Internet of Things Architecture

(Elliott) #1

Internet of Things – Architecture © 18


Figure 70: How to use UNI to IoT ARM mapping to identify impacts of a given
requirement on a concrete system architecture - Activity diagram ......................... 199


Figure 71: Applying Perspectives to Views (see Figure 4-1 in [Rozanski 2011] ... -
218 -


Figure 72: A car parked in the Gatwick North Terminal Flightpath long stay car park
[Whittington 2010]..................................................................................... - 243 -


Figure 73: Context diagram of the PBL IoT system. The dashed box indicates the
border of the Control Centre (photography taken from [Korbach 2011]) ....... - 244 -


Figure 74: IoT Domain Model of the PBL system ............................................... - 250 -


Figure 75: IM of the VE for resident-parker and time-parkers. (in orange edge:
unique to resident-parking). ................................................................................ - 262 -


Figure 76: Technical use-case – purchase of parking permit by time-parker. .... - 265 -


Figure 77: Technical scenario –subscribe/unsubscribe/change by resident-parker. ... -
266 -


Figure 78: Technical scenario – on-street parking by time-parker ...................... - 267 -


Figure 79: Technical scenario – on-street parking by resident-parker. ............... - 267 -


Figure 80: Technical scenario – parking enforcement. ....................................... - 267 -


Figure 81: Service Description for the PBL system. ........................................... - 268 -


Figure 82: Database pattern as an example for an Augmented Entity. .............. - 272 -


Figure 83: Smart-object pattern. UAV: Unmanned Aerial Vehicle. ..................... - 273 -


Figure 84: Multiple VEs (database entries) for a single PE (car). ....................... - 274 -


Figure 85: Exemplary modelling of a smart phone that is used as tracking device. .... -
275 -


Figure 86: IoT Domain Model instantiation for a M2M communication scenario.- 277 -


Figure 87: M2M communication. ........................................................................ - 278 -


Figure 88: Shipping box containing multiple packets. The VE-to-PE mapping is
exemplified by paper tags. ................................................................................. - 279 -


Figure 89: Domain modelling of a typical EPC-based RFID scenario (pallet
containing cases). .............................................................................................. - 279 -


Figure 90: Growth fruit sensor (3). ..................................................................... - 282 -

Free download pdf