SlideShare a Scribd company logo
1 of 104
IoT-A ARM
Final ARM (D1.5)
Introduction
Introduction
• Nowadays solutions:
• Vertical silos -> is not like internet but intranet
Usage of ARM
• (ARM > Architecture reference model)
1. Cognitive aid
2. Common grounding
3. Generation of architectures
4. Identify differences in derived architectures
5. Achieving interoperability
6. System roadmaps and product life cycles
7. Benchmarking
Content Table
• Reference Model
• Reference Architecture
• View
• Function View
• Information View
• Development & Operation view
• Perspective
• Guidance
Reference Model
Interaction of all sub-models in the IoT Reference Model
Domain Model
• purpose: common understanding of the target domain in question
• "The things in the internet of things." Poster at the (IoT 2010):
The IoT domain suffers from an inconsistent usage and understanding
of the meaning of many central terms
• The domain model includes
• definition of the main concepts (terms)
• their responsibilities
• thier relationships
Physical Entity
• The Physical Entity is an identifiable part of the physical
environment that is of interest to the User for the
completion of the goal.
• e.g. humans, animals, cars, stores, room, computers, …
Virtual Entity
• PEs (1) are represented in the digital world by VE (*).
• Tho fundamental properties:
1. They are Digital Arterfacts.
2. Ideally, VEs are synchronized representations of a given set of aspects (or
properties) of respective PE.
User (of service)
• Not include different roles/users in the Domain Model
because underlying taxonomies depends on use cases.
• common option for modelling roles:
• Raymond, K. (1995). Reference model of open distributed processing (RM-
ODP): Introduction. Open Distributed Processing, Springer: 3-14.
1. Human user
2. Active Digitial Artifacts
Device
1. Sensor
2. Actuator
3. Tag
Resources
• software components
1. On-Device Resources:
• bridge between the digital and physical world
• may be storage resources (with limited capacity)
2. Network Resources
• run on dedicated server (or cloud)
• aggregate or more high-level information
• may be storage resources about Physical Entities (e.g. state, location …)
Services (1/2)
• MacKenzie, C. M., et al. (2006).
• "Services are the mechanism by which needs and capabilities are
brought together".
• Meyer, S., et al. (2013).
• "Software components with well-defined and standardized interfaces, which
enable access to other, heterogeneous components with native interfaces
and expose their functionality as a unit of work to a business process."
• Interaction with the service is done via the network.
Services (2/2)
1. non-IoT Services
• e.g. enterprise system
2. IoT Services
• Resource-level Services
• Virtual Entity-level Services
• Integrated Services
• Services should be orchestrated together to form a complete system.
• Associations between VEs and Service are important for look-
up and discovery processes.
Information Model
• Information Model defines the structure (e.g. relations, attributes,
services) of all the information for VE on a conceptual level.
Lefort, L. (2005). "Ontology for quantity kinds and
units: units and quantities definitions." W3 Semantic
Sensor Network Incubator Activity.
Other Information models in IoT-A
• Entity model
• Heras, R. d. l. and N. Santos "Internet of Things Architecture IoT-A Project
Internal Report D4.1 - Concepts and Solutions for Identification and Lookup of
IoT Resources."
• Resource model & Service description model
• Martín, G. "Internet of Things Architecture IoT-A Project Deliverable D2.1 -
Resource Description Specification."
• Event model
• Völksen, G. (2013). "Internet-of-Things Architecture IoT-A Project Deliverable
D2.6 - Event Representation and Processing ".
Functional Model
• MacKenzie, C. M., et al. (2006). "Reference model for service oriented
architecture 1.0." OASIS Standard 12:
• “The Functional Model is an abstract framework for understanding the
main Functionality Groups (FG) and their interactions. “
Functional Model
Reference architecture
How to describe the architecture? (1/2)
• [ IEEE Architecture] “A viewpoint defines the stakeholders whose
concerns are reflected in the viewpoint and the guidelines, principles,
and template models for constructing its views.“
• A view is composed of viewpoints, which aggregate several
architectural concepts in order to make the work with views easier.
• Example: Functional view:
• functional-decomposition viewpoint
• interaction viewpoint
• interface viewpoint
How to describe the architecture? (2/2)
• Rozanski, N. and E. Woods (2011). Software systems architecture:
working with stakeholders using viewpoints and perspectives,
Addison-Wesley.
• Some qualitative aspirations cut across more than one view
• A quality property is an externally visible, non-functional property of a
system such as performance, security, or scalability
• They are referred to perspectives. (Discuss latter)
• An architectural perspective is a collection of activities, tactics, and guidelines
that are used to ensure that a system exhibits a particular set of related
quality properties that require consideration across a number of the
system’s architectural views.
Good Material
• Harrison, R. (2007). TOGAF version 811 enterprise edition, Van Haren.
• Link: Developing Architecture Views (chapter 31)
Functional View
describes the functional building blocks of the architecture
Functional View
• Unified Requirement: Link
From WP6
1. Map UR to FG
2. Clusterize functionality to FC
IoT Process Management
IoT Process Management
Process Modelling
• Provides an environment for the modelling of IoT-aware processes
that will be serialized and executed in the Process Execution FC.
• Default function set
• IoT business processes modeler
• In D2.2, D2.4, D2.5
IoT Process Management
Process Execution
• Executes IoT-aware processes that have been modelled in the Process
Modelling FC. This execution is achieved by utilizing IoT Services that
are orchestrated in the Service Organization layer.
• Default function set
