Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018.

Slides:



Advertisements
Similar presentations
NDN in Local Area Networks Junxiao Shi The University of Arizona
Advertisements

Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
Networking Components Chad Benedict – LTEC
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Performance Validation of Mobile IP Wireless Networks Syed Shahzad Ali Muhammad Saqib Ilyas Advisor: Dr. Ravi Pendse.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Midterm Review - Network Layers. Computer 1Computer 2 2.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Networking Components Daniel Rosser LTEC Network Hub It is very difficult to find Hubs anymore Hubs sends data from one computer to all other computers.
IntelliSense.io Beyond the hype - Real World Applications / Solutions of Internet of Things.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Performance Validation of Mobile IP Wireless Networks Presented by Syed Shahzad Ali Advisor Dr. Ravi Pendse.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
5G Wireless Technology.
Ethernet, WiFi & Protocols
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Telematics Protocols and Technologies
Sensors Journal, IEEE, Issue Date: May 2013,
Seminar on 4G wireless technology
Fundamentals of Information Systems, Sixth Edition
IMPROVING OF WIRELESS MESH NETWORKS.
A brief introduction to IoT gateway
Introduction Wireless devices offering IP connectivity
Introduction to Technology Infrastructure
University of Maryland College Park
Architecture and Algorithms for an IEEE 802
NETWORK Unit 1 Module: 2 Objective: 7.
VoIP over Wireless Networks
Welcome to the Cloud Chapter 1 Panko and Panko
17th International Conference on E-health Networking, Applications & Services Healthcom 2015 Boston, USA On Resilience of Wireless Mesh Routing Protocol.
1st Draft for Defining IoT (1)
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Lec 2: Protocols.
World-Leading Research with Real-World Impact!
Seminar on…. 5G Wireless Technology By: Niki Upadhyay
Algorithms for Big Data Delivery over the Internet of Things
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Introduction  An IoT is a network that connects uniquely identifiable things to the Internet.  The first word is “Internet” and the second word is “Things”.
Introduction to Technology Infrastructure
Mobile edge computing Report by Weiqing huang.
Internet of Things (IoT)
Bluetooth Based Smart Sensor Network
Extending IP to Low-Power, Wireless Personal Area Networks
Net 431: ADVANCED COMPUTER NETWORKS
I. Basic Network Concepts
SDN Based IoT-Cloud Comm.
Home Internet Vulnerabilities
Goal Control the amount of traffic in the network
Localized Scheduling for End-to-End Delay
The Impact of Multihop Wireless Channel on TCP Performance
NETWORK Unit 1 Module: 2 Objective: 7.
Net 323 D: Networks Protocols
Wireless & Mobile Networking CS 752/852 - Spring 2011
NETWORK Unit 1 Module: 2 Objective: 7.
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Tareq Khan, Ph.D. Assistant Professor,
Session 26 INST 346 Technologies, Infrastructure and Architecture
IoT Requirements for Networking Protocols Sadoon Azizi Department of Computer Engineering and IT.
An Overview of Security Issues in Sensor Network
Mobile Commerce and Ubiquitous Computing
IOT and ZigBee Wang Zhongsheng Xi'an Technological University,
5G as a Social Infrastructure Chaesub LEE, Director, ITU
Presentation transcript:

Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018

Introduction Overview of the Internet of Things (IoT) Concepts and related works Student count Managing the environment Proposed network architecture model Simulation results Application layer Transport layer Mac layer Conclusion Future research

Internet of Things (IoT)? The ‘Internet of Things’, or IoT, is made up of ‘smart’ objects such as mobile phones, tablets, alarm systems, home appliances, and industrial machines. These devices are connected to the internet and each other in a continuous state through an internet of networks. (N. Bari et all, 2013)[1]

Internet of Things (IoT)

Internet of Things (IoT) S-E-N-S-E Internet of Things The Internet Sensing Sensors (things) attached to network (e.g. temperature, pressure, acceleration) Greater amounts of data generated by things than by people Efficient Utilises intelligence to manual processes (e.g. reduction of power on hot days) Encompasses the internets production gains to things, not just people Networked Communication between objects / things to the network (e.g. thermostats, cars, watches) Information moves from the cloud to the network’s edge (‘fog’ computing) Specialised Customises technology and processes to precise assignments (e.g. healthcare, education, and industry) Devices such as PCs, smartphones, and laptops have a broad reach, IoT however can be defined as fragmented. Everywhere Deployed ubiquitously (e.g. body, cars, homes, businesses, and buildings) World presence, resulting in more devices and higher security risks

Concept of Smart University Student occupancy and monitoring Radio frequency Identification (RFID) Face / motion detection camera Environmental control Temperature, humidity, and air conditioner (AC) Lighting and lux Blind and window automation Building management system (BMS)

Concept of Smart University

Concept of Smart University

Proposed model University labs controlled Cisco, Games, Electronics, and Cyber-Security Wireless connectivity 802.11 Wi-Fi protocol Data communication through wired network Servers utilised within network User, Web, Mail, and BMS Connection to the ISP and cloud storage

Proposed model

Testing and Results Two connections were configured on QualNet software to simulate connectivity in each lab. Packets forwarded by routers MAC and PHY protocols utilise IEEE 802.11 IPv4 addressing scheme AODV as routing protocol UDP and TCP represent the client 500 packets of data transmitted across the network Application, MAC, and transport layers graphically displayed

Unicast session start Looking at the results from figure 6, it shows that all the nodes associated with the UDP client will start up efficiently within one second of having any traffic. This is vital in a wireless sensor network due to the changes in conditions as defined in the management software

Unicast jitter An important factor in a network is jitter; this test is identify in figure 8. How much of a delay will there be prior to receiving a packet of data. Clearly, on nodes 14, 23 and 25 the delay is almost non-existent, however looking closely at node 8 having the delay of almost 0.135 seconds could cause substantial downtime or potential poor operation of the equipment or sensor. A possible solution to this could be to ensure that the traffic is prioritised across the network.

Unicast received throughput When reviewing the results from the received throughput it is important to identify that this will highlight the performance of the proposed network and as to how long it would take to receive data sent across the network. In figure 9, node, 25 has the highest bits per sec rate and is capable of handling large amounts of data, however, node 8 will take a substantial time to receive large data traffic. It would be important to look into the placement within the network of these two nodes and possibly look at maybe splitting the channels that these nodes operate on to create a faster network.

Unicast overhead packets sent The results from figure 13 show that only four nodes are sending large amounts of data across the network. Potentially this could result in some loss, delay and queueing. In figure 12, it shows that the corresponding nodes in each lab receive high data; again, this could demonstrate on the simulation that there has been queuing and delays across the network.

Unicast overhead packets received The results from figure 13 show that only four nodes are sending large amounts of data across the network. Potentially this could result in some loss, delay and queueing. In figure 12, it shows that the corresponding nodes in each lab receive high data; again, this could demonstrate on the simulation that there has been queuing and delays across the network.

UDP Simulation The time interval between packet generations is exponential The packet lengths are also exponential The average value of the packet lengths constant during the simulation Each connection should generate 500 packets One simulation “No Fade Model” Second simulation “With Fade” set to Rayleigh

UDP packet delay The results from this graph show that node 4 has a significant delay when you introduce the Fade Model as this simulates real-world environments from geographical, weather and building structures etc. this clearly shows that node 4 will require careful location within the classroom and maybe even its own dedicated channel to ensure the QoS is achieved.

UDP server throughput Comparing the results from this simulation it has shown that there is little difference between no fade model and with fade, again node 4 appears to perform slightly better, this is in part due to its location within the network. To improve the testbed for future modeling larger amounts of data and more traffic would be required thus simulating a more conclusive real-world scenario.

Conclusion IoTs impact within society Home, industry, personal, and mobile devices Smart cities, grids, and vehicles Smart universities are achievable Location identification is vital to success to prevent data loss, delay, and re-transmission of data Planning of network utilising simulation software will be a major component Simulation has drawbacks as it doesn’t allow for user error or interference

Future research Review of findings against real-world scenarios Implementation of physical testbed Comparison of simulation results against the physical Identify possible further applications for the sensor network other than educational Proposal for PHD study into WSN and IoT technologies

Thank you for your time Any Questions?

Appendix

Appendix