SlideShare a Scribd company logo
1 of 55
IoT communication technologies
U & P U Patel Department of Computer Engineering
Technical Deviations from Regular Web
U & P U Patel Department of Computer Engineering
Considerations
• Communication between the IoT device(s) and the outside world dictates
the network architecture.
• Choice of communication technology dictates the IoT device hardware
requirements and costs.
• Due to the presence of numerous applications of IoT enabled devices, a
single networking paradigm not sufficient to address all the needs of the
consumer or the IoT device.
U & P U Patel Department of Computer Engineering
Functionality-based IoT Protocol Organization
• 6LoWPAN,RPL
Connectivity
• EPC, uCode
• IPv6,URIs
Identification
• WIFI,Bluetooth,NFC,
• LPWAN
Communication/Transport
• Physical Web
• mDNS,DNS-SD
Discovery
• MQTT,CoAP,AMQP,
• WebSockets,Node
Data Protocols
• TR‐069, OMA‐DM
Device Management
• JSON‐LD, Web Thing Model
Semantic
• Alljoyn, IoTivity, Weave, Homekit
Multi‐layer Frameworks
U & P U Patel Department of Computer Engineering
IEEE 802.15.4
U & P U Patel Department of Computer Engineering
IEEE 802.15.4
• Well‐known standard for low data‐rate WPAN.
• Developed for low‐data‐rate monitoring and
control applications and extended‐life
low‐power‐consumption uses.
• Short range, low bit rate, low power
consumption
• Home
• Automotive
• Industrial applications
• Games
• Metering
• This standard uses only the first two layers (PHY,
MAC) plus the logical link control (LLC) and
service specific convergence sub‐layer (SSCS)
additions to communicate with all upper layers
• Operates in the ISM band.
Application
Layer
Presentation
Layer
Session Layer
Transport
Layer
Network Layer
Data Link
Layer
Physical Layer
Network
Layer
LLC
SSCS
MAC
Physical layer
IEEE
802.15.4
U & P U Patel Department of Computer Engineering
IEEE 802.15.4
Uses direct sequence
spread spectrum (DSSS)
modulation.
Highly tolerant of noise
and interference and offers
link reliability
improvement mechanisms.
Low‐speed versions use
Binary Phase Shift Keying
(BPSK).
High data‐rate versions use
offset‐quadrature
phase‐shift keying
(O‐QPSK).
Uses carrier sense multiple
access with collision
avoidance (CSMA‐CA) for
channel access.
Multiplexing allows
multiple users or nodes
interference‐free access to
the same channel at
different times.
Power consumption is
minimized due to
infrequently occurring very
short packet transmissions
with low duty cycle (<1%).
Transmission, for most
cases, is Line of Sight (LOS).
Standard transmission
range varies between 10m
to 75m.
Best case transmission
range achieved outdoors
can be upto1000m.
Networking topologies
defined are ‐
Star, and Mesh.
U & P U Patel Department of Computer Engineering
IEEE 802.15.4 Variants
A/B • Base version
C • For China
D • For Japan
E • Industrial applications
F • Active RFID uses
G • Smart utility networks (Smart Grids)
U & P U Patel Department of Computer Engineering
802.15.4
Channels
• 16 channels in the 2.4 GHz ISM band
• 10 channels in the 915 MHz ISM band in the USA
and Australia
• 1 channel in the European 868 MHz band
• 1 channel in China’s 784 MHz band
IEEE 802.15.4 PHY Overview Operating
Frequency Bands
U & P U Patel Department of Computer Engineering
802.15.4
FFD
PAN
coordinator
Router
Device
RFD Device
Full Function Device (FFD)
• Can talk to all types of
devices
• Supports full protocol
Reduced Function Device (RFD)
• Can only talk to an FFD
• Lower power consumption
• Minimal CPU/RAM required
IEEE 802.15.4 Frames
IEEE 802.15.4 Device classes
Frames
Beacon
MAC
Command
Acknowledgement
Data
U & P U Patel Department of Computer Engineering
Topology
IEEE 802.15.4 MAC Star Topology IEEE 802.15.4 MAC Peer to peer Topology
U & P U Patel Department of Computer Engineering
IEEE 802.15.4 Networks
• Periodic transmission of beacon messages
• Data‐frames sent via Slotted CSMA/CA with a superframe structure managed by PAN coordinator
• Beacons used for synchronization & association of other nodes with the coordinator
• Scope of operation spans the whole network.
Beacon Enabled Networks
• Data‐frames sent via un‐slotted CSMA/CA (ContentionBased)
• Beacons used only for link layer discovery
• Requires both source and destination IDs.
• As 802.15.4 is primarily, a mesh protocol, all protocol addressing must adhere to mesh
configurations
• De‐centralized communication amongst nodes
Non-Beacon Enabled Networks
U & P U Patel Department of Computer Engineering
IEEE 802.15.4 PHY Overview Packet Structure
PHY Packet Fields
• Preamble (32 bits) – synchronization
• Start of Packet Delimiter (8 bits)
• PHY Header (8 bits) – PSDU length
• PSDU (0 to 1016 bits) – Data field
IEEE 802.15.4 MAC Overview
General Frame Structure
U & P U Patel Department of Computer Engineering
ZigBee
• Most widely deployed enhancement of IEEE 802.15.4.
• The ZigBee protocol is defined by layer 3 and above. It works with the
802.15.4 layers 1 and 2.
• The standard uses layers 3 and 4 to define additional communication
