This presentation is based on the IETF draft draft-farrell-lpwan-lora-overview-01 and provides a brief overview of the LoRaWAN architecture. It was presented at the LPWAN WG meeting in IETF 98.
This presentation is based on the IETF draft draft-farrell-lpwan-lora-overview-01 and provides a brief overview of the LoRaWAN architecture. It was presented at the LPWAN WG meeting in IETF 98.
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
WSN protocol 802.15.4 together with cc2420 seminars . It is based on the standand of ieee802.15.4 and data sheet of the radio transceiver cc2420.
Note that some slides are borrowed.
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
The security flaws of legacy GSM networks, which lack of mutual authentication and implement an outdated encryption algorithm, are well understood among the technology community and have been extensively discussed for years. However, my smartphone’s settings do not provide the means to shut down the GSM radio to prevent my phone from connecting to a potentially insecure GSM access point. Instead, I have the option to turn off LTE, the fastest mobile network.
This is not the only confusing aspect of mobile network security. Given LTE’s mutual authentication and strong encryption scheme result, there is a general assumption that LTE rogue base stations are not possible. However, before the connection authentication step, any mobile device implicitly trusts (and exchanges a substantial amount of messages with) any LTE base station, legitimate or not, that advertises itself with the right parameters. Such implicit trust and unprotected messages can be exploited to block mobile devices and track their location.
Finally, it is generally assumed that Stingrays and IMSI catchers are expensive equipment that require downgrading the connection of mobile devices to GSM. However, a basic fully-LTE IMSI catcher can be implemented by means of low-cost software radio and slight modification of a well known open-source implementation of the LTE stack.
This talk will present an exploration of the security of LTE networks, as well as experimentation results of passive eavesdropping threats, LTE protocol exploits to block mobile devices and a location leak that allows tracking mobile devices as the connection is handed off from tower to tower.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Weightless - a new standard, a new technologyDhruvit Rajpura
It was a pleasure giving a power-point presentation on the new trending LPWAN technology i.e. the weightless standard. Weightless-p is indeed a truly open sourced technology with a definite future, specifically designed for IIOT in order to make M2M communications better.
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3G4G
This SON tutorial is part of the 3GPP Self-Organizing Networks series (#3GPPSONSeries). In this part we will look at what is meant by Inter-Cell Interference Coordination (ICIC) and how does the standard define the mechanism to help erase it. We will also look at some of the basic algorithms used for ICIC.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
This presentation/video provides an example of the registration procedure. The device or UE needs to let the core network(s) know that it is switched on and active. This procedure is known as registration. The UE can register individually to the CS and PS core networks. Most modern networks allow combined registration (or combined attach) whereby the UE registers only to the PS network and the PS network informs the CS network that the UE is active.
WSN protocol 802.15.4 together with cc2420 seminars Salah Amean
WSN protocol 802.15.4 together with cc2420 seminars . It is based on the standand of ieee802.15.4 and data sheet of the radio transceiver cc2420.
Note that some slides are borrowed.
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
The security flaws of legacy GSM networks, which lack of mutual authentication and implement an outdated encryption algorithm, are well understood among the technology community and have been extensively discussed for years. However, my smartphone’s settings do not provide the means to shut down the GSM radio to prevent my phone from connecting to a potentially insecure GSM access point. Instead, I have the option to turn off LTE, the fastest mobile network.
This is not the only confusing aspect of mobile network security. Given LTE’s mutual authentication and strong encryption scheme result, there is a general assumption that LTE rogue base stations are not possible. However, before the connection authentication step, any mobile device implicitly trusts (and exchanges a substantial amount of messages with) any LTE base station, legitimate or not, that advertises itself with the right parameters. Such implicit trust and unprotected messages can be exploited to block mobile devices and track their location.
Finally, it is generally assumed that Stingrays and IMSI catchers are expensive equipment that require downgrading the connection of mobile devices to GSM. However, a basic fully-LTE IMSI catcher can be implemented by means of low-cost software radio and slight modification of a well known open-source implementation of the LTE stack.
