SlideShare a Scribd company logo
1 of 40
Dr Mallikarjunaswamy N J
1
ī‚¨INTERNET OF THINGS
MODULE-3
By
Dr. Mallikarjunaswamy N J
IP as the IoT Network Layer:
ī‚¨ The Business Case for IP
ī‚¨ The Need for Optimization
ī‚¨ Optimizing IP for IoT
ī‚¨ Profiles and Compliances
Dr Mallikarjunaswamy N J
2
The Key Advantages of
Internet Protocol
ī‚¨ 1. Open and standards-based:
ī‚¨ 2. Versatile:
ī‚¨ 3. Ubiquitous:
ī‚¨ 4. Scalable:
ī‚¨ 5. Manageable and highly secure:
ī‚¨ 6. Stable and resilient:
ī‚¨ 7. Consumers’ market adoption:
ī‚¨ 8. The innovation factor:
Dr Mallikarjunaswamy N J
3
Adoption or Adaptation of the Internet
Protocol:
ī‚¨ Adaptation means application layered gateways (ALGs) must be implemented to ensure the
translation between non-IP and IP layers.
ī‚¨ Adoption involves replacing all non-IP layers with their IP layer counterparts, simplifying the
deployment model and operations.
ī‚¨ Supervisory control and data acquisition (SCADA) applications are typical examples of
vertical market deployments that operate both the IP adaptation model and the adoption
model.
ī‚¨ SCADA is an automation control system for remote monitoring and control of equipment.
ī‚¨ Implementations that make use of IP adaptation have SCADA devices attached through serial
interfaces to a gateway tunneling or translating the traffic.
ī‚¨ With the IP adoption model, SCADA devices are attached via Ethernet to switches and
routers.
ī‚¨ Another example is a ZigBee solution that runs a non-IP stack between devices and a ZigBee
gateway that forwards traffic to an application server.
ī‚¨ A ZigBee gateway often acts as a translator between the ZigBee and IP protocol stacks.
Dr Mallikarjunaswamy N J
4
which model is best suited for
last-mile connectivity:
ī‚¨ Bidirectional versus unidirectional data flow:
ī‚¨ Overhead for last-mile communications paths:
ī‚¨ Data flow model:
ī‚¨ Network diversity:
Dr Mallikarjunaswamy N J
5
The Need for Optimization:
ī‚¨ Constrained Nodes:
ī‚¨ IoT node may be required to communicate through an unreliable path.
ī‚¨ power consumption is a key characteristic of constrained nodes.
ī‚¨ Many IoT devices are battery powered, with lifetime battery requirements varying from a few
months to 10+ years.
ī‚¨ This drives the selection of networking technologies since high-speed ones, such as Ethernet,
Wi-Fi, and cellular, are not (yet) capable of multi-year battery life.
ī‚¨ Current capabilities practically allow less than a year for these technologies on battery-
powered nodes.
ī‚¨ power consumption is much less of a concern on nodes that do not require batteries as an
energy source.
Dr Mallikarjunaswamy N J
6
IoT constrained nodes can be classified as
follows:
1. Devices that are very constrained in resources, may communicate infrequently
to transmit a few bytes, and may have limited security and management
capabilities:
2. Devices with enough power and capacities to implement a stripped downIP
stack or non-IP stack:
3. Devices that are similar to generic PCs in terms of computing and power
resources but have constrained networking capacities, such as bandwidth:
Dr Mallikarjunaswamy N J
7
Constrained Networks:
ī‚¨ limited by low-power, low-bandwidth links
ī‚¨ high latency and a high potential for packet loss
ī‚¨ They operate between a few kbps and a few hundred kbps.
ī‚¨ unpredictable errors and even loss of connectivity
ī‚¨ packet delivery rate (PDR) to oscillate between low and high percentages.
ī‚¨ highly stable and fast links are available.
ī‚¨ limited by low-power, low-bandwidth links (wireless and wired).
Dr Mallikarjunaswamy N J
8
IP Versions:
ī‚¤ For 20+ years, the IETF has been working on transitioning the Internet
ī‚¨ from IP version 4 to IP version 6.
ī‚¤ The main driving force has been the lack of address space in IPv4 as the
Internet has grown.
ī‚¤ IPv6 has a much larger range of addresses that should not be exhausted for
the foreseeable future.
ī‚¤ Today, both versions of IP run over the Internet, but most traffic is still
