This document discusses Internet of Things (IoT) networking standards that enable IoT devices to connect using IPv6. It covers protocols like 6LoWPAN that allow IPv6 to be used over low-power wireless networks, as well as standards for routing (RPL), security (DTLS, CoAP), and device management (LWM2M, SUIT). It also mentions low-power wide area network technologies (LPWANs) and the Thread mesh networking standard that are important for connecting many IoT devices using IPv6.
MPLS VPN is a family of methods for using multiprotocol label switching (MPLS) to create virtual private networks (VPNs). MPLS VPN is a flexible method to transport and route several types of network traffic using an MPLS backbone.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
MPLS VPN is a family of methods for using multiprotocol label switching (MPLS) to create virtual private networks (VPNs). MPLS VPN is a flexible method to transport and route several types of network traffic using an MPLS backbone.
Tutorial about MPLS Implementation with Cisco Router, this first of two chapter discuss about What is MPLS, Network Design, P, PE, and CE Router Description, Case Study of IP MPLS Implementation, IP and OSPF Routing Configuration
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
A presentation given by RAD’s CTO, Dr. Yaakov Stein, at the 2012 MPLS and Ethernet World Congress. The presentation compares the two technologies in ten critical categories and grades them on suitability, coverage and maturity
In Internet of things network stack don't support IPV6 packet of length 1280 Bytes. there for 6LowPAN being an adaptation layer create chunks of IPV6 packet and make it compatible with Network stack. and on communicating with outer world 6LowPAN transform it into full length IPV6 Packet.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
This slide contains fundamental concept about Quality of Service (QoS) technology and various types of Queuing Methods, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
Mobile Transport Evolution with Unified MPLSCisco Canada
Mobile Service Providers are seeing unprecedented challenges in relation to their Transport architectures with the 3GPP evolution towards IP based Node Bs, LTE (Long Term Evolution) and LTE-Advanced. This presentation will initially discuss the network migration trends and factors that are changing how mobile networks are evolving. A description is provided on Unified MPLS and the current issues that need to be fixed and how this architecture addresses this. A more detailed analysis will then examine the options available for transporting GSM/2G, UMTS/3G traffic and IP/Ethernet Node B deployments and some of factors that need consideration like scalability, resiliency and security. Finally, there is a detailed description of the LTE/LTE - A evolution and the feature requirements made on the transport network. There will be detailed analysis of different LTE models and also some technical enhancements and proposals considered for the implementation of LTE in a Unified MPLS environment.
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
A presentation given by RAD’s CTO, Dr. Yaakov Stein, at the 2012 MPLS and Ethernet World Congress. The presentation compares the two technologies in ten critical categories and grades them on suitability, coverage and maturity
In Internet of things network stack don't support IPV6 packet of length 1280 Bytes. there for 6LowPAN being an adaptation layer create chunks of IPV6 packet and make it compatible with Network stack. and on communicating with outer world 6LowPAN transform it into full length IPV6 Packet.
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
This slide contains fundamental concept about Quality of Service (QoS) technology and various types of Queuing Methods, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
Intel IPSO/6LoWPAN solution for general wireless sensor network usman sarwar
The 6LoWPAN NBR is enabled on the Intel Baytrail platform with Linux. This solution can provide an open source gateway implementation of IPSO 6LoWPAN based solution. Kindly refer here to get details.
If you need more information or need to get more features please contact me thru LinkedIn or email
www.linkedin.com/hp/update/6178842682400567296
Usman Sarwar
IoT Connectivity Architect
usman.sarwar@intel.com
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
gogo6 IPv6 Video Series. Event, presentation and speaker details below:
EVENT
gogoNET LIVE! 4: IPv6 & The Internet of Things. http://gogonetlive.com
November 12 – 14, 201, Silicon Valley, California
Agenda: http://gogonetlive.com/gogonetlive4-agenda.asp
PRESENTATION
IoT Field Area Network Solutions & Integration of IPv6 Standards
Abstract: http://www.gogo6.com/profiles/blogs/my-presentation-at-gogolive-integration-of-ipv4-and-non-ip
Presentation video: http://www.gogo6.com/video/iot-field-area-network-solutions-integration-of-ipv6-standards-by
Interview video: http://www.gogo6.com/video/interview-with-carsten-bormann-at-gogonet-live-4-ipv6-iot-confere
SPEAKER
Patrick Grossetete - Technical Marketing Engineer (IoT), Cisco
Bio/Profile: http://www.gogo6.com/profile/PatrickGrossetete
MORE
Learn more about IPv6 on the gogoNET social network and our online training courses
http://www.gogo6.com/main
Get free IPv6 connectivity with Freenet6
http://www.gogo6.com/Freenet6
Subscribe to the gogo6 IPv6 Channel on YouTube
http://www.youtube.com/subscription_center?add_user=gogo6videos
Follow gogo6 on Twitter
http://twitter.com/gogo6inc
Like gogo6 on Facebook
http://www.facebook.com/pages/IPv6-products-community-and-services-gogo6/161626696777
Overview of Haystack's DASH7 technology, features, & applications. Includes information on real-time outdoor and indoor location. Discussion of Haystack support for Semtech's LoRa LPWAN radio.
