Changing the Infrastructure and Landscape for the Next

Download Report

Transcript Changing the Infrastructure and Landscape for the Next

Changing the Infrastructure and Landscape for the
Next Technology Wave of Communications – IoT
Peter DeNagy
Acommence Advisors, Inc.
January 20, 2015
IoT - It’s Huge, but How Huge?
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
IoT - It’s Huge, but How Huge?
Gartner has proclaimed IoT hype to have
surpassed Big Data
The number of press articles around IoT has
increased 10X in one year
CAGR of IoT 2013-2020 is projected to be ~
35%/year
This is not a market - This is a collection of
loosely related markets
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
3
Revenue Expectations for IoT in 2014
Revenue Projections for IoT in 2020
IoT – Where is the market?
Measured in # of devices,
• Consumer dominated until 2018
• Industrial dominated thereafter
Measured in Dollars
• Until 2020, consumer oriented IoT will be 53% of the market
• Projection long term, commercial / industrial will be 2X the
revenue of the consumer market
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
6
IoT - New challenges for Infrastructure
Device /
Backend
Connectivity
Security
API
Management
© 2014 Cisco and/or its affiliates. All rights reserved.
Data
Analytics
IoT
Framework
Cisco Confidential
7
IoT – Reference Model / Framework
challenges
IoT Framework
• Currently 14+ Frameworks being socialized
• IEEE P2413
• IoT WF / Cisco
• AllSeen Alliance / Qualcomm, LG, Sharp, Panasonic, MSFT, Sony,
Electrolux, Haier
• Open Interconnect Consortium / Samsung, Dell, HP, Intel, ADT,
Siemens, Cisco, GE
• Thread Group / ARM, Nest, Samsung, Freescale
• Industrial Internet Consortium / AT&T, Cisco. GE, IBM, Intel
• International Society for Automation / ISA100 Committee
• oneM2M / 195 Members & 7 Standards Orgs.
• Many standards mean NO STANDARDS
• Enterprise Adoption will slow until agreement
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
8
IEEE P2413
• 2016 target completion
• 23 Members include:
•
•
•
•
•
•
Cisco Systems
Huawei Technologies
General Electric
Oracle
Qualcomm
Schneider Electric
Hitachi
Broadcom
Itron
Marvel
Rockwell
Siemens AG
• Cooperation with:
•
•
•
•
ZigBee Alliance
ETSI (the European Telecommunications Standards Institute)
ISO (International Organization for Standardization)
oneM2M
© 2014 Cisco and/or its affiliates. All rights reserved.
http://standards.ieee.org/develop/project/2413.html
Cisco Confidential
9
IoT WF – Reference Model
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
10
IoT World Forum Architecture Committee
https://www.iotwf.com/resources/72 (presentation)
https://www.iotwf.com/resources/71 (white paper)
Allseen Alliance – Value Proposition
© 2014 Cisco and/or its affiliates. All rights reserved.
https://allseenalliance.org/
Cisco Confidential
12
Open Interconnect Consortium
– Value Proposition (IoTivity Project)
THE OPEN INTERCONNECT CONSORTIUM IS BEING FOUNDED BY LEADING
TECHNOLOGY COMPANIES WITH THE GOAL OF DEFINING THE CONNECTIVITY
REQUIREMENTS AND ENSURING INTEROPERABILITY OF THE BILLIONS OF DEVICES
THAT WILL MAKE UP THE EMERGING INTERNET OF THINGS (IOT).
© 2014 Cisco and/or its affiliates. All rights reserved.
http://openinterconnect.org/
Cisco Confidential
13
Open Interconnect Consortium
– Members
• Mid 2015 first
specification to be
completed and code
drop and reference
model availability
• Developer source
code by 4Q2015
• Device certification
capabilities 1Q2016
• Broadcom resigned
over IP issues
• Gaining traction
© 2014 Cisco and/or its affiliates. All rights reserved.
http://openinterconnect.org/
Cisco Confidential
14
Thread Group – Value Proposition
THREAD SOLVES RELIABILITY, SECURITY, POWER, AND COMPATIBILITY
ISSUES FOR CONNECTING PRODUCTS AROUND THE HOME
•
•
•
•
•
•
•
•
•
•
•
•
Based on a robust mesh network with no single point of failure
Designed to support a wide variety of products for the home
Simple for consumers to use
Always secure
Power-efficient
An open protocol that carries IPv6 natively
Runs over standard 802.15.4 radios
Appliances, access control, climate control, energy management,
lighting, safety, and security Simple installation using your
smartphone, tablet or computer
Scalable to connect 250+ devices into a single network supporting
multiple hops
Provides security at network and application layers
Product install codes are used to ensure only authorized devices can
join the network
Supported by banking-class, public-key cryptography
© 2014 Cisco and/or its affiliates. All rights reserved.
