SlideShare a Scribd company logo
ARCHITECTURE LAYERS
INTERNETOF THINGS
IoT
BY GROUP 5
IoT solutions have
become a regular part of
our lives. From the
smartwatch on your
wrist to industrial
enterprises, connected
devices are everywhere.
Having things work for us
is no longer sci-fi fantasy.
MAJOR IOT BUILDING BLOCKS AND LAYERS
There is no single, agreed-upon IoT architecture. It varies in complexity and number of
architecturallayersdependingon a particularbusiness task.
For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as
many as seven layers.
The standardized architectural model proposed by IoT industry leaders.
MAJOR IOT BUILDING BLOCKS AND LAYERS
The key buildingblocks of any Iot structure are alwaysthe same, namely:
• smart things;
• networks and gatewaysenabling low-
power devices (which is often the case
in IoT) to enter the big Internet;
• the middlewareor IoT platforms
providingdata storage spaces and
advancedcomputing engines along
with analytical capabilities;and
• applications,allowingend users to
benefit from IoT and manipulatethe
physicalworld.
MAJOR IOT BUILDING BLOCKS AND LAYERS
These elements make up the backbone of any IoT system upon which effective, multi-layered
architecture can be developed.Most commonly, these layersare:
• the PERCEPTION LAYER hosting smart things;
• the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the
cloud and vice versa via networks and gateways;
• the PROCESSING LAYER employing IoT platforms to accumulateand manage all data
streams; and
• the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control
to end users.
Besides the most essential components, the article also describes three additional layers:
• the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge,
where IoT things collect new information.Typically,edgy computing occurs on gateways;
• the BUSINESS LAYER where businesses make decisions based on the data;and
• the SECURITY LAYER encompassing all other layers.
PERCEPTION LAYER
Converting analog signals into digital data and vice versa
The initialstage of any IoT system embraces a wide range of “things” or endpoint
devices that act as a bridge between the real and digital worlds. They vary in form and
size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be
dividedinto the following large groups
• Sensors such as probes, gauges, meters, and others. They
collect physicalparameterslike temperature or humidity, turn
them into electrical signals, and send them to the IoT system.
IoT sensors are typicallysmall and consume little power.
• Actuators, translatingelectrical signalsfrom the IoT system
into physicalactions. Actuatorsare used in motor controllers,
lasers, robotic arms.
• Machines and devices connected to sensors and actuatorsor
having them as integral parts.
CONNECTIVITY LAYER
Enabling data transmission
The second level is in charge of all communicationsacross devices, networks, and cloud
services that make up the IoT infrastructure. The connectivitybetween the physical
layer and the cloud is achievedin two ways:
The communications between devices and cloud services or gateways involve different networking
technologies.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
• This level is essential for enabling IoT systems
to meet the speed, security, and scale
requirementsof the 5th generation mobile
network or 5G. The new wireless standard
promises faster speeds, lower latency, and
the abilityto handle many more connected
devices, than the current 4G standard.
• The idea behind edge or fog computing is to
process and store information as early and as
close to its sources as possible. Thisapproach
allowsfor analyzingand transforming high
volumes of real-time data locally,at the edge
of the networks. Thus, you save the time and
other resources that otherwise would be
needed to send all datato cloud services.
The result is reduced system latency that
leadsto real-time responses and enhanced
performance.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
Edge computing occurs on gateways,local servers, or other edge nodes scattered
across the network. At this level, data can be:
• evaluatedto determine if it needs further processing at higher levels,
• formatted for further processing,
• decoded,
• filtered, and
• redirected to an additional destination
PROCESSING LAYER
Making raw data useful
The processing layer accumulates, stores, and processes data that comes
from the previous layer. All these tasks are commonly handled via IoT
platforms and include two major stages
Data accumulation stage Data abstraction stage
• The real-time data is captured via
an API and put at rest to meet the
requirements of non-real-time
applications. The data accumulation
component stage works as a transit hub
between event-based data generation and
query-based data consumption.
• Here, datapreparationis finalized so that
consumer applicationscan use it to
generate insights. The entire process
involvesthe following steps:
1. combining datafrom different sources,
both IoT and non-IoT,including ERM, ERP,
and CRM systems;
2. reconcilingmultiple data formats; and
3. aggregating datain one place or making it
accessible regardless of locationthrough
data virtualization.
APPLICATION LAYER
Addressing business requirements
At this layer, informationis analyzedby software to give answers to key business
questions. There are hundredsof IoT applicationsthat vary in complexity and function,
using different technology stacks and operatingsystems. Some examples are:
• device monitoringand controlsoftware,
• mobile apps for simple interactions,
• business intelligenceservices, and
• analyticsolutionsusing machine learning.
Currently, applicationscan be built right on top of IoT platforms that offer software
developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced
analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith
middleware.
BUSINESS LAYER
Implementing data-driven solutions
The informationgenerated at the previouslayersbrings value if only it results in problem-
solving solution and achieving business goals. New data must initiatecollaboration
between stakeholderswho in turn introduce new processes to enhance productivity.
The decision-makingusually involvesmore than one person working with more than one
software solution. For this reason, the business layer is defined as a separate stage,
higher than a single applicationlayer.
SECURITY LAYER
Preventing data-breaches
It goes without saying that there should be a security layer covering all the above-
mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll
only point out the basic features of the safe architecture across different levels.
Device security. Modern manufacturersof IoT devices typicallyintegratesecurity
features both in the hardware and firmware installedon it. This includes
• embedded TPM (Trusted Platform Module) chips with cryptographickeys for
authenticationand protectionof endpointdevices;
• a secure boot process that prevents unauthorizedcode from running on a powered-
up device;
• updatingsecurity patches on a regular basis; and
• physicalprotectionlike metal shields to block physicalaccess to the device.
SECURITY LAYER
Preventing data-breaches
Connection security. Whether datais being sent over devices, networks, or applications,
it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho
interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and
DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure
end-to-end data protection.
Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate
risks of exposing sensitive information to intruders. Cloud security also involves
authenticationand authorization mechanismsto limit access to the IoT applications.
Another importantsecurity method is device identitymanagement to verify the device’s
credibilitybefore allowing it to connect to the cloud.
Reference:
• https://www.altexsoft.com/blog/iot-architecture-layers-
components/
• https://www.hindawi.com/journals/jece/2017/9324035/
#:~:text=Architecture%20of%20IoT%20(A%3A%20three,(
B%3A%20five%20layers).&text=%5D.,the%20architecture
%20with%20three%20layers
• https://www.zibtek.com/blog/iot-architecture/
THANK YOU!
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja

More Related Content

What's hot

Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
Jason K
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
Yash Gajera
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
Eslam Nader
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)
TusharSoam
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
usman sarwar
 
Iot basics
Iot basicsIot basics
Iot basics
AllsoftSolutions
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
IoT
IoTIoT
IoT
Mphasis
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
sameergupta85
 
Boards for the IoT-Prototyping
Boards for the IoT-PrototypingBoards for the IoT-Prototyping
Boards for the IoT-Prototyping
Lars Gregori
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
pavan penugonda
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 
Iot presentation
Iot presentationIot presentation
Iot presentation
huma742446
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
Hitesh Mohapatra
 
Internet of things
Internet of thingsInternet of things
Internet of things
Vikrant Negi
 
Internet of things
Internet of thingsInternet of things
Internet of things
Palak Sood
 

What's hot (20)

Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
Elements of IoT connectivity technologies
Elements of IoT connectivity technologiesElements of IoT connectivity technologies
Elements of IoT connectivity technologies
 
Iot basics
Iot basicsIot basics
Iot basics
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
IoT
IoTIoT
IoT
 
Internet Of Things(IOT)
Internet Of Things(IOT)Internet Of Things(IOT)
Internet Of Things(IOT)
 
Boards for the IoT-Prototyping
Boards for the IoT-PrototypingBoards for the IoT-Prototyping
Boards for the IoT-Prototyping
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to Group 5 IoT Architecture Layer

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
IoT.pptx
IoT.pptxIoT.pptx
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Muhammad Ahad
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-SolutionsManoj Punamia
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
Embitel Technologies (I) PVT LTD
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
Intel IoT
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
SatyaKVivek
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
Mistral Solutions
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
Ahmed Banafa
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
IRJET Journal
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
Susan Wu
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
NadouShe
 
NX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT InterfaceNX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT Interface
Messung Industrial Automation & Controls
 
Nx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interfaceNx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interface
Messung Industrial Automation & Controls
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 

Similar to Group 5 IoT Architecture Layer (20)

Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Developing-IoT-Solutions
Developing-IoT-SolutionsDeveloping-IoT-Solutions
Developing-IoT-Solutions
 
What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?What is an IoT Gateway Device & Why It's Important?
What is an IoT Gateway Device & Why It's Important?
 
Intel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of ThingsIntel Gateway Solutions for the Internet of Things
Intel Gateway Solutions for the Internet of Things
 
IoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & ChallengesIoT Application Testing - Complexities & Challenges
IoT Application Testing - Complexities & Challenges
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
IoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdfIoT-CT internet of thing master séminaire cours.pdf
IoT-CT internet of thing master séminaire cours.pdf
 
NX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT InterfaceNX-ERA unleashes the power of IIot with MQTT Interface
NX-ERA unleashes the power of IIot with MQTT Interface
 
Nx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interfaceNx-era unleashes the power of i iot with mqtt interface
Nx-era unleashes the power of i iot with mqtt interface
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Group 5 IoT Architecture Layer

