This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:iot-reloaded:iot_network_components [2024/12/03 16:45] – pczekalski | en:iot-reloaded:iot_network_components [2025/05/13 14:51] (current) – [Components of IoT Network Architectures] pczekalski | ||
---|---|---|---|
Line 2: | Line 2: | ||
IoT Network Architecture is composed of a variety of layers, including Edge-class IoT devices such as sensors and actuators, access points enabling devices to connect to the Internet and services, fog-class devices performing preliminary data processing such as aggregation and conversion, core Internet network and finally a set of cloud services for data storage and advanced data processing. A sample model is present in figure {{ref> | IoT Network Architecture is composed of a variety of layers, including Edge-class IoT devices such as sensors and actuators, access points enabling devices to connect to the Internet and services, fog-class devices performing preliminary data processing such as aggregation and conversion, core Internet network and finally a set of cloud services for data storage and advanced data processing. A sample model is present in figure {{ref> | ||
<figure networkinginf1> | <figure networkinginf1> | ||
- | {{ : | + | {{ : |
< | < | ||
</ | </ | ||
- | ===== IoT nodes ===== | + | ===== IoT Nodes ===== |
- | IoT nodes are the fundamental building blocks of an IoT system, enabling the capture, processing, and transmission of data across connected devices. These nodes often operate in energy-constrained environments and are connected to an access point, which links them to the internet, using low-power communication technologies (LPCT). These technologies enable cost-effective, | + | IoT nodes are the fundamental building blocks of an IoT system, enabling the capture, processing, and transmission of data across connected devices. These nodes often operate in energy-constrained environments and are connected to an access point, which links them to the Internet, using low-power communication technologies (LPCT). These technologies enable cost-effective, |
| | ||
Line 44: | Line 44: | ||
* Wide-Area Coverage: Reliable communication over distances of several kilometres, even in challenging environments. | * Wide-Area Coverage: Reliable communication over distances of several kilometres, even in challenging environments. | ||
- | * Ultra-Low Power Operation: Prolonged battery life for IoT devices, | + | * Ultra-Low Power Operation: Prolonged battery life for IoT devices, |
* Low-Cost Connectivity: | * Low-Cost Connectivity: | ||
* Scalability: | * Scalability: | ||
Line 73: | Line 73: | ||
* A TCP-based publish-subscribe protocol ideal for IoT systems requiring real-time data exchange. | * A TCP-based publish-subscribe protocol ideal for IoT systems requiring real-time data exchange. | ||
* Utilises a central message broker to distribute packets between publishers and subscribers. | * Utilises a central message broker to distribute packets between publishers and subscribers. | ||
- | * MQTT-SN (Sensor Network): A variant | + | * MQTT-SN (Sensor Network): A variant |
**3. Advanced Message Queuing Protocol (AMQP):** | **3. Advanced Message Queuing Protocol (AMQP):** | ||
Line 88: | Line 88: | ||
IoT nodes rely on advanced wireless access technologies and application layer protocols to establish seamless connectivity, | IoT nodes rely on advanced wireless access technologies and application layer protocols to establish seamless connectivity, | ||
- | ===== The IoT Gateway | + | ===== The IoT Gateway |
- | The Internet of Things (IoT) Gateway is a pivotal component in IoT ecosystems, serving as the interface between IoT devices—such as sensors, actuators, and edge nodes—and the broader network infrastructure, | + | The IoT Gateway is a pivotal component in IoT ecosystems, serving as the interface between IoT devices—such as sensors, actuators, and edge nodes—and the broader network infrastructure, |
- | ==== Core Functions of IoT Gateway | + | ==== Core Functions of IoT Gateway |
IoT gateways serve multiple essential functions that enhance the overall effectiveness of IoT deployments: | IoT gateways serve multiple essential functions that enhance the overall effectiveness of IoT deployments: | ||
Line 118: | Line 118: | ||
* Reduced Latency: Local processing enables real-time decision-making, | * Reduced Latency: Local processing enables real-time decision-making, | ||
- | * Bandwidth | + | * Bandwidth |
* Enhanced Security: Localised data processing limits the exposure of sensitive information to external threats. | * Enhanced Security: Localised data processing limits the exposure of sensitive information to external threats. | ||
