SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
Networking Protocols for
Internet of Things

.

Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
Jain@cse.wustl.edu
These slides and audio/video recordings of this class lecture are at:
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-1

©2013 Raj Jain
Overview




6LowPAN
 Adaptation Layer
 Address Formation
 Compression
RPL
 RPL Concepts
 RPL Control Messages
 RPL Data Forwarding
Note: This is part 2 of a series of class lectures on IoT.
MQTT is covered in other parts.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-2

©2013 Raj Jain
IEEE 802.15.4








Wireless Personal Area Network (WPAN)
Allows mesh networking.
Full function nodes can forward packets to other nodes.
A PAN coordinator (like WiFi Access Point) allows nodes to
join the network.
Nodes have 64-bit addresses
Coordinator assigns 16-bit short address for use during the
association
Maximum frame size is 127 bytes
More details in CSE 574 wireless networking course
http://www.cse.wustl.edu/~jain/cse574-10/index.html

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-3

©2013 Raj Jain
6LowPAN




IPv6 over Low Power Wireless
Personal Area Networks (6LowPAN)
To compress IPv6 header for low power IoT devices
Issues:
 Maximum Transmission Unit (MTU) at least 1280 bytes
IEEE 802.15.4 standard packet size is 127 bytes
802.15.4 Header Security Option Payload
25B

21B

81B



Address Resolution: 128b or 16B IPv6 addresses.802.15.4
devices use 64 bit (no network prefix) or 16 bit addresses
Optional mesh routing in datalink layer.
 Need destination and intermediate addresses.
MAC-level retransmissions versus end-to-end



Similar issues apply to power line and fieldbus




Ref: G. Montenegro, et al., “Transmission of IPv6 Packets over IEEE 802.15.4 Networks,” RFC 4944, Sep 2007, http://tools.ietf.org/pdf/rfc4944

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-4

©2013 Raj Jain
6LowPAN Adaptation Layer







Optional hop-by-hop ack feature of 15.4 is used but the max
number of retransmissions is kept low (to avoid overlapping
L2 and L4 retransmissions)
IPv6 Extension Headers: 8b or less dispatch  header type
1. Mesh addressing header (2-bit dispatch=10)
2. Hop-by-hop LowPAN Broadcast header (8-bit
dispatch=01010000)
3. Destination Processing Fragment header
(5-bit dispatch=11100 or 11101)
IPv6 address formation
IPv6 and UDP compression headers

Frame Seq.
Control #
2B

1B

Adrs

[Security]

Disp

bits
0-20B

Ext
Hdr

Disp
bits

Ext
Hdr

Disp

bits

Ext
Hdr

IPv6
Payload

0-21B

Ref: O. Hersent, et al., “The Internet of Things: Key Applications and Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book)

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-5

©2013 Raj Jain
Mesh Addressing Header





Dispatch = 10 (2 bits)  Mesh Addressing Header
MAC header contains per-hop source and destination
Original source and destination addresses are saved in Mesh
addressing header
A 4-bit hops-left field is decremented at each hop
Originator

P1

Dispatch V F Hops
10
Left
2b

1b 1b

4b

P2

P3

Final

Originator Final
Address
Address
16b/64b

16b/64bit

F=0  Final address is EUI64, F=1  16-bit
V=0  Originator address is EUI64, V=1  16bit
Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-6

©2013 Raj Jain
6LowPAN Broadcast Header



For Mesh broadcast/multicast
A new sequence number is put in every broadcast message by
the originator
Dispatch Sequence
01010000 Number
8b
8b

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-7

©2013 Raj Jain
6LowPAN Fragment Header





Dispatch = 11x00 (5 bits)  Fragment Header
Full packet size in the first fragment’s fragment header
Datagram tag = sequence number
 Fragments of the same packet
Fragment Offset in multiples of 8 bytes
1st Fragment:

11000

IP Pkt Size

5b

11b

Other Fragments:

11100

IP Pkt Size

5b

11b

Washington University in St. Louis

Datagram tag

Payload

16b

Datagram tag
16b

Datagram Offset
8b

http://www.cse.wustl.edu/~jain/cse570-13/

19-8

Payload

©2013 Raj Jain
Address Formation


Ethernet addresses: 48 bit MAC
Unicast
Universal Organizationally Manufacturer
Multicast Local
Unique ID (OUI) Assigned
1b



1b

22b

24b

IEEE 802.15.4 Addresses: 64 bit Extended Unique Id (EUI)
Unicast
Universal Organizationally Manufacturer
Multicast Local
Unique ID (OUI) Assigned
1b





1b

22b

40b

Local bit was incorrectly assigned. L=1  Local
but all-broadcast address = all 1’s is not local
IETF RFC4291 changed the meaning so that L=0  Local
The 2nd bit is now called Universal bit (U-bit)
 U-bit formatted EUI64 addresses
Link-Local IPv6 address = FE80::U-bit formatted EUI64

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-9

©2013 Raj Jain
Address Formation (Cont)






Example:
 EUI64 Local Address = 40::1 = 0100 0000::0000 0001
 U-bit formatted EUI64 = 0::1
 IPv6 Link-local address = FE80::1 = 1111 1110 1000
0000::1
IEEE 802.15.4 allows nodes to have 16-bit short addresses
and each PAN has a 16-bit PAN ID.
1st bit of Short address and PAN ID is Unicast/Multicast
The 2nd bit of Short Address and PAN ID is Universal/Local.
You can broadcast to all members of a PAN or to all PANs.
IPv6 Link Local Address = FE80 :: PAN ID : Short Address
Use 0 if PAN ID is unknown.
2nd bit of PAN ID should always be zero since it is always
local.
(2nd most significant = 6th bit from right)

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-10

©2013 Raj Jain
Stateless Compression






Called HC1-HC2 compression (not recommended)
IP version field is omitted
Flow label field if zero is omitted and C=1
Only 4b UDP ports are sent if between 61616-61631 (F0Bx)
UDP length field is omitted
HC1 Header

HC2 Header

Dispatch
SA
DA
C
01000010 Encoding Encoding

00
01
10
11

NH 0 S D L Uncompressed
Fields

Prefix
IID
Uncompressed
Uncompressed
Uncompressed
Derived from L2
FE80::/80 omitted Uncompressed
FE80::/64 omitted Derived from L2

Washington University in St. Louis

00
01
10
11

UDP Length omitted
UDP Dest Port 61616-61631
UDP Src Port 61616-61631
Next Hdr inline
Next Hdr= 17 (UDP)
Next Hdr = 1 (ICMP)
Next Hdr = 6 (TCP)

http://www.cse.wustl.edu/~jain/cse570-13/

19-11

©2013 Raj Jain
Context Based Compression




HC1 works only with link-local addresses
Need globally routable IPv6 addresses for outside nodes
IPHC uses a 3b dispatch code and a 13-bit base header

Disp TF NH Hop CID SAC SAM M DAC DAM SCI DCI Uncompressed
IPv6 fields
011
Limit
3b

00
01
10
11

2b

1b

2b

1b

1b

2b 1b
1b
2b
4b
4b
Source Adr Mode Source/Dest Context IDs if CID=1
Next Header
Source Adr Compression Multicast Destination
uses
Predefined hop limit = SAC SAM Address
LowPAN_NHC uncompressed (00),
DAC DAM
1, 64, 255
0
00
No compression
0
01
First 64-bits omitted
ECN+DSCP+4b pad+
0
10
First 112 bits omitted
20b Flow label (4 Bytes)
0
11
128 bits omitted. Get from L2
ECN +2b pad + 12b Flow
1
00
Unspecified Address ::
label (2 Bytes), DSCP omitted
1
01
First 64 bits from context
ECN+DSCP (1B), Flow label omitted
1
10
First 112 bits from context
ECN+DSCP+Flow label omitted
1
11
128 bits from context and L2

Ref: O. Hersent, et al., “The Internet of Things: Key Applications and Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book)

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-12

©2013 Raj Jain
Context Based Compression (Cont)


If the next header uses LowPAN_NHC
 For IPv6 base extension headers:
1110 IPv6 Ext Hdr ID NH Uncompressed Next
(EID)
Fields
Hdr
4b

EID
0
1
2
3
4
5
6
7

Header
IPv6 Hop-by-Hop Options
IPv6 Routing
IPv6 Fragment
IPv6 Destination Options
IPv6 Mobility Header
Reserved
Reserved
IPv6 Header

3b

1b

0 = Uncompressed
1 = LowPAN_NHC encoded
LowPAN_NHC UDP Header:
11110 C P
5b

1b 2b

Checksum omitted

00
01
10
11

All 16-bits in line
1st 8-bits of dest port omitted
1st 8-bits of src port omitted
1st 12-bits of src & dest omitted

Ref: J. Hui and P. Thubert, “Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks,” IETF RFC 6282,
Sep 2011, http://tools.ietf.org/pdf/rfc6282
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis
©2013 Raj Jain

19-13
6LowPAN: Summary





3 New Headers:
 Mesh addressing: Intermediate addresses
 Hop-by-Hop: Mesh broadcasts
 Destination processing: Fragmentation
Address Formation: 128-bit addresses by prefixing FE80::
Header compression:
 HC1+HC2 header for link-local IPv6 addresses
 IPHC compression for all IPv6 addresses

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-14

©2013 Raj Jain
Routing Protocol for Low-Power and Lossy
Networks (RPL)









Developed by IETF Routing over Low-Power and Lossy
Networks (ROLL) working group
Low-Power and Lossy Networks (LLN) Routers have
constraints on processing, memory, and energy.
 Can’t use OSPF, OLSR, RIP, AODV, DSR, etc
LLN links have high loss rate, low data rates, and instability
 expensive bits, dynamically formed topology
Covers both wireless and wired networks
Requires bidirectional links. May be symmetric/asymmetric.
Ideal for n-to-1 (data sink) communications,
e.g., meter reading
1-to-n and 1-to-1 possible with some extra work.
Multiple LLN instances on the same physical networks

Ref: T. Winder, Ed., et al., "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks," IETF RFC 6550, Mar 2012,
https://ietf.org/doc/rfc6550/
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis
©2013 Raj Jain

19-15
RPL Concepts
Directed Acyclic Graph (DAG): No cycles
DAG
 Root: No outgoing edge
 Destination-Oriented DAG (DODAG): Single
root
 Up: Towards root
 Down: Away from root
DODAG
 Objective Function: Minimize energy, latency, …
Root
 Rank: Distance from root using specified objective
Rank=1
 RPL Instance: One or more DODAGs.
A node may belong to multiple RPL instances.Rank=2
Up
 DODAG ID: IPv6 Adr of the root
One RPL
 DODAG Version: Current version of the
Instance
DODAG. Every time a new DODAG is
computed with the same root, its version
incremented.
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis
©2013 Raj Jain


19-16
RPL Concepts (Cont)








Goal: Reachability goal, e.g., connected to
database
Grounded: Root can satisfy the goal
Floating: Not grounded. Only in-DODAG
communication.
Parent: Immediate successor towards the root
Sub-DODAG: Sub tree rooted at this node
Storing: Nodes keep routing tables for subDODAG
Non-Storing: Nodes know only parent.
Do not keep a routing table.

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-17

©2013 Raj Jain
RPL Control Messages
1.

2.

3.

4.
5.

