Internet of Things 2017/2018

Similar documents
Internet of Things 2017/2018

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Smart test and certification of wireless IoT devices

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

Chapter 16 Networking

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Mobile Communications

Multiple Access Links and Protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

MULTIPLE ACCESS PROTOCOLS 2. 1

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Internet Structure. network edge:

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

CSC 4900 Computer Networks: Wireless Networks

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ECE 4450:427/527 - Computer Networks Spring 2017

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Mobile and Sensor Systems

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

By Ambuj Varshney & Akshat Logar

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

WIRELESS SENSOR NETWORK

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

CS263: Wireless Communications and Sensor Networks

The Link Layer and LANs. Chapter 6: Link layer and LANs

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

RF and network basics. Antonio Liñán Colina

The MAC layer in wireless networks

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Link Layer and LANs. CMPS 4750/6750: Computer Networks

CS 455/555 Intro to Networks and Communications. Link Layer

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Wireless Security Background

MAC LAYER. Murat Demirbas SUNY Buffalo

Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Medium Access Control in Wireless Sensor Networks

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

System Architecture Challenges in the Home M2M Network

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Medium Access Control

Wireless and Mobile Networks 7-2

Eclipse IOT day April 3016 LoRa Overview. Wyres SAS 2016

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

The Internet of Things. Thomas Watteyne Senior Networking Design Engineer Linear Technology, Dust Networks product group

WP-PD Wirepas Mesh Overview

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

WIRELESS TECHNOLOGIES FOR THE INTERNET OF THINGS

Chapter 5 Link Layer and LANs

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

Introduction to Networked Embedded Systems and Course Description. Song Han Office: ITEB 355

Lecture 04 Introduction: IoT Networking - Part I

Wireless networks. Wireless Network Taxonomy

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

CSMA based Medium Access Control for Wireless Sensor Network

Subject: Adhoc Networks

Internet of Things: Latest Technology Development and Applications

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Communication and Networking in the IoT

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Chapter 12 Multiple Access 12.1

By Nick Giannaris. ZigBee

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Internet based IoT connectivity Technologies

Data Link Layer Technologies

Chapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011

CS 332 Computer Networks Wireless Networks

WirelessHART, Technology and Deployment ( ETSI Nov. 09 ) Jean-Luc Griessmann, HART Communication Foundation Europe

CSC 4900 Computer Networks: The Link Layer

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CSE 461: Multiple Access Networks. This Lecture

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

WIRELESS TECHNOLOGIES

15-441: Computer Networking. Wireless Networking

Data Link Layer: Multi Access Protocols

wireless Connectivity For iot

Ad Hoc Networks: Issues and Routing

2. A collection of interconnected networks is called an internetwork. 3. Each machine is connected to a central hub with a point-to-point connection.

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Medium Access Control in Wireless Sensor Networks

Cloud Based IoT Application Provisioning (The Case of Wireless Sensor Applications)

Routing over Low Power and Lossy Networks

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Transcription:

Internet of Things 2017/2018 The Things Johan Lukkien John Carpenter, 1982 1

Guiding questions What to think about things and how are they connected? 2

Resource limitations Memory: available flash ( program code ) and ram Processor: Mhz, instruction set expressive power, address width, ability to manage its power Energy: available Joules and how they are replenished Communication: required transceive power, bps, complexity of protocols These are connected, mainly through energy Ram required power to retain state Processor complexity and Mhz require energy Low memory needs fewer address bits Simpler network protocols and smaller bandwidths lead to lower power transceivers 3

RFC 7228: devices Three classes representing memory (hence processor) limitations C0: dependent on proxies for secure Internet inclusion C1: only low resource protocols C2: can run most Internet protocols (C9: phone, tablet, desktop) 4

Energy limitation and communication policies 5

Some private taxonomy Flash RAM Address space Processor (type) OS Energy Operation Actively reachable Example A small code memory several bytes <= 8bits ~100Hz no External, or battery + wakeup Externally activated, simple read/write not designed for reachability via multi-hop RFID tag, ISO 18000-6c B <= 32K Few hundreds <=16 bits ~1Mhz TMS430 no, or simple executive mechanical mechanically activated, just generates some data no; needs proxy power switch C <=32K Few hundreds <=16 bits ~1Mhz TMS430 Contiki, TinyOS battery simple, fixed external behavior, needs proxy, simple sensing duty cycled, needs proxy simple sensor mote D <=32K ~10K <=16 bits ~1Mhz TMS430 Contiki, TinyOS battery + recharge capable of managing most constrained IP protocols, sensing, actuating, processing self-managed on/off behavior Crossbow E <=256K ~32K <=32 bits ~1-10Mhz ARM Contiki, TinyOS battery + recharge, mains complete IP endpoint behavior, limited storage yes Jennic mote F ~GB ~500Mb 32 bits G ~Ghz ARM Linux battery + recharge, mains full fledged embedded computer system yes Rasberry PI phones, laptops, servers 6

