Iot M0dule 1
Iot M0dule 1
Iot M0dule 1
Until recently, information technology (IT) and operational technology (OT) have
for the most part lived in separate worlds.
IT supports connections to the Internet along with related data and technology
systems and is focused on the secure flow of data across an organization.
Typically, IT did not get involved with the production and logistics of OT
environments.
Take a closer look at some of the differences between IT and IoT networks, with a focus on the IoT
requirements that are driving new network architectures, and considers what adjustments are needed.
COMPARING IOT ARCHITECTURES
The oneM2M IoT Standardized Architecture:
The goal of this committee was to create a common architecture that would help accelerate
the adoption of M2M applications and devices.
Over time, the scope has expanded to include the Internet of Things.
One of the greatest challenges in designing an IoT architecture is dealing with the
heterogeneity of devices, software, and access methods.
By developing a horizontal platform architecture, oneM2M is
developing standards that allow interoperability at all levels of the IoT
stack
The oneM2M architecture divides IoT functions into three major
domains:
The application layer
The services layer
The network layer
Applications layer:
The oneM2M architecture gives major attention to connectivity
between devices and their applications.
At this layer, horizontal modules include the physical network that the IoT
applications run on, the underlying management protocols, and the hardware.
Network layer:
This is the communication domain for the IoT devices and endpoints.
It includes the devices themselves and the communications network that links
them.
From an architectural standpoint, several components have to work together for an IoT network to be
operational:
“Things” layer
Communications network layer
Access network sublayer
Gateways and backhaul network sublayer
Network transport sublayer
IoT network management sublayer
Application and analytics layer
Compute and network assets used in IoT can be very different from
those in IT environments. The difference in the physical form factors
between devices used by IT and OT is obvious even to the most casual
of observers. What typically drives this is the physical environment in
which the devices are deployed. What may not be as inherently
obvious, however, is their operational differences. The operational
differences must be understood in order to apply the correct handling
to secure the target assets.
Access Network Sublayer
• There is a direct relationship between the IoT network technology you
choose and the type of connectivity topology this technology allows
PAN (personal area network): Scale of a few meters. This is the personal space
around a person. A common wireless technology for this scale is Bluetooth.
HAN (home area network): Scale of a few tens of meters. At this scale, common
wireless technologies for IoT include ZigBee and Bluetooth Low Energy (BLE).
NAN (neighborhood area network): Scale of a few hundreds of meters. The term
NAN is often used to refer to a group of house units from which data is collected.
FAN (field area network): Scale of several tens of meters to several hundred
meters. FAN typically refers to an outdoor area larger than a single group of house
units. The FAN is often seen as “open space” (and therefore not secured and not
controlled).
LAN (local area network): Scale of up to 100 m. This term is very common in
networking, and it is therefore also commonly used in the IoT space when
standard networking technologies (such as Ethernet or IEEE 802.11) are used.
Similar ranges also do not mean similar topologies. Some technologies
offer flexible connectivity structure to extend communication possibilities:
• Point-to-point topologies
• Point-to-multipoint
Comparison of the main solutions from an architectural angle:
Layer 3: Applications and Analytics Layer
• Analytics application:
- collects data from multiple smart objects
- processes the collected data
- displays information resulting from the data that was processed
application processes
Control application:
- controls the behavior of the smart object or the behavior of an
object related to the smart object.
- used for controlling complex aspects of an IoT network with a
logic that cannot be programmed inside a single IoT object
IOT DATA MANAGEMENT AND COMPUTE STACK
This model also has limitations, As data volume, the variety of objects
connecting to the network, and the need for more efficiency increase,
new requirements appear, These new requirements include the
following:
Minimizing latency:
Conserving network bandwidth:
Increasing local efficiency: Collecting and securing data across a wide
geographic area with different environmental conditions may not be
useful. The environmental conditions in one area will trigger a local
response independent from the conditions of another site hundreds
of miles away.
Data management and compute stack are divided in to 3 layers
Fog Computing:
• Fog computing is a decentralized computing infrastructure in which
data, compute , storage and applications are located somewhere
between the data source and the cloud.
Edge Computing:
• If clouds exit in the sky ,and fog sits near the ground then mist is what
actually sits on the ground.