times New Roman">Improved asset utilisation</font></Paragraph><Paragraph><font val="Times New Roman">New revenue streams</font></Paragraph><Paragraph><font val="Times New Roman">Energy optimisation</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Service providers</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Car sensors</font></Paragraph><Paragraph><font val="Times New Roman">Appliance sensors</font></Paragraph><Paragraph><font val="Times New Roman">RFID</font></Paragraph><Paragraph><font val="Times New Roman">Digital billboards</font></Paragraph><Paragraph><font val="Times New Roman">Unused inventory</font></Paragraph><Paragraph><font val="Times New Roman">Office facilities</font></Paragraph><Paragraph><font val="Times New Roman">Trucks</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Remote site monitoring Service</font></Paragraph><Paragraph><font val="Times New Roman">Smart commerce</font></Paragraph><Paragraph><font val="Times New Roman">Intelligent diagnostics</font></Paragraph><Paragraph><font val="Times New Roman">Targeted advertising</font></Paragraph></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.1.2 M2P connections</Title>
                                                  <Paragraph>People play an important role in harnessing the digital intelligence gathered by M2M connections. The resulting M2P connections are essential for optimal decision making.</Paragraph>
                                                  <Paragraph>For example, portable sensors and monitors can provide round-the-clock information on a patient’s vital signs, but health care providers are ultimately responsible for using that information to assess patients and provide treatment.</Paragraph>
                                                  <Paragraph>M2P connections mean that people can send information to technical systems and receive information from these systems. M2P connections are transactional, which means the flow of information moves in both directions, from machines to people and from people to machines. M2M and P2P connections are also transactional.</Paragraph>
                                                  <Paragraph>M2P technologies can range from automated customer notification systems with preset triggers, to advanced dashboards that help people visualise analytics. People can also perform more complex M2P operations such as examining and analyzing received data, and determining how to present information to decision-makers.</Paragraph>
                                                  <Paragraph>In addition to offering improvements in efficiency, the IoE provides safety benefits. For example, sensors in the ground and on the miners make it possible to detect danger signs before an accident occurs. Vibrations in soil and rock, or changes in human vital signs, can prompt real-time M2M or M2P interactions that save property, investments, and lives. Table 2 provides examples of the impact that M2P connections can have in retail, manufacturing, the public sector, and service provider industries.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 2 M2P interactions</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><font val="Times New Roman">Sector</font></td>
                                                  <td><font val="Times New Roman">Connections</font></td>
                                                  <td><font val="Times New Roman">Impacts</font></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Retail</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Digital signage</font></Paragraph><Paragraph><font val="Times New Roman">Connected shopping carts</font></Paragraph><Paragraph><font val="Times New Roman">Video cameras</font></Paragraph><Paragraph><font val="Times New Roman">Wi-Fi badges</font></Paragraph><Paragraph><font val="Times New Roman">Point-of-sale devices</font></Paragraph><Paragraph><font val="Times New Roman">Kiosks</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Understand shopper behaviour </font></Paragraph><Paragraph><font val="Times New Roman">Personalised content</font></Paragraph><Paragraph><font val="Times New Roman">Endless aisle omnichannel</font></Paragraph><Paragraph><font val="Times New Roman">Optimised retail operations&gt;</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Manufacturing</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Video analysis of control systems</font></Paragraph><Paragraph><font val="Times New Roman">Operations dashboards</font></Paragraph><Paragraph><font val="Times New Roman">Safety tags and signage</font></Paragraph><Paragraph><font val="Times New Roman">Fleet/logistics systems</font></Paragraph><Paragraph><font val="Times New Roman">Partner/supplier supply-chain data</font></Paragraph><Paragraph><font val="Times New Roman">Distribution locations</font></Paragraph><Paragraph><font val="Times New Roman">IT assets and endpoints</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Operations analytic</font></Paragraph><Paragraph><font val="Times New Roman">Real-time supply chain </font></Paragraph><Paragraph><font val="Times New Roman">IT and physical security</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Public sector</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Video surveillance</font></Paragraph><Paragraph><font val="Times New Roman">Smart parking</font></Paragraph><Paragraph><font val="Times New Roman">Disaster response</font></Paragraph><Paragraph><font val="Times New Roman">Inpatient monitoring</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Enhanced security, safer communities</font></Paragraph><Paragraph><font val="Times New Roman">Increased revenue/compliance</font></Paragraph><Paragraph><font val="Times New Roman">Smart public safety fleets</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Service providers</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Intelligent GPS</font></Paragraph><Paragraph><font val="Times New Roman">Home security devices</font></Paragraph><Paragraph><font val="Times New Roman">Home energy devices</font></Paragraph><Paragraph><font val="Times New Roman">Automated customer notifications</font></Paragraph><Paragraph><font val="Times New Roman">Auto-translation</font></Paragraph><Paragraph><font val="Times New Roman">Sponsored data</font></Paragraph><Paragraph><font val="Times New Roman">Connected life</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Personalised traffic report</font></Paragraph><Paragraph><font val="Times New Roman">Hyper location presence</font></Paragraph><Paragraph><font val="Times New Roman">Health order refills  </font></Paragraph><Paragraph><font val="Times New Roman">Home security energy control</font></Paragraph></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.1.3 P2P connections</Title>
                                                  <Paragraph>M2M and M2P connections are an important aspect of any IoE solution. But, for a complete IoE solution, individuals must communicate and collaborate with others using P2P connections.</Paragraph>
                                                  <Paragraph>P2P connections are characterised by collaborative solutions that leverage new and existing network infrastructure, devices, and applications. These optimised and secure network platforms allow for voice, video and data to be presented in a single view, to and from any endpoint or mobile device.</Paragraph>
                                                  <Paragraph>P2P applications provide services for managing meeting room reservations and resources, for example, using Cisco Smart+Connected Meeting Spaces. P2P applications also support online collaboration through web and video conferencing, for example, using Cisco Webex. Table 3 provides examples of the impact that P2P connections can have in retail, manufacturing, the public sector, and service provider industries.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 3 P2P interactions</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><font val="Times New Roman">Sector</font></td>
                                                  <td><font val="Times New Roman">Connections</font></td>
                                                  <td><font val="Times New Roman">Impacts</font></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Retail</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Store associate mobile devices</font></Paragraph><Paragraph><font val="Times New Roman">Immersive video</font></Paragraph><Paragraph><font val="Times New Roman">Social media</font></Paragraph><Paragraph><font val="Times New Roman">Contact centre</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">On-demand expert advice</font></Paragraph><Paragraph><font val="Times New Roman">Collaborative product development</font></Paragraph><Paragraph><font val="Times New Roman">On-demand training</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Manufacturing</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Environmentally hardened mobile video device</font></Paragraph><Paragraph><font val="Times New Roman">Active collaboration rooms</font></Paragraph><Paragraph><font val="Times New Roman">R&amp;D and production teams</font></Paragraph><Paragraph><font val="Times New Roman">Engineers and production experts</font></Paragraph><Paragraph><font val="Times New Roman">Contact centre</font></Paragraph><Paragraph><font val="Times New Roman">Business-to-business (B2B) e-commerce site</font></Paragraph></td>
                                                  <td><font val="Times New Roman">Remote Expertise Collaborative Product Development Mobile collaboration on factory floor</font></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Public sector</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Telework</font></Paragraph><Paragraph><font val="Times New Roman">Bring your own device (BYOD)</font></Paragraph><Paragraph><font val="Times New Roman">Connected learning</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Employee productivity </font></Paragraph><Paragraph><font val="Times New Roman">Lower costs </font></Paragraph><Paragraph><font val="Times New Roman">Distance learning</font></Paragraph></td>
                                                  </tr>
                                                  <tr>
                                                  <td><font val="Times New Roman">Service providers</font></td>
                                                  <td><Paragraph><font val="Times New Roman">Video cameras</font></Paragraph><Paragraph><font val="Times New Roman">Television</font></Paragraph><Paragraph><font val="Times New Roman">Digital signage</font></Paragraph><Paragraph><font val="Times New Roman">Social media</font></Paragraph><Paragraph><font val="Times New Roman">Contact centre</font></Paragraph></td>
                                                  <td><Paragraph><font val="Times New Roman">Collaboration as a service</font></Paragraph><Paragraph><font val="Times New Roman">TelePresence as a service</font></Paragraph><Paragraph><font val="Times New Roman">Smart health</font></Paragraph></td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.1.4 M2M, M2P, P2P interacting to form solutions</Title>
                                                  <Paragraph>Implementing an IoE solution using M2M, M2P and P2P connections, provides organisations and individuals with actionable insights and seamless automation.</Paragraph>
                                                  <Paragraph>For example, consider how a business that sells metallic, purple phone covers, might benefit from these interactions should a sudden spike in demand occur. Analytics first pick up indications of this trend for that product and color on social media. That business predicts the change in demand. M2M, M2P, and P2P connections can prompt factories and suppliers to ramp up production of this metallic, purple phone cover.</Paragraph>
                                                  <Paragraph>As IT and OT converge, all aspects of the supply chain are connected. Through wireless sensors and networked mobility, companies gain immediate visibility into every aspect of the product cycle, from initial consumer interest to post-purchase feedback:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>consumer interest informed by checkout process, carts and shelves, post-purchase feedback</ListItem>
                                                  <ListItem>inventory informed by loading docks, stock shelves, and warehouses</ListItem>
                                                  <ListItem>logistics informed by trucks and trains</ListItem>
                                                  <ListItem>production informed by factory floors and machines.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Table 4 shows how the interaction of the devices and people  might occur.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 4 Interaction process</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Step 1</b></td>
                                                  <td class="TableCentered"><b>Step 2</b></td>
                                                  <td class="TableCentered"><b>Step 3</b></td>
                                                  <td class="TableCentered"><b>Step 4</b></td>
                                                  <td class="TableCentered"><b>Step 5</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Customers talk to companies through purchase habits and online feedback. </td>
                                                  <td class="TableLeft">Companies talk to supply chain management channels.</td>
                                                  <td class="TableLeft">Supply chain management systems talk to machines on the factory floor. </td>
                                                  <td class="TableLeft">Machines on the factory floor talk to the suppliers of raw materials.</td>
                                                  <td class="TableLeft">Suppliers of raw materials inform supply chain management channels of the shipment of raw materials.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>With IoE, there is the potential of providing connections all the way back to the mines and drilling operations, where raw materials are extracted from the ground. Those mines, which are the start of the production value chain, illustrate the IoE’s value, particularly its ability to offer predictive insights.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>4.2 Implementing an IoE solution</Title>
                                                  <Paragraph>In this section you will be introduced to how you may design and implement an IoEsolution. There are many challenges and each system has its own requirements which must be considered. In reading this section, you will explore bandwidth and technology growth considerations, how proprietary (manufacturer specific) systems affect any IoE solution, the processes required for connecting different systems, how you may adjust different technologies.
