Agenda - assetsprod.microsoft.com · Solution UX Provisioning API Identity and Registry Stores...

28

Transcript of Agenda - assetsprod.microsoft.com · Solution UX Provisioning API Identity and Registry Stores...

March 21-22 | Fairmont Hotel, San Jose

IoT in Action with Microsoft

Carl CokenGM, IoTMicrosoft Corp.

ANATOMY OF IOT

Anatomy of IoT OverviewDevice ConnectivityBuilding an IoT Solution

Agenda

Anatomy of the Internet of Things

Things Connectivity Data Analytics Action

Security

Anatomy of the Internet of Things

Things Connectivity Data Analytics Action

Security

Pillars of IoTDevices Data Transfer Cloud Infra. Services

Sensors, Gateways, OS,

HVAC, Mobile Devices,

Facility, Machines/Robotics

Protocols, Satellites,

Cellular, Fiber Optic, Mesh

Networks

Servers, Storage,

Networking, Platforms,

Middleware

Applications/Software,

Tools, Algorithms

IoT Pillar

Components of Pillar

Scenario/Real World Example

Activities/

Outcomes Collect Data

M2M/Control

Automation

Human Interface

Display Information

Transfer Data

Security

Low Power Consumption

Process Data

Store Data

Structure Data

Facilitate Integration of Data

Uncover Actionable Insights

Produce/Execute Recomm.

Learn

Visualize Data

Enable Development

Enable Collaboration

Human/Machine Interaction

The Plantweb Digital Ecosystem: a Comprehensive Industrial IoT Portfolio

Data

Applications

Security

Services

Emerson Connected

Services

Plantweb

Insight

Secure

First Mile

Pervasive

Sensing

Gas

Monitor

Radar

Level

Electrical

Monitoring

X-Well Steam

TrapsVibration Valve Position

Monitor

Tank Safety

Valve Monitor

Standalone

PUMPS

Rich Tools

HEAT EXCHANGER

STEAM TRAP

VALVE HEALTH

PERFORMANCE ENERGYHEALTH

Pressure

Gauge

Always

MobilePlantweb

Advisor

Technology

Partnership

Services &

Consulting

Control &

Safety

Systems,

Asset

Management

Intelligent

Field

Devices

FOUNDATIONAL

SOLUTIONS

NEW

SOLUTIONS

Traditional Data Pathways IIoT Application Gateways

Windows Today

Azure Today

March 21-22 | Fairmont Hotel, San Jose

IoT in Action with Microsoft

Carl CokenGM, IoTMicrosoft Corp.

ANATOMY OF IOT

Anatomy of IoT OverviewDevice ConnectivityBuilding an IoT Solution

Agenda

Microsoft ConfidentialMicrosoft Confidential

Anatomy of the Internet of Things

Things Connectivity Data Analytics Action

Security

Microsoft Confidential

Pillars of IoTDevices Data Transfer Cloud Infra. Services

Sensors, Gateways, OS,

HVAC, Mobile Devices,

Facility, Machines/Robotics

Protocols, Satellites,

Cellular, Fiber Optic, Mesh

Networks

Servers, Storage,

Networking, Platforms,

Middleware

Applications/Software,

Tools, Algorithms

IoT Pillar

Components of Pillar

Scenario/Real World Example

Activities/

Outcomes Collect Data

M2M/Control

Automation

Human Interface

Display Information

Transfer Data

Security

Low Power Consumption

Process Data

Store Data

Structure Data

Facilitate Integration of Data

Uncover Actionable Insights

Produce/Execute Recomm.

Learn

Visualize Data

Enable Development

Enable Collaboration

Human/Machine Interaction

The Plantweb Digital Ecosystem: a Comprehensive Industrial IoT Portfolio

Data

Applications

Security

Services

Emerson Connected

Services

Plantweb

Insight

Secure

First Mile

Pervasive

Sensing

Gas

Monitor

Radar

Level

Electrical

Monitoring

X-Well Steam

TrapsVibration Valve Position

Monitor

Tank Safety

Valve Monitor

Standalone

PUMPS

Rich Tools

HEAT EXCHANGER

STEAM TRAP

VALVE HEALTH

PERFORMANCE ENERGYHEALTH

Pressure

Gauge

Always

MobilePlantweb

Advisor

Technology

Partnership

Services &

Consulting

Control &

Safety

Systems,

Asset

Management

Intelligent

Field

Devices

FOUNDATIONAL

SOLUTIONS

NEW

SOLUTIONS

Traditional Data Pathways IIoT Application Gateways

Windows Today

Azure Today

March 21-22 | Fairmont Hotel, San Jose

IoT in Action with Microsoft

Manish Amin

Data Solution Architect, IoT

Microsoft Corp.

Device to Cloud

Microsoft ConfidentialMicrosoft Confidential

Anatomy of the Internet of Things

Things Data Analytics Action

Security

Connectivity

Low power

devices

Existing IoT

devices

IoT Client

Solution UX

Provisioning API

Identity and Registry Stores

Stream Processors

Analytics &

Machine Learning

Business

Integration

Connectors

and

Gateway(s)

Device State Store

Gateway

Storage

Cloud

Gateway

App Backend

Data Path

Optional solution component

IoT solution component

IoT Client

ActionsData and AnalyticsThings & Connectivity

Personal

mobile

devices

IP capable

devices

IoT Client

Business

systems

ThingsRemote lighting

Environmental sensors

Beacons and proximity

Object tracking

Industrial sensor control

Smart gateways

Smart vending machines

Digital signage

Health

monitoring

PLCs

Home energy management

Basic

Things

Remote lighting

Environmental sensors

Beacons and proximity

Object tracking

Smart

Things

Industrial sensor control

Smart gateways

Smart vending machines

Digital signage

Health

monitoring

PLCs

Home energy management

THE THINGS OF INTERNET

Smart

Things

Industrial sensor control

Smart gateways

Smart vending machines

Digital signage

Health

monitoring

PLCs

Home energy management

Role of Smart Things

Perform local compute

Maximize security

Operate solutions reliably

Enable time-sensitive

decisions

Reduce bandwidth costs

Run edge analytics

Attributes of Smart Things

Natural user interface

Manageability

Cloud enabled

Identity

Security

Interoperability

SMART THINGS ENABLE INTELLIGENCE AT THE EDGE

Basic

Things

Remote lighting

Environmental sensors

Beacons and proximity

Object tracking

Smart lighting

Environmental sensors

Role of Basic Things

Transmit data

Perform instant actions

Generate data

Attributes of Basic Things

Basic security/identity

No/light manageability

Resource constrained

Basic hardware

Basic connectivity

IoT anatomy from the top down

Solution

UX

Application Business Logic

Stream Processing & Analytics

Business

Integration

ConnectorsData

Ingestion

ActionData & AnalyticsThings & Connectivity

Device Provisioning and Management

Data Storage

Data

Exploration

Things

Gateways

for Things

Batch Processing & Analytics

Monitoring

& Alerting

Web &

Mobile

Other IT

Systems

Other

Things

Security

Connectivity

Many aspects of device connectivityFunctionality

• Device-to-cloud telemetry,

• Cloud-to-device commands and notifications,

• File uploads/downloads

Security

• Device security,

• Cloud security,

• Channel security, …

Monitoring

Identify malfunctioning devices when they cannot be reached

directly

Reach and customization

• RTOS/Linux/Windows/non-IP capable,

• Network/application protocols,

• Authentication schemes

Field Gateway

Device

Connectivity & Management

Protocol Adaptation

Field Gateway

Protocol Adaptation

Devices

RTO

S, L

inu

x, W

ind

ow

s, A

nd

roid

, iO

S

Cloud

IoT anatomy from the top down

Solution

UX

Application Business Logic

Stream Processing & Analytics

Business

Integration

ConnectorsData

Ingestion

ActionData & AnalyticsThings & Connectivity

Device Provisioning and Management

Data Storage

Data

Exploration

Things

Gateways

for Things

Batch Processing & Analytics

Monitoring

& Alerting

Web &

Mobile

Other IT

Systems

Other

Things

Security

Data

IoT anatomy from the top down

Solution

UX

Application Business Logic

Stream Processing & Analytics

Business

Integration

ConnectorsData

Ingestion

ActionData & AnalyticsThings & Connectivity

Device Provisioning and Management

Data Storage

Data

Exploration

Things

Gateways

for Things

Batch Processing & Analytics

Monitoring

& Alerting

Web &

Mobile

Other IT

Systems

Other

Things

Security

Analytics

IoT anatomy from the top down

Solution

UX

Application Business Logic

Stream Processing & Analytics

Business

Integration

ConnectorsData

Ingestion

ActionData & AnalyticsThings & Connectivity

Device Provisioning and Management

Data Storage

Data

Exploration

Things

Gateways

for Things

Batch Processing & Analytics

Monitoring

& Alerting

Web &

Mobile

Other IT

Systems

Other

Things

Security

Action

Cloud SecuritySecurity Center

Active Directory

Key Vault

Policy-Based Access Control

Connection SecurityX.509/TLS-Based Handshake and Encryption

Device SecurityDevice Provisioning and

Authorization

Security Across All Pillars

Securely connect millions of devices . . .

Over a secure internet connection . . .

Cloud built with security from the ground up

Security

Next Up….

Building an IoT Solution End to End