SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Mobility Management
Wael AYOUB
waaelayoub@gmail.com
15 May 2017
2/29
• Handover management focuses on the procedure to conduct handovers
between two networks, and addresses the entire solution to maintain
communications while users are mobile.
• Network-Layer Mobility Support
• Transport-Layer Mobility Support
• Application-Layer Mobility Support
Mobility Management
3/29
• IP address is the unique identification in IP based networks, which changes between
different networks. to maintain the on-going traffic flows, network layer mobility
management protocols should be executed.
• Mobile IP used to redirect packages from home to new location of MN.
• Mobile IP entities:
• Mobile Node (MN); Terminal changes its PoA
• Home Agent (HA); Updated MN location & redirection
• Foreign Agent (FA); assigns a CoA to MN & routing services
• MIP supports mobility management through:
• Agent Discovery
• Registration
• Routing and Tunneling
Network-Layer Mobility Support
Triangular routing
Route optimization
IPv6
Next step:
Comparative analysis of different
mobility protocols for VHO based on
MIH Standards
4/29
• Benefit: changes of network address configurations in different networks are all masked
on top of the network layer.
• Mobile SCTP (mSCTP) is designed to achieve seamless mobility in heterogeneous
wireless networks. Based on Stream Control Transmission Protocol (SCTP), with the
extension of Dynamic Address Reconfiguration (DAR).
• DAR offers two features:
• Multi-homing; multiple IP & paths
• Dynamic IP-address manipulation;
• Steps of mSCTP:
• FA give me IP
• CNs add my new IP
• CNs set my new IP
• CNs delete old IP
Transport-Layer Mobility Support
1
2
3
4
5/29
• Registration control mechanism and HO
management are implemented in this layer.
• Benefits: Flexibility on service requirements &
scalability on system infrastructure.
• There are two mainstream mobility management
protocols in the application layer:
• Session Initial Protocol (SIP)
• H.323 (Packet-based multimedia communications
systems)
• SIP protocol defines one common SIP handover
scenario, called Mid-call mobility, where a mobile
node takes handover to a new network during the
call session.
Application-Layer Mobility Support
1
1
2
A B
3
4
5
6
6/29
• After switching a PoA and entering a new
network, mobile node first handles all ongoing
sessions, and sends the new INVITE request
to the CN directly.
• Finally, MN register the new IP address to the
home SIP server to update the address binding.
Application-Layer Mobility Support
• In the new INVITE message, the
session ID stay the same, and the
Contact field is filled with the new IP
address.
7/29
IoT Standards
&
Protocols
15 May 2017
8/29
Rather than trying to fit all of the IoT Protocols on top of existing architecture models
like OSI Model, writer have broken the protocols into the following layers to provide
some level of organization:
1. Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL) ==> Network & Transport Layer
2. Comms / Transport (ex: Wifi, Bluetooth, LPWAN) ==> PHY/MAC layer
3. Discovery (ex: Physical Web, mDNS, DNSSD)
4. Data Protocols (ex: MQTT, CoAP, AMQP, Websocket, Node) ==> App layer
5. Multilayer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit) ==> Cross layer
Protocols
11/29
• IPv6:*Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram
transmission across multiple IP networks.
• 6LoWPAN:*(IPv6 Low power Wireless Personal Area Networks). It is an adaptation layer for IPv6
over IEEE 802.15.4 links (Frequency: 2.4 GHz/ Transfer rate: 250 kbps).
• UDP:*(User Datagram Protocol). A simple OSI transport layer protocol for client/server network
applications based on Internet Protocol (IP). Used in applications specially tuned for real-time
performance.
• NanoIP: (nano Internet Protocol) designed with minimal overheads, wireless networking, and local
addressing in mind.
• CCN: (Content Centric Networking) architecture to solve challenges in content distribution scalability,
mobility, and security. CCN directly routes and delivers named pieces of content at the packet level of
the network, enabling automatic and application-neutral caching in memory wherever it’s located in the
network. Efficient and effective delivery of content wherever and whenever it is needed.
Infrastructure
12/29
• UIP: (micro IP) open source TCP/IP stack capable of being used with tiny 8- and 16-bit
microcontrollers.
• DTLS: (Datagram Transport Layer) protocol provides communications privacy for datagram
protocols. Designed to prevent eavesdropping, tampering, or message forgery. Based on the
Transport Layer Security (TLS) protocol and provides equivalent security guarantees.
• RPL:* (IPv6 Routing Protocol for Low-Power and Lossy Networks LLN) a mechanism whereby
multipoint-to-point traffic from devices inside the LLN towards a central control point, and vice
versa. Support for point-to-point traffic is also available.
• TSMP:(Time Synchronized Mesh Protocol) a communications protocol for self-organizing
