SlideShare a Scribd company logo
1 of 35
IOT Platform
Design
Methodology
IOT Design Methodology Includes
 Purpose and Requirement Specification
 Process Specification
 Domain Model Specification
 Information Model Specification
 Service Specification
 IOT Level Specification
 Functional View Specification
 Operational View Specification
 Device and Component integration
 Application Development
Purpose and Requirement Specification
Process Specification
Purpose & Requirements Specification
The first step in IOT system design methodology is to define the
purpose and requirements of the system. In this step, the system
purpose, behavior and requirements (such as data collection
requirements, data analysis requirements, system management
requirements, data privacy and security requirements, user
interface requirements, ...) are captured.
Process Specification
The second step in the IoT design methodology is to define the
process specification. In this step, the use cases of the IoT system
are formally described based on and derived fromthe purpose and
requirement specifications.
Domain model Specification
Information model specification
Domain model Specification
 The domain model describes the main concepts, entities and objects in the domain of
IoT system to be designed.
 Domain model defines the attributes of the objects and relationships between objects.
Domain model provides an abstract representation of the concepts, objects and
entities in the IoT domain, independent of any specific technology or platform. With
the domain model, the IoT system designers can get an understanding of the IoT
domain for which the system is to be designed.
Domain model Specification
The entities, objects and concepts defined in the domain model include:
 Physical Entity : Physical Entity is a discrete and identifiable entity in the
physical environment (e.g. a room, a light, an appliance, a car, etc.).
 Virtual Entity : Virtual Entity is a representation of the Physical Entity in
the digital world.
 Device :provides a medium for interactions between Physical Entities and
Virtual Entities. Devices are either attached to Physical Entities or placed
near Physical Entities.
Domain model Specification
 Resource : Resources are software components which can be either "on-
device" or "network-resources". On-device resources are hosted on the device
and include software components that either provide information on or
enable actuation upon the Physical Entity to which the device is attached.
 Service : Services provide an interface for interacting with the Physical
Entity. Services access the resources hosted on the device or the network
resources to obtain information about the Physical Entity or perform
actuation upon the Physical Entity.
Information model specification
 Information Model defines the structure of all the information in the IoT
system, for example, attributes of Virtual Entities, relations, etc.
 Information model does not describe the specifics of how the information is
represented or stored. To define the information model, we first list the
Virtual Entities defined in the Domain Model.
 Information model adds more details to the Virtual Entities by defining
their attributes and relations.
Information model specification
Service Specifications
IOT Level Specification
Service Specifications
• The fifth step in the IoT design methodology is to define the service specifications.
Service specifications define the services in the IoT system, service types, service
inputs/output, service endpoints, service schedules, service preconditions and
service effects.
IOT Level Specification
 The sixth step in the IoT design methodology is to define the IoT level for the
system. In Chapter-1, we defined five IoT deployment levels
Functional viewSpecification
Operational viewSpecification
Functional viewSpecification
The Functional Groups (FG) included in a Functional View include:
 Device : The device FG contains devices for monitoring and control. In the home
automation example. the device FG includes a single board mini-computer, a light
sensor and relay switch(actuator).
 Communication : The communication FG handles the communication for the IoT
system. The communication FG includes the communication protocols that form
the backbone of IoT systems and enable network connectivity.
 The communication FG also includes the communication APis (such as REST and
WebSocket) that are used by the services and applications to exchange data over
the network.
Functional viewSpecification
 Services : The service FG includes various services involved in the IoT system
such as services for device monitoring , device control services, data publishing
services and services for device discovery.
 Management : The management FG includes all functionalities that are needed to
configure and manage the loT system .
 Security : The security FG includes security mechanisms for the loT system
such as authentication, authorization, data security, etc.
 Application : The application FG includes applications that provide an interface to
the users to control and monitor various aspects of the IoT system. Applications
also allow users to view the system status and the processed data.
Operational View Specification
Operation view address how an actual system can be realized by using devices and
technologies among many options and making them communicate and operate in an
efficient manner.
Devices options: Arduino, PIR Sensor, LED. Buzzer, Camera, Raspberry PI are
needed for further enhancement.
Communication options: network layer-IPV4, MQTT
Services options: Web Service.
Operational View Specification
Application options: It is out of scope for the project but as discussed earlier, Node-
red web application can be realized.
Security options: Two-phase authentication and authorization.
Device and Component Integration: This section is all about integrating the devices
and components. The devices and components used in are Arduino, PIR sensor, and
LED.
Device and Component
Integration
Device and Component Integration
The ninth step in the IoT design methodology is the integration of the
devices and components.
It integrates the devices and components and draws a schematic diagram
showing the same.
The following diagram shows the component & device integration.
Application Development
Application Development
 The final step in the IoT design methodology is to develop the IoT
application.
 Application development is the process of designing, building, and
implementing software applications. It can be done by massive
organizations with large teams working on projects, or by a single
freelance developer. Application development defines the process of how
the application is made, and generally follows a standard methodology.
Examples of IoT in Real Life
Wearable Health Monitors Disaster Management
Examples of IoT in Real Life
Biometric Security Systems Smart Cars
Examples of IoT in Real Life
Farming
Shopping Malls
IOT Platform Design Methodology