DODAG Information Object (DIO):
 Downward RPL instance multicasts
 Allows other nodes to discover an RPL
instance and join it
DODAG Information Solicitation (DIS):
 Link-Local multicast request for DIO
(neighbor discovery).
Do you know of any DODAGs?
Destination Advertisement Object (DAO):
 From child to parents or root.
 Can I join you as a child on DODAG #x?
DAO Ack: Yes, you can! Or Sorry, you cant!
Consistency Check: Challenge/response
messages for security

Ref: S. Kuryla, “RPL:IPv6 Routing Protocol for Low Power and Lossy Networks,”
http://cnds.eecs.jacobs-university.de/courses/nds-2010/kuryla-rpl.pdf
http://www.cse.wustl.edu/~jain/cse570-13/
Washington University in St. Louis

19-18

DIS
New
New

Old
DIS

DIO
DAO
DAO-Ack

©2013 Raj Jain
DODAG Formation Example
1.
2.

3.
4.
5.
6.
7.
8.
9.

A multicasts DIOs that it’s member of
DODAG ID itself with Rank 0.
B, C, D, E hear and determine that
their rank (distance) is 1, 1, 3, 4,
respectively from A
B, C, D, E send DAOs to A.
A accepts all
B and C multicast DIOs
D hears those and determines that its
distance from B and C is 1, 2
E hears both B, C and determines that
its distance from B and C is 2, 1
D sends a DAO to B
E sends a DAO to C
B sends a DAO-Ack to D
C sends a DAO-Ack to E

Washington University in St. Louis

1 A

1
B

3

1
4

DIO
E
D

C

B

E

D
A

C
B
DAO-Ack Rank 1
E
D
D

C
E

Rank 3

A

5
B
1

D

9

C
E

B

1

8

DAO
E DAO
D
A

DAO-Ack

D

Rank 4

C

A
B

Rank 1

A

DIO
2

3

DAO C

B

A

4

E

http://www.cse.wustl.edu/~jain/cse570-13/

19-19

A

C

C

B
D

E

Rank 2 Rank 2
©2013 Raj Jain
RPL Data Forwarding





Case 1: To the root (n-to-1)
 Address to root and give to parent
Case 2: A to B
 2A: Storing (Everyone keeps a routing table)
 Forward up from A to common parent
 Forward down from common parent to B
 2B: Non-storing (No routing tables except at root)
 Forward up from A to root
 Root puts a source route and forwards down
Case 2: Broadcast from the root (1-to-n)
 2A: Storing (everyone knows their children)
 Broadcast to children
 2B: Non-Storing (Know only parents but not children)
 Root puts a source route for each leaf and forwards

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-20

©2013 Raj Jain
RPL Summary
1.
2.

3.

An RPL instance consists of one or more DODAGs
DIO are broadcast downward,
DAOs are requests to join upward
DIS are DIO solicitations
DAO-ack are responses to DAO
Non-storing nodes do not keep any routing table and send
everything upwards toward the root

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-21

©2013 Raj Jain
Summary

1.

2.

6LowPAN is designed for IPv6 over IEEE 802.15.4
Frame size and address sizes are primary issues
Header compression is the key mechanism
RPL is designed primarily for data collection
No assumption about IEEE 802.15.4 or wireless or frame size
Routing is the primary issue
Forming a spanning tree like DODAG is the solution

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-22

©2013 Raj Jain
Reading List


O. Hersent, et al., “The Internet of Things: Key Applications and
Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book)



G. Montenegro, et al., “Transmission of IPv6 Packets over IEEE 802.15.4
Networks,” RFC 4944, Sep 2007, http://tools.ietf.org/pdf/rfc4944



J. Hui and P. Thubert, “Compression Format for IPv6 Datagrams over IEEE
802.15.4-Based Networks,” IETF RFC 6282, Sep 2011,
http://tools.ietf.org/pdf/rfc6282



T. Winder, Ed., et al., "RPL: IPv6 Routing Protocol for Low-Power and
Lossy Networks," IETF RFC 6550, Mar 2012,
https://ietf.org/doc/rfc6550/



S. Kuryla, “RPL: IPv6 Routing Protocol for Low Power and Lossy
Networks,”
http://cnds.eecs.jacobs-university.de/courses/nds-2010/kuryla-rpl.pdf

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-23

©2013 Raj Jain
Wikipedia Links









http://en.wikipedia.org/wiki/6LoWPAN
http://en.wikipedia.org/wiki/IEEE_802.15.4
http://en.wikipedia.org/wiki/MAC_address
http://en.wikipedia.org/wiki/IPv6
http://en.wikipedia.org/wiki/IPv6_address
http://en.wikipedia.org/wiki/Organizationally_unique_identifier
http://en.wikipedia.org/wiki/IPv6_packet
http://en.wikipedia.org/wiki/Link-local_address

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-24

©2013 Raj Jain
References








N. Kushalnagar, et al., "IPv6 over Low-Power Wireless Personal Area
Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and
Goals", IETF RFC 4919, Aug 2007, http://www.rfceditor.org/rfc/pdfrfc/rfc4919.txt.pdf
E. Kim, et al., "Design and Application Spaces for IPv6 over Low-Power
Wireless Personal Area Networks (6LoWPANs)," IETF RFC 6568, Apr
2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6568.txt.pdf
E. Kim, et al., "Problem Statement and Requirements for IPv6 over LowPower Wireless Personal Area Network (6LoWPAN) Routing," IETF RFC
6606, May 2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6606.txt.pdf
Z. Shelby, et al., "Neighbor Discovery Optimization for IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs), IETF RFC 6775,
Nov. 2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6775.txt.pdf

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-25

©2013 Raj Jain
References (Cont)









"Routing Requirements for Urban Low-Power and Lossy Networks," IETF
RFC 5548, May 2009, https://ietf.org/doc/rfc5548/
"Industrial Routing Requirements in Low-Power and Lossy Networks,"
IETF RFC 5673, Oct 2009, https://ietf.org/doc/rfc5673/
"Home Automation Routing Requirements in Low-Power and Lossy
Networks," IETF RFC 5826, Apr 2010, https://ietf.org/doc/rfc5826/
"Building Automation Routing Requirements in Low-Power and Lossy
Networks," IETF RFC 5867, Jun 2010, https://ietf.org/doc/rfc5867/
"The Trickle Algorithm," IETF RFC 6206, Mar 2011,
https://ietf.org/doc/rfc6206/
"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks," IETF
RFC 6550, Mar 2012, https://ietf.org/doc/rfc6550/
"Routing Metrics Used for Path Calculation in Low-Power and Lossy
Networks," IETF RFC 6551, Mar 2012, https://ietf.org/doc/rfc6551/
"Objective Function Zero for the Routing Protocol for Low-Power and
Lossy Networks (RPL)," IETF RFC 6552, Mar 2012,
https://ietf.org/doc/rfc6552/

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-26

©2013 Raj Jain
References (Cont)




"The Minimum Rank with Hysteresis Objective Function," IETF RFC 6719,
Sep 2012, https://ietf.org/doc/rfc6719/
"Reactive Discovery of Point-to-Point Routes in Low-Power and Lossy
Networks," IETF RFC 6997, Aug 2013, https://ietf.org/doc/rfc6997/
"A Mechanism to Measure the Routing Metrics along a Point-to-Point
Route in a Low-Power and Lossy Network," IETF RFC 6998, Aug 2013,
https://ietf.org/doc/rfc6998/

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-27

©2013 Raj Jain
Acronyms
















6LowPAN
AODV
CC
DA
DAG
DAO
DIO
DIS
DODAG
DSR
EUI
HC
ICMP
ID
IEEE

IPv6 over Low Power Wireless Personal Area Network
Ad-hoc On-demand Distance Vector
Consistency Check
Destination Address
Directed Acyclic Graph
DODAG Advertisement Object
DODAG Information Object
DODAG Information Solicitation
Destination Oriented Directed Acyclic Graph
Dynamic Source Routing
Extended Unique Id
Header Compression
IP Control Message Protocol
Identifier
Institution of Electrical and Electronic Engineers

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-28

©2013 Raj Jain
Acronyms (Cont)
















IETF
IID
IoT
IP
IPHC
IPv6
LLN
MAC
MTU
OLSR
OSPF
PAN
RIP
ROLL
SA

Internet Engineering Task Force
Interface Identifier
Internet of Things
Internet Protocol
IP Header Compression
Internet Protocol Version 6
Low-Power and Lossy Networks
Media Access Control
Maximum Transmission Unit
On-Demand Link State Routing
Open Shortest Path Forwarding
Personal Area Network
Routing Information Protocol
Routing over Low-Power and Lossy Networks
Source Address

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-29

©2013 Raj Jain
Acronyms (Cont)





TCP
UDP
WiFi
WPAN

Transmission Control Protocol
User Datagram Protocol
Wireless Fidelity
Wireless Personal Area Network

Washington University in St. Louis

http://www.cse.wustl.edu/~jain/cse570-13/

19-30

©2013 Raj Jain

Contenu connexe

Tendances

Tendances (20)

Rpl dodag
Rpl dodagRpl dodag
Rpl dodag
 
Data link layer
Data link layerData link layer
Data link layer
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Day 3.1 basic routing
Day 3.1 basic routing Day 3.1 basic routing
Day 3.1 basic routing
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Node localization
Node localizationNode localization
Node localization
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
6LoWPAN.pptx
6LoWPAN.pptx6LoWPAN.pptx
6LoWPAN.pptx
 
DESIGN AND SIMULATION OF DIFFERENT 8-BIT MULTIPLIERS USING VERILOG CODE BY SA...
DESIGN AND SIMULATION OF DIFFERENT 8-BIT MULTIPLIERS USING VERILOG CODE BY SA...DESIGN AND SIMULATION OF DIFFERENT 8-BIT MULTIPLIERS USING VERILOG CODE BY SA...
DESIGN AND SIMULATION OF DIFFERENT 8-BIT MULTIPLIERS USING VERILOG CODE BY SA...
 
Pure aloha
Pure alohaPure aloha
Pure aloha
 
I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_I pv6 routing_protocol_for_low_power_and_lossy_
I pv6 routing_protocol_for_low_power_and_lossy_
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Olsr protocol ppt
Olsr protocol pptOlsr protocol ppt
Olsr protocol ppt
 
Security of RPL in IoT
Security of RPL in IoTSecurity of RPL in IoT
Security of RPL in IoT
 

En vedette

Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsQuang Do
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksLandry Simo
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...Adam Dunkels
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014Pascal Thubert
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Toolsrjain51
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunitiesrjain51
 
6lowpan
6lowpan 6lowpan
6lowpan Wi6Labs
 
Les technologies Open Source pour les objets connectés
Les technologies Open Source pour les objets connectésLes technologies Open Source pour les objets connectés
Les technologies Open Source pour les objets connectésAlexandre LAHAYE
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Thingsrjain51
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlowrjain51
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 

En vedette (20)

Slide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNsSlide RPL- Routing Protocol for Loossy and Low-power LLNs
Slide RPL- Routing Protocol for Loossy and Low-power LLNs
 
Rpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy NetworksRpl:Routing Protocol for Low-Power and Lossy Networks
Rpl:Routing Protocol for Low-Power and Lossy Networks
 
Rpl
Rpl Rpl
Rpl
 
Rpl2016
Rpl2016Rpl2016
Rpl2016
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Tools
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
these_sample
these_samplethese_sample
these_sample
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
SDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier OpportunitiesSDN and NFV: Facts, Extensions, and Carrier Opportunities
SDN and NFV: Facts, Extensions, and Carrier Opportunities
 
6lowpan
6lowpan 6lowpan
6lowpan
 
Les technologies Open Source pour les objets connectés
Les technologies Open Source pour les objets connectésLes technologies Open Source pour les objets connectés
Les technologies Open Source pour les objets connectés
 
