Professional Documents
Culture Documents
Introduction to IoT
Definitions, Characteristics, Applications
• Alternate Definition:
“The Internet of Things (IoT) is the network of physical objects that contain
embedded technology to communicate and sense or interact with their internal
states or the external environment.” – Gartner Research*
* https://www.gartner.com/en/information-technology/glossary/internet-of-things
To the Businesses
– WSN is primarily used for monitoring and recording the physical environment
conditions like temperature, sound, pollution levels, humidity, wind, and so on.
– In a WSN, there is no direct connection to the internet. Instead, the various sensors
connect to some kind of router or central node.
• In 2017, Cisco Systems estimates that these new connections will lead to $19 trillion in
profits and cost savings
18-11-2020 Dr. Manas Khatua 7
Where is IoT?
Wearable
Tech Devices
Smart Appliances
It’s everywhere!
Industry Automation
and Monitoring
Healthcare
18-11-2020 Dr. Manas Khatua 8
Global IoT Market Share
14% Smart Homes Retail < 2%
3%
Wearables Smart Utilities
& Energy
4%
7%
Industrial IoT
Connected Cars
24%
Source: https://depositphotos.com/126025652/stock-illustration-smart-city-concept-and-internet.html
Source: https://medium.com/@globalindnews/north-america-accounted-for-major-share-in-the-global-smart-home-healthcare-market-in-2015-cc9cc1974ac5
Source: http://iot.fit-foxconn.com/
Source: https://data-flair.training/blogs/industrial-iot-applications/
Source: https://www.winmate.com/Solutions/Solutions_IoT.asp
Source: https://www.google.com/
Source: https://in.pinterest.com/pin/515380751093603767/?lp=true
Source: https://data-flair.training/blogs/iot-applications-in-agriculture/
Interoperability
• various protocol, various architecture
• unavailability of standardized platform
• different technology leads to interoperability issue
• Recent IoT standards are minimizing this problem
• Community components:
IoT Frameworks
• Tools needed to design and implement IoT-based solutions and products
IoT Architectures
• Graphical structure of the designed IoT-based solutions and products
IoT Core
• Sensors & Actuators, microcontrollers, internet connectivity, service platform including security
IoT Gateway
• It carries the responsibility to ensure bidirectional communication between IoT protocols and other networks
Cloud
• Accepts, accumulates, maintains, stores, and process data in real time
Analytics
• It indulges in conversion of data which results in meaningful suggestions and recommendations
– sensors, sensor systems, gateways, mobile app, embedded controller, data management
platform, analytical platform, and so on.
– support interoperability among all devices, provides secure connectivity, reliability in data
transfer, interface to 3rd party application to built on it, and so on.
Driving forces:
Scale
Security
Constrained devices
Massive data
Data analysis
Support to legacy devices
• Architecture is how you design (i.e. graphical
structure) your application or solution.
• Goal : to create a common services layer, which can be readily embedded in field
devices to allow communication with application servers.
Source: B. Kang, D. Kim, H. Choo, “Internet of Everything: A Large-Scale Autonomic IoT Gateway”,
IEEE Transactions on Multi-scale Computing Systems, vol. 3, no. 3, 2017, pp. 206-214.
MQ135 - Air Quality Sound Detection DHT11 - Temperature PIR Motion Detector
Gas Sensor Sensor and Humidity Sensor Sensor
LED LCD
Linear Actuators
Source: Nick Lethaby “Wireless Connectivity for the IoT: one size does not fit all”, Texas Instruments, 2017
Use of AI in IoT:
• Smart Home
– Automated HVAC control
• Industrial IoT
– Predictive maintenance
– Optimized supply chain
• Farming
– Smart farming
– Interruption warning
• Self-driving Car
– Mimic human driving on road
• Health
– Auto-diagnosing any disease
– Assistive healthcare
The business value of IoT is not just in the ability to connect devices, but it
comes from understanding the data these devices create.
Challenges:
Huge Volume
Real-time data flow
Variety of data types
e.g. XML, video, SMS
Unstructured data
Variable data model and
meaning / value
IoT analytics is the application of data analysis tools and procedures to realize
value from the huge volumes of data generated by connected IoT devices
Source:https://www.theguardian.com/technology/2016/oct/26/ddos-
attack-dyn-mirai-botnet Source:http://metropolitan.fi/entry/ddos-attack-halts-heating-in-
finland-amidst-winter
Source: https://www.youtube.com/watch?v=7E1WsdODxu0
Source: https://www.youtube.com/watch?v=4oONdV5RYp8
• Users can actively check and act in for their IOT system
Important
Characteristics:
Sleek design
Visually appealing
Interactive UI
Ease-of-use
Handy
Source: https://data-flair.training/blogs/how-iot-works/
IoT Architecture
“We must have life-building, man-making, character-making assimilation of ideas.” – Swami Vivekananda
Architectural Plan
Smart Home
Networks run the modern
business
Driving forces:
The key difference between the IT and IoT is Scale
sensor & data Security
Constrained devices
Massive data
Essence of IoT architecture:
Data analysis
how the data is
transported, Support to legacy
collected, devices
analyzed, and
ultimately acted upon.
Image Source: Rajiv Ranjan et. al., “Integrating the IoT and Data Science” IEEE Cloud Computing, 2018
• Include:
• the physical
network that the
IoT applications
run on. (e.g.
backhaul network)
• the underlying
management
protocols
• the hardware
IoT devices,
communicat
ion network
(802.15.4,
LoRa, WiFi)
• Identify different
technologies at each layer
• primary function is
generating data
Layers Functions
Layer 4: Data Accumulation • Captures data and stores it for applications
• Convert event-based data to query-based processing
Layer 5: Data Abstraction • Reconciles multiple data formats
• Ensures consistent semantics for various data sources
• Confirmation about dataset completeness
Layer 6: Application • Interpret data using software applications
• Applications may monitor, control, and provide report
based on analysing the data
Layer 7: Collaboration and • Consumes and shares the application information
processes • Collaborating and communicating IoT information
26-09-2020 Dr. Manas Khatua 13
Simplified IoT Architecture
• It highlights the fundamental building blocks that are common to most IoT
systems and which is intended to help in designing an IoT network.
The “Things” in IoT
“Arise! Awake! Stop not till the goal is reached.”‐ Swami Vivekananda.
The “Things”
Sensors & Actuators are the fundamental building
blocks of IoT
Sensor senses Sensor
Actuator acts
Smart objects are any physical objects that contain
Actuator
Embedded technology
Sensors and/or actuators
Smart objects are to sense and/or interact with
their environment in a meaningful way
by being interconnected, and
enabling communication among themselves or an
external agent. Smart Object
03‐10‐2020 Dr. Manas Khatua 2
Sensors
• It measures some physical quantity and converts that measurement into analog/digital form
• There are a number of ways to group and cluster sensors into different categories
– Based on external energy requirement
• Active / Passive
– Based on placement location
• Invasive / Non‐invasive
– Based on distance from the sensing object
• Contact / No‐contact
– Based on application industry
• Medical / Manufacturing / Agriculture / etc.
– Based on measuring scale
• Absolute / Relative
– Based on sensing mechanism
• Thermoelectric / Electromechanical / Piezo resistive / Optic / Electric / Fluid mechanics / Photoelastic / etc.
