Post on 27-May-2018
October 14-16, 2014 • Chicago, Illinois
Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things
Brian McCarson – Sr. Principal Engineer & Sr. System
Architect, Internet of Things Group, Intel Corp
Mac Devine – Vice President SDN Cloud Services & CTO,
IBM Distinguished Engineer, IBM Corp, Cloud Services Division
© 2013 Cisco and/or its affiliates. All rights reserved. 3
Agenda
Overview of IoT Reference Model – Jim Green
Introduction to the Reference Model
Security, Interoperability, Scalability – Brian McCarson
HW and SW Features for an E2E Lockdown
Protocol Abstraction
Scaled Compute Intelligence
IBM Section – Mac Devine
Trusted Security
IoT Foundational Cloud Services
Real-time Analytics
© 2013 Cisco and/or its affiliates. All rights reserved. 5
Basic Premises
Devices
send and receive data interacting with the
Network
where the data is transmitted, normalized, and filtered using
Edge Computing
before landing in
Data storage / Databases
accessible by
Applications
which process it and provide it to people who will
Act and Collaborate
Standards based
approaches are required
to enable the IoT industry
© 2013 Cisco and/or its affiliates. All rights reserved. 6
IoT World Forum Reference Model
Levels
Application(Reporting, Analytics, Control)
Data Abstraction(Aggregation & Access)
Data Accumulation(Storage)
Edge Computing(Data Element Analysis & Transformation)
Connectivity(Communication & Processing Units)
Physical Devices & Controllers(The “Things” in IoT)
Collaboration & Processes(Involving People & Business Processes)
1
2
3
4
5
6
7
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
© 2013 Cisco and/or its affiliates. All rights reserved. 7
Internet of Things Reference Model Objectives
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
IT
OT
Query
Based
Event
Based
Data at
Rest
Data in
Motion
Non-real
Time
Real
Time
Levels
1
2
3
4
5
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. 8
Bridging IT and OT
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Key Point:
IT – OT
IT
OT
Levels
1
2
3
4
5
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. 9
Bridging IT and OT: Introducing IoT “Edgeware”
Devices
Edge
Edge
computing
Device Control• Configure (from the device provider)
• Status (from the device provider)
Device Interactions• Discovery
• Addressing
• Protocol conversion
Middleware• Listeners (Zigbee), brokers (MQTT)
• Event grouping / batch interactions
Data• Normalize (standardize codes for the app)
• Filter (against pre-set criteria from the app)
• Expand (decode/expand cryptic codes)
• Aggregate (generate statistics)
• Notify/alert (to the app)
Combine the functions above• Schedule (when to comm with the device)
• BPM (when multiple steps are needed)
Security• Roles
• Privileges
An individual edge
software function may
serve many applications
Edge software can be
sourced completely
separately from the
vertical application
© 2013 Cisco and/or its affiliates. All rights reserved. 10
Key Points:
• IT – OT
• Decoupling
Issue: Devices may
generate data faster
than apps can ingest it
Devices
Apps
Bridging IT and OT: Handling the Volume of Data
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Levels
1
2
3
4
5
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. 11
Interoperability: Enable Edgeware and Applications from Different Vendors
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Levels
1
2
3
4
5
6
7
Abstraction Layer
Key Points:
• IT – OT
• Decoupling
- Scalability
- Agility
• Interoperability
© 2013 Cisco and/or its affiliates. All rights reserved. 12
The “Cache and Batch” Sequence Pattern(decouple the application from the data capture)
Time
Application
Edge software
Device Driver
Request Reply
Temporary
storage
© 2013 Cisco and/or its affiliates. All rights reserved. 13
Acknowledgement to the IoT “Edge” Software Vendors
© 2013 Cisco and/or its affiliates. All rights reserved. 14
Interoperability: The Next Step is Defining Interfaces, Prototyping, and Testing
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Abstraction Layer
Key Points:
• IT – OT
Decoupling
- Scalability
- Agility
• Interoperability
© 2013 Cisco and/or its affiliates. All rights reserved. 15
Embracing Legacy Applications
Key Point:
• IoT Enablement of
