SlideShare a Scribd company logo
1 of 70
Download to read offline
2: IoT Reference Architectures
IoT Reference Architectures
• Industrie 4.0
– Reference Architecture Model Indutsrie 4.0
• Industrial Internet Consortium
– Industrial Internet Consortium Reference
Architecture
– Industrial Internet of Things Security Framework
• OpenFog Consortium
– OpenFog Reference Architecture
RAMI 4.0
Industrie 4.0
• I4.0 connects / merges production with
information and communications technology
• I4.0 merges customer data with machine data
• Machines communicate with machines
• Components and machines autonomously
manage production in a flexible, efficient, and
resource-saving manner
Reference Architecture
Model Industrie 4.0
• RAMI 4.0 is a three-dimensional map/model
showing how to approach the issue of
Industrie 4.0 in a structured manner
• RAMI 4.0 ensures that all participants involved
in Industrie 4.0 discussions understand each
other
RAMI 4.0
3D Model
• Architecture axis (Layers): models functionalities at
different granularities of the system
– comprises six different layers, from the asset to the business
level
• Process axis (Value Stream): models the stages of an asset’s
lifecycle, along with a corresponding value creation process
– based on IEC 62890
• Hierarchy axis (Hierarchy levels): models the breakdown
structure of assembled components
– based on a taxonomy that starts from the product and goes up
to the connected smart factory
RAMI 4.0
Axis 1 – Hierarchy: The
Factory
The Old World: Industrie
3.0
• Hardware-based
structure
• Functions are bound to
hardware
• Hierarchy-based
communication
• Product is isolated
Axis 1 – Hierarchy: The
Factory
The New World: Industrie 4.0
• Flexible systems and
machines; functions are
distributed through the
network
• The network can cross
company boundaries
• Participants interact across
hierarchical levels
• All participants are able to
communicate with each other
• Products are part of the
network
Axis 1 – Hierarchy: The
Factory (1/2)
• Product: abstracts the product that is manufactured in a
factory
• Field device: captures and/or controls data from the field
– sensor and electronic devices
• Control device: corresponds to the Operational Technology
(OT) that manages input and output
– PLCs (Programmable Logic Controllers) and DCSs (Distributed
Control Systems)
• Station, enables operators to coordinate several processes
and monitoring the results, by means of automation
systems
– SCADA
Axis 1 – Hierarchy: The
Factory (2/2)
• Work Center: keeps track of manufacturing
information and parameters that enable quality
management
• Enterprise: comprises the core business processes that
are usually managed through an ERP system
– production planning, production scheduling, marketing
and sales, financial modules
• Connected World: deals with the interlinking of all
stakeholders as part of their supply chain interactions
– including information sharing and exchange among them
Axis 2 – Architecture
Axis 2 – Architecture
Questions about the business idea
Axis 2 – Architecture
Communications Layer
Basis for standardized comms between admin shells
Axis 3 – Product Life Cycle
RAMI 4.0
Requirements
• Globally standardized
communication
• Easy installation and
operation (“plug and
play”)
• Standardized language
for the exchange of
information
Administration Shell
The Administration Shell
provides interpretation
• is the interface
connecting I4.0 to the
physical Thing
• stores all data and
information about the
asset
• serves as the network’s
standardized
communication interface
• integrates passive assets
Roles and Responsibilities of
the A.S.
• Each physical thing has its own administration shell.
• Several assets can form a thematic unit with a
common administration shell, several thematic units
Industrie 4.0 Component
• The connection takes
place over the I4.0
communication
• The administration shell
forms the digital part
• The Thing forms the
real part
Each object has its own
administration shell that
allows its integration into
Industrie 4.0
INDUSTRIAL INTERNET CONSORTIUM
REFERENCE ARCHITECTURE (IIRA)
IIRA Architecture Framework
• An architecture framework contains
information identifying the fundamental
architecture constructs and specifies
concerns, stakeholders, viewpoints, model
kinds, correspondence rules and conditions of
applicability
ISO/IEC/IEEE Architecture
Description
• A viewpoint comprises conventions framing the
description and analysis of specific system concerns
– Frames one or more concerns.
• The term concern refers to any topic of interest
pertaining to the system
• A stakeholder is an individual, team, organization or
classes thereof, having an interest in a concern and by
extension an interest in the viewpoint and system