• Deploy process models to execution environments
• Align application requirements with service capabilities
• Run application
Interactions for Process Modelling
Interactions for Process Deployment and
Execution
Service Organization
Service Organization
Service Orchestration
• The Service Orchestration component resolves the IoT Services
that are suitable to fulfil service requests coming from Process
Execution component or from IoT -A users.
• Default function set
• Orchestrate IoT Services
• In D2.3, D2.5
Service Organization
Service Composition
• The Service Composition FC resolves services that are composed
of IoT Services and other services in order to create services
with extended functionality.
• Default function set
• Support flexible service compositions
• Increase QoI
• In D2.3, D2.5
Service Organization
Service Choreography
• allows Users to register their service request. By the time a suitable
service offers its capabilities on the blackboard the Service
Choreography FC will arrange the interaction between user and
service.
• Default function set
• Orchestrate IoT services (publish service request)
• In D2.6
IoT Services
IoT Services
IoT Service Resolution (1/2)
• User use it to find service.
• Service specification to query
• Service use it to manage service descriptions > lookup, discover
• Service identifier
• Service locator
• Further information, e.g. geographic area
IoT Services
IoT Service Resolution (2/2)
• Default function set
• Resolve Service with ID
• (Un)Subscribe to Resolution for Service with given ID (when locator change)
• Lockup Service given ID
• (Un)Subscribe to Lookup for Service with given ID (when description change)
• Discover service with given spec
• (Un)Subscribe to Discovery with given spec
• Manage description
• In D2.1, D4.3
IoT Services
IoT Service
• Software component exposing a Resource through a well- defined
interface to make it accessible to other parts of the IoT system, often
via the Internet.
• Service also deal with non-functional aspect (e.g. timeliness)
• Default function set
• Get Information
• Subscribe Information
• Put Information (store, configure, control)
Resolve Service Identifier to URL
Subscribe Resolution of Service Identifier to URL
Look up Service Description based on Service Identifier
Subscribe Look-up of Service Description based on Service Identifier
Discover Service based on Service Specification
Subscribe Discovery of Service Descriptions based on Service Specification
Insert Service Description
Update Service Description
Delete Service Description
Virtual Entity
Virtual Entity
VE
Resolution
Retrieve association
between VEs and IoT
Services.
(Subscribe) Discover VE-related services
(Subscribe) Lookup VE-related services
Manage association
Monitoring Automatically find new
associations
Assert static Association
Assert dynamic Association
Delete/Update
VE Service Overall access point to
particular entity (facade)
Read/Set Attribute
Look up Associations based on VE-ID and VE Service Specification
Subscribe Look-up of Associations for VE
Identifier and VE Service Specification
Discover Associations based on VE
Specifications and VE Service Specifications
Subscribe Discovery of Associations based on
VE Specification and VE Service Specification
Insert Association
Update Associations
Delete Association
Assert Static VE-IoT Service Association
Discover Dynamic Associations between VEs and Services
Monitor and Update Existing Dynamic Associations
Monitor and Delete Existing Dynamic Associations
Communication
Definition of Network Units
Application Description Telnet,
FTP
Message
Transport Specifies how to reliably
handle data transfer.
TCP, UDP Segment, Packet
Network Specifies addressing
assignments and how packets
are forwarded.
IP Datagram, Packet
Link Specifies the organization of
data into frames and how to
send frames over a network.
Drivers,
interface card
Frame
Material: An Introduction to TCP/IP (38 page)
Communication
End To End Communication
• End To End Communication abstraction:
• Reliable transfer, transport, translation
• Proxies/gateways support
• Tuning configuration parameters
• Default function set
• Transmit Message
• Configure Message Arguments
• Cache and Proxy
• Translate End to End Protocol
• Pass Context
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Communication
Network Communication
• Enabling communication between networks
• Default function set
• Transmit Packet (Datagram)
• Configure Packet Arguments
• Translate Network Protocol
• Route Packet
• Resolve Locator/ID
• Manage Packet Queue
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Communication
Hop To Hop Communication
• 1st abstraction of the device’s physical communication tech.
• Enable the usage and the configuration of any different link layer tech
• Default function set
• Transmit Frame
• Configure Frame Arguments
• Route Frame
• Manage Frame Queue
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Security
Security
Authorization
• Managing access control policies
• Performing access control decision (when access to a restricted
resources)
• Default function set
• Authorize
• Manage Policies
• In D4.2
Security
Authentication
• Check the credentials provided by a user.
• Valid > return assertion. Use the assertion
• Default function set
• Authenticate
• Verify
• In D4.2
Security
Identity Management
• Address privacy question by
• Pseudonyms and accessory information to trusted subjects so that they can
operate anonymously
• Default function set
• Create Identity
• Resolve pseudonym
• In D4.2
Security
Key Exchange and Management
• Enable secure communications between multiple IoT-A peers
• Not need initial knowledge of each other
• Default function set
• Securely distribute keys
• Register security capabilities
• In D4.2
Security
Trust and Reputation Architecture
• Collect user reputation scores and calculates service trust levels
• Default function set
• Request Reputation Information
• Provide Reputation Information
• In D4.2
Management (Façade)
Management
Configuration
• Configuration for FC, Device …
• Default function set