Dataplane networking acceleration with OpenDataplane / Максим Уваров (Linaro)Ontico
HighLoad++ 2017
Зал «Москва», 7 ноября, 13:00
Тезисы:
http://www.highload.ru/2017/abstracts/2909.html
OpenDataPlane (ODP, https://www.opendataplane.org) является open-source-разработкой API для сетевых data plane-приложений, представляющий абстракцию между сетевым чипом и приложением. Сейчас вендоры, такие как TI, Freescale, Cavium, выпускают SDK с поддержкой ODP на своих микросхемах SoC. Если проводить аналогию с графическим стеком, то ODP можно сравнить с OpenGL API, но только в области сетевого программирования.
...
SDN programming and operations requires continuous monitoring of network and application state as well as consistent configuration and update of (forwarding) policies across heterogeneous devices. This is resulting in significant challenges.
Multiple open protocols such as OpenFlow, OF-CONFIG, OnePK , etc. are being adopted by different vendors causing an integration problem for developers.
Internet of Things applications are pushing the size and volume of data handled by SDN systems demanding more efficient and scalable protocols for information distribution and coordination of SDN devices.
This presentation will describe these and other SDN challenges and ways in which various open protocols, such as DDS, XMPP, AMQP, are being used to address them.
Google and Intel speak on NFV and SFC service delivery
The slides are as presented at the meet up "Out of Box Network Developers" sponsored by Intel Networking Developer Zone
Here is the Agenda of the slides:
How DPDK, RDT and gRPC fit into SDI/SDN, NFV and OpenStack
Key Platform Requirements for SDI
SDI Platform Ingredients: DPDK, IntelⓇRDT
gRPC Service Framework
IntelⓇ RDT and gRPC service framework
Madhu Rangarajan will provide an overview of Networking trends they are seeing in Cloud, various network topologies and tradeoffs, and trends in the acceleration of packet processing workloads. They will also talk about some of the work going on in Intel to address these trends, including FPGAs in the datacenter.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1. - 1
IPv6 & IoT
APRICOT 2019 / APNIC 47
February 2019
Daejeon, South Korea
@JordiPalet
(jordi.palet@theipv6company.com)
2. - 2
Full (incomplete) Picture
* https://www.postscapes.com/internet-of-things-alliances-roundup/
3. - 3
Why IoT with IPv6?
• Huge number of addresses (devices)
• Autoconfiguration
• Header compression
• IPv6-only: Dual-stack is not an option (tiny
devices)
• Avoid using non-IP such as ZigBee
4. - 4
6LoWPAN
• Initial IETF work on IoT
–IPv6 over Low Power Wireless Personal Area Networks
• 6LoWPAN
–IPv6 adaptation layer
• IEEE 802.15.4
–PHY & MAC layers
–Encryption
–127 bytes payload
IEEE 802.15.4 & 6
PHY
868MHz / 915MHz / 2.4GHz
Simpler MAC
32- / 64- / 128-bit encryption
LoWPAN shim
Fragmentation, Compression,
IPv6
Application
Stack Profile
IEEE
802.15.4
IETF
6LoWPAN
– IPv6 adaptation
IEEE 802.15.4
– encryption
– Physical & Media Ac
Control layers
– 127 bytes payload
IEEE 802.15.4 & 6LoWPAN
PHY
868MHz / 915MHz / 2.4GHz
Simpler MAC
32- / 64- / 128-bit encryption
LoWPAN shim
Fragmentation, Compression,
IPv6
Application
Stack Profile
IEEE
802.15.4
IETF
5. - 5
6LoWPAN Challenges
• Small packets
– Fragmentation
– Header Compression
• ND not efficient in low power wireless
• Topology
– Star and mesh
• Security and Privacy
– Nodes have low computing resources
– May be physically reachable
• Nodes may “sleep”
6. - 6
6Lo
• IPv6 over Networks of Resource-constrained Nodes
–Extend 6LoWPAN
–ND extensions
–Privacy
–Other PHY (Bluetooth LE, DECT ULE, G3-PLC, MS/TP,
NFC, Z-Wave, …)
7. - 7
6TiSCH
• IPv6 over the TSCH mode of IEEE 802.15.4e
• “Deterministic 802.15.4”
• The Timeslotted Channel Hopping (TSCH) mode was introduced in 2012 as
an amendment to the Medium Access Control (MAC) portion of the
IEEE802.15.4 standard.