More Related Content

What's hot

M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
Data enrichment
Data enrichmentData enrichment
Data enrichmentFabMinds
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)Prakash Honnur
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io tShilpaKrishna6
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)FabMinds
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
M2M Communication
M2M CommunicationM2M Communication
M2M CommunicationFabMinds
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile ComputingKABILESH RAMAR
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and ArchitectureJitendra Tomar
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoTFabMinds
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoTAmit Dev
 

What's hot (20)

WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
 
Data enrichment
Data enrichmentData enrichment
Data enrichment
 
802 15-4 tutorial
802 15-4 tutorial802 15-4 tutorial
802 15-4 tutorial
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
netconf and yang
netconf and yangnetconf and yang
netconf and yang
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 
Data link layer
Data link layer Data link layer
Data link layer
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
M2M Communication
M2M CommunicationM2M Communication
M2M Communication
 
Handover in Mobile Computing
Handover in Mobile ComputingHandover in Mobile Computing
Handover in Mobile Computing
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
 
Business models for business processes on IoT
Business models for business processes on IoTBusiness models for business processes on IoT
Business models for business processes on IoT
 
Snmp
SnmpSnmp
Snmp
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Protocols for IoT
Protocols for IoTProtocols for IoT
Protocols for IoT
 

Similar to IOT Platform Design Methodology

Unit 4 -IOT2.pptx
Unit 4 -IOT2.pptxUnit 4 -IOT2.pptx
Unit 4 -IOT2.pptxNutanBhor
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.docvenui2
 
Internet of things
Internet of thingsInternet of things
Internet of thingsraj esaki
 
IOT Unit 3 for engineering second year .pptx
IOT Unit 3 for engineering second year .pptxIOT Unit 3 for engineering second year .pptx
IOT Unit 3 for engineering second year .pptxneelamsanjeevkumar
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedCognizant
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit Iparveen837153
 
Iot presentation
Iot presentationIot presentation
Iot presentationhuma742446
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introductionsundeepsiddula
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object frameworkijscai
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgHakkemB
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfShubhamYadav73126
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptxKume3
 

Similar to IOT Platform Design Methodology (20)

Unit 4 -IOT2.pptx
Unit 4 -IOT2.pptxUnit 4 -IOT2.pptx
Unit 4 -IOT2.pptx
 
IOT Reference Model.doc
IOT Reference Model.docIOT Reference Model.doc
IOT Reference Model.doc
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
IoT Methodology.pptx
IoT Methodology.pptxIoT Methodology.pptx
IoT Methodology.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IOT Unit 3 for engineering second year .pptx
IOT Unit 3 for engineering second year .pptxIOT Unit 3 for engineering second year .pptx
IOT Unit 3 for engineering second year .pptx
 
The Internet of Things: QA Unleashed
The Internet of Things: QA UnleashedThe Internet of Things: QA Unleashed
The Internet of Things: QA Unleashed
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Unit III.docx
Unit  III.docxUnit  III.docx
Unit III.docx
 
Definition of Internet of things and introduction
Definition of Internet of things and introductionDefinition of Internet of things and introduction
Definition of Internet of things and introduction
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object framework
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
Ch 4.pptx
Ch 4.pptxCh 4.pptx
Ch 4.pptx
 