networks of wireless devices called motes. TSMP devices stay synchronized to each other and
communicate in timeslots, similar to other TDM systems.
Infrastructure
13/29
• MDNS: (multicast Domain Name System) Resolves host names to IP addresses within small
networks that do not include a local name server.
• Physical Web: Enables users to view a list of URLs being broadcast by objects in the environment
around you with a Bluetooth Low Energy (BLE) beacon.
• HyperCat: An open, lightweight JSON-based hypermedia catalogue format for exposing
collections of URIs.
• UPnP: (Universal Plug and Play) a set of networking protocols that permits devices to seamlessly
discover each other's presence on the network and establish functional network services for data
sharing, communications, and entertainment.
Discovery
14/29
• MQTT:*(Message Queuing Telemetry Transport) Enables a publish/subscribe messaging model in an
extremely lightweight way.
• CoAP:*(Constrained Application Protocol) RESTful protocol that is intended for use in resource
constrained internet devices. Designed to easily translate to HTTP, multicast, low overhead, and
simplicity.
• XMPP:*(Extensible Messaging and Presence Protocol) An open technology for real-time
communication.
• AMQP:*(Advanced Message Queuing Protocol) An open standard application layer protocol for
message oriented middleware. Features: message orientation, queuing, routing (including point-to-point
and publish and subscribe), reliability and security.
• REST:* (Representational state transfer) RESTful HTTP or RESTful Web services are one way of
providing interoperability between computer systems on the Internet. REST-compliant Web services
allow requesting systems to access and manipulate textual representations of Web resources using a
uniform and predefined set of stateless operations.
Data
15/29
• STOMP: (Simple Text Oriented Messaging Protocol) an interoperable wire format so that STOMP
clients can communicate with any STOMP message broker to provide easy and widespread messaging
interoperability among many languages, platforms and brokers.
• Mihini/M3DA: (An open-source protocol for efficient M2M communications) a software component
that acts as a mediator between an M2M server and the applications running on an embedded
gateway. M3DA is a protocol optimized for the transport of binary M2M data.
• DDS: (Service for Real-Time Systems) open international middleware standard directly addressing
publish/ subscribe communications for real-time and embedded systems.
• JMS: (Java Message Service) A Java Message Oriented Middleware (MOM) API for sending
messages between two or more clients.
• LLAP: (lightweight local automation protocol) a simple short message that is sent between intelligent
objects using normal text, it's not like TCP/IP, Bluetooth, ZigBee, 6lowpan, WiFi etc which achieve at
a low level "how" to move data around. Can run over any communication medium.
Data
16/29
• LWM2M: (Lightweight M2M) a system standard in the Open Mobile Alliance. It includes DTLS,
CoAP, Block, Observe, SenML and Resource Directory and weaves them into a device server
interface along with an Object structure.
• SSI: (Simple Sensor Interface) a simple communications protocol designed for data transfer
between computers or user terminals and smart sensors.
• SOAP: (Simple Object Access Protocol) like REST
• Websocket: defines a full duplex single socket connection over which messages can be sent
between client and server. This standard simplifies much of the complexity around bidirectional
web communication and connection management.
Data
17/29
• Ethernet
• WirelessHart: technology provides a robust wireless protocol for the full range of process
measurement, control, and asset management applications.
• DigiMesh: peer-to-peer networking topology for use in wireless endpoint connectivity solutions.
• ISA100.11a: Wireless Systems for Industrial Automation: Process Control and Related Application,
developed by the International Society of Automation (ISA).
• IEEE 802.15.4: is a standard which specifies the physical layer and media access control for low-rate
wireless personal area networks (LRWPANs). It is the basis for the ZigBee,ISA100.11a, MiWi, and
WirelessHART specifications, each of which further extends the standard by developing the upper
layers.
• Eddystone: A protocol specification that defines a Bluetooth low energy (BLE) message format for
proximity beacon messages.
Communication / Transport
18/29
• ANT: a wireless sensor network technology for wireless communications protocol stack, operating
in the 2.4 GHz.
• EnOcean: is a an energy harvesting wireless technology, operate in the frequencies of 868 MHz for
Europe and 315 MHz for North America. The transmit range goes up to 30 meter in buildings and
up to 300 meter outdoor.
• Weightless: open wireless technology standard for exchanging data between a base station and
thousands of machines around it with high levels of security.
