Internet of things -IoT

Internet of things -IoT

The Internet of things (IoT) describes the network of physical things - that are working with smart sensors and other technologies for the general/specific purpose of connecting and exchanging data with other devices and systems over the Internet.

No alt text provided for this image

The IoT Layers

No alt text provided for this image


1. PERCEPTION LAYER 

These IoT layers form the components of the internet physical design of IoT, acting as a medium between the digital and real world. In the IoT architecture layers, this perception layer has the main function of transforming analog signals into the digital form and vice versa. These come in a different multitude of shape and sizes with:

  • Sensors: They are very small devices or systems built to understand and detect the change in their environment and further streamline information to their system. Generally, these sensors are quite small and take even less power to perform their task. Sensors have the unique ability to detect physical parameters such as humidity or temperature, then transforming them into electronic signals.
  • Actuators: These represent a part of the machine that allows an electrical signal to be transformed into physical actions. These Actuators play a crucial role as components of IoT networks.
  • Machine and Devices: They are the main devices that have actuators and sensors.

In IoT architecture, there is no limitation of location or distance between two or more devices that can be spread across the globe.

2. CONNECTIVITY LAYER

Here in the second Connectivity layer, communication takes center stage between the physical layer of devices and IoT architecture. This communication takes place via two methods;

First directly by either TCP or UDP/IP stack;

Second, gateways act as a link between Local Area Network (LAN) and Wide Area Network (WAN), thus providing a path for information to pass through multiple protocols.

So, which one element is not IoT? Several network technologies are integrated across IoT systems that include:

  • WiFi, the most popular and versatile technique used across data-driven technologies. WiFi modems are suitable for Smart homes, personal offices, and even corporate offices for seamless communication between LAN and WAN, respectively.
  • Ethernet represents the hardware that supports fixed or permanent devices such as video cameras, gaming consoles, and security installations.
  • Bluetooth is another widely used technology suited mainly for communication between devices within a short range. A perfect example would be headphones that can work on small power and simultaneously share fewer data over the network.
  • NFC (Near Field Communications) allows communication between a very short distance of 4 inches or less.
  • LPWAN (Low Power Wide Area Network), designed and built to match the IoT usage across long distances. These low-power WAN devices can last as much as 10+ years while consuming low power throughout. However, it can send signals to give precise information over a long periodic duration. These include devices for smart buildings, smart fields, smart cities, etc.
  • ZigBee is another advanced wireless networking technology that consumes low power and can offer small data-sharing ability. One of the unique features of IoT is its capability to handle up to 65,000 nodes in its premises. ZigBee is built with the main focus for home automation and also has shown remarkable success for medical, scientific, and industrial protocols.
  • Cellular networks are ideally suited for communication on a global scale with more trust and reliability. For IoT, there are two broad IoT levels of the cellular network as
  • LTE-M is Long Term Evolution for Machines that provides a very high-speed exchange of data and smooth direct cloud communication.
  • NB-IoT as Narrowband that offers small data exchange using low-frequency channels respectively.

There are also messaging protocols present in the IoT system that allows seamless data sharing. Here is a list of top protocols present in the IoT architecture layers as of now.

  • Data Distribution Service (DDS) represents a machine-to-machine real-time messaging framework in IoT systems.
  • Advanced Message Queuing Protocol (AMQP) provides server protocols for servers via peer-to-peer data exchange.
  • Constrained Application Protocol (CoAP) defines the protocols for constrained devices that use low power and low memory, such as wireless sensors.
  • Message Queue Telemetry Transport (MQTT) represents the messaging protocol standards for low-powered devices using TCP/IP for seamless data communication.

3. EDGE LAYER 

In the early stages, with IoT networks gaining size and numbers, latency becomes one of the major hurdles. And when multiple devices tried connecting with the main center, it clogged the system delaying the procedure. Here edge computing offered a unique solution that accelerated the growth of IoT Systems overall.

Now with the edge IoT layers, systems can process and analyze the information close to the source as much as possible. Edge has now become the standard for the 5th Generation of mobile networks (5G), offering systems to connect with more devices at a lower latency than the prevailing 4G standards. All the procedures for the IoT networks take place at the edge. Thus saving time, resources and further resulting in real-time reactions and improved performance.

4. PROCESSING LAYER

IoT systems are designed to capture, store, and process data for further requirements in this layer. In the processing layer, there are two main stages.

  • Data Accumulation

Every device is sending millions of data streams across the IoT network. Here data comes in various forms, speeds, and sizes. Separating the essential data from these large streams is a primary concern that professionals must prioritize in this layer. Unstructured data in raw form such as photos and video streams can be quite enormous and must be done efficiently to gather intelligence factors for the business. Professionals must have a thorough understanding of the business procedures to pinpoint data requirements precisely and help procure future benefits.

  • Data Abstraction

Once the data accumulation stage is finished, selected data is taken out from the large data for application to optimize their business procedures. Here the data abstraction follows the path as:

  • Collecting all the data from all IoT and non-IoT systems (CRM, ERP, & ERM)
  • Using data virtualization to make data accessible from a single location
  • Managing raw data in multiple forms

Interoperability among devices and architecture plays a crucial role in the processing layer. Once data accumulation and abstraction are complete, it is easy for data analysts to use business acumen in fetching intelligence factors.  

5. APPLICATION LAYER 

In this layer, Data is further processed and analyzed to gather business intelligence. Here IoT systems get connected with middleware or software that can understand data more precisely.

Some examples of the Application layer include:

  • Business decision-making software’s
  • Device control and monitoring services
  • Analytics solutions built with Machine learning and Artificial Intelligence
  • Mobile Application for further interactions

Each IoT system is built with its particular goals and objectives to match with business specifications. At present, most of the IoT Applications are working at a varying complexity and operate a multitude of technology stacks performing specific tasks for businesses.

6. BUSINESS LAYER

Once IoT data is procured, it is valuable only if it applies to business planning and strategy. Every business has specific goals and objectives that it wants to accomplish by gathering intelligence from data. Business owners and stakeholders use data from past and present data to plan precisely for the future.

Today Data analysis has become the new oil for industries to enhance their productivity. Businesses are competing to get more data into their business for analysis and decision-making. Here software, CRM, and business intelligence programs have gained a lot of popularity in industries for superior performance.

7. SECURITY LAYER 

With modern challenges, security has become one of the main necessities of IT architecture. Data breach, tracking malicious software, and hacking are the main challenges with Security Layer in integrating IoT systems.  

  • Device Security 

The first point of security in the IoT layers starts with the devices themselves. Most of the manufacturers follow security guidelines to install in both firmware and hardware for IoT integration. Some of the essential measures are:

  • Secure boot process to avoid any malicious code running on a device
  • Using Trusted Platform Module (TPM) chips in combination with cryptographic keys for devices endpoint protections
  • Extra physical layer to avoid direct access via the device
  • Regular updates for security patches
  • Cloud Security

Now Clouds are taking over from the traditional server for data storage and communication. Their data security is of paramount importance, especially for IoT systems. Mechanisms include multiple authorization factors and encryptions to avoid any data breach. Here the process of verifying any new device is an essential crux that must have strict regulations for

device identity management.

  • Connection Security

While transferring data across the network, it must be encrypted from an end-to-end point across the IoT system. Here messaging protocols such as DDS, AMQP, and MQTT are integrated to secure sensitive information from any breach. The use of TSL cryptographic protocol is recommended industry standard across IoT architecture for data communication.


Baraa Munib

Business Development | Driving Business growth and Innovation through Gen AI & Agentic AI | Intelligent Transformation | Unifyapps

3 年

Thank you for sharing such insightful article.

回复

要查看或添加评论,请登录

Mahmoud Kamal???? (PMP?)的更多文章

  • Cloud-Computing and Fog-Computing

    Cloud-Computing and Fog-Computing

    The Article describe the difference between Cloud-Computing and Fog-Computing and Impact of them on the Internet of…

    2 条评论
  • What your Smart phone know about you?

    What your Smart phone know about you?

    What Smart phones know about you? Did you ask yourself before what do your smart phone know about you! So, let me…

  • FOG Computing

    FOG Computing

    Fog computing or fog networking, also known as fogging, is an architecture that uses edge devices to carry out a…

  • Future of the internet

    Future of the internet

    Future of the internet "internet of everything (IOE)" In the incoming few words, I will imagine with you what the shape…

    2 条评论
  • Why you may spending so much time on your LinkedIn account ?

    Why you may spending so much time on your LinkedIn account ?

    To seek and trusts in God that he will not miss out on the best work. To learn another experience from other…

  • Network devices simulation

    Network devices simulation

    Full design for small company contains R&S to control and management all devices like PCs, servers ..

社区洞察

其他会员也浏览了