Iotarchitecture
Iotarchitecture
IoT
“A global infrastructure of the information society, enabling advanced services by
interconnecting (physical and virtual) things based on existing and evolving interoperable
information and communication technologies.”
“The internet of things in the internetworking of physical devices, vehicles, building, and
other items – embedded with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data.”
FEATURES OF IoT
⚫ Fundamental features of a sustainable IoT architecture include
⚫ Artificial Intelligence: IoT makes virtually anything “smart”. Knowledge can be extracted from generated data.
⚫ Interconnectivity: Anything can be interconnected, any time and anywhere using a communication infrastructure.
⚫ Distributivity: Data is gathered from different sources and processed by several entities in a distributed manner.
⚫ Heterogeneity: The devices in IoT are heterogeneous as based on different hardware platforms.
⚫ Interoperability: Devices from different vendors cooperate, in order to achieve common goals. Also, systems and
protocols will have to be designed in a way that allows objects (devices) from different manufacturers to exchange
data and work in an interoperable way.
⚫ Scalability: The number of devices that need to be managed and that communicate with each other is of a great
magnitude.
⚫ Security: Users feelings of helplessness and being under some unknown external control could seriously hinder
IoT's deployment.
⚫ Dynamic changes: The state of devices change dynamically, eg sleeping or waking up, connected or disconnected,
as well as context of devices including location and speed. The number of devices can also change dynamically.
⚫ Everything as a service: All resources are consumed as services.
⚫ Without addressing these conditions, the result of the IoT architecture is a failure.
BASIC ARCHITECTURE
SENSOR NETWORK:
• Consists of sensing nodes (sensors) communicating in a wireless multi-hop fashion for gathering data.
• Sensor network can exist without IoT, but IoT cannot exist without a senor network.
• Sensors provide information, knowledge, or data about the Physical Entity (the identity of the Physical Entity and state of the
Physical Entity) they monitor.
• A sensor can measure the physical property and convert it into signal that can be understood by an instrument.
• The sensors enable the interconnection of the physical and digital worlds allowing real-time information to be collected and
processed.
Virtual Sensors:
• The data acquired by a set of sensors can be collected, processed according to an application-provided aggregation function, and then perceived as
the reading of a single virtual sensor.
• Valuable higher-level knowledge is being derived from lower-level events and can be approached using different technologies from
many independent research fields (such as, discrete event simulation active databases, network management, or temporal reasoning),
• Trusted connectivity and security -- ensuring the integrity of the network and system in both directions
• Protocol and data bridge -- being able to translate and transfer data among and between systems operating with different
communications protocols and data formats, often requiring bidirectional communication capabilities
• Storage and analysis -- onboard application development platforms and storage to drive intelligence and decision-making closer to
the edge device
• Management -- the ability to provision, update and control access of connected devices to the system as well as policy-based
permissions
TYPES OF VIRTUAL SENSORS BASED ON THE SERVICES OFFERED
1. Singular: This type of virtual sensor provides one to one mapping so that a single physical sensor can be virtualized, shared among
multiple applications.
3. Aggregator: The function of Aggregator is to act on top of physical sensors, to read and do the simple computations like averaging,
finding maximum and minimum, sorting, counting as per application need.
4. Selector: It can select a single value from a group of values, based on specific criteria.
5. Qualifier: It is categorized to work on events based on priority. A Qualifier will be activated if a threshold for a single observable
quantity is breached. It checks the highest or lowest value from a group of observed sensor data.
6. Context-Qualifier: Virtual sensor designed for prioritizing events when threshold levels of multiple variables are breached at same
time. It is a typical example of many to one mapping, where multiple physical sensors are grouped and monitored together to alert a
SaaS level application.
7. Predictor and Compute: Physical sensors are unable to detect the events in priory. It may detect the occurrence of a present event,
but not the future event. A virtual sensor like predictor can be deployed to guess the occurrence of event in future, which may provide
sophisticated solution to patient monitoring like averting cardiac arrest. Also when decision making is involved in such scenarios,
compute virtual sensor can be used.
List of some of the measurement devices used in IoT:
Accelerometers Temperature sensors
Magnetometers Proximity sensors
Gyroscopes Acoustic sensors
Light sensors Pressure sensors
Gas RFID sensors Humidity sensors
Micro flow sensors Image sensors
COMMUNICATION:
1. CHALLENGES
a) Addressing and identification: Things need to be identified through a unique address, on the basis of which they communicate with
each other. For this, we need a large addressing space, and a unique address for each smart object.
b) Low power communication: Communication of data between devices is a power consuming task, specially, wireless communication.
Therefore, we need a solution that facilitates communication with low power consumption.
c) Routing protocols with low memory requirement and efficient communication patterns.
d) High speed and nonlossy communication.
e) Mobility of smart things.
2. ENABLING TECHNOLOGIES FOR COMMUNICATION:
❑ IEEE 802.15.4 has developed a low-cost, low-power consumption, low complexity, low to medium range communication
standard at the link and the physical layers for resource constrained devices.
