0% found this document useful (0 votes)
20 views96 pages

Week 2

Uploaded by

sachin2017stars
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views96 pages

Week 2

Uploaded by

sachin2017stars
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 96

EL

Connectivity Technologies – Part II

PT Dr. Sudip Misra


Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/

Introduction to Internet of Things 1


EL
6LoWPAN
PT
N
Introduction to Internet of Things 2
Introduction

 Low‐power Wireless Personal Area Networks over IPv6.

EL
 Allows for the smallest devices with limited processing ability
to transmit information wirelessly using an Internet protocol.
 Allows low‐power devices to connect to the Internet.
PT
 Created by the Internet Engineering Task Force (IETF) ‐ RFC
5933 and RFC 4919.
N
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012

Introduction to Internet of Things 3


Features of 6LoWPANs

 Allows IEEE 802.15.4 radios to carry 128‐bit addresses of

EL
Internet Protocol version 6 (IPv6).
 Header compression and address translation techniques allow
the IEEE 802.15.4 radios to access the Internet.
PT
 IPv6 packets compressed and reformatted to fit the IEEE
802.15.4 packet format.
 Uses include IoT, Smart grid, and M2M applications.
N
Introduction to Internet of Things 4
Addressing in 6LoWPAN
• 64‐bit addresses: globally
Addressing

EL
unique
• 16 bit addresses: PAN specific;
64‐bit assigned by PAN coordinator
Extended

16‐bit
PT
• IPv6 multicast not supported by
802.15.4
• IPv6 packets carried as link
N
Short layer broadcast frames
Introduction to Internet of Things
6LowPAN Packet Format
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Length Flags DSN

IEEE 802.15.4
EL
PAN ID
Destination (64 bit)

Source (64 bit)

Ver
PT
Traffic Class
Payload Length
Flow Label
Next Header Hop Limit

IPv6
Source Address (128 bit)
N
Destination Length (128 bit)

Introduction to Internet of Things


Header Type: Dispatch Header

1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8

EL
0 1 Dispatch Type Specific Header

• Dispatch: Initiates communication


• 0,1: Identifier for Dispatch Type
• Dispatch:
• 6 bits PT
• Identifies the next header type
N
• Type Specific Header:
• Determined by Dispatch header

Introduction to Internet of Things


Header Type: Mesh Addressing Header

1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8

EL
1 0 V F Hops Left Originator Address Final Address

• 1,0: ID for Mesh Addressing Header



address PT
V: ‘0’ if originator is 64‐bit extended address, ‘1’ if 16‐bit

F: ‘0’ if destination is 64‐bit addr., ‘1’ if 16‐bit addr.


N
• Hops Left: decremented by each node before sending to next
hop

Introduction to Internet of Things


Header Type: Fragmentation Header

1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8

EL
1 1 0 0 Datagram Size Datagram Tag

(a) First Fragment


1 2

1 1 0 0
3 4 5 6

Datagram Offset
7 8

PT
1 2 3 4

Datagram Size
5 6 7 8 1 2 3 4 5 6 7 8 1 2

Datagram Tag
3 4 5 6 7 8
N
(b) Subsequent Fragment

Introduction to Internet of Things


6LoWPAN Routing Considerations
 Mesh routing within

EL
the PAN space.
 Routing between IPv6
and the PAN domain

use:
 LOADng
PT
 Routing protocols in
N
 RPL

Introduction to Internet of Things 10


LOADng Routing
 Derived from AODV and extended for use in IoT.

EL
 Basic operations of LOADng include:
 Generation of Route Requests (RREQs) by a LOADng Router
(originator) for discovering a route to a destination,
 Forwarding of such RREQs until they reach the destination LOADng
Router,
PT
 Generation of Route Replies (RREPs) upon receipt of an RREQ by the
indicated destination, and unicast hop‐by‐hop forwarding of these
RREPs towards the originator.
N
Source: Clausen, T.; Colin de Verdiere, A.; Yi, J.; Niktash, A.; Igarashi, Y.; Satoh, H.; Herberg, U.; Lavenu, C. et al. (January 2016). The
Lightweight On‐demand Ad hoc Distance‐vector Routing Protocol ‐ Next Generation (LOADng). IETF. I‐D draft‐clausen‐lln‐loadng‐14

Introduction to Internet of Things 11


 If a route is detected to be broken, a Route Error (RERR) message is
returned to the originator of that data packet to inform the originator
about the route breakage.

EL
 Optimized flooding is supported, reducing the overhead incurred by
RREQ generation and flooding.
 Only the destination is permitted to respond to an RREQ.
 Intermediate LOADng Routers are explicitly prohibited from

sought destination. PT
responding to RREQs, even if they may have active routes to the

 RREQ/RREP messages generated by a given LOADng Router share a


N
single unique, monotonically increasing sequence number.
Source: Clausen, T.; Colin de Verdiere, A.; Yi, J.; Niktash, A.; Igarashi, Y.; Satoh, H.; Herberg, U.; Lavenu, C. et al. (January 2016). The
Lightweight On‐demand Ad hoc Distance‐vector Routing Protocol ‐ Next Generation (LOADng). IETF. I‐D draft‐clausen‐lln‐loadng‐14

Introduction to Internet of Things 12


RPL Routing
 Distance Vector IPv6 routing protocol for lossy and low power
networks.

EL
 Maintains routing topology using low rate beaconing.
 Beaconing rate increases on detecting inconsistencies (e.g.
node/link in a route is down).
PT
 Routing information included in the datagram itself.
 Proactive: Maintaining routing topology.
N
 Reactive: Resolving routing inconsistencies.
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012

Introduction to Internet of Things 13


 RPL separates packet processing and forwarding from the
routing optimization objective, which helps in Low power
Lossy Networks (LLN).

EL
 RPL supports message confidentiality and integrity.
 Supports Data‐Path Validation and Loop Detection

 minimizing energy
 minimizing latency
PT
 Routing optimization objectives include
N
 satisfying constraints (w.r.t node power, bandwidth, etc.)
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012

Introduction to Internet of Things 14


 RPL operations require bidirectional links.
 In some LLN scenarios, those links may exhibit asymmetric
properties.

EL
 It is required that the reachability of a router be verified
before the router can be used as a parent.

PT
N
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012

Introduction to Internet of Things 15


EL
RFID
PT
N
Introduction to Internet of Things 16
Introduction

 RFID is an acronym for “radio‐frequency identification”

EL
 Data digitally encoded in RFID tags, which can be read by a
reader.
 Somewhat similar to barcodes.
PT
 Data read from tags are stored in a database by the reader.
 As compared to traditional barcodes and QR codes, RFID tag
N
data can be read outside the line‐of‐sight.
Source: “How does RFID work?” AB&R (Online)

Introduction to Internet of Things 17


RFID Features
 RFID tag consists of an integrated circuit and an antenna.

EL
 The tag is covered by a protective material which also acts as
a shield against various environmental effects.
 Tags may be passive or active.
PT
 Passive RFID tags are the most widely used.
 Passive tags have to be powered by a reader inductively
before they can transmit information, whereas active tags
N
have their own power supply.
Source: “How does RFID work?” AB&R (Online)

Introduction to Internet of Things 18


Working Principle
 Derived from Automatic Identification and Data Capture (AIDC)
technology.

EL
 AIDC performs object identification, object data collection and
mapping of the collected data to computer systems with little or no
human intervention.
 AIDC uses wired communication
PT
 RFID uses radio waves to perform AIDC functions.
 The main components of an RFID system include an RFID tag or
smart label, an RFID reader, and an antenna.
N
Source: “How does RFID work?” AB&R (Online)

Introduction to Internet of Things 19


EL
PT
N
Introduction to Internet of Things 20
Applications
 Inventory management

EL
 Asset tracking
 Personnel tracking
 Controlling access to restricted areas


ID badging
Supply chain management
PT
N
 Counterfeit prevention (e.g. in the pharmaceutical industry)
Source: “How does RFID work?” AB&R (Online)

Introduction to Internet of Things 21


EL
PT
N
Introduction to Internet of Things 22
EL
Basics of IoT Networking – Part II

PT Dr. Sudip Misra


Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/

Introduction to Internet of Things 1


Functionality-based IoT Protocol Organization
 Connectivity (6LowPAN, RPL)

EL
 Identification (EPC, uCode, IPv6, URIs)
 Communication / Transport (WiFi, Bluetooth, LPWAN)
 Discovery (Physical Web, mDNS, DNS‐SD)



PT
Data Protocols (MQTT, CoAP, AMQP, Websocket, Node)
Device Management (TR‐069, OMA‐DM)
Semantic (JSON‐LD, Web Thing Model)
N
 Multi‐layer Frameworks (Alljoyn, IoTivity, Weave, Homekit)
Source: Internet of Things Protocols (Online)

Introduction to Internet of Things 2


EL
MQTT

PT
N
Introduction to Internet of Things 3
Introduction
 Message Queue Telemetry Transport.