enhancements.
• These enhancements include authentication with valid nodes,encryption
for security, and a data routing and forwarding capability that enables
mesh networking.
• The most popular use of ZigBee is wireless sensor networks using the
mesh topology.
U & P U Patel Department of Computer Engineering
ZigBee
U & P U Patel Department of Computer Engineering
Zigbee Network Overview:
U & P U Patel Department of Computer Engineering
ZigBee Architecture
Divided into three sections
• IEEE 802.15.4 which consists of MAC and
physical layers
• ZigBee layers, which consist of the network
layer, the ZigBee device object (ZDO), the
application sublayer, and security
management
• Manufacturer application: Manufacturers of
ZigBee devices can use the ZigBee application
profile or develop their own application
profile
U & P U Patel Department of Computer Engineering
Important Components
U & P U Patel Department of Computer Engineering
Application Support Sublayer (APS)
• Provides services necessary for application objects (endpoints) and the
ZigBee device object (ZDO)
• Some of services provided by the APS to the application objects for data
transfer are
• Request
• Confirm
• Response
U & P U Patel Department of Computer Engineering
ZigBee Device Object (ZDO)
• Control and management of application objects
• Performs overall device management tasks:
• Determines the type of device in a network (for example, end device, router, or
coordinator)
• Initializes the APS, network layer, and security service provider
• Performs device and service discovery
• Initializes coordinator for establishing a network
• Security management
• Network management
• ZigBee Addressing Mode
• ZigBee uses direct, group, and broadcast addressing for transmission of information
U & P U Patel Department of Computer Engineering
ZigBee Topologies
U & P U Patel Department of Computer Engineering
ZigBee Mesh
• In a mesh, any node can
communicate with any
other node within its range.
• If nodes are not in range,
messages are relayed
through intermediate
nodes.
• This allows the network
deployment over large
areas.
U & P U Patel Department of Computer Engineering
ZigBee Mesh (Contd.)
• Meshes have increased network
reliability.
• For example, if nodes C and F
are down, the message packets
from A can still be relayed to G
via B and E.
• ZigBee mesh networks are self
configuring and self‐healing.
U & P U Patel Department of Computer Engineering
ZigBee Types
• ZigBee Coordinator (ZC):
• The Coordinator forms the root of the ZigBee network tree and might act as a bridge
between networks.
• There is a single ZigBee Coordinator in each network, which originally initiates the network.
• It stores information about the network under it and outside it.
• It acts as a Trust Center & repository for security keys.
• ZigBee Router (ZR):
• Capable of running applications, as well as relaying information between nodes connected
to it.
• ZigBee End Device (ZED):
• It contains just enough functionality to talk to the parent node, and it cannot relay data
from other devices.
• This allows the node to be asleep a significant amount of the time thereby enhancing
battery life.
• Memory requirements and cost of ZEDs are quite low, as compared to ZR or ZC.
U & P U Patel Department of Computer Engineering
Network Layer
• Located between the MAC layer and application support sublayer
• Provides the following functions:
• Starting a network
• Managing end devices joining or leaving a network
• Route discovery
• Neighbor discovery
U & P U Patel Department of Computer Engineering
ZigBee Network Layer
• The network layer uses Ad Hoc On‐Demand Distance Vector (AODV)
routing.
• To find the final destination, the AODV broadcasts a route request to all its
immediate neighbors.
• The neighbors relay the same information to their neighbors, eventually
spreading the request throughout the network.
• Upon discovery of the destination, a low‐cost path is calculated and
informed to the requesting device via unicast messaging.
U & P U Patel Department of Computer Engineering
Zigbee 3.0:
• Enables interoperability among
different application profiles.
• The security layer is enhanced and here
there are two security modes
supported.
• Centralized: This mode is managed by
central co-ordinator. This co-ordinator
forms the network as well as takes care of
key assignment to the new joining nodes.
• Distributed: This mode does not have any
central co-ordinator. The zigbee router
itself manages network establishment and
key assignment to peer router in the
network.
U & P U Patel Department of Computer Engineering
Zigbee 3.0:
• Zigbee 3.0 support large number of nodes about 250.
• It also supports dynamic nature of the network.
• It supports rejoining of orphaned nodes with the new parent node in the
event of loss of parent.
• Zigbee 3.0 provides backward compatibility with other zigbee application
profiles such as zigbee light link 1.0 profile, zigbee home automation 1.2
profile etc.
U & P U Patel Department of Computer Engineering