• A model kind of a viewpoint is a modeling construct
that is defined to aid the tasks of describing, analyzing
and resolving concerns
Architecture Framework
IIRA Constructs and
Applications
IIRA
• Specifies a common architecture framework for
developing interoperable IoT systems for
different vertical industries
• Presents the structure of IoT
systems from four viewpoints
– Business
– Usage
– Functional
– Implementation
IIRA Viewpoints
• The business viewpoint attends to the
concerns of the identification of stakeholders
and their business vision, values and
objectives in establishing an IIoT system in its
business and regulatory context
• It identifies how the IIoT system achieves the
stated objectives through its mapping to
fundamental system capabilities.
IIRA Viewpoints
• The usage viewpoint addresses the concerns
of expected system usage. It is typically
represented as sequences of activities
involving human or logical (e.g. system or
system components) users that deliver its
intended functionality in ultimately achieving
its fundamental system capabilities.
IIRA Viewpoints
• The functional viewpoint focuses on the
functional components in an IIoT system, their
structure and interrelation, the interfaces and
interactions between them, and the relation
and interactions of the system with external
elements in the environment, to support the
usages and activities of the overall system.
IIRA Viewpoints
• The implementation viewpoint deals with the
technologies needed to implement functional
components (functional viewpoint), their
communication schemes and their lifecycle
procedures. These elements are coordinated
by activities (usage viewpoint) and supportive
of the system capabilities (business
viewpoint).
Relationships among
Viewpoints
• Crosscutting concerns: require consistent
consideration across the viewpoints
– Safety
– Security
IIRA Business Viewpoint
Vision and value-driven model
IIRA Usage Viewpoint
Is concerned with how an IIoT system realizes the key
capabilities identified in the business viewpoint
IIRA Functional Viewpoint
• The functional viewpoint specifies the
functionalities of an IIoT system
– specifies distinct functionalities in the form of
functional domains
• Functional domains are used to decompose an
IoT system in a set of important building blocks
– applicable across different vertical domains and
applications
– Used to conceptualize concrete functional
architectures
IIRA Functional Domains
• The IIRA decomposes
an IoT system into five
functional domains
– control domain
– operations domain
– information domain
– application domain
– business domain
Green Arrows: Data/Information Flows
Grey/White Arrows: Decision Flows
Red Arrows: Command/Request Floes
IIRA Control Domain
Represents the collection of functions that are
performed by industrial control systems
IIRA Operations Domain
Represents the collection
of functions responsible
for the provisioning,
management, monitoring
and optimization of the
systems in the control
domain
IIRA Information Domain
Represents the collection
of functions for gathering
data from various
domains, most
significantly from the
control domain, and
transforming, persisting,
and modeling or analyzing
those data to acquire
high-level intelligence
about the overall system
IIRA Application Domain
Represents the collection of functions
implementing application logic that realizes
specific business functionalities
IIRA Business Domain
The business domain functions enable end-to-
end operations of the industrial internet of
things systems by integrating them with
traditional or new types of industrial internet
systems specific business functions including
those supporting business processes and
procedural activities
Functional Domains,
Crosscutting Functions and
System Characteristics
IIRA Implementation
Viewpoint
• Based on a three-tier architecture
– follows the edge/cloud computing paradigm
Mapping 3-tier Architecture
to Functional Domains
INDUSTRIAL INTERNET SECURITY
FRAMEWORK (IISF)
IIoT Security and Safety
• IIoT: convergence of IT and OT worlds
– IT security is a well studied domain with strong
mathematical foundations
– OT security in trustworthy industrial systems relied on
physical separation and network isolation of
vulnerable components, and on the obscurity of the
design and access rules for critical control systems.
• Convergence of
– control systems
– business systems, and
– the Internet
IIoT Risks
Systems that were originally designed to be isolated are now
exposed to attacks of ever-increasing sophistication and the
design assumptions of existing OT systems no longer apply
Approach: make their IIoT systems trustworthy
Enabling Trustworthiness
• Key system characteristics: affect the trust decisions of an IIoT deployment
– Security: the condition of a system being protected from unintended or
unauthorized access, change or destruction
– Safety: the condition of the system operating without causing unacceptable
risk of physical injury or damage to the health of people, either directly or
indirectly, as a result of damage to property or to the environment
– Reliability: the ability of a system or component to perform its required
functions under stated conditions for a specified period of time
– Resilience: the emergent property of a system that behaves in a manner to
avoid, absorb and manage dynamic adversarial conditions while completing
the assigned missions, and reconstitute the operational capabilities after
causalities
– Privacy: the right of an individual or group to control or influence what
information related to them may be collected, processed, and stored and by
whom, and to whom that information may be disclosed
Trustworthiness
Trustworthiness is the degree of confidence one has
that the system performs as expected in respect to all
the key system
characteristics in
the face of
environmental
disruptions,
human errors,
system faults
and attacks
IT/OT Convergence
Functional and
Implementation Viewpoints
• IIoT implementations must provide end-to-
end security from the edge to the cloud
Security Functionalities
• They have to be deployed for the various edge points
according to the IISF
• Functional Viewpoint of IISF
IISF Mapping
• Alignment of and IoT system with IIRA and IISF
IISF Endpoint Protection
IISF Comms and Connectivity
Protection
IISF Security Monitoring and
Analysis
IISF Security Configuration
and Management
IISF Data Protection
IISF Security Model and
Policy
OPENFOG REFERENCE
ARCHITECTURE
OpenFog Consortium
• A consortium of high tech industrial enterprises
companies and research/academic institutions
collaborating towards standardizing and promoting the
fog computing paradigm
– Cisco
– Intel
– Microsoft
– Princeton
– Dell
– ARM
– …
• Merged with IIC, January 31, 2019
Fog Computing
An extension of the traditional cloud-based computing
model where implementations of the architecture can
reside in multiple layers of a network’s topology
A horizontal, system-level architecture that distributes
computing, storage, control and networking functions
closer to the users along a cloud-to-thing continuum
All benefits of cloud should be preserved with these
extensions to fog, including containerization,
virtualization, orchestration, manageability, and efficiency
OpenFog Architecture
Advantages
OpenFog architectures offer unique advantages over
other approaches
• Security: Additional security to ensure safe, trusted
transactions
• Cognition: awareness of client-centric objectives to
enable autonomy
• Agility: rapid innovation and affordable scaling under a
common infrastructure
• Latency: real-time processing and cyber-physical
system control
• Efficiency: dynamic pooling of local unused resources
from participating end-user devices
OpenFog Reference
Architecture
• Describes a generic fog platform that is designed
to be applicable to any vertical market or
application
– applicable across many different markets
– Transportation, agriculture, smart-cities, smart–
buildings, healthcare, hospitality, financial services,
and more
• Provides business value for IoT applications that
require real-time decision making, low latency,
improved security, and are network-constrained
Pillars of OpenFog RA
Hierarchical Fog Deployment
Models
Cloud vs.
Fog deployments
Fog Hierarchy Example
Fog Hirearchical Deployment
Model
OpenFog Reference
Architecture
OpenFog RA Perspectives
• Performance: Low latency
– Critical computing, time sensitive networking
• Security: end-to-end security
– Data integrity is of particular importance
– Builds security hierarchically
• From low level silicon devices to higher levels of node-to-x communications
• Manageability: all aspects of fog deployment
– RAS, DevOps
• Data analytics and Control: autonomy requires localized analytics
and control
• IT Business and Cross Fog Applications: In multi-vendor applications
need the ability to migrate and properly operate at any level of a
fog deployment’s hierarchy
References
• Reference Architecture Model Industrie 4.0
– https://www.plattform-
i40.de/I40/Redaktion/EN/Downloads/Publikation/rami40-an-
introduction.pdf?__blob=publicationFile&v=4
• Industrial Internet Consortium Reference Architecture
– https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01-
31.pdf
• Industrial Internet of Things Security Framework
– https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB.pdf
• OpenFog Reference Architecture
– https://www.iiconsortium.org/pdf/OpenFog_Reference_Archite
cture_2_09_17.pdf

