SlideShare a Scribd company logo
IoT Architecture – The Art of
Building Smart Systems
In this article we will discuss IoT Architecture
“Alexa! Turn off the light”, we all know that this task happens in a millisecond,
but only a few of us know what happens behind the scenes. In this article, we
shall try to understand the architecture of IoT as we scale down each layer of
the 4 stage architecture IoT system.
Hopefully, by the end of this article, the next time you ask any virtual assistant
to operate a smart gadget, you will know exactly what is happening in the
background and which stage is performing what role.
The 4-Stage IoT architecture
The most used architecture for the Internet of Things is the 4-stage
architecture which has 4 phases in it. There is no rule stating that only the 4
stage architecture of IoT will be used all the time, but the twist is that these
four stages will always be used no matter how many stage architectures you
use.
By phases, I mean the path that the action traverses. So to achieve a specific
action, be it smart watches, smart homes, driverless cars, or any other
example, the data has to traverse or go through these phases.
IoT in itself means an interrelated internet-connected object system that
collects and transfers data over a wireless network without any human
intervention. This brings me to the next topic:
Importance of IoT architecture
In IoT, Data collection is enabled by having devices (or sensors) connected to
the internet via their own IP address. The quintessence of this is to track data
through their sensors, perform calculations and make them available for
consumption to their users.
One of the vital importance of having good architecture is ‘security’. If
penetration is anywhere in the architecture, the data could fall into the wrong
hand and could cause significant damage. Hence these perpetually connected
systems have a secure architecture.
In layman’s language, the IoT architecture is where the data flows from the
“things” to the “internet”! Here, “thing” refers to a machine, sensor, etc., and
“internet” refers to the cloud or server.
The 4 Stages of IoT architecture
Okay, enough talk. Let’s get down to the matter at hand. The four phases or
stages of IoT architecture are:
1. Sensors and Actuators
2. Internet Gateway
3. Edge IT
4. Data Center and Cloud
Let us take a detailed look at each phase and see what happens to the data in
each stage.
1. Sensors and actuators
We all know that IoT revolves around sensors. But do we know why? Well. it
is because they convert information obtained in the outer world into data for
analysis. They include data regarding the process or environmental
surroundings like temperature, fluid flow in the pipe, air quality, and more.
But what are actuators? Well, by definition, actuators can intervene to alter the
physical reality. It sounds mindboggling when you put it like that, but they are
boring. They are just normal machines like fan regulators, switches,
thermostats, valves, air conditioners, etc.
Every IoT device must and will have sensors because it is from this stage that
data is generated and collected. This data will travel through the different
stages of IoT architecture and, finally, the cloud.
2. Internet gateway
The IoT architecture’s second stage works close to the first stage (sensors
and actuators). This stage is the gateway to the internet, or more technically:
data acquisition systems (DAS).
The data obtained from the sensors is in analog form. For this data to enter
the cloud and undergo in-depth processing, it needs to be aggregated and
converted to digital signals.
This is precisely what this stage does. It prepares the data from the sensors to
be cloud readable, acting like a gateway to the cloud, thus the name ‘internet
gateway’. Finally, the internet receives this digitized data and routes it to
systems in stage 3.
3. Edge IT
At this stage, the data from the sensors has already been transferred to the IT
world. But there is one problem, the data still requires to be reduced in volume
before it enters the data centers. In technical terms, Edge IT systems perform
enhanced analytics and pre-processing, such as machine learning and
visualization.
The edge IT stage reduces the burden on IT infrastructure. How? Here are
two examples: edge IT systems use machine learning to scan for anomalies
and use visualization techniques to present information into attractive
dashboards, pie charts, and graphs. Here is a bonus fact: this stage sits a little
closer to the sensors in a wiring closet.
4. Data Centre and Cloud
The last and final stage of IoT architecture is not the data centre and cloud but
rather happens in the data centre and cloud. It is where the data is analysed,
managed, and securely stored for in-depth processing and follow-up revision
for feedback and future decisions.
This stage can also execute precise analysis by combining data from other
sources, including the digital and physical worlds. These sources can identify
and analyse significant patterns and trends.
With that said, this architecture is the basic fundamental for IoT. However,
before we conclude, let us take a look at some advantages and
disadvantages of IoT.
Advantages of IoT
1. Cost reduction
IoT devices catch problems and bugs very fast when compared to traditional
debugging. It saves not only the cost of repairs but also time.
2. Efficiency
IoT devices are very productive and efficient. One such example is an
automated PDF converter, which removes the hassle of PDF editing and
archiving.
3. Mobility
Thanks to IoT, employees can work from any geographical location, anytime,
without any restrictions.
4. Supports Various Technologies
IoT supports technologies like big data analytics, cloud computing, wireless
sensor networks, embedded systems, and many more.
Disadvantages of IoT
1. Security
Since the data travels all over the internet, end-to-end encryption is a must in
IoT. However, as of today, maintaining privacy is a big challenge. It is why we
need better and more secure architectures.
2. Complexity
As much as IoT is good at Fixing bugs, most of the devices still contain some
software bugs. Each IoT device must be able to seamlessly interact with other
devices in the network to which they are connected.
3. Compatibility
One example of why IoT devices are not compatible is that there is no
International Standard for monitoring the equipment.
4. Policies
Governments must impose policies and standards to stop the Black marketing
of IoT devices.
Summary
Now you know exactly what happens every time you say, “Alexa! Turn up the
temperature”. We have now seen the importance of IoT architecture and the
four different phases of it and concluded with some advantages and
disadvantages of IoT.

