Connecting Business with Machines in the Cloud-Based World Of
Total Page:16
File Type:pdf, Size:1020Kb
AN IOT BLUEPRINT 2015 Connecting Business with Machines in the Cloud-Based World of IoT Eurotech® combines Intel-based hardware, Wind River Linux software, Oracle Java Virtual Machine, McAfee security technology, networking expertise, and a global cloud-based infrastructure to create a framework for Internet of Things developers. Brought to you by An ioT Blueprint | Connecting Business with Machines in a Cloud-Based World of IoT Connecting Business with Machines in the Cloud-Based World of IoT Table of Contents Eurotech® combines Intel-based hardware, Wind River Linux software, Oracle Executive Summary 2 Java Virtual Machine, McAfee security technology, networking expertise, and a Key Business Objectives 2 Business Challenges 2 global cloud-based infrastructure to create a framework for Internet of Things Solution Benefits 2 developers. Solution Overview 4 Executive Summary networks for decades, usually by engineering Key Components 4 or customizing the hardware and software Adding value is all about focusing on your core Solution Capabilities 6 from scratch. That forced system integrators to strengths while leveraging those of others. As the Example Use Models 6 develop networking, embedded and operational “Internet of Things” becomes more complicated Technology 7 technology expertise whether they liked it or and diverse, it’s important to make a solid IoT Tenets 8 not. A firm specializing in medical equipment, business case for attaching all of those “things” Summary 8 for example, doesn’t typically also employ Resources 9 experts on protocol stacks, low-level driver code, operating system kernels, or quality-of-service (QoS) algorithms. Distributed, industrial-grade networking expertise shouldn’t be a mandatory requirement for all system developers. Moreover, connecting a product to business applications is only the beginning. How can that connection be managed and monetized? How can it be integrated into the enterprise’s existing back-office business information systems? Can it to the Internet – or to your business systems. communicate with suppliers and vendors? How From the sensors and actuators at one end of the are updates, upgrades, revisions and changes scale, to the business information systems at the in hardware handled? In short, developing a other, there’s a huge amount of technology in successful IoT product involves far more than between. Technology that most companies aren’t just hardware/software engineering; it means equipped to handle. Eurotech and Intel have integrating products into the business in an already built out that infrastructure and made it accessible, flexible, and financially sensible available to system integrators and developers manner while creating investment protection so that they can add value while leveraging the against future changes and growth. existing (and future) technology. Solution Benefits Key Business Objectives Knowing that many aspects of IoT are the Eurotech and Intel offer an open, scalable, and same for everyone – and that few potential expandable infrastructure to developers and IoT developers have the time or inclination system integrators so that they can connect their to develop all the infrastructure from scratch systems to a global network cloud (either public – Eurotech has spent the past several years or private) and to in-house information systems. crafting an end-to-end, or “edge to application” They do this in a way that minimizes one-off software framework and application development and instead leverages existing enablement platform for IoT developers and technology, standards, and protocols, while systems integrators. From individual IoT devices providing the ability to remotely manage the at one end (say, a vending machine or an distributed devices and the applications running air-conditioning unit), to the manufacturer’s at the edge. The result should be cost-effective, information technology (IT) department and standards-based, and broadly interoperable. business-information systems (BIS) at the other end, Eurotech’s collection of IoT building blocks Business Challenges takes care of all the Internet hops, skips, and The “Internet of Things” (IoT) is a new term for jumps along the way. an old concept. Developers have been attaching The company’s framework has two major 2 embedded systems to public and private components, called the Everyware* Software An ioT Blueprint | Connecting Business with Machines in a Cloud-Based World of IoT Framework (ESF) and the Everyware Cloud. operating system drivers. The Everyware Between them they form an application Software Framework (ESF) provides all the enablement platform for the enterprise IT building blocks required to get Device X up and world while also providing the required data, running on the Everyware Cloud. ESF includes device, and application management functions the Wind River Linux operating system, Oracle to distributed devices in the field. One of the Java programming tools, support for multiple guiding principles behind these two pillars was wired and wireless protocols (ZigBee, Wi-Fi, that every feature and function they provide GPRS, etc.), gateway services, an administration should be modular and replaceable. That is, ESF GUI, and much more. Everything about ESF is not one big monolithic software project that is based on open, global standards, not works for everyone. On the contrary, it’s a set proprietary technology. of pieces that can be added (or removed) as necessary. All the pieces work together. Just as M2M/IoT Standard Protocols: important, they also work with outside, third- The deployment of large numbers of party software. That’s because the Everyware geographically dispersed systems in the Software Framework and Everyware Cloud field require communication protocols that are based on globally accepted standards, not ensure efficient use of bandwidth, real- Eurotech-specific “hooks.” Developers are not time transactions, and the ability to cope locked in to any particular technology or any with unreliable networks. MQTT (Message specific approach. Quite the opposite: they’re Queue Telemetry Transport) publish/subscribe free to innovate when and where they choose – technology addresses these and other aspects which is usually somewhere completely unrelated of highly distributed, network connected to the device software framework and the cloud embedded devices. infrastructure. They would like to replace the above Eurotech believes that IoT developers should paragraph with the one below. Can you please add value in their chosen field as subject- take a look and see how much that would matter experts and not spend time developing affect your layout, and if it is possible to include and debugging systems that are already well the whole paragraph below. understood by others. Writing TCP/IP stacks doesn’t add value. Original features specific Security built in: to a market add value. Spend your time on Security is one of the important aspects of any engineering creative solutions, not recreating M2M/IoT solution and has to be looked at in a existing infrastructure. holistic way. Holistic, in this case, means that the overall security architecture is as important Connecting Devices to Business: as the quality of the approach in each of its The Everyware Cloud quickly connects any parts. In these solutions, there are the devices type of device, sensor, or asset to business and their software. There is the communication applications. More than just a gateway to the channel that leverages the Internet as the cloud or a network stack for IoT, Everyware “WAN backbone”. There is the cloud or Cloud brings field data right to where it’s data center portion of the solution and the needed. Everyware Cloud scales with the connection to the enterprise IT world. number of devices deployed, from a single Eurotech’s solution contains security prototype to thousands of installed units in the technology, authentication methods and best field. It’s a developer’s private bridge from IoT practices for each of these parts in the M2M/ sensors at one end to in-house information IoT solutions as described in this document. systems at the other. Additionally, it extends the Examples of some of the security solution rich management functionality of the device building blocks range from TLS encrypted to allow for remote management of device communication channels that are limited to applications and bundles. a single TCP/IP port on the remote device to remote boot and Embedded Security from Everyware Software Framework: Wind River and McAfee / Intel Security, notably, Deploying an innovative IoT product shouldn’t McAfee Embedded Control. depend on engineering network interfaces, McAfee Embedded Control includes system 3 understanding wireless protocols, or debugging integrity and change control for embedded An ioT Blueprint | Connecting Business with Machines in a Cloud-Based World of IoT Consumers of Data APIs, Dashboards, Console, etc. M2M M2M Infrastructure Integration Platform Solution Operational Multi- Technology Service Building Block Gateways Standard Interfaces Producers of Figure 1. Data Cloud-connected devices. devices. This software blocks unauthorized matter experts to do what they do best: applications from running on your embedded develop original applications, not debug low- systems (whitelisting). It is also configurable level code. That makes the entire development to allow for trusted software update sources team more productive and more valuable, while to be identified. The McAfee Change Control