0% found this document useful (0 votes)
17 views

Iiot Notes

The document discusses various topics related to wireless sensor networks and Internet of Things over multiple weeks. It covers concepts like 6LoWPAN, RPL, MQTT, CoAP, sensor types, HART protocol, mobile WSNs, challenges in IoT and human-centric sensing, and interfacing sensors with Arduino.

Uploaded by

wagoyey799
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Iiot Notes

The document discusses various topics related to wireless sensor networks and Internet of Things over multiple weeks. It covers concepts like 6LoWPAN, RPL, MQTT, CoAP, sensor types, HART protocol, mobile WSNs, challenges in IoT and human-centric sensing, and interfacing sensors with Arduino.

Uploaded by

wagoyey799
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Week 1

● The gateways assigned with prefixes are immune to changes of network prefixes.
● The address of the nodes within the gateways remain unchanged as the
gateways provide them with locally unique address
● tunneling, where the nodes communicate to a remote anchor point instead of channeling
their packets through router
● Multi-homing => A node/network connected to multiple networks for improved reliability.
● proxy based approach is used to manage multiple IP addresses and map them to link
local addresses
● The IPv4 emphasizes more on reliable transmission and IPv6 it mainly focuses
on the addressing part of the source and destination.
● Sensor = > A device which detects or measures a physical property and records,
indicates, or otherwise responds to it.The more is the resolution of a sensor, the more
accurate is its
precision.
● Transducers convert energy of one kind into another.
● Actuators which can be used to switch voltages or currents
● Analogous sensor produce continuous signal and digital sensor produce discrete signal.
● Scalar Sensors produce output signal or voltage which is generally
proportional to the magnitude of the quantity being measured.
● Vector Sensors produce output signal or voltage which is generally
proportional to the magnitude, direction, as well as the orientation
of the quantity being measured.
● An actuator is a component of a machine or system that
moves or controls the mechanism or the system.
Actuator types = > Hydraulic,Pneumatic,Electrical,Thermal/ Magnetic,Mechanical

Week 2
Addressing in 6LoWPAN
● 64 bit addresser-> globally unique and 16 bit addresser-> Pan specific.
● Routing protocol use = > LOADng and RPL
● LOADng = Generation of Route Requests (RREQs) and Route Replies (RREPs) and
If a route is detected to be broken, a Route Error (RERR) message is
Returned to the originator.Uses AODV.
● Optimized flooding is supported, reducing the overhead incurred by RREQ generation
and flooding.
RPL Routing
● Distance Vector IPv6 routing protocol for lossy and low power
Networks. Proactive: Maintaining routing topology. And Reactive: Resolving routing
inconsistencies.
RFID(“radio‐frequency identification”)
● Derived from Automatic Identification and Data Capture (AIDC) technology.
● AIDC performs object identification, object data collection and mapping of the collected
data to computer systems with little or no human intervention.
● Connectivity (6LowPAN, RPL)
● Identification (EPC, uCode, IPv6, URIs)
● Communication / Transport (WiFi, Bluetooth, LPWAN)
● Discovery (Physical Web, mDNS, DNS‐SD)
● Data Protocols (MQTT, CoAP, AMQP, Websocket, Node)
● Device Management (TR‐069, OMA‐DM)
● Semantic (JSON‐LD, Web Thing Model)
● Multi‐layer Frameworks (Alljoyn, IoTivity, Weave, Homekit)

MQTT(Message Queue Telemetry Transport.)


● It is a publish‐subscribe‐based lightweight messaging protocol for use in conjunction
with TCP/IP protocols and A message broker controls the publish‐subscribe messaging
pattern. A topic to which a client is subscribed is updated in the form of messages and
distributed by the message broker.
● provide connectivity (mostly embedded) between applications and middle‐wares on one
side and networks and communications on the other side.
● Components in MQTT
Publishers = > lightweight Sensor
Suscribers = > Application interested in sensoring data.
Brokers = > Connect Suscribers and Publishers. Classify sensor data to topic.
● MQTT method = > subscribe,unsubscribe, Connect , disConnect, Publish
● The protocol uses a publish/subscribe architecture (HTTP uses a request/response
paradigm).Publish/subscribe is event‐driven and enables messages to be pushed to
clients.
● The topic is the routing information for the broker.

SMQTT(Secure MQTT)
● uses encryption based on lightweight attribute based encryption.
● the algorithm consists of four main stages: setup, encryption, publish and decryption.
CoAP(Constrained Application Protocol)
● Web transfer protocol for use with constrained nodes and networks.
● Machine to Machine (M2M) applications such as smart energy and building automation.
● Request‐Response model between end‐points.
● CoAP is designed to enable low‐power sensors and build over UDP.
● It has four messaging modes: Confirmable, Non-Confirmable,Piggyback,Separate
● Piggback for direct communication and separate => server response from separate msg.

XMPP(Extensible Messaging and Presence Protocol)


● It is an open standard protocol and uses uses a client‐server architecture.
● Real‐time exchange of structured data.
● Core Xmpp technology = > Core ,Jingle ,Multi-user Chat ,PubSub ,BOSH

AMQP(Advanced Message Queuing Protocol)


● Open standard for passing business messages between applications or organization.


● Components - Exchange->Part of Broker. Receives message and routes them to queue
Queue ->separate queue for separate business and consumer receive msg from queue.
Binding -> Rules for distributing message.
● AMQP Exchanges => Direct, Fan‐out, Topic, Header

IEEE 802.15.4
● Uses direct sequence spread spectrum (DSSS) modulation.
Zigbee
● types=> Zigbee router and Zigbee end device.

Week 3
HART( Highway Adress Remote Transducer)
● HART standard was developed for networked smart field devices. It consist of
physical,data link,Network,Transport,Application. It is of two types wired and unwired
and wired hart lack network layer.
● Hart Physical Layer => It operates only in the 2.4 GHz ISM band.
● HART Data Link Layer=>Collision free and deterministic communication
achieved by means of super‐frames and TDMA.Super‐frames consist of
grouped 10ms wide timeslots.This layer incorporates channel hopping and
channel blacklisting to increase reliability and security.
=> Channel blacklisting identifies channels consistently affected by
interference and removes them from use.
● HART Network & Transport Layers=> handle various types of traffic, routing,
session creation, and security.WirelessHART relies on Mesh networking for its
communication.Network layer (HART)=Network + Transport+ Session layers
● HART Application Layer => communication between gateways and devices via
command and respond msg.Responsible for extracting commands from
msg,executing and generating response.

● WirelessHART=> allow collision - free and on time delivery.Represent true mesh


network and all device are backwards compatible.It handle code-based network
security and prevent unauthorized nodes from joining the network
● NFC (Near field communication,)=> It is of two types active and passive device.NFC's
data‐transmission frequency is 13.56MHz.Communication range is less than
20cms.Modes of operation=>Peer to Peer,Read and write and Card emulation.
● Bluetooth => based on Ad‐hoc technology and Ad-hoc Piconets.
Modes = > Active,Sniff,Hold,Park
Z-wave
● It uses rf for signaling and control.
● Zwave utilizes GFSK modulation and Manchester channel encoding.
Week 4

WMSNs consist of less number of CS nodes and large number of SS nodes.


Tic-tac-toe-arch: A self-organizing virtual architecture for underwater sensor networks.
WSN Coverage have two mode static and mobile

COVERAGE
Two types of reporting
event driven => e.g. forest fire monitoring
on demand => e.g. inventory control system
The coverage algorithm
Distributed: Nodes compute their position by communicating with their neighbors only.
Centralized: Data collected at central point and global map computed.
Localized: Localized algorithms are a special type of distributed algorithms where only

Mobile Wireless Sensor Networks(MWSN)


MWSN is Mobile Ad hoc Network (MANET) .
Components => Mobile Sensor Nodes, Mobile Sink,Data Mules
Challenges in human centric sensing:
Energy of devices
Participant selection
Privacy of users
M2M Node Types =>
Low-end Sensor Nodes => Generally used for environment monitoring applications.Basic
functionalities such as, data aggregation, auto configuration, and power saving.
Mid-end Sensor Nodes => Typical application includes home networks, SCM, asset
management, and industrial automation.Additional functionalities such as localization, Quality of
Service (QoS) support, TCP/IP support, power control or traffic control, and intelligence.
High-end Sensor Nodes => Generally applied to ITS and military or bio/medical
applications.
Week 5
Current Challenges in IoT=> Large Scale of Co-Operation,Global Heterogeneity,Unknown IoT
Device Configuration,Semantic Conflicts:
Different Types of Interoperability?=> user and device Interoperability
User Interoperability
The following problems need to be solved
Device identification and categorization for discovery
Syntactic interoperability for device interaction
Semantic interoperability for device interaction

Sketch(A program return in arduino) Structure


A sketch can be divided into two parts:
Setup ()
Loop()
The function setup() is the point where
the code starts, just like the main()
function in C and C++
I/O Variables, pin modes are initialized in
the Setup() function
Loop() function, as the name suggests,
iterates the specified task in the program

Sensor Interface with Arduino

Digital Humidity and Temperature


Sensor (DHT)
PIN 1, 2, 3, 4 (from left to right)
PIN 1- 3.3V-5V Power supply
PIN 2- Data
PIN 3- Null
PIN 4- Ground

Some other functions available with the Servo


library:
Knob()
Sweep()
write()
writeMicroseconds()
read()
attached()
detach()

Week 7

Adafruit provides a library to work with the DHT22 sensor.


grid(): Enable or disable axis grids in the plot.
ion(): turns on the interactive mode.
subplot(): Adds subplot in a figure
Basic Concepts of SDN
Separate control logic from hardware switches
SDN challenges = > Rule Placement and Controller Placement

Components/Attributes of SDN

Hardware switches
Controller
Applications
Flow-Rules
Application programming interfaces (APIs)
Fast processing is done using TCAM at the switches.

Hard timeout
-All rules are deleted from the switch at hard timeout.
-This can used to reset the switch
Soft timeout
-If NO flow is received associated with a rule for a particular time, the rule is deleted.
-This is used to empty the rule-space by deleting an unused rule.
APIs in SDN

Southbound API
Used to communicate between control layer and infrastructure layer.
OpenFlow protocol is used.
Northbound API
Used to communicate between control layer and application layer.
Standard APIs are used.
East-Westbound APIs
Used to communicate among multiple controllers in the control layer.

Control Mechanisms

Distributed
The control decisions can be taken in a distributed manner
Ex: each subnetwork is controlled by different controller
Centralized
The control decisions are taken in a centralized manner.
Ex: A network is controlled by a single controller.
SDN is not overflow
OpenFlow Switch Software

Indigo: Open source, it runs on Mac OS X.


LINC: Open source, it runs on Linux, Solaris, Windows, MacOS, and FreeBSD.
Pantou: Turns a commercial wireless router/access point to an OpenFlow enabled switch.
OpenFlow runs on OpenWRT.
Of13softswitch: User-space software switch based on Ericsson TrafficLab 1.1 softswitch.
Open vSwitch: Open Source, it is the MOST popular one present today.

Mininet
Used to create a virtual network with OpenFlow-enabled switches
Based on Python language
Supports remote and local controller.

Wireless Sensor Network I

Challenges
Real-time programming of sensor nodes
Vendor-specific architecture
Resource constrained – heavy computation cannot be performed
Limited memory – cannot insert too many control programs
Week 8
Rule placement at access device
Approaches

ODIN=>An agent is placed at access points to communicate with controller .Odin master–
placed with the physical devices. Odin agent - placed with controller.
Ubi-Flow
Mobi-Flow

Data Center Networking

Mice-Flow – Wildcard rules can be placed to deal with mice-


flows
Elephant Flow – Exact match rules are useful

Infrastructure Security has 3 components


Network level security
Host level security => Host security at PaaS and SaaS Level:
Hide the host operating system from end-users
Security responsibilities are transferred to Cloud service
providers
Host security at IaaS Level:
Primary objective is to secure the allocated hosts
Example of threats: Blue Pill attack on hypervisor

Application level security => Both CSP and the customer are responsible for security at
application level

Access control layers in cloud include:


Cloud access
Server access
Service access
Database access (direct and queries via web services)
VM access
Access to objects within a VM

Trust: Independent expectancy between two entities for any


specific context at a given time
Reputation: Belief of an entity’s standing by the community

Cloud Simulators

Different Cloud Simulators are:


CloudSim
CloudAnalyst
GreenCloud
iCanCloud
GroudSim
DCSim
Study about them from ppt pg- 108

Week 9
Horizon Components
Keystone
Identity service
Provides authentication and authorization
Horizon
Dashboard
GUI of the software
Provides overview of the other components
Nova
Compute service
Where you launce your instances

Glance
Image service
Discovering, registering, retrieving the VM
Snapshot
Swift
Object storage
Helps in storing data safely, cheaply and efficiently
Neutron
Provides networking service
Enables the other services to communicate with each other
Make your own network

Cinder
Block storage
Virtualizes the management of block service
Heat
Orchestration
Ceilometer
Billing
What service you are using
How long are you using

Transmit the sensed data (through wireless communication) to a centralized unit, commonly
known sink node.

Actors in Sensor-cloud

● End ‐users
Enjoy Se‐aaS through applications as per the requirements.
Unknown about what and which physical sensor is/are allocated to serve the
application

● Sensor‐owner
Plays a role from business perspective.
They purchase physical sensor devices, deployed over different geographical
locations, and lend these devices to the sensor‐cloud

● Sensor

‐Cloud Service Provider (SCSP)


A business actor.
SCSP charges price from the end‐users as per their usage of Se‐aaS.

Management Issues in Sensor-Cloud

● Optimal Composition of virtual sensor nodes


● Data Caching
● Optimal Pricing
Fog Computing ISSUE
● Volume
● Latency
● Bandwidth

Challenges in fog computing


● Power consumption
● Fog use addition nodes
● Power consumption is higher than centralized cloud
● Data Security
● Data generating nodes are distributed
● Providing authentication and authorization system for the whole nodes is
● not an easy task

● Reliability
● Maintaining data integrity and availability for millions of nodes is difficult
● failure of a node cannot affect the network

Week 10

HAN Standards
● Universal Plug and Play (UPnP)
● Digital Living Network Alliance(DLNA) => Trade organization created by Sony, Intel, and
Microsoft.Connects cable-based networks with wireless networks for increased sharing
of media, control and access.
● Konnex (KNX): an open important standard for home and building networks.Utilizes the
full range of home communication infrastructure –Power lines, coaxial cables, twisted
pair, RF, etc.
● Local Operation Networks (LonWorks).Every device includes a Neuron Chip, a
transceiver and the application electronics.
● Zigbee consists of four layers – Physical,Medium Access Control, Network, and
Application. ZigBee Alliance is composed of Mitsubishi, Honeywell, Invensys, Motorola
and Philips
● X-10 enables remote control of compliant transmitters and receivers over power lines
and electrical wirings present in the house. Adopted by GE and Philips.

You might also like