SlideShare a Scribd company logo
1 of 24
[Unit 3] IP Layer
IP as the IoT Network Layer
 The Business Case for IP
 The need for Optimization
 Optimizing IP for IoT
 Profiles and Compliances,
Application Protocols for IoT
 The Transport Layer,
 IoT Application Transport Methods.
Asst.Prof. Pallavi D.Patil ,CSE Dept,SETI
IP as the IoT Network Layer
The Business Case for IP
Data flowing from or to “things” is consumed, controlled, or monitored
by data center servers.
Servers may be Cloud, may be Distributed or may be centralized.
Dedicated applications are then run over virtualized or traditional
operating systems or on network edge platforms (for example, fog
computing).
IP is standard protocol that has data communication capabilities between
all devices in network.
The Key Advantages of Internet
Protocol
a. Open and standards-based: (IETF) standard.
b. Versatile:
c. Ubiquitous:
d. Scalable:
e. Manageable and highly secure:
f. Stable and resilient:
g. Consumers’ market adoption
h. The innovation factor
Adoption or Adaptation of the Internet
Protocol
 Adaptation means application layered gateways (ALGs) must
be implemented to ensure the translation between non-IP and IP
layers.
 Adoption involves replacing all non-IP layers with their IP
layer counterparts, simplifying the deployment model and
operations.
The factors that decide when you go for
adaption and adapatation
1)Bidirectional versus unidirectional data flow- the devices which are
used only for record something and send it to higher levels. These devices
does not have capability to receive data from higher ends.it only
transmitting the data it records so we can’t use IP because IP needs
bidirectional communication.
2) Overhead for last-mile communications paths-last mile technologies
means actual edge devices or end devices of IoT n/w .these devices
communicate with very less frequencies.they pass very low data.
3) Data flow model- end to end communication. Can not
implemented in IoT
4) Network diversity- dependent on physical and Mac layer
• There lot of challenges in building the IoT solutions on IP.
• In addition to coping with the integration of non-IP devices,
you may need to deal with the limits at the device and network
levels that IoT often imposes.
• Therefore, optimizations are needed at various layers of the IP
stack to handle the restrictions that are present in IoT
networks.
The Need for Optimization
Why optimization is necessary in IP based IoT solutions:
 Constrained Nodes
IoT is a platform, where different classes of devices coexist.
Depending on its functions in a network, a “thing” architecture may or may not offer similar
characteristics compared to a generic PC or server in an IT environment.
Another limit is that this network protocol stack on an IoT node may be required to
communicate through an unreliable path.
Even if a full IP stack is available on the node, this causes problems such as limited or
unpredictable throughput and low convergence when a topology change occurs.
power consumption is a key characteristic of constrained nodes. Many IoT devices are battery
powered, with lifetime battery requirements varying from a few months to 10+ years.
IoT constrained nodes can be classified as follows:
■ Devices that are very constrained in resources, may communicate infrequently to
transmit a few bytes, and may have limited security and management capabilities:
This drives the need for the IP adaptation model, where nodes communicate through
gateways and proxies.
■ Devices with enough power and capacities to implement a stripped-down IP stack
or non-IP stack: In this case, you may implement either an optimized IP stack and
directly communicate with application servers (adoption model) or go for an IP or
non-IP stack and communicate through gateways and proxies (adaptation model).
■ Devices that are similar to generic PCs in terms of computing and power
resources but have constrained networking capacities, such as bandwidth: These
nodes usually implement a full IP stack (adoption model), but network design and
application behaviors must cope with the bandwidth constraints.
 Constrained Networks
• Constrained networks are often referred to as low-power and lossy networks (LLNs). Lossy in this
context refers to network unreliability that is caused by disruptions in the data flow or packet loss.
• Constrained networks have unique characteristics and requirements. In contrast with typical IP
networks, where highly stable and fast links are available, constrained networks are limited by
low-power, low-bandwidth links (wireless and wired).
• Unstable link layer environments create other challenges in terms of latency and control plane
reactivity.
• Control plane traffic must also be kept at a minimum; otherwise, it consumes the bandwidth
that is needed by the data traffic.
 IP Versions
• IPv4(32- bit)
• IPv6(128- bit)