APPLICATIONS
• Building automation
• Remote control (RF4CE or RF for consumer electronics)
• Smart energy for home energy monitoring
• Health care for medical and fitness monitoring
• Home automation for control of smart homes
• Light Link for control of LED lighting
• Telecom services
U & P U Patel Department of Computer Engineering
6LowPAN :Introduction
• Low‐power Wireless Personal Area Networks over IPv6.
• Allows for the smallest devices with limited processing ability to transmit
information wirelessly using an Internet protocol.
• Allows low‐power and memory constrained Embedded devices to connect
to the Internet.
• Created by the Internet Engineering Task Force (IETF) ‐ RFC 5933 and RFC
4919.
U & P U Patel Department of Computer Engineering
6LoWPAN
Adaptation
layer
U & P U Patel Department of Computer Engineering
6LoWPAN
• Edge Routers help
a 6LoWPAN domains to get into the
internet.
• Edge Router performs three main
tasks :
• Exchange of Info between 6LoWPAN
devices and the Internet.
• Data exchange between the devices
Present in 6LoWPAN domain.
• Generation and maintenance of the
radio subnet (6LoWPAN Island)
• All the motes or devices within
a 6LoWPAN domain share the
same Prefix (IPv6 addressing ) maximum frame
size 127 bytes
Minimum MTU size
1280 bytes.
6
L
o
W
P
A
N
Uses IPv6
Uses 802.15.4
Border
router Adaptation Layer
U & P U Patel Department of Computer Engineering
Features of 6LoWPANs
• Allows IEEE 802.15.4 radios to carry
128‐bit addresses of Internet Protocol
version 6 (IPv6).
• Header compression and address
translation techniques allow the IEEE
802.15.4 radios to access the Internet.
• IPv6 packets compressed and
reformatted to fit the IEEE802.15.4
packet format.
• Uses include IoT, Smart grid, and M2M
applications.
U & P U Patel Department of Computer Engineering
Addressing in 6LoWPAN
• 64‐bit addresses: globally unique
• 16 bit addresses: PAN specific;
assigned by PAN coordinator
• IPv6 multicast not supported by
802.15.4
• IPv6 packets carried as link layer
broadcast frames
Addressing
64 bit
Extended
16 bit
Short
U & P U Patel Department of Computer Engineering
6LoWPAN Packet format
U & P U Patel Department of Computer Engineering
Header Type: Dispatch Header
Dispatch: Initiates communication
• 0,1: Identifier for Dispatch Type
• Dispatch:
• 6 bits
• Identifies the next header type
• Type Specific Header:
• Determined by Dispatch header
U & P U Patel Department of Computer Engineering
Header Type: Mesh Addressing Header
1,0: ID for Mesh Addressing Header
• V: ‘0’ if originator is 64‐bit extended address, ‘1’ if 16‐bit address
• F: ‘0’ if destination is 64‐bit addr., ‘1’ if 16‐bit addr.
• Hops Left: decremented by each node before sending to next hop
U & P U Patel Department of Computer Engineering
Header Type: Fragmentation Header
(a) First Fragment
(b) Subsequent Fragment
U & P U Patel Department of Computer Engineering
6LoWPAN Routing Considerations
• Mesh routing within the PAN
space.
• Routing between IPv6 and the PAN
domain
• Routing protocols in use:
• LOADng
• RPL
U & P U Patel Department of Computer Engineering
LOADng Routing
• Lightweight On-demand Ad hoc Distance-vector
Routing Protocol – Next Generation (LOADng) is a
routing protocol,
• Derived from AODV and extended for use in Mobile
Ad hoc NETworks (MANETs) and Low-power and
Lossy Networks (LLNs).
• Basic operations of LOADng include:
• Generation of Route Requests (RREQs) by a LOADng
Router (originator) for discovering a route to a
destination,
• Forwarding of such RREQs until they reach the
destination LOADng Router,
• Generation of Route Replies (RREPs) upon receipt of
an RREQ by the indicated destination, and unicast
hop‐by‐hop forwarding of these RREPs towards the
originator.
U & P U Patel Department of Computer Engineering
Route Discovery Process
A
D
C
B
F
E
G
RREQ
RREQ
RREQ
Source Destination
U & P U Patel Department of Computer Engineering
An example of RREQ message flooding
• Router S initiates a route discovery to Router
D.
• The RREQ message generated by Router S is
retransmitted by other routers and flooded in
the network until it reaches the destination
router D.
• All the intermediate routers will set up a
“reverse route” to Router S.
U & P U Patel Department of Computer Engineering
Route Maintenance
• If a route is detected to be broken, a Route Error (RERR) message is
returned to the originator of that data packet to inform the originator
about the route breakage.
• Optimized flooding is supported, reducing the overhead incurred by RREQ
generation and flooding.
• Only the destination is permitted to respond to an RREQ.
• Intermediate LOADng Routers are explicitly prohibited from responding to RREQs,
even if they may have active routes to the sought destination.
• RREQ/RREP messages generated by a given LOADng Router share a single unique,
monotonically increasing sequence number.
U & P U Patel Department of Computer Engineering
How unicast RREP message forwarding works
• When the RREQ message reaches the