IPv4 based.
ī‚¤ A variety of factors dictate whether IPv4, IPv6, or both can be used in an
IoT solution.
ī‚¤ Most often these factors include a legacy protocol or technology that
supports only IPv4.
Dr Mallikarjunaswamy N J
9
The following are some of the main factors applicable to
IPv4 and IPv6 support in an IoT solution:
ī‚¨ Application Protocol:
ī‚¨ Cellular Provider and Technology:
ī‚¨ Serial Communications:
ī‚¨ IPv6 Adaptation Layer:
Dr Mallikarjunaswamy N J
10
IPv6 Adaptation Layer:
Optimizing IP for IoT:
Dr Mallikarjunaswamy N J
11
From 6LoWPAN to 6Lo:
Dr Mallikarjunaswamy N J
12
6LoWPAN
Dr Mallikarjunaswamy N J
13
Figure shows the sub headers related to compression,
fragmentation, and mesh addressing.
Dr Mallikarjunaswamy N J
14
6LoWPAN
Dr Mallikarjunaswamy N J
15
Fragmentation:
ī‚¤ The maximum transmission unit (MTU)for an IPv6 network must be at
least 1280 bytes.
ī‚¤ The term MTU defines the size of the largest protocol data unit that can be
passed.
ī‚¤ For IEEE 802.15.4, 127 bytes is the MTU.
ī‚¤ In IPv6, with a much larger MTU, is carried inside the 802.15.4 frame with
a much smaller one.
ī‚¤ Toremedy this situation, large IPv6 packets must be fragmented across
multiple 802.15.4 frames at Layer 2.
Dr Mallikarjunaswamy N J
16
Fragmentation
ī‚¤ The fragment header utilized by 6LoWPAN is composed of three primary
fields:
īŽ Datagram Size, Datagram Tag, and Datagram Offset.
ī‚¤ The 1-byte Datagram Size field specifies the total size of the unfragmented
payload.
ī‚¤ Datagram Tag identifies the set of fragments for a payload.
ī‚¤ Finally, the Datagram Offset field delineates how far into apayload a
particular fragment occurs.
ī‚¤ Figure provides an overview of a 6LoWPAN fragmentation header.
Dr Mallikarjunaswamy N J
17
6lOWPAN Fragmentation Header
Dr Mallikarjunaswamy N J
18
6lOWPAN Fragmentation
Header
Dr Mallikarjunaswamy N J
19
Mesh Addressing:
ī‚¨ The purpose of the 6LoWPAN mesh addressing function is to
forward packets over multiple hops.
ī‚¨ Three fields are defined for this header: Hop Limit, Source
Address, and Destination Address.
ī‚¨ hop limit for mesh addressing also provides an upper limit on
how many times the frame can be forwarded.
ī‚¨ Each hop decrements this value by 1 as it is forwarded.
ī‚¨ Once the value hits 0, it is dropped and no longer forwarded.
Dr Mallikarjunaswamy N J
20
6LoWPAN Mesh Addressing
Header
Dr Mallikarjunaswamy N J
21
6TiSCH:
ī‚¨ IEEE 802.15.4e, Time-Slotted Channel Hopping (TSCH), is an
add-on to the Media Access Control (MAC) portion of the IEEE
802.15.4 standard, with direct inheritance from other standards,
such as WirelessHART and ISA100.11a.
ī‚¨ Devices implementing IEEE 802.15.4e TSCH communicate by
following a Time Division Multiple Access (TDMA) schedule.
ī‚¨ An allocation of a unit of bandwidth or time slot is scheduled
between neighbor nodes.
Dr Mallikarjunaswamy N J
22
The 6TiSCH architecture defines four schedule
management mechanisms:
ī‚¨ Static scheduling: (Slotted aloha)
ī‚¨ Neighbor-to-neighbor scheduling: (add and
delete cells)
ī‚¨ Remote monitoring and scheduling
management: (management entity
responsible to allocate time slots )
ī‚¨ Hop-by-hop scheduling: (source node is
responsible to allocate time slots &
resources) Dr Mallikarjunaswamy N J
23
four schedule management
mechanisms:
Dr Mallikarjunaswamy N J
24
There are three 6TiSCH forwarding
models:
ī‚¨ Track Forwarding (TF):
īƒ˜ A “track” in this model is a unidirectional path between a source and
a destination.
ī‚¨ Fragment forwarding (FF):
īƒ˜ IPv6 packets can get fragmented at source node and reassemble at
des.
ī‚¨ IPv6 Forwarding (6F):
īƒ˜ Maintains IPv6 routing table to give priority to the pkts(QOS) and to avoid
collision of pkts(RED).
Dr Mallikarjunaswamy N J
25
RPL:
ī‚¨ RPL (Routing Protocol for Low Power and Lossy Networks ):
ī‚¨ In an RPL network, each node acts as a router and becomes part of a
mesh network.
ī‚¨ Ø Routing is performed at the IP layer.
ī‚¨ Ø Each node examines every received IPv6 packet anddetermines