– Based on sensing parameter
• Position / Occupancy / Motion / Velocity / Force / Pressure / Flow / Humidity / Light / Temperature / Acoustic /
Radiation / Chemical / Biosensors / etc.
03‐10‐2020 Dr. Manas Khatua 3
Sensor Types: What it measures
Sensor Type Description Example
Position • Measures the position of an object • Proximity sensor
• Position could be absolute/relative • Potentiometer
• Position sensor could be linear, angular, • Inclinometer
or multi‐axis
Occupancy • Detects the presence of people and • Radar Sensor
animals in a surveillance area
• Generates signal even when a person is
stationary
Motion • Detects the movement of people and • Passive Infrared (PIR)
objects Sensor
03‐10‐2020 Dr. Manas Khatua 6
Cont…
Sensor Type Description Example
Radiation • Detects the radiation in the environment • Neutron detector
• Geiger‐Muller counter
Temperature • Measures the amount of heat or cold • Thermometer
present in the system • Temperature gauge
• Two type: contact / non‐contact • Calorimeter
03‐10‐2020 Dr. Manas Khatua 7
Cont…
Sensor Type Description Example
Acoustic • Measures sound level • Microphone
• Hydrophone
Chemical • Measures the concentration of a • Smoke detector
chemical (e.g. CO2) in a system • Breathalyzer
Biosensor • Detects various biological elements, such • Pulse oximeter
as organisms, tissues, cells, enzymes, • Electrocardiograph (ECG)
antibodies, nucleic acid, etc. • Blood glucose biosensor
03‐10‐2020 Dr. Manas Khatua 9
Sensors in a Smartphone
03‐10‐2020 Dr. Manas Khatua 10
Actuators
• Sensors are designed to sense and measure the surrounding environment
• Actuators receive some type of control signal (commonly an electrical
signal or digital command) that triggers a physical effect, usually some
type of motion, force, and so on.
Source: https://cdn2.hubspot.net/hubfs/1878050/Landingpages/Events/Schwabengipfel/Guido_Schmutz_IoT‐Cloud‐or‐OnPrem.pdf?t=1501051153000
03‐10‐2020 Dr. Manas Khatua 11
Cont…
Source:
https://bridgera.com/iot‐
system‐sensors‐actuators/
Source:
https://www.novatec‐
gmbh.de/blog/sensors‐
and‐actuators‐of‐the‐iot/
03‐10‐2020 Dr. Manas Khatua 12
Actuator Classification
• Common ways to classify actuators:
Type of motion they produce
• e.g. linear, rotary, one/two/three axes
Power output
• e.g. high power, low power, micro power
Binary / Continuous output
• Based on number of stable‐state outputs
Area of application
• Specific industry or vertical where they are used
Type of energy
• e.g. mechanical energy, electrical energy, hydraulic energy, etc.
03‐10‐2020 Dr. Manas Khatua 13
Actuators by Energy Type
Type Examples
Electromagnetic actuators Electromagnet, Linear solenoid
Hydraulic and Pneumatic Hydraulic cylinder, Pneumatic cylinder, Piston,
actuators Pressure control valve, Air motor
03‐10‐2020 Dr. Manas Khatua 14
Smart Objects
• It is the building blocks of IoT
• Smart object has the following five characteristics:
– Sensor(s) and/or Actuator(s)
– Processing unit
• For acquiring sensed data from sensors,
• processing and analysing sensing data,
• coordinating control signals to any actuators, and
• controlling many functions (e.g. communication unit, power unit).
– Memory
• Mostly on‐chip flash memory
• user memory used for storing application related data
• program memory used for programming the device
– Communication unit
• Responsible for connecting a smart object with other smart
objects and the outside world (via the network using
wireless/wired communication)
– Power source
• To powered all components of the smart object
TelosB Mote
03‐10‐2020 Dr. Manas Khatua 15
Cont…
Source: Cisco
03‐10‐2020 Dr. Manas Khatua 16
Present Trends in Smart Objects
• Size is decreasing
• Power consumption is decreasing
• Processing power is increasing
• Communication capabilities are improving
• Communication is being increasingly standardized
03‐10‐2020 Dr. Manas Khatua 17
Lessons Learned
What is “Things” in IoT
Classification method of Sensors
Different Sensors based on Sensing parameter
Classification method of Actuators
Different Actuators based on Energy type
What is “Smart object” in IoT
03‐10‐2020 Dr. Manas Khatua 18
Figures and slide materials are taken from the following Books:
1. David Hanes et al., “IoT Fundamentals: Networking Technologies, Protocols,
and Use Cases for the Internet of Things”, 1st Edition, 2018, Pearson India.
03‐10‐2020 Dr. Manas Khatua 19
CS578: Internet of Things
UART
Serial Communication
“We suffer as a result of our own actions; it is unfair to blame anybody for it.” – Ma Sarada Devi
UART
UART stands for Universal Asynchronous Receiver Transmitter
• It is a physical circuit in a microcontroller, or a stand-alone IC
• Full Duplex: Devices can send and receive at the same time
• TX (transmission)
• RX (reception).
• Data flows from the TX pin of the transmitting UART to the RX pin of the receiving UART
• For communication between the devices, both of them have to have same baud rate
• Baud rate is a measure of the speed of data transfer, expressed in bits per second (bps).
• The baud rate between the transmitting and receiving UARTs can only differ by max 10%.
• Bit Rate = Baud rate x the number of bit per baud
Start Bit:
• The UART transmission line is normally held at a high voltage level when it’s not
transmitting data
• It start bit is set to logic low as it is used to signal the receiver that a new framing is
coming.
Data Frame:
• Next 5-8 bits carry the “data bits” (information), if one parity bit is used.
• Otherwise, data bits can be 5-9 bits
Parity:
• It is an optional bit.
• It is used to detect the wrong data packets, i.e. error during transmission
• Two type of parity bit used: even parity, odd parity.
• Even parity:
• If the count of bits with value 1 is odd, the parity bit value is set to 1, making the total
count of occurrences of 1s in the whole set (including the parity bit) an even number.
• If the count of 1s in a given set of bits is already even, the parity bit's value is 0.
• Odd parity:
• In the case of odd parity, the coding is reversed.
Stop Bits:
• To signal the end of the data packet, the sending UART drives the data transmission line from a low
voltage to a high voltage for at least two bit durations.
2. The transmitting UART adds the start bit, (even) parity bit, and stop bit(s) to the data frame:
Cont…
3. The entire packet is sent serially from the transmitting UART to the receiving UART.
The receiving UART samples the data line at the pre-configured baud rate:
4. The receiving UART discards the start bit, parity bit, and stop bit from the data frame:
Cont…
5. The receiving UART converts the serial data back into parallel and transfers it to the data bus
on the receiving end:
Advantages and Disadvantages
Advantages:
1) Well documented and widely used method.
5) The structure of the data packet can be changed as long as both sides are set up
for it.
Disadvantages:
1) The size of the dataframe is limited to maximum of 9 bits.
3) The baud rate of each UART must be with 10% of each other.
The first of the serial data transmission standards was RS232, or more correctly RS-232 or
COM-port. This was developed in 1962.