• NB-IoT: (NarrowBand IoT) A technology being standardized by the 3GPP standards body.
• LTEMTC: (LTEMachine Type Communication) Standards-based family of technologies supports
several technology categories, such as Cat1and CatM1, suitable for the IoT.
• EC-GSM-IoT: (Extended Coverage-GSM-IoT) Enables new capabilities of existing cellular
networks for LPWA (Low Power Wide Area) IoT applications. Activated by deploying a software
over GSM footprint, adding even more coverage to serve IoT devices.
Communication / Transport
19/29
Bluetooth
Short-range communications technology
designed to offer significantly reduced power
consumption
• Standard: Bluetooth 4.2 core specification
• Frequency: 2.4GHz (ISM)
• Range: 5-15m (Smart/BLE)
• Data Rates: 1Mbps (Smart/BLE)
Zigbee
ZigBee, like Bluetooth, has a large installed base
of operation.
• Standard: ZigBee 3.0 based on IEEE802.15.4
• Frequency: 868MHz, 915MHz, 2.4GHz
• Range: 10-100m
• Data Rates: 20, 40, 250kbps
Communication / Transport
20/29
Z-Wave
Z-Wave is a low-power RF communications
technology that is primarily designed for home
automation. Optimized for reliable and low-
latency communication of small data packets.
• Standard: Z-Wave Alliance ZAD12837 / ITU-
T G.9959
• Frequency: 900MHz (ISM)
• Range: 30m
• Data Rates: 9.6/40/100kbit/s
NFC
NFC (Near Field Communication) is a
technology that enables simple and safe two-way
interactions between electronic devices.
• Standard: ISO/IEC 18000-3
• Frequency: 13.56MHz (ISM)
• Range: 10cm
• Data Rates: 100–420kbps
Communication / Transport
21/29
Sigfox
An alternative wide-range technology, range
comes between WiFi (too short range) and
cellular (too expensive).
• Frequency: 900MHz
• Range: 30-50km (rural environments), 3-10km
(urban environments)
• Power Consumption: 50mW
• Data Rates: 10-1kbps
Neul
Similar in concept to Sigfox and operating in the
sub-1GHz band, deliver high scalability, high
coverage, low power and low-cost wireless
networks. The communications technology is
called Weightless.
• Frequency: 900MHz (ISM [N]), 458MHz (UK
[P]), 470-790MHz (White Space [W])
• Range: 10km
• Power Consumption: 20mA – 30mA
• Data Rates: Few bps up to 100kbps
Communication / Transport
22/29
LoRaWAN
Similar in some respects to Sigfox and Neul,
wide-area network (WAN) applications,
designed to provide low-power WANs, low-cost
mobile secure bi-directional communication in
IoT, M2M and smart city and industrial
applications.
• Frequency: 433- 868-780 -915 MHZ ISM
• Range: 2-5km (urban environment), 15km
(suburban environment)
• Power Consumption: 25 – 50 mW
• Data Rates: 0.3-50 kbps.
RPMA
Random phase multiple access (RPMA) is a
low-power wide-area channel access method
used exclusively for machine-to-machine (M2M)
communication on the Internet of Things (IoT).
• Frequency band: 2.4 GHz ISM
• Range: 500 km (line of side)
• Data Rate: 624 kbps
• Power Consumption: 100 mW ~ 125 mW
Communication / Transport
23/29
DASH7
DASH7 is open source and operates primarily in
sub-1GHz frequency bands. Connectivity for
moving things. Specification: open source, 25
kHz or 200 kHz channel bandwidth, good for
wireless sensor networks.
• Frequency: 433- 868-780 -915 MHZ ISM
• Range: 2-5km (urban environment), 15km
(suburban environment)
• Power Consumption: 30uW - 60uW
• Data Rates: 0.3-50 kbps.
WiMAX
WiMAX (Worldwide Interoperability for
Microwave Access) based on the IEEE 802.16
set of standards, which provide multiple physical
layer (PHY) and Media Access Control (MAC)
options. WiMAX was initially designed to
provide 30 to 40 megabit-per-second data rates,
with the 2011 update providing up to 1 Gbit/s for
fixed stations.
Communication / Transport
24/29
Cellular
Any IoT application that requires
operation over longer distances can take
advantage of GSM/3G/4G cellular
communication capabilities.
WiFi
Is a wide existing infrastructure that
offers fast data transfer and the ability to
handle high quantities of data.
Communication / Transport
25/29
• Alljoyn: open source software framework for devices and apps to discover and communicate with
each other.
• IoTivity: open source software framework enabling seamless connectivity to address the emerging
needs of the IoT.
• IEEE P2413: Standard for an Architectural Framework for the Internet of Things (IoT)
• Thread: Built on open standards and IPv6 technology with 6LoWPAN as its foundation.
• IPSO Application Framework: Defines sets of REST interfaces that may be used by a smart object
to represent its available resources, interact with other smart objects and backend services.
• OMA Light-weight-M2M: Management protocol to develop a fast deployable client-server
specification to provide machine to machine service. It is able to transfer service / application data.
• Weave: A communications platform for IoT devices that enables device setup, phone-to-device-to-
cloud communication, and user interaction from mobile devices and the web.
• Telehash: A secure wire protocol powering a decentralized overlay network for apps and devices
Multi-layer Frameworks
27/29
29/29

