SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Session title
1
Devising a Practical Approach
To the Internet of Things
Gordon Haff
@ghaff
ghaff@redhat.com
10 February 2015
Session title
2
IoT's
expected
impact
Source: The Economist Intelligence Unit
Session title
3
What does the market look like?
How is it developing?
How do you architect for IoT?
HOW SHOULD WE THINK ABOUT IOT?
Session title
4
Session title
5
Session title
6
IT MAY BE WORTH REMEMBERING
There is no reason for any
individual to have a
computer in his home.
Ken Olsen, DEC, 1977
Session title
7
Session title
8
THE RISE OF THE
PERVASIVE SENSOR
Credit: Eric Fischer
Complete set: https://www.flickr.com/photos/walkingsf/sets/72157624209158632/
San
Francisco
Session title
9
Session title
10
SOME FACETS TO CONSIDER
• Consumer vs. Industrial
• No IP address vs. IP address
• How heavy is the client?
• How is the client connected?
• What does the client connect to?
• How and where is data processed?
Session title
11
Session title
12
Internet of Things Ecosystem and Trends
Source: IDC, Internet of Things Ecosystem and Trends, #IDC_P24793
Session title
13
GARTNER
HYPE CYCLE
FOR
INTERNET OF
THINGS
Session title
14
• Connected things not new, but…
• Value from greater connectivity options and
how data used to improve process
capabilities and automate decisions
• Integration with existing IT nascent
• High potential value—but also requires high
process and culture change
GARTNER: INTERNET OF THINGS FOR
MANUFACTURING OPERATIONS
Session title
15
THE INDUSTRIAL IOT
“We need the IT side to understand the
business value and priorities of control
integration, and to take more of a
leadership role. The controls side needs to
understand the need to partner and work
more closely with IT to take advantage of
these technologies.”
--Dan McGrath, Panduit
Session title
16
The growth of data
Session title
17
DATA = $$ ?
Session title
18
IS IT USEFUL?
Useful 34%
Tagged 7%
Analyzed 1%
Source: KPCB
Session title
19
Flickr/cc by Amy Barr
https://www.flickr.com/photos/anaxila/367953499
vs.
Session title
20
• The Thread Group
• IoT-GSI Open Interconnect Consortium
• The AllSeen Alliance
• HyperCat
• HomeKit
• Industrial Internet Consortium *
• OASIS IoT/M2M
• Weightless
MANY STANDARDS ORGS WITH DIFFERENT GOALS
Much overlapping membership
Session title
21
Apple
Cisco
Symantec
Accenture
ARM
Dell
Google
IBM
Intel
Microsoft
PTC
Samsung
Source: Rachel Chalmers,
Ignition Partners
Session title
22
SOME IOT MESSAGING PROTOCOLS: NEW HTTP?
Message Queue Telemetry Transport (MQTT)
• Pub/sub over TCP (one-to-one, one-to-many and many-to-one)
• Lightweight M2M
• Originally IBM—open standard
Constrained Application Protocol (CoAP)
• Document transfer protocol (like HTTP) but designed for constrained devices
• Built on UDP
• Primarily one-to-one (client/server)
XMPP (Jabber)
• Mostly data is going between distant, mostly unrelated points (like IM)
• Tends to be for consumer apps
Session title
23
MORE IOT MESSAGING PROTOCOLS
Data Distribution Service (DDS)
• Direct device-to-device bus communication
• Data-centric middleware standard with roots in high-
performance defense, industrial, and embedded applications.
• Can efficiently deliver millions of messages per second to many
simultaneous receivers
Advanced Message Queuing Protocol (AMQP)
• Strictly reliable point-to-point messages between servers using
TCP
• The standard for high-performance messaging in finance
• In IoT context, AMQP most appropriate for the control tier or
server-based analysis functions
Session title
24
IOT: STRINGENT TECH CHALLENGES FOR IT
Scalability
• IDC expects the global installed base of IoT endpoints to reach 212
billion connected devices by 2020 (Source: Worldwide Internet of Things
(IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars, IDC,
October 2013)
• An individual intelligent system might gather and analyze billions of data
objects from millions of distinct endpoints
Session title
25
IOT: STRINGENT TECH CHALLENGES FOR IT
Reliability
• Many intelligent systems will be employed for mission-critical applications
where system downtime can result in diminished productivity, dissatisfied
customers, or lost revenue
• Some intelligent systems will be used in safety-critical applications where
system downtime can lead to loss of life or property or cause significant
environmental or health hazards
• Examples: emergency services, process control, real-time systems
control, health applications
Session title
26
IOT: STRINGENT TECH CHALLENGES FOR IT
Security
• Inherent exposure to public cloud and network services
• Security systems and practices must be extended to protect
against data loss, service theft, and increasingly sophisticated
denial-of-service attacks in a scalable manner
• Support cohesive authentication, authorization, and auditing
capabilities to establish trust, govern access to resources, and
ensure compliance
• Strong encryption often needed
Session title
27
THREE TIER ARCHITECTURE FOR IOT: DEVICE
• Wide variety of intelligent endpoints
(including relatively traditional client
computers/OSs)
• Standards-based wired and wireless
networking protocols for connectivity
• Standards-based data transport and
messaging mechanisms are used to forward
raw data and exchange control information
• Up to 100s of thousands or even millions
Session title
28
THREE TIER ARCHITECTURE FOR IOT: CONTROLLER
• Intermediary that facilitates communications,
offloads processing functions, and drives
action
• Analyzes tactical data and executes business
rules and issues control information
downstream
• Collects, summarizes, and stores device data
and forwards it upstream
• Consider “data gravity” and network
bandwidth/latency effects
• Thousands of instances
Session title
29
THREE TIER IOT ARCHITECTURE IOT: DATACENTER/CLOUD
• Large-scale data computation and repository
for data storage and strategic analysis
• Virtual environment for instantiating
applications, storing data, and executing
complex event processing, distributed
computing, and business analytics functions
• Collects and examines aggregated data from
the control tier and disseminates business
rules downstream
• Hundreds of instances
Session title
30
THREE-TIER ARCHITECTURE FOR IOT
Session title
31
SUMMING UP
• IOT isn’t a single thing and the details vary a
lot
• Different IOT examples are at different
maturity points
• Some may never mature—technology, use
case, cost
• Data architectures and approaches matter
• Intelligent systems architectures matter
Session title
32
ABOUT ME
• Red Hat Cloud Product Strategy
• Twitter: @ghaff
• Google+: Gordon Haff
• Email: ghaff@redhat.com
• Blog: http://bitmason.blogspot.com
• Formerly: Illuminata (industry analyst), Data
General (minicomputers/Unix/NUMA/etc.)
Session title
33
Questions?
Gordon Haff
@ghaff
ghaff@redhat.com