Introduction to Internet of Things
Introduction to Internet of ThingsIntroduction to Internet of Things
Introduction to Internet of Things
 
Introduction to OpenFlow
Introduction to OpenFlowIntroduction to OpenFlow
Introduction to OpenFlow
 
Internet of Things and Future Internet
Internet of Things and Future InternetInternet of Things and Future Internet
Internet of Things and Future Internet
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 

Similaire à Networking Protocols for Internet of Things

LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...rjain51
 
Iot for bluetoth
Iot for bluetothIot for bluetoth
Iot for bluetothYomi Ayo
 
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docx
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docxCSC3407 Assigment 2 Question 1 (50 marks) USQ College .docx
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docxfaithxdunce63732
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing ArchitectureShreehari Dhat
 
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdfIPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf1987gelhu
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Data Center Ethernet
Data Center EthernetData Center Ethernet
Data Center Ethernetrjain51
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Arunabh Deka
 
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3Eswar Publications
 
Networking Fundamentals: Local Networks
Networking Fundamentals: Local NetworksNetworking Fundamentals: Local Networks
Networking Fundamentals: Local NetworksAndriy Berestovskyy
 

Similaire à Networking Protocols for Internet of Things (20)

LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
LAN Extension and Network Virtualization for Cloud Computing using Layer 3 Pr...
 
Iot for bluetoth
Iot for bluetothIot for bluetoth
Iot for bluetoth
 
I pv6 for cmu
I pv6 for cmuI pv6 for cmu
I pv6 for cmu
 
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docx
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docxCSC3407 Assigment 2 Question 1 (50 marks) USQ College .docx
CSC3407 Assigment 2 Question 1 (50 marks) USQ College .docx
 
IPv6
IPv6IPv6
IPv6
 
IPv6 Addressing Architecture
IPv6 Addressing ArchitectureIPv6 Addressing Architecture
IPv6 Addressing Architecture
 
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdfIPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf
IPV6 TYPESghjgkhggggggdhfhgfjfjgjhggkgkg .pdf
 
Networking
NetworkingNetworking
Networking
 
Intro to Ethernet
Intro to EthernetIntro to Ethernet
Intro to Ethernet
 
Data Center Ethernet
Data Center EthernetData Center Ethernet
Data Center Ethernet
 
Ipv6
Ipv6Ipv6
Ipv6
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
CCNA project-report
CCNA project-reportCCNA project-report
CCNA project-report
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
IPv6 Overview
IPv6 OverviewIPv6 Overview
IPv6 Overview
 
Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)Presentation on CCNA(Networking & Troubleshooting)
Presentation on CCNA(Networking & Troubleshooting)
 
6lowpan introduction
6lowpan introduction6lowpan introduction
6lowpan introduction
 
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
An Experimental of IPv6 Address Assignment for Global Unicast Address Using NS-3
 
Networking Fundamentals: Local Networks
Networking Fundamentals: Local NetworksNetworking Fundamentals: Local Networks
Networking Fundamentals: Local Networks
 

Plus de rjain51

Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)rjain51
 
Network Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data CentersNetwork Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data Centersrjain51
 
Networking Issues For Big Data
Networking Issues For Big DataNetworking Issues For Big Data
Networking Issues For Big Datarjain51
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentalsrjain51
 
Data Center Networks:Virtual Bridging
Data Center Networks:Virtual BridgingData Center Networks:Virtual Bridging
Data Center Networks:Virtual Bridgingrjain51
 
Application Delivery Networking
Application Delivery NetworkingApplication Delivery Networking
Application Delivery Networkingrjain51
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernetrjain51
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualizationrjain51
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologiesrjain51
 

Plus de rjain51 (9)

Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Network Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data CentersNetwork Virtualization in Cloud Data Centers
Network Virtualization in Cloud Data Centers
 
Networking Issues For Big Data
Networking Issues For Big DataNetworking Issues For Big Data
Networking Issues For Big Data
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Data Center Networks:Virtual Bridging
Data Center Networks:Virtual BridgingData Center Networks:Virtual Bridging
Data Center Networks:Virtual Bridging
 
Application Delivery Networking
Application Delivery NetworkingApplication Delivery Networking
Application Delivery Networking
 
Carrier Ethernet
Carrier EthernetCarrier Ethernet
Carrier Ethernet
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Data Center Network Topologies
Data Center Network TopologiesData Center Network Topologies
Data Center Network Topologies
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Networking Protocols for Internet of Things

