The document discusses 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IP networking for small, low-power devices. It describes how 6LoWPAN compresses IPv6 headers to reduce overhead and fragments packets to meet small MTU sizes. 6LoWPAN networks use an edge router to connect to the wider IP network and support two routing modes: route-over and mesh-under. The document also discusses related topics like CoAP, MQTT, and publish/subscribe messaging.
6LoWPAN is a networking standard that allows IPv6 packets to be transmitted efficiently over low-power wireless networks like IEEE 802.15.4. It defines an adaptation layer that compresses IPv6 and UDP headers to address challenges of limited bandwidth and device resources. 6LoWPAN networks connect to the internet using edge routers and support applications through protocols like CoAP that are optimized for low-power devices.
The implementation of embedded IPv6 applications in an IPv4 world require one of several strategies of converting or tunneling IPv6 traffic through the IPv4 internet.
6LoWPAN enables the use of IPv6 in low power wireless networks by providing an adaptation layer between IEEE 802.15.4 and IPv6. It addresses issues like large IPv6 header sizes, fragmentation, and mobility through techniques like header compression and micro-mobility support. By allowing wireless embedded devices to connect using standard IPv6 protocols, 6LoWPAN helps foster interoperability and is an important foundation for enabling the Internet of Things.
6LoWPAN is an IPv6 protocol that allows communication over low power wireless personal area networks (WPANs). It enables smaller devices with limited processing power and battery life to communicate using IPv6. 6LoWPAN uses the IEEE 802.15.4 standard and creates an IP-enabled mesh network of edge routers and sensor nodes to transmit data between small IoT devices and the broader internet or cloud platforms. It provides secure, low-cost communication for applications like home automation and industrial monitoring.
This document provides an overview of 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IPv6 packets to be transmitted efficiently over IEEE 802.15.4 networks. It describes 6LoWPAN's key features such as mesh networking, IP-based infrastructure, open standards, and support for low-power wireless networks. The document also outlines 6LoWPAN's network architecture, including edge routers, access points, routers, and hosts. It explains the need for an adaptation layer between the IP and link layers to compress headers and handle fragmentation. Applications of 6LoWPAN include automation, industrial monitoring, and smart grids.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
With the exhaustion of global IPv4 addresses, all operators cannot apply to the IPv4 address pool of the public network. All countries have adopted IPv6 as the direction of the next-generation Internet, and China has also clearly accelerated the strategy of building IPv6-based next-generation Internet.
IPv6 was developed by IETF to address issues with IPv4 such as address exhaustion and simplify auto-configuration. IPv6 uses 128-bit addresses compared to 32-bit in IPv4, providing vastly more unique addresses. It also includes improvements like more efficient routing, integrated security, and auto-configuration protocols to simplify address assignment for nodes on a link.
6LoWPAN is a networking standard that allows IPv6 packets to be transmitted efficiently over low-power wireless networks like IEEE 802.15.4. It defines an adaptation layer that compresses IPv6 and UDP headers to address challenges of limited bandwidth and device resources. 6LoWPAN networks connect to the internet using edge routers and support applications through protocols like CoAP that are optimized for low-power devices.
The implementation of embedded IPv6 applications in an IPv4 world require one of several strategies of converting or tunneling IPv6 traffic through the IPv4 internet.
6LoWPAN enables the use of IPv6 in low power wireless networks by providing an adaptation layer between IEEE 802.15.4 and IPv6. It addresses issues like large IPv6 header sizes, fragmentation, and mobility through techniques like header compression and micro-mobility support. By allowing wireless embedded devices to connect using standard IPv6 protocols, 6LoWPAN helps foster interoperability and is an important foundation for enabling the Internet of Things.
6LoWPAN is an IPv6 protocol that allows communication over low power wireless personal area networks (WPANs). It enables smaller devices with limited processing power and battery life to communicate using IPv6. 6LoWPAN uses the IEEE 802.15.4 standard and creates an IP-enabled mesh network of edge routers and sensor nodes to transmit data between small IoT devices and the broader internet or cloud platforms. It provides secure, low-cost communication for applications like home automation and industrial monitoring.
This document provides an overview of 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IPv6 packets to be transmitted efficiently over IEEE 802.15.4 networks. It describes 6LoWPAN's key features such as mesh networking, IP-based infrastructure, open standards, and support for low-power wireless networks. The document also outlines 6LoWPAN's network architecture, including edge routers, access points, routers, and hosts. It explains the need for an adaptation layer between the IP and link layers to compress headers and handle fragmentation. Applications of 6LoWPAN include automation, industrial monitoring, and smart grids.