Weitere ähnliche Inhalte

Was ist angesagt?

Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
Monika Keerthi
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
Rick G. Garibay
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
Paul Fremantle
 

Was ist angesagt? (20)

Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
NDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoTNDC Minnesota 2019 - Fundamentals of Azure IoT
NDC Minnesota 2019 - Fundamentals of Azure IoT
 
Iot and ethics
Iot and ethicsIot and ethics
Iot and ethics
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
How AI connect dots for IoT
How AI connect dots for IoTHow AI connect dots for IoT
How AI connect dots for IoT
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 

Ähnlich wie Devising a practical approach to the Internet of Things

Ähnlich wie Devising a practical approach to the Internet of Things (20)

Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Chapter 1-it-im introduction
Chapter 1-it-im introductionChapter 1-it-im introduction
Chapter 1-it-im introduction
 
The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...The internet of things (beyond data management and analytics) jonathan cooper...
The internet of things (beyond data management and analytics) jonathan cooper...
 
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
What is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your ReachWhat is Your Edge From the Cloud to the Edge, Extending Your Reach
What is Your Edge From the Cloud to the Edge, Extending Your Reach
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
Eurotech and Red Hat collaboration simplifies Internet of Things integration ...
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 

Mehr von Gordon Haff

Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOps
Gordon Haff
 

Mehr von Gordon Haff (20)

Artificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine LearningArtificial Intelligence: Beyond Machine Learning
Artificial Intelligence: Beyond Machine Learning
 
Blockchains for Business 101
Blockchains for Business 101Blockchains for Business 101
Blockchains for Business 101
 
Preserving privacy while sharing data
Preserving privacy while sharing dataPreserving privacy while sharing data
Preserving privacy while sharing data
 
Lightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising PrivacyLightning Talk: Using Data without Compromising Privacy
Lightning Talk: Using Data without Compromising Privacy
 
Free and Open:An Historical Perspective
Free and Open:An Historical PerspectiveFree and Open:An Historical Perspective
Free and Open:An Historical Perspective
 
Why do we contribute (to open source)?
Why do we contribute (to open source)?Why do we contribute (to open source)?
Why do we contribute (to open source)?
 
