20EI602 - IIoT Unit 2
20EI602 - IIoT Unit 2
20EI602 - IIoT Unit 2
This document is confidential and intended solely for the educational purpose of
RMK Group of Educational Institutions. If you have received this document
through email in error, please notify the system manager. This document
contains proprietary information and is intended only to the respective group /
learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender
immediately by e-mail if you have received this document by mistake and delete
this document from your system. If you are not the intended recipient you are
notified that disclosing, copying, distributing or taking any action in reliance on
the contents of this information is strictly prohibited.
Industrial Internet of
Things
Department: Electronics and Instrumentation Engineering
Date: 18.01.2023
1. Contents
2 Course Objectives
3 Pre Requisites
4 Syllabus
5 Course Outcomes
9 Lecture Notes
10 Assignments
12 Part B Questions
16 Assessment Schedule
Unit Contents
INTRODUCTION TO INDUSTRY 4.0 12
III Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP) - (TLS, DTLS) –
Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT. Service Layer -
oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC
802.15.4, 6LoWPAN, RPL, Application Layer.
INDUSTRIAL IoT 12
CO
Course Outcomes
Number
Understand IoT value chain structure (device, data cloud),
C609.1 application areas and technologies involved.
P P P P P P P P P P P P PS PS PS
CO O O O O O O O O O O O O O O O
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
C609.
3 2 - - - - - 2 1 2 - 3 3 1 -
1
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
2
C609.
3 3 3 2 - - - 2 2 2 - 3 3 3 2
3
C609.
3 2 - - - - - 2 1 2 - 3 3 2 2
4
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
5
C609.
3 2 2 - - - - 2 1 2 - 3 3 2 2
6
7. Lecture Plan
Actual
S. No of Proposed Pertaini Taxono Mode of
Topics Lecture
No.: Period date ng CO my level Delivery
Date
PPT +
Protocol
Online
1 Standardization 1 C609.1 K2
White
for IoT
Board
PPT +
IEEE 802.11, Online
2 2 C609.1 K2
IEEE 802.15 White
Board
PPT +
Wireless HART, Online
3 2 C609.1 K2
Z-Wave White
Board
PPT +
Bluetooth Low
Online
4 Energy, Zigbee 2 C609.1 K2
White
Smart Energy
Board
PPT +
Online
5 IPv4, IPv6 2 C609.1 K2
White
Board
PPT +
6LoWPAN, Online
6 1 C609.1 K2
6TiSCH White
Board
PPT +
Online
7 ND, DHCP, ICMP 1 C609.1 K2
White
Board
PPT +
RPL, CORPL, Online
8 1 C609.1 K2
CARP White
Board
8. Activity based learning
Aim: The Think Tank activity motivates the students developing a list of
advantages and disadvantages of various types of Networking protocols
in industries, helping them to analyze the selection of protocol for
particular applications
.Time : 20 – 30 minutes
Size : 4 in a Group Activity
The students are divided into groups and problem statements are given
in terms of different types of industry. The group of students should
summarize the characteristics, uses and selection of networking protocol
for particular application.
9. Lecture Notes
IOT DATA LINK LAYER & NETWORK LAYER PROTOCOLS
IEEE 802.11
LAN (and WLAN) continues to be important technology for M2M and IoT
applications. This is due to the high bandwidth, reliability, and legacy of the
technologies. Where power is not a limiting factor, and high bandwidth is
required, devices may connect seamlessly to the Internet via Ethernet (IEEE
802.3) or Wi-Fi (IEEE 802.11).
The IEEE 802.11 (Wi-Fi) standards continue to evolve in various directions to
improve certain operational characteristics depending on usage scenario.
A widely adopted recent release was IEEE 802.11n, which was specifically
designed to enhance throughput (typically useful for streaming multimedia).
Ongoing work such as IEEE 802.11ac is developing an even higher
throughput version to replace this, focusing efforts in the 5 GHz band.
IEEE 802.11ah is working on an evolution of the 2007 standard that will allow
a number of networked devices to cooperate in the ,1 GHz (ISM) band.
The idea is to exploit collaboration (relaying, or networking in other words) to
extend range, and improve energy efficiency (by cycling the active periods of
the radio transceiver).
The standard aims to facilitate the rapid development of IoT and M2M
applications that could exploit burst-like transmissions, such as in metering
applications.
Two or more BSS's are interconnected using a Distribution System or DS. This
concept of DS increases network coverage. Each BSS becomes a component of
an extended, larger network. Entry to the DS is accomplished with the use of
Access Points (AP). An access point is a station, thus addressable. So data
moves between the BSS and the DS with the help of these access points.
Creating large and complex networks using BSS's and DS's leads us to the next
level of hierarchy, the Extended Service Set or ESS. The beauty of the ESS is the
entire network looks like an independent basic service set to the Logical Link
Control layer (LLC). This means that stations within the ESS can communicate or
even move between BSS's transparently to the LLC.
