Mitrc: Machine To Machine Communication
Mitrc: Machine To Machine Communication
Lecture 1
RC
Main features of M2M communications are:
IT
• It is a general concept involving an autonomous device communicating directly
to another autonomous device. Autonomous refers to the ability of the node to
instantiate and communicate information with another node without human
intervention.
M
• The form of communication is left open to the application. It may very well
be the case that an M2M device uses no inherent services or topologies for
communication.
• An M2M system may communicate over non-IP based channels as well, such
as a serial port or custom protocol.
The M2M system solution is used to remotely monitor and control enterprise assets
of various kinds, and to integrate those assets into the business processes of the
enterprise in question. The asset can be of a wide range of types (e.g. vehicle, freight
container, building, or smart electricity meter), all depending on the enterprise.
RC
The system components of an M2M solution are as follows:
• M2M Device. This is the M2M device attached to the asset of interest, and
provides sensing and actuation capabilities. The M2M device is here general-
IT
ized, as there are a number of different realizations of these devices, ranging
from low-end sensor nodes to high-end complex devices with multimodal sens-
ing capabilities.
M
RC
IT
M
[h]
further integrated into the overall business process system of the enterprise.
M2M Architecture
• An M2M area network comprises of machines (or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
• Various communication protocols can be used for M2M local area networks
such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Com-
munication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
RC
• Since non-IP based protocols are used within M2M area networks, the M2M
nodes within one network cannot communicate with nodes in an external net-
work. To enable the communication between remote M2M area networks,
M2M gateways are used.
IT
• The communication between the M2M nodes and the M2M gateway is based
on the communication protocols which are native to the M2M area network.
• The M2M data is gathered into point solutions such as enterprise applications,
service management applications, or remote monitoring applications.
• M2M has various application domains such as smart metering, home automa-
tion, industrial automation, smart grids, etc. M2M solution designs (such as
data collection and storage architectures and applications) are specific to the
M2M application domain.
Lecture 2
In many respects, it can initially look the same as M2M communication connecting
sensors and other devices to Information and Communication Technology (ICT)
systems via wired or wireless networks. IoT systems may incorporate some M2M
RC
nodes (such as a Bluetooth mesh using non-IP communication), but aggregates data
at an edge router or gateway. An edge appliance like a gateway or router serves as
the entry point onto the internet. In the longer term, it is envisaged that an IoT
ecosystem will emerge not dissimilar to today?s Internet, allowing things and real
world objects to connect, communicate, and interact with one another in the same
IT
way humans do via the web today.
Therefore, IoT is significantly different from M2M. Few important difference are:
• Communication Protocols: M2M and IoT can differ in how the communi-
M
cation between the machines or devices happens. M2M uses either proprietary
or non-IP based communication protocols for communication within the M2M
area networks. Commonly uses M2M protocols include ZigBee, Bluetooh,
ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC), 6LoW-
PAN, IEEE 802.15.4, Z-Wave, etc. The focus of communication in M2M is
usually on the protocols below the network layer. The focus of communica-
tion in IoT is usually on the protocols above the network layer such as HTTP,
CoAP, WebSockets, MQTT, XMPP etc.
RC
loT devices run specialized software for sensor data collection, data analysis
and interfacing with the cloud through IP-based communication.
• Data Collection & Analysis M2M data is collected in point solutions and
often in on-premises storage infrastructure. In contrast to M2M, the data in
IoT is collected in the cloud (can be public, private or hybrid cloud). The
IT
analytics component analyzes the data and stores the results in the cloud
database. The IoT data and analysis results are visualized with the cloud-
based applications. The centralized controller is aware of the status of all
M
the end nodes and sends control commands to the nodes. Observer nodes
can process information and use it for various applications, however, observer
nodes do not perform any control functions.
RC [h]
IT
Application of M2M
• Security applications are mainly those related to home alarms and small busi-
RC [h]
Lecture 3
RC
IT
Limitations of the conventional network architectures can be given in following
points:
ingly complex with more and more protocols being implemented to improve
link speeds and reliability. Interoperability is limited due to the lack of stan-
dard and open interfaces. The conventional networks were well suited for
static traffic patterns and had a large number of protocols designed for spe-
cific applications. For IoT applications which are deployed in cloud computing
environments, the traffic patterns are more dynamic.
