SlideShare a Scribd company logo
1 of 104
IoT-A ARM
Final ARM (D1.5)
Introduction
Introduction
• Nowadays solutions:
• Vertical silos -> is not like internet but intranet
Usage of ARM
• (ARM > Architecture reference model)
1. Cognitive aid
2. Common grounding
3. Generation of architectures
4. Identify differences in derived architectures
5. Achieving interoperability
6. System roadmaps and product life cycles
7. Benchmarking
Content Table
• Reference Model
• Reference Architecture
• View
• Function View
• Information View
• Development & Operation view
• Perspective
• Guidance
Reference Model
Interaction of all sub-models in the IoT Reference Model
Domain Model
• purpose: common understanding of the target domain in question
• "The things in the internet of things." Poster at the (IoT 2010):
The IoT domain suffers from an inconsistent usage and understanding
of the meaning of many central terms
• The domain model includes
• definition of the main concepts (terms)
• their responsibilities
• thier relationships
Physical Entity
• The Physical Entity is an identifiable part of the physical
environment that is of interest to the User for the
completion of the goal.
• e.g. humans, animals, cars, stores, room, computers, …
Virtual Entity
• PEs (1) are represented in the digital world by VE (*).
• Tho fundamental properties:
1. They are Digital Arterfacts.
2. Ideally, VEs are synchronized representations of a given set of aspects (or
properties) of respective PE.
User (of service)
• Not include different roles/users in the Domain Model
because underlying taxonomies depends on use cases.
• common option for modelling roles:
• Raymond, K. (1995). Reference model of open distributed processing (RM-
ODP): Introduction. Open Distributed Processing, Springer: 3-14.
1. Human user
2. Active Digitial Artifacts
Device
1. Sensor
2. Actuator
3. Tag
Resources
• software components
1. On-Device Resources:
• bridge between the digital and physical world
• may be storage resources (with limited capacity)
2. Network Resources
• run on dedicated server (or cloud)
• aggregate or more high-level information
• may be storage resources about Physical Entities (e.g. state, location …)
Services (1/2)
• MacKenzie, C. M., et al. (2006).
• "Services are the mechanism by which needs and capabilities are
brought together".
• Meyer, S., et al. (2013).
• "Software components with well-defined and standardized interfaces, which
enable access to other, heterogeneous components with native interfaces
and expose their functionality as a unit of work to a business process."
• Interaction with the service is done via the network.
Services (2/2)
1. non-IoT Services
• e.g. enterprise system
2. IoT Services
• Resource-level Services
• Virtual Entity-level Services
• Integrated Services
• Services should be orchestrated together to form a complete system.
• Associations between VEs and Service are important for look-
up and discovery processes.
Information Model
• Information Model defines the structure (e.g. relations, attributes,
services) of all the information for VE on a conceptual level.
Lefort, L. (2005). "Ontology for quantity kinds and
units: units and quantities definitions." W3 Semantic
Sensor Network Incubator Activity.
Other Information models in IoT-A
• Entity model
• Heras, R. d. l. and N. Santos "Internet of Things Architecture IoT-A Project
Internal Report D4.1 - Concepts and Solutions for Identification and Lookup of
IoT Resources."
• Resource model & Service description model
• Martín, G. "Internet of Things Architecture IoT-A Project Deliverable D2.1 -
Resource Description Specification."
• Event model
• Völksen, G. (2013). "Internet-of-Things Architecture IoT-A Project Deliverable
D2.6 - Event Representation and Processing ".
Functional Model
• MacKenzie, C. M., et al. (2006). "Reference model for service oriented
architecture 1.0." OASIS Standard 12:
• “The Functional Model is an abstract framework for understanding the
main Functionality Groups (FG) and their interactions. “
Functional Model
Reference architecture
How to describe the architecture? (1/2)
• [ IEEE Architecture] “A viewpoint defines the stakeholders whose
concerns are reflected in the viewpoint and the guidelines, principles,
and template models for constructing its views.“
• A view is composed of viewpoints, which aggregate several
architectural concepts in order to make the work with views easier.
• Example: Functional view:
• functional-decomposition viewpoint
• interaction viewpoint
• interface viewpoint
How to describe the architecture? (2/2)
• Rozanski, N. and E. Woods (2011). Software systems architecture:
working with stakeholders using viewpoints and perspectives,
Addison-Wesley.
• Some qualitative aspirations cut across more than one view
• A quality property is an externally visible, non-functional property of a
system such as performance, security, or scalability
• They are referred to perspectives. (Discuss latter)
• An architectural perspective is a collection of activities, tactics, and guidelines
that are used to ensure that a system exhibits a particular set of related
quality properties that require consideration across a number of the
system’s architectural views.
Good Material
• Harrison, R. (2007). TOGAF version 811 enterprise edition, Van Haren.
• Link: Developing Architecture Views (chapter 31)
Functional View
describes the functional building blocks of the architecture
Functional View
• Unified Requirement: Link
From WP6
1. Map UR to FG
2. Clusterize functionality to FC
IoT Process Management
IoT Process Management
Process Modelling
• Provides an environment for the modelling of IoT-aware processes
that will be serialized and executed in the Process Execution FC.
• Default function set
• IoT business processes modeler
• In D2.2, D2.4, D2.5
IoT Process Management
Process Execution
• Executes IoT-aware processes that have been modelled in the Process
Modelling FC. This execution is achieved by utilizing IoT Services that
are orchestrated in the Service Organization layer.
• Default function set