The first type of BSS is known as ad hoc network, which consists of a group of
stations within the range of each other. As its name implies, ad hoc networks are
temporary in nature, which are typically created and maintained as needed
without prior administrative arrangement. Ad hoc networks can be formed
anywhere spontaneously and can be disbanded after a limited period of time. A
typical ad hoc network is shown in Figure below.
Figure3.3 (a) Basic Service set (BSS), (b) Infrastructure BSS (ESS)
IEEE 802.11 MAC Frame
MAC layer provides functionality for several tasks like control medium access,
can also offer support for roaming, authentication, and power conservation. The
basic services provided by MAC are the mandatory asynchronous data service
and optional time-bounded service.
MAC Frame:
The MAC layer frame consists of 9 fields. The following figure shows the basic
structure of an IEEE 802.11 MAC data frame along with the content of the frame
control field.
Frame Control:
It is 2 bytes long field which defines type of frame and some control
information. Various fields present in FC are:
1. Version:
It is a 2 bit long field which indicates the current protocol version which is fixed
to be 0 for now.
2. Type:
3. Subtype:
It is a 4 bit long field which indicates sub-type of the frame like 0000 for
association request, 1000 for beacon.
4. To DS:
It is a 1 bit long field which when set indicates that destination frame is for
DS(distribution system).
5. From DS:
It is a 1 bit long field which when set indicates frame coming from DS.
It is 1 bit long field which when set to 1 means frame is followed by other
fragments.
7. Retry:
It is 1-bit long field that indicates the mode of a station after successful
transmission of a frame. Set to 1 the field indicates that the station goes into
power-save mode. If the field is set to 0, the station stays active.
9. More data:
It is 1-bit long field that is used to indicate receiver that a sender has more data
to send than the current frame. This can be used by an access point to indicate
to a station in power-save mode that more packets are buffered or it can be
used by a station to indicate to an access point after being polled that more
polling is necessary as the station has more data ready to transmit.
10. WEP:
It is 1 bit long field which indicates that the standard security mechanism of
802.11 is applied.
11. Order:
It is 1 bit long field, if this bit is set to 1 the received frames must be processed
in strict order.
Duration/ID –
It is 4 bytes long field which contains the value indicating the period of time in
which the medium is occupied(in µs).
Address 1 to 4 –
These are 6 bytes long fields which contain standard IEEE 802 MAC addresses (48
bit each). The meaning of each address depends on the DS bits in the frame control
field.
SC (Sequence control) –
It is 16 bits long field which consists of 2 sub-fields, i.e., Sequence number (12 bits)
and Fragment number (4 bits). Since acknowledgement mechanism frames may be
duplicated hence, a sequence number is used to filter duplicate frames.
Data –
It is 4 bytes long field which contains a 32 bit CRC error detection sequence to
ensure error free frame.
Bluetooth Low Energy
Bluetooth low energy or Bluetooth smart is a short range communication
protocol with PHY and MAC layer widely used for in-vehicle networking. Its low
energy can reach ten times less than the classic Bluetooth while its latency can
reach 15 times. Its access control uses a contention-less MAC with low latency
and fast transmission. It follows master/slave architecture and offers two types
of frames: adverting and data frames. The Advertising frame is used for
discovery and is sent by slaves on one or more of dedicated advertisement
channels. Master nodes sense advertisement channels to find slaves and
connect them. After connection, the master tells the slave it’s waking cycle and
scheduling sequence. Nodes are usually awake only when they are
communicating and they go to sleep otherwise to save their power.
Being part of the Bluetooth v4.0 standard adopted in 2010-06-30, Bluetooth Low
Energy (BLE) is also known as Smart Bluetooth. BLE is an IEEE 802.15.1
variation with better and more suitable capacities for low power applications
than the classic Bluetooth Basic Rate. Devices that demand communication with
both standards of Bluetooth are required to implement and support both
protocol stacks due the incompatibilities among them. Star is the only topology
accepted by BLE due the standard definition that does not permit physical link
connections among slave devices. Any data exchanged between two slave
devices shall pass through the unique master and a slave device may not be
connected to two master units at the same time. These premises define the
formation of a BLE star pico-net .
Using a similar protocol stack as classic Bluetooth, the differences between them
starts above the L2CAP layer. Above the L2CAP layer, BLE is the application layer
that uses a set of functionalities, which are not present in the classic Bluetooth
specifications. These functionalities are the Attribute Protocol (ATT), the Generic
Attribute Profile (GATT), the Security Manager Protocol (SMP) and the Generic
Access Profile (GAP). Figure 7 depicts the BLE protocol stack.
The two main roles of BLE are: controller and host. BLE differs from the classical
Bluetooth in the controller stack that defines the association methods of the
devices. A slave can belong to only one pico-net during an association lifetime,
and is synchronized with only one master element.
A Host Controller Interface (HCI) is a communication standard applied between
the slave and controller. In the Bluetooth Basic Rate, 79 channels are used with
a 1 MHz bandwidth to reduce interference with adjacent channels. In Bluetooth
Low Energy, the channels are defined in the 2.400– 2.4835 GHz band with a 2
MHz guard band. To achieve scalability, the master device controls the number
of hosts associated with it by adjusting the value of the connection interval
(ConnInterval parameter) between hosts and controllers.