Contenu connexe

Tendances (20)

Vp ns
Vp nsVp ns
Vp ns
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Vo ip
Vo ipVo ip
Vo ip
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
 
Chapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSNChapter 5 2 marks for PG PAWSN
Chapter 5 2 marks for PG PAWSN
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
Ns lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing ProtocolNs lecture1: Introduction to Routing Protocol
Ns lecture1: Introduction to Routing Protocol
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016Pristine rina-sdk-icc-2016
Pristine rina-sdk-icc-2016
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 

Similaire à Mobility managment and io t standards

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IPPiero Fraternali
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam SinghShivam Singh
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxEdJulleza
 
Ip transformation by altanai
Ip transformation by altanaiIp transformation by altanai
Ip transformation by altanaiALTANAI BISHT
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 

Similaire à Mobility managment and io t standards (20)

Web technologies: recap on TCP-IP
Web technologies: recap on TCP-IPWeb technologies: recap on TCP-IP
Web technologies: recap on TCP-IP
 
Internet
InternetInternet
Internet
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Automation Networking By Shivam Singh
Automation Networking By Shivam SinghAutomation Networking By Shivam Singh
Automation Networking By Shivam Singh
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
IT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptxIT-NET GROUP 3 REPORT.pptx
IT-NET GROUP 3 REPORT.pptx
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
1658897215230.pdf
1658897215230.pdf1658897215230.pdf
1658897215230.pdf
 
Ip transformation by altanai
Ip transformation by altanaiIp transformation by altanai
Ip transformation by altanai
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 
Bhargava Presentation.ppt
Bhargava Presentation.pptBhargava Presentation.ppt
Bhargava Presentation.ppt
 

Dernier

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesLumiverse Solutions Pvt Ltd
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 

Dernier (9)

Cybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best PracticesCybersecurity Threats and Cybersecurity Best Practices
Cybersecurity Threats and Cybersecurity Best Practices
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 

Mobility managment and io t standards

  • 2. • Handover management focuses on the procedure to conduct handovers between two networks, and addresses the entire solution to maintain communications while users are mobile. • Network-Layer Mobility Support • Transport-Layer Mobility Support • Application-Layer Mobility Support Mobility Management 3/29
  • 3. • IP address is the unique identification in IP based networks, which changes between different networks. to maintain the on-going traffic flows, network layer mobility management protocols should be executed. • Mobile IP used to redirect packages from home to new location of MN. • Mobile IP entities: • Mobile Node (MN); Terminal changes its PoA • Home Agent (HA); Updated MN location & redirection • Foreign Agent (FA); assigns a CoA to MN & routing services • MIP supports mobility management through: • Agent Discovery • Registration • Routing and Tunneling Network-Layer Mobility Support Triangular routing Route optimization IPv6 Next step: Comparative analysis of different mobility protocols for VHO based on MIH Standards 4/29
  • 4. • Benefit: changes of network address configurations in different networks are all masked on top of the network layer. • Mobile SCTP (mSCTP) is designed to achieve seamless mobility in heterogeneous wireless networks. Based on Stream Control Transmission Protocol (SCTP), with the extension of Dynamic Address Reconfiguration (DAR). • DAR offers two features: • Multi-homing; multiple IP & paths • Dynamic IP-address manipulation; • Steps of mSCTP: • FA give me IP • CNs add my new IP • CNs set my new IP • CNs delete old IP Transport-Layer Mobility Support 1 2 3 4 5/29
  • 5. • Registration control mechanism and HO management are implemented in this layer. • Benefits: Flexibility on service requirements & scalability on system infrastructure. • There are two mainstream mobility management protocols in the application layer: • Session Initial Protocol (SIP) • H.323 (Packet-based multimedia communications systems) • SIP protocol defines one common SIP handover scenario, called Mid-call mobility, where a mobile node takes handover to a new network during the call session. Application-Layer Mobility Support 1 1 2 A B 3 4 5 6 6/29
  • 6. • After switching a PoA and entering a new network, mobile node first handles all ongoing sessions, and sends the new INVITE request to the CN directly. • Finally, MN register the new IP address to the home SIP server to update the address binding. Application-Layer Mobility Support • In the new INVITE message, the session ID stay the same, and the Contact field is filled with the new IP address. 7/29
  • 8. Rather than trying to fit all of the IoT Protocols on top of existing architecture models like OSI Model, writer have broken the protocols into the following layers to provide some level of organization: 1. Infrastructure (ex: 6LowPAN, IPv4/IPv6, RPL) ==> Network & Transport Layer 2. Comms / Transport (ex: Wifi, Bluetooth, LPWAN) ==> PHY/MAC layer 3. Discovery (ex: Physical Web, mDNS, DNSSD) 4. Data Protocols (ex: MQTT, CoAP, AMQP, Websocket, Node) ==> App layer 5. Multilayer Frameworks (ex: Alljoyn, IoTivity, Weave, Homekit) ==> Cross layer Protocols 11/29
  • 9. • IPv6:*Internet Layer protocol for packet-switched internetworking and provides end-to-end datagram transmission across multiple IP networks. • 6LoWPAN:*(IPv6 Low power Wireless Personal Area Networks). It is an adaptation layer for IPv6 over IEEE 802.15.4 links (Frequency: 2.4 GHz/ Transfer rate: 250 kbps). • UDP:*(User Datagram Protocol). A simple OSI transport layer protocol for client/server network applications based on Internet Protocol (IP). Used in applications specially tuned for real-time performance. • NanoIP: (nano Internet Protocol) designed with minimal overheads, wireless networking, and local addressing in mind. • CCN: (Content Centric Networking) architecture to solve challenges in content distribution scalability, mobility, and security. CCN directly routes and delivers named pieces of content at the packet level of the network, enabling automatic and application-neutral caching in memory wherever it’s located in the network. Efficient and effective delivery of content wherever and whenever it is needed. Infrastructure 12/29
  • 10. • UIP: (micro IP) open source TCP/IP stack capable of being used with tiny 8- and 16-bit microcontrollers. • DTLS: (Datagram Transport Layer) protocol provides communications privacy for datagram protocols. Designed to prevent eavesdropping, tampering, or message forgery. Based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. • RPL:* (IPv6 Routing Protocol for Low-Power and Lossy Networks LLN) a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point, and vice versa. Support for point-to-point traffic is also available. • TSMP:(Time Synchronized Mesh Protocol) a communications protocol for self-organizing networks of wireless devices called motes. TSMP devices stay synchronized to each other and communicate in timeslots, similar to other TDM systems. Infrastructure 13/29
