SlideShare ist ein Scribd-Unternehmen logo
1 von 14
The Internet of Things- An Architectural Perspective
Gaurav Awasthi
Software Architect &
Technology Evangelist
@gawasthi22
in.linkedin.com/in/gawasthi
2
What is Internet of things
Internet of Things can be realized in three paradigms:
 Internet-oriented (middleware)
 Things oriented (sensors)
 Semantic-oriented (knowledge)
Definition:
Interconnection of devices, sensors and actuators sharing information
and data across platforms through a unified framework and enabling
innovative business applications. This is achieved by large scale
sensing, analytics and representation using cloud computing and real
time streaming analysis
Primary Goal:
To create situation awareness, to make intelligent decisions and to
respond to dynamics of the environment
3
What does it comprise of ?
DEVICES
CONNECTIVITY
PLATFORM
APPLICATIONS
4
Technology Agnostic view of IOT
FeedbackandDecisions
© AllStuffIOT
THINGS
Internet
Device Data
Data Analytics
Operational
Feedback
Business
Insight
LOCAL ANALYTICS
FeedbackandDecisions
5
Remote Monitoring & VisualizationConnectivity
Data/Device
Management
 Device/Hardware
Firmware
 Sensors
 Reports and Dashboards
 Web, tablet, mobile, PC based applications
 Device Configuration, Monitoring and diagnostics
 Alarms, alerts, notifications
 Advanced analytics, Predictive analytics
Things
Cloud
 Data Models
 Device Management
 Cloud based solution
 Big data solutions
 Platform services
 Connectivity
 Device
Concentrator/Gateways
 Secure Communication
 Communication Interfaces –
NFC, BLE, Zigbees, GSM, GPRS
IOT COMPONENTS
MICRO IOT – REMOTE PATIENT MONITORING
CONNECTED HOSPITALS – TYPICAL REQUIREMENTS
Command Monitor
Registration/De-Registration of Medical devices
Device Health Monitoring
Patient Data Capture and Upload
Device Configuration data Upload
Software Update on devices
Compliance Requirements and Guidelines like HIPPA, Data Residency
Remote Troubleshooting
CONNECTED HOSPITALS – REFERENCE ARCHITECTURE
Gateway
HTTPS
ServiceBus
Device Management
Platform Services
Software Updates
Event
Ingester
Security
Fault
Handling
Audit
Logging
Event
Listener
Solution Portal
Visualization
Reports
Web API
Device
Device
Device
.
.
.
HTTPS
Alerts/
Notification
Rules Engine
Preventive/Predict
ive Maintenance
Green
Compliance
External Interfaces
Social Analytics
Mobile/
Wearable Apps
Device
Storage
Service
Bus
Big Data
Analytics
web services
Energy
Optimization
Enterprise
Applications
COMPONENT DESCRIPTION
•The medical devices can either be directly connected to internet or through a gateway.
•In some cases, there could be localized hubs which connect to gateways and then to the
platform
Devices
•There are generally two kind of requirements, one for communicating for large messages
from/to the platform or stream data
•Based on the data type, there are different kind of messaging components to ingest such
data. An ESB on ingress and egress is generally used
Messaging
•For Device Management, service like Software Upload to devices, Configuration data
download from devices, Device Health Service etc. are deployed on the platformDevice Management
•Data storage is generally used for persisting device configuration and device topology
•For Software packages, generally a cloud storage mechanism is usedStorage
Analytics
External Interface
• Big Data Analytics is generally used on data that is present in the database
• Real time Analytics is used for device health purposes on streaming data from devices
• External Interfaces to the platform are supported from Enterprise Service Bus and Data
API
DEVICE MANAGEMENT
GATEWAY ARCHITECTURE
AWS IMPLEMENTATION
DEPLOYMENT ARCHITECTURE
Devices
Gateway
Availability Zone 1
Availability Zone 2
Auto Scaling Group
Dashboard
Dashboard
Queueing
Service(SQS)
Storage
(S3)
CDN
(CloudFront)
Auto Scaling Group
Platform
Services
Platform
Services
Elastic Cache
E
l
a
s
t
i
c
L
o
a
d
B
a
l
a
n
c
e
r
Streaming channel
(Kinesis)
Master
RDS
Standby
RDS
Logs
(Cloud Watch)
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureUS-Ignite
 
Prism presentation
Prism presentationPrism presentation
Prism presentationLakshmi .
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentUS-Ignite
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorIRJET Journal
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threatsAkhil Kumar
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointBeyondTrust
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking ServicesVirtue Security
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...Venkat Projects
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionBialogics
 