Link layer manages events generated by the hosts, at determined time intervals,
using the advertising channels. Bidirectional data flow is obtained with a
connection between elements, when slaves advertising packets are received by
master elements. The energy save handling done at MAC layer can put the
slaves in a sleeping mode by default and waking them periodically through a
Time Division Multiple Access (TDMA) scheme. In the classic Bluetooth basic
protocol, this layer a stop-and-wait flow control mechanism is used to provide
error recovery capabilities. At BLE, the L2CAP is an adaption of the classic
Bluetooth basic protocol stack but optimized and simplified to receive the
application layers designed for low energy platforms.
Data exchange between the application layer and link layer are also done by
L2CAP using no retransmission techniques or flow control mechanisms as used
on the classic Bluetooth. Not using retransmission or flow control mechanisms
(present in the classic Bluetooth) and segmentation and reassembly capabilities,
the Packet Data Units (PDU) (limited to 23 bytes in BLE) received by the
application layer is delivered ready to fit the maximum size of the L2CAP
payload.
When two devices are connected under a server and client association
architecture, the server needs to maintain a set of attributes. The Attribute
Protocol (ATT) handles the attributes of this connection like the definition of data
structure used to store the information managed by the Generic Attribute Profile
(GATT) that works on top of the ATT. GATT defines the client or server
functionalities of a connection and this association is independent of the master
or slave roles. The attributes of the server need to be accessed by the client
through the requests sent, which trigger the response messages of the server. It
is also possible for a server to send to a client, unsolicited messages like
notifications that do not need any confirmation message to be sent by the client.
A server is also required to send indication messages, which need confirmation
messages to be sent by the client. The slave sends requests for responses and
indications prior to transactions confirmation following a stop-and-wait scheme.
Slaves can either write attributes values at the master.
A framework defined by GATT performs the role of discovery services using the
ATT attributes, and allows exchange of characteristics between devices
interconnected. An attribute carries a set of characteristics that includes a value
and properties of the parameter monitored by the device. For example, a
humidity sensor needs humidity characteristics and attributes to describe this
sensor, and to store its measurements. Thus, this sensor needs a further
attribute to specify the measurement units. Creating specific profiles with the
Low Energy Bluetooth standard takes place in the Generic Attribute
Profile (GATT). GATT uses the Attribute Protocol (ATT) protocol in addition to the
lower stack protocols, in order to introduce the subdivision of retained server
attributes into services and features. Services can contain a set of features,
which can include a single value (accessible from the client) and other numerical
data that describe such features.
Among the assignments of GAP profile specifications are: device role rights,
discovery devices and services, as well as establishing connections and security.
A new profile based on the existing profile requirements can be created
following a profile hierarchy. The interoperability of different devices can be
handled through application profiles. Bluetooth is designed to offer a low-cost
alternative to Wi-Fi at the expense of the transmission range. Its transmission
range is considerably shorter (up to 100 m LOS) and data rate does not exceed
721.2 Kbps in the classic Bluetooth Basic Rate version and can reach 3 Mbps
with the Enhanced DataRate feature. BLE operates at 1Mbps rate on its physical
layer, while its application layer can handle only 236.7 Kbps.
In Bluetooth Low Energy, there are no subdivisions in power classes but only the
maximum and minimum output power values of the transmitter are provided.
Only an approximate value of the maximum reachable distance can be
predicted. The low power required for transmission is the main feature of the
Bluetooth Low Energy standard and this result is due to enhancements made on
the classic version. These enhancements include reduced frequency band and
shorter PDU packets. An energy evaluation is offered at using CC2640 radio
chipset consumption reference measurements. The comparison is made when
operating on 0 dBm transmission power by gathering the main characteristics of
Bluetooth and BLE.
Bluetooth v5.0 has no functional block included in its first and second layers
when compared to versions v4.0, v4.1, and v4.2. A representation of the inter-
layer communication structure and the relationship with Bluetooth layers of
different Bluetooth versions can be seen in Figure 8. Device-to- device file
transfers, wireless speakers, wireless headsets, and Body Sensor Networks are
often enabled with Bluetooth versions.
IEEE 802.15.4
IEEE 802.15.4 is a subgroup of features that refers to physical and medium
access control layers that can support ZigBee and 6LoWPAN upper. IEEE
802.15.4 focuses on physical and data link layer specifications while ZigBee
Alliance aims to provide the upper characteristics. It is a standard that defines
PHY and MAC layers for personal area networks that demand low rate and low
cost applications. This also called a LR-WPAN protocol and has some
advantages. Among them are a simple and flexible protocol stack, low cost, low
energy consumption, short-range operation, reliable data transfer, and ease of
operation [34]. These features are more important when operating in the
Personal Operating Space (POS) also defined as Personal Area Network (PAN)
that involves the human body.