destination router D, D will generate an
RREP message.
• The RREP is unicast to the route
discovery originator S following the
reverse route established during the
RREQ flooding.
• All the routers receiving the RREP
message will establish a “forward route”
to Router D.
U & P U Patel Department of Computer Engineering
Smart Route Request
• Avoid flooding of network by RREQ
• If a intermediate node already knows the destination route, then directly RREQ is sent to
destination.
• Why don’t intermediate node inform source?
A
D
C
B
F
E
G
RREQ
RREQ
RREQ
Source Destination
If D knows the
destination
U & P U Patel Department of Computer Engineering
Expanding Ring Search
• Reduce the overhead & power
• Case-1
• Low TTL(time to live)
• If destination is in the vicinity of the source
• Case-2
• High TTL
• If destination is in the far away from the
source
A
D
C
B
F
E
G
RREQ
RREQ
RREQ
Source Case-2
Destination
Case-1
Destination
U & P U Patel Department of Computer Engineering
Collection Tree Protocol
A
F
R
B
C
D
E
G
R
H
I
J
K
Source Destination
• Appoint a
Collection node
in each PAN
• Stores the
address of all
the nodes
• Forwards the
RREQ packets
to the intended
destination
U & P U Patel Department of Computer Engineering
RPL Routing
• Developed by IETF Routing over Low-Power and Lossy Networks (ROLL) working group
• Low-Power and Lossy Networks (LLN) Routers have constraints on processing, memory,
and energy.
• Can’t use OSPF, OLSR, RIP, AODV, DSR, etc
• LLN links have high loss rate, low data rates, and instability
• expensive bits, dynamically formed topology
• Covers both wireless and wired networks
• Requires bidirectional links. May be symmetric/asymmetric.
• Ideal for n-to-1 (data sink) communications, e.g., meter reading 1-to-n and 1-to-1
possible with some extra work.
• Multiple LLN instances on the same physical networks
• Proactive: Maintaining routing topology.
• Reactive: Resolving routing inconsistencies.
U & P U Patel Department of Computer Engineering
RPL Routing
• RPL separates packet processing and forwarding from the routing
optimization objective, which helps in Low power Lossy Networks (LLN).
• RPL supports message confidentiality and integrity.
• Supports Data‐Path Validation and Loop Detection
• Routing optimization objectives include
• minimizing energy
• minimizing latency
• satisfying constraints (w.r.t node power, bandwidth, etc.)
U & P U Patel Department of Computer Engineering
RPL Concepts
• Directed Acyclic Graph (DAG): No cycles
• Root: No outgoing edge
• Destination-Oriented DAG (DODAG): Single root
• Up: Towards root
• Down: Away from root
• Objective Function: Minimize energy, latency, …
• Rank: Distance from root using specified objective
• RPL Instance: One or more DODAGs. A node may
belong to multiple RPL instances.
• DODAG ID: IPv6 Adr of the root
• DODAG Version: Current version of the DODAG. Every
time a new DODAG is computed with the same root,
its version incremented
U & P U Patel Department of Computer Engineering
RPL Concepts (Cont)
• Goal: Reachability goal, e.g., connected to database
• Grounded: Root can satisfy the goal
• Floating: Not grounded. Only in-DODAG communication.
• Parent: Immediate successor towards the root
• Sub-DODAG: Sub tree rooted at this node
• Storing: Nodes keep routing tables for sub- DODAG
• Non-Storing: Nodes know only parent. Do not keep a routing table.
U & P U Patel Department of Computer Engineering
RPL Control Messages
1. DODAG Information Object (DIO): Downward RPL
instance multicasts
• Allows other nodes to discover an RPL instance and join
it
2. DODAG Information Solicitation (DIS): Link-Local
multicast request for DIO (neighbor discovery). Do you
know of any DODAGs?
3. Destination Advertisement Object (DAO): From child to
parents or root. Can I join you as a child on DODAG #x?
4. DAO Ack: Yes, you can! Or Sorry, you cant!
5. Consistency Check: Challenge/response messages for
security
U & P U Patel Department of Computer Engineering
DODAG Formation Example
1. A multicasts DIOs that it’s member of DODAG ID
itself with Rank 0.
2. B, C, D, E hear and determine that their rank
(distance) is 1, 1, 3, 4, respectively from A
3. B, C, D, E send DAOs to A.
4. A accepts all
5. B and C multicast DIOs
6. D hears those and determines that its distance
from B and C is 1, 2
7. E hears both B, C and determines that its
distance from B and C is 2, 1
8. D sends a DAO to B E sends a DAO to C
9. B sends a DAO-Ack to D C sends a DAO-Ack to E
U & P U Patel Department of Computer Engineering
References
1. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
2. Clausen, T.; Colin de Verdiere, A.; Yi, J.; Niktash, A.; Igarashi, Y.; Satoh, H.; Herberg, U.; Lavenu, C. et al. (January
2016). The Lightweight On‐demand Ad hoc Distance‐vector Routing Protocol ‐ Next Generation (LOADng). IETF. I‐D
draft‐clausen‐lln‐loadng‐
3. T. Agarwal, “ZigBeeWireless Technology Architecture and Applications”, Electronics Projects Focus (Online)
U & P U Patel Department of Computer Engineering
Thank You…