  • 2. IoT solutions have become a regular part of our lives. From the smartwatch on your wrist to industrial enterprises, connected devices are everywhere. Having things work for us is no longer sci-fi fantasy.
  • 3. MAJOR IOT BUILDING BLOCKS AND LAYERS There is no single, agreed-upon IoT architecture. It varies in complexity and number of architecturallayersdependingon a particularbusiness task. For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as many as seven layers. The standardized architectural model proposed by IoT industry leaders.
  • 4. MAJOR IOT BUILDING BLOCKS AND LAYERS The key buildingblocks of any Iot structure are alwaysthe same, namely: • smart things; • networks and gatewaysenabling low- power devices (which is often the case in IoT) to enter the big Internet; • the middlewareor IoT platforms providingdata storage spaces and advancedcomputing engines along with analytical capabilities;and • applications,allowingend users to benefit from IoT and manipulatethe physicalworld.
  • 5. MAJOR IOT BUILDING BLOCKS AND LAYERS These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed.Most commonly, these layersare: • the PERCEPTION LAYER hosting smart things; • the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the cloud and vice versa via networks and gateways; • the PROCESSING LAYER employing IoT platforms to accumulateand manage all data streams; and • the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control to end users. Besides the most essential components, the article also describes three additional layers: • the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge, where IoT things collect new information.Typically,edgy computing occurs on gateways; • the BUSINESS LAYER where businesses make decisions based on the data;and • the SECURITY LAYER encompassing all other layers.
  • 6. PERCEPTION LAYER Converting analog signals into digital data and vice versa The initialstage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital worlds. They vary in form and size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be dividedinto the following large groups • Sensors such as probes, gauges, meters, and others. They collect physicalparameterslike temperature or humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typicallysmall and consume little power. • Actuators, translatingelectrical signalsfrom the IoT system into physicalactions. Actuatorsare used in motor controllers, lasers, robotic arms. • Machines and devices connected to sensors and actuatorsor having them as integral parts.
  • 7. CONNECTIVITY LAYER Enabling data transmission The second level is in charge of all communicationsacross devices, networks, and cloud services that make up the IoT infrastructure. The connectivitybetween the physical layer and the cloud is achievedin two ways: The communications between devices and cloud services or gateways involve different networking technologies.
  • 8. EDGE OR FOG COMPUTING LAYER Reducing system latency • This level is essential for enabling IoT systems to meet the speed, security, and scale requirementsof the 5th generation mobile network or 5G. The new wireless standard promises faster speeds, lower latency, and the abilityto handle many more connected devices, than the current 4G standard. • The idea behind edge or fog computing is to process and store information as early and as close to its sources as possible. Thisapproach allowsfor analyzingand transforming high volumes of real-time data locally,at the edge of the networks. Thus, you save the time and other resources that otherwise would be needed to send all datato cloud services. The result is reduced system latency that leadsto real-time responses and enhanced performance.
  • 9. EDGE OR FOG COMPUTING LAYER Reducing system latency Edge computing occurs on gateways,local servers, or other edge nodes scattered across the network. At this level, data can be: • evaluatedto determine if it needs further processing at higher levels, • formatted for further processing, • decoded, • filtered, and • redirected to an additional destination
  • 10. PROCESSING LAYER Making raw data useful The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled via IoT platforms and include two major stages Data accumulation stage Data abstraction stage • The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation component stage works as a transit hub between event-based data generation and query-based data consumption. • Here, datapreparationis finalized so that consumer applicationscan use it to generate insights. The entire process involvesthe following steps: 1. combining datafrom different sources, both IoT and non-IoT,including ERM, ERP, and CRM systems; 2. reconcilingmultiple data formats; and 3. aggregating datain one place or making it accessible regardless of locationthrough data virtualization.
  • 11. APPLICATION LAYER Addressing business requirements At this layer, informationis analyzedby software to give answers to key business questions. There are hundredsof IoT applicationsthat vary in complexity and function, using different technology stacks and operatingsystems. Some examples are: • device monitoringand controlsoftware, • mobile apps for simple interactions, • business intelligenceservices, and • analyticsolutionsusing machine learning. Currently, applicationscan be built right on top of IoT platforms that offer software developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith middleware.
  • 12. BUSINESS LAYER Implementing data-driven solutions The informationgenerated at the previouslayersbrings value if only it results in problem- solving solution and achieving business goals. New data must initiatecollaboration between stakeholderswho in turn introduce new processes to enhance productivity. The decision-makingusually involvesmore than one person working with more than one software solution. For this reason, the business layer is defined as a separate stage, higher than a single applicationlayer.
  • 13. SECURITY LAYER Preventing data-breaches It goes without saying that there should be a security layer covering all the above- mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll only point out the basic features of the safe architecture across different levels. Device security. Modern manufacturersof IoT devices typicallyintegratesecurity features both in the hardware and firmware installedon it. This includes • embedded TPM (Trusted Platform Module) chips with cryptographickeys for authenticationand protectionof endpointdevices; • a secure boot process that prevents unauthorizedcode from running on a powered- up device; • updatingsecurity patches on a regular basis; and • physicalprotectionlike metal shields to block physicalaccess to the device.
  • 14. SECURITY LAYER Preventing data-breaches Connection security. Whether datais being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure end-to-end data protection. Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders. Cloud security also involves authenticationand authorization mechanismsto limit access to the IoT applications. Another importantsecurity method is device identitymanagement to verify the device’s credibilitybefore allowing it to connect to the cloud.
  • 16. THANK YOU! Group 5: Reymart John Aguho Lawrence Valdez Trishia Mae Salazar Gayle Allyson Guitones Dempster Winston Corpuz Matthew Erickson Quinto Marc Vincent Maneja