Chapter 2 IoT Architectures
Chapter 2 IoT Architectures
Chapter 2
IoT Architecture
1
04-Sep-21
IoT Components
Things we connect : Hardware, sensors, actuators
Connectivity : Medium we use to connect things
Platfrom : processing and storing collected data
Receive and send data via standardized interfaces or
API
Store the data
Process data
Analytics
Get insights from gathered data
User interface
2
04-Sep-21
IoT Devices
The "Things" in IoT usually refers to IoT devices which
have unique identities
They can perform remote sensing, actuating and monitoring
capabilities
IoT devices can:
Exchange data with other connected devices and
applications
Collect data from other devices and process the data
locally
Send the data to centralized servers or cloudbased
application back-ends for processing
Perform some tasks locally and other tasks within
the IoT infrastructure
3
04-Sep-21
Sensors
Characteristic of any device or material to detect
presence of particular physical quantity
Output of sensor is signal, which is converted to
human readable form
Performs some function of input by sensing or feeling
physical changes in the characteristic of a system in
response to stimuli
Input: Physical parameter or stimuli
Example: Temperature, light, gas, pressure, and sound
Output: Response to stimuli
Sensors
4
04-Sep-21
Classification
Passive Sensor
Cannot independently sense the input
Example:
Accelerometer
Soil Moisture
Water-level and
Temperature Sensors
Active Sensor
Independently sense the input
Example:
Radar
Sounder and
Laser Altimeter Sensors
Analog Sensor
The response or output of the sensor is some continuous
function of its input parameter
Example:
Temperature sensor
LDR
Digital Sensor
Responses in binary nature
Designs to overcome the disadvantages of analog sensors
Along with the analog sensor it also comprises of extra
electronics for bit conversion
Example:
Passive Infrared (PIR) Sensor and
5
04-Sep-21
Scalar Sensor
Detects the input parameter only based on its
magnitude
Response of the sensor is a function of magnitude of
the input parameter
Not affected by direction of input parameter
Example: Temperature, Gas, Strain, Color and Smoke
Sensors
Vector Sensor
Response of sensor depends on magnitude of direction
and orientation of input parameter
Example :
Accelerometer, Gyroscope, Magnetic Field
Motion Detector Sensors
Actuator
6
04-Sep-21
Actuator
Actuator - Classification
7
04-Sep-21
Smart Objects
1T
network, and interface resulting in
100G new usage and the establishment of a
10G new industry.”
[Bell et al. Computer,
1G 1972, ACM, 2008]
100M Workstation
Size (mmper
1M Smart
log (people
16
8
04-Sep-21
IoT analytics
17
Cisco
18
9
04-Sep-21
Sensors:
These form the front end of the IoT devices. These are the
so-called “Things” of the system. Their main purpose is to
collect data from its surroundings (sensors) or give out data
to its surrounding (actuators).
These have to be uniquely identifiable devices with a
unique IP address so that they can be easily identifiable
over a large network.
These have to be active in nature which means that they
should be able to collect real-time data. These can either
work on their own (autonomous in nature) or can be made
to work by the user depending on their needs (user-
controlled).
Examples of sensors are gas sensor, water quality sensor,
moisture sensor, etc
10
04-Sep-21
Processors:
Gateways:
11
04-Sep-21
Applications:
Elements of IoT
12
04-Sep-21
13
04-Sep-21
IoT Architecture
14
04-Sep-21
15
04-Sep-21
16
04-Sep-21
Network Layer
Application Layer
17
04-Sep-21
Support Layer
18
04-Sep-21
Processing Layer
19
04-Sep-21
Business Layer
20
04-Sep-21
Application Layer
21
04-Sep-21
Network Layer
22
04-Sep-21
Architecture
An architecture description is
a collection of models organized into views
that examine a system from a certain
viewpoint defined by the concern of a
stakeholder
for understanding, analysis, communication,
construction, documentation
23
04-Sep-21
24
04-Sep-21
25
04-Sep-21
26
04-Sep-21
Services Layer
Riding on top is the common services layer.