  • 1. Networking Protocols for Internet of Things . Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-1 ©2013 Raj Jain
  • 2. Overview   6LowPAN  Adaptation Layer  Address Formation  Compression RPL  RPL Concepts  RPL Control Messages  RPL Data Forwarding Note: This is part 2 of a series of class lectures on IoT. MQTT is covered in other parts. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-2 ©2013 Raj Jain
  • 3. IEEE 802.15.4        Wireless Personal Area Network (WPAN) Allows mesh networking. Full function nodes can forward packets to other nodes. A PAN coordinator (like WiFi Access Point) allows nodes to join the network. Nodes have 64-bit addresses Coordinator assigns 16-bit short address for use during the association Maximum frame size is 127 bytes More details in CSE 574 wireless networking course http://www.cse.wustl.edu/~jain/cse574-10/index.html Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-3 ©2013 Raj Jain
  • 4. 6LowPAN    IPv6 over Low Power Wireless Personal Area Networks (6LowPAN) To compress IPv6 header for low power IoT devices Issues:  Maximum Transmission Unit (MTU) at least 1280 bytes IEEE 802.15.4 standard packet size is 127 bytes 802.15.4 Header Security Option Payload 25B 21B 81B  Address Resolution: 128b or 16B IPv6 addresses.802.15.4 devices use 64 bit (no network prefix) or 16 bit addresses Optional mesh routing in datalink layer.  Need destination and intermediate addresses. MAC-level retransmissions versus end-to-end  Similar issues apply to power line and fieldbus   Ref: G. Montenegro, et al., “Transmission of IPv6 Packets over IEEE 802.15.4 Networks,” RFC 4944, Sep 2007, http://tools.ietf.org/pdf/rfc4944 Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-4 ©2013 Raj Jain
  • 5. 6LowPAN Adaptation Layer     Optional hop-by-hop ack feature of 15.4 is used but the max number of retransmissions is kept low (to avoid overlapping L2 and L4 retransmissions) IPv6 Extension Headers: 8b or less dispatch  header type 1. Mesh addressing header (2-bit dispatch=10) 2. Hop-by-hop LowPAN Broadcast header (8-bit dispatch=01010000) 3. Destination Processing Fragment header (5-bit dispatch=11100 or 11101) IPv6 address formation IPv6 and UDP compression headers Frame Seq. Control # 2B 1B Adrs [Security] Disp bits 0-20B Ext Hdr Disp bits Ext Hdr Disp bits Ext Hdr IPv6 Payload 0-21B Ref: O. Hersent, et al., “The Internet of Things: Key Applications and Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-5 ©2013 Raj Jain
  • 6. Mesh Addressing Header     Dispatch = 10 (2 bits)  Mesh Addressing Header MAC header contains per-hop source and destination Original source and destination addresses are saved in Mesh addressing header A 4-bit hops-left field is decremented at each hop Originator P1 Dispatch V F Hops 10 Left 2b 1b 1b 4b P2 P3 Final Originator Final Address Address 16b/64b 16b/64bit F=0  Final address is EUI64, F=1  16-bit V=0  Originator address is EUI64, V=1  16bit Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-6 ©2013 Raj Jain
  • 7. 6LowPAN Broadcast Header   For Mesh broadcast/multicast A new sequence number is put in every broadcast message by the originator Dispatch Sequence 01010000 Number 8b 8b Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-7 ©2013 Raj Jain
  • 8. 6LowPAN Fragment Header     Dispatch = 11x00 (5 bits)  Fragment Header Full packet size in the first fragment’s fragment header Datagram tag = sequence number  Fragments of the same packet Fragment Offset in multiples of 8 bytes 1st Fragment: 11000 IP Pkt Size 5b 11b Other Fragments: 11100 IP Pkt Size 5b 11b Washington University in St. Louis Datagram tag Payload 16b Datagram tag 16b Datagram Offset 8b http://www.cse.wustl.edu/~jain/cse570-13/ 19-8 Payload ©2013 Raj Jain
  • 9. Address Formation  Ethernet addresses: 48 bit MAC Unicast Universal Organizationally Manufacturer Multicast Local Unique ID (OUI) Assigned 1b  1b 22b 24b IEEE 802.15.4 Addresses: 64 bit Extended Unique Id (EUI) Unicast Universal Organizationally Manufacturer Multicast Local Unique ID (OUI) Assigned 1b   1b 22b 40b Local bit was incorrectly assigned. L=1  Local but all-broadcast address = all 1’s is not local IETF RFC4291 changed the meaning so that L=0  Local The 2nd bit is now called Universal bit (U-bit)  U-bit formatted EUI64 addresses Link-Local IPv6 address = FE80::U-bit formatted EUI64 Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-9 ©2013 Raj Jain
  • 10. Address Formation (Cont)    Example:  EUI64 Local Address = 40::1 = 0100 0000::0000 0001  U-bit formatted EUI64 = 0::1  IPv6 Link-local address = FE80::1 = 1111 1110 1000 0000::1 IEEE 802.15.4 allows nodes to have 16-bit short addresses and each PAN has a 16-bit PAN ID. 1st bit of Short address and PAN ID is Unicast/Multicast The 2nd bit of Short Address and PAN ID is Universal/Local. You can broadcast to all members of a PAN or to all PANs. IPv6 Link Local Address = FE80 :: PAN ID : Short Address Use 0 if PAN ID is unknown. 2nd bit of PAN ID should always be zero since it is always local. (2nd most significant = 6th bit from right) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-10 ©2013 Raj Jain
  • 11. Stateless Compression      Called HC1-HC2 compression (not recommended) IP version field is omitted Flow label field if zero is omitted and C=1 Only 4b UDP ports are sent if between 61616-61631 (F0Bx) UDP length field is omitted HC1 Header HC2 Header Dispatch SA DA C 01000010 Encoding Encoding 00 01 10 11 NH 0 S D L Uncompressed Fields Prefix IID Uncompressed Uncompressed Uncompressed Derived from L2 FE80::/80 omitted Uncompressed FE80::/64 omitted Derived from L2 Washington University in St. Louis 00 01 10 11 UDP Length omitted UDP Dest Port 61616-61631 UDP Src Port 61616-61631 Next Hdr inline Next Hdr= 17 (UDP) Next Hdr = 1 (ICMP) Next Hdr = 6 (TCP) http://www.cse.wustl.edu/~jain/cse570-13/ 19-11 ©2013 Raj Jain