This talk will present an exploration of the security of LTE networks, as well as experimentation results of passive eavesdropping threats, LTE protocol exploits to block mobile devices and a location leak that allows tracking mobile devices as the connection is handed off from tower to tower.
Check out slides presented by Mo Haghighi, Research Scientist at Intel Labs Europe, which explore how to solve urban challenges at the Olympic Park. These slides were presented at Digital Catapult's LPWAN London meetup.
Weightless - a new standard, a new technologyDhruvit Rajpura
It was a pleasure giving a power-point presentation on the new trending LPWAN technology i.e. the weightless standard. Weightless-p is indeed a truly open sourced technology with a definite future, specifically designed for IIOT in order to make M2M communications better.
3GPP SON Series: Inter-Cell Interference Coordination (ICIC)3G4G
This SON tutorial is part of the 3GPP Self-Organizing Networks series (#3GPPSONSeries). In this part we will look at what is meant by Inter-Cell Interference Coordination (ICIC) and how does the standard define the mechanism to help erase it. We will also look at some of the basic algorithms used for ICIC.
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
Group A - IEEE_802.15.4
Apil, Irish A.
Cenal, Marie Claire B.
Cruz, Joshua Franzel
Esguerra, Jomarie Paolo L.
Estavillo, Edlyn U.
Jacoben, Joanne Marie G.
Lucas, Ralph Jayson
ZigBee defines the application and security layer specifications enabling interoperability between products from different manufacturers.ZigBee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless M2M networks.It is very useful in this communication world.
Wireless zigbee communication technology 141215052616-conversion-gate01M srinivasu
ZigBee defines the application and security layer specifications enabling interoperability between products from different manufacturers.ZigBee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless M2M networks.It is very useful in this communication world
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Introduction to IoT
Defining IoT,
Characteristics of IoT,
Physical design of IoT,
Logical design of IoT,
Functional blocks of IoT,
Brief review of applications of IoT.
Smart Object
Definition,
Characteristics and Trends
Text Book
1. Arsheep Bahga (Author), Vijay Madisetti, Internet Of Things: A Hands-On Approach
Paperback, Universities Press,
Reprint 2020
2. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,
IoT Fundamentals Networking Technologies, Protocols, and Use Cases for the Internet of
Things CISCO.
Internet of Things.
CSDLO5013
The Differences Between Bluetooth, ZigBee and WiFiMostafa Ali
Understanding Differences Between Bluetooth, ZigBee and WiFi.
It's not about what is the best it's just a description, the best you have to choose for your project what is suitable more?
Now we discuss job analysis:
We discuss its outcome, uses of job analysis information,
job analysis process (steps), method of job analysis information, writing a job description, writing a job specification,
If any confusion then tells in the comment section.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
2. INTRODUCTION
• Development started 1998, when many engineers
realized that WiFi and Bluetooth were going to be
unsuitable for many applications.
• The IEEE 802.15.4 standard was completed in May
2003.
• The ZigBee specifications were ratified on 14
December 2004.
• The ZigBee Alliance announced public availability of
Specification 1.0 on 13 June 2005.
• Much research is still going on with ZigBee.
3. WHAT IS ZIGBEE?
•Technological Standard Created for
Control and Sensor Networks
•Based on the IEEE 802.15.4 Standard
•Created by the ZigBee Alliance
4. ZIGBEE ALLIANCE (COMPANY)
• Organization defining global standards for reliable,
cost‐effective, low power wireless applications.
• Developing applications and network capability
utilizing the 802.15.4 packet delivery mechanism.
5. CHARACTERISTICS
• Low cost
• Low power consumption
• Low data rate
• Relatively short transmission range
• Scalability (System capacity, capability)
• Reliability
• Flexible protocol design suitable for many applications
6. IEEE 802.15.4 STANDARD AND ZIGBEE
• The IEEE 802.15.4 standard defines both the physical
and MAC layer protocols for most remote monitoring
and control, as well as sensor network applications.