• Retrieve Configuration
• Set Configuration
Management
Fault
• Default function set
• Handle Fault
• Monitor Fault
• Retrieve Fault
Management
Member
• Manage membership and associated information of entity
• FG, FC, VE, IoT Service, Device, App, User
• Default function set
• Monitor Member
• Retrieve Member
• Update Member
Management
Reporting
• Overlay for the other FCs.
• Determine the efficiency of the system
• Default function set
• Retrieve Report
Information View
shows how the information flow is routed through the system and what requests
are needed to query for or to subscribe to information offered by certain functional
components.
Development & Operation view
explains the operational behavior of the functional components
and the interplay of them.
Perspective
An architectural perspective is a collection of activities, tactics, and guidelines
that are used to ensure that a system exhibits a particular set of related quality
properties that require consideration across a number of the system’s
architectural views.
• For each of the perspectives, tactics are listed.
• The tactics are state-of–the art methodologies commonly used in
today’s systems architectures.
Perspective
Evolution and Interoperability
Activities • Characterize the evolution needs
• Assess the current ease of evolution
• Consider the evolution trade-offs
• Rework the architecture
Tactics • Contain change
• Create extensible interfaces
• Apply design techniques that facilitate change
• Apply meta model-based architectural styles
• Build variation points into the software
• Use standard extension points
• Achieve reliable change
• Preserve development environments
Perspective
Performance and scalability
Activities • Capture the performance requirements
• Create the performance models
• Analyze the performance model
• Conduct practical testing
• Assess against the requirements
• Rework the architecture
Tactics • Optimize repeated processing
• Reduce contention via replication
• Prioritize processing
• Consolidate related workload
• Distribute processing over time
• Minimize the use of shared resources
• Reuse resources and results
• Partition and parallelize
• Scale up or scale out
• Degrade gracefully
• Use asynchronous processing
• Relax transactional consistency
• Make design compromises
Perspective
Trust
Activities • Capture trust requirements
• Perform risk analysis
• Check interoperability requirements and their impact on
• trust between heterogeneous subjects
• Define trust model
• Consider risks derived from malicious or unintentional misuse of IoT
systems
Tactics • Harden root of trust
• Ensure physical security and implement tampering
• detection
• Ensure and check data freshness
• Consider the impact of security/performance tradeoffs on trust
• Use (trusted) infrastructural Trust and Reputation
• Agents for scalability
• Use security imprinting
• Check system integrity often
• Balance privacy vs. non-repudiation (accountability)
Perspective
Security (1/2)
Activities • Capture the security requirements
• Check interoperability requirements for impacts on
• security processes between heterogenous peers
• Conduct risk analysis
• Use infrastructural Authentication components that support more
Identity Frameworks for scalability and interoperability
• Use infrastructural or federated Key Exchange
• Management to secure communication initiation and tunnelling between
gateways for interoperability
• Use an Authorization component to enable interoperability with other
systems
• Define security impact on interaction model
• Address all aspects of Service and Communication Security
• Integrate the trust model and support privacy features
• Identify security hardware requirements
• Consider performance/security tradeoffs
• Validate against requirements
• Avoid Over-The-Air device management; if necessary secure properly
Perspective
Security (2/2)
Tactics • Use an extended Internet Threat Model for which takes into account
specific IoT communication vulnerabilities
• Harden infrastructural functional components
• Authenticate subjects
• Define and enforce access policies
• Secure communication infrastructure (gateways, infrastructure services)
• Secure communication between subjects
• Secure peripheral networks (data link layer security, network entry,
secure routing, mobility and handover)
• Avoid wherever possible wireless communication
• Physically protect peripheral devices or consider peripheral devices as
available to malicious users in the attacker model
Perspective
Privacy
Activities • Capture the privacy requirements
• Conduct risk analysis
• Evaluate compliancy with existing privacy frameworks
Tactics • Use an Identity Management component that supports
• Pseudonymization
• Avoid transmitting identifiers in clear especially over wireless connections
• Minimize unauthorized access to implicit information (e.g. deriving
location information from service access requests)
• Validate against requirements
• Consider the impact of security/performance tradeoffs on privacy
• Enable the user to control the privacy (and thus security and trust)
settings
• Balance privacy vs. non-repudiation (accountability)
Perspective
Availability and resilience
Activities • Capture the availability requirements
• Produce the availability schedule
• Estimate platform availability
• Estimate functional availability
• Assess against the requirements
• Rework the architecture
Tactics • Select fault-tolerant hardware
• Use high-availability clustering and load balancing
• Log transactions
• Apply software availability solutions
• Select or create fault-tolerant software
• Design for failure
• Allow for component replication
• Relax transactional consistency
• Identify backup and disaster recovery solution
Guidance
explaining the usage of the IoT ARM, e.g.:
derivation of domain-specific architectures from the ARM
Architecture concepts
• Physical View
• Context View
• Functional View
• Information View
• Deployment View
Virtual Entity
Virtual-Entity (VE) Resolution
• What’s association?
• Dynamic?
• In D4.3