More Related Content

Similar to IoT Architecture .pdf

IoT.pptx
IoT.pptxIoT.pptx
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
vikramkagitapu
 
Internet of things
Internet of thingsInternet of things
Internet of things
Ashish Aggarwal
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
Rupesh930637
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
vishal choudhary
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
ssuserec53e73
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
ThomasJose43
 
iot m1.pdf
iot m1.pdfiot m1.pdf
iot m1.pdf
PavanPrabhu8
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
shashankvaidyar2
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
Muhammad Ahad
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
Jayanth Vinay
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
RamithaDevi
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
ardexateam
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
Daksh Raj Chopra
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
Tekle12
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
Ahmed Banafa
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
ugushe
 

Similar to IoT Architecture .pdf (20)

IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
internet of things(Architecture and components).pptx
internet of  things(Architecture and components).pptxinternet of  things(Architecture and components).pptx
internet of things(Architecture and components).pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Unit 1 iot.pptx
Unit 1 iot.pptxUnit 1 iot.pptx
Unit 1 iot.pptx
 
thomas.pptx
thomas.pptxthomas.pptx
thomas.pptx
 
iot m1.pdf
iot m1.pdfiot m1.pdf
iot m1.pdf
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
iot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdfiot-full-notes-iot-for-smart-systems.pdf
iot-full-notes-iot-for-smart-systems.pdf
 
IoT Agent Design Principles
IoT Agent Design PrinciplesIoT Agent Design Principles
IoT Agent Design Principles
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
Chapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptxChapter 4about internet of things IoT.pptx
Chapter 4about internet of things IoT.pptx
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUESUltimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
Ultimate_IoT_Implementation_Guide_for_Businesses EMERSON EDUARDO RODRIGUES
 
it was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptxit was the handout about AI hand out ppt.pptx
it was the handout about AI hand out ppt.pptx
 

More from SudhanshiBakre1

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
SudhanshiBakre1
 
Top Java Frameworks.pdf
Top Java Frameworks.pdfTop Java Frameworks.pdf
Top Java Frameworks.pdf
SudhanshiBakre1
 
Numpy ndarrays.pdf
Numpy ndarrays.pdfNumpy ndarrays.pdf
Numpy ndarrays.pdf
SudhanshiBakre1
 
Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdf
SudhanshiBakre1
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdf
SudhanshiBakre1
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdf
SudhanshiBakre1
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdf
SudhanshiBakre1
 
Node.js with MySQL.pdf
Node.js with MySQL.pdfNode.js with MySQL.pdf
Node.js with MySQL.pdf
SudhanshiBakre1
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdf
SudhanshiBakre1
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
SudhanshiBakre1
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdf
SudhanshiBakre1
 
Streams in Node .pdf
Streams in Node .pdfStreams in Node .pdf
Streams in Node .pdf
SudhanshiBakre1
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdf
SudhanshiBakre1
 
