Internet of Things 2018/2019

Similar documents
Internet of Things 2017/2018

An Architecture. What the MEC? for 5G

Khartoum, Sudan Dec 2017

Lecture 04 Introduction: IoT Networking - Part I

IoT CoAP Plugtests & Workshop November 27 th 2012

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

Chapter 4. Fundamental Concepts and Models

Internet of Things 2017/2018

Internet of Things: Driving the Transformation

Internet of Things 2018/2019

Smart Homes and Cities

Cisco Kinetic Data Control Module

onem2m ADAPTED FOR SMART CITIES ETSI IOT M2M WORKSHOP 2016 NOV 15 TH 2016

ICN-WEN Information Centric-Networking in Wireless Edge Networks

IoT Security Fundamentals That Must Be Solved. Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016

Wireless Connectivity Options for IoT. By: MIST Makers John Varela and Nicholas Landy

Accelerating intelligence at the edge for embedded and IoT applications

DROPBOX.COM - PRIVACY POLICY

Thread in Commercial Backgrounder

Internet of Things Workshop ST 2015/2016

Fundamental Concepts and Models

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Real-Time Insights from the Source

A Layered Protocol Architecture for Scalable Innovation and Identification of Network Economic Synergies in the Internet of Things

The Internet of Everything

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Yeseong Kim. System Energy Efficiency Lab. seelab.ucsd.edu

Layered Architecture

Evolving IoT with Smart Objects

L2 - Internet of Things

Managing & Accelerating Innovation with Open Source at the Edge

GIoTS & IOT Week 2017: IOT Reality Check Patrick Wetterwald, CTAO IOT Standards and Architecture

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.

Update on the NSF-Intel partnership on ICN-WEN (Information Centric-Networking in Wireless Edge Networks)

The challenge with IoT

Lesson 9 Smart city Services And Monitoring. Chapter-12 L09: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Data Analytics for IoT: Applications to Security and Privacy. Nick Feamster Princeton University

Introduction to Device Trust Architecture

Reliable Stream Analysis on the Internet of Things

Cisco 5G Vision Series: Vertical Value Creation

Service Mesh and Microservices Networking

Web of Things Architecture and Use Cases. Soumya Kanti Datta, Christian Bonnet Mobile Communications Department

Internet of Things 2017/2018

Powering the Internet of Things with MQTT

Accelerating IoT with ARM mbed

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

Introduction to the Active Everywhere Database

5G systems. meeting the expectations of the Networked Society. Dr Magnus Frodigh Director Wireless Access Networks GSM. Wi-Fi. New technologies 5G

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Software Architecture

Accelerating IoT with ARM mbed

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

2013 Cisco and/or its affiliates. All rights reserved. 1

ITU-T Y Next generation network evolution phase 1 Overview

IoT Engineering 1: Introduction to the Internet of Things. CC BY-SA, Thomas Amberg, FHNW (Screenshots considered fair use)

Integrated Security Management Framework

The Integrated Smart & Security Platform Powered the Developing of IOT

Accelerating IoT with ARM mbed

Bark: Default-Off Networking and Access Control for the IoT. James Hong, Amit Levy, Laurynas Riliskis, Philip Levis Stanford University

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center

Innovation policy for Industry 4.0

Subscriber Data Correlation

Internet of Things: Latest Technology Development and Applications

Sentinet for Microsoft Azure SENTINET

Looking Beyond the Buzz of Edge Computing. Thomas M. Bohnert et alia OCD 2018, ZHAW Winterthur

Securing IoT with the ARM mbed ecosystem

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision

Part III: Evaluating the Business Value of the Hybrid Cloud

Unlocking Intelligent Communities with connected lighting and beyond

Challenges. Distribution. Discovery. Security. Usability. Governance. Unreliable messaging. Physical objects. Dealing with places.

IoT on Fedora Using Fedora as a base for the IoT Revolution

Transforming Utility Grid Operations with the Internet of Things

Developing a Common Language for Communication between Disparate IoT Devices and Applications across Various Wireless Technologies

F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things

Global Data Plane. The Cloud is not enough: Saving IoT from the Cloud & Toward a Global Data Infrastructure PRESENTED BY MEGHNA BAIJAL

ENVISION TECHNOLOGY CONFERENCE. Ethernet TSN Overview ANIL N. KUMAR, INTEL PRINCIPAL ENGINEER

Software architecture: Introduction

Logical Network Design (Part II)

Virginia Tech Research Center Arlington, Virginia, USA

Cisco Tetration Analytics

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Introduction to Cisco IoT Tools for Developers IoT 101

Cross-Site Virtual Network Provisioning in Cloud and Fog Computing

THE VMTURBO CLOUD CONTROL PLANE

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

Dynamic Network Segmentation

High Level Architecture (HLA)