Legacy Applications
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Edge
Levels
1
2
3
4
5
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. 16
The Legacy Application Compatibility Sequence Pattern(use the existing DB and schema)
Time
Application
Edge software
Device Driver
Request
RDBMS
(existing
schema)
Data Collection
Proxy and Streaming
Inserts
Request
Reply
Reply
Temporary
storage
© 2013 Cisco and/or its affiliates. All rights reserved. 17
The Internet of Things and Analytics
Key Point:
• Enabling IoT Analytics
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Edge
Levels
1
2
3
4
5
6
7
Analytics
© 2013 Cisco and/or its affiliates. All rights reserved. 18
Sampling and Analytics Sequence Pattern
Time
Application
Edge software
Device Driver
Request Reply
Relational
dataRequestReply
Analytics
Request Reply
Temporary
storage
Data Collection
Proxy and Streaming
Inserts
© 2013 Cisco and/or its affiliates. All rights reserved. 19
Analytics Using Both OT and IT Data
Key Point:
• Integration with
the Enterprise
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Levels
1
2
3
4
5
6
7
© 2013 Cisco and/or its affiliates. All rights reserved. 20
Data Integration /
Virtualization
Analytics on Mixed OT and IT Data Sequence Pattern
Time
Application
Edge software
Device Driver
RequestReply
OT
dataRequest
Reply
Analytics
RequestReply
IT Data
Temporary
storage
Data Collection
Proxy and Streaming
Inserts
Abstraction Layer
Application
Edge software
Device Driver
OT data
Analytics
IT Data
Sample
Data
Data Collection
Proxy and Streaming
Inserts
Data Integration / Virtualization
Physical Devices
Connectivity
Edge Computing
Data Accumulation
Data Abstraction
Applications /Analytics
Collaboration
Various
protocols
Business
Decisions
Key Point:
An Open IoT
Framework
© 2013 Cisco and/or its affiliates. All rights reserved. 22
The Complete IoT System
Key Points:
• Bridging IT & OT
• Decoupling
- Scalability
- Agility
• Interoperability
• Legacy Compatibility
• Analytics
• Integrated with
the Enterprise
Sensors, Devices, Machines,
Intelligent Edge Nodes of all types
Center
Edge
Levels
1
2
3
4
5
6
7
Next Steps:• Interfaces
• IIC Prototyping
© 2013 Cisco and/or its affiliates. All rights reserved. 23
Agenda
Overview of IoT Reference Model – Jim Green
Introduction to the Reference Model
Developed based upon the flow of information
Logical description with emphasis on abstraction layer
Security, Interoperability, Scalability – Brian McCarson
HW and SW Features for an E2E Lockdown
Protocol Abstraction
Scaled Compute Intelligence
IBM Section – Mac Devine
Trusted Security
IoT Foundational Cloud Services
Real-time Analytics
24
Essential Tenets of End to End IoT Solutions
Infrastructure to Monetize HW, SW, and Data Management from Edge to Cloud
Value Visualized by Broad Analytics Infrastructure from Edge to Cloud
Data Normalization through Protocol Abstraction
Automated Discovery and Provisioning to Ease Deployment of Edge Devices
Security as the Foundation with Embedded HW and SW-Level Protection
10010001001001001001
0011
25
HW ID, Secure Boot, White Listing: E2E Lockdown
Stored
ImageActual
Image
vs
Stored
ImageActual
Image
vs
=
=
Secure Boot: Kernel-level device
image to enable secure device
provisioning at OS/BIOS level.
White Listing: Secure image of
allowable agents/applications for
that specific device.
HW ID: Immutable identification for
each compute device to enable
secure, automated provisioning.
26
Things Network/Cloud Compute
OS Layer
Protocol A
Protocol B
Protocol C
Protocol D
Unlocking Value thru Protocol Abstraction, APIs
Protocol Abstraction
Layer
Developer API Layer
Protocol E
Edge Compute
(Gateway or Smart Sensor)
Countless legacy systems require connecting to many disparate protocols. Abstraction layers can enable
seamless ingestion of data from disparate sources so developers can create value across market segments.
Intel Confidential
27
Things Network/Cloud Compute
OS Layer
Protocol A
Protocol D
Protocol C
Unlocking Value thru Protocol Abstraction, APIs
Protocol Abstraction
Layer
Developer API Layer
Edge Compute
(Gateway or Smart Sensor)
Abstraction layers can reside at the Edge Compute (aka: Gateway) level or the Network/Cloud Compute level
of the IoT solution stack.