Abstract
The rapid growth in the Internet of Things (IoTs)
has change our life to be more intelligent and smart,
the development in the Wireless Sensors Networks
(WSNs), besides the wide use of the embedded devices
in different area like industry, home automation,
transport, agriculture and health care, which was led
the Routing Over Low-power and Lossy-network
(ROLL) working group to introduce the IPv6 Routing
Protocol for Low-Power and Lossy Networks (RPL),
therein the RPL nodes have organized topology as a
Directed Acyclic Graph (DAG) and terminated at one
root to form the Destination Oriented DAGs
(DODAGs). In this paper by using InstantContiki3.0
and CoojaGUI we analyze the DODAG formations,
the RPL control messages that are send downward
and upward routes to construct and maintain
DODAG and the Rank computation by Objective
Function (OF) for inconsistency and loop detection,
also we evaluate the performance of the RPL based
on the Expected Transmission Count (ETX) OF that
enable RPL to select and optimize routes within RPL
instance, as well as we evaluate the following metrics:
The ETX Reliability Object (ETX), Radio Duty Cycle
(RDC), energy consumption, the received packets by
the motes and neighbor count. The simulation results
show that the RPL control messages flow in consistent
manner, the DODAG root able to connect to all of the
neighbor motes, also Rank illustration shows no loops
and DODAG topology consistent, as well as the ETX
can essentially take control over DODAG formations
and it has an effects in the RDC ratio, furthermore
most of the motes show reasonable low power
consumption, also the motes show acceptable number
of the received packets.
With the exhaustion of global IPv4 addresses, all operators cannot apply to the IPv4 address pool of the public network. All countries have adopted IPv6 as the direction of the next-generation Internet, and China has also clearly accelerated the strategy of building IPv6-based next-generation Internet.
IPv6 was developed by IETF to address issues with IPv4 such as address exhaustion and simplify auto-configuration. IPv6 uses 128-bit addresses compared to 32-bit in IPv4, providing vastly more unique addresses. It also includes improvements like more efficient routing, integrated security, and auto-configuration protocols to simplify address assignment for nodes on a link.
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
This document discusses several topics related to IPv6 and low power and lossy networks (LLNs):
1. It outlines the agenda for discussing IPv6 neighbor discovery for point-to-point and transit links, wireless neighbor discovery, RPL routing, and RPL extensions.
2. It notes that LLNs comprise billions of constrained devices interconnected by wireless links, and several standards groups are working on protocols for these networks, including 6LoWPAN, ROLL, and 6TiSCH at the IETF.
3. It argues that IPv6 is necessary for the Internet of Things given the tens of billions of additional smart objects that will be connected, and that the RIPE NCC has now
Network Interview Questions documents common networking concepts and protocols. It defines networking as interconnecting computers, describes bandwidth as the maximum data transfer rate of a connection, and VLAN as a logical grouping of ports on a switch. It also summarizes protocols like CIDR for IP address allocation, VLSM for subnetting, unicast for one-to-one transmission, multicast for one-to-many, and broadcast for one-to-all transmission. Key networking protocols like CDP, SNMP, OSPF, RIP, BGP, and PPPoE are also outlined.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
- Zigbee is a wireless mesh networking standard used for low-power wireless personal area networks. It operates on the IEEE 802.15.4 standard and defines the higher layers for reliable transmission of data between devices.
- 6LoWPAN is an adaptation layer that allows IPv6 packets to be sent over IEEE 802.15.4 low-power wireless networks. It provides compression mechanisms to encapsulate IPv6 datagrams into frames compatible with the IEEE 802.15.4 standard.
- Both Zigbee and 6LoWPAN are commonly used in wireless sensor networks and Internet of Things applications where many devices need to communicate wirelessly over short distances with low power consumption. However, Z
IPv6 is the next-generation Internet protocol that replaces IPv4. It features a 128-bit address size allowing for many more IP addresses compared to IPv4's 32-bit addresses. IPv6 also includes improvements in routing, network autoconfiguration, security, quality of service, and extensibility. A transition from IPv4 to IPv6 is underway using mechanisms like dual stacking that allow both protocols to coexist on networks. While not yet widely deployed, IPv6 is expected to fully replace IPv4 in the coming years.
This document discusses the Teredo protocol, which enables IPv6 connectivity for nodes located behind IPv4 NAT devices. It explains how Teredo works by tunneling IPv6 packets over UDP through NATs. While Teredo allows IPv6 connectivity, it also raises security concerns by bypassing security controls and allowing unsolicited traffic. The document analyzes attacks that could exploit vulnerabilities in Teredo tunnels, such as a denial of service attack against a Teredo server using a single packet. It investigates whether Teredo represents a security risk or is a worthwhile transition mechanism from IPv4 to IPv6.
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
(1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdfapnashop1
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc\'s database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one .
IP is the standard network layer protocol for IoT due to its advantages like being open, ubiquitous, scalable and manageable. However, optimizations are needed for IP in IoT due to constraints of nodes and networks. 6LoWPAN defines optimizations like header compression, fragmentation and mesh addressing to use IP in low power wireless networks. Profiles like Thread and certifications like IPv6 Ready Logo help ensure interoperability.