</Paragraph>
                                                  <Section>
                                                  <Title>4.2.1 Understanding existing business processes</Title>
                                                  <Paragraph>Implementing an IoE-enabled business model can improve business operations, save costs, and allow for more effective marketing strategies. But how can an organisation implement new IoE solutions without disrupting current operations?</Paragraph>
                                                  <Paragraph>One of the first steps business managers must take is to understand their current processes. They must identify:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>Who their suppliers and customers are</ListItem>
                                                  <ListItem>What customer needs are</ListItem>
                                                  <ListItem>What the schedule and process steps are for creating and delivering an offering</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>For example, as a supply manager or distributor, it is important to understand when receipt of an item will be in relation to the expiration dates of those same products. Watch this video of the supply chain feedback loop for banana harvests.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_1_1_supply_chain_management_banana_30.mp4" type="video" width="512" x_manifest="ioe_1_video_4_2_1_1_supply_chain_management_banana_30_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="8d17a664" x_subtitles="ioe_1_video_4_2_1_1_supply_chain_management_banana_30.srt">
                                                  <Transcript>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>The banana anticipated the early harvest, which told the servers to alert the trucks. And they arranged the new delivery time with the supermarket chain, which put the current stock of bananas on sale. So the shopping cart, just to be extra helpful, suggested a delicious dessert recipe. And that's how Cisco is connecting the Internet of Everything get supply chains perfectly linked.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_1_1_supply_chain_management_banana_30.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_4_2_1_1_supply_chain_management_banana_30.jpg" x_folderhash="55f4befe" x_contenthash="6aa5fc63" x_imagesrc="ioe_1_video_4_2_1_1_supply_chain_management_banana_30.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.2 Understanding existing IT and OT networks</Title>
                                                  <Paragraph>In addition to understanding business processes, organisations that are implementing an IoE solution must consider the existing IT and OT network infrastructures and operations.</Paragraph>
                                                  <Paragraph>Business managers must understand how the IT network users interact with the network resources and services and gather information about all internal and external access to the existing network infrastructure. Without full knowledge of who has access to the network and how it is used, the intended solution might not include some user requirements, or incorrectly identify user groups. Other considerations include identifying the existing network and infrastructure components, and capabilities, including support for traffic requirements, data storage, and security needs.</Paragraph>
                                                  <Paragraph>In addition to understanding IT network operations, business managers must also consider how current networks of OT systems operate. This includes knowing how the M2M connections currently take place, the information that is generated from these connections, and how this information is integrated into the current business processes. They must also identify any connectivity requirements, such as the use of proprietary protocols.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.3 Business goals and opportunities</Title>
                                                  <Paragraph>Business managers must also take into consideration business goals, business styles, tolerance to risk, and the level of technical expertise available. Business managers must analyse the feasibility of an IoE project based on how it contributes to business success. Considerations might include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Profitability</b> − Determine cost and return on investment of implementing the IoE project as a result of efficiencies and improvements.</ListItem>
                                                  <ListItem><b>Business growth and market share</b> − Identify growth opportunities and competitive advantages due to the IoE implementation as a result of new insights.</ListItem>
                                                  <ListItem><b>Customer satisfaction</b> – Determine the impact to customer experience and loyalty as a result of improved responsiveness to customer needs.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.4 Cisco streamlines old mining operation</Title>
                                                  <Paragraph>A full IoE implementation is an end-to-end solution with multiple M2M, M2P and P2P connections. Companies must determine implementation priorities based on those connections that provide the best opportunity to contribute to the success of the business.</Paragraph>
                                                  <Paragraph>Consider how a mining company might use IoE solutions to optimise operations and reduce costs by asking:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>What benefits can an IoE solution bring to a mining organisation?</ListItem>
                                                  <ListItem>How can the organisation be impacted by the real-time data?</ListItem>
                                                  <ListItem>How is cost-saving achieved by the IoE implementation?</ListItem>
                                                  <ListItem>What types of profits could be foreseen by the owners, shareholders, and employees?</ListItem>
                                                  <ListItem>While there are many connections that can be made in the IoE solution, which ones will provide the best return on investment (ROI) and, therefore, should take prioritisation?</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Watch the video to see how mining companies use IoE to provide connectivity and collaboration across the organisation and the systems they use. A focus of the video is one IoE solution that was implemented to minimise downtime of trucks used in operations, which can save money.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations.mp4" type="video" width="512" x_manifest="ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="0a6523fd" x_subtitles="ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>Today's mining operations comprise a series of disparate, siloed environments, from extraction and automation systems to port and rail and track automation. Each environment presents its own challenges and mainly operates independently, using proprietary data sources and networks. You need a holistic view of your entire mining operations that leads to better visibility and traceability while letting you take advantage of rich IP-enabled technologies in each environment. </Remark>
                                                  <Remark>Working with industry leading partners, Cisco can help fully connect and integrate all of your operational environments, removing the barriers to efficiency created by siloed networks. But it doesn't stop there. Cisco takes an integrated approach, converging your existing enterprise systems with this new consolidated operational technology, or OT network. The result is a fully connected and converged pit-to-port network that enables lean, efficient, collaborative, safe, and highly secure operations while helping you keep your costs down and your profits up.</Remark>
                                                  <Remark>With Cisco's solutions for mining, you can improve performance and efficiency at all stages of operations to reduce downtime; better manage and schedule your fleet and assets, wherever or whatever they may be; increase security to control access to restricted areas and your assets; and most importantly, better ensure the safety of both your employees and the environment. And you can do all of this while connecting your teams and assets collaboratively around the world. Here are just a few examples.</Remark>
                                                  <Remark>In mining operations, downtime is the enemy, and an idle truck can cost hundreds of thousands per day. Cisco's solutions for mining help automate operations for maximum efficiency by leveraging the Internet of Things, where every device interacts with each other and turns information into action. That means critical elements on a truck, from engine components to tyre pressure, can be monitored both on-board and remotely, enabling predictive maintenance.</Remark>
                                                  <Remark>Cab sensors monitor drivers for alertness and, should a driver become tired, automatically notify both the driver and a remote operations centre. Monitors can also remotely alert vehicles approaching a pit too quickly, helping to ensure the safety of the driver and others working in the pit.</Remark>
                                                  <Remark>Real-time remote monitoring and scheduling of all machines and vehicles is possible at every operation phase, from excavation to raw material movement to delivery. Cisco's solutions for mining also helped to create a zero-harm environment for personnel and surrounding areas. This includes using RFID tags to track miners and machinery underground at all times. If there's an incident, each worker can be located in minutes. Similarly, gas monitor systems help enable remote real-time gas detection, so personnel and responders can be alerted to up-to-the-minute conditions.</Remark>
                                                  <Remark>Even with mining operations located in remote areas, malicious attacks can still occur at any time. Cisco's solutions for mining add both physical and cyber security to your infrastructure, helping to protect your operations and assets from both internal and external threats. And Cisco's solutions for mining let the mining operators remotely collaborate on ideas and solutions with your office personnel, outside maintenance crews, and third-party engineering companies from around the world without ever leaving the site.</Remark>
                                                  <Remark>To find out more about Cisco's solutions for mining, visit us on the web.</Remark>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations.jpg" x_folderhash="55f4befe" x_contenthash="1eff3ced" x_imagesrc="ioe_1_video_4_2_1_4_cisco_helps_mining_companies_streamline_operations.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.5 Determine technical requirements</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">After business managers have determined their priorities and established the changes in business processes that must be made, the technology professionals can then begin the process of determining the technical requirements. Table 5 provides more information.</font></Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 5 Technical requirements</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Standardisation</b></td>
                                                  <td class="TableCentered"><b>Equipment</b></td>
                                                  <td class="TableCentered"><b>Network scalability</b></td>
                                                  <td class="TableCentered"><b>Security</b></td>
                                                  <td class="TableCentered"><b>Network management</b></td>
                                                  <td class="TableCentered"><b>Programming</b></td>
                                                  <td class="TableCentered"><b>Data processing and access</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">What technology is required to allow these systems to communicate to IT systems, or to convert these systems to use IP?</td>
                                                  <td class="TableLeft">What new equipment is required? Are sensors needed to track information? What devices are needed to aggregate information and help with information management?</td>
                                                  <td class="TableLeft">How does the existing infrastructure need to be modified to support the new technical requirements and data load?</td>
                                                  <td class="TableLeft">What security measures need to be implemented on IT systems, OT systems, and end devices?</td>
                                                  <td class="TableLeft">Does the new device integration create a more complex network environment? If so, what new services and applications need to be installed to simplify the management of these updated systems?</td>
                                                  <td class="TableLeft">What are the programming requirements needed to support non-IP-enabled and IP-enabled devices?</td>
                                                  <td class="TableLeft">When is it necessary to forward data to the Cloud for processing, and when does data need to be processed closer to the source, for example, in the Fog?</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.6 Potential constraints</Title>
                                                  <Paragraph>Constraints can and do affect IoE implementations and should be identified early when implementing a solution. The relative importance of the constraints varies from project to project. Budget constraints are not always the main consideration for a large project (Table 6).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 6 Potential contraints</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Budget</b></td>
                                                  <td class="TableCentered"><b>Legacy systems</b></td>
                                                  <td class="TableCentered"><b>Technical expertise</b></td>
                                                  <td class="TableCentered"><b>Policies</b></td>
                                                  <td class="TableCentered"><b>Culture</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Limited resources may require some compromises in design due to the costs of equipment, software, or other components.</td>
                                                  <td class="TableLeft">Businesses may have large capital investments in existing systems.</td>
                                                  <td class="TableLeft">The lack of trained personnel to implement an IoE solution is a major constraint.</td>
                                                  <td class="TableLeft">The design must account for existing policies regarding protocols, standards, vendors, and applications. If necessary, these policies need to be refined or removed. In some cases, new policies must be created to facilitate the IoE implementation.</td>
                                                  <td class="TableLeft">The change over to an IoE implementation requires a collaborative environment with open communications between traditionally segmented departments.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>In addition to these common constraints, business managers must also consider the complexity of any existing IT and OT designs when converging IT and OT in the new IoE implementation.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.7 The IoE architectural approach</Title>
                                                  <Paragraph>Cisco’s architectural approach to the IoE is organised into three functional layers. The application layer is dependent on the platform layer, which is dependent on the infrastructure layer (Table 7).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 7 Architectural approach</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Application layer</b></td>
                                                  <td class="TableCentered"><b>Platform layer</b></td>
                                                  <td class="TableCentered"><b>Infastructure layer</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">This layer provides automated, dynamic, application-centric responses to changing traffic and usage demands. The application layer includes the intelligence needed to improve user experiences. It allows for the integration of traditional IT apps, and the use of collaboration applications and industry-specific applications.</td>
                                                  <td class="TableLeft">This refers to Cisco solutions that provide orchestration, management, and policy adjustments based on changing demands, to accelerate service delivery. It allows applications and users to receive the resources they need, when they need them, without manual or complicated IT tasks and configuration changes. The platform layer creates business agility by implementing new services and new analytical applications that can handle Big Data needs.</td>
                                                  <td class="TableLeft">This layer integrates power, security, core networks, access architectures, and storage with physical and virtual resources. It includes the right mix of hardware and software across enterprise, Cloud, and service provider networks. It converges all connections, both OT and IT, into IP and accounts for Cloud computing and mobile connectivity.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>This architectural approach reflects the service models of the cloud computing model, taking advantage of software as a service (SaaS), platform as a service (PaaS), andiInfrastructure as a service (IaaS).</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.8 Adjusting technologies</Title>
                                                  <Paragraph>Organisations must adjust the technologies that are used across the infrastructure and applications. The table provies more information.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 8 Adjusting technologies</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Standard infastructure</b></td>
                                                  <td class="TableCentered"><b>Responsive software</b></td>
                                                  <td class="TableCentered"><b>Holistic security</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">This refers to establishing and implementing standardised protocols and coordinating services in an end-to-end IP environment. This helps reduce, or eliminate, the costs associated with legacy systems. It also creates seamless integration across autonomous departments, which allows for increased collaboration, rapid delivery of information, and end-to-end management and security.</td>
                                                  <td class="TableLeft">This requires, through an application-centric approach, enabling the infrastructure to automatically and rapidly detect, and adapt to, traffic demands and flows. This allows the infrastructure to react to changing conditions and potential issues, without compromising security or availability. A large part of an application-centric approach is establishing what information is virtualised, what moves into the Cloud, and what stays within the Fog.</td>
                                                  <td class="TableLeft">This refers to securing a network infrastructure from end-to-end. It includes enabling technologies that can monitor network operations and automatically detect and mitigate threats. It simultaneously ensures confidentiality, integrity, and availability of any information that is transmitted across the network.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.9 Connecting processes</Title>
                                                  <Paragraph>The Process pillar describes how people, data, and things interact with each other to deliver societal benefits and economic value. By connecting the unconnected, we have visibility into new processes, providing opportunities to create more efficient and effective interactions. Cisco is working with major retailers to use a combination of sensors, video, and analytics to improve store productivity and customer experience.</Paragraph>
                                                  <Paragraph>Watch this video about how the IoE affects a users' trip to a US-based online store (Big Box).</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_2_3_at_the_store_demo.mp4" type="video" width="512" x_manifest="ioe_1_video_4_2_2_3_at_the_store_demo_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="a1cd75c6" x_subtitles="ioe_1_video_4_2_2_3_at_the_store_demo.srt">
                                                  <Transcript>
                                                  <Remark>[MUSIC PLAYING]</Remark>
                                                  <Speaker>RICHARD MULLEN</Speaker>
                                                  <Remark>Hi, this is Richard Mullen at Cisco Systems, back at CES 2014 and our Big Box store. And we're going to walk through the second half of our scenario that we just looked at in the house.</Remark>
                                                  <Remark>So we left the house, we had a couple things we needed to buy for the friend that's spending the night. So we're making our way home here to the Big Box store, and we're going to stop there on the way home.</Remark>
                                                  <Remark>So you know, we're going to walk inside Big Box, and we're going to log on to their network via our Facebook credentials. And I'm going to launch of the Big Box app, all right? So what we're able to do-- and this is going to be the start of our story in here-- is a couple of things. Number one, you'll notice I have a parking place assigned. So I made an appointment that's going to be at 4 o'clock, and now I can go with the parking-- I now have dedicated parking for me out in the lot.</Remark>
                                                  <Remark>The other thing you'll notice is our shopping list. So we've got the light bulb. We've got the jersey that Aidan selected on the screen in the other room. And those elements, if we map them, we can see where these are in the store. Because we have these products identified, and then with location-based services, we know where I am inside this physical environment. So that way, for the customer coming into our retail environment, we have a real customised experience. But we're going to watch how that manifests itself in a couple of other locations.</Remark>
                                                  <Remark>All right, so the parking place we have reserved at Big Box that allows us to get in and out of the store, we actually do that in Building 10 in San Jose. So here we have a map of Building 10 that we're monitoring, and we have sensors underneath the parking places. So we can determine whether or not the space is occupied, or it's vacant, and that way we can reserve it for customers. They come to see us at the EBC, and we get them directly into that parking spot.</Remark>
                                                  <Remark>So here we are at POP with our Big Box bright lights. If you remember, these light bulbs, they have a sensor embedded in them, and they put themselves on our shopping list when they were reaching the end of their life. So they knew that, and they put it on the list. So here at POP, we could have this iPad with all this great product information on it. We can also host a video that gives us some information about what we're able to do regarding lighting in the home.</Remark>
                                                  <Remark>The other thing we can do is just call the manufacturer. So if people on the floor don't know about the product, we can just call into the call centre using a Jabber client on this iPad, and there we have our representative. Give everybody a wave. Awesome. We can call our manufacturer, and she can tell us directly about the Big Box Big Bright Light right here. And we can get some information about that. Thanks so much.</Remark>
                                                  <Remark>So, a way that we can really change the Internet of Everything experience directly at POP. But let's take a look at what's going on behind the store next.</Remark>
                                                  <Remark>So this is one of my associates' iPad right here. This is Cheryl's iPad. And it's got her schedule. It's got some promotions that we're running. And it's got where we need her next.</Remark>
                                                  <Remark>So we're just going to hit this lighting piece. She's going to see Mary Stone at 4 o'clock. But right over here we have a shopping cart that has a Wi-Fi tag on it. That allows the customer inside the store to hit that button when they need help.</Remark>
                                                  <Remark>So we're going to send Cheryl to that shopping cart, right? Because what we want to do is make sure that we pair up the right associate with the expertise needed in the store. So as you can see here, I've got my shopping cart that needs some attention in Soft Goods and there is Cheryl, who's really an expert there. So I want to send her directly to the shopping cart. I have other associates in the area, but she's the expert. I want to make sure that she's available there.</Remark>
                                                  <Remark>Let's talk about how all this data rolls up into how we manage the store. Shown here on this device, what we have all of our checkout lanes here. This tells us where all my carts are going in the store and when they're rolling out of the piece. It also tells me how long they shop inside the store. So I now know, in 23 minutes, I've got to have some more of my staff open up checkout lines, because this wave of carts are going to come in.</Remark>
                                                  <Remark>I also use surveillance-level data that we're doing up here, as well as the cart data, as well as people that are on the Wi-Fi network, to heat-map the entire store. So now I can figure out both associates that aren't in the right place, and get them placed over, but also where my traffic is going inside the store. All of this rolls into this dashboard that's over there on the final position, that's right here.</Remark>
                                                  <Remark>So that takes us to this dashboard, this IoE dashboard, that allows the manager to really manage the store much more effectively. So we looked at all this data that's going on inside the store. We have customers that are parking in the lot on appointment. We've got carts that are signalling. We're sending our associates out for there. We're looking at what's going on in the checkout lanes.</Remark>
                                                  <Remark>All of that data that's being captured in this environment is part of the Internet of Everything. So that manifests itself. For example, I know those carts are coming back in 20 minutes. So in blue are my checkout numbers. In white are-- I need to open up five more lanes in 20 more minutes.</Remark>
                                                  <Remark>So all of this information would be hosted on a platform that this Big Box retailer would be providing to their customer set. So that's where Cisco's network comes in, providing security, cloud services, application, predictive analytics. Being able to provide these types of applications to our customer set and roll them out, with security, all the way to the edge, with application-specific silicon that is set on very particular tasks in the data centre, a mix of maybe virtualised and physical environments-- all of our network expertise is what drives these type of Internet of Everything, where we're combining devices that are in the physical realm and are then now brought on-board onto the network and are now part of our experience. So thank you from CES 2014, and we look forward to seeing you in the next event.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_2_2_3_at_the_store_demo.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_4_2_2_3_at_the_store_demo.jpg" x_folderhash="55f4befe" x_contenthash="76b9882a" x_imagesrc="ioe_1_video_4_2_2_3_at_the_store_demo.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.10 The IoE in retail</Title>
                                                  <Paragraph>When transitioning to an IoE model, retailers have the opportunity to create new and better connections in their stores, corporate offices, distribution centers, and other environments. Figure 3 compares retail examples of the past with the IoE. Click on each of the terms on the left to see more information. Press each button to reveal a different section of the IoE retail infrastructure.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_4.2.3.1v2.zip" type="html5" height="425" width="512" id="s4_2_10" x_folderhash="55f4befe" x_contenthash="1b17dbb3" x_xhtml="y">
                                                  <Caption>Figure 3</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.11 The IoE in manufacturing</Title>
                                                  <Paragraph>Before IoE, manufacturers had little contact with customers and it was time-consuming to collect customer feedback on products. IT and OT operations were also separate.</Paragraph>
                                                  <Paragraph>With IoE, products and services can include embedded sensors that provide manufacturers with constant data and feedback. IT and OT operations are converged (Figure 4). Press each button to the left to reveal a different section of the IoE manufacturing infrastructure.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_4.2.3.2v2.zip" type="html5" height="425" width="512" id="s4_2_11" x_folderhash="55f4befe" x_contenthash="7f0805f5" x_xhtml="y">
                                                  <Caption>Figure 4</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.12 The IoE in the public sector</Title>
                                                  <Paragraph>Creating new and better connections, and collecting information from assets, can pay enormous dividends for governments (Figure 5). Press each button to the left to reveal a different section of the IoE public sector  infrastructure.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_4.2.3.3v3.zip" type="html5" height="425" width="512" id="s4_2_12" x_folderhash="55f4befe" x_contenthash="b32a8c5c" x_xhtml="y">
                                                  <Caption>(Figure 5)</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.13 The IoE for service providers</Title>
                                                  <Paragraph>IoE opens up tremendous possibilities for service providers to monetise their network. Service providers already have large networks that deliver mobile, video, collaboration, and other offerings to individual subscribers and businesses of all sises. They can now integrate many types of IoE connections to deliver rich new services (Figure 6). Press each button to the left to reveal a different section of the IoE service provider infrastructure.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_interactive_4.2.3.4v3.zip" type="html5" height="425" width="512" id="s4_2_13" x_folderhash="55f4befe" x_contenthash="c5b30b7c" x_xhtml="y">
                                                  <Caption>Figure 6</Caption>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.14 Proprietary ecosystems</Title>
                                                  <Paragraph>To achieve a complete IoE solution, interoperability is critical. OT networks and systems are often implemented using proprietary protocols that may be insecure. These protocols do not interoperate well with the protocols of an IP network, which are typically more secure.</Paragraph>
                                                  <Paragraph>One of the first steps is to develop a solution that allows the devices to speak the same language, regardless of the vendor. One way to accomplish this is to convert proprietary networks to IP-based networks. Another approach is to ensure that these proprietary protocols can communicate through a translator.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.15 Technological growth</Title>
                                                  <Paragraph>Today, the rate of technological growth is accelerating exponentially. To maintain a competitive advantage, organisations must be able to account for this growth.</Paragraph>
                                                  <Paragraph>There are three primary principles, referred to as laws that organisations and experts can use to help them plan for technological needs:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Moore’s Law</b> – This law was proposed by Gordon E. Moore, co-founder of Intel, in 1965. It states that the number of transistors on integrated circuits tend to double every two years, which increases processing capacity. <Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-2-15a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-2-15a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="7d43ba84" x_imagesrc="4-2-15a.jpg" x_imagewidth="880" x_imageheight="753" x_smallsrc="4-2-15a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-2-15a.small.jpg" x_smallwidth="512" x_smallheight="386"/><Caption>Figure 7</Caption><Description>Figure 7 is a graph entitled “Moore’s Law” and shows the increase of transistor count over the years from 1971 to 2011.</Description></Figure></ListItem>
                                                  <ListItem><b>Metcalfe’s Law</b> – This law is attributed to Robert Metcalfe. It states that the value of a given network is proportional to the square of the number of users connected to it. As shown in Figure 78 Metcalfe's Law relates to the number of unique connections in a network of (n) nodes, mathematically expressed as n(n−1)/2. The value described by this law is therefore proportional to n^2.<Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-2-15b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-2-15b.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="80aaca9f" x_imagesrc="4-2-15b.jpg" x_imagewidth="512" x_imageheight="435"/><Caption>Figure 8</Caption><Description>Figure 8 is a visualisation of the possible computer connections with Metcalfe’s Law.</Description></Figure></ListItem>
                                                  <ListItem><b>Reed’s Law</b> – This law was proposed by David Reed. It states that the value of the network grows exponentially if you add up all the potential two-person groups, three-person groups, etcetera, that members could form. This is represented as 2^n and is best seen with social media networks.<Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-2-15c.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-2-15c.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="0ab357ca" x_imagesrc="4-2-15c.jpg" x_imagewidth="512" x_imageheight="417"/><Caption>Figure 9</Caption><Description>Figure 9 a Many-to-Many connection as described by Reed’s Law.</Description></Figure></ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Metcalfe's law is frequently mentioned when explaining the internet's explosive growth. Together, Metcalfe's and Moore's laws provide a solid foundation to explain the ever increasing presence and value of information technology in people's daily lives.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.16 Growth relevance to IoE</Title>
                                                  <Paragraph>Moore's law allows organisations to make a rough estimate as to the computing power of machines in the future. The exponential growth in computing power allows us to make an estimate as to how long before the technology is ready and available at a reasonable cost to consumers. This allows organisations to not only plan for their own technological advances, but also to predict the advances of their competitors.</Paragraph>
                                                  <Paragraph>Metcalfe's law is useful for business managers to calculate the optimal number of interconnections between nodes. They must complete a cost-benefit analysis because the number of connections increases both costs and benefits.</Paragraph>
                                                  <Paragraph>When the cost of sensors used in the IoE becomes low enough, the benefits of more meshed networks are realised. Currently, most IoE implementations rely on controllers and gateways to aggregate the traffic between IoE end devices. These types of IoE devices incorporate many-to-many designs, as described by Reed’s law.</Paragraph>
                                                  <Paragraph>These principles allow organisations to better predict and plan for future needs and opportunities.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.17 Big data challenges</Title>
                                                  <Paragraph>The exponential growth of data continues as the number of things connected to the Internet increases. However, more data is not necessarily better if that data cannot be accessed, analysed, and applied in a usable manner. For data to be a true asset, it must be used effectively. In addition, using old, inaccurate data wastes time, resources, and money.</Paragraph>
                                                  <Paragraph>Managing this increased amount of data creates many challenges, including:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>bandwidth capacity on existing links connected to data centres</ListItem>
                                                  <ListItem>privacy concerns for user data</ListItem>
                                                  <ListItem>managing data for real-time communications</ListItem>
                                                  <ListItem>selecting and analysing appropriate data.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Insights from Big Data will enhance customer engagement, improve operations, and identify new sources of value. However, the increasing demands of Big Data require new technologies and processes for data centers and data analysis.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.18 Bandwidth requirements</Title>
                                                  <Paragraph>As more and more things are connected to the Internet, the demand for bandwidth will increase because of M2M communications in industrial, government, and home applications.</Paragraph>
                                                  <Paragraph>Fifty sensors may not consume much of your home’s Wi-Fi bandwidth simply because each device intermittently bursts a small amount of data. However, 50 sensors could be a very conservative estimate of the number of things connected per home in the next decade.</Paragraph>
                                                  <Paragraph>An essential characteristic of cloud computing is broad network access. In cloud computing service models, enabling on-demand network access to shared computing resources and services over the network results in increased requirements for network bandwidth. In turn, higher bandwidth requirements demand infrastructure improvements.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.19 Cloud vs fog computing</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-2-19.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-2-19.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="a57e1e71" x_imagesrc="4-2-19.jpg" x_imagewidth="512" x_imageheight="449"/>
                                                  <Caption>Figure 10</Caption>
                                                  <Description>The figure shows Cloud computing connected to Fog computing. </Description>
                                                  </Figure>
                                                  <Paragraph>Cloud computing solutions will create substantial increases in bandwidth needs as data and services are moved and processed in the Cloud, promoting organisational flexibility and agility.</Paragraph>
                                                  <Paragraph>However, some data and service solutions are more appropriate closer to the source. For example, smart light traffic systems require real-time processing. The selected computing model must enable the level of resiliency, scale, speed, and mobility that is required to efficiently use the data.</Paragraph>
                                                  <Paragraph>To deliver the best value, system designers must consider the distribution of data and account for different computing models. As a result, some services and applications may need to move from the cloud into the fog. This can help manage escalating bandwidth needs.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.2.20 The learning society</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">People are the most valuable asset in any organisation. To remain relevant and competitive in any environment, training must be a top priority. The impact of the IoE will affect all aspects of an organisation's operations. As a result, the entire organisation will require training to take advantage of IoE opportunities. For example, OT and IT must work together in innovative ways to overcome the challenges and realise the benefits of the IoE.</font></Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>4.3 Security and the IoE</Title>
                                                  <Paragraph>Security has become the primary concern for all interconnected computer systems. The IoE is not immune to attack and a good system should be designed with security in mind. In this section you will cover security architecture and policies, what may be a beneficial security strategy, the pervasive nature of security, security devices, wireless security, the risk of personal data with the IoE and system redundancy and how this assures security.</Paragraph>
                                                  <Paragraph>The increased number of connected devices and the amount of data they generate increases the demand for security of that data.</Paragraph>
                                                  <Paragraph>Watch the video of John Stewart, Senior Vice President, Chief Security Officer at Cisco Systems, discussing how to secure billions of devices in the IoE.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_3_1_1_security_included.mp4" type="video" width="512" x_manifest="ioe_1_video_4_3_1_1_security_included_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="658415eb" x_subtitles="ioe_1_video_4_3_1_1_security_included.srt">
                                                  <Transcript>
                                                  <Speaker>JOHN STEWART</Speaker>
                                                  <Remark>Hi. My name's John Stewart. I'm chief security officer here at Cisco. It is amazing to live in a time where there are more IP-addressable devices connected on the face of the earth than there are people. And it's really daunting to think about the fact that in the span of less than 10 years there are potentially going to be 50 billion IP-addressable systems on the internet.</Remark>
                                                  <Remark>Things like cameras, things like identity-card readers, things like people, things like cars, things like-- yes, believe it or not-- houses that tweet or trees that are tweeting or diapers that have their own iPhone app in order to make sure you can detect if your young kid has actually got to be changed. This innovation is happening all around us right now.</Remark>
                                                  <Remark>Part of what we're beginning to realise here at Cisco is that, as this transforms our world, companies like Samsung, General Electric, certainly ourselves, we have to build security into it and build it sort of in a different way. All the security capabilities that PCs were able to run can't be run on phones. Even the security features on phones can't always be run on the next-generation tablets. If you can run it on a tablet you might not be able to run it on a small sensor that's detecting air quality. So the entire concept of security is changing around our eyes.</Remark>
                                                  <Remark>Here's what we're aiming to do. We think there's a huge opportunity for both networks, service providers, and security in a quote-unquote "cloud configuration" to protect the devices that are being brought online. This should, all going smoothly-- and this is the test-- enable a house to be better protected, enable a car to be better protected, enable us to be able to crowdsource and protect one another's systems, because we're actually cooperating electronically. And it should, in the end analysis, enable the 50 billion IP-addressable systems that are coming online.</Remark>
                                                  <Remark>Here's the thing. They're going to come online anyway. So the designing of security now, which is to basically think about the problem today and enable it inside of the network-- and you give me another place it could be enabled, and I'm willing to listen. I don't know of one, and I've been in this industry for about 25 years. I think it's the only place it's going to get done. It's not only because I'm at Cisco, it's because I've actually defended networks for this long.</Remark>
                                                  <Remark>And the network of the future is the one that's going to need a network with security built in. That's one of our goals. Proof's in the pudding. You end up telling us how we're doing. Thanks.</Remark>
                                                  </Transcript>
                                                  </MediaContent>
                                                  <Paragraph>Hacking attacks are a daily occurrence, and it seems no organisation is immune. Given how easy it is to steal and misuse information in today’s connected world, it is only natural to be concerned about this problem as people, process, data, and things all become connected in the IoE. In the video, <a href="https://www.youtube.com/watch?v=3D6jxBDy8k8">DARPA and Car Hacking</a>, Dr. Kathleen Fisher of the Defense Advanced Research Projects Agency (DARPA) describes how a hacker could control the operation of a motor vehicle remotely.</Paragraph>