More Related Content

Similar to Communication Technologies in IOT.pptx

The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccnavivek kumar
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptxPratik Gohel
 
CCNA Introducing
CCNA IntroducingCCNA Introducing
CCNA IntroducingTIB Academy
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx20CE112YASHPATEL
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxssuser52b751
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptxssuser5cb8d3
 

Similar to Communication Technologies in IOT.pptx (20)

Main document
Main documentMain document
Main document
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
ZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdfZigBee Technology PPT 2.pdf
ZigBee Technology PPT 2.pdf
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
IoT Control Units and Communication Models
IoT Control Units and Communication ModelsIoT Control Units and Communication Models
IoT Control Units and Communication Models
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
1.pptx
1.pptx1.pptx
1.pptx
 
6-IoT protocol.pptx
6-IoT protocol.pptx6-IoT protocol.pptx
6-IoT protocol.pptx
 
CCNA Introducing
CCNA IntroducingCCNA Introducing
CCNA Introducing
 
Data_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptxData_Processing_and_communication_bluetooth.pptx
Data_Processing_and_communication_bluetooth.pptx
 
Zigbee ppt
Zigbee pptZigbee ppt
Zigbee ppt
 
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptxConnecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
Connecting_Things_2.01_Instructor Supplemental Materials_Chapter4.pptx
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptx
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 

More from 20CE112YASHPATEL

InternetOFThings_network_communicqtionCoAP_.pptx
InternetOFThings_network_communicqtionCoAP_.pptxInternetOFThings_network_communicqtionCoAP_.pptx
InternetOFThings_network_communicqtionCoAP_.pptx20CE112YASHPATEL
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx20CE112YASHPATEL
 
Money Manager Presentation-2.pptx
Money Manager Presentation-2.pptxMoney Manager Presentation-2.pptx
Money Manager Presentation-2.pptx20CE112YASHPATEL
 

More from 20CE112YASHPATEL (7)

InternetOFThings_network_communicqtionCoAP_.pptx
InternetOFThings_network_communicqtionCoAP_.pptxInternetOFThings_network_communicqtionCoAP_.pptx
InternetOFThings_network_communicqtionCoAP_.pptx
 
DLP_Presentation.pptx
DLP_Presentation.pptxDLP_Presentation.pptx
DLP_Presentation.pptx
 
RFID.pptx
RFID.pptxRFID.pptx
RFID.pptx
 
Network_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptxNetwork_Layer_and_Internet_Protocols_IPv.pptx
Network_Layer_and_Internet_Protocols_IPv.pptx
 
Project.pptx
Project.pptxProject.pptx
Project.pptx
 
Prolog PPT_merged.pdf
Prolog PPT_merged.pdfProlog PPT_merged.pdf
Prolog PPT_merged.pdf
 
Money Manager Presentation-2.pptx
Money Manager Presentation-2.pptxMoney Manager Presentation-2.pptx
Money Manager Presentation-2.pptx
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Communication Technologies in IOT.pptx