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

Best Practices for the Unknown: Wearables, Devices & Things

Addressing Unique Smart Grid Challenges with Converged Gateways

Standards for V2X Communication and Implications for OEMs and ITS

Internet of Things (IoT) CSE237A

Revolutionising mobile networks with SDN and NFV

Context-aware Services for UMTS-Networks*

An Introduction to the Intelligent IoT Integrator (I3)

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web

Standard Open Source Cloud APIs for the Smart Home

Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects

ARM mbed Towards Secure, Scalable, Efficient IoT of Scale

Transcription:

Internet of Things 2018/2019 Architecture Johan Lukkien John Carpenter, 1982 1

Guiding questions What are relevant architecture concerns for IoT systems? What are different architectural options? What are typical architecture styles? What is (software, system) architecture anyway, and can we make sure we understand what is meant with all these terms? 2

3

Standards and Platforms 4

Involved Bodies, Companies and Frameworks ETSI (network) European Telecommunication Standards Institute ITU (network) International Telecommunication Union IETF (protocols) Internet Engineering Task Force EU Projects (books, architectures): IoT-A SENSEI OSG (data, information) Open Geospatial Consortium OMA Open Mobile Alliance IEEE (protocols) 5

The war on standards Apple HomeKit Google NEST + Firebase Google Home Google Thread OpenThread ARM mbed Intel Intel IoT Platform, IoTivity Samsung Artik (AllJoyn, IoTivity) Microsoft Azure IoT Cisco Cisco IoT Amazon AWS IoT Philips HUE (just lighting) Threadgroup Thread Open Connectivity Foundation IoTivity, AllJoyn (absorbed) 6

7

The Failure of IoT Platforms Glenn Allmendinger, Harbor Research Current IoT development frameworks and their implied platform architectures do not solve fundamental problems in IoT creation of un-interoperable data pools creation of inequality between data producers and data collectors the requirement of handling steps of life cycles of individual devices the lack of separation between device and application brittle systems, critically dependent on operation of specific devices address scalability not by locality but by ever-expanding back-end servers So, this has to be resolved

On Architecture 9

Architectural description: overall picture View 1 Model 1 Stakeholder(s) Viewpoint concern Model 2 System Model 3 Model 4 Model 5 View 2 View 3 Architectural description from existing system to description: analysis, reverse engineering, documentation from stakeholders and requirements to system: architecture design, detailed design, implementation TU/e Computer Science, System Architecture and Networking 10

Architecture An architecture (of a system) is The fundamental organization of a system embodied by its components [jl: building blocks], their relationships to each other [jl: connectors and interfaces, dependencies] and to the environment and the principles guiding its design [jl: rationales for choices, rules & constraints for building blocks and connectors] and evolution (IEEE Standard P1471 Recommended Practice for Architectural Description of Software-Intensive Systems) An architecture description is a collection of models organized into views that examine a system from a certain viewpoint defined by the concern of a stakeholder for understanding, analysis, communication, construction, documentation.for answering questions Concern: how is the system physically Structure: see above Behavior: the messages exchanged during a scenario Views include structure and behavior (scenarios) 12

Example: deployment view Addresses concerns of realization, performance (throughput, latency), availability, reliability, etc., together with the process view Models in the deployment view describe Machines (processors, memories), networks, organization of interconnect at relevant levels of detail including specifications, e.g. speeds, sizes this part is also called: physical view Mapping of components and functionality to machines Flow of control and data (also relevant for process view) (From: Towards Horizontal Architecture for Autonomic M2M Service Networks, Future Internet 2014, 6(2), 261-301) 13

Which views and models will we look at? Logical layering, relevant for all (technical) views to give an overall impression, at different layers of abstraction Deployment view, physical view examining organizational alternatives, related to both functional and extrafunctional aspects Development view looking at devices: how is the software (and hardware) organized, how does this support the operational requirements deriving from use cases Process view how is the operation and interoperation: protocols and architectural patterns; active entities in the system, flow of control Data view concerns about data semantics, data protection, data flow and data processing 14

Cisco reference model for IoT Information Technology Operational Technology 15

Deployment views for IoT 16

Physical elements: devices and networks Things : low capacity devices (T-S) sensors (T-A) actuators (T-I) identifier (special sensor) Infra structure: (I-S, I-R) switches, routers (layer 2,3 connectivity within a network technology) (I-G) gateways converting between two parties different layers of the OSI stack networks, e.g. (wireless) LANs, PANs (S) Storage devices e.g. SAN or NAS, Cloud storage (U) User devices: phones, tablets, desktops, laptops (E) Embedded devices (containing several functions) (F) Fog : high capacity devices in the vicinity of data generation ( edge ) (C) Clouds : massive storage and execution power 17