More Related Content

What's hot

IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart ManufacturingHarrison Fortier
 
Industrial Internet of Things (IIoT)
Industrial Internet of Things (IIoT)Industrial Internet of Things (IIoT)
Industrial Internet of Things (IIoT)Aman Soni
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
5G and Internet of Things (IoT)
5G and Internet of Things (IoT)5G and Internet of Things (IoT)
5G and Internet of Things (IoT)Atifa Aqueel
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.docvenui2
 
VLSI Design-Lecture2 introduction to ic technology
VLSI Design-Lecture2 introduction to ic technologyVLSI Design-Lecture2 introduction to ic technology
VLSI Design-Lecture2 introduction to ic technologysritulasiadigopula
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)3G4G
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)sankar s
 
Smart manufacturing
Smart manufacturingSmart manufacturing
Smart manufacturingswati singh
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Industry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven ManufacturingIndustry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven ManufacturingSMARTRAC
 
HART protocol for network data communication
HART protocol for network data communicationHART protocol for network data communication
HART protocol for network data communicationAmol Dudhate
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOTAmberSinghal1
 
Industrial communication protocol
Industrial communication protocolIndustrial communication protocol
Industrial communication protocolASWATHYSURESH18
 
Hart communication
Hart communicationHart communication
Hart communicationSumit Sharma
 

What's hot (20)

Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
 
Industrial Internet of Things (IIoT)
Industrial Internet of Things (IIoT)Industrial Internet of Things (IIoT)
Industrial Internet of Things (IIoT)
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
IoT Wireless Technologies
IoT Wireless TechnologiesIoT Wireless Technologies
IoT Wireless Technologies
 
5G and Internet of Things (IoT)
5G and Internet of Things (IoT)5G and Internet of Things (IoT)
5G and Internet of Things (IoT)
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.doc
 
The IoT Advantage
The IoT AdvantageThe IoT Advantage
The IoT Advantage
 
VLSI Design-Lecture2 introduction to ic technology
VLSI Design-Lecture2 introduction to ic technologyVLSI Design-Lecture2 introduction to ic technology
VLSI Design-Lecture2 introduction to ic technology
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)
 
Internet of things (iot)
Internet of things (iot)Internet of things (iot)
Internet of things (iot)
 
Smart manufacturing
Smart manufacturingSmart manufacturing
Smart manufacturing
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
What is industry 4.0
What is industry 4.0 What is industry 4.0
What is industry 4.0
 
Industry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven ManufacturingIndustry 4.0: Sensor Driven Manufacturing
Industry 4.0: Sensor Driven Manufacturing
 
HART protocol for network data communication
HART protocol for network data communicationHART protocol for network data communication
HART protocol for network data communication
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
Industrial communication protocol
Industrial communication protocolIndustrial communication protocol
Industrial communication protocol
 
Hart communication
Hart communicationHart communication
Hart communication
 
Module 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGSModule 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGS
 

Similar to IoT Reference Architectures Overview

Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...
Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...
Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...OPEN DEI
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
 
Views on building blocks
Views on building blocksViews on building blocks
Views on building blocksRitesh Khanna
 
Assessing Technology Landscape
Assessing Technology LandscapeAssessing Technology Landscape
Assessing Technology LandscapeComputing Cage
 
chapter4-220725121544-5ef6271b.pdf
chapter4-220725121544-5ef6271b.pdfchapter4-220725121544-5ef6271b.pdf
chapter4-220725121544-5ef6271b.pdfMahmoudSOLIMAN380726
 
Chapter 4: Data Architecture Management
Chapter 4: Data Architecture ManagementChapter 4: Data Architecture Management
Chapter 4: Data Architecture ManagementAhmed Alorage
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 SecurityDuncan Purves
 
Software Architecture
Software ArchitectureSoftware Architecture
Software ArchitectureAhmed Misbah
 
ISO SC4 TC184 65th Workshop IMAGINE inputs for Future Architecture
ISO SC4 TC184 65th Workshop  IMAGINE inputs for Future ArchitectureISO SC4 TC184 65th Workshop  IMAGINE inputs for Future Architecture
ISO SC4 TC184 65th Workshop IMAGINE inputs for Future ArchitectureDr Nicolas Figay
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxJENATH223
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Graham Bleakley
 
Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Alexander SAMARIN
 

Similar to IoT Reference Architectures Overview (20)

Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...
Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...
Accelerating the Digital Transformation – Building a 3D IoT Reference Archite...
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
 
Views on building blocks
Views on building blocksViews on building blocks
Views on building blocks
 
Chap02
Chap02Chap02
Chap02
 
Assessing Technology Landscape
Assessing Technology LandscapeAssessing Technology Landscape
Assessing Technology Landscape
 
Lect 2 assessing the technology landscape
Lect 2 assessing the technology landscapeLect 2 assessing the technology landscape
Lect 2 assessing the technology landscape
 