More Related Content

What's hot

Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and materialSDMCET DHARWAD
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingTonex
 
Iot ppt
Iot pptIot ppt
Iot pptpiyuu7
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with moduleIsp university Multan
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 

What's hot (20)

Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
6lowpan
6lowpan6lowpan
6lowpan
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
IOT DATA AND BIG DATA
IOT DATA AND BIG DATAIOT DATA AND BIG DATA
IOT DATA AND BIG DATA
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
AWS for IoT
AWS for IoTAWS for IoT
AWS for IoT
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Analytics in IOT
Analytics in IOTAnalytics in IOT
Analytics in IOT
 

Viewers also liked

El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.07956663
 
Kemahiran bernilai tambah
Kemahiran bernilai tambahKemahiran bernilai tambah
Kemahiran bernilai tambahhallen77
 
Narrative photo writing task term 4
Narrative photo writing task term 4Narrative photo writing task term 4
Narrative photo writing task term 4Gavin Clark
 
Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Gavin Clark
 
Javascript session june 2013 (iii) jquery json
Javascript session june 2013 (iii) jquery   jsonJavascript session june 2013 (iii) jquery   json
Javascript session june 2013 (iii) jquery jsonabksharma
 
Auriga gamification the processes acquired
Auriga gamification the processes acquiredAuriga gamification the processes acquired
Auriga gamification the processes acquiredabksharma
 
Social Media Marketing - An Overview
Social Media Marketing - An OverviewSocial Media Marketing - An Overview
Social Media Marketing - An OverviewRhys Downard
 
Introduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationIntroduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationRhys Downard
 

Viewers also liked (12)

El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.
 
Kemahiran bernilai tambah
Kemahiran bernilai tambahKemahiran bernilai tambah
Kemahiran bernilai tambah
 
Narrative photo writing task term 4
Narrative photo writing task term 4Narrative photo writing task term 4
Narrative photo writing task term 4
 
Morfo1 pie
Morfo1 pieMorfo1 pie
Morfo1 pie
 
Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014
 
Javascript session june 2013 (iii) jquery json
Javascript session june 2013 (iii) jquery   jsonJavascript session june 2013 (iii) jquery   json
Javascript session june 2013 (iii) jquery json
 
