In this talk, we will discuss what is IOT, what is the market and growth of IOT, security in IOT, and factor for the growth of IOT, how the invention of eSIM giving a boost in IOT, and need of cloud and steps for the codification of IOT with Azure.
(Language – English)
Narendra is a Technical Architect at Cognizant, other than coding his hobbies includes Travelling, reading technical books & watching thriller/sci-fi series.
19. Microsoft Azure IoT services
Devices Connectivity Data Storage Data Analytics Presentation & Action
Event Hubs SQL Database
Machine
Learning
App Service
Service Bus
Table/Blob
Storage
Stream
Analytics
Power BI
External Data
Sources
DocumentDB HDInsight
Notification
Hubs
External Data
Sources
Data Factory Mobile Services
BizTalk
Services
{ }
29. IoT Capability IoT Hub Even Hub
Device to Cloud
Messaging
Yes Yes
Cloud-to-device
messaging
Yes No
Protocols: HTTPS,
AMQP, AMQP over
webSockets
Yes Yes
Protocols: MQTT,
MQTT over
webSockets
Yes No
Per-device identity Yes No
Device Provisioning
Service
Yes No
IoT Edge Yes No
IOT Hub & Event Hubs
Editor's Notes
Scenario #1: IoT in your home
Imagine you wake up at 7am every day to go to work. Your alarm clock does the job of waking you just fine. That is, until something goes wrong. Your train’s cancelled and you have to drive to work instead. The only problem is that it takes longer to drive, and you would have needed to get up at 6.45am to avoid being late. Oh, and it’s pouring with rain, so you’ll need to drive slower than usual. A connected or IoT-enabled alarm clock would reset itself based on all these factors, to ensure you got to work on time. It could recognize that your usual train is cancelled, calculate the driving distance and travel time for your alternative route to work, check the weather and factor in slower travelling speed because of heavy rain, and calculate when it needs to wake you up so you’re not late. If it’s super-smart, if might even sync with your IoT-enabled coffee maker, to ensure your morning caffeine’s ready to go when you get up.
Scenario #2: IoT in transport
Having been woken by your smart alarm, you’re now driving to work. On comes the engine light. You’d rather not head straight to the garage, but what if it’s something urgent? In a connected car, the sensor that triggered the check engine light would communicate with others in the car. A component called the diagnostic bus collects data from these sensors and passes it to a gateway in the car, which sends the most relevant information to the manufacturer’s platform. The manufacturer can use data from the car to offer you an appointment to get the part fixed, send you directions to the nearest dealer, and make sure the correct replacement part is ordered so it’s ready for you when you show up.
IoT devices are designed to respond to sensor activity that the device is being used for, like a glass break sensor for instance.
The heart of cloud platform is uses of open source board like Raspberry Pi, Intel Galileop & Beaglebone Black and now major breakthrough in IOT came with eSIM. These platform works as interface between Device and Cloud,
Scale-# devices >> # users, and growing fast-Volume of data (and network traffic)-P ce
Innovation pressure: analysis, command and control, cost
Skill pressure: data science, new platforms
Environment- IT/OT collaboration- Security and privacy threats -Emerging standards-New competitors
Public cloud-Public clouds are owned and operated by a third-party cloud service providers, which deliver their computing resources, like servers and storage, over the Internet. Private cloud-A private cloud refers to cloud computing resources used exclusively by a single business or organization. A private cloud can be physically located on the company’s on-site datacenter. Some companies also pay third-party service providers to host their private cloud. A private cloud is one in which the services and infrastructure are maintained on a private network.
Hybrid cloud-Hybrid clouds combine public and private clouds, bound together by technology that allows data and applications to be shared between them. By allowing data and applications to move between private and public clouds, a hybrid cloud gives your business greater flexibility, more deployment options, and helps optimize your existing infrastructure, security, and compliance.
Infrastructure as a service (IaaS)-The most basic category of cloud computing services. With IaaS, you rent IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a cloud provider on a pay-as-you-go basis
Platform as a service (PaaS)-Platform as a service refers to cloud computing services that supply an on-demand environment for developing, testing, delivering, and managing software applications. PaaS is designed to make it easier for developers to quickly create web or mobile apps, without worrying about setting up or managing the underlying infrastructure of servers, storage, network, and databases needed for development.
