SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
ARCHITECTURE LAYERS
INTERNETOF THINGS
IoT
BY GROUP 5
IoT solutions have
become a regular part of
our lives. From the
smartwatch on your
wrist to industrial
enterprises, connected
devices are everywhere.
Having things work for us
is no longer sci-fi fantasy.
MAJOR IOT BUILDING BLOCKS AND LAYERS
There is no single, agreed-upon IoT architecture. It varies in complexity and number of
architecturallayersdependingon a particularbusiness task.
For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as
many as seven layers.
The standardized architectural model proposed by IoT industry leaders.
MAJOR IOT BUILDING BLOCKS AND LAYERS
The key buildingblocks of any Iot structure are alwaysthe same, namely:
• smart things;
• networks and gatewaysenabling low-
power devices (which is often the case
in IoT) to enter the big Internet;
• the middlewareor IoT platforms
providingdata storage spaces and
advancedcomputing engines along
with analytical capabilities;and
• applications,allowingend users to
benefit from IoT and manipulatethe
physicalworld.
MAJOR IOT BUILDING BLOCKS AND LAYERS
These elements make up the backbone of any IoT system upon which effective, multi-layered
architecture can be developed.Most commonly, these layersare:
• the PERCEPTION LAYER hosting smart things;
• the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the
cloud and vice versa via networks and gateways;
• the PROCESSING LAYER employing IoT platforms to accumulateand manage all data
streams; and
• the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control
to end users.
Besides the most essential components, the article also describes three additional layers:
• the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge,
where IoT things collect new information.Typically,edgy computing occurs on gateways;
• the BUSINESS LAYER where businesses make decisions based on the data;and
• the SECURITY LAYER encompassing all other layers.
PERCEPTION LAYER
Converting analog signals into digital data and vice versa
The initialstage of any IoT system embraces a wide range of “things” or endpoint
devices that act as a bridge between the real and digital worlds. They vary in form and
size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be
dividedinto the following large groups
• Sensors such as probes, gauges, meters, and others. They
collect physicalparameterslike temperature or humidity, turn
them into electrical signals, and send them to the IoT system.
IoT sensors are typicallysmall and consume little power.
• Actuators, translatingelectrical signalsfrom the IoT system
into physicalactions. Actuatorsare used in motor controllers,
lasers, robotic arms.
• Machines and devices connected to sensors and actuatorsor
having them as integral parts.
CONNECTIVITY LAYER
Enabling data transmission
The second level is in charge of all communicationsacross devices, networks, and cloud
services that make up the IoT infrastructure. The connectivitybetween the physical
layer and the cloud is achievedin two ways:
The communications between devices and cloud services or gateways involve different networking
technologies.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
• This level is essential for enabling IoT systems
to meet the speed, security, and scale
requirementsof the 5th generation mobile
network or 5G. The new wireless standard
promises faster speeds, lower latency, and
the abilityto handle many more connected
devices, than the current 4G standard.
• The idea behind edge or fog computing is to
process and store information as early and as
close to its sources as possible. Thisapproach
allowsfor analyzingand transforming high
volumes of real-time data locally,at the edge
of the networks. Thus, you save the time and
other resources that otherwise would be
needed to send all datato cloud services.
The result is reduced system latency that
leadsto real-time responses and enhanced
performance.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
Edge computing occurs on gateways,local servers, or other edge nodes scattered
across the network. At this level, data can be:
• evaluatedto determine if it needs further processing at higher levels,
• formatted for further processing,
• decoded,
• filtered, and
• redirected to an additional destination
PROCESSING LAYER
Making raw data useful
The processing layer accumulates, stores, and processes data that comes
from the previous layer. All these tasks are commonly handled via IoT
platforms and include two major stages
Data accumulation stage Data abstraction stage
• The real-time data is captured via
an API and put at rest to meet the
requirements of non-real-time
applications. The data accumulation
component stage works as a transit hub
between event-based data generation and
query-based data consumption.
• Here, datapreparationis finalized so that
consumer applicationscan use it to
generate insights. The entire process
involvesthe following steps:
1. combining datafrom different sources,
both IoT and non-IoT,including ERM, ERP,
and CRM systems;
2. reconcilingmultiple data formats; and
3. aggregating datain one place or making it
accessible regardless of locationthrough
data virtualization.
APPLICATION LAYER
Addressing business requirements
At this layer, informationis analyzedby software to give answers to key business
questions. There are hundredsof IoT applicationsthat vary in complexity and function,
using different technology stacks and operatingsystems. Some examples are:
• device monitoringand controlsoftware,
• mobile apps for simple interactions,
• business intelligenceservices, and
• analyticsolutionsusing machine learning.
Currently, applicationscan be built right on top of IoT platforms that offer software
developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced
analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith
middleware.
BUSINESS LAYER
Implementing data-driven solutions
The informationgenerated at the previouslayersbrings value if only it results in problem-
solving solution and achieving business goals. New data must initiatecollaboration
between stakeholderswho in turn introduce new processes to enhance productivity.
The decision-makingusually involvesmore than one person working with more than one
software solution. For this reason, the business layer is defined as a separate stage,
higher than a single applicationlayer.
SECURITY LAYER
Preventing data-breaches
It goes without saying that there should be a security layer covering all the above-
mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll
only point out the basic features of the safe architecture across different levels.
Device security. Modern manufacturersof IoT devices typicallyintegratesecurity
features both in the hardware and firmware installedon it. This includes
• embedded TPM (Trusted Platform Module) chips with cryptographickeys for
authenticationand protectionof endpointdevices;
• a secure boot process that prevents unauthorizedcode from running on a powered-
up device;
• updatingsecurity patches on a regular basis; and
• physicalprotectionlike metal shields to block physicalaccess to the device.
SECURITY LAYER
Preventing data-breaches
Connection security. Whether datais being sent over devices, networks, or applications,
it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho
interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and
DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure
end-to-end data protection.
Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate
risks of exposing sensitive information to intruders. Cloud security also involves
authenticationand authorization mechanismsto limit access to the IoT applications.
Another importantsecurity method is device identitymanagement to verify the device’s
credibilitybefore allowing it to connect to the cloud.
Reference:
• https://www.altexsoft.com/blog/iot-architecture-layers-
components/
• https://www.hindawi.com/journals/jece/2017/9324035/
#:~:text=Architecture%20of%20IoT%20(A%3A%20three,(
B%3A%20five%20layers).&text=%5D.,the%20architecture
%20with%20three%20layers
• https://www.zibtek.com/blog/iot-architecture/
THANK YOU!
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja

Weitere ähnliche Inhalte

Was ist angesagt?

web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoTFabMinds
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocolTom Chou
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsAbdullah Alfadhly
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...rahul kundu
 

Was ist angesagt? (20)

Dns server
Dns serverDns server
Dns server
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
WLAN
WLANWLAN
WLAN
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Ethernet protocol
Ethernet protocolEthernet protocol
Ethernet protocol
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
Hypertext transfer protocol and hypertext transfer protocol secure(HTTP and H...
 

Ähnlich wie Group 5 IoT Architecture Layer

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-SolutionsManoj Punamia
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesSatyaKVivek
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulKellton Tech Solutions Ltd
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...Mistral Solutions
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedCognizant
 

Ähnlich wie Group 5 IoT Architecture Layer (20)

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-Solutions
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
NX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT InterfaceNX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT Interface
 
Nx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interfaceNx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interface
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA Unleashed
 

Kürzlich hochgeladen

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Kürzlich hochgeladen (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Group 5 IoT Architecture Layer

  • 2. IoT solutions have become a regular part of our lives. From the smartwatch on your wrist to industrial enterprises, connected devices are everywhere. Having things work for us is no longer sci-fi fantasy.
  • 3. MAJOR IOT BUILDING BLOCKS AND LAYERS There is no single, agreed-upon IoT architecture. It varies in complexity and number of architecturallayersdependingon a particularbusiness task. For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as many as seven layers. The standardized architectural model proposed by IoT industry leaders.
  • 4. MAJOR IOT BUILDING BLOCKS AND LAYERS The key buildingblocks of any Iot structure are alwaysthe same, namely: • smart things; • networks and gatewaysenabling low- power devices (which is often the case in IoT) to enter the big Internet; • the middlewareor IoT platforms providingdata storage spaces and advancedcomputing engines along with analytical capabilities;and • applications,allowingend users to benefit from IoT and manipulatethe physicalworld.
  • 5. MAJOR IOT BUILDING BLOCKS AND LAYERS These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed.Most commonly, these layersare: • the PERCEPTION LAYER hosting smart things; • the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the cloud and vice versa via networks and gateways; • the PROCESSING LAYER employing IoT platforms to accumulateand manage all data streams; and • the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control to end users. Besides the most essential components, the article also describes three additional layers: • the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge, where IoT things collect new information.Typically,edgy computing occurs on gateways; • the BUSINESS LAYER where businesses make decisions based on the data;and • the SECURITY LAYER encompassing all other layers.
  • 6. PERCEPTION LAYER Converting analog signals into digital data and vice versa The initialstage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital worlds. They vary in form and size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be dividedinto the following large groups • Sensors such as probes, gauges, meters, and others. They collect physicalparameterslike temperature or humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typicallysmall and consume little power. • Actuators, translatingelectrical signalsfrom the IoT system into physicalactions. Actuatorsare used in motor controllers, lasers, robotic arms. • Machines and devices connected to sensors and actuatorsor having them as integral parts.
  • 7. CONNECTIVITY LAYER Enabling data transmission The second level is in charge of all communicationsacross devices, networks, and cloud services that make up the IoT infrastructure. The connectivitybetween the physical layer and the cloud is achievedin two ways: The communications between devices and cloud services or gateways involve different networking technologies.