                                                  <Section>
                                                  <Title>4.3.1 Security strategy</Title>
                                                  <Paragraph>The larger and more integrated the IoE solution, the more decentralised the network becomes. This allows for a greater number of access points into the network, which introduces a greater number of vulnerabilities. A significant number of the devices communicating across the IoE will be transmitting data from insecure locations, but those transmissions must be secure. However, securing an IoE solution can be difficult due to the large number of sensors, smart objects, and devices that are connected to the network. The potential harm caused by allowing unsecured devices to access an organisation’s network is a significant challenge for security professionals.</Paragraph>
                                                  <Paragraph>So how does an organisation or individual leverage the benefits of the IoE while managing risk? Take a look at Table 9.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 9 Security strategy</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Adaptable and real-time security</b></td>
                                                  <td class="TableCentered"><b>Secure and dynamic connections</b></td>
                                                  <td class="TableCentered"><b>Protecting customer and brand trust</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Prepare to handle security as you grow by deploying adaptable and real-time security. As business evolves, adjust security levels to minimize risk.</td>
                                                  <td class="TableLeft">Ensure that the right level of security is in place for all connections all the time. Advanced security measures and protocols help achieve regulatory and privacy compliance. All valuable assets including intellectual property, data, employees, and buildings are protected.</td>
                                                  <td class="TableLeft">Reduce the impact and cost of security breaches with a seamless security strategy. Security breaches erode customer confidence and brand integrity. The security strategy must detect, confirm, mitigate, and remediate threats across the entire organisation.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.2 Pervasive</Title>
                                                  <Paragraph>Currently, network security is largely driven by the effort to stay ahead of threats. Just as medical doctors attempt to prevent new illnesses while treating existing problems, network security professionals attempt to prevent future attacks while minimising the effects of successful attacks.</Paragraph>
                                                  <Paragraph>Within the IoE, security must be pervasive. The approach to security must be:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>consistent, automated, and extend to secured boundaries across organisations</ListItem>
                                                  <ListItem>dynamic, to better recognise security threats through real-time predictive analytics</ListItem>
                                                  <ListItem>intelligent, providing visibility across all connections, and elements of the infrastructure</ListItem>
                                                  <ListItem>scalable, to meet the needs of a growing organisation</ListItem>
                                                  <ListItem>agile, able to react in real-time</ListItem>
                                                  <ListItem>comprehensive, end-to-end solution.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>A pervasive security solution avoids disjointed security implementations that can increase complexity, be difficult to manage, and require increased staffing and technical knowledge to support.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.3 Security architecture</Title>
                                                  <Paragraph>Securing IoE networks cannot be about securing just the individual devices. Rather, it is about implementing an end-to-end security solution.</Paragraph>
                                                  <Paragraph>A security solution that provides protection with centralised policy management and distributed enforcement must be integrated throughout the network. Continuous monitoring of activity on the network is needed to aggregate and correlate data across the connected environment, leveraging insights, and taking action as needed.</Paragraph>
                                                  <Paragraph>Cisco’s security architectures use infrastructure, platform, and application layers to provide a comprehensive set of tools and systems. These tools and systems work together to produce actionable security intelligence, in near real-time, while allowing the network to adjust to security threats with little or no human intervention required (Table 10).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 10 Security architecture</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Access Control</b></td>
                                                  <td class="TableCentered"><b>Context-aware policies</b></td>
                                                  <td class="TableCentered"><b>Context-aware inspection and enforcement</b></td>
                                                  <td class="TableCentered"><b>Network and global intelligence</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Access control provides policy-based access for any user or device seeking access to the distributed network. Users are authenticated and authorised. End devices are also analyzed to determine if they meet the security policy. Non-authenticating devices, such as printers, video cameras, sensors, and controllers are also automatically identified and inventoried.</td>
                                                  <td class="TableLeft">Context-aware policies use a simplified descriptive business language to define security policies based on the full context of the situation: who is sending, what information, when, where and how. These security policies closely align with business policies and are simpler to administer across an organisation. They help businesses provide more effective security and meet compliance objectives with greater operational efficiency and control.</td>
                                                  <td class="TableLeft">Context-aware inspection and security enforcement use network and global intelligence to make enforcement decisions across the network. Flexible deployment options, such as integrated security services, standalone appliances, or cloud-based security services bring protections closer to the user.</td>
                                                  <td class="TableLeft">Network and global intelligence uses the correlation of global data to ensure that the network is aware of environments that have a reputation for malicious activity. It provides deep insights into network activity and threats for fast and accurate protection, and policy enforcement.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-3-4a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-4a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="8d685e82" x_imagesrc="4-3-4a.jpg" x_imagewidth="880" x_imageheight="548" x_smallsrc="4-3-4a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-4a.small.jpg" x_smallwidth="512" x_smallheight="325"/>
                                                  <Caption>Figure 11</Caption>
                                                  <Description>The figure is an interactive piece to obtain more information about security architecture. </Description>
                                                  </Figure>
                                                  <Paragraph>Figure 11 shows a Cisco security architecture. The security principles described in the table above are applied across the layers of the architecture. The architecture includes the infrastructure layer at the bottom, which provides a set of application programming interfaces (APIs). These APIs deliver certain functions and applications to the security services platform layer above. At the top of the platform sits a common security policy and management layer that manages the entire platform.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-3-4b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-4b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="2a12feb8" x_imagesrc="4-3-4b.jpg" x_imagewidth="880" x_imageheight="493" x_smallsrc="4-3-4b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-4b.small.jpg" x_smallwidth="512" x_smallheight="291"/>
                                                  <Caption>Figure 12</Caption>
                                                  <Description>The figure provides information about security architecture. Across the top are the headings Unmatched visibility, Consistent control, Advanced threat protection, Complexity reduction. Beneath each of these respectivley are phrases, 'Global intelligence with the right context', 'Consistent poloicies across the data network and data centre', 'Dtects and stops advanced threats'; 'Fits and adapts to changing business models'. Beneath this are three cogs forming the attach continuum with labels: 'BEFORE: Control, Enforce, Harden'; 'DURING: Detect, Block, defend'; AFTER: Scope, Contain, Remediate'. </Description>
                                                  </Figure>
                                                  <Paragraph>Implementing a Cisco security architecture provides the benefits shown in Figure 12, as well as continuous support before, during, and after a security event or attack.</Paragraph>
                                                  <Paragraph>Cisco is uniquely positioned in the IoE market. As a pioneer in the security industry, Cisco has end-to-end solutions within its product lines.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.4 Security devices</Title>
                                                  <Paragraph>Some of the devices in the security architecture that can be used to control access, inspect content, and enforce policies include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Firewalls</b> – A firewall creates a barrier between two networks. The firewall analyses network traffic to determine if that traffic should be allowed to travel between the two networks based upon a set of rules that have been programmed into it, as shown in the following animation. (Click on the full screen button for a clearer view.)</ListItem>
                                                  </BulletedList>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/screen_4_3_2_2.mp4" type="video" width="512" id="s4_3_4" x_manifest="screen_4_3_2_2_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="e8e4a884"/>
                                                  <BulletedList>
                                                  <ListItem><b>Intrusion prevention systems (IPS)</b> − The IPS monitors the activities on a network and determines if it is malicious. An IPS will attempt to prevent the attack by dropping traffic from the offending device or resetting a connection. Figure 22 shows more about how an IPS works.<Figure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/4-3-5b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-5b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="00e52d1d" x_imagesrc="4-3-5b.jpg" x_imagewidth="880" x_imageheight="633" x_smallsrc="4-3-5b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/4-3-5b.small.jpg" x_smallwidth="512" x_smallheight="350"/><Caption>Figure 22</Caption><Description>The figure shows how an IPS works. Data travels from a user to the IPS sensor which compares the traffic with known malicious signatures. The sensor drops any data that it dtermines is maicious. The management concols logs the events.</Description></Figure></ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.5 Application-centric security</Title>
                                                  <Paragraph>As organisations move to application-centric environments, the traditional security solutions are no longer adequate. Cisco’s ACI Security Solutions protect environments by fully integrating customised security technologies for the needs of a specific application. ACI Security Solutions can be managed as a pool of resources that are attached to applications and transactions using a central controller. This solution can automatically scale on demand providing seamless policy-based security.</Paragraph>
                                                  <Paragraph>This solution allows for a holistic, policy-based approach to security that reduces cost and complexity. It integrates physical and virtual security technologies directly into Cloud and datacenter infrastructures.</Paragraph>
                                                  <Paragraph>Watch the video overview of the Cisco ACI.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview.mp4" type="video" width="512" x_manifest="ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="0f70884e" x_subtitles="ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview.srt">
                                                  <Transcript>
                                                  <Speaker>NARRATOR</Speaker>
                                                  <Remark>In today's fast-paced global economy, business agility isn't an option, it's a necessity. With technology becoming a core part of most business strategies, business agility is closely tied to your data centre's and IT's ability to roll out new applications and services quickly and cost-effectively. However, today's traditional data centres lack the linkage between apps and the infrastructure to enable rapid application rollout.</Remark>
                                                  <Remark>IT has to rely on complex and manual configuration processes across multiple siloed teams to provision boxes before new applications can be deployed. Unfortunately, everyone is spending more time dealing with boxes instead of what's really important-- the applications. Emerging solutions, such as software-only overlays, attempt to simplify application deployments, but introduce additional complexities in terms of visibility, management, scale, and performance.</Remark>
                                                  <Remark>A new architectural and operation or model is needed-- a model that focuses on the applications, a model where application policy automates and unifies physical and virtual infrastructure, a model with real-time visibility and unprecedented performance and scale. That's exactly what the Cisco Application Centric Infrastructure delivers.</Remark>
                                                  <Remark>ACI transforms the data centre and how applications are deployed by shifting the focus to the application, dramatically reducing data centre complexity by unifying physical and virtual into one network, and radically accelerating the entire application deployment lifecycle. It does this by providing a common policy management and operational framework across siloed IT teams, enabling automatic infrastructure provisioning based on application policy profiles, providing secure multi-tenancy with centralised compliance and auditing, enabling anywhere workload placement and seamless mobility within and across data centres, taking a systems approach to provide a holistic view of application health, and providing open APIs to integrate with existing systems and enabling a vast partner ecosystem.</Remark>
                                                  <Remark>So how does it work? In the ACI model, the networked infrastructure becomes a flexible and programmable pool of stateless resources ready to be provisioned for new applications and policies. The Application Policy Infrastructure Controller, or APIC, is a key architectural component of the ACI model, that provides a single touch point for all configuration, management, and operational tasks.</Remark>
                                                  <Remark>It provides a common operational framework, unifying application, network, cloud, and security teams, all using a common tool set to define application policy requirements via an application network profile. The application network profile defines the logical representation of all the application infrastructure requirements, connectivity, and policies that define their interdependencies, such as tenant information, network services, and security policies.</Remark>
                                                  <Remark>This same model will extend to storage and compute in the future. When the application is ready to be deployed, the APIC uses the application network profile to automatically provision the required infrastructure resources and services, significantly simplifying and reducing infrastructure configuration and application deployment time from days to minutes. For fast and easy integration with your automation and orchestration tools, ACI offers a rich set of open northbound and southbound APIs, enabling a vast partner ecosystem and open source communities.</Remark>
                                                  <Remark>Also, ACI open source technologies extend the ACI framework to OpenStack and OpenDaylight. To ensure security, ACI separates policy from the network forwarding plane, providing complete network isolation. Open APIs support import and export from external security policy engines.</Remark>
                                                  <Remark>Through programmable policy framework, ACI supports service chaining automation and centralised compliance and auditing. With both enterprise and cloud providers in mind, the ACI model is designed to scale from small enterprise deployments to multi-data centres to large-scale, secure multi-tenant cloud providers with seamless workload mobility across data centres.</Remark>
                                                  <Remark>For monitoring and troubleshooting, the APIC collects extensive real-time telemetry information for both virtual and physical infrastructure. The APIC uses this real-time telemetry to monitor application health via an application health score, helping ensure SLAs. For instance, if a congested link impacts the application's health score, a pre-defined policy can automatically and seamlessly move the application to another rack or data centre, bypassing the congestion, and restoring optimal service, all while still enforcing defined policies.</Remark>
                                                  <Remark>Whether you're an enterprise or a service provider, ACI transforms your data centre or cloud deployment into an automated, highly agile, and scalable application-centric infrastructure. It provides a transformational operational model to radically accelerate application deployment, redefining the power of IT to be more responsive to changing business needs.</Remark>
                                                  <Remark>For more information on ACI and our vast partner ecosystem, please visit us on the web.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview.jpg" x_folderhash="55f4befe" x_contenthash="70d3b18c" x_imagesrc="ioe_1_video_4_3_2_3_cisco_application_centric_infrastructure_aci_overview.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.6 Wireless security</Title>
                                                  <Paragraph>The difficulties in keeping a wired network secure are amplified with a wireless network. A wireless network is open to anyone within range of an access point and the appropriate credentials to associate to it.</Paragraph>
                                                  <Paragraph>Wireless security is often implemented at the access point, or the point where the wireless connection enters into the network. Basic wireless security includes:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>setting strong authentication protocols with strong passwords</ListItem>
                                                  <ListItem>configuring administrative security</ListItem>
                                                  <ListItem>enabling encryption</ListItem>
                                                  <ListItem>changing all default settings</ListItem>
                                                  <ListItem>keeping firmware up-to-date.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>However, even with these configuration settings, with a wireless-capable device and knowledge of hacking techniques, an attacker can gain access to an organisation’s or an individual’s network. Additionally, many new wireless-enabled devices that connect to the IoE do not support wireless security functionality.</Paragraph>
                                                  <Paragraph>For this reason, traffic from smart wireless and mobile devices, and traffic from sensors and embedded objects, must pass through the security devices and context-aware applications of the network.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.7 Redundancy and high availability</Title>
                                                  <Paragraph>With so many connections to the network, it is important to ensure that the network is available and reliable.</Paragraph>
                                                  <Paragraph>Redundancy requires installing additional network infrastructure components, telecommunication links, and power components to back up primary resources in case they fail. Redundancy also enables load sharing of resources, providing a high-availability system design that ensures that a prearranged level of operational performance will be met during a contractual measurement period.</Paragraph>
                                                  <Paragraph>In addition to having redundant equipment and connections, data must also be backed up. Secure backups archive the data in an encrypted format, preventing unauthorised access to the stored archive.</Paragraph>
                                                  <Paragraph>Examples of network redundancy include:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>redundant servers</ListItem>
                                                  <ListItem>redundant fibre connections</ListItem>
                                                  <ListItem>redundant power supplies.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.8 Security policy</Title>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">Some people have malicious intent, while others make mistakes or follow unsecure practices, putting equipment and data at risk. To protect assets, rules and regulations must be put in place to define how users should act, what actions are right or wrong, what they are allowed to do, and how they access systems and data.</font></Paragraph>