RESTful API in Node.pdf
RESTful API in Node.pdfRESTful API in Node.pdf
RESTful API in Node.pdf
SudhanshiBakre1
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdf
SudhanshiBakre1
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
SudhanshiBakre1
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdf
SudhanshiBakre1
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdf
SudhanshiBakre1
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
SudhanshiBakre1
 

More from SudhanshiBakre1 (20)

IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
Top Java Frameworks.pdf
Top Java Frameworks.pdfTop Java Frameworks.pdf
Top Java Frameworks.pdf
 
Numpy ndarrays.pdf
Numpy ndarrays.pdfNumpy ndarrays.pdf
Numpy ndarrays.pdf
 
Float Data Type in C.pdf
Float Data Type in C.pdfFloat Data Type in C.pdf
Float Data Type in C.pdf
 
IoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdfIoT Hardware – The Backbone of Smart Devices.pdf
IoT Hardware – The Backbone of Smart Devices.pdf
 
Internet of Things – Contiki.pdf
Internet of Things – Contiki.pdfInternet of Things – Contiki.pdf
Internet of Things – Contiki.pdf
 
Java abstract Keyword.pdf
Java abstract Keyword.pdfJava abstract Keyword.pdf
Java abstract Keyword.pdf
 
Node.js with MySQL.pdf
Node.js with MySQL.pdfNode.js with MySQL.pdf
Node.js with MySQL.pdf
 
Collections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdfCollections in Python - Where Data Finds Its Perfect Home.pdf
Collections in Python - Where Data Finds Its Perfect Home.pdf
 
File Handling in Java.pdf
File Handling in Java.pdfFile Handling in Java.pdf
File Handling in Java.pdf
 
Types of AI you should know.pdf
Types of AI you should know.pdfTypes of AI you should know.pdf
Types of AI you should know.pdf
 
Streams in Node .pdf
Streams in Node .pdfStreams in Node .pdf
Streams in Node .pdf
 
Annotations in Java with Example.pdf
Annotations in Java with Example.pdfAnnotations in Java with Example.pdf
Annotations in Java with Example.pdf
 
RESTful API in Node.pdf
RESTful API in Node.pdfRESTful API in Node.pdf
RESTful API in Node.pdf
 
Top Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdfTop Cryptocurrency Exchanges of 2023.pdf
Top Cryptocurrency Exchanges of 2023.pdf
 
Epic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdfEpic Python Face-Off -Methods vs.pdf
Epic Python Face-Off -Methods vs.pdf
 
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdfDjango Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
Django Tutorial_ Let’s take a deep dive into Django’s web framework.pdf
 
Benefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdfBenefits Of IoT Salesforce.pdf
Benefits Of IoT Salesforce.pdf
 
Epic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdfEpic Python Face-Off -Methods vs. Functions.pdf
Epic Python Face-Off -Methods vs. Functions.pdf
 
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdfPython Classes_ Empowering Developers, Enabling Breakthroughs.pdf
Python Classes_ Empowering Developers, Enabling Breakthroughs.pdf
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

