Already a subscriber? 

MADCAD.com Free Trial
Sign up for a 3 day free trial to explore the MADCAD.com interface, PLUS access the
2009 International Building Code to see how it all works.
If you like to setup a quick demo, let us know at support@madcad.com
or +1 800.798.9296 and we will be happy to schedule a webinar for you.
Security check
Please login to your personal account to use this feature.
Please login to your authorized staff account to use this feature.
Are you sure you want to empty the cart?

ISO/IEC 30141:2024 Internet of Things (IoT) - Reference architecture, 2024
- CONTENTS
- FOREWORD
- INTRODUCTION
- 1 Scope
- 2 Normative references
- 3 Terms and definitions
- 4 Abbreviated terms
- 5 IoT RA context [Go to Page]
- 5.1 Overview
- 5.2 Stakeholders and concerns
- 6 IoT RA viewpoints and views [Go to Page]
- 6.1 Overview
- 6.2 Foundational IoT viewpoint and views [Go to Page]
- 6.2.1 Foundational IoT viewpoint
- 6.2.2 Foundational IoT view
- 6.3 Business viewpoint and view [Go to Page]
- 6.3.1 Business viewpoint
- 6.3.2 Business view
- 6.4 Usage viewpoint and view [Go to Page]
- 6.4.1 Usage viewpoint
- 6.4.2 Usage view
- 6.5 Functional viewpoint and view [Go to Page]
- 6.5.1 Functional viewpoint
- 6.5.2 Functional view
- 6.6 Trustworthiness viewpoint and view [Go to Page]
- 6.6.1 Trustworthiness viewpoint
- 6.6.2 Trustworthiness view
- 6.7 Construction viewpoint and views [Go to Page]
- 6.7.1 Construction viewpoint
- 6.7.2 Construction view
- 6.7.3 IoT component pattern
- Annex A (normative) Additional IoT construction patterns [Go to Page]
- A.1 General
- A.2 Reference Architecture Model Industrie 4.0 (RAMI 4.0) pattern
- A.3 Dynamic IoT system pattern
- A.4 IoT enterprise system pattern
- A.5 IoT enterprise networking pattern
- A.6 IoT enterprise usage pattern
- Annex B (informative) Guidance on the use of ISO/IEC/IEEE 42010:2022 [Go to Page]
- B.1 Overview
- B.2 Systems and architectures
- B.3 Elements in ISO/IEC/IEEE 42010:2022 used in ISO/IEC 30141 IoT reference architecture description [Go to Page]
- B.3.1 Overview
- B.3.2 Stakeholders, perspective, and concerns
- B.4 Viewpoints, model kinds, legends, correspondences, and correspondence methods
- B.5 Views and models
- B.6 Correspondences
- Annex C (informative) Characteristics for IoT systems in particular contexts [Go to Page]
- C.1 Common characteristics [Go to Page]
- C.1.1 Legacy support
- C.1.2 Network connectivity
- C.1.3 Unique identification
- C.1.4 Well-defined components
- C.1.5 Auto-configuration
- C.1.6 Content-awareness
- C.1.7 Context-awareness
- C.1.8 Discoverability
- C.1.9 Manageability
- C.1.10 Network management and operation
- C.1.11 Real-time capability
- C.1.12 Self-description
- C.1.13 Service subscription
- C.2 Characteristics related to trustworthiness [Go to Page]
- C.2.1 Data characteristics – volume, velocity, veracity, variability, and variety
- C.2.2 Protection of personally identifiable information (PII)
- C.2.3 Flexibility
- Bibliography
- Figures [Go to Page]
- Figure 1 – Using the IoT RA standard
- Figure 2 – Relationship between IoT component, IoT system and IoT environment
- Figure 3 – Example of IoT environment
- Figure 4 – External facing functions
- Figure 5 – Internal model of abstract function classes
- Figure 6 – Legend used in the trustworthiness view
- Figure 7 – IoT architecture construction view
- Figure 8 – Capabilities of an IoT component
- Figure A.1 – RAMI 4.0
- Figure A.2 – DSC components
- Figure A.3 – Message flow in DSC
- Figure A.4 – Home smart air cleaning service
- Figure A.5 – Example system deployment model
- Figure A.6 – Networking model
- Figure A.7 – Roles present when the system is in use
- Figure A.8 – IoT service provider subroles and activities
- Figure A.9 – IoT service developer subroles and activities
- Figure A.10 – IoT subroles and activities
- Figure A.11 – Activities of device and application development
- Figure A.12 – Using device data for security-related analytics and operations.
- Figure B.1 – Conceptual model of an architecture description
- Tables [Go to Page]
- Table 1 – List of viewpoints, stakeholders, and concerns
- Table 2 – Foundational IoT viewpoint
- Table 3 – Business viewpoint
- Table 4 – Usage viewpoint
- Table 5 – Functional viewpoint
- Table 6 – Trustworthiness viewpoint
- Table 7 – Construction viewpoint
- Table 8 – Construction pattern legend
- Table 9 – IoT component pattern
- Table 10 – Additional information on IoT component capabilities
- Table 11 – Key capability transformations
- Table 12 – IoT system pattern
- Table A.1 – RAMI 4.0 pattern
- Table A.2 – Dynamic IoT system pattern
- Table A.3 – IoT enterprise system pattern
- Table A.4 – IoT enterprise networking system
- Table A.5 – IoT enterprise usage pattern
- Table A.6 – Overview of activities and roles
- Table A.7 – Overview of enterprise activities and roles [Go to Page]