Cloud Seeding Program plans to cover Makkah and Holy Sites using ground-based generators    King Salman undergoes treatment after diagnosed with lung infection    Saudi Arabia bans import of vehicles from 20 automakers that failed to submit supply plan    Saudi Arabia pledges support for Iran following President Raisi's copter mishap    Oleksandr Usyk claims undisputed heavyweight title in 'Ring of Fire' match in Riyadh    Saudi Arabia: The emerging cultural powerhouse shaping global soft power dynamics    Umrah not allowed for those without a Hajj permit between May 24 and June 26    Saudi Crown Prince, US National Security Advisor discuss nearly finalized strategic agreements    France deploys over 600 gendarmes in New Caledonia amid unrest over voting rights    Lavrov accuses Europe of using 'Russian threat' myth to escalate arms race    Saudi students shine at international science and engineering competitions, winning 114 awards    How SP Jain's EMBA meets modern professionals' needs    Aramco signs three MoUs with American companies to advance lower-carbon energy solutions    Jorge Jesus praises Al Hilal's resilience after dramatic last-minute draw in Riyadh Derby    King Abdulaziz University launches female admissions in maritime studies    Star golfer Scottie Scheffler arrested over alleged assault on police officer    Saudi Arabia joins International Agency for Research on Cancer    Row erupts over portraits of Australia's richest woman    Al-Ittihad's victory drought continues, misses chance to qualify for ACL elite    Indian spices face heat over global safety concerns    JK Rowling in 'arrest me' challenge over hate crime law    Trump's Bible endorsement raises concern in Christian religious circles    Hollywood icon Will Smith shares his profound admiration for Holy Qur'an    We have celebrated Founding Day for three years - but it has been with us for 300    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Intelligent IT solutions for Internet of Things
Published in The Saudi Gazette on 13 - 08 - 2016

THE Internet of Things is changing business IT and holds great potential for companies. By analyaing data from networked devices, they can automate their business processes, increase productivity and lower costs. This requires a highly scalable, reliable and secure IT infrastructure, which should be based on standardized components and protocols and operate on three different layers: the device layer, the gateway layer and the data centre layer.
The Internet of Things (IoT) networks intelligent devices of all kinds, such as sensors, mobile devices, machines or vehicles with each other and with the cloud. The analysis of IoT data offers great opportunities to companies — they can make decisions faster, optimize business processes or develop new applications or even business models. In this way, the Internet of Things impacts nearly every field, from energy, health, and transportation, to retail, hospitality, manufacturing and financial services.
This opens up a broad spectrum of new potential applications, ranging from intelligent building technology, automated lighting or energy management, intelligent manufacturing systems and optimized solutions for inventories, logistics and supply chain management to remote monitoring of patients' vital data.
The sheer size and public nature of the Internet of Things, however, also involves huge technological challenges. Network and system architects have to optimize the IT infrastructure in order to meet the demanding requirements of the IoT in terms of scalability, reliability and security.
The Internet of Things poses entirely new challenges for scalability, for instance. In the study ‘Worldwide Internet of Things (IoT) 2013–2020 Forecast: Billions of Things, Trillions of Dollars,' the market researcher IDC forecasts that more than 220 billion devices will be connected via the Internet of Things by 2020. A single intelligent system could then collect and analyse billions of data objects from millions of different endpoints. This will place unprecedented demand on processor performance, storage and networks.
IoT-based applications and automated business processes also place higher demands on the availability of the system. Many intelligent systems are used for mission-critical applications, and system failures can lead to lowered productivity, dissatisfied customers or a drop in sales. The same is true for emergency services, medical applications and monitoring solutions. In these cases a system failure can endanger property, the environment, people's health or even lives.
Distributed IoT solutions create large-scale security challenges, since the systems are networked over the Internet and use processing capacity and storage resources from the cloud. That's why companies need to expand their security infrastructure to efficiently protect themselves from data loss, theft and ever more sophisticated denial-of-service attacks. This infrastructure includes comprehensive authentication, authorizing and auditing features. These build confidence, regulate access to resources and ensure compliance with the legal guidelines and company policies. Companies should use powerful encryption methods in order to protect their intellectual property and customer data from theft.
Layer model satisfies demands
Intelligent IT solutions meet the requirements of IoT systems in terms of scalability, reliability and security. The solutions are based on a hierarchical model with a device layer, control layer and data centre or cloud layer. The solutions also use standardized protocols and components.
The device layer includes a high number of intelligent devices, including mobile devices, wearables, sensors, control devices and autonomous machines and appliances. Communication between the devices and the control points is based on standard network protocols — either cable or wireless. Open messaging standards are also used for routing raw data and exchanging control system information. The device layer also includes gateways that allow for interoperability with older and proprietary devices.
The gateway layer serves as a link between the devices and data centre or the cloud. It collects and saves data from the devices and sends them to the data centre. Conversely, it also sends control information to the devices — all based on open messaging standards. The gateway layer also serves as a cache for data required for tactical analysis or regulatory standards.
In addition, the gateway layer plays a central role for the Business Rules Management System (BRMS), since it saves real-time data monitored by BRMS in order to speed up processes. This layer recognizes patterns in the data and functions according to predefined business rules. In addition, it distributes workloads and automates routine services for applications such as routing, transforming, distributing and aggregating data.
The data center and cloud layer is responsible for operating applications and services, analysing data and adapting business rules based on historical trends. It stores data for long-term analysis, contains the most user and management interfaces and offers a virtual environment for complex tasks, distributed computing and business analytics functions. Furthermore, aggregated data from the control layer is collected and examined in this layer and business rules are distributed downstream.
One alternative to the three-layer model outlined here is the two-layer model, in which devices are connected directly to the data centres or the cloud. This model is ideally suited to consumer applications that require less bandwidth and that do not need a gateway layer for the distribution of workloads.
Flexibility and lower costs: The multilayer model and open standards allow the systems to utilize all the advantages of the Internet and the cloud — scalability, reliability, security and flexibility. By using standard interfaces, companies gain a variety of protocols and products and avoid becoming dependent on any single manufacturer. They can utilize different components from different providers and freely combine these into one system that perfectly meets their requirements.
Scalability: The distributed model allows for maximum scalability and lowers costs. The intermediate control layer reduces the load on data centres and the cloud by processing raw data, carrying out business logic and communicating with devices. Since it also reduces devices' demands on processor performance and storage, more simple, cost-effective devices can be used. The elements of the control layer can be geographically distributed in order to maximize performance (uniform distribution of computing, network and storage resources) and cost-effectiveness (lower costs for network bandwidth).
Reliability: The hierarchal topology is very robust on every layer and between layers. Architects can implement redundant elements and domains in order to eliminate single points of failure and deliver high quality service. A system with reliable network, computing and storage components ensures the continual availability of mission-critical applications.
Security: The multilayer model offers multiple levels of security. Architects can implement different security measures at the individual levels (e.g. encryption, secure authentication, authorization, and auditing, as well as patch and configuration management) in order to protect the system from attacks and threats.
This type of flexible, high-performance system can master all the challenges that the Internet of Things poses with its millions of networked devices and huge data volume. As a result, companies can transform raw data into valuable information and create the conditions for long-term success in their business.
— The writer is a lead architect at Red Hat


Clic here to read the story from its source.