• Deploy process models to execution environments
• Align application requirements with service capabilities
• Run application
Interactions for Process Modelling
Interactions for Process Deployment and
Execution
Service Organization
Service Organization
Service Orchestration
• The Service Orchestration component resolves the IoT Services
that are suitable to fulfil service requests coming from Process
Execution component or from IoT -A users.
• Default function set
• Orchestrate IoT Services
• In D2.3, D2.5
Service Organization
Service Composition
• The Service Composition FC resolves services that are composed
of IoT Services and other services in order to create services
with extended functionality.
• Default function set
• Support flexible service compositions
• Increase QoI
• In D2.3, D2.5
Service Organization
Service Choreography
• allows Users to register their service request. By the time a suitable
service offers its capabilities on the blackboard the Service
Choreography FC will arrange the interaction between user and
service.
• Default function set
• Orchestrate IoT services (publish service request)
• In D2.6
IoT Services
IoT Services
IoT Service Resolution (1/2)
• User use it to find service.
• Service specification to query
• Service use it to manage service descriptions > lookup, discover
• Service identifier
• Service locator
• Further information, e.g. geographic area
IoT Services
IoT Service Resolution (2/2)
• Default function set
• Resolve Service with ID
• (Un)Subscribe to Resolution for Service with given ID (when locator change)
• Lockup Service given ID
• (Un)Subscribe to Lookup for Service with given ID (when description change)
• Discover service with given spec
• (Un)Subscribe to Discovery with given spec
• Manage description
• In D2.1, D4.3
IoT Services
IoT Service
• Software component exposing a Resource through a well- defined
interface to make it accessible to other parts of the IoT system, often
via the Internet.
• Service also deal with non-functional aspect (e.g. timeliness)
• Default function set
• Get Information
• Subscribe Information
• Put Information (store, configure, control)
Resolve Service Identifier to URL
Subscribe Resolution of Service Identifier to URL
Look up Service Description based on Service Identifier
Subscribe Look-up of Service Description based on Service Identifier
Discover Service based on Service Specification
Subscribe Discovery of Service Descriptions based on Service Specification
Insert Service Description
Update Service Description
Delete Service Description
Virtual Entity
Virtual Entity
VE
Resolution
Retrieve association
between VEs and IoT
Services.
(Subscribe) Discover VE-related services
(Subscribe) Lookup VE-related services
Manage association
Monitoring Automatically find new
associations
Assert static Association
Assert dynamic Association
Delete/Update
VE Service Overall access point to
particular entity (facade)
Read/Set Attribute
Look up Associations based on VE-ID and VE Service Specification
Subscribe Look-up of Associations for VE
Identifier and VE Service Specification
Discover Associations based on VE
Specifications and VE Service Specifications
Subscribe Discovery of Associations based on
VE Specification and VE Service Specification
Insert Association
Update Associations
Delete Association
Assert Static VE-IoT Service Association
Discover Dynamic Associations between VEs and Services
Monitor and Update Existing Dynamic Associations
Monitor and Delete Existing Dynamic Associations
Communication
Definition of Network Units
Application Description Telnet,
FTP
Message
Transport Specifies how to reliably
handle data transfer.
TCP, UDP Segment, Packet
Network Specifies addressing
assignments and how packets
are forwarded.
IP Datagram, Packet
Link Specifies the organization of
data into frames and how to
send frames over a network.
Drivers,
interface card
Frame
Material: An Introduction to TCP/IP (38 page)
Communication
End To End Communication
• End To End Communication abstraction:
• Reliable transfer, transport, translation
• Proxies/gateways support
• Tuning configuration parameters
• Default function set
• Transmit Message
• Configure Message Arguments
• Cache and Proxy
• Translate End to End Protocol
• Pass Context
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Communication
Network Communication
• Enabling communication between networks
• Default function set
• Transmit Packet (Datagram)
• Configure Packet Arguments
• Translate Network Protocol
• Route Packet
• Resolve Locator/ID
• Manage Packet Queue
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Communication
Hop To Hop Communication
• 1st abstraction of the device’s physical communication tech.
• Enable the usage and the configuration of any different link layer tech
• Default function set
• Transmit Frame
• Configure Frame Arguments
• Route Frame
• Manage Frame Queue
• In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
Security
Security
Authorization
• Managing access control policies
• Performing access control decision (when access to a restricted
resources)
• Default function set
• Authorize
• Manage Policies
• In D4.2
Security
Authentication
• Check the credentials provided by a user.
• Valid > return assertion. Use the assertion
• Default function set
• Authenticate
• Verify
• In D4.2
Security
Identity Management
• Address privacy question by
• Pseudonyms and accessory information to trusted subjects so that they can
operate anonymously
• Default function set
• Create Identity
• Resolve pseudonym
• In D4.2
Security
Key Exchange and Management
• Enable secure communications between multiple IoT-A peers
• Not need initial knowledge of each other
• Default function set
• Securely distribute keys
• Register security capabilities
• In D4.2
Security
Trust and Reputation Architecture
• Collect user reputation scores and calculates service trust levels
• Default function set
• Request Reputation Information
• Provide Reputation Information
• In D4.2
Management (Façade)
Management
Configuration
• Configuration for FC, Device …
• Default function set