SDN Defintion
RC
Software-Defined Networking (SDN) is an emerging paradigm that promises to make
complex IP network more manageable and flexible by breaking vertical integration(the
control and data planes are bundled together), separating the network?s control logic
IT
from the underlying routers and switches, promoting (logical) centralization of net-
work control, and introducing the ability to program the network.
The separation of concerns introduced between the definition of network policies,
their implementation in switching hardware, and the forwarding of traffic, is key
M
to the desired flexibility. By breaking the network control problem into tractable
pieces, SDN makes it easier to create and introduce new abstractions in networking,
simplifying network management and facilitating network evolution.
The important characteristics of SDN network are:
• The control plane is decoupled from the data plane. Data plane hardware
becomes simple packet-forwarding devices.
allows for easy scaling and flexibility with virtual switches, firewalls, and mid-
dleware.
• The control logic is also known as the SDN Controller. This software version
of legacy hardware is capable of running on commodity hardware and cloud-
based instances. Its purpose is to command and govern the simplified switching
nodes.
• The control logic is also known as the SDN Controller. This software version
of legacy hardware is capable of running on commodity hardware and cloud-
nodes.
RC
based instances. Its purpose is to command and govern the simplified switching
• Network application software can reside over the SDN controller through a
northbound interface. This software can interact and manipulate the data
IT
plane with services such as deep packet inspection, firewalls, and load bal-
ancers.
RC
• Standard Communication Interface (OpenFlow): SDN architecture uses
a standard communication interface between the control and infrastructure
IT
layers (Southbound interface). OpenFlow, which is defined by the Open Net-
working Foundation (ONF) is the broadly accepted SDN protocol for the
Southbound interface. With OpenFlow, the forwarding plane of the network
M
Advantages of SDN
SDN has many important benefits over traditional network when it comes to traffic
nature of IoT.
RC
many edge sensors only report data periodically or at a certain time of day.
Sophisticated bandwidth sharing algorithms can be constructed to time slice
capacity.
IT
M
Lecture 4
SDN Architecture
Elements of SDN Architecture
RC
some header). These instructions are defined by southbound interfaces (e.g.,
OpenFlow, ForCES ) and are installed in the forwarding devices by the SDN
controllers implementing the southbound protocols.
RC
interface abstracts the low level instruction sets used by southbound interfaces
to program forwarding devices
RC
Layer I: Infrastructure
Southbound interfaces (or southbound APIs) are the connecting bridges between
control and forwarding elements, thus being the crucial instrument for clearly sep-
arating control and data plane functionality. As a central component of its design
the southbound APIs represent one of the major barriers for the introduction and
acceptance of any new networking technology therefore standard SDN southbound
API like OpenFlow Emerges .
The OpenFlow protocol provides three information sources for network operating
systems. First, event-based messages are sent by forwarding devices to the controller
when a link or port change is triggered. Second, flow statistics are generated by the
forwarding devices and collected by the controller. Third, packet-in messages are
sent by forwarding devices to the controller when they do not known what to do
with a new incoming flow or because there is an explicit “send to controller? action
in the matched entry of the flow table.
Hypervisors enable distinct virtual machines to share the same hardware resources.
Virtual machines can be easily migrated from one physical server to another and
can be created and/or destroyed on-demand, enabling the provisioning of elastic
RC
services with flexible and easy management. Item Unfortunately, virtualization has
been only partially realized in practice.
control offered by a network operating system (NOS) The crucial value of a NOS
is to provide abstractions, essential services, and common application programming
interfaces (APIs) to developers. Generic functionality as network state and network
topology information, device discovery, and distribution of network configuration
can be provided as services of the NOS. With NOSs, to define network policies a
developer no longer needs to care about the low-level details of data distribution
among routing elements, for instance
RC
Two essential characteristics of virtualization solutions are the capability of express-
ing modularity and of allowing different levels of abstractions while still guaranteeing
desired properties such as protection Pyretic is example of such language that of-
fers this type of high-level abstraction of network topology. It incorporates this
IT
concept of abstraction by introducing network objects. These objects consist of an
abstract network topology and the sets of policies applied to it. Network objects
simultaneously hide information and offer the required services.
