SlideShare a Scribd company logo
IoT Application Architecture
IoT Application
Architecture
• The IoT application architecture
represents the overall structure and
components of your IoT solution
Devices
• IoT devices are physical objects
equipped with sensors, actuators, and
communication interfaces. These devices
collect data from the physical world, such
as temperature, humidity, motion, or
location, and transmit it to an IoT platform
for processing.
IoT Edge
• IoT Edge refers to the computing devices
or gateways situated close to the IoT
devices, typically at the edge of the
network. These devices can preprocess
data locally before transmitting it to the
central IoT platform. Edge computing
reduces latency and minimizes data
transfer costs.
Ingestion
• Ingestion is the process of receiving,
collecting, and storing data from IoT
devices. It involves data acquisition,
validation, and transformation before data
is stored in a database or data lake for
further processing.
Provisioning
• Provisioning involves configuring and
authorizing IoT devices to connect to the
IoT platform securely. It ensures that only
authorized devices can access the
network and transmit data.
Hot Path
• The hot path in IoT refers to the real-time
processing and analysis of incoming
data. It involves immediate actions based
on the data, such as triggering alerts,
notifications, or immediate control
actions.
Warm Path
• The warm path is the intermediate layer
between the hot path and cold path. It
involves data processing that may not
require immediate action but is still
processed relatively quickly for
operational insights or near real-time
analytics.
Cold Path
• The cold path is where historical data is
stored and analysed for long-term
insights, trends, and predictive analytics.
It is used for batch processing and deep
analysis of accumulated data.
Management
• IoT device management encompasses
activities like device onboarding,
monitoring, software updates, and
security management. Effective device
management ensures the health and
security of the IoT ecosystem.
Business
Integration
• IoT applications often need to integrate
with existing enterprise systems, such as
Customer Relationship Management
(CRM), Enterprise Resource Planning
(ERP), or Supply Chain Management
(SCM) systems. This integration helps
organizations derive business value from
IoT data.
Monitoring
• Monitoring in IoT involves tracking the
health and performance of IoT devices,
gateways, and the overall system. It
includes real-time alerts, diagnostics, and
predictive maintenance to ensure optimal
functionality.

More Related Content

Similar to IoT Application Architecture.pptx

Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
ezzAyman1
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device Management
FriendlyTech1
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
ssuserec53e73
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
Pratik Gohel
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
ThomasJose43
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
Selva914004
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
spreya772
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
Gaurav Awasthi
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
gopinathcreddy
 
IOT Presentation new (2).pptx
IOT Presentation new (2).pptxIOT Presentation new (2).pptx
IOT Presentation new (2).pptx
MdMahfoozAlam5
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
murugesanarumugam
 
The Internet of Things.pdf
The Internet of Things.pdfThe Internet of Things.pdf
The Internet of Things.pdf
SONALIKABAL
 
IoT.pptx
IoT.pptxIoT.pptx
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
Priyab Satoshi
 
Internet of things
Internet of things Internet of things
Internet of things
Zubayer Al Billal Khan
 
IoT definition and the presentation for engineers
IoT definition and the presentation for engineersIoT definition and the presentation for engineers
IoT definition and the presentation for engineers
jeevarajan1302
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
Cognizant
 
Week 6.pptx
Week 6.pptxWeek 6.pptx
Week 6.pptx
DhamoDharan66
 
IOT ppt
IOT pptIOT ppt
Internet of things
Internet of thingsInternet of things
Internet of things
Magesh Parthasarathy
 

Similar to IoT Application Architecture.pptx (20)

Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
IoT Device Management
IoT Device ManagementIoT Device Management
IoT Device Management
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
UNIT-2.pptx
UNIT-2.pptxUNIT-2.pptx
UNIT-2.pptx
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Module 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iotModule 1 Internet of Things (2).ppt.pdf on iot
Module 1 Internet of Things (2).ppt.pdf on iot
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
OCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdfOCS352-IOT -UNIT-1.pdf
OCS352-IOT -UNIT-1.pdf
 
IOT Presentation new (2).pptx
IOT Presentation new (2).pptxIOT Presentation new (2).pptx
IOT Presentation new (2).pptx
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 
The Internet of Things.pdf
The Internet of Things.pdfThe Internet of Things.pdf
The Internet of Things.pdf
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Internet of things
Internet of things Internet of things
Internet of things
 
IoT definition and the presentation for engineers
IoT definition and the presentation for engineersIoT definition and the presentation for engineers
IoT definition and the presentation for engineers
 
The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
Week 6.pptx
Week 6.pptxWeek 6.pptx
Week 6.pptx
 
IOT ppt
IOT pptIOT ppt
IOT ppt
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
enizeyimana36
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball playEric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
Eric Nizeyimana's document 2006 from gicumbi to ttc nyamata handball play
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 

IoT Application Architecture.pptx

  • 2. IoT Application Architecture • The IoT application architecture represents the overall structure and components of your IoT solution
  • 3. Devices • IoT devices are physical objects equipped with sensors, actuators, and communication interfaces. These devices collect data from the physical world, such as temperature, humidity, motion, or location, and transmit it to an IoT platform for processing.
  • 4. IoT Edge • IoT Edge refers to the computing devices or gateways situated close to the IoT devices, typically at the edge of the network. These devices can preprocess data locally before transmitting it to the central IoT platform. Edge computing reduces latency and minimizes data transfer costs.
  • 5. Ingestion • Ingestion is the process of receiving, collecting, and storing data from IoT devices. It involves data acquisition, validation, and transformation before data is stored in a database or data lake for further processing.
  • 6. Provisioning • Provisioning involves configuring and authorizing IoT devices to connect to the IoT platform securely. It ensures that only authorized devices can access the network and transmit data.
  • 7. Hot Path • The hot path in IoT refers to the real-time processing and analysis of incoming data. It involves immediate actions based on the data, such as triggering alerts, notifications, or immediate control actions.
  • 8. Warm Path • The warm path is the intermediate layer between the hot path and cold path. It involves data processing that may not require immediate action but is still processed relatively quickly for operational insights or near real-time analytics.
  • 9. Cold Path • The cold path is where historical data is stored and analysed for long-term insights, trends, and predictive analytics. It is used for batch processing and deep analysis of accumulated data.
  • 10. Management • IoT device management encompasses activities like device onboarding, monitoring, software updates, and security management. Effective device management ensures the health and security of the IoT ecosystem.
  • 11. Business Integration • IoT applications often need to integrate with existing enterprise systems, such as Customer Relationship Management (CRM), Enterprise Resource Planning (ERP), or Supply Chain Management (SCM) systems. This integration helps organizations derive business value from IoT data.
  • 12. Monitoring • Monitoring in IoT involves tracking the health and performance of IoT devices, gateways, and the overall system. It includes real-time alerts, diagnostics, and predictive maintenance to ensure optimal functionality.