http://sandbox.threadgroup.org/Home.aspx
Cisco Confidential
15
Thread Group – Members
• Mid 2015 first
specification to be
completed and code
drop and reference
model availability
• Developer source code
by 4Q2015
• Device certification
capabilities 1Q2016
• All for Smart Home /
Smart Building
applications and
integration
• Competing against
ZigBee, Z-Wave and
Bluetooth Smart
© 2014 Cisco and/or its affiliates. All rights reserved.
http://sandbox.threadgroup.org/Home.aspx
Cisco Confidential
16
Industrial Internet Consortium
– Value Proposition
The goal of the IIC is to:
• Drive innovation through the creation of new industry use cases and
testbeds for real-world applications
• Define and develop the reference architecture and frameworks
necessary for interoperability
• Influence the global development standards process for internet and
industrial systems;
• Facilitate open forums to share and exchange real-world ideas,
practices, lessons, and insights;
• Build confidence around new and innovative approaches to security.
https://www.
youtube.com
/watch?v=zh
KUdwdf0dI
http://www.iiconsortium.org/index.htm
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
17
Industrial Internet Consortium
Industrial Internet Consortium – Members
ABB Ltd.
Accenture
aicas
Altera Corporation
Analog Devices
Apprion
AT&T*
Atomic Database Corporation
Auburn University
Bayshore Networks, Inc.
BlackBerry
Bedrock Automation
Bosch
Canonical Group Limited
Carnegie Mellon University
Certified Security Solutions
Charles Stark Draper Laboratory
Cisco Systems Inc.*
Cork Institute of Technology
CSIRO
Cubicon Corporation
CyberLightning Ltd.
CyberX
Dan Hussain
Datawatch
Decisyon
Dell
Deloitte LLP
Detecon, Inc.
DGLogik, Inc.
DigiCert, Inc
Eclipse Foundation
Ei3 Corporation
Elecsys Corporation
EMC Corporation
ENT Foundation
EnterpriseWeb
First Line Software, Inc
FogHorn
Frost Data Capital
Fuji Electric Co., Ltd.
Fujifilm Corporation
Fujitsu Limited
General Electric*
Grid Connect Inc.
Hewlett-Packard
Hitachi, Ltd.
Huawei Technologies Co., Ltd.
IBM*
ICT Austria
IGear Online
Industrial Technology Research Institute
Institute for Information Industry
Intel*
Intel-GE Care Innovations
Jasper Technologies, Inc.
John Hopkins University
Kyland Technology Co., Ltd.
LAAS-CNRS
MachineShop, Inc.
Machine-to-Machine Intelligence (M2Mi)
MD PnP
MDSL
Micron Technology
Microsoft Corporation
Mitsubishi Electric Corporation
MITRE Corporation
Moxa Inc
National Association of Electrical Distributors (NAED)
National Instruments
NEC Corporation
NeuStar, Inc.
NGRAIN (Canada) Corporation
No Magic
Open Group.
Parker Hannifin
Parstream
People Power
Pitney Bowes
PrismTech
Productivity Apex, Inc.
PTC Inc
Purfresh Inc.
Putman Media
QualiCal
Real-Time Innovations
RhoData Corporation
Room 5
Saffron Technology, Inc.
Samsung Electronics
Sansa Security
SAP SE
Schneider Electric
Sentient Science
SevOne, Inc.
Siemens
Singlewire
SpaceCurve
Stream Technologies
Symantec
Synapse Wireless
System Insights
Tata Consultancy Services
TE Connectivity
Tech Mahindra Limited
Technische Universität Darmstadt
ThetaRay LTD.
ThingWorx
Telecommunications Industry Association (TIA)
Telstra Software Group
Toshiba
Toyota Motor Sales
Tyco
UL
UNISYS Corporation
University of Pennsylvania
University of Pittsburgh
V2COM
Vanderbilt University
Verisign, Inc.
VTT Technical Research Centre of Finland
Water & Process Group (WPG)
Wave Systems Corp
Wireless Glue Networks
wot.io
Wyconn
Xcaliber Technologies, LLC
http://www.iiconsortium.org/index.htm
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
18
ISA100 - Purpose
Wireless Systems for Automation
The ISA100 Committee will establish standards, recommended practices, technical reports, and related
information that will define technologies and procedures for implementing wireless systems in the
automation and control environment with a focus on the field level (Level 0). Guidance is directed
towards those responsible for the complete life cycle including the designing, implementing, on-going
maintenance, scalability or managing manufacturing and control systems, and shall apply to users,
system integrators, practitioners, and control systems manufacturers and vendors.
The Committee's focus is to improve the confidence, integrity, and availability of components or systems
used for manufacturing or control, and provide criteria for procuring and implementing wireless
technology in the control system environment. Compliance with the Committee's guidance will improve
manufacturing and control system deployment, and will help identify vulnerabilities and address them,
thereby reducing the risk of compromising or causing manufacturing control systems degradation or
failure.
Application of the technology will include
• Field sensors used for monitoring, control, alarm, and shutdown that can be vertically integrated
from field to business systems
• Wireless technology whose uses include real time field-to-business systems (e.g. wireless equipment
interfacing work order systems, control LAN, business LAN, voice)
• Across all industries - fluid processing, material processing, and discrete parts manufacturing
environments - See more at: https://www.isa.org/isa100/#sthash.hFDOKZZP.dpuf
https://www.isa.org/isa100/#sthash.hFDOKZZP.dpuf
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
19
Purpose - Standards for
M2M and IoT
The purpose and goal of oneM2M is to develop technical specifications which address the need for a
common M2M Service Layer that can be readily embedded within various hardware and software, and
relied upon to connect the myriad of devices in the field with M2M application servers worldwide.
A critical objective of oneM2M is to attract and actively involve organizations from M2M-related
business domains such as: telematics and intelligent transportation, healthcare, utilities, industrial
automation, smart homes, etc. Initially, oneM2M shall prepare, approve and maintain the necessary set
of Technical Specifications and Technical Reports for:
•
•
•
•
•
•
•
•
•
•
•
Use cases and requirements for a common set of Service Layer capabilities;
Service Layer aspects with high level and detailed service architecture, in light of an access independent view
of end-to-end services;
Protocols/APIs/standard objects based on this architecture (open interfaces & protocols);
Security and privacy aspects (authentication, encryption, integrity verification);
Reachability and discovery of applications;
Interoperability, including test and conformance specifications;
Collection of data for charging records (to be used for billing and statistical purposes);
Identification and naming of devices and applications;
Information models and data management (including store and subscribe/notify functionality);
Management aspects (including remote management of entities); and
Common use cases, terminal/module aspects, including Service Layer interfaces/APIs between:
• Application and Service Layers;
• Service Layer and communication functions
© 2014 Cisco and/or its affiliates. All rights reserved.
http://www.onem2m.org/
Cisco Confidential
20
oneM2M - Members
7 Standards Bodies
5 Global ICT fora
There are currently 195 participating partners and members
http://www.onem2m.org/membership/current-members
© 2014 Cisco and/or its affiliates. All rights reserved.
http://www.onem2m.org/
Cisco Confidential
21
IoT - New challenges for Device and
Backend Connectivity
Device and Backend Connectivity Challenges
• Local Network
•
•
•
•
•
Radio selection
Peer to Peer
Mesh
Bridging
SCATA network integration / OT / IT
• Corporate Network
•
•
•
•
LAN/WAN
Public Wi-Fi
Mobile Network 3G – 4G – 5G
Satellite
• Wide Area Network
•
•
•
•
© 2014 Cisco and/or its affiliates. All rights reserved.
Public
Private
Hybrid
Cloud
Cisco Confidential
22
IoT - New challenges for Device and
Backend Connectivity
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
23
IoT - New challenges for API
Management
API
Management
API Management Issues
• Sensors & Beacons
• Firmware based
• Mostly no OS
• 10’s of thousands of endpoints to integrate
• Smartphones, Tablets, Computers and Wearables
• Multiple OSs (Mozilla, WebOS, Tizen, iOS, Android, QNX, BB-12,
Linux, Windows …)
• Multiple Browsers (Safari, Opera, Chrome, IE …)
• Onboarding Endpoints to
•
•
•
•
Backend Compute Platforms
M2M Gateways
Middleware solutions
ERP, CRM, WFM, EAM, EMR, POS backends
• Cloud integrations
© 2014 Cisco and/or its affiliates. All rights reserved.
• Public
• Private
• Hybrid
Cisco Confidential
24
IoT - New challenges for API
Management
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
25
IoT - New challenges for API Management
Dynamic Connection & Authentication of IoT Devices/Sensors & APIs
1
CONNECT YOUR DEVICE
C2M™, is an IoT middleware which can generate dynamic adapters within
seconds to enable connecting to multitude of IoT/M2M Devices and
Sensors as well as APIs. The IoT application needs to only consume the
RESTFUL API and leave all the complex connectivity management and
handshakes to C2M™.
2
AUTHENTICATE AND ACTIVATE YOUR DEVICES
C2M™ uniquely identifies, authenticates and activates the
Devices/Sensors/APIs in a secure account. Enable IoT elements as part of
one project or multiple projects and control their visibility, access, data and
control. All of this can be managed through the API or Carrier Grade Device
Management Console.
.DEVICE DATA AND CONTROL MANAGEMENT
3
Once activated, the Devices/Sensors/APIs will provide a secure data feed
and control management through C2M™ communication bus. You can tap
into a specific device state or control its behavior. You can even Mash data
from multiple sources to create unique analytic feeds. Use this to build
next generation IoT applications or to simply monitor the IoT ecosystem.
Copyright © 2015. PBI, Inc. All Rights Reserved
IoT - New challenges for
Infrastructure Security
Security Issues
• Sensors & Beacons
Security
• Firmware based
• Mostly no OS
• 10’s of thousands of endpoints to integrate
• Smartphones, Tablets, Computers and Wearables
• Multiple OSs (Mozilla, WebOS, Tizen, iOS, Android, QNX, BB-12,
Linux, Windows …)
• Multiple Browsers (Safari, Opera, Chrome, IE …)
• Onboarding Endpoints to
•
•
•
•
Backend Compute Platforms
M2M Gateways
Middleware solutions
ERP, CRM, WFM, EAM, EMR, POS backends
• Cloud integrations
© 2014 Cisco and/or its affiliates. All rights reserved.
• Public
• Private
• Hybrid
Cisco Confidential
27
IoT - New challenges for
Infrastructure Security
SEC CSF
SEC CSF API (Mca, Mcc)
Security Functions Layer
Identification
Authentication
Authorization
Security
Association
Sensitive Data
Handling
Security
Administration
Secure Environment Abstraction Layer
Secure Environments Layer
Secure Environment n
Sensitive Data
© 2014 Cisco and/or its affiliates. All rights reserved.
Security Environments 1
Security Environments 2
Sensitive Functions
Cisco Confidential
28
IoT - New challenges for
Data Analytics Infrastructure
Data
Analytics
Data Analytics
• Devices
• Network
• Data Format
• Storage
• Data Structure
• IoT Data is voluminous
• IoT data is largely unstructured
• Aggregation
• Meaningful insight
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
29
IoT - New challenges for
Infrastructure Data and Analytics
“The network will play a crucial part in how we develop the car;
gathering data, learning from it and adapting will ultimately
determine our season”
Christian Horner
Team Principal, Infiniti Red Bull Racing
IoT - New challenges for
Infrastructure Data and Analytics
• The value
proposition of IoT is
100% captured in
Data Analytics
• ioT will generate
Petabytes of
unstructured data
for the large
enterprise
Application
Business
Decisions
Data Integration / Virtualization
Sample
Data
Data Collection
Proxy and Streaming
Inserts
OT data
• Ramifications will go
well beyond
network, storage,
processing at the
edge and core and
cloud
Analytics
IT Data
Abstraction Layer
Edge software
Various
protocols
Device Driver
© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
31
About Acommence Advisors
Acommence Advisors is a partnership designed to Accelerate Business Value for our clients by driving
the speed of their business interactions and the heightening their engagement of the ecosystem
most relevant to the clients’ value proposition, benefiting all stakeholders of their company.
A technology industry consultancy dedicated to business acceleration and velocity generation for
mature organizations, Acommence Advisors has deep roots in the Mobile, Network, Communications
and Systems Integration arena. We focus on Sales, Strategy, Research and Analysis, Innovation and
Ideation, Business Development and Strategic Alliance growth and support to enhance our clients’
ability to quickly address market opportunities and make the most of their own competitive
advantages. The firm’s foremost goals are helping organizations and businesses develop strategic
plans around utilization, ROI and TCO calculations, revenue generation, sales rationalization and
deployment strategies with services including; revenue generation and sales strategy, market
analysis, organizational and product design and ideation, systems provisioning, cost containment,
program construction, deployment and operation plans to introduce Social, Mobility, IT,
Communication platforms that forward client’s business mission and value proposition.
Our principals average over 25 years each in technology, mobile, communications and consulting
companies just like Client. We have deep, deep experience in enabling leading Mobile OEMs
enterprise efforts and understand how we can enable your companies success in this venture. Learn
more about us at http://www.acommence.com/aboutus-management.html.