Anda di halaman 1dari 1

The Internet of Things

The Intelligence in the Internet of Things


Driven by the convergence of cloud technology, rapidly growing data volumes, and
increasingly connected devices, the Internet of Things (IoT) poses new challenges and
presents a host of new opportunities that can be seized right now by businesses of all
sizes and industries. This system-of-systems will be fundamental to realizing business
value in the futureunlocking the value hidden in data, identifying and creating new
services, enhancing productivity and efficiency, improving real-time decision making,
solving critical problems, and developing new and innovative user experiences.
Private Cloud
Companies looking to transform their business
Private through data will rely increasingly on private
Data Centers Cloud clouds tailored to their own anlalytic, security,
and reliability requirements. The challenges
With the amount of data doubling Data Center https faced by providers of public cloud infrastructure
every two years, Data Centers are email will hit home for IT departments.
looking to efficiently scale in IM
anticipation of the flood of data video
generated by people and
machines, driving interest in
VoIP Telcos
software defined networking As carriers look to monetize the massive amounts
(SDN), off-the-shelf hardware, and The Internet of data traveling over their networks, requirements
open source technology. for flow analysis, deep packet inspection, and sheer
Embedded speed will grow. Cost pressure will drive interest in
The Cloud software solutions like network functions
Cloud
The Cloud Big
virtualization (NFV).

By 2020 nearly 40% of data will interact with the


public cloud, but its IT-like levels of reliability are Data
inconsistent with the up-time demands of critical
infrastructure and trusted systems designed to Embedded Cloud
leverage IoT architectures. The widespread adoption of multi-core technology in the
embedded industry is spurring system-level approaches to
computing. Virtualized application architectures open the
There will be a 50-fold growth in door to the cloud, while advances in networking will enable
stored data from 2010 to 2020. this shift with nanosecond and microsecond latencies.

99.95% availability means as much as 99.999% availability means less than


21.56 minutes of downtime per month. 5.26 minutes of downtime per year.

Only 15% of data today is


structured; 85%generated by
humans and machinesis not. Analytics
Adaptive Analytics Real-Time Analytics
Enabling predictive maintenance and self-diagnostics, real-time
Transforming business with insights gleaned from Big Data requires analytics are performed autonomously by machines and devices.
adaptive analytics, the study of large-scale data sets for emergent
insights. In the system-of-systems, this work will be performed in the
cloud as massive Hadoop clusters crunch data sets gathered through
Gateways For example, systems can extend the life of components that are
near failure by reducing mechanical load, or request service calls
autonomously; and businesses can transition from costly scheduled
time. Adaptive analytics will also be crucial in evolving intelligence at maintenance to more efficient maintenance as needed.
the edge, refining requirements for data gathering.

Gateways
Gateways sit on the horizon between the revenue generative
territory north of the gateway, where app stores, adaptive
analytics, and the cloud are transforming businesses, and
those devices south of the gateway, where cost pressure
coexists with rapid innovation. Gateway devices must
support a broad range of connectivity protocols and satisfy
complex management and provisioning requirements.

A single intelligent jet engine can generate


1TB of data during a five-hour flight. Global Connectivity
By 2020, 70% of data will be
generated in locations other
than the United States and
Automotive
Modern IVI systems consist of as many as fifty million lines of code. 6.2 GB Western Europe.

The intelligence required to deliver on the promise of V2X capabilities per user
or autonomous vehicles will be net-new, meaning more engineers per month
and more complexity. by 2017

Machine-generated data is expected Security


End-to-end security is checked at the final destination; but before
to grow by a factor of 15x between reaching the gateway, packets will often go through one or more
now and 2020. wireless links that are by nature exposed to potential attackers.
Per-hop security depends on the intelligence required to detect
altered, dropped, or fake packets at each node that data intersects
in the system-of-systems.

Brownfield Greenfield
Of the billions of devices that comprise our social and industrial Greenfield devices are built from the ground up to take advantage of
infrastructure, a significant number perform discrete functions in IoT and the system-of-systems. Connected, secure, and managed
network isolation. A subset of these devices will continue to be remotely, these devices are transforming established industrial
manufactured and maintained in this way, while others will require companies by opening up new software-enabled revenue streams
migration strategiesoften referred to as bolt-on approaches and enabling competitive differentiation.
to connect and realize the benefits of IoT.

Firmware Update
Aggregated Packet Headers
Firmware Content
Headers Headers
Headers Message Integrity Code
Sensed Data
Message Integrity Code

Sensor Networks
Edge Management As companies look to deploy sensor networks with millions
of end-points, each sensor requires extreme reliability,
In device networks with thousands to millions of end points, wired or wireless connectivity, sensing, and securityall of
attached to trusted systems and critical infrastructure, which results in a complex requirement set.
management of devices at the edge will require intelligence

1 =31.5M
throughout the systems-of-systems: agent-based execution at
the device level, remote management and provisioning
data point/ data points
capabilities delivered by gateways, and cloud-based delivery of second per year
updated software.

Sensor Hubs
Headers
Sensor hubs aggregate a representative data
Data Source (ID) set from numerous packets of sensed data.
Data Destination
Timestamps This process requires opening those packets,
Key Identier analyzing their contents, validating their
Security Content integrity, and verifying that these actions have
taken place securely.

Sources
Cisco, "Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion, 2013
GE, "Industrial Internet: Pushing the Boundaries of Minds and Machines," November 2012
IDC, The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East United States, February 2013
IDC, The Diverse and Exploding Digital Universe, March 2008
IDC, Worldwide Intelligent Systems 2011-2015 Forecast: The Next Big Opportunity, September 2011
High availability, Wikipedia

www.windriver.com/iot
Wind River is a world leader in embedded and mobile software. Wind River has been pioneering computing inside embedded devices since 1981, and its technology is found in more than
1 billion products. Wind River is headquartered in Alameda, California, with offices in more than 20 countries. To learn more, visit Wind River at www.windriver.com.
2013 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev. 09/2013

Anda mungkin juga menyukai