IoT Architecture .pdf

  • 1. IoT Architecture – The Art of Building Smart Systems In this article we will discuss IoT Architecture “Alexa! Turn off the light”, we all know that this task happens in a millisecond, but only a few of us know what happens behind the scenes. In this article, we shall try to understand the architecture of IoT as we scale down each layer of the 4 stage architecture IoT system. Hopefully, by the end of this article, the next time you ask any virtual assistant to operate a smart gadget, you will know exactly what is happening in the background and which stage is performing what role. The 4-Stage IoT architecture The most used architecture for the Internet of Things is the 4-stage architecture which has 4 phases in it. There is no rule stating that only the 4 stage architecture of IoT will be used all the time, but the twist is that these four stages will always be used no matter how many stage architectures you use. By phases, I mean the path that the action traverses. So to achieve a specific action, be it smart watches, smart homes, driverless cars, or any other example, the data has to traverse or go through these phases.
  • 2. IoT in itself means an interrelated internet-connected object system that collects and transfers data over a wireless network without any human intervention. This brings me to the next topic: Importance of IoT architecture In IoT, Data collection is enabled by having devices (or sensors) connected to the internet via their own IP address. The quintessence of this is to track data through their sensors, perform calculations and make them available for consumption to their users. One of the vital importance of having good architecture is ‘security’. If penetration is anywhere in the architecture, the data could fall into the wrong hand and could cause significant damage. Hence these perpetually connected systems have a secure architecture. In layman’s language, the IoT architecture is where the data flows from the “things” to the “internet”! Here, “thing” refers to a machine, sensor, etc., and “internet” refers to the cloud or server. The 4 Stages of IoT architecture Okay, enough talk. Let’s get down to the matter at hand. The four phases or stages of IoT architecture are: 1. Sensors and Actuators 2. Internet Gateway
  • 3. 3. Edge IT 4. Data Center and Cloud Let us take a detailed look at each phase and see what happens to the data in each stage. 1. Sensors and actuators We all know that IoT revolves around sensors. But do we know why? Well. it is because they convert information obtained in the outer world into data for analysis. They include data regarding the process or environmental surroundings like temperature, fluid flow in the pipe, air quality, and more. But what are actuators? Well, by definition, actuators can intervene to alter the physical reality. It sounds mindboggling when you put it like that, but they are boring. They are just normal machines like fan regulators, switches, thermostats, valves, air conditioners, etc. Every IoT device must and will have sensors because it is from this stage that data is generated and collected. This data will travel through the different stages of IoT architecture and, finally, the cloud. 2. Internet gateway The IoT architecture’s second stage works close to the first stage (sensors and actuators). This stage is the gateway to the internet, or more technically: data acquisition systems (DAS).
  • 4. The data obtained from the sensors is in analog form. For this data to enter the cloud and undergo in-depth processing, it needs to be aggregated and converted to digital signals. This is precisely what this stage does. It prepares the data from the sensors to be cloud readable, acting like a gateway to the cloud, thus the name ‘internet gateway’. Finally, the internet receives this digitized data and routes it to systems in stage 3. 3. Edge IT At this stage, the data from the sensors has already been transferred to the IT world. But there is one problem, the data still requires to be reduced in volume before it enters the data centers. In technical terms, Edge IT systems perform enhanced analytics and pre-processing, such as machine learning and visualization. The edge IT stage reduces the burden on IT infrastructure. How? Here are two examples: edge IT systems use machine learning to scan for anomalies and use visualization techniques to present information into attractive dashboards, pie charts, and graphs. Here is a bonus fact: this stage sits a little closer to the sensors in a wiring closet. 4. Data Centre and Cloud The last and final stage of IoT architecture is not the data centre and cloud but rather happens in the data centre and cloud. It is where the data is analysed,
  • 5. managed, and securely stored for in-depth processing and follow-up revision for feedback and future decisions. This stage can also execute precise analysis by combining data from other sources, including the digital and physical worlds. These sources can identify and analyse significant patterns and trends. With that said, this architecture is the basic fundamental for IoT. However, before we conclude, let us take a look at some advantages and disadvantages of IoT. Advantages of IoT 1. Cost reduction IoT devices catch problems and bugs very fast when compared to traditional debugging. It saves not only the cost of repairs but also time. 2. Efficiency IoT devices are very productive and efficient. One such example is an automated PDF converter, which removes the hassle of PDF editing and archiving. 3. Mobility Thanks to IoT, employees can work from any geographical location, anytime, without any restrictions. 4. Supports Various Technologies IoT supports technologies like big data analytics, cloud computing, wireless sensor networks, embedded systems, and many more.
  • 6. Disadvantages of IoT 1. Security Since the data travels all over the internet, end-to-end encryption is a must in IoT. However, as of today, maintaining privacy is a big challenge. It is why we need better and more secure architectures. 2. Complexity As much as IoT is good at Fixing bugs, most of the devices still contain some software bugs. Each IoT device must be able to seamlessly interact with other devices in the network to which they are connected. 3. Compatibility One example of why IoT devices are not compatible is that there is no International Standard for monitoring the equipment. 4. Policies Governments must impose policies and standards to stop the Black marketing of IoT devices. Summary Now you know exactly what happens every time you say, “Alexa! Turn up the temperature”. We have now seen the importance of IoT architecture and the four different phases of it and concluded with some advantages and disadvantages of IoT.