                                                  <Paragraph>A security policy defines all of the rules, regulations, and procedures that must be followed to keep an organisation, its people, and systems secure. A security policy can be divided into many different areas to address specific types of risk (Table 11).</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 11 Types of security policies for people</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Remote access policy</b></td>
                                                  <td class="TableCentered"><b>Information privacy policy</b></td>
                                                  <td class="TableCentered"><b>Computer security policy</b></td>
                                                  <td class="TableCentered"><b>Physical security policy</b></td>
                                                  <td class="TableCentered"><b>Password policy</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Defines who can connect, how they can connect, when they can connect, and what devices can be used to connect to a system remotely. This policy also defines the assets that are accessible to a remote user.</td>
                                                  <td class="TableLeft">Defines what methods are used to protect information depending on the level of sensitivity. Generally, the more sensitive the information, the greater the level of protection used to secure it.</td>
                                                  <td class="TableLeft">Defines the way in which users are allowed to use computers. This policy might define who can use certain computers, what programs must be used to protect a computer, or if a certain storage media is allowed to be used.</td>
                                                  <td class="TableLeft">Defines how physical assets are secured. Some assets may need to be locked away at night, kept in a locked area at all times, or specifically designated not to leave the property.</td>
                                                  <td class="TableLeft">Defines what password will be used to access specific resources and the complexity of the password. Often, this policy will control how often a password must be changed.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>The most important part of a security policy is user education. The people governed by the security policy must not just be aware of this policy; they must understand and follow it to ensure the safety of people, data, and things.</Paragraph>
                                                  <Paragraph>To learn more about security polices, visit the  <a href="http://www.sans.org/security-resources/policies">SANS website</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>4.3.9 Personal data and the IoE</Title>
                                                  <Table class="type 2">
                                                  <TableHead>Table 12 Categories of personal data</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>Volunteered data</b></td>
                                                  <td class="TableCentered"><b>Inferred data</b></td>
                                                  <td class="TableCentered"><b>Oserved data</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">Volunteered data is created and explicitly shared by individuals, such as social network profiles.</td>
                                                  <td class="TableLeft">Inferred data, such as a credit score, is based on analysis of volunteered or observed data.</td>
                                                  <td class="TableLeft">Observed data is captured by recording the actions of individuals, such as location data when using cell phones. </td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>Organisations can collect all sorts of personal data; however, there is a legal and ethical struggle between access and privacy. Blocks of data are enhanced with metadata that includes information about where the data was created, who created it, and where it is going. In this way, data becomes property that can be exchanged. This change will allow personal information to be audited to enforce policies and laws when issues arise.</Paragraph>
                                                  <Paragraph>The definition of personal data, however, is evolving. What might be personal data to one person may not seem like personal data to another person. For example, a cancer patient and a healthy patient may have very different ideas on what medical information they want kept private.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>4.4 Terms and concepts practice</Title>
                                                  <Paragraph>This activity will help you to test some of the terms and concepts you've been introduced to.</Paragraph>
                                                  <Activity>
                                                  <Question>
                                                  <Paragraph/>
                                                  </Question>
                                                  <Interaction>
                                                  <Matching>
                                                  <Option>
                                                  <Paragraph>operational technology </Paragraph>
                                                  </Option>
                                                  <Match x_letter="c">
                                                  <Paragraph>an organisation's industrial control and automation infrastructure</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>information technology</Paragraph>
                                                  </Option>
                                                  <Match x_letter="b">
                                                  <Paragraph>the network infrastructure, telecommunications, and software applications that process information and allow the exchange of information between people</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>telemetry</Paragraph>
                                                  </Option>
                                                  <Match x_letter="f">
                                                  <Paragraph>transmission of performance measurements gathered from monitoring instruments in remote locations</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>bandwidth</Paragraph>
                                                  </Option>
                                                  <Match x_letter="i">
                                                  <Paragraph>the number of bits of data that can be transmitted across a communication link within a given unit of time</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>fog computing</Paragraph>
                                                  </Option>
                                                  <Match x_letter="e">
                                                  <Paragraph>extends cloud computing and services to the edge of the network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>firewall</Paragraph>
                                                  </Option>
                                                  <Match x_letter="a">
                                                  <Paragraph>analyses network traffic to determine if it should be allowed to travel between two networks based upon a set of rules</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>redundancy</Paragraph>
                                                  </Option>
                                                  <Match x_letter="h">
                                                  <Paragraph>a technique of installing network components, such as servers, switches, routers, and telecommunication links to back up primary resources in case they fail</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>security policy</Paragraph>
                                                  </Option>
                                                  <Match x_letter="g">
                                                  <Paragraph>defines all of the rules, regulations, and procedures that must be followed to keep an organisation, people, and systems secure</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>interoperability </Paragraph>
                                                  </Option>
                                                  <Match x_letter="d">
                                                  <Paragraph>devices can communicate with one another by using the same protocol or a translator device</Paragraph>
                                                  </Match>
                                                  </Matching>
                                                  </Interaction>
                                                  </Activity>
                                                  </Session>
                                                  <Session>
                                                  <Title>4.5 Session 4 quiz</Title>
                                                  <Paragraph>Check what you have learned in Session 4.</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48855">Session 4 quiz</a></Paragraph>
                                                  <Paragraph>Use 'ctrl' (cmd on a Mac) or right-click to open the quiz in a new window or tab then come back here when you're finished.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>4.6 Summary</Title>
                                                  <Paragraph>The IoE requires a convergence between an organisation’s OT and the IT systems those organisations have in place.</Paragraph>
                                                  <Paragraph>M2M refers to any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans. In M2P connections, technical systems interact with individuals and organisations to provide or receive information. P2P connections are collaborative solutions that leverage the existing network infrastructure, devices, and applications, to allow seamless communication and collaboration between people. Each of these types of connections is transactional.</Paragraph>
                                                  <Paragraph>One of the first steps in implementing an IoE solution is to understand current processes and procedures. In addition to understanding business processes, consider the existing IT network infrastructure, network operations, and network management tools.</Paragraph>
                                                  <Paragraph>Security must be able to react in real-time, so it must be high-performance and scalable. Cisco’s security architecture provides a comprehensive set of tools and systems that work together to produce actionable security intelligence, in near real-time, while allowing the network to adjust to security threats with little or no human intervention required.</Paragraph>
                                                  <Paragraph>A security policy defines all of the rules, regulations, and procedures that must be followed to keep an organisation, people, and systems secure.</Paragraph>
                                                  <Paragraph>The definition of personal data is evolving.</Paragraph>
                                                  </Session>
                            </Unit>
                            <Unit>
                                                  <UnitID/>
                                                  <UnitTitle>Session 5: Bringing it all together</UnitTitle>
                                                  <Session>
                                                  <Title>5.1 Modelling an IoE solution</Title>
                                                  <Paragraph>One of the fastest developing areas in the application of the IoE  is in healthcare. While there are many other solutions. This case study gives an excellent insight into how one common need for all of humanity can be improved by the use of pervasive technologies on the IoE.</Paragraph>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">The IoE is already improving the healthcare industry. The video demonstrates how the IoE is being used in every aspect of healthcare.</font></Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care.mp4" type="video" width="512" x_manifest="ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="f4a1436d" x_subtitles="ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care.srt">
                                                  <Transcript>
                                                  <Speaker>MAN</Speaker>
                                                  <Remark> When we think about connectivity, we think about the easy stuff, right? Phones, tablets, computers. Well, today we're going to explore how these connections create a vast, new world of previously unconnected experiences.</Remark>
                                                  <Remark>After all, there are more people connected than ever before. Technology is powering more business processes than ever. Last year alone we created more data than the past 5,000 years combined.</Remark>
                                                  <Remark>Well, the number of connected devices is growing rapidly every year, and it's called "the internet of everything." It's dramatically changing the way we live, work, play, and learn. Come on. Let's go take a look.</Remark>
                                                  <Remark>Welcome to the doctor's office, where we've taken a routine visit and combined it with the internet of everything to see how our world is changing. We're going to use this visit to the doctor not just to illustrate the internet of everything but also to showcase how Cisco is changing the way businesses manage security threats on the back end to make sure a patient electronic medical records and the medical groups' vast amounts of data remain secure.</Remark>
                                                  <Remark>Now our first stop is in the nurse's station. Now imagine that an ozone alert has just caused a respiratory issue with a boy. Let's call him Aidan. He's living here in the general area, and his parents immediately log into this connected health portal and communicate with the nurse to find out whether or not a visit is required to keep the boy healthy and out of trouble.</Remark>
                                                  <Remark>The nurse is also logged into this DX650. Using the Android-based platform of applications, personalised to our nurse, the login on any of the phones will bring up her desktop profile. From their profile, she then has access to vital information regarding Aidan in the electronic medical record.</Remark>
                                                  <Remark>Well, it turns out an office visit is going to be necessary. So, knowing Aidan is coming in, the staff decides to locate a heart-monitor machine. The hospital has placed an RFID tag on this device so they can find it instantly. No small feat, in a large facility.</Remark>
                                                  <Remark>But that's really just the beginning. That RFID tag can also determine utilisation and let the staff know when to schedule preventative maintenance prior to the heart monitor breaking. They could also determine when the monitor needs to be inspected for regulatory compliance or for required software upgrades. Now this is actually machine-to-machine communication created with applications and a Wi-Fi network that's location- and contextually aware.</Remark>
                                                  <Remark>Now we're at the doctor's desk, taking a look at the boy, Aidan, who's suffering from an asthma attack. Now we have Aidan's health-care record on the doctor's laptop, shown here on the DX80. Then we also have the same record on the iPad that the nurse can see. The patient can see this, as well, and also the billing department.</Remark>
                                                  <Remark>Now we use the Cisco Identity Services Engine to reconcile the patient's qualifications and content requirements. Billing will see the list of procedures, for insurance purposes. Aidan's parents will see symptoms and recommended treatments.</Remark>
                                                  <Remark>Now each of these encrypted requests travels back to the data centre, accesses a portion of the record, and brings it back to the device. At last, the doctor is able to get to the root of the problem. It turns out that when ships come to port and they unload their cargoes of soybeans, people downwind with soybean allergies can experience problems.</Remark>
                                                  <Remark>Through the internet of everything, data was pooled, which included air-quality sensors deployed by the city of San Francisco, the port of San Francisco's shipping manifests, National Oceanic Atmospheric Administration Data, and information from San Francisco-based allergists. Based on this realisation, our doctor uses the DX80 TelePresence for a desktop 10-ADP video to consult with the nurse regarding Aidan. The doctor could also consult with a colleague outside the practise about altering Aidan's treatment regimen.</Remark>
                                                  <Remark>Now these are just a few of the many new capabilities made possible through the internet of everything. We thank you for watching. And for more information on how the internet of everything is changing the way people, processes, data, and things connect to make amazing things possible, please visit internetofeverything.com.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care.jpg" x_folderhash="55f4befe" x_contenthash="4f2acb83" x_imagesrc="ioe_1_video_5_1_1_1_transforming_how_doctors_provide_care.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Section>
                                                  <Title>5.1.1 A diabetic patient healthcare solution model</Title>
                                                  <Paragraph>To demonstrate how the IoE is improving patient care, we will focus on a patient with type 1 diabetes. Type 1 diabetes is a disease where a person’s body does not produce insulin, a hormone needed by the body’s cells so that the cells can absorb glucose. The glucose is used by the cells for energy. Without enough insulin, glucose builds up in the blood, and cells starve for glucose. This is known as hyperglycemia. With too much insulin, the body burns too much glucose. This is called hypoglycemia. Very high or very low glucose levels can lead to a diabetic coma, where a patient becomes unconscious, and can die if left untreated. People with type 1 diabetes must diligently monitor the levels of glucose in their bodies. They may need to administer proper amounts of insulin to maintain a healthy level of glucose in their blood.</Paragraph>
                                                  <Paragraph>To illustrate a healthcare solution model we will examine John Doe. John Doe is 55 years old. He was diagnosed with diabetes 5 years ago, and has difficulty maintaining healthy glucose levels. He has a record of hospitalisation and diabetic coma. John has recently begun using a health monitoring company (HMC) to help him avoid diabetic comas and emergency visits to the hospital. He wears a continuous glucose monitoring (CGM) device and a fitness tracker to monitor his exercise level and respiration. These devices provide the data for the health monitoring company to determine when his state of health moves outside his normal range.</Paragraph>
                                                  <Paragraph>When John’s health data is showing dangerous patterns like those that he has exhibited in the past, the health monitoring company sends John an alert on his smartwatch, smartphone, tablet, and television. The alert tells John to call the health monitoring company so that they can assess his condition. If John still does not change his behavior, and he continues this trend, the health monitoring company will dispatch a mobile patient treatment center (MPTC) to administer urgent care.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.2 M2M interactions</Title>
                                                  <Paragraph>The diabetic healthcare solution model is an IoE solution that can serve as a prototype for other health monitoring companies. When developing an IoE solution, it is important to design a model before creating a prototype.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-3a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-3a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="9655d4fc" x_imagesrc="5-1-3a.jpg" x_imagewidth="880" x_imageheight="588" x_smallsrc="5-1-3a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-3a.small.jpg" x_smallwidth="512" x_smallheight="343"/>
                                                  <Caption>Figure 1</Caption>
                                                  <Description>Figure 1 shows an initial model of traffic signal control for the health monitoring company’s mobile patient treatment center as it approaches an intersection. At the centre is the traffic signal controller. Cellular signals are transmitted between here and the internet and cloud services. WiFi signals travel between the traffic signal controller and emergency signal sensors and traffic signals. Local processing is carries out in the fog. </Description>
                                                  </Figure>
                                                  <Paragraph>Modeling an IoE solution begins by understanding the potential M2M, M2P, and P2P interactions. Figure 1 shows an initial model of traffic signal control for the health monitoring company’s mobile patient treatment center. When sensors indicate that a mobile patient treatment center is approaching an intersection, and the signal is red, the signal is changed to green to allow the mobile patient treatment center to reach John faster. This decision does not need to be made by a person, nor does the required information (to make the decision) need to be sent to the cloud. Data concerning traffic patterns, congestion, and emergency signal interruptions are sent to the cloud for storage and analysis periodically.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-3b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-3b.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="be9e76a4" x_imagesrc="5-1-3b.jpg" x_imagewidth="512" x_imageheight="359"/>
                                                  <Caption>Figure 2</Caption>
                                                  <Description>Figure 2 shows an electronic door lock that can be opened remotely.</Description>
                                                  </Figure>
                                                  <Paragraph>Another example of M2M interactions that may take place in this healthcare solution model is the interaction between the health monitoring company system and the electronic lock that is on John’s front door. For medical personnel to enter his home when they arrive, the health monitoring company system sends a one-time-use code to the lock, shown in Figure 2.</Paragraph>
                                                  <Paragraph>If you'd like to to learn more about connected transportation visist the Cisco <a href="http://newsroom.cisco.com/connected-transportation-march2015">FOCUS website</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.3 M2P interactions</Title>