M
Network applications can be seen as the ?network brains?. They implement the
control-logic that will be translated into commands to be installed in the data plane,
dictating the behavior of the forwarding devices. Software-defined networks can be
deployed on any traditional network environment, from home and enterprise net-
works to data centers and Internet exchange points. Such variety of environments
has led to a wide array of network applications. Existing network applications per-
form traditional functionality such as routing, load balancing, and security policy
RC
enforcement, but also explore novel approaches, such as reducing power consump-
tion. Other examples include fail-over and reliability functionalities to the data
plane, end-to-end QoS enforcement, network virtualization, mobility management
in wireless networks, among many others. The variety of network applications, com-
bined with real use case deployments, is expected to be one of the major forces on
IT
fostering a broad adoption of SDN
M
Lecture 5
NFV originated from discussions among major network operators and carriers about
how to improve network operations in the high-volume multimedia era. These dis-
cussions resulted in the publication of the original NFV white paper, Network Func-
tions Virtualization: An Introduction, Benefits, Enablers, Challenges & Call for
RC
Action. In this white paper, the group listed as the overall objective of NFV is
leveraging standard IT virtualization technology to consolidate many network equip-
ment types onto industry standard high-volume servers, switches, and storage, which
could be located in data centers, network nodes, and in the end-user premises.
IT
The white paper highlights that the source of the need for this new approach
is that networks include a large and growing variety of proprietary hardware appli-
ances, leading to the following negative consequences:
• New network services may require additional different types of hardware ap-
M
pliances, and finding the space and power to accommodate these boxes is
becoming increasingly difficult.
• Once new types of hardware appliances are acquired, operators are faced with
the rarity of skills necessary to design, integrate, and operate increasingly
complex hardware-based appliances.
The NFV approach moves away from dependence on a variety of hardware plat-
forms to the use of a small number of standardized platform types, with virtualiza-
tion techniques used to provide the needed network functionality.
Virtualization
RC
Virtualization encompasses a variety of technologies for managing computing re-
sources, providing a software translation layer, known as an abstraction layer, be-
tween the software and the physical hardware. Virtualization turns physical re-
sources into logical, or virtual, resources. Virtualization enables users, applications,
IT
and management software operating above the abstraction layer to manage and
use resources without needing to be aware of the physical details of the underlying
resources.
M
individual physical servers, processors, and operating systems, from server users.
RC
This makes it possible to partition a single host into multiple independent servers,
conserving hardware resources. It also makes it possible to quickly migrate a server
from one machine to another for load balancing or for dynamic switchover in the case
of machine failure. Server virtualization has become a central element in dealing
IT
with big data applications and in implementing cloud computing infrastructures.
Container Virtualization
NFV Concept
RC
Network Function Virtualization is defined as the virtualization of network functions
by implementing these functions in software and running them on VMs. NFV de-
couples network functions, such as Network Address Translation (NAT), firewalling,
intrusion detection, Domain Name Service (DNS), and caching, from proprietary
IT
hardware appliances so that they can run in software on VMs.NFV builds on stan-
dard VM technologies, extending their use into the networking domain.
The network-based devices, include the following:
M
requires additional hardware for increased capacity, but this hardware is idle when
the system is running below capacity. With NFV, however, network elements are
independent applications that are flexibly deployed on a unified platform comprising
standard servers, storage devices, and switches. In this way, software and hardware
are decoupled, and capacity for each application is increased or decreased by adding
or reducing virtual resources.
RC
By broad consensus, the Network Functions Virtualization Industry Standards
Group (ISG NFV), created as part of the European Telecommunications Standards
Institute (ETSI), has the lead and indeed almost the sole role in creating NFV
standards.ISG NFV was established in 2012 by seven major telecommunications
network operators.
IT
Simple Example of the Use of NFV
This section considers a simple example from the NFV Architectural Framework
document. Part a of Figure 7.6 shows a physical realization of a network service. At
M
a top level, the network service consists of endpoints connected by a forwarding graph
of network functional blocks, called network functions (NFs). Examples of NFs are
firewalls, load balancers, and wireless network access points. In the Architectural
Framework, NFs are viewed as distinct physical nodes. The endpoints are beyond
the scope of the NFV specifications and include all customer-owned devices. So, in
the figure, endpoint A could be a smartphone and endpoint B a content delivery
network (CDN) server.