OS Layer
Protocol Abstraction
Layer
Developer API Layer
Protocol B
Protocol Abstraction Layer
Developer API Layer
Protocol A
Protocol F
28
E2E Compute Scalability: Flexible Intelligence
CORE
Edge Compute (Gateway or Smart Sensor) Network/Cloud Compute
Compute
CapabilityCompute
Capability
Intel Confidential
29
AgendaOverview of IoT Reference Model – Jim Green
Introduction to the Reference Model
Developed based upon the flow of information
Logical description with emphasis on abstraction layer
Security, Interoperability, Scalability – Brian McCarson
HW and SW Features for an E2E Lockdown
Protocol Abstraction
Scaled Compute Intelligence
IBM Section – Mac Devine
Trusted Security
IoT Foundational Cloud Services
Real-time Analytics
31
Internet of Things – Cloud Delivered Services
The model
is based on
“Information
Flow”
Edge
Man
ag
em
en
t
Center
PolicyDataControl
SoftLayer Flow DataStream
Beta site up, running, and open for
registration at https://fds.flow.net
IoT
Foundatio
nal S
erv
ices
32
Trusted Computing Services
Geo
Placement
Select SoftLayer Data Center in your country of choiceGeo
Placement
Select SoftLayer Data Center in your country of choice
Server
Isolation
Select bare metal server for server isolationServer
Isolation
Select bare metal server for server isolation
Intel TXT
and TPM
Select Intel Trusted Execution Technology (TXT) for
trusted platform launch with hardware-based root of
trust
Intel TXT
and TPM
Select Intel Trusted Execution Technology (TXT) for
trusted platform launch with hardware-based root of
trust
VM/Workload
Policy
Management
Virtustream, HyTrust; specify and define granular
security policies and enforce these policies
VM/Workload
Policy
Management
Virtustream, HyTrust; specify and define granular
security policies and enforce these policies
Trusted
Compute
Pool (TCP)
Use virtualization management and orchestration
software to create TCP (aggregation of trusted
systems)
Trusted
Compute
Pool (TCP)
Use virtualization management and orchestration
software to create TCP (aggregation of trusted
systems)
Trusted computing
environment
Controlled VM distribution
Enhanced IT compliance
+https://www.softlayer.com/press/release/2602/ibm-and-intel-bring-new-security-features-to-the-cloud
Building a chain of trust from IoT Smart Devices to the SoftLayer Cloud
Securityintelligence and action is critical
from the device up through industry solutions
34
IoT as a Composable Business
IoT Foundation Services
IoT Related Bluemix services
Device Registration
Device Connectivity
Historian
Visual wiring
Rules, Push, Geo location, Analytics, Asset management, Predictive Maintenance, …
Devices & GatewaysDevice recipe
open community
IoT end-end solutionsConnected appliance solutions, Smarter home solutions, …
App tips open
community
IoT SDKs
Design & Engineerthings and applications
addressing requirements, management and complex system design processes
36
IoT Foundation Services – Managed Data Services
Enables web and mobile developers to eliminate
complexity through
A NoSQL data layer delivered as a managed service
Advanced indexing and querying capabilities
Speed and agility for the developer
Flexible consumption models
Massive scaling for number of users and
read/write operations
BLU Acceleration
MapReduce/Hadoop
SQL Database
JSON database
Mobile data
NoSQL Database
IBM offers a full range
of database services
for cloud developers
37
Analytics must be performed at the right layer, at the
right time & with the right actionable insights
cs
Tier 1: Devices / Sensors (Things)
Tier 2: Protocol Gateways
analytics zone
model dev. , training and
operationalization
real-time event management
Tier 3: Operational Gateways
Analytics pushdown
InternetTier4: Data & Analytics Zone
39
Better outcomes driven by data, analytics, and business
process optimization
Connect, Collect, & Commanda wide variety of devices with
different patterns of data volume, variety and velocity
Analyze & Optimizeinformation from across the lifecycle
leveraging insight for action
Managethe lifecycle of assets ensuring safe,
reliable and predictive operations
Operateinfrastructure safely and securely
from rollout to production
Please complete the brief breakout session survey that can be found in the mobile app under "Surveys."
Your input is essential in helping the IoTWFsteering committee improve the quality of sessions for IoTWF 2015.
If you haven’t already downloaded the app, youcan do so at customers.genie-connect.com/iotwf2014 on your mobile device.