Chapter 5
Internet of Things IoT
Cloud Services
Virtualization
Part I:
Internet of Things (IoT)
Internet of Things
What is the IoT?
It is predicted that the Internet will interconnect 50 billion things by late 2020.
Using existing and new technologies, we are connecting the physical world to
the Internet.
It is by connecting the unconnected that we transition from the Internet to the
Internet of Things (IoT).
The Converged Network and Things
Network convergence refers to the provision of telephone, video and data
communication services within a single network.
Cisco estimates that 99% of things in the physical world are currently
unconnected. Therefore, the IoT will experience tremendous growth as we
connect more of the unconnected things.
Many things are currently connected using a loose collection of independent,
use-specific networks, as shown in the figure. For example, today’s cars have
multiple proprietary networks to control engine function, safety features, and
communications systems. Converging these systems common alone onto a
network would save over 50 lbs. (23 kg) of cable in a modern full-size sedan.
Other examples include commercial and residential buildings, which have various
control systems and networks for heating, ventilation, and air conditioning (HVAC),
telephone service, security, and lighting.
IoT Elements
The Converged Network and Things
Dissimilar networks are converging to share the same infrastructure.
This infrastructure includes comprehensive security, analytics, and management
capabilities.
The connection of the components into a converged network that uses IoT technologies
increases the power of the network to help people improve their daily lives.
Challenges of Connecting Things
The IoT connects smart objects to the Internet. It connects traditional computer
devices as well as untraditional devices. Within the IoT, the communication is
Machine-to-Machine (M2M), enabling communication between machines
without human intervention.
For example, M2M occurs in cars with temperature and oil sensors communicating
with an onboard computer.
Digitization means connecting people and things together and making sense of
the data in a meaningful and secure way.
IoT Elements
The Six Pillars of the Cisco IoT System
Cisco IoT System uses six pillars as shown in the figure to identify foundational
elements of IoT.
1. The Network Connectivity Pillar
There are many different types of networks: home networks, public Wi-Fi
networks, small business networks, enterprise networks, service provider
networks, data center networks, cloud networks, and IoT networks.
Regardless of network type, they all need devices to provide network
connectivity. However, network connectivity equipment varies depending on
the type of network.
For example, home networks typically consist of a wireless broadband router,
while business networks will have multiple switches, APs, a firewall or firewalls,
routers, and more.
The Cisco IoT network connectivity pillar identifies devices that can be used to
provide IoT connectivity to many diverse industries and applications.
IoT Pillars
The Network Connectivity Pillar
• Using Cisco’s Digital Ceiling is an example, the
network can manage lighting and air
temperature seamlessly, based on the
preferences of the occupants.
• Cisco announced new Digital Solutions with
Cisco Digital Ceiling, enabling connecting
previously building systems and services on a
single IP network. In the Digital Ceiling, users
can converge lighting, heating, cooling, sensors
and other actuators, in order to make a building
not only smart, but seamlessly and securely
connected.
• The Cisco Digital Ceiling improves the
efficiency and sustainability of your buildings
and enables you to manage them more
effectively.
2. The Fog Computing Pillar
Networking models describe how data flows within a network. Networking models
include:
Client-Server model – This is the most common model used in networks. Client
devices request services of servers.
Cloud computing model – This is a newer model where servers and services are
dispersed globally in distributed data centers.
Fog computing – This IoT network model identifies a distributed computing
infrastructure closer to the network edge. It enables edge devices to run
applications locally and make immediate decisions. This reduces the data burden
on networks as raw data does not need to be sent over network connections. It
enhances resiliency (quick recovery) by allowing IoT devices to operate when
network connections are lost. It also enhances security by keeping sensitive data
from being transported beyond the edge where it is needed.
2. The Fog Computing Pillar
Network administrators can use any combination of the three models to address
the needs of the network users.
The Fog computing pillar basically extends cloud connectivity closer to the edge. It
enables end devices, such as smart meters, industrial sensors, robotic machines,
and others, to connect to a local integrated computing, networking, and storage
system.
2. The Fog Computing Pillar
Fog computing
• This IoT network model identifies a computing
infrastructure closer to the network edge.
Client-Server Model
• Edge devices run applications locally and
make immediate decisions.
Cloud Computing
• Data does not need to be sent over network Model
connections.
• Enhances resiliency by allowing IoT devices
to operate when network connections are lost.
• Enhances security by keeping sensitive data
from being transported beyond the edge
where it is needed.
Fog Computing Model
2. The Fog Computing Pillar
Applications that use Fog computing can monitor or analyze real-time data from
network-connected things and then act such as locking a door, changing
equipment settings, applying the brakes on a train, and more.
For example, a traffic light can interact locally with several sensors that can detect
the presence of pedestrians and bikers and measure the distance and speed of
approaching vehicles. The traffic light also interacts with neighboring lights
providing a coordinated effort. Based on this information, the smart light sends
warning signals to approaching vehicles and modifies its own cycle to prevent
accidents.
The data collected by the smart traffic light system is processed locally to do real-
time analytics. Coordinating with neighboring smart traffic light systems in the Fog
allows for any modification of the cycle. For example, it can change the timing of
the cycles in response to road conditions or traffic patterns. The data from clusters
of smart traffic light systems is sent to the cloud to analyze long-term traffic
patterns.
3. The Security Pillar
The Cisco IoT security pillar offers scalable cybersecurity solutions, enabling an
organization to quickly and effectively discover, contain, and remediate an attack to
minimize damage.
These cybersecurity solutions include:
• Operational Technology (OT) specific security – OT is the hardware and software
that keeps power plants running and manages factory process lines. OT security
includes the ISA 3000 industrial security appliance and Fog data services.
• IoT Network security – Includes network and perimeter security devices such as
switches, routers, ASA Firewall devices, and Cisco FirePOWER Next-Generation
Intrusion Prevention Services (NGIPS).
• IoT Physical security - Cisco Video Surveillance IP Cameras are feature-rich digital
cameras that enable surveillance in a wide variety of environments. Available in
standard and high definition, box and dome, wired and wireless, and stationery and
pan-tilt-zoom (PTZ) versions, the cameras support MPEG-4 and H.264, and offer
efficient network utilization while providing high-quality video.
3. The Security Pillar
IoT introduces new attack vectors not typically encountered with normal enterprise
networks.
Cybersecurity solutions include:
Operational Technology (OT) specific security – OT is the hardware and software that
keeps power plants running and manages factory process lines.
IoT Network security – Includes network and perimeter security devices.
IoT Physical security - Cisco Video Surveillance IP Cameras.
Cisco Video
Surveillance
Cisco Industrial Cisco FirePower Appliance Cameras
Security Appliance
Cisco ASA is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities.
4. Data Analytics Pillar
The IoT can connect billions of devices capable of creating exabytes of data
every day. To provide value, this data must be rapidly processed and
transformed into actionable intelligence.
The Cisco IoT analytics infrastructure consists of distributed network
infrastructure components and IoT-specific, application programming interfaces
(APIs).
4. Data Analytics Pillar
We need to bring centers of data together and take advantage of data.
5. Management and Automation Pillar
The IoT greatly expands the size and diversity of the network to include the billions of
smart objects that sense, monitor, control, and react. While networking these previously
unconnected devices can deliver unparalleled levels of business and operational
intelligence, it is essential to understand that operational environments are made up of
multiple, disparate functional areas. Each of these areas also has distinctive
requirements, including the need to track specific metrics. Operational technology
systems can vary widely by industry, as well as by function in each industry.
Cisco delivers a broad range of IoT management and automation capabilities
throughout the extended network. Cisco management and automation products can be
customized for specific industries to provide enhanced security and control and support.
The Cisco IoT System management and automation portfolio includes management
tools such as the Cisco IoT Field Network Director for utilities, oil & gas, transportation,
manufacturing, smart cities. Other management tools include Cisco Prime, Cisco Video
Surveillance Manager, and more.
5. Management and Automation Pillar- Example: Cisco FAN
6. Application Enablement Platform Pillar
The Application Enablement Platform pillar provides the infrastructure for
application hosting and application mobility between cloud and Fog computing. The
Fog environment allows for multiple instances of the application across different
end devices and sensors. These instances can communicate with each other for
redundancy and data-sharing purposes to create business models such pay-as-
you-go consumption for objects, machines, and products.
For example, Cisco IOx which is a combination of
Cisco IOS and Linux, allows routers to host
applications close to the objects they need to
monitor, control, analyze, and optimize. Cisco IOx
services are offered on multiple hardware devices
that are customized for various industry needs
and can therefore support applications specific to
those industries.
End of Part I