SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Downloaden Sie, um offline zu lesen
Unit 2
IoT NETWORK ARCHITECTURE
AND DESIGN
One M2M IoT Standardized Architecture
One M2M IoT Standardized
Architecture
• The one M2M architecture divides IoT functions into three major domains:
– Application Layer
– Services Layer
– Network Layer
• Promotes interoperability through IT-friendly APIs & support wide range of IoT technologies
Application Layer
• The one M2M architecture gives major focus on connectivity between devices and their applications
• Includes the application-layer protocols
• Attempts to standardize northbound API definitions for interaction with BI systems
• Applications tend to be industry-specific and have their own sets of data models
• Thus shown as vertical entities
Services Layer
• Shown as horizontal framework across the vertical industry applications
• At this layer, horizontal modules include
– Physical network that IoT applications run on
– Underlying management protocols
– Hardware
• Examples include backhaul communications via cellular, MPLS networks, VPNs, and so onServices
Layer
• Riding on top is the common services layer.
• This conceptual layer adds APIs & middleware supporting third-party services & applications
Network Layer
• Communication domain for the IoT devices and endpoints
• Includes devices themselves and the communications network that links them
• Examples include wireless mesh technologies, such as IEEE 802.15.4, and wireless point-to-multipoint
systems, such as IEEE 801.11ah
IoT World Forum (IoTWF) Standardized Architecture
• IoTWF architectural committee published 7-layer IoT architectural reference model in 2014
• This committee was led by Cisco, IBM, Rockwell Automation, and others
• While various IoT reference models exist, the one put forth by the IoT World Forum offers clean,
simplified perspective on IoT
• Includes edge computing, data storage, and access
IoT World Forum (IoTWF) Standardized Architecture
IoT World Forum (IoTWF) Standardized Architecture
• Defines set of levels with control flowing from the center (cloud service or dedicated data center), to the
edge
• May includes sensors, devices, machines, and other types of intelligent end nodes
• In general, data travels up stack, originating from edge, and goes northbound to the center
IoT World Forum (IoTWF) Standardized Architecture
• Using this model, we are able to achieve:
– Decompose the IoT problem into smaller parts
– Identify different technologies at each layer and how they relate to one another
– Define a system in which different parts can be provided by different vendors
– Have a process of defining interfaces that leads to interoperability
– Define a tiered security model that is enforced at the transition points between levels
Layer 1: Physical Devices and Controllers Layer
• This layer is home to the “things” in the IoT, including various endpoint devices & sensors
• Size of these “things” can range from almost tiny sensors to huge machines in factory
• Their primary function is generating data and being capable of being controlled over network
Layer 2: Connectivity Layer
Layer 3: Edge Computing Layer
Upper Layers: Layers 4–7
A Simplified IoT Architecture
A Simplified IoT Architecture
• Framework is presented as 2 parallel stacks:
– IoT Data Management and Compute Stack
– Core IoT Functional Stack
• Intention is to simplify the IoT architecture into its most basic building blocks
A Simplified IoT Architecture
Expanded View of the Simplified IoT Architecture
The Core IoT Functional Stack
• Every published IoT model include core layers, including “things,” a communications network, and
applications
• Framework presented here separates core IoT & data management in parallel & aligned stack
• Allows you to carefully examine functions of both, network & applications, at each stage of complex IoT
system
The Core IoT Functional Stack
• This separation gives you better visibility into the functions of each layer
• Presentation in 3 layers is meant to simplify your understanding of IoT architecture into its most
foundational building blocks
• Such simple architecture needs to expanded
IoT Data Management and Compute Stack
• The “things” connected to the Internet are continuing to grow exponentially
• Cisco predicted that by 2020 there will be more than 50 billion devices connected to some form
of an IP network
• If number of devices is beyond conventional numbers, surely the data generated by these devices must
also be of serious concern
