Both sides previous revisionPrevious revisionNext revision | Previous revision |
en:iot-reloaded:iot_network_components [2025/01/04 17:54] – [IoT Software Applications] pczekalski | en:iot-reloaded:iot_network_components [2025/05/13 14:51] (current) – [Components of IoT Network Architectures] pczekalski |
---|
IoT Network Architecture is composed of a variety of layers, including Edge-class IoT devices such as sensors and actuators, access points enabling devices to connect to the Internet and services, fog-class devices performing preliminary data processing such as aggregation and conversion, core Internet network and finally a set of cloud services for data storage and advanced data processing. A sample model is present in figure {{ref>networkinginf1}}. | IoT Network Architecture is composed of a variety of layers, including Edge-class IoT devices such as sensors and actuators, access points enabling devices to connect to the Internet and services, fog-class devices performing preliminary data processing such as aggregation and conversion, core Internet network and finally a set of cloud services for data storage and advanced data processing. A sample model is present in figure {{ref>networkinginf1}}. |
<figure networkinginf1> | <figure networkinginf1> |
{{ :en:iot-reloaded:network_infrastructure_iot_new.drawio.png?700 | IoT Network Architecture Components}} | {{ :en:iot-reloaded:network_infrastructure_iot_new.drawio.png?780 | IoT Network Architecture Components}} |
<caption>IoT Network Architecture Components</caption> | <caption>IoT Network Architecture Components</caption> |
</figure> | </figure> |
| |
===== IoT nodes ===== | ===== IoT Nodes ===== |
| |
IoT nodes are the fundamental building blocks of an IoT system, enabling the capture, processing, and transmission of data across connected devices. These nodes often operate in energy-constrained environments and are connected to an access point, which links them to the Internet, using low-power communication technologies (LPCT). These technologies enable cost-effective, reliable connectivity while adhering to the limitations of battery-operated or energy-harvesting devices. They encompass wireless access technologies at the physical layer for establishing connectivity and application layer communication protocols for managing data exchange over IP networks. | IoT nodes are the fundamental building blocks of an IoT system, enabling the capture, processing, and transmission of data across connected devices. These nodes often operate in energy-constrained environments and are connected to an access point, which links them to the Internet, using low-power communication technologies (LPCT). These technologies enable cost-effective, reliable connectivity while adhering to the limitations of battery-operated or energy-harvesting devices. They encompass wireless access technologies at the physical layer for establishing connectivity and application layer communication protocols for managing data exchange over IP networks. |
IoT nodes rely on advanced wireless access technologies and application layer protocols to establish seamless connectivity, optimise energy efficiency, and support diverse use cases. The selection of these technologies should align with the application's specific requirements, ensuring a balance between performance, scalability, and cost. With the rise of LPWAN and lightweight communication protocols, IoT systems are increasingly capable of supporting massive, energy-efficient deployments in various domains, from smart cities to industrial automation. | IoT nodes rely on advanced wireless access technologies and application layer protocols to establish seamless connectivity, optimise energy efficiency, and support diverse use cases. The selection of these technologies should align with the application's specific requirements, ensuring a balance between performance, scalability, and cost. With the rise of LPWAN and lightweight communication protocols, IoT systems are increasingly capable of supporting massive, energy-efficient deployments in various domains, from smart cities to industrial automation. |
| |
===== The IoT Gateway node ===== | ===== The IoT Gateway Node ===== |
| |
The Internet of Things (IoT) Gateway is a pivotal component in IoT ecosystems, serving as the interface between IoT devices—such as sensors, actuators, and edge nodes—and the broader network infrastructure, including cloud platforms and external data analytics systems. The gateway facilitates seamless data transmission, device management, and integration, enabling efficient communication within the IoT network. By bridging IoT nodes that cannot directly communicate with each other or the Internet, IoT gateways are vital in ensuring interoperability and scalability across diverse devices and protocols. | The IoT Gateway is a pivotal component in IoT ecosystems, serving as the interface between IoT devices—such as sensors, actuators, and edge nodes—and the broader network infrastructure, including cloud platforms and external data analytics systems. The gateway facilitates seamless data transmission, device management, and integration, enabling efficient communication within the IoT network. By bridging IoT nodes that cannot directly communicate with each other or the Internet, IoT gateways are vital in ensuring interoperability and scalability across diverse devices and protocols. |
| |
==== Core Functions of IoT Gateway nodes ==== | ==== Core Functions of IoT Gateway Nodes ==== |
| |
IoT gateways serve multiple essential functions that enhance the overall effectiveness of IoT deployments: | IoT gateways serve multiple essential functions that enhance the overall effectiveness of IoT deployments: |
| |
===== Fog and Edge Computing Nodes ===== | ===== Fog and Edge Computing Nodes ===== |
In the rapidly expanding Internet of Things (IoT) landscape, fog and edge computing nodes play a critical role in bridging the gap between IoT devices and centralised cloud computing infrastructure. These nodes decentralise data processing, bringing computational resources closer to the source of data generation, enhancing responsiveness, reducing latency, and alleviating the load on cloud data centres. While "fog computing" and "edge computing" are often used interchangeably, they have distinct scopes. Fog computing is a broader architecture integrating processing at intermediate layers, such as gateways or local servers. In contrast, edge computing focuses on computations directly at or near the device level. These approaches offer a synergistic framework for efficient, real-time, and scalable IoT systems. | In the rapidly expanding Internet of Things landscape, fog and edge computing nodes are critical in bridging the gap between IoT devices and centralised cloud computing infrastructure. These nodes decentralise data processing, bringing computational resources closer to the source of data generation, enhancing responsiveness, reducing latency, and alleviating the load on cloud data centres. While "fog computing" and "edge computing" are often used interchangeably, they have distinct scopes. Fog computing is a broader architecture integrating processing at intermediate layers, such as gateways or local servers. In contrast, edge computing focuses on computations directly at or near the device level. These approaches offer a synergistic framework for efficient, real-time, scalable IoT systems. |
| |
**Key Characteristics of Fog and Edge Computing** | **Key Characteristics of Fog and Edge Computing** |
| |
| |
===== Internet core networks ===== | ===== Internet Core Networks ===== |
Internet core networks are the backbone of the Internet of Things (IoT), enabling seamless connectivity and data exchange between billions of devices and cloud computing platforms. These networks are integral to the operation of IoT systems, ensuring the reliable transmission of vast amounts of data generated by interconnected sensors, actuators, and devices, collectively called IoT nodes. | Internet core networks are the backbone of the Internet of Things, enabling seamless connectivity and data exchange between billions of devices and cloud computing platforms. These networks are integral to the operation of IoT systems, ensuring the reliable transmission of vast amounts of data generated by interconnected sensors, actuators, and devices, collectively called IoT nodes. |
| |
IoT nodes capture and generate significant data volumes that need to be processed to extract actionable insights. This data journey involves two key communication paths: | IoT nodes capture and generate significant data volumes that need to be processed to extract actionable insights. This data journey involves two key communication paths: |
Core networks can meet the evolving demands of IoT systems by adopting advanced technologies such as SDN, NFV, edge computing, and AI-driven management and implementing robust security measures and energy-efficient practices. These innovations will ensure a sustainable, secure, and efficient future for IoT, driving transformative advancements across industries in an increasingly connected world. | Core networks can meet the evolving demands of IoT systems by adopting advanced technologies such as SDN, NFV, edge computing, and AI-driven management and implementing robust security measures and energy-efficient practices. These innovations will ensure a sustainable, secure, and efficient future for IoT, driving transformative advancements across industries in an increasingly connected world. |
| |
===== Cloud computing data centres ===== | ===== Cloud Computing Data Centres ===== |
IoT devices are typically constrained by limited computational power and memory, so they rely heavily on cloud data centres for advanced analytics and data storage. IoT cloud computing represents the intersection of cloud technology and the rapidly expanding Internet of Things (IoT) domain, offering a robust framework for processing and managing the massive data streams of IoT devices. | IoT devices are typically constrained by limited computational power and memory, so they rely heavily on cloud data centres for advanced analytics and data storage. IoT cloud computing represents the intersection of cloud technology and the rapidly expanding Internet of Things domain, offering a robust framework for processing and managing the massive data streams of IoT devices. |
| |
Cloud computing has transformed IT operations, providing unparalleled advantages in cost-effectiveness, scalability, and flexibility. When combined with IoT, these benefits are amplified, enabling seamless access to a broad array of computing resources—ranging from software to infrastructure and platforms—delivered remotely over the Internet. This integration allows IoT devices to connect to cloud environments from virtually any location, enabling real-time data processing, efficient resource management, and dynamic scalability. | Cloud computing has transformed IT operations, providing unparalleled advantages in cost-effectiveness, scalability, and flexibility. When combined with IoT, these benefits are amplified, enabling seamless access to a broad array of computing resources—ranging from software to infrastructure and platforms—delivered remotely over the Internet. This integration allows IoT devices to connect to cloud environments from virtually any location, enabling real-time data processing, efficient resource management, and dynamic scalability. |
