SlideShare a Scribd company logo
1 of 6
Download to read offline
IoT Architecture – The Art of
Building Smart Systems
In this article we will discuss IoT Architecture
“Alexa! Turn off the light”, we all know that this task happens in a millisecond,
but only a few of us know what happens behind the scenes. In this article, we
shall try to understand the architecture of IoT as we scale down each layer of
the 4 stage architecture IoT system.
Hopefully, by the end of this article, the next time you ask any virtual assistant
to operate a smart gadget, you will know exactly what is happening in the
background and which stage is performing what role.
The 4-Stage IoT architecture
The most used architecture for the Internet of Things is the 4-stage
architecture which has 4 phases in it. There is no rule stating that only the 4
stage architecture of IoT will be used all the time, but the twist is that these
four stages will always be used no matter how many stage architectures you
use.
By phases, I mean the path that the action traverses. So to achieve a specific
action, be it smart watches, smart homes, driverless cars, or any other
example, the data has to traverse or go through these phases.
IoT in itself means an interrelated internet-connected object system that
collects and transfers data over a wireless network without any human
intervention. This brings me to the next topic:
Importance of IoT architecture
In IoT, Data collection is enabled by having devices (or sensors) connected to
the internet via their own IP address. The quintessence of this is to track data
through their sensors, perform calculations and make them available for
consumption to their users.
One of the vital importance of having good architecture is ‘security’. If
penetration is anywhere in the architecture, the data could fall into the wrong
hand and could cause significant damage. Hence these perpetually connected
systems have a secure architecture.
In layman’s language, the IoT architecture is where the data flows from the
“things” to the “internet”! Here, “thing” refers to a machine, sensor, etc., and
“internet” refers to the cloud or server.
The 4 Stages of IoT architecture
Okay, enough talk. Let’s get down to the matter at hand. The four phases or
stages of IoT architecture are:
1. Sensors and Actuators
2. Internet Gateway
3. Edge IT
4. Data Center and Cloud
Let us take a detailed look at each phase and see what happens to the data in
each stage.
1. Sensors and actuators
We all know that IoT revolves around sensors. But do we know why? Well. it
is because they convert information obtained in the outer world into data for
analysis. They include data regarding the process or environmental
surroundings like temperature, fluid flow in the pipe, air quality, and more.
But what are actuators? Well, by definition, actuators can intervene to alter the
physical reality. It sounds mindboggling when you put it like that, but they are
boring. They are just normal machines like fan regulators, switches,
thermostats, valves, air conditioners, etc.
Every IoT device must and will have sensors because it is from this stage that
data is generated and collected. This data will travel through the different
stages of IoT architecture and, finally, the cloud.
2. Internet gateway
The IoT architecture’s second stage works close to the first stage (sensors
and actuators). This stage is the gateway to the internet, or more technically:
data acquisition systems (DAS).
The data obtained from the sensors is in analog form. For this data to enter
the cloud and undergo in-depth processing, it needs to be aggregated and
converted to digital signals.
This is precisely what this stage does. It prepares the data from the sensors to
be cloud readable, acting like a gateway to the cloud, thus the name ‘internet
gateway’. Finally, the internet receives this digitized data and routes it to
systems in stage 3.
3. Edge IT
At this stage, the data from the sensors has already been transferred to the IT
world. But there is one problem, the data still requires to be reduced in volume
before it enters the data centers. In technical terms, Edge IT systems perform
enhanced analytics and pre-processing, such as machine learning and
visualization.
The edge IT stage reduces the burden on IT infrastructure. How? Here are
two examples: edge IT systems use machine learning to scan for anomalies
and use visualization techniques to present information into attractive
dashboards, pie charts, and graphs. Here is a bonus fact: this stage sits a little
closer to the sensors in a wiring closet.
4. Data Centre and Cloud
The last and final stage of IoT architecture is not the data centre and cloud but
rather happens in the data centre and cloud. It is where the data is analysed,
managed, and securely stored for in-depth processing and follow-up revision
for feedback and future decisions.
This stage can also execute precise analysis by combining data from other
sources, including the digital and physical worlds. These sources can identify
and analyse significant patterns and trends.
With that said, this architecture is the basic fundamental for IoT. However,
before we conclude, let us take a look at some advantages and
disadvantages of IoT.
Advantages of IoT
1. Cost reduction
IoT devices catch problems and bugs very fast when compared to traditional
debugging. It saves not only the cost of repairs but also time.
2. Efficiency
IoT devices are very productive and efficient. One such example is an
automated PDF converter, which removes the hassle of PDF editing and
archiving.
3. Mobility
Thanks to IoT, employees can work from any geographical location, anytime,
without any restrictions.
4. Supports Various Technologies
IoT supports technologies like big data analytics, cloud computing, wireless
sensor networks, embedded systems, and many more.
Disadvantages of IoT
1. Security
Since the data travels all over the internet, end-to-end encryption is a must in
IoT. However, as of today, maintaining privacy is a big challenge. It is why we
need better and more secure architectures.
2. Complexity
As much as IoT is good at Fixing bugs, most of the devices still contain some
software bugs. Each IoT device must be able to seamlessly interact with other
devices in the network to which they are connected.
3. Compatibility
One example of why IoT devices are not compatible is that there is no
International Standard for monitoring the equipment.
4. Policies
Governments must impose policies and standards to stop the Black marketing
of IoT devices.
Summary
Now you know exactly what happens every time you say, “Alexa! Turn up the
temperature”. We have now seen the importance of IoT architecture and the
four different phases of it and concluded with some advantages and
disadvantages of IoT.