the next-hop destination based on the information contained in the
IPv6 header.
ī‚¨ Ø Noinformation from the MAC-layer header is needed to perform
next-hop determination.
Dr Mallikarjunaswamy N J
26
The protocol defines two modes:
ī‚¨ Storing mode:
ī‚¨ Non-storing mode:
Dr Mallikarjunaswamy N J
27
RPL Modes
Dr Mallikarjunaswamy N J
28
RPL (Routing Protocol for Low Power and
Lossy Networks ):
Dr Mallikarjunaswamy N J
29
DAG and DODAG
Comparison
Dr Mallikarjunaswamy N J
30
Figure shows how DAO and DIO messages move both up and down the
DODAG, depending on the exact message type.
Dr Mallikarjunaswamy N J
31
DIO & DAO
Dr Mallikarjunaswamy N J
32
RPL Headers:
ī‚¨ Specific network layer headers are defined for datagrams being forwarded
within an RPL domain.
ī‚¨ Ø One of the headers is standardized in RFC 6553, “The Routing Protocol
for Low- Power and Lossy Networks (RPL) Option for Carrying RPL
Information in Data- Plane Datagrams,” and the other is discussed in RFC
6554, “An IPv6 Routing Header for Source Routes with the Routing
Protocol for Low-Power and Lossy Networks
ī‚¨ The RPL option is carried in the IPv6 Hop-by-Hop header.
ī‚¨ Ø The purpose of this header is to leverage data-plane packets for loop
detection in a RPL instance.
ī‚¨ Ø DODAGs only have single paths and should be loop free.
ī‚¨ Ø RFC 6554 specifies the Source Routing Header (SRH) for use between
RPL routers.
ī‚¨
Dr Mallikarjunaswamy N J
33
Metrics: (RPL Metrics)
1. Expected Transmission Count
(ETX):
2. Hop Count: (higher hop counts)
3. Latency: (low Latency)
4. Link Quality Level: (high level of quality)
5. Link Color: (link more or less desirable)
6. Node State and Attribute: (high workload &
CPU)
7. Node Energy: (low power)
8. Throughput: (maximum)Dr Mallikarjunaswamy N J
34
Authentication and Encryption on Constrained Nodes:
ī‚¨ the Authentication and Authorization for Constrained Environments (ACE)
working group is tasked with evaluating the applicability of existing
authentication and authorization protocols and documenting their
suitability for certain constrained-environment use cases.
ī‚¨ Ø Once the candidate solutions are validated, the ACE working group will
focus its work on CoAP with the Datagram Transport Layer Security
(DTLS) protocol.
ī‚¨ Ø The ACE working group expects to produce a standardized solution for
authentication and authorization that enables authorized access (Get, Put,
Post, Delete) to resources identified by a URI and hosted on a resource
server in constrained environments.
Dr Mallikarjunaswamy N J
35
DICE:
ī‚¨ Ø New generations of constrained nodes implementing an IP stack over
constrained access networks are expected to run an optimized IP protocol
stack.
ī‚¨ Ø For example, when implementing UDP at the transport layer, the IETF
Constrained Application Protocol (CoAP) should be used at the application
layer.
ī‚¨ Ø In constrained environments secured by DTLS, CoAP can be used
to control resources on a device.
Dr Mallikarjunaswamy N J
36
Application Protocols for IoT
ī‚¨ This chapter focuses on how higher-layer IoT protocols are transported.
Specifically, this chapter includes the following sections:
ī‚¨ The Transport Layer:
ī‚¨ IP-based networks use either TCP or UDP.
ī‚¨ With the TCP/IP protocol, two main protocols are specified for the
transport layer:
ī‚¨ Transmission Control Protocol (TCP):
ī‚¨ User Datagram Protocol (UDP):
Dr Mallikarjunaswamy N J
37
IoT Application Transport Methods:
1. Application layer protocol not present:
īƒ˜ Lower layers transport data so application layer not needed
2. Supervisory control and data acquisition
(SCADA):
īƒ˜ Monitoring and controlling remote physical equipment
3 Generic web-based protocols: (wifi, Ethernet, etc )
4. IoT application layer protocols: (MQTT)
īƒ˜ Reduces number of connection b/w peripheral devices
Dr Mallikarjunaswamy N J
38
MQTT: Message Queuing
Telemetry Transport
Dr Mallikarjunaswamy N J
39
Dr Mallikarjunaswamy N J
40
MQTT: Message Queuing
Telemetry Transport

