SlideShare a Scribd company logo
MODULE 5: MOBILITY AND
SETTINGS
CO4. Analysis and evaluate protocols
used in IOT.
CO5. Design and develop smart city in
IOT.
CONTENTS
• Introduction
• Localization
• Mobility management
• Localization and handover management
• Technology considerations
• Performance evaluation
• Simulation setup
• Performance results
• Identification of IOT (data formats. IPV6,
identifiers and locators, tag etc.)
INTRODUCTION
• The significance of location awareness and the
requirement for fast adaptation to frequent location
changes due to mobility are critical issues that need to
be addressed for the success of future ubiquitous and
mobile networks.
• Location information is important for enabling
location-based services (LBS) in commercial,
healthcare, public safety, and military domains.
• Location awareness can be utilized for improving or
enhancing network functionalities, such as mobility
management for quality of service provisioning.
INTRODUCTION
• Localization and mobility management are
two concepts that are tightly inter-connected.
• The need to determine the unknown location
of an entity stems from the mobility capability
of this entity.
• On the other hand, managing the issues raised
due to mobility can be alleviated by the
provision of location-related information.
INTRODUCTION
• While determining the location of objects in
outdoor environments has been extensively
studied and addressed with technologies such
as GPS (global positioning system).
• The localization problem for indoor radio
propagation environments is recognized to be
very challenging. This is mainly due to the
presence of severe multipath and shadow
fading
INTRODUCTION
• For mobility support over IP networks, mobile
IP (MIP) is the most well-known protocol
proposed by the Internet Engineering Task
Force (IETF).
• But, latency delays and losses in IP traffic due
to the time needed to perform the handover
process are its main limitations.
LOCALIZATION
• The localization problem is defined as the process of
determining the current position of a mobile node or
an object within a specific region, indoor or outdoor.
• The position can be expressed in several ways,
depending on the application requirements or the
positioning system specifications.
• For instance, absolute coordinates, relative or symbolic
locations are possible formats.
• Location information is important for enabling LBS in
commercial, healthcare, public safety and military
domains. Furthermore, location awareness can be
utilized for improving or enhancing network
functionalities, such as mobility management for
quality of service provisioning.
LOCALIZATION
• Localization using radio signals has attracted considerable attention
in the fields of telecommunications and navigation.
• The most well-known positioning system is the GPS, which is
satellite-based and is successful for tracking users in outdoor
environments.
• The inability of satellite signals to penetrate buildings can cause the
complete failure of GPS in indoor environments.
• For indoor location sensing, a number of wireless technologies have
been proposed, such as infrared, ultrasound , WiFi and ultra-wide
band.
• However, the indoor radio propagation channel is characterized as
site specific, exhibiting severe multipath effects and low probability
of line-of-sight signal propagation between the transmitter and
receiver, making accurate indoor positioning very challenging.
LOCALIZATION
• Localization techniques, in general, utilize
metrics of the received radio signals (RRS).
• The most traditional received signal metrics
are based on angle of arrival (AOA), time of
arrival (TOA), time difference of arrival (TDOA)
measurements or RSS measurements from
several reference points.
General framework of RRS-based
positioning
General framework of RRS-based
positioning
• The general framework of an RSS-based positioning system
is illustrated in Figure.
• Radio signals transmitted by the fixed reference points
(such as access points or base stations) and
sensed/measured by the RRS-sensing devices of the
receiver.
• They are converted into location-related signal metrics,
such as TOA, TDOA, AOA and RSS.
• The reported signal metrics are then processed by the
positioning algorithm for estimating the unknown location
of the receiver, which is finally utilized by the application.
• The accuracy of the signal metrics and the complexity of
the positioning algorithm define the accuracy of the
estimated location.
• Depending on how the signal metrics are
utilized by the positioning algorithm, we can
identify three major families of localization
techniques
– Triangulation
– Scene analysis
– Proximity
Triangulation
• Triangulation methods are based on the
geometric properties of a triangle to estimate
the receiver’s location.
• Depending on the type of radio signal
measurements, they can be further
subdivided into
– Multilateration method
– angulation method
Multilateration positioning technique
Multilateration positioning technique
• In multilateration techniques, TOA, TDOA or RSS
measurements from multiple reference points are
converted into distance estimations with the help of a radio
propagation model.
• Examples of such positioning systems include GPS , the
cricket location system , and the SpotON ad hoc location.
• Models for indoor localization applications must, however,
account for the effects of harsh indoor wireless channel
behavior on the characteristics of the metrics at the
receiving side.
• These characteristics affect indoor localization applications
in ways that are very different from how they affect indoor
telecommunication applications.
Angulation positioning technique
Angulation positioning technique
• In angulation techniques, AOA measurements
with the help of specific antenna designs or
hardware equipment are used for inferring the
receiver’s position.
• The Ubisense [UBI] is an example of an AOA
based location sensing system.
• The increased complexity and the hardware
requirement are the main hindrances of such
systems.
Scene analysis
• Scene analysis or fingerprinting methods require an
offline phase for learning the radio characteristics in a
specific area under study.
• This signal information is then stored in a database
called Radio Map.
• During the online localization phase, the receiver’s
unknown location is inferred based on the similarity
between the Radio Map entries and real-time signal
measurements.
• The similarity in signal space can be based either on
pattern-matching techniques (deterministic schemes)
or on probability distributions (probabilistic schemes).
Scene analysis positioning technique
Scene analysis positioning technique
• Figure depicts the general mechanism of scene
analysis
• localization.
• RADAR , HORUS , COMPASS and WIFE are
fingerprinting localization approaches.
• The main limitation and weakness of scene
analysis methods is due to the frequent
environmental changes that cause inconsistency
of signal behavior between the training phase
and time of the actual location determination
phase.
Proximity
• Proximity methods are based on the detection
of objects with a known location.
• This can be done with the aid of sensors, such
as Touch MOUSE or based on topology and
connectivity information, such as in the active
badge location system , or finally with the aid
of an automatic identification system, such as
the credit card point of cell terminals.
• Such techniques are simple but usually suffer
from limited accuracy.
Proximity positioning technique
Mobility management
• Over recent years, we have witnessed an
increasing demand for wireless access to Internet
applications.
• This is due the remarkable success of wireless
networking, mobile computing and the growing
popularity of the Internet.
• Mobility is a requirement not appropriately
addressed by the Internet Protocol (IP), however,
which was originally designed for static, wired
networks.
Mobility management
• According to the IP, an IP address has two major
functionalities:
– To uniquely identify a particular terminal in the entire network
– For routing the traffic between two endpoints.
• The IP address is indicative of the IP sub network in which
the terminal resides.
• The problem arises when the terminal changes sub
networks due to the mobile node’s mobility.
• A mobile terminal needs to have a stable IP address in
order to be stably identifiable to other network nodes.
• It also needs a temporary IP address for routing purposes.
Mobility management
• The MIP protocol extends IP by allowing a
mobile node to effectively utilize two IP
addresses, one for identification and the other
for routing.
• While the mobile node changes its access
point to the network, handover (or handoff)
management enables the network to maintain
a mobile node’s connection.
Mobility management
• The latency delay during handover causes
interruption of the IP traffic, which may be
prohibitive for real time applications.
• In the following, a more detailed description
of both MIP and handover process is provided.
MIP
• The standardized mobility support in IP networks is MIP, an
IETF communication protocol that is designed to let mobile
nodes move from one network to another while
maintaining a permanent IP address.
• This is done through the interaction of a home agent and a
foreign agent.
• A mobile node is identified by its home address, regardless
of its current point of attachment to the network.
• While situated away from its home, the data packets
flowing from a corresponding node are transparently
routed via the home agent to a care of address that
represents its current location.
• The main issue when transmitting real time traffic is non-
synchronization of the handover process at the link and
network layers.
Link-layer handover
• A Layer 2 (L2) handover occurs because the mobile
node must
• establish a physical connection to a new access point.
• This is because, due to mobility, the RSS from the
mobile node’s current access point may decrease,
causing degradation of their communication.
• Even though several protocols have been proposed for
different wireless access technologies, we focus on the
IEEE 802.11 standard for its popularity and the
availability of numerical results regarding its latency
analysis; it is also the vector of wireless Internet today.
Link-layer handover
• According to its specifications, the handover
process follows three phases;
– the handover initiation
– the handover decision
– The handover execution
• It includes three main steps: discovery,
authentication and association, as illustrated
in Figure
Link-layer handover
Link-layer handover
• During the discovery phase, the mobile node
searches for an access point with a stronger
RSS to associate with.
• This is accomplished through a medium access
control (MAC) layer function, called scan.
• There are two modes of scanning:
– active
– passive
Link-layer handover
• In the passive mode the mobile node listens
for beacon messages (sent periodically by the
access points), on assigned channels.
• In the active mode, the mobile node sends in
additional PROBE broadcast packets on each
channel and receives probe responses from
access points.
Link-layer handover
• After scanning all channels, the mobile node
selects a target access point and enters the
authentication step, which includes the
transmission of the mobile node’s identity to
the access point and the access point’s
AUTHENTICATION RESPONSE.
• The L2 handover terminates upon the
reception of an ASSOCIATION RESPONSE
message.
Link-layer handover
• After scanning all channels, the mobile node
selects a target access point and enters the
authentication step, which includes the
transmission of the mobile node’s identity to
the access point and the access point’s
AUTHENTICATION RESPONSE.
• The L2 handover terminates upon the
reception of an ASSOCIATION RESPONSE
message.
Link-layer handover
• The L2 handover latency is mainly due to the
time needed for the discovery phase, since the
mobile node has to wait for PROBE RESPONSE
messages even if no access points are
operating on specific channels.
• According to the results in [MIS 03] the L2
handover latency is between 58.74 ms and
396.76 ms
Network-layer handover
• If a mobile node roams between two access
points of the same subnetwork, no routing
issues occur and its session is not interrupted,
since the mobile node keeps the same IP
address and is already authenticated.
• However, if the access points belong to
different IP subnetworks, the routing
subnetwork prefix changes and thus the IP
(L3) handover follows the L2 handover.
Network-layer handover
Network-layer handover
• It includes three stages:
– movement detection
– address configuration
– Binding update.
• The movement detection stage starts after a mobile
node has attached itself to the new network at the
physical and link layer (L2 handover).
• In this stage a mobile node detects that it has moved to
a new network, based on messages broadcasted by the
access routers access routes (ARs) in either a passive or
active mode.
Network-layer handover
• In the passive case, the access routers ARs are regularly
sending broadcast ROUTER ADVERTISEMENT messages that
contain their identity and their IP addresses.
• In the ACTIVE mode, the mobile node is sending in addition
ROUTER SOLICITATION requests to the ARs regularly in
order to discover new point of attachment to the network.
• The mobile node receives relevant information from the
network that will allow it to configure its new temporary
address, the care of address and other network settings.
• Finally, it sends a BINDING UPDATE to the home agent (HA)
in order to register its care of address with its permanent
address.
Network-layer handover
• The L3 handover latency is mainly due to the
time needed for the movement detection
phase, which depends on the frequency of the
ROUTER ADVERTISEMENT or ROUTER
SOLICITATION messages.
• Statistically, the longer the time between two
consecutive messages, the longer it takes the
movement detection to be completed.
Movement Detection Process
• Movement detection mechanisms may be broadly divided into
– advertisement based
– hint based.
• The advertisement based method relies on the periodic
broadcasting of AR advertisements that include mobility-related
information.
• CARD (candidate access router discovery) is process where an AR
access router announces its capabilities in broadcast messages.
• In such schemes, there is an inherent trade-off between the
bandwidth wasted by advertisements and the movement detection
performance.
• The higher the rate that periodic advertisements are broadcasted;
the more bandwidth is wasted by these messages.
Movement Detection Process
• Hint-based mechanisms attempt to deal with this
bandwidth wastage by relaying on hints or
triggers from lower layers.
• In fast MIP, it is assumed that at the mobile
node's terminal link layer triggers are sent to the
network layer so that the delay between the L2
handover and L3 handover are better
synchronized.
• By minimizing the L3 movement detection delay,
the mobile node can proactively proceed with its
mobility registration at the network level.
Handover Management
• In Handoff management a mobile device
keeps its connection active when it moves
from one cell to another cell.
• Depending on the broad category, handoffs
may be of two types:
1. Horizontal Handoff (Intra-System Handoff)
2. Vertical Handoff (Inter-System Handoff)
Handover Management
• Horizontal handoff:
– Handoffs in homogeneous networks are referred to as
Horizontal Handoff.
– This type of handoff occurs when the signal strength of the
serving BS goes below a certain threshold value.
– The reason for such handoff could be poor signal strength,
local interference, load balancing.
• Vertical Handoff:
– Inter-System Handoff or vertical handoff between two BSs,
belong to two different systems.
– The reason for such handoff could be poor signal strength,
local interference.
Localization and handover
management relying on RFID
RFID-enabled Localization
• The low cost of passive tags, the non-line-of-site
requirement, the fast reading of multiple tags,
and the relatively reduced sensitivity to user
orientation motivated to explore the potential of
RFID in solving both problems of indoor
localization and mobility management
improvement.
• Positioning schemes relying on RFID can follow
two basic procedures, depending on the type of
the RFID component supported by the target’s
device, i.e. tag or reader.
RFID-enabled Localization
• IoT service, mobile devices might be:
– Tagged with an RFID tag (e.g. passive);
– Carry RFID reader as with the near-field
communication technology
• Mobile node carrying an RFID reader will be more
expensive than a tag.
• Depending on the IoT service scenario as being
either a massive deployment of RFID tags or RFID
readers surrounding the mobile device.
• Again, deploying RFID readers will be more
expensive than deploying RFID tags (passive).
RFID-enabled Localization
• If the mobile nodes device is equipped with a tag, a
number of reference readers are placed in the area, any of
the general positioning techniques, i.e. triangulation, scene
analysis or proximity can be employed to estimate the
location of the mobile node.
• Many positioning systems follows this approach.
• If the user’s terminal is equipped with an RFID reader,
passive tags with known coordinates are deployed in the
area as reference tags and their IDs are associated with
their location information.
• For estimating the mobile node’s location, a proximity
technique is followed based on the location information
corresponding to the reference tags detected by the reader
embedded in the mobile node’s device.
RFID-enabled Localization
• Second type of positioning schemes are easier to
implement, since low-cost passive tags can be
deployed in a large extent in most indoor
environments; such as a smart floor tagged with
RFIDs.
• Additionally, it is anticipated that future mobile
terminals will have a reader extension capability
for gaining access to a wide range of innovative
applications and services supported by RFID
systems.
• There are already cell phones on the market that
are RFID tag reader enabled.
RFID-enabled movement detection
• There will be a massive deployment of reference passive
tags for the purpose of movement detection of a mobile
node whose terminal is reader enabled.
• One possible way for accomplishing this is by associating
the reference tag IDs with network topology information.
• For instance, each tag ID can be matched to its best point of
access according to certain criteria.
• Then, during the mobile node’s mobility, such topology-
related information corresponding to the reference tags ID
retrieved by its reader, can be used for detecting its
movement faster.
• This is because the tags are informing the mobile node
about the access points covering the area, and thus the
mobile node can also anticipate the handover and at the
same time select its next best point of access.
Technology Consideration
• Multiple Tags-to-reader Collisions
• Multiple Readers-to-tag Collision
• Reader-to-reader Collision
Multiple Tags-to-reader Collisions
• A tag collision occurs when more than one tag
attempts to transmit its ID at the same time,
the reader will receive a mixture of the tags’
signals and cannot understand it.
• This type of collision is shown in Figure.
Multiple Tags-to-reader Collisions
• Simultaneous responses from numerous tags
prevent the reader from correctly translating
the signal, which decreases throughput.
• No tag is aware of the activity of any other
tag, and so they cannot prevent the
simultaneous transmission of tags.
• To solve this problem, anti-collision protocols
are very influential.
Multiple Tags-to-reader Collisions -
Multi-access methods
• Each anti-collision protocol uses certain multi-
access methods for identification in order to
physically separate the transmitters’ signals.
• Accordingly, they can be categorized into four
different types:
– Space Division Multiple Access (SDMA)
– Frequency Division Multiple Access (FDMA)
– Code Division Multiple Access (CDMA)
– Time Division Multiple Access (TDMA)
Multiple Tags-to-reader Collisions -
Multi-access methods
Multiple Tags-to-reader Collisions -
Multi-access methods
• SDMA—
– The term space division multiple access relates to dividing of the
channel capacity into separate areas.
– Protocols based on this method can point the beam at different
areas in order to identify tags.
– The channel is spatially separated using complex directional
antennas.
• FDMA—
– Tags transmitting in one of several different frequency channels
requiring a complex receiver at the reader.
– Consequently, different frequency ranges can be used for
communication from and to the tags: from the reader to the
tags, 135 kHz, and from the tags to the reader, in the 433–435
MHz range.
Multiple Tags-to-reader Collisions -
Multi-access methods
• CDMA—
– Requires tags to multiply their ID by a pseudo-random sequence
(PN) before transmission.
– CDMA is quite good in many ways, such as the security of the
communications between the RFID tags and the reader, and
multiple tag identification.
• TDMA—
– Given that it is less expensive, this is the most widely used
method.
– This method involves the largest group of anti-collision
algorithms.
– The transmission channel is divided between the participants
and ensures that the reader can identify a tag at different times
in order to avoid interfering with another one.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Aloha-based Protocols
– Aloha-based protocols use a random-access strategy
in order to successfully identify the number of tags in
an interrogation.
– They belong to the group of probabilistic protocols
because the tags transmit their own ID in randomly
selected slots in a frame in order to reduce the
possibility of a collision.
– However, there is no guarantee that all of the tags will
be identified in the interrogation process.
– These protocols suffer from the well-known tag
starvation problem.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• The main Aloha-based protocols can be
divided into four subgroups:
– Pure Aloha (PA)
– Slotted Aloha (SA)
– Frame Slotted Aloha (FSA)
– Dynamic Frame Slotted Aloha (DFSA) protocols.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Pure Aloha (PA)
– Pure Aloha (PA) is one of the simplest anti-collision
protocols. It is based on TDMA.
– Whenever tags enter the interrogation zone, they
randomly choose a frequency on which to transmit
their data.
– A collision will occur if several tags transmit data at
the same time, resulting in complete or incomplete
collisions.
– A complete collision occurs when the messages of two
– tags fully collide; an incomplete collision, however,
takes place when only part of the tag message collides
with another tag message.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Slotted Aloha (SA)
– To avoid incomplete collisions, Slotted Aloha (SA)
has been created.
– In SA, the time is divided into several slots and
each tag must randomly select a slot in which it
will transmit its data.
– The communication between the reader and the
tag is now synchronous.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Framed Slotted Aloha (FSA)
– In Framed Slotted Aloha (FSA), the time is divided
into a variable number of frames and each frame
consists of several slots.
– All tags need to transmit data into a fixed length
frame, but each tag must choose only one slot in a
frame to transmit data.
– This protocol significantly reduces the probability
of collision since tags can only respond once in a
frame.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Framed Slotted Aloha (FSA)
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Dynamic Frame Slotted Aloha (DFSA) protocol
– Dynamic Frame Slotted Aloha (DFSA) protocol is
capable of changing frame size according to an
estimate of the number of tags.
– At the beginning of each frame, the reader informs
the
– tags of the frame length.
– Every tag selects a random number [0,F−1], where F
denotes the frame size and all tags respond within the
number of slots.
– At the end of the frame, the reader estimates the
number of colliding tags, then adjusts F accordingly.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Dynamic Frame Slotted Aloha (DFSA)
protocol
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Tree based Protocols:
– The query tree protocol (QT) is one of the most
representative memory less protocols, in which
the reader must provide the tags with a query and
the matching tags must respond with their full ID.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Tree based Protocols:
– Tag response depends directly on the current query, ignoring the prior
communication history.
– QT tags involve only simple hardware requirements because they only
compare the reader query with their own ID and respond if it coincides.
– The identification process consists of more rounds in which the reader sends a
query, and tags whose ID prefix match the current query respond with their
whole ID binary value.
– In the case of a collision, the reader forms two new queries by appending q
with a binary 0 or 1.
– New queries will be placed in a Last Input First Output stack (LIFO).
– If there is no response to a query, the reader knows that there is no tag with
the required prefix, and the query is rejected.
– This kind of slot is called idle. If just one tag responds to the reader query, that
tag will be identified.
– By extending the query prefixes until only one tag’s ID matches, the algorithm
can identify the rest of the tags.
– The identification procedure is completed when the LIFO stack is empty.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Hybrid Protocols:
– Hybrid protocols combine the advantages of tree-based
and Aloha-based protocols to avoid their problems and
provide better features in tag identification.
– Most of them first implement a tree-based procedure and
tag estimation procedure in order to predict the number of
tags.
– Therefore, the combined Aloha-based and tree-based
protocol procedures are known for their high complexity
and hardware demands.
– This kind of protocol can significantly increase
performance as compared to the previous ones.
Multiple Readers-to-tag Collision
• Reader collision occurs when the reader
attempts to make communication with tags
that are in the coverage area of another
reader.
• This type of collision is shown in Figure.
• The transmissions of three tags, shown in
Figure, are not synchronized, but in many
cases, the reader is synchronized with at least
one tag in the interrogation zone.
Multiple Readers-to-tag Collision
Multiple Readers-to-tag Collision
• This collision causes two different problems:
1. Signal interference occurs when the fields of two
or more readers overlap and interfere.
• This problem can be solved by programming all readers
to read at fractionally different times.
2. Multiple reads of the same tag occur when the
same tag is read once by every overlapping
reader.
Multiple Readers-to-tag Collision
Multiple Readers-to-tag Collision
• A multiple readers-to-tag collision occurs
when a tag is located at the intersection of
two or more readers’ interrogation ranges and
the readers attempt to communicate with this
tag simultaneously.
• Let Ri and Rj denote the read ranges of readers
ri and rj with dij their distance.
• Apparently, if:
Ri+Rj > dij
Multiple Readers-to-tag Collision
• and ri and rj communicate at the same time,
they will collide and the tags in the common
area will not be detected.
• Figure depicts two readers, r1 and r2, which
simultaneously transmit query messages to a
tag t1 situated within their overlapping region.
• t1 might not be able to read the query
messages from r1 and r2 due to interference.
Reader-to-reader Collision
• Reader-to-reader interference is induced when a signal
from one reader reaches other readers.
• This can happen even if there is no intersection among
reader interrogation ranges but because a neighbor
reader’s strong signal interferes with the weak reflected
signal from a tag.
• Figure demonstrates an example of collision from reader r2
to reader r1 when the latter tries to retrieve data from tag
t1.
• Generally, the signal strength of a reader is superior to that
of a tag and therefore if the frequency channel occupied by
r2 is the same as that between t1 and r1, r1 is no longer
able to listen to t1’s response.
Reader-to-reader Collision
Reader-to-reader Collision
• Reader-to-reader interference affects the read
range parameter. However, when interfering
• readers exist, the actual interrogation range of
the desired reader decreases to a circular
region with radius R↓max↑I, which can be
represented by:
Reader-to-reader Collision
Why IPv6 suits IoT
• IPv6 is good for IoT and IoT is good for IPv6.
• There are several arguments and features that
demonstrate that IPv6 is actually a key communication
enabler for the future Internet of Things:
– Scalability:
• IPv6 offers a highly scalable address scheme.
• The present scheme of Internet Governance provides at most 2 x
1019 unique, globally routable, addresses.
• This is many orders of magnitude more than the 2 x 109 that is
possible with IPv4.
• It is quite sufficient to address the needs of any present and future
communicating device still allowing it to have many addresses.
Why IPv6 suits IoT
• Solving the NAT barrier:
– Due to the limits of the IPv4 address space, the current
Internet had to adopt a stopgap solution to face its
unplanned expansion: The Network Address
Translation(NAT).
– It enables several users and devices to share the same
public IP address. This solution is working but with two
main trades-off:
• The NAT users are borrowing and sharing IP addresses with others.
While this technique allows single stakeholders to mount large
applications, it becomes completely unmanageable if the same
end-points are to be used by many different stakeholders; this
would occur in an IoT deployment where the same sensors are to
be used by multiple, independent, stakeholders.
• Secondly the mechanism cannot be used to access specific end-
points from the Internet.
Why IPv6 suits IoT
• Multi-Stakeholder Support:
– IPv6 provides for end devices to have multiple addresses and an even
more distributed routing mechanism than the IPv4 Internet.
– This allows different stakeholders to assign IoT end-device addresses
that are consistent with their own application and network practices.
– Thus, multiple stakeholders can deploy their own applications, sharing
a common sensor/actuation infrastructure, without impacting the
technical operation or governance of the Internet.
– Many features have been built into the basic IPv6 specifications that
are very useful both for the operation and the deployment of IoT.
– These include multicast, anycast, mobility support, auto-configuration
and address scope.
– Over the last decade, many new higher-level protocols have been
developed that are both useful for IoT and are well-suited to devices
with constrained resources. Examples are 6LowPAN (wireless nets),
COAP (transport with web services) and DTLS (secured datagrams).
Why IPv6 suits IoT
• Tiny operating systems and network stacks:
– IPv6 application to the Internet of Things has been
researched for many years.
– The research community has developed several operating
systems like TinyOS and Contiki that are relatively small
and support the above protocol suites and environments.
– While the main IPv6 is very rich in possible features, these
reduced environments have often restricted carefully the
features available in order to meet IoT needs while
reducing the size of the underlying system and leaving
more space for applications.
– For example, a basic Contiki system takes less than
20KByte, and even one supporting a full IPv6 stack and the
other high-level protocols including DTLS can probably fit
into 70 Kbyte
Why IPv6 suits IoT
• Increased hardware support:
– The operating system and network stack (with
security) could be made much more compact by
providing more hardware support in the chipset
(or a co-processor).
– However, such initiatives would detract from the
efficient porting of the system to other chipsets. It
would be desirable to make such upgrades for
large deployments in commercial environments.
Why IPv6 suits IoT
• Mapping of physical systems onto IPv6 address and
Privacy extension:
– It is possible to map many features of the physical IoT
devices onto IPv6 addresses.
– This can ease large-scale deployments – though at the cost
of revealing to anyone interested architectural features of
the IoT devices because of the transparency of the Domain
Name Service entries.
– In contrast, IPv6 provides for privacy by automatically
randomizing the suffix of the IPv6 address to hide the MAC
address or any serial number used as identifier when
connecting to the Internet.
– This feature is made available on all operating systems
automatically.
Why IPv6 suits IoT
• Use of Identifiers and improved functionality:
– By the use of Identifiers in conjunction with IPv6, one
can take advantages of IPv6 features without their
drawbacks.
– For example, with systems like Handle the structure
can mirror the topology of a deployment, while the
security features of the identifier system preclude
unauthorized access to this information.
– At the same time IPv6 addresses can be attributes of
the Handle Identifiers, but use the privacy
enhancements at the same time.
Why IPv6 suits IoT
• Enabling the extension of the Internet to the web
of things:
– IPv6 enables the extension of the Internet to any
device and service.
– Experiments have demonstrated the successful use of
IPv6 addresses to large-scale deployments of sensors
in smart buildings, smart cities and even with cattle.
– Moreover, the CoAP protocol enables the constrained
devices to behave as web services easily accessible
and fully compliant with REST architecture.
Why IPv6 suits IoT
• Mobility:
– IPv6 provides strong features and solutions to
support mobility of end-nodes, as well as mobility
of the routing nodes of the network.
– The project has also achieved some interesting
results on including Mobile IP in the Contiki stack.
Why IPv6 suits IoT
• Address auto-configuration:
– IPv6 provides an address self-configuration
mechanism (Stateless mechanism).
– The nodes can define their addresses in very
autonomous manner.
– This enables drastic reduction of IoT configuration
effort and deployment cost.
– With an Identifier-based system like Handle, this
technique can be combined with automated
procedures to derive authentication tokens from the
device, and have access control features added.
Why IPv6 suits IoT
• Fully Internet compliant Gateways:
– IPv6 Gateways can be fully Internet compliant.
– In other words, it is possible to build a proprietary
network of smart things or to interconnect one’s
own smart things with the rest of the World via a
gateway that is fully compliant with IP
requirements towards the Internet.
Why IPv6 suits IoT
• Standardisation:
– Some of the IoT6 developments like GLowBALIP
and the Identifier system would benefit hugely if
their attributes were standardized in this context
much more rigidly for IoT.
– EC initiatives should support directly such
standardization – possibly in a Support Action.
Identifiers and Locators for IoT
• Things connected to the IoT need an address system
that can uniquely identify each one in the network;
therefore, devices are able to use internet protocol (IP)
addresses as their identifiers (IDs) and locators (LOCs)
to communicate with others and to bind a host and an
application in the network.
• This binding provides some advantages for a wired and
fixed network environment because the internet was
originally designed for a fixed environment.
• Although it is important to consider the mobility
function in today’s network environment, this binding
still has several drawbacks such as mobility, multi-
homing, and extensibility problems.
• The exponential increase of mobile devices
especially causes the difficulties of deployment
and addressing in networks.
• Additionally, it is hard to maintain the routing
table size of a default free zone (DFZ).
• Therefore, binding is not suitable for current
mobile-oriented network environments.
• To provide a mobility function with scalable
routing and addressing, the ID and LOC roles of IP
addresses need to be separated for the future
internet.
• Thus, ID–LOC separation protocols have been proposed. These
proposed protocols use two namespaces as ID and LOC, and they
are classified into two types:
– host-based protocols
– network-based protocols.
• Host-based protocols, such as host identity protocol (HIP) and
Shim6, require the modification of a protocol stack within the hosts
and a rendezvous server for maintaining ID and LOC mapping
information.
• Additionally, it has the problem of initial deployment in a network.
In contrast, network-based schemes do not modify hosts’ protocol
stack.
• The end nodes do not participate in any signaling procedure.
• The ID–LOC mapping is processed by other
network components such as routers, and they
forward packets using tunneling according to the
mapping information.
• The problems are bandwidth waste and
processing overhead on the network caused by
tunneling.
• Host-based and network-based protocols also
require a centralized ID–LOC mapping system
such as a rendezvous server and a map server.
• These problems cause the scalability problem.
Host-Based Identifier–Locator
Separation Schemes
• Host-based ID–LOC separation protocol (HIP),
introduced new namespaces for separating the ID
and LOC of a host.
• It suggests to add a host identity layer between
the IP layer and the transport layer.
• The host identity layer communicates with the
upper layer using a host ID as an identifier and a
lower layer using an IP address for the locator.
• This layer maintains the mapping information
between identifiers and locators.
Host-Based Identifier–Locator
Separation Schemes
• Shim6 protocol provides site multi homing by
Internet Protocol version 6 (IPv6) intermediation.
• It suggested a multi homing shim layer called
l3shim within the IP layer for the local agility with
failover capabilities.
• The basic concept of Shim6 is similar to HIP, but it
does not use a special namespace such as a host
ID and locator in HIP.
• A host of Shim6 allows for multiple IPv6 address
prefixes to continue existing communication.
Host-Based Identifier–Locator
Separation Schemes
• MOFI (Mobile Oriented Future Internet) also uses
a host ID (HID) for ID and an LOC for a locator.
• However, MOFI uses two kinds of LOCs as a
locally routable LOC that must only be locally
unique in an access network (A-LOC) and a LOC
that is used in the backbone network (B-LOC).
• Each access router (AR) within MOFI operates the
LOC translation between the ALOC and B-LOC.
• For the maintenance of HID–LOC mapping, the
AR includes a Local Mapping Controller (LMC)
with a hash table and HID–LOC register (HLR).
Host-Based Identifier–Locator
Separation Schemes
• The HID–LOC mapping information are
managed in ARs in a distributed manner.
• The weakness of host-based protocols is that
every host has to modify its protocol stack.
• It makes the deployment of hosts difficult in a
network.
• Additionally, they need a centralized mapping
server to the ID–LOC mapping, so it may cause
a single point of failure.
Network-Based Identifier–Locator
Separation Schemes
• Locator Identifier Separation Protocol (LISP) is a representative
network-based ID–LOC separation protocol.
• LISP enables the separation of IP addresses into two new
numbering spaces.
• One is the Endpoint Identifiers (EIDs) that are not globally routable,
and the other is Routing Locators (RLOCs) that are globally routable.
• Also, LISP defines an encapsulating mechanism for the LISP routers
to transmit packets using EIDs across a network infrastructure that
uses RLOCs.
• The routers are responsible to lookup the mapping between EIDs
and RLOCs. In LISP, packets to the destination through Ingress
Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs).
• ITRs and ETRs are used as tunnel start and end points.
Network-Based Identifier–Locator
Separation Schemes
• A DHT-based Identifier–Locator Mapping Scheme (DHT–MAP) was
proposed to resolve LOC for a flat ID.
• The authors used a DHT-based system, which is a modified version
of the Content Addressable Network (CAN) system.
• The CAN is a DHT-based network that uses to map “keys” onto
“values.”
• The network consists of a customer network for forwarding packets
and an overlay network using CAN for maintaining ID–LOC mapping.
• In this scheme, every Autonomous System (AS) maintains one or
more resolvers to store EID–LOC mapping.
• Network-based protocols, however, require the tunneling for
forwarding packets.
• Because the use of tunneling needs an encapsulation and a DE
capsulation mechanism for processing the packets, it consumes
more bandwidth and processing overhead.
Open Data Format (O-DF): Data
Format for IoT
• Standard Data formats required for:
– IoT data sources (devices, machines, server-based
systems, etc.) to be able to publish their available
data and provide access to it in an easy and secure
way
– Providing means to filter the available data
depending on identifier, context, etc. at the
receiver end or service side
Open Data Format (O-DF): Data
Format for IoT
• The O-DF can be used for publishing the
available data using ordinary URL (Uniform
Resource Locator) addresses.
• O-DF structures can also be used for
requesting and sending published data
between systems, notably when used
together with the Open Messaging Interface
(O-MI) standard.
Open Data Format (O-DF): Data
Format for IoT
• In the IoT, information about a product or a “Thing” is
often distributed over many different devices, systems,
and organizations.
• The O-DF is intended to represent information about
things in a standardized way that can be understood
and exchanged in a universal way by all information
systems that need to manage such IoT-related data.
• A data format structure typically does not contain
complete information about a particular thing.
• Information about the same thing may be contained in
several different data format structures.
Open Data Format (O-DF): Data
Format for IoT
• Object identifiers make it possible to link the data
about a single thing that may be located in different
information systems.
• An object identifier may be the only information that a
data format structure contains about a particular thing.
• The visibility and the access to data may depend on the
object identifier used, as well as on the identity of the
requesting party, as well as on the context of the
request.
• This is why the object identifier data structure is of
particular importance in any universal IoT standard.
Open Data Format (O-DF): Data
Format for IoT
• The O-DF is specified using XML Schema.
• It defines a simple and extensible ontology that
allows the creation of information structures that
are similar to those of objects and properties in
object-oriented programming.
• It is thereby generic enough for the
representation of any object and information that
is needed for information exchange in domains
such as the IoT, lifecycle information
management, etc.
Open Data Format (O-DF): Data
Format for IoT
• An O-DF structure is a hierarchy with an Objects element as
its top element, as shown in Illustration of O-DF Element
Hierarchy.
• The Objects element can contain any number of Object
sub-elements. Object elements are identified by at least
one id sub-element.
• An Object may also have an optional description sub-
element.
• Object elements usually have properties, which are sub-
elements called Info Item, as well as Object sub-elements.
• The resulting Object tree can contain any number of levels.
O-DF Objects provides detailed, normative descriptions of
these elements
Open Data Format (O-DF): Data
Format for IoT
Open Data Format (O-DF): Data
Format for IoT
• The O-DF is intended to be used for expressing information about
“any” identifiable object (products, services, humans, …).
• How the information is communicated is not a part of this standard.
• The communication media might be a file sent as an email
attachment, on a USB stick, or any other kind of media.
• O-DF content can also be sent using REST-based services, SOAP,
Java Message Service (JMS), the O-MI, and other kinds of
messaging protocols.
• The O-DF can be used as a query and response format in such
messaging; for instance, the O-MI specifies that a “read” request
with an O-DF structure should be responded to with the next level
in the hierarchy shown in the figure above.
• As an example, a request with only an “Objects” element should
return an O-DF response with the list of Object elements available,
including at least the compulsory attributes and sub-elements
(notably at least one id element).
SMART Tags in IoT (Examples)
• Staff Tracking
• Retail Industry
• Healthcare

More Related Content

PPTX
IOE MODULE 6.pptx
PPTX
Ioe module 2
PPTX
Ioe module 3
PPTX
Ioe module 4
PPTX
Ioe module 1
PPT
802 15-4 tutorial
PPT
RFID (Radio Frequency Identification)
PPTX
IoT implementation and Challenges
IOE MODULE 6.pptx
Ioe module 2
Ioe module 3
Ioe module 4
Ioe module 1
802 15-4 tutorial
RFID (Radio Frequency Identification)
IoT implementation and Challenges

What's hot (20)

PPTX
Webnesday - Introduction to LoRaWAN
PPTX
RFID
PPTX
Internet of things (IoT)
PPTX
NFC near feald communication
PPTX
Mobility Management
PPTX
RFID with INTERNET OF THINGS
PPT
RFID Basics
PPTX
Internet of things
PPTX
Radio frequency identification
PPT
IoT (Internet of Things)
PPTX
1. Introduction to IoT
PPTX
Mobile ipv6
KEY
NFC & RFID on Android
PPTX
Indoor localization using wifi fingerprinting
PPTX
Location Based services
PPTX
Rfid radio frequency identification
PPTX
Enhancing indoor localization using IoT techniques
PPTX
Near field communication ppt
PDF
DASH7 Alliance Protocol Technical Presentation
PPTX
Spatial Databases
Webnesday - Introduction to LoRaWAN
RFID
Internet of things (IoT)
NFC near feald communication
Mobility Management
RFID with INTERNET OF THINGS
RFID Basics
Internet of things
Radio frequency identification
IoT (Internet of Things)
1. Introduction to IoT
Mobile ipv6
NFC & RFID on Android
Indoor localization using wifi fingerprinting
Location Based services
Rfid radio frequency identification
Enhancing indoor localization using IoT techniques
Near field communication ppt
DASH7 Alliance Protocol Technical Presentation
Spatial Databases
Ad

Similar to IOE MODULE 5.pptx (20)

PDF
Indoor Positioning Systems
PDF
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
PDF
5G Vs Wi-Fi Indoor Positioning: A Comparative Study
PPTX
A Survey on Localization of Wireless Sensors
PDF
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
PPT
Indoor geolocation
PPT
ummarizes the development of a real-time monitoring system for weather and ai...
PPTX
Internet of Things (IoT): Micro-location and Smart Buildings
PDF
Hybridised_Positioning_Algorithms_in_Location_Based_Services
PDF
Positioning seminar 2012
PPTX
Indoor navigation system
PPT
User mobility and location management
PDF
PDF
Intelligent location tracking scheme for handling user’s mobility
PPT
UNIT 2 mobility management system for wireless system
PDF
IRJET- Personal Assistant for Visually Impaired People in Malls
PDF
Tracking Technology
PDF
Wba2 Project Description En Tech
PPTX
Positioning in Location Based Services
PDF
Wifi vs Bluetooth vs UWB
Indoor Positioning Systems
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
5G Vs Wi-Fi Indoor Positioning: A Comparative Study
A Survey on Localization of Wireless Sensors
PLNOG15: Find the location of your superhero with 802.11 - Sebastian Pasternacki
Indoor geolocation
ummarizes the development of a real-time monitoring system for weather and ai...
Internet of Things (IoT): Micro-location and Smart Buildings
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Positioning seminar 2012
Indoor navigation system
User mobility and location management
Intelligent location tracking scheme for handling user’s mobility
UNIT 2 mobility management system for wireless system
IRJET- Personal Assistant for Visually Impaired People in Malls
Tracking Technology
Wba2 Project Description En Tech
Positioning in Location Based Services
Wifi vs Bluetooth vs UWB
Ad

More from nikshaikh786 (20)

PPTX
Module 2_ Divide and Conquer Approach.pptx
PPTX
Module 1_ Introduction.pptx
PPTX
Module 1_ Introduction to Mobile Computing.pptx
PPTX
Module 2_ GSM Mobile services.pptx
PPTX
MODULE 4_ CLUSTERING.pptx
PPTX
MODULE 5 _ Mining frequent patterns and associations.pptx
PDF
DWM-MODULE 6.pdf
PDF
TCS MODULE 6.pdf
PPTX
Module 3_ Classification.pptx
PPTX
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
PPTX
Module 1_Data Warehousing Fundamentals.pptx
PPTX
Module 2_ Cyber offenses & Cybercrime.pptx
PPTX
Module 1- Introduction to Cybercrime.pptx
PPTX
MODULE 5- EDA.pptx
PPTX
MODULE 4-Text Analytics.pptx
PPTX
Module 3 - Time Series.pptx
PPTX
Module 2_ Regression Models..pptx
PPTX
MODULE 1_Introduction to Data analytics and life cycle..pptx
PDF
MAD&PWA VIVA QUESTIONS.pdf
PDF
VIVA QUESTIONS FOR DEVOPS.pdf
Module 2_ Divide and Conquer Approach.pptx
Module 1_ Introduction.pptx
Module 1_ Introduction to Mobile Computing.pptx
Module 2_ GSM Mobile services.pptx
MODULE 4_ CLUSTERING.pptx
MODULE 5 _ Mining frequent patterns and associations.pptx
DWM-MODULE 6.pdf
TCS MODULE 6.pdf
Module 3_ Classification.pptx
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 1_Data Warehousing Fundamentals.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
MODULE 5- EDA.pptx
MODULE 4-Text Analytics.pptx
Module 3 - Time Series.pptx
Module 2_ Regression Models..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
MAD&PWA VIVA QUESTIONS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf

Recently uploaded (20)

PPTX
Onica Farming 24rsclub profitable farm business
PDF
LDMMIA Reiki Yoga S2 L3 Vod Sample Preview
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
PDF
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
PDF
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
PPTX
Introduction and Scope of Bichemistry.pptx
PDF
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
PPTX
How to Manage Loyalty Points in Odoo 18 Sales
PDF
High Ground Student Revision Booklet Preview
PDF
Sunset Boulevard Student Revision Booklet
PPTX
vedic maths in python:unleasing ancient wisdom with modern code
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PPTX
How to Manage Bill Control Policy in Odoo 18
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
PPTX
ACUTE NASOPHARYNGITIS. pptx
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
Onica Farming 24rsclub profitable farm business
LDMMIA Reiki Yoga S2 L3 Vod Sample Preview
Open Quiz Monsoon Mind Game Final Set.pptx
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
What Is Coercive Control? Understanding and Recognizing Hidden Abuse
Introduction and Scope of Bichemistry.pptx
Electrolyte Disturbances and Fluid Management A clinical and physiological ap...
How to Manage Loyalty Points in Odoo 18 Sales
High Ground Student Revision Booklet Preview
Sunset Boulevard Student Revision Booklet
vedic maths in python:unleasing ancient wisdom with modern code
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
How to Manage Bill Control Policy in Odoo 18
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
ACUTE NASOPHARYNGITIS. pptx
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
Renaissance Architecture: A Journey from Faith to Humanism

IOE MODULE 5.pptx

  • 1. MODULE 5: MOBILITY AND SETTINGS CO4. Analysis and evaluate protocols used in IOT. CO5. Design and develop smart city in IOT.
  • 2. CONTENTS • Introduction • Localization • Mobility management • Localization and handover management • Technology considerations • Performance evaluation • Simulation setup • Performance results • Identification of IOT (data formats. IPV6, identifiers and locators, tag etc.)
  • 3. INTRODUCTION • The significance of location awareness and the requirement for fast adaptation to frequent location changes due to mobility are critical issues that need to be addressed for the success of future ubiquitous and mobile networks. • Location information is important for enabling location-based services (LBS) in commercial, healthcare, public safety, and military domains. • Location awareness can be utilized for improving or enhancing network functionalities, such as mobility management for quality of service provisioning.
  • 4. INTRODUCTION • Localization and mobility management are two concepts that are tightly inter-connected. • The need to determine the unknown location of an entity stems from the mobility capability of this entity. • On the other hand, managing the issues raised due to mobility can be alleviated by the provision of location-related information.
  • 5. INTRODUCTION • While determining the location of objects in outdoor environments has been extensively studied and addressed with technologies such as GPS (global positioning system). • The localization problem for indoor radio propagation environments is recognized to be very challenging. This is mainly due to the presence of severe multipath and shadow fading
  • 6. INTRODUCTION • For mobility support over IP networks, mobile IP (MIP) is the most well-known protocol proposed by the Internet Engineering Task Force (IETF). • But, latency delays and losses in IP traffic due to the time needed to perform the handover process are its main limitations.
  • 7. LOCALIZATION • The localization problem is defined as the process of determining the current position of a mobile node or an object within a specific region, indoor or outdoor. • The position can be expressed in several ways, depending on the application requirements or the positioning system specifications. • For instance, absolute coordinates, relative or symbolic locations are possible formats. • Location information is important for enabling LBS in commercial, healthcare, public safety and military domains. Furthermore, location awareness can be utilized for improving or enhancing network functionalities, such as mobility management for quality of service provisioning.
  • 8. LOCALIZATION • Localization using radio signals has attracted considerable attention in the fields of telecommunications and navigation. • The most well-known positioning system is the GPS, which is satellite-based and is successful for tracking users in outdoor environments. • The inability of satellite signals to penetrate buildings can cause the complete failure of GPS in indoor environments. • For indoor location sensing, a number of wireless technologies have been proposed, such as infrared, ultrasound , WiFi and ultra-wide band. • However, the indoor radio propagation channel is characterized as site specific, exhibiting severe multipath effects and low probability of line-of-sight signal propagation between the transmitter and receiver, making accurate indoor positioning very challenging.
  • 9. LOCALIZATION • Localization techniques, in general, utilize metrics of the received radio signals (RRS). • The most traditional received signal metrics are based on angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA) measurements or RSS measurements from several reference points.
  • 10. General framework of RRS-based positioning
  • 11. General framework of RRS-based positioning • The general framework of an RSS-based positioning system is illustrated in Figure. • Radio signals transmitted by the fixed reference points (such as access points or base stations) and sensed/measured by the RRS-sensing devices of the receiver. • They are converted into location-related signal metrics, such as TOA, TDOA, AOA and RSS. • The reported signal metrics are then processed by the positioning algorithm for estimating the unknown location of the receiver, which is finally utilized by the application. • The accuracy of the signal metrics and the complexity of the positioning algorithm define the accuracy of the estimated location.
  • 12. • Depending on how the signal metrics are utilized by the positioning algorithm, we can identify three major families of localization techniques – Triangulation – Scene analysis – Proximity
  • 13. Triangulation • Triangulation methods are based on the geometric properties of a triangle to estimate the receiver’s location. • Depending on the type of radio signal measurements, they can be further subdivided into – Multilateration method – angulation method
  • 15. Multilateration positioning technique • In multilateration techniques, TOA, TDOA or RSS measurements from multiple reference points are converted into distance estimations with the help of a radio propagation model. • Examples of such positioning systems include GPS , the cricket location system , and the SpotON ad hoc location. • Models for indoor localization applications must, however, account for the effects of harsh indoor wireless channel behavior on the characteristics of the metrics at the receiving side. • These characteristics affect indoor localization applications in ways that are very different from how they affect indoor telecommunication applications.
  • 17. Angulation positioning technique • In angulation techniques, AOA measurements with the help of specific antenna designs or hardware equipment are used for inferring the receiver’s position. • The Ubisense [UBI] is an example of an AOA based location sensing system. • The increased complexity and the hardware requirement are the main hindrances of such systems.
  • 18. Scene analysis • Scene analysis or fingerprinting methods require an offline phase for learning the radio characteristics in a specific area under study. • This signal information is then stored in a database called Radio Map. • During the online localization phase, the receiver’s unknown location is inferred based on the similarity between the Radio Map entries and real-time signal measurements. • The similarity in signal space can be based either on pattern-matching techniques (deterministic schemes) or on probability distributions (probabilistic schemes).
  • 20. Scene analysis positioning technique • Figure depicts the general mechanism of scene analysis • localization. • RADAR , HORUS , COMPASS and WIFE are fingerprinting localization approaches. • The main limitation and weakness of scene analysis methods is due to the frequent environmental changes that cause inconsistency of signal behavior between the training phase and time of the actual location determination phase.
  • 21. Proximity • Proximity methods are based on the detection of objects with a known location. • This can be done with the aid of sensors, such as Touch MOUSE or based on topology and connectivity information, such as in the active badge location system , or finally with the aid of an automatic identification system, such as the credit card point of cell terminals. • Such techniques are simple but usually suffer from limited accuracy.
  • 23. Mobility management • Over recent years, we have witnessed an increasing demand for wireless access to Internet applications. • This is due the remarkable success of wireless networking, mobile computing and the growing popularity of the Internet. • Mobility is a requirement not appropriately addressed by the Internet Protocol (IP), however, which was originally designed for static, wired networks.
  • 24. Mobility management • According to the IP, an IP address has two major functionalities: – To uniquely identify a particular terminal in the entire network – For routing the traffic between two endpoints. • The IP address is indicative of the IP sub network in which the terminal resides. • The problem arises when the terminal changes sub networks due to the mobile node’s mobility. • A mobile terminal needs to have a stable IP address in order to be stably identifiable to other network nodes. • It also needs a temporary IP address for routing purposes.
  • 25. Mobility management • The MIP protocol extends IP by allowing a mobile node to effectively utilize two IP addresses, one for identification and the other for routing. • While the mobile node changes its access point to the network, handover (or handoff) management enables the network to maintain a mobile node’s connection.
  • 26. Mobility management • The latency delay during handover causes interruption of the IP traffic, which may be prohibitive for real time applications. • In the following, a more detailed description of both MIP and handover process is provided.
  • 27. MIP • The standardized mobility support in IP networks is MIP, an IETF communication protocol that is designed to let mobile nodes move from one network to another while maintaining a permanent IP address. • This is done through the interaction of a home agent and a foreign agent. • A mobile node is identified by its home address, regardless of its current point of attachment to the network. • While situated away from its home, the data packets flowing from a corresponding node are transparently routed via the home agent to a care of address that represents its current location. • The main issue when transmitting real time traffic is non- synchronization of the handover process at the link and network layers.
  • 28. Link-layer handover • A Layer 2 (L2) handover occurs because the mobile node must • establish a physical connection to a new access point. • This is because, due to mobility, the RSS from the mobile node’s current access point may decrease, causing degradation of their communication. • Even though several protocols have been proposed for different wireless access technologies, we focus on the IEEE 802.11 standard for its popularity and the availability of numerical results regarding its latency analysis; it is also the vector of wireless Internet today.
  • 29. Link-layer handover • According to its specifications, the handover process follows three phases; – the handover initiation – the handover decision – The handover execution • It includes three main steps: discovery, authentication and association, as illustrated in Figure
  • 31. Link-layer handover • During the discovery phase, the mobile node searches for an access point with a stronger RSS to associate with. • This is accomplished through a medium access control (MAC) layer function, called scan. • There are two modes of scanning: – active – passive
  • 32. Link-layer handover • In the passive mode the mobile node listens for beacon messages (sent periodically by the access points), on assigned channels. • In the active mode, the mobile node sends in additional PROBE broadcast packets on each channel and receives probe responses from access points.
  • 33. Link-layer handover • After scanning all channels, the mobile node selects a target access point and enters the authentication step, which includes the transmission of the mobile node’s identity to the access point and the access point’s AUTHENTICATION RESPONSE. • The L2 handover terminates upon the reception of an ASSOCIATION RESPONSE message.
  • 34. Link-layer handover • After scanning all channels, the mobile node selects a target access point and enters the authentication step, which includes the transmission of the mobile node’s identity to the access point and the access point’s AUTHENTICATION RESPONSE. • The L2 handover terminates upon the reception of an ASSOCIATION RESPONSE message.
  • 35. Link-layer handover • The L2 handover latency is mainly due to the time needed for the discovery phase, since the mobile node has to wait for PROBE RESPONSE messages even if no access points are operating on specific channels. • According to the results in [MIS 03] the L2 handover latency is between 58.74 ms and 396.76 ms
  • 36. Network-layer handover • If a mobile node roams between two access points of the same subnetwork, no routing issues occur and its session is not interrupted, since the mobile node keeps the same IP address and is already authenticated. • However, if the access points belong to different IP subnetworks, the routing subnetwork prefix changes and thus the IP (L3) handover follows the L2 handover.
  • 38. Network-layer handover • It includes three stages: – movement detection – address configuration – Binding update. • The movement detection stage starts after a mobile node has attached itself to the new network at the physical and link layer (L2 handover). • In this stage a mobile node detects that it has moved to a new network, based on messages broadcasted by the access routers access routes (ARs) in either a passive or active mode.
  • 39. Network-layer handover • In the passive case, the access routers ARs are regularly sending broadcast ROUTER ADVERTISEMENT messages that contain their identity and their IP addresses. • In the ACTIVE mode, the mobile node is sending in addition ROUTER SOLICITATION requests to the ARs regularly in order to discover new point of attachment to the network. • The mobile node receives relevant information from the network that will allow it to configure its new temporary address, the care of address and other network settings. • Finally, it sends a BINDING UPDATE to the home agent (HA) in order to register its care of address with its permanent address.
  • 40. Network-layer handover • The L3 handover latency is mainly due to the time needed for the movement detection phase, which depends on the frequency of the ROUTER ADVERTISEMENT or ROUTER SOLICITATION messages. • Statistically, the longer the time between two consecutive messages, the longer it takes the movement detection to be completed.
  • 41. Movement Detection Process • Movement detection mechanisms may be broadly divided into – advertisement based – hint based. • The advertisement based method relies on the periodic broadcasting of AR advertisements that include mobility-related information. • CARD (candidate access router discovery) is process where an AR access router announces its capabilities in broadcast messages. • In such schemes, there is an inherent trade-off between the bandwidth wasted by advertisements and the movement detection performance. • The higher the rate that periodic advertisements are broadcasted; the more bandwidth is wasted by these messages.
  • 42. Movement Detection Process • Hint-based mechanisms attempt to deal with this bandwidth wastage by relaying on hints or triggers from lower layers. • In fast MIP, it is assumed that at the mobile node's terminal link layer triggers are sent to the network layer so that the delay between the L2 handover and L3 handover are better synchronized. • By minimizing the L3 movement detection delay, the mobile node can proactively proceed with its mobility registration at the network level.
  • 43. Handover Management • In Handoff management a mobile device keeps its connection active when it moves from one cell to another cell. • Depending on the broad category, handoffs may be of two types: 1. Horizontal Handoff (Intra-System Handoff) 2. Vertical Handoff (Inter-System Handoff)
  • 44. Handover Management • Horizontal handoff: – Handoffs in homogeneous networks are referred to as Horizontal Handoff. – This type of handoff occurs when the signal strength of the serving BS goes below a certain threshold value. – The reason for such handoff could be poor signal strength, local interference, load balancing. • Vertical Handoff: – Inter-System Handoff or vertical handoff between two BSs, belong to two different systems. – The reason for such handoff could be poor signal strength, local interference.
  • 46. RFID-enabled Localization • The low cost of passive tags, the non-line-of-site requirement, the fast reading of multiple tags, and the relatively reduced sensitivity to user orientation motivated to explore the potential of RFID in solving both problems of indoor localization and mobility management improvement. • Positioning schemes relying on RFID can follow two basic procedures, depending on the type of the RFID component supported by the target’s device, i.e. tag or reader.
  • 47. RFID-enabled Localization • IoT service, mobile devices might be: – Tagged with an RFID tag (e.g. passive); – Carry RFID reader as with the near-field communication technology • Mobile node carrying an RFID reader will be more expensive than a tag. • Depending on the IoT service scenario as being either a massive deployment of RFID tags or RFID readers surrounding the mobile device. • Again, deploying RFID readers will be more expensive than deploying RFID tags (passive).
  • 48. RFID-enabled Localization • If the mobile nodes device is equipped with a tag, a number of reference readers are placed in the area, any of the general positioning techniques, i.e. triangulation, scene analysis or proximity can be employed to estimate the location of the mobile node. • Many positioning systems follows this approach. • If the user’s terminal is equipped with an RFID reader, passive tags with known coordinates are deployed in the area as reference tags and their IDs are associated with their location information. • For estimating the mobile node’s location, a proximity technique is followed based on the location information corresponding to the reference tags detected by the reader embedded in the mobile node’s device.
  • 49. RFID-enabled Localization • Second type of positioning schemes are easier to implement, since low-cost passive tags can be deployed in a large extent in most indoor environments; such as a smart floor tagged with RFIDs. • Additionally, it is anticipated that future mobile terminals will have a reader extension capability for gaining access to a wide range of innovative applications and services supported by RFID systems. • There are already cell phones on the market that are RFID tag reader enabled.
  • 50. RFID-enabled movement detection • There will be a massive deployment of reference passive tags for the purpose of movement detection of a mobile node whose terminal is reader enabled. • One possible way for accomplishing this is by associating the reference tag IDs with network topology information. • For instance, each tag ID can be matched to its best point of access according to certain criteria. • Then, during the mobile node’s mobility, such topology- related information corresponding to the reference tags ID retrieved by its reader, can be used for detecting its movement faster. • This is because the tags are informing the mobile node about the access points covering the area, and thus the mobile node can also anticipate the handover and at the same time select its next best point of access.
  • 51. Technology Consideration • Multiple Tags-to-reader Collisions • Multiple Readers-to-tag Collision • Reader-to-reader Collision
  • 52. Multiple Tags-to-reader Collisions • A tag collision occurs when more than one tag attempts to transmit its ID at the same time, the reader will receive a mixture of the tags’ signals and cannot understand it. • This type of collision is shown in Figure.
  • 53. Multiple Tags-to-reader Collisions • Simultaneous responses from numerous tags prevent the reader from correctly translating the signal, which decreases throughput. • No tag is aware of the activity of any other tag, and so they cannot prevent the simultaneous transmission of tags. • To solve this problem, anti-collision protocols are very influential.
  • 54. Multiple Tags-to-reader Collisions - Multi-access methods • Each anti-collision protocol uses certain multi- access methods for identification in order to physically separate the transmitters’ signals. • Accordingly, they can be categorized into four different types: – Space Division Multiple Access (SDMA) – Frequency Division Multiple Access (FDMA) – Code Division Multiple Access (CDMA) – Time Division Multiple Access (TDMA)
  • 55. Multiple Tags-to-reader Collisions - Multi-access methods
  • 56. Multiple Tags-to-reader Collisions - Multi-access methods • SDMA— – The term space division multiple access relates to dividing of the channel capacity into separate areas. – Protocols based on this method can point the beam at different areas in order to identify tags. – The channel is spatially separated using complex directional antennas. • FDMA— – Tags transmitting in one of several different frequency channels requiring a complex receiver at the reader. – Consequently, different frequency ranges can be used for communication from and to the tags: from the reader to the tags, 135 kHz, and from the tags to the reader, in the 433–435 MHz range.
  • 57. Multiple Tags-to-reader Collisions - Multi-access methods • CDMA— – Requires tags to multiply their ID by a pseudo-random sequence (PN) before transmission. – CDMA is quite good in many ways, such as the security of the communications between the RFID tags and the reader, and multiple tag identification. • TDMA— – Given that it is less expensive, this is the most widely used method. – This method involves the largest group of anti-collision algorithms. – The transmission channel is divided between the participants and ensures that the reader can identify a tag at different times in order to avoid interfering with another one.
  • 58. Multiple Tags-to-reader Collisions - Anti-collision protocols • Aloha-based Protocols – Aloha-based protocols use a random-access strategy in order to successfully identify the number of tags in an interrogation. – They belong to the group of probabilistic protocols because the tags transmit their own ID in randomly selected slots in a frame in order to reduce the possibility of a collision. – However, there is no guarantee that all of the tags will be identified in the interrogation process. – These protocols suffer from the well-known tag starvation problem.
  • 59. Multiple Tags-to-reader Collisions - Anti-collision protocols • The main Aloha-based protocols can be divided into four subgroups: – Pure Aloha (PA) – Slotted Aloha (SA) – Frame Slotted Aloha (FSA) – Dynamic Frame Slotted Aloha (DFSA) protocols.
  • 60. Multiple Tags-to-reader Collisions - Anti-collision protocols • Pure Aloha (PA) – Pure Aloha (PA) is one of the simplest anti-collision protocols. It is based on TDMA. – Whenever tags enter the interrogation zone, they randomly choose a frequency on which to transmit their data. – A collision will occur if several tags transmit data at the same time, resulting in complete or incomplete collisions. – A complete collision occurs when the messages of two – tags fully collide; an incomplete collision, however, takes place when only part of the tag message collides with another tag message.
  • 61. Multiple Tags-to-reader Collisions - Anti-collision protocols • Slotted Aloha (SA) – To avoid incomplete collisions, Slotted Aloha (SA) has been created. – In SA, the time is divided into several slots and each tag must randomly select a slot in which it will transmit its data. – The communication between the reader and the tag is now synchronous.
  • 62. Multiple Tags-to-reader Collisions - Anti-collision protocols • Framed Slotted Aloha (FSA) – In Framed Slotted Aloha (FSA), the time is divided into a variable number of frames and each frame consists of several slots. – All tags need to transmit data into a fixed length frame, but each tag must choose only one slot in a frame to transmit data. – This protocol significantly reduces the probability of collision since tags can only respond once in a frame.
  • 63. Multiple Tags-to-reader Collisions - Anti-collision protocols • Framed Slotted Aloha (FSA)
  • 64. Multiple Tags-to-reader Collisions - Anti-collision protocols • Dynamic Frame Slotted Aloha (DFSA) protocol – Dynamic Frame Slotted Aloha (DFSA) protocol is capable of changing frame size according to an estimate of the number of tags. – At the beginning of each frame, the reader informs the – tags of the frame length. – Every tag selects a random number [0,F−1], where F denotes the frame size and all tags respond within the number of slots. – At the end of the frame, the reader estimates the number of colliding tags, then adjusts F accordingly.
  • 65. Multiple Tags-to-reader Collisions - Anti-collision protocols • Dynamic Frame Slotted Aloha (DFSA) protocol
  • 66. Multiple Tags-to-reader Collisions - Anti-collision protocols • Tree based Protocols: – The query tree protocol (QT) is one of the most representative memory less protocols, in which the reader must provide the tags with a query and the matching tags must respond with their full ID.
  • 67. Multiple Tags-to-reader Collisions - Anti-collision protocols • Tree based Protocols: – Tag response depends directly on the current query, ignoring the prior communication history. – QT tags involve only simple hardware requirements because they only compare the reader query with their own ID and respond if it coincides. – The identification process consists of more rounds in which the reader sends a query, and tags whose ID prefix match the current query respond with their whole ID binary value. – In the case of a collision, the reader forms two new queries by appending q with a binary 0 or 1. – New queries will be placed in a Last Input First Output stack (LIFO). – If there is no response to a query, the reader knows that there is no tag with the required prefix, and the query is rejected. – This kind of slot is called idle. If just one tag responds to the reader query, that tag will be identified. – By extending the query prefixes until only one tag’s ID matches, the algorithm can identify the rest of the tags. – The identification procedure is completed when the LIFO stack is empty.
  • 68. Multiple Tags-to-reader Collisions - Anti-collision protocols • Hybrid Protocols: – Hybrid protocols combine the advantages of tree-based and Aloha-based protocols to avoid their problems and provide better features in tag identification. – Most of them first implement a tree-based procedure and tag estimation procedure in order to predict the number of tags. – Therefore, the combined Aloha-based and tree-based protocol procedures are known for their high complexity and hardware demands. – This kind of protocol can significantly increase performance as compared to the previous ones.
  • 69. Multiple Readers-to-tag Collision • Reader collision occurs when the reader attempts to make communication with tags that are in the coverage area of another reader. • This type of collision is shown in Figure. • The transmissions of three tags, shown in Figure, are not synchronized, but in many cases, the reader is synchronized with at least one tag in the interrogation zone.
  • 71. Multiple Readers-to-tag Collision • This collision causes two different problems: 1. Signal interference occurs when the fields of two or more readers overlap and interfere. • This problem can be solved by programming all readers to read at fractionally different times. 2. Multiple reads of the same tag occur when the same tag is read once by every overlapping reader.
  • 73. Multiple Readers-to-tag Collision • A multiple readers-to-tag collision occurs when a tag is located at the intersection of two or more readers’ interrogation ranges and the readers attempt to communicate with this tag simultaneously. • Let Ri and Rj denote the read ranges of readers ri and rj with dij their distance. • Apparently, if: Ri+Rj > dij
  • 74. Multiple Readers-to-tag Collision • and ri and rj communicate at the same time, they will collide and the tags in the common area will not be detected. • Figure depicts two readers, r1 and r2, which simultaneously transmit query messages to a tag t1 situated within their overlapping region. • t1 might not be able to read the query messages from r1 and r2 due to interference.
  • 75. Reader-to-reader Collision • Reader-to-reader interference is induced when a signal from one reader reaches other readers. • This can happen even if there is no intersection among reader interrogation ranges but because a neighbor reader’s strong signal interferes with the weak reflected signal from a tag. • Figure demonstrates an example of collision from reader r2 to reader r1 when the latter tries to retrieve data from tag t1. • Generally, the signal strength of a reader is superior to that of a tag and therefore if the frequency channel occupied by r2 is the same as that between t1 and r1, r1 is no longer able to listen to t1’s response.
  • 77. Reader-to-reader Collision • Reader-to-reader interference affects the read range parameter. However, when interfering • readers exist, the actual interrogation range of the desired reader decreases to a circular region with radius R↓max↑I, which can be represented by:
  • 79. Why IPv6 suits IoT • IPv6 is good for IoT and IoT is good for IPv6. • There are several arguments and features that demonstrate that IPv6 is actually a key communication enabler for the future Internet of Things: – Scalability: • IPv6 offers a highly scalable address scheme. • The present scheme of Internet Governance provides at most 2 x 1019 unique, globally routable, addresses. • This is many orders of magnitude more than the 2 x 109 that is possible with IPv4. • It is quite sufficient to address the needs of any present and future communicating device still allowing it to have many addresses.
  • 80. Why IPv6 suits IoT • Solving the NAT barrier: – Due to the limits of the IPv4 address space, the current Internet had to adopt a stopgap solution to face its unplanned expansion: The Network Address Translation(NAT). – It enables several users and devices to share the same public IP address. This solution is working but with two main trades-off: • The NAT users are borrowing and sharing IP addresses with others. While this technique allows single stakeholders to mount large applications, it becomes completely unmanageable if the same end-points are to be used by many different stakeholders; this would occur in an IoT deployment where the same sensors are to be used by multiple, independent, stakeholders. • Secondly the mechanism cannot be used to access specific end- points from the Internet.
  • 81. Why IPv6 suits IoT • Multi-Stakeholder Support: – IPv6 provides for end devices to have multiple addresses and an even more distributed routing mechanism than the IPv4 Internet. – This allows different stakeholders to assign IoT end-device addresses that are consistent with their own application and network practices. – Thus, multiple stakeholders can deploy their own applications, sharing a common sensor/actuation infrastructure, without impacting the technical operation or governance of the Internet. – Many features have been built into the basic IPv6 specifications that are very useful both for the operation and the deployment of IoT. – These include multicast, anycast, mobility support, auto-configuration and address scope. – Over the last decade, many new higher-level protocols have been developed that are both useful for IoT and are well-suited to devices with constrained resources. Examples are 6LowPAN (wireless nets), COAP (transport with web services) and DTLS (secured datagrams).
  • 82. Why IPv6 suits IoT • Tiny operating systems and network stacks: – IPv6 application to the Internet of Things has been researched for many years. – The research community has developed several operating systems like TinyOS and Contiki that are relatively small and support the above protocol suites and environments. – While the main IPv6 is very rich in possible features, these reduced environments have often restricted carefully the features available in order to meet IoT needs while reducing the size of the underlying system and leaving more space for applications. – For example, a basic Contiki system takes less than 20KByte, and even one supporting a full IPv6 stack and the other high-level protocols including DTLS can probably fit into 70 Kbyte
  • 83. Why IPv6 suits IoT • Increased hardware support: – The operating system and network stack (with security) could be made much more compact by providing more hardware support in the chipset (or a co-processor). – However, such initiatives would detract from the efficient porting of the system to other chipsets. It would be desirable to make such upgrades for large deployments in commercial environments.
  • 84. Why IPv6 suits IoT • Mapping of physical systems onto IPv6 address and Privacy extension: – It is possible to map many features of the physical IoT devices onto IPv6 addresses. – This can ease large-scale deployments – though at the cost of revealing to anyone interested architectural features of the IoT devices because of the transparency of the Domain Name Service entries. – In contrast, IPv6 provides for privacy by automatically randomizing the suffix of the IPv6 address to hide the MAC address or any serial number used as identifier when connecting to the Internet. – This feature is made available on all operating systems automatically.
  • 85. Why IPv6 suits IoT • Use of Identifiers and improved functionality: – By the use of Identifiers in conjunction with IPv6, one can take advantages of IPv6 features without their drawbacks. – For example, with systems like Handle the structure can mirror the topology of a deployment, while the security features of the identifier system preclude unauthorized access to this information. – At the same time IPv6 addresses can be attributes of the Handle Identifiers, but use the privacy enhancements at the same time.
  • 86. Why IPv6 suits IoT • Enabling the extension of the Internet to the web of things: – IPv6 enables the extension of the Internet to any device and service. – Experiments have demonstrated the successful use of IPv6 addresses to large-scale deployments of sensors in smart buildings, smart cities and even with cattle. – Moreover, the CoAP protocol enables the constrained devices to behave as web services easily accessible and fully compliant with REST architecture.
  • 87. Why IPv6 suits IoT • Mobility: – IPv6 provides strong features and solutions to support mobility of end-nodes, as well as mobility of the routing nodes of the network. – The project has also achieved some interesting results on including Mobile IP in the Contiki stack.
  • 88. Why IPv6 suits IoT • Address auto-configuration: – IPv6 provides an address self-configuration mechanism (Stateless mechanism). – The nodes can define their addresses in very autonomous manner. – This enables drastic reduction of IoT configuration effort and deployment cost. – With an Identifier-based system like Handle, this technique can be combined with automated procedures to derive authentication tokens from the device, and have access control features added.
  • 89. Why IPv6 suits IoT • Fully Internet compliant Gateways: – IPv6 Gateways can be fully Internet compliant. – In other words, it is possible to build a proprietary network of smart things or to interconnect one’s own smart things with the rest of the World via a gateway that is fully compliant with IP requirements towards the Internet.
  • 90. Why IPv6 suits IoT • Standardisation: – Some of the IoT6 developments like GLowBALIP and the Identifier system would benefit hugely if their attributes were standardized in this context much more rigidly for IoT. – EC initiatives should support directly such standardization – possibly in a Support Action.
  • 91. Identifiers and Locators for IoT • Things connected to the IoT need an address system that can uniquely identify each one in the network; therefore, devices are able to use internet protocol (IP) addresses as their identifiers (IDs) and locators (LOCs) to communicate with others and to bind a host and an application in the network. • This binding provides some advantages for a wired and fixed network environment because the internet was originally designed for a fixed environment. • Although it is important to consider the mobility function in today’s network environment, this binding still has several drawbacks such as mobility, multi- homing, and extensibility problems.
  • 92. • The exponential increase of mobile devices especially causes the difficulties of deployment and addressing in networks. • Additionally, it is hard to maintain the routing table size of a default free zone (DFZ). • Therefore, binding is not suitable for current mobile-oriented network environments. • To provide a mobility function with scalable routing and addressing, the ID and LOC roles of IP addresses need to be separated for the future internet.
  • 93. • Thus, ID–LOC separation protocols have been proposed. These proposed protocols use two namespaces as ID and LOC, and they are classified into two types: – host-based protocols – network-based protocols. • Host-based protocols, such as host identity protocol (HIP) and Shim6, require the modification of a protocol stack within the hosts and a rendezvous server for maintaining ID and LOC mapping information. • Additionally, it has the problem of initial deployment in a network. In contrast, network-based schemes do not modify hosts’ protocol stack. • The end nodes do not participate in any signaling procedure.
  • 94. • The ID–LOC mapping is processed by other network components such as routers, and they forward packets using tunneling according to the mapping information. • The problems are bandwidth waste and processing overhead on the network caused by tunneling. • Host-based and network-based protocols also require a centralized ID–LOC mapping system such as a rendezvous server and a map server. • These problems cause the scalability problem.
  • 95. Host-Based Identifier–Locator Separation Schemes • Host-based ID–LOC separation protocol (HIP), introduced new namespaces for separating the ID and LOC of a host. • It suggests to add a host identity layer between the IP layer and the transport layer. • The host identity layer communicates with the upper layer using a host ID as an identifier and a lower layer using an IP address for the locator. • This layer maintains the mapping information between identifiers and locators.
  • 96. Host-Based Identifier–Locator Separation Schemes • Shim6 protocol provides site multi homing by Internet Protocol version 6 (IPv6) intermediation. • It suggested a multi homing shim layer called l3shim within the IP layer for the local agility with failover capabilities. • The basic concept of Shim6 is similar to HIP, but it does not use a special namespace such as a host ID and locator in HIP. • A host of Shim6 allows for multiple IPv6 address prefixes to continue existing communication.
  • 97. Host-Based Identifier–Locator Separation Schemes • MOFI (Mobile Oriented Future Internet) also uses a host ID (HID) for ID and an LOC for a locator. • However, MOFI uses two kinds of LOCs as a locally routable LOC that must only be locally unique in an access network (A-LOC) and a LOC that is used in the backbone network (B-LOC). • Each access router (AR) within MOFI operates the LOC translation between the ALOC and B-LOC. • For the maintenance of HID–LOC mapping, the AR includes a Local Mapping Controller (LMC) with a hash table and HID–LOC register (HLR).
  • 98. Host-Based Identifier–Locator Separation Schemes • The HID–LOC mapping information are managed in ARs in a distributed manner. • The weakness of host-based protocols is that every host has to modify its protocol stack. • It makes the deployment of hosts difficult in a network. • Additionally, they need a centralized mapping server to the ID–LOC mapping, so it may cause a single point of failure.
  • 99. Network-Based Identifier–Locator Separation Schemes • Locator Identifier Separation Protocol (LISP) is a representative network-based ID–LOC separation protocol. • LISP enables the separation of IP addresses into two new numbering spaces. • One is the Endpoint Identifiers (EIDs) that are not globally routable, and the other is Routing Locators (RLOCs) that are globally routable. • Also, LISP defines an encapsulating mechanism for the LISP routers to transmit packets using EIDs across a network infrastructure that uses RLOCs. • The routers are responsible to lookup the mapping between EIDs and RLOCs. In LISP, packets to the destination through Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs). • ITRs and ETRs are used as tunnel start and end points.
  • 100. Network-Based Identifier–Locator Separation Schemes • A DHT-based Identifier–Locator Mapping Scheme (DHT–MAP) was proposed to resolve LOC for a flat ID. • The authors used a DHT-based system, which is a modified version of the Content Addressable Network (CAN) system. • The CAN is a DHT-based network that uses to map “keys” onto “values.” • The network consists of a customer network for forwarding packets and an overlay network using CAN for maintaining ID–LOC mapping. • In this scheme, every Autonomous System (AS) maintains one or more resolvers to store EID–LOC mapping. • Network-based protocols, however, require the tunneling for forwarding packets. • Because the use of tunneling needs an encapsulation and a DE capsulation mechanism for processing the packets, it consumes more bandwidth and processing overhead.
  • 101. Open Data Format (O-DF): Data Format for IoT • Standard Data formats required for: – IoT data sources (devices, machines, server-based systems, etc.) to be able to publish their available data and provide access to it in an easy and secure way – Providing means to filter the available data depending on identifier, context, etc. at the receiver end or service side
  • 102. Open Data Format (O-DF): Data Format for IoT • The O-DF can be used for publishing the available data using ordinary URL (Uniform Resource Locator) addresses. • O-DF structures can also be used for requesting and sending published data between systems, notably when used together with the Open Messaging Interface (O-MI) standard.
  • 103. Open Data Format (O-DF): Data Format for IoT • In the IoT, information about a product or a “Thing” is often distributed over many different devices, systems, and organizations. • The O-DF is intended to represent information about things in a standardized way that can be understood and exchanged in a universal way by all information systems that need to manage such IoT-related data. • A data format structure typically does not contain complete information about a particular thing. • Information about the same thing may be contained in several different data format structures.
  • 104. Open Data Format (O-DF): Data Format for IoT • Object identifiers make it possible to link the data about a single thing that may be located in different information systems. • An object identifier may be the only information that a data format structure contains about a particular thing. • The visibility and the access to data may depend on the object identifier used, as well as on the identity of the requesting party, as well as on the context of the request. • This is why the object identifier data structure is of particular importance in any universal IoT standard.
  • 105. Open Data Format (O-DF): Data Format for IoT • The O-DF is specified using XML Schema. • It defines a simple and extensible ontology that allows the creation of information structures that are similar to those of objects and properties in object-oriented programming. • It is thereby generic enough for the representation of any object and information that is needed for information exchange in domains such as the IoT, lifecycle information management, etc.
  • 106. Open Data Format (O-DF): Data Format for IoT • An O-DF structure is a hierarchy with an Objects element as its top element, as shown in Illustration of O-DF Element Hierarchy. • The Objects element can contain any number of Object sub-elements. Object elements are identified by at least one id sub-element. • An Object may also have an optional description sub- element. • Object elements usually have properties, which are sub- elements called Info Item, as well as Object sub-elements. • The resulting Object tree can contain any number of levels. O-DF Objects provides detailed, normative descriptions of these elements
  • 107. Open Data Format (O-DF): Data Format for IoT
  • 108. Open Data Format (O-DF): Data Format for IoT • The O-DF is intended to be used for expressing information about “any” identifiable object (products, services, humans, …). • How the information is communicated is not a part of this standard. • The communication media might be a file sent as an email attachment, on a USB stick, or any other kind of media. • O-DF content can also be sent using REST-based services, SOAP, Java Message Service (JMS), the O-MI, and other kinds of messaging protocols. • The O-DF can be used as a query and response format in such messaging; for instance, the O-MI specifies that a “read” request with an O-DF structure should be responded to with the next level in the hierarchy shown in the figure above. • As an example, a request with only an “Objects” element should return an O-DF response with the list of Object elements available, including at least the compulsory attributes and sub-elements (notably at least one id element).
  • 109. SMART Tags in IoT (Examples) • Staff Tracking • Retail Industry • Healthcare