O ring chart
O ring chartO ring chart
O ring chart
 
Auriga gamification the processes acquired
Auriga gamification the processes acquiredAuriga gamification the processes acquired
Auriga gamification the processes acquired
 
sosiologi
sosiologisosiologi
sosiologi
 
Social Media Marketing - An Overview
Social Media Marketing - An OverviewSocial Media Marketing - An Overview
Social Media Marketing - An Overview
 
Introduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationIntroduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine Optimisation
 
HIV &AIDS
HIV &AIDSHIV &AIDS
HIV &AIDS
 

Similar to IoT-A ARM

Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplifiedPrasad Chitta
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTUREAnyaForger34
 
Interoperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and ResourcesInteroperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and Resourcesiotest
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)Colin Bell
 
Architecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsArchitecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsGem WeBlog
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentationdikshagupta111
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Vinod Wilson
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxJENATH223
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...jeetendra mandal
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxBarananKamal
 
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...mfrancis
 
Mechanisms for Real World Services
Mechanisms for Real World ServicesMechanisms for Real World Services
Mechanisms for Real World Servicesiotest
 

Similar to IoT-A ARM (20)

Architectural design
Architectural designArchitectural design
Architectural design
 
Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplified
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
 
Interoperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and ResourcesInteroperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and Resources
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)
 
Architecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsArchitecting and Designing Enterprise Applications
Architecting and Designing Enterprise Applications
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
 
IoT Methodology.pptx
IoT Methodology.pptxIoT Methodology.pptx
IoT Methodology.pptx
 
Soa 1 7.ppsx
Soa 1 7.ppsxSoa 1 7.ppsx
Soa 1 7.ppsx
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Domain Driven Design
Domain Driven DesignDomain Driven Design
Domain Driven Design
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
 
DSchap-02.ppt
DSchap-02.pptDSchap-02.ppt
DSchap-02.ppt
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptx
 
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
 
Mechanisms for Real World Services
Mechanisms for Real World ServicesMechanisms for Real World Services
Mechanisms for Real World Services
 

Recently uploaded

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMNanaAgyeman13
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 

Recently uploaded (20)

Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 

IoT-A ARM

  • 3. Introduction • Nowadays solutions: • Vertical silos -> is not like internet but intranet
  • 4. Usage of ARM • (ARM > Architecture reference model) 1. Cognitive aid 2. Common grounding 3. Generation of architectures 4. Identify differences in derived architectures 5. Achieving interoperability 6. System roadmaps and product life cycles 7. Benchmarking
  • 5. Content Table • Reference Model • Reference Architecture • View • Function View • Information View • Development & Operation view • Perspective • Guidance
  • 7. Interaction of all sub-models in the IoT Reference Model
  • 8. Domain Model • purpose: common understanding of the target domain in question • "The things in the internet of things." Poster at the (IoT 2010): The IoT domain suffers from an inconsistent usage and understanding of the meaning of many central terms • The domain model includes • definition of the main concepts (terms) • their responsibilities • thier relationships
  • 9.
  • 10. Physical Entity • The Physical Entity is an identifiable part of the physical environment that is of interest to the User for the completion of the goal. • e.g. humans, animals, cars, stores, room, computers, …
  • 11. Virtual Entity • PEs (1) are represented in the digital world by VE (*). • Tho fundamental properties: 1. They are Digital Arterfacts. 2. Ideally, VEs are synchronized representations of a given set of aspects (or properties) of respective PE.
  • 12. User (of service) • Not include different roles/users in the Domain Model because underlying taxonomies depends on use cases. • common option for modelling roles: • Raymond, K. (1995). Reference model of open distributed processing (RM- ODP): Introduction. Open Distributed Processing, Springer: 3-14. 1. Human user 2. Active Digitial Artifacts
  • 14. Resources • software components 1. On-Device Resources: • bridge between the digital and physical world • may be storage resources (with limited capacity) 2. Network Resources • run on dedicated server (or cloud) • aggregate or more high-level information • may be storage resources about Physical Entities (e.g. state, location …)
  • 15. Services (1/2) • MacKenzie, C. M., et al. (2006). • "Services are the mechanism by which needs and capabilities are brought together". • Meyer, S., et al. (2013). • "Software components with well-defined and standardized interfaces, which enable access to other, heterogeneous components with native interfaces and expose their functionality as a unit of work to a business process." • Interaction with the service is done via the network.
  • 16. Services (2/2) 1. non-IoT Services • e.g. enterprise system 2. IoT Services • Resource-level Services • Virtual Entity-level Services • Integrated Services • Services should be orchestrated together to form a complete system. • Associations between VEs and Service are important for look- up and discovery processes.
  • 17. Information Model • Information Model defines the structure (e.g. relations, attributes, services) of all the information for VE on a conceptual level.
  • 18.
  • 19. Lefort, L. (2005). "Ontology for quantity kinds and units: units and quantities definitions." W3 Semantic Sensor Network Incubator Activity.
  • 20. Other Information models in IoT-A • Entity model • Heras, R. d. l. and N. Santos "Internet of Things Architecture IoT-A Project Internal Report D4.1 - Concepts and Solutions for Identification and Lookup of IoT Resources." • Resource model & Service description model • Martín, G. "Internet of Things Architecture IoT-A Project Deliverable D2.1 - Resource Description Specification." • Event model • Völksen, G. (2013). "Internet-of-Things Architecture IoT-A Project Deliverable D2.6 - Event Representation and Processing ".
  • 21. Functional Model • MacKenzie, C. M., et al. (2006). "Reference model for service oriented architecture 1.0." OASIS Standard 12: • “The Functional Model is an abstract framework for understanding the main Functionality Groups (FG) and their interactions. “
  • 23.
  • 24.
  • 26. How to describe the architecture? (1/2) • [ IEEE Architecture] “A viewpoint defines the stakeholders whose concerns are reflected in the viewpoint and the guidelines, principles, and template models for constructing its views.“ • A view is composed of viewpoints, which aggregate several architectural concepts in order to make the work with views easier. • Example: Functional view: • functional-decomposition viewpoint • interaction viewpoint • interface viewpoint
  • 27. How to describe the architecture? (2/2) • Rozanski, N. and E. Woods (2011). Software systems architecture: working with stakeholders using viewpoints and perspectives, Addison-Wesley. • Some qualitative aspirations cut across more than one view • A quality property is an externally visible, non-functional property of a system such as performance, security, or scalability • They are referred to perspectives. (Discuss latter) • An architectural perspective is a collection of activities, tactics, and guidelines that are used to ensure that a system exhibits a particular set of related quality properties that require consideration across a number of the system’s architectural views.
  • 28. Good Material • Harrison, R. (2007). TOGAF version 811 enterprise edition, Van Haren. • Link: Developing Architecture Views (chapter 31)
  • 29. Functional View describes the functional building blocks of the architecture
  • 30. Functional View • Unified Requirement: Link From WP6 1. Map UR to FG 2. Clusterize functionality to FC
  • 31.
  • 33. IoT Process Management Process Modelling • Provides an environment for the modelling of IoT-aware processes that will be serialized and executed in the Process Execution FC. • Default function set • IoT business processes modeler • In D2.2, D2.4, D2.5
  • 34. IoT Process Management Process Execution • Executes IoT-aware processes that have been modelled in the Process Modelling FC. This execution is achieved by utilizing IoT Services that are orchestrated in the Service Organization layer. • Default function set • Deploy process models to execution environments • Align application requirements with service capabilities • Run application
  • 35.
  • 37. Interactions for Process Deployment and Execution
  • 39. Service Organization Service Orchestration • The Service Orchestration component resolves the IoT Services that are suitable to fulfil service requests coming from Process Execution component or from IoT -A users. • Default function set • Orchestrate IoT Services • In D2.3, D2.5