Example: A battery-less light switch The switch is pressed. The node turns on and sends a Route Request broadcast message for a known destination. it boots an OS in the process! Using Route Reply, it finds the route to the luminaries. Using the discovered route, the node transmits the control signal (turn on/off) to the luminaries. The luminary node acknowledges the reception of the control signal. The switch node does multiple retries to transmit that control signal as long as the node stays on and until an ACK is received. 30mA @ 3.3V for 60ms Running FreeRTOS and capable of transmitting compressed IP packets (6LoWPAN). From: 6LoWPAN: IPv6 for Battery-less Building Networks, MSc thesis of N.A. Abbasi, TU/e 7

Functionality of things Things must be capable to perform the required sensing, actuation, computation, communication functional requirements In addition, because they are many: (secure) bootstrap, (secure) network association upon (re)starting a device must load its code from a trusted source it must join the correct network secure communication (secure) software update, over the network updates are inevitable and must remain safe part of the life cycle 8

Concerns and management - can it join a network? - secure bootstrapping - can it be configured? - adapting operational parameters - e.g. sensing, communication frequency - can it be updated (over the air)? - new firmware, new software, new application components - can it run IP? - serve as IP endpoint - can it secure itself? - independent node A,B,C: need trusted partner (proxy) A,B: very little; C: limited From D onwards From E onwards; D runs limited protocols A,B,C: need trusted partner; D: limited 9

Some private taxonomy Flash RAM Address space Processor (type) OS Energy Operation Actively reachable Example A small code memory several bytes <= 8bits ~100Hz no External, or battery + wakeup Externally activated, simple read/write not designed for reachability via multi-hop RFID tag, ISO 18000-6c B <= 32K Few hundreds <=16 bits ~1Mhz TMS430 no, or simple executive mechanical mechanically activated, just generates some data no; needs proxy power switch C <=32K Few hundreds <=16 bits ~1Mhz TMS430 Contiki, TinyOS battery simple, fixed external behavior, needs proxy, simple sensing duty cycled, needs proxy simple sensor mote D <=32K ~10K <=16 bits ~1Mhz TMS430 Contiki, TinyOS battery + recharge capable of managing most constrained IP protocols, sensing, actuating, processing self-managed on/off behavior Crossbow E <=256K ~32K <=32 bits ~1-10Mhz ARM Contiki, TinyOS battery + recharge, mains complete IP endpoint behavior, limited storage yes Jennic mote F ~GB ~500Mb 32 bits G ~Ghz ARM Linux battery + recharge, mains full fledged embedded computer system yes Rasberry PI phones, laptops, servers 10

There are many things #things / person >> 1 (50B in 2020) hence, things need to talk to each other or to a database about..? self-* properties, autonomy self management, self healing, scalability, at access networks What s new with IoT? many things sharing your wireless LAN special infra structure outdoor Things have limitations low processing power, memory, low capacity network size IP packet comparable to available memory sometimes battery operated embedded: no UI Their numbers and far-reaching locations enable entirely new applications large-scale data collection data-based applications manufacturers probing into the deployed systems Their scale and locations comes with complex concerns device/data handling, ownership security, safety, application reliability at a compelling scale application development, deployment, management 11

Guiding questions What to think about things and how are they connected? 12

How do end points communicate? 13

Networking approaches Physical neighbors: Shared medium Point-to-point In case of physical separation switching connecting networks multiple interfaces for some nodes Packet oriented Full connectivity by (intelligent) flooding routing shared medium point to point 14

Flooding 15

Wired Wireless Battery Mains Energy limitations will determine uptime communication behavior and protocols. In principle, the wire could be used for power; and at least for waking up nodes No real need for low resources except cost and energy; this class captures regular office/home infra structure devices Energy limitations will determine uptime, communication behavior and protocols; nodes must manage their sleeping behavior; nodes can be mobile Wireless is there for convenience (absence of other infra - outdoors) and for connecting to mobile wireless nodes; powerful wireless protocols can be used, always on 16

