Introduction To Internet of Things: Source: "
Introduction To Internet of Things: Source: "
ZWAVE
536
INTRODUCTION
537
1
16-02-2023
538
539
2
16-02-2023
GFSK
540
541
3
16-02-2023
542
543
4
16-02-2023
Zwave Zigbee
544
Zwave Zigbee
545
5
16-02-2023
NFC
546
INTRODUCTION
547
6
16-02-2023
NFC TYPES
Smartphone
however it cannot read information itself.
✓ NFC tags found in supermarket products Active Passive
are examples of passive NFC.
✓ Active devices are able to collect as well
NFC Tags
as transmit information.
✓ Smartphones are a good example of
active devices.
Source: “How NFC Works”, NFC (Online)
548
WORKING PRINCIPLE
549
7
16-02-2023
550
NFC SPECIFICATIONS
Source: “Inside NFC: how near field communication works”, APC (Online), Aug. 2011
551
8
16-02-2023
MODES OF OPERATION
552
NFC APPLICATIONS
553
9
16-02-2023
6LOWPAN
5
5
4
554
INTRODUCTION
Source: T. Winter, P.Thubert, A. Brandt, J. Hui, R. Kelsey, P.Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
5
5
5
555
10
16-02-2023
FEATURES OF 6LOWPANS
5
5
6
556
ADDRESSING IN
6LOWPAN
557
11
16-02-2023
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
Length Flags DSN
IEEE 802.15.4
PAN ID
Destination (64 bit)
IPv6
Source Address (128 bit)
558
• The 6LoWPAN working group published several RFCs, but RFC 4994 is foundational
because it defines frame headers for the capabilities of header compression,
fragmentation, and mesh addressing.
• These headers can be stacked in the adaptation layer to keep these concepts separate
• while enforcing a structured method for expressing each capability.
• Depending on the implementation, all, none, or any combination of these capabilities and
their corresponding headers can be enabled.
• Figure shows some examples of typical 6LoWPAN header stacks.
559
12
16-02-2023
560
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
561
13
16-02-2023
• Fragmentation:
• The maximum transmission unit (MTU) for an IPv6 network must be at least 1280 bytes.
• The term MTU defines the size of the largest protocol data unit that can be passed.
• For IEEE 802.15.4, MTU is of 127 bytes.
• In IPv6, with a much larger MTU, is carried inside the 802.15.4 frame with a much smaller
one.
• To remedy this situation, large IPv6 packets must be fragmented across multiple 802.15.4
frames at Layer2.
562
563
14
16-02-2023
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
564
• In Figure, the 6LoWPAN fragmentation header field itself uses a unique bit value to
identify that the subsequent fields behind it are fragment fields as opposed to another
capability, such as header compression.
• Also, in the first fragment, the Datagram Offset field is not present because it would
simply be set to 0.
• This results in the first fragmentation header for an IPv6 payload being only 4 bytes long.
• The remainder of the fragments have a 5-byte header field so that the appropriate offset
can be specified
565
15
16-02-2023
566
LOADNG ROUTING
567
16
16-02-2023
568
RPL ROUTING
✓ Distance Vector IPv6 routing protocol for lossy and low power
networks.
✓ Maintains routing topology using low rate beaconing.
✓ Beaconing rate increases on detecting inconsistencies (e.g.
node/link in a route is down).
✓ Routing information included in the datagram itself.
✓ Proactive: Maintaining routing topology.
✓ Reactive: Resolving routing inconsistencies.
Source: T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
569
17
16-02-2023
570
Source: T. Winter, P.Thubert, A. Brandt, J. Hui, R. Kelsey, P.Levis, K. Pister, R. Struik , JP. Vasseur, R. Alexander,
“RPL: IPv6 Routing Protocol for Low‐Power and Lossy Networks”, IETF, Standards Track, Mar. 2012
571
18
16-02-2023
572
• Focus on technologies that enable communication between the IoT devices, networks, and remote
infrastructures
• Six groups:
• 1) Infrastructure protocols,
• 2) discovery protocols,
• 3) DATA PROTOCOLS
• 4) identification protocols
• 5) device management protocols,
• 6) semantic protocols
573
19
16-02-2023
574
• Constrained nodes
❑Internet-communication feature are not available.
❑Due to constraints of costs, size, weight and available power for functioning.
❑ Restrictions of memory and processing power limit the usage of these nodes.
❑Example: most of these nodes have a severely limited layer 2 capability and often lack full
connectivity features and broadcasting capabilities.