There are more recent standards which allow high speed data transmission along with
multiple transmitters and receivers
E.g. USB
Lessons Learned
“All Birds find shelter during a rain. But Eagle avoids rain by flying above the Clouds” – APJ Abdul Kalam
Communications Criteria
• A large number of wired and
wireless access technologies are
available
• Wireless communication is
prevalent for smart object
connectivity
– ease of deployment
– allows smart objects to be mobile
without losing connectivity
• Short range:
– tens of meters of maximum distance between two devices • Long range
– often considered as an alternative to serial cable – greater than 1 mile (1.6 km)
between two devices
– IEEE 802.15.1 Bluetooth, IEEE 802.15.7 Visible Light
Communications (VLC) – Wireless : 2G, 3G, 4G, Outdoor
Wi-Fi (IEEE 802.11ah), Low-
Power Wide-Area (LPWA)
• Medium range communications
– tens to hundreds of meters between two devices – Wired : IEEE 802.3 ethernet
– Wireless : IEEE 802.11 WiFi, IEEE 802.15.4 Low Rate WPAN, over optical fiber, IEEE 1901.2
IEEE 802.15.4g Smart Utility Networks (SUN) Broadband PLC
– Wired : IEEE 802.3 Ethernet, IEEE 1901.2 Narrowband
Power Line Communications (PLC)
• Layer 1 and Layer 2 protocols must be evaluated in using the following characteristics:
– data rate and throughput
– latency and determinism
– overhead and payload.
IEEE 802.15.4 is the IEEE standards for Low Rate Wireless Networks (or Low Rare Wireless
Personal Area Networks). Latest version published in 2015.
• Several network communication stacks leverage this technology for many IoT
use cases in both the consumer and business markets.
• Few applications:
Home and building automation
Automotive networks
Industrial wireless sensor networks
Interactive toys and remote controls
• ZigBee uses AODV routing across a mesh • ZigBee network & security layer
network provides mechanisms for network
startup, configuration, routing, and
• ZigBee utilizes 128-bit AES encryption for securing communications.
security at the MAC layer
• ZigBee utilizes the IEEE 802.15.4
• It also provides security at the network and standard at the PHY and MAC layers
application layers.
13-10-2020 Dr. Manas Khatua 17
ZigBee IP
• ZigBee has not provided interoperability
with other IoT solutions or open standards
• Modulation schemes
– OQPSK PHY : Direct sequence spread spectrum (DSSS) PHY employing offset quadrature phase-shift
keying (OQPSK)
– BPSK PHY : DSSS PHY employing binary phase-shift keying (BPSK)
– ASK PHY : parallel sequence spread spectrum (PSSS) PHY employing amplitude shift keying (ASK)
and BPSK
IEEE 802.15.4 PHY Frame Format SFD (1 byte): informs the receiver about the
starting point of frame content
13-10-2020 Dr. Manas Khatua 19
IEEE 802.15.4 MAC layer
• MAC layer manages access to the PHY channel
• defines how devices in the same area will share the frequencies allocated.
• Main tasks:
• Network beaconing for devices acting as coordinators
• PAN association and disassociation by a device
• Reliable link communications between two peer MAC entities
• Device security
16-bit short address
OR
64-bit extended address
Compress
• IEEE 802.15.4 does not define a path selection for a mesh topology
Mesh-under: Path selection can be done at Layer 2
Mesh-over: Path selection can occur at Layer 3 in routing protocol
• IEEE 802.15.4 specification uses Advanced Encryption Standard (AES) with a 128-bit
key length as the base encryption algorithm
• Message integrity code (MIC), which is calculated for the entire frame using the
same AES key, to validate the data that is sent
IEEE 802.15.4g & IEEE 802.15.4e are the PHY and MAC layer amendments of wireless
personal area networks (IEEE 802.1.5.4) published in 2012.
• IEEE 802.15.4 maximum payload size of 127 bytes 2047 bytes for SUN PHY.
– Fragmentation is no longer necessary at Layer 2 for IPv6 packets
• Error protection was improved in IEEE 802.15.4g by the CRC from 16 to 32 bits.
• SUN PHY supports multiple data rates and more channels in ISM bands
• Modulation schemes:
– MR-FSK : Multi-Rate and Multi-Regional Frequency Shift Keying
• good transmit frequency
– MR-OFDM : Multi-Rate and Multi-Regional Orthogonal Frequency Division
Multiplexing
• good data rate
– MR-O-QPSK : Multi-Rate and Multi-Regional Offset Quadrature Phase-Shift Keying
• cost effective design
• Enhanced ACK
allow for the integration of a frame counter for the frame being acknowledged
helps to protect against certain attacks
• Message integrity
code (MIC) validates
the data that is sent
Mesh Topology
• Battery-powered nodes
with a long lifecycle
requires
– optimized Layer 2
forwarding or
– optimized Layer 3
routing protocol
• OFDM Modulation
• Null data packet (NDP) support: to cover control and management frames.
– It is only transmitted by a STA; It carry’s no data payload.
• Sectorization: partition the coverage area of a Basic Service Set (BSS) into sectors, each
containing a subset of stations. it uses an antenna array and beam-forming technique.
– reduces contention by restricting which group, in which sector, and at which time window.
– to mitigate the hidden node problem; to eliminate the overlapping BSS problem.
• Target wake time (TWT): AP can define times when a STA can access the network
• Star topology
• Semtech LoRa: Layer 1 PHY modulation technology available by multiple chipset vendors
LoRaWAN
Protocol Stack
Class A:
• this is default
implementation
• optimized for battery-
powered nodes
• allows bidirectional
communications
• two receive windows are
available after each
transmission
Class B:
• Class B node should get additional
receive windows compared to Class A Class C:
• gateways must be synchronized • This class is particularly adapted for
through a beaconing process powered nodes
• “ping slots”, can be used by the • enables a node to be continuously
network infrastructure to initiate a listening by keeping its receive window
downlink communication open when not transmitting
Node Addressing:
endpoints are also
known by their 32-bit
end device address
• 7 bit for network
• 25 bit for devices
• Data rate varies depending on the frequency bands and adaptive data rate (ADR)
• ADR is an algorithm that manages data rate and radio signal for each endpoint.
– Data privacy applied at the end points (end device and application server)
• second layer is an application session key (AppSKey)
• performs encryption & decryption functions between the endpoint and its application
server.
• it computes and checks the application-level MIC
• LoRaWAN service provider does not have access to the application payload if it is
not allowed
• AppKey is then used to derive the session keys: NwkSKey and AppSKey.
• NB-IoT is addressing the LPWA IoT market opportunity using licensed spectrum
• New physical layer signals and channels are designed
“The highest education makes our life in harmony with all existence.” – Rabindranath Tagore
IEEE 802.15 Task Group 4
• TG4 defines low-data-rate PHY and MAC layer specifications for wireless personal
area networks (WPAN)
• IEEE 802.15.4 PHY and MAC layers are the foundations for several
networking protocol stacks used in different market applications.
• Few well-known protocol stacks:
ZigBee
ZigBee IP • ZigBee shows how 802.15.4 can be
6LoWPAN leveraged at the PHY and MAC
WirelessHART layers, independent of the protocol
Thread layers above.
• ZigBee Alliance
45+ companies: Semiconductor mfrs, IP providers, OEMs, etc.
Application Framework
monitors TV VCR
sensors DVD/CD
automation Remote control
control
INDUSTRIAL & CONSUMER
COMMERCIAL ELECTRONICS
monitors mouse
diagnostics ZigBee keyboard
sensors LOW DATA-RATE joystick
PC &
RADIO DEVICES PERIPHERALS
PERSONAL
HEALTH CARE
security
consoles HVAC
portables lighting
educational TOYS & HOME closures
GAMES AUTOMATION
• Applications using ISM band do not require a licence for stations emitting less than 1W.