• Retrieve Configuration
• Set Configuration
Management
Fault
• Default function set
• Handle Fault
• Monitor Fault
• Retrieve Fault
Management
Member
• Manage membership and associated information of entity
• FG, FC, VE, IoT Service, Device, App, User
• Default function set
• Monitor Member
• Retrieve Member
• Update Member
Management
Reporting
• Overlay for the other FCs.
• Determine the efficiency of the system
• Default function set
• Retrieve Report
Information View
shows how the information flow is routed through the system and what requests
are needed to query for or to subscribe to information offered by certain functional
components.
Development & Operation view
explains the operational behavior of the functional components
and the interplay of them.
Perspective
An architectural perspective is a collection of activities, tactics, and guidelines
that are used to ensure that a system exhibits a particular set of related quality
properties that require consideration across a number of the system’s
architectural views.
• For each of the perspectives, tactics are listed.
• The tactics are state-of–the art methodologies commonly used in
today’s systems architectures.
Perspective
Evolution and Interoperability
Activities • Characterize the evolution needs
• Assess the current ease of evolution
• Consider the evolution trade-offs
• Rework the architecture
Tactics • Contain change
• Create extensible interfaces
• Apply design techniques that facilitate change
• Apply meta model-based architectural styles
• Build variation points into the software
• Use standard extension points
• Achieve reliable change
• Preserve development environments
Perspective
Performance and scalability
Activities • Capture the performance requirements
• Create the performance models
• Analyze the performance model
• Conduct practical testing
• Assess against the requirements
• Rework the architecture
Tactics • Optimize repeated processing
• Reduce contention via replication
• Prioritize processing
• Consolidate related workload
• Distribute processing over time
• Minimize the use of shared resources
• Reuse resources and results
• Partition and parallelize
• Scale up or scale out
• Degrade gracefully
• Use asynchronous processing
• Relax transactional consistency
• Make design compromises
Perspective
Trust
Activities • Capture trust requirements
• Perform risk analysis
• Check interoperability requirements and their impact on
• trust between heterogeneous subjects
• Define trust model
• Consider risks derived from malicious or unintentional misuse of IoT
systems
Tactics • Harden root of trust
• Ensure physical security and implement tampering
• detection
• Ensure and check data freshness
• Consider the impact of security/performance tradeoffs on trust
• Use (trusted) infrastructural Trust and Reputation
• Agents for scalability
• Use security imprinting
• Check system integrity often
• Balance privacy vs. non-repudiation (accountability)
Perspective
Security (1/2)
Activities • Capture the security requirements
• Check interoperability requirements for impacts on
• security processes between heterogenous peers
• Conduct risk analysis
• Use infrastructural Authentication components that support more
Identity Frameworks for scalability and interoperability
• Use infrastructural or federated Key Exchange
• Management to secure communication initiation and tunnelling between
gateways for interoperability
• Use an Authorization component to enable interoperability with other
systems
• Define security impact on interaction model
• Address all aspects of Service and Communication Security
• Integrate the trust model and support privacy features
• Identify security hardware requirements
• Consider performance/security tradeoffs
• Validate against requirements
• Avoid Over-The-Air device management; if necessary secure properly
Perspective
Security (2/2)
Tactics • Use an extended Internet Threat Model for which takes into account
specific IoT communication vulnerabilities
• Harden infrastructural functional components
• Authenticate subjects
• Define and enforce access policies
• Secure communication infrastructure (gateways, infrastructure services)
• Secure communication between subjects
• Secure peripheral networks (data link layer security, network entry,
secure routing, mobility and handover)
• Avoid wherever possible wireless communication
• Physically protect peripheral devices or consider peripheral devices as
available to malicious users in the attacker model
Perspective
Privacy
Activities • Capture the privacy requirements
• Conduct risk analysis
• Evaluate compliancy with existing privacy frameworks
Tactics • Use an Identity Management component that supports
• Pseudonymization
• Avoid transmitting identifiers in clear especially over wireless connections
• Minimize unauthorized access to implicit information (e.g. deriving
location information from service access requests)
• Validate against requirements
• Consider the impact of security/performance tradeoffs on privacy
• Enable the user to control the privacy (and thus security and trust)
settings
• Balance privacy vs. non-repudiation (accountability)
Perspective
Availability and resilience
Activities • Capture the availability requirements
• Produce the availability schedule
• Estimate platform availability
• Estimate functional availability
• Assess against the requirements
• Rework the architecture
Tactics • Select fault-tolerant hardware
• Use high-availability clustering and load balancing
• Log transactions
• Apply software availability solutions
• Select or create fault-tolerant software
• Design for failure
• Allow for component replication
• Relax transactional consistency
• Identify backup and disaster recovery solution
Guidance
explaining the usage of the IoT ARM, e.g.:
derivation of domain-specific architectures from the ARM
Architecture concepts
• Physical View
• Context View
• Functional View
• Information View
• Deployment View
Virtual Entity
Virtual-Entity (VE) Resolution
• What’s association?
• Dynamic?
• In D4.3

