U4 Notes
U4 Notes
Lecture 1
• The form of communication is left open to the application. It may very well
be the case that an M2M device uses no inherent services or topologies for
communication.
• An M2M system may communicate over non-IP based channels as well, such
as a serial port or custom protocol.
The M2M system solution is used to remotely monitor and control enterprise assets
of various kinds, and to integrate those assets into the business processes of the
1
Unit 4 CSE VII Sem Internet of Things
enterprise in question. The asset can be of a wide range of types (e.g. vehicle, freight
container, building, or smart electricity meter), all depending on the enterprise.
• M2M Device. This is the M2M device attached to the asset of interest, and
provides sensing and actuation capabilities. The M2M device is here general-
ized, as there are a number of different realizations of these devices, ranging
from low-end sensor nodes to high-end complex devices with multimodal sens-
ing capabilities.
2
Unit 4 CSE VII Sem Internet of Things
[h]
further integrated into the overall business process system of the enterprise.
M2M Architecture
3
Unit 4 CSE VII Sem Internet of Things
• An M2M area network comprises of machines (or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
• Various communication protocols can be used for M2M local area networks
such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Com-
munication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
• Since non-IP based protocols are used within M2M area networks, the M2M
nodes within one network cannot communicate with nodes in an external net-
work. To enable the communication between remote M2M area networks,
M2M gateways are used.
• The communication between the M2M nodes and the M2M gateway is based
on the communication protocols which are native to the M2M area network.
• The M2M data is gathered into point solutions such as enterprise applications,
service management applications, or remote monitoring applications.
• M2M has various application domains such as smart metering, home automa-
tion, industrial automation, smart grids, etc. M2M solution designs (such as
data collection and storage architectures and applications) are specific to the
M2M application domain.
4
Unit 4 CSE VII Sem Internet of Things
Lecture 2
In many respects, it can initially look the same as M2M communication connecting
sensors and other devices to Information and Communication Technology (ICT)
systems via wired or wireless networks. IoT systems may incorporate some M2M
nodes (such as a Bluetooth mesh using non-IP communication), but aggregates data
at an edge router or gateway. An edge appliance like a gateway or router serves as
the entry point onto the internet. In the longer term, it is envisaged that an IoT
ecosystem will emerge not dissimilar to today?s Internet, allowing things and real
world objects to connect, communicate, and interact with one another in the same
way humans do via the web today.
Therefore, IoT is significantly different from M2M. Few important difference are:
• Communication Protocols: M2M and IoT can differ in how the communi-
cation between the machines or devices happens. M2M uses either proprietary
or non-IP based communication protocols for communication within the M2M
area networks. Commonly uses M2M protocols include ZigBee, Bluetooh,
ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC), 6LoW-
PAN, IEEE 802.15.4, Z-Wave, etc. The focus of communication in M2M is
usually on the protocols below the network layer. The focus of communica-
tion in IoT is usually on the protocols above the network layer such as HTTP,
CoAP, WebSockets, MQTT, XMPP etc.
5
Unit 4 CSE VII Sem Internet of Things
external environment (and user applications) or their internal physical states. The unique
identifiers for the things in IoT are the IP addresses (or MAC addresses). Things have software
components for accessing, processing, and storing sensor information, or controlling actuators
connected. IoT systems can have heterogeneous things, M2M systems, in contrast to IoT, typically
• Data Collection & Analysis M2M data is collected in point solutions and
often in on-premises storage infrastructure. In contrast to M2M, the data in
IoT is collected in the cloud (can be public, private or hybrid cloud). The
analytics component analyzes the data and stores the results in the cloud
database. The IoT data and analysis results are visualized with the cloud-
based applications. The centralized controller is aware of the status of all
the end nodes and sends control commands to the nodes. Observer nodes
can process information and use it for various applications, however, observer
nodes do not perform any control functions.
Applications: M2M data is collected in point solutions and can be accessed by on-
premises applications such as diagnosis applications, service manage- ment applications,
and on-premisis enterprise applications. IoT data is col- lected in the cloud and can be
accessed by cloud applications such as analytics applications, enterprise applications, remote
diagnosis and management appli- cations, etc. Since the scale of data collected in IoT is so
massive, cloud-based real-time and batch data analysis frameworks are used for data
analys
6
Unit 4 CSE VII Sem Internet of Things
[h]
Application of M2M
• Security applications are mainly those related to home alarms and small busi-
7
Unit 4 CSE VII Sem Internet of Things
[h]
8
Unit 4 CSE VII Sem Internet of Things
Lecture 3
In traditional network configuration, the data plane and control plane are unified.
When the system needs to add or remove another node or set up a new data path,
many of the dedicated systems need to be updated with new VLAN settings, QoS
parameters, access control lists, static routes, and firewall pass-throughs.
9
Unit 4 CSE VII Sem Internet of Things
SDN Defintion
• The control plane is decoupled from the data plane. Data plane hardware
becomes simple packet-forwarding devices.
10
Unit 4 CSE VII Sem Internet of Things
allows for easy scaling and flexibility with virtual switches, firewalls, and mid-
dleware.
• The control logic is also known as the SDN Controller. This software version
of legacy hardware is capable of running on commodity hardware and cloud-
based instances. Its purpose is to command and govern the simplified switching
nodes.
• The control logic is also known as the SDN Controller. This software version
of legacy hardware is capable of running on commodity hardware and cloud-
based instances. Its purpose is to command and govern the simplified switching
nodes.
• Network application software can reside over the SDN controller through a
northbound interface. This software can interact and manipulate the data
plane with services such as deep packet inspection, firewalls, and load bal-
ancers.
11
Unit 4 CSE VII Sem Internet of Things
Advantages of SDN
SDN has many important benefits over traditional network when it comes to traffic
nature of IoT.
12
Unit 4 CSE VII Sem Internet of Things
13
Unit 4 CSE VII Sem Internet of Things
Lecture 4
SDN Architecture
Elements of SDN Architecture
15
Unit 4 CSE VII Sem Internet of Things
Layer I: Infrastructure
Southbound interfaces (or southbound APIs) are the connecting bridges between
control and forwarding elements, thus being the crucial instrument for clearly sep-
arating control and data plane functionality. As a central component of its design
the southbound APIs represent one of the major barriers for the introduction and
acceptance of any new networking technology therefore standard SDN southbound
API like OpenFlow Emerges .
The OpenFlow protocol provides three information sources for network operating
systems. First, event-based messages are sent by forwarding devices to the controller
when a link or port change is triggered. Second, flow statistics are generated by the
16
Unit 4 CSE VII Sem Internet of Things
forwarding devices and collected by the controller. Third, packet-in messages are
sent by forwarding devices to the controller when they do not known what to do
with a new incoming flow or because there is an explicit “send to controller? action
in the matched entry of the flow table.
Hypervisors enable distinct virtual machines to share the same hardware resources.
Virtual machines can be easily migrated from one physical server to another and
can be created and/or destroyed on-demand, enabling the provisioning of elastic
services with flexible and easy management. Item Unfortunately, virtualization has
been only partially realized in practice.
Networks have so far been managed and configured using lower level, device-specific
instruction sets and mostly closed proprietary network operating systems (e.g., Cisco
IOS and Juniper JunOS) SDN is promised to facilitate network management and
ease the burden of solving networking problems by means of the logically-centralized
control offered by a network operating system (NOS) The crucial value of a NOS
is to provide abstractions, essential services, and common application programming
interfaces (APIs) to developers. Generic functionality as network state and network
topology information, device discovery, and distribution of network configuration
can be provided as services of the NOS. With NOSs, to define network policies a
developer no longer needs to care about the low-level details of data distribution
among routing elements, for instance
17
Unit 4 CSE VII Sem Internet of Things
18
Unit 4 CSE VII Sem Internet of Things
Network applications can be seen as the ?network brains?. They implement the
control-logic that will be translated into commands to be installed in the data plane,
dictating the behavior of the forwarding devices. Software-defined networks can be
deployed on any traditional network environment, from home and enterprise net-
works to data centers and Internet exchange points. Such variety of environments
has led to a wide array of network applications. Existing network applications per-
form traditional functionality such as routing, load balancing, and security policy
enforcement, but also explore novel approaches, such as reducing power consump-
tion. Other examples include fail-over and reliability functionalities to the data
plane, end-to-end QoS enforcement, network virtualization, mobility management
in wireless networks, among many others. The variety of network applications, com-
bined with real use case deployments, is expected to be one of the major forces on
fostering a broad adoption of SDN
19
Unit 4 CSE VII Sem Internet of Things
Lecture 5
NFV originated from discussions among major network operators and carriers about
how to improve network operations in the high-volume multimedia era. These dis-
cussions resulted in the publication of the original NFV white paper, Network Func-
tions Virtualization: An Introduction, Benefits, Enablers, Challenges & Call for
Action. In this white paper, the group listed as the overall objective of NFV is
leveraging standard IT virtualization technology to consolidate many network equip-
ment types onto industry standard high-volume servers, switches, and storage, which
could be located in data centers, network nodes, and in the end-user premises.