  • 2. U & P U Patel Department of Computer Engineering Technical Deviations from Regular Web
  • 3. U & P U Patel Department of Computer Engineering Considerations • Communication between the IoT device(s) and the outside world dictates the network architecture. • Choice of communication technology dictates the IoT device hardware requirements and costs. • Due to the presence of numerous applications of IoT enabled devices, a single networking paradigm not sufficient to address all the needs of the consumer or the IoT device.
  • 4. U & P U Patel Department of Computer Engineering Functionality-based IoT Protocol Organization • 6LoWPAN,RPL Connectivity • EPC, uCode • IPv6,URIs Identification • WIFI,Bluetooth,NFC, • LPWAN Communication/Transport • Physical Web • mDNS,DNS-SD Discovery • MQTT,CoAP,AMQP, • WebSockets,Node Data Protocols • TR‐069, OMA‐DM Device Management • JSON‐LD, Web Thing Model Semantic • Alljoyn, IoTivity, Weave, Homekit Multi‐layer Frameworks
  • 5. U & P U Patel Department of Computer Engineering IEEE 802.15.4
  • 6. U & P U Patel Department of Computer Engineering IEEE 802.15.4 • Well‐known standard for low data‐rate WPAN. • Developed for low‐data‐rate monitoring and control applications and extended‐life low‐power‐consumption uses. • Short range, low bit rate, low power consumption • Home • Automotive • Industrial applications • Games • Metering • This standard uses only the first two layers (PHY, MAC) plus the logical link control (LLC) and service specific convergence sub‐layer (SSCS) additions to communicate with all upper layers • Operates in the ISM band. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer LLC SSCS MAC Physical layer IEEE 802.15.4
  • 7. U & P U Patel Department of Computer Engineering IEEE 802.15.4 Uses direct sequence spread spectrum (DSSS) modulation. Highly tolerant of noise and interference and offers link reliability improvement mechanisms. Low‐speed versions use Binary Phase Shift Keying (BPSK). High data‐rate versions use offset‐quadrature phase‐shift keying (O‐QPSK). Uses carrier sense multiple access with collision avoidance (CSMA‐CA) for channel access. Multiplexing allows multiple users or nodes interference‐free access to the same channel at different times. Power consumption is minimized due to infrequently occurring very short packet transmissions with low duty cycle (<1%). Transmission, for most cases, is Line of Sight (LOS). Standard transmission range varies between 10m to 75m. Best case transmission range achieved outdoors can be upto1000m. Networking topologies defined are ‐ Star, and Mesh.
  • 8. U & P U Patel Department of Computer Engineering IEEE 802.15.4 Variants A/B • Base version C • For China D • For Japan E • Industrial applications F • Active RFID uses G • Smart utility networks (Smart Grids)
  • 9. U & P U Patel Department of Computer Engineering 802.15.4 Channels • 16 channels in the 2.4 GHz ISM band • 10 channels in the 915 MHz ISM band in the USA and Australia • 1 channel in the European 868 MHz band • 1 channel in China’s 784 MHz band IEEE 802.15.4 PHY Overview Operating Frequency Bands
  • 10. U & P U Patel Department of Computer Engineering 802.15.4 FFD PAN coordinator Router Device RFD Device Full Function Device (FFD) • Can talk to all types of devices • Supports full protocol Reduced Function Device (RFD) • Can only talk to an FFD • Lower power consumption • Minimal CPU/RAM required IEEE 802.15.4 Frames IEEE 802.15.4 Device classes Frames Beacon MAC Command Acknowledgement Data
  • 11. U & P U Patel Department of Computer Engineering Topology IEEE 802.15.4 MAC Star Topology IEEE 802.15.4 MAC Peer to peer Topology
  • 12. U & P U Patel Department of Computer Engineering IEEE 802.15.4 Networks • Periodic transmission of beacon messages • Data‐frames sent via Slotted CSMA/CA with a superframe structure managed by PAN coordinator • Beacons used for synchronization & association of other nodes with the coordinator • Scope of operation spans the whole network. Beacon Enabled Networks • Data‐frames sent via un‐slotted CSMA/CA (ContentionBased) • Beacons used only for link layer discovery • Requires both source and destination IDs. • As 802.15.4 is primarily, a mesh protocol, all protocol addressing must adhere to mesh configurations • De‐centralized communication amongst nodes Non-Beacon Enabled Networks
  • 13. U & P U Patel Department of Computer Engineering IEEE 802.15.4 PHY Overview Packet Structure PHY Packet Fields • Preamble (32 bits) – synchronization • Start of Packet Delimiter (8 bits) • PHY Header (8 bits) – PSDU length • PSDU (0 to 1016 bits) – Data field IEEE 802.15.4 MAC Overview General Frame Structure
  • 14. U & P U Patel Department of Computer Engineering ZigBee • Most widely deployed enhancement of IEEE 802.15.4. • The ZigBee protocol is defined by layer 3 and above. It works with the 802.15.4 layers 1 and 2. • The standard uses layers 3 and 4 to define additional communication enhancements. • These enhancements include authentication with valid nodes,encryption for security, and a data routing and forwarding capability that enables mesh networking. • The most popular use of ZigBee is wireless sensor networks using the mesh topology.
  • 15. U & P U Patel Department of Computer Engineering ZigBee
  • 16. U & P U Patel Department of Computer Engineering Zigbee Network Overview:
  • 17. U & P U Patel Department of Computer Engineering ZigBee Architecture Divided into three sections • IEEE 802.15.4 which consists of MAC and physical layers • ZigBee layers, which consist of the network layer, the ZigBee device object (ZDO), the application sublayer, and security management • Manufacturer application: Manufacturers of ZigBee devices can use the ZigBee application profile or develop their own application profile
  • 18. U & P U Patel Department of Computer Engineering Important Components
  • 19. U & P U Patel Department of Computer Engineering Application Support Sublayer (APS) • Provides services necessary for application objects (endpoints) and the ZigBee device object (ZDO) • Some of services provided by the APS to the application objects for data transfer are • Request • Confirm • Response
  • 20. U & P U Patel Department of Computer Engineering ZigBee Device Object (ZDO) • Control and management of application objects • Performs overall device management tasks: • Determines the type of device in a network (for example, end device, router, or coordinator) • Initializes the APS, network layer, and security service provider • Performs device and service discovery • Initializes coordinator for establishing a network • Security management • Network management • ZigBee Addressing Mode • ZigBee uses direct, group, and broadcast addressing for transmission of information