IoT Data Management and Compute Stack
IoT Data Management and Compute Stack
• Data-related problems need to be addressed:
– Bandwidth in last-mile IoT networks is very limited
– Latency can be very high (Instead of dealing with latency in the milliseconds range, large IoT
networks latency of hundreds to thousands of milliseconds)
– Volume of data transmitted can be high
– Big data is getting bigger
Fog Computing
• Solution to the various challenges is to distribute data management throughout the IoT system, as close
to the edge of the IP network as possible
• Best-known example of edge services in IoT is fog computing
• Any device with computing, storage, and network connectivity can be a fog node
Fog Computing
• Concept of fog was first developed by Flavio Bonomi and Rodolfo Milito of Cisco Systems
• In world of IoT, fog gets name from a relative comparison to computing in cloud layer
• Like clouds exist in sky, fog rests near ground
• In the same way, the intention of fog computing is to place resources as close to the ground—that is, the
IoT devices—as possible
Fog Computing
• Examples : industrial controllers, switches, routers, embedded servers, and IoT gateways
• An advantage of this structure is that fog node allows intelligence gathering (analytics) and control from
the closest possible point
• In one sense, this introduces new layer to the traditional IT computing model, one that is often referred to
as the “fog layer”
Fog Computing
Edge Computing
• Also called as “mist” computing
• If clouds exist in sky, and fog sits near ground, then mist is what actually sits on the ground
• Thus, concept of mist is to extend fog right into IoT endpoint device itself
• Fog computing solutions are being adopted by many industries
Hierarchy of Edge, Fog and Cloud
Introduction to M2M
• Machine-to-Machine (M2M) refers to networking of machines (or devices)
• Purpose of remote monitoring and control and data exchange
Introduction to M2M
Introduction to M2M
• M2M area network comprises of machines which have embedded hardware modules for sensing,
actuation and communication
• Various communication protocols such as ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-Bus,
Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc. can be used
Introduction to M2M
• Communication network provide connectivity to remote M2M area networks
• Communication network can use either wired or wireless networks (IP based)
M2M Gateway
• Since non-IP based protocols are used, M2M nodes within one network can’t communicate with nodes in
an external network
• To enable communication between remote M2M area networks, M2M gateways are used
M2M Gateway
Difference between IoT and M2M
Topic M2M IOT
Communication Proprietary or Non-IP Based IP Based
Protocols
Machines in M2M vs Homogeneous Machine Physical Objects that have
Things in IoT Unique Identifiers
Hardware vs Software More On Hardware More On Software
Emphasis
Data Collection & Collected In Point Solutions Collected In The Cloud (Can
Analysis And Often In On-premises Be Public, Private Or
Storage Hybrid Cloud
Applications Diagnosis Applications, Analytics Applications,
Service Management Enterprise Applications,
Applications, And On Remote Diagnosis And
Premises Management
Enterprise Applications Applications, etc.
Communication in IoT vs M2M
Software-Defined Networking (SDN)
• Architecture that separate control plane from data plane and centralizes network controller
• SDN controllers maintain a unified view of the network & make configuration, management and
provisioning simpler
• Underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized
hardware in conventional network
Software-Defined Networking (SDN)
Network Function Virtualization (NFV)
• Technology that controls virtualization to combine the heterogeneous network devices onto industry
standard high volume servers, switches and storage
• NFV is complementary to SDN as NFV can provide infrastructure on which SDN can run
Network Function Virtualization (NFV)
Key Elements of NFV
Virtualized Network Function (VNF)
• Software implementation of network function which is capable of running over NFV
Infrastructure
NFV Infrastructure
• Includes compute, network and storage resources that are virtualized
NFV Management and Orchestration
• Focuses on all virtualization-specific management tasks
• Covers orchestration and life-cycle management of physical and/or software resources that support
the infrastructure virtualization, and the life-cycle management of VNFs