  • 11. • MDNS: (multicast Domain Name System) Resolves host names to IP addresses within small networks that do not include a local name server. • Physical Web: Enables users to view a list of URLs being broadcast by objects in the environment around you with a Bluetooth Low Energy (BLE) beacon. • HyperCat: An open, lightweight JSON-based hypermedia catalogue format for exposing collections of URIs. • UPnP: (Universal Plug and Play) a set of networking protocols that permits devices to seamlessly discover each other's presence on the network and establish functional network services for data sharing, communications, and entertainment. Discovery 14/29
  • 12. • MQTT:*(Message Queuing Telemetry Transport) Enables a publish/subscribe messaging model in an extremely lightweight way. • CoAP:*(Constrained Application Protocol) RESTful protocol that is intended for use in resource constrained internet devices. Designed to easily translate to HTTP, multicast, low overhead, and simplicity. • XMPP:*(Extensible Messaging and Presence Protocol) An open technology for real-time communication. • AMQP:*(Advanced Message Queuing Protocol) An open standard application layer protocol for message oriented middleware. Features: message orientation, queuing, routing (including point-to-point and publish and subscribe), reliability and security. • REST:* (Representational state transfer) RESTful HTTP or RESTful Web services are one way of providing interoperability between computer systems on the Internet. REST-compliant Web services allow requesting systems to access and manipulate textual representations of Web resources using a uniform and predefined set of stateless operations. Data 15/29
  • 13. • STOMP: (Simple Text Oriented Messaging Protocol) an interoperable wire format so that STOMP clients can communicate with any STOMP message broker to provide easy and widespread messaging interoperability among many languages, platforms and brokers. • Mihini/M3DA: (An open-source protocol for efficient M2M communications) a software component that acts as a mediator between an M2M server and the applications running on an embedded gateway. M3DA is a protocol optimized for the transport of binary M2M data. • DDS: (Service for Real-Time Systems) open international middleware standard directly addressing publish/ subscribe communications for real-time and embedded systems. • JMS: (Java Message Service) A Java Message Oriented Middleware (MOM) API for sending messages between two or more clients. • LLAP: (lightweight local automation protocol) a simple short message that is sent between intelligent objects using normal text, it's not like TCP/IP, Bluetooth, ZigBee, 6lowpan, WiFi etc which achieve at a low level "how" to move data around. Can run over any communication medium. Data 16/29
  • 14. • LWM2M: (Lightweight M2M) a system standard in the Open Mobile Alliance. It includes DTLS, CoAP, Block, Observe, SenML and Resource Directory and weaves them into a device server interface along with an Object structure. • SSI: (Simple Sensor Interface) a simple communications protocol designed for data transfer between computers or user terminals and smart sensors. • SOAP: (Simple Object Access Protocol) like REST • Websocket: defines a full duplex single socket connection over which messages can be sent between client and server. This standard simplifies much of the complexity around bidirectional web communication and connection management. Data 17/29
  • 15. • Ethernet • WirelessHart: technology provides a robust wireless protocol for the full range of process measurement, control, and asset management applications. • DigiMesh: peer-to-peer networking topology for use in wireless endpoint connectivity solutions. • ISA100.11a: Wireless Systems for Industrial Automation: Process Control and Related Application, developed by the International Society of Automation (ISA). • IEEE 802.15.4: is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks (LRWPANs). It is the basis for the ZigBee,ISA100.11a, MiWi, and WirelessHART specifications, each of which further extends the standard by developing the upper layers. • Eddystone: A protocol specification that defines a Bluetooth low energy (BLE) message format for proximity beacon messages. Communication / Transport 18/29
  • 16. • ANT: a wireless sensor network technology for wireless communications protocol stack, operating in the 2.4 GHz. • EnOcean: is a an energy harvesting wireless technology, operate in the frequencies of 868 MHz for Europe and 315 MHz for North America. The transmit range goes up to 30 meter in buildings and up to 300 meter outdoor. • Weightless: open wireless technology standard for exchanging data between a base station and thousands of machines around it with high levels of security. • NB-IoT: (NarrowBand IoT) A technology being standardized by the 3GPP standards body. • LTEMTC: (LTEMachine Type Communication) Standards-based family of technologies supports several technology categories, such as Cat1and CatM1, suitable for the IoT. • EC-GSM-IoT: (Extended Coverage-GSM-IoT) Enables new capabilities of existing cellular networks for LPWA (Low Power Wide Area) IoT applications. Activated by deploying a software over GSM footprint, adding even more coverage to serve IoT devices. Communication / Transport 19/29
