WSN Unit 04 Notes
WSN Unit 04 Notes
wireless sensor network design (Misrimal Navajee Munoth Jain Engineering College)
UNIT 4
APPLICATION
4.1. INTRODUCTION
.The internet and especiallythe web has become ubiquitouspartly because of its
ability to represent content in a universal way using a common application
protocol-theHypertextTransferProtocol (HTTP).
&The most widely ùsed applicationprotocol supportingthe web pages and web
services. There are a large number of important applicationprotocols used on
the Internet.
&Example, the File Transfer Protocol (FTP), Real Time Protocol (RTP), Session
Initiation Protocol (SIP), Service Location Protocol (SLP) and the Simple
Network ManagementProtocol (SNMP).
# Applicationprotocol can be defined as all the messages and methods having to
do with inter process communicationvia the Internetprotocol.
4The application layer depends on the transport layer to provide host to host
communicationand port multiplexingallowing multiple access to communicate
between end points simultaneously.
* The Intermet of things makes use of most of the same application
protocols used
in the Internet for communication between machines and services for auto
Configurationand for managingnodes and networks.
* Wireless Embedded Internet with 6LoWPAN, It is a
challengingin this respect
having smallframe sizes, limited data rates, limited memory, sleepingnode
ycle along with the mobiling of devices make the design of new application
protocolsand the adaptationof existing onesdifficult.
Application
Wireless Sensor Network Desipy
4.2
processes using well defined
We services enable the communicationbetween
4.3
App
Access Protocol (SOAP) or
message sequences with the Simple Object
(REST) style design.
StatelessResourceswith RepresentationalState Transfer App UDP
UDP
App
specific
Wireless Embedded Intermet svstems are usually designed tor a App
network. App
pupose, for example a facility management
* Currently, large building automation systems are preconfiguredto function in App App
that environment require management, for example, SNMP often make use of
TCP
TCP App
industry specific protocolssuch as BACnet. App
& A home automation system on the other hand requires service discovery App
protocols such as SLP, and may make use of web-service style or proprietary Fig. 4.1.
protocolsfor data and management. Applications process communicationoccurs through Internt
sockets
* Although the Intemet protocol provides basic packet networking over A Although the Internet Protocol provides basic
heterogeneous linkS, it is UDP and TCP that allow for the large range of heterogeneous links, it is UDP and TCP that allowpacket networking over
for the large range of
applicationprotocols by providing best efort (UDP) and reliable connection applicationprotocols by providing best-effort (UDP) and reliable connection
oriented (TCP). oriented(TCP) multiplexedcommunicationsbetween
applicationprocesses.
4 Wireless Embedded Intermet systems are usually designed for a specific 4 IP protocols use a socket-based approach, where
process end-points are
purpose, for example a facility management network or for a simple home identifiedby 16-bit source and destinationport identifiers.These are commonly
automation system. These two examples happen to have widely different called Internet sockets or network sockets. The concept is illustrated in
applicationprotocolrequirements. Figure 4.1.
4 Currently, large building automationsystems are pre-configuredto function in 4 The communicationbetween any twO end-pointsis uniquely identifiedfor cach
that environment,require managementwith e.g. SNMP, and often make use of
transportby a four-tupleconsistingof the local and renotesocket addresses:
industry-specificprotocolssuch as BAChet.
4 Ahome automation system on the other hand requires service discovery {src IP address,sre port, dst IP address,dst port)
protocols such as SLP, and may make use of web-service style or proprietary Applicationprotocols use a socket API to access datagram socket (UDP) and
protocols for data and management. What makes 6LoWPAN very different Stream sSocket(TCP) transport services along with raw socket (IP) services
from vertical communicationsolutions is that the same within a protocol stack. The different types of sockets are completely
network can be used by can be used
a large variety of devices running different applications thanks to the independent of each other (e.g. UDP port 80 and TCP port 80
Internet
model. simultaneously).
