m2m
3 TopicsLightboard Lessons: What is MQTT?
The mad dash to connect virtually every noun to the internet or The Internet of Things, is creating a massive M2M network for all the devices, systems, sensors and actuators to connect & communicate on the Internet. With that, they need a communications protocol to understand each other. One of those is Message Queue Telemetry Transport (MQTT). MQTT is a “subscribe and publish” messaging protocol designed for lightweight machine-to-machine (or IoT) communications. In this episode of Lightboard Lessons, I light up how MQTT works. ps Related: IoT Ready Infrastructure IoT Effect on Applications IoT Influence on Society What are These "Things? The Intruders of Things321Views0likes0CommentsIoT Effect on Applications
As more applications are needed to run those Things, traditional infrastructure concerns like scale and reliability will become paramount. Additional challenges with identity and access, improving the user experience, and the need for faster provisioning of services could overwhelm IT departments. A robust, scalable and intelligent infrastructure will be necessary to handle the massive traffic growth. IT professionals are tasked with designing and building the infrastructure that’s ready for the challenges that lie ahead, including IoT. But many of today’s traditional architectures will buckle under the increasing demand of all the connected devices. According to IDC, the rate at which applications double in the enterprise is every four years. This is likely to be cut in half as more IoT devices need applications supporting them and organizations need to be ready for the deluge. The Domain Name System (DNS) is the most likely method for connected devices to locate needed services, and it’s potentially the means by which people will locate the devices themselves. There might be other schemas in the planning process, but those would require the adoption of a new technology naming standard, which would be costly, slow and highly unlikely. Clearly, security must also be present since Iot has the potential to weave vulnerabilities throughout the system. Unless organizations remain proactive, the ubiquity of connected devices presents a gold mine for attackers. Outpacing attackers in our current threat landscape will require more resources in order to minimize risk. Organizations will need to continue to harden our own infrastructures and look to cloud services like DoS mitigation to lessen the effects of attacks. At the same time, the explosion of embedded devices may well be the event that drives more mainstream IPv6 adoption. There are several advantages to IPv6 such as a large namespace, address self-configuration, and the potential to remove Network Address Translation (NAT) problems. The data center will require some planning to embrace this shift. Components such as routers, firewalls, and application delivery controllers will need to be IPv6-ready, capable of understanding the protocols and data that devices will use to communicate. To ensure security, intelligent routing, and analytics, networking layers will need to be fluent in the language your devices use. Understanding these protocols within the network will allow traffic to be secured, prioritized, and routed accordingly. Recognizing and prioritizing these messages will enable better scale and manageability of the onslaught of device traffic and data. Intelligence will also be needed to categorize what data needs attention (like a health monitor alert) and what doesn’t (temperature is good). According to TechTarget, to ensure high availability of IoT services, enterprises must consider boosting traffic management and monitoring. This will both mitigate business continuity risks, and prevent potential losses. From a project planning standpoint, organizations need to do capacity planning and watch the growth rate of the network so that the increased demand for the required bandwidth can be met. ps Related The Digital Dress Code Is IoT Hype For Real? What are These "Things”? IoT Influence on Society CloudExpo 2014: The DNS of Things Intelligent DNS Animated Whiteboard The Internet of Me, Myself & I Technorati Tags: devices,f5,iot,m2m,security,sensors,silva,things,wearables,dns,applicatons Connect with Peter: Connect with F5:498Views0likes0CommentsWhat are These "Things”?
The Internet of Things (IoT) refers to the set of devices and systems that interconnect real world sensors and actuators to the internet. This includes many different types of systems, including: Mobile devices Smart meters & objects Wearable devices including clothing, health care implants, smartwatches, fitness devices, etc. Internet connected automobiles Home Automation Systems including thermostats, lighting, home security Other measuring sensors for weather, traffic, ocean tides, road signals and more These systems connect to the internet or gateway in a variety of manners including long range WiFi/Ethernet using IP protocols (tcp/udp, including cellular), short range Bluetooth low energy, short range Near Field Communications, or other types of medium range radio networks. Point to point radio links and serial lines are also used. There are many sensors that connect directly to the internet and there are others that may need specialized IoT networking hardware. Message Queue Telemetry Transport (MQTT), for instance, is a subscribe and publish messaging protocol designed for lightweight machine to machine (M2M) communications. Originally developed by IBM, is now an open standard but its primary purpose is to allow a device to send a very short message one hop to a MQ broker and to receive commands from that broker. It needs a gateway or receiver (broker) to communicate. Basically, every message is published to a location, called a topic, clients (the sensors) subscribe to various topics and when a message is published to the topic, the client/sensor gets it. The systems themselves typically fall into a few classes of categories. The smallest devices have 8-bit embedded system on chip (SOC) controllers but no operating system; then there are ones that have a limited 32-bit architecture, like a home router, with or without a base OS and; the most capable systems have either full 32-bit or 64-bit operating platform such as a mobile phone. You might even use your mobile phone to send the data, via the internet, from the IoT device to the destined application. Not only are we interacting with these devices, they are interacting with other machines to send specific Information, which is called Machine-to-machine technology. The M2M fabric works in conjunction with the various systems that support wearables, home networks and the widely deployed sensors. Some areas that you can focus on as IoT progresses include: Focus on scale of core capabilities like DNS and availability Evaluate readiness to federate access across cloud apps Examine state of identity and access to manage millions of users Strategize on automation for provisioning and auto-scale According to Gartner, the Internet of Things is not a single technology but a concept with embedded sensors driving the trend, real time support and learning having a social impact and allows businesses to make situational decisions based on the sensor’s information. With that, no single architecture can address all the potential IoT device areas and requirements of each but a scalable architecture that can add or subtract resources to support a wide variety of scenarios prepares organizations for the impact IoT will have. You can check out F5's The Internet of Things-Ready Infrastructure White Paper to learn more about how an IoT–ready environment can enable service providers and enterprises to begin taking advantage of this societal shift without a wholesale rip-and-replace of existing technology. ps Related Is IoT Hype For Real? Internet of Things OWASP Top 10 Internet of Food The Internet of Me, Myself & I Oh, Is That The Internet You're Wearing? The Analog Generation The Internet of Things-Ready Infrastructure White Paper Technorati Tags: iot,things,devices,sensors,wearables,silva Connect with Peter: Connect with F5:344Views0likes0Comments