  • 21. U & P U Patel Department of Computer Engineering ZigBee Topologies
  • 22. U & P U Patel Department of Computer Engineering ZigBee Mesh • In a mesh, any node can communicate with any other node within its range. • If nodes are not in range, messages are relayed through intermediate nodes. • This allows the network deployment over large areas.
  • 23. U & P U Patel Department of Computer Engineering ZigBee Mesh (Contd.) • Meshes have increased network reliability. • For example, if nodes C and F are down, the message packets from A can still be relayed to G via B and E. • ZigBee mesh networks are self configuring and self‐healing.
  • 24. U & P U Patel Department of Computer Engineering ZigBee Types • ZigBee Coordinator (ZC): • The Coordinator forms the root of the ZigBee network tree and might act as a bridge between networks. • There is a single ZigBee Coordinator in each network, which originally initiates the network. • It stores information about the network under it and outside it. • It acts as a Trust Center & repository for security keys. • ZigBee Router (ZR): • Capable of running applications, as well as relaying information between nodes connected to it. • ZigBee End Device (ZED): • It contains just enough functionality to talk to the parent node, and it cannot relay data from other devices. • This allows the node to be asleep a significant amount of the time thereby enhancing battery life. • Memory requirements and cost of ZEDs are quite low, as compared to ZR or ZC.
  • 25. U & P U Patel Department of Computer Engineering Network Layer • Located between the MAC layer and application support sublayer • Provides the following functions: • Starting a network • Managing end devices joining or leaving a network • Route discovery • Neighbor discovery
  • 26. U & P U Patel Department of Computer Engineering ZigBee Network Layer • The network layer uses Ad Hoc On‐Demand Distance Vector (AODV) routing. • To find the final destination, the AODV broadcasts a route request to all its immediate neighbors. • The neighbors relay the same information to their neighbors, eventually spreading the request throughout the network. • Upon discovery of the destination, a low‐cost path is calculated and informed to the requesting device via unicast messaging.
  • 27. U & P U Patel Department of Computer Engineering Zigbee 3.0: • Enables interoperability among different application profiles. • The security layer is enhanced and here there are two security modes supported. • Centralized: This mode is managed by central co-ordinator. This co-ordinator forms the network as well as takes care of key assignment to the new joining nodes. • Distributed: This mode does not have any central co-ordinator. The zigbee router itself manages network establishment and key assignment to peer router in the network.
  • 28. U & P U Patel Department of Computer Engineering Zigbee 3.0: • Zigbee 3.0 support large number of nodes about 250. • It also supports dynamic nature of the network. • It supports rejoining of orphaned nodes with the new parent node in the event of loss of parent. • Zigbee 3.0 provides backward compatibility with other zigbee application profiles such as zigbee light link 1.0 profile, zigbee home automation 1.2 profile etc.
  • 29. U & P U Patel Department of Computer Engineering APPLICATIONS • Building automation • Remote control (RF4CE or RF for consumer electronics) • Smart energy for home energy monitoring • Health care for medical and fitness monitoring • Home automation for control of smart homes • Light Link for control of LED lighting • Telecom services
  • 30. U & P U Patel Department of Computer Engineering 6LowPAN :Introduction • Low‐power Wireless Personal Area Networks over IPv6. • Allows for the smallest devices with limited processing ability to transmit information wirelessly using an Internet protocol. • Allows low‐power and memory constrained Embedded devices to connect to the Internet. • Created by the Internet Engineering Task Force (IETF) ‐ RFC 5933 and RFC 4919.
  • 31. U & P U Patel Department of Computer Engineering 6LoWPAN Adaptation layer
  • 32. U & P U Patel Department of Computer Engineering 6LoWPAN • Edge Routers help a 6LoWPAN domains to get into the internet. • Edge Router performs three main tasks : • Exchange of Info between 6LoWPAN devices and the Internet. • Data exchange between the devices Present in 6LoWPAN domain. • Generation and maintenance of the radio subnet (6LoWPAN Island) • All the motes or devices within a 6LoWPAN domain share the same Prefix (IPv6 addressing ) maximum frame size 127 bytes Minimum MTU size 1280 bytes. 6 L o W P A N Uses IPv6 Uses 802.15.4 Border router Adaptation Layer
  • 33. U & P U Patel Department of Computer Engineering Features of 6LoWPANs • Allows IEEE 802.15.4 radios to carry 128‐bit addresses of Internet Protocol version 6 (IPv6). • Header compression and address translation techniques allow the IEEE 802.15.4 radios to access the Internet. • IPv6 packets compressed and reformatted to fit the IEEE802.15.4 packet format. • Uses include IoT, Smart grid, and M2M applications.
  • 34. U & P U Patel Department of Computer Engineering Addressing in 6LoWPAN • 64‐bit addresses: globally unique • 16 bit addresses: PAN specific; assigned by PAN coordinator • IPv6 multicast not supported by 802.15.4 • IPv6 packets carried as link layer broadcast frames Addressing 64 bit Extended 16 bit Short
  • 35. U & P U Patel Department of Computer Engineering 6LoWPAN Packet format
  • 36. U & P U Patel Department of Computer Engineering Header Type: Dispatch Header Dispatch: Initiates communication • 0,1: Identifier for Dispatch Type • Dispatch: • 6 bits • Identifies the next header type • Type Specific Header: • Determined by Dispatch header
  • 37. U & P U Patel Department of Computer Engineering Header Type: Mesh Addressing Header 1,0: ID for Mesh Addressing Header • V: ‘0’ if originator is 64‐bit extended address, ‘1’ if 16‐bit address • F: ‘0’ if destination is 64‐bit addr., ‘1’ if 16‐bit addr. • Hops Left: decremented by each node before sending to next hop
  • 38. U & P U Patel Department of Computer Engineering Header Type: Fragmentation Header (a) First Fragment (b) Subsequent Fragment
  • 39. U & P U Patel Department of Computer Engineering 6LoWPAN Routing Considerations • Mesh routing within the PAN space. • Routing between IPv6 and the PAN domain • Routing protocols in use: • LOADng • RPL
  • 40. U & P U Patel Department of Computer Engineering LOADng Routing • Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng) is a routing protocol, • Derived from AODV and extended for use in Mobile Ad hoc NETworks (MANETs) and Low-power and Lossy Networks (LLNs). • Basic operations of LOADng include: • Generation of Route Requests (RREQs) by a LOADng Router (originator) for discovering a route to a destination, • Forwarding of such RREQs until they reach the destination LOADng Router, • Generation of Route Replies (RREPs) upon receipt of an RREQ by the indicated destination, and unicast hop‐by‐hop forwarding of these RREPs towards the originator.