& All the compression of UDP ports down to a range of 16
protocols mentioned above can be run over the same IP * OLoWPAN supports the of
network LoWPAN usually has a limited number
infrastructure, simultaneously. IP uses what is often called a horizontal Which is useful because a wireless
is poorlysuited to lossy
networking approach. applications.TCP is not easy to compress,and
congestionavoidancedesign.
mesh networksbecauseof its
Downloaded by ??????? ([email protected])
lOMoARcPSD|51489847
Apylication
Ayplication
pgelieatton
The intermittent
Wireless Sensor Network Design 4 node
4.8
be takeninto availability due to mobility and sleeo
account during
4.9
4 lf the UDP sourre or destinationports are compressed, then thc port space can application schedules
needs
synchronous rolling of design.
For example, the to
be limited down to l6 ports (ports 61616-61631). Alhough 6LoWPAN
communicationshouldLoWPAN
be avoided. Instead nodes from aserver should
supports fragmentation in onder to handle larger payloads coming in from be node
when possible.
outside the LoWPAN, the fragmentation of large payloads inereases delay, initiatedand asynchronous
packet loss probabilityand congestion. 42.4. COMPRESSION
a ltis recommendedto use applicationlayer payload lengths that avoid the nccd
4 The small payload sizes
for 6LoWPAN fragmentation
existing protocols.
available often require compression to be used on
4.2.3. HOST ISSUES
.The minimal payload available
4 The typical Intermet hosts 6LoWPAN hosts & networks are often mobile in combine with fragmentationperformanceissues
requires applicationprotocolsto use very compact
nature during operation. formats.
Some applicationsprotocolsare directly
Battery powered nodes often use sleep periodwith duty cycle often between 1-5 useful with 6LoWPAN such as RTP.
Other existing protocols or have been slightly
percent.
when used with 6LoWPAN, These include MATT. adapted to make them efficient
* A node may be identifiedin many ways, for example, IPv6 address or domain SNMP, SLP, and BACnet.
& It is designed for the web usually based on
name. HTTP/TCP are not well suited for
use over 6LoWPAN.
4 The identificationof a device is especiallyimportant in embedded application.
For example in the monitoringof machines for maintenance & HTTP uses a text based human reliable format which takes space and is
difficult
4 The device can be identified by an application using some unique identifier to parse on simple embeddeddevices.
such as its EUI.64 a serial number IPv6 address of the node or by its domain 4 XML - universallyused for the machine to machine content carried in HTTP
name. such as SOAP.
* The IPv6 address changes each time the LoWPAN node or the whole Lo WPAN * Techniqueto compressXML such as web serviceparadigms.
changes its point of attachmentsis employed.
*When applyingcompressionfor web servicesan impotantdesign consideration
* The unique serial number such as the EUI-64 of the device is a reliable is whether to use compressionend to end or implement it with a proxy.
identifier. But it must still be resolved to the IPv6 address of the device for
communicationby the applications. 42.5. SECURITY
LoWPAN.
4 The most application friendly method is to use a domain name to identify a OLoWPANdepend on link layer encryption for securinglinks in the
device which is updated with the current IPv6 address of the device each time it intermediatehope and understood by all
moves using appropriateDNS technique. * Link layer encryptionis vulnerableat
node using the same encryptionkey.
4 Battery powered nodes are implemented to take advantage of
aggressive sleep applicationlevel informationwhich wouldbe
schedule in order to extend battery life. "t 1S not very useful for securing after being routed
over other IP networks
4 It is even common for a node to be active less Vulnerableat intermediatenodes and
than l percent of the time.
outside the LoWPAN.
Downloaded by ??????? ([email protected])
lOMoARcPSD|51489847
Application
opliation
Aplicalton
http://sensor10.example.com/sensors/acc-X
http://sensor10.example.com/sensors/acc-y
(http:/ www.exatnple.com/soap.usdl)
application/
htp://sensor10.example.com/sensors/acc-z Soap + XML Text /XML Text /XML
http://sensorl0.example.com/config/sleeptime
Header
htp://sensor10.example.com/config/waketime
htp://sensor10.example.com/configlenabled Body
http://sensor10.example.com/config/samplerate
UR1 +method (GET)
4.4.COMMON PROTOcoLS
HTTP
potential for use
4 The common protocols that are commonly used or have good
over 6LoWPAN. IP address TCP Port (80)
TCP
The common protocolsinclude:
1, Web service protocols
servicecontentoverHTTP/TCP
2. MQTT-S Fig. 4.5. Typicalstructure of web
servicesor
URLS availableon an HTTP servers with
3. Zigbee CAP * Web services are simply
4. Servicediscoverprotocols resourcesaccessiblebehind them. responsesthat
ofmethodswith corresponding
5. SNMP
4 This servicessupport any number
6. RTP/RTCP
are describedby a WSDL document. header and a body in whichthe body
7. SIP of a
4 SOAP is an XML format consisting
8. Industry specific protocols
Carries any numberof messages.
aplication
Mplication
4.18| Wireless Sensor Network Design
&The protocol was
4 Binary XML from the open geospatial consortium was designed to
compress websphere and desiM2Mgned by IBM and is used in
lotus 4.19
Fig. 4.6. The MQTT-S architectureused over Fig. 4.7. The MOTT-S messagestructure
6LoWPAN
structurewhich consist of alength field
*igure 4.7 shows the MOTT-S message
variablelengthmessage part.
a messagetype field and then a
Downloaded by ??????? ([email protected])
lOMoARcPSD|51489847
glieation
pgelicaion
Wireless Sensor Network Design Some
|4.22
4 application
4 The CAP protocolstack is shown in Figure 4.8. The functions of the ZAL and builtin discovery protocols such as zigbee CAP
features. and
4.23
ZCL are implementedby the CAP.
The data protocolcorespondsto the zigbee cluster library.
location protocol is used for MOTT-S have their OWn
4 The service
networks. SLP
needs in ordergeneral
* The management protocol corresponds to the zigbee device profile handling 6LoWPAN because
of theoptsize
i m i z at i o n to beservice discoveryover IP
of
binding and discover.
* The security protocol implementszigbee applicationsublayersecurity.
The SSLP typical
Supports most of the features message.
directoryagents. of
effectively used with
4 In CAP this is replaced by a CAP address record which contain a IPv4 address
kept as short as possible. scheme like SSLP should be
plus UDP port, IPv6 address plus UDP port. IIPNP is a protocol aimed at
&The CAP protocol is simply zigbee application layer APS frames places in and controllableas specifiedinmaking home devices automaticallyrecognizable
UPNPI.
UDP. & UPNP makes use of three
protocols.
4 The APSdelivery modes are mapped to P unicast and broadcastdelivery and 1) Simple service discovery protocol(SSDP)-
groupcast is reduced down to broadcast. 2) Generic event notificationarchitecturefor event
iscovering
devices
4 CAP supports secure transmission and the use of APS acknowledgements noification(GENA)’
Event notificationand SOAP for controllingdevices
which provide limited applicationprotocolreliability. UPNP is not diectly applicable to 6LoWPAN devices because of its
* The zigbee security and key managementfeatures are implementedby the CAP dependance on broadcast along with XML &HITP based descripions and
security protocol. protocols.
4 CAP is aconcept that would need standardizationto become widely used. The
upcoming zigbee/lP smart energy 2.0 profile will not be based on a CAP
* SSDP may be applicabledirectlyover 6LoWPAN.
approach. *The devices profile for webservice (DPWS) describes a basic set of
functionalityto enable embedded IP devices with web service based discovery
4.44. SERVICE DISCOVERY
device descriptionmessagingand events
on XMLHTTP/TCPit
4 Service discovery is an imporant issue in wireless embedded applications DPWSdescriptionsare XML and all messagingis based
where device are autonomic also requiring the auto configuration of binding along with simplification
Would require web service compressionand
applications.
In order to be used over 6Lo WPAN.
system
4 Typical protocolsused for service discoveryon embeddeddevices includedthe popularityfor use in enterpriseand industrial
*DPWS has been gainingin into back end systems
Service Location Protocol (SLP), Universal Plug NPlay (UPNP) and Device can be automaticallyintegrated
Profilefor Web Services (DPWS). nd devicesusing DPWS
based on web services.
gelication
6LoWPAN management.
+ The following optimizationfor SNMPv3 have been identifiedin these drafts. Fig. 4.9. The RTP base header
4 Currently SNMPv3 requires the handling of payload sizes upto 484 bytes, 4RTCP is used during an RTP session to provide
which creates too much overhead for managing large 6LoWPANS. feedback on the QoS of RTP
data delivery to identify the RTP source adjust the RTCP report intervals and
4 The SNMPy3 header is variable in size and need to be optimized for
carry session control information.
6LoWPAN. Only a minimal subset of functionalityshould be supportedand the
header size should be limited. 4 RTP uses the concept of profiles which define possible additional headers
The binary encoding rules of the payload use variable length fields for features and payload formats for aparticularclass of application.
6LoWPAN, fixed length fields or more compactencodingmay be necessary. * The RTP audio video profile specifies the profile for common audio and video
* Payload compressionand aggregationmay be needed for 6LoWPAN. applications.
& Toreduce memory requirementsthe maximum size of SNMP messages should * RTP makes use of UDP is IP version independent and has a fairly compact
be limited. header format, It is directly usable without modification.
data streams. It requires that
*KIP can be used to deliver and monitor real time
4.4.6. REAL TIME TRANPORT AND SESSIONS about and find each other.
ne sender and receiversomehow know
Ao The Real time Transport Protocol (RTP)is used for the end to end delivery of modifying and
was designed for establishing,
real time data. e Session initiation protocol
learing down multimediasession over lP.
Downloaded by ??????? ([email protected])
lOMoARcPSD|51489847
gliution
communication
|4.26
WirelessSensor Network Design 4
As
plaion
eation
DLMS
4.30
WirelessSensor Network Design 4
The
AssOciat62056
standards,IEC ion |DLMS]
is actively promotes the
431
Application
4.32 Wireless Sensor Nevork Design List out the layers of BACnet. 4.33
4. Name two commonly used web serviceprotocol. 1. Applicationlayer
1. MQTT-S 9 Network layer
2. ZigBee CAP 3. Data link
5. What is proxying? 4. Physicallayer
Some of the applicationprotocol in 6LoWPAN also include the possibilityfor 10. DefineSIP.
intermediate nodes to inspect cache or modify application protocols.This is
referred to as proxying. Session Initiation
Protocol(SP) is asignaling protocol. It is used to initiate
modify andterminatesession. It
6. What are the disadvantages of SNMP? lies on Applicationlayer.
1. The polling approach used by SNMP is the biggest drawback of the Listoutthe basicsetof
approach. 1.
paradigms.
End to End paradigm
2. It creates unnecessaryoverhead.
2. Streamingsession
7. DifferentiateRTP and RTCP. 3. Publish/Subscribe
RTP 4. Web service
RTCP
1. Used to carry media streams. Used to monitoringtransmission 12. List out thefour MQTT-Selement.
states and QoS.
1. MQTT brokers
2. Even port number Odd port number
2. MQTT-S gateways
3. Interoperability Performancecontrollingthrough 3. MQTT-S forwarders
feedback
4. Payload type, sequence 4. MQTT-S clients
Sender and receiver reports
number, time stamp 13. Zigbee uses horizontalor verticalapproach.Justif.
5. 32 bit identifieris used. ZAL and ZCL with
Textual information Zigbee makes use of a vertical profile approach over the
ZigBee Home automation
8. Mention the two modes of gateway profiles for different industry applications such as
approachfunction. profile or the ZigBee Smart Energy Profile.
1. Transparentnode - where a connectionto the broker is maintainedfor each
client or in. 14. Define methods.
typically designed with a
2. Aggregationnode - where the gateway aggregatesmessages from all clients services (SOAP) interface is
A service based web procedure calls (RPCS) called
into a single broker connection. URL that implements several remote
SIhgle
methods.