The document discusses several communication protocols that are important for the Internet of Things (IoT), including IEEE 802.15.4, Zigbee, 6LoWPAN, Wireless HART, Z-Wave, ISA 100, Bluetooth, NFC, and RFID. It provides details on IEEE 802.15.4, including its features, variants, and introduction to related protocols like Zigbee, 6LoWPAN, and Wireless HART.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
1) The document discusses 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IPv6 packets to be sent over IEEE 802.15.4 low-power networks.
2) A key challenge is that the large IPv6 address and header do not fit efficiently into the small 802.15.4 frames, so 6LoWPAN defines header compression methods.
3) 6LoWPAN defines a dispatch byte and optional headers for mesh routing, header compression, and fragmentation to optimize IPv6 packets for transmission over 802.15.4 networks.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
The document outlines key concepts related to IPv4 and IPv6 including:
- IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. IPv6 simplifies the header format and introduces extension headers.
- It describes IP address classes in IPv4 and differences between IPv4 and IPv6 addressing schemes, header formats, and features like built-in security.
- Transitioning from IPv4 to IPv6 poses challenges around increased management complexity, interoperability problems, and security concerns due to shared communication resources between the protocols.
IPv6 was created to replace IPv4 due to IPv4's limited address space. IPv6 uses a 128-bit address compared to IPv4's 32-bit address, providing vastly more unique IP addresses. It also features improvements like better support for extensions and more robust security features. The document discusses IPv6 addressing formats, allocation of address blocks, stateless autoconfiguration, renumbering, packet header format, and the roles of extension headers. It provides technical details on how IPv6 aims to resolve limitations in IPv4 and support future networking needs.
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTAniruddha Chakrabarti
1) The document discusses emerging open and standardized protocols for the Internet of Things (IoT), as IoT projects currently face challenges selecting technology stacks due to a lack of standardization.
2) It describes several standardized protocols for different layers of the TCP/IP model that are being used for IoT, including IEEE 802.15.4 for the network/link layer, 6LoWPAN for adapting IPv6 packets to IEEE 802.15.4 links, UDP and DTLS for the transport layer, and CoAP and MQTT for the application layer.
3) CoAP is presented as a specialized web transfer protocol for constrained environments like IoT, serving a similar purpose to HTTP with features tailored
Web Tracking in cyber security and network securityHRJEETSINGH
Web tracking collects user activity data across websites to gain insights into user behavior and preferences. This is done through cookies, pixels/beacons, and fingerprinting. Cookies can track users both within and across sites, pixels notify servers when activated to collect user data, and fingerprinting stitches together browser data to create unique user profiles. While useful for customization, this tracking also enables targeted marketing and profiling without user consent.
Data compression MCQs AKTU Final Year ExaminationHRJEETSINGH
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
More Related Content
Similar to 6LowPAN etc.pptx computer network and IOT devices in future technology
The document discusses IPv6, the next generation Internet Protocol. It introduces IPv6 and describes some key differences from IPv4, including a much larger 128-bit address space compared to 32-bits in IPv4. It also describes some advantages IPv6 has over IPv4 such as built-in support for multicasting and stateless address autoconfiguration. The document outlines various mechanisms for transitioning from IPv4 to IPv6, including dual stack implementations, tunneling protocols, and translation technologies.
This document discusses several topics related to IPv6 and low power and lossy networks (LLNs):
1. It outlines the agenda for discussing IPv6 neighbor discovery for point-to-point and transit links, wireless neighbor discovery, RPL routing, and RPL extensions.
2. It notes that LLNs comprise billions of constrained devices interconnected by wireless links, and several standards groups are working on protocols for these networks, including 6LoWPAN, ROLL, and 6TiSCH at the IETF.
3. It argues that IPv6 is necessary for the Internet of Things given the tens of billions of additional smart objects that will be connected, and that the RIPE NCC has now
Network Interview Questions documents common networking concepts and protocols. It defines networking as interconnecting computers, describes bandwidth as the maximum data transfer rate of a connection, and VLAN as a logical grouping of ports on a switch. It also summarizes protocols like CIDR for IP address allocation, VLSM for subnetting, unicast for one-to-one transmission, multicast for one-to-many, and broadcast for one-to-all transmission. Key networking protocols like CDP, SNMP, OSPF, RIP, BGP, and PPPoE are also outlined.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
- Zigbee is a wireless mesh networking standard used for low-power wireless personal area networks. It operates on the IEEE 802.15.4 standard and defines the higher layers for reliable transmission of data between devices.
- 6LoWPAN is an adaptation layer that allows IPv6 packets to be sent over IEEE 802.15.4 low-power wireless networks. It provides compression mechanisms to encapsulate IPv6 datagrams into frames compatible with the IEEE 802.15.4 standard.
