IoT Platforms
Internet of Things
Entire Internet of Things (IoT) can be represented in 3 tiers as shown in following figure.Things comprise of a large number of intelligent sensors or devices deployed in field, which gather information about certain aspect of their environment. These devices interact with the “Infrastructure”. The communication media, Internet and server farm or Cloud, are part of the “Infrastructure”. The third part is the “Applications” which run on a wide range of devices are used by the end-user. The applications consume data produced by the “Infrastructure”.
An ideal IoT platform is expected to cover the middle tier (the “Infrastructure”), including the interfaces on both sides.
Ideal IoT Platform
An ideal IoT platform should be reliable and secure. It should be scalable in terms of number of devices connected simultaneously, capability to handle concurrent communication channels etc. It should provide high availability, ease of integration and should be easy to manage from end-user’s perspective. It should be extensible across industries. It should provide extensive interface APIs to application developers in order to have a good number of ready-to-use applications available to the end-user. It should be easy to integrate new types of smart sensors/devices into the system.Connector understands various protocols (such as Wi-Fi, ZigBee, Z-Wave, Bluetooth (SDR/EDR/LE), 6LoWPAN, etc.) and may also carry out format conversion if required. The “Connector” may interact with one or more smart sensors/devices. Additionally, following are the main features of a Connector:
- Provides easy device integration
- Device management, such as,
- Group control
- Scheduling
- Alarm and notification handling
- Carrier subscription management
- Device troubleshooting
- Providing access control, authentication and authorization
- Device data conditioning
- Device management
- Firmware updates
- Device configuration changes
- Remote device reboot
- Support for encryption/decryption
- Data archival/retention as per defined policies
- Secured and controlled access to data
- Data encryption
- Data modelling, rules engine, data filtering etc.
- RESTful web API for application developers
Comments
Post a Comment