• it may seem natural to base all IoT deployments on IPv6.
• The main factors applicable to IPv4 and IPv6 support in an IoT solution:
- Application Protocol
- Cellular Provider and Technology
- Serial Communications
- IPv6 Adaptation Layer
Optimizing IP for IoT
While the Internet Protocol is key for a successful Internet of Things, constrained nodes and
constrained networks mandate optimization at various layers and on multiple protocols of
the IP architecture.
The following sections introduce some of these optimizations already available from the
market or under development by the IETF. Figure 5-1 highlights the TCP/IP layers where
optimization is applied.
From 6LoWPAN to 6Lo
In the IP architecture, the transport of IP packets over any given Layer 1 (PHY) and Layer 2
(MAC) protocol must be defined and documented. The model for packaging IP into lower-layer
protocols is often referred to as an adaptation layer.
Figure 5-2 shows an example of an IoT protocol stack using the 6LoWPAN adaptation layer
beside the well-known IP protocol stack for reference.
Header Compression
IPv6 header compression for 6LoWPAN was defined initially in RFC 4944 and
subsequently updated by RFC 6282.
This capability shrinks the size of IPv6’s 40-byte headers and User Datagram Protocol’s
(UDP’s) 8-byte headers down as low as 6 bytes combined in some cases.
Note that header compression for 6LoWPAN is only defined for an IPv6 header and not
IPv4.
The 6LoWPAN protocol does not support IPv4, and, in fact, there is no standardized IPv4
adaptation layer for IEEE 802.15.4
Fragmentation
The maximum transmission unit (MTU) for an IPv6 network must be at least 1280 bytes.
The term MTU defines the size of the largest protocol data unit that can be passed. For IEEE
802.15.4, 127 bytes is the MTU.
You can see that this is a problem because IPv6, with a much larger MTU, is carried inside
the 802.15.4 frame with a much smaller one.
To remedy this situation, large IPv6 packets must be fragmented across multiple 802.15.4
frames at Layer 2.
The fragment header utilized by 6LoWPAN is composed of three primary fields:
Datagram Size, Datagram Tag, and Datagram Offset.
The 1-byte Datagram Size field specifies the total size of the fragmented payload. Datagram
Tag identifies the set of fragments for a payload.
Mesh Addressing
The purpose of the 6LoWPAN mesh addressing function is to forward packets over
multiple hops. Three fields are defined for this header: Hop Limit, Source Address,
and Destination Address. Analogous to the IPv6 hop limit field, the hop limit for
mesh addressing also provides an upper limit on how many times the frame can be
forwarded.
Each hop decrements this value by 1 as it is forwarded. Once the value hits 0, it is
dropped and no longer forwarded.
The Source Address and Destination Address fields for mesh addressing are IEEE
802.15.4 addresses indicating the endpoints of an IP hop.
Figure 5-6 details the 6LoWPAN mesh addressing header fields.
Profiles and Compliances
Internet Protocol for Smart Objects (IPSO) Alliance
Established in 2008, the Internet Protocol for Smart Objects (IPSO) Alliance has had its objective evolve over years.
Today, it is more focused on how to use IP, with the IPSO Alliance organizing interoperability tests between alliance members to
validate that IP for smart objects can work together and properly implement industry standards.
As the IPSO Alliance declares in its value and mission statement, it wants to ensure that “engineers and product builders will have
access to the necessary tools for ‘how to build the IoT RIGHT.’”
Wi-SUN Alliance
 The Wi-SUN Alliance is an example of efforts from the industry to define a communication profile that applies to specific physical and data link layer
protocols.
Wi-SUN’s main focus is on the IEEE 802.15.4g protocol and its support for multiservice and secure IPv6 communications with applications running over the
UDP transport layer.
The Wi-SUN field area network (FAN) profile enables smart utility networks to provide resilient, secure, and cost-effective connectivity with extremely good
coverage in a range of topographic environments, from dense urban neighborhoods to rural areas.
Thread
A group of companies involved with smart object solutions for consumers created the
Thread Group.
This group has defined an IPv6-based wireless profile that provides the best way to connect
more than 250 devices into a low-power, wireless mesh network.
IPv6 Ready Logo
Initially, the IPv6 Forum ensured the promotion of IPv6 around the world. Once IPv6
implementations became widely available, the need for interoperability and certification
led to the creation of the IPv6 Ready Logo program.
The IPv6 Ready Logo program has established conformance and interoperability
testing programs with the intent of increasing user confidence when implementing IPv6.
IOT - Unit 3.pptx

