SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
ARCHITECTURE LAYERS
INTERNETOF THINGS
IoT
BY GROUP 5
IoT solutions have
become a regular part of
our lives. From the
smartwatch on your
wrist to industrial
enterprises, connected
devices are everywhere.
Having things work for us
is no longer sci-fi fantasy.
MAJOR IOT BUILDING BLOCKS AND LAYERS
There is no single, agreed-upon IoT architecture. It varies in complexity and number of
architecturallayersdependingon a particularbusiness task.
For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as
many as seven layers.
The standardized architectural model proposed by IoT industry leaders.
MAJOR IOT BUILDING BLOCKS AND LAYERS
The key buildingblocks of any Iot structure are alwaysthe same, namely:
• smart things;
• networks and gatewaysenabling low-
power devices (which is often the case
in IoT) to enter the big Internet;
• the middlewareor IoT platforms
providingdata storage spaces and
advancedcomputing engines along
with analytical capabilities;and
• applications,allowingend users to
benefit from IoT and manipulatethe
physicalworld.
MAJOR IOT BUILDING BLOCKS AND LAYERS
These elements make up the backbone of any IoT system upon which effective, multi-layered
architecture can be developed.Most commonly, these layersare:
• the PERCEPTION LAYER hosting smart things;
• the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the
cloud and vice versa via networks and gateways;
• the PROCESSING LAYER employing IoT platforms to accumulateand manage all data
streams; and
• the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control
to end users.
Besides the most essential components, the article also describes three additional layers:
• the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge,
where IoT things collect new information.Typically,edgy computing occurs on gateways;
• the BUSINESS LAYER where businesses make decisions based on the data;and
• the SECURITY LAYER encompassing all other layers.
PERCEPTION LAYER
Converting analog signals into digital data and vice versa
The initialstage of any IoT system embraces a wide range of “things” or endpoint
devices that act as a bridge between the real and digital worlds. They vary in form and
size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be
dividedinto the following large groups
• Sensors such as probes, gauges, meters, and others. They
collect physicalparameterslike temperature or humidity, turn
them into electrical signals, and send them to the IoT system.
IoT sensors are typicallysmall and consume little power.
• Actuators, translatingelectrical signalsfrom the IoT system
into physicalactions. Actuatorsare used in motor controllers,
lasers, robotic arms.
• Machines and devices connected to sensors and actuatorsor
having them as integral parts.
CONNECTIVITY LAYER
Enabling data transmission
The second level is in charge of all communicationsacross devices, networks, and cloud
services that make up the IoT infrastructure. The connectivitybetween the physical
layer and the cloud is achievedin two ways:
The communications between devices and cloud services or gateways involve different networking
technologies.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
• This level is essential for enabling IoT systems
to meet the speed, security, and scale
requirementsof the 5th generation mobile
network or 5G. The new wireless standard
promises faster speeds, lower latency, and
the abilityto handle many more connected
devices, than the current 4G standard.
• The idea behind edge or fog computing is to
process and store information as early and as
close to its sources as possible. Thisapproach
allowsfor analyzingand transforming high
volumes of real-time data locally,at the edge
of the networks. Thus, you save the time and
other resources that otherwise would be
needed to send all datato cloud services.
The result is reduced system latency that
leadsto real-time responses and enhanced
performance.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
Edge computing occurs on gateways,local servers, or other edge nodes scattered
across the network. At this level, data can be:
• evaluatedto determine if it needs further processing at higher levels,
• formatted for further processing,
• decoded,
• filtered, and
• redirected to an additional destination
PROCESSING LAYER
Making raw data useful
The processing layer accumulates, stores, and processes data that comes
from the previous layer. All these tasks are commonly handled via IoT
platforms and include two major stages
Data accumulation stage Data abstraction stage
• The real-time data is captured via
an API and put at rest to meet the
requirements of non-real-time
applications. The data accumulation
component stage works as a transit hub
between event-based data generation and
query-based data consumption.
• Here, datapreparationis finalized so that
consumer applicationscan use it to
generate insights. The entire process
involvesthe following steps:
1. combining datafrom different sources,
both IoT and non-IoT,including ERM, ERP,
and CRM systems;
2. reconcilingmultiple data formats; and
3. aggregating datain one place or making it
accessible regardless of locationthrough
data virtualization.
APPLICATION LAYER
Addressing business requirements
At this layer, informationis analyzedby software to give answers to key business
questions. There are hundredsof IoT applicationsthat vary in complexity and function,
using different technology stacks and operatingsystems. Some examples are:
• device monitoringand controlsoftware,
• mobile apps for simple interactions,
• business intelligenceservices, and
• analyticsolutionsusing machine learning.
Currently, applicationscan be built right on top of IoT platforms that offer software
developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced
analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith
middleware.
BUSINESS LAYER
Implementing data-driven solutions
The informationgenerated at the previouslayersbrings value if only it results in problem-
solving solution and achieving business goals. New data must initiatecollaboration
between stakeholderswho in turn introduce new processes to enhance productivity.
The decision-makingusually involvesmore than one person working with more than one
software solution. For this reason, the business layer is defined as a separate stage,
higher than a single applicationlayer.
SECURITY LAYER
Preventing data-breaches
It goes without saying that there should be a security layer covering all the above-
mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll
only point out the basic features of the safe architecture across different levels.
Device security. Modern manufacturersof IoT devices typicallyintegratesecurity
features both in the hardware and firmware installedon it. This includes
• embedded TPM (Trusted Platform Module) chips with cryptographickeys for
authenticationand protectionof endpointdevices;
• a secure boot process that prevents unauthorizedcode from running on a powered-
up device;
• updatingsecurity patches on a regular basis; and
• physicalprotectionlike metal shields to block physicalaccess to the device.
SECURITY LAYER
Preventing data-breaches
Connection security. Whether datais being sent over devices, networks, or applications,
it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho
interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and
DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure
end-to-end data protection.
Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate
risks of exposing sensitive information to intruders. Cloud security also involves
authenticationand authorization mechanismsto limit access to the IoT applications.
Another importantsecurity method is device identitymanagement to verify the device’s
credibilitybefore allowing it to connect to the cloud.
Reference:
• https://www.altexsoft.com/blog/iot-architecture-layers-
components/
• https://www.hindawi.com/journals/jece/2017/9324035/
#:~:text=Architecture%20of%20IoT%20(A%3A%20three,(
B%3A%20five%20layers).&text=%5D.,the%20architecture
%20with%20three%20layers
• https://www.zibtek.com/blog/iot-architecture/
THANK YOU!
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja

Más contenido relacionado

La actualidad más candente

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt sutrishnakar1995
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Slide Marvels
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-pptSonalSharnam
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Amarjeetsingh Thakur
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) PresentationJason K
 

La actualidad más candente (20)

Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
IoT
IoTIoT
IoT
 
Internet of things(IoT)
Internet of things(IoT)Internet of things(IoT)
Internet of things(IoT)
 
IoT ppt
IoT pptIoT ppt
IoT ppt
 
IoT Overview
IoT OverviewIoT Overview
IoT Overview
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
 
Iot internet-of-things-ppt
Iot internet-of-things-pptIot internet-of-things-ppt
Iot internet-of-things-ppt
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IoT
IoTIoT
IoT
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
 
IoT Smart Home
IoT Smart HomeIoT Smart Home
IoT Smart Home
 
Internet of things ppt
Internet of things pptInternet of things ppt
Internet of things ppt
 

Similar a Group 5 IoT Architecture Layer

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-SolutionsManoj Punamia
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel IoT
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesSatyaKVivek
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulKellton Tech Solutions Ltd
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...Mistral Solutions
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedCognizant
 

Similar a Group 5 IoT Architecture Layer (20)

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-Solutions
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
NX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT InterfaceNX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT Interface
 
Nx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interfaceNx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interface
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA Unleashed
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Group 5 IoT Architecture Layer