How do you get started in AI?
How do you get started in AI?How do you get started in AI?
How do you get started in AI?
 
The good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AIThe good the bad and the ugly: Getting started doing AI
The good the bad and the ugly: Getting started doing AI
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native:  A New Ecosystem for Putting Containers into ProductionCloud-Native:  A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
 
Containers: Don't Skeu Them Up
Containers: Don't Skeu Them UpContainers: Don't Skeu Them Up
Containers: Don't Skeu Them Up
 
Cloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into ProductionCloud-Native: A New Ecosystem for Putting Containers into Production
Cloud-Native: A New Ecosystem for Putting Containers into Production
 
DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018DevSecOps: The Open Source Way for CloudExpo 2018
DevSecOps: The Open Source Way for CloudExpo 2018
 
AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018AI: The Good, the Bad, and the Practical for CloudExpo 2018
AI: The Good, the Bad, and the Practical for CloudExpo 2018
 
DevSecOps: The Open Source Way
DevSecOps: The Open Source WayDevSecOps: The Open Source Way
DevSecOps: The Open Source Way
 
Ten layers of container security for CloudCamp Nov 2017
Ten layers of container security  for CloudCamp Nov 2017Ten layers of container security  for CloudCamp Nov 2017
Ten layers of container security for CloudCamp Nov 2017
 
That's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native successThat's not a metric! Data for cloud-native success
That's not a metric! Data for cloud-native success
 
The Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing OperationsThe Interesting IoT: Digitizing Operations
The Interesting IoT: Digitizing Operations
 
A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)A short history of packaging (Monkigras 2017)
A short history of packaging (Monkigras 2017)
 
Optimizing the Ops in DevOps
Optimizing the Ops in DevOpsOptimizing the Ops in DevOps
Optimizing the Ops in DevOps
 
Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.Containers: Don't Skeu Them Up. Use Microservices Instead.
Containers: Don't Skeu Them Up. Use Microservices Instead.
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Devising a practical approach to the Internet of Things