EL
 ISO standard (ISO/IEC PRF 20922).
 It is a publish‐subscribe‐based lightweight messaging protocol for
use in conjunction with the TCP/IP protocol.
 MQTT was introduced by IBM in 1999 and standardized by OASIS in
2013.
PT
 Designed to provide connectivity (mostly embedded) between
applications and middle‐wares on one side and networks and
N
communications on the other side.
Source: “MQTT”, Wikipedia (Online)

Introduction to Internet of Things 4


 A message broker controls the publish‐subscribe messaging
pattern.
 A topic to which a client is subscribed is updated in the form

EL
of messages and distributed by the message broker.
 Designed for:
 Remote connections
 Limited bandwidth
 Small‐code footprint
PT
N
Source: “MQTT”, Wikipedia (Online)

Introduction to Internet of Things 5


MQTT Components

EL
• Lightweight sensors
Publishers
• Applications interested in sensor data
Subscribers
PT
Brokers • Connect publishers and subscribers
• Classify sensor data into topics
N
Source: “MQTT”, Wikipedia (Online)

Introduction to Internet of Things 6


MQTT Methods
Connect

EL
Disconnect
Subscribe
Unsubscribe
Publish
PT
N
Source: “MQTT”, Wikipedia (Online)

Introduction to Internet of Things 7


EL
PT
N
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)

Introduction to Internet of Things 8


Communication
 The protocol uses a publish/subscribe architecture (HTTP uses a

EL
request/response paradigm).
 Publish/subscribe is event‐driven and enables messages to be
pushed to clients.
 The central communication point is the MQTT broker, which is in
rightful receivers. PT
charge of dispatching all messages between the senders and the

 Each client that publishes a message to the broker, includes a topic


into the message. The topic is the routing information for the
N
broker.
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)

Introduction to Internet of Things 9


 Each client that wants to receive messages subscribes to a
certain topic and the broker delivers all messages with the
matching topic to the client.

EL
 Therefore the clients don’t have to know each other. They
only communicate over the topic.

PT
 This architecture enables highly scalable solutions without
dependencies between the data producers and the data
consumers.
N
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)

Introduction to Internet of Things 10


MQTT Topics

 A topic is a simple string that can have more hierarchy levels,

EL
which are separated by a slash.
 A sample topic for sending temperature data of the living
room could be house/living‐room/temperature.
PT
 On one hand the client (e.g. mobile device) can subscribe to
the exact topic or on the other hand, it can use a wildcard.
N
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)

Introduction to Internet of Things 11


 The subscription to house/+/temperature would result in all
messages sent to the previously mentioned topic house/living‐
room/temperature, as well as any topic with an arbitrary value in
the place of living room, such as house/kitchen/temperature.

EL
 The plus sign is a single level wild card and only allows arbitrary
values for one hierarchy.
 If more than one level needs to be subscribed, such as, the entire

PT
sub‐tree, there is also a multilevel wildcard (#).
 It allows to subscribe to all underlying hierarchy levels.
 For example house/# is subscribing to all topics beginning with
N
house.
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)

Introduction to Internet of Things 12


Applications
 Facebook Messenger uses MQTT for online chat.

EL
 Amazon Web Services use Amazon IoT with MQTT.
 Microsoft Azure IoT Hub uses MQTT as its main protocol for
telemetry messages.
PT
 The EVRYTHNG IoT platform uses MQTT as an M2M protocol
for millions of connected products.
 Adafruit launched a free MQTT cloud service for IoT
N
experimenters called Adafruit IO.