The interconnections among the NFs and endpoints are depicted by dashed
lines, representing logical links. These logical links are supported by physical paths
through infrastructure networks (wired or wireless).
RC
IT
M
The reason for this is that three separate and distinct network functions are being
performed. For example, it may be that some traffic flows need to be subjected to a
traffic policing or shaping function, which could be performed by VNF-2C. So, some
flows would be routed through VNF-2C, while others would bypass this network
function.
A second observation is that two of the VMs in VNF-FG-2 are hosted on the
same physical machine. Because these two VMs perform different functions, they
need to be distinct at the virtual resource level but can be supported by the same
physical machine. But this is not required, and a network management function
RC
may at some point decide to migrate one of the VMs to another physical machine,
for reasons of performance. This movement is transparent at the virtual resource
level.
NFV Principle
IT
The VNFs are the building blocks used to create end-to-end network services. Three
key NFV principles are involved in creating practical network services:
M
• Service chaining: VNFs are modular and each VNF provides limited func-
tionality on its own. For a given traffic flow within a given application, the
service provider steers the flow through multiple VNFs to achieve the desired
network functionality. This is referred to as service chaining.
NFV Advantages
RC
• Reduced CapEx, by using commodity servers and switches, consolidating equip-
ment, exploiting economies of scale, and supporting pay-as-you grow models
to eliminate wasteful overprovisioning.
• The ability to innovate and roll out services quickly and also lowers the risks
associated with rolling out new services, allowing providers to easily trial and
M
• Use of a single platform for different applications, users and tenants. This
allows network operators to share resources across services and across different
customer bases.
NFV Requirements
RC
• Portability/interoperability: The capability to load and execute VNFs
provided by different vendors on a variety of standardized hardware platforms.
The challenge is to define a unified interface that clearly decouples the software
instances from the underlying hardware, as represented by VMs and their
hypervisors.
IT
• Performance trade-off : Because the NFV approach is based on industry
standard hardware (that is, avoiding any proprietary hardware such as ac-
celeration engines), a probable decrease in performance has to be taken into
M
faces (for management and control) and interwork with physical appliances
implementing the same functions.
• Automation: NFV will scale only if all the functions can be automated.
RC
Automation of process is paramount to success.
avoiding lock-in. The ecosystem must offer integration services and mainte-
nance and third-party support; it must be possible to resolve integration issues
between several parties. The ecosystem will require mechanisms to validate
new NFV products.
RC
IT
M
Lecture 6
NFV Architecture
NFV Terminology
RC
• Network Services: A composition of network functions that is defined by
its functional and behavioral specification.
across several locations (that is, multiple points of presence [N-PoPs). The
network providing connectivity between these locations is considered to be
part of the NFVI.
RC
• Network Forwarding Path: Ordered list of connection points forming a
chain of NFs, along with policies associated with the list.
• VNF Forwarding Path: Graph of logical links connecting VNF nodes for
IT
the pur- pose of describing traffic flow between these network func- tions.
RC
Figure 2: High-Level NFV Framework
The ISG NFV Architectural Framework document specifies that in the deploy-
ment, operation, management and orchestration of VNFs, two types of relations
between VNFs are supported:
• VNF forwarding graph (VNF FG): Covers the case where network con-
nectivity between VNFs is specified, such as a chain of VNFs on the path
to a web server tier (for example, firewall, network address translator, load
balancer).
• VNF set: Covers the case where the connectivity between VNFs is not spec-
ified, such as a web server pool.
We have discussed high-level framework in above section. Figure given below shows
a more detailed look at the ISG NFV reference architectural framework. You can
view this architecture as consisting of four major blocks:
RC
• VNF/EMS: The collection of VNFs implemented in software to run on virtual
computing, storage, and networking resources, together with a collection of
element management systems (EMS) that manage the VNFs.
It is also useful to view the architecture as consisting of three layers. The NFVI
together with the virtualized infrastructure manager provide and manage the virtual
resource environment and its underlying physical resources. The VNF layer provides
the software implementation of network functions, together with element manage-
ment systems and one or more VNF managers. Finally, there is a management,
orchestration, and control layer consisting of OSS/BSS and the NFV orchestrator.