The white paper highlights that the source of the need for this new approach is
that networks include a large and growing variety of proprietary hardware appli-
ances, leading to the following negative consequences:
• New network services may require additional different types of hardware ap-
pliances, and finding the space and power to accommodate these boxes is
becoming increasingly difficult.
• Once new types of hardware appliances are acquired, operators are faced with
the rarity of skills necessary to design, integrate, and operate increasingly
complex hardware-based appliances.
20
Unit 4 CSE VII Sem Internet of Things
The NFV approach moves away from dependence on a variety of hardware plat-
forms to the use of a small number of standardized platform types, with virtualiza-
tion techniques used to provide the needed network functionality.
Virtualization
21
Unit 4 CSE VII Sem Internet of Things
individual physical servers, processors, and operating systems, from server users.
This makes it possible to partition a single host into multiple independent servers,
conserving hardware resources. It also makes it possible to quickly migrate a server
from one machine to another for load balancing or for dynamic switchover in the case
of machine failure. Server virtualization has become a central element in dealing
with big data applications and in implementing cloud computing infrastructures.
Container Virtualization
22
Unit 4 CSE VII Sem Internet of Things
NFV Concept
23
Unit 4 CSE VII Sem Internet of Things
requires additional hardware for increased capacity, but this hardware is idle when
the system is running below capacity. With NFV, however, network elements are
independent applications that are flexibly deployed on a unified platform comprising
standard servers, storage devices, and switches. In this way, software and hardware
are decoupled, and capacity for each application is increased or decreased by adding
or reducing virtual resources.
This section considers a simple example from the NFV Architectural Framework
document. Part a of Figure 7.6 shows a physical realization of a network service. At
a top level, the network service consists of endpoints connected by a forwarding graph
of network functional blocks, called network functions (NFs). Examples of NFs are
firewalls, load balancers, and wireless network access points. In the Architectural
Framework, NFs are viewed as distinct physical nodes. The endpoints are beyond
the scope of the NFV specifications and include all customer-owned devices. So, in
the figure, endpoint A could be a smartphone and endpoint B a content delivery
network (CDN) server.
The interconnections among the NFs and endpoints are depicted by dashed
lines, representing logical links. These logical links are supported by physical paths
through infrastructure networks (wired or wireless).
24
Unit 4 CSE VII Sem Internet of Things
25
Unit 4 CSE VII Sem Internet of Things
The reason for this is that three separate and distinct network functions are being
performed. For example, it may be that some traffic flows need to be subjected to a
traffic policing or shaping function, which could be performed by VNF-2C. So, some
flows would be routed through VNF-2C, while others would bypass this network
function.
A second observation is that two of the VMs in VNF-FG-2 are hosted on the
same physical machine. Because these two VMs perform different functions, they
need to be distinct at the virtual resource level but can be supported by the same
physical machine. But this is not required, and a network management function
may at some point decide to migrate one of the VMs to another physical machine,
for reasons of performance. This movement is transparent at the virtual resource
level.
NFV Principle
The VNFs are the building blocks used to create end-to-end network services. Three
key NFV principles are involved in creating practical network services:
• Service chaining: VNFs are modular and each VNF provides limited func-
tionality on its own. For a given traffic flow within a given application, the
service provider steers the flow through multiple VNFs to achieve the desired
network functionality. This is referred to as service chaining.
26
Unit 4 CSE VII Sem Internet of Things
NFV Advantages
• The ability to innovate and roll out services quickly and also lowers the risks
associated with rolling out new services, allowing providers to easily trial and
evolve services to determine what best meets the needs of customers.
• Use of a single platform for different applications, users and tenants. This
allows network operators to share resources across services and across different
customer bases.
27
Unit 4 CSE VII Sem Internet of Things
NFV Requirements
28
Unit 4 CSE VII Sem Internet of Things
faces (for management and control) and interwork with physical appliances
implementing the same functions.
• Automation: NFV will scale only if all the functions can be automated.
Automation of process is paramount to success.
29
Unit 4 CSE VII Sem Internet of Things
avoiding lock-in. The ecosystem must offer integration services and mainte-
nance and third-party support; it must be possible to resolve integration issues
between several parties. The ecosystem will require mechanisms to validate
new NFV products.
30
Unit 4 CSE VII Sem Internet of Things
Lecture 6
NFV Architecture
NFV Terminology
31
Unit 4 CSE VII Sem Internet of Things
• VNF Forwarding Path: Graph of logical links connecting VNF nodes for
the pur- pose of describing traffic flow between these network func- tions.
32
Unit 4 CSE VII Sem Internet of Things
The ISG NFV Architectural Framework document specifies that in the deploy-
ment, operation, management and orchestration of VNFs, two types of relations
between VNFs are supported:
• VNF forwarding graph (VNF FG): Covers the case where network con-
nectivity between VNFs is specified, such as a chain of VNFs on the path
to a web server tier (for example, firewall, network address translator, load
balancer).
• VNF set: Covers the case where the connectivity between VNFs is not spec-
ified, such as a web server pool.
33
Unit 4 CSE VII Sem Internet of Things
We have discussed high-level framework in above section. Figure given below shows
a more detailed look at the ISG NFV reference architectural framework. You can
view this architecture as consisting of four major blocks:
It is also useful to view the architecture as consisting of three layers. The NFVI
together with the virtualized infrastructure manager provide and manage the virtual
resource environment and its underlying physical resources. The VNF layer provides
the software implementation of network functions, together with element manage-
ment systems and one or more VNF managers. Finally, there is a management,
orchestration, and control layer consisting of OSS/BSS and the NFV orchestrator.
34
Unit 4 CSE VII Sem Internet of Things
The NFV management and orchestration facility includes the following functional
blocks:
35
Unit 4 CSE VII Sem Internet of Things
Reference Points
Architecture also defines a number of reference points that constitute interfaces be-
tween functional blocks. The main (named) reference points and execution reference
points are shown by solid lines and are in the scope of NFV. These are potential
targets for standardization.
The main reference points include the following considerations:
• Vn-Nf: These interfaces are APIs used by VNFs to execute on the virtual
infrastructure. Application developers, whether migrating existing network
functions or developing new VNFs, require a consistent interface the provides
functionality and the ability to specify performance, reliability, and scalability
requirements.
• Nf-Vi: Marks interfaces between the NFVI and the virtualized infrastructure
manager (VIM). This interface can facilitate specification of the capabilities
that the NFVI provides for the VIM. The VIM must be able to manage all the
NFVI virtual resources, including allocation, monitoring of system utilization,
and fault management.
36
Unit 4 CSE VII Sem Internet of Things
• Vi-Vnfm: Used for resource allocation requests by the VNF manager and the
exchange of resource configuration and state information.
• Or-Vi: Used for resource allocation requests by the NFV orchestrator and
the exchange of resource configuration and state information.
• Os-Ma: Used for interaction between the orchestrator and the OSS/BSS sys-
tems.
• Ve-Vnfm: Used for requests for VNF lifecycle management and exchange of
configuration and state information.
• Se-Ma: Interface between the orchestrator and a data set that provides in-
formation regarding the VNF deployment template, VNF forwarding graph,
service-related information, and NFV infrastructure information models.
37
Unit 4 CSE VII Sem Internet of Things
Lecture 7
The core similarity between software-defined networking (SDN) and network func-
tions virtualization (NFV) is that they both use network abstraction. Both de-
pend heavily on virtualization to enable network design and infrastructure to be
abstracted in software and then implemented by underlying software across hard-
ware platforms and devices. SDN seeks to separate network control functions from
network forwarding functions, while NFV seeks to abstract network forwarding and
other networking functions from the hardware on which it runs. SDN abstracts
physical networking resources ?switches, routers and so on ? and moves decision
making to a virtual network control plane. In this approach, the control plane de-
cides where to send traffic, while the hardware continues to direct and handle the
traffic. NFV aims to virtualize all physical network resources beneath a hypervisor,
which allows the network to grow without the addition of more devices. When SDN
executes on an NFV infrastructure, SDN forwards data packets from one network
device to another. At the same time, SDN’s networking control functions for rout-
ing, policy definition and applications run in a virtual machine somewhere on the
network. Thus, NFV provides basic networking functions, while SDN controls and
orchestrates them for specific uses. SDN further allows configuration and behavior
to be programmatically defined and modified.
The concern of a network service provider is about the set of network devices
(such as routers) and the control and management of the functions they perform
(such as packet forwarding). Both SDF and NFV can be used seperately to provide
this but SDN and NFV are not mutually exclusive. If both SDN and NFV are
implemented for a network, the following relationships hold:
• The relationship between SDN and NFV is perhaps viewed as SDN functioning
38
Unit 4 CSE VII Sem Internet of Things
as an enabler of NFV.
• A major challenge with NFV is to best enable the user to configure a network so
that VNFs running on servers are connected to the network at the appropriate
place, with the appropriate connectivity to other VNFs, and with desired QoS
• With SDN, users and orchestration software can dynamically configure the
network and the distribution and connectivity of VNFs.
• Without SDN, NFV requires much more manual intervention, especially when
resources beyond the scope of NFVI are part of the environment.
Some of the ways that ETSI believes that NFV and SDN complement each other
include the following:
• The SDN controller fits well into the broader concept of a network controller
in an NFVI network domain.
• SDN can play a significant role in the orchestration of the NFVI resources, both
physical and virtual, enabling functionality such as provisioning, configuration
of network connectivity, bandwidth allocation, automation of operations, mon-
itoring, security, and policy control.
39
Unit 4 CSE VII Sem Internet of Things
• The SDN controller can be run as a VNF, possibly as part of a service chain
including other VNFs. For example, applications and services originally de-
veloped to run on the SDN controller could also be implemented as separate
VNFs.
40
Unit 4 CSE VII Sem Internet of Things
• SDN controller can be virtualized, running as a VNF with its EM and VNF
manager. Note that there may be SDN controllers for the physical infrastruc-
ture, the virtual infrastructure, and the virtual and physical network functions.
As such, some of these SDN controllers may reside in the NFVI or management
and orchestration (MANO) functional blocks (not shown in figure).
• SDN enabled VNF includes any VNF that may be under the control of an
SDN controller (for example, virtual router, virtual firewall).
• Ve-Vnfm interface is used between the SDN VNF (SDN controller VNF, SDN
network functions VNF, SDN applications VNF) and their respective VNF
Manager for lifecycle management.
• Vn-Nf allows SDN VNFs to access connectivity services between VNFC inter-
faces.
41
Unit 4 CSE VII Sem Internet of Things
Lecture 8
objects forecasted according to Gartner1, it?s difficult to manage these devices gen-
erating an impressive amount of data as a whole, without having elasticity and flexibility
inherently defined in the network. If the networks are not prepared, the flood of IoT
where a lot of traffic are generated could leave the network paralysed
43
Unit 4 CSE VII Sem Internet of Things
44
Unit 4 CSE VII Sem Internet of Things
4. Management: The SDN controller manages and supervises the entire net-
work. The centralized position of the SDN controller makes it suitable to have
a global vision of the network topology and conditions, performing network
control such as routing and QoS control. The controller can determine the
best routing decisions and inserting these decisions into the flow tables. The
sensor nodes do not make routing decisions but only forward and drop packets
according to the rules set by the controller. The scheduling must be built
over defined routes and the controller can optimize the sleep/active cycles of
the sensors by choosing the most energy-efficient set in every scheduling cycle.
Latency can be reduced and significant energy savings can be achieved.
45
Unit 4 CSE VII Sem Internet of Things
(3) load balancing (4) fault-tolerance among others. With multiple controllers,
this can be used to offload computational tasks which brings benefits in terms
of administration. Each domain has its SDN controller which controls all traf-
fic in its domain. When one SDN controller fails, another SDN controller can
take control to avoid network failures.
46