- Both Zigbee and 6LoWPAN are commonly used in wireless sensor networks and Internet of Things applications where many devices need to communicate wirelessly over short distances with low power consumption. However, Z
IPv6 is the next-generation Internet protocol that replaces IPv4. It features a 128-bit address size allowing for many more IP addresses compared to IPv4's 32-bit addresses. IPv6 also includes improvements in routing, network autoconfiguration, security, quality of service, and extensibility. A transition from IPv4 to IPv6 is underway using mechanisms like dual stacking that allow both protocols to coexist on networks. While not yet widely deployed, IPv6 is expected to fully replace IPv4 in the coming years.
This document discusses the Teredo protocol, which enables IPv6 connectivity for nodes located behind IPv4 NAT devices. It explains how Teredo works by tunneling IPv6 packets over UDP through NATs. While Teredo allows IPv6 connectivity, it also raises security concerns by bypassing security controls and allowing unsolicited traffic. The document analyzes attacks that could exploit vulnerabilities in Teredo tunnels, such as a denial of service attack against a Teredo server using a single packet. It investigates whether Teredo represents a security risk or is a worthwhile transition mechanism from IPv4 to IPv6.
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
Basic Introduction to Technology (networking).pdftthind
The document provides an overview of networking concepts and components. It begins with basic definitions of networks and networking. It then describes common networking devices like hubs, switches, routers, and network cards. It covers networking cables, IPv4 addressing, routing protocols like RIP and EIGRP, redistribution between protocols, ACLs, NAT, VPN tunnels, and Frame Relay. It concludes with an example implementation of a VPN tunnel between two routers.
(1) What is the purpose of a VLAN trunkAns) A trunk is a line or .pdfapnashop1
(1) What is the purpose of a VLAN trunk?
Ans) A trunk is a line or link designed to handle many signals simultaneously, and that connects
major switching centers or nodes in communication system. The transmitted data can be voice(as
in the conventinal telephone system) data, computer programs, images, video or control signals.
Trunks are used to interconnect switches to form nerwors, and to interconnect local area
nerworks(LAN) to form wide area networks (WAN) or virtual LAN (VLANs). A trunk often
consists of multiple wires, cables, or fiber opric strands to maximize the available bandwidth and
the number of channels that can be accommodated. A trunk can also be a broadband wireless
link. The use and management of trunks in a communications system is known as trunking. It
minimizes the number of physical signal paths, and thus the total amount of cable hardware,
required to serve a given number of suscribers in a nerwork.
In Cisco networks, trunking is special function can be assigned to a port, making thar port
capable of carrying traffic for any or all of the VLANs accessible by particular switch. such a
port is called a trunk port, in contrast to an access port, which carries traffic only to and from the
specific VLAN assigned to it. A trunk port marks frames with special identifying tags (either ISL
tags or 802.1Q tags) as they pass between switches, so easch frame can be routed to its intended
VLAN. An access port does nor provide such tags, because the VLAN for it is pre-assigned, and
identiying markers are therefore unnecessary.
Trunking:-
1)VLANs are local to each swithc\'s database, and VLAN infromation is not passed between
switches.
2)Trunk linksprovies VLAN identification for frames travelling between switches.
3)Cisco seitches have two Ethernet trunking mechanisms: ISL and IEEE 802.1Q
4)certain types of switches can negotiate trunk links.
5)Trunks carry trafic from all VLANs to and from the switch by default but can be configured to
carry only specified VLAN traffic.
6)Trunk links must be configured to allow trunking on each end of the link
2)Will a router always choose a static route over an OSPF route?
Ans) OSPF is an interior gatway routing protocaol that uses link states rather than distance
vectors for path selecation. OSPF propagates link-state advertisments rather than table updates.
Because only LSAs are exchnged, rather than entire routing table, OSPF nerwork converge more
quickly than RIP nerworks. OSPF supports MD5 and clear text neighbor authentication.
Authentiction should be used with all routing protocols when possible because route
redistribution between OSPF and other protocols when possible because route redistribution
between OSPF and other protocols (like RIP) can potentially be used by attackers to subvert
routing information. If NAT is used, if OSPF is operating on public and private areas, and if
address filtering is required, then you need to run two OSPF processes—one process for the
public areas and one .
IP is the standard network layer protocol for IoT due to its advantages like being open, ubiquitous, scalable and manageable. However, optimizations are needed for IP in IoT due to constraints of nodes and networks. 6LoWPAN defines optimizations like header compression, fragmentation and mesh addressing to use IP in low power wireless networks. Profiles like Thread and certifications like IPv6 Ready Logo help ensure interoperability.
The document discusses several communication protocols that are important for the Internet of Things (IoT), including IEEE 802.15.4, Zigbee, 6LoWPAN, Wireless HART, Z-Wave, ISA 100, Bluetooth, NFC, and RFID. It provides details on IEEE 802.15.4, including its features, variants, and introduction to related protocols like Zigbee, 6LoWPAN, and Wireless HART.
This presentation summarizes the Cisco Certified Network Associate (CCNA) certification and covers networking concepts relevant to the CCNA including networking devices, the OSI model, IP addressing, routing, access lists, network address translation, switches, virtual LANs, WAN connection types, wireless technology, and comparisons of 802.11 wireless standards.
