0% found this document useful (0 votes)
30 views6 pages

Test 1

The document provides an overview of IoT architecture, detailing both four-layered and five-layered models that include components such as perception, network, middleware, application, and business layers. It outlines the functions of each layer, the principles for designing IoT architecture, and emphasizes the importance of interoperability and security. Additionally, it describes the various layers involved in IoT, including asset, resource, communication, service support, data and information, application, and business layers.

Uploaded by

govindanm223
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views6 pages

Test 1

The document provides an overview of IoT architecture, detailing both four-layered and five-layered models that include components such as perception, network, middleware, application, and business layers. It outlines the functions of each layer, the principles for designing IoT architecture, and emphasizes the importance of interoperability and security. Additionally, it describes the various layers involved in IoT, including asset, resource, communication, service support, data and information, application, and business layers.

Uploaded by

govindanm223
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

2.

2 M2M TO IOT –AN ARCHITECTURAL OVERVIEW

IoT Architecture Overview


IoT can be classified into a four or five-layered architecture which gives
you a complete overview of how it works in real life.
The various components of the architecture include the
following:
Four-layered architecture: this includes media/device layer,
network layer, service andapplication support layer, and application layer.
Five-layered architecture: this includes perception layer, network
layer, middleware layer,application layer, and business layer.
Functions of Each Layer
Sensor/Perception layer: This layer comprises of wireless devices,
sensors, and radiofrequency identification (RFID) tags that are used for
collecting and transmitting raw datasuch as the temperature, moisture, etc.
which is passed on to the next layer.
Network layer: This layer is largely responsible for routing data to the
next layer in thehierarchy with the help of network protocols. It uses wired
and wireless technologies for datatransmission.
Middleware layer: This layer comprises of databases that store the
information passed on bythe lower layers where it performs information
processing and uses the results to makefurther decisions.
Service and application support layer: This layer involve business
process modeling andexecution as well as IoT service monitoring and
resolution.
Application layer: It consists of application user interface and deals
with various applicationssuch as home automation, electronic health
monitoring, etc.
Business layer: this layer determines the future or further actions required
based on the data provided by the lower layers.
2.2.1 BUILDING AN ARCHITECTURE

Architecture refers to the description of the main conceptual elements,


the actual elements of a target system, how they relate to each other, and
principles for the design of the architecture. The applied architecture is then
the blueprint used to develop the actual system solution.

2.2.2 MAIN DESIGN PRINCIPLES AND NEEDED CAPABILITIES

 The architecture relies on the separation of resources providing


sensing and actuation from the actual devices, a set of contextual and
real world entity-centric services, and the users of the services.
 SENSEI further relies on an open-ended constellation of providers and
users, and also provides a reference model for different business roles.
 A number of design principles and guidelines are identified, and so is a
set of requirements.
 Finally, the architecture itself contains a set of key functional
capabilities.
 IoT-A refers to as the Architectural Reference Model (ARM).
 The vision of IoT-A is, via the ARM, to establish a means to achieve a
high degree of interoperability between different IoT solutions at the
different system levels of communication, service, and information.
 IoT-A provides a set of different architectural views, establishes a
proposed terminology and a set of Unified Requirements.
 The overall design objective of IoT architecture shall be to target a
horizontal system of real-world services that are open, service-
oriented, secure, and offer trust.
 Design for reuse of deployed IoT resources across application domains.
 Design for a set of support services that provide open service-oriented
capabilities and can be used for application development and
execution.
 Design for different abstraction levels that hide underlying
complexities and heterogeneities.
 Design for sensing and actors taking on different roles of providing and
using services across different business domains and value chains.
 Design for ensuring trust, security, and privacy.
 Design for scalability, performance, and effectiveness.
 Design for simplicity of management.
 Design for different service delivery models.
 Design for lifecycle support.

2.2.3 AN IOT ARCHITECTURE OUTLINE

Asset Layers
First Layer in IoT - This layer comprises basic element or objects
which are used for Monitoring and Controlling. This layer has various digital
representation and Identifiers. Exp: Building, Utility Systems, Home and
People.

Resource Layer
Sensing, Actuation and Embedded Identities are main functionality
ofthis layer. It has two types Primary Resources such as Sensors,
Actuatorand RFID Tags, Readers etc and Secondary Resources such as
Gateways.
Communication Layer
This is Second Layer mainly used for communication among
theinterconnected different objects to provide specific services.
Generally,the IoT nodes are operated using LLN(Low Power Lossy
NetworkCommunication) which are used for Resource Constraint
applications. Forexample WiFi, Bluetooth, IEEE 802.15.4, Z-wave, and LTE-
Advanced.
Apart from this new identity technologies also used in IoT like
RFID,Near Field Communication (NFC) and ultra-wide bandwidth (UWB).RFID
–Radio Frequency Identification is new technology used to identifyObject
using unique identity in M2M technology. The RFID technologyhas Tags,
Readers components. Tags are small chip, attached to provideobject’s
identity which is normally assigned with Unique ID. The RFIDreader is
another component which is used to transmit a query signal tothe tag and
receives reflected signal from the tag. This signal is passed tothe database
for further processing.

Service Support Layer


This layer typically executing in Data Center or Servers inside
anOrganization or Cloud Environment. This layer can provide numerous
functions such as Remote Device Management, Remote Diagnostics
orRecovery, Setting Event Filters and Communication related Functionssuch
as LBS (Location Based Services) and GIS(Geographic InformationServices).
Data and Information Layers
Abstract services are provided in this layer. Important goal is to
capture knowledge and provide advanced Control Logic and Support.
Application Layer
Customers request variety of services which are provided by this layer. It
is present above the Data and Information Layer. This application layer can
provide Blood Pressure, temperature and air humidity measurements of the
patient who asks for analysization using machine learning concepts.The main
aim of this layer is to provide High Quality Services to satisfy Customer
requirements and their needs. Smart home, Smart building, Transportation,
Industrial automation and Smart healthcare are numerous application field
which are covered by Application Layer.
Business Layer
Last layer is business (management) layer which is mainly useful for
different types of System activity and Services. They received data from
thisapplication layer which is used to build a business model, graphs,
flowcharts, etc which is the unique Functions of this layer. This layer is
responsible for Designing, analyzing, implementing, evaluation and
Monitoring process.
Management, Security and Data Services
Management, Security and Data Services IoT Management Layer
is responsible for Various Operations, Maintenance, Administration and
Provisioning. IoT Security Layer is responsible for Communication and
Information Security, Identity Management and Authentication, Authorization
and used to protect from threats and Harms. Finally Data and Services
layer is responsible for Event filtering, Data aggregation, Data Averaging
and Contextual Meta Data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy