How IoT is changing our World?
The Internet of Things has changed the dimensions of traditional Business IT. To tap the
potential need for a highly scalable and reliable IT Infrastructure, they should be on
standardized components and open protocols and include the three layer Devices,
Controllers and Data Center or the Cloud solutions.
The Internet of Things connected all of kinds intelligent devices, such as mobile devices,
sensors, machines or vehicles with each other and with the cloud computing. Analysis of
the IoT data offers many opportunities for companies, as they can make faster decisions,
optimize business processes or develop new applications and even restructure business
models. This has the enormous potential of Internet of Things that is virtually present in
every industry, including energy, retail, healthcare, financial services, transportation and
manufacturing.
The range of potential new applications is great. It ranges from smart infrastructure with
automated lighting and energy management through optimized solutions for inventory,
logistics and supply chain management to intelligent manufacturing systems.
However, IoT put completely new challenges on the table when the subject comes for
scalability. Gartner (market research firm) expects 6.4 billion devices will be connected via
IoT in 2016. This figure represent a massive increase of 30% compared to 2015. Want to
get more surprised? 5.5 million Devices will get connected per day in 2016.
In 2020, increase rate is predicated around 20.8 billion. This means, in future a single
intelligent system could collect and analyze billions of data objects from millions of
different endpoints. This is exceptional demands on processing power, storage and
connected networks.
A coin has two sides
The growth is a positive sign for all industry, but we cannot ignore the sheer size and the
public nature of the Internet of Things, which will bring great challenges. Network and
system architects need to optimize the IT infrastructure to meet the higher requirements of
the IoT in terms of scalability, reliability and security. IoT based applications and
automated business processes make high demands on the availability of the system. Many
intelligent systems are used for mission critical applications where system downtime leads
to decreased productivity.
The distributed IoT solutions lead to further major security challenges, since the systems
are connected via the Internet and use computing power or memory resources from the
data center or from the cloud. Therefore, it is very important for companies to improve
their security architecture to protect themselves effectively against any data loss, theft and
increasingly sophisticated DDOS attacks. This includes comprehensive authentication,
authorization and auditing capabilities. These create trust, control access to resources, and
ensure compliance with the legal requirements and corporate guidelines (compliance). It is
also mandatory for companies to use resilient encryption methods to protect their
intellectual property and customer data from theft.
Layer model has important technical requirements
Intelligent IT solutions such as Red Hat technologies are based on things to meet the
requirements of IoT based systems for scalability, reliability and security. The solutions are
based on a hierarchical model with device layer (Edge Nodes), control layer (controller
gateway) and Datacenter Tier or Cloud layer. Here come standardized protocols and
components for use.
The device layer involving a variety of intelligent terminals that includes mobile devices,
wearable gadgets, sensors, control and regulation devices, autonomous machines and
appliances, etc… The communication between the devices and the control or checkpoints is
based on standard network protocols, either wired or wireless. The forwarding of the raw
data and the exchange of control information is based on open messaging standards.
For communication between Edge and Controller – MQTT (message queue telemetry
transport) appears for use. It was developed as part of a project to monitor an oil pipeline
of two companies i.e. IBM and Arcom Control Systems. The protocol is characterized by
high reliability and is suitable for use in mobile networks and in networks with low
bandwidth. An implementation of the Protocol requires little coding. MQTT was released in
2010 under a free license, since 2013, OASIS standard has reached to the version of 3.1.1 in
the meantime.
MQTT works on publish and subscribe protocol that is based on a hub-and-spoke
architecture. The transmitter (producer) of a message does not directly communicate with
a receiver (consumer), but through a broker. By decoupling, the two sides, the producer,
for example – a sensor, then transmit data when no receiver as a gateway is online. Even
more: the producer has no way of knowing whether there is data for one or more
consumer. The broker acts as a server for producer and consumer, which are connected as
clients both with the broker. MQTT operates completely independent of the actual content
of the messages.
Unlike a client / server protocol like HTTP, MQTT is event-oriented. In the former case, the
client asks the server to see if there are new messages. In an event-driven model, the
broker informs the consumer when information about a particular topic is present.
However, there are no 1:1 queues, as in the Java Messaging Service.
Consumer need for one or more topics are logged and are therefore referred to as a
subscriber. In a topic, messages are combined into a particular topic. This may for example
be measured by sensor temperatures.
The MQTT protocol provides three quality-of-service (QoS) stages. At the lowest level is
assured that the message more than once (at most once) is delivered. A producer features
in this case a publish message with the QoS level 0. Since the sender does not take over care
of the message, this fast and resource-efficient form of Message Exchange is also called
“Fire and Forget”. There is no guarantee that the message actually arrives. In other words,
it can lead to message loss, but not carry weight when shortly after a lost already, the next
value is transmitted.
On the next QoS level, it is ensured that the consumer receives the message at least once.
However, this also means that a message can be delivered several times. The producer
stores the message in a file and then make available in an emergency for a re-transmission.
The producer sends a publish message with a Packet Identifier to the consumer. It
acknowledges receipt with a package that contains the same Packet Identifier. Does the
producer have not received this packet, it can send the original – including Packet Identifier
and content – as often send to the consumer. After receiving a message with the already
transmitted Packet Identifier retransmit, this applies as a new message.
At the highest QoS level is ensured that duplicates are excluded and the messages exactly
once have been unsuccessful. In order for this warranty can also be adhered to, there is
two-step confirmation. The consumer responds to the receipt of a message with a reception
packet. Then the Producer sent another package, on which in turn responds to the
consumer.
Controller route data into the data center or in the cloud
The controller level acts as a link between the devices and the datacenter or the cloud. It
collects and stores device data and forwards it. For example, via Java Messaging Service to
the datacenter; further, conversely it conveys control information to the equipment – all
based on open messaging standards. In addition, it serves as temporary store for data that
are needed for tactical analysis or regulatory requirements.
An alternative to the above-described three-layer model forms a two-layer model, in which
the devices are connected directly to the datacenter or the cloud. This model is very
suitable for consumer applications that require less bandwidth and no gateway level for
the distribution of workloads.
Conclusion:
The Internet of Things is a challenge for the industry, as billions of objects will be
connected soon. It is also a major issue in IT. By connecting objects together, it will be
possible to collect data of crowds that will better understand the world around us, to make
it smarter and more controllable.
However, it is a big challenge for the entire industry, but also for the data security
experts, as the use of these data can be made at the expense of citizens. Uncle Sam may
soon find a way to hide in everyday objects…
Therefore, you think you know all of the Internet of Things. Share your thoughts with
us in the comment box below!
Also, don’t miss to read next article on why Morgan Stanley thinks “2017 will be the Year
of the Internet of Things”…

More Related Content

PDF
5.[40 44]enhancing security in cloud computing
PPTX
Lecture 10
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PPTX
Lecture 4
PDF
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
PDF
Cloud Security and Data Integrity with Client Accountability Framework
PPTX
Efficient authentication for mobile and pervasive computing
PPT
IT8005_EC_Unit_III_Securing_Communication_Channels
5.[40 44]enhancing security in cloud computing
Lecture 10
4.authentication and key agreement based on anonymous identity for peer to-pe...
Lecture 4
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
Cloud Security and Data Integrity with Client Accountability Framework
Efficient authentication for mobile and pervasive computing
IT8005_EC_Unit_III_Securing_Communication_Channels

What's hot (20)

PPTX
Lecture 11
PPT
Mobile Web Services in Health Care and Sensor Networks
PDF
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
PPTX
Lecture 15
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
DOCX
2013 and 2014 ieee projects list
PDF
Cloud-based middleware for supporting batch and stream access over smart heal...
PDF
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
PDF
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
PDF
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
PDF
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...
PDF
IRJET- MQTT in Internet of Things
PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
PDF
Information Leakage Prevention In Cloud Computing
PDF
Ieee 2015 2016
PDF
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
PDF
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
PDF
710201940
Lecture 11
Mobile Web Services in Health Care and Sensor Networks
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...
Lecture 15
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
2013 and 2014 ieee projects list
Cloud-based middleware for supporting batch and stream access over smart heal...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
INFORMATION-CENTRIC BLOCKCHAIN TECHNOLOGY FOR THE SMART GRID
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...
IRJET- MQTT in Internet of Things
Literature Survey: Secure transmitting of data using RSA public key implement...
Information Leakage Prevention In Cloud Computing
Ieee 2015 2016
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
International Journal of Computational Engineering Research(IJCER)
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...
710201940
Ad

Similar to How io t is changing our world (20)

PPTX
Unit - 1.pptx
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PDF
Designing Internet of things
ODP
Internet of things
PDF
Livre blanc iot
DOCX
Unit III.docx
PPTX
Evolution of IoT with the sir of gujarat university
PPTX
Introduction to IoT.pptx for btech students
PPTX
INTERNET OF THINGS.pptx
PPTX
Modulmnbjkjnbnjnbnj,kkjebnmhnvfghjhgbcvxv
PDF
iot m1.pdf
PPTX
IOT Introduction.pptx
PPTX
IoT frameworks offer a pre-defined structure and architecture for building Io...
PPTX
IoT devices are physical objects embedded with sensors, processing ability, s...
PPTX
A Secure Model of IoT Using Blockchain
PPTX
IoT [Internet of Things]
PPTX
Internet of Things Basics and its protocols
PPTX
Internet of Things with Cloud Computing and M2M Communication
PPTX
IT18503 Internet of Things unit-1 introduction.pptx
PDF
Internet of Things (IoT): Readme
Unit - 1.pptx
F5 Networks: The Internet of Things - Ready Infrastructure
Designing Internet of things
Internet of things
Livre blanc iot
Unit III.docx
Evolution of IoT with the sir of gujarat university
Introduction to IoT.pptx for btech students
INTERNET OF THINGS.pptx
Modulmnbjkjnbnjnbnj,kkjebnmhnvfghjhgbcvxv
iot m1.pdf
IOT Introduction.pptx
IoT frameworks offer a pre-defined structure and architecture for building Io...
IoT devices are physical objects embedded with sensors, processing ability, s...
A Secure Model of IoT Using Blockchain
IoT [Internet of Things]
Internet of Things Basics and its protocols
Internet of Things with Cloud Computing and M2M Communication
IT18503 Internet of Things unit-1 introduction.pptx
Internet of Things (IoT): Readme
Ad

More from manoharparakh (20)

PDF
How Colocation is Enabling Compliance for BFSI Workloads.pdf
PDF
Colocation The infrastructure edge for enterprise transformation
PDF
Why GCC is important for Government - ESDS Software solution
PDF
Government Community Cloud The Foundation for Digital Transformation in Gover...
PDF
Government Community Cloud The Foundation for Digital Transformation in Gover...
PDF
Bridging the Gap Between Alert and Action with SOAR Services India
PDF
7 Criteria to Evaluate Cloud Hosting Providers.pdf
PDF
The Rise of Artificial Intelligence Navigating India’s Digital Future.pdf
PDF
The Rise of Artificial Intelligence Navigating India’s Digital Future.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches.pdf
PDF
What Role Does SOC Play in Preventing Data Breaches
PDF
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
PDF
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
PDF
Unlocking Business Continuity with Managed Colocation Services by ESDS.pdf
PDF
The Future of Data Center Services Powering Digital Growth.pdf
PDF
Why Government Organizations Trust MeitY Empaneled Cloud for Secure Digital T...
PDF
Common Myths About Colocation Services.pdf
PDF
Common Myths About Colocation Services.pdf
PDF
How Enterprise Community Cloud and AI are Transforming Enterprise Security in...
PDF
How Enterprise Community Cloud and AI are Transforming Enterprise Security in...
How Colocation is Enabling Compliance for BFSI Workloads.pdf
Colocation The infrastructure edge for enterprise transformation
Why GCC is important for Government - ESDS Software solution
Government Community Cloud The Foundation for Digital Transformation in Gover...
Government Community Cloud The Foundation for Digital Transformation in Gover...
Bridging the Gap Between Alert and Action with SOAR Services India
7 Criteria to Evaluate Cloud Hosting Providers.pdf
The Rise of Artificial Intelligence Navigating India’s Digital Future.pdf
The Rise of Artificial Intelligence Navigating India’s Digital Future.pdf
What Role Does SOC Play in Preventing Data Breaches.pdf
What Role Does SOC Play in Preventing Data Breaches
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
How Cloud Migration is Transforming Enterprise Infrastructure.pdf
Unlocking Business Continuity with Managed Colocation Services by ESDS.pdf
The Future of Data Center Services Powering Digital Growth.pdf
Why Government Organizations Trust MeitY Empaneled Cloud for Secure Digital T...
Common Myths About Colocation Services.pdf
Common Myths About Colocation Services.pdf
How Enterprise Community Cloud and AI are Transforming Enterprise Security in...
How Enterprise Community Cloud and AI are Transforming Enterprise Security in...

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PPTX
The various Industrial Revolutions .pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Five Habits of High-Impact Board Members
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
CloudStack 4.21: First Look Webinar slides
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Modernising the Digital Integration Hub
Geologic Time for studying geology for geologist
The various Industrial Revolutions .pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
Group 1 Presentation -Planning and Decision Making .pptx
O2C Customer Invoices to Receipt V15A.pptx
Getting Started with Data Integration: FME Form 101
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Five Habits of High-Impact Board Members
observCloud-Native Containerability and monitoring.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
WOOl fibre morphology and structure.pdf for textiles
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
CloudStack 4.21: First Look Webinar slides
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Modernising the Digital Integration Hub

How io t is changing our world

  • 1. How IoT is changing our World? The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions. The Internet of Things connected all of kinds intelligent devices, such as mobile devices, sensors, machines or vehicles with each other and with the cloud computing. Analysis of the IoT data offers many opportunities for companies, as they can make faster decisions, optimize business processes or develop new applications and even restructure business models. This has the enormous potential of Internet of Things that is virtually present in every industry, including energy, retail, healthcare, financial services, transportation and manufacturing. The range of potential new applications is great. It ranges from smart infrastructure with automated lighting and energy management through optimized solutions for inventory, logistics and supply chain management to intelligent manufacturing systems. However, IoT put completely new challenges on the table when the subject comes for scalability. Gartner (market research firm) expects 6.4 billion devices will be connected via IoT in 2016. This figure represent a massive increase of 30% compared to 2015. Want to get more surprised? 5.5 million Devices will get connected per day in 2016. In 2020, increase rate is predicated around 20.8 billion. This means, in future a single intelligent system could collect and analyze billions of data objects from millions of different endpoints. This is exceptional demands on processing power, storage and connected networks. A coin has two sides The growth is a positive sign for all industry, but we cannot ignore the sheer size and the public nature of the Internet of Things, which will bring great challenges. Network and system architects need to optimize the IT infrastructure to meet the higher requirements of the IoT in terms of scalability, reliability and security. IoT based applications and automated business processes make high demands on the availability of the system. Many intelligent systems are used for mission critical applications where system downtime leads to decreased productivity. The distributed IoT solutions lead to further major security challenges, since the systems are connected via the Internet and use computing power or memory resources from the data center or from the cloud. Therefore, it is very important for companies to improve their security architecture to protect themselves effectively against any data loss, theft and increasingly sophisticated DDOS attacks. This includes comprehensive authentication, authorization and auditing capabilities. These create trust, control access to resources, and ensure compliance with the legal requirements and corporate guidelines (compliance). It is
  • 2. also mandatory for companies to use resilient encryption methods to protect their intellectual property and customer data from theft. Layer model has important technical requirements Intelligent IT solutions such as Red Hat technologies are based on things to meet the requirements of IoT based systems for scalability, reliability and security. The solutions are based on a hierarchical model with device layer (Edge Nodes), control layer (controller gateway) and Datacenter Tier or Cloud layer. Here come standardized protocols and components for use. The device layer involving a variety of intelligent terminals that includes mobile devices, wearable gadgets, sensors, control and regulation devices, autonomous machines and appliances, etc… The communication between the devices and the control or checkpoints is based on standard network protocols, either wired or wireless. The forwarding of the raw data and the exchange of control information is based on open messaging standards. For communication between Edge and Controller – MQTT (message queue telemetry transport) appears for use. It was developed as part of a project to monitor an oil pipeline of two companies i.e. IBM and Arcom Control Systems. The protocol is characterized by high reliability and is suitable for use in mobile networks and in networks with low bandwidth. An implementation of the Protocol requires little coding. MQTT was released in
  • 3. 2010 under a free license, since 2013, OASIS standard has reached to the version of 3.1.1 in the meantime. MQTT works on publish and subscribe protocol that is based on a hub-and-spoke architecture. The transmitter (producer) of a message does not directly communicate with a receiver (consumer), but through a broker. By decoupling, the two sides, the producer, for example – a sensor, then transmit data when no receiver as a gateway is online. Even more: the producer has no way of knowing whether there is data for one or more consumer. The broker acts as a server for producer and consumer, which are connected as clients both with the broker. MQTT operates completely independent of the actual content of the messages. Unlike a client / server protocol like HTTP, MQTT is event-oriented. In the former case, the client asks the server to see if there are new messages. In an event-driven model, the broker informs the consumer when information about a particular topic is present. However, there are no 1:1 queues, as in the Java Messaging Service. Consumer need for one or more topics are logged and are therefore referred to as a subscriber. In a topic, messages are combined into a particular topic. This may for example be measured by sensor temperatures. The MQTT protocol provides three quality-of-service (QoS) stages. At the lowest level is assured that the message more than once (at most once) is delivered. A producer features in this case a publish message with the QoS level 0. Since the sender does not take over care of the message, this fast and resource-efficient form of Message Exchange is also called “Fire and Forget”. There is no guarantee that the message actually arrives. In other words, it can lead to message loss, but not carry weight when shortly after a lost already, the next value is transmitted.
  • 4. On the next QoS level, it is ensured that the consumer receives the message at least once. However, this also means that a message can be delivered several times. The producer stores the message in a file and then make available in an emergency for a re-transmission. The producer sends a publish message with a Packet Identifier to the consumer. It acknowledges receipt with a package that contains the same Packet Identifier. Does the producer have not received this packet, it can send the original – including Packet Identifier and content – as often send to the consumer. After receiving a message with the already transmitted Packet Identifier retransmit, this applies as a new message. At the highest QoS level is ensured that duplicates are excluded and the messages exactly once have been unsuccessful. In order for this warranty can also be adhered to, there is two-step confirmation. The consumer responds to the receipt of a message with a reception packet. Then the Producer sent another package, on which in turn responds to the consumer. Controller route data into the data center or in the cloud The controller level acts as a link between the devices and the datacenter or the cloud. It collects and stores device data and forwards it. For example, via Java Messaging Service to the datacenter; further, conversely it conveys control information to the equipment – all based on open messaging standards. In addition, it serves as temporary store for data that are needed for tactical analysis or regulatory requirements.
  • 5. An alternative to the above-described three-layer model forms a two-layer model, in which the devices are connected directly to the datacenter or the cloud. This model is very suitable for consumer applications that require less bandwidth and no gateway level for the distribution of workloads. Conclusion: The Internet of Things is a challenge for the industry, as billions of objects will be connected soon. It is also a major issue in IT. By connecting objects together, it will be possible to collect data of crowds that will better understand the world around us, to make it smarter and more controllable. However, it is a big challenge for the entire industry, but also for the data security experts, as the use of these data can be made at the expense of citizens. Uncle Sam may soon find a way to hide in everyday objects… Therefore, you think you know all of the Internet of Things. Share your thoughts with us in the comment box below! Also, don’t miss to read next article on why Morgan Stanley thinks “2017 will be the Year of the Internet of Things”…