IoT Requirements for Networking Protocols Sadoon Azizi s.azizi@uok.ac.ir Department of Computer Engineering and IT.

Slides:



Advertisements
Similar presentations
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advertisements

Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Deployment of the Light Weight IPv6 protocols In the Internet of Things(IoT) draft-fu-lwig-iot-usecase-00 Qiao Fu China Mobile
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
MOBILE CLOUD COMPUTING
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI network layer CCNA Exploration Semester 1 – Chapter 5.
M ODULE 1 UNIT 3 ROUTING. R OUTING Routing protocols are the set of rules used by the routers to communicate between source and destination. They do not.
Network Concepts.
WELCOME ALL.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Instructor Materials Chapter 7: Network Evolution
Seminar on 4G wireless technology
Instructor Materials Chapter 1: LAN Design
Developing IoT endpoints with mbed Client
IMPROVING OF WIRELESS MESH NETWORKS.
Grid Optical Burst Switched Networks
IoT Integration Patterns, REST, and CoAP
Ad-hoc Networks.
Instructor Materials Chapter 1 Ever Wonder How It Works?
Semester 4 - Chapter 3 – WAN Design
UNIT II –Part 2.
Planning and Troubleshooting Routing and Switching
1st Draft for Defining IoT (1)
Distribution and components
Chapter 4: Routing Concepts
Chapter 24: Internet of Things (IoT): Growth, Challenges and Security
Understanding the OSI Reference Model
Introduction to Networks
Chapter 6: Network Layer
CT1303 LAN Rehab AlFallaj.
GRID COMPUTING PRESENTED BY : Richa Chaudhary.
CSE 4340/5349 Mobile Systems Engineering
Chapter 16: Distributed System Structures
Mobile edge computing Report by Weiqing huang.
Ad Hoc and Sensor Networks
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Smart University utilising the concept of the Internet of Things (IoT) Simon Downes BSc MBCS Carlene Campbell March 2018.
Net 431: ADVANCED COMPUTER NETWORKS
I. Basic Network Concepts
Software Defined Networking (SDN)
ECE 4450:427/527 - Computer Networks Spring 2017
Adhoc and Wireless Sensor Networks
An Introduction to Computer Networking
Mobile Computing.
Introduction to Local Area Networks
Energy Efficient Scheduling in IoT Networks
Principles/Paradigms Of Pervasive Computing
Introduction to Computer Concept
System Models and Networking Chapter 2,3
Middleware for Internet of Things: A Survey
Connecting to the Network
Introduction to IoT Sadoon Azizi s. ac
Protocols.
Introduction to Computer Networks
Protocols.
Network Basics and Architectures Neil Tang 09/05/2008
Lecture 36.
Lecture 36.
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

IoT Requirements for Networking Protocols Sadoon Azizi s.azizi@uok.ac.ir Department of Computer Engineering and IT

Chapter Objectives * In this chapter students are expected to get familiar with these concepts: Internet of Things dependencies for networking protocols Dependencies’ effects on each of the protocol stack layers

Inspired by the traditional internet protocol stack The main reason of major growth of the traditional internet protocol stack is that it encapsulates each layer from it’s neighbors Such a model, provides easier development of the layers Researchers are inspired by this model for the world of IoT Two methods ahead: Using the traditional internet protocol stack for IoT Need for a new protocol stack At the late 1990s and the first decade of 2000 researchers declared that the traditional internet protocol stack is not suitable for such tasks

Support for the device limitations IoT devices include wide variety of features and specifications: Computation power Mobility Size Complexity Scattering Energy sources Placement Connectivity patterns Such characteristics force a set of dependencies and limitations on the network infrastructure (based on IP) for devices to connect to each other Specially computation power and energy resource limitations

Heterogeneous devices in IoT In traditional internet, devices are homogeneous; meaning that they usually have high computation power and limitless energy resource (direct outlet connectivity or rechargeable batteries) Servers, desktop computers, laptops, printers In IoT such a homogeneous structure isn’t present; on one end devices have limited computational power and energy source (such as pressure sensors) and on the other end devices with powerful processors and rechargeable batteries are present (such as smartphones)

Resource-constrained devices In general, a resource-constrained device has limitation in at least one of these aspects: Maximum code complexity (ROM/Flash) Amount of RAM Computational power (amount of computations done in a slice of time) Available energy resource User interface management and placement accessibility (security key settings, updating software, etc.) Definition Small, low computational powered, limited energy devices with small memory are known as resource-constrained devices

Categories of resource-constrained devices Class 0 devices are extremely limited in memory and computation power. Such devices do not have enough resources to connect to and IP based network Class 1 devices are a bit less limited compared to class 0 ones. These are able to connect to IP based networks directly; but they do face challenges for certain protocols like OSPF, HTTP and TLS. Class 2 devices are the least limited in this category; these are able to run the traditional internet protocol stack but they demand efficient protocol implementations

Energy resource limitation Factors that are effective on the energy limitation: Device size Main use state Cost Operational environment Device categories based on energy resource limitation Energy harvesting (collecting energy from the environment) Battery included devices (rechargeable and replaceable) Battery included devices (non-rechargeable and non-replaceable) Main power (devices without energy constraints)

Resource-constrained devices’ requirements Energy consumption is the main challenge for the IoT devices Data transfer is 3 times costly compared to local computations (energy cost) A common strategy is to put the devices on sleep when the devices are idle Designing light, energy efficient, bandwidth-aware communication protocols

Broad scalablility Based on the estimations done by Cisco, about 99.4% of the physical objects in the world which have the potential to be connected to the internet are not connected to internet yet! Devices connected to internet will be more than 26 billion by the year 2020 (Cisco’s forecast)

Broad Scalability This broad scalability forces different dependencies to the IoT protocol stack: Device detection and addressing Security Routing protocols Data transmission Management

Device addressing IoT devices must be individually addressable so that it would be possible to connect to them remotely using the internet If the device connections are made through proxy or gateway, they are called second class citizens IoT’s broad scalability accelerates the migration to IPv6

Authentication management Authentication security (such as shared key and certification management) forces a significant challenge to the internet Adding billions of devices to internet using IoT complicates this issue even more Manual mechanism that are used nowadays will not continue to be dominant for two reasons: Enormous number of devices The shortage (or even lack) of user interfaces on devices with limited resources Thus, there is need for automatic and light mechanism for authentication

Control plane IoT protocols are distributed and are implemented using message exchange between nodes These protocols function based on two models: Hierarchical (Client-Server model) Flat (Peer-To-Peer) Controlling functions’ behavior alongside with syntax and semantics of the exchanged messages define specific characteristics of the controlling protocols As the number of active nodes in a protocol increase, challenges related to the internal resources of each node (storage and compute) arise

Wireless spectrum Things (Objects) mostly use wireless access to connect to the internet Wireless spectrum is a limited resource Radio frequencies can only be used with expensive licenses (which are also rarely to be found) By connecting billions of things to internet, the competition for these waves will be more intensive Most IoT systems work in unlicensed frequencies (ISM) For licensed frequencies (such as GSM) there is spectrum crisis issue There are two reasons for this spectrum crisis: Impressive increase in number of the edge nodes Impressive increase in the traffic of each edge node

The growth of machine to machine connection

Immediate response time In most IoT applications, the time it takes for a packet to travel the distance between source and destination must be specified (Timeliness) An IoT system is working accurately only when it can guarantee the timeliness Imagine what happens if the network delivers the controlling packet for a jet’s engine with a long delay If delay and jitter of a network can be predicted for it’s worst case then that network is a deterministic network

Traffic of best effort, guaranteed, deterministic

Collaborativeness of an application Development complexity, placement and management of IoT applications is key challenge for industry Current IoT solutions will not only take costly implementations but also it is difficult and costly to maintain and to evolve through time Understanding IoT’s vision will be difficult unless APIs which control the devices’ behaviors follow certain standards somehow to enable and guarantee the collaborativeness Having standard APIs, abstraction for these operations would be introducable: Device management (setup, authenticate, update software/middleware) Data management (read, write, share) Application management (start, stop, debug, upgrade)

Abstraction and standard APIs