* Autonomous Operation: In environments with intermittent connectivity, | * Autonomous Operation: In environments with intermittent connectivity, | ||
Line 129: | Line 129: | ||
* Smart Cities: WiFi-enabled gateways support high-speed communication for smart lighting, traffic management, and public safety systems. | * Smart Cities: WiFi-enabled gateways support high-speed communication for smart lighting, traffic management, and public safety systems. | ||
* Healthcare IoT: Gateways integrated with BLE or WiFi connect wearable devices to centralised systems for real-time patient monitoring and diagnostics. | * Healthcare IoT: Gateways integrated with BLE or WiFi connect wearable devices to centralised systems for real-time patient monitoring and diagnostics. | ||
- | * Industrial IoT (IIoT): Gateways facilitate predictive maintenance and process | + | * Industrial IoT (IIoT): Gateways facilitate predictive maintenance and process |
IoT gateways are indispensable for creating seamless, secure, and efficient IoT networks. By bridging diverse devices, translating protocols, and enabling edge computing, these gateways ensure the scalability and functionality of IoT solutions across industries. Their integration with modern wireless technologies and edge devices makes them a cornerstone for the growing adoption of IoT in real-world applications. | IoT gateways are indispensable for creating seamless, secure, and efficient IoT networks. By bridging diverse devices, translating protocols, and enabling edge computing, these gateways ensure the scalability and functionality of IoT solutions across industries. Their integration with modern wireless technologies and edge devices makes them a cornerstone for the growing adoption of IoT in real-world applications. | ||
===== Fog and Edge Computing Nodes ===== | ===== Fog and Edge Computing Nodes ===== | ||
- | In the rapidly expanding Internet of Things | + | In the rapidly expanding Internet of Things landscape, fog and edge computing nodes are critical in bridging the gap between IoT devices and centralised cloud computing infrastructure. These nodes decentralise data processing, bringing computational resources closer to the source of data generation, enhancing responsiveness, |
**Key Characteristics of Fog and Edge Computing** | **Key Characteristics of Fog and Edge Computing** | ||
Line 240: | Line 240: | ||
- | ===== Internet | + | ===== Internet |
- | Internet core networks are the backbone of the Internet of Things | + | Internet core networks are the backbone of the Internet of Things, enabling seamless connectivity and data exchange between billions of devices and cloud computing platforms. These networks are integral to the operation of IoT systems, ensuring the reliable transmission of vast amounts of data generated by interconnected sensors, actuators, and devices, collectively called IoT nodes. |
IoT nodes capture and generate significant data volumes that need to be processed to extract actionable insights. This data journey involves two key communication paths: | IoT nodes capture and generate significant data volumes that need to be processed to extract actionable insights. This data journey involves two key communication paths: | ||
Line 263: | Line 263: | ||
* End-to-end Encryption: Ensures data confidentiality during transmission. | * End-to-end Encryption: Ensures data confidentiality during transmission. | ||
* Secure Authentication Protocols: Protect against unauthorised access. | * Secure Authentication Protocols: Protect against unauthorised access. | ||
- | * Continuous Network Monitoring: Identifies and neutralizes | + | * Continuous Network Monitoring: Identifies and neutralises |
Without comprehensive security frameworks, IoT systems are vulnerable to breaches, data theft, and operational disruptions, | Without comprehensive security frameworks, IoT systems are vulnerable to breaches, data theft, and operational disruptions, | ||
Line 274: | Line 274: | ||
Even minor QoS degradation can result in severe consequences for applications such as autonomous vehicles, industrial automation, and telemedicine, | Even minor QoS degradation can result in severe consequences for applications such as autonomous vehicles, industrial automation, and telemedicine, | ||
- | **Solutions for QoS Optimization:** | + | **Solutions for QoS Optimisation:** |
* Traffic Prioritisation Mechanisms: Assign higher priority to time-sensitive data. | * Traffic Prioritisation Mechanisms: Assign higher priority to time-sensitive data. | ||
- | * Dynamic Network | + | * Dynamic Network |
