Introduction To IOT
Introduction To IOT
Data
1 0 1 0 0 1 1 1 0 0 1
Manchester
(as per IEEE 802.3)
8
How Can Many
Robert’s local
DNS server
Hosts Communicate?
.com authoritative
DNS sever
Robert Routing Table at B
Prefix IF Hops
10.1.8.7 4.0.0.0/8 D 1
23.2.0.1 IP address
Dest=4.5.16.2 A
4.9.0.1
10.1.0.0/16 B
23.2.0.0/24
4.18.5.1
Prefix
C D
10.1.0.1 81.2.0.0/24 4.0.0.0/8
Routing Table at A
Prefix IF Hops
B 2 81.2.0.1 4.5.16.2
youtube.com
4.0.0.0/8
Routing Table at C
Prefix IF Hops
4.0.0.0/8 D 1
youtube.com’s authoritative
DNS server
• Hosts assigned topology-dependent addresses
• Routers advertise address blocks (“prefixes”)
• Routers compute “shortest” paths to prefixes
• Map IP addresses to names with DNS
9
What is a Protocol? Can we meet next
week sometime?
Ok, great!
See you then!
What is a Protocol?
• Sequence of communications used to conduct some activity in a
distributed system
Transport
TCP Flags
Port Numbers
Destination Sender IP
IP Address Address Networking
Routing Table at C
Prefix IF Hops
4.0.0.0/8 D 1
A B
Name: B
Address: 308 E Green St.
Champaign, IL
61820
61801
A B
61822
Name: B
Address: 308 E Green St.
Champaign, IL
61820
61820
Scenario: Access Control
C
“Inspect mail to
308 E Green St.” D
308 E Green St.
Name: C
603 S Wright St
Name: C
Address: 308 E Green St.
Champaign, IL
201 N Goodwin Ave 61820
Internet Addressing:
Different Layers Use Different Addresses
URLs (e.g., http://www.cs.Illinois.edu/index.html)
• Identifies “resources” – files, content
Application
Domain names (e.g., illinois.edu)
• Identifies groups of computers under single administrative control
Hierarchically-assigned, location-dependent
Flat (location-independent) identifier
identifier
Like a social security number
Like a postal address
Usually hard-coded, requires no
Needs to be manually configured, assigned by
configuration
DHCP
Portable; can stay the same as the host moves Not portable; must be changed if host changes
networks
Used to get packet to destination on same
Used to get packet to destination IP subnet
LAN
Also, creating new protocols can help lock-in and market control
• Bad for innovation but good for security
Common IoT Protocols
Different IoT Protocols
for Different Environments
Data Rate
Wireless LAN (WLAN) Low-Power Wide-Area Network (LPWAN)
High
(Gbps)
Low Power Wireless LAN (LPWLAN)
Medium
(Mbps)
Low Power Wireless Personal Area
Networks (LPWPAN)
Low
(Kbps)
Communication Range
Short Medium Long
Zigbee Protocol Stack
Application Layer (APL)
Application Zigbee Device Application
Framework Object Support Sub-layer
Defined in the
ZigBee Standard
Network Layer (NWK)
Security Message Routing Network
Management Broker Management Management
Application
Application
Layer Generic Attribute Generic Access Host
Functions Protocol (GATT) Profile (GAP)
Attribute
Protocol (ATT)
Security
Manager
Network Layer
Functions Logical Link Control and Adaptation
Layer Protocol (L2CAP)
A
B
C D
30
How Does Internet Routing Work?
Internet routing works on two levels:
source Sprint
AT&T
BGP session
0D:73:CA:F3
17.3.6.2 Dest Nexthop
17.0.0.0/24 fe0/1
F5:5A:21:03
Dest Nexthop
29.51.130.9
17.0.0.0/24 fe7/1
Hey everybody –
I own Dest Nexthop
17.3.6.0/24! 17.0.0.0/24 fe0/0
L2 Switching vs L3 Routing:
Switching Relies on Broadcast
Dest Nexthop
Data 0D:73:CA:F3 fe0/1
Messages
0D:73:CA:F3
17.3.6.2
F5:5A:21:03
29.51.130.9
Here is a data
Say… I received a data packet with src MAC
packet I want to
address 0D:73:CA:F3 on fe0/1…
send to
Next time I get a packet destined to 0D:73:CA:F3
F5:5A:21:03!
I know what direction they are…
Virtualizing Ethernet with VLANs
Guest Corporate Corporate Credit Card
• Divide up hosts into logical printers printer Server
groups called VLANs VLAN
• Like virtual machines, but for
LANs (creates “virtual
networks”)
• VLANs isolate traffic at layer 2 Corporate
B1
• Each VLAN corresponds to IP workstatio
subnet, single broadcast n
domain
• Ethernet packet headers have
VLAN tag
• Bridges forward packet only Guest Guest
on subnets on corresponding workstations
VLAN VLAN
Delivery Models
A
B C
• Unicast
D • Broadcast
E
• Multicast
I
• Anycast
H
F G J
Source
Delivery Models
A
B C • Unicast
• One source, one
D destination
E
• Widely used (web,
I cloud, streaming;
many protocols)
H
F G J
Delivery Models
A
B C • Broadcast
• One source, all
D destinations
E
• Used to
I disseminate control
information,
H perform service
F G J discovery
Delivery Models
A
B C • Multicast
• One source, several
D (prespecified)
destinations
E • Used within some
I ISP infrastructures
for content
H delivery, overlay
F G J networks
Delivery Models
A
B C • Anycast
• One source, route
D to “best”
destination
E
I • Used in DNS,
content
H distribution, service
F G J selection
Multicast: Source-Specific Trees
A
• Each source is the
B C root of its own tree
E • Tree consists of
I
shortest paths to
H
each receiver
F G J
Member of Sender to
multicast group
UIUC, Spring 2010
F multicast group
Multicast: Source-Specific Trees
A
• Each source is the
B C root of its own tree
E • Tree consists of
I
shortest paths to
H each receiver
F G JJ
Member of Sender to
multicast group
UIUC, Spring 2010
F multicast group
Multicast: Shared Tree
A
• One tree used by all
B C members of a group
• Rooted at “rendezvous
D
RP point” (RP)
E
I • Less state to maintain,
but hard to pick a tree
H that’s “good” for
F G JJ
everybody
45
Multicast: Shared Tree
• Ideally, find a “Steiner
A tree” minimum-weighted
tree connecting only the
B C
multicast members
– Unfortunately, this is
D NP-hard
RP
E
I
• Instead, use heuristics
– E.g., find a minimum
H
F G JJ spanning tree (much
easier)
46
Example Applications
• So many applications, scenarios, use cases for IoT
• Seems hard to digest it all
• Important we understand
environment
• Global warming reducing arable land,
honeybees disappearing, pollution
kills millions of people
Environmental Monitoring: Wildlife
• Earth is facing its 6th major
extinction event
• 10,000 species go extinct every year
• # species halved in last 40 years
• Comparable to “Snowball Earth” and
the asteroid that wiped out the
dinosaurs
• Threats: Escalating poaching, human
encroachment, climate change,
disease
• Understanding the problem can
help us solve it
Environmental Monitoring: Wildlife
• Animal monitoring an essential part of almost all conservation
efforts
• If they are ill, injured, caught in a trap, we can find and help them
• Big changes in migration patterns, population density
• Elephants, Whales, Tigers, Macaws, etc. on the verge of extinction
infrastructure such as
antenna towers Directional
antenna
• Plane flyovers – listen
for pings from collars RF
Range
• Peer-peer Tracking
collar Cell
communication to Tower
replicate info across
collars
• E.g., use gossip
opportunistically during
encounters
Environmental Monitoring: Wildlife:
Sample Findings (Zebra Monitoring)
• Forestry monitoring
• Illegal logging, land-use/species changes, health, fire prediction
• Study physical characteristics: tree height, diameter at base, stem
density, canopy/foliage density, discolorations, water content
• Challenges: no fixed infrastructure, large multipath effects (long-wave,
relays, satellite)
Other Kinds of Environmental Monitoring
connected to
“gateway/hub”
802.11
(Wifi)
documentation to
prevent independent
Ethernet
DOCSIS
(wired)
development Cable Modem
• Poor release/patching
802.11
SmartFridge
(Wifi)
Per-floor
distribution
switches
(Ethernet)
Building
Management Lighting Alarm Security
System (BMS) Controller Panel Headend
Horn/ Microwave/
Chilled Beam Lights IR/Laser Sensor
Strobe
Applications
border E-Governance
routers firewall IPS
Fiduciary/Accounting
IP Core
3rd Party/Citizen Apps
Internet
IPS
firewall
Electrical power Traffic Control Critical services Medical services Operation Center
services (smart grid, (monitoring, (fire, police, (hospital,
smart metering) parking) security) paramedics,
medivac)