❑ Bluetooth low energy (Bluetooth LE, is the ultra-lowpower version of the Bluetooth technology that is up to 15 times more
efficient than Bluetooth.
❑ Ultra-Wide Bandwidth (UWB) Technology is an emerging technology in the IoT domain that transmits signals across a much larger
frequency range than conventional systems.
UWB, in addition to its communication capabilities, it can allow for high precision ranging of devices in IoT applications.
(2) Device discovery and management: This feature enables the devices to be aware of all other devices in the neighborhood and the services
provided by them.
Here the infrastructure is mostly dynamic.
The devices have to announce their presence and the services they provide.
Finally, any IoT middleware needs to perform load balancing, manage devices based on their services, capabilities and levels of battery .
3) Scalability: Middleware makes the required changes when the infrastructure scales, as a large number of devices are expected to
communicate in an IoT setup.
(4) Big data and analytics: IoT sensors typically collect a huge amount of data.
It is necessary to analyze all of this data in great detail.
As a result a lot of big data algorithms are used to analyze IoT data.
(5) Security and privacy: The middleware has built-in mechanisms to address security and privacy issues, as the IoT applications are mostly
related to someone’s personal life or an industry.
The middleware should have built-in mechanisms to address such issues, along with user authentication, and the implementation of
access control.
(7) Context detection: The data collected from the sensors needs to be used to extract the context by applying various types of algorithms.
The context can subsequently be used for providing sophisticated services to users.
Middlewares can be classified as follows on the basis of their design;
(4) Semantic:
•Semantic middleware focuses on the interoperation of different types of devices, which communicate using different formats of data. It
incorporates devices with different data formats and ties all of them together in a common framework.
•The framework is used for exchanging data between diverse types of devices.
•This technique allows multiple physical resources to communicate even though they do not implement or understand the same protocols.
• Includes objects to be detected (from physical moving objects, such as humans, cars, ) or factors to be observed ( temperature, or
humidity) .
• Includes sensors, other hardware such as; embedded systems, RFID tags and readers and others.
2. NETWORK LAYER
• The network layer is responsible for processing the received data from the Perception Layer.
• It is in charge of transmitting data to the application layer through various network technologies, such as wireless/wired
networks and Local Area Networks (LAN).
• The main media for transmission include 3G, 4G, Wifi, bluetooth, Zigbee, UMB, infrared technology, and so on.
• Huge quantities of data will be carried by the network.
• Crucial to provide a sound middleware to store and process this massive amount of data.
3. APPLICATION LAYER
• It is the layer at the top of the architecture and is responsible for delivery of various applications to different users in IoT.
• It realizes the use of smart objects by a set of functions to users to meet defined requirements.
• The applications can be from different industry segments such as: manufacturing, logistics, retail, environment, public safety,
healthcare, food and drug etc.
• With the increasing maturity of RFID technology, numerous applications are evolving which will be under the umbrella of IoT.
Device Data Procesing Thing/Devic
Edge
and platform e/Cloud
Figure 8: The 4 stag IoT Solutions Architecture
Stage 1: Networked Things (Wireless sensors and actuators)
Sensors convert information obtained in outer world into data for analysis.
Actuators can intervene the physical reality, e.g switching off lights
Stage 2: Sensor data aggregation systems and analog- to-digital data conversion
This stage makes data both digitalized and aggregated. Enormous amount of information collected on previous stage is processed and
squeezed into optimal size for further analysis.
The prepared data is transferred to the IT world. So basically the analytics and pre-processing of data is done .
Also some additional processing might happen here , prior to the stage of entering the data center.
The main processed on the last stage of IoT happen in the data center or cloud. It enables in-depth processing, along with a follow-up
revision for feedback. Data from other sources might also be included to ensure the in-depth analysis.
REFERENCE ARCHITECTURE
⚫ This architecture comprises of service layers and presentation layers.
⚫ Service layers include Event Processing and Analytics, Resource Management and Service Discovery, as well as Message
Aggregation and Enterprise Service Bus (ESB) services built on top of communication and physical layers.
⚫ API management, which is essential for defining and sharing system services and web-based dashboards (or equivalent) for
managing and accessing these APIs, are also included in the architecture.
⚫ Due to the importance of device management, security and privacy enforcement in different layers, and the ability to
uniquely identify objects and control their access level, these components are pre-stressed independently in this architecture.
o Sensing layer is integrated with available hardware objects to sense the status of things.
o Network layer is the infrastructure to support over wireless or wired connections among
things.
o Service layer is to create and manage services required by users or applications.
o Interfaces layer consists of the interaction methods with users or applications.
The IoT Layered Architecture
•Functions Include:
o Data filtering, cleanup, aggregation
o Packet content inspection
o Combination of network and data level analytics
o Thresholding
o Event generation
4. Data Accumulation (Storage):
• Makes the network data usable by applications.
• Converts data-in-motion to data-at-rest.
• Converts format from network packets to database relational tables.
• Achieves transition from ‘Event based’ to ‘Query based’ computing.
• Dramatically reduces data through filtering and selective storing.