1) The document discusses 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), which allows IPv6 packets to be sent over IEEE 802.15.4 low-power networks.
2) A key challenge is that the large IPv6 address and header do not fit efficiently into the small 802.15.4 frames, so 6LoWPAN defines header compression methods.
3) 6LoWPAN defines a dispatch byte and optional headers for mesh routing, header compression, and fragmentation to optimize IPv6 packets for transmission over 802.15.4 networks.
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
Currently IPv6 is extremely popular with companies, organizations and Internet service providers (ISP)
due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms
will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network. These
mechanisms are Dual-Stack, Tunnel and Translation. This research will shed the light on IPv4 and IPv6
and assess the automatic and manual transition strategies of the IPv6 by comparing their performances in
order to show how the transition strategy affects network behaviour. The experiment will be executed using
OPNET Modeler that simulates a network containing a Wide Area Network (WAN) , a Local Area Network
(LAN), hosts and servers. The results will be presented in graphs and tables, with further explanation. The
experiment will use different measurements such as throughput, latency (delay), queuing delay, and TCP
delay.
The document outlines key concepts related to IPv4 and IPv6 including:
- IPv4 uses 32-bit addresses and IPv6 uses 128-bit addresses. IPv6 simplifies the header format and introduces extension headers.
- It describes IP address classes in IPv4 and differences between IPv4 and IPv6 addressing schemes, header formats, and features like built-in security.
- Transitioning from IPv4 to IPv6 poses challenges around increased management complexity, interoperability problems, and security concerns due to shared communication resources between the protocols.
IPv6 was created to replace IPv4 due to IPv4's limited address space. IPv6 uses a 128-bit address compared to IPv4's 32-bit address, providing vastly more unique IP addresses. It also features improvements like better support for extensions and more robust security features. The document discusses IPv6 addressing formats, allocation of address blocks, stateless autoconfiguration, renumbering, packet header format, and the roles of extension headers. It provides technical details on how IPv6 aims to resolve limitations in IPv4 and support future networking needs.
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTAniruddha Chakrabarti
1) The document discusses emerging open and standardized protocols for the Internet of Things (IoT), as IoT projects currently face challenges selecting technology stacks due to a lack of standardization.
2) It describes several standardized protocols for different layers of the TCP/IP model that are being used for IoT, including IEEE 802.15.4 for the network/link layer, 6LoWPAN for adapting IPv6 packets to IEEE 802.15.4 links, UDP and DTLS for the transport layer, and CoAP and MQTT for the application layer.
3) CoAP is presented as a specialized web transfer protocol for constrained environments like IoT, serving a similar purpose to HTTP with features tailored
Similar to 6LowPAN etc.pptx computer network and IOT devices in future technology (20)
Web Tracking in cyber security and network securityHRJEETSINGH
Web tracking collects user activity data across websites to gain insights into user behavior and preferences. This is done through cookies, pixels/beacons, and fingerprinting. Cookies can track users both within and across sites, pixels notify servers when activated to collect user data, and fingerprinting stitches together browser data to create unique user profiles. While useful for customization, this tracking also enables targeted marketing and profiling without user consent.
Data compression MCQs AKTU Final Year ExaminationHRJEETSINGH
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
image processing MCQ AKTU final year Exam all unitsHRJEETSINGH
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Renewable energy resources mcqs quiz unit(1 5)HRJEETSINGH
This document contains 30 multiple choice questions about renewable energy resources. It covers topics like solar energy, geothermal energy, and wind energy. Some key details covered are:
- The main disadvantages of renewable energy is unreliable supply.
- Solar cells convert light to electricity via the photovoltaic effect.
- Methane is the main component of biogas.
- The Ministry of New and Renewable Energy is mainly responsible for research and development in India on renewable sources like solar, wind, small hydro, and biogas.
- India has a large amount of installed grid interactive renewable power capacity in wind power.
This document is an industrial training report submitted by Hrjeet Singh in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. The 6-week online training took place from November 24, 2020 to January 5, 2021 at Internshala, an online certification training provider, under the guidance of Kunal Jain and Sunil Roy. The training covered topics including machine learning algorithms, Python programming, data preprocessing techniques, and hands-on assignments. The report details the company background, weekly schedule, technical contents covered, and learning outcomes from applying theory and skills gained during the training.
Hrjeet Singh completed a 42-day online industrial training from Internshala located in Gurgaon, India. During the training, Singh learned about machine learning concepts including classification, regression, linear regression, logistic regression, decision trees, and K-means clustering. Singh also completed a project using machine learning classifiers to detect breast cancer by analyzing features of breast cancer patient and normal cells.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
2. Non-IP Based WPAN
WPAN Networks have adopted protocols that
are typically not TCP/IP.