  • 8. EDGE OR FOG COMPUTING LAYER Reducing system latency • This level is essential for enabling IoT systems to meet the speed, security, and scale requirementsof the 5th generation mobile network or 5G. The new wireless standard promises faster speeds, lower latency, and the abilityto handle many more connected devices, than the current 4G standard. • The idea behind edge or fog computing is to process and store information as early and as close to its sources as possible. Thisapproach allowsfor analyzingand transforming high volumes of real-time data locally,at the edge of the networks. Thus, you save the time and other resources that otherwise would be needed to send all datato cloud services. The result is reduced system latency that leadsto real-time responses and enhanced performance.
  • 9. EDGE OR FOG COMPUTING LAYER Reducing system latency Edge computing occurs on gateways,local servers, or other edge nodes scattered across the network. At this level, data can be: • evaluatedto determine if it needs further processing at higher levels, • formatted for further processing, • decoded, • filtered, and • redirected to an additional destination
  • 10. PROCESSING LAYER Making raw data useful The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled via IoT platforms and include two major stages Data accumulation stage Data abstraction stage • The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation component stage works as a transit hub between event-based data generation and query-based data consumption. • Here, datapreparationis finalized so that consumer applicationscan use it to generate insights. The entire process involvesthe following steps: 1. combining datafrom different sources, both IoT and non-IoT,including ERM, ERP, and CRM systems; 2. reconcilingmultiple data formats; and 3. aggregating datain one place or making it accessible regardless of locationthrough data virtualization.
  • 11. APPLICATION LAYER Addressing business requirements At this layer, informationis analyzedby software to give answers to key business questions. There are hundredsof IoT applicationsthat vary in complexity and function, using different technology stacks and operatingsystems. Some examples are: • device monitoringand controlsoftware, • mobile apps for simple interactions, • business intelligenceservices, and • analyticsolutionsusing machine learning. Currently, applicationscan be built right on top of IoT platforms that offer software developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith middleware.
  • 12. BUSINESS LAYER Implementing data-driven solutions The informationgenerated at the previouslayersbrings value if only it results in problem- solving solution and achieving business goals. New data must initiatecollaboration between stakeholderswho in turn introduce new processes to enhance productivity. The decision-makingusually involvesmore than one person working with more than one software solution. For this reason, the business layer is defined as a separate stage, higher than a single applicationlayer.
  • 13. SECURITY LAYER Preventing data-breaches It goes without saying that there should be a security layer covering all the above- mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll only point out the basic features of the safe architecture across different levels. Device security. Modern manufacturersof IoT devices typicallyintegratesecurity features both in the hardware and firmware installedon it. This includes • embedded TPM (Trusted Platform Module) chips with cryptographickeys for authenticationand protectionof endpointdevices; • a secure boot process that prevents unauthorizedcode from running on a powered- up device; • updatingsecurity patches on a regular basis; and • physicalprotectionlike metal shields to block physicalaccess to the device.
  • 14. SECURITY LAYER Preventing data-breaches Connection security. Whether datais being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure end-to-end data protection. Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders. Cloud security also involves authenticationand authorization mechanismsto limit access to the IoT applications. Another importantsecurity method is device identitymanagement to verify the device’s credibilitybefore allowing it to connect to the cloud.
  • 16. THANK YOU! Group 5: Reymart John Aguho Lawrence Valdez Trishia Mae Salazar Gayle Allyson Guitones Dempster Winston Corpuz Matthew Erickson Quinto Marc Vincent Maneja