More Related Content

What's hot (20)

IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Subnetting
SubnettingSubnetting
Subnetting
 
Subnet Masks
Subnet MasksSubnet Masks
Subnet Masks
 
WLAN
WLANWLAN
WLAN
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP /IP
TCP /IPTCP /IP
TCP /IP
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Application Layer
Application Layer Application Layer
Application Layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Tutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standardTutorial on IEEE 802.15.4e standard
Tutorial on IEEE 802.15.4e standard
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
 
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdfUnit 2 Smart Objects _IOT  by Dr.M.K.Jayanthi.pdf
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 

Similar to IOT - Unit 3.pptx

Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfIUA
 
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTMphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTAniruddha Chakrabarti
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ150ROHITCHANDRASHEKH
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topicDurgaDeviP2
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxjainam bhavsar
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoTAPNIC
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 

Similar to IOT - Unit 3.pptx (20)

module 3.pptx
module 3.pptxmodule 3.pptx
module 3.pptx
 
6 lowpan
6 lowpan6 lowpan
6 lowpan
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTMphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
 
Swry013
Swry013Swry013
Swry013
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
Ens
EnsEns
Ens
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
IPv6 and IoT
IPv6 and IoTIPv6 and IoT
IPv6 and IoT
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Module 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGSModule 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGS
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IOT - Unit 3.pptx