Non-IP communication systems are optimal as
for cost and energy
IEEE 802.15: Wireless personal area network
definitions
IEEE 802.15.1: Original foundation of the
Bluetooth PAN
3. Other Standards
IEEE 802.15.2: Coexistence specifications for WPAN and WLAN
for Bluetooth
IEEE 802.15.3: High data rate (55 Mbps+) on WPAN for
multimedia
IEEE 802.15.3c: High-Speed (>1 GBps) using mm-wave
(millimeter wave) technology
IEEE 802.15.4: Low data rate, simple, simple design, multi-year
battery life specifications (Zigbee)
IEEE 802.15.5: Mesh networking
IEEE 802.15.6: Body area networking for medical and
entertainment
4. IP-based WPAN
The protocol stacks for Bluetooth, Zigbee, and
Z-Wave have similarities to a true TCP/IP
protocol but don't inherently communicate over
TCP/IP.
There are adaptions of IP on Zigbee (using
Zigbee-IP) and IP over Bluetooth (using
Internet Protocol Support Profile (IPSP) to
support 6LoWPAN) that do exist.
5. IPv6 Header Format
• Version field for version number 0110
• Traffic class to support differentiated services
• Flow: sequence of packets from particular source to particular
destination for which source requires special handling
Version Traffic Class Flow Label
Payload Length Next Header Hop Limit
Source Address
Destination Address
0 4 12 16 24 31
6. IPv6 Header Format
• Payload length: length of data excluding header, up to 65535 B
• Next header: type of extension header that follows basic header
• Hop limit: # hops packet can travel before being dropped by a router
Version Traffic Class Flow Label
Payload Length Next Header Hop Limit
Source Address
Destination Address
0 4 12 16 24 31
8. IPv6 Address Generation Through
DHCPv6 or SAA
Stateless Address Autoconfiguration (SAA) is a
distributed mechanism that allows devices to obtain a
unique unicast IPv6 address that serves for proper
routing of datagrams.
A device relying on SSA dynamically generates its
IPv6 address by combining its 64-bit Interface
Identifier (IID) with the router supplied prefix.
The IID is derived from the device link layer address
and depends, therefore, on the link layer technology in
use.
9. 6LoWPAN
Purpose to allow IP networking over low-power
RF devices that are power and space
constrained and do not need high bandwidth
services.
Protocol can be used with other WPAN
communications such as IEEE 802.15.4 as well
as Bluetooth, sub-1GHz RF protocols, and
power line controller (PLC).
10. IPv6 over Low power Wireless Personal
Area Networks (6LoWPAN )
IPv6 header field and the protocol itself is unsuitable for IoT
applications
All devices in a WPAN have IPv6 addresses that share the
same prefix.
The prefix and an IID that are derived via SAA from link layer
addresses and edge router parameters received in 6LoWPAN
Neighbor Discovery (ND) RA messages.
6LoWPAN ND messages are ICMPv6 ND messages that are
exchanged in the context of 6LoWPAN and have been
optimized to work in WPANs as per IETF RFC 6775.
11. WPAN Types
There are three types of WPANs;
1) Simple WPANs that have connectivity to the IP
core by means of edge routers,
2) Ad hoc WPANs that locally connect devices and
have no access to the IP core, and
3) Extended WPANs that have connectivity to the IP
code by means of several edge routers along a
backbone link.
12. Adopting IPv6 into IoT Systems
Adopting IPv6 in constrained environments
through 6LoWPAN introduces:
packet fragmentation (into small link-layer
frames) and compression at the transmitter;
fragment reassembly (from small link-layer
frames) and decompression at the receiver.
13. Effect of Small Size Packets
In 6LoWPANs, fragmentation can increase the probability of
packet delivery failure.
Given the small packet size of LoWPANs, applications must send
small amounts of data:
Less data ⇒ fewer fragments to be sent ⇒ lower energy
consumption (CPU/TX/RX);
Less data ⇒ fewer fragments to be sent ⇒ lower packet loss
probability.
Due to the limited capabilities of objects in the IoT, the distinction
among the different layers of the protocol stack is not as strong as
in the traditional Internet.
14. 6LoWPAN
In an effort to bring IP addressability to the
smallest and most resource-constrained devices,
the concept of 6LoWPAN was formed in 2005.
A working group formalized the design in the
IETF under the specification RFC 4944 and
later updated with RFC 6282 to address header
compression and RFC 6775 for neighbor
discovery.
15. 6LoWPAN
6LoWPAN networks are mesh networks residing on the
periphery of larger networks.
An Edge Router resides in between the access and core
networks and plays the role of a traditional IoT gateway
and relay device.
Edge Router handles traffic in and out of the WPAN by
performing 6LoWPAN adaptation, ND for interaction
with devices on the same link and other types of
operations like IPv4-to-IPv6 translations for
communication with other entities in the IP core.
17. Edge Router
Performs compression of IPv6 headers by reducing a
40-byte IPv6 header and 8-byte UDP headers for
efficiency in a sensor network.
A typical IPv6 header can compress to 2 to 20-bytes.