Mapping IoT Architecture elements to devices balance functionals, extra-functionals and boundary conditions Functional Extra functional Sensing (event and state) Dependability Actuation (event) Application logic (incl. control) Communication / translation Storage Data, Information (context, semantics, location, identity) Vertical Analytics Horizontal Analytics Management (of application, of data), UI (APIs for) services, advertisement, discovery reliable, available secure, private safe Performance, QoS response time, latency, throughput processing timeliness (Resource) management program, update, extend sharing, concurrent applications, scheduling Interoperability Mobility Managerial domains, ownership Boundary conditions Distributed systems Given components Given protocols Network standards Legal matters (Design) Technology languages, tools all that is given 18

Analytics Vertical analytics data from a single unit e.g. person, item, household, office analysis results in knowledge about that single unit Horizontal analytics data from many units analysis results in knowledge about a population of units can characterize classes of units, reference models, averages (from Wikipedia) Possible analysis, for a one day temperature chart of a person compare to an average over a long time (of that person) compare to averages of different groups same day, or longer period 19

Managerial Domain Managerial domain: the control span of a (managing) stakeholder Physical Managerial Domain: managerial domain defined by physical access to devices and networks (usually derived from ownership) Logical Managerial Domain: control of software elements and data. Derived from physical managerial domain and further defined by the extent of external control over a device and the writer of those software elements Examples: devices and networks in a home network are in the physical managerial domain of the home owner or the resident also the data generated is in that domain data can leave a managerial domain and go to another one, subject to control decisions in software elements an external party might have logical control over a software element, e.g. update it or modify its behavior 20

Types of managerial control Life cycle control: control over actions in the life cycle like switching on/off, performing an update etc. Behavior control: controlling the behavior of a device or software element when it runs Examples: a resident can switch on/off devices, update firmware or install applications: life cycle control in the physical managerial domain the application or new firmware behaves according to the defined behavior of the developer 21

Exploring architectural alternatives in chalkboard drawings Considering a scenario of normal operation (other scenario s have their own analysis) 22

Direct data Indirect data (limited) Direct control Indirect control (limited) A Thermostat Application logic (control) UI E Device with integrated functionality Older ones are even network unaware (not connected to any network) Sense Sense Actuate user (home, office) internet provider core internet (clouds) 23

A distributed variant UI Sense T-S Application logic U / E Sense 802.11 (WiFI) I-G T-S 802.15.4 U / E Application logic Actuate T-A The gateway enables IP connections to sensors / actuators The application logic can be just a function in a user device Other devices can use the sensors as well e.g. just show temperature this sensor access could also be achieved by virtualizing functions in a connected thermostat i.e., making a single box thermostat as in the previous case but connected user (home, office) internet provider core internet (clouds) 24

U UI Sense T-S Application logic storage vertical analytics Sense 802.11 (WiFI) I-G T-S 802.15.4 U / F Actuate T-A Long term storing for optimization Store data for analysis storage and analytics could also be distributed again Show temperature profile Improve application behavior over time learning patterns using correlations (e.g. using weather info) Can also replace bottom with regular (connected) thermostat Remote UI, e.g. on phone but have to be home to see user (home, office) internet provider core internet (clouds) 25

Application logic storage U / F Cloud storage for horizontal analytics and applications vertical analytics 802.11 (WiFI) Internet application logic,e.g. energy usage prediction horizontal analytics C I-G I-G storage New applications by combining many users Sense T-S Sense T-S Actuate T-A Data possibly crossing managerial domains 802.15.4 (UI: contact C or U/F) user (home, office) internet provider core internet (clouds) 26

Everything in the Cloud U UI Internet application logic C 802.11 (WiFI) analytics I-G storage Sense T-S Sense T-S 802.15.4 Actuate T-A User can examine her data everywhere User has no (direct) control, neither data nor application user (home, office) internet provider core internet (clouds) 27

More variations possible Many alternatives e.g. extending the low capacity network across managerial domains some smart meters create neighborhood meshes Note the use of fog : smart infra structure devices that host applications and storage for aggregation e.g. some Cisco routers fog computing, edge computing Almost everything in one device the smartphone Most important: architecture/deployment decisions and views are obtained from scenarios previous examples: suggested functional scenarios other scenarios: adding devices, install applications, establish associations 28

What are the options and alternatives? Integration, distribution and virtualization integration: put functions together on one device distribution: put functions on different devices virtualization: decoupling of logical and physical representation (full abstraction of implementation details). Examples: addressing an individual sensor in a device as if it were a separate device let a gateway be just a software function in a larger server address a distributed service as one representing a tomato digitally 29

What are the options and alternatives? Communication direct: between communicating parties indirect: use a broker, store or proxy between communicating partners Broker: a component that handles and translates calls (messages) between two or more parties, and that manages the binding between references and objects Proxy: a component that acts on behalf of another component, implementing the same interface, and sometimes caching Store: one component leaves data and another one picks it up. No protocol arrangements between the parties push or pull Push: control flow and data flow go in same direction ( call-back, event driven ) Pull: control flow and data flow go opposite ( call, polling ) 30