RC
Figure 3: High-Level NFV Framework
IT
NFV Management and Orchestration
The NFV management and orchestration facility includes the following functional
blocks:
M
Reference Points
Architecture also defines a number of reference points that constitute interfaces be-
tween functional blocks. The main (named) reference points and execution reference
points are shown by solid lines and are in the scope of NFV. These are potential
targets for standardization.
The main reference points include the following considerations:
RC
ent purposes, reassigning resources for different purposes, evolving software
and hardware independently, and obtaining software and hardware compo-
nent from different vendors.
• Vn-Nf : These interfaces are APIs used by VNFs to execute on the virtual
IT
infrastructure. Application developers, whether migrating existing network
functions or developing new VNFs, require a consistent interface the provides
functionality and the ability to specify performance, reliability, and scalability
requirements.
M
• Nf-Vi: Marks interfaces between the NFVI and the virtualized infrastructure
manager (VIM). This interface can facilitate specification of the capabilities
that the NFVI provides for the VIM. The VIM must be able to manage all the
NFVI virtual resources, including allocation, monitoring of system utilization,
and fault management.
• Vi-Vnfm: Used for resource allocation requests by the VNF manager and the
exchange of resource configuration and state information.
• Or-Vi: Used for resource allocation requests by the NFV orchestrator and
the exchange of resource configuration and state information.
• Os-Ma: Used for interaction between the orchestrator and the OSS/BSS sys-
tems.
• Ve-Vnfm: Used for requests for VNF lifecycle management and exchange of
RC
configuration and state information.
• Se-Ma: Interface between the orchestrator and a data set that provides in-
formation regarding the VNF deployment template, VNF forwarding graph,
service-related information, and NFV infrastructure information models.
IT
M
Lecture 7
RC
network forwarding functions, while NFV seeks to abstract network forwarding and
other networking functions from the hardware on which it runs. SDN abstracts
physical networking resources ?switches, routers and so on ? and moves decision
making to a virtual network control plane. In this approach, the control plane de-
cides where to send traffic, while the hardware continues to direct and handle the
IT
traffic. NFV aims to virtualize all physical network resources beneath a hypervisor,
which allows the network to grow without the addition of more devices. When SDN
executes on an NFV infrastructure, SDN forwards data packets from one network
device to another. At the same time, SDN’s networking control functions for rout-
M
ing, policy definition and applications run in a virtual machine somewhere on the
network. Thus, NFV provides basic networking functions, while SDN controls and
orchestrates them for specific uses. SDN further allows configuration and behavior
to be programmatically defined and modified.
The concern of a network service provider is about the set of network devices
(such as routers) and the control and management of the functions they perform
(such as packet forwarding). Both SDF and NFV can be used seperately to provide
this but SDN and NFV are not mutually exclusive. If both SDN and NFV are
implemented for a network, the following relationships hold:
• The relationship between SDN and NFV is perhaps viewed as SDN functioning
as an enabler of NFV.
• A major challenge with NFV is to best enable the user to configure a network so
that VNFs running on servers are connected to the network at the appropriate
place, with the appropriate connectivity to other VNFs, and with desired QoS
RC
• With SDN, users and orchestration software can dynamically configure the
network and the distribution and connectivity of VNFs.
• Without SDN, NFV requires much more manual intervention, especially when
resources beyond the scope of NFVI are part of the environment.
IT
NFV and SDN combined architecture
Some of the ways that ETSI believes that NFV and SDN complement each other
include the following:
M
• The SDN controller fits well into the broader concept of a network controller
in an NFVI network domain.
• SDN can play a significant role in the orchestration of the NFVI resources, both
physical and virtual, enabling functionality such as provisioning, configuration
of network connectivity, bandwidth allocation, automation of operations, mon-
itoring, security, and policy control.
RC
IT
• Forwarding graphs can be implemented using the SDN controller to provide
automated provisioning of service chains, while ensuring strong and consistent
implementation of security and other policies.
M
• The SDN controller can be run as a VNF, possibly as part of a service chain
including other VNFs. For example, applications and services originally de-
veloped to run on the SDN controller could also be implemented as separate
VNFs.
• SDN controller can be virtualized, running as a VNF with its EM and VNF
manager. Note that there may be SDN controllers for the physical infrastruc-
ture, the virtual infrastructure, and the virtual and physical network functions.
As such, some of these SDN controllers may reside in the NFVI or management
and orchestration (MANO) functional blocks (not shown in figure).