Channel coding is accomplished by selectively introducing redundant bits into the transmitted information stream.
Modulation is the process by which some characteristic of a carrier wave is varied in accordance with an information
signal, or modulating wave.
• spreading code spreads the signal across a wider frequency band in direct proportion
to the number of bits used
Spread the
data stream
Transmit the
spread data using
modulation
In-phase
Constellation diagram
quadrature for QPSK
phase
• OQPSK
a variation of QPSK known as
offset QPSK or orthogonal
QPSK
a delay of one bit time is
introduced in the Q stream of
QPSK
Its spectral characteristics and
bit-error performance are the
same as that of QPSK
at any time the phase change
in the combined signal never
exceeds 90° (π/2)
• IEEE 802.15.4 does not prefer to use frequency hopping to minimize energy consumption.
• To minimize interference in 2.4 GHz band, IEEE 802.15.4 prefer channel no. 15, 20, 25, 26
• Transmission power is adjustable from 0.5 mW (min in 802.1.5.4) to 1 W (max in ISM band)
• Transmission power 1 mW provides theoretical distances as:
– Outdoor range 300 m.
– Indoor range 100 m.
• 802.15.4 PHY provides link quality information (LQI) to NET and APP layers
– Transmitter may decide to use high transmission power based on LQI
– Applications may dynamically change 802.15.4 channels based on LQI
Frame Control
Octets:2 1 4 to 20 1 variable 2
Data Frame
Frame Address Command
sequence Command payload check
control information type
number sequence
MAC
MAC header MAC payload
footer
ACK Frame
Octets:2 1 2
Data Frame
Frame
sequence check
control
number sequence
MAC
MAC header
footer
• Each device operating on a network has a unique 64-bit address, called extended unique identifier (EUI-
64)
– This address can be used for direct communication in the PAN
• A device also has a 16-bit short address, which is allocated by the PAN coordinator when the device
associates with its coordinator.
• IEEE 802.15.4 devices can be grouped into Personal Area Networks (PANs). These are identified by
their 2 Byte PAN identifier (PAN ID).
– Short address: The address field includes a short address and a PAN ID (total of 4
bytes).
– Long address: The address field includes a long address and a PAN ID (total of 10
bytes).
– No address:
• Both addresses are missing from ACK frames.
• For data and command frames, only one (either source or destination) field can be omitted
– if the source address is omitted, it means the PAN coordinator sent the frame;
– if the destination address is missing, it means it should be received by the PAN coordinator.
CAP CFP
GTS GTS
Inactive
0 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
BI = aBaseSuperframeDuration*2BO symbols
• Length of a superframe can range from 15.36 msec to 215.7 sec (= 3.5 min).
– Devices use the slotted CAMA/CA mechanism to contend for the channels
– FFDs who require fixed rates of transmissions can ask for GTS from the coordinator
• CSMA/CA is not used for Beacon transmission; also not for Data frame transmission during CFP
• Duty Cycle:
BO-SO 0 1 2 3 4 5 6 7 8 9 ≧10
Duty cycle (%) 100 50 25 12 6.25 3.125 1.56 0.78 0.39 0.195 < 0.1
– In a non-beacon-enable network,
• device simply transmits its data using unslotted CSMA/CA
In slotted CSMA/CA:
The backoff period boundaries of every device in the PAN shall be aligned with the
superframe slot boundaries of the PAN coordinator
i.e. the start of first backoff period of each device is aligned with the start of the beacon
transmission
The MAC sublayer shall ensure that the PHY layer commences all of its transmissions on the
boundary of a backoff period
In unslotted CSMA/CA:
The backoff periods of one device are not related in time to the backoff periods of any other
device in the PAN.
• Algorithms runs using units of time called backoff periods, where one backoff
period shall be equal to aUnitBackoffPeriod.
– NB (Number of Backoff): number of times that backoff has been taken in this
attempt of transmission
• if exceeding macMaxCSMABackoff, the attempt fails
– CW (Contention Window): contention window length, the number clear slots that
must be seen after each backoff
• always set to 2 and count down to 0 if the channel is sensed to be clear
• The design is for some PHY parameters, which require 2 CCA for efficient channel usage.
Y Perform CCA on
Battery life BE = lesser of
backoff period
extension? (2, macMinBE)
boundary
N
BE = macMinBE Y
Channel idle?
N NB> N
macMaxCSMABackoffs CW = 0?
?
NB (Number of Backoff) Y Y
BE (Backoff Exponent)
CW (Contention Window) Failure Success
Contention in
IEEE 802.11 DCF
Contention in
IEEE 802.15.4
• The standard specifies that a transmitter node performs the CCA twice
in order to protect acknowledgment (ACK).
– When an ACK packet is expected, the receiver shall send it after a tACK
time on the backoff boundary
• tACK varies from 12 to 31 symbols
Existing
session for
DATA & ACK
New CCA
transmitter
Backoff Detect
end here an ACK
New
transmitter CCA CCA
Backoff Detect
end here an ACK
27-10-2020 Dr. Manas Khatua 39
Why 2 CCAs (Case 2)
Backoff slot
boundary aTurnaroundTime
Existing
session
New CCA
transmitter
Backoff Detect
end here an ACK
New
transmitter CCA
Backoff Detect
end here an DATA
27-10-2020 Dr. Manas Khatua 40
Why 2 CCAs (Case 3)
Backoff boundary
Existing
session
New
transmitter CCA
Backoff Detect a
end here DATA
27-10-2020 Dr. Manas Khatua 41
Unslotted CSMA/CA
Un-slotted CSMA
NB = 0,
only one
BE = macMinBE
CCA
Delay for
random(2BE - 1) unit
backoff periods
Perform CCA
Y
Channel idle?
NB = NB+1,
BE = min(BE+1, aMaxBE)
N NB>
macMaxCSMABackoffs
?
NB (Number of Backoff) Y
BE (Backoff Exponent)
Failure Success
CW (Contention Window)
CCA (Clear Channel Assessment)
27-10-2020 Dr. Manas Khatua 42
GTS Concepts
• A guaranteed time slot (GTS) allows a device to operate on the channel within
a portion of the superframe
• A device that has been allocated a GTS may also operate in the CAP
• A data frame transmitted in an allocated GTS shall use only short addressing
• Procedures:
Coordinator Device • The ACK to an Association Request
command does not mean that the device
has associated.
Scan
Association req. channel
• In IEEE 802.15.4, association results are
ACK announced in an indirect fashion.
– A coordinator responds to Association Requests
by appending devices’ long addresses in Beacon
Make Beacon Wait for frames
decision (pending address) response
• IEEE 802.15.4 specification uses Advanced Encryption Standard (AES) with a 128-bit
key length as the base encryption algorithm
• Message integrity code (MIC), which is calculated for the entire frame using the
same AES key, to validate the data that is sent
What is ZigBee
“The best among you is the one who doesn’t harm others with his tongue and hands.” – Muhammad
Limitations of 802.15.4 MAC
Unbounded latency No protection against
Both BE and Non-BE mode use interferences/multipath fading
CSMA-CA Due to usage of single channel
No bound on maximum delay to
reach destination
Powered relay nodes in multi-hop
network
Non-reliable communication
Relay nodes keep their radio active always.
Very low delivery ratio due to the
Results in complex synchronization and
inefficiency of CSMA-CA
beacon scheduling in BE mode
Consume large energy
Reliability
Wire‐like reliability may be required, e.g., 99.9% or better
Scalability
Large network size
Energy Efficiency
Target battery lifetime: 5 years, or more
Channel hopping
Mitigates the effects of interference and multi-
path fading
Improve reliability
• TsTxOffset: Timeslot
Transmission Offset
= TsCCAOffset + TsCCA + TsRxTx
A timeslot is long enough to send a data frame and receive its ACK
A node can start sending its beacon only after getting a valid EB frame
ASN (absolute slot number) : total # of slots elapsed since the network was deployed
nch : number of physical channels presently available to consider
F is implemented as a look‐up‐table containing the set of available channels
k : count of slotframe cycle since the start of the network
S : slotframe size
t : timeslot in a slotframe
Max. no. of available
channel =16
Each channel is
identified by a
channelOffset
Channel could be
blacklisted because of
low quality
02-11-2020 Dr. Manas Khatua 13
TSCH Mode: Link
Link: Pairwise assignment of a directed communication between devices in a
specific slot, with a given channel offset
Backoff mechanism
In 802.15.4 CSMA/CA, transmitting node waits for a random backoff time before trying to transmit
In TSCH CSMA/CA, backoff mechanism is activated only after the node has experienced a collision
Packet dropping
In 802.15.4 CSMA/CA, a packet is dropped after the sender found channel busy for macMaxCSMABackoffs
consecutive times
In TSCH CSMA/CA, a packet is dropped only if it reaches the maximum number of retransmissions i.e.,
macMaxFrameRetries
(2BE –1)
TSCH
Retransmission
Backoff Algorithm
CSMA/CA used in
shared link to avoid
repeated collisions.
In dedicated link, no
chance of collision.
Timeslot information
describes when to expect a frame transmission and when to send an acknowledgment
Upon receiving an EB
The MAC layer notifies the higher layer
Minimize EB transmissions
Frequent EB transmission consumes more communication resources
Also Increases energy consumption at network and node level
• A. Kalita and M. Khatua, “Channel Condition Based Dynamic Beacon Interval for Faster Formation of 6TiSCH
Network”, IEEE Transaction on Mobile Computing, 2020.
• A. Kalita and M. Khatua, “Opportunistic Transmission of Control Packets for Faster Formation of 6TiSCH
Network”, ACM Transactions on Internet of Things, 2020.
IEEE 802.15.4e standard does not specify how to derive an appropriate link
schedule
Existing multi-channel scheduling schemes are not suitable for TSCH networks
They do not allow per-packet channel hopping
Not for resource-constrained nodes
They are not efficient in terms of channel utilization
Distributed Scheduling
Link schedule is computed autonomously by each node
Based on local, partial information exchanged with its neighbors
Limited Overhead
Suitable for energy‐constrained nodes
Good choice for dynamic network and large scale network
Security
Selective Jamming (SJ) attacks
Secure Beacons and Different Frequency hopping sequence
Mechanisms to adapt the resources allocated between neighbor nodes to the data
traffic flows
2. Centralized Scheduling
A central entity called Path Computation Element (PCE) collects network state
information and traffic requirements
It builds and install the schedule in the network
3. Distributed Scheduling
Nodes agree on a common distributed schedule by using distributed multi‐hop
scheduling protocols and neighbor‐to‐neighbor scheduling negotiation
Reservation phase & negotiation phase
• S. Duquennoy, B. Al Nahas, O. Landsiedel, T. Watteyne, “Orchestra: robust mesh networks through autonomously scheduled TSCH,” in: Proc. of the
13th ACM Conference on Embedded Networked Sensor Systems (SenSys), NY, USA, November 2015, pp. 337–350. <Orchestra>
• Seohyang Kim, Hyung-Sin Kim, Chongkwon Kim, “ALICE: Autonomous Link-based Cell Scheduling for TSCH”, ,” in: Proc. of the IPSN , April 16–18,
2019, Montreal, Canada, pp. 1-12. <ALICE>
• Taieb Hamza and Georges Kaddoum “Enhanced Minimal Scheduling Function for IEEE 802.15.4e TSCH Networks”, IEEE Wireless Communications
and Networking Conference, 15- 18 April 2019, Marrakesh, Morocco, pp. 1-7. <EMSF>
• Nastooh Taheri Javan, Masoud Sabaei and Vesal Hakami, “IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial
Multi-Armed Bandit Approach”, IEEE Sensors Journal, 2019, pp. 1-12. <CMAB>
• SEUNGBEOM JEONG, JEONGYEUP PAEKz, HYUNG-SIN KIM, and SAEWOONG BAHK “TESLA: Traffic-aware Elastic Slotframe Adjustment in TSCH
Networks”, IEEE Access, 2019, Vol. 4, pp. 1-16. <TESLA>
• Mike O. Ojo, Stefano Giordano, Davide Adami and Michele Pagano, “Throughput Maximizing and Fair Scheduling Algorithms in Industrial Internet of
Things Networks”, IEEE Transactions on Industrial Informatics, 2019. pp.1-11. <Throughput-maximum>
• Vasileios Kotsiou, Georgios Z. Papadopoulos, Periklis Chatzimisios, F. Theoleyre, “Whitelisting without Collisions for Centralized Scheduling in
Wireless Industrial Networks”, IEEE Internet of Things Journal, 2019, pp. 1-9. <Whitelist>
• T. Chang, M. Vucinic, X. Vilajosana, S. Duquennoy, and D. Dujovne, “6TiSCH Minimal Scheduling Function (MSF) draft-ietf-6tisch-msf-16,” April 2020.
<MSF>
• Seungbeom Jeong, Hyung-Sin Kimy, Jeongyeup Paek, and Saewoong Bahk, “OST: On-Demand TSCH Scheduling with Traffic-Awareness,” INFOCOM
2020. <OST>
TSCH provides
✓ Increases network capacity
✓ High reliability
Time Synch ✓ Predictable latency
TSCH
Scheduling ronisation ✓ While maintaining very low duty cycle
Network
formation Slotframe
Channel
hopping
TSCH Components
➢ Objective of MSF:
▪ To manage the communication
schedule in the 6TiSCH schedule
in a distributed manner.
❑ https://tools.ietf.org/html/draft-ietf-6tisch-msf-18
04-11-2020 Dr. Manas Khatua 17
Solution Approach
▪ A node implementing MSF should implement 6TiSCH minimal configuration.
▪ Minimal cell is for broadcast frames(EB,DIO)
▪ 3 slotframes used
✓ Slotframe0(Minimal cell)
✓ Slotframe1(Autonomous cells)
✓ Slotframe2 (6P Negotiated cells)
➢ Autonomous cells
▪ Maintained autonomously by node without 6P negotiation
▪ AutoTxCell (cell options Tx=1,Rx=0,shared=1)(added/deleted on demand)
✓ When there is a frame to send and there is no negotiated Tx cell and uninstall
after sending out the frame ✓ For Tx cell,
▪ AutoRxCell (cell options Tx=0,Rx=1,shared=0)(permanent) EUI64
✓ Always remain scheduled after synchronization of destination
▪ SlotOffset = 1+ hash (EUI64, Slotframe1 –1) node
▪ ChannelOffset = hash (EUI64, NumberOfChannels) ✓ For Rx cell,
hash of EUI64
of node itself
04-11-2020 Dr. Manas Khatua 18
Solution Approach Cont...
➢ Node Behavior at Boot
1) Randomly choosing a frequency JP
2) Receiving EB's and chose a Join Proxy(JP) AutoTxCell NegotiatedTxCell
3) Setting up autonomous cells for join process
4) Acquiring RPL rank and select a routing parent
5) Setting up first Tx negotiated cell
6) Send EB's and DIO's on the minimal cell AutoTxCell AutoTxCell
• Cell options: Tx=1,Rx=0 or Tx=0 Rx=1 Or
Pledge JRC
• Number of cells:1 NegotiatedTxCell
• Cell list: at least 5
6P ADD Request
over AutoTxCell Fig: Setting Up Autonomous cell for
Selected join process
Joined node Parent
6P Response
over AutoTxCell
An example of 2 step 6P
transaction
04-11-2020 Dr. Manas Khatua 22
Solution Approach Cont...
➢ Rules for Cell list
✓ To have at least NumCells in
CellList
✓ Each cell must have different slot
offset value
✓ Must not have any scheduled cell
on the same slot offset
✓ Can't be with slotoffset 0
✓ Should be randomly chosen
among all slotoffset values
✓ Channel offset is chosen
randomly from
[0...NoOfFrequencies]
❑ IETF 6TiSCH:A Tutorial
❑ https://tools.ietf.org/html
An example of 3 step 6P
/draft-ietf-6tisch-6top-
transaction
protocol
04-11-2020 Dr. Manas Khatua 23
Solution Approach Cont...
✓ Switching parent
▪ Counts the number of negotiated Tx cell it has with the old parent
per slot frame.
▪ Triggers one or more 6p ADD request with same cell options to the
new parent.
▪ Then issues 6p CLEAR command to its old parent.
• 6TiSCH Layer
– 6TiSCH Minimal Configuration, 6top
Shortcomings
• Static Allocation
• Joining time is more
• Shortcomings
– Consumes more energy
– Hampers data transmission schedule
– More shared cell Fig. DRA allocation strategy
Carlo VALLATI et al. “Improving Network Formation in 6TiSCH Networks”. In : IEEE Transactions on Mobile Computing 18.1
(2019), p. 98-110. ISSN : 1536-1233.
A. Kalita and M. Khatua, “Channel Condition Based Dynamic Beacon Interval for Faster Formation of 6TiSCH Network". IEEE
Transaction on Mobile Computing. [Online]. Available : https ://doi.org/10.1109/TMC.2020.2980828.
𝐼𝑚𝑖𝑛 ; 𝑖𝑓 𝐶𝐵𝑅 = 0
𝐼𝑒𝑏 =ቊ 𝐶𝐵𝑅
𝐼𝑚𝑖𝑛 + 𝐼𝑚𝑎𝑥 − 𝐼𝑚𝑖𝑛 ; 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
where, 𝐼𝑒𝑏 is the calculated beacon interval and 𝐼𝑚𝑖𝑛 and 𝐼𝑚𝑎𝑥 are the minimum and maximum
value of 𝐼𝑒𝑏
A. Kalita and M. Khatua, “Channel Condition Based Dynamic Beacon Interval for Faster Formation of 6TiSCH Network". IEEE
Transaction on Mobile Computing. [Online]. Available : https ://doi.org/10.1109/TMC.2020.2980828.
A. Kalita and M. Khatua, “Channel Condition Based Dynamic Beacon Interval for Faster Formation of 6TiSCH Network". IEEE
Transaction on Mobile Computing. [Online]. Available : https ://doi.org/10.1109/TMC.2020.2980828.
Solution:
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
Solutions
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
Solutions
– A joined node does not need to wait for more time to participate in contention race in
order to transmit its urgent control packet once the node has encountered channel
busy
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
• The proposed scheme performs better than the benchmark schemes (6TiSCH
minimal configuration) in terms of joining time and energy consumption
A. Kalita and M. Khatua,“Opportunistic Transmission of control packets for Faster Formation of 6TiSCH Network” in ACM Transactions on
Internet of Things,
o H: Host
o R: Router
o ER: Edge router
This document This document describes RFC6606: This document provides the
specifies an simple optimizations to IPv6 problem statement and design space for
IPv6 Header Neighbor Discovery, its 6LoWPAN routing. Defines how
Compression addressing schemes, and 6LoWPAN formation and multi-hop
format for IPv6 duplicate address detection routing could be supported.
packet delivery for 6LoWPAN
in 6LoWPAN
Building automation
Industrial automation
Logistics
Environmental Monitoring
etc.
Global scalability
2^128 Bit Addressing = 3.4*10^38 unique addresses
4. Multicast support
IEEE 802.15.4 & other radios do not support multicast (as it is expensive)
LoWPAN encapsulation are the payload in the IEEE 802.15.4 MAC protocol data unit (PDU).
Cont…
All LoWPAN encapsulated datagrams are prefixed by encapsulation header stack.
Each header in the stack starts with a header type field followed by zero or more header fields
6LoWPAN Headers
Each header in the stack starts with
a header type field
followed by zero or more header fields
First byte of each header (i.e. dispatch byte) identifies the nature of each header
First Fragment
Subsequent Fragments
64 bit Interface ID
In these cases, a "pseudo 48-bit address" is formed first, and then EUI-64
interface id is formed from the pseudo 48-bit MAC address.
IPv6 Header:40-Byte
Uncompressed
08-11-2020 Dr. Manas Khatua 32
Cont...
HC1 Compressed IPv6 Header
IPv6 address <prefix64 || Interface ID64> for nodes in IEEE 802.15.4 subnet
derived from the link address.
o PAN ID maps to a unique IPv6 prefix
o Interface ID generated from EUID 64 or PAN ID or short address
So, they are usually not used for application layer data traffic in present times
Mesh-under Route-over
Uses L2 addresses to Uses L3 addresses to
forward data forward data.
Only IP router is the edge Each hop acts as an IP
router router.
Individual fragments may As routing decision
take different paths. taken on a per packet
Suitable for small and local basis, all fragments are
networks sent to same path
Mesh-under
Route-over
08-11-2020 Dr. Manas Khatua 39
Neighbour Discovery Protocol
Hosts uses to discover Routers
Duplicate Address Detection(DAD)
Uses ICMPv6
RS(Router Solicitation) , RA (Router Advertisement)
NS(Neighbour Solicitation ) , NA (Neighbour Advertisement)
6LoWPAN
Architectures
RFCs
Stacked headers concept
Dispatch Header
Fragmentation Header
Mesh Routing Header
Address Autoconfiguration
Header Compression
Neighbour Discovery
6LoWPAN Security
Thanks!
“The Man who works for others, without any selfish motive, really does good to himself.” – Shri Ramakrishna
What is Low-Power and Lossy Network?
RFC 7228
Constrained Node: A node where some of the characteristics that are otherwise pretty much taken for
granted for Internet nodes are not attainable, often due to cost constraints and/or physical constraints on
characteristics such as size, weight, and available power and energy.
tight limits on power, memory, and processing resources
Constrained Network: A network where some of the characteristics pretty much taken for granted with
link layers in common use in the Internet are not attainable.
low achievable bitrate/throughput; high packet loss and variability of packet loss; limits on reachability over time
LLN (Low-Power and Lossy Network): Typically composed of many embedded devices with limited power,
memory, and processing resources interconnected by a variety of links, such as IEEE 802.15.4 or low-power
Wi-Fi.
