An Implementation of Fog Computing Attributes in an IoT Environment

Similar documents
Lecture 04 Introduction: IoT Networking - Part I

Sensor-to-cloud connectivity using Sub-1 GHz and

The Integrated Smart & Security Platform Powered the Developing of IOT

Power Management Techniques for Low- Energy IoT Devices

IQRF - Mesh Networking

WP-PD Wirepas Mesh Overview

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.

Low Power Wide Area Network (LPWAN) Presented By: Dr. Hafiz Yasar Lateef Director, Telxperts Pty Ltd.

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

M a/b/g Outdoor Layer-2 MESH AP

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

DASH7 ALLIANCE PROTOCOL - WHERE RFID MEETS WSN. public

WAN Optimization. Overview KNOW YOUR NETWORK

Wireless IoT Sensing Solutions

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi

A Low Latency Data Transmission Scheme for Smart Grid Condition Monitoring Applications 28/05/2012

Accelerate critical decisions and optimize network use with distributed computing

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Wireless Sensor Networks

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

Managing & Accelerating Innovation with Open Source at the Edge

Wzzard Sensing Platform Network Planning and Installation. Application Note

Transforming Utility Grid Operations with the Internet of Things

ISA100.11a. Pengfei Ren.

OneWireless Network Overview

LXRS and LXRS+ Wireless Sensor Protocol

Enable IoT Solutions using Azure

Routing protocols in WSN

Data Analytics at Logitech Snowflake + Tableau = #Winning

Enhancement of CoAP Packet Delivery Performance for Internet of Things. Hang Liu

Storage Networking Strategy for the Next Five Years

Topics. Introduction Architecture Node Types Network Topologies Traffic Modes Frame Format Applications Conclusion

Intelligent Edge Computing and ML-based Traffic Classifier. Kwihoon Kim, Minsuk Kim (ETRI) April 25.

Project: IEEE P Task Group for Wireless Smart Sensors

OnboardICNg: a Secure Protocol for On-boarding IoT Devices in ICN

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services

Enabling Smart Energy as a Service via 5G Mobile Network advances

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

Portable Wireless Mesh Networks: Competitive Differentiation

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks

The network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:

Exam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.

Wireless Mesh Network - A well proven alternative to LPWAN

Lesson 13 Smart Street-lighting Services And Monitoring. Chapter-12 L13: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

MicroPnP The Zero-Configuration Platform for Wireless Sensing & Actuation

Yanzi IoT for Smart Buildings From Sensor to Cloud. Marie Lassborn, VP Cloud Operations Jfokus 2018

Introduction to Networking

White paper. Optimizing ios and macos Devices on Cisco Wireless Networks

OSS-7 AN OPEN SOURCE DASH7 STACK

The Open System Interconnect model

CN9000 Series 100Gbps Encryptors

DYNAMIC SMART WIRELESS

GIoTS & IOT Week 2017: IOT Reality Check Patrick Wetterwald, CTAO IOT Standards and Architecture

Service Mesh and Microservices Networking

Powering the Internet of Things with MQTT

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX

Critical networking using mesh Wi-SUN technology Dr Simon Dunkley

ZIGBEE. Erkan Ünal CSE 401 SPECIAL TOPICS IN COMPUTER NETWORKS

Wireless Clients and Users Monitoring Overview

Ad Hoc Networks: Introduction

Design of Next Generation Internet Based on Application-Oriented Networking

Support for Notifications in CCN ( draft-ravi-ccn-notification-00.txt ) IETF/ICN-RG -93, Prague

IoT Smart & Connected Facilities 2017

Real-Time and Low-Power Wireless Communication with Sensors and Actuators

European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Building a Future-Proof Data- Processing Solution with Intelligent IoT Gateways. Johnny T.L. Fang Product Manager

CSMA based Medium Access Control for Wireless Sensor Network

Vortex Whitepaper. Intelligent Data Sharing for the Business-Critical Internet of Things. Version 1.1 June 2014 Angelo Corsaro Ph.D.

Unraveling Mesh Networking Options TOM PANNELL 28 FEBRUARY 2018

that will impact New IoT Technology Trends Production Automation

MR30H. MR30H and Meraki Cloud Management: A Powerful Combination. Robust Feature Set for Multi-dwelling Wireless. Product Highlights

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Out of the Fog: Use Case Scenarios. Industry. Smart Cities. Visual Security & Surveillance. Application

Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation

Smart Grid Communications and Networking

OneWireless Network Overview

SUB-TITLE WLAN Management-as-a-Service

Introduction to Z-Wave SmartStart. Whitepaper

Internet of Things: An Introduction

Case studies intelligente verlichting. Patrick van der Meulen Business Development Manager

Accelerating intelligence at the edge for embedded and IoT applications

5G systems. meeting the expectations of the Networked Society. Dr Magnus Frodigh Director Wireless Access Networks GSM. Wi-Fi. New technologies 5G

HIGH DENSITY ACCESS POINTS

Dynamic WAN Selection

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Simplifying WAN Architecture

Part I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis

AMI: Communications and Integration Options

What do we expect from Wireless in the Factory?

Technologies for Future Mobile Tactile Internet of Things (IoT)

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Logitech Advanced 2.4 GHz Technology With Unifying Technology

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Transcription:

An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc.

Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into Predictive Insights Data Classification at the network level allows an efficient, scalable Cloud Analytics engine Predicts operational efficiencies and business opportunities Facilitates the building of secured, flexible and modular applications

Sensor Networks Challenges Software Stack Elements of Fog Computing Example of an end-to-end IoT Architecture Characteristics of IoT Data Data Collection Data Organization In-network Processing Data Transmission Security Management and Control Index

Sensor Networks Sensor Nodes Low Power (battery operated) Typically wireless Distributed Resource-constrained Disparate Prone to failures Sensor Networks Self-organizing Self-healing Robust Cross-platform, standards-based Secure Controller

Sensor Network Challenges Resource constraints Power consumption Environmental RF interference Robustness Reliability of data Software optimization Power management Frequency hopping Mesh networking Advanced data collection and validation

Software Stack

End-to-End IoT Architecture

Characteristics of IoT Data Very large volume of data Speed of Data Processing and Consumption Quantum Latency Cost Structure Drives the Cost of WAN & storage How is the Data Structured?

Policy set by the cloud-based via the Controller Push Model Sensor pushes data to controller Configurable interval Pull Model Controller requests data from the sensor Model-based Query-based Policy affects power consumption Data Collection

Data Organization Data is collected from heterogeneous sources Sensor data is often unstructured IoT Controller creates order from chaos Maintains data model for sensors Validates accuracy of data Organizes and structures data

In-Network Processing Rules-based processing Rules can be set by a Cloud-based controller Reduced latency for local actions Model-based processing Controller builds a model of sensor data Deviations from model are treated as triggers Advanced machine-learning algorithms provide predictive insights into the data

Data Transport Secure, end-to-end communications Link-layer security for sensor nodes TLS for Controller-to-Cloud communications Compression and aggregation Rules-based aggregation Compression to reduce bandwidth Prioritization and classification Policy-based prioritization of sensor network events Control upstream traffic Crucial for applications requiring low-latencies

Data Aggregation and Classification Aggregation Coupled with compression can reduce upstream traffic Can be controlled via the Rules Engine Can be used to batch-transfer data Optimize for payload size Classification Pre-classified data can reduce processing load for the Cloud Prioritized events can lower latency for critical events Facilitates SLA s for individual customers in a Public Cloud C Payload Q0 Q1 Q2 Qn P0 P1 Pn

Sensor Authentication Pre-shard keys are not secure Controller can authenticate sensor using x.509 certificates Controller Controller and Cloud perform mutual authentication using x.509 certificates Well-established, industry-standard mechanisms Link-Layer Most standardized protocols provide link-layer security (For e.g. 802.15.4) Pre-shared keys are not secure Transport All traffic between the Controller and Cloud is encrypted using TLS Security

Sensor Nodes Exclude rogue sensors from joining the network Throttle sensor data volume Firmware upgrades Management and Control Controller Functions as a management gateway for Sensor Nodes Enforces local security policy Can be managed via existing standards (SNMP, TR-069, REST, etc.) Configures sensor network topology: Star vs. Mesh Limited logs and alarms

Summary Deploying and managing sensor networks requires intelligent local processing Building, Scaling and Managing IOT solutions requires a distributed architecture with Fog Computing attributes Data conditioning, filtering and classification is crucial In-network processing of events is essential for many applications Security needs to be a design consideration, not an after-thought