• SDN enabled VNF includes any VNF that may be under the control of an
SDN controller (for example, virtual router, virtual firewall).
RC
• Nf-Vi interface allows management of the SDN enabled infrastructure.
• Ve-Vnfm interface is used between the SDN VNF (SDN controller VNF, SDN
network functions VNF, SDN applications VNF) and their respective VNF
IT
Manager for lifecycle management.
• Vn-Nf allows SDN VNFs to access connectivity services between VNFC inter-
faces.
M
Lecture 8
RC
diverse heterogeneous devices that rely on sensory, communication, networking and
information processing technologies required to provide advanced services aimed to
improve our quality of life. The application doamins stems from healthcare (medical
monitoring devices) to smart grids, transportation systems, industrial and automa-
tion sectors, just to mention a few. IoT draws together various technologies such as
IT
Radio Frequency Identification (RFID), Near Field Communication (NFC), Wireless
Sensor Networks (WSN), Machine-to-Machine (M2M) communications. However,
the complexity, possible limitations and heterogeneity of various IoT devices con-
nected to the internet will require even more specific tools to manage them and to
M
improve the performance of the whole network. The critical aspects are often not
only related on the characteristics of the devices but also on the adopted proprietary
architectures. This is particular evident in the emerging domain of “deterministic
networking” mainly for industrial applications, and on the Low Power, low bit rate
Wide Area Networks (LPWAN) domain such as LoRa or Sigfox, mainly for telemetry
applications.
Traditional architectures and network protocols for IoT devices are not designed
to support high level of scalability, high amount of traffic and mobility together with
the above mentioned requirements. They are inefficient and have limitations to sat-
isfy these new requirements. Moreover, with the incredible numbers of connected
objects forecasted according to Gartner1, it?s difficult to manage these devices gen-
erating
an impressive amount of data as a whole, without having elasticity and flexibility
inherently defined in the network. If the networks are not prepared, the flood of IoT
where a lot of traffic are generated could leave the network paralysed.
To achieve such goals, emerging technologies such as software defined networking
(SDN) and Network Function Virtualization (NFV) are being considered as technol-
ogy enablers to provide adequate solutions. SDN has recently received a great deal
of attention from researchers and has proven itself in data centers networks, where
RC
joint optimization of network and IT resources are the main goals. Just for an exam-
ple, Google has revealed the use of SDN for managing its networking infrastructure
interconnecting their data centres has revealed the use of SDN for managing its
networking infrastructure interconnecting their data centres.
IT
SDN is a new approach for network programmability where the network operator
programs the controller to automatically manage data plane devices and optimize
network resource usage. This results in improved network performance in terms of
network management, control and data handling. Network Function Virtualization
M
RC
can be used to allow different objects connected to heterogeneous networks
to communicate with each other. This will be able to handle simultaneous
connections of various communication technologies. Network management de-
cisions such as routing, scheduling can be done at the SDN controller and
moreover, the programmability allows for any updates for new proposals or
IT
even clean state approaches.
ages and configuration errors. The ability to self-configure and adapt to the
environment without human
4. Management: The SDN controller manages and supervises the entire net-
work. The centralized position of the SDN controller makes it suitable to have
RC
a global vision of the network topology and conditions, performing network
control such as routing and QoS control. The controller can determine the
best routing decisions and inserting these decisions into the flow tables. The
sensor nodes do not make routing decisions but only forward and drop packets
according to the rules set by the controller. The scheduling must be built
IT
over defined routes and the controller can optimize the sleep/active cycles of
the sensors by choosing the most energy-efficient set in every scheduling cycle.
Latency can be reduced and significant energy savings can be achieved.
M
(3) load balancing (4) fault-tolerance among others. With multiple controllers,
this can be used to offload computational tasks which brings benefits in terms
of administration. Each domain has its SDN controller which controls all traf-
fic in its domain. When one SDN controller fails, another SDN controller can
take control to avoid network failures.
RC
ferent time periods. SDN is able to strengthen network controlling ability and
also perform dynamic adaptation of control logic by the devices in real-time.
SDN and its extension to the Wireless Sensors and Actuators Domain will give
the possibility to support application specific requirements with control logic
that jointly act at the network and processing level enhancing the QoS/QoE
IT
of the entire system.