More Related Content

What's hot

Syed IoT - module 5
Syed  IoT - module 5Syed  IoT - module 5
Syed IoT - module 5Syed Mustafa
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardGiuseppe Anastasi
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoTGanesh Awati
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee PresentationMaathu Michael
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2Hitesh Mohapatra
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3Syed Mustafa
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)rjain51
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io tShilpaKrishna6
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic designudhayakumarc1
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry PiYash Gajera
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingPeter R. Egli
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology poonam kumawat
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 

What's hot (20)

IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Syed IoT - module 5
Syed  IoT - module 5Syed  IoT - module 5
Syed IoT - module 5
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
15CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 315CS81- IoT- VTU- module 3
15CS81- IoT- VTU- module 3
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Ipv6
Ipv6Ipv6
Ipv6
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
Ppt 3 - IOT logic design
Ppt   3 - IOT logic designPpt   3 - IOT logic design
Ppt 3 - IOT logic design
 
Internet of things using Raspberry Pi
Internet of things using Raspberry PiInternet of things using Raspberry Pi
Internet of things using Raspberry Pi
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
6LoWPAN
6LoWPAN 6LoWPAN
6LoWPAN
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 

Similar to Module 3 INTERNET OF THINGS

Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfIUA
 
Congestion and Energy Aware Multipath Load Balancing Routing for LLNS
Congestion and Energy Aware Multipath Load Balancing Routing for LLNSCongestion and Energy Aware Multipath Load Balancing Routing for LLNS
Congestion and Energy Aware Multipath Load Balancing Routing for LLNSIJCNCJournal
 
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNSCONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNSIJCNCJournal
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfIUA
 
6 lowpan
6 lowpan6 lowpan
6 lowpanSiva Kumar
 
The support of multipath routing in IPv6-based internet of things
The support of multipath routing in IPv6-based  internet of things The support of multipath routing in IPv6-based  internet of things
The support of multipath routing in IPv6-based internet of things IJECEIAES
 
IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED
 
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKAN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
 
An Experimental Study of IoT Networks Under Internal Routing Attack
An Experimental Study of IoT Networks Under Internal Routing AttackAn Experimental Study of IoT Networks Under Internal Routing Attack
An Experimental Study of IoT Networks Under Internal Routing AttackIJCNCJournal
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsIJAAS Team
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things IJECEIAES
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docxaryan532920
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 

Similar to Module 3 INTERNET OF THINGS (20)

IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Congestion and Energy Aware Multipath Load Balancing Routing for LLNS
Congestion and Energy Aware Multipath Load Balancing Routing for LLNSCongestion and Energy Aware Multipath Load Balancing Routing for LLNS
Congestion and Energy Aware Multipath Load Balancing Routing for LLNS
 
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNSCONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNS
 
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdfPerformance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
Performance-Evaluation-of-RPL-Routes-and-DODAG-Construction-for-IoTs .pdf
 
Swry013
Swry013Swry013
Swry013
 
6 lowpan
6 lowpan6 lowpan
6 lowpan
 
The support of multipath routing in IPv6-based internet of things
The support of multipath routing in IPv6-based  internet of things The support of multipath routing in IPv6-based  internet of things
The support of multipath routing in IPv6-based internet of things
 
IJSRED-V1I1P4
IJSRED-V1I1P4IJSRED-V1I1P4
IJSRED-V1I1P4
 
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKAN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
 
An Experimental Study of IoT Networks Under Internal Routing Attack
An Experimental Study of IoT Networks Under Internal Routing AttackAn Experimental Study of IoT Networks Under Internal Routing Attack
An Experimental Study of IoT Networks Under Internal Routing Attack
 
Energy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of ThingsEnergy and Load Aware Routing Protocol for Internet of Things
Energy and Load Aware Routing Protocol for Internet of Things
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
Respond 3 of your colleagues postings in one or more of the fol.docx
 Respond  3 of your colleagues postings in one or more of the fol.docx Respond  3 of your colleagues postings in one or more of the fol.docx
Respond 3 of your colleagues postings in one or more of the fol.docx
 
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned īģŋTube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

Module 3 INTERNET OF THINGS

  • 1. Dr Mallikarjunaswamy N J 1 ī‚¨INTERNET OF THINGS MODULE-3 By Dr. Mallikarjunaswamy N J
  • 2. IP as the IoT Network Layer: ī‚¨ The Business Case for IP ī‚¨ The Need for Optimization ī‚¨ Optimizing IP for IoT ī‚¨ Profiles and Compliances Dr Mallikarjunaswamy N J 2
  • 3. The Key Advantages of Internet Protocol ī‚¨ 1. Open and standards-based: ī‚¨ 2. Versatile: ī‚¨ 3. Ubiquitous: ī‚¨ 4. Scalable: ī‚¨ 5. Manageable and highly secure: ī‚¨ 6. Stable and resilient: ī‚¨ 7. Consumers’ market adoption: ī‚¨ 8. The innovation factor: Dr Mallikarjunaswamy N J 3
  • 4. Adoption or Adaptation of the Internet Protocol: ī‚¨ Adaptation means application layered gateways (ALGs) must be implemented to ensure the translation between non-IP and IP layers. ī‚¨ Adoption involves replacing all non-IP layers with their IP layer counterparts, simplifying the deployment model and operations. ī‚¨ Supervisory control and data acquisition (SCADA) applications are typical examples of vertical market deployments that operate both the IP adaptation model and the adoption model. ī‚¨ SCADA is an automation control system for remote monitoring and control of equipment. ī‚¨ Implementations that make use of IP adaptation have SCADA devices attached through serial interfaces to a gateway tunneling or translating the traffic. ī‚¨ With the IP adoption model, SCADA devices are attached via Ethernet to switches and routers. ī‚¨ Another example is a ZigBee solution that runs a non-IP stack between devices and a ZigBee gateway that forwards traffic to an application server. ī‚¨ A ZigBee gateway often acts as a translator between the ZigBee and IP protocol stacks. Dr Mallikarjunaswamy N J 4
  • 5. which model is best suited for last-mile connectivity: ī‚¨ Bidirectional versus unidirectional data flow: ī‚¨ Overhead for last-mile communications paths: ī‚¨ Data flow model: ī‚¨ Network diversity: Dr Mallikarjunaswamy N J 5
  • 6. The Need for Optimization: ī‚¨ Constrained Nodes: ī‚¨ IoT node may be required to communicate through an unreliable path. ī‚¨ power consumption is a key characteristic of constrained nodes. ī‚¨ Many IoT devices are battery powered, with lifetime battery requirements varying from a few months to 10+ years. ī‚¨ This drives the selection of networking technologies since high-speed ones, such as Ethernet, Wi-Fi, and cellular, are not (yet) capable of multi-year battery life. ī‚¨ Current capabilities practically allow less than a year for these technologies on battery- powered nodes. ī‚¨ power consumption is much less of a concern on nodes that do not require batteries as an energy source. Dr Mallikarjunaswamy N J 6
  • 7. IoT constrained nodes can be classified as follows: 1. Devices that are very constrained in resources, may communicate infrequently to transmit a few bytes, and may have limited security and management capabilities: 2. Devices with enough power and capacities to implement a stripped downIP stack or non-IP stack: 3. Devices that are similar to generic PCs in terms of computing and power resources but have constrained networking capacities, such as bandwidth: Dr Mallikarjunaswamy N J 7
  • 8. Constrained Networks: ī‚¨ limited by low-power, low-bandwidth links ī‚¨ high latency and a high potential for packet loss ī‚¨ They operate between a few kbps and a few hundred kbps. ī‚¨ unpredictable errors and even loss of connectivity ī‚¨ packet delivery rate (PDR) to oscillate between low and high percentages. ī‚¨ highly stable and fast links are available. ī‚¨ limited by low-power, low-bandwidth links (wireless and wired). Dr Mallikarjunaswamy N J 8
  • 9. IP Versions: ī‚¤ For 20+ years, the IETF has been working on transitioning the Internet ī‚¨ from IP version 4 to IP version 6. ī‚¤ The main driving force has been the lack of address space in IPv4 as the Internet has grown. ī‚¤ IPv6 has a much larger range of addresses that should not be exhausted for the foreseeable future. ī‚¤ Today, both versions of IP run over the Internet, but most traffic is still IPv4 based. ī‚¤ A variety of factors dictate whether IPv4, IPv6, or both can be used in an IoT solution. ī‚¤ Most often these factors include a legacy protocol or technology that supports only IPv4. Dr Mallikarjunaswamy N J 9