  • 1. Session title 1 Devising a Practical Approach To the Internet of Things Gordon Haff @ghaff ghaff@redhat.com 10 February 2015
  • 3. Session title 3 What does the market look like? How is it developing? How do you architect for IoT? HOW SHOULD WE THINK ABOUT IOT?
  • 6. Session title 6 IT MAY BE WORTH REMEMBERING There is no reason for any individual to have a computer in his home. Ken Olsen, DEC, 1977
  • 8. Session title 8 THE RISE OF THE PERVASIVE SENSOR Credit: Eric Fischer Complete set: https://www.flickr.com/photos/walkingsf/sets/72157624209158632/ San Francisco
  • 10. Session title 10 SOME FACETS TO CONSIDER • Consumer vs. Industrial • No IP address vs. IP address • How heavy is the client? • How is the client connected? • What does the client connect to? • How and where is data processed?
  • 12. Session title 12 Internet of Things Ecosystem and Trends Source: IDC, Internet of Things Ecosystem and Trends, #IDC_P24793
  • 14. Session title 14 • Connected things not new, but… • Value from greater connectivity options and how data used to improve process capabilities and automate decisions • Integration with existing IT nascent • High potential value—but also requires high process and culture change GARTNER: INTERNET OF THINGS FOR MANUFACTURING OPERATIONS
  • 15. Session title 15 THE INDUSTRIAL IOT “We need the IT side to understand the business value and priorities of control integration, and to take more of a leadership role. The controls side needs to understand the need to partner and work more closely with IT to take advantage of these technologies.” --Dan McGrath, Panduit
  • 18. Session title 18 IS IT USEFUL? Useful 34% Tagged 7% Analyzed 1% Source: KPCB
  • 19. Session title 19 Flickr/cc by Amy Barr https://www.flickr.com/photos/anaxila/367953499 vs.
  • 20. Session title 20 • The Thread Group • IoT-GSI Open Interconnect Consortium • The AllSeen Alliance • HyperCat • HomeKit • Industrial Internet Consortium * • OASIS IoT/M2M • Weightless MANY STANDARDS ORGS WITH DIFFERENT GOALS Much overlapping membership
  • 22. Session title 22 SOME IOT MESSAGING PROTOCOLS: NEW HTTP? Message Queue Telemetry Transport (MQTT) • Pub/sub over TCP (one-to-one, one-to-many and many-to-one) • Lightweight M2M • Originally IBM—open standard Constrained Application Protocol (CoAP) • Document transfer protocol (like HTTP) but designed for constrained devices • Built on UDP • Primarily one-to-one (client/server) XMPP (Jabber) • Mostly data is going between distant, mostly unrelated points (like IM) • Tends to be for consumer apps
  • 23. Session title 23 MORE IOT MESSAGING PROTOCOLS Data Distribution Service (DDS) • Direct device-to-device bus communication • Data-centric middleware standard with roots in high- performance defense, industrial, and embedded applications. • Can efficiently deliver millions of messages per second to many simultaneous receivers Advanced Message Queuing Protocol (AMQP) • Strictly reliable point-to-point messages between servers using TCP • The standard for high-performance messaging in finance • In IoT context, AMQP most appropriate for the control tier or server-based analysis functions
  • 24. Session title 24 IOT: STRINGENT TECH CHALLENGES FOR IT Scalability • IDC expects the global installed base of IoT endpoints to reach 212 billion connected devices by 2020 (Source: Worldwide Internet of Things (IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars, IDC, October 2013) • An individual intelligent system might gather and analyze billions of data objects from millions of distinct endpoints
  • 25. Session title 25 IOT: STRINGENT TECH CHALLENGES FOR IT Reliability • Many intelligent systems will be employed for mission-critical applications where system downtime can result in diminished productivity, dissatisfied customers, or lost revenue • Some intelligent systems will be used in safety-critical applications where system downtime can lead to loss of life or property or cause significant environmental or health hazards • Examples: emergency services, process control, real-time systems control, health applications
  • 26. Session title 26 IOT: STRINGENT TECH CHALLENGES FOR IT Security • Inherent exposure to public cloud and network services • Security systems and practices must be extended to protect against data loss, service theft, and increasingly sophisticated denial-of-service attacks in a scalable manner • Support cohesive authentication, authorization, and auditing capabilities to establish trust, govern access to resources, and ensure compliance • Strong encryption often needed
  • 27. Session title 27 THREE TIER ARCHITECTURE FOR IOT: DEVICE • Wide variety of intelligent endpoints (including relatively traditional client computers/OSs) • Standards-based wired and wireless networking protocols for connectivity • Standards-based data transport and messaging mechanisms are used to forward raw data and exchange control information • Up to 100s of thousands or even millions
  • 28. Session title 28 THREE TIER ARCHITECTURE FOR IOT: CONTROLLER • Intermediary that facilitates communications, offloads processing functions, and drives action • Analyzes tactical data and executes business rules and issues control information downstream • Collects, summarizes, and stores device data and forwards it upstream • Consider “data gravity” and network bandwidth/latency effects • Thousands of instances
  • 29. Session title 29 THREE TIER IOT ARCHITECTURE IOT: DATACENTER/CLOUD • Large-scale data computation and repository for data storage and strategic analysis • Virtual environment for instantiating applications, storing data, and executing complex event processing, distributed computing, and business analytics functions • Collects and examines aggregated data from the control tier and disseminates business rules downstream • Hundreds of instances
  • 31. Session title 31 SUMMING UP • IOT isn’t a single thing and the details vary a lot • Different IOT examples are at different maturity points • Some may never mature—technology, use case, cost • Data architectures and approaches matter • Intelligent systems architectures matter
  • 32. Session title 32 ABOUT ME • Red Hat Cloud Product Strategy • Twitter: @ghaff • Google+: Gordon Haff • Email: ghaff@redhat.com • Blog: http://bitmason.blogspot.com • Formerly: Illuminata (industry analyst), Data General (minicomputers/Unix/NUMA/etc.)

Hinweis der Redaktion

  1. Ignition Partners’ Rachel Chalmers argues this is the most important