Industry 4.0
Industry 4.0 Industry 4.0
Industry 4.0
 
Soa 1 7.ppsx
Soa 1 7.ppsxSoa 1 7.ppsx
Soa 1 7.ppsx
 
chapter4-220725121544-5ef6271b.pdf
chapter4-220725121544-5ef6271b.pdfchapter4-220725121544-5ef6271b.pdf
chapter4-220725121544-5ef6271b.pdf
 
Chapter 4: Data Architecture Management
Chapter 4: Data Architecture ManagementChapter 4: Data Architecture Management
Chapter 4: Data Architecture Management
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
 
Software Architecture
Software ArchitectureSoftware Architecture
Software Architecture
 
iot_basic_1.pptx
iot_basic_1.pptxiot_basic_1.pptx
iot_basic_1.pptx
 
ISO SC4 TC184 65th Workshop IMAGINE inputs for Future Architecture
ISO SC4 TC184 65th Workshop  IMAGINE inputs for Future ArchitectureISO SC4 TC184 65th Workshop  IMAGINE inputs for Future Architecture
ISO SC4 TC184 65th Workshop IMAGINE inputs for Future Architecture
 
ROUTE module 1
ROUTE module 1ROUTE module 1
ROUTE module 1
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
 
Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2Icp 3273-the iiot understanding designing and developing the bigger picture v2
Icp 3273-the iiot understanding designing and developing the bigger picture v2
 
Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4Mini-course at VFU - Architecting modern digital systems - 4
Mini-course at VFU - Architecting modern digital systems - 4
 