What are the options and alternatives? Data: storage and handling (of data in flight and in rest) storage location: local or cloud: (not) leaving managerial domain aggregation level (from raw data to a high level function), retention / history Application & control logic: application location: local (same managerial domain); remote ( in the cloud ) centralized or distributed 31

What are guiding tactics in choices? Choices in integration, distribution depend on: location, form factor, numbers, energy, cost put sensor where it needs to be; may need to be battery operated cannot afford many powerful devices cannot power many devices system complexity easier to use the accelerometer (and other sensors) in your phone than to attach a bluetooth connected one component availability network technology gateways, sensor types, sensor boxes software / framework availability Virtualization improves: simplicity, generalization of components e.g. making an internal sensor available as an IP end point lights in Markthal as IP endpoints admitting app development flexibility, cost 32

What are guiding tactics in choices? Direct or indirect communication: indirect: reduces dependencies between partners: dependency in time: the need to be on at the same time admits intermittent connectivity and space: the need to share any physical space resource directly no need to share memory or a network connection direct: reduces latency Push or Pull communication: Push: reduces latency; needs administration at sender in order to know receiver; needs receiver to be on Pull: obtain data when required; increases latency because of the extra request; needs sender to be on; sender does not need to know receiver; one extra interaction tradeoff: implementing low latency with pull mode leads to excessive communication (polling) and bad scalability 33

What are guiding tactics in choices? Data storage and handling choices, determined by: privacy concerns (privacy is reduced by storage) the need for collecting evidence, post mortem analysis cost concerns in business case: by giving away your data the service may come for free the value of data: application needs, innovation combining data from long time and many sources improves the service Application and control logic choices: location of application logic: privacy concerns; overall business case location of control logic: latency requirements centralized/distributed: used framework, performance, complexity 34

Privacy, Safety, and Security Privacy: control over personal information in particular: use information only within the intended context Safety: freedom from danger or risk on injury resulting from recognized but potentially hazardous events Security: regulating access to (electronic) assets according to some policy policy: allowed and disallowed actions security mechanisms: can be regarded as enforcing the policy Asset protection, privacy and safety result in particular security policies security for privacy and security for safety 35

Summarizing +: improves -: makes worse o: no effect centralized operation is bad for scalability, in general distributed implementations help R+S-: Receiver+Sender- denotes one-sided dependency Note that cloud operation enables large innovations 36

Coming back to the architecture model: We saw general concepts occurring in IoT systems (e.g. device types, functionality), communication interactions (data and control flow) and typical scenarios (fitting in the life cycles) architecture: We discussed deployment views of an example, still abstracting from the implementation details other views are required to express how stakeholder concerns are addressed although each IoT instantiation will be different, we aim for a common architecture framework that they all satisfy 37

Another layered model for IoT From M2M to the IoT, J.Holler et al., Academmic Press 2014, based on IoT-A 38

Reference architecture IoT is a generic term, referring to many possible instantiations The reference model defines generically what binds them together. It consists of domain model: relevant concepts and relations in IoT information model: data structures of the domain model elements functional model: (generic) operations communication model: communication interactions between entities The reference architecture is an architecture description that takes this model as starting point. it consists of a multi-view modeling of stakeholder concerns but at a generic level it supports exploration of design decisions From M2M to the IoT, J.Holler et al., Academic Press 2014 Both need instantiation in a concrete case 39

Reference architecture Many organizations provide partial material (see previous layered views) European project IoT-a delivered a proposal, and a book currently not followed up it seems European project OpenAIS provided a reference architecture for intelligent lighting 40

IoT (partial) domain model and instantiation IoT domain model, from M2M to the IoT, J.Holler et al., Academic Press 2014, chapter 7 41

IoT domain model and instantiation IoT domain model, from M2M to the IoT, J.Holler et al., Academic Press 2014, chapter 7 42

Concerns and aims for an IoT reference architecture Re-use (IoT) resources across application domains [create a platform] From M2M to the IoT, J.Holler et al., Academic Press 2014 A set of support services that provide open service-oriented capabilities and can be used for application development and execution [platform services] Different abstraction levels that hide underlying complexities and heterogeneity Sensing and actuating can assume roles in different applications running over different managerial domains Trust, security, privacy, safety / scalability, performance / evolution, heterogeneous Include different service delivery models Simple integration, simple management Life cycle support: devices, applications and all components 43

Guiding questions What are relevant architecture concerns for IoT systems? What are different architectural options? What are typical architecture styles? What is (software, system) architecture anyway, and can we make sure we understand what is meant with all these terms? 44