SlideShare ist ein Scribd-Unternehmen logo
1 von 109
MODULE 5: MOBILITY AND
SETTINGS
CO4. Analysis and evaluate protocols
used in IOT.
CO5. Design and develop smart city in
IOT.
CONTENTS
• Introduction
• Localization
• Mobility management
• Localization and handover management
• Technology considerations
• Performance evaluation
• Simulation setup
• Performance results
• Identification of IOT (data formats. IPV6,
identifiers and locators, tag etc.)
INTRODUCTION
• The significance of location awareness and the
requirement for fast adaptation to frequent location
changes due to mobility are critical issues that need to
be addressed for the success of future ubiquitous and
mobile networks.
• Location information is important for enabling
location-based services (LBS) in commercial,
healthcare, public safety, and military domains.
• Location awareness can be utilized for improving or
enhancing network functionalities, such as mobility
management for quality of service provisioning.
INTRODUCTION
• Localization and mobility management are
two concepts that are tightly inter-connected.
• The need to determine the unknown location
of an entity stems from the mobility capability
of this entity.
• On the other hand, managing the issues raised
due to mobility can be alleviated by the
provision of location-related information.
INTRODUCTION
• While determining the location of objects in
outdoor environments has been extensively
studied and addressed with technologies such
as GPS (global positioning system).
• The localization problem for indoor radio
propagation environments is recognized to be
very challenging. This is mainly due to the
presence of severe multipath and shadow
fading
INTRODUCTION
• For mobility support over IP networks, mobile
IP (MIP) is the most well-known protocol
proposed by the Internet Engineering Task
Force (IETF).
• But, latency delays and losses in IP traffic due
to the time needed to perform the handover
process are its main limitations.
LOCALIZATION
• The localization problem is defined as the process of
determining the current position of a mobile node or
an object within a specific region, indoor or outdoor.
• The position can be expressed in several ways,
depending on the application requirements or the
positioning system specifications.
• For instance, absolute coordinates, relative or symbolic
locations are possible formats.
• Location information is important for enabling LBS in
commercial, healthcare, public safety and military
domains. Furthermore, location awareness can be
utilized for improving or enhancing network
functionalities, such as mobility management for
quality of service provisioning.
LOCALIZATION
• Localization using radio signals has attracted considerable attention
in the fields of telecommunications and navigation.
• The most well-known positioning system is the GPS, which is
satellite-based and is successful for tracking users in outdoor
environments.
• The inability of satellite signals to penetrate buildings can cause the
complete failure of GPS in indoor environments.
• For indoor location sensing, a number of wireless technologies have
been proposed, such as infrared, ultrasound , WiFi and ultra-wide
band.
• However, the indoor radio propagation channel is characterized as
site specific, exhibiting severe multipath effects and low probability
of line-of-sight signal propagation between the transmitter and
receiver, making accurate indoor positioning very challenging.
LOCALIZATION
• Localization techniques, in general, utilize
metrics of the received radio signals (RRS).
• The most traditional received signal metrics
are based on angle of arrival (AOA), time of
arrival (TOA), time difference of arrival (TDOA)
measurements or RSS measurements from
several reference points.
General framework of RRS-based
positioning
General framework of RRS-based
positioning
• The general framework of an RSS-based positioning system
is illustrated in Figure.
• Radio signals transmitted by the fixed reference points
(such as access points or base stations) and
sensed/measured by the RRS-sensing devices of the
receiver.
• They are converted into location-related signal metrics,
such as TOA, TDOA, AOA and RSS.
• The reported signal metrics are then processed by the
positioning algorithm for estimating the unknown location
of the receiver, which is finally utilized by the application.
• The accuracy of the signal metrics and the complexity of
the positioning algorithm define the accuracy of the
estimated location.
• Depending on how the signal metrics are
utilized by the positioning algorithm, we can
identify three major families of localization
techniques
– Triangulation
– Scene analysis
– Proximity
Triangulation
• Triangulation methods are based on the
geometric properties of a triangle to estimate
the receiver’s location.
• Depending on the type of radio signal
measurements, they can be further
subdivided into
– Multilateration method
– angulation method
Multilateration positioning technique
Multilateration positioning technique
• In multilateration techniques, TOA, TDOA or RSS
measurements from multiple reference points are
converted into distance estimations with the help of a radio
propagation model.
• Examples of such positioning systems include GPS , the
cricket location system , and the SpotON ad hoc location.
• Models for indoor localization applications must, however,
account for the effects of harsh indoor wireless channel
behavior on the characteristics of the metrics at the
receiving side.
• These characteristics affect indoor localization applications
in ways that are very different from how they affect indoor
telecommunication applications.
Angulation positioning technique
Angulation positioning technique
• In angulation techniques, AOA measurements
with the help of specific antenna designs or
hardware equipment are used for inferring the
receiver’s position.
• The Ubisense [UBI] is an example of an AOA
based location sensing system.
• The increased complexity and the hardware
requirement are the main hindrances of such
systems.
Scene analysis
• Scene analysis or fingerprinting methods require an
offline phase for learning the radio characteristics in a
specific area under study.
• This signal information is then stored in a database
called Radio Map.
• During the online localization phase, the receiver’s
unknown location is inferred based on the similarity
between the Radio Map entries and real-time signal
measurements.
• The similarity in signal space can be based either on
pattern-matching techniques (deterministic schemes)
or on probability distributions (probabilistic schemes).
Scene analysis positioning technique
Scene analysis positioning technique
• Figure depicts the general mechanism of scene
analysis
• localization.
• RADAR , HORUS , COMPASS and WIFE are
fingerprinting localization approaches.
• The main limitation and weakness of scene
analysis methods is due to the frequent
environmental changes that cause inconsistency
of signal behavior between the training phase
and time of the actual location determination
phase.
Proximity
• Proximity methods are based on the detection
of objects with a known location.
• This can be done with the aid of sensors, such
as Touch MOUSE or based on topology and
connectivity information, such as in the active
badge location system , or finally with the aid
of an automatic identification system, such as
the credit card point of cell terminals.
• Such techniques are simple but usually suffer
from limited accuracy.
Proximity positioning technique
Mobility management
• Over recent years, we have witnessed an
increasing demand for wireless access to Internet
applications.
• This is due the remarkable success of wireless
networking, mobile computing and the growing
popularity of the Internet.
• Mobility is a requirement not appropriately
addressed by the Internet Protocol (IP), however,
which was originally designed for static, wired
networks.
Mobility management
• According to the IP, an IP address has two major
functionalities:
– To uniquely identify a particular terminal in the entire network
– For routing the traffic between two endpoints.
• The IP address is indicative of the IP sub network in which
the terminal resides.
• The problem arises when the terminal changes sub
networks due to the mobile node’s mobility.
• A mobile terminal needs to have a stable IP address in
order to be stably identifiable to other network nodes.
• It also needs a temporary IP address for routing purposes.
Mobility management
• The MIP protocol extends IP by allowing a
mobile node to effectively utilize two IP
addresses, one for identification and the other
for routing.
• While the mobile node changes its access
point to the network, handover (or handoff)
management enables the network to maintain
a mobile node’s connection.
Mobility management
• The latency delay during handover causes
interruption of the IP traffic, which may be
prohibitive for real time applications.
• In the following, a more detailed description
of both MIP and handover process is provided.
MIP
• The standardized mobility support in IP networks is MIP, an
IETF communication protocol that is designed to let mobile
nodes move from one network to another while
maintaining a permanent IP address.
• This is done through the interaction of a home agent and a
foreign agent.
• A mobile node is identified by its home address, regardless
of its current point of attachment to the network.
• While situated away from its home, the data packets
flowing from a corresponding node are transparently
routed via the home agent to a care of address that
represents its current location.
• The main issue when transmitting real time traffic is non-
synchronization of the handover process at the link and
network layers.
Link-layer handover
• A Layer 2 (L2) handover occurs because the mobile
node must
• establish a physical connection to a new access point.
• This is because, due to mobility, the RSS from the
mobile node’s current access point may decrease,
causing degradation of their communication.
• Even though several protocols have been proposed for
different wireless access technologies, we focus on the
IEEE 802.11 standard for its popularity and the
availability of numerical results regarding its latency
analysis; it is also the vector of wireless Internet today.
Link-layer handover
• According to its specifications, the handover
process follows three phases;
– the handover initiation
– the handover decision
– The handover execution
• It includes three main steps: discovery,
authentication and association, as illustrated
in Figure
Link-layer handover
Link-layer handover
• During the discovery phase, the mobile node
searches for an access point with a stronger
RSS to associate with.
• This is accomplished through a medium access
control (MAC) layer function, called scan.
• There are two modes of scanning:
– active
– passive
Link-layer handover
• In the passive mode the mobile node listens
for beacon messages (sent periodically by the
access points), on assigned channels.
• In the active mode, the mobile node sends in
additional PROBE broadcast packets on each
channel and receives probe responses from
access points.
Link-layer handover
• After scanning all channels, the mobile node
selects a target access point and enters the
authentication step, which includes the
transmission of the mobile node’s identity to
the access point and the access point’s
AUTHENTICATION RESPONSE.
• The L2 handover terminates upon the
reception of an ASSOCIATION RESPONSE
message.
Link-layer handover
• After scanning all channels, the mobile node
selects a target access point and enters the
authentication step, which includes the
transmission of the mobile node’s identity to
the access point and the access point’s
AUTHENTICATION RESPONSE.
• The L2 handover terminates upon the
reception of an ASSOCIATION RESPONSE
message.
Link-layer handover
• The L2 handover latency is mainly due to the
time needed for the discovery phase, since the
mobile node has to wait for PROBE RESPONSE
messages even if no access points are
operating on specific channels.
• According to the results in [MIS 03] the L2
handover latency is between 58.74 ms and
396.76 ms
Network-layer handover
• If a mobile node roams between two access
points of the same subnetwork, no routing
issues occur and its session is not interrupted,
since the mobile node keeps the same IP
address and is already authenticated.
• However, if the access points belong to
different IP subnetworks, the routing
subnetwork prefix changes and thus the IP
(L3) handover follows the L2 handover.
Network-layer handover
Network-layer handover
• It includes three stages:
– movement detection
– address configuration
– Binding update.
• The movement detection stage starts after a mobile
node has attached itself to the new network at the
physical and link layer (L2 handover).
• In this stage a mobile node detects that it has moved to
a new network, based on messages broadcasted by the
access routers access routes (ARs) in either a passive or
active mode.
Network-layer handover
• In the passive case, the access routers ARs are regularly
sending broadcast ROUTER ADVERTISEMENT messages that
contain their identity and their IP addresses.
• In the ACTIVE mode, the mobile node is sending in addition
ROUTER SOLICITATION requests to the ARs regularly in
order to discover new point of attachment to the network.
• The mobile node receives relevant information from the
network that will allow it to configure its new temporary
address, the care of address and other network settings.
• Finally, it sends a BINDING UPDATE to the home agent (HA)
in order to register its care of address with its permanent
address.
Network-layer handover
• The L3 handover latency is mainly due to the
time needed for the movement detection
phase, which depends on the frequency of the
ROUTER ADVERTISEMENT or ROUTER
SOLICITATION messages.
• Statistically, the longer the time between two
consecutive messages, the longer it takes the
movement detection to be completed.
Movement Detection Process
• Movement detection mechanisms may be broadly divided into
– advertisement based
– hint based.
• The advertisement based method relies on the periodic
broadcasting of AR advertisements that include mobility-related
information.
• CARD (candidate access router discovery) is process where an AR
access router announces its capabilities in broadcast messages.
• In such schemes, there is an inherent trade-off between the
bandwidth wasted by advertisements and the movement detection
performance.
• The higher the rate that periodic advertisements are broadcasted;
the more bandwidth is wasted by these messages.
Movement Detection Process
• Hint-based mechanisms attempt to deal with this
bandwidth wastage by relaying on hints or
triggers from lower layers.
• In fast MIP, it is assumed that at the mobile
node's terminal link layer triggers are sent to the
network layer so that the delay between the L2
handover and L3 handover are better
synchronized.
• By minimizing the L3 movement detection delay,
the mobile node can proactively proceed with its
mobility registration at the network level.
Handover Management
• In Handoff management a mobile device
keeps its connection active when it moves
from one cell to another cell.
• Depending on the broad category, handoffs
may be of two types:
1. Horizontal Handoff (Intra-System Handoff)
2. Vertical Handoff (Inter-System Handoff)
Handover Management
• Horizontal handoff:
– Handoffs in homogeneous networks are referred to as
Horizontal Handoff.
– This type of handoff occurs when the signal strength of the
serving BS goes below a certain threshold value.
– The reason for such handoff could be poor signal strength,
local interference, load balancing.
• Vertical Handoff:
– Inter-System Handoff or vertical handoff between two BSs,
belong to two different systems.
– The reason for such handoff could be poor signal strength,
local interference.
Localization and handover
management relying on RFID
RFID-enabled Localization
• The low cost of passive tags, the non-line-of-site
requirement, the fast reading of multiple tags,
and the relatively reduced sensitivity to user
orientation motivated to explore the potential of
RFID in solving both problems of indoor
localization and mobility management
improvement.
• Positioning schemes relying on RFID can follow
two basic procedures, depending on the type of
the RFID component supported by the target’s
device, i.e. tag or reader.
RFID-enabled Localization
• IoT service, mobile devices might be:
– Tagged with an RFID tag (e.g. passive);
– Carry RFID reader as with the near-field
communication technology
• Mobile node carrying an RFID reader will be more
expensive than a tag.
• Depending on the IoT service scenario as being
either a massive deployment of RFID tags or RFID
readers surrounding the mobile device.
• Again, deploying RFID readers will be more
expensive than deploying RFID tags (passive).
RFID-enabled Localization
• If the mobile nodes device is equipped with a tag, a
number of reference readers are placed in the area, any of
the general positioning techniques, i.e. triangulation, scene
analysis or proximity can be employed to estimate the
location of the mobile node.
• Many positioning systems follows this approach.
• If the user’s terminal is equipped with an RFID reader,
passive tags with known coordinates are deployed in the
area as reference tags and their IDs are associated with
their location information.
• For estimating the mobile node’s location, a proximity
technique is followed based on the location information
corresponding to the reference tags detected by the reader
embedded in the mobile node’s device.
RFID-enabled Localization
• Second type of positioning schemes are easier to
implement, since low-cost passive tags can be
deployed in a large extent in most indoor
environments; such as a smart floor tagged with
RFIDs.
• Additionally, it is anticipated that future mobile
terminals will have a reader extension capability
for gaining access to a wide range of innovative
applications and services supported by RFID
systems.
• There are already cell phones on the market that
are RFID tag reader enabled.
RFID-enabled movement detection
• There will be a massive deployment of reference passive
tags for the purpose of movement detection of a mobile
node whose terminal is reader enabled.
• One possible way for accomplishing this is by associating
the reference tag IDs with network topology information.
• For instance, each tag ID can be matched to its best point of
access according to certain criteria.
• Then, during the mobile node’s mobility, such topology-
related information corresponding to the reference tags ID
retrieved by its reader, can be used for detecting its
movement faster.
• This is because the tags are informing the mobile node
about the access points covering the area, and thus the
mobile node can also anticipate the handover and at the
same time select its next best point of access.
Technology Consideration
• Multiple Tags-to-reader Collisions
• Multiple Readers-to-tag Collision
• Reader-to-reader Collision
Multiple Tags-to-reader Collisions
• A tag collision occurs when more than one tag
attempts to transmit its ID at the same time,
the reader will receive a mixture of the tags’
signals and cannot understand it.
• This type of collision is shown in Figure.
Multiple Tags-to-reader Collisions
• Simultaneous responses from numerous tags
prevent the reader from correctly translating
the signal, which decreases throughput.
• No tag is aware of the activity of any other
tag, and so they cannot prevent the
simultaneous transmission of tags.
• To solve this problem, anti-collision protocols
are very influential.
Multiple Tags-to-reader Collisions -
Multi-access methods
• Each anti-collision protocol uses certain multi-
access methods for identification in order to
physically separate the transmitters’ signals.
• Accordingly, they can be categorized into four
different types:
– Space Division Multiple Access (SDMA)
– Frequency Division Multiple Access (FDMA)
– Code Division Multiple Access (CDMA)
– Time Division Multiple Access (TDMA)
Multiple Tags-to-reader Collisions -
Multi-access methods
Multiple Tags-to-reader Collisions -
Multi-access methods
• SDMA—
– The term space division multiple access relates to dividing of the
channel capacity into separate areas.
– Protocols based on this method can point the beam at different
areas in order to identify tags.
– The channel is spatially separated using complex directional
antennas.
• FDMA—
– Tags transmitting in one of several different frequency channels
requiring a complex receiver at the reader.
– Consequently, different frequency ranges can be used for
communication from and to the tags: from the reader to the
tags, 135 kHz, and from the tags to the reader, in the 433–435
MHz range.
Multiple Tags-to-reader Collisions -
Multi-access methods
• CDMA—
– Requires tags to multiply their ID by a pseudo-random sequence
(PN) before transmission.
– CDMA is quite good in many ways, such as the security of the
communications between the RFID tags and the reader, and
multiple tag identification.
• TDMA—
– Given that it is less expensive, this is the most widely used
method.
– This method involves the largest group of anti-collision
algorithms.
– The transmission channel is divided between the participants
and ensures that the reader can identify a tag at different times
in order to avoid interfering with another one.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Aloha-based Protocols
– Aloha-based protocols use a random-access strategy
in order to successfully identify the number of tags in
an interrogation.
– They belong to the group of probabilistic protocols
because the tags transmit their own ID in randomly
selected slots in a frame in order to reduce the
possibility of a collision.
– However, there is no guarantee that all of the tags will
be identified in the interrogation process.
– These protocols suffer from the well-known tag
starvation problem.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• The main Aloha-based protocols can be
divided into four subgroups:
– Pure Aloha (PA)
– Slotted Aloha (SA)
– Frame Slotted Aloha (FSA)
– Dynamic Frame Slotted Aloha (DFSA) protocols.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Pure Aloha (PA)
– Pure Aloha (PA) is one of the simplest anti-collision
protocols. It is based on TDMA.
– Whenever tags enter the interrogation zone, they
randomly choose a frequency on which to transmit
their data.
– A collision will occur if several tags transmit data at
the same time, resulting in complete or incomplete
collisions.
– A complete collision occurs when the messages of two
– tags fully collide; an incomplete collision, however,
takes place when only part of the tag message collides
with another tag message.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Slotted Aloha (SA)
– To avoid incomplete collisions, Slotted Aloha (SA)
has been created.
– In SA, the time is divided into several slots and
each tag must randomly select a slot in which it
will transmit its data.
– The communication between the reader and the
tag is now synchronous.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Framed Slotted Aloha (FSA)
– In Framed Slotted Aloha (FSA), the time is divided
into a variable number of frames and each frame
consists of several slots.
– All tags need to transmit data into a fixed length
frame, but each tag must choose only one slot in a
frame to transmit data.
– This protocol significantly reduces the probability
of collision since tags can only respond once in a
frame.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Framed Slotted Aloha (FSA)
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Dynamic Frame Slotted Aloha (DFSA) protocol
– Dynamic Frame Slotted Aloha (DFSA) protocol is
capable of changing frame size according to an
estimate of the number of tags.
– At the beginning of each frame, the reader informs
the
– tags of the frame length.
– Every tag selects a random number [0,F−1], where F
denotes the frame size and all tags respond within the
number of slots.
– At the end of the frame, the reader estimates the
number of colliding tags, then adjusts F accordingly.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Dynamic Frame Slotted Aloha (DFSA)
protocol
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Tree based Protocols:
– The query tree protocol (QT) is one of the most
representative memory less protocols, in which
the reader must provide the tags with a query and
the matching tags must respond with their full ID.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Tree based Protocols:
– Tag response depends directly on the current query, ignoring the prior
communication history.
– QT tags involve only simple hardware requirements because they only
compare the reader query with their own ID and respond if it coincides.
– The identification process consists of more rounds in which the reader sends a
query, and tags whose ID prefix match the current query respond with their
whole ID binary value.
– In the case of a collision, the reader forms two new queries by appending q
with a binary 0 or 1.
– New queries will be placed in a Last Input First Output stack (LIFO).
– If there is no response to a query, the reader knows that there is no tag with
the required prefix, and the query is rejected.
– This kind of slot is called idle. If just one tag responds to the reader query, that
tag will be identified.
– By extending the query prefixes until only one tag’s ID matches, the algorithm
can identify the rest of the tags.
– The identification procedure is completed when the LIFO stack is empty.
Multiple Tags-to-reader Collisions -
Anti-collision protocols
• Hybrid Protocols:
– Hybrid protocols combine the advantages of tree-based
and Aloha-based protocols to avoid their problems and
provide better features in tag identification.
– Most of them first implement a tree-based procedure and
tag estimation procedure in order to predict the number of
tags.
– Therefore, the combined Aloha-based and tree-based
protocol procedures are known for their high complexity
and hardware demands.
– This kind of protocol can significantly increase
performance as compared to the previous ones.
Multiple Readers-to-tag Collision
• Reader collision occurs when the reader
attempts to make communication with tags
that are in the coverage area of another
reader.
• This type of collision is shown in Figure.
• The transmissions of three tags, shown in
Figure, are not synchronized, but in many
cases, the reader is synchronized with at least
one tag in the interrogation zone.
Multiple Readers-to-tag Collision
Multiple Readers-to-tag Collision
• This collision causes two different problems:
1. Signal interference occurs when the fields of two
or more readers overlap and interfere.
• This problem can be solved by programming all readers
to read at fractionally different times.
2. Multiple reads of the same tag occur when the
same tag is read once by every overlapping
reader.
Multiple Readers-to-tag Collision
Multiple Readers-to-tag Collision
• A multiple readers-to-tag collision occurs
when a tag is located at the intersection of
two or more readers’ interrogation ranges and
the readers attempt to communicate with this
tag simultaneously.
• Let Ri and Rj denote the read ranges of readers
ri and rj with dij their distance.
• Apparently, if:
Ri+Rj > dij
Multiple Readers-to-tag Collision
• and ri and rj communicate at the same time,
they will collide and the tags in the common
area will not be detected.
• Figure depicts two readers, r1 and r2, which
simultaneously transmit query messages to a
tag t1 situated within their overlapping region.
• t1 might not be able to read the query
messages from r1 and r2 due to interference.
Reader-to-reader Collision
• Reader-to-reader interference is induced when a signal
from one reader reaches other readers.
• This can happen even if there is no intersection among
reader interrogation ranges but because a neighbor
reader’s strong signal interferes with the weak reflected
signal from a tag.
• Figure demonstrates an example of collision from reader r2
to reader r1 when the latter tries to retrieve data from tag
t1.
• Generally, the signal strength of a reader is superior to that
of a tag and therefore if the frequency channel occupied by
r2 is the same as that between t1 and r1, r1 is no longer
able to listen to t1’s response.
Reader-to-reader Collision
Reader-to-reader Collision
• Reader-to-reader interference affects the read
range parameter. However, when interfering
• readers exist, the actual interrogation range of
the desired reader decreases to a circular
region with radius R↓max↑I, which can be
represented by:
Reader-to-reader Collision
Why IPv6 suits IoT
• IPv6 is good for IoT and IoT is good for IPv6.
• There are several arguments and features that
demonstrate that IPv6 is actually a key communication
enabler for the future Internet of Things:
– Scalability:
• IPv6 offers a highly scalable address scheme.
• The present scheme of Internet Governance provides at most 2 x
1019 unique, globally routable, addresses.
• This is many orders of magnitude more than the 2 x 109 that is
possible with IPv4.
• It is quite sufficient to address the needs of any present and future
communicating device still allowing it to have many addresses.
Why IPv6 suits IoT
• Solving the NAT barrier:
– Due to the limits of the IPv4 address space, the current
Internet had to adopt a stopgap solution to face its
unplanned expansion: The Network Address
Translation(NAT).
– It enables several users and devices to share the same
public IP address. This solution is working but with two
main trades-off:
• The NAT users are borrowing and sharing IP addresses with others.
While this technique allows single stakeholders to mount large
applications, it becomes completely unmanageable if the same
end-points are to be used by many different stakeholders; this
would occur in an IoT deployment where the same sensors are to
be used by multiple, independent, stakeholders.
• Secondly the mechanism cannot be used to access specific end-
points from the Internet.
Why IPv6 suits IoT
• Multi-Stakeholder Support:
– IPv6 provides for end devices to have multiple addresses and an even
more distributed routing mechanism than the IPv4 Internet.
– This allows different stakeholders to assign IoT end-device addresses
that are consistent with their own application and network practices.
– Thus, multiple stakeholders can deploy their own applications, sharing
a common sensor/actuation infrastructure, without impacting the
technical operation or governance of the Internet.
– Many features have been built into the basic IPv6 specifications that
are very useful both for the operation and the deployment of IoT.
– These include multicast, anycast, mobility support, auto-configuration
and address scope.
– Over the last decade, many new higher-level protocols have been
developed that are both useful for IoT and are well-suited to devices
with constrained resources. Examples are 6LowPAN (wireless nets),
COAP (transport with web services) and DTLS (secured datagrams).
Why IPv6 suits IoT
• Tiny operating systems and network stacks:
– IPv6 application to the Internet of Things has been
researched for many years.
– The research community has developed several operating
systems like TinyOS and Contiki that are relatively small
and support the above protocol suites and environments.
– While the main IPv6 is very rich in possible features, these
reduced environments have often restricted carefully the
features available in order to meet IoT needs while
reducing the size of the underlying system and leaving
more space for applications.
– For example, a basic Contiki system takes less than
20KByte, and even one supporting a full IPv6 stack and the
other high-level protocols including DTLS can probably fit
into 70 Kbyte
Why IPv6 suits IoT
• Increased hardware support:
– The operating system and network stack (with
security) could be made much more compact by
providing more hardware support in the chipset
(or a co-processor).
– However, such initiatives would detract from the
efficient porting of the system to other chipsets. It
would be desirable to make such upgrades for
large deployments in commercial environments.
Why IPv6 suits IoT
• Mapping of physical systems onto IPv6 address and
Privacy extension:
– It is possible to map many features of the physical IoT
devices onto IPv6 addresses.
– This can ease large-scale deployments – though at the cost
of revealing to anyone interested architectural features of
the IoT devices because of the transparency of the Domain
Name Service entries.
– In contrast, IPv6 provides for privacy by automatically
randomizing the suffix of the IPv6 address to hide the MAC
address or any serial number used as identifier when
connecting to the Internet.
– This feature is made available on all operating systems
automatically.
Why IPv6 suits IoT
• Use of Identifiers and improved functionality:
– By the use of Identifiers in conjunction with IPv6, one
can take advantages of IPv6 features without their
drawbacks.
– For example, with systems like Handle the structure
can mirror the topology of a deployment, while the
security features of the identifier system preclude
unauthorized access to this information.
– At the same time IPv6 addresses can be attributes of
the Handle Identifiers, but use the privacy
enhancements at the same time.
Why IPv6 suits IoT
• Enabling the extension of the Internet to the web
of things:
– IPv6 enables the extension of the Internet to any
device and service.
– Experiments have demonstrated the successful use of
IPv6 addresses to large-scale deployments of sensors
in smart buildings, smart cities and even with cattle.
– Moreover, the CoAP protocol enables the constrained
devices to behave as web services easily accessible
and fully compliant with REST architecture.
Why IPv6 suits IoT
• Mobility:
– IPv6 provides strong features and solutions to
support mobility of end-nodes, as well as mobility
of the routing nodes of the network.
– The project has also achieved some interesting
results on including Mobile IP in the Contiki stack.
Why IPv6 suits IoT
• Address auto-configuration:
– IPv6 provides an address self-configuration
mechanism (Stateless mechanism).
– The nodes can define their addresses in very
autonomous manner.
– This enables drastic reduction of IoT configuration
effort and deployment cost.
– With an Identifier-based system like Handle, this
technique can be combined with automated
procedures to derive authentication tokens from the
device, and have access control features added.
Why IPv6 suits IoT
• Fully Internet compliant Gateways:
– IPv6 Gateways can be fully Internet compliant.
– In other words, it is possible to build a proprietary
network of smart things or to interconnect one’s
own smart things with the rest of the World via a
gateway that is fully compliant with IP
requirements towards the Internet.
Why IPv6 suits IoT
• Standardisation:
– Some of the IoT6 developments like GLowBALIP
and the Identifier system would benefit hugely if
their attributes were standardized in this context
much more rigidly for IoT.
– EC initiatives should support directly such
standardization – possibly in a Support Action.
Identifiers and Locators for IoT
• Things connected to the IoT need an address system
that can uniquely identify each one in the network;
therefore, devices are able to use internet protocol (IP)
addresses as their identifiers (IDs) and locators (LOCs)
to communicate with others and to bind a host and an
application in the network.
• This binding provides some advantages for a wired and
fixed network environment because the internet was
originally designed for a fixed environment.
• Although it is important to consider the mobility
function in today’s network environment, this binding
still has several drawbacks such as mobility, multi-
homing, and extensibility problems.
• The exponential increase of mobile devices
especially causes the difficulties of deployment
and addressing in networks.
• Additionally, it is hard to maintain the routing
table size of a default free zone (DFZ).
• Therefore, binding is not suitable for current
mobile-oriented network environments.
• To provide a mobility function with scalable
routing and addressing, the ID and LOC roles of IP
addresses need to be separated for the future
internet.
• Thus, ID–LOC separation protocols have been proposed. These
proposed protocols use two namespaces as ID and LOC, and they
are classified into two types:
– host-based protocols
– network-based protocols.
• Host-based protocols, such as host identity protocol (HIP) and
Shim6, require the modification of a protocol stack within the hosts
and a rendezvous server for maintaining ID and LOC mapping
information.
• Additionally, it has the problem of initial deployment in a network.
In contrast, network-based schemes do not modify hosts’ protocol
stack.
• The end nodes do not participate in any signaling procedure.
• The ID–LOC mapping is processed by other
network components such as routers, and they
forward packets using tunneling according to the
mapping information.
• The problems are bandwidth waste and
processing overhead on the network caused by
tunneling.
• Host-based and network-based protocols also
require a centralized ID–LOC mapping system
such as a rendezvous server and a map server.
• These problems cause the scalability problem.
Host-Based Identifier–Locator
Separation Schemes
• Host-based ID–LOC separation protocol (HIP),
introduced new namespaces for separating the ID
and LOC of a host.
• It suggests to add a host identity layer between
the IP layer and the transport layer.
• The host identity layer communicates with the
upper layer using a host ID as an identifier and a
lower layer using an IP address for the locator.
• This layer maintains the mapping information
between identifiers and locators.
Host-Based Identifier–Locator
Separation Schemes
• Shim6 protocol provides site multi homing by
Internet Protocol version 6 (IPv6) intermediation.
• It suggested a multi homing shim layer called
l3shim within the IP layer for the local agility with
failover capabilities.
• The basic concept of Shim6 is similar to HIP, but it
does not use a special namespace such as a host
ID and locator in HIP.
• A host of Shim6 allows for multiple IPv6 address
prefixes to continue existing communication.
Host-Based Identifier–Locator
Separation Schemes
• MOFI (Mobile Oriented Future Internet) also uses
a host ID (HID) for ID and an LOC for a locator.
• However, MOFI uses two kinds of LOCs as a
locally routable LOC that must only be locally
unique in an access network (A-LOC) and a LOC
that is used in the backbone network (B-LOC).
• Each access router (AR) within MOFI operates the
LOC translation between the ALOC and B-LOC.
• For the maintenance of HID–LOC mapping, the
AR includes a Local Mapping Controller (LMC)
with a hash table and HID–LOC register (HLR).
Host-Based Identifier–Locator
Separation Schemes
• The HID–LOC mapping information are
managed in ARs in a distributed manner.
• The weakness of host-based protocols is that
every host has to modify its protocol stack.
• It makes the deployment of hosts difficult in a
network.
• Additionally, they need a centralized mapping
server to the ID–LOC mapping, so it may cause
a single point of failure.
Network-Based Identifier–Locator
Separation Schemes
• Locator Identifier Separation Protocol (LISP) is a representative
network-based ID–LOC separation protocol.
• LISP enables the separation of IP addresses into two new
numbering spaces.
• One is the Endpoint Identifiers (EIDs) that are not globally routable,
and the other is Routing Locators (RLOCs) that are globally routable.
• Also, LISP defines an encapsulating mechanism for the LISP routers
to transmit packets using EIDs across a network infrastructure that
uses RLOCs.
• The routers are responsible to lookup the mapping between EIDs
and RLOCs. In LISP, packets to the destination through Ingress
Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs).
• ITRs and ETRs are used as tunnel start and end points.
Network-Based Identifier–Locator
Separation Schemes
• A DHT-based Identifier–Locator Mapping Scheme (DHT–MAP) was
proposed to resolve LOC for a flat ID.
• The authors used a DHT-based system, which is a modified version
of the Content Addressable Network (CAN) system.
• The CAN is a DHT-based network that uses to map “keys” onto
“values.”
• The network consists of a customer network for forwarding packets
and an overlay network using CAN for maintaining ID–LOC mapping.
• In this scheme, every Autonomous System (AS) maintains one or
more resolvers to store EID–LOC mapping.
• Network-based protocols, however, require the tunneling for
forwarding packets.
• Because the use of tunneling needs an encapsulation and a DE
capsulation mechanism for processing the packets, it consumes
more bandwidth and processing overhead.
Open Data Format (O-DF): Data
Format for IoT
• Standard Data formats required for:
– IoT data sources (devices, machines, server-based
systems, etc.) to be able to publish their available
data and provide access to it in an easy and secure
way
– Providing means to filter the available data
depending on identifier, context, etc. at the
receiver end or service side
Open Data Format (O-DF): Data
Format for IoT
• The O-DF can be used for publishing the
available data using ordinary URL (Uniform
Resource Locator) addresses.
• O-DF structures can also be used for
requesting and sending published data
between systems, notably when used
together with the Open Messaging Interface
(O-MI) standard.
Open Data Format (O-DF): Data
Format for IoT
• In the IoT, information about a product or a “Thing” is
often distributed over many different devices, systems,
and organizations.
• The O-DF is intended to represent information about
things in a standardized way that can be understood
and exchanged in a universal way by all information
systems that need to manage such IoT-related data.
• A data format structure typically does not contain
complete information about a particular thing.
• Information about the same thing may be contained in
several different data format structures.
Open Data Format (O-DF): Data
Format for IoT
• Object identifiers make it possible to link the data
about a single thing that may be located in different
information systems.
• An object identifier may be the only information that a
data format structure contains about a particular thing.
• The visibility and the access to data may depend on the
object identifier used, as well as on the identity of the
requesting party, as well as on the context of the
request.
• This is why the object identifier data structure is of
particular importance in any universal IoT standard.
Open Data Format (O-DF): Data
Format for IoT
• The O-DF is specified using XML Schema.
• It defines a simple and extensible ontology that
allows the creation of information structures that
are similar to those of objects and properties in
object-oriented programming.
• It is thereby generic enough for the
representation of any object and information that
is needed for information exchange in domains
such as the IoT, lifecycle information
management, etc.
Open Data Format (O-DF): Data
Format for IoT
• An O-DF structure is a hierarchy with an Objects element as
its top element, as shown in Illustration of O-DF Element
Hierarchy.
• The Objects element can contain any number of Object
sub-elements. Object elements are identified by at least
one id sub-element.
• An Object may also have an optional description sub-
element.
• Object elements usually have properties, which are sub-
elements called Info Item, as well as Object sub-elements.
• The resulting Object tree can contain any number of levels.
O-DF Objects provides detailed, normative descriptions of
these elements
Open Data Format (O-DF): Data
Format for IoT
Open Data Format (O-DF): Data
Format for IoT
• The O-DF is intended to be used for expressing information about
“any” identifiable object (products, services, humans, …).
• How the information is communicated is not a part of this standard.
• The communication media might be a file sent as an email
attachment, on a USB stick, or any other kind of media.
• O-DF content can also be sent using REST-based services, SOAP,
Java Message Service (JMS), the O-MI, and other kinds of
messaging protocols.
• The O-DF can be used as a query and response format in such
messaging; for instance, the O-MI specifies that a “read” request
with an O-DF structure should be responded to with the next level
in the hierarchy shown in the figure above.
• As an example, a request with only an “Objects” element should
return an O-DF response with the list of Object elements available,
including at least the compulsory attributes and sub-elements
(notably at least one id element).
SMART Tags in IoT (Examples)
• Staff Tracking
• Retail Industry
• Healthcare

Weitere ähnliche Inhalte

Was ist angesagt?

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMSuvendu Kumar Dash
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Robert Vivanco Salcedo
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)AWANISHKUMAR84
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...sam_tandon
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobileshome
 

Was ist angesagt? (20)

Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID
RFID RFID
RFID
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
Smart shopping cart (using RFID)
Smart shopping cart (using RFID)Smart shopping cart (using RFID)
Smart shopping cart (using RFID)
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Indoor Navigation
Indoor NavigationIndoor Navigation
Indoor Navigation
 
Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)Understand LPWA tetchnologies (Sigfox and LoRa)
Understand LPWA tetchnologies (Sigfox and LoRa)
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
Asset Tracking and Management using RFID for IT/Datacenters and Oil and Gas i...
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
Sniffer for detecting lost mobiles
Sniffer for detecting lost mobilesSniffer for detecting lost mobiles
Sniffer for detecting lost mobiles
 

Ähnlich wie IOE MODULE 5.pptx

Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning SystemsProjectENhANCE
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocationharisri269
 
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...Cynapsys It Hotspot
 
Mobile Mapping Technology and Applications.pdf
Mobile Mapping Technology and Applications.pdfMobile Mapping Technology and Applications.pdf
Mobile Mapping Technology and Applications.pdfsooryaK18
 
Indoor Mapping & Tracking
Indoor Mapping & TrackingIndoor Mapping & Tracking
Indoor Mapping & TrackingVimala Siravi
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesNavid Solhjoo
 
Evolution Of AGPS And E911
Evolution Of AGPS And E911Evolution Of AGPS And E911
Evolution Of AGPS And E911ronrulzzz
 
Location Based services
Location Based servicesLocation Based services
Location Based servicesFraj Alshahibi
 
Mobile applications chapter 6
Mobile applications chapter 6Mobile applications chapter 6
Mobile applications chapter 6Akib B. Momin
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Sanket Pawar
 
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSijitcs
 
Location Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsLocation Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsShu Wang
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
 
Location-based Technologies Explained
Location-based Technologies ExplainedLocation-based Technologies Explained
Location-based Technologies ExplainedTechAhead
 
Data management issues
Data management issuesData management issues
Data management issuesNeha Bansal
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationIJCERT
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesIOSR Journals
 

Ähnlich wie IOE MODULE 5.pptx (20)

Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning Systems
 
telenity
telenitytelenity
telenity
 
Lps
LpsLps
Lps
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
 
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...
Présentation noura baccar " Innovation on Indoor GeoLocalization Applications...
 
Mobile Mapping Technology and Applications.pdf
Mobile Mapping Technology and Applications.pdfMobile Mapping Technology and Applications.pdf
Mobile Mapping Technology and Applications.pdf
 
Indoor Mapping & Tracking
Indoor Mapping & TrackingIndoor Mapping & Tracking
Indoor Mapping & Tracking
 
Hybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_ServicesHybridised_Positioning_Algorithms_in_Location_Based_Services
Hybridised_Positioning_Algorithms_in_Location_Based_Services
 
Evolution Of AGPS And E911
Evolution Of AGPS And E911Evolution Of AGPS And E911
Evolution Of AGPS And E911
 
Location Based services
Location Based servicesLocation Based services
Location Based services
 
Mobile applications chapter 6
Mobile applications chapter 6Mobile applications chapter 6
Mobile applications chapter 6
 
Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.Tracking and positioning of mobile in telecommunications.
Tracking and positioning of mobile in telecommunications.
 
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMS
 
Location Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and StandardsLocation Based Services for Mobiles: Technologies and Standards
Location Based Services for Mobiles: Technologies and Standards
 
Location dependent query processing
Location dependent query processingLocation dependent query processing
Location dependent query processing
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
Location-based Technologies Explained
Location-based Technologies ExplainedLocation-based Technologies Explained
Location-based Technologies Explained
 
Data management issues
Data management issuesData management issues
Data management issues
 
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN NavigationAn Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
An Enhanced Predictive Proportion using TMP Algorithm in WSN Navigation
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization Techniques
 

Mehr von nikshaikh786

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxnikshaikh786
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptxnikshaikh786
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptxnikshaikh786
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptxnikshaikh786
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxnikshaikh786
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxnikshaikh786
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptxnikshaikh786
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...nikshaikh786
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxnikshaikh786
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxnikshaikh786
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptxnikshaikh786
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxnikshaikh786
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptxnikshaikh786
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptxnikshaikh786
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxnikshaikh786
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfnikshaikh786
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfnikshaikh786
 

Mehr von nikshaikh786 (20)

Module 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptxModule 2_ Divide and Conquer Approach.pptx
Module 2_ Divide and Conquer Approach.pptx
 
Module 1_ Introduction.pptx
Module 1_ Introduction.pptxModule 1_ Introduction.pptx
Module 1_ Introduction.pptx
 
Module 1_ Introduction to Mobile Computing.pptx
Module 1_  Introduction to Mobile Computing.pptxModule 1_  Introduction to Mobile Computing.pptx
Module 1_ Introduction to Mobile Computing.pptx
 
Module 2_ GSM Mobile services.pptx
Module 2_  GSM Mobile services.pptxModule 2_  GSM Mobile services.pptx
Module 2_ GSM Mobile services.pptx
 
MODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptxMODULE 4_ CLUSTERING.pptx
MODULE 4_ CLUSTERING.pptx
 
MODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptxMODULE 5 _ Mining frequent patterns and associations.pptx
MODULE 5 _ Mining frequent patterns and associations.pptx
 
DWM-MODULE 6.pdf
DWM-MODULE 6.pdfDWM-MODULE 6.pdf
DWM-MODULE 6.pdf
 
TCS MODULE 6.pdf
TCS MODULE 6.pdfTCS MODULE 6.pdf
TCS MODULE 6.pdf
 
Module 3_ Classification.pptx
Module 3_ Classification.pptxModule 3_ Classification.pptx
Module 3_ Classification.pptx
 
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
Module 2_ Introduction to Data Mining, Data Exploration and Data Pre-processi...
 
Module 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptxModule 1_Data Warehousing Fundamentals.pptx
Module 1_Data Warehousing Fundamentals.pptx
 
Module 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptxModule 2_ Cyber offenses & Cybercrime.pptx
Module 2_ Cyber offenses & Cybercrime.pptx
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
MODULE 5- EDA.pptx
MODULE 5- EDA.pptxMODULE 5- EDA.pptx
MODULE 5- EDA.pptx
 
MODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptxMODULE 4-Text Analytics.pptx
MODULE 4-Text Analytics.pptx
 
Module 3 - Time Series.pptx
Module 3 - Time Series.pptxModule 3 - Time Series.pptx
Module 3 - Time Series.pptx
 
Module 2_ Regression Models..pptx
Module 2_ Regression Models..pptxModule 2_ Regression Models..pptx
Module 2_ Regression Models..pptx
 
MODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptxMODULE 1_Introduction to Data analytics and life cycle..pptx
MODULE 1_Introduction to Data analytics and life cycle..pptx
 
MAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdfMAD&PWA VIVA QUESTIONS.pdf
MAD&PWA VIVA QUESTIONS.pdf
 
VIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdfVIVA QUESTIONS FOR DEVOPS.pdf
VIVA QUESTIONS FOR DEVOPS.pdf
 

Kürzlich hochgeladen

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Kürzlich hochgeladen (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

IOE MODULE 5.pptx

  • 1. MODULE 5: MOBILITY AND SETTINGS CO4. Analysis and evaluate protocols used in IOT. CO5. Design and develop smart city in IOT.
  • 2. CONTENTS • Introduction • Localization • Mobility management • Localization and handover management • Technology considerations • Performance evaluation • Simulation setup • Performance results • Identification of IOT (data formats. IPV6, identifiers and locators, tag etc.)
  • 3. INTRODUCTION • The significance of location awareness and the requirement for fast adaptation to frequent location changes due to mobility are critical issues that need to be addressed for the success of future ubiquitous and mobile networks. • Location information is important for enabling location-based services (LBS) in commercial, healthcare, public safety, and military domains. • Location awareness can be utilized for improving or enhancing network functionalities, such as mobility management for quality of service provisioning.
  • 4. INTRODUCTION • Localization and mobility management are two concepts that are tightly inter-connected. • The need to determine the unknown location of an entity stems from the mobility capability of this entity. • On the other hand, managing the issues raised due to mobility can be alleviated by the provision of location-related information.
  • 5. INTRODUCTION • While determining the location of objects in outdoor environments has been extensively studied and addressed with technologies such as GPS (global positioning system). • The localization problem for indoor radio propagation environments is recognized to be very challenging. This is mainly due to the presence of severe multipath and shadow fading
  • 6. INTRODUCTION • For mobility support over IP networks, mobile IP (MIP) is the most well-known protocol proposed by the Internet Engineering Task Force (IETF). • But, latency delays and losses in IP traffic due to the time needed to perform the handover process are its main limitations.
  • 7. LOCALIZATION • The localization problem is defined as the process of determining the current position of a mobile node or an object within a specific region, indoor or outdoor. • The position can be expressed in several ways, depending on the application requirements or the positioning system specifications. • For instance, absolute coordinates, relative or symbolic locations are possible formats. • Location information is important for enabling LBS in commercial, healthcare, public safety and military domains. Furthermore, location awareness can be utilized for improving or enhancing network functionalities, such as mobility management for quality of service provisioning.
  • 8. LOCALIZATION • Localization using radio signals has attracted considerable attention in the fields of telecommunications and navigation. • The most well-known positioning system is the GPS, which is satellite-based and is successful for tracking users in outdoor environments. • The inability of satellite signals to penetrate buildings can cause the complete failure of GPS in indoor environments. • For indoor location sensing, a number of wireless technologies have been proposed, such as infrared, ultrasound , WiFi and ultra-wide band. • However, the indoor radio propagation channel is characterized as site specific, exhibiting severe multipath effects and low probability of line-of-sight signal propagation between the transmitter and receiver, making accurate indoor positioning very challenging.
  • 9. LOCALIZATION • Localization techniques, in general, utilize metrics of the received radio signals (RRS). • The most traditional received signal metrics are based on angle of arrival (AOA), time of arrival (TOA), time difference of arrival (TDOA) measurements or RSS measurements from several reference points.
  • 10. General framework of RRS-based positioning
  • 11. General framework of RRS-based positioning • The general framework of an RSS-based positioning system is illustrated in Figure. • Radio signals transmitted by the fixed reference points (such as access points or base stations) and sensed/measured by the RRS-sensing devices of the receiver. • They are converted into location-related signal metrics, such as TOA, TDOA, AOA and RSS. • The reported signal metrics are then processed by the positioning algorithm for estimating the unknown location of the receiver, which is finally utilized by the application. • The accuracy of the signal metrics and the complexity of the positioning algorithm define the accuracy of the estimated location.
  • 12. • Depending on how the signal metrics are utilized by the positioning algorithm, we can identify three major families of localization techniques – Triangulation – Scene analysis – Proximity
  • 13. Triangulation • Triangulation methods are based on the geometric properties of a triangle to estimate the receiver’s location. • Depending on the type of radio signal measurements, they can be further subdivided into – Multilateration method – angulation method
  • 15. Multilateration positioning technique • In multilateration techniques, TOA, TDOA or RSS measurements from multiple reference points are converted into distance estimations with the help of a radio propagation model. • Examples of such positioning systems include GPS , the cricket location system , and the SpotON ad hoc location. • Models for indoor localization applications must, however, account for the effects of harsh indoor wireless channel behavior on the characteristics of the metrics at the receiving side. • These characteristics affect indoor localization applications in ways that are very different from how they affect indoor telecommunication applications.
  • 17. Angulation positioning technique • In angulation techniques, AOA measurements with the help of specific antenna designs or hardware equipment are used for inferring the receiver’s position. • The Ubisense [UBI] is an example of an AOA based location sensing system. • The increased complexity and the hardware requirement are the main hindrances of such systems.
  • 18. Scene analysis • Scene analysis or fingerprinting methods require an offline phase for learning the radio characteristics in a specific area under study. • This signal information is then stored in a database called Radio Map. • During the online localization phase, the receiver’s unknown location is inferred based on the similarity between the Radio Map entries and real-time signal measurements. • The similarity in signal space can be based either on pattern-matching techniques (deterministic schemes) or on probability distributions (probabilistic schemes).
  • 20. Scene analysis positioning technique • Figure depicts the general mechanism of scene analysis • localization. • RADAR , HORUS , COMPASS and WIFE are fingerprinting localization approaches. • The main limitation and weakness of scene analysis methods is due to the frequent environmental changes that cause inconsistency of signal behavior between the training phase and time of the actual location determination phase.
  • 21. Proximity • Proximity methods are based on the detection of objects with a known location. • This can be done with the aid of sensors, such as Touch MOUSE or based on topology and connectivity information, such as in the active badge location system , or finally with the aid of an automatic identification system, such as the credit card point of cell terminals. • Such techniques are simple but usually suffer from limited accuracy.
  • 23. Mobility management • Over recent years, we have witnessed an increasing demand for wireless access to Internet applications. • This is due the remarkable success of wireless networking, mobile computing and the growing popularity of the Internet. • Mobility is a requirement not appropriately addressed by the Internet Protocol (IP), however, which was originally designed for static, wired networks.
  • 24. Mobility management • According to the IP, an IP address has two major functionalities: – To uniquely identify a particular terminal in the entire network – For routing the traffic between two endpoints. • The IP address is indicative of the IP sub network in which the terminal resides. • The problem arises when the terminal changes sub networks due to the mobile node’s mobility. • A mobile terminal needs to have a stable IP address in order to be stably identifiable to other network nodes. • It also needs a temporary IP address for routing purposes.
  • 25. Mobility management • The MIP protocol extends IP by allowing a mobile node to effectively utilize two IP addresses, one for identification and the other for routing. • While the mobile node changes its access point to the network, handover (or handoff) management enables the network to maintain a mobile node’s connection.
  • 26. Mobility management • The latency delay during handover causes interruption of the IP traffic, which may be prohibitive for real time applications. • In the following, a more detailed description of both MIP and handover process is provided.
  • 27. MIP • The standardized mobility support in IP networks is MIP, an IETF communication protocol that is designed to let mobile nodes move from one network to another while maintaining a permanent IP address. • This is done through the interaction of a home agent and a foreign agent. • A mobile node is identified by its home address, regardless of its current point of attachment to the network. • While situated away from its home, the data packets flowing from a corresponding node are transparently routed via the home agent to a care of address that represents its current location. • The main issue when transmitting real time traffic is non- synchronization of the handover process at the link and network layers.
  • 28. Link-layer handover • A Layer 2 (L2) handover occurs because the mobile node must • establish a physical connection to a new access point. • This is because, due to mobility, the RSS from the mobile node’s current access point may decrease, causing degradation of their communication. • Even though several protocols have been proposed for different wireless access technologies, we focus on the IEEE 802.11 standard for its popularity and the availability of numerical results regarding its latency analysis; it is also the vector of wireless Internet today.
  • 29. Link-layer handover • According to its specifications, the handover process follows three phases; – the handover initiation – the handover decision – The handover execution • It includes three main steps: discovery, authentication and association, as illustrated in Figure
  • 31. Link-layer handover • During the discovery phase, the mobile node searches for an access point with a stronger RSS to associate with. • This is accomplished through a medium access control (MAC) layer function, called scan. • There are two modes of scanning: – active – passive
  • 32. Link-layer handover • In the passive mode the mobile node listens for beacon messages (sent periodically by the access points), on assigned channels. • In the active mode, the mobile node sends in additional PROBE broadcast packets on each channel and receives probe responses from access points.
  • 33. Link-layer handover • After scanning all channels, the mobile node selects a target access point and enters the authentication step, which includes the transmission of the mobile node’s identity to the access point and the access point’s AUTHENTICATION RESPONSE. • The L2 handover terminates upon the reception of an ASSOCIATION RESPONSE message.
  • 34. Link-layer handover • After scanning all channels, the mobile node selects a target access point and enters the authentication step, which includes the transmission of the mobile node’s identity to the access point and the access point’s AUTHENTICATION RESPONSE. • The L2 handover terminates upon the reception of an ASSOCIATION RESPONSE message.
  • 35. Link-layer handover • The L2 handover latency is mainly due to the time needed for the discovery phase, since the mobile node has to wait for PROBE RESPONSE messages even if no access points are operating on specific channels. • According to the results in [MIS 03] the L2 handover latency is between 58.74 ms and 396.76 ms
  • 36. Network-layer handover • If a mobile node roams between two access points of the same subnetwork, no routing issues occur and its session is not interrupted, since the mobile node keeps the same IP address and is already authenticated. • However, if the access points belong to different IP subnetworks, the routing subnetwork prefix changes and thus the IP (L3) handover follows the L2 handover.
  • 38. Network-layer handover • It includes three stages: – movement detection – address configuration – Binding update. • The movement detection stage starts after a mobile node has attached itself to the new network at the physical and link layer (L2 handover). • In this stage a mobile node detects that it has moved to a new network, based on messages broadcasted by the access routers access routes (ARs) in either a passive or active mode.
  • 39. Network-layer handover • In the passive case, the access routers ARs are regularly sending broadcast ROUTER ADVERTISEMENT messages that contain their identity and their IP addresses. • In the ACTIVE mode, the mobile node is sending in addition ROUTER SOLICITATION requests to the ARs regularly in order to discover new point of attachment to the network. • The mobile node receives relevant information from the network that will allow it to configure its new temporary address, the care of address and other network settings. • Finally, it sends a BINDING UPDATE to the home agent (HA) in order to register its care of address with its permanent address.
  • 40. Network-layer handover • The L3 handover latency is mainly due to the time needed for the movement detection phase, which depends on the frequency of the ROUTER ADVERTISEMENT or ROUTER SOLICITATION messages. • Statistically, the longer the time between two consecutive messages, the longer it takes the movement detection to be completed.
  • 41. Movement Detection Process • Movement detection mechanisms may be broadly divided into – advertisement based – hint based. • The advertisement based method relies on the periodic broadcasting of AR advertisements that include mobility-related information. • CARD (candidate access router discovery) is process where an AR access router announces its capabilities in broadcast messages. • In such schemes, there is an inherent trade-off between the bandwidth wasted by advertisements and the movement detection performance. • The higher the rate that periodic advertisements are broadcasted; the more bandwidth is wasted by these messages.
  • 42. Movement Detection Process • Hint-based mechanisms attempt to deal with this bandwidth wastage by relaying on hints or triggers from lower layers. • In fast MIP, it is assumed that at the mobile node's terminal link layer triggers are sent to the network layer so that the delay between the L2 handover and L3 handover are better synchronized. • By minimizing the L3 movement detection delay, the mobile node can proactively proceed with its mobility registration at the network level.
  • 43. Handover Management • In Handoff management a mobile device keeps its connection active when it moves from one cell to another cell. • Depending on the broad category, handoffs may be of two types: 1. Horizontal Handoff (Intra-System Handoff) 2. Vertical Handoff (Inter-System Handoff)
  • 44. Handover Management • Horizontal handoff: – Handoffs in homogeneous networks are referred to as Horizontal Handoff. – This type of handoff occurs when the signal strength of the serving BS goes below a certain threshold value. – The reason for such handoff could be poor signal strength, local interference, load balancing. • Vertical Handoff: – Inter-System Handoff or vertical handoff between two BSs, belong to two different systems. – The reason for such handoff could be poor signal strength, local interference.
  • 46. RFID-enabled Localization • The low cost of passive tags, the non-line-of-site requirement, the fast reading of multiple tags, and the relatively reduced sensitivity to user orientation motivated to explore the potential of RFID in solving both problems of indoor localization and mobility management improvement. • Positioning schemes relying on RFID can follow two basic procedures, depending on the type of the RFID component supported by the target’s device, i.e. tag or reader.
  • 47. RFID-enabled Localization • IoT service, mobile devices might be: – Tagged with an RFID tag (e.g. passive); – Carry RFID reader as with the near-field communication technology • Mobile node carrying an RFID reader will be more expensive than a tag. • Depending on the IoT service scenario as being either a massive deployment of RFID tags or RFID readers surrounding the mobile device. • Again, deploying RFID readers will be more expensive than deploying RFID tags (passive).
  • 48. RFID-enabled Localization • If the mobile nodes device is equipped with a tag, a number of reference readers are placed in the area, any of the general positioning techniques, i.e. triangulation, scene analysis or proximity can be employed to estimate the location of the mobile node. • Many positioning systems follows this approach. • If the user’s terminal is equipped with an RFID reader, passive tags with known coordinates are deployed in the area as reference tags and their IDs are associated with their location information. • For estimating the mobile node’s location, a proximity technique is followed based on the location information corresponding to the reference tags detected by the reader embedded in the mobile node’s device.
  • 49. RFID-enabled Localization • Second type of positioning schemes are easier to implement, since low-cost passive tags can be deployed in a large extent in most indoor environments; such as a smart floor tagged with RFIDs. • Additionally, it is anticipated that future mobile terminals will have a reader extension capability for gaining access to a wide range of innovative applications and services supported by RFID systems. • There are already cell phones on the market that are RFID tag reader enabled.
  • 50. RFID-enabled movement detection • There will be a massive deployment of reference passive tags for the purpose of movement detection of a mobile node whose terminal is reader enabled. • One possible way for accomplishing this is by associating the reference tag IDs with network topology information. • For instance, each tag ID can be matched to its best point of access according to certain criteria. • Then, during the mobile node’s mobility, such topology- related information corresponding to the reference tags ID retrieved by its reader, can be used for detecting its movement faster. • This is because the tags are informing the mobile node about the access points covering the area, and thus the mobile node can also anticipate the handover and at the same time select its next best point of access.
  • 51. Technology Consideration • Multiple Tags-to-reader Collisions • Multiple Readers-to-tag Collision • Reader-to-reader Collision
  • 52. Multiple Tags-to-reader Collisions • A tag collision occurs when more than one tag attempts to transmit its ID at the same time, the reader will receive a mixture of the tags’ signals and cannot understand it. • This type of collision is shown in Figure.
  • 53. Multiple Tags-to-reader Collisions • Simultaneous responses from numerous tags prevent the reader from correctly translating the signal, which decreases throughput. • No tag is aware of the activity of any other tag, and so they cannot prevent the simultaneous transmission of tags. • To solve this problem, anti-collision protocols are very influential.
  • 54. Multiple Tags-to-reader Collisions - Multi-access methods • Each anti-collision protocol uses certain multi- access methods for identification in order to physically separate the transmitters’ signals. • Accordingly, they can be categorized into four different types: – Space Division Multiple Access (SDMA) – Frequency Division Multiple Access (FDMA) – Code Division Multiple Access (CDMA) – Time Division Multiple Access (TDMA)
  • 55. Multiple Tags-to-reader Collisions - Multi-access methods
  • 56. Multiple Tags-to-reader Collisions - Multi-access methods • SDMA— – The term space division multiple access relates to dividing of the channel capacity into separate areas. – Protocols based on this method can point the beam at different areas in order to identify tags. – The channel is spatially separated using complex directional antennas. • FDMA— – Tags transmitting in one of several different frequency channels requiring a complex receiver at the reader. – Consequently, different frequency ranges can be used for communication from and to the tags: from the reader to the tags, 135 kHz, and from the tags to the reader, in the 433–435 MHz range.
  • 57. Multiple Tags-to-reader Collisions - Multi-access methods • CDMA— – Requires tags to multiply their ID by a pseudo-random sequence (PN) before transmission. – CDMA is quite good in many ways, such as the security of the communications between the RFID tags and the reader, and multiple tag identification. • TDMA— – Given that it is less expensive, this is the most widely used method. – This method involves the largest group of anti-collision algorithms. – The transmission channel is divided between the participants and ensures that the reader can identify a tag at different times in order to avoid interfering with another one.
  • 58. Multiple Tags-to-reader Collisions - Anti-collision protocols • Aloha-based Protocols – Aloha-based protocols use a random-access strategy in order to successfully identify the number of tags in an interrogation. – They belong to the group of probabilistic protocols because the tags transmit their own ID in randomly selected slots in a frame in order to reduce the possibility of a collision. – However, there is no guarantee that all of the tags will be identified in the interrogation process. – These protocols suffer from the well-known tag starvation problem.
  • 59. Multiple Tags-to-reader Collisions - Anti-collision protocols • The main Aloha-based protocols can be divided into four subgroups: – Pure Aloha (PA) – Slotted Aloha (SA) – Frame Slotted Aloha (FSA) – Dynamic Frame Slotted Aloha (DFSA) protocols.
  • 60. Multiple Tags-to-reader Collisions - Anti-collision protocols • Pure Aloha (PA) – Pure Aloha (PA) is one of the simplest anti-collision protocols. It is based on TDMA. – Whenever tags enter the interrogation zone, they randomly choose a frequency on which to transmit their data. – A collision will occur if several tags transmit data at the same time, resulting in complete or incomplete collisions. – A complete collision occurs when the messages of two – tags fully collide; an incomplete collision, however, takes place when only part of the tag message collides with another tag message.
  • 61. Multiple Tags-to-reader Collisions - Anti-collision protocols • Slotted Aloha (SA) – To avoid incomplete collisions, Slotted Aloha (SA) has been created. – In SA, the time is divided into several slots and each tag must randomly select a slot in which it will transmit its data. – The communication between the reader and the tag is now synchronous.
  • 62. Multiple Tags-to-reader Collisions - Anti-collision protocols • Framed Slotted Aloha (FSA) – In Framed Slotted Aloha (FSA), the time is divided into a variable number of frames and each frame consists of several slots. – All tags need to transmit data into a fixed length frame, but each tag must choose only one slot in a frame to transmit data. – This protocol significantly reduces the probability of collision since tags can only respond once in a frame.
  • 63. Multiple Tags-to-reader Collisions - Anti-collision protocols • Framed Slotted Aloha (FSA)
  • 64. Multiple Tags-to-reader Collisions - Anti-collision protocols • Dynamic Frame Slotted Aloha (DFSA) protocol – Dynamic Frame Slotted Aloha (DFSA) protocol is capable of changing frame size according to an estimate of the number of tags. – At the beginning of each frame, the reader informs the – tags of the frame length. – Every tag selects a random number [0,F−1], where F denotes the frame size and all tags respond within the number of slots. – At the end of the frame, the reader estimates the number of colliding tags, then adjusts F accordingly.
  • 65. Multiple Tags-to-reader Collisions - Anti-collision protocols • Dynamic Frame Slotted Aloha (DFSA) protocol
  • 66. Multiple Tags-to-reader Collisions - Anti-collision protocols • Tree based Protocols: – The query tree protocol (QT) is one of the most representative memory less protocols, in which the reader must provide the tags with a query and the matching tags must respond with their full ID.
  • 67. Multiple Tags-to-reader Collisions - Anti-collision protocols • Tree based Protocols: – Tag response depends directly on the current query, ignoring the prior communication history. – QT tags involve only simple hardware requirements because they only compare the reader query with their own ID and respond if it coincides. – The identification process consists of more rounds in which the reader sends a query, and tags whose ID prefix match the current query respond with their whole ID binary value. – In the case of a collision, the reader forms two new queries by appending q with a binary 0 or 1. – New queries will be placed in a Last Input First Output stack (LIFO). – If there is no response to a query, the reader knows that there is no tag with the required prefix, and the query is rejected. – This kind of slot is called idle. If just one tag responds to the reader query, that tag will be identified. – By extending the query prefixes until only one tag’s ID matches, the algorithm can identify the rest of the tags. – The identification procedure is completed when the LIFO stack is empty.
  • 68. Multiple Tags-to-reader Collisions - Anti-collision protocols • Hybrid Protocols: – Hybrid protocols combine the advantages of tree-based and Aloha-based protocols to avoid their problems and provide better features in tag identification. – Most of them first implement a tree-based procedure and tag estimation procedure in order to predict the number of tags. – Therefore, the combined Aloha-based and tree-based protocol procedures are known for their high complexity and hardware demands. – This kind of protocol can significantly increase performance as compared to the previous ones.
  • 69. Multiple Readers-to-tag Collision • Reader collision occurs when the reader attempts to make communication with tags that are in the coverage area of another reader. • This type of collision is shown in Figure. • The transmissions of three tags, shown in Figure, are not synchronized, but in many cases, the reader is synchronized with at least one tag in the interrogation zone.
  • 71. Multiple Readers-to-tag Collision • This collision causes two different problems: 1. Signal interference occurs when the fields of two or more readers overlap and interfere. • This problem can be solved by programming all readers to read at fractionally different times. 2. Multiple reads of the same tag occur when the same tag is read once by every overlapping reader.
  • 73. Multiple Readers-to-tag Collision • A multiple readers-to-tag collision occurs when a tag is located at the intersection of two or more readers’ interrogation ranges and the readers attempt to communicate with this tag simultaneously. • Let Ri and Rj denote the read ranges of readers ri and rj with dij their distance. • Apparently, if: Ri+Rj > dij
  • 74. Multiple Readers-to-tag Collision • and ri and rj communicate at the same time, they will collide and the tags in the common area will not be detected. • Figure depicts two readers, r1 and r2, which simultaneously transmit query messages to a tag t1 situated within their overlapping region. • t1 might not be able to read the query messages from r1 and r2 due to interference.
  • 75. Reader-to-reader Collision • Reader-to-reader interference is induced when a signal from one reader reaches other readers. • This can happen even if there is no intersection among reader interrogation ranges but because a neighbor reader’s strong signal interferes with the weak reflected signal from a tag. • Figure demonstrates an example of collision from reader r2 to reader r1 when the latter tries to retrieve data from tag t1. • Generally, the signal strength of a reader is superior to that of a tag and therefore if the frequency channel occupied by r2 is the same as that between t1 and r1, r1 is no longer able to listen to t1’s response.
  • 77. Reader-to-reader Collision • Reader-to-reader interference affects the read range parameter. However, when interfering • readers exist, the actual interrogation range of the desired reader decreases to a circular region with radius R↓max↑I, which can be represented by:
  • 79. Why IPv6 suits IoT • IPv6 is good for IoT and IoT is good for IPv6. • There are several arguments and features that demonstrate that IPv6 is actually a key communication enabler for the future Internet of Things: – Scalability: • IPv6 offers a highly scalable address scheme. • The present scheme of Internet Governance provides at most 2 x 1019 unique, globally routable, addresses. • This is many orders of magnitude more than the 2 x 109 that is possible with IPv4. • It is quite sufficient to address the needs of any present and future communicating device still allowing it to have many addresses.
  • 80. Why IPv6 suits IoT • Solving the NAT barrier: – Due to the limits of the IPv4 address space, the current Internet had to adopt a stopgap solution to face its unplanned expansion: The Network Address Translation(NAT). – It enables several users and devices to share the same public IP address. This solution is working but with two main trades-off: • The NAT users are borrowing and sharing IP addresses with others. While this technique allows single stakeholders to mount large applications, it becomes completely unmanageable if the same end-points are to be used by many different stakeholders; this would occur in an IoT deployment where the same sensors are to be used by multiple, independent, stakeholders. • Secondly the mechanism cannot be used to access specific end- points from the Internet.
  • 81. Why IPv6 suits IoT • Multi-Stakeholder Support: – IPv6 provides for end devices to have multiple addresses and an even more distributed routing mechanism than the IPv4 Internet. – This allows different stakeholders to assign IoT end-device addresses that are consistent with their own application and network practices. – Thus, multiple stakeholders can deploy their own applications, sharing a common sensor/actuation infrastructure, without impacting the technical operation or governance of the Internet. – Many features have been built into the basic IPv6 specifications that are very useful both for the operation and the deployment of IoT. – These include multicast, anycast, mobility support, auto-configuration and address scope. – Over the last decade, many new higher-level protocols have been developed that are both useful for IoT and are well-suited to devices with constrained resources. Examples are 6LowPAN (wireless nets), COAP (transport with web services) and DTLS (secured datagrams).
  • 82. Why IPv6 suits IoT • Tiny operating systems and network stacks: – IPv6 application to the Internet of Things has been researched for many years. – The research community has developed several operating systems like TinyOS and Contiki that are relatively small and support the above protocol suites and environments. – While the main IPv6 is very rich in possible features, these reduced environments have often restricted carefully the features available in order to meet IoT needs while reducing the size of the underlying system and leaving more space for applications. – For example, a basic Contiki system takes less than 20KByte, and even one supporting a full IPv6 stack and the other high-level protocols including DTLS can probably fit into 70 Kbyte
  • 83. Why IPv6 suits IoT • Increased hardware support: – The operating system and network stack (with security) could be made much more compact by providing more hardware support in the chipset (or a co-processor). – However, such initiatives would detract from the efficient porting of the system to other chipsets. It would be desirable to make such upgrades for large deployments in commercial environments.
  • 84. Why IPv6 suits IoT • Mapping of physical systems onto IPv6 address and Privacy extension: – It is possible to map many features of the physical IoT devices onto IPv6 addresses. – This can ease large-scale deployments – though at the cost of revealing to anyone interested architectural features of the IoT devices because of the transparency of the Domain Name Service entries. – In contrast, IPv6 provides for privacy by automatically randomizing the suffix of the IPv6 address to hide the MAC address or any serial number used as identifier when connecting to the Internet. – This feature is made available on all operating systems automatically.
  • 85. Why IPv6 suits IoT • Use of Identifiers and improved functionality: – By the use of Identifiers in conjunction with IPv6, one can take advantages of IPv6 features without their drawbacks. – For example, with systems like Handle the structure can mirror the topology of a deployment, while the security features of the identifier system preclude unauthorized access to this information. – At the same time IPv6 addresses can be attributes of the Handle Identifiers, but use the privacy enhancements at the same time.
  • 86. Why IPv6 suits IoT • Enabling the extension of the Internet to the web of things: – IPv6 enables the extension of the Internet to any device and service. – Experiments have demonstrated the successful use of IPv6 addresses to large-scale deployments of sensors in smart buildings, smart cities and even with cattle. – Moreover, the CoAP protocol enables the constrained devices to behave as web services easily accessible and fully compliant with REST architecture.
  • 87. Why IPv6 suits IoT • Mobility: – IPv6 provides strong features and solutions to support mobility of end-nodes, as well as mobility of the routing nodes of the network. – The project has also achieved some interesting results on including Mobile IP in the Contiki stack.
  • 88. Why IPv6 suits IoT • Address auto-configuration: – IPv6 provides an address self-configuration mechanism (Stateless mechanism). – The nodes can define their addresses in very autonomous manner. – This enables drastic reduction of IoT configuration effort and deployment cost. – With an Identifier-based system like Handle, this technique can be combined with automated procedures to derive authentication tokens from the device, and have access control features added.
  • 89. Why IPv6 suits IoT • Fully Internet compliant Gateways: – IPv6 Gateways can be fully Internet compliant. – In other words, it is possible to build a proprietary network of smart things or to interconnect one’s own smart things with the rest of the World via a gateway that is fully compliant with IP requirements towards the Internet.
  • 90. Why IPv6 suits IoT • Standardisation: – Some of the IoT6 developments like GLowBALIP and the Identifier system would benefit hugely if their attributes were standardized in this context much more rigidly for IoT. – EC initiatives should support directly such standardization – possibly in a Support Action.
  • 91. Identifiers and Locators for IoT • Things connected to the IoT need an address system that can uniquely identify each one in the network; therefore, devices are able to use internet protocol (IP) addresses as their identifiers (IDs) and locators (LOCs) to communicate with others and to bind a host and an application in the network. • This binding provides some advantages for a wired and fixed network environment because the internet was originally designed for a fixed environment. • Although it is important to consider the mobility function in today’s network environment, this binding still has several drawbacks such as mobility, multi- homing, and extensibility problems.
  • 92. • The exponential increase of mobile devices especially causes the difficulties of deployment and addressing in networks. • Additionally, it is hard to maintain the routing table size of a default free zone (DFZ). • Therefore, binding is not suitable for current mobile-oriented network environments. • To provide a mobility function with scalable routing and addressing, the ID and LOC roles of IP addresses need to be separated for the future internet.
  • 93. • Thus, ID–LOC separation protocols have been proposed. These proposed protocols use two namespaces as ID and LOC, and they are classified into two types: – host-based protocols – network-based protocols. • Host-based protocols, such as host identity protocol (HIP) and Shim6, require the modification of a protocol stack within the hosts and a rendezvous server for maintaining ID and LOC mapping information. • Additionally, it has the problem of initial deployment in a network. In contrast, network-based schemes do not modify hosts’ protocol stack. • The end nodes do not participate in any signaling procedure.
  • 94. • The ID–LOC mapping is processed by other network components such as routers, and they forward packets using tunneling according to the mapping information. • The problems are bandwidth waste and processing overhead on the network caused by tunneling. • Host-based and network-based protocols also require a centralized ID–LOC mapping system such as a rendezvous server and a map server. • These problems cause the scalability problem.
  • 95. Host-Based Identifier–Locator Separation Schemes • Host-based ID–LOC separation protocol (HIP), introduced new namespaces for separating the ID and LOC of a host. • It suggests to add a host identity layer between the IP layer and the transport layer. • The host identity layer communicates with the upper layer using a host ID as an identifier and a lower layer using an IP address for the locator. • This layer maintains the mapping information between identifiers and locators.
  • 96. Host-Based Identifier–Locator Separation Schemes • Shim6 protocol provides site multi homing by Internet Protocol version 6 (IPv6) intermediation. • It suggested a multi homing shim layer called l3shim within the IP layer for the local agility with failover capabilities. • The basic concept of Shim6 is similar to HIP, but it does not use a special namespace such as a host ID and locator in HIP. • A host of Shim6 allows for multiple IPv6 address prefixes to continue existing communication.
  • 97. Host-Based Identifier–Locator Separation Schemes • MOFI (Mobile Oriented Future Internet) also uses a host ID (HID) for ID and an LOC for a locator. • However, MOFI uses two kinds of LOCs as a locally routable LOC that must only be locally unique in an access network (A-LOC) and a LOC that is used in the backbone network (B-LOC). • Each access router (AR) within MOFI operates the LOC translation between the ALOC and B-LOC. • For the maintenance of HID–LOC mapping, the AR includes a Local Mapping Controller (LMC) with a hash table and HID–LOC register (HLR).
  • 98. Host-Based Identifier–Locator Separation Schemes • The HID–LOC mapping information are managed in ARs in a distributed manner. • The weakness of host-based protocols is that every host has to modify its protocol stack. • It makes the deployment of hosts difficult in a network. • Additionally, they need a centralized mapping server to the ID–LOC mapping, so it may cause a single point of failure.
  • 99. Network-Based Identifier–Locator Separation Schemes • Locator Identifier Separation Protocol (LISP) is a representative network-based ID–LOC separation protocol. • LISP enables the separation of IP addresses into two new numbering spaces. • One is the Endpoint Identifiers (EIDs) that are not globally routable, and the other is Routing Locators (RLOCs) that are globally routable. • Also, LISP defines an encapsulating mechanism for the LISP routers to transmit packets using EIDs across a network infrastructure that uses RLOCs. • The routers are responsible to lookup the mapping between EIDs and RLOCs. In LISP, packets to the destination through Ingress Tunnel Routers (ITRs) and Egress Tunnel Routers (ETRs). • ITRs and ETRs are used as tunnel start and end points.
  • 100. Network-Based Identifier–Locator Separation Schemes • A DHT-based Identifier–Locator Mapping Scheme (DHT–MAP) was proposed to resolve LOC for a flat ID. • The authors used a DHT-based system, which is a modified version of the Content Addressable Network (CAN) system. • The CAN is a DHT-based network that uses to map “keys” onto “values.” • The network consists of a customer network for forwarding packets and an overlay network using CAN for maintaining ID–LOC mapping. • In this scheme, every Autonomous System (AS) maintains one or more resolvers to store EID–LOC mapping. • Network-based protocols, however, require the tunneling for forwarding packets. • Because the use of tunneling needs an encapsulation and a DE capsulation mechanism for processing the packets, it consumes more bandwidth and processing overhead.
  • 101. Open Data Format (O-DF): Data Format for IoT • Standard Data formats required for: – IoT data sources (devices, machines, server-based systems, etc.) to be able to publish their available data and provide access to it in an easy and secure way – Providing means to filter the available data depending on identifier, context, etc. at the receiver end or service side
  • 102. Open Data Format (O-DF): Data Format for IoT • The O-DF can be used for publishing the available data using ordinary URL (Uniform Resource Locator) addresses. • O-DF structures can also be used for requesting and sending published data between systems, notably when used together with the Open Messaging Interface (O-MI) standard.
  • 103. Open Data Format (O-DF): Data Format for IoT • In the IoT, information about a product or a “Thing” is often distributed over many different devices, systems, and organizations. • The O-DF is intended to represent information about things in a standardized way that can be understood and exchanged in a universal way by all information systems that need to manage such IoT-related data. • A data format structure typically does not contain complete information about a particular thing. • Information about the same thing may be contained in several different data format structures.
  • 104. Open Data Format (O-DF): Data Format for IoT • Object identifiers make it possible to link the data about a single thing that may be located in different information systems. • An object identifier may be the only information that a data format structure contains about a particular thing. • The visibility and the access to data may depend on the object identifier used, as well as on the identity of the requesting party, as well as on the context of the request. • This is why the object identifier data structure is of particular importance in any universal IoT standard.
  • 105. Open Data Format (O-DF): Data Format for IoT • The O-DF is specified using XML Schema. • It defines a simple and extensible ontology that allows the creation of information structures that are similar to those of objects and properties in object-oriented programming. • It is thereby generic enough for the representation of any object and information that is needed for information exchange in domains such as the IoT, lifecycle information management, etc.
  • 106. Open Data Format (O-DF): Data Format for IoT • An O-DF structure is a hierarchy with an Objects element as its top element, as shown in Illustration of O-DF Element Hierarchy. • The Objects element can contain any number of Object sub-elements. Object elements are identified by at least one id sub-element. • An Object may also have an optional description sub- element. • Object elements usually have properties, which are sub- elements called Info Item, as well as Object sub-elements. • The resulting Object tree can contain any number of levels. O-DF Objects provides detailed, normative descriptions of these elements
  • 107. Open Data Format (O-DF): Data Format for IoT
  • 108. Open Data Format (O-DF): Data Format for IoT • The O-DF is intended to be used for expressing information about “any” identifiable object (products, services, humans, …). • How the information is communicated is not a part of this standard. • The communication media might be a file sent as an email attachment, on a USB stick, or any other kind of media. • O-DF content can also be sent using REST-based services, SOAP, Java Message Service (JMS), the O-MI, and other kinds of messaging protocols. • The O-DF can be used as a query and response format in such messaging; for instance, the O-MI specifies that a “read” request with an O-DF structure should be responded to with the next level in the hierarchy shown in the figure above. • As an example, a request with only an “Objects” element should return an O-DF response with the list of Object elements available, including at least the compulsory attributes and sub-elements (notably at least one id element).
  • 109. SMART Tags in IoT (Examples) • Staff Tracking • Retail Industry • Healthcare