The LANs Taken from Wikipedia (Nov. 2015) Important wireless: the 3 group (ethernet, PoE) the 11 group ( WiFi ) the 15 group (wireless PAN) Within IEEE 802.15 1x: Bluetooth 4x: PHY/MAC layer for ZigBee, 6LoWPAN, Thread, WirelessHART, MiWi ContikiMAC, 6Tisch Within the IEEE 802.11 LANs: 11p: ITS 11e: QoS 11s: meshing 11ah: low power, low interference 17

Example: which (IP) protocols occur in a lighting network? Connectivity: 6LoWPAN (= adaptation for IP/802.15.4), UDP, TCP [sometimes] RPL, RIP, MPL: routing, multicasting DTLS: packet based security Application Trickle: application protocol for dissemination to all devices in a network RESTful style REST plus HTTP methods CoAP constrained application protocol DNS-SD using mdns, or CoAP directory: for service discovery M2M protocols, e.g. MQTT/TCP Courtesy of Dee Denteneer 18

Characteristics of wireless communication A wireless network is like a shared channel to put data on standards must address this sharing, avoiding destructive interference Wireless communication is intrinsically subject to errors received signal is the energy collected over time can always be disturbed by an external party (a different protocol family in same frequency), or by another neighbor than the sender quality depends on environment properties (e.g. reflections) Wireless communication is energy-hungry, particularly when compared to the energy used by embedded processors Standards must address the unreliability, sharing and energy use 19

What techniques are applied? FDMA: multiple channels (frequency division multiple access) channel hopping with synchronization e.g. 802.15.1 (Bluetooth), 6tisch, cell formation / independent domains e.g. 3/4G, IEEE 802.11 (WiFi) TDMA: division in timeslots (time division multiple access) timeslots with schedules, time synchronization e.g. WirelessHART, DECT, IEEE 802.15.4 in superframe mode in combination with cell formation Master-Slave e.g. an access point as master beacon-based signaling e.g. IEEE 802.11 (WiFi), Bluetooth, IEEE 802.15.4 CSMA: try before you cry (carrier sense multiple access) Clear Channel Assessment: Aloha with collision avoidance, detection or resolution e.g. IEEE 802.15.4 (ZigBee): random distribution of retries with priority e.g. IEEE 802.11e (WiFi + QoS) CDMA (code division multiple access, as in 4G) concurrent access of the medium with coded packets admits decoding even with interference Regulation duty cycle restrictions (e.g. 1% per station) frequency assignment 20

Wired Wireless Shared medium Point to point CSMA/CD: coax ethernet CSMA/CR: CAN TDMA token passing: profibus Master/Slave: ethercat (,profibus) Switched ethernet: PoE Common way to set up larger networks using switches and routers MA/CA: (pure) Aloha CSMA/CA: Wifi, Zigbee TDMA: Wireless Hart Master/Beaconing: Wifi, Zigbee FDMA + channel hopping: bluetooth (low energy), 6tisch CDMA: virtual point to point (4G), Chirp Spread Spectrum UWB FDMA Dedicated frequencies for long-haul transport: satellite 21

Outdoor Wired No common infra structure available; some initiatives via light poles or other relatively dense infra Wireless City WiFi 4G/5G: LTE adaptation, LongRange low power WAN technologies Indoor Standard wired infra structure using UTP, fiber, switches, bridges and routers WiFi Bluetooth IEEE 802.15.4 based technologies 22

Energy, in low capacity environment Radio communication is a major contributor to energy consumption don t use it Applied techniques (combinations, need support at multiple layers) asymmetry low-power nodes are 1 hop away from well-powered infra control the transmit / receive power trade connectivity for energy duty cycle switch node or radio on and off periodically demand driven event driven control of radio (wakeup radio, or push mode) with asymmetry push / pull strategies let the low power partner always be the first trade power for range and throughput special network technologies, special physical layers 23

Metrics (which is how to judge all this) throughput number of bytes per time unit for a station: bytes per interval latency or delay jitter time difference in initiation of a transmission and the start of the receipt consist of processing delay, transmission delay and queueing delay variations in timing, e.g. delay jitter, throughput jitter fairness, ability to prioritize fairness: bound on delay in access to a transmission channel or fair share in competition overhead scalability as utilization increasing the amount of communication increasing # stations e.g. CSMA/CA scales badly when increasing # stations while TDMA scales well as dimensioning predictability reliability LoRaWan can scale the number of gateways with the number of low-power nodes e.g. resilience agains interference power range 24

Qualitative metrics +: improves (e.g. Latency + means improves (reduces) Latency) -: makes worse o: no effect/not applicable 25

Guiding questions What to think about things and how are they connected? 26