Recently uploaded

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

IoT Reference Architectures Overview

  • 1. 2: IoT Reference Architectures
  • 2. IoT Reference Architectures • Industrie 4.0 – Reference Architecture Model Indutsrie 4.0 • Industrial Internet Consortium – Industrial Internet Consortium Reference Architecture – Industrial Internet of Things Security Framework • OpenFog Consortium – OpenFog Reference Architecture
  • 4. Industrie 4.0 • I4.0 connects / merges production with information and communications technology • I4.0 merges customer data with machine data • Machines communicate with machines • Components and machines autonomously manage production in a flexible, efficient, and resource-saving manner
  • 5. Reference Architecture Model Industrie 4.0 • RAMI 4.0 is a three-dimensional map/model showing how to approach the issue of Industrie 4.0 in a structured manner • RAMI 4.0 ensures that all participants involved in Industrie 4.0 discussions understand each other
  • 6. RAMI 4.0 3D Model • Architecture axis (Layers): models functionalities at different granularities of the system – comprises six different layers, from the asset to the business level • Process axis (Value Stream): models the stages of an asset’s lifecycle, along with a corresponding value creation process – based on IEC 62890 • Hierarchy axis (Hierarchy levels): models the breakdown structure of assembled components – based on a taxonomy that starts from the product and goes up to the connected smart factory
  • 8. Axis 1 – Hierarchy: The Factory The Old World: Industrie 3.0 • Hardware-based structure • Functions are bound to hardware • Hierarchy-based communication • Product is isolated
  • 9. Axis 1 – Hierarchy: The Factory The New World: Industrie 4.0 • Flexible systems and machines; functions are distributed through the network • The network can cross company boundaries • Participants interact across hierarchical levels • All participants are able to communicate with each other • Products are part of the network
  • 10. Axis 1 – Hierarchy: The Factory (1/2) • Product: abstracts the product that is manufactured in a factory • Field device: captures and/or controls data from the field – sensor and electronic devices • Control device: corresponds to the Operational Technology (OT) that manages input and output – PLCs (Programmable Logic Controllers) and DCSs (Distributed Control Systems) • Station, enables operators to coordinate several processes and monitoring the results, by means of automation systems – SCADA
  • 11. Axis 1 – Hierarchy: The Factory (2/2) • Work Center: keeps track of manufacturing information and parameters that enable quality management • Enterprise: comprises the core business processes that are usually managed through an ERP system – production planning, production scheduling, marketing and sales, financial modules • Connected World: deals with the interlinking of all stakeholders as part of their supply chain interactions – including information sharing and exchange among them
  • 12. Axis 2 – Architecture
  • 13. Axis 2 – Architecture Questions about the business idea
  • 14. Axis 2 – Architecture Communications Layer Basis for standardized comms between admin shells
  • 15. Axis 3 – Product Life Cycle
  • 17. Requirements • Globally standardized communication • Easy installation and operation (“plug and play”) • Standardized language for the exchange of information
  • 18. Administration Shell The Administration Shell provides interpretation • is the interface connecting I4.0 to the physical Thing • stores all data and information about the asset • serves as the network’s standardized communication interface • integrates passive assets
  • 19. Roles and Responsibilities of the A.S. • Each physical thing has its own administration shell. • Several assets can form a thematic unit with a common administration shell, several thematic units
  • 20. Industrie 4.0 Component • The connection takes place over the I4.0 communication • The administration shell forms the digital part • The Thing forms the real part Each object has its own administration shell that allows its integration into Industrie 4.0
  • 22. IIRA Architecture Framework • An architecture framework contains information identifying the fundamental architecture constructs and specifies concerns, stakeholders, viewpoints, model kinds, correspondence rules and conditions of applicability
  • 23. ISO/IEC/IEEE Architecture Description • A viewpoint comprises conventions framing the description and analysis of specific system concerns – Frames one or more concerns. • The term concern refers to any topic of interest pertaining to the system • A stakeholder is an individual, team, organization or classes thereof, having an interest in a concern and by extension an interest in the viewpoint and system • A model kind of a viewpoint is a modeling construct that is defined to aid the tasks of describing, analyzing and resolving concerns
  • 26. IIRA • Specifies a common architecture framework for developing interoperable IoT systems for different vertical industries • Presents the structure of IoT systems from four viewpoints – Business – Usage – Functional – Implementation
  • 27. IIRA Viewpoints • The business viewpoint attends to the concerns of the identification of stakeholders and their business vision, values and objectives in establishing an IIoT system in its business and regulatory context • It identifies how the IIoT system achieves the stated objectives through its mapping to fundamental system capabilities.
  • 28. IIRA Viewpoints • The usage viewpoint addresses the concerns of expected system usage. It is typically represented as sequences of activities involving human or logical (e.g. system or system components) users that deliver its intended functionality in ultimately achieving its fundamental system capabilities.
  • 29. IIRA Viewpoints • The functional viewpoint focuses on the functional components in an IIoT system, their structure and interrelation, the interfaces and interactions between them, and the relation and interactions of the system with external elements in the environment, to support the usages and activities of the overall system.
  • 30. IIRA Viewpoints • The implementation viewpoint deals with the technologies needed to implement functional components (functional viewpoint), their communication schemes and their lifecycle procedures. These elements are coordinated by activities (usage viewpoint) and supportive of the system capabilities (business viewpoint).
  • 31. Relationships among Viewpoints • Crosscutting concerns: require consistent consideration across the viewpoints – Safety – Security
  • 32. IIRA Business Viewpoint Vision and value-driven model
  • 33. IIRA Usage Viewpoint Is concerned with how an IIoT system realizes the key capabilities identified in the business viewpoint