More Related Content

Similar to IoT Architecture .pdf

internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptxvikramkagitapu
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principlesardexateam
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)shashankvaidyar2
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfRamithaDevi
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principlesardexateam
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxTekle12
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESEMERSON EDUARDO RODRIGUES
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxugushe
 

Similar to IoT Architecture .pdf (20)

IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
 
iot m1.pdf
iot m1.pdfiot m1.pdf
iot m1.pdf
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 

More from SudhanshiBakre1

Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdfSudhanshiBakre1
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfSudhanshiBakre1
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdfSudhanshiBakre1
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdfSudhanshiBakre1
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfSudhanshiBakre1
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdfSudhanshiBakre1
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdfSudhanshiBakre1
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdfSudhanshiBakre1
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfSudhanshiBakre1
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfSudhanshiBakre1
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfSudhanshiBakre1
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfSudhanshiBakre1
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfSudhanshiBakre1
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfSudhanshiBakre1
 

More from SudhanshiBakre1 (20)

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
Top Java Frameworks.pdf
Top Java Frameworks.pdfTop Java Frameworks.pdf
Top Java Frameworks.pdf
 
Numpy ndarrays.pdf
Numpy ndarrays.pdfNumpy ndarrays.pdf
Numpy ndarrays.pdf
 
Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdf
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdf
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdf
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdf
 
Node.js with MySQL.pdf
Node.js with MySQL.pdfNode.js with MySQL.pdf
Node.js with MySQL.pdf
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdf
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdf
 
Streams in Node .pdf
Streams in Node .pdfStreams in Node .pdf
Streams in Node .pdf
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdf
 
RESTful API in Node.pdf
RESTful API in Node.pdfRESTful API in Node.pdf
RESTful API in Node.pdf
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdf
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdf
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdf
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdf
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

