Professional Documents
Culture Documents
Iot Architecture, Onem2M Model, Reference Model: L-T-P - (C) 4-0-0
Iot Architecture, Onem2M Model, Reference Model: L-T-P - (C) 4-0-0
L-T-P-[C] 4-0-0-[4]
1
Courseware and Reference Books
Text Books:
Mayur Ramgir, Internet of Things- Architecture, Implementation, and Security, Pearson Education India,
2019.
Reference Books:
1. Raj Kamal, INTERNET OF THINGS Architecture and Design Principles, McGraw Hill Education
(India) Private Limited, 2017.
2. S. Misra, A. Mukherjee, and A. Roy, Introduction to IoT, Cambridge University Press, 2020.
3. S. Misra, C. Roy, and A. Mukerjee, 2020, Introduction to Industrial Internet of Things and Industry 4.0,
CRC Press, 2020
4. Research Papers.
2
Lecture No 9
Revision
Two of the best-known architecture are those
supported by oneM2M and the IoT World Forum
(IoTWF).
3
While various IoT reference models exist, the one put
forth by the IoT World Forum offers clean, simplified
perspective on IoT
4
A Simplified IoT Architecture
5
The Core IoT Functional Stack
“Things” layer
At this layer, the physical devices need to fit the
constraints of the environment in which they are
deployed while still being able to provide the
information needed.
6
Communications network layer
When smart objects are not self-contained, they
need to communicate with an external system.
7
o Gateways and backhaul network sublayer
The gateway communicates directly with
the smart objects.
9
The following sections examine these elements and help
you architect your IoT communication network.
Battery-powered or power-connected
Mobile or static
Low or high reporting frequency
Simple or rich data
Report range
Object density per cell
10
Battery-powered or power-connected:
This classification is based on whether the object
carries its own energy supply or receives continuous
power from an external power source.
Mobile or static:
This classification is based on whether the “thing”
should move or always stay at the same location.
11
Simple or rich data:
This classification is based on the quantity of data
exchanged at each report cycle.
Report range:
This classification is based on the distance at which
the gateway is located.
For example, for your fitness band to communicate
with your phone, it needs to be located a few meters
away at most.
12
Signage - Signs collectively, especially commercial or
public display signs.
13
Layer 2: Communications Network Layer
Once you have determined the influence of the smart
object form factor over its transmission capabilities
(transmission range, data volume and frequency,
sensor density and mobility), you are ready to connect
the object and communicate.
14
The operational differences must be understood in
order to apply the correct handling to secure the target
assets.
15
One key parameter determining the choice of access
technology is the range between the smart object and
the information collector.
16
PAN (personal area network)
Scale of a few meters.
This is the personal space around a person.
A common wireless technology for this scale is
Bluetooth.
EMV stands for Europay, MasterCard® and Visa® and refers to the increased
security of payment card transactions through the use of a chip embedded in
credit, debit, and prepaid cards.
17
FAN (field area network)
Scale of several tens of meters to several hundred
meters.
FAN typically refers to an outdoor area larger than
a single group of house units.
A FAN is sometimes viewed as a group of NANs.
18
19
Layer 3: Applications and Analytics Layer
Once connected to a network, your smart objects
exchange information with other systems.
As soon as your IoT network spans more than a few sensors, the
power of the Internet of Things appears in the applications
that make use of the information exchanged
with the smart objects.
20
From an architectural standpoint, one basic
classification can be as follows:
Analytics application:
This type of application collects data from multiple
smart objects, processes the collected data, and
displays information resulting from the data that was
processed.
21
Control application:
This type of application controls the behavior of the
smart object or the behavior of an object related to the
smart object.
22
In the world of IoT, a possible classification of the
analytics function is as follows:
Data analytics:
This type of analytics processes the data collected by
smart objects and combines it to provide an intelligent
view related to the IoT system.
23
Network analytics:
Most IoT systems are built around smart objects
connected to the network.