• Nodes in a IEEE802.15.4 TSCH network communicate by following a Time
Division Multiple Access (TDMA) schedule.
• Use cases for LLNs (Low-power and Lossy Networks), including:
– Control loops in a wireless process control network, in which high reliability and a fully
deterministic behavior are required.
– Service Provider networks transporting data from different independent clients, and for
which an operator needs flow isolation and traffic shaping.
– Networks comprising energy harvesting nodes, which require an extremely low and
predictable average power consumption.
8. - 8
ROLL
• Routing Over Low power and Lossy networks
• RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks)
• L3 addresses
• Multiple IP links and IEEE802 broadcast/multicast domains
• Multiple border routers
• Reassembly in each hop
• Apps can see multiple link-locals
9. - 9
CoRE
• Constrained RESTful Environments
• Defined a Constrained Application Protocol (CoAP) for the
manipulation of Resources on a Device
• Request/Responses
• HTTP transaction typically 10 times higher than CoAP
• Power consumption matters! Lifetime!
10. - 10
DICE
• DTLS In Constrained Environments
• Supporting the use of Datagram Transport Layer Security in
these environments
11. - 11
ACE
• Authentication and Authorization for Constrained
Environments
• Solution for authentication and authorization to enable
authorized access (Get, Put, Post, Delete) to resources
identified by a URI and hosted on a resource server in
constrained environments
12. - 12
LPWAN
• IPv6 over Low-Power Wide-Area Networks
– SIGFOX, LoRa, WI-SUN and NB-IOT
• Optimized radio modulation
• Star topology
• Frame sizes in the order of tens of bytes transmitted a few
times per day at ultra-low speeds and sometimes variable
MTUs
• Downstream may be supported, but mostly upstream
transmission (devices in low-energy deep-sleep mode)
• Enables ranges of several Kms with long battery lifetime (10
years with a single coin-cell)
13. - 13
LWIG
• Light-Weight Implementation Guidance
• The goal is to be able to build minimal yet interoperable IP-
capable devices for the most constrained environments
• There are implementations that go even further in
minimization and can exist in as few as a couple of kilobytes
of code
14. - 14
SUIT
• Software Updates for Internet of Things
• Vulnerabilities in Internet of Things (IoT) devices have raised
the need for a secure firmware update mechanism that is
also suitable for constrained devices (Class 1 and up).
• RFC7228 defines “Classes of Constrained Devices”:
Name Data Size Code Size
(e.g., RAM) (e.g., Flash)
Class 0, C0 <10 KiB <100 KiB
Class 1, C1 ~10 KiB ~100 KiB
Class 2, C2 ~50 KiB ~250 KiB
15. - 15
Web of Things (I)
• Defines architecture to facilitate interoperability and
applications development by means of an
application layer
–CoAP for management
–CBOR and JSON for data formats
–DTLS and TLS for secure communications
–COSE and JOSE for object security (CBOR/JSON
Object Signing and Encryption)
–ACE for authenticated authorizations
16. - 16
Web of Things (II)
Web$of$Things
Hypermedia$Web$Applications
IPSO$Objects$+$Hypermedia
OMA$LWM2M
CoAP HTTP
6LowPAN IPv4/IPv6
MCU$–$16KiB$RAM MPU
802.15.4 WiFi,$Ethernet
Hardware
HW$Network
Routing
Application$Protocol
API$and$Services
Data$Models
Application
Web$Server
17. - 17
Thread Group
• Vendors consortium based on IPv6, 802.15.4 and 6LoWPAN
– Low-power wireless mesh based on IPv6.
– Enables device-to-device and device-to-cloud communications and
reliably connects hundreds (or thousands) of products and includes
mandatory security features.
– Thread networks have no single point of failure, can self-heal and
reconfigure when a device is added or removed, and are simple to
setup and use.
– Thread is based on the broadly supported IEEE 802.15.4 radio
standard, which is designed from the ground up for extremely low
power consumption and low latency.