  • 12. Context Based Compression    HC1 works only with link-local addresses Need globally routable IPv6 addresses for outside nodes IPHC uses a 3b dispatch code and a 13-bit base header Disp TF NH Hop CID SAC SAM M DAC DAM SCI DCI Uncompressed IPv6 fields 011 Limit 3b 00 01 10 11 2b 1b 2b 1b 1b 2b 1b 1b 2b 4b 4b Source Adr Mode Source/Dest Context IDs if CID=1 Next Header Source Adr Compression Multicast Destination uses Predefined hop limit = SAC SAM Address LowPAN_NHC uncompressed (00), DAC DAM 1, 64, 255 0 00 No compression 0 01 First 64-bits omitted ECN+DSCP+4b pad+ 0 10 First 112 bits omitted 20b Flow label (4 Bytes) 0 11 128 bits omitted. Get from L2 ECN +2b pad + 12b Flow 1 00 Unspecified Address :: label (2 Bytes), DSCP omitted 1 01 First 64 bits from context ECN+DSCP (1B), Flow label omitted 1 10 First 112 bits from context ECN+DSCP+Flow label omitted 1 11 128 bits from context and L2 Ref: O. Hersent, et al., “The Internet of Things: Key Applications and Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book) Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-12 ©2013 Raj Jain
  • 13. Context Based Compression (Cont)  If the next header uses LowPAN_NHC  For IPv6 base extension headers: 1110 IPv6 Ext Hdr ID NH Uncompressed Next (EID) Fields Hdr 4b EID 0 1 2 3 4 5 6 7 Header IPv6 Hop-by-Hop Options IPv6 Routing IPv6 Fragment IPv6 Destination Options IPv6 Mobility Header Reserved Reserved IPv6 Header 3b 1b 0 = Uncompressed 1 = LowPAN_NHC encoded LowPAN_NHC UDP Header: 11110 C P 5b 1b 2b Checksum omitted 00 01 10 11 All 16-bits in line 1st 8-bits of dest port omitted 1st 8-bits of src port omitted 1st 12-bits of src & dest omitted Ref: J. Hui and P. Thubert, “Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks,” IETF RFC 6282, Sep 2011, http://tools.ietf.org/pdf/rfc6282 http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis ©2013 Raj Jain 19-13
  • 14. 6LowPAN: Summary    3 New Headers:  Mesh addressing: Intermediate addresses  Hop-by-Hop: Mesh broadcasts  Destination processing: Fragmentation Address Formation: 128-bit addresses by prefixing FE80:: Header compression:  HC1+HC2 header for link-local IPv6 addresses  IPHC compression for all IPv6 addresses Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-14 ©2013 Raj Jain
  • 15. Routing Protocol for Low-Power and Lossy Networks (RPL)       Developed by IETF Routing over Low-Power and Lossy Networks (ROLL) working group Low-Power and Lossy Networks (LLN) Routers have constraints on processing, memory, and energy.  Can’t use OSPF, OLSR, RIP, AODV, DSR, etc LLN links have high loss rate, low data rates, and instability  expensive bits, dynamically formed topology Covers both wireless and wired networks Requires bidirectional links. May be symmetric/asymmetric. Ideal for n-to-1 (data sink) communications, e.g., meter reading 1-to-n and 1-to-1 possible with some extra work. Multiple LLN instances on the same physical networks Ref: T. Winder, Ed., et al., "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks," IETF RFC 6550, Mar 2012, https://ietf.org/doc/rfc6550/ http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis ©2013 Raj Jain 19-15
  • 16. RPL Concepts Directed Acyclic Graph (DAG): No cycles DAG  Root: No outgoing edge  Destination-Oriented DAG (DODAG): Single root  Up: Towards root  Down: Away from root DODAG  Objective Function: Minimize energy, latency, … Root  Rank: Distance from root using specified objective Rank=1  RPL Instance: One or more DODAGs. A node may belong to multiple RPL instances.Rank=2 Up  DODAG ID: IPv6 Adr of the root One RPL  DODAG Version: Current version of the Instance DODAG. Every time a new DODAG is computed with the same root, its version incremented. http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis ©2013 Raj Jain  19-16
  • 17. RPL Concepts (Cont)        Goal: Reachability goal, e.g., connected to database Grounded: Root can satisfy the goal Floating: Not grounded. Only in-DODAG communication. Parent: Immediate successor towards the root Sub-DODAG: Sub tree rooted at this node Storing: Nodes keep routing tables for subDODAG Non-Storing: Nodes know only parent. Do not keep a routing table. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-17 ©2013 Raj Jain
  • 18. RPL Control Messages 1. 2. 3. 4. 5. DODAG Information Object (DIO):  Downward RPL instance multicasts  Allows other nodes to discover an RPL instance and join it DODAG Information Solicitation (DIS):  Link-Local multicast request for DIO (neighbor discovery). Do you know of any DODAGs? Destination Advertisement Object (DAO):  From child to parents or root.  Can I join you as a child on DODAG #x? DAO Ack: Yes, you can! Or Sorry, you cant! Consistency Check: Challenge/response messages for security Ref: S. Kuryla, “RPL:IPv6 Routing Protocol for Low Power and Lossy Networks,” http://cnds.eecs.jacobs-university.de/courses/nds-2010/kuryla-rpl.pdf http://www.cse.wustl.edu/~jain/cse570-13/ Washington University in St. Louis 19-18 DIS New New Old DIS DIO DAO DAO-Ack ©2013 Raj Jain
  • 19. DODAG Formation Example 1. 2. 3. 4. 5. 6. 7. 8. 9. A multicasts DIOs that it’s member of DODAG ID itself with Rank 0. B, C, D, E hear and determine that their rank (distance) is 1, 1, 3, 4, respectively from A B, C, D, E send DAOs to A. A accepts all B and C multicast DIOs D hears those and determines that its distance from B and C is 1, 2 E hears both B, C and determines that its distance from B and C is 2, 1 D sends a DAO to B E sends a DAO to C B sends a DAO-Ack to D C sends a DAO-Ack to E Washington University in St. Louis 1 A 1 B 3 1 4 DIO E D C B E D A C B DAO-Ack Rank 1 E D D C E Rank 3 A 5 B 1 D 9 C E B 1 8 DAO E DAO D A DAO-Ack D Rank 4 C A B Rank 1 A DIO 2 3 DAO C B A 4 E http://www.cse.wustl.edu/~jain/cse570-13/ 19-19 A C C B D E Rank 2 Rank 2 ©2013 Raj Jain
