SlideShare a Scribd company logo
6
Most read
7
Most read
12
Most read
ARCHITECTURE LAYERS
INTERNETOF THINGS
IoT
BY GROUP 5
IoT solutions have
become a regular part of
our lives. From the
smartwatch on your
wrist to industrial
enterprises, connected
devices are everywhere.
Having things work for us
is no longer sci-fi fantasy.
MAJOR IOT BUILDING BLOCKS AND LAYERS
There is no single, agreed-upon IoT architecture. It varies in complexity and number of
architecturallayersdependingon a particularbusiness task.
For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as
many as seven layers.
The standardized architectural model proposed by IoT industry leaders.
MAJOR IOT BUILDING BLOCKS AND LAYERS
The key buildingblocks of any Iot structure are alwaysthe same, namely:
• smart things;
• networks and gatewaysenabling low-
power devices (which is often the case
in IoT) to enter the big Internet;
• the middlewareor IoT platforms
providingdata storage spaces and
advancedcomputing engines along
with analytical capabilities;and
• applications,allowingend users to
benefit from IoT and manipulatethe
physicalworld.
MAJOR IOT BUILDING BLOCKS AND LAYERS
These elements make up the backbone of any IoT system upon which effective, multi-layered
architecture can be developed.Most commonly, these layersare:
• the PERCEPTION LAYER hosting smart things;
• the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the
cloud and vice versa via networks and gateways;
• the PROCESSING LAYER employing IoT platforms to accumulateand manage all data
streams; and
• the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control
to end users.
Besides the most essential components, the article also describes three additional layers:
• the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge,
where IoT things collect new information.Typically,edgy computing occurs on gateways;
• the BUSINESS LAYER where businesses make decisions based on the data;and
• the SECURITY LAYER encompassing all other layers.
PERCEPTION LAYER
Converting analog signals into digital data and vice versa
The initialstage of any IoT system embraces a wide range of “things” or endpoint
devices that act as a bridge between the real and digital worlds. They vary in form and
size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be
dividedinto the following large groups
• Sensors such as probes, gauges, meters, and others. They
collect physicalparameterslike temperature or humidity, turn
them into electrical signals, and send them to the IoT system.
IoT sensors are typicallysmall and consume little power.
• Actuators, translatingelectrical signalsfrom the IoT system
into physicalactions. Actuatorsare used in motor controllers,
lasers, robotic arms.
• Machines and devices connected to sensors and actuatorsor
having them as integral parts.
CONNECTIVITY LAYER
Enabling data transmission
The second level is in charge of all communicationsacross devices, networks, and cloud
services that make up the IoT infrastructure. The connectivitybetween the physical
layer and the cloud is achievedin two ways:
The communications between devices and cloud services or gateways involve different networking
technologies.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
• This level is essential for enabling IoT systems
to meet the speed, security, and scale
requirementsof the 5th generation mobile
network or 5G. The new wireless standard
promises faster speeds, lower latency, and
the abilityto handle many more connected
devices, than the current 4G standard.
• The idea behind edge or fog computing is to
process and store information as early and as
close to its sources as possible. Thisapproach
allowsfor analyzingand transforming high
volumes of real-time data locally,at the edge
of the networks. Thus, you save the time and
other resources that otherwise would be
needed to send all datato cloud services.
The result is reduced system latency that
leadsto real-time responses and enhanced
performance.
EDGE OR FOG COMPUTING LAYER
Reducing system latency
Edge computing occurs on gateways,local servers, or other edge nodes scattered
across the network. At this level, data can be:
• evaluatedto determine if it needs further processing at higher levels,
• formatted for further processing,
• decoded,
• filtered, and
• redirected to an additional destination
PROCESSING LAYER
Making raw data useful
The processing layer accumulates, stores, and processes data that comes
from the previous layer. All these tasks are commonly handled via IoT
platforms and include two major stages
Data accumulation stage Data abstraction stage
• The real-time data is captured via
an API and put at rest to meet the
requirements of non-real-time
applications. The data accumulation
component stage works as a transit hub
between event-based data generation and
query-based data consumption.
• Here, datapreparationis finalized so that
consumer applicationscan use it to
generate insights. The entire process
involvesthe following steps:
1. combining datafrom different sources,
both IoT and non-IoT,including ERM, ERP,
and CRM systems;
2. reconcilingmultiple data formats; and
3. aggregating datain one place or making it
accessible regardless of locationthrough
data virtualization.
APPLICATION LAYER
Addressing business requirements
At this layer, informationis analyzedby software to give answers to key business
questions. There are hundredsof IoT applicationsthat vary in complexity and function,
using different technology stacks and operatingsystems. Some examples are:
• device monitoringand controlsoftware,
• mobile apps for simple interactions,
• business intelligenceservices, and
• analyticsolutionsusing machine learning.
Currently, applicationscan be built right on top of IoT platforms that offer software
developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced
analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith
middleware.
BUSINESS LAYER
Implementing data-driven solutions
The informationgenerated at the previouslayersbrings value if only it results in problem-
solving solution and achieving business goals. New data must initiatecollaboration
between stakeholderswho in turn introduce new processes to enhance productivity.
The decision-makingusually involvesmore than one person working with more than one
software solution. For this reason, the business layer is defined as a separate stage,
higher than a single applicationlayer.
SECURITY LAYER
Preventing data-breaches
It goes without saying that there should be a security layer covering all the above-
mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll
only point out the basic features of the safe architecture across different levels.
Device security. Modern manufacturersof IoT devices typicallyintegratesecurity
features both in the hardware and firmware installedon it. This includes
• embedded TPM (Trusted Platform Module) chips with cryptographickeys for
authenticationand protectionof endpointdevices;
• a secure boot process that prevents unauthorizedcode from running on a powered-
up device;
• updatingsecurity patches on a regular basis; and
• physicalprotectionlike metal shields to block physicalaccess to the device.
SECURITY LAYER
Preventing data-breaches
Connection security. Whether datais being sent over devices, networks, or applications,
it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho
interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and
DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure
end-to-end data protection.
Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate
risks of exposing sensitive information to intruders. Cloud security also involves
authenticationand authorization mechanismsto limit access to the IoT applications.
Another importantsecurity method is device identitymanagement to verify the device’s
credibilitybefore allowing it to connect to the cloud.
Reference:
• https://www.altexsoft.com/blog/iot-architecture-layers-
components/
• https://www.hindawi.com/journals/jece/2017/9324035/
#:~:text=Architecture%20of%20IoT%20(A%3A%20three,(
B%3A%20five%20layers).&text=%5D.,the%20architecture
%20with%20three%20layers
• https://www.zibtek.com/blog/iot-architecture/
THANK YOU!
Group 5:
Reymart John Aguho
Lawrence Valdez
Trishia Mae Salazar
Gayle Allyson Guitones
Dempster Winston Corpuz
Matthew Erickson Quinto
Marc Vincent Maneja