  • 10. The following are some of the main factors applicable to IPv4 and IPv6 support in an IoT solution: ī‚¨ Application Protocol: ī‚¨ Cellular Provider and Technology: ī‚¨ Serial Communications: ī‚¨ IPv6 Adaptation Layer: Dr Mallikarjunaswamy N J 10
  • 11. IPv6 Adaptation Layer: Optimizing IP for IoT: Dr Mallikarjunaswamy N J 11
  • 12. From 6LoWPAN to 6Lo: Dr Mallikarjunaswamy N J 12
  • 14. Figure shows the sub headers related to compression, fragmentation, and mesh addressing. Dr Mallikarjunaswamy N J 14
  • 16. Fragmentation: ī‚¤ The maximum transmission unit (MTU)for an IPv6 network must be at least 1280 bytes. ī‚¤ The term MTU defines the size of the largest protocol data unit that can be passed. ī‚¤ For IEEE 802.15.4, 127 bytes is the MTU. ī‚¤ In IPv6, with a much larger MTU, is carried inside the 802.15.4 frame with a much smaller one. ī‚¤ Toremedy this situation, large IPv6 packets must be fragmented across multiple 802.15.4 frames at Layer 2. Dr Mallikarjunaswamy N J 16
  • 17. Fragmentation ī‚¤ The fragment header utilized by 6LoWPAN is composed of three primary fields: īŽ Datagram Size, Datagram Tag, and Datagram Offset. ī‚¤ The 1-byte Datagram Size field specifies the total size of the unfragmented payload. ī‚¤ Datagram Tag identifies the set of fragments for a payload. ī‚¤ Finally, the Datagram Offset field delineates how far into apayload a particular fragment occurs. ī‚¤ Figure provides an overview of a 6LoWPAN fragmentation header. Dr Mallikarjunaswamy N J 17
  • 18. 6lOWPAN Fragmentation Header Dr Mallikarjunaswamy N J 18
  • 20. Mesh Addressing: ī‚¨ The purpose of the 6LoWPAN mesh addressing function is to forward packets over multiple hops. ī‚¨ Three fields are defined for this header: Hop Limit, Source Address, and Destination Address. ī‚¨ hop limit for mesh addressing also provides an upper limit on how many times the frame can be forwarded. ī‚¨ Each hop decrements this value by 1 as it is forwarded. ī‚¨ Once the value hits 0, it is dropped and no longer forwarded. Dr Mallikarjunaswamy N J 20
  • 21. 6LoWPAN Mesh Addressing Header Dr Mallikarjunaswamy N J 21
  • 22. 6TiSCH: ī‚¨ IEEE 802.15.4e, Time-Slotted Channel Hopping (TSCH), is an add-on to the Media Access Control (MAC) portion of the IEEE 802.15.4 standard, with direct inheritance from other standards, such as WirelessHART and ISA100.11a. ī‚¨ Devices implementing IEEE 802.15.4e TSCH communicate by following a Time Division Multiple Access (TDMA) schedule. ī‚¨ An allocation of a unit of bandwidth or time slot is scheduled between neighbor nodes. Dr Mallikarjunaswamy N J 22
  • 23. The 6TiSCH architecture defines four schedule management mechanisms: ī‚¨ Static scheduling: (Slotted aloha) ī‚¨ Neighbor-to-neighbor scheduling: (add and delete cells) ī‚¨ Remote monitoring and scheduling management: (management entity responsible to allocate time slots ) ī‚¨ Hop-by-hop scheduling: (source node is responsible to allocate time slots & resources) Dr Mallikarjunaswamy N J 23
  • 24. four schedule management mechanisms: Dr Mallikarjunaswamy N J 24
  • 25. There are three 6TiSCH forwarding models: ī‚¨ Track Forwarding (TF): īƒ˜ A “track” in this model is a unidirectional path between a source and a destination. ī‚¨ Fragment forwarding (FF): īƒ˜ IPv6 packets can get fragmented at source node and reassemble at des. ī‚¨ IPv6 Forwarding (6F): īƒ˜ Maintains IPv6 routing table to give priority to the pkts(QOS) and to avoid collision of pkts(RED). Dr Mallikarjunaswamy N J 25
  • 26. RPL: ī‚¨ RPL (Routing Protocol for Low Power and Lossy Networks ): ī‚¨ In an RPL network, each node acts as a router and becomes part of a mesh network. ī‚¨ Ø Routing is performed at the IP layer. ī‚¨ Ø Each node examines every received IPv6 packet anddetermines the next-hop destination based on the information contained in the IPv6 header. ī‚¨ Ø Noinformation from the MAC-layer header is needed to perform next-hop determination. Dr Mallikarjunaswamy N J 26