                                                  <Paragraph>In the healthcare solution model, a simple M2P interaction involves the equipment used to monitor John. When John’s glucose is too low or too high, and he begins to show symptoms, his health can be compromised very quickly. Without treatment, he will quickly become unable to treat himself, and will need medical attention immediately. The health monitoring company system sends an alert to John’s devices which he must acknowledge. If John fails to contact the health monitoring company, medical personnel will be dispatched to his location. This M2P interaction helps to prevent John from entering a diabetic coma.</Paragraph>
                                                  <Paragraph>These are some additional examples of where M2P interactions in the healthcare solution model help to improve healthcare for patients:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>The health monitoring company system sends a one-time-use code to a tablet carried by personnel on the mobile patient treatment center so that they can enter John’s house easily when they arrive.</ListItem>
                                                  <ListItem>The health monitoring company collects all of John’s glucose monitor data so that he can see his levels, allowing him to administer the proper amount of insulin.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.4 P2P interactions</Title>
                                                  <Paragraph>These are some of the P2P interactions that take place in the healthcare solution model:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Patient to </b><b>health monitoring company</b> <b>personnel</b> – When alerted, John must call and speak with a healthcare worker at the health monitoring company. Without this important P2P step, emergency personnel will be dispatched to treat John immediately.</ListItem>
                                                  <ListItem><b>Patient to </b><b>mobile patient treatment center</b> <b>personnel </b>– When emergency personnel arrive, they will administer medical attention to restore John’s glucose levels to normal. This critical P2P interaction could save John’s life.</ListItem>
                                                  <ListItem><b>Doctor to patient </b>– John must consult with his doctor on a regular basis to ensure that he is following directions to maintain a healthy lifestyle. His doctor may decide to adjust John’s treatment strategy based on this P2P interaction.</ListItem>
                                                  </BulletedList>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.5 Analytical tools</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-6.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-6.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="09cf929a" x_imagesrc="5-1-6.jpg" x_imagewidth="880" x_imageheight="715" x_smallsrc="5-1-6.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-6.small.jpg" x_smallwidth="512" x_smallheight="422"/>
                                                  <Caption>Figure 3</Caption>
                                                  <Description>The figure shows various sensor health data (glucose level, exercise level, respiration) that are being gathered that have arrows pointing to the Patient Monitor that runs analytics on that data.</Description>
                                                  </Figure>
                                                  <Paragraph>There are enormous amounts of data created in the IoE. To apply this data to processes, people use analytical software. Analytical software ranges from simple spreadsheet tools to determine statistics for a given range of data, to sophisticated business software suites. The software may be created and sold by a large organisation, developed independently and provided through open source means, or designed by the business that uses it for a specific purpose.</Paragraph>
                                                  <Paragraph>The majority of analytics were used as a method of forecasting supply, based on the number of units sold in a given amount of time. Analytics in the IoE has advanced to address many new aspects of business. Some of the following types of analytics are used to help shape how a business functions:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>Descriptive</b> – uses historical data to create reports designed to facilitate understanding.</ListItem>
                                                  <ListItem><b>Predictive</b> - uses data mining and modeling techniques to determine what could happen next.</ListItem>
                                                  <ListItem><b>Prescriptive</b> – uses simulation, business rules, and machine learning to recommend a course of action and what the outcome of that action might be.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>In the healthcare solution model, the health monitoring company uses analytics of all kinds to improve the quality of healthcare.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.6 Analytics in healthcare</Title>
                                                  <Paragraph>In the healthcare solution model, IoE technology improves healthcare by analysing trends in a patient’s vital signs and other indicators such as blood glucose levels. This data can be monitored in real-time to alert the patient and the health monitoring company so that they can make decisions quickly and correctly. As a patient goes about daily life, data is constantly gathered by sensors worn by the patient. This data is sent back to the health monitoring company for storage and analysis. Over time, this data is analysed to find trends which are used to determine if the patient may require immediate assistance.</Paragraph>
                                                  <Paragraph>IoE technology in this healthcare solution model is not used just for monitoring a patient’s health. It is also used in many other areas to improve healthcare. For example, data from live traffic cameras and historical traffic data can be used to route the mobile patient treatment center more effectively to arrive at a patient’s location faster. New uses for IoE technology in the healthcare industry are being discovered every day to help patients live longer, healthier lives.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.7 Packet tracer: diabetic patient healthcare IoE solution</Title>
                                                  <Paragraph>This packet tracer activity simulates an IoE Healthcare solution for a fictitious person, John Doe.</Paragraph>
                                                  <Paragraph>Watch a demonstration of the Packet Tracer activity.</Paragraph>
                                                  <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro.mp4" type="video" width="512" x_manifest="ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro_1_server_manifest.xml" x_filefolderhash="55f4befe" x_folderhash="55f4befe" x_contenthash="d1c68f15" x_subtitles="ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro.srt">
                                                  <Transcript>
                                                  <Speaker>INSTRUCTOR</Speaker>
                                                  <Remark>This packet tracer activity is designed to illustrate the internet of everything and how the online interconnections between things, people, data, and processes improves our lives on a daily basis.</Remark>
                                                  <Remark>In this scenario, we have John who has a medical condition. He's diabetic, and he's having trouble keeping his blood glucose levels at a normal level. As a result, his health care monitoring company is implementing an IoE solution to continually monitor his health and blood glucose levels. In the event that his levels fall out of a normal range, the health care monitoring company can dispatch emergency medical aid at a moment's notice.</Remark>
                                                  <Remark>Let's see how all of this works. First off, we have John's home where he has implemented, one, a connection to the internet, as well as smart monitoring devices in his home that continually monitor his health condition.</Remark>
                                                  <Remark>We also have his health care monitoring company that is also connected to the internet and utilises cloud data storage services to have access to continual data from clients like John. This data also allows them to see historical patterns and trends.</Remark>
                                                  <Remark>Then we have the mobile patient treatment centre that also has a wireless or cellular connection to the internet and is also able to call upon or download John's vital statistics as well as keep in constant contact with the health care monitoring company.</Remark>
                                                  <Remark>Let's start by going into John's home and going into his home gateway router and configuring it. I'll go to the graphical user interface and change the IP address of the local interface to 192.168.0.1. I'll change the subnet mask to 255.255.255.0.</Remark>
                                                  <Remark>Scroll down, turn on the DHCP server by clicking Enabled. And then scroll all the way down to the bottom of the window and press Save Settings. His wireless router is now configured and working. I'll close the home gateway router.</Remark>
                                                  <Remark>Let's take a look at some of John's smart connected devices. First, we'll look at his smartwatch. His smartwatch is keeping track of his respiration rate and his exercise level.</Remark>
                                                  <Remark>He also has an implanted glucose metre. If we open that up, you can see that it's keeping track of his blood glucose level. Both of these devices are sending information wirelessly to his home router and then on to his health care monitoring company, which then stores the data in their cloud-based data centre.</Remark>
                                                  <Remark>If we close this device and open up John's tablet, smart TV, or his smartphone, he can monitor his health care settings. I'll click on John's smart TV. And you can see Cisco Health Care Mobile Monitoring Web Application.</Remark>
                                                  <Remark>There's his name. And you can see that his current status is normal. His glucose level being monitored, respiratory rate, exercise level. And it says at the bottom, all settings are within his normal range.</Remark>
                                                  <Remark>If I open up his smartphone, he can similarly view the Mobile Monitoring Web Application. I'll move this to the side and take a look at the Environment window. With this Environment window, I can control John's condition. I can induce hypoglycemia, hyperglycemia, or restore his blood sugar levels back to normal.</Remark>
                                                  <Remark>Let's pretend that John has had a large meal and has forgotten to take his insulin. I'll click Induce Hyperglycemia, and we'll see that instantly on his monitoring application, there is a warning. I'll open up his smartwatch, and you can similarly see a warning happening on his smartwatch.</Remark>
                                                  <Remark>Glucose level is very high. Contact your health care provider immediately. Failure to respond will dispatch the mobile patient treatment centre. Notice his glucose levels rising. I'll minimise these windows and go back and look at the mobile patient treatment centre.</Remark>
                                                  <Remark>If we look at the tablet in the mobile patient treatment centre, notice that the technician has access to a web application. And in his application, he can reset the patient statistics once he verifies the patient's status. And he can also see the five-hour averages regarding glucose level, respiration rate, and exercise.</Remark>
                                                  <Remark>Currently, this mobile patient treatment centre will be dispatched in 13 minutes. The patient's status is in a warning state. The warning is still being sent to John's smartwatch as well as John's smartphone.</Remark>
                                                  <Remark>You'll also notice at the bottom that the technician is being informed that the health care monitoring company is attempting to contact the patient. I've clicked the Speed Up Time button in the Environment window. And you can see that now help will be sent in 3 minutes.</Remark>
                                                  <Remark>Critical-- the patient's status has gone to critical. Traffic lights controllers are on. The ETA to the destination, and the mobile patient treatment centre has now been dispatched. If we look at John's smartphone, you can see that John is informed that the MPTC is on its way, and the ETA time that it'll take to get there.</Remark>
                                                  <Remark>John is informed that the mobile patient treatment centre has arrived. The door is unlocked. If we go to the mobile patient treatment centre device, you can see that the mobile patient treatment centre technician is informed also that the door to the home has been unlocked, and that the patient is in a critical status.</Remark>
                                                  <Remark>Once the technician is able to reach John and provide necessary care, he'll be the one who can then eventually reset his status to a normal level once that's indicated. So back in the Environment window, I can now restore John's levels to normal. And the patient status has been reset and the crisis has been averted.</Remark>
                                                  <Remark>You can see how the internet of everything proves extremely useful in a situation like this where communication and real-time information is critical.</Remark>
                                                  </Transcript>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro.jpg" x_folderhash="55f4befe" x_contenthash="fbf36643" x_imagesrc="ioe_1_video_5_1_8_diabetic_patient_healthcare_ioe_solution_with_intro.jpg" x_imagewidth="512" x_imageheight="288"/>
                                                  </Figure>
                                                  </MediaContent>
                                                  <Paragraph>The video demonstration is the primary source for how to navigate the activity. However, after viewing the video, you can click the following files to investigate the activity on your own.</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49462">Packet Tracer – Diabetic Patient Healthcare IoE Solution.pdf</a></ListItem>
                                                  <ListItem><a href="https://www.open.edu/openlearn/ocw/mod/resource/view.php?id=49463">Packet Tracer – Diabetic Patient Healthcare IoE Solution.pkz</a></ListItem>
                                                  </BulletedList>
                                                  <Paragraph><b>Essential note</b>: If you are new to Packet Tracer, you can watch a <a href="http://youtu.be/any2NbeSZV4">tutorial</a>. You must install Packet Tracer before you can open .pkz files. To  install Packet Tracer, return to the <a href="https://www.open.edu/openlearn/science-maths-technology/internet-everything/content-section-overview">course progress page</a> where a copy is available to download and install .</Paragraph>
                                                  <Paragraph>Packet Tracer is available for both Microsoft Windows and Linux systems. The Open University Cisco Academy team support a moderated Facebook Community helping Mac users port this application onto all versions of the Apple Mac OSX. For more information, you will need to join the <a href="https://www.facebook.com/groups/packettracermac/">community</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.8 Value in good modelling</Title>
                                                  <Paragraph>As you learned in the packet tracer activity, modelling is a valuable step in the implementation of an IoE solution. By modelling the potential solution, the changes in the organisation’s processes are visualised. The model can be shared among all stakeholders to ensure an understanding of how the new solutions work and interact.</Paragraph>
                                                  <Paragraph>A model can be a representation of a system. Models help individuals and organisations better understand the processes that are implemented and help identify problem areas. Models help to run 'what if' scenarios that reveal the benefits and impediments to implementing a new solution. When an organisation begins process re-engineering, it is beneficial to use modeling prior to executing any plans.</Paragraph>
                                                  <Paragraph>While modeling may not be easy, the benefits of good modeling outweigh the costs of poor or rushed modeling for most organisations.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-9.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-9.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="11e19161" x_imagesrc="5-1-9.jpg" x_imagewidth="880" x_imageheight="538" x_smallsrc="5-1-9.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-9.small.jpg" x_smallwidth="512" x_smallheight="363"/>
                                                  <Caption>Figure 4</Caption>
                                                  <Description>The figure is a graphic organiser that lists the benefits of modelling. There are seven steps: stakeholder acceptance, visualisation of system component interactions, improved communication with developers and pther stakeholders, clarification of roles and responsibilities, well-defined technology requirements, stronger end-to-end documentation, higher quality final product.</Description>
                                                  </Figure>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.9 Flowcharts</Title>
                                                  <Paragraph>Organisations can begin to identify the processes that may require re-engineering by using a flowchart. Flowcharts are graphical representations of the workflows that businesses use to analyse and document existing systems, as well as design and manage process re-engineering efforts. A flowchart uses symbols to represent workflows and decisions.</Paragraph>
                                                  <Table class="type 2" id="t1">
                                                  <TableHead>Table 1 Flowchart key</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td>Symbol</td>
                                                  <td>Name</td>
                                                  <td>Description</td>
                                                  </tr>
                                                  <tr>
                                                  <td> <InlineFigure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-1a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-1a.jpg" x_folderhash="55f4befe" x_contenthash="dabda3db" x_imagesrc="5-1-1a.jpg" x_imagewidth="100" x_imageheight="52"/></InlineFigure></td>
                                                  <td>Data</td>
                                                  <td>This symbol represents data. It is not intended to be specific as to the type of medium for the data</td>
                                                  </tr>
                                                  <tr>
                                                  <td> <InlineFigure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-1b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-1b.jpg" x_folderhash="55f4befe" x_contenthash="9d929668" x_imagesrc="5-1-1b.jpg" x_imagewidth="102" x_imageheight="48"/></InlineFigure></td>
                                                  <td>Stored data</td>
                                                  <td>This symbol represents stored data, which is intended as data that is ready for processing. It is not intended to be specific as to the type medium for the stored data</td>
                                                  </tr>
                                                  <tr>
                                                  <td> <InlineFigure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-1c.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-1c.jpg" x_folderhash="55f4befe" x_contenthash="9eedae68" x_imagesrc="5-1-1c.jpg" x_imagewidth="90" x_imageheight="50"/></InlineFigure></td>
                                                  <td>Process</td>
                                                  <td>This symbol represents a processing function. For example, it may indicate a single, defined operation that changes the value of information. Alternatively, it may indicate a group of operations that change the value or form of information. It may also represent the determination of one of several directions to be followed in a flow</td>
                                                  </tr>
                                                  <tr>
                                                  <td> <InlineFigure><Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-1d.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-1d.jpg" x_folderhash="55f4befe" x_contenthash="4b347485" x_imagesrc="5-1-1d.jpg" x_imagewidth="91" x_imageheight="14"/></InlineFigure></td>
                                                  <td>Line</td>
                                                  <td>This symbol represents the flow of data or control. It may include solid or open arrowheads to indicate direction of flow where necessary or to enhance the readability.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>The basic symbols for a flowchart, as described by the International Organisation for Standardisation (ISO) are shown in Table 1. The ISO also describes a number of specific symbols for data and process that are not referenced in the figure.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.10 Healthcare model flowchart</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-11.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-11.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="14f0179e" x_imagesrc="5-1-11.jpg" x_imagewidth="880" x_imageheight="486" x_smallsrc="5-1-11.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-11.small.jpg" x_smallwidth="512" x_smallheight="286"/>
                                                  <Caption>Figure 5</Caption>
                                                  <Description>The figure shows a flowchart of basic processes in our model of a healthcare solution. Glucose, respiration and exercise level data go to monitor patient (John Doe) process. This either goes to insulin process, which goes back to data; historical data (stored data) and then analysis (future planning); or a feedback loop with dispatch MPTC process.</Description>
                                                  </Figure>