  • 20. RPL Data Forwarding    Case 1: To the root (n-to-1)  Address to root and give to parent Case 2: A to B  2A: Storing (Everyone keeps a routing table)  Forward up from A to common parent  Forward down from common parent to B  2B: Non-storing (No routing tables except at root)  Forward up from A to root  Root puts a source route and forwards down Case 2: Broadcast from the root (1-to-n)  2A: Storing (everyone knows their children)  Broadcast to children  2B: Non-Storing (Know only parents but not children)  Root puts a source route for each leaf and forwards Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-20 ©2013 Raj Jain
  • 21. RPL Summary 1. 2. 3. An RPL instance consists of one or more DODAGs DIO are broadcast downward, DAOs are requests to join upward DIS are DIO solicitations DAO-ack are responses to DAO Non-storing nodes do not keep any routing table and send everything upwards toward the root Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-21 ©2013 Raj Jain
  • 22. Summary 1. 2. 6LowPAN is designed for IPv6 over IEEE 802.15.4 Frame size and address sizes are primary issues Header compression is the key mechanism RPL is designed primarily for data collection No assumption about IEEE 802.15.4 or wireless or frame size Routing is the primary issue Forming a spanning tree like DODAG is the solution Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-22 ©2013 Raj Jain
  • 23. Reading List  O. Hersent, et al., “The Internet of Things: Key Applications and Protocols,” Wiley, 2013, 344 pp., ISBN: 9781119994350 (Safari Book)  G. Montenegro, et al., “Transmission of IPv6 Packets over IEEE 802.15.4 Networks,” RFC 4944, Sep 2007, http://tools.ietf.org/pdf/rfc4944  J. Hui and P. Thubert, “Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks,” IETF RFC 6282, Sep 2011, http://tools.ietf.org/pdf/rfc6282  T. Winder, Ed., et al., "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks," IETF RFC 6550, Mar 2012, https://ietf.org/doc/rfc6550/  S. Kuryla, “RPL: IPv6 Routing Protocol for Low Power and Lossy Networks,” http://cnds.eecs.jacobs-university.de/courses/nds-2010/kuryla-rpl.pdf Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-23 ©2013 Raj Jain
  • 25. References     N. Kushalnagar, et al., "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals", IETF RFC 4919, Aug 2007, http://www.rfceditor.org/rfc/pdfrfc/rfc4919.txt.pdf E. Kim, et al., "Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs)," IETF RFC 6568, Apr 2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6568.txt.pdf E. Kim, et al., "Problem Statement and Requirements for IPv6 over LowPower Wireless Personal Area Network (6LoWPAN) Routing," IETF RFC 6606, May 2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6606.txt.pdf Z. Shelby, et al., "Neighbor Discovery Optimization for IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs), IETF RFC 6775, Nov. 2012, http://www.rfc-editor.org/rfc/pdfrfc/rfc6775.txt.pdf Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-25 ©2013 Raj Jain
  • 26. References (Cont)         "Routing Requirements for Urban Low-Power and Lossy Networks," IETF RFC 5548, May 2009, https://ietf.org/doc/rfc5548/ "Industrial Routing Requirements in Low-Power and Lossy Networks," IETF RFC 5673, Oct 2009, https://ietf.org/doc/rfc5673/ "Home Automation Routing Requirements in Low-Power and Lossy Networks," IETF RFC 5826, Apr 2010, https://ietf.org/doc/rfc5826/ "Building Automation Routing Requirements in Low-Power and Lossy Networks," IETF RFC 5867, Jun 2010, https://ietf.org/doc/rfc5867/ "The Trickle Algorithm," IETF RFC 6206, Mar 2011, https://ietf.org/doc/rfc6206/ "RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks," IETF RFC 6550, Mar 2012, https://ietf.org/doc/rfc6550/ "Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks," IETF RFC 6551, Mar 2012, https://ietf.org/doc/rfc6551/ "Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL)," IETF RFC 6552, Mar 2012, https://ietf.org/doc/rfc6552/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-26 ©2013 Raj Jain
  • 27. References (Cont)    "The Minimum Rank with Hysteresis Objective Function," IETF RFC 6719, Sep 2012, https://ietf.org/doc/rfc6719/ "Reactive Discovery of Point-to-Point Routes in Low-Power and Lossy Networks," IETF RFC 6997, Aug 2013, https://ietf.org/doc/rfc6997/ "A Mechanism to Measure the Routing Metrics along a Point-to-Point Route in a Low-Power and Lossy Network," IETF RFC 6998, Aug 2013, https://ietf.org/doc/rfc6998/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-27 ©2013 Raj Jain
  • 28. Acronyms                6LowPAN AODV CC DA DAG DAO DIO DIS DODAG DSR EUI HC ICMP ID IEEE IPv6 over Low Power Wireless Personal Area Network Ad-hoc On-demand Distance Vector Consistency Check Destination Address Directed Acyclic Graph DODAG Advertisement Object DODAG Information Object DODAG Information Solicitation Destination Oriented Directed Acyclic Graph Dynamic Source Routing Extended Unique Id Header Compression IP Control Message Protocol Identifier Institution of Electrical and Electronic Engineers Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-28 ©2013 Raj Jain
  • 29. Acronyms (Cont)                IETF IID IoT IP IPHC IPv6 LLN MAC MTU OLSR OSPF PAN RIP ROLL SA Internet Engineering Task Force Interface Identifier Internet of Things Internet Protocol IP Header Compression Internet Protocol Version 6 Low-Power and Lossy Networks Media Access Control Maximum Transmission Unit On-Demand Link State Routing Open Shortest Path Forwarding Personal Area Network Routing Information Protocol Routing over Low-Power and Lossy Networks Source Address Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-29 ©2013 Raj Jain
  • 30. Acronyms (Cont)     TCP UDP WiFi WPAN Transmission Control Protocol User Datagram Protocol Wireless Fidelity Wireless Personal Area Network Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-13/ 19-30 ©2013 Raj Jain