ZigBee is an industry consortium with the goal of
promoting the IEEE 802.15.4 standard. ZigBee ensures
interoperability by defining higher network layers and
application interfaces.
7. ZIGBEE
• Zigbee emerging applications of Wireless Sensor
Network is wireless monitoring and control.
• ZigBee is such an application that uses low-power and
low-data-rate networked sensors. It was developed by
the ZigBee Alliance, an industry association of
semiconductor companies and network equipment
companies such as Ember, Honeywell, Mitsubishi
Electric, Motorola, Samsung, and Philips.
8. ZIGBEE JUST LIKE HONEYBEES
• The term ZigBee refers to the silent communication
between honeybees where the bee dances in a zig-zag
pattern to tell others the location, distance, and
direction of some newly found food.
9. IEEE 802.15.4 LR-WPAN (ZIGBEE)
• ZigBee technology is simpler (and less expensive) than
Bluetooth.
• The main objectives of an LR-WPAN like ZigBee are ease of
installation, reliable data transfer, short-range operation,
extremely low cost, and a reasonable battery life, while
maintaining a simple and flexible protocol.
• The raw data rate will be high enough (maximum of 250 kbit/s)
to satisfy a set of simple needs such as interactive toys, but is
also scalable down to the needs of sensor and automation
needs (20 kbit/s or below) using wireless communications.
10. ZIGBEE USAGE
• The initial target markets of ZigBee products are home control,
building control, industrial automation, personal healthcare,
consumer electronics, PC and peripherals control, etc. Key
specs of ZigBee include the following:
● Frequency bands: 868 MHz, 915 MHz, and 2.4 GHz
● Data transfer rate up to 250 Kbps
● Signal transmission range of 10 to 100 m, depending on the
sensors being
used
● AES(Advanced Encryption Standard) encryption of data
● Various ZigBee applications can work with each other
● Low power usage
11. ZIGBEE FREQUENCIES
• Operates in Unlicensed Bands
• ISM(International Safety Management) 2.4 GHz Global
Band at 250kbps
• 868 MHz European Band at 20kbps
• 915 MHz North American Band at 40kbps
12. IEEE 802.15.4 & ZIGBEE IN CONTEXT
S
PHY
868MHz / 915MHz / 2.4GHz
MAC
Network
Star / Mesh / Cluster-Tree
Security
32- / 64- / 128-bit encryption
Application
API
ZigBee
Alliance
IEEE
802.15.4
Customer
Silcon Stack App
“the software”
- Network, Security & Application layers
- Brand management
IEEE 802.15.4
- “the hardware”
- Physical & Media Access Control layers
13. SECURITY
• Encryption specified for MAC, Network and APS layers
• Encryption/Authentication mode CCM(CTR +CBC-MAC)
• CTR is a counter based encryption mode
• CBC-MAC provides data integrity
• All security is based on 128bit key and AES-128 block
encryption method
14. IEEE 802.15.4 PHYSICAL LAYER
• PHY functionalities:
• Activation and deactivation of the radio transceiver
• Energy detection within the current channel
• Link quality indication for received packets
• Clear channel assessment for CSMA-CA
• Channel frequency selection
• Data transmission and reception
15. PHY FRAME STRUCTURE
• PHY packet fields
• Preamble (32 bits) – synchronization
• Start of packet delimiter (8 bits) – shall be formatted as “11100101”
• PHY header (8 bits) –PSDU length
• PSDU (0 to 127 bytes) – data field
Start of
Packet
Delimiter
PHY Header
Sync Header
Frame
Length
(7 bit)
Preamble
PHY Payload
PHY Service
Data Unit (PSDU
Reserv
e
(1 bit
4 Octets 1 Octets 1 Octets 0-127 Bytes
16. WHAT DOES ZIGBEE DO?
• Designed for wireless controls and sensors
• Operates in Personal Area Networks (PAN’s) and
device-to-device networks
• Connectivity between small packet devices
• Control of lights, switches, thermostats, appliances,
etc.
