Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
25 views14 pages

Unit3 C

Uploaded by

mroriginal845438
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views14 pages

Unit3 C

Uploaded by

mroriginal845438
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 14

CSE88D

IOT State of Arts


UNIT III-Part III
Deployment and Operation View
• Connected and smart objects in the IoT can be realized in
many different ways and can communicate using many
different technologies.

• Moreover, different systems may need to communicate the
one to each other in a compliant way.

• Hence the Deployment and Operation view is very important


to address how actual system can be realized by selecting
technologies and making them communicate and operate in a
comprehensive way.
• The Deployment and Operation view aims at providing users
of the IoT Reference Model with a set of guidelines to drive
them through the different design choices that they have to
face while designing the actual implementation of their
services.

• Starting from the IoT Domain Model, we found three main


element groups : Devices, Resources, and Services highlighted
in red, blue and yellow, respectively.

• Each of them poses a different deployment problem, which, in


turn, reflects on the operational capabilities of the system.
The viewpoints used in the Deployment and Operation
view are the following:

• The IoT Domain Model diagram is used as a guideline to


describe the specific application domain.

• The Functional Model is used as a reference to the system


definition; in particular it defines Functional Groups such as
IoT Services and Connectivity groups which are fundamental
for a correct definition of the system.
• Network connectivity diagrams can be used to plan the
connectivity topology to enable the desired networking
capability of the target application; at the deployment level,
the connectivity diagram will be used to define the hierarchies
and the type of the sub-networks composing the complete
system network;

• Device Descriptions (such as datasheets and users manuals)


can be used to map actual hardware on the service and
resource requirements of the target system.
• First of all, devices in IoT systems include the whole spectrum
of technologies ranging from the simplest of the
radiofrequency tags to the most complex servers.

• The unifying characteristics are mainly two-fold: on the one


hand, every device is connected with one another forming a
part of the IoT; and, on the other hand, every device is
“smart”, even though with different degree of complexity, in
that it provides computational capabilities.
• These two characteristics are the subject of the first choices a
system designer has to make.

• The following list provides a few of the typical technologies


that can be found in IoT systems: Sensor & Actuator
Networks;

• RFIDs and smart tags;


• WiFi or other unconstrained technologies;
• Cellular networks.
• As a consequence of the coexistence of different communication
technologies in the same system, the second choice the system designer
must account for is related to communication protocols.

• In addition, in order to better understand the application, it is important to


describe it within the Functional View.
• We identified the following possibilities:

• 1.IoT protocol suite: This is the main direction supported by this


project and providing the best solution for interoperability;

• 2.Ad-hoc proprietary solutions: Whenever the performance
requirements of the target application are more important than the
system versatility, ad hoc solutions may be the only way to go;

• 3.Other standards: Depending on the target application domain,
regulations may exist forcing the system designer to adopt
standards, different from those suggested by the IoT protocol suite,
that solved a given past issue and have been maintained for
continuity.
• After having selected the devices and their
communication methods, the system designer
has to account for services and resources, as
defined in the IoT Service FG section.
• 1. On smart objects: This choice applies to simple resource
definitions and lightweight services, such as web-services that may
be realized in few tens or hundreds of bytes;

• 2.On gateways: Whenever the target devices are not powerful
enough to run the needed software themselves, gateways or other
more capable devices have to be deployed to assist the less capable
ones;

• 3.In the cloud: Software can be also deployed on web-farms. This
solution improves the availability of the services, but may decrease
the performance in terms of latency and throughput.
Trust, Security and Privacy
• Trust
• Trust in the IoT environment is a fundamental yet difficult to
obtain quality.

• As the security one, this quality is highly dependent on the


computation and communication performance of the system.

• In the frame of IoT moreover, M2M subjects must be enabled
to evaluate this quality in order to obtain autonomous
systems
• Security
• Security is an essential quality of an IoT system and it is tightly
related to specific security features which are often a basic
prerequisite for enabling Trust and Privacy qualities in a
system

• Privacy
• There are usually different concepts conveyed with the term
privacy, some being more from the technical side and some
more from the legal perspective, without forgetting ethical
aspects

You might also like