Feed abonnieren

According to a 2014 Forbes article (actually, the autoplay video on the article), 87% of people had never heard the term “the Internet of things.” That has changed rapidly in the last two years (research firm 451 Research pegs 2016 as the year that the Internet of Things goes mainstream). Still, as with many cloud computing concepts, IoT is a vague term.

A Simple Description of the Internet of Things

Consumer-centric devices have emerged over the last forty years, from ATMs to inventory tracking in vending machines. Smart phones were a massive jolt, introducing a new means to connect to and interact with both consumers and physical objects. That networked, digitized environment of physical objects is the Internet of Things. 451 Research had a fantastic term for it: the Internet of things “virtualizes the physical world.”

That is a slightly consumer-centric perspective, though, looking at how one interacts with that IoT environment. The Internet of Things means something a little different from a business perspective, where a company actually defines that IoT environment.

In this sense, there are kind of two realms. There is the centralized, internal data systems environment. This is a more traditional IT environment, like data center servers or cloud instances, running enterprise-wide systems like data processing, enterprise applications, and analytics. Then there is the outer realm, the variegated sets of devices that interacts directly with users and customers -- sensors, actuators, applications.

In this perspective, IoT is not a technology -- it is a series of use cases (noted by James Kirkland, the chief IoT architect here at Red Hat). It is the way your company uses its connected devices and (big point here) the data they collect.

A Three Tier Architecture

Red Hat defines a three-tier architecture for IoT: a data center / cloud level, a gateway (control) level, and a device level.

These tiers map neatly to those internal / external realm of IoT.

That external realm has a two tiers:

  • Device tier. This is the outer tier, the devices at the edge of your infrastructure. From the perspective of consumers, these are any devices, like self-service kiosks. From the infrastructure perspective, these are data points. These are a new data stream that can deliver very detailed, real-time information.
  • Gateway tier. This is also called a control tier, because it provides a closer access point for devices to be able to interact with the business intelligence in the centralized core services, only outside of the IT environment, closer to the edge. This communicates with devices, both receiving their data and sending forward business logic, event processing, and other automated responses to make the device tier more reactive.

The inner realm has single level:

  • Data center (or cloud) tier. These are the core data services within the organization, and is more within a traditional IT environment. These include databases and storage servers, business rules engines, and real-time and historic analytics.

Technically, dual gateway and data center / cloud tiers are not required. Devices can communicate directly with services in a data center. However, that runs into potential issues with scalability, security, and resilience, not to mention basic performance. Pushing more data processing logic closer to the devices can help that device tier be more responsive to customer or system issues, which improves overall customer satisfaction.

Middleware within an IoT Environment

There are two key phrases that jump out to me when describing the three-tier model: data and communication. IoT is based on bidirectional communication, and in this sense it is very similar to social media. It’s not just pushing information at users; it’s about consuming and responding to information from your users.

IDC’s FurtureScape report on the Internet of Things noted that the Internet of Things, from an architectural or planning perspective, should be considered “beyond just the end-user interface, but in terms of the data and information that your IoT project wants to collect and act on.” (Emphasis added.)

Recognizing what data are valuable is key to an effective IoT design. This is a middleware blog, so my primary concern is not the entire IoT infrastructure -- it is the role of middleware in developing and sustaining that infrastructure. For middleware, that comes down to the data center / cloud and gateway tiers, specifically in how they process and respond to data.

IoT3

The two key functions of IoT are data and communication, plus James Kirkland’s observation that this is less about technology and more about workflow. At a really high level, you can break down IoT design into three steps:

  • Identify what types of data you can receive and, of that, what data you want.
  • Identify data formats for more effective storage and aggregation.
  • Define workflows and develop business logic or actions that can be taken in response to common scenarios.

IoT introduces a potentially overwhelming stream of data (both figuratively in the amount of information and literally in the IT resources required to process it). Once you identify what data you need and what you want to do with it, middleware provides the services that support that business plan:

  • Communications (messaging and transaction management) for every tier
  • Data integration and virtualization, across many different data formats and protocols
  • Automated business processes

Learn More

IoT isn’t a single application or even a stack. It is a way of using data from new sources, physical devices. And you can decide on how and what you need to do within your environment to do that effectively. Red Hat has some interesting whitepapers on different approaches to IoT:


Über den Autor

Deon Ballard is a product marketing manager focusing on customer experience, adoption, and renewals for Red Hat Enterprise Linux. Red Hat Enterprise Linux is the foundation for open hybrid cloud. In previous roles at Red Hat, Ballard has been a technical writer, doc lead, and content strategist for technical documentation, specializing in security technologies such as NSS, LDAP, certificate management, and authentication / authorization, as well as cloud and management. She also wrote and edited the Middleware Blog for Red Hat and led portfolio solution marketing for integration and business automation.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

Nach Thema durchsuchen

automation icon

Automatisierung

Das Neueste zum Thema IT-Automatisierung für Technologien, Teams und Umgebungen

AI icon

Künstliche Intelligenz

Erfahren Sie das Neueste von den Plattformen, die es Kunden ermöglichen, KI-Workloads beliebig auszuführen

open hybrid cloud icon

Open Hybrid Cloud

Erfahren Sie, wie wir eine flexiblere Zukunft mit Hybrid Clouds schaffen.

security icon

Sicherheit

Erfahren Sie, wie wir Risiken in verschiedenen Umgebungen und Technologien reduzieren

edge icon

Edge Computing

Erfahren Sie das Neueste von den Plattformen, die die Operations am Edge vereinfachen

Infrastructure icon

Infrastruktur

Erfahren Sie das Neueste von der weltweit führenden Linux-Plattform für Unternehmen

application development icon

Anwendungen

Entdecken Sie unsere Lösungen für komplexe Herausforderungen bei Anwendungen

Original series icon

Original Shows

Interessantes von den Experten, die die Technologien in Unternehmen mitgestalten