                                                  <Paragraph><font val="CiscoSansTTLight,Helvetica,Arial,sans-serif">The figure shows a flowchart of basic processes in our model of a healthcare solution. (It uses same the same key as in <CrossRef idref="t1">Table 1</CrossRef>). Wearable sensors on a patient provide monitoring to inform patients and other healthcare workers while creating an historical record to identify trends in a patient’s health. Based on these trends, a patient may be notified of an unhealthy condition, or medical personnel may be dispatched. This is an example of a feedback loop. Additionally, analysis of historical data can help to identify opportunities and improvements in the overall operation of the healthcare system. This can lead to future processes that help patients in ways we cannot identify now.</font></Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.11 Physical topology</Title>
                                                  <Paragraph>A network topology is a kind of map that identifies various elements of a computer network. A network is represented by two topology types: physical and logical.</Paragraph>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-12a.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-12a.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="66a1968f" x_imagesrc="5-1-12a.jpg" x_imagewidth="880" x_imageheight="765" x_smallsrc="5-1-12a.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-12a.small.jpg" x_smallwidth="512" x_smallheight="439"/>
                                                  <Caption>Figure 6 Physical topology</Caption>
                                                  <Description>Figure 6 is a physical topology that describes how devices are actually interconnected with wires and cables.</Description>
                                                  </Figure>
                                                  <Paragraph>The physical topology displays the layout and location of all of the devices that comprise the network. The physical topology describes how devices are actually interconnected with wires and cables, as shown in Figure 6.</Paragraph>
                                                  <Paragraph>This physical topology will change when mobile devices are incorporated into the network. Mobile devices require connectivity, regardless of their location, for access, monitoring, and control. Some sensors may be located beyond the range of traditional wireless solutions and it may be too expensive to connect them with data cabling. Cellular connections may be required to provide the necessary data links to controllers, central data storage or processing equipment.</Paragraph>
                                                  <Paragraph>The mobile devices must be represented in the physical topology. For wireless connectivity, an inspection, called a site survey, should be done to determine a basic, physical topology.</Paragraph>
                                                  <Paragraph>These are some considerations when determining a physical topology:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>the location of user computers</ListItem>
                                                  <ListItem>the position of network equipment, such as switches, routers, and wireless access points</ListItem>
                                                  <ListItem>the position of controllers and servers</ListItem>
                                                  <ListItem>the position of sensors and actuators</ListItem>
                                                  <ListItem>the potential for future network growth.</ListItem>
                                                  </BulletedList>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-12b.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-12b.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="1da340c2" x_imagesrc="5-1-12b.jpg" x_imagewidth="880" x_imageheight="474" x_smallsrc="5-1-12b.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-12b.small.jpg" x_smallwidth="512" x_smallheight="274"/>
                                                  <Caption>Figure 7 Wireless site survey</Caption>
                                                  <Description>Figure 7 is a wireless site survey that shows where the wireless access points can be located and the strength of the wireless signals.</Description>
                                                  </Figure>
                                                  <Paragraph>Wireless access points must be strategically placed throughout the hospital to relay data. A wireless survey shows where the wireless access points can be located and the strength of the wireless signals, as shown in Figure 8. Wireless access points may be moved to distribute coverage, or additional access points may be installed where needed. The physical topology must be updated to reflect any devices that have been relocated or added.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.1.12 Logical topology</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-1-13.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-13.jpg" webthumbnail="true" width="100%" x_folderhash="55f4befe" x_contenthash="cca71787" x_imagesrc="5-1-13.jpg" x_imagewidth="880" x_imageheight="545" x_smallsrc="5-1-13.small.jpg" x_smallfullsrc="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-1-13.small.jpg" x_smallwidth="512" x_smallheight="320"/>
                                                  <Caption>Figure 8</Caption>
                                                  <Description>The figure is a logical topology that represents the way data flows through the network.</Description>
                                                  </Figure>
                                                  <Paragraph>Logical topologies are based on how the communication protocols work and convey a different perspective than physical topologies. The logical topology represents the way data flows through the network. It describes how devices exchange data with network users. As shown in the figure, an integral part of the logical topology is the addressing scheme. This addressing scheme helps identify network and data needs.</Paragraph>
                                                  <Paragraph>After modelling the solution, the next step is to build a prototype.</Paragraph>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.2 Prototyping your ideas</Title>
                                                  <Paragraph>Prototyping is the act of trying out your ideas on a system before it goes into live use. Prototypes do not need to be perfect, their purpose is to help you explore if an idea will work and give you the opportunity to refine it into a working ‘production ready’ system.</Paragraph>
                                                  <Paragraph>In this section you will explore how prototyping helps in the development of IoE systems.</Paragraph>
                                                  <Section>
                                                  <Title>5.2.1 Defining prototyping</Title>
                                                  <Paragraph>Following are some phrases that define a prototype:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>fully functional, but not fault-proof</ListItem>
                                                  <ListItem>an actual working version of the product</ListItem>
                                                  <ListItem>used for performance evaluation and further improvement of product</ListItem>
                                                  <ListItem>has a complerte interior and exterior</ListItem>
                                                  <ListItem>may be relatively expensive to produce</ListItem>
                                                  <ListItem>in the IoE, often used as a technology demonstrator.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>Prototyping is the next step in modelling. For the prototyping in the IoE, it helps to have design skills, electrical skills, physical/mechanical skills (working with your hands to put things together), programming skills, and to understand how TCP/IP works. But you do not need to be an expert in any of these areas. In fact, prototyping helps you to refine these skills.</Paragraph>
                                                  <Paragraph>Because the IoE is still developing, there are still unknown tasks to discover. This is a great time to invent something that is part of the IoE. Because the IoE combines people, process, data, and things, there is no end to the inventions that the IoE can help create and then incorporate.</Paragraph>
                                                  <Paragraph>For news and ideas that are already being talked about in the IoE, visit the Cisco IoE <a href="http://newsroom.cisco.com/ioe">Newsroom</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.2.2 How to prototype and further resources</Title>
                                                  <Paragraph>How do you prototype? There are a few ways to get started. A team at Google used the 'Rapid Prototyping Method; to create the Google Glass. If you like you can watch a <a href="http://ed.ted.com/lessons/rapid-prototyping-google-glass-tom-chi">TedTalk</a> about this process.</Paragraph>
                                                  <Paragraph>Of course, Google has a large amount of resources to pay for the people and materials that go into prototyping. Most of us need some financial help to get our ideas out of our heads and into a prototype. For us, there is crowd funding. Kickstarter, Indiegogo, and Crowdfunder are just three of the many online crowd funding programs. The <a href="http://vimeo.com/40128933">Pebble Watch Kickstarter</a> video was used to generate donations to help this group of inventors create the Pebble Watch.</Paragraph>
                                                  <Paragraph>What IoE invention will you create?</Paragraph>
                                                  <InternalSection>
                                                  <Heading>Physical materials</Heading>
                                                  <Paragraph>A good place to start is, of course, the internet. People have exchanged ideas for ages, but the Internet allows for idea exchanges on a whole new level. People who have never physically met can now collaborate and work together. There are several web sites you can visit to connect with other makers.</Paragraph>
                                                  <Paragraph>Maker Media is a global platform for connecting makers with each other to exchange projects and ideas. The platform also provides a place where makers can find and buy products for their projects. For more information, go to the <a href="http://makezine.com/">Makezine </a> website.</Paragraph>
                                                  <Paragraph>It is helpful to have practical skills when working with certain materials; for example, wood and metal are common prototyping materials, but they may be too difficult for a beginner to use. Making Society has a good section on modeling plastic and clay. You might be surprised with what you can do with plastic, clay, paper, and wires. For more information or ideas, go to the <a href="http://makingsociety.com/category/prototyping">Making society</a> website.</Paragraph>
                                                  <Paragraph>LEGO <a href="http://mindstorms.lego.com/">Mindstorms</a> has a large community of contributors and fans. With LEGO Mindstorms, you can create LEGO robots and control them using an application. The kits come with everything you need to make it work.</Paragraph>
                                                  <Paragraph><a href="http://www.erector.us/">Meccano  </a>is a model construction system that consists of reusable metal strips, plates, angle girders, wheels, axles, and gears, with nuts and bolts to connect the pieces. It lets you build working prototypes and mechanical devices.</Paragraph>
                                                  <Paragraph>3D printing is the process of making a solid object based on a 3D model computer file. A machine, called a 3D printer, is connected to the computer. A number of companies now build and sell 3D printers. An example is <a href="https://www.makerbot.com/">Makerbot</a>.</Paragraph>
                                                  </InternalSection>
                                                  <InternalSection>
                                                  <Heading>Electronics toolkits</Heading>
                                                  <Paragraph>Computer programs cannot run without a computer. While you can create programs for almost any computer, some platforms are designed for the beginner. Following you will find some of the most popular platforms.</Paragraph>
                                                  <Paragraph><a href="http://arduino.cc/">Arduino</a> is an open-source physical computing platform based on a simple microcontroller board, and a development environment for writing software for the board. You can develop interactive objects that take input from a variety of switches or sensors to control lights, motors, and other physical objects.</Paragraph>
                                                  <Paragraph>While Arduino is not suitable for use as a computer, the low power requirement makes it capable of controlling other devices efficiently.</Paragraph>
                                                  <Paragraph>The <a href="http://www.raspberrypi.org/">Raspberry Pi</a> is a low cost, credit-card-sized computer that plugs into a computer monitor or TV. You operate it using a standard keyboard and mouse. It is capable of doing everything a computer can do, from browsing the Internet and playing high-definition video, to making spreadsheets, word-processing, and playing games.</Paragraph>
                                                  <Paragraph>The <a href="http://beagleboard.org/">Beaglebone</a> is very similar to the Raspberry Pi in size, power requirements, and application. The Beaglebone has more processing power than the Raspberry Pi; therefore, it is a better choice for applications with higher processing requirements. </Paragraph>
                                                  </InternalSection>
                                                  <InternalSection>
                                                  <Heading>Programming resources</Heading>
                                                  <Paragraph>Programming is critical to the IoE. Creating custom code is very useful when developing an IoE solution. You have already learned about  <a href="http://scratch.mit.edu/">Scratch</a>. There are many other free resources that can help you get started with programming.</Paragraph>
                                                  <Paragraph>The <a href="http://ocw.mit.edu/courses/intro-programming">MIT OpenCourseWare (OCW)</a> is a web-based publication of almost all MIT course content. Open and available to the world, OCW is great place to get familiar with computer programming for free. OCW programming related courses can be found at.</Paragraph>
                                                  <Paragraph>Khan Academy is a non-profit educational website created in 2006 to provide 'a free, world-class education for anyone, anywhere'. There are <a href="https://www.khanacademy.org/computing/cs">lectures related to computer programming</a>.</Paragraph>
                                                  <Paragraph><a href="http://www.codeacademy.com/">Code Academy</a> is another excellent resource. It relies on interactivity to help people learn how to write computer programs.</Paragraph>
                                                  <Paragraph>There are also aa number of coures on OpenLearn including <a href="http://www.open.edu/openlearn/science-maths-technology/learn-code-data-analysis/content-section-overview"><i>Learn code for data analysis</i></a>.</Paragraph>
                                                  </InternalSection>
                                                  <InternalSection>
                                                  <Heading>Community inventor and entrepeneurship</Heading>
                                                  <Paragraph>So, perhaps you have just created something really neat. What now? There are a number of places where you can get help exposing your idea or prototype to others.</Paragraph>
                                                  <Paragraph>Investigate what is available in your community. Check with your local government, schools, and chamber of commerce for information about workshops, classes, and expert advice.</Paragraph>
                                                  <Paragraph>The internet has many resources to help your idea get exposure. A good example is <a href="https://www.quirky.com/how-it-works">Quirky</a>. Quirky allows users to share their ideas. When an idea is submitted, other Quirky users can vote and choose whether or not they want to support your idea. If an idea is good, it may become a real product. </Paragraph>
                                                  <Paragraph>If you do not want to share your idea and all you want is information, <a href="http://www.asktheinventors.com./">Ask the Inventors</a> is a great resource. Their website provides detailed information on all the phases of your project. </Paragraph>
                                                  </InternalSection>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.3 Want to go further?</Title>
                                                  <Figure>
                                                  <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1399956/mod_oucontent/oucontent/72266/5-3-1.jpg" src_uri="https://openuniv.sharepoint.com/sites/informal-lrning/ioe_1/assets/5-3-1.jpg" webthumbnail="false" width="100%" x_folderhash="55f4befe" x_contenthash="cfbe4f30" x_imagesrc="5-3-1.jpg" x_imagewidth="512" x_imageheight="356"/>
                                                  <Caption>Figure 9</Caption>
                                                  <Description>The figure is a world map indicating the number of students in the Cisco Networking Academy Program by region as of 28 October 2013: USA and Canada, 168,000, 17% of worldwide total; Central and South America, 187,000, 18%; Western Europe, 147,000, 14%; North Africa and Middle East 69,000, 7%; Sub-Saharan Africa, 51,000, 5%; Eastern Europe, Russia and Central Asia 148,000, 15%; China and Mongolia, 55,000, 5%; Japan, 4000, 1%; South and Southeast Asia and Pacific, 187,000, 18%. </Description>
                                                  </Figure>
                                                  <Paragraph>The rapid growth of networks has created a global shortage of people who are qualified to implement and maintain networking solutions, especially in places where networks are being built to promote economic development. At the same time, people need access to better training and career opportunities to successfully compete in the global economy.</Paragraph>
                                                  <Paragraph>With 9,000 academies in 170 countries, the Cisco Networking Academy helps individuals prepare for industry-recognised certifications and entry-level information and communication technology (ICT) careers in virtually every type of industry. The Cisco Networking Academy helps address the growing demand for ICT professionals, while improving career prospects in communities around the world.</Paragraph>
                                                  <Paragraph>Cisco Networking Academy has trained more than four million students to date. Many graduates have gone on to successful ICT careers in a variety of industries, while others have harnessed the entrepreneurial spirit and knowledge they acquired to start their own businesses and create new jobs.</Paragraph>
                                                  <Section>
                                                  <Title>5.3.1 Networking Academy curricula</Title>
                                                  <Paragraph>The Networking Academy delivers a comprehensive, 21st century learning experience. Students develop the foundational ICT skills needed to design, build, and manage networks, along with career skills such as problem solving, collaboration, and critical thinking. Students complete hands-on learning activities and network simulations to develop practical skills that will help them fill a growing need for networking professionals around the world. These are some of the offerings of the Networking Academy:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem><b>IT Essentials </b>− IT Essentials covers the fundamentals of computer hardware and software and advanced concepts, such as security, networking, and the responsibilities of an IT professional.</ListItem>
                                                  <ListItem><b>Entrepreneurship </b>− The Entrepreneurship course teaches critical business and financial skills, attitudes, and behaviors to help students develop an entrepreneurial mindset that can empower them to improve their overall quality of life.</ListItem>
                                                  <ListItem><b>Introduction to Cybersecurity</b> − The Introduction to Cybersecurity course covers trends in cybersecurity and demonstrates the need for cybersecurity skills in various industries.</ListItem>
                                                  <ListItem><b>CCNA Routing and Switching</b> − CCNA Routing and Switching provides a comprehensive overview of networking concepts and skills. It covers network applications to the protocols and services provided to those applications by the lower layers of the network. This curriculum has an emphasis on practical application, work-force readiness, and soft-skills development.</ListItem>
                                                  <ListItem><b>CCNA Security</b> − CCNA Security introduces the core security concepts and skills needed to install, troubleshoot, and monitor a network to maintain the integrity, confidentiality, and availability of data and devices.</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>For more information on our latest offerings, go to the  <a href="http://www.netacad.com/">Networking Academy website</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.3.2 IT industry certifications</Title>
                                                  <Paragraph>Industry certifications are highly respected by employers around the world and help validate the skills needed to launch successful careers in networking and ICT. Certifications are achieved by passing an exam proctored by a certifying authority. Students must complete training materials specific to the certification exam. Field experience is often very helpful, but not always required, to pass a certification exam. Cisco Networking Academy provides courses that prepare students for the industry certifications that are shown in Table 2.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 2 Cisco Networking Academy courses</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td class="TableCentered"><b>CompTIA A+</b></td>
                                                  <td class="TableCentered"><b>CCENT</b></td>