Recently uploaded

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 

Recently uploaded (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

IOT Platform Design Methodology

  • 2. IOT Design Methodology Includes  Purpose and Requirement Specification  Process Specification  Domain Model Specification  Information Model Specification  Service Specification  IOT Level Specification  Functional View Specification  Operational View Specification  Device and Component integration  Application Development
  • 3.
  • 4. Purpose and Requirement Specification Process Specification
  • 5. Purpose & Requirements Specification The first step in IOT system design methodology is to define the purpose and requirements of the system. In this step, the system purpose, behavior and requirements (such as data collection requirements, data analysis requirements, system management requirements, data privacy and security requirements, user interface requirements, ...) are captured.
  • 6. Process Specification The second step in the IoT design methodology is to define the process specification. In this step, the use cases of the IoT system are formally described based on and derived fromthe purpose and requirement specifications.
  • 7.
  • 9. Domain model Specification  The domain model describes the main concepts, entities and objects in the domain of IoT system to be designed.  Domain model defines the attributes of the objects and relationships between objects. Domain model provides an abstract representation of the concepts, objects and entities in the IoT domain, independent of any specific technology or platform. With the domain model, the IoT system designers can get an understanding of the IoT domain for which the system is to be designed.
  • 10. Domain model Specification The entities, objects and concepts defined in the domain model include:  Physical Entity : Physical Entity is a discrete and identifiable entity in the physical environment (e.g. a room, a light, an appliance, a car, etc.).  Virtual Entity : Virtual Entity is a representation of the Physical Entity in the digital world.  Device :provides a medium for interactions between Physical Entities and Virtual Entities. Devices are either attached to Physical Entities or placed near Physical Entities.
  • 11. Domain model Specification  Resource : Resources are software components which can be either "on- device" or "network-resources". On-device resources are hosted on the device and include software components that either provide information on or enable actuation upon the Physical Entity to which the device is attached.  Service : Services provide an interface for interacting with the Physical Entity. Services access the resources hosted on the device or the network resources to obtain information about the Physical Entity or perform actuation upon the Physical Entity.
  • 12.
  • 13. Information model specification  Information Model defines the structure of all the information in the IoT system, for example, attributes of Virtual Entities, relations, etc.  Information model does not describe the specifics of how the information is represented or stored. To define the information model, we first list the Virtual Entities defined in the Domain Model.  Information model adds more details to the Virtual Entities by defining their attributes and relations.
  • 16. Service Specifications • The fifth step in the IoT design methodology is to define the service specifications. Service specifications define the services in the IoT system, service types, service inputs/output, service endpoints, service schedules, service preconditions and service effects.
  • 17.
  • 18. IOT Level Specification  The sixth step in the IoT design methodology is to define the IoT level for the system. In Chapter-1, we defined five IoT deployment levels
  • 19.
  • 21. Functional viewSpecification The Functional Groups (FG) included in a Functional View include:  Device : The device FG contains devices for monitoring and control. In the home automation example. the device FG includes a single board mini-computer, a light sensor and relay switch(actuator).  Communication : The communication FG handles the communication for the IoT system. The communication FG includes the communication protocols that form the backbone of IoT systems and enable network connectivity.  The communication FG also includes the communication APis (such as REST and WebSocket) that are used by the services and applications to exchange data over the network.
  • 22. Functional viewSpecification  Services : The service FG includes various services involved in the IoT system such as services for device monitoring , device control services, data publishing services and services for device discovery.  Management : The management FG includes all functionalities that are needed to configure and manage the loT system .  Security : The security FG includes security mechanisms for the loT system such as authentication, authorization, data security, etc.  Application : The application FG includes applications that provide an interface to the users to control and monitor various aspects of the IoT system. Applications also allow users to view the system status and the processed data.
  • 23.
  • 24.
  • 25. Operational View Specification Operation view address how an actual system can be realized by using devices and technologies among many options and making them communicate and operate in an efficient manner. Devices options: Arduino, PIR Sensor, LED. Buzzer, Camera, Raspberry PI are needed for further enhancement. Communication options: network layer-IPV4, MQTT Services options: Web Service.
  • 26. Operational View Specification Application options: It is out of scope for the project but as discussed earlier, Node- red web application can be realized. Security options: Two-phase authentication and authorization. Device and Component Integration: This section is all about integrating the devices and components. The devices and components used in are Arduino, PIR sensor, and LED.
  • 28. Device and Component Integration The ninth step in the IoT design methodology is the integration of the devices and components. It integrates the devices and components and draws a schematic diagram showing the same. The following diagram shows the component & device integration.
  • 29.
  • 31. Application Development  The final step in the IoT design methodology is to develop the IoT application.  Application development is the process of designing, building, and implementing software applications. It can be done by massive organizations with large teams working on projects, or by a single freelance developer. Application development defines the process of how the application is made, and generally follows a standard methodology.
  • 32. Examples of IoT in Real Life Wearable Health Monitors Disaster Management
  • 33. Examples of IoT in Real Life Biometric Security Systems Smart Cars
  • 34. Examples of IoT in Real Life Farming Shopping Malls