  • 17. Bluetooth Short-range communications technology designed to offer significantly reduced power consumption • Standard: Bluetooth 4.2 core specification • Frequency: 2.4GHz (ISM) • Range: 5-15m (Smart/BLE) • Data Rates: 1Mbps (Smart/BLE) Zigbee ZigBee, like Bluetooth, has a large installed base of operation. • Standard: ZigBee 3.0 based on IEEE802.15.4 • Frequency: 868MHz, 915MHz, 2.4GHz • Range: 10-100m • Data Rates: 20, 40, 250kbps Communication / Transport 20/29
  • 18. Z-Wave Z-Wave is a low-power RF communications technology that is primarily designed for home automation. Optimized for reliable and low- latency communication of small data packets. • Standard: Z-Wave Alliance ZAD12837 / ITU- T G.9959 • Frequency: 900MHz (ISM) • Range: 30m • Data Rates: 9.6/40/100kbit/s NFC NFC (Near Field Communication) is a technology that enables simple and safe two-way interactions between electronic devices. • Standard: ISO/IEC 18000-3 • Frequency: 13.56MHz (ISM) • Range: 10cm • Data Rates: 100–420kbps Communication / Transport 21/29
  • 19. Sigfox An alternative wide-range technology, range comes between WiFi (too short range) and cellular (too expensive). • Frequency: 900MHz • Range: 30-50km (rural environments), 3-10km (urban environments) • Power Consumption: 50mW • Data Rates: 10-1kbps Neul Similar in concept to Sigfox and operating in the sub-1GHz band, deliver high scalability, high coverage, low power and low-cost wireless networks. The communications technology is called Weightless. • Frequency: 900MHz (ISM [N]), 458MHz (UK [P]), 470-790MHz (White Space [W]) • Range: 10km • Power Consumption: 20mA – 30mA • Data Rates: Few bps up to 100kbps Communication / Transport 22/29
  • 20. LoRaWAN Similar in some respects to Sigfox and Neul, wide-area network (WAN) applications, designed to provide low-power WANs, low-cost mobile secure bi-directional communication in IoT, M2M and smart city and industrial applications. • Frequency: 433- 868-780 -915 MHZ ISM • Range: 2-5km (urban environment), 15km (suburban environment) • Power Consumption: 25 – 50 mW • Data Rates: 0.3-50 kbps. RPMA Random phase multiple access (RPMA) is a low-power wide-area channel access method used exclusively for machine-to-machine (M2M) communication on the Internet of Things (IoT). • Frequency band: 2.4 GHz ISM • Range: 500 km (line of side) • Data Rate: 624 kbps • Power Consumption: 100 mW ~ 125 mW Communication / Transport 23/29
  • 21. DASH7 DASH7 is open source and operates primarily in sub-1GHz frequency bands. Connectivity for moving things. Specification: open source, 25 kHz or 200 kHz channel bandwidth, good for wireless sensor networks. • Frequency: 433- 868-780 -915 MHZ ISM • Range: 2-5km (urban environment), 15km (suburban environment) • Power Consumption: 30uW - 60uW • Data Rates: 0.3-50 kbps. WiMAX WiMAX (Worldwide Interoperability for Microwave Access) based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options. WiMAX was initially designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. Communication / Transport 24/29
  • 22. Cellular Any IoT application that requires operation over longer distances can take advantage of GSM/3G/4G cellular communication capabilities. WiFi Is a wide existing infrastructure that offers fast data transfer and the ability to handle high quantities of data. Communication / Transport 25/29
  • 23. • Alljoyn: open source software framework for devices and apps to discover and communicate with each other. • IoTivity: open source software framework enabling seamless connectivity to address the emerging needs of the IoT. • IEEE P2413: Standard for an Architectural Framework for the Internet of Things (IoT) • Thread: Built on open standards and IPv6 technology with 6LoWPAN as its foundation. • IPSO Application Framework: Defines sets of REST interfaces that may be used by a smart object to represent its available resources, interact with other smart objects and backend services. • OMA Light-weight-M2M: Management protocol to develop a fast deployable client-server specification to provide machine to machine service. It is able to transfer service / application data. • Weave: A communications platform for IoT devices that enables device setup, phone-to-device-to- cloud communication, and user interaction from mobile devices and the web. • Telehash: A secure wire protocol powering a decentralized overlay network for apps and devices Multi-layer Frameworks 27/29
  • 24. 29/29