  • 41. U & P U Patel Department of Computer Engineering Route Discovery Process A D C B F E G RREQ RREQ RREQ Source Destination
  • 42. U & P U Patel Department of Computer Engineering An example of RREQ message flooding • Router S initiates a route discovery to Router D. • The RREQ message generated by Router S is retransmitted by other routers and flooded in the network until it reaches the destination router D. • All the intermediate routers will set up a “reverse route” to Router S.
  • 43. U & P U Patel Department of Computer Engineering Route Maintenance • If a route is detected to be broken, a Route Error (RERR) message is returned to the originator of that data packet to inform the originator about the route breakage. • Optimized flooding is supported, reducing the overhead incurred by RREQ generation and flooding. • Only the destination is permitted to respond to an RREQ. • Intermediate LOADng Routers are explicitly prohibited from responding to RREQs, even if they may have active routes to the sought destination. • RREQ/RREP messages generated by a given LOADng Router share a single unique, monotonically increasing sequence number.
  • 44. U & P U Patel Department of Computer Engineering How unicast RREP message forwarding works • When the RREQ message reaches the destination router D, D will generate an RREP message. • The RREP is unicast to the route discovery originator S following the reverse route established during the RREQ flooding. • All the routers receiving the RREP message will establish a “forward route” to Router D.
  • 45. U & P U Patel Department of Computer Engineering Smart Route Request • Avoid flooding of network by RREQ • If a intermediate node already knows the destination route, then directly RREQ is sent to destination. • Why don’t intermediate node inform source? A D C B F E G RREQ RREQ RREQ Source Destination If D knows the destination
  • 46. U & P U Patel Department of Computer Engineering Expanding Ring Search • Reduce the overhead & power • Case-1 • Low TTL(time to live) • If destination is in the vicinity of the source • Case-2 • High TTL • If destination is in the far away from the source A D C B F E G RREQ RREQ RREQ Source Case-2 Destination Case-1 Destination
  • 47. U & P U Patel Department of Computer Engineering Collection Tree Protocol A F R B C D E G R H I J K Source Destination • Appoint a Collection node in each PAN • Stores the address of all the nodes • Forwards the RREQ packets to the intended destination
  • 48. U & P U Patel Department of Computer Engineering RPL Routing • Developed by IETF Routing over Low-Power and Lossy Networks (ROLL) working group • Low-Power and Lossy Networks (LLN) Routers have constraints on processing, memory, and energy. • Can’t use OSPF, OLSR, RIP, AODV, DSR, etc • LLN links have high loss rate, low data rates, and instability • expensive bits, dynamically formed topology • Covers both wireless and wired networks • Requires bidirectional links. May be symmetric/asymmetric. • Ideal for n-to-1 (data sink) communications, e.g., meter reading 1-to-n and 1-to-1 possible with some extra work. • Multiple LLN instances on the same physical networks • Proactive: Maintaining routing topology. • Reactive: Resolving routing inconsistencies.
  • 49. U & P U Patel Department of Computer Engineering RPL Routing • RPL separates packet processing and forwarding from the routing optimization objective, which helps in Low power Lossy Networks (LLN). • RPL supports message confidentiality and integrity. • Supports Data‐Path Validation and Loop Detection • Routing optimization objectives include • minimizing energy • minimizing latency • satisfying constraints (w.r.t node power, bandwidth, etc.)
  • 50. U & P U Patel Department of Computer Engineering RPL Concepts • Directed Acyclic Graph (DAG): No cycles • Root: No outgoing edge • Destination-Oriented DAG (DODAG): Single root • Up: Towards root • Down: Away from root • Objective Function: Minimize energy, latency, … • Rank: Distance from root using specified objective • RPL Instance: One or more DODAGs. A node may belong to multiple RPL instances. • DODAG ID: IPv6 Adr of the root • DODAG Version: Current version of the DODAG. Every time a new DODAG is computed with the same root, its version incremented
  • 51. U & P U Patel Department of Computer Engineering RPL Concepts (Cont) • Goal: Reachability goal, e.g., connected to database • Grounded: Root can satisfy the goal • Floating: Not grounded. Only in-DODAG communication. • Parent: Immediate successor towards the root • Sub-DODAG: Sub tree rooted at this node • Storing: Nodes keep routing tables for sub- DODAG • Non-Storing: Nodes know only parent. Do not keep a routing table.
  • 52. U & P U Patel Department of Computer Engineering RPL Control Messages 1. DODAG Information Object (DIO): Downward RPL instance multicasts • Allows other nodes to discover an RPL instance and join it 2. DODAG Information Solicitation (DIS): Link-Local multicast request for DIO (neighbor discovery). Do you know of any DODAGs? 3. Destination Advertisement Object (DAO): From child to parents or root. Can I join you as a child on DODAG #x? 4. DAO Ack: Yes, you can! Or Sorry, you cant! 5. Consistency Check: Challenge/response messages for security
  • 53. U & P U Patel Department of Computer Engineering DODAG Formation Example 1. A multicasts DIOs that it’s member of DODAG ID itself with Rank 0. 2. B, C, D, E hear and determine that their rank (distance) is 1, 1, 3, 4, respectively from A 3. B, C, D, E send DAOs to A. 4. A accepts all 5. B and C multicast DIOs 6. D hears those and determines that its distance from B and C is 1, 2 7. E hears both B, C and determines that its distance from B and C is 2, 1 8. D sends a DAO to B E sends a DAO to C 9. B sends a DAO-Ack to D C sends a DAO-Ack to E
  • 54. U & P U Patel Department of Computer Engineering References 1. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander, “RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012 2. Clausen, T.; Colin de Verdiere, A.; Yi, J.; Niktash, A.; Igarashi, Y.; Satoh, H.; Herberg, U.; Lavenu, C. et al. (January 2016). The Lightweight On‐demand Ad hoc Distance‐vector Routing Protocol ‐ Next Generation (LOADng). IETF. I‐D draft‐clausen‐lln‐loadng‐ 3. T. Agarwal, “ZigBeeWireless Technology Architecture and Applications”, Electronics Projects Focus (Online)
  • 55. U & P U Patel Department of Computer Engineering Thank You…