More Related Content

What's hot

Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachArshdeep Bahga
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Slide Marvels
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elementsPooja Dixit
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoTFabMinds
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Merima Kulin
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of thingsGd Insaa
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiespavan penugonda
 
Topic detection & tracking
Topic detection & trackingTopic detection & tracking
Topic detection & trackingGeorge Ang
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfkanaka vardhini
 
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Mumbai B.Sc.IT Study
 

What's hot (20)

netconf and yang
netconf and yangnetconf and yang
netconf and yang
 
Internet of Things: A Hands-On Approach
Internet of Things: A Hands-On ApproachInternet of Things: A Hands-On Approach
Internet of Things: A Hands-On Approach
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
Internet of Things (IoT) - Slide Marvels, Top PowerPoint presentation design ...
 
Basic constituent elements
Basic constituent elementsBasic constituent elements
Basic constituent elements
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016Machine learning for wireless networks @Bestcom2016
Machine learning for wireless networks @Bestcom2016
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of things
 
Cloud, Fog & Edge Computing
Cloud, Fog & Edge ComputingCloud, Fog & Edge Computing
Cloud, Fog & Edge Computing
 
Chapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologiesChapter 5 IoT Design methodologies
Chapter 5 IoT Design methodologies
 
Topic detection & tracking
Topic detection & trackingTopic detection & tracking
Topic detection & tracking
 
IOT Unit 1.pptx
IOT Unit 1.pptxIOT Unit 1.pptx
IOT Unit 1.pptx
 
CoAP - Web Protocol for IoT
CoAP - Web Protocol for IoTCoAP - Web Protocol for IoT
CoAP - Web Protocol for IoT
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
IoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdfIoT & Applications Digital Notes.pdf
IoT & Applications Digital Notes.pdf
 
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
Internet Of Things (Question Paper) [October – 2018 | Choice Based Syllabus]
 
Introduction to IOT
Introduction to IOTIntroduction to IOT
Introduction to IOT
 

Viewers also liked

El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.07956663
 
Kemahiran bernilai tambah
Kemahiran bernilai tambahKemahiran bernilai tambah
Kemahiran bernilai tambahhallen77
 
Narrative photo writing task term 4
Narrative photo writing task term 4Narrative photo writing task term 4
Narrative photo writing task term 4Gavin Clark
 
Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Gavin Clark
 
Javascript session june 2013 (iii) jquery json
Javascript session june 2013 (iii) jquery   jsonJavascript session june 2013 (iii) jquery   json
Javascript session june 2013 (iii) jquery jsonabksharma
 
Auriga gamification the processes acquired
Auriga gamification the processes acquiredAuriga gamification the processes acquired
Auriga gamification the processes acquiredabksharma
 
Social Media Marketing - An Overview
Social Media Marketing - An OverviewSocial Media Marketing - An Overview
Social Media Marketing - An OverviewRhys Downard
 
Introduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationIntroduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationRhys Downard
 

Viewers also liked (12)

El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.El patrimonio de una empresa. sic 4º.
El patrimonio de una empresa. sic 4º.
 
Kemahiran bernilai tambah
Kemahiran bernilai tambahKemahiran bernilai tambah
Kemahiran bernilai tambah
 
Narrative photo writing task term 4
Narrative photo writing task term 4Narrative photo writing task term 4
Narrative photo writing task term 4
 
Morfo1 pie
Morfo1 pieMorfo1 pie
Morfo1 pie
 
Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014Leadership Presentation for NAPP 2014
Leadership Presentation for NAPP 2014
 
Javascript session june 2013 (iii) jquery json
Javascript session june 2013 (iii) jquery   jsonJavascript session june 2013 (iii) jquery   json
Javascript session june 2013 (iii) jquery json
 
O ring chart
O ring chartO ring chart
O ring chart
 
Auriga gamification the processes acquired
Auriga gamification the processes acquiredAuriga gamification the processes acquired
Auriga gamification the processes acquired
 
sosiologi
sosiologisosiologi
sosiologi
 
Social Media Marketing - An Overview
Social Media Marketing - An OverviewSocial Media Marketing - An Overview
Social Media Marketing - An Overview
 
Introduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine OptimisationIntroduction to Search Marketing - Search Engine Optimisation
Introduction to Search Marketing - Search Engine Optimisation
 
HIV &AIDS
HIV &AIDSHIV &AIDS
HIV &AIDS
 

Similar to IoT-A ARM

Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplifiedPrasad Chitta
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTUREAnyaForger34
 
Interoperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and ResourcesInteroperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and Resourcesiotest
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)Colin Bell
 
Architecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsArchitecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsGem WeBlog
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentationdikshagupta111
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Vinod Wilson
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxJENATH223
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...jeetendra mandal
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxBarananKamal
 
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...mfrancis
 
Mechanisms for Real World Services
Mechanisms for Real World ServicesMechanisms for Real World Services
Mechanisms for Real World Servicesiotest
 

Similar to IoT-A ARM (20)

Architectural design
Architectural designArchitectural design
Architectural design
 
Software architecture simplified
Software architecture simplifiedSoftware architecture simplified
Software architecture simplified
 
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURESOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
SOA1-Background.ppt SOFTWARE ORIENTED SERVICES AND ARCHITECTURE
 
Interoperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and ResourcesInteroperability issues and challenges for IoT Services and Resources
Interoperability issues and challenges for IoT Services and Resources
 
OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)OUCC2015 Service Oriented Enterprise (SOE)
OUCC2015 Service Oriented Enterprise (SOE)
 
Architecting and Designing Enterprise Applications
Architecting and Designing Enterprise ApplicationsArchitecting and Designing Enterprise Applications
Architecting and Designing Enterprise Applications
 
Diksha sda presentation
Diksha sda presentationDiksha sda presentation
Diksha sda presentation
 
IoT Methodology.pptx
IoT Methodology.pptxIoT Methodology.pptx
IoT Methodology.pptx
 
Soa 1 7.ppsx
Soa 1 7.ppsxSoa 1 7.ppsx
Soa 1 7.ppsx
 
Chapter - 1.pptx
Chapter - 1.pptxChapter - 1.pptx
Chapter - 1.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Domain Driven Design
Domain Driven DesignDomain Driven Design
Domain Driven Design
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1Representational state transfer (rest) architectural style1.1
Representational state transfer (rest) architectural style1.1
 
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptxDr.G.Balmurugan_IoT-Architecture_day_01.pptx
Dr.G.Balmurugan_IoT-Architecture_day_01.pptx
 
DSchap-02.ppt
DSchap-02.pptDSchap-02.ppt
DSchap-02.ppt
 
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
Top 5 Software Architecture Pattern Event Driven SOA Microservice Serverless ...
 
Systems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptxSystems Engineering Architecture - Vitech.pptx
Systems Engineering Architecture - Vitech.pptx
 
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
The Future Of Service-Oriented Component Models for the OSGi Framework - Clém...
 
Mechanisms for Real World Services
Mechanisms for Real World ServicesMechanisms for Real World Services
Mechanisms for Real World Services
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

IoT-A ARM

  • 3. Introduction • Nowadays solutions: • Vertical silos -> is not like internet but intranet
  • 4. Usage of ARM • (ARM > Architecture reference model) 1. Cognitive aid 2. Common grounding 3. Generation of architectures 4. Identify differences in derived architectures 5. Achieving interoperability 6. System roadmaps and product life cycles 7. Benchmarking
  • 5. Content Table • Reference Model • Reference Architecture • View • Function View • Information View • Development & Operation view • Perspective • Guidance
  • 7. Interaction of all sub-models in the IoT Reference Model
  • 8. Domain Model • purpose: common understanding of the target domain in question • "The things in the internet of things." Poster at the (IoT 2010): The IoT domain suffers from an inconsistent usage and understanding of the meaning of many central terms • The domain model includes • definition of the main concepts (terms) • their responsibilities • thier relationships
  • 9.
  • 10. Physical Entity • The Physical Entity is an identifiable part of the physical environment that is of interest to the User for the completion of the goal. • e.g. humans, animals, cars, stores, room, computers, …
  • 11. Virtual Entity • PEs (1) are represented in the digital world by VE (*). • Tho fundamental properties: 1. They are Digital Arterfacts. 2. Ideally, VEs are synchronized representations of a given set of aspects (or properties) of respective PE.
  • 12. User (of service) • Not include different roles/users in the Domain Model because underlying taxonomies depends on use cases. • common option for modelling roles: • Raymond, K. (1995). Reference model of open distributed processing (RM- ODP): Introduction. Open Distributed Processing, Springer: 3-14. 1. Human user 2. Active Digitial Artifacts
  • 14. Resources • software components 1. On-Device Resources: • bridge between the digital and physical world • may be storage resources (with limited capacity) 2. Network Resources • run on dedicated server (or cloud) • aggregate or more high-level information • may be storage resources about Physical Entities (e.g. state, location …)
  • 15. Services (1/2) • MacKenzie, C. M., et al. (2006). • "Services are the mechanism by which needs and capabilities are brought together". • Meyer, S., et al. (2013). • "Software components with well-defined and standardized interfaces, which enable access to other, heterogeneous components with native interfaces and expose their functionality as a unit of work to a business process." • Interaction with the service is done via the network.
  • 16. Services (2/2) 1. non-IoT Services • e.g. enterprise system 2. IoT Services • Resource-level Services • Virtual Entity-level Services • Integrated Services • Services should be orchestrated together to form a complete system. • Associations between VEs and Service are important for look- up and discovery processes.
  • 17. Information Model • Information Model defines the structure (e.g. relations, attributes, services) of all the information for VE on a conceptual level.
  • 18.
  • 19. Lefort, L. (2005). "Ontology for quantity kinds and units: units and quantities definitions." W3 Semantic Sensor Network Incubator Activity.
  • 20. Other Information models in IoT-A • Entity model • Heras, R. d. l. and N. Santos "Internet of Things Architecture IoT-A Project Internal Report D4.1 - Concepts and Solutions for Identification and Lookup of IoT Resources." • Resource model & Service description model • Martín, G. "Internet of Things Architecture IoT-A Project Deliverable D2.1 - Resource Description Specification." • Event model • Völksen, G. (2013). "Internet-of-Things Architecture IoT-A Project Deliverable D2.6 - Event Representation and Processing ".
  • 21. Functional Model • MacKenzie, C. M., et al. (2006). "Reference model for service oriented architecture 1.0." OASIS Standard 12: • “The Functional Model is an abstract framework for understanding the main Functionality Groups (FG) and their interactions. “
  • 23.
  • 24.
  • 26. How to describe the architecture? (1/2) • [ IEEE Architecture] “A viewpoint defines the stakeholders whose concerns are reflected in the viewpoint and the guidelines, principles, and template models for constructing its views.“ • A view is composed of viewpoints, which aggregate several architectural concepts in order to make the work with views easier. • Example: Functional view: • functional-decomposition viewpoint • interaction viewpoint • interface viewpoint
  • 27. How to describe the architecture? (2/2) • Rozanski, N. and E. Woods (2011). Software systems architecture: working with stakeholders using viewpoints and perspectives, Addison-Wesley. • Some qualitative aspirations cut across more than one view • A quality property is an externally visible, non-functional property of a system such as performance, security, or scalability • They are referred to perspectives. (Discuss latter) • An architectural perspective is a collection of activities, tactics, and guidelines that are used to ensure that a system exhibits a particular set of related quality properties that require consideration across a number of the system’s architectural views.
  • 28. Good Material • Harrison, R. (2007). TOGAF version 811 enterprise edition, Van Haren. • Link: Developing Architecture Views (chapter 31)
  • 29. Functional View describes the functional building blocks of the architecture
  • 30. Functional View • Unified Requirement: Link From WP6 1. Map UR to FG 2. Clusterize functionality to FC
  • 31.
  • 33. IoT Process Management Process Modelling • Provides an environment for the modelling of IoT-aware processes that will be serialized and executed in the Process Execution FC. • Default function set • IoT business processes modeler • In D2.2, D2.4, D2.5
  • 34. IoT Process Management Process Execution • Executes IoT-aware processes that have been modelled in the Process Modelling FC. This execution is achieved by utilizing IoT Services that are orchestrated in the Service Organization layer. • Default function set • Deploy process models to execution environments • Align application requirements with service capabilities • Run application
  • 35.
  • 37. Interactions for Process Deployment and Execution
  • 39. Service Organization Service Orchestration • The Service Orchestration component resolves the IoT Services that are suitable to fulfil service requests coming from Process Execution component or from IoT -A users. • Default function set • Orchestrate IoT Services • In D2.3, D2.5
