Iot Network Architecture and Design: Mms Institut Teknologi Del
Iot Network Architecture and Design: Mms Institut Teknologi Del
Iot Network Architecture and Design: Mms Institut Teknologi Del
Design
MMS
Institut Teknologi Del
Overview
• Why?
• Drivers Behind new Network Architecture
• Comparing IoT Architecture
• Simplified IoT Architecture
• Core IoT Functional Stack
• IoT Data Management and Compute Stack
Why?
• Everything need a plan
• IoT Network implementation differ from Traditional
IT which needs new approach in planning and
implementation
Drivers Behind New Network
Architecture
• OT (Operational Technology) networks, which is the target area of IoT
Implementation, have unique characteristics and constraints that are
not easily supported by traditional IT network architectures.
• In General, they key different between traditional IT and IoT is the data
• Traditional IT concerned with a reliable and continuous support of business
application (email, web, ERP)
• IoT is all about the data generated by sensors, how it is used, transported,
collected, analyzed and acted upon
• 5 main drivers:
• Scale
• Security
• Constrained device and networks
• Data
• Legacy Device Support
Scale
• Millions of endpoints in IoT network need different
approach in implementation and operation
compared to thousands of nodes in traditional IT
networks
• E.g. IPv4 address space exhaustion is unable to
meet IoT scalability requirement.
• Solution is to use IPv6
Security
• Case: at 3:30 p.m. on December 23, 2015, the Ukrainian power grid
(SCADA System) experienced an unprecedented cyber attack that
affected approximately 225,000 customers.
• IoT devices which often physically exposed introduce a new challenge
in designing security strategy.
• Requirements for optimum IoT system security:
• Authentication (Be able to identify and authenticate all entities involved in the
IoT service)
• Encryption (Ensure that all user data shared between the endpoint device and
back-end applications is encrypted)
• Secure data storage (Comply with local data protection legislation so that all
data is protected and stored correctly)
• Utilize an IoT connectivity management platform and establish rules- based
security policies.
• Take a holistic, network-level approach to security (Firewall, WAF, IDS/IPS)
Constrained Devices and Networks
Layer Tanggungjawab/Tindakan
Part2
• Simplified IoT Architechture
• The Core IoT Functional Stack
• IoT Data Management and
Compute Stack
Simplified IoT Architecture
• The framework grouped all layers in two:
• Core IoT Functional Stack
• IoT Data Management and Compute Stack
Expanded Architecture
Core IoT Functional Stack
Layer 1: Things: Sensor and
Actuator Layers
• The object or “thing” that needs to be connected
(smart objects)
• Smart Object (things) classification parameters:
• Battery-powered or power-connected
• Mobile or static
• Low or high reporting frequency
• Simple or rich data
• Report range
• Object density per cell
Example of sensor classification
based on mobility and Throughput
Layer 2: Communication
Network Layer
• This layer responsible to connect the “things” after
its form factors, classifications determined.
• Sub layers:
• Access Network
• Gateway and Backhaul
• Network Transport
• IoT Network Management
Access Network
• Provides direct connectivity between the “things” and the network