Introduction to Internet of Things 13


SMQTT
 Secure MQTT is an extension of MQTT which uses encryption

EL
based on lightweight attribute based encryption.
 The main advantage of using such encryption is the broadcast
encryption feature, in which one message is encrypted and
delivered to multiple other nodes, which is quite common in
IoT applications.
PT
 In general, the algorithm consists of four main stages: setup,
encryption, publish and decryption.
N
Source: M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Fifth International Conference on
Communication Systems and Network Technologies (CSNT 2015), April 2015, pp. 746‐751

Introduction to Internet of Things 14


 In the setup phase, the subscribers and publishers register
themselves to the broker and get a master secret key according to
their developer’s choice of key generation algorithm.

EL
 When the data is published, it is encrypted and published by the
broker which sends it to the subscribers, which is finally decrypted
at the subscriber end having the same master secret key.

PT
 The key generation and encryption algorithms are not standardized.
 SMQTT is proposed only to enhance MQTT security features.
N
Source: M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Fifth International Conference on
Communication Systems and Network Technologies (CSNT 2015), April 2015, pp. 746‐751

Introduction to Internet of Things 15


EL
PT
N
Introduction to Internet of Things 16
EL
Basics of IoT Networking – Part III

PT Dr. Sudip Misra


Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/

Introduction to Internet of Things 1


EL
CoAP
PT
N
Introduction to Internet of Things 2
Introduction
 CoAP – Constrained Application Protocol.
 Web transfer protocol for use with constrained nodes and

EL
networks.
 Designed for Machine to Machine (M2M) applications such

PT
as smart energy and building automation.
 Based on Request‐Response model between end‐points
 Client‐Server interaction is asynchronous over a datagram
N
oriented transport protocol such as UDP
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014

Introduction to Internet of Things


 The Constrained Application Protocol (CoAP) is a session layer
protocol designed by IETF Constrained RESTful Environment
(CoRE) working group to provide lightweight RESTful (HTTP)

EL
interface.
 Representational State Transfer (REST) is the standard
interface between HTTP client and servers.

PT
 Lightweight applications such as those in IoT, could result in
significant overhead and power consumption by REST.
 CoAP is designed to enable low‐power sensors to use RESTful
N
services while meeting their power constraints.
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014

Introduction to Internet of Things 4


 Built over UDP, instead of TCP (which is commonly used with HTTP) and
has a light mechanism to provide reliability.
 CoAP architecture is divided into two main sub‐layers:
 Messaging

EL
 Request/response.
 The messaging sub‐layer is responsible for reliability and duplication of
messages, while the request/response sub‐layer is responsible for
communication.
 CoAP has four messaging modes:



Confirmable
Non‐confirmable
Piggyback
PT
N
 Separate
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015

Introduction to Internet of Things 5


CoAP Position

EL
Application

Request
CoAP

PT Messages

UDP
N
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014

Introduction to Internet of Things


CoAP Message Types

Message Types‐CoAP
Confirmable

EL
Non‐Confirmable

PT Piggyback

Separate
N
Source: Z. Shelby , K. Hartke, C. Bormann, “The Constrained Application Protocol (CoAP)”, Internet Engineering Task Force (IETF), Standards Track,
2014

Introduction to Internet of Things


CoAP Request-Response Model

EL
PT
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015

Introduction to Internet of Things


 Confirmable and non‐confirmable modes represent the reliable and
unreliable transmissions, respectively, while the other modes are used for
request/response.
 Piggyback is used for client/server direct communication where the server

EL
sends its response directly after receiving the message, i.e., within the
acknowledgment message.
 On the other hand, the separate mode is used when the server response

some time to be sent by the server. PT


comes in a message separate from the acknowledgment, and may take

 Similar to HTTP, CoAP utilizes GET, PUT, PUSH, DELETE messages requests
to retrieve, create, update, and delete, respectively
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015

Introduction to Internet of Things 9


CoAP Request-Response Model

EL
PT
N
Source: V. Karagiannis, P. Chatzimisios, F. Vazquez‐Gallego, and J. Alonso‐Zarate, "A survey on application layer protocols for the internet of
things," Transaction on IoT and Cloud Computing, vol. 3, no. 1, pp. 11‐17, 2015

Introduction to Internet of Things


Features
 Reduced overheads and parsing complexity.

EL
 URL and content‐type support.
 Support for the discovery of resources provided by known
CoAP services.

notifications. PT
 Simple subscription for a resource, and resulting push

 Simple caching based on maximum message age.