• Work Items:
Routing Protocol work
Routing is designed to support different LLN application requirements
RFC 5548 - Routing requirements for Urban LLNs
RFC 5673 - Routing requirements for Industrial LLNs
RFC 5826 - Routing requirements for Home Automation LLNs
RFC 5867 - Routing requirements for Building Automation LLNs
Routing metrics for LLN
Produce a security Framework
Applicability statement of ROLL routing protocols
• Least cost route between any two nodes is the route with minimum distance.
• Each node maintains a vector (table) of minimum distance to every node.
• Requires that a router inform its neighbours of topology changes periodically
• Non-storing mode:
• Only the border router(s) of the RPL domain contain(s) the full routing table.
• Boarder router knows how to directly reach every other node.
2) P2MP: Point-to-Multipoint
data streams can be used for actuation purposes
messages sent from DODAG roots to destination nodes
3) P2P: Point-to-Point
to allow communications between two devices belonging to
the same LLN
1
1
1 • Links are annotated w/ ETX
1
F D 4
E • It is expected that ETX variations
will be averaged/filtered as per
1
1 1 1 ROLL Metrics to be stable
enough for route computation
1 – Nodes observe the metric and
G H I gain confidence before use
The ETX metric of a wireless link is the expected number of transmissions required to successfully
transmit and acknowledge a packet on the link.
1
G H I
1 1
• Node B is at Depth 3, with DAG
A B C Parents LBR-1, and can reach
1
::/0 via LBR-1 or C with ETX 3
1 1
1
4
• Node C is at Depth 2, ::/0 via
F D E LBR-1 with ETX 2
1
1 1 1
• Node E is at Depth 3, ::/0 via C
1 with ETX 3
G H I
1
• Node B adds Node A
4
F D E
1
• Node B can improve to a more
1 1 1 optimum position in the DAG
G
1
H I • Node B removes LBR-1 and Node C
as DAG Parents
A
1
B
1
C • Node B is at Depth 2, ::/0 via
1 A with ETX 2
1 1
G
1
H I
• Node E is at Depth 3, ::/0 via
C with ETX 3
1 1
A B C
1
1 1 • And is continuously
1
4
maintained
F D E
1
1 1 1
1
G H I
1 1
• DAG Root may also extend
A B C connectivity to other prefixes
1
beyond the DAG root, as
1 1 specified in the DIO
1
F D 4 E • Nodes may join multiple DAGs
1 as necessary to satisfy
1 1 1 application constraints
1
G H I
1
4
F D E
1
1 1 1
• For simplicity, we will focus on a
subset of DA in the example
1
G H I
1
• F stores G:: via G
1
F D
• H emits NA to F for destination prefix H::
1 1
• F stores H:: via H
1
G H
1
• F emits NA to D with DAO
F
1
D
indicating reachability to
destination prefix F*::
1 1
• D cannot store…
1
G H
(continued)
1 (continued)
G H
1
A B • A stores D:: via B, with the
piecewise source route [D]
1
F
1
D • B also emits a DAO indicating
prefix B:: to A
1 1
1
• A stores B:: via B
G H
(continued)
1
• It is done. So, in brief,
1
4
• Node D no longer has any
F D E
DAG parent in the grounded
1 1
1
1
DAG, so it will become the
root of its own floating DAG
1
G H I
1
1
1 • Node ‘I’ has an alternate DAG
1
Parent, E
F D 4 E – so it does not have to leave the
1 DAG rooted at LBR-1.
1 1 1
1
G H I • Node I removes Node D as a
DAG Parent
1
F D 4 E • Node F multicasts an RA-DIO
1
1 1 1
G
1
H I
of duration 4 (i.e. depth)
associated with Node I
1 1
1
1 • Node F sees a chance to rejoin
grounded DAG at depth 2
1
F D 4 E through Node A
1
1 1 1
• Node F starts a DAG Hop timer
G
1
H I of duration 1 (i.e. depth)
associated with Node A
1 1
A B C • Node D starts a DAG Hop
1 1
1
1 timer of duration 2
1
associated with Node F,
F D 4 E
• in addition the DAG Hop
1 1
1
1 timer already running with
duration 4 associated with
1
G H I Node I
1 1
A B C
• Node D joins the grounded
1
1 1 1 DAG at depth 3 by adding
1
4
Node F as a DAG Parent
F D E
1
1 1 1
• The breaking-off and re-
1 joining of the broken sub-
G H I
DAG is thus coordinated with
loop avoidance
Solutions:
Floating DAG
• Leave DAG, color sub-DAG, then look for new routes
• Operation local to nodes that must increase their depth
• Does not guarantee loop freedom
• Parameters: • Suppression:
– T_min: Minimum advertisement period – Increment count (c) when receiving similar
– T_max: Maximum advertisement period advertisement
– k: Suppression threshold – At end of period, transmit if c < k, set c = 0
1. https://tools.ietf.org/agenda/75/slides/roll-1.ppt
Example:
• Light sensor continuously sends sensor data to the broker.
• Building control application receives sensor data from the broker and decides to activate Camera.
• The application sends an activation message to the camera node (i.e. actuator) through the broker.
Topic
A topic forms the namespace in hierarchical with each “sub topic” separated by a /
An example topic space :
A house publishes information about itself on:
<country>/<region>/<town>/<postalcode>/<house>/energyConsumption
<country>/<region>/<town>/<postalcode>/<house>/solarEnergy
• And subscribes for control commands:
<country>/<region>/<town>/<postalcode>/<house>/thermostat/setTemp
NOTE :
Wildcards must be next to a separator
Cannot be used wildcards when publishing
MQTT is lightweight
because each packets consists of a 2-byte fixed header with optional variable header fields
and optional payload
RETAIN 1: Instructs the server to retain the last received PUBLISH message and deliver it as a first message to
new subscriptions.
Remaining Length Indicates the number of remaining bytes in the message, i.e. the length of the (optional) variable length
header and (optional) payload.
Example:
Subscribers receive last known temperature value from the temperature data topic.
RETAIN=1 indicates to subscriber B that the message may have been published some time ago.
• To save bits, remaining length is a variable length field with 1…4 bytes.
• The most significant bit (msb) of a length field byte has the meaning continuation bit (CB).
• If more bytes follow, it is set to 1.
msb 7 bits
at least once
QoS level 1:
• At-least-once delivery.
Messages are guaranteed to arrive, but there may be duplicates.
Example application: A door sensor senses the door state. It is important that door state
changes (closed->open, open->closed) are published losslessly to subscribers (e.g. alarming
function). Applications simply discard duplicate messages by evaluating the message ID field.
QoS level 2:
Exactly-once delivery.
This is the highest level that also incurs most overhead in terms of control messages and the need
for locally storing the messages.
Exactly-once is a combination of at-least-once and at-most-once delivery guarantee.
Example application: Applications where duplicate events could lead to incorrect actions, e.g.
sounding an alarm as a reaction to an event received by a message. So, it avoids duplicate.
QoS level 1:
QoS level 1 affords at-least-once delivery semantics. If the client does not receive the PUBACK in
time, it re-sends the message.
• Structured data :
– data follows a model/schema
– defines data representation
– e.g. Relational Database
– easily formatted, stored, queried, and processed
• has been core type of data used for making business
decisions
• Wide array of data analytics tools are available
• Unstructured data:
– lacks a logical schema
– Doesn’t fit into predefined data model
– e.g. text, speech, images, video
• Semi-structured data:
− hybrid of structured and unstructured data
− Not relational, but contains a certain schema
− e.g. Email : fields are well defined, but body and
attachments are unstructured
• Predictive
– It aims to foretell problems or issues
before they occur.
• e.g., it could provide an estimate on
the remaining life of the truck
engine.
• Prescriptive
– It goes a step beyond predictive and
recommends solutions for upcoming
problems. Most data analysis
• e.g. it might calculate various space in IoT
alternatives to cost-effectively
maintain our truck.
• In more complex cases, static rules cannot be simply inserted into the
program
– because the programs require parameters that can change.
– e.g., dictation program – it does not know your accent, tone, speed, and so on.
You need to record a set of predetermined sentences to help the tool. This
process is called machine learning.
– the learning process is not about classifying in two or more categories but
about finding a correct value.
– regression predicts numeric values, whereas classification predicts categories.
Variety refers
to different
types of data.
– Transactional data
• from the sources that produce data from transactions on these
systems, and, have high volume and structured.
– Social data
• which are typically high volume and structured.
– Enterprise data
• data that is lower in volume and very structured.
• NameNode coordinate
where the data is stored,
and maintain a map of
where each block of data
is stored and where it is
replicated.
• Big Data tools like Hadoop and MapReduce are not suited for real-time analysis
– because of distance from the IoT endpoints and the network bandwidth requirement
• Streaming analytics allows you to continually monitor and assess data in real-time so that
you can adjust or fine-tune your predictions as the race progresses.
• In IoT, streaming analytics is performed at the edge (either at the sensors themselves or
very close to them such as gateway)
• The edge isn’t in just one place. The edge is highly distributed.
• Does the streaming analytics replaces big data analytics in the cloud?
– Not at all.
– Big data analytics is focused on large quantities of data at rest, edge analytics continually processes
streaming flows of data in motion.
• Time sensitivity
– When timely response to data is required, passing data to the cloud for
future processing results in unacceptable latency.
• Output streams
– The data that is output is organized into insightful streams and passed on for storage and further
processing in the cloud.
– It is network-based analytics
– power to analyze details of communications patterns made by protocols
• Capacity planning
• Security analysis
• Accounting
• Flow analysis at the gateway is not possible with all IoT systems
– LoRaWAN gateways simply forward MAC-layer sensor traffic to the centralized
LoRaWAN network server, which means flow analysis (based on Layer 3) is not
possible at this point.
– A similar problem is encountered when using an MQTT server that sends data
through an IoT broker
• Traffic flows are processed in places that might not support flow analytics,
and visibility is thus lost.
• IPv4 and IPv6 native interfaces sometimes need to inspect inside VPN
tunnels, which may impact the router’s performance.
– It provides appropriate infrastructure & tolls to design and implement the architecture
– sensors, sensor systems, gateways, mobile app, embedded controller, data management
platform, analytical platform, and so on.
– support interoperability among all devices, provides secure connectivity, reliability in data
transfer, interface to 3rd party application to built on it, and many more.
It includes core network support for all wireless IoT connectivity (e.g. 2G/3G/LTE, NB-IoT
& CAT-M1, WiFi, LoRaWAN, etc.)
Source: https://www.cisco.com/c/en/us/solutions/collateral/service-provider/ultra-services-platform/cisco-ultra-iot-at-a-glance.html
Simplifies and automates services provisioning with Cisco’s industry-leading orchestration solutions
Provide end-to-end 5G network slicing, which uses powerful provisioning and management
capabilities to enable each enterprise customer or IoT Service to get its own secure, highly reliable,
dedicated virtualized mobile core
Separates the user plane from the control plane with a distributed architecture using SDN, allowing
traffic to go directly to the Internet without costly backhaul
Cisco CIoT Serving Gateway Node (CSGN): it terminates multiple access technologies
Cisco enhanced Service Capability Exposure Function (eSCEF): associates endpoints with applications
and exposes network capabilities and data to applications through an open API.
Benefits/Goal at-a-glance:
Grow revenues by securely connecting IoT devices and sensors over a multi-access core with unified
policy, charging, and service capabilities
Monetize network intelligence and services by enhancing capabilities of IoT applications
Meet the scaling requirements of Massive IoT with a fully virtualized 5G-ready mobile core solution
• AWS SDKs
– Build your IoT applications using language-specific APIs.
– These SDKs wrap the HTTP/HTTPS API and allow you to program in any of the
supported languages.
• Communications
– Devices communicate with cloud
services by using various technologies
and protocols.
– e.g. Wi-Fi/ Broadband Internet,
• Apps Broadband/ Narrowband cellular data
– Apps give end users access to IoT devices and the
features provided by the cloud services to which those
devices are connected. • Interfaces
– An interface is a component that
connects a device to the physical
• Devices world.
– A device is a type of hardware that manages interfaces – e.g. User interfaces, Sensors,
and communications. Actuators
– e.g. Raspberry Pi, Arduino, Custom IoT devices
• AWS IoT Greengrass extends AWS to edge devices so they can act locally on the data they generate and use the cloud for
management, analytics, and durable storage.
• AWS IoT Core is a managed cloud service that enables connected devices to securely interact with cloud applications and
other devices.
• AWS IoT Analytics filters, transforms, and enriches IoT data before storing it in a time-series data store for analysis.
• AWS IoT Core provides the services that connect your IoT devices to the AWS Cloud so that other cloud
services and applications can interact with your internet-connected devices.
• The Message broker handles communication between your devices and AWS IoT.
• The Device Shadow service maintains a device's state so that applications can communicate with a device
whether the device is online or not.
• The Rules engine connects data from the message broker to other AWS services for storage and additional
processing.
15-11-2020 Dr. Manas Khatua 10
Connecting to AWS IoT Core
• AWS IoT Core supports connections with IoT devices, services, and apps.
• Devices connect to the AWS IoT Core so they can send data to and receive data from AWS IoT services and
other devices.
• Apps and other services also connect to AWS IoT Core to control and manage the IoT devices and process the
data from your IoT solution.
• In general, the two ways to interact with AWS IoT are through the AWS IoT Core service endpoints and the
AWS IoT device endpoints.
• Use AWS IoT to build predictive quality • Use AWS IoT in your
models in industrial operations connected home
• Use AWS IoT to build predictive quality • Use AWS IoT to provide home
models in industrial operations security and monitoring
• Things: The physical objects or things, such as industrial equipment, devices or sensors, that connect to the
cloud persistently or intermittently.
• Insights: Information collected by the things, which is analysed and turned into actionable knowledge
either by people or AI.
• Action: The way people respond to those insights and connect them to their business, as well as the
systems and tools they use.
• Enable highly secure and reliable communication between your IoT application and the
devices it manages.
• Security-enhanced communication channel for sending and receiving data from IoT devices
• Extend your solution from the cloud to the edge with per-device authentication
• Built-in device management and provisioning to connect and manage IoT devices at scale
• Compatibility with Azure IoT Edge and Azure Stack for building hybrid IoT applications
In-home care
Healthcare manufacturing