Initiates the 6LoWPAN network and Exchanges data
between devices on the 6LoWPAN network.
Form 6LoWPAN mesh networks on larger traditional
network perimeters.
They can also broker exchanges between IPV6 and
IPV4 if necessary.
18. Node Characteristics in 6LoWPAN
All nodes within a 6LoWPAN network share the same
IPv6 prefix that the edge router establishes.
Nodes will register with the edge routers as part of
the ND phase.
ND controls how hosts and routers in the local
6LoWPAN mesh will interact with each other.
Multi-homing allows for multiple 6LoWPAN edge
routers to manage a network
19. Nodes in 6LoWPAN Mesh
Nodes are free to move and reorganize/reassemble in a
mesh.
A node can move and associate with a different edge
router in a multi-home scenario or even move between
different 6LoWPAN meshes.
When such topology change occurs, the IPv6 address of
the associated nodes also change.
In an ad hoc mesh without an edge router, a 6LoWPAN
router node could manage a 6LoWPAN mesh.
20. Other Nodes in 6LoWPAN
Devices in a WPAN can behave like either hosts or
routers depending on source and destination
addresses of the datagrams.
Router nodes: These nodes forward data from one
6LoWPAN mesh node to another.
Routers can also communicate outward to the WAN
and internet.
Host nodes: Hosts in the mesh network cannot route
data and are simply endpoints consuming or
producing data. Hosts sleep & occasionally wake to
produce data or receive data cached by their parent
22. An Example end-to-end IP network that combines a traditional IPv6
core with an 6LoWPAN access
23. Addresses
Most link layer IoT technologies like IEEE 802.15.4
support 64-bit MAC addresses and configurable, 8-bit
or 16-bit short addresses typically assigned by the
PAN coordinator.
In the context of 6LoWPAN either one of these types
of addresses can be used to form the 64-bit IIDs.
Edge router exchanges 6LoWPAN ND messages that
not only support SAA but also enable it to keep track
of all devices in the link.
End devices can behave like routers or hosts
depending on their location and their traffic
24. Addresses
End devices do not have direct connectivity to the edge
router and rely on mesh routing to reach it.
Bootstrapping phase starts when the edge router begins
to advertise the 2001:11::/64 prefix to the devices by
means of 6LoWPAN ND RA messages.
Devices use this prefix and their own IID derived from
the 64-bit IEEE 802.15.4 MAC address to generate IPv6
addresses.
Devices, also relying on 6LoWPAN ND, register with the
edge router and receive a 16-bit IID that is combined
with the prefix to generate a less complex IPv6 address.
25. 6LoWPAN Adaptation Layer
6LoWPAN standard provides header compression to
reduce the transmission overhead, fragmentation to
meet the IPv6 MTU requirement, and forwarding to
link-layer to support multi-hop delivery.
Constrained device characteristics necessitate an
adaptation layer in 6LoWPAN protocol stack that fits
IPv6 packets to the IEEE 802.15.4 specifications.
26. 6LoWPAN Adaptation Layer
6LoWPAN provides an adaptation layer within layer
three (network layer) and on top of layer two (data
link layer).
This adaptation layer is defined by the IETF.
6LoWPAN adaptation layer provides reliability by
means of error detection and correction.
The adaptation layer must also support security
through encryption and authentication.
28. Route-over Network
In a route-over topology, networks will incur the
charge of forwarding packets up to layer three
(network layer) of the stack.
Route-over schemes manage routes at an IP level.
Each hop represents one IP router.
A route-over network implies that every router node
is equally capable and can perform the larger set of
functions as a normal IP router, such as duplicate
address detection.
29. Route-over Network...
When 6LoWPAN is in place, communication between
devices is by means of capillary networking where
devices acting as routers have only one interface.
Datagrams enter the router and leave the router on
the same interface.
Not all devices on a single link can talk to each due to
the power limitations that prevent long distance radio
transmissions.
6LoWPAN layer should decompress IPv6 addresses
that are used for routing.
30. Route-over Network
RFC 6550 formally defines the route-over protocol
RPL (ripple).
RPL provides multipoint-to-point communication (where
traffic from devices in a mesh communicate to a central
server on the internet) and point-to-multipoint
communication (central service to the devices in the
mesh).
Storing vs Non-storing network
33. Mesh Forwarding to the 6LoWPAN
Adaptation Layer (Mesh Under)
The alternative to route-over routing is to rely on the link layer to
perform multihop frame mesh forwarding and enable local link
connectivity.
The link layer keeps track of source and destination MAC
addresses for immediate hop communication but also original
source and destination MAC addresses for end-to-end support.
In the context of IEEE 802.15.4, mesh forwarding is introduced
as part of IEEE 802.15.5.
Link layer mesh forwarding is invisible to both 6LoWPAN and
IPv6.
34. Mesh-under Network
In a mesh-under topology, routing is transparent and
assumes a single IP subnet representing the entirety
of the mesh.