                                                  <td class="TableCentered"><b>CCNA Routing and Switching</b></td>
                                                  <td class="TableCentered"><b>CCNA Security</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td class="TableLeft">The CompTIA A+ certification for computer support technicians demonstrates competence in areas such as installation, preventive maintenance, networking, security, and troubleshooting. IT technician, IT administrator, and field service technician are examples of jobs that students can pursue using the CompTIA A+ certification.</td>
                                                  <td class="TableLeft">The Cisco CCENT certification for entry network technicians validates the ability to install, operate, and troubleshoot a small branch network and perform basic network security tasks. Support desk technician and network support technician are examples of jobs that students can pursue using the Cisco CCENT certification.</td>
                                                  <td class="TableLeft">The Cisco CCNA Routing and Switching certification validates the ability to install, configure, operate, and troubleshoot medium-sized routed and switched networks, and implement and verify connections to remote sites in a wide-area network (WAN). Examples of jobs that the CCNA Routing and Switching certification can help students to find are network administrator, network installer, and network engineer.</td>
                                                  <td class="TableLeft">The Cisco CCNA Security certification for network security professionals validates the knowledge needed to install, troubleshoot, and monitor Cisco network security devices; develop a security infrastructure; recognise network vulnerabilities; and mitigate security threats. Students who gain CCNA Security certification would be well qualified for a position as a network security specialist.</td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>There are two basic types of certification available: vendor-specific and vendor neutral. Vendor-specific certifications are tailored to technologies offered by a company to prove that an individual is qualified to deploy and manage that technology. Vendor-neutral certifications are offered by many different organisations. They show that an individual has a well-rounded skillset centered on common systems and programs, rather than specific types of technology.</Paragraph>
                                                  <Paragraph>Most often, certifications must be renewed over time. Requirements for re-certification may be earning continuing education units (CEUs), passing a re-certification exam, or both. CEUs can be earned by attending classes, professional membership, on-the-job experience, or research and publishing of materials that support the certification technology.</Paragraph>
                                                  <Table class="type 2">
                                                  <TableHead>Table 3 Cisco certification tracks</TableHead>
                                                  <tbody>
                                                  <tr>
                                                  <td><b>Certification tracks</b></td>
                                                  <td><b>Entry</b></td>
                                                  <td><b>Associate</b></td>
                                                  <td><b>Professional</b></td>
                                                  <td><b>Expert</b></td>
                                                  <td><b>Architect</b></td>
                                                  </tr>
                                                  <tr>
                                                  <td>Collaboration</td>
                                                  <td> </td>
                                                  <td> </td>
                                                  <td> </td>
                                                  <td>CCIE Collaboration</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Data Center</td>
                                                  <td> </td>
                                                  <td>CCNA Data Center</td>
                                                  <td>CCNP Data Center</td>
                                                  <td>CCIE Data Center</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Design</td>
                                                  <td>CCENT</td>
                                                  <td>CCDA</td>
                                                  <td>CCDP</td>
                                                  <td>CCDE</td>
                                                  <td>CCAr</td>
                                                  </tr>
                                                  <tr>
                                                  <td>Routing &amp; Switching</td>
                                                  <td>CCENT</td>
                                                  <td>CCNA Routing and Switching</td>
                                                  <td>CCNP</td>
                                                  <td>CCIE Routing &amp; Switching</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Security</td>
                                                  <td>CCENT</td>
                                                  <td>CCNA Security</td>
                                                  <td>CCNP Security</td>
                                                  <td>CCIE Security</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Service Provide</td>
                                                  <td> </td>
                                                  <td>CCNA Service Provider</td>
                                                  <td>CCNP Service Provider</td>
                                                  <td>CCIE Service Provider</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Service Provider Operations</td>
                                                  <td>CCENT</td>
                                                  <td>CCNA Service Provider Operations</td>
                                                  <td>CCNP Service Provider Operations</td>
                                                  <td>CCIE Service Provider Operations</td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Video</td>
                                                  <td> </td>
                                                  <td>CCNA Video</td>
                                                  <td> </td>
                                                  <td> </td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Voice</td>
                                                  <td>CCENT</td>
                                                  <td>CCNA Voice</td>
                                                  <td>CCNP Voice</td>
                                                  <td> </td>
                                                  <td> </td>
                                                  </tr>
                                                  <tr>
                                                  <td>Wireless</td>
                                                  <td>CCENT</td>
                                                  <td>CCNA Wireless</td>
                                                  <td>CCNP Wireless</td>
                                                  <td>CCIE Wireless</td>
                                                  <td> </td>
                                                  </tr>
                                                  </tbody>
                                                  </Table>
                                                  <Paragraph>The Cisco Certification Tracks are shown in Table 3. To explore all of the different Cisco career certifications, visit the <a href="https://learningnetwork.cisco.com/">Cisco Learning Network website</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.3.3 Additional learning opportunities</Title>
                                                  <Paragraph>Certifications can show an employer that an individual has the appropriate skills for a job. University degrees can show that a person has gained a broad understanding in an educational field. This broad understanding creates a solid foundation for emerging career opportunities in the IoE. A combination of industry certifications and university degrees provides a student with the best background, experience, and education to pursue a career with greater opportunities and higher salary.</Paragraph>
                                                  <Paragraph>When looking for a degree to pursue at a college or university that will pertain to the skillsets needed for a career in the IoE, look out  for some of the following degrees:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>Business Intelligence</ListItem>
                                                  <ListItem>Computer Information Systems</ListItem>
                                                  <ListItem>Computer Programming</ListItem>
                                                  <ListItem>Computer Science</ListItem>
                                                  <ListItem>Database Administration</ListItem>
                                                  <ListItem>Electromechanical Automation</ListItem>
                                                  <ListItem>Electronics Engineering</ListItem>
                                                  <ListItem>Linux Networking</ListItem>
                                                  <ListItem>Machining</ListItem>
                                                  <ListItem>Network Administration</ListItem>
                                                  <ListItem>System Analysis</ListItem>
                                                  <ListItem>Web Server Administrator</ListItem>
                                                  </BulletedList>
                                                  <Paragraph>This is not an exhaustive list. Even traditional degree programs such as supply chain management, business, and project management are helpful for careers in IoE. Computer-aided design (CAD), drafting, math, and physics are applicable and show a diverse education, which is perfect for an IoE career.</Paragraph>
                                                  <Paragraph>The Open University is part of the Cisco Networking Academy programme. You can find out more about our <a href="http://www.open.ac.uk/courses/modules/t216">Cisco courses</a> and also explore our <a href="http://www.open.ac.uk/courses/find/computing-and-it">full computing prospectus</a>.</Paragraph>
                                                  </Section>
                                                  <Section>
                                                  <Title>5.3.4 IT industry jobs for the IoE</Title>
                                                  <Paragraph>IoE is creating demand for a broad spectrum of IT jobs. These opportunities may be specific to Fog computing, developing new processes, or a specialisation in a discipline that has not yet been realised. These jobs reflect skills spanning multiple disciplines that include computer science, computer engineering (a blend of computer science and electrical engineering), and software engineering in the following areas:</Paragraph>
                                                  <BulletedList>
                                                  <ListItem>collaboration</ListItem>
                                                  <ListItem>enterprise networks</ListItem>
                                                  <ListItem>data centre and virtualisation.</ListItem>
                                                  </BulletedList>
                                                  <InternalSection>
                                                  <Heading>Create your own IoE job</Heading>
                                                  <Paragraph>IoE is also creating demand for a new kind of IT specialist, individuals with the skillsets to create new products and process the data they collect. A workforce is needed that specialises in both information science and software or computer engineering.</Paragraph>
                                                  <Paragraph>Additionally, operational technologies and information technologies are converging in the IoE. With this convergence, people must collaborate and learn from each other to understand the things, the networks, and methodologies to harness the limitless potential of the IoE.</Paragraph>
                                                  </InternalSection>
                                                  </Section>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.4 Terms and concepts practice</Title>
                                                  <Paragraph>This activity will help you to test some of the terms and concepts you've been introduced to.</Paragraph>
                                                  <Activity>
                                                  <Question>
                                                  <Paragraph/>
                                                  </Question>
                                                  <Interaction>
                                                  <Matching>
                                                  <Option>
                                                  <Paragraph>model </Paragraph>
                                                  </Option>
                                                  <Match x_letter="a">
                                                  <Paragraph>a representation of a system</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>physical topology</Paragraph>
                                                  </Option>
                                                  <Match x_letter="f">
                                                  <Paragraph>a kind of map of the layout and location of all of the devices that comprise a network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>logical topology</Paragraph>
                                                  </Option>
                                                  <Match x_letter="d">
                                                  <Paragraph>a diagram illustrating the flow of data through a network</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>predictive analytics</Paragraph>
                                                  </Option>
                                                  <Match x_letter="e">
                                                  <Paragraph>uses data mining and modelling techniques to determine what will happen in the future</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>prototype </Paragraph>
                                                  </Option>
                                                  <Match x_letter="g">
                                                  <Paragraph>a fully functional working version of a product that is under design</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>M2M interaction </Paragraph>
                                                  </Option>
                                                  <Match x_letter="b">
                                                  <Paragraph>a sensor sends data to a controller which activates an actuator</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>M2P interaction </Paragraph>
                                                  </Option>
                                                  <Match x_letter="h">
                                                  <Paragraph>a sensor sends data to a controller which sends an alert to a gateway which pages an employee</Paragraph>
                                                  </Match>
                                                  <Option>
                                                  <Paragraph>flowchart </Paragraph>
                                                  </Option>
                                                  <Match x_letter="c">
                                                  <Paragraph>uses symbols to represent workflows and decisions</Paragraph>
                                                  </Match>
                                                  </Matching>
                                                  </Interaction>
                                                  </Activity>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.5 Session 5 quiz</Title>
                                                  <Paragraph>Check what you have learned in Session 5.</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48856">Session 5 quiz</a></Paragraph>
                                                  <Paragraph>Use 'ctrl' (cmd on a Mac) or right-click to open the quiz in a new window or tab then come back here when you're finished.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.6 Summary</Title>
                                                  <Paragraph>The healthcare model that is used in this chapter details M2M, M2P, and P2P interactions. It models every aspect of patient monitoring from basic vital signs to dispatching healthcare professionals to treat patients.</Paragraph>
                                                  <Paragraph>Descriptive, predictive, and prescriptive analytics help shape how a business functions.</Paragraph>
                                                  <Paragraph>Modelling the potential IoE solution identifies the changes in the organisation’s processes. organisations identify the areas that are best served by re-engineering processes using a flowchart. A flowchart uses symbols to represent workflows and decisions.</Paragraph>
                                                  <Paragraph>A network topology is a kind of map. There are two types of network topologies, physical and logical. The physical topology displays the layout and location of all of the devices that comprise the network. The logical topology represents the way data flows through the network.</Paragraph>
                                                  <Paragraph>To prototype ideas for the IoE, it helps to have design skills, electrical skills, physical/mechanical skills (work with your hands to put things together), programming skills, and to understand how TCP/IP works.</Paragraph>
                                                  <Paragraph>Programming is critical to the IoE. There are many other free resources that can help you get started with programming. Three of the most popular platforms are Arduino, Raspberry PI, and Beaglebone. Check with your local government, schools, and chamber of commerce for information about workshops, classes, and expert advice.</Paragraph>
                                                  <Paragraph>The Cisco Networking Academy helps individuals prepare for industry-recognised certifications and entry-level information and communication technology (ICT) careers in virtually every type of industry. The internet of everything is creating demand for a broad spectrum of IT jobs, and creating opportunities for exciting new jobs in emerging fields.</Paragraph>
                                                  <Paragraph>You've nearly finished! The next section takes you to the final assessment quiz.</Paragraph>
                                                  </Session>
                                                  <Session>
                                                  <Title>5.7 Final assessment quiz</Title>
                                                  <Paragraph>To complete the course and gain your free statement of participation, take the final assessment quiz:</Paragraph>
                                                  <Paragraph><a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=49284">Final assessment quiz</a></Paragraph>
                                                  <Paragraph>Once you've completed it you've finished the course. Congratulations! You should receive notification that your free Statement of Participation is ready within 24 hours.</Paragraph>
                                                  <Paragraph>Now you've completed the course we would again appreciate a few minutes of your time to tell us a bit about your experience of studying it and what you plan to do next. We will use this information to provide better online experiences for all our learners and to share our findings with others. If you’d like to help, please fill in this <a href="https://www.surveymonkey.co.uk/r/internet_everything_open_end">optional survey</a>.</Paragraph>
                                                  </Session>
                            </Unit>
                            <BackMatter>
                                                  <References>
                                                  <Reference><b>Session 1</b></Reference>
                                                  <Reference>TeleGeography (n.d.) 'Submarine cable map' [Online]. Available at http://www.submarinecablemap.com/ Accessed 12 July 2016.</Reference>
                                                  </References>
                                                  <Acknowledgements>
                                                  <Paragraph>The <i>Internet of everything</i> free course is brought to you by The Open University. This course was originally developed by Cisco Systems Ltd and adapted for OpenLearn by The Open University. The collaboration of The Open University and Cisco Systems to develop and deliver this course as part of OpenLearn’s portfolio will  provide and extend free learning in this important and current area of study.</Paragraph>
                                                  <Paragraph>Except for third party materials and otherwise stated (see <a href="http://www.open.ac.uk/conditions">terms and conditions</a>), this content is made available under a <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence</a>.</Paragraph>
                                                  <Paragraph>The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course: </Paragraph>
                                                  <Paragraph>Videos: © Cisco Systems  <a href="http://www.cisco.com/">http://www.cisco.com/</a> <a href="https://creativecommons.org/licenses/by-nc-nd/4.0/">https://creativecommons.org/licenses/by-nc-nd/4.0/</a></Paragraph>
                                                  <Paragraph>Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.</Paragraph>
                                                  <Paragraph/>
                                                  <Paragraph><b>Don't miss out</b></Paragraph>
                                                  <Paragraph>If reading this text has inspired you to learn more, you may be interested in joining the millions of people who discover our free learning resources and qualifications by visiting The Open University – <a href="http://www.open.edu/openlearn/free-courses?utm_source=google">www.open.edu/openlearn/free-courses</a>.</Paragraph>
                                                  </Acknowledgements>
                            </BackMatter>
</Item>