The true value of IoT applications lies in their ability to convert raw data from connected devices into actionable insights, drive automation, and improve decision-making. Whether for monitoring, control, or automation, IoT applications are revolutionising industries by improving efficiency, reducing costs, and enhancing user experiences. As IoT technology evolves, the potential for even more advanced, intelligent, and integrated applications will only grow, further embedding IoT into our daily lives and business operations. | The true value of IoT applications lies in their ability to convert raw data from connected devices into actionable insights, drive automation, and improve decision-making. Whether for monitoring, control, or automation, IoT applications are revolutionising industries by improving efficiency, reducing costs, and enhancing user experiences. As IoT technology evolves, the potential for even more advanced, intelligent, and integrated applications will only grow, further embedding IoT into our daily lives and business operations. |
| |
===== IoT network security systems ===== | ===== IoT Network Security Systems ===== |
| Nowadays, virtually every IoT system processes sensitive data directly or indirectly. Many of those systems are mission-critical ones.\\ |
As the number of IoT devices grows, the need for robust security measures becomes even more critical. Protecting the sensitive data collected by these devices from unauthorised access, tampering, or misuse is paramount to ensure the integrity and privacy of users and organisations. Thus, network security systems should be considered when designing IoT networks and systems to ensure they're secure by design. | As the number of IoT devices grows, the need for robust security measures becomes even more critical. Protecting the sensitive data collected by these devices from unauthorised access, tampering, or misuse is paramount to ensure the integrity and privacy of users and organisations. Thus, network security systems should be considered when designing IoT networks and systems to ensure they're secure by design. |
| |
**Key Security Measures** | **Key Security Measures** |
| |
* **Encryption**: Encryption is one of the most fundamental techniques used to protect data transmitted across IoT networks. It ensures that even if malicious actors intercept data, it remains unreadable without the appropriate decryption key. Both data at rest (stored data) and data in transit (data being transmitted) can be encrypted. IoT devices often use advanced encryption standards (AES), Transport Layer Security (TLS), or Secure Socket Layer (SSL) protocols to safeguard the communication between devices and the cloud or other endpoints. This makes it difficult for attackers to gain meaningful access to sensitive data. | * **Encryption**: Encryption is one of the most fundamental techniques to protect data transmitted across IoT networks. It ensures that even if malicious actors intercept data, it remains unreadable without the appropriate decryption key. Both data at rest (stored data) and data in transit (data being transmitted) can be encrypted. IoT devices often use advanced encryption standards (AES), Transport Layer Security (TLS), or Secure Socket Layer (SSL) protocols to safeguard the communication between devices and the cloud or other endpoints. This makes it difficult for attackers to gain meaningful access to sensitive data. |
* **Authentication**: Authentication verifies the identity of both the devices and the users interacting with the IoT network. With IoT systems often comprising many different types of devices, each with varying levels of capabilities, ensuring that only legitimate devices can join the network is critical. Authentication mechanisms can include device certificates, biometrics, and multi-factor authentication (MFA) for users. Device authentication ensures that only authorised devices can communicate within the network, reducing the risk of a rogue or compromised device gaining access to sensitive information. | * **Authentication**: Authentication verifies the identity of both the devices and the users interacting with the IoT network. With IoT systems often comprising many different types of devices, each with varying levels of capabilities, ensuring that only legitimate devices can join the network is critical. Authentication mechanisms can include device certificates, biometrics, and multi-factor authentication (MFA) for users. Device authentication ensures that only authorised devices can communicate within the network, reducing the risk of a rogue or compromised device gaining access to sensitive information. |
* **Authorisation**: Once authenticated, the authorisation process dictates what actions a device or user can perform within the network. Authorisation systems define roles and permissions, ensuring that devices only have access to data and resources necessary for their function. For example, a smart thermostat may be authorised to adjust temperature settings but not to access user data stored in the cloud. This limits the potential impact of a compromised device by preventing it from performing unauthorised actions that could lead to data breaches or system failures. | * **Authorisation**: Once authenticated, the authorisation process dictates what actions a device or user can perform within the network. Authorisation systems define roles and permissions, ensuring that devices only have access to data and resources necessary for their function. For example, a smart thermostat may be authorised to adjust temperature settings but not to access user data stored in the cloud. This limits the potential impact of a compromised device by preventing it from performing unauthorised actions that could lead to data breaches or system failures. |