More Related Content

What's hot (20)

PPTX
Unit 4
Mayura shelke
 
PPTX
IOT PROTOCOLS.pptx
DRREC
 
PPTX
1. Introduction to IoT
Abhishek Das
 
PPTX
security and privacy-Internet of things
sreelekha appakondappagari
 
PPTX
Iot architecture
Anam Iqbal
 
PPTX
FOG COMPUTING
Saisharan Amaravadhi
 
PPTX
Smart home Environment using iot
parvathy s m
 
PDF
IoT architecture
Sumit Sharma
 
PDF
Data Analytics for IoT
Muralidhar Somisetty
 
PDF
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 
PDF
Chapter 5 IoT Design methodologies
pavan penugonda
 
PDF
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
PDF
Edge Computing.pdf
RemoMarconzini1
 
PPTX
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
PDF
Protocols for IoT
Amit Dev
 
PDF
IoT Networking
Hitesh Mohapatra
 
PPTX
Edge Computing
Vikas Yadav
 
PDF
IRJET- An IoT Based Forest Fire Detection and Prevention System using Raspber...
IRJET Journal
 
PDF
Raspberry Pi
Selvaraj Seerangan
 
PPT
Education and the Internet of Things
Leo Gaggl
 
IOT PROTOCOLS.pptx
DRREC
 
1. Introduction to IoT
Abhishek Das
 
security and privacy-Internet of things
sreelekha appakondappagari
 
Iot architecture
Anam Iqbal
 
FOG COMPUTING
Saisharan Amaravadhi
 
Smart home Environment using iot
parvathy s m
 
IoT architecture
Sumit Sharma
 
Data Analytics for IoT
Muralidhar Somisetty
 
Internet of Things: A Hands-On Approach
Arshdeep Bahga
 
Chapter 5 IoT Design methodologies
pavan penugonda
 
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Edge Computing.pdf
RemoMarconzini1
 
Cloud of things (IoT + Cloud Computing)
Zakaria Hossain
 
Protocols for IoT
Amit Dev
 
IoT Networking
Hitesh Mohapatra
 
Edge Computing
Vikas Yadav
 
IRJET- An IoT Based Forest Fire Detection and Prevention System using Raspber...
IRJET Journal
 
Raspberry Pi
Selvaraj Seerangan
 
Education and the Internet of Things
Leo Gaggl
 

Similar to Group 5 IoT Architecture Layer (20)

PPTX
chapter 1 internet of things - architecture.pptx
SwapandeepKaur8
 
PDF
15CS81 Module1 IoT
Ganesh Awati
 
PPTX
Introduction to Internet of things (ioT)
siddiqmayar
 
PDF
Understanding IoT and the 5-Layer Architecture of the Internet of Things
dharmendra491836
 
PPTX
IoT architecture.pptx
HammadArif32
 
PDF
2.pdf
Nikhil Patankar
 
PPTX
Atal io t introduction
Yadvendra bedi
 
PPTX
Simplified Internet of Things Architecture
Bkannan2
 
PDF
IoT Architecture: Key Layers and How They Power Smart Systems
dharmendra491836
 
PDF
Internet of things chapter2.pdf
Rupesh930637
 
PPTX
Unit I _ Lecture PPT INTRODUCTION TO IOT PPT (2).pptx
NALESVPMEngg
 
PPTX
Internet of thing (IOT) AICT (Lec#10).pptx
hinasattar5
 
PPTX
Lec2.pptx
MuhammadIbrahim983635
 
PPTX
IOT UNIT I.pptx
sufiyashaikh19
 
PPTX
Lecture 10
vishal choudhary
 
PDF
PowerPoint Presentation of Internet of Things
AniketRibadiya
 
PDF
"Exploring the Power of Internet of Things"
Mickeyvirus4
 
PPTX
Internet of Things – Technical landscape (1).pptx
EhabRushdy1
 
PPTX
Internet of things
Vikrant Negi
 
DOC
Iot architecture report
Niranjan Kumar
 
chapter 1 internet of things - architecture.pptx
SwapandeepKaur8
 
15CS81 Module1 IoT
Ganesh Awati
 
Introduction to Internet of things (ioT)
siddiqmayar
 
Understanding IoT and the 5-Layer Architecture of the Internet of Things
dharmendra491836
 
IoT architecture.pptx
HammadArif32
 
Atal io t introduction
Yadvendra bedi
 
Simplified Internet of Things Architecture
Bkannan2
 
IoT Architecture: Key Layers and How They Power Smart Systems
dharmendra491836
 
Internet of things chapter2.pdf
Rupesh930637
 
Unit I _ Lecture PPT INTRODUCTION TO IOT PPT (2).pptx
NALESVPMEngg
 
Internet of thing (IOT) AICT (Lec#10).pptx
hinasattar5
 
IOT UNIT I.pptx
sufiyashaikh19
 
Lecture 10
vishal choudhary
 
PowerPoint Presentation of Internet of Things
AniketRibadiya
 
"Exploring the Power of Internet of Things"
Mickeyvirus4
 
Internet of Things – Technical landscape (1).pptx
EhabRushdy1
 
Internet of things
Vikrant Negi
 
Iot architecture report
Niranjan Kumar
 
Ad

Recently uploaded (20)

PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
DOCX
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PPTX
K-Circle-Weekly-Quiz12121212-May2025.pptx
Pankaj Rodey
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
The Future of Artificial Intelligence Opportunities and Risks Ahead
vaghelajayendra784
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Digital Professionalism and Interpersonal Competence
rutvikgediya1
 
Unit 5: Speech-language and swallowing disorders
JELLA VISHNU DURGA PRASAD
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
K-Circle-Weekly-Quiz12121212-May2025.pptx
Pankaj Rodey
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
Ad

Group 5 IoT Architecture Layer

  • 2. IoT solutions have become a regular part of our lives. From the smartwatch on your wrist to industrial enterprises, connected devices are everywhere. Having things work for us is no longer sci-fi fantasy.
  • 3. MAJOR IOT BUILDING BLOCKS AND LAYERS There is no single, agreed-upon IoT architecture. It varies in complexity and number of architecturallayersdependingon a particularbusiness task. For example, the Reference Model introduced in 2014 by Cisco, IBM, and Intelat the 2014 IoTWorld Forumhas as many as seven layers. The standardized architectural model proposed by IoT industry leaders.
  • 4. MAJOR IOT BUILDING BLOCKS AND LAYERS The key buildingblocks of any Iot structure are alwaysthe same, namely: • smart things; • networks and gatewaysenabling low- power devices (which is often the case in IoT) to enter the big Internet; • the middlewareor IoT platforms providingdata storage spaces and advancedcomputing engines along with analytical capabilities;and • applications,allowingend users to benefit from IoT and manipulatethe physicalworld.
  • 5. MAJOR IOT BUILDING BLOCKS AND LAYERS These elements make up the backbone of any IoT system upon which effective, multi-layered architecture can be developed.Most commonly, these layersare: • the PERCEPTION LAYER hosting smart things; • the CONNECTIVITY OR TRANSPORT LAYER transferring data from the physicallayerto the cloud and vice versa via networks and gateways; • the PROCESSING LAYER employing IoT platforms to accumulateand manage all data streams; and • the APPLICATION LAYER deliveringsolutionslike analytics,reporting, and device control to end users. Besides the most essential components, the article also describes three additional layers: • the EDGE OR FOG COMPUTING LAYER performing data preprocessing close to the edge, where IoT things collect new information.Typically,edgy computing occurs on gateways; • the BUSINESS LAYER where businesses make decisions based on the data;and • the SECURITY LAYER encompassing all other layers.
  • 6. PERCEPTION LAYER Converting analog signals into digital data and vice versa The initialstage of any IoT system embraces a wide range of “things” or endpoint devices that act as a bridge between the real and digital worlds. They vary in form and size, from tiny silicon chipsto large vehicles. By their functions, IoT things can be dividedinto the following large groups • Sensors such as probes, gauges, meters, and others. They collect physicalparameterslike temperature or humidity, turn them into electrical signals, and send them to the IoT system. IoT sensors are typicallysmall and consume little power. • Actuators, translatingelectrical signalsfrom the IoT system into physicalactions. Actuatorsare used in motor controllers, lasers, robotic arms. • Machines and devices connected to sensors and actuatorsor having them as integral parts.
  • 7. CONNECTIVITY LAYER Enabling data transmission The second level is in charge of all communicationsacross devices, networks, and cloud services that make up the IoT infrastructure. The connectivitybetween the physical layer and the cloud is achievedin two ways: The communications between devices and cloud services or gateways involve different networking technologies.
  • 8. EDGE OR FOG COMPUTING LAYER Reducing system latency • This level is essential for enabling IoT systems to meet the speed, security, and scale requirementsof the 5th generation mobile network or 5G. The new wireless standard promises faster speeds, lower latency, and the abilityto handle many more connected devices, than the current 4G standard. • The idea behind edge or fog computing is to process and store information as early and as close to its sources as possible. Thisapproach allowsfor analyzingand transforming high volumes of real-time data locally,at the edge of the networks. Thus, you save the time and other resources that otherwise would be needed to send all datato cloud services. The result is reduced system latency that leadsto real-time responses and enhanced performance.