❑ Use in networks and networked applications require special design considerations.
❑Issues of energy optimization and bandwidth utilization are associated with these nodes
575
20
16-02-2023
CONSTRAINED NETWORKS
• Those networks in which some or all of the constituent nodes are limited in usage aspects due to the
following constraints:
• limited processing power resulting in restrictions on achieving smaller duty cycles
• low data rates and low throughput.
• asymmetric links and increased packet losses.
• restrictions on supported packet sizes due to increased packet losses.
• lack of advanced layer 3 functions such as multicasting and broadcasting.
• limited temporal device reachability from outside the network due to the inclusion of sleep states for
power management in the devices
576
• Class 0:
• These devices are severely constrained regarding resources and capabilities.
• The barely feasible memory and processing available in these classes of devices do not
allow for direct communication to the Internet.
• Even if the devices manage to communicate to the Internet directly, the mechanisms in
place for ensuring the security of the device are not supported at all due to the device’s
reduced capabilities.
• Typically, this class of device communicates to the Internet through a gateway or a proxy
577
21
16-02-2023
• Class 1:
• These devices are constrained concerning available code space and processing power.
• They can primarily talk to the Internet but cannot employ a regular full protocol stack such as HTTP
(hyper text transfer protocol).
• Specially designed protocols stacks such as CoAP (common offer acceptance portal) can be used to
enable Internet-based communication with other nodes.
• Compared to Class 0 devices, Class 1 devices have a comparatively increased power budget, which is
attributed to the increased functionalities it supports over Class 0 devices.
• This class of devices does not need a gateway for accessing the Internet and can be armed with security
features for ensuring safer communication over the Internet
578
• Class 2:
• These devices are functionally similar to regular portable computers such as laptops and
PDAs (personal digital assistants).
• They have the ability and capacity to support full protocol stacks of commonly used
protocols such as HTTP, TLS, and others.
• However, as compared to the previous two classes of devices, these devices have a
significantly higher power budget
579
22
16-02-2023
• Low power and lossy networks (LLNs) typically comprise devices or nodes with limited
power, small usable memory space, and limited available processing resources.
• The network links between the devices in this network may be composed of low power Wi-Fi
or may be based on the IEEE 802.15.4.
• The physical layers of the devices comprising LLNs are characterized by high variations in
delivery rates significant packet losses, and other similar behavior, which makes it quite
unreliable, and often compromises network stability.
• However, LLNs have found extensive use in application areas such as industrial automation
and monitoring, building automation, smart healthcare, smart homes, logistics, environment
monitoring, and energy management
580
INFRASTRUCTURE PROTOCOLS
581
23
16-02-2023
582
583
24
16-02-2023
584
585
25
16-02-2023
586
587
26
16-02-2023
588
• Designed to provide its users with the ability to interact with physical objects and locations seamlessly.
• The information to the users can be in the form of regular web pages or even dynamic web applications
• The main takeaway of this concept is the seamless integration of several standalone smart systems
through the web to provide information on demand to its users
• Examples:
• User-friendly buses, which can alert its users about various route-related information,
• Smart home appliances that can teach new users how to use them,
• Self-diagnostic robots and machinery in industries
• Smart pet tags which can provide information about the pet’s owner and its home location
589
27
16-02-2023
• The physical web broadcasts a list of URLs within a short radius around it so that anyone
in range can see the available URLs and interact with them.
• This paradigm is primarily built upon Bluetooth low energy (BLE), which is used to
broadcast the content as beacons.
• The primary requirement of any supporting beacons to function in the physical web and
broadcast URLs is their ability to support the Eddystone protocol specification.
• BLE was primarily chosen for the physical web due to its ubiquity, efficiency, and extended
battery life of several years
590
• URLs are one of the core principles of the web and can be either flexible or decentralized.
• These URLs allow any application to have a presence on the web and enables the digital
presence of an object or thing.
• As of now, physical web deployments have been undertaken in public spaces, and any device
with a physical web scanner can detect these URLs.
• The use of URLs extends the benefits of the web security model to the physical web.
• Features such as secured login, secure communication over HTTPS (HTTP over secure
socket layer), domain obfuscation, and others can be easily integrated with the physical web.
591
28
16-02-2023
• The multicast domain name system or mDNS is explicitly designed for small networks and is
analogous to regular DNS (domain name system), which is tasked with the resolution of IP
addresses.
• Interestingly, this system is free from any local name server from an operational point of view.
• However, it can work with regular DNS systems as it is a zero-configuration service. It uses
multicast UDP for resolving host names.
• An mDNS client initiates a multicast query on the IP network, which asks a remote host to identify
itself.
• The mDNS cache in the associated network subnet is updated with the multicast response
received from the target.
592
• A node can give up its claim to a domain name by setting the time-to-live (TTL) field to
zero in its response packet to an mDNS query.
• Some popular implementations of mDNS include the Apple Bonjour service and the
networked printer discovery service in Windows 10 operating system from Microsoft.
• The main drawback of mDNS is its host name resolution reach to a top-level domain
only.
593
29
16-02-2023
594
595
30
16-02-2023
• Universal plug and play or UPnP encompasses a set of networking protocols aimed at service discovery
and the establishment of functional network-based data sharing and communication services
• Mainly used for enabling dynamic connections of devices to computing platforms.
• UPnP allows the devices attaching to a computer network to configure themselves and update their
hosts about their working configurations over a network.
• UPnP is managed by the Open Connectivity Foundation.
• UPnP’s scope includes the discovery and intercommunication between networked devices such as
mobiles, printers, access points, gateways, televisions, and other regular commercial systems enabled with
IP capabilities..
596
597
31
16-02-2023
598
599
32
16-02-2023
600
601
33
16-02-2023
602
• The present-day UPnP has been designed to run on IP enabled networks, and makes use of
the networking services of HTTP, XML, and SOAP for data transfer, device descriptions, and
event generation and monitoring.
• UPnP enables UDP-based HTTP device search requests and advertisements using
multicasting.
• The responses to device requests are necessarily unicast.
• UPnP advertisements use UDP port 1900 for multicasting.
• The unnecessary overheads and traffic generated by UPnP systems and their multicast
behavior make them unsuitable for enterprise systems
603
34
16-02-2023
FUNCTIONALITY-BASED IOT
PROTOCOL ORGANIZATION
✓ Connectivity (6LowPAN, RPL)
✓ Identification (EPC, uCode, IPv6, URIs)
✓ Communication / Transport (WiFi, Bluetooth, LPWAN)
✓ Discovery (Physical Web, mDNS, DNS‐SD)
✓ Data Protocols (MQTT, CoAP, AMQP, Websocket, Node)
✓ Device Management (TR‐069, OMA‐DM)
✓ Semantic (JSON‐LD, Web Thing Model)
✓ Multi‐layer Frameworks (Alljoyn, IoTivity, Weave, Homekit)
Source: Internet of Things Protocols (Online)
604
MQTT
605
35
16-02-2023
INTRODUCTION
✓ Message Queue Telemetry Transport.
✓ ISO standard (ISO/IEC PRF 20922).
✓ It is a publish‐subscribe‐based lightweight messaging protocol for
use in conjunction with the TCP/IP protocol.
✓ MQTT was introduced by IBM in 1999 and standardized by OASIS in
2013.
✓ Designed to provide connectivity (mostly embedded) between
applications and middle‐wares on one side and networks and
communications on the other side.
Source: “MQTT”, Wikipedia (Online)
606
607
36
16-02-2023
MQTT
COMPONENTS
608
MQTT
METHODS
Connect
Disconnect
Subscribe
Unsubscribe
Publish
609
37
16-02-2023
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
610
COMMUNICATION
611
38
16-02-2023
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
612
MQTT TOPICS
Source: “MQTT 101 – How to Get Started with the lightweight IoT Protocol”, HiveMQ (Online)
613
39
16-02-2023
614
APPLICATIONS
615
40
16-02-2023
SMQTT
616
Source: M. Singh, M. Rajan, V. Shivraj, and P.Balamuralidhar, "Secure MQTT for Internet of Things (IoT)," in Fifth International Conference on
Communication Systems and Network Technologies (CSNT 2015), April 2015, pp. 746‐751
617
41
16-02-2023
618
• The clients can have the roles of information publishers (sending messages to the broker)
or information subscribers (retrieving messages from the broker).
• This allows MQTT to be largely decoupled from the applications being used with MQTT
619
42
16-02-2023
OPERATIONAL PRINCIPLE
• MQTT is built upon the principles of hierarchical topics and works on TCP for
communication over the network.
• Brokers receive new messages in the form of topics from publishers.
• A publisher first sends a control message along with the data message.
• Once updated in the broker, the broker distributes this topic’s content to all the subscribers
of that topic for which the new message has arrived.
• This paradigm enables publishers and subscribers to be free from any considerations of the
address and ports of multiple destinations/subscribers or network considerations of the
subscribers, and vice versa.
620
621
43
16-02-2023
622
623
44
16-02-2023
624
• Content delivery mechanisms are primarily designed for message transmission over
constrained networks and through constrained devices.
• At most once: This is a best-effort delivery service and is dependent on the best delivery
efforts of the TCP/IP network on which the MQTT is supported. It may result in message
duplication or loss.
• At least once: This delivery service guarantees assured delivery of messages. However,
message redundancy through duplication is a possibility.
• Exactly once: This delivery service guarantees assured message delivery. This service also
prevents message duplication
625
45
16-02-2023
626
QOS 1:
• This QoS level ensures that the message delivery between the publisher and server and
then between the server and subscribers occurs at least once.
• In PUBLISH and PUBACK packets, a packet identifier is included in the variable header.
• If the message is not acknowledged by a PUBACK packet, it is sent again.
• This level guarantees “at least once” delivery
627
46
16-02-2023
QOS 2:
• This is the highest QoS level, used when neither loss nor duplication of messages is acceptable.
• Confirming the receipt of a PUBLISH message requires a two-step acknowledgement process.
• The first step is done through the PUBLISH/PUBREC packet pair and the second is achieved with the
PUBREL/PUBCOMP packet pair.
• This level provides a “guaranteed service” known as “exactly once” delivery, with no consideration for
the number of retries as long as the message is delivered once.
• QoS process is symmetric in regard to the roles of sender and receiver, but two separate transactions
exist.
• One transaction occurs between the publishing client and the MQTT server, and the other transaction
happens between the MQTT server and the subscribing client
628
COAP
• The constrained application protocol, or CoAP as it is more popularly known, is designed for
use as a web transfer protocol in constrained devices and networks, which are typically low
power and lossy.
• The constrained devices typically have minimal RAM and an 8-bit processor at most
• CoAP can efficiently work on such devices, even when these devices are connected to highly
lossy networks with high packet loss, high error rates, and bandwidth in the range of kilobits
• CoAP follows a request–response paradigm for communication over these lossy networks.
• Additional highlights of this protocol include support for service discovery, resource
discovery, URIs (uniform resource identifier), Internet media handling support, easy HTTP
integration, and multicasting support, that too while maintaining low overheads.
629
47
16-02-2023
• CoAP implementations can act as both clients and servers (not simultaneously).
• A CoAP client’s request signifies a request for action from an identified resource on a
server, which is similar to HTTP.
• The response sent by the server in the form of a response code can contain resource
representations as well.
• CoAP interchanges are asynchronous and datagram-oriented over UDP.
630
631
48
16-02-2023
COAP FEATURES
• It has suitable web protocol for integrating IoT and M2M services in constrained environments
with the Internet.
• CoAP enables UDP binding and provides reliability concerning unicast as well as multicast requests.
• Message exchanges between end points in the network or between nodes is asynchronous.
• The limited packet header incurs significantly lower overheads. This also results in less complexity
and processing requirements for parsing of packets.
• CoAP has provisions for URI and other content-type identifier support. CoAP additionally provides
DTLS (datagram transport layer security) binding.
632
633
49
16-02-2023
COAP MESSAGING
634
635
50
16-02-2023
OPERATIONAL PRINCIPLE
• CoAP is built upon the exchange of messages between two or more UDP end points.
• Options and payload follow the compact 4-byte binary header in CoAP.
• This arrangement is typical of request and response messages of CoAP.
• A 2-byte message ID is used with each message to detect duplicates.
• Whenever a message is marked as a CON message, it signifies that the message is reliable.
• In the event of delivery failure of a CON message, subsequent retries are attempted with exponential
back-off until the receiving end point receives an ACK with the same message ID.
• In case the recipient does not have the resources to process the CON message, a RESET message is sent
to the originator of the CON message instead of an ACK message.
636
637
51
16-02-2023
• Specific messages, which do not require reliable message transmission (such as rapid
temporal readings of the environment from a sensor node), are sent as NON messages.
• NON messages do not receive an acknowledgment
• However, the message ID associated with it prevents duplication.
• NON messages elucidate a NON or CON response from a server, based on the settings
and semantics of the application.
• If the receiver of the NON cannot process the message, a RESET message is sent to the
originator of the NON message
638
639
52