A message is broadcast in a single domain and is sent
to all devices in the mesh.
This generates considerable traffic.
Mesh-under routing will move from hop to hop in the
mesh but only forward packets up to layer two (data
link layer) of the stack.
IEEE 802.15.4 handles all the routing for each hop in
layer two.
36. Mesh-under Network
Here, 6LoWPAN keeps track of original source
and destination MAC addresses since the link
layer keeps tracks of source and destination
MAC addresses for immediate hop
communication.
37. Mesh-under Network
Essentially at every single hop source and destination
MAC addresses are overwritten at the link layer by
means of the original source and destination
addresses carried in the 6LoWPAN mesh header.
Knowing source, destination, original, andfinal MAC
addresses is not only needed for mesh forwarding but
also for other services provided by 6LoWPAN like
fragmentation and reassembly
39. Mesh Header
The header defines two 1-bit fields, O and F that,
respectively, indicate whether the original and final
MAC address is 16-bit PAN coordinator assigned or 64-
bit based.
Since the mesh header carries all information needed
for forwarding, it is the very first header included in a
6LoWPAN datagram.
40. Mesh Header
The header also includes a hops left field that indicates
how many times the packet can be forwarded before it
is dropped by the network.
As the datagram traverses a network, and it is
forwarded by different devices acting as routers, this
counter is decremented.
41. 6LoWPAN on Other LL Technologies
6LoWPAN requires that link layer protocols support
framing, unicast transmission and unique addresses that
can be used, in turn, to derive unique IPv6 addresses by
means of SAA.
Because IPv6 fragments cannot be smaller than 1280
bytes, 6LoWPAN performs its own fragmentation to adapt
datagram transmission to link layer mechanisms with
small MTUs.
It is therefore desirable for link layer frames to be as large
as possible with payloads of at least 60 bytes to minimize
the number of fragments that 6LoWPAN needs to track.
42. 6LoWPAN on Other LL Technologies
For fixed network packet loss, it is always good to
minimize the number of fragments per datagram
since the more fragments the higher the probability
that a datagram will get dropped by the network.
Also, 6LoWPAN compression can be used to
efficiently compress IPv6 and UDP headers in order
to maximize link layer payload size and therefore
minimize the number of fragments per datagram.
43. IETF CoRE (Constrained RESTful
Environments) Working Group (WG)
Chartered to provide a framework for RESTful
applications in constrained IP networks.
CoAP we know is used to let constrained devices
communicate with any node, either on the same
network or on the Internet, and provides a mapping
to HTTP REST APIs.
CoAP also provides create-read-update-delete
(CRUD) primitives for resources of constrained
devices and pub/sub communication capabilities.
44. CoAP Observe Option - Recap
CoAP Observe option is used in GET requests
in order to let the client register its interest in
the resource.
The server then sends “unsolicited” responses
back to the client, echoing the token it specified
in the GET request
Server also reports an Observe option with a
sequence number used for reordering purposes.
45. Message Queue Telemetry Transport
MQTT is a lightweight broker-based
publish/subscribe application protocol that
provides session layer functionality.
MQTT was developed and designed by IBM in
1999 for low transmission rate constrained
devices.
It can be used in scenarios where two-way
communications between endpoints operating in
unreliable networks must occur.
46. Publish/subscribe
Publish/subscribe, also known as pub/sub, is a
way to decouple a client transmitting a message
from another client receiving a message.
Unlike a traditional client-server model, the
clients are not aware of any physical identifiers
such as the IP address or port.
MQTT is a pub/sub architecture, but is not a
message queue
47. MQTT
According to the pub/sub model, in MQTT,
messages are published to a shared topic space
inside the broker.
Topics are used as filters on the message
stream from all publishers to the broker.
MQTT supports hierarchical topics in the form
of a topic/sub-topic/sub-sub-topic path.
48. MQTT Broker
A client transmitting a message is called a publisher;
a client receiving a message is called a subscriber.
In the center is an MQTT broker who has the
responsibility of connecting clients and filtering data.
In MQTT, the broker applies the subscription filters
to the message stream it receives in order to
efficiently determine to which clients a message
should be dispatched.
50. Matching the Condition Through Filter
Messages are delivered to all clients that have
subscribed with a matching topic filter.
This means that a single client can receive
messages coming from multiple publishers.
The matching condition is applied to the topic’s
hierarchy, so it possible to subscribe to just a
portion of the topic.
51. Filters in Pub/Sub
Subject filtering: By design, clients subscribe to topics and certain
topic branches and do not receive more data than they want.
Each published message must contain a topic and the broker is
responsible for either re-broadcasting that message to subscribed
clients or ignoring it.
Content filtering: Brokers have the ability to inspect and filter
published data. Thus, any data not encrypted can be managed by
the broker before being stored or published to other clients.
Type filtering: A client listening to a subscribed data stream can
apply their own filters as well. Incoming data can be parsed and the
data stream either processed further or ignored.