IoT Architecture .pdf

  • 1. IoT Architecture – The Art of Building Smart Systems In this article we will discuss IoT Architecture “Alexa! Turn off the light”, we all know that this task happens in a millisecond, but only a few of us know what happens behind the scenes. In this article, we shall try to understand the architecture of IoT as we scale down each layer of the 4 stage architecture IoT system. Hopefully, by the end of this article, the next time you ask any virtual assistant to operate a smart gadget, you will know exactly what is happening in the background and which stage is performing what role. The 4-Stage IoT architecture The most used architecture for the Internet of Things is the 4-stage architecture which has 4 phases in it. There is no rule stating that only the 4 stage architecture of IoT will be used all the time, but the twist is that these four stages will always be used no matter how many stage architectures you use. By phases, I mean the path that the action traverses. So to achieve a specific action, be it smart watches, smart homes, driverless cars, or any other example, the data has to traverse or go through these phases.
  • 2. IoT in itself means an interrelated internet-connected object system that collects and transfers data over a wireless network without any human intervention. This brings me to the next topic: Importance of IoT architecture In IoT, Data collection is enabled by having devices (or sensors) connected to the internet via their own IP address. The quintessence of this is to track data through their sensors, perform calculations and make them available for consumption to their users. One of the vital importance of having good architecture is ‘security’. If penetration is anywhere in the architecture, the data could fall into the wrong hand and could cause significant damage. Hence these perpetually connected systems have a secure architecture. In layman’s language, the IoT architecture is where the data flows from the “things” to the “internet”! Here, “thing” refers to a machine, sensor, etc., and “internet” refers to the cloud or server. The 4 Stages of IoT architecture Okay, enough talk. Let’s get down to the matter at hand. The four phases or stages of IoT architecture are: 1. Sensors and Actuators 2. Internet Gateway
  • 3. 3. Edge IT 4. Data Center and Cloud Let us take a detailed look at each phase and see what happens to the data in each stage. 1. Sensors and actuators We all know that IoT revolves around sensors. But do we know why? Well. it is because they convert information obtained in the outer world into data for analysis. They include data regarding the process or environmental surroundings like temperature, fluid flow in the pipe, air quality, and more. But what are actuators? Well, by definition, actuators can intervene to alter the physical reality. It sounds mindboggling when you put it like that, but they are boring. They are just normal machines like fan regulators, switches, thermostats, valves, air conditioners, etc. Every IoT device must and will have sensors because it is from this stage that data is generated and collected. This data will travel through the different stages of IoT architecture and, finally, the cloud. 2. Internet gateway The IoT architecture’s second stage works close to the first stage (sensors and actuators). This stage is the gateway to the internet, or more technically: data acquisition systems (DAS).
  • 4. The data obtained from the sensors is in analog form. For this data to enter the cloud and undergo in-depth processing, it needs to be aggregated and converted to digital signals. This is precisely what this stage does. It prepares the data from the sensors to be cloud readable, acting like a gateway to the cloud, thus the name ‘internet gateway’. Finally, the internet receives this digitized data and routes it to systems in stage 3. 3. Edge IT At this stage, the data from the sensors has already been transferred to the IT world. But there is one problem, the data still requires to be reduced in volume before it enters the data centers. In technical terms, Edge IT systems perform enhanced analytics and pre-processing, such as machine learning and visualization. The edge IT stage reduces the burden on IT infrastructure. How? Here are two examples: edge IT systems use machine learning to scan for anomalies and use visualization techniques to present information into attractive dashboards, pie charts, and graphs. Here is a bonus fact: this stage sits a little closer to the sensors in a wiring closet. 4. Data Centre and Cloud The last and final stage of IoT architecture is not the data centre and cloud but rather happens in the data centre and cloud. It is where the data is analysed,
  • 5. managed, and securely stored for in-depth processing and follow-up revision for feedback and future decisions. This stage can also execute precise analysis by combining data from other sources, including the digital and physical worlds. These sources can identify and analyse significant patterns and trends. With that said, this architecture is the basic fundamental for IoT. However, before we conclude, let us take a look at some advantages and disadvantages of IoT. Advantages of IoT 1. Cost reduction IoT devices catch problems and bugs very fast when compared to traditional debugging. It saves not only the cost of repairs but also time. 2. Efficiency IoT devices are very productive and efficient. One such example is an automated PDF converter, which removes the hassle of PDF editing and archiving. 3. Mobility Thanks to IoT, employees can work from any geographical location, anytime, without any restrictions. 4. Supports Various Technologies IoT supports technologies like big data analytics, cloud computing, wireless sensor networks, embedded systems, and many more.
  • 6. Disadvantages of IoT 1. Security Since the data travels all over the internet, end-to-end encryption is a must in IoT. However, as of today, maintaining privacy is a big challenge. It is why we need better and more secure architectures. 2. Complexity As much as IoT is good at Fixing bugs, most of the devices still contain some software bugs. Each IoT device must be able to seamlessly interact with other devices in the network to which they are connected. 3. Compatibility One example of why IoT devices are not compatible is that there is no International Standard for monitoring the equipment. 4. Policies Governments must impose policies and standards to stop the Black marketing of IoT devices. Summary Now you know exactly what happens every time you say, “Alexa! Turn up the temperature”. We have now seen the importance of IoT architecture and the four different phases of it and concluded with some advantages and disadvantages of IoT.