* Adaptive Bandwidth Allocation: Scale resources based on traffic demands.\\ | * Adaptive Bandwidth Allocation: Scale resources based on traffic demands.\\ | ||
By ensuring consistent QoS, core networks can meet the stringent demands of real-time IoT applications. | By ensuring consistent QoS, core networks can meet the stringent demands of real-time IoT applications. | ||
Line 337: | Line 337: | ||
Core networks can meet the evolving demands of IoT systems by adopting advanced technologies such as SDN, NFV, edge computing, and AI-driven management and implementing robust security measures and energy-efficient practices. These innovations will ensure a sustainable, | Core networks can meet the evolving demands of IoT systems by adopting advanced technologies such as SDN, NFV, edge computing, and AI-driven management and implementing robust security measures and energy-efficient practices. These innovations will ensure a sustainable, | ||
- | ===== Cloud computing data centres | + | ===== Cloud Computing Data Centres |
- | IoT devices are typically constrained by limited computational power and memory, so they rely heavily on cloud data centres for advanced analytics and data storage. IoT cloud computing represents the intersection of cloud technology and the rapidly expanding Internet of Things | + | IoT devices are typically constrained by limited computational power and memory, so they rely heavily on cloud data centres for advanced analytics and data storage. IoT cloud computing represents the intersection of cloud technology and the rapidly expanding Internet of Things domain, offering a robust framework for processing and managing the massive data streams of IoT devices. |
Cloud computing has transformed IT operations, providing unparalleled advantages in cost-effectiveness, | Cloud computing has transformed IT operations, providing unparalleled advantages in cost-effectiveness, | ||
- | By leveraging cloud computing, organisations can minimize | + | By leveraging cloud computing, organisations can minimise |
**Key Benefits of IoT Cloud Computing** | **Key Benefits of IoT Cloud Computing** | ||
Line 358: | Line 358: | ||
End-to-End Encryption: Protects data during transmission and storage. | End-to-End Encryption: Protects data during transmission and storage. | ||
Regular Updates and Patches: Ensures systems are safeguarded against emerging vulnerabilities. | Regular Updates and Patches: Ensures systems are safeguarded against emerging vulnerabilities. | ||
- | Robust Authentication Mechanisms: Prevents | + | Robust Authentication Mechanisms: Prevents |
By outsourcing security to cloud providers, organisations can achieve a level of protection that would be costly and complex to maintain independently. | By outsourcing security to cloud providers, organisations can achieve a level of protection that would be costly and complex to maintain independently. | ||
Line 385: | Line 385: | ||
**1. Real-Time Insights: | **1. Real-Time Insights: | ||
- | Cloud-based analytics enable | + | Cloud-based analytics enable |
**2. Enhanced Operational Efficiency: | **2. Enhanced Operational Efficiency: | ||
Line 408: | Line 408: | ||
As the integration of these technologies continues to advance, IoT cloud computing will remain a driving force behind innovation and global connectivity, | As the integration of these technologies continues to advance, IoT cloud computing will remain a driving force behind innovation and global connectivity, | ||
- | ===== IoT Software | + | ===== IoT Software |
- | The value of IoT lies not just in the devices themselves but in the software applications that leverage the data generated by these devices to provide actionable insights and drive automation. These software applications are at the heart of IoT solutions and can be designed for various purposes. Let's explore the different aspects of IoT applications | + | IoT devices are naturally network-enabled and communication-oriented. For this reason, software development on any component of the IoT ecosystem requires a specific approach driven by communication requirements, |
+ | The value of IoT lies not just in the devices themselves but in the software applications that leverage the data generated by these devices to provide actionable insights and drive automation. These software applications are at the heart of IoT solutions and can be designed for various purposes. Let's explore the different aspects of IoT Software Applications | ||
**1. Monitoring** | **1. Monitoring** | ||
- | Monitoring is one of the most common IoT application categories. In this use case, IoT devices (such as sensors, cameras, or smart meters) continuously collect data about the environment, | + | Monitoring is one of the most common IoT application categories. In this use case, IoT devices (such as sensors, cameras, or smart meters) continuously collect data about the environment, |
- | + | The software interfaces with the devices to retrieve real-time data, such as temperature, | |
- | Collect | + | |
* Analyse the data: Visualisation tools and dashboards allow users to view trends and patterns in real time, making it easy to monitor critical metrics. | * Analyse the data: Visualisation tools and dashboards allow users to view trends and patterns in real time, making it easy to monitor critical metrics. | ||
* Alert and notify: When the system detects anomalies or values that exceed predefined thresholds, the software can send alerts or notifications to stakeholders, | * Alert and notify: When the system detects anomalies or values that exceed predefined thresholds, the software can send alerts or notifications to stakeholders, | ||
Line 472: | Line 472: | ||
The true value of IoT applications lies in their ability to convert raw data from connected devices into actionable insights, drive automation, and improve decision-making. Whether for monitoring, control, or automation, IoT applications are revolutionising industries by improving efficiency, reducing costs, and enhancing user experiences. As IoT technology evolves, the potential for even more advanced, intelligent, | The true value of IoT applications lies in their ability to convert raw data from connected devices into actionable insights, drive automation, and improve decision-making. Whether for monitoring, control, or automation, IoT applications are revolutionising industries by improving efficiency, reducing costs, and enhancing user experiences. As IoT technology evolves, the potential for even more advanced, intelligent, | ||
- | ===== IoT network security systems | + | ===== IoT Network Security Systems |
- | As the number of IoT devices grows, the need for robust security measures becomes even more critical. Protecting the sensitive data collected by these devices from unauthorized | + | Nowadays, virtually every IoT system processes sensitive data directly or indirectly. Many of those systems are mission-critical ones.\\ |
+ | As the number of IoT devices grows, the need for robust security measures becomes even more critical. Protecting the sensitive data collected by these devices from unauthorised | ||
**Security in IoT Networks:** \\ | **Security in IoT Networks:** \\ | ||
Line 480: | Line 481: | ||
**Key Security Measures** | **Key Security Measures** | ||
- | * **Encryption**: | + | * **Encryption**: |
* **Authentication**: | * **Authentication**: | ||
* **Authorisation**: | * **Authorisation**: | ||
Line 486: | Line 487: | ||
* **Intrusion Detection and Prevention Systems (IDPS)**: IoT networks are prone to cyberattacks, | * **Intrusion Detection and Prevention Systems (IDPS)**: IoT networks are prone to cyberattacks, | ||
* **Firmware and Software Updates**: Keeping devices' | * **Firmware and Software Updates**: Keeping devices' | ||
- | * **Secure Network Architecture**: | + | * **Secure Network Architecture**: |
* **Physical Security**: Physical security is also an essential aspect of IoT device protection besides cyber threats. Devices located in publicly accessible places or vulnerable environments can be tampered with or stolen, leading to a loss of control or data misuse. Protecting IoT devices physically through tamper-resistant hardware, secure storage solutions, and proper disposal methods ensures that attackers cannot quickly gain unauthorised access by physically compromising a device. | * **Physical Security**: Physical security is also an essential aspect of IoT device protection besides cyber threats. Devices located in publicly accessible places or vulnerable environments can be tampered with or stolen, leading to a loss of control or data misuse. Protecting IoT devices physically through tamper-resistant hardware, secure storage solutions, and proper disposal methods ensures that attackers cannot quickly gain unauthorised access by physically compromising a device. | ||
* **Challenges in IoT Security**: While these security measures are critical, implementing them in IoT networks presents several challenges. Many IoT devices have limited computational power and storage, making implementing complex encryption or authentication mechanisms difficult. Additionally, | * **Challenges in IoT Security**: While these security measures are critical, implementing them in IoT networks presents several challenges. Many IoT devices have limited computational power and storage, making implementing complex encryption or authentication mechanisms difficult. Additionally, |