N
Source: ”Constrained Application Protocol”, Wikipedia (Online)

Introduction to Internet of Things 11


EL
XMPP
PT
N
Introduction to Internet of Things 12
Introduction

 XMPP – Extensible Messaging and Presence Protocol.

EL
 A communication protocol for message‐oriented middleware
based on XML (Extensible Markup Language).
 Real‐time exchange of structured data.
PT
 It is an open standard protocol.
N
Source: “XMPP”, Wikipedia (Online)

Introduction to Internet of Things 13


 XMPP uses a client‐server architecture.
 As the model is decentralized, no central server is required.
 XMPP provides for the discovery of services residing locally or

EL
across a network, and the availability information of these
services.
 Well‐suited for cloud computing where virtual machines,

PT
networks, and firewalls would otherwise present obstacles to
alternative service discovery and presence‐based solutions.
 Open means to support machine‐to‐machine or peer‐to‐peer
N
communications across a diverse set of networks.
Source: “XMPP”, Wikipedia (Online)

Introduction to Internet of Things 14


Highlights

 Decentralization – No central server; anyone can run their

EL
own XMPP server.
 Open standards – No royalties or granted permissions are
required to implement these specifications
PT
 Security – Authentication, encryption, etc.
 Flexibility – Supports interoperability
N
Source: “XMPP”, Wikipedia (Online)

Introduction to Internet of Things 15


EL
PT
N
Source: “JabberNetwork.svg”, Wikimedia Commons (Online)

Introduction to Internet of Things 16


Core XMPP Technologies
Core
• information about the core XMPP technologies for XML streaming

EL
Jingle
• multimedia signalling for voice, video, file transfer
Multi‐user Chat

PubSub PT
• flexible, multi‐party communication

• alerts and notifications for data syndication


BOSH
N
• HTTP binding for XMPP
Source: “XMPP: Technology Overview”, XMPP.org (Online)

Introduction to Internet of Things 17


Weaknesses

 Does not support QoS.

EL
 Text based communications induces higher network
overheads.
 Binary data must be first encoded to base64 before
transmission. PT
N
Introduction to Internet of Things 18
Applications
 Publish‐subscribe systems

EL
 Signaling for VoIP
 Video
 File transfer


Gaming PT
Internet of Things applications
 Smart grid
N
 Social networking services

Introduction to Internet of Things 19


EL
PT
N
Introduction to Internet of Things 20
EL
Basics of IoT Networking – Part IV

PT Dr. Sudip Misra


Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/

Introduction to Internet of Things 1


EL
AMQP
PT
N
Introduction to Internet of Things 2
Introduction
 Advanced Message Queuing Protocol.

EL
 Open standard for passing business messages between
applications or organizations.
 Connects between systems and business processes.
PT
 It is a binary application layer protocol.
 Basic unit of data is a frame.
 ISO standard: ISO/IEC 19464
N
Source: “Advanced Message Queuing Protocol”, Wikipedia (Online)

Introduction to Internet of Things 3


EL
PT
N
Source: “The‐amqp‐model‐for‐wikipedia.svg”, Wikimedia Commons (Online)

Introduction to Internet of Things 4


AMQP Features

EL
Organizations Technologies Time Space

PT Connects across
N
Introduction to Internet of Things 5
Features
Security

EL
Reliability
Interoperability

PT
Routing
Queuing
Open standard
N
Introduction to Internet of Things 6
Message Delivery Guarantees

 At‐most‐once

EL
 each message is delivered once or never
 At‐least‐once
 each message is certain to be delivered, but may do so multiple times
 Exactly‐once PT
 message will always certainly arrive and do so only once
N
Reference: "OASIS AMQP version 1.0, sections 2.6.12‐2.6.13". OASIS AMQP Technical Committee

Introduction to Internet of Things 7


AMQP Frame Types
 Nine AMQP frame types are defined that are used to initiate, control and

EL
tear down the transfer of messages between two peers:
 Open (connection open)
 Begin (session open)
 Attach (initiate new link)





PT
Transfer (for sending actual messages)
Flow (controls message flow rate)
Disposition (Informs the changes in state of transfer)
Detach (terminate the link)
End (session close)
N
 Close (connection close)
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013

Introduction to Internet of Things 8


Components
• Part of Broker
Exchange

EL
• Receives messages and routes them to Queues

• Separate queues for separate business processes


Queue • Consumers receive messages from queues

Bindings
PT • Rules for distributing messages (who can access
what message, destination of the message)
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013

Introduction to Internet of Things 9


AMQP Exchanges
Direct

EL
Fan‐out

PT
Topic
Header
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013

Introduction to Internet of Things 10


AMQP Features

 Targeted QoS (Selectively offering QoS to links)

EL
 Persistence (Message delivery guarantees)
 Delivery of messages to multiple consumers



PT
Possibility of ensuring multiple consumption
Possibility of preventing multiple consumption
High speed protocol
N
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013

Introduction to Internet of Things 11


Applications
 Monitoring and global update sharing.