Serverless computing-Overlapping with PaaS, serverless computing focuses on building app functionality without spending time continually managing the servers and infrastructure required to do so. The cloud provider handles the setup, capacity planning, and server management for you. Serverless architectures are highly scalable and event-driven, only using resources when a specific function or trigger occurs.
Software as a service (SaaS)-Software as a service is a method for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure, and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet, or PC.
Scale-The benefits of cloud computing services include the ability to scale elastically. In cloud speak, that means delivering the right amount of IT resources—for example, more or less computing power, storage, bandwidth—right when they’re needed, and from the right geographic location.
Performance-The biggest cloud computing services run on a worldwide network of secure datacenters, which are regularly upgraded to the latest generation of fast and efficient computing hardware. This offers several benefits over a single corporate datacenter, including reduced network latency for applications and greater economies of scale.
Security-Many cloud providers offer a broad set of policies, technologies, and controls that strengthen your security posture overall, helping protect your data, apps, and infrastructure from potential threats.
Reliability-Cloud computing makes data backup, disaster recovery, and business continuity easier and less expensive because data can be mirrored at multiple redundant sites on the cloud provider’s network.
Speed-Most cloud computing services are provided self service and on demand, so even vast amounts of computing resources can be provisioned in minutes, typically with just a few mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity planning.
Cost-Cloud computing eliminates the capital expense of buying hardware and software and setting up and running on-site datacenters—the racks of servers, the round-the-clock electricity for power and cooling, and the IT experts for managing the infrastructure. It adds up fast.
Aspects of the architecture include: • The user layer is independent of any specific network domain. It may be in or outside any specific domain. • The proximity network domain has networking capabilities that typically extend the public network domain. The devices (including sensor/actuator, firmware and management agent) and the physical entity are part of the proximity network domain. The devices communicate for both data flow and control flow either via an IoT Gateway and edge services or directly over the public network via edge services.
• The public network and enterprise network domains contain data sources that feed the entire architecture. Data sources include traditional systems of record from the enterprise as well as new sources from Internet of Things (IoT). The public network includes communication with peer clouds.
• The provider cloud captures data from devices, peer cloud services and other data sources (for example Weather services). It can use integration technologies or stream processing to transform, filter and analyse this data in real time and it can store the data into repositories where further analytics can be performed. This processing, which can be augmented with the use of Cognitive and Predictive analytics, is used to generate Actionable Insights. These insights are used by users and enterprise applications and can also be used to trigger actions to be performed by IoT Actuators. All of this needs to be done in a secure and governed environment.
• Results are delivered to users and applications using transformation and connectivity components that provide secure messaging and translations to and from systems of engagement, enterprise data, and enterprise applications.
Stage 1 (Sensors/Actuators):
A thing in the context of “Internet of Things”, should be equipped with sensors and actuators thus giving the ability to emit, accept and process signals.
Stage 2 (Data Acquisition Systems):
The data from the sensors starts in analogue form which needs to be aggregated and converted into digital streams for further processing. Data acquisition systems perform these data aggregation and conversion functions.
Stage 3 (Edge Analytics):
Once IoT data has been digitized and aggregated, it may require further processing before it enters the data center, this is where Edge Analytics comes in.
Stage 4 (Cloud Analytics):
Data that needs more in-depth processing gets forwarded to physical data centers or cloud-based systems
None of systems is hack proof, even Google and Facebook are not. Respective proper security related measurement's should be established timely for any IoT implementation.
Different vulnerabilities can lead to serious consensuses where attacker can take over control, steal information or disrupt services of many devices at the same time.
Some one could take control of your refrigerator for example, which is quite dramatic event.
To prevent those type of attacks, it is important to be on top of latest security solutions.
In IoT it can be sliced in number of categories or layers. Device layer, Connectivity, IoT Platform, Data Layer, End user devices.
Some preventive measurements are provided by design, some can be managed.
Proper security controls can be also enabled by introducing solutions secured by their design for example part of eSIM solution has built in security.
Actually, IoT success was depending on 2 major factors, one is security which we just talked about, and connectivity(where 5G going to bring a boost). IoT was struggling on security aspect until eSIM was introduced to market and telco.