Intelligent Tech Channels Issue 02 | Page 47

INTELLIGENT SOFTWARE BUSINESS need to expand their security infrastructure to efficiently protect themselves from data loss , theft and ever more sophisticated denial-of-service attacks .
This infrastructure includes comprehensive authentication , authorising and auditing features . These build confidence , regulate access to resources and ensure compliance with legal guidelines and company policies . Companies should use powerful encryption methods in order to protect their intellectual property and customer data from theft .
Layer model Intelligent IT solutions meet the requirements of IoT systems in terms of scalability , reliability and security . The solutions are based on a hierarchical model with a device layer , control layer and datacentre or cloud layer . The solutions also use standardised protocols and components .
The device layer covers the high number of intelligent devices , including mobile devices , wearables , sensors , control devices and autonomous machines and appliances . Communication between the devices and the control points is based on standard network protocols , either cable or wireless . Open messaging standards are also used for routing raw data and exchanging control system information . The device layer also includes gateways that allow for interoperability with older and proprietary devices .
The gateway layer serves as a link between the devices and datacentre or the cloud . It collects and saves data from the devices and sends them to the datacentre . Conversely , it also sends control information to the devices , all based on open messaging standards . The gateway layer also serves as a cache for data required for tactical analysis or regulatory standards .
In addition , the gateway layer plays a central role for application of business rules management systems , since it saves real-time data monitored by business rules management in order to speed up
The device layer includes intelligent devices like mobile devices , wearables , sensors , control devices , autonomous machines , appliances
processes . This layer recognises patterns in the data and functions according to predefined business rules . In addition , it distributes workloads and automates routine services for applications such as routing , transforming , distributing and aggregating data .
The datacentre and cloud layer is responsible for operating applications and services , analysing data and adapting business rules based on historical trends . It stores data for long-term analysis , contains most user and management interfaces and offers a virtual environment for complex tasks , distributed computing and business analytics functions . Furthermore , aggregated data from the control layer is collected and examined in this layer and business rules are distributed downstream .
One alternative to the three-layer model outlined here is the two-layer model , in which devices are connected directly to the datacentres or the cloud . This model is ideally suited to consumer applications that require less bandwidth and that do not need a gateway layer for the distribution of workloads .
Flexibility The multi-layer model and open standards allow systems to utilise all the advantages of the Internet and the cloud , scalability , reliability , security and flexibility . By using standard interfaces , companies gain a variety of protocols and products and avoid becoming dependent on any single manufacturer . They can utilise different components from different providers and freely combine these into one system that perfectly meets their requirements .
Scalability The distributed model allows for maximum scalability and lowers costs . The intermediate control layer reduces the load on datacentres and the cloud by processing raw data , carrying out business logic and communicating with devices . Since it also reduces device demands on processor performance and storage , more simple , cost-effective devices can be used . The elements of the control layer can be geographically distributed in order to maximise performance , uniform distribution of computing , network and storage resources and cost-effectiveness , lower costs for network bandwidth .
Reliability The hierarchal topology is robust on every layer and between layers . Architects can implement redundant elements and domains in order to eliminate single points of failure and deliver high quality service . A system with reliable network , computing and storage components ensures continual availability of mission-critical applications . This type of flexible , high-performance system can master all the challenges that the Internet of Things poses with its millions of networked devices and huge data volume .
Patrick Steiner is Lead Architect at Red Hat
47