EL
 Connecting different systems and processes to talk to each other.
 Allowing servers to respond to immediate requests quickly and
delegate time consuming tasks for later processing.

PT
 Distributing a message to multiple recipients for consumption.
 Enabling offline clients to fetch data at a later time.
 Introducing fully asynchronous functionality for systems.
N
 Increasing reliability and uptime of application deployments.
Source: O.S. Tezer, “An advanced messaging queuing protocol walkthrough ”, DigitalOcean (Online), 2013

Introduction to Internet of Things 12


EL
PT
N
Introduction to Internet of Things 13
EL
Connectivity Technologies – Part I

PT Dr. Sudip Misra


Associate Professor
Department of Computer Science and Engineering
IIT KHARAGPUR
N
Email: smisra@sit.iitkgp.ernet.in
Website: http://cse.iitkgp.ac.in/~smisra/

Introduction to Internet of Things 1


Communication Protocols
The following communication protocols have immediate importance to consumer and

EL
industrial IoTs:
 IEEE 802.15.4
 Zigbee
 6LoWPAN
 Wireless HART
 Z‐Wave
 ISA 100
 Bluetooth
 NFC
PT
N
 RFID

Introduction to Internet of Things 2


EL
IEEE 802.15.4
PT
N
Introduction to Internet of Things 3
Features of IEEE 802.15.4
 Well‐known standard for low data‐rate WPAN.

EL
 Developed for low‐data‐rate monitoring and control
applications and extended‐life low‐power‐consumption uses.
 This standard uses only the first two layers (PHY, MAC) plus
PT
the logical link control (LLC) and service specific convergence
sub‐layer (SSCS) additions to communicate with all upper
layers
N
 Operates in the ISM band.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 4


EL
PT
N
Introduction to Internet of Things 5
 Uses direct sequence spread spectrum (DSSS) modulation.
 Highly tolerant of noise and interference and offers link
reliability improvement mechanisms.

EL
 Low‐speed versions use Binary Phase Shift Keying (BPSK).
 High data‐rate versions use offset‐quadrature phase‐shift
keying (O‐QPSK).

(CSMA‐CA) for channel access. PT


 Uses carrier sense multiple access with collision avoidance

 Multiplexing allows multiple users or nodes interference‐free


N
access to the same channel at different times.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 6


 Power consumption is minimized due to infrequently occurring
very short packet transmissions with low duty cycle (<1%).
 The minimum power level defined is –3 dBm or 0.5 mW.

EL
 Transmission, for most cases, is Line of Sight (LOS).
 Standard transmission range varies between 10m to 75m.

1000m. PT
 Best case transmission range achieved outdoors can be upto

 Networking topologies defined are ‐‐ Star, and Mesh.


N
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 7


IEEE 802.15.4 Variants
A/B
• Base version

EL
C
• For China
D
• For Japan
E
PT
• Industrial applications
F
• Active RFID uses
N
G
• Smart utility networks (Smart Grids)

Introduction to Internet of Things 8


IEEE 802.15.4 Types
PAN
coordinator

EL
Networks
FFD Router
Non‐Beacon
Enabled

Beacon
Enabled
PT
802.15.4

RFD
Device

Device
N
(a) (b)

Introduction to Internet of Things


• Full Function Device (FFD)
• Can talk to all types of devices

EL
• Supports full protocol

• Reduced Function Device (RFD)


PT
• Can only talk to an FFD
• Lower power consumption
• Minimal CPU/RAM required
N
Introduction to Internet of Things
IEEE 802.15.4 Frames
Beacon

EL
MAC

Frames Command

PT Acknowledgement
N
Data

Introduction to Internet of Things


Beacon Enabled Networks

• Periodic transmission of beacon messages

EL
• Data‐frames sent via Slotted CSMA/CA with a super
frame structure managed by PAN coordinator
• Beacons used for synchronization & association of
PT
other nodes with the coordinator
• Scope of operation spans the whole network.
N
Introduction to Internet of Things
Non-Beacon Enabled Networks
• Data‐frames sent via un‐slotted CSMA/CA (Contention
Based)

EL
• Beacons used only for link layer discovery
• Requires both source and destination IDs.