Information security
Information securityInformation security
Information securityWilliam Moore
 
Smartt fleet presentation
Smartt fleet presentationSmartt fleet presentation
Smartt fleet presentationDeniseByer
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 

Was ist angesagt? (20)

SeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTureSeaCat: and SDN End-to-end Application Containment ArchitecTure
SeaCat: and SDN End-to-end Application Containment ArchitecTure
 
Prism presentation
Prism presentationPrism presentation
Prism presentation
 
SeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application ContainmentSeaCat: SDN End-to-End Application Containment
SeaCat: SDN End-to-End Application Containment
 
Crime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic ProtectorCrime Investigation with Cybernetic Protector
Crime Investigation with Cybernetic Protector
 
Mobile database security threats
Mobile database security threatsMobile database security threats
Mobile database security threats
 
Ijcet 06 07_002
Ijcet 06 07_002Ijcet 06 07_002
Ijcet 06 07_002
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
 
Ethical Hacking Services
Ethical Hacking ServicesEthical Hacking Services
Ethical Hacking Services
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...efficient io t management with resilience to unauthorized access to cloud sto...
efficient io t management with resilience to unauthorized access to cloud sto...
 
Intelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data ExtractionIntelligent Protocol Content Analysis - Efficient Data Extraction
Intelligent Protocol Content Analysis - Efficient Data Extraction
 
Alive 2016
Alive 2016Alive 2016
Alive 2016
 
Information security
Information securityInformation security
Information security
 
Smartt fleet presentation
Smartt fleet presentationSmartt fleet presentation
Smartt fleet presentation
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
IOT wearable device case study
IOT wearable device case studyIOT wearable device case study
IOT wearable device case study
 
Unit4
Unit4Unit4
Unit4
 

Andere mochten auch

Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceIndicThreads
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT ArchitectureNaseeba P P
 
A reference architecture for the internet of things
A reference architecture for the internet of thingsA reference architecture for the internet of things
A reference architecture for the internet of thingsCharles Gibbons
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architectureMachinePulse
 

Andere mochten auch (6)

Internet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads ConferenceInternet of things architecture perspective - IndicThreads Conference
Internet of things architecture perspective - IndicThreads Conference
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Enterprise, Architecture and IoT
Enterprise, Architecture and IoTEnterprise, Architecture and IoT
Enterprise, Architecture and IoT
 
A reference architecture for the internet of things
A reference architecture for the internet of thingsA reference architecture for the internet of things
A reference architecture for the internet of things
 
IoT Cloud architecture
IoT Cloud architectureIoT Cloud architecture
IoT Cloud architecture
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 

Ähnlich wie Internet of Things - An Architectural Perspective

Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development PlatformUnmesh Ballal
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System Saptarshi Nag
 
IoT definition and the presentation for engineers
IoT definition and the presentation for engineersIoT definition and the presentation for engineers
IoT definition and the presentation for engineersjeevarajan1302
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre canaleenergia
 
IoT Dynatrace
IoT Dynatrace IoT Dynatrace
IoT Dynatrace Malik BC
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaIJARIIT
 
Real World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTReal World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTEurotech
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
Internet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellInternet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellIntersog
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsEurotech
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoIntergen
 
What are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdfWhat are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdfashumasih3
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Eurotech
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
Io t and cloud based computational framework, evolutionary approach in health...
Io t and cloud based computational framework, evolutionary approach in health...Io t and cloud based computational framework, evolutionary approach in health...
Io t and cloud based computational framework, evolutionary approach in health...owatheowais
 

Ähnlich wie Internet of Things - An Architectural Perspective (20)

Iot Solution Development Platform
Iot Solution Development PlatformIot Solution Development Platform
Iot Solution Development Platform
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
IoT definition and the presentation for engineers
IoT definition and the presentation for engineersIoT definition and the presentation for engineers
IoT definition and the presentation for engineers
 
IoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from PatentsIoT Big Data Analytics Insights from Patents
IoT Big Data Analytics Insights from Patents
 
SMART CITY 3 novembre
SMART CITY 3 novembre SMART CITY 3 novembre
SMART CITY 3 novembre
 
IoT Dynatrace
IoT Dynatrace IoT Dynatrace
IoT Dynatrace
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
 