  • 40. Service Organization Service Composition • The Service Composition FC resolves services that are composed of IoT Services and other services in order to create services with extended functionality. • Default function set • Support flexible service compositions • Increase QoI • In D2.3, D2.5
  • 41. Service Organization Service Choreography • allows Users to register their service request. By the time a suitable service offers its capabilities on the blackboard the Service Choreography FC will arrange the interaction between user and service. • Default function set • Orchestrate IoT services (publish service request) • In D2.6
  • 42.
  • 43.
  • 45. IoT Services IoT Service Resolution (1/2) • User use it to find service. • Service specification to query • Service use it to manage service descriptions > lookup, discover • Service identifier • Service locator • Further information, e.g. geographic area
  • 46. IoT Services IoT Service Resolution (2/2) • Default function set • Resolve Service with ID • (Un)Subscribe to Resolution for Service with given ID (when locator change) • Lockup Service given ID • (Un)Subscribe to Lookup for Service with given ID (when description change) • Discover service with given spec • (Un)Subscribe to Discovery with given spec • Manage description • In D2.1, D4.3
  • 47. IoT Services IoT Service • Software component exposing a Resource through a well- defined interface to make it accessible to other parts of the IoT system, often via the Internet. • Service also deal with non-functional aspect (e.g. timeliness) • Default function set • Get Information • Subscribe Information • Put Information (store, configure, control)
  • 48.
  • 50. Subscribe Resolution of Service Identifier to URL
  • 51. Look up Service Description based on Service Identifier
  • 52. Subscribe Look-up of Service Description based on Service Identifier
  • 53. Discover Service based on Service Specification
  • 54. Subscribe Discovery of Service Descriptions based on Service Specification
  • 59. Virtual Entity VE Resolution Retrieve association between VEs and IoT Services. (Subscribe) Discover VE-related services (Subscribe) Lookup VE-related services Manage association Monitoring Automatically find new associations Assert static Association Assert dynamic Association Delete/Update VE Service Overall access point to particular entity (facade) Read/Set Attribute
  • 60.
  • 61. Look up Associations based on VE-ID and VE Service Specification
  • 62. Subscribe Look-up of Associations for VE Identifier and VE Service Specification
  • 63. Discover Associations based on VE Specifications and VE Service Specifications
  • 64. Subscribe Discovery of Associations based on VE Specification and VE Service Specification
  • 68.
  • 69. Assert Static VE-IoT Service Association
  • 70. Discover Dynamic Associations between VEs and Services
  • 71. Monitor and Update Existing Dynamic Associations
  • 72. Monitor and Delete Existing Dynamic Associations
  • 74. Definition of Network Units Application Description Telnet, FTP Message Transport Specifies how to reliably handle data transfer. TCP, UDP Segment, Packet Network Specifies addressing assignments and how packets are forwarded. IP Datagram, Packet Link Specifies the organization of data into frames and how to send frames over a network. Drivers, interface card Frame Material: An Introduction to TCP/IP (38 page)
  • 75. Communication End To End Communication • End To End Communication abstraction: • Reliable transfer, transport, translation • Proxies/gateways support • Tuning configuration parameters • Default function set • Transmit Message • Configure Message Arguments • Cache and Proxy • Translate End to End Protocol • Pass Context • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 76. Communication Network Communication • Enabling communication between networks • Default function set • Transmit Packet (Datagram) • Configure Packet Arguments • Translate Network Protocol • Route Packet • Resolve Locator/ID • Manage Packet Queue • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 77. Communication Hop To Hop Communication • 1st abstraction of the device’s physical communication tech. • Enable the usage and the configuration of any different link layer tech • Default function set • Transmit Frame • Configure Frame Arguments • Route Frame • Manage Frame Queue • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 78.
  • 80. Security Authorization • Managing access control policies • Performing access control decision (when access to a restricted resources) • Default function set • Authorize • Manage Policies • In D4.2
  • 81. Security Authentication • Check the credentials provided by a user. • Valid > return assertion. Use the assertion • Default function set • Authenticate • Verify • In D4.2
  • 82. Security Identity Management • Address privacy question by • Pseudonyms and accessory information to trusted subjects so that they can operate anonymously • Default function set • Create Identity • Resolve pseudonym • In D4.2
  • 83. Security Key Exchange and Management • Enable secure communications between multiple IoT-A peers • Not need initial knowledge of each other • Default function set • Securely distribute keys • Register security capabilities • In D4.2
  • 84. Security Trust and Reputation Architecture • Collect user reputation scores and calculates service trust levels • Default function set • Request Reputation Information • Provide Reputation Information • In D4.2
  • 86. Management Configuration • Configuration for FC, Device … • Default function set • Retrieve Configuration • Set Configuration
  • 87. Management Fault • Default function set • Handle Fault • Monitor Fault • Retrieve Fault
  • 88. Management Member • Manage membership and associated information of entity • FG, FC, VE, IoT Service, Device, App, User • Default function set • Monitor Member • Retrieve Member • Update Member
  • 89. Management Reporting • Overlay for the other FCs. • Determine the efficiency of the system • Default function set • Retrieve Report
  • 90. Information View shows how the information flow is routed through the system and what requests are needed to query for or to subscribe to information offered by certain functional components.
  • 91. Development & Operation view explains the operational behavior of the functional components and the interplay of them.