This conceptual layer adds APIs & middleware
supporting third-party services & applications
Network Layer
Communication domain for the IoT devices and
endpoints
Includes devices themselves and the communications
network that links them
Examples include wireless mesh technologies, such as
IEEE 802.15.4, and wireless point-tomultipoint
systems, such as IEEE 801.11ah
27
04-Sep-21
28
04-Sep-21
29
04-Sep-21
30
04-Sep-21
31
04-Sep-21
32
04-Sep-21
33
04-Sep-21
Fog Computing
Solution to the various challenges is to distribute data
management throughout the IoT system, as close to the edge of
the IP network as possible
Best-known example of edge services in IoT is fog computing
Any device with computing, storage, and network connectivity
can be a fog node
Concept of fog was first developed by Flavio Bonomi and
Rodolfo Milito of Cisco Systems
In world of IoT, fog gets name from a relative comparison to
computing in cloud layer
Like clouds exist in sky, fog rests near ground
In the same way, the intention of fog computing is to place
resources as close to the ground—that is, the IoT devices—as
possible
34
04-Sep-21
Fog Computing
Fog Computing
35
04-Sep-21
Edge Computing
36
04-Sep-21
Fog computing
37
04-Sep-21
38
04-Sep-21
Edge computing
(process as much as possible where data is collected)
Pushing processing power, communication
capabilities, intelligence down at device level
Emerging applications range from autonomous
vehicles, to VR glasses, to earbuds.
Do as much processing as required on the device, transmit
only what is relevant long term or summaries
Low latency and decentralised decisions
Personalised experience
39
04-Sep-21
ABCD’s of IoT
Applications
40
04-Sep-21
Map-Reduce
Frequent Item-sets
Similarity
Clustering
Dimension Reduction
Streaming Data
41
04-Sep-21
42
04-Sep-21
Big Data
Volume: size of data such as terabytes (TB), petabytes (PB),
zettabytes (ZB),
Variety: types of data from difference sources (sensors,
devices, social networks, the web, mobile phones)
Velocity: how frequently the data is generated (every
millisecond, second, minute, hour, day,week, month, year.)
Processing frequency may also differ from the user
requirements.
Challenges
High volume processing using low power processing
architectures.
Discovery of real-time data-adaptive Machine learning
techniques.
Design scalable data storages that provide efficient data
mining
43
04-Sep-21
$300B in US medica
l industry
Increased efficiency
of government
operaEons
Search engines perso
nalized for users
Personalized ads, pro
ducts, etc.
44
04-Sep-21
Data Generation
Enterprise data: big companies, e.g. Facebook, Amazon
Business data is expected to double every 1.2 years
Walmart processes 1M customer trades/hour
Akamai adverEses 75M events/day
IoT data: pervasive applicaEons, clinical medical care-‐R&D
Large scale, heterogeneous and strongly correlated data
30 billion RFID tags and 4.6 billion camera phones are used around the
world today
If Wal-‐Mart operates RFID on item level, it is expected to generate 7
terabytes (TB) of data every day
Bio-‐medical data: human gene sequencing
One sequencing of human gene may generate 100 sequences of 600GB
raw data
Other areas: physics, bio-‐informaEcs, etc.
Astronomy: Sloan Digital Sky Survey (SDSS), the data volume generatd
per night surpasses 20TB 8
45
04-Sep-21
Data Acquisition
Data Transportation
46
04-Sep-21
Data Preprocessing
Eliminate or reduce redundancy, noise, meaningless data
Increase storage efficiency, data analysis speed
IntegraEon: combining data from different sources
Data warehouse: ETL (Extract, Transform and Load)
Data federaEon
Mostly used by search engines
Cleaning: how can data be cleaned?
Define error types -‐> idenEfy errors -‐> correct errors -‐>
document errors -‐> modify infrastructure to prevent errors
Redundancy eliminaEon
Redundancy detecEon, data filtering, data compression
Areas: Images, videos
One solution: Compression!
Preprocessing Capabilities
47
04-Sep-21
48
04-Sep-21
Connectivity
M2M
Wireless Sensor Networks
IPv6 and 6LowPAN
Bluetooth LE and ZigBee
WiFi and LTE
Backscatter
Mobile Systems
Sensor Systems
Wearables
Energy Harvesting
Security and Privacy
49