Weitere ähnliche Inhalte

Ähnlich wie 2.pdf

Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introductionYadvendra bedi
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture LayerMarcus Maneja
 
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...rohanbawadkar
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxMeghaShree665225
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
iot course a hand on approach internet of things
iot course a hand on approach internet of thingsiot course a hand on approach internet of things
iot course a hand on approach internet of thingsYOYOFRX
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer EvolutiononeM2M
 

Ähnlich wie 2.pdf (20)

Atal io t introduction
Atal io t introductionAtal io t introduction
Atal io t introduction
 
Group 5 IoT Architecture Layer
Group 5 IoT Architecture LayerGroup 5 IoT Architecture Layer
Group 5 IoT Architecture Layer
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 3 IOT.docx
Unit 3 IOT.docxUnit 3 IOT.docx
Unit 3 IOT.docx
 
iot unit1.pdf
iot unit1.pdfiot unit1.pdf
iot unit1.pdf
 
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...
iot iotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotiotioti...
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
1.pptx
1.pptx1.pptx
1.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
IOT Network architecture and Design.pptx
IOT Network architecture and Design.pptxIOT Network architecture and Design.pptx
IOT Network architecture and Design.pptx
 
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
iot course a hand on approach internet of things
iot course a hand on approach internet of thingsiot course a hand on approach internet of things
iot course a hand on approach internet of things
 
Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]Fog Computing: What, How and Why [Shakeeb A.]
Fog Computing: What, How and Why [Shakeeb A.]
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 

Mehr von Nikhil Patankar

Mehr von Nikhil Patankar (7)

UNIT V.pdf
UNIT V.pdfUNIT V.pdf
UNIT V.pdf
 
Unit 6.pptx
Unit 6.pptxUnit 6.pptx
Unit 6.pptx
 
SMAC.pdf
SMAC.pdfSMAC.pdf
SMAC.pdf
 
SMAC.pptx
SMAC.pptxSMAC.pptx
SMAC.pptx
 
Radio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTRadio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOT
 
Fundamental IOT Key Mechanism and Resources
Fundamental IOT Key Mechanism and ResourcesFundamental IOT Key Mechanism and Resources
Fundamental IOT Key Mechanism and Resources
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 

Kürzlich hochgeladen

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 

Kürzlich hochgeladen (20)

Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 

2.pdf

  • 1. Unit 2 IoT NETWORK ARCHITECTURE AND DESIGN
  • 2. One M2M IoT Standardized Architecture
  • 3. One M2M IoT Standardized Architecture • The one M2M architecture divides IoT functions into three major domains: – Application Layer – Services Layer – Network Layer • Promotes interoperability through IT-friendly APIs & support wide range of IoT technologies Application Layer • The one M2M architecture gives major focus on connectivity between devices and their applications • Includes the application-layer protocols • Attempts to standardize northbound API definitions for interaction with BI systems • Applications tend to be industry-specific and have their own sets of data models • Thus shown as vertical entities
  • 4. Services Layer • Shown as horizontal framework across the vertical industry applications • At this layer, horizontal modules include – Physical network that IoT applications run on – Underlying management protocols – Hardware • Examples include backhaul communications via cellular, MPLS networks, VPNs, and so onServices Layer • Riding on top is the common services layer. • This conceptual layer adds APIs & middleware supporting third-party services & applications
  • 5. Network Layer • Communication domain for the IoT devices and endpoints • Includes devices themselves and the communications network that links them • Examples include wireless mesh technologies, such as IEEE 802.15.4, and wireless point-to-multipoint systems, such as IEEE 801.11ah
  • 6. IoT World Forum (IoTWF) Standardized Architecture • IoTWF architectural committee published 7-layer IoT architectural reference model in 2014 • This committee was led by Cisco, IBM, Rockwell Automation, and others • While various IoT reference models exist, the one put forth by the IoT World Forum offers clean, simplified perspective on IoT • Includes edge computing, data storage, and access
  • 7. IoT World Forum (IoTWF) Standardized Architecture
  • 8. IoT World Forum (IoTWF) Standardized Architecture • Defines set of levels with control flowing from the center (cloud service or dedicated data center), to the edge • May includes sensors, devices, machines, and other types of intelligent end nodes • In general, data travels up stack, originating from edge, and goes northbound to the center
  • 9. IoT World Forum (IoTWF) Standardized Architecture • Using this model, we are able to achieve: – Decompose the IoT problem into smaller parts – Identify different technologies at each layer and how they relate to one another – Define a system in which different parts can be provided by different vendors – Have a process of defining interfaces that leads to interoperability – Define a tiered security model that is enforced at the transition points between levels
  • 10. Layer 1: Physical Devices and Controllers Layer • This layer is home to the “things” in the IoT, including various endpoint devices & sensors • Size of these “things” can range from almost tiny sensors to huge machines in factory • Their primary function is generating data and being capable of being controlled over network
  • 12. Layer 3: Edge Computing Layer
  • 14. A Simplified IoT Architecture
  • 15. A Simplified IoT Architecture • Framework is presented as 2 parallel stacks: – IoT Data Management and Compute Stack – Core IoT Functional Stack • Intention is to simplify the IoT architecture into its most basic building blocks
  • 16. A Simplified IoT Architecture Expanded View of the Simplified IoT Architecture
  • 17. The Core IoT Functional Stack • Every published IoT model include core layers, including “things,” a communications network, and applications • Framework presented here separates core IoT & data management in parallel & aligned stack • Allows you to carefully examine functions of both, network & applications, at each stage of complex IoT system
  • 18. The Core IoT Functional Stack • This separation gives you better visibility into the functions of each layer • Presentation in 3 layers is meant to simplify your understanding of IoT architecture into its most foundational building blocks • Such simple architecture needs to expanded
  • 19. IoT Data Management and Compute Stack • The “things” connected to the Internet are continuing to grow exponentially • Cisco predicted that by 2020 there will be more than 50 billion devices connected to some form of an IP network • If number of devices is beyond conventional numbers, surely the data generated by these devices must also be of serious concern
  • 20. IoT Data Management and Compute Stack
  • 21. IoT Data Management and Compute Stack • Data-related problems need to be addressed: – Bandwidth in last-mile IoT networks is very limited – Latency can be very high (Instead of dealing with latency in the milliseconds range, large IoT networks latency of hundreds to thousands of milliseconds) – Volume of data transmitted can be high – Big data is getting bigger
  • 22. Fog Computing • Solution to the various challenges is to distribute data management throughout the IoT system, as close to the edge of the IP network as possible • Best-known example of edge services in IoT is fog computing • Any device with computing, storage, and network connectivity can be a fog node
  • 23. Fog Computing • Concept of fog was first developed by Flavio Bonomi and Rodolfo Milito of Cisco Systems • In world of IoT, fog gets name from a relative comparison to computing in cloud layer • Like clouds exist in sky, fog rests near ground • In the same way, the intention of fog computing is to place resources as close to the ground—that is, the IoT devices—as possible
  • 24. Fog Computing • Examples : industrial controllers, switches, routers, embedded servers, and IoT gateways • An advantage of this structure is that fog node allows intelligence gathering (analytics) and control from the closest possible point • In one sense, this introduces new layer to the traditional IT computing model, one that is often referred to as the “fog layer”
  • 26. Edge Computing • Also called as “mist” computing • If clouds exist in sky, and fog sits near ground, then mist is what actually sits on the ground • Thus, concept of mist is to extend fog right into IoT endpoint device itself • Fog computing solutions are being adopted by many industries
  • 27. Hierarchy of Edge, Fog and Cloud
  • 28. Introduction to M2M • Machine-to-Machine (M2M) refers to networking of machines (or devices) • Purpose of remote monitoring and control and data exchange
  • 30. Introduction to M2M • M2M area network comprises of machines which have embedded hardware modules for sensing, actuation and communication • Various communication protocols such as ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc. can be used
  • 31. Introduction to M2M • Communication network provide connectivity to remote M2M area networks • Communication network can use either wired or wireless networks (IP based)
  • 32. M2M Gateway • Since non-IP based protocols are used, M2M nodes within one network can’t communicate with nodes in an external network • To enable communication between remote M2M area networks, M2M gateways are used
  • 34. Difference between IoT and M2M Topic M2M IOT Communication Proprietary or Non-IP Based IP Based Protocols Machines in M2M vs Homogeneous Machine Physical Objects that have Things in IoT Unique Identifiers Hardware vs Software More On Hardware More On Software Emphasis Data Collection & Collected In Point Solutions Collected In The Cloud (Can Analysis And Often In On-premises Be Public, Private Or Storage Hybrid Cloud Applications Diagnosis Applications, Analytics Applications, Service Management Enterprise Applications, Applications, And On Remote Diagnosis And Premises Management Enterprise Applications Applications, etc.
  • 36. Software-Defined Networking (SDN) • Architecture that separate control plane from data plane and centralizes network controller • SDN controllers maintain a unified view of the network & make configuration, management and provisioning simpler • Underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional network
  • 38. Network Function Virtualization (NFV) • Technology that controls virtualization to combine the heterogeneous network devices onto industry standard high volume servers, switches and storage • NFV is complementary to SDN as NFV can provide infrastructure on which SDN can run
  • 40. Key Elements of NFV Virtualized Network Function (VNF) • Software implementation of network function which is capable of running over NFV Infrastructure NFV Infrastructure • Includes compute, network and storage resources that are virtualized NFV Management and Orchestration • Focuses on all virtualization-specific management tasks • Covers orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs