SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Scalable IoT
Francis daCosta
Founder and CTO
www.meshdynamics.com
Author, Rethinking the Internet of Things
2
Simpler Devices Will Rule the IoT
Next wave of the Internet is Machines-to-Machines Ecosystems
Not (really) Resource Constrained
• Lots more Processor, Memory, Protocol stacks
• Human Oriented Consumption (external)
• Assumed often “Always On”
• Centrally-managed naming (MACID, et al)
Often Resource Constrained
• Often Limited or no processor, memory, etc.
• Consumption for local use (Internal)
• Many remote with Intermittent power
• Built by millions of manufacturers worldwide
… many cannot afford traditional IP protocol overhead
Man Oriented Ecosystem Machine Oriented Ecosystem
3
IoT Data Characteristics
Machine to Machine (M2M)
• Terse – not oriented to humans
• Repetitive
• Individual messages not critical
• Meaning comes from combination with other data sources:
“Small Data”
• Consumption and generation is mostly Local
• Usually unidirectional
• Self-classified: new concept, based on Nature
4
Scalable Communication Lesson from Nature: Pollen
Pollen propagates everywhere, but only specific receivers decode “message”
5
The “Lightness” and Elegance of Pollen
• Self-classified (by species)
• Extremely lightweight
• No inherent transport
mechanism
• Uni-directional
• Single-function
• Individual “message” not critical
• Receiver-oriented sensitivity
… these are the reasons that pollen scales
6
Public Section (mandatory) Private Section (optional)
Total chirp length with 2 Byte Public Field, 4 bit Marker, 1 Byte Payload = 5.0 bytes
5.0 Bytes with 1 Byte Payload
6.0 Bytes with 2 Byte Payload
7.0 Bytes with 3 Byte Payload
8.0 Bytes with 4 Byte Payload
04 22 243 06 02 255 03
12 22 243 16 23 255 4 251 6
Marker Pointer (4 bits) 8 bit Marker 4 bit Marker
Agent ID Agent ID
Self-Classification (Pollen-like) for IoT: “Chirps”
7
Public Section (mandatory) Private Section (optional)
DNA Pointer: 4 bytes, 8 bit Marker (1010)
12 22 243 16 23 255 4 251 6
Public Agent ID is 4.8.255 (4 byte Public, 8 bit Marker, DNA 255
(Subscribed) Agent states: Classification is 8.8.8.8 (1 byte each)
Decrypted Chirp Class: 4.8.22.243.16.23.
Its payload requires another Agent
Private Agent 1.4.6 (for 4.8.22.243.16.23) decodes value (251)
Chirp with public (open) payloads have shorter classifications
e.g. Chirp Class 4.8.22: Temp=243F Pressure=16psi Humidity=23%.
Enterprises define their (internal) classification schemes.
Discovery of “unknown” chirp classes detected, addressed in SIGs.
Distributed, organic growth of chirp classification taxonomy.
Security Must be Incremental
8
Self Classification Lesson from Nature: Birdsong
All birds derive some information, but only specific receivers fully participate
9
Home NetworkHome Network
Smoke Alarm
Ventilation
Lawn
Sprinkler

Local Weather Forecasts
Home “Health”
Advisor
Application
subscribes to
many data streams
Time of Day
Utility
Pricing
Known Publish/Subscribe Affinity (“Birdsong”)
10
Self-Classification Lesson from Nature: Pheromones
Underlying event not seen, but affinities are visible
11
Initial application:
air conditioning
control
Affinity by time-of-day correlation: elevator activity
Affinity by location: lighting control
Integrator function seeks additional
candidate data sources by affinities.
Builds more refined causal models.
Accelerate Learning through Affinities
Affinity by type of data: peak energy cost variations
Discovered Publish/Subscribe Affinity (“Pheromones”)
12
Topology Lesson from Nature: Trees
End devices don’t communicate with one another, so “tree” better than “web”
13
Emerging Tree Based IoT Architecture
End Devices
Propagator
Mesh Network
Filter
Gateway
Integrator
Function
Chirp Data Streams “Small” Data Flows “Big Data” Analysis
14
Scalability: Loading “Buses”
Chirps to-and-from end devices
Buses to/from
different
destinations
Propagator Node
Buses to/from
different
integrator
functions
Chirps
unloaded/
reloaded
Real Time Scheduling at Propagator Node
15
• Developed on Open Source platform: OpenWrt, et al
• Build structured trees among themselves
- Path discovery, routing, redundancy, fail-over
- Simplicity through “near-optimal” routing
• Manage multicast: pruning, forwarding, spoofing, etc.
• Optional integrated Publishing Agents participate in
publish/subscribe bus, machine learning
• Offer variety of end device interfaces: wired, wireless, optical, etc.
Propagator Nodes –Networking Capabilities
16
OEM Licensees for Propagator Nodes

Contenu connexe

Tendances

Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & EcosystemHarish Vadada
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of ThingsAngelo Corsaro
 
Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network usman sarwar
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesIván Alfonso
 
Research review of iot
Research review of iotResearch review of iot
Research review of iotAbdullah Aziz
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
LoRaWAN Deployment Models
LoRaWAN Deployment ModelsLoRaWAN Deployment Models
LoRaWAN Deployment ModelsJohan Stokking
 
The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016Johan Stokking
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)FabMinds
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LANABHIJEET SINGH
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
 
IoT RF Protocols
IoT RF ProtocolsIoT RF Protocols
IoT RF ProtocolsAPNIC
 

Tendances (20)

Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
IoT Standards & Ecosystem
IoT Standards & EcosystemIoT Standards & Ecosystem
IoT Standards & Ecosystem
 
Building the Internet of Things
Building the Internet of ThingsBuilding the Internet of Things
Building the Internet of Things
 
Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network Intel IPSO/6LoWPAN solution for general wireless sensor network
Intel IPSO/6LoWPAN solution for general wireless sensor network
 
Modeling self-adaptative IoT architectures
Modeling self-adaptative IoT architecturesModeling self-adaptative IoT architectures
Modeling self-adaptative IoT architectures
 
ioT-SecurityECC-v1
ioT-SecurityECC-v1ioT-SecurityECC-v1
ioT-SecurityECC-v1
 
IoT-SecurityECC-v4
IoT-SecurityECC-v4IoT-SecurityECC-v4
IoT-SecurityECC-v4
 
Research review of iot
Research review of iotResearch review of iot
Research review of iot
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
LoRaWAN Deployment Models
LoRaWAN Deployment ModelsLoRaWAN Deployment Models
LoRaWAN Deployment Models
 
Iot
IotIot
Iot
 
ioT_SDN
ioT_SDN ioT_SDN
ioT_SDN
 
The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)Technology Behind IoT (JNTUK - Unit - 1)
Technology Behind IoT (JNTUK - Unit - 1)
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
IoT RF Protocols
IoT RF ProtocolsIoT RF Protocols
IoT RF Protocols
 

Similaire à Scale-able Internet of Things (Presented June 12015)

Short Term Effects Of Cocaine Essay
Short Term Effects Of Cocaine EssayShort Term Effects Of Cocaine Essay
Short Term Effects Of Cocaine EssayMelissa Luster
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).BHAVIN GOSWAMI
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012Charith Perera
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Riscure
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.pptDetSersi
 
Expert System Full Details
Expert System Full DetailsExpert System Full Details
Expert System Full Detailsssbd6985
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsDr. Paolo Di Prodi
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)TusharSoam
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of thingsRehmat Ullah
 
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An Overview
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An OverviewFIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An Overview
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An OverviewFIWARE
 

Similaire à Scale-able Internet of Things (Presented June 12015) (20)

Short Term Effects Of Cocaine Essay
Short Term Effects Of Cocaine EssayShort Term Effects Of Cocaine Essay
Short Term Effects Of Cocaine Essay
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).
 
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
MobiDE’2012, Phoenix, AZ, United States, 20 May, 2012
 
The internet
The internetThe internet
The internet
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?
 
XG Firewall
XG FirewallXG Firewall
XG Firewall
 
honeypots.ppt
honeypots.ppthoneypots.ppt
honeypots.ppt
 
NZ Medical IT after 2014 - A little bit pregnant
NZ Medical IT after 2014 - A little bit pregnantNZ Medical IT after 2014 - A little bit pregnant
NZ Medical IT after 2014 - A little bit pregnant
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Bio-Graphy pitch
Bio-Graphy pitchBio-Graphy pitch
Bio-Graphy pitch
 
Expert System Full Details
Expert System Full DetailsExpert System Full Details
Expert System Full Details
 
Grid computing
Grid computingGrid computing
Grid computing
 
Brief Tour about Android Security
Brief Tour about Android SecurityBrief Tour about Android Security
Brief Tour about Android Security
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence Platforms
 
IoT (Internet of Things)
IoT (Internet of Things)IoT (Internet of Things)
IoT (Internet of Things)
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
Introduction to Internet of things
Introduction to Internet of thingsIntroduction to Internet of things
Introduction to Internet of things
 
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An Overview
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An OverviewFIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An Overview
FIWARE Global Summit - Connecting Sensors to FIWARE with IDAS: An Overview
 

Plus de MeshDynamics

Chirp_Primer_Slides:ULtra Low Power Edge Connectivity
Chirp_Primer_Slides:ULtra Low Power Edge ConnectivityChirp_Primer_Slides:ULtra Low Power Edge Connectivity
Chirp_Primer_Slides:ULtra Low Power Edge ConnectivityMeshDynamics
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
Francis da costa rethinks the internet of things zd_net
Francis da costa rethinks the internet of things   zd_netFrancis da costa rethinks the internet of things   zd_net
Francis da costa rethinks the internet of things zd_netMeshDynamics
 
Md4000 mesh suite-intro
Md4000 mesh suite-introMd4000 mesh suite-intro
Md4000 mesh suite-introMeshDynamics
 
Chirp Networks for Industrial Internet and Real time M2M
Chirp Networks for Industrial Internet and Real time M2MChirp Networks for Industrial Internet and Real time M2M
Chirp Networks for Industrial Internet and Real time M2MMeshDynamics
 
Strategies for IIOT and M2M Networking
Strategies for IIOT and M2M NetworkingStrategies for IIOT and M2M Networking
Strategies for IIOT and M2M NetworkingMeshDynamics
 
IOT Solutions and Challenges
IOT Solutions and ChallengesIOT Solutions and Challenges
IOT Solutions and ChallengesMeshDynamics
 
Towards Rapid Implementation of Adaptive Robotic Systems
Towards Rapid Implementation of Adaptive Robotic SystemsTowards Rapid Implementation of Adaptive Robotic Systems
Towards Rapid Implementation of Adaptive Robotic SystemsMeshDynamics
 
An Integrated Prototyping Environment For Programmable Automation
An Integrated Prototyping Environment For Programmable AutomationAn Integrated Prototyping Environment For Programmable Automation
An Integrated Prototyping Environment For Programmable AutomationMeshDynamics
 
The Abstracted Network for Industrial Internet- Slides
The Abstracted Network for Industrial Internet- SlidesThe Abstracted Network for Industrial Internet- Slides
The Abstracted Network for Industrial Internet- SlidesMeshDynamics
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetMeshDynamics
 
MeshDynamics P3M Persistent and Dynamic Mesh Networks
MeshDynamics P3M Persistent and Dynamic Mesh NetworksMeshDynamics P3M Persistent and Dynamic Mesh Networks
MeshDynamics P3M Persistent and Dynamic Mesh NetworksMeshDynamics
 
MeshDynamics Mesh Networks - Video Surveillance
MeshDynamics Mesh Networks - Video SurveillanceMeshDynamics Mesh Networks - Video Surveillance
MeshDynamics Mesh Networks - Video SurveillanceMeshDynamics
 
MeshDynamics MD4000 Mesh Network Products - Installation Guide
MeshDynamics MD4000 Mesh Network Products - Installation GuideMeshDynamics MD4000 Mesh Network Products - Installation Guide
MeshDynamics MD4000 Mesh Network Products - Installation GuideMeshDynamics
 
MeshDynamics MD4000 Mesh Network Deployment- Best Practices
MeshDynamics MD4000 Mesh Network Deployment- Best PracticesMeshDynamics MD4000 Mesh Network Deployment- Best Practices
MeshDynamics MD4000 Mesh Network Deployment- Best PracticesMeshDynamics
 
MeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level OverviewMeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level OverviewMeshDynamics
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]MeshDynamics
 
Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products MeshDynamics
 
Mesh Networks in Underground Mining [MeshDynamics]
Mesh Networks in Underground Mining [MeshDynamics]Mesh Networks in Underground Mining [MeshDynamics]
Mesh Networks in Underground Mining [MeshDynamics]MeshDynamics
 

Plus de MeshDynamics (20)

Chirp_Primer_Slides:ULtra Low Power Edge Connectivity
Chirp_Primer_Slides:ULtra Low Power Edge ConnectivityChirp_Primer_Slides:ULtra Low Power Edge Connectivity
Chirp_Primer_Slides:ULtra Low Power Edge Connectivity
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Francis da costa rethinks the internet of things zd_net
Francis da costa rethinks the internet of things   zd_netFrancis da costa rethinks the internet of things   zd_net
Francis da costa rethinks the internet of things zd_net
 
Md4000 mesh suite-intro
Md4000 mesh suite-introMd4000 mesh suite-intro
Md4000 mesh suite-intro
 
Chirp Networks for Industrial Internet and Real time M2M
Chirp Networks for Industrial Internet and Real time M2MChirp Networks for Industrial Internet and Real time M2M
Chirp Networks for Industrial Internet and Real time M2M
 
Strategies for IIOT and M2M Networking
Strategies for IIOT and M2M NetworkingStrategies for IIOT and M2M Networking
Strategies for IIOT and M2M Networking
 
IOT Solutions and Challenges
IOT Solutions and ChallengesIOT Solutions and Challenges
IOT Solutions and Challenges
 
Towards Rapid Implementation of Adaptive Robotic Systems
Towards Rapid Implementation of Adaptive Robotic SystemsTowards Rapid Implementation of Adaptive Robotic Systems
Towards Rapid Implementation of Adaptive Robotic Systems
 
An Integrated Prototyping Environment For Programmable Automation
An Integrated Prototyping Environment For Programmable AutomationAn Integrated Prototyping Environment For Programmable Automation
An Integrated Prototyping Environment For Programmable Automation
 
Chirp Networks
Chirp NetworksChirp Networks
Chirp Networks
 
The Abstracted Network for Industrial Internet- Slides
The Abstracted Network for Industrial Internet- SlidesThe Abstracted Network for Industrial Internet- Slides
The Abstracted Network for Industrial Internet- Slides
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
MeshDynamics P3M Persistent and Dynamic Mesh Networks
MeshDynamics P3M Persistent and Dynamic Mesh NetworksMeshDynamics P3M Persistent and Dynamic Mesh Networks
MeshDynamics P3M Persistent and Dynamic Mesh Networks
 
MeshDynamics Mesh Networks - Video Surveillance
MeshDynamics Mesh Networks - Video SurveillanceMeshDynamics Mesh Networks - Video Surveillance
MeshDynamics Mesh Networks - Video Surveillance
 
MeshDynamics MD4000 Mesh Network Products - Installation Guide
MeshDynamics MD4000 Mesh Network Products - Installation GuideMeshDynamics MD4000 Mesh Network Products - Installation Guide
MeshDynamics MD4000 Mesh Network Products - Installation Guide
 
MeshDynamics MD4000 Mesh Network Deployment- Best Practices
MeshDynamics MD4000 Mesh Network Deployment- Best PracticesMeshDynamics MD4000 Mesh Network Deployment- Best Practices
MeshDynamics MD4000 Mesh Network Deployment- Best Practices
 
MeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level OverviewMeshDynamics Mesh Networks- High Level Overview
MeshDynamics Mesh Networks- High Level Overview
 
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]Military, Defense and Public Safety Mesh Networks [MeshDynamics]
Military, Defense and Public Safety Mesh Networks [MeshDynamics]
 
Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products Battelle AoA Evaluation Report on Military Mesh Network Products
Battelle AoA Evaluation Report on Military Mesh Network Products
 
Mesh Networks in Underground Mining [MeshDynamics]
Mesh Networks in Underground Mining [MeshDynamics]Mesh Networks in Underground Mining [MeshDynamics]
Mesh Networks in Underground Mining [MeshDynamics]
 

Dernier

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 

Dernier (20)

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 

Scale-able Internet of Things (Presented June 12015)

  • 1. Scalable IoT Francis daCosta Founder and CTO www.meshdynamics.com Author, Rethinking the Internet of Things
  • 2. 2 Simpler Devices Will Rule the IoT Next wave of the Internet is Machines-to-Machines Ecosystems Not (really) Resource Constrained • Lots more Processor, Memory, Protocol stacks • Human Oriented Consumption (external) • Assumed often “Always On” • Centrally-managed naming (MACID, et al) Often Resource Constrained • Often Limited or no processor, memory, etc. • Consumption for local use (Internal) • Many remote with Intermittent power • Built by millions of manufacturers worldwide … many cannot afford traditional IP protocol overhead Man Oriented Ecosystem Machine Oriented Ecosystem
  • 3. 3 IoT Data Characteristics Machine to Machine (M2M) • Terse – not oriented to humans • Repetitive • Individual messages not critical • Meaning comes from combination with other data sources: “Small Data” • Consumption and generation is mostly Local • Usually unidirectional • Self-classified: new concept, based on Nature
  • 4. 4 Scalable Communication Lesson from Nature: Pollen Pollen propagates everywhere, but only specific receivers decode “message”
  • 5. 5 The “Lightness” and Elegance of Pollen • Self-classified (by species) • Extremely lightweight • No inherent transport mechanism • Uni-directional • Single-function • Individual “message” not critical • Receiver-oriented sensitivity … these are the reasons that pollen scales
  • 6. 6 Public Section (mandatory) Private Section (optional) Total chirp length with 2 Byte Public Field, 4 bit Marker, 1 Byte Payload = 5.0 bytes 5.0 Bytes with 1 Byte Payload 6.0 Bytes with 2 Byte Payload 7.0 Bytes with 3 Byte Payload 8.0 Bytes with 4 Byte Payload 04 22 243 06 02 255 03 12 22 243 16 23 255 4 251 6 Marker Pointer (4 bits) 8 bit Marker 4 bit Marker Agent ID Agent ID Self-Classification (Pollen-like) for IoT: “Chirps”
  • 7. 7 Public Section (mandatory) Private Section (optional) DNA Pointer: 4 bytes, 8 bit Marker (1010) 12 22 243 16 23 255 4 251 6 Public Agent ID is 4.8.255 (4 byte Public, 8 bit Marker, DNA 255 (Subscribed) Agent states: Classification is 8.8.8.8 (1 byte each) Decrypted Chirp Class: 4.8.22.243.16.23. Its payload requires another Agent Private Agent 1.4.6 (for 4.8.22.243.16.23) decodes value (251) Chirp with public (open) payloads have shorter classifications e.g. Chirp Class 4.8.22: Temp=243F Pressure=16psi Humidity=23%. Enterprises define their (internal) classification schemes. Discovery of “unknown” chirp classes detected, addressed in SIGs. Distributed, organic growth of chirp classification taxonomy. Security Must be Incremental
  • 8. 8 Self Classification Lesson from Nature: Birdsong All birds derive some information, but only specific receivers fully participate
  • 9. 9 Home NetworkHome Network Smoke Alarm Ventilation Lawn Sprinkler  Local Weather Forecasts Home “Health” Advisor Application subscribes to many data streams Time of Day Utility Pricing Known Publish/Subscribe Affinity (“Birdsong”)
  • 10. 10 Self-Classification Lesson from Nature: Pheromones Underlying event not seen, but affinities are visible
  • 11. 11 Initial application: air conditioning control Affinity by time-of-day correlation: elevator activity Affinity by location: lighting control Integrator function seeks additional candidate data sources by affinities. Builds more refined causal models. Accelerate Learning through Affinities Affinity by type of data: peak energy cost variations Discovered Publish/Subscribe Affinity (“Pheromones”)
  • 12. 12 Topology Lesson from Nature: Trees End devices don’t communicate with one another, so “tree” better than “web”
  • 13. 13 Emerging Tree Based IoT Architecture End Devices Propagator Mesh Network Filter Gateway Integrator Function Chirp Data Streams “Small” Data Flows “Big Data” Analysis
  • 14. 14 Scalability: Loading “Buses” Chirps to-and-from end devices Buses to/from different destinations Propagator Node Buses to/from different integrator functions Chirps unloaded/ reloaded Real Time Scheduling at Propagator Node
  • 15. 15 • Developed on Open Source platform: OpenWrt, et al • Build structured trees among themselves - Path discovery, routing, redundancy, fail-over - Simplicity through “near-optimal” routing • Manage multicast: pruning, forwarding, spoofing, etc. • Optional integrated Publishing Agents participate in publish/subscribe bus, machine learning • Offer variety of end device interfaces: wired, wireless, optical, etc. Propagator Nodes –Networking Capabilities
  • 16. 16 OEM Licensees for Propagator Nodes