Why you need to upgrade your IT infrastructure for IoT

The Internet of Things (IoT) presents a number of challenges for businesses and their IT planners. To make best use of the technology, it’s important that CIOs and wider management teams work with trained network and security architects to upgrade their IT infrastructures to intelligent systems that address the increased scalability, reliability and security demands of IoT.

In order to utilise IoT, organisations need the right architecture and systems in place to collate billions of data objects from millions of distinct endpoints, and cope with stringent system availability demands, particularly when using IoT for mission critical applications.

The distributed nature of IoT solutions can also present significant security challenges, as intelligent systems often rely on the Internet for connectivity or use cloud-based resources. Security systems must therefore be extended to protect against data loss, service theft and sophisticated denial of service attacks in a scalable manner.

Intelligent systems need cohesive authentication, authorisation and auditing capabilities to establish trust, govern access to resources, and ensure compliance with government regulations and corporate policies. They must also support strong encryption schemes to safeguard data confidentiality and protect intellectual property.

Organisations should deploy intelligent systems solutions, specifically designed to address the stringent scalability, reliability and security requirements of IoT-based systems. Best-practice solutions are based on a hierarchical model that uses standards-based protocols and components for flexibility and cost-efficiency.

At Red Hat we believe an intelligent IoT hierarchical systems architecture includes:

  • The device level with multiple intelligent endpoints, including mobile computing devices, wearable technology, remote sensors and controls, and autonomous machines and appliances. At the device level, standards-based wired and wireless networking protocols are employed for connectivity, while standards-based data transport and messaging mechanisms are used to forward raw data and exchange control information.
  • The control tier, which acts as an intermediary to facilitate communications, offloads processing functions and drives action. It also analyses tactical data, executes business rules and issues control information upstream.
  • The data centre and cloud tier that performs large-scale data computation and acts as a repository for data storage and strategic analysis. It should also provide a virtual environment for instantiating applications, storing data, executing complex event processing, distributed computing, and business analytics functions. At this level, the system intelligently creates and adapts business rules based on historical trends.

This tiered model helps organisations take full advantage of the Internet and cloud computing for IoT. Using open and standards-based solutions delivers maximum choice and cost savings, as well as helping to accelerate deployment, optimise performance, and address the stringent scalability, reliability and security demands of IoT.

Colin McCabe, Director of Consulting, Red Hat