  • 1. [Unit 3] IP Layer IP as the IoT Network Layer  The Business Case for IP  The need for Optimization  Optimizing IP for IoT  Profiles and Compliances, Application Protocols for IoT  The Transport Layer,  IoT Application Transport Methods. Asst.Prof. Pallavi D.Patil ,CSE Dept,SETI
  • 2. IP as the IoT Network Layer
  • 3. The Business Case for IP Data flowing from or to “things” is consumed, controlled, or monitored by data center servers. Servers may be Cloud, may be Distributed or may be centralized. Dedicated applications are then run over virtualized or traditional operating systems or on network edge platforms (for example, fog computing). IP is standard protocol that has data communication capabilities between all devices in network.
  • 4. The Key Advantages of Internet Protocol a. Open and standards-based: (IETF) standard. b. Versatile: c. Ubiquitous: d. Scalable: e. Manageable and highly secure: f. Stable and resilient: g. Consumers’ market adoption h. The innovation factor
  • 5. Adoption or Adaptation of the Internet Protocol  Adaptation means application layered gateways (ALGs) must be implemented to ensure the translation between non-IP and IP layers.  Adoption involves replacing all non-IP layers with their IP layer counterparts, simplifying the deployment model and operations.
  • 6. The factors that decide when you go for adaption and adapatation 1)Bidirectional versus unidirectional data flow- the devices which are used only for record something and send it to higher levels. These devices does not have capability to receive data from higher ends.it only transmitting the data it records so we can’t use IP because IP needs bidirectional communication. 2) Overhead for last-mile communications paths-last mile technologies means actual edge devices or end devices of IoT n/w .these devices communicate with very less frequencies.they pass very low data.
  • 7. 3) Data flow model- end to end communication. Can not implemented in IoT 4) Network diversity- dependent on physical and Mac layer
  • 8. • There lot of challenges in building the IoT solutions on IP. • In addition to coping with the integration of non-IP devices, you may need to deal with the limits at the device and network levels that IoT often imposes. • Therefore, optimizations are needed at various layers of the IP stack to handle the restrictions that are present in IoT networks. The Need for Optimization
  • 9. Why optimization is necessary in IP based IoT solutions:  Constrained Nodes IoT is a platform, where different classes of devices coexist. Depending on its functions in a network, a “thing” architecture may or may not offer similar characteristics compared to a generic PC or server in an IT environment. Another limit is that this network protocol stack on an IoT node may be required to communicate through an unreliable path. Even if a full IP stack is available on the node, this causes problems such as limited or unpredictable throughput and low convergence when a topology change occurs. power consumption is a key characteristic of constrained nodes. Many IoT devices are battery powered, with lifetime battery requirements varying from a few months to 10+ years.
  • 10. IoT constrained nodes can be classified as follows: ■ Devices that are very constrained in resources, may communicate infrequently to transmit a few bytes, and may have limited security and management capabilities: This drives the need for the IP adaptation model, where nodes communicate through gateways and proxies. ■ Devices with enough power and capacities to implement a stripped-down IP stack or non-IP stack: In this case, you may implement either an optimized IP stack and directly communicate with application servers (adoption model) or go for an IP or non-IP stack and communicate through gateways and proxies (adaptation model). ■ Devices that are similar to generic PCs in terms of computing and power resources but have constrained networking capacities, such as bandwidth: These nodes usually implement a full IP stack (adoption model), but network design and application behaviors must cope with the bandwidth constraints.
  • 11.  Constrained Networks • Constrained networks are often referred to as low-power and lossy networks (LLNs). Lossy in this context refers to network unreliability that is caused by disruptions in the data flow or packet loss. • Constrained networks have unique characteristics and requirements. In contrast with typical IP networks, where highly stable and fast links are available, constrained networks are limited by low-power, low-bandwidth links (wireless and wired). • Unstable link layer environments create other challenges in terms of latency and control plane reactivity. • Control plane traffic must also be kept at a minimum; otherwise, it consumes the bandwidth that is needed by the data traffic.
  • 12.  IP Versions • IPv4(32- bit) • IPv6(128- bit) • it may seem natural to base all IoT deployments on IPv6. • The main factors applicable to IPv4 and IPv6 support in an IoT solution: - Application Protocol - Cellular Provider and Technology - Serial Communications - IPv6 Adaptation Layer
  • 13. Optimizing IP for IoT While the Internet Protocol is key for a successful Internet of Things, constrained nodes and constrained networks mandate optimization at various layers and on multiple protocols of the IP architecture. The following sections introduce some of these optimizations already available from the market or under development by the IETF. Figure 5-1 highlights the TCP/IP layers where optimization is applied.
  • 14. From 6LoWPAN to 6Lo In the IP architecture, the transport of IP packets over any given Layer 1 (PHY) and Layer 2 (MAC) protocol must be defined and documented. The model for packaging IP into lower-layer protocols is often referred to as an adaptation layer. Figure 5-2 shows an example of an IoT protocol stack using the 6LoWPAN adaptation layer beside the well-known IP protocol stack for reference.
  • 15.
  • 16. Header Compression IPv6 header compression for 6LoWPAN was defined initially in RFC 4944 and subsequently updated by RFC 6282. This capability shrinks the size of IPv6’s 40-byte headers and User Datagram Protocol’s (UDP’s) 8-byte headers down as low as 6 bytes combined in some cases. Note that header compression for 6LoWPAN is only defined for an IPv6 header and not IPv4. The 6LoWPAN protocol does not support IPv4, and, in fact, there is no standardized IPv4 adaptation layer for IEEE 802.15.4
  • 17.
  • 18. Fragmentation The maximum transmission unit (MTU) for an IPv6 network must be at least 1280 bytes. The term MTU defines the size of the largest protocol data unit that can be passed. For IEEE 802.15.4, 127 bytes is the MTU. You can see that this is a problem because IPv6, with a much larger MTU, is carried inside the 802.15.4 frame with a much smaller one. To remedy this situation, large IPv6 packets must be fragmented across multiple 802.15.4 frames at Layer 2. The fragment header utilized by 6LoWPAN is composed of three primary fields: Datagram Size, Datagram Tag, and Datagram Offset. The 1-byte Datagram Size field specifies the total size of the fragmented payload. Datagram Tag identifies the set of fragments for a payload.
  • 19.
  • 20. Mesh Addressing The purpose of the 6LoWPAN mesh addressing function is to forward packets over multiple hops. Three fields are defined for this header: Hop Limit, Source Address, and Destination Address. Analogous to the IPv6 hop limit field, the hop limit for mesh addressing also provides an upper limit on how many times the frame can be forwarded. Each hop decrements this value by 1 as it is forwarded. Once the value hits 0, it is dropped and no longer forwarded. The Source Address and Destination Address fields for mesh addressing are IEEE 802.15.4 addresses indicating the endpoints of an IP hop. Figure 5-6 details the 6LoWPAN mesh addressing header fields.
  • 21.
  • 22. Profiles and Compliances Internet Protocol for Smart Objects (IPSO) Alliance Established in 2008, the Internet Protocol for Smart Objects (IPSO) Alliance has had its objective evolve over years. Today, it is more focused on how to use IP, with the IPSO Alliance organizing interoperability tests between alliance members to validate that IP for smart objects can work together and properly implement industry standards. As the IPSO Alliance declares in its value and mission statement, it wants to ensure that “engineers and product builders will have access to the necessary tools for ‘how to build the IoT RIGHT.’” Wi-SUN Alliance  The Wi-SUN Alliance is an example of efforts from the industry to define a communication profile that applies to specific physical and data link layer protocols. Wi-SUN’s main focus is on the IEEE 802.15.4g protocol and its support for multiservice and secure IPv6 communications with applications running over the UDP transport layer. The Wi-SUN field area network (FAN) profile enables smart utility networks to provide resilient, secure, and cost-effective connectivity with extremely good coverage in a range of topographic environments, from dense urban neighborhoods to rural areas.
  • 23. Thread A group of companies involved with smart object solutions for consumers created the Thread Group. This group has defined an IPv6-based wireless profile that provides the best way to connect more than 250 devices into a low-power, wireless mesh network. IPv6 Ready Logo Initially, the IPv6 Forum ensured the promotion of IPv6 around the world. Once IPv6 implementations became widely available, the need for interoperability and certification led to the creation of the IPv6 Ready Logo program. The IPv6 Ready Logo program has established conformance and interoperability testing programs with the intent of increasing user confidence when implementing IPv6.