  • 40. Service Organization Service Composition • The Service Composition FC resolves services that are composed of IoT Services and other services in order to create services with extended functionality. • Default function set • Support flexible service compositions • Increase QoI • In D2.3, D2.5
  • 41. Service Organization Service Choreography • allows Users to register their service request. By the time a suitable service offers its capabilities on the blackboard the Service Choreography FC will arrange the interaction between user and service. • Default function set • Orchestrate IoT services (publish service request) • In D2.6
  • 42.
  • 43.
  • 45. IoT Services IoT Service Resolution (1/2) • User use it to find service. • Service specification to query • Service use it to manage service descriptions > lookup, discover • Service identifier • Service locator • Further information, e.g. geographic area
  • 46. IoT Services IoT Service Resolution (2/2) • Default function set • Resolve Service with ID • (Un)Subscribe to Resolution for Service with given ID (when locator change) • Lockup Service given ID • (Un)Subscribe to Lookup for Service with given ID (when description change) • Discover service with given spec • (Un)Subscribe to Discovery with given spec • Manage description • In D2.1, D4.3
  • 47. IoT Services IoT Service • Software component exposing a Resource through a well- defined interface to make it accessible to other parts of the IoT system, often via the Internet. • Service also deal with non-functional aspect (e.g. timeliness) • Default function set • Get Information • Subscribe Information • Put Information (store, configure, control)
  • 48.
  • 50. Subscribe Resolution of Service Identifier to URL
  • 51. Look up Service Description based on Service Identifier
  • 52. Subscribe Look-up of Service Description based on Service Identifier
  • 53. Discover Service based on Service Specification
  • 54. Subscribe Discovery of Service Descriptions based on Service Specification
  • 59. Virtual Entity VE Resolution Retrieve association between VEs and IoT Services. (Subscribe) Discover VE-related services (Subscribe) Lookup VE-related services Manage association Monitoring Automatically find new associations Assert static Association Assert dynamic Association Delete/Update VE Service Overall access point to particular entity (facade) Read/Set Attribute
  • 60.
  • 61. Look up Associations based on VE-ID and VE Service Specification
  • 62. Subscribe Look-up of Associations for VE Identifier and VE Service Specification
  • 63. Discover Associations based on VE Specifications and VE Service Specifications
  • 64. Subscribe Discovery of Associations based on VE Specification and VE Service Specification
  • 68.
  • 69. Assert Static VE-IoT Service Association
  • 70. Discover Dynamic Associations between VEs and Services
  • 71. Monitor and Update Existing Dynamic Associations
  • 72. Monitor and Delete Existing Dynamic Associations
  • 74. Definition of Network Units Application Description Telnet, FTP Message Transport Specifies how to reliably handle data transfer. TCP, UDP Segment, Packet Network Specifies addressing assignments and how packets are forwarded. IP Datagram, Packet Link Specifies the organization of data into frames and how to send frames over a network. Drivers, interface card Frame Material: An Introduction to TCP/IP (38 page)
  • 75. Communication End To End Communication • End To End Communication abstraction: • Reliable transfer, transport, translation • Proxies/gateways support • Tuning configuration parameters • Default function set • Transmit Message • Configure Message Arguments • Cache and Proxy • Translate End to End Protocol • Pass Context • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 76. Communication Network Communication • Enabling communication between networks • Default function set • Transmit Packet (Datagram) • Configure Packet Arguments • Translate Network Protocol • Route Packet • Resolve Locator/ID • Manage Packet Queue • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 77. Communication Hop To Hop Communication • 1st abstraction of the device’s physical communication tech. • Enable the usage and the configuration of any different link layer tech • Default function set • Transmit Frame • Configure Frame Arguments • Route Frame • Manage Frame Queue • In D3.1, D3.2 , D3.3 , D3.4 , D3.5, D3.6
  • 78.
  • 80. Security Authorization • Managing access control policies • Performing access control decision (when access to a restricted resources) • Default function set • Authorize • Manage Policies • In D4.2
  • 81. Security Authentication • Check the credentials provided by a user. • Valid > return assertion. Use the assertion • Default function set • Authenticate • Verify • In D4.2
  • 82. Security Identity Management • Address privacy question by • Pseudonyms and accessory information to trusted subjects so that they can operate anonymously • Default function set • Create Identity • Resolve pseudonym • In D4.2
  • 83. Security Key Exchange and Management • Enable secure communications between multiple IoT-A peers • Not need initial knowledge of each other • Default function set • Securely distribute keys • Register security capabilities • In D4.2
  • 84. Security Trust and Reputation Architecture • Collect user reputation scores and calculates service trust levels • Default function set • Request Reputation Information • Provide Reputation Information • In D4.2
  • 86. Management Configuration • Configuration for FC, Device … • Default function set • Retrieve Configuration • Set Configuration
  • 87. Management Fault • Default function set • Handle Fault • Monitor Fault • Retrieve Fault
  • 88. Management Member • Manage membership and associated information of entity • FG, FC, VE, IoT Service, Device, App, User • Default function set • Monitor Member • Retrieve Member • Update Member
  • 89. Management Reporting • Overlay for the other FCs. • Determine the efficiency of the system • Default function set • Retrieve Report
  • 90. Information View shows how the information flow is routed through the system and what requests are needed to query for or to subscribe to information offered by certain functional components.
  • 91. Development & Operation view explains the operational behavior of the functional components and the interplay of them.
  • 92. Perspective An architectural perspective is a collection of activities, tactics, and guidelines that are used to ensure that a system exhibits a particular set of related quality properties that require consideration across a number of the system’s architectural views.
  • 93. • For each of the perspectives, tactics are listed. • The tactics are state-of–the art methodologies commonly used in today’s systems architectures.
  • 94. Perspective Evolution and Interoperability Activities • Characterize the evolution needs • Assess the current ease of evolution • Consider the evolution trade-offs • Rework the architecture Tactics • Contain change • Create extensible interfaces • Apply design techniques that facilitate change • Apply meta model-based architectural styles • Build variation points into the software • Use standard extension points • Achieve reliable change • Preserve development environments
  • 95. Perspective Performance and scalability Activities • Capture the performance requirements • Create the performance models • Analyze the performance model • Conduct practical testing • Assess against the requirements • Rework the architecture Tactics • Optimize repeated processing • Reduce contention via replication • Prioritize processing • Consolidate related workload • Distribute processing over time • Minimize the use of shared resources • Reuse resources and results • Partition and parallelize • Scale up or scale out • Degrade gracefully • Use asynchronous processing • Relax transactional consistency • Make design compromises
  • 96. Perspective Trust Activities • Capture trust requirements • Perform risk analysis • Check interoperability requirements and their impact on • trust between heterogeneous subjects • Define trust model • Consider risks derived from malicious or unintentional misuse of IoT systems Tactics • Harden root of trust • Ensure physical security and implement tampering • detection • Ensure and check data freshness • Consider the impact of security/performance tradeoffs on trust • Use (trusted) infrastructural Trust and Reputation • Agents for scalability • Use security imprinting • Check system integrity often • Balance privacy vs. non-repudiation (accountability)
  • 97. Perspective Security (1/2) Activities • Capture the security requirements • Check interoperability requirements for impacts on • security processes between heterogenous peers • Conduct risk analysis • Use infrastructural Authentication components that support more Identity Frameworks for scalability and interoperability • Use infrastructural or federated Key Exchange • Management to secure communication initiation and tunnelling between gateways for interoperability • Use an Authorization component to enable interoperability with other systems • Define security impact on interaction model • Address all aspects of Service and Communication Security • Integrate the trust model and support privacy features • Identify security hardware requirements • Consider performance/security tradeoffs • Validate against requirements • Avoid Over-The-Air device management; if necessary secure properly
  • 98. Perspective Security (2/2) Tactics • Use an extended Internet Threat Model for which takes into account specific IoT communication vulnerabilities • Harden infrastructural functional components • Authenticate subjects • Define and enforce access policies • Secure communication infrastructure (gateways, infrastructure services) • Secure communication between subjects • Secure peripheral networks (data link layer security, network entry, secure routing, mobility and handover) • Avoid wherever possible wireless communication • Physically protect peripheral devices or consider peripheral devices as available to malicious users in the attacker model
  • 99. Perspective Privacy Activities • Capture the privacy requirements • Conduct risk analysis • Evaluate compliancy with existing privacy frameworks Tactics • Use an Identity Management component that supports • Pseudonymization • Avoid transmitting identifiers in clear especially over wireless connections • Minimize unauthorized access to implicit information (e.g. deriving location information from service access requests) • Validate against requirements • Consider the impact of security/performance tradeoffs on privacy • Enable the user to control the privacy (and thus security and trust) settings • Balance privacy vs. non-repudiation (accountability)
  • 100. Perspective Availability and resilience Activities • Capture the availability requirements • Produce the availability schedule • Estimate platform availability • Estimate functional availability • Assess against the requirements • Rework the architecture Tactics • Select fault-tolerant hardware • Use high-availability clustering and load balancing • Log transactions • Apply software availability solutions • Select or create fault-tolerant software • Design for failure • Allow for component replication • Relax transactional consistency • Identify backup and disaster recovery solution
  • 101. Guidance explaining the usage of the IoT ARM, e.g.: derivation of domain-specific architectures from the ARM
  • 102.
  • 103. Architecture concepts • Physical View • Context View • Functional View • Information View • Deployment View
  • 104. Virtual Entity Virtual-Entity (VE) Resolution • What’s association? • Dynamic? • In D4.3

Editor's Notes

  1. The description of the representation of the information (e.g. binary, XML, RDF etc.) and concrete implementations are not part of the IoT Information Model. But can convert among each other if they follow this model
  2. Metadata may include time stamp, location …
  3. System is large, and how to describe? Architectural  views  make  both  the  derivation  of  the architecture  and  its  validation  easier.
  4. The component is described in detail in deliverables D2.2 and in the upcoming D2.4.
  5. The component is described in detail in deliverables D2.2 and in the upcoming D2.4.
  6. Use-Case
  7. This function resolves the appropriate services that are capable of handling the IoT User's request. If needed, temporary resources will be set up to store intermediate results that feed into service composition or complex event processing
  8. Provides asynchronous way of requesting service orchestration. IoT services matching the service request are executed on behalf of the requesting user once they are available. Complex services are able to act as user too here, they can issue requests for IoT services they need to fulfil the service composition.
  9. Structure > design choice. D2.1 is example