  • 2. IoT solutions have become a regular part of our lives. From the smartwatch on your wrist to industrial enterprises, connected devices are everywhere. Having things work for us is no longer sci-fi fantasy.
  • 3. MAJOR IOT BUILDING BLOCKS AND LAYERS There is no single, agreed-upon IoT architecture. It varies in complexity and number of architecturallayersdependingon a particularbusiness task. For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as many as seven layers. The standardized architectural model proposed by IoT industry leaders.
  • 4. MAJOR IOT BUILDING BLOCKS AND LAYERS The key buildingblocks of any Iot structure are alwaysthe same, namely: • smart things; • networks and gatewaysenabling low- power devices (which is often the case in IoT) to enter the big Internet; • the middlewareor IoT platforms providingdata storage spaces and advancedcomputing engines along with analytical capabilities;and • applications,allowingend users to benefit from IoT and manipulatethe physicalworld.
  • 5. MAJOR IOT BUILDING BLOCKS AND LAYERS These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed.Most commonly, these layersare: • the PERCEPTION LAYER hosting smart things; • the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the cloud and vice versa via networks and gateways; • the PROCESSING LAYER employing IoT platforms to accumulateand manage all data streams; and • the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control to end users. Besides the most essential components, the article also describes three additional layers: • the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge, where IoT things collect new information.Typically,edgy computing occurs on gateways; • the BUSINESS LAYER where businesses make decisions based on the data;and • the SECURITY LAYER encompassing all other layers.
  • 6. PERCEPTION LAYER Converting analog signals into digital data and vice versa The initialstage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital worlds. They vary in form and size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be dividedinto the following large groups • Sensors such as probes, gauges, meters, and others. They collect physicalparameterslike temperature or humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typicallysmall and consume little power. • Actuators, translatingelectrical signalsfrom the IoT system into physicalactions. Actuatorsare used in motor controllers, lasers, robotic arms. • Machines and devices connected to sensors and actuatorsor having them as integral parts.
  • 7. CONNECTIVITY LAYER Enabling data transmission The second level is in charge of all communicationsacross devices, networks, and cloud services that make up the IoT infrastructure. The connectivitybetween the physical layer and the cloud is achievedin two ways: The communications between devices and cloud services or gateways involve different networking technologies.
  • 8. EDGE OR FOG COMPUTING LAYER Reducing system latency • This level is essential for enabling IoT systems to meet the speed, security, and scale requirementsof the 5th generation mobile network or 5G. The new wireless standard promises faster speeds, lower latency, and the abilityto handle many more connected devices, than the current 4G standard. • The idea behind edge or fog computing is to process and store information as early and as close to its sources as possible. Thisapproach allowsfor analyzingand transforming high volumes of real-time data locally,at the edge of the networks. Thus, you save the time and other resources that otherwise would be needed to send all datato cloud services. The result is reduced system latency that leadsto real-time responses and enhanced performance.
  • 9. EDGE OR FOG COMPUTING LAYER Reducing system latency Edge computing occurs on gateways,local servers, or other edge nodes scattered across the network. At this level, data can be: • evaluatedto determine if it needs further processing at higher levels, • formatted for further processing, • decoded, • filtered, and • redirected to an additional destination
  • 10. PROCESSING LAYER Making raw data useful The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled via IoT platforms and include two major stages Data accumulation stage Data abstraction stage • The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation component stage works as a transit hub between event-based data generation and query-based data consumption. • Here, datapreparationis finalized so that consumer applicationscan use it to generate insights. The entire process involvesthe following steps: 1. combining datafrom different sources, both IoT and non-IoT,including ERM, ERP, and CRM systems; 2. reconcilingmultiple data formats; and 3. aggregating datain one place or making it accessible regardless of locationthrough data virtualization.
  • 11. APPLICATION LAYER Addressing business requirements At this layer, informationis analyzedby software to give answers to key business questions. There are hundredsof IoT applicationsthat vary in complexity and function, using different technology stacks and operatingsystems. Some examples are: • device monitoringand controlsoftware, • mobile apps for simple interactions, • business intelligenceservices, and • analyticsolutionsusing machine learning. Currently, applicationscan be built right on top of IoT platforms that offer software developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith middleware.
  • 12. BUSINESS LAYER Implementing data-driven solutions The informationgenerated at the previouslayersbrings value if only it results in problem- solving solution and achieving business goals. New data must initiatecollaboration between stakeholderswho in turn introduce new processes to enhance productivity. The decision-makingusually involvesmore than one person working with more than one software solution. For this reason, the business layer is defined as a separate stage, higher than a single applicationlayer.
  • 13. SECURITY LAYER Preventing data-breaches It goes without saying that there should be a security layer covering all the above- mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll only point out the basic features of the safe architecture across different levels. Device security. Modern manufacturersof IoT devices typicallyintegratesecurity features both in the hardware and firmware installedon it. This includes • embedded TPM (Trusted Platform Module) chips with cryptographickeys for authenticationand protectionof endpointdevices; • a secure boot process that prevents unauthorizedcode from running on a powered- up device; • updatingsecurity patches on a regular basis; and • physicalprotectionlike metal shields to block physicalaccess to the device.
  • 14. SECURITY LAYER Preventing data-breaches Connection security. Whether datais being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure end-to-end data protection. Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders. Cloud security also involves authenticationand authorization mechanismsto limit access to the IoT applications. Another importantsecurity method is device identitymanagement to verify the device’s credibilitybefore allowing it to connect to the cloud.
  • 16. THANK YOU! Group 5: Reymart John Aguho Lawrence Valdez Trishia Mae Salazar Gayle Allyson Guitones Dempster Winston Corpuz Matthew Erickson Quinto Marc Vincent Maneja