Real World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoTReal World IoT Architectures and Projects with Eclipse IoT
Real World IoT Architectures and Projects with Eclipse IoT
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
Internet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a NutshellInternet of Things (IoT) in a Nutshell
Internet of Things (IoT) in a Nutshell
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M Solutions
 
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and DemoTechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
TechEd NZ 2014: Intelligent Systems Service - Concept, Code and Demo
 
What are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdfWhat are the roles of Building and Functional Blocks of IoT.pdf
What are the roles of Building and Functional Blocks of IoT.pdf
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Io t and cloud based computational framework, evolutionary approach in health...
Io t and cloud based computational framework, evolutionary approach in health...Io t and cloud based computational framework, evolutionary approach in health...
Io t and cloud based computational framework, evolutionary approach in health...
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Internet of Things - An Architectural Perspective

  • 1. The Internet of Things- An Architectural Perspective Gaurav Awasthi Software Architect & Technology Evangelist @gawasthi22 in.linkedin.com/in/gawasthi
  • 2. 2 What is Internet of things Internet of Things can be realized in three paradigms:  Internet-oriented (middleware)  Things oriented (sensors)  Semantic-oriented (knowledge) Definition: Interconnection of devices, sensors and actuators sharing information and data across platforms through a unified framework and enabling innovative business applications. This is achieved by large scale sensing, analytics and representation using cloud computing and real time streaming analysis Primary Goal: To create situation awareness, to make intelligent decisions and to respond to dynamics of the environment
  • 3. 3 What does it comprise of ? DEVICES CONNECTIVITY PLATFORM APPLICATIONS
  • 4. 4 Technology Agnostic view of IOT FeedbackandDecisions © AllStuffIOT THINGS Internet Device Data Data Analytics Operational Feedback Business Insight LOCAL ANALYTICS FeedbackandDecisions
  • 5. 5 Remote Monitoring & VisualizationConnectivity Data/Device Management  Device/Hardware Firmware  Sensors  Reports and Dashboards  Web, tablet, mobile, PC based applications  Device Configuration, Monitoring and diagnostics  Alarms, alerts, notifications  Advanced analytics, Predictive analytics Things Cloud  Data Models  Device Management  Cloud based solution  Big data solutions  Platform services  Connectivity  Device Concentrator/Gateways  Secure Communication  Communication Interfaces – NFC, BLE, Zigbees, GSM, GPRS IOT COMPONENTS
  • 6. MICRO IOT – REMOTE PATIENT MONITORING
  • 7. CONNECTED HOSPITALS – TYPICAL REQUIREMENTS Command Monitor Registration/De-Registration of Medical devices Device Health Monitoring Patient Data Capture and Upload Device Configuration data Upload Software Update on devices Compliance Requirements and Guidelines like HIPPA, Data Residency Remote Troubleshooting
  • 8. CONNECTED HOSPITALS – REFERENCE ARCHITECTURE Gateway HTTPS ServiceBus Device Management Platform Services Software Updates Event Ingester Security Fault Handling Audit Logging Event Listener Solution Portal Visualization Reports Web API Device Device Device . . . HTTPS Alerts/ Notification Rules Engine Preventive/Predict ive Maintenance Green Compliance External Interfaces Social Analytics Mobile/ Wearable Apps Device Storage Service Bus Big Data Analytics web services Energy Optimization Enterprise Applications
  • 9. COMPONENT DESCRIPTION •The medical devices can either be directly connected to internet or through a gateway. •In some cases, there could be localized hubs which connect to gateways and then to the platform Devices •There are generally two kind of requirements, one for communicating for large messages from/to the platform or stream data •Based on the data type, there are different kind of messaging components to ingest such data. An ESB on ingress and egress is generally used Messaging •For Device Management, service like Software Upload to devices, Configuration data download from devices, Device Health Service etc. are deployed on the platformDevice Management •Data storage is generally used for persisting device configuration and device topology •For Software packages, generally a cloud storage mechanism is usedStorage Analytics External Interface • Big Data Analytics is generally used on data that is present in the database • Real time Analytics is used for device health purposes on streaming data from devices • External Interfaces to the platform are supported from Enterprise Service Bus and Data API
  • 13. DEPLOYMENT ARCHITECTURE Devices Gateway Availability Zone 1 Availability Zone 2 Auto Scaling Group Dashboard Dashboard Queueing Service(SQS) Storage (S3) CDN (CloudFront) Auto Scaling Group Platform Services Platform Services Elastic Cache E l a s t i c L o a d B a l a n c e r Streaming channel (Kinesis) Master RDS Standby RDS Logs (Cloud Watch)