24
Data Analytics Versus Business Benefits
Data analytics is undoubtedly a field where the value
of IoT is booming.
Smart Services
25
Smart services can also be used to measure the
efficiency of machines by detecting machine output,
speed, or other forms of usage evaluation.
26
IoT Data Management and Compute Stack
27
Smart objects need to connect to the cloud, and data
processing is centralized.
28
Minimizing latency:
Milliseconds matter for many types of industrial
systems,
29
It is not practical to transport vast amounts of
data from thousands or hundreds of thousands
of edge devices to the cloud.
30
An important design consideration, therefore, is
how to design an IoT network to manage this
volume of data in an efficient way such that the
data can be quickly analyzed and lead to
business benefits.
31
The Traditional IT Cloud Computing Model
32
Latency can be very high. Instead of dealing
with latency in the milliseconds range, large IoT
networks often introduce latency of hundreds to
thousands of milliseconds.
33
Fog Computing
The solution to the challenges mentioned in the previous section is
34
The IoT Data Management and Compute Stack with Fog
Computing
35
In this way, it is performing distributed analytics
such that the volume of data sent upstream is
greatly reduced.
For example, there might be a fog router on an oil derrick
that is monitoring all the sensor activity at that location.
36
Fog applications are as diverse as the Internet
of Things itself.
37
Contextual location awareness and low latency:
The fog node sits as close to the IoT endpoint as
possible to deliver distributed computing.
Geographic distribution:
In sharp contrast to the more centralized cloud,
the services and applications targeted by the fog
nodes demand widely distributed deployments.
38
Wireless communication between the fog and
the IoT endpoint:
Although it is possible to connect wired nodes,
the advantages of fog are greatest when dealing
with a large number of endpoints, and wireless
access is the easiest way to achieve such scale.
39
Edge Computing
Note
If clouds exist in the sky, and fog sits near the ground, then
mist is what actually sits on the ground.
40
The Hierarchy of Edge, Fog, and Cloud
41
While cloud resources are expected to be
homogenous, it is fair to expect that in many cases
both edge and fog resources will use different
operating systems, have different CPU and data
storage capabilities, and have different energy
consumption profiles.
42
Rather, they complement each other, and many use
cases actually require strong cooperation between
layers.
43
From an architectural standpoint, fog nodes closest
to the network edge receive the data from IoT
devices.
The fog IoT application then directs different types of
data to the optimal place for analysis:
44
In summary, when architecting an IoT network, you
should consider the amount of data to be analyzed and
the time sensitivity of this data.
45
IoT Interdependencies
46
So, if we look at IoT from another prospective or we
have sensors, we have actuators and a bunch of
other things that they are in between as shown in this
particular figure.
47
Power management responsibilities are:
How much power is required,
for how long it is going to power,
then what are the ways to harvest energy if at all
it can be harvested and how much power
consumption is going to take place at different
points of time, can it be optimized different
points of operation on and so on.
So, these are the different you know radios that can
help in communicating the data that is sensed
onward to other nodes.
48
So, alongside we also have things like virtual
machines which takes care of the virtualization of the
nodes.
So, these are the once MQTT CoAP, we are going to talk next in the
subsequent lectures. So, that will make our understanding clear.
49
IoT Service Oriented Architecture
50
Sensing layer basically takes care of sensing
through different RFIF tags sensors and so on.
Industrial IoT
IoT device connects to an IP network and
the global internet.
52
Consumer IoT
IoT device communicates within the locally
networked devices.
53
IoT and Associated Technologies
54
Then, we have the machine to machine
communication where one machine talks to another
without any human intervention.
55
Technical Deviations from Web
56
But difference is that we have a new set of protocols
that are used over here. So, the new set of protocols
and additionally in IoT, unlike in the case of web
things.
57
IoT Challenges
Security
Scalability
Energy efficiency
Bandwidth management
Modeling Analysis’
Interfacing
Interoperability
Data storage
Data analytics
Complexity management (e.g., SDN)
Summary
We learnt
58