  • 9. EDGE OR FOG COMPUTING LAYER Reducing system latency Edge computing occurs on gateways,local servers, or other edge nodes scattered across the network. At this level, data can be: • evaluatedto determine if it needs further processing at higher levels, • formatted for further processing, • decoded, • filtered, and • redirected to an additional destination
  • 10. PROCESSING LAYER Making raw data useful The processing layer accumulates, stores, and processes data that comes from the previous layer. All these tasks are commonly handled via IoT platforms and include two major stages Data accumulation stage Data abstraction stage • The real-time data is captured via an API and put at rest to meet the requirements of non-real-time applications. The data accumulation component stage works as a transit hub between event-based data generation and query-based data consumption. • Here, datapreparationis finalized so that consumer applicationscan use it to generate insights. The entire process involvesthe following steps: 1. combining datafrom different sources, both IoT and non-IoT,including ERM, ERP, and CRM systems; 2. reconcilingmultiple data formats; and 3. aggregating datain one place or making it accessible regardless of locationthrough data virtualization.
  • 11. APPLICATION LAYER Addressing business requirements At this layer, informationis analyzedby software to give answers to key business questions. There are hundredsof IoT applicationsthat vary in complexity and function, using different technology stacks and operatingsystems. Some examples are: • device monitoringand controlsoftware, • mobile apps for simple interactions, • business intelligenceservices, and • analyticsolutionsusing machine learning. Currently, applicationscan be built right on top of IoT platforms that offer software developmentinfrastructure with ready-to-use instrumentsfor datamining, advanced analytics, and data visualization.Otherwise, IoT applicationsuse APIs to integratewith middleware.
  • 12. BUSINESS LAYER Implementing data-driven solutions The informationgenerated at the previouslayersbrings value if only it results in problem- solving solution and achieving business goals. New data must initiatecollaboration between stakeholderswho in turn introduce new processes to enhance productivity. The decision-makingusually involvesmore than one person working with more than one software solution. For this reason, the business layer is defined as a separate stage, higher than a single applicationlayer.
  • 13. SECURITY LAYER Preventing data-breaches It goes without saying that there should be a security layer covering all the above- mentioned layers.IoT security is a broad topic worthy of a separate article. Here we’ll only point out the basic features of the safe architecture across different levels. Device security. Modern manufacturersof IoT devices typicallyintegratesecurity features both in the hardware and firmware installedon it. This includes • embedded TPM (Trusted Platform Module) chips with cryptographickeys for authenticationand protectionof endpointdevices; • a secure boot process that prevents unauthorizedcode from running on a powered- up device; • updatingsecurity patches on a regular basis; and • physicalprotectionlike metal shields to block physicalaccess to the device.
  • 14. SECURITY LAYER Preventing data-breaches Connection security. Whether datais being sent over devices, networks, or applications, it should be encrypted. Otherwise, sensitive informationcan be read by anybodywho interceptsinformation in transit. IoT-centric messaging protocolslike MQTT, AMQP, and DDS may use standardTransport Layer Security (TSL) cryptographicprotocol to ensure end-to-end data protection. Cloud security. Data at rest stored in the cloud must be encrypted as well to mitigate risks of exposing sensitive information to intruders. Cloud security also involves authenticationand authorization mechanismsto limit access to the IoT applications. Another importantsecurity method is device identitymanagement to verify the device’s credibilitybefore allowing it to connect to the cloud.
  • 16. THANK YOU! Group 5: Reymart John Aguho Lawrence Valdez Trishia Mae Salazar Gayle Allyson Guitones Dempster Winston Corpuz Matthew Erickson Quinto Marc Vincent Maneja