  • 92. Perspective An architectural perspective is a collection of activities, tactics, and guidelines that are used to ensure that a system exhibits a particular set of related quality properties that require consideration across a number of the system’s architectural views.
  • 93. • For each of the perspectives, tactics are listed. • The tactics are state-of–the art methodologies commonly used in today’s systems architectures.
  • 94. Perspective Evolution and Interoperability Activities • Characterize the evolution needs • Assess the current ease of evolution • Consider the evolution trade-offs • Rework the architecture Tactics • Contain change • Create extensible interfaces • Apply design techniques that facilitate change • Apply meta model-based architectural styles • Build variation points into the software • Use standard extension points • Achieve reliable change • Preserve development environments
  • 95. Perspective Performance and scalability Activities • Capture the performance requirements • Create the performance models • Analyze the performance model • Conduct practical testing • Assess against the requirements • Rework the architecture Tactics • Optimize repeated processing • Reduce contention via replication • Prioritize processing • Consolidate related workload • Distribute processing over time • Minimize the use of shared resources • Reuse resources and results • Partition and parallelize • Scale up or scale out • Degrade gracefully • Use asynchronous processing • Relax transactional consistency • Make design compromises
  • 96. Perspective Trust Activities • Capture trust requirements • Perform risk analysis • Check interoperability requirements and their impact on • trust between heterogeneous subjects • Define trust model • Consider risks derived from malicious or unintentional misuse of IoT systems Tactics • Harden root of trust • Ensure physical security and implement tampering • detection • Ensure and check data freshness • Consider the impact of security/performance tradeoffs on trust • Use (trusted) infrastructural Trust and Reputation • Agents for scalability • Use security imprinting • Check system integrity often • Balance privacy vs. non-repudiation (accountability)
  • 97. Perspective Security (1/2) Activities • Capture the security requirements • Check interoperability requirements for impacts on • security processes between heterogenous peers • Conduct risk analysis • Use infrastructural Authentication components that support more Identity Frameworks for scalability and interoperability • Use infrastructural or federated Key Exchange • Management to secure communication initiation and tunnelling between gateways for interoperability • Use an Authorization component to enable interoperability with other systems • Define security impact on interaction model • Address all aspects of Service and Communication Security • Integrate the trust model and support privacy features • Identify security hardware requirements • Consider performance/security tradeoffs • Validate against requirements • Avoid Over-The-Air device management; if necessary secure properly
  • 98. Perspective Security (2/2) Tactics • Use an extended Internet Threat Model for which takes into account specific IoT communication vulnerabilities • Harden infrastructural functional components • Authenticate subjects • Define and enforce access policies • Secure communication infrastructure (gateways, infrastructure services) • Secure communication between subjects • Secure peripheral networks (data link layer security, network entry, secure routing, mobility and handover) • Avoid wherever possible wireless communication • Physically protect peripheral devices or consider peripheral devices as available to malicious users in the attacker model
  • 99. Perspective Privacy Activities • Capture the privacy requirements • Conduct risk analysis • Evaluate compliancy with existing privacy frameworks Tactics • Use an Identity Management component that supports • Pseudonymization • Avoid transmitting identifiers in clear especially over wireless connections • Minimize unauthorized access to implicit information (e.g. deriving location information from service access requests) • Validate against requirements • Consider the impact of security/performance tradeoffs on privacy • Enable the user to control the privacy (and thus security and trust) settings • Balance privacy vs. non-repudiation (accountability)
  • 100. Perspective Availability and resilience Activities • Capture the availability requirements • Produce the availability schedule • Estimate platform availability • Estimate functional availability • Assess against the requirements • Rework the architecture Tactics • Select fault-tolerant hardware • Use high-availability clustering and load balancing • Log transactions • Apply software availability solutions • Select or create fault-tolerant software • Design for failure • Allow for component replication • Relax transactional consistency • Identify backup and disaster recovery solution
  • 101. Guidance explaining the usage of the IoT ARM, e.g.: derivation of domain-specific architectures from the ARM
  • 102.
  • 103. Architecture concepts • Physical View • Context View • Functional View • Information View • Deployment View
  • 104. Virtual Entity Virtual-Entity (VE) Resolution • What’s association? • Dynamic? • In D4.3

Editor's Notes

  1. The description of the representation of the information (e.g. binary, XML, RDF etc.) and concrete implementations are not part of the IoT Information Model. But can convert among each other if they follow this model
  2. Metadata may include time stamp, location …
  3. System is large, and how to describe? Architectural  views  make  both  the  derivation  of  the architecture  and  its  validation  easier.
  4. The component is described in detail in deliverables D2.2 and in the upcoming D2.4.
  5. The component is described in detail in deliverables D2.2 and in the upcoming D2.4.
  6. Use-Case
  7. This function resolves the appropriate services that are capable of handling the IoT User's request. If needed, temporary resources will be set up to store intermediate results that feed into service composition or complex event processing
  8. Provides asynchronous way of requesting service orchestration. IoT services matching the service request are executed on behalf of the requesting user once they are available. Complex services are able to act as user too here, they can issue requests for IoT services they need to fulfil the service composition.
  9. Structure > design choice. D2.1 is example