18. HOW ZIGBEE WORKS
• States of operation
• Active
• Sleep
• Devices
• Full Function Devices (FFD’s)
• Reduced Function Devices (RFD’s)
• Modes of operation
• Beacon
• Non-beacon
20. LR-WPAN DEVICE TYPES
Two different device types can participate in an LR-WPAN
network:
• Full-function devices (FFD) can operate in three modes serving
as a personal area network (PAN) coordinator, a coordinator, or
a device.
• Reduced-function devices (RFD) are intended for applications
that are extremely simple.
An FFD can talk to RFDs or other FFDs, while an RFD can talk
only to an FFD.
21. NETWORK TOPOLOGIES (1)
• Two or more devices communicating on the same physical
channel constitute a WPAN. The WPAN network must include at
least one FFD that operates as the PAN coordinator.
• The PAN coordinator initiates, terminates, or routes
communication around the network. The PAN coordinator is the
primary controller of the PAN.
• The WPAN may operate in either of two topologies: the star
topology or the peer-to-peer topology.
22. NETWORK TOPOLOGIES (2)
Star topology In a star network, after an FFD is
activated for the first time, it may
establish its own network and become
the PAN coordinator.
The PAN coordinator can allow other
devices to join its network.
PAN coordinator (always FFD) FFD RFD
23. NETWORK TOPOLOGIES (3)
In a peer-to-peer network, each FFD
is capable of communicating with any
other FFD within its radio sphere of
influence. One FFD will be nominated
as the PAN coordinator.
Peer-to-peer topology
A peer-to-peer network can be ad hoc, self-
organizing and self-healing, and can combine
devices using a mesh networking topology.
24. ZIGBEE PHY AND MAC PARAMETERS
Topology
RF band
RF channels
Spreading
Chip rate
Modulation
Access method
Ad hoc (central PAN coordinator)
2.4 GHz ISM frequency band
16 channels with 5 MHz spacing
DSSS (32 chips / 4 bits)
2 Mchip/s
Offset QPSK
CSMA/CA (or slotted CSMA/CA)
25. SPREADING AND MODULATION
• Four consecutive bits are mapped into a data symbol. Each
symbol is mapped into a 32-chip pseudorandom sequence. The
even-indexed and odd-indexed chips of the chip sequence
representing each data symbol are modulated onto the carrier
using Offset-QPSK in the following way:
C0 C2 C4 C6 C8 C10 C12 ...
...
C1 C3 C5 C6 C9 C11 C13 ...
...
I-phase
Q-phase
26. BEACON FRAMES
• The LR-WPAN standard allows the optional use of a superframe
structure. The format of the superframe is defined by the
coordinator. The superframe is bounded by network beacons,
sent by the coordinator, and is divided into 16 equally sized
slots. The beacon frame is transmitted in the first slot of each
superframe. If a coordinator does not wish to use a superframe
structure, it may turn off the beacon transmissions. The
beacons are used to synchronize the attached devices, to
identify the PAN, and to describe the superframe structure.
27. CSMA/CA OPERATION (1)
• Nonbeacon-enabled networks use an unslotted CSMA-CA
channel access mechanism. Each time a device wishes to
transmit data frames or MAC commands, it shall wait for a
random period. If the channel is found to be idle, following the
random backoff, the device shall transmit its data. If the
channel is found to be busy, following the random backoff, the
device shall wait for another random period before trying to
access the channel again.
• Acknowledgment frames shall be sent without using a CSMA-
CA mechanism.
28. CSMA/CA OPERATION (2)
• Beacon-enabled networks use a slotted CSMA-CA channel
access mechanism, where the backoff slots are aligned with the
start of the beacon transmission.
• Each time a device wishes to transmit data frames, it shall wait
for a random number of backoff slots. If the channel is busy,
following this random backoff, the device shall wait for another
random number of backoff slots before trying to access the
channel again. If the channel is idle, the device can begin
transmitting on the next available backoff slot boundary.