Physical Layer
The 802.15.4 standard supports an extensive number of PHY options that range
from 2.4 GHz to sub-GHz frequencies in ISM bands. (ISM bands are discussed earlier
in this chapter.) The original IEEE 802.15.4-2003 standard specified only three PHY
options based on direct sequence spread spectrum (DSSS) modulation. DSSS is a
modulation technique in which a signal is intentionally spread in the frequency
domain, resulting in greater bandwidth. The original physical layer transmission
options were as follows:
You should note that only the 2.4 GHz band operates worldwide. The 915 MHz band
operates mainly in North and South America, and the 868 MHz frequencies are used
in Europe, the Middle East, and Africa. IEEE 802.15.4-2006, 802.15.4-2011, and
IEEE 802.15.4-2015 introduced additional PHY communication options, including the
following:
• OQPSK PHY: This is DSSS PHY, employing offset quadrature phase-shift keying
(OQPSK) modulation. OQPSK is a modulation technique that uses four unique bit
values that are signaled by phase changes. An offset function that is present
during phase shifts allows data to be transmitted more reliably.
• BPSK PHY: This is DSSS PHY, employing binary phase-shift keying (BPSK)
modulation. BPSK specifies two unique phase shifts as its data encoding scheme.
• ASK PHY: This is parallel sequence spread spectrum (PSSS) PHY, employing
amplitude shift keying (ASK) and BPSK modulation. PSSS is an advanced encoding
scheme that offers increased range, throughput, data rates, and signal integrity
compared to DSSS. ASK uses amplitude shifts instead of phase shifts to signal
different bit values.
These improvements increase the maximum data rate for both 868 MHz and 915
MHz to 100 kbps and 250 kbps, respectively. The 868 MHz support was enhanced to
3 chan- nels, while other IEEE 802.15.4 study groups produced addendums for new
frequency bands. For example, the IEEE 802.15.4c study group created the bands
314–316 MHz, 430–434 MHz, and 779–787 MHz for use in China.
Figure shows the frame for the 802.15.4 physical layer. The synchronization header
for this frame is composed of the Preamble and the Start of Frame Delimiter fields.
The Preamble field is a 32-bit 4-byte (for parallel construction) pattern that identifies
the start of the frame and is used to synchronize the data transmission. The Start of
Frame Delimiter field informs the receiver that frame contents start immediately
after this byte.
The PHY Header portion of the PHY frame shown in Figure 4-5 is simply a frame
length value. It lets the receiver know how much total data to expect in the PHY
service data unit (PSDU) portion of the 802.4.15 PHY. The PSDU is the data field or
payload.
MAC Layer
The IEEE 802.15.4 MAC layer manages access to the PHY channel by defining how
devices in the same area will share the frequencies allocated. At this layer, the
scheduling and routing of data frames are also coordinated. The 802.15.4 MAC layer
performs the following tasks:
■Network beaconing for devices acting as coordinators (New devices use beacons to
join an 802.15.4 network)
The MAC layer achieves these tasks by using various predefined frame types. In
fact, four types of MAC frames are specified in 802.15.4:
Each of these four 802.15.4 MAC frame types follows the frame format shown in
Figure . In Figure, notice that the MAC frame is carried as the PHY payload. The
802.15.4 MAC frame can be broken down into the MAC Header, MAC Payload, and
MAC Footer fields.
The MAC Header field is composed of the Frame Control, Sequence Number and the
Addressing fields. The Frame Control field defines attributes such as frame type,
address- ing modes, and other control flags. The Sequence Number field indicates
the sequence identifier for the frame. The Addressing field specifies the Source and
Destination PAN Identifier fields as well as the Source and Destination Address
fields.
The MAC Payload field varies by individual frame type. For example, beacon frames
have specific fields and payloads related to beacons, while MAC command frames
have different fields present. The MAC Footer field is nothing more than a frame
check sequence (FCS). An FCS is a calculation based on the data in the frame that is
used by the receiving side to confirm the integrity of the data in the frame. IEEE
802.15.4 requires all devices to support a unique 64-bit extended MAC address,
based on EUI-64. However, because the maximum payload is 127 bytes, 802.15.4
also defines how a 16-bit “short address” is assigned to devices. This short address
is local to the PAN and substantially reduces the frame overhead compared to a 64-
bit extended MAC address.
However, you should be aware that the use of this short address might be limited to
specific upper-layer protocol stacks.
IEEE 802.15.4 MAC Format
The IEEE 802.15.4 BE and NBE operational modes have being strongly investigated
over recent years. Thus, some limitations have been addressed and the most
important ones are the unbounded delay, low communication efficiency, low
interference robustness, and/or fading and main poweredrelay nodes Figure
compares IEEE 802.15.4 stack with the OSI reference model.
Wireless HART
• Wireless HART is a datalink protocol that operates on the top of IEEE 802.15.4
PHY and adopts Time Division Multiple Access (TDMA) in its MAC. It is a secure
and reliable MAC protocol that uses advanced encryption to encrypt the
messages and calculate the integrity in order to offer reliability.
• The architecture, as shown in fig consists of a network manager, a security
manager, a gateway to connect the wireless network to the wired networks,
wireless devices as field devices, access points, routers and adapters. The
standard offers end-to-end, per-hop or peer-to- peer security mechanisms. End
to end security mechanisms enforce security from sources to destinations while
per-hop mechanisms secure it to next hop only.
Fig: Wireless HART architecture
• Using the IEEE 802.15.4 PHY layer, Wireless-HART operates in the license-free
ISM of 2.4–2.4835 GHz with 2 MHz bandwidth of each one of the 16 channels.
The channels are numbered from 11 to 26 with a gap of 5 MHz between IEEE
802.11b/g adjacent channels, delivering up to 250 Kbps.
• Wireless-HART uses its own Time Division Multiplex Access (TDMA) on the MAC
layer including the 10 ms synchronized time slot features. These characteristics
allow the messages routing through a network topology obstacle and
interference. This is possible due to the use of self-organizing and self-healing
mesh networking techniques supported by the network layer. Even being
essentially a centralized wireless network, Wireless-HART uses a network
manager in its stack in order to provide routing and communication schedules.
This can guarantee network performance and satisfy the wireless industrial
applications.
• During the joining process of the devices onto networks, the network manager
distributes the communication links and the channel hop patterns to the
devices. It also manages the enabling or disabling of the use of channels that are
frequently affected by considerable interference levels, calling this feature
channels blacklist,wHart-n-802-15- 4e,petersen2011wirelesshart.
• Z-Wave is a low-power MAC protocol designed for home automation and has been
used for IoT communication, especially for smart home and small commercial
domains. It covers about 30-meter point- to-point communication and is suitable
for small messages in IoT applications, like light control, energy control, wearable
healthcare control and others. It uses CSMA/CA for collision detection and ACK
messages for reliable transmission. It follows a master/slave architecture in which
the master control the slaves, send them commands, and handling scheduling of
the whole network. Z-Wave was developed and is overseen by the company
Zensys to provide wireless communication between devices with a focus on
residential automation. Monitoring and controlling of lighting, ambient
temperature and security through sensors and actuators by tablets, smartphones
or computers are some applications in its portfolio. Z-Wave devices are arranged
in mesh network topology. They can send and receive messages from any device
that is connected to the network.
• The protocol is a proprietary standard based on the ITU G.9959 specification that
operates in the Industrial, Scientific, and Medical (ISM) radio frequency band. Z-
Wave transmits on 868.42 MHz (Europe) and 908.42 MHz (United States)
frequencies working with FSK and Gaussian Fase Shift Keying (GFSK)
modulations. With low transmission rates of 9.6 Kbps, 40 Kbps and 100 Kbps, it
employs symmetric AES-128 encryption. The MAC layer uses the CSMA-CA
technique for a medium access control technique and, based on ITU G.9959, has
the following characteristics: a capacity of 232 unique network identifiers that
allows the same quantity of nodes joying the network; collision avoidance
mechanism; back-off time when collision occurs; reliability guaranteed by
receiving acknowledgments; frame validation and retransmission mechanisms. A
power saving mechanism is achieved due to a sleep mode with a dedicated
wake-up pattern. Figure 13 depicts the Z-Wave protocol stack.
Figure.3.13 Z-Wave protocol stack.
• The Z-Wave basic device classes are the following: Portable Controller, Static
Controller, Slave, and Slave with Routing Capabilities. Different classes provide the
device with a certain role in the Z- Wave network. Inside a Basic Class, Generic
and Specific device classes are used to achieve the wanted functionality in the
control network. In the Z-Wave protocol, the unique identification of the devices is
used through a 32-bit ID. This ID value cannot be changed as it is written in the
device chipset by the device manufacturer. A Z-Wave network has only one
primary controller device at a time. Each of the 232 nodes of this network can
also be a repeater for forwarding data to its neighbors, mediating a connection.
Battery-powered nodes do not enjoy this facility. In an environment with a certain
level of device drift or even when a device is removed from the network for some
reason, the network topology may change. Changing network topology can lead
to problems in packet forwarding and packet routing in the network. To minimize
this effect, routing tables should be kept up-to-date, optimized and any new
topology detected; Z-Wave supports the discovery and suitability of the new
network topology. This is possible by keeping the routing table up-to-date on each
device and showing all neighboring devices. When a node changes its position or
is removed from the network, a topology failure can start an automatic topology
and healing procedure to detect the new topology and define the best routes to
update the routing tables. This mechanism is subjected to unauthorized
modification of routing table attacks by rouge nodes.
• The transfer (or transport) layer management functions are: communication
between two neighbor nodes, packet acknowledgment, low power network nodes
awake (Beaming), and packet origin authentication. This layer controls the Beam
frames used to wake-up battery powered Z-Wave devices, as each primary
controller device of a cluster can handle up to 232 nodes. All nodes can act as a
packet repeater, except those devices that are batteries powered. This is Z-Wave
mesh topology formed. Z-Wave data security is based on AES and on the cipher
block chaining message authentication code (CBC-MAC). However, standards and
rules for command classes, device types and timers are missing. These
characteristics are only acquired in the new advanced security framework (S2)
determined by the Z-Wave Alliance and developed in conjunction with the cyber
security community. For the certification of new products as of 2017, Z-Wave
brings devices a higher level of security. The structure of S2 is based on the
protection of the devices that is already associated with the network, so they are
not hacked while still connected to the network. Once the device has already
been associated to the network through its pin-code or QR (Quick Response)
code, there is an exchange of security keys through the Elliptic Curve Diffie-
Hellman (ECDH) algorithm.
• Wireless protocol for device monitoring and control: Zigbee Smart Energy
(Zigbee SE) is a protocol designed for monitoring and actively managing energy
consumption at the end-user level. For both utilities and consumers, Zigbee SE
can help reduce waste, energy consumption and enables utilities to monitor and
manage customers’ energy use. Furthermore, the end-user can monitor their
energy consumption.
• A number of standards use ZigBee as a base. The most common of these are:
• ZigBee Home Automation (ZHA): This is a home automation-oriented global standard
for controlling applications like lighting, temperature control, energy management,
security and accident prevention.
• ZigBee Smart Energy (ZSE): This is a global standard that allows service providers
and Home Area Network (HAN) electricity distribution companies to manage energy
consumption. ZSE also allows suppliers and customers to interact, so that both
can access smart communications.
• ZigBee Light Link (ZLL): This is a global standard that permits consumer lighting
elements and other elements to interoperate with each other, giving consumers wireless
access to these elements. It allows consumers to control their home lighting, while
managing energy use and making their homes “greener”.
Reason for ZigBee Smart Energy
• ZigBee SE provides service providers and power distributors with a simple wireless
access network within homes (Home Area Network, or HAN). Smart Energy offers
these groups and their customers the possibility of communicating with each
other directly in order to control smart applications (e.g., thermostats and other
devices used to control high energy use in the home). Having access to
customers’ instantaneous consumption, enables power distributors to more
efficiently manage the electricity smart grid (generation and distribution).
Furthermore, customers can receive real-time information on their energy use
through devices installed inside the home, as well as by accessing the HAN
through the services provided by energy distributors and/or service providers.
IPv4 provides hierarchical addressing scheme which enables it to divide the network
into sub-networks, each with well-defined number of hosts. IP addresses are divided
into many categories:
• Class A- it uses first octet for network addresses and last three octets for host
addressing
• Class B- it uses first two octets for network addresses and last two for host
addressing
• Class C- it uses first three octets for network addresses and last one for host
addressing
IPv4 also has well-defined address spaces to be used as private addresses (not
routable on internet), and public addresses (provided by ISPs and are routable on
internet).
Multicast Anycast
1. Unicast Address –
2. Multicast Address –
3. Anycast Address –
Version (4-bits): Indicates version of Internet Protocol which contains bit sequence
0110.
.
Traffic Class (8-bits): The Traffic Class field indicates class or priority of IPv6 packet
which is similar to Service Field in IPv4 packet. It helps routers to handle the traffic
based on the priority of the packet. If congestion occurs on the router then packets
with the least priority will be discarded.
As of now, only 4-bits are being used (and the remaining bits are under research), in
which 0 to 7 are assigned to Congestion controlled traffic and 8 to 15 are assigned
to Uncontrolled traffic.
Uncontrolled data traffic is mainly used for Audio/Video data. So we give higher
priority to Uncontrolled data traffic.The source node is allowed to set the priorities
but on the way, routers can change it. Therefore, the destination should not expect
the same priority which was set by the source node.
Flow Label (20-bits): Flow Label field is used by a source to label the packets
belonging to the same flow in order to request special handling by intermediate IPv6
routers, such as non-default quality of service or real-time service. In order to
distinguish the flow, an intermediate router can use the source address, a
destination address, and flow label of the packets. Between a source and
destination, multiple flows may exist because many processes might be running at
the same time. Routers or Host that does not support the functionality of flow label
field and for default router handling, flow label field is set to 0. While setting up the
flow label, the source is also supposed to specify the lifetime of the flow.
Uncontrolled data traffic is mainly used for Audio/Video data. So we give higher
priority to Uncontrolled data traffic.The source node is allowed to set the priorities
but on the way, routers can change it. Therefore, the destination should not expect
the same priority which was set by the source node.
Flow Label (20-bits): Flow Label field is used by a source to label the packets
belonging to the same flow in order to request special handling by intermediate IPv6
routers, such as non-default quality of service or real-time service. In order to
distinguish the flow, an intermediate router can use the source address, a
destination address, and flow label of the packets. Between a source and
destination, multiple flows may exist because many processes might be running at
the same time. Routers or Host that does not support the functionality of flow label
field and for default router handling, flow label field is set to 0. While setting up the
flow label, the source is also supposed to specify the lifetime of the flow.
Next Header (8-bits): Next Header indicates the type of extension header(if
present) immediately following the IPv6 header. Whereas In some cases it indicates
the protocols contained within upper-layer packets, such as TCP, UDP.
Hop Limit (8-bits): Hop Limit field is the same as TTL in IPv4 packets. It indicates
the maximum number of intermediate nodes IPv6 packet is allowed to travel. Its
value gets decremented by one, by each node that forwards the packet and the
packet is discarded if the value decrements to 0. This is used to discard the packets
that are stuck in an infinite loop because of some routing error.
Source Address (128-bits): Source Address is the 128-bit IPv6 address of the
original source of the packet.
Destination Address (128-bits): The destination Address field indicates the IPv6
address of the final destination(in most cases). All the intermediate nodes can use
this information in order to correctly route the packet.
Extension Headers: In order to rectify the limitations of the IPv4 Option Field,
Extension Headers are introduced in IP version 6. The extension header
mechanism is a very important part of the IPv6 architecture. The next Header
field of IPv6 fixed header points to the first Extension Header and this first extension
header points to the second extension header and so on.
• IPv6 has introduced Anycast addressing but has removed the concept of
broadcasting. IPv6 enables devices to self-acquire an IPv6 address and
communicate within that subnet. This auto-configuration removes the
dependability of Dynamic Host Configuration Protocol (DHCP) servers. This way,
even if the DHCP server on that subnet is down, the hosts can communicate with
each other.
• IPv6 provides new feature of IPv6 mobility. Mobile IPv6 equipped machines can
roam around without the need of changing their IP addresses.
• IPv6 is still in transition phase and is expected to replace IPv4 completely in
coming years. At present, there are few networks which are running on IPv6.
There are some transition mechanisms available for IPv6 enabled networks to
speak and roam around different networks easily on IPv4. These are:
• Dual stack implementation
• Tunneling
• NAT-PT
Difference between IPv4 and IPv6:
6LoWPAN
IPv6 over Low power Wireless Personal Area Network (6LoWPAN) is the first and
most commonly used standard in this category. It efficiently encapsulates IPv6 long
headers in IEEE802.15.4 small packets, which cannot exceed 128 bytes. The
specification supports different length addresses, low bandwidth, different topologies
including star or mesh, power consumption, low cost, scalable networks, mobility,
unreliability and long sleep time. The standard provides header compression to
reduce transmission overhead, fragmentation to meet the 128-byte maximum frame
length in IEEE802.15.4, and support of multi-hop delivery. Frames in 6LoWPAN use
four types of headers: No 6loWPAN header (00), Dispatch header (01), Mesh header
(10) and Fragmentation header (11). In No 6loWPAN header case, any frame that
does not follow 6loWPAN specifications is discarded. Dispatch header is used for
multicasting and IPv6 header compressions. Mesh headers are used for
broadcasting; while Fragmentation headers are used to break long IPv6 header to fit
into fragments of maximum 128-byte length.
6TiSCH
6TiSCH working group in IETF is developing standards to allow IPv6 to pass through
Time-Slotted Channel Hopping (TSCH) mode of IEEE 802.15.4e datalinks. It defines
a Channel Distribution usage matrix consisting of available frequencies in columns
and time-slots available for network scheduling operations in rows. This matrix is
portioned into chucks where each chunk contains time and frequencies and is
globally known to all nodes in the network. The nodes within the same interference
domain negotiate their scheduling so that each node gets to transmit in a chunk
within its interference domain. Scheduling becomes an optimization problem where
time slots are assigned to a group of neighboring nodes sharing the same
application. The standard does not specify how the scheduling can be done and
leaves that to be an application specific problem in order to allow for maximum
flexibility for different IoT applications. The scheduling can be centralized or
distributed depending on application or the topology used in the MAC layer.
DHCP
IP addresses may be static or dynamic. Static means that the address assigned to a machine
generally does not change. Dynamic means that an IP address is assigned to a computer on
demand, for a fixed lease period. The computer may be assigned a different address each
time it demands one. Dynamic addresses are acceptable for a machine running client
software, since the way things are organized is that the client initiates communications with
a server, and includes its "return address" (the source IP address) in every packet sent to
the server. To communicate to a server, it is necessary to find out the numeric IP address of
the server before the client can communicate to it. That is often accomplished through the
Domain Name System (DNS), essentially tables where the IP address of a server can be
looked up. To avoid having to frequently update those tables, servers are generally assigned
static addresses.
Addresses are assigned to a computer using the Dynamic Host Configuration Protocol
(DHCP). The system administrator provisions a DHCP server, configured to assign IP
addresses within a defined range to clients. Computers are loaded with DHCP client
software. Communications between the DHCP client and server are effectively application-
layer messages, coded into ASCII and carried in UDP protocol data units, which are carried
in IP packets, which are carried in MAC frames. The desired recipient of the messages is
indicated as being the DHCP on a machine by populating in the UDP header destination port
= 67 for messages to the server and destination port = 68 for messages to the client. The
messages are "broadcast", which means that the destination IP address is all 1s and
destination MAC address is all 1s. The actual addresses are used for source MAC and IP
addresses, except that the client uses "0" as its IP address, since of course the whole point
of the exercise is to get an IP address. Each computer will run a DHCP client when it starts,
generating a DHCP Discover message as illustrated above.
Fig 3.17 DHCP offer message
Any DHCP server that receives it, and there may be more than one, will respond
with a DHCP Offer message, with an offered IP address and a lease time:
The client will answer with a DHCP Request message to confirm its selection of an
offered address:
Source quench message is a request to decrease the traffic rate for messages
sending to the host(destination). Or we can say when receiving host detects that the
rate of sending packets (traffic rate) to it is too fast it sends the source quench
message to the source to slow the pace down so that no packet can be lost.
ICMP will take the source IP from the discarded packet and informs the source by
sending a source quench message. Then source will reduce the speed of
transmission so that router will be free from congestion.
When the congestion router is far away from the source the ICMP will send hop by
hop source quench message so that every router will reduce the speed of
transmission.
RPL
Routing Protocol for Low-Power and Lossy Networks (RPL) is distance-vector
protocol that can support a variety of datalink protocols.RPL builds a directed acyclic
graph (DAG) with no outgoing edges as the base element of the topology, this
ensure that no cycles exist in the hierarchy. The sink node starts building the first
DAG making itself the ultimate DAG root, other nodes in this DAG start forming their
own DAGs which are routed towards the first one making a destination oriented DAG
(DODAG). RPL uses a number of control messages to build and maintain its
hierarchy. The DODAG information object (DIO) is sent from the root node with
information about the rank of the sending node, the instance ID, the version
number and the DODAG-ID. This allows nodes to decide whether or not to act upon
receiving this message, in addition to keeping valuable information about the
network that can contribute to making an informed decision. The destination
advertisement object (DAO) is sent from the child node to its parent (the DAG root
or the DODAG root) and it contains destination information which practically informs
the root that this node is still available. The root node may optionally send a DAOack
acknowledgement if required. The DODAG information solicitation is another form of
upward control messages that is used to request a DIO from the parent node, this is
one of the most relevant and important features that RPL uses to maintain
connectivity. Fig 1 shows the direction of RPL control messages.
CARP
Course
Q. K
Questions Outcom
No.: Level
es
1 K2 CO2
4 K2 CO2
12. Part B
Course
Q. K
Questions Outcom
No.: Level
es
3GPP MTC
Communication scenario with MTC devices communicating with MTC server. MTC
server is located in the operator domain.
Communication scenario with MTC devices communicating with MTC server. MTC
server is located outside the operator domain.
The network operator provides network connectivity to MTC Server(s). This applies
to MTC Servers controlled by the network operator or to MTC Servers not controlled
by the network operator.
MTC devices communicating with each other
The communication scenario where the MTC Devices communicate directly without
intermediate MTC Server.
As technology evolves, there are important changes in capabilities and costs. More
computing power, memory and communication capabilities make it possible for
machines to take over tasks presently done by, but not well suited to human
beings. Lower costs make it practical for machines to take over tasks not well
suited to expensive human beings. Increasing capabilities and lower costs together
open new opportunities for revenue generating services not previously economical
to do.
The increasing capability of machines makes it possible to avoid dull and repetitious
work having to be done by people, freeing them to utilize their capabilities and
intelligence in better suited and much more fruitful activities.
16. Assessment Schedule
17. Prescribed Text Books & Reference Books
TEXT BOOKS:
1. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on
approach‖, Universities Press, 2015
2. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds),
―Architecting the Internet of Things‖, Springer, 2011.
3. Olivier Hersent, David Boswarthick, Omar Elloumi, ―The Internet of
Things – Key applications and Protocols‖, Wiley, 2012
REFERENCES:
1. Honbo Zhou, ―The Internet of Things in the Cloud: A Middleware
Perspective‖, CRC Press, 2012.
2. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis ,
Karnouskos, Stefan Avesand. David Boyle, "From Machine-to-
Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
3. “Industry 4.0: The Industrial Internet of Things”, by Alasdair
Gilchrist (Apress)
4. “Industrial Internet of Things: Cyber manufacturing Systems” by
Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat
(Springer)
5. Peter Waher, “Learning Internet of Things”, PACKT publishing,
BIRMINGHAM – MUMBAI.
6. NPTEL Video Lecture Notes on “Introduction to Industry 4.0 and
Industrial Internet of Things” by Prof. Sudip Misra, IIT Kharagpur.
https://nptel.ac.in/courses/106105195
18. Mini Project Suggestions
https://www.emqx.com/en/blog/how-to-use-mqtt-in-python
Thank you
Disclaimer:
This document is confidential and intended solely for the educational purpose of RMK Group of
Educational Institutions. If you have received this document through email in error, please notify the
system manager. This document contains proprietary information and is intended only to the
respective group / learning community as intended. If you are not the addressee you should not
disseminate, distribute or copy through e-mail. Please notify the sender immediately by e-mail if you
have received this document by mistake and delete this document from your system. If you are not
the intended recipient you are notified that disclosing, copying, distributing or taking any action in
reliance on the contents of this information is strictly prohibited.