  • 34. IIRA Functional Viewpoint • The functional viewpoint specifies the functionalities of an IIoT system – specifies distinct functionalities in the form of functional domains • Functional domains are used to decompose an IoT system in a set of important building blocks – applicable across different vertical domains and applications – Used to conceptualize concrete functional architectures
  • 35. IIRA Functional Domains • The IIRA decomposes an IoT system into five functional domains – control domain – operations domain – information domain – application domain – business domain Green Arrows: Data/Information Flows Grey/White Arrows: Decision Flows Red Arrows: Command/Request Floes
  • 36. IIRA Control Domain Represents the collection of functions that are performed by industrial control systems
  • 37. IIRA Operations Domain Represents the collection of functions responsible for the provisioning, management, monitoring and optimization of the systems in the control domain
  • 38. IIRA Information Domain Represents the collection of functions for gathering data from various domains, most significantly from the control domain, and transforming, persisting, and modeling or analyzing those data to acquire high-level intelligence about the overall system
  • 39. IIRA Application Domain Represents the collection of functions implementing application logic that realizes specific business functionalities
  • 40. IIRA Business Domain The business domain functions enable end-to- end operations of the industrial internet of things systems by integrating them with traditional or new types of industrial internet systems specific business functions including those supporting business processes and procedural activities
  • 41. Functional Domains, Crosscutting Functions and System Characteristics
  • 42. IIRA Implementation Viewpoint • Based on a three-tier architecture – follows the edge/cloud computing paradigm
  • 43. Mapping 3-tier Architecture to Functional Domains
  • 45. IIoT Security and Safety • IIoT: convergence of IT and OT worlds – IT security is a well studied domain with strong mathematical foundations – OT security in trustworthy industrial systems relied on physical separation and network isolation of vulnerable components, and on the obscurity of the design and access rules for critical control systems. • Convergence of – control systems – business systems, and – the Internet
  • 46. IIoT Risks Systems that were originally designed to be isolated are now exposed to attacks of ever-increasing sophistication and the design assumptions of existing OT systems no longer apply Approach: make their IIoT systems trustworthy
  • 47. Enabling Trustworthiness • Key system characteristics: affect the trust decisions of an IIoT deployment – Security: the condition of a system being protected from unintended or unauthorized access, change or destruction – Safety: the condition of the system operating without causing unacceptable risk of physical injury or damage to the health of people, either directly or indirectly, as a result of damage to property or to the environment – Reliability: the ability of a system or component to perform its required functions under stated conditions for a specified period of time – Resilience: the emergent property of a system that behaves in a manner to avoid, absorb and manage dynamic adversarial conditions while completing the assigned missions, and reconstitute the operational capabilities after causalities – Privacy: the right of an individual or group to control or influence what information related to them may be collected, processed, and stored and by whom, and to whom that information may be disclosed
  • 48. Trustworthiness Trustworthiness is the degree of confidence one has that the system performs as expected in respect to all the key system characteristics in the face of environmental disruptions, human errors, system faults and attacks
  • 50. Functional and Implementation Viewpoints • IIoT implementations must provide end-to- end security from the edge to the cloud
  • 51. Security Functionalities • They have to be deployed for the various edge points according to the IISF • Functional Viewpoint of IISF
  • 52. IISF Mapping • Alignment of and IoT system with IIRA and IISF
  • 54. IISF Comms and Connectivity Protection
  • 55. IISF Security Monitoring and Analysis
  • 58. IISF Security Model and Policy
  • 60. OpenFog Consortium • A consortium of high tech industrial enterprises companies and research/academic institutions collaborating towards standardizing and promoting the fog computing paradigm – Cisco – Intel – Microsoft – Princeton – Dell – ARM – … • Merged with IIC, January 31, 2019
  • 61. Fog Computing An extension of the traditional cloud-based computing model where implementations of the architecture can reside in multiple layers of a network’s topology A horizontal, system-level architecture that distributes computing, storage, control and networking functions closer to the users along a cloud-to-thing continuum All benefits of cloud should be preserved with these extensions to fog, including containerization, virtualization, orchestration, manageability, and efficiency
  • 62. OpenFog Architecture Advantages OpenFog architectures offer unique advantages over other approaches • Security: Additional security to ensure safe, trusted transactions • Cognition: awareness of client-centric objectives to enable autonomy • Agility: rapid innovation and affordable scaling under a common infrastructure • Latency: real-time processing and cyber-physical system control • Efficiency: dynamic pooling of local unused resources from participating end-user devices
  • 63. OpenFog Reference Architecture • Describes a generic fog platform that is designed to be applicable to any vertical market or application – applicable across many different markets – Transportation, agriculture, smart-cities, smart– buildings, healthcare, hospitality, financial services, and more • Provides business value for IoT applications that require real-time decision making, low latency, improved security, and are network-constrained
  • 69. OpenFog RA Perspectives • Performance: Low latency – Critical computing, time sensitive networking • Security: end-to-end security – Data integrity is of particular importance – Builds security hierarchically • From low level silicon devices to higher levels of node-to-x communications • Manageability: all aspects of fog deployment – RAS, DevOps • Data analytics and Control: autonomy requires localized analytics and control • IT Business and Cross Fog Applications: In multi-vendor applications need the ability to migrate and properly operate at any level of a fog deployment’s hierarchy
  • 70. References • Reference Architecture Model Industrie 4.0 – https://www.plattform- i40.de/I40/Redaktion/EN/Downloads/Publikation/rami40-an- introduction.pdf?__blob=publicationFile&v=4 • Industrial Internet Consortium Reference Architecture – https://www.iiconsortium.org/IIC_PUB_G1_V1.80_2017-01- 31.pdf • Industrial Internet of Things Security Framework – https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB.pdf • OpenFog Reference Architecture – https://www.iiconsortium.org/pdf/OpenFog_Reference_Archite cture_2_09_17.pdf