  • 27. The protocol defines two modes: ī‚¨ Storing mode: ī‚¨ Non-storing mode: Dr Mallikarjunaswamy N J 27
  • 29. RPL (Routing Protocol for Low Power and Lossy Networks ): Dr Mallikarjunaswamy N J 29
  • 30. DAG and DODAG Comparison Dr Mallikarjunaswamy N J 30
  • 31. Figure shows how DAO and DIO messages move both up and down the DODAG, depending on the exact message type. Dr Mallikarjunaswamy N J 31
  • 32. DIO & DAO Dr Mallikarjunaswamy N J 32
  • 33. RPL Headers: ī‚¨ Specific network layer headers are defined for datagrams being forwarded within an RPL domain. ī‚¨ Ø One of the headers is standardized in RFC 6553, “The Routing Protocol for Low- Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data- Plane Datagrams,” and the other is discussed in RFC 6554, “An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks ī‚¨ The RPL option is carried in the IPv6 Hop-by-Hop header. ī‚¨ Ø The purpose of this header is to leverage data-plane packets for loop detection in a RPL instance. ī‚¨ Ø DODAGs only have single paths and should be loop free. ī‚¨ Ø RFC 6554 specifies the Source Routing Header (SRH) for use between RPL routers. ī‚¨ Dr Mallikarjunaswamy N J 33
  • 34. Metrics: (RPL Metrics) 1. Expected Transmission Count (ETX): 2. Hop Count: (higher hop counts) 3. Latency: (low Latency) 4. Link Quality Level: (high level of quality) 5. Link Color: (link more or less desirable) 6. Node State and Attribute: (high workload & CPU) 7. Node Energy: (low power) 8. Throughput: (maximum)Dr Mallikarjunaswamy N J 34
  • 35. Authentication and Encryption on Constrained Nodes: ī‚¨ the Authentication and Authorization for Constrained Environments (ACE) working group is tasked with evaluating the applicability of existing authentication and authorization protocols and documenting their suitability for certain constrained-environment use cases. ī‚¨ Ø Once the candidate solutions are validated, the ACE working group will focus its work on CoAP with the Datagram Transport Layer Security (DTLS) protocol. ī‚¨ Ø The ACE working group expects to produce a standardized solution for authentication and authorization that enables authorized access (Get, Put, Post, Delete) to resources identified by a URI and hosted on a resource server in constrained environments. Dr Mallikarjunaswamy N J 35
  • 36. DICE: ī‚¨ Ø New generations of constrained nodes implementing an IP stack over constrained access networks are expected to run an optimized IP protocol stack. ī‚¨ Ø For example, when implementing UDP at the transport layer, the IETF Constrained Application Protocol (CoAP) should be used at the application layer. ī‚¨ Ø In constrained environments secured by DTLS, CoAP can be used to control resources on a device. Dr Mallikarjunaswamy N J 36
  • 37. Application Protocols for IoT ī‚¨ This chapter focuses on how higher-layer IoT protocols are transported. Specifically, this chapter includes the following sections: ī‚¨ The Transport Layer: ī‚¨ IP-based networks use either TCP or UDP. ī‚¨ With the TCP/IP protocol, two main protocols are specified for the transport layer: ī‚¨ Transmission Control Protocol (TCP): ī‚¨ User Datagram Protocol (UDP): Dr Mallikarjunaswamy N J 37
  • 38. IoT Application Transport Methods: 1. Application layer protocol not present: īƒ˜ Lower layers transport data so application layer not needed 2. Supervisory control and data acquisition (SCADA): īƒ˜ Monitoring and controlling remote physical equipment 3 Generic web-based protocols: (wifi, Ethernet, etc ) 4. IoT application layer protocols: (MQTT) īƒ˜ Reduces number of connection b/w peripheral devices Dr Mallikarjunaswamy N J 38
  • 39. MQTT: Message Queuing Telemetry Transport Dr Mallikarjunaswamy N J 39
  • 40. Dr Mallikarjunaswamy N J 40 MQTT: Message Queuing Telemetry Transport