PT
• As 802.15.4 is primarily, a mesh protocol, all protocol
addressing must adhere to mesh configurations
• De‐centralized communication amongst nodes
N
Introduction to Internet of Things
EL
Zigbee
PT
N
Introduction to Internet of Things 14
Features of ZigBee
 Most widely deployed enhancement of IEEE 802.15.4.

EL
 The ZigBee protocol is defined by layer 3 and above. It works with
the 802.15.4 layers 1 and 2.
 The standard uses layers 3 and 4 to define additional
communication enhancements.

PT
 These enhancements include authentication with valid nodes,
encryption for security, and a data routing and forwarding capability
that enables mesh networking.
 The most popular use of ZigBee is wireless sensor networks using
N
the mesh topology.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 15


EL
PT
N
Introduction to Internet of Things 16
Important Components

EL
• ZigBee Device Object
ZDO (Device management, Security, Policies)

APSPT • Application Support Sub‐layer


(Interfacing and control services, bridge
between network and other layers)
N
Introduction to Internet of Things 17
ZigBee Topologies

EL
PT
N
Source: T. Agarwal, “ZigBee Wireless Technology Architecture and Applications”, Electronics Projects Focus (Online)

Introduction to Internet of Things 18


ZigBee Mesh
 In a mesh, any node can

EL
communicate with any other
node within its range.
 If nodes are not in range,
messages are relayed through
intermediate nodes.
 This allows the network
PT
N
deployment over large areas.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 19


ZigBee Mesh (Contd.)
 Meshes have increased network

EL
reliability.
 For example, if nodes C and F
are down, the message packets
from A can still be relayed to G
via B and E.
 ZigBee mesh networks are self‐
PT
N
configuring and self‐healing.
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 20


ZigBee Types
 ZigBee Coordinator (ZC):

EL
 The Coordinator forms the root of the ZigBee network tree and might
act as a bridge between networks.
 There is a single ZigBee Coordinator in each network, which originally
initiates the network.
PT
 It stores information about the network under it and outside it.
 It acts as a Trust Center & repository for security keys.
N
Sources:
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2010-04-15.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2009-02-05.

Introduction to Internet of Things 21


ZigBee Types
 ZigBee Router (ZR):

EL
 Capable of running applications, as well as relaying information between
nodes connected to it.
 ZigBee End Device (ZED):
 It contains just enough functionality to talk to the parent node, and it

PT
cannot relay data from other devices.
 This allows the node to be asleep a significant amount of the time thereby
enhancing battery life.
 Memory requirements and cost of ZEDs are quite low, as compared to ZR
N
Sources: or ZC.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2010-04-15.
•"Wireless Sensor Networks Research Group". Sensor-networks.org. 2009-02-05.

Introduction to Internet of Things 22


ZigBee Network Layer
 The network layer uses Ad Hoc On‐Demand Distance Vector (AODV)

EL
routing.
 To find the final destination, the AODV broadcasts a route request
to all its immediate neighbors.

PT
 The neighbors relay the same information to their neighbors,
eventually spreading the request throughout the network.
 Upon discovery of the destination, a low‐cost path is calculated and
N
informed to the requesting device via unicast messaging.
Source: “Zigbee”, Wikipedia (Online)

Introduction to Internet of Things 23


Applications
 Building automation

EL
 Remote control (RF4CE or RF for consumer electronics)
 Smart energy for home energy monitoring
 Health care for medical and fitness monitoring


PT
Home automation for control of smart homes
Light Link for control of LED lighting
N
 Telecom services
Source: L.Fenzel, “What’s The Difference Between IEEE 802.15.4 And ZigBee Wireless?”, Electronic Design (Online), Mar. 2013

Introduction to Internet of Things 24


EL
PT
N
Introduction to Internet of Things 25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy