Internet of Things - Architecture and Protocols - Unit 1
Internet of Things - Architecture and Protocols - Unit 1
PRUDHVI KIRAN P
Assistant Professor, CSE - IoT Dept.
R. V. R. & J. C. College of Engineering
UNIT - 1 [ 12 Periods ]
IoT Network Architecture and Design: Drivers behind New Network Architectures, The
OneM2M IoT Standardized Architecture, The IoT World Forum (IoTWF) Standardized
Architecture, A Simplified IoT Architecture - The Core IoT Functional Stack, IoT Data
Management and Compute Stack.
IoT Connectivity Technologies (PART 1):
1. Introduction
2. IEEE 802.15.4 - Overview, Architecture, Topology, Addressing Modes and Packet
Structure, Security, 802.15 standards
3. Zigbee - Overview, Protocol Stack, PHY and MAC Layer, Addressing Modes and Packet
Structure, Topology, Security
4. Z-Wave - Overview, Protocol Stack, Addressing, Topology and Routing.
While this architecture may seem simple and somewhat generic at first glance, it is very rich and
promotes interoperability through IT-friendly APIs and supports a wide range of IoT
technologies.
Applications Layer:
Here the major attention is given to connectivity between devices and their applications, using
application-layer protocols and attempts to standardize API definitions for interaction with
business intelligence (BI) systems.
Applications tend to be industry specific and have their own sets of data models and thus they
are shown as vertical entities.
Services Layer:
This layer is shown as a horizontal framework across the vertical industry applications. At this
layer, horizontal modules include the physical network that the IoT applications run on, the
underlying management protocols, and the hardware.
This conceptual layer adds APIs and middleware supporting third party services and applications.
Network Layer:
This is the communication domain for the IoT devices and endpoints. It includes the devices
themselves and the communication network that links them. Embodiments of this
communication infrastructure includes wireless mesh technologies such as IEEE 802.15.4, and
wireless point-to-multipoint systems, such as IEEE 801.11. Also included are wired device
connections, such as IEEE 1901 power line communications.
Common services layer, which can be readily embedded in field devices to allow
communication with application servers. One of the greatest challenges in
designing an IoT architecture is dealing with the heterogeneity of devices,
software, and access methods.
UNDERSTANDING ONE M2M ARCHITECTURE WITH GIF IMAGE
1.1.3 The IoT World Forum (IoTWF) Standardized Architecture
In 2014 the IoTWF architectural committee COLLABORATION & PROCESSES
(led by Cisco, IBM, Rockwell Automation, 7 (Involving people & business processes)
and others) published a seven layer IoT APPLICATION
architectural reference model. Each of the 6 (Reporting analysis control)
seven layers is broken down into specific
DATA ABSTRACTION
functions, and security encompasses the 5 (Aggregation & access)
entire model.
DATA ACCUMULATION
According to an official press release by 4 (Storage)
Cisco forum host, the architecture aims to
EDGE (FOG) COMPUTING
help educate IT departments and 3 (Data element analysis and transformation)
developers on deployment of IoT projects,
and accelerate the adoption of IoT. CONNECTIVITY
2 (Communication & Processing units)
About Layers
PHYSICAL DEVICES & CONTROLLERS
Layer 1 - Physical Devices 1 ('Things' in IoT)
Including the various endpoint devices and
IOT WORLD FORUM (IOTWF)
sensors that send and receive information.
STANDARDIZED ARCHITECTURE
The size of these “things” can range from almost microscopic sensors to giant machines in a
factory.
Their primary function is generating data and being capable of being queried and/or controlled
over a network.
Layer 2 - Connectivity
The focus is on connectivity. The most important function of this IoT layer is the reliable and
timely transmission of data. Few functions include, communication between Layer 1 devices,
switching and routing, translation between protocols, network level security.
Layer 3 - EDGE/FOG
Edge computing is often referred to as the “fog” layer. At this layer, the emphasis is on data
reduction and converting network data flows into information that is ready for storage and
processing by higher layers.
One of the basic principles of this reference model is that information processing is initiated as
early and as close to the edge of the network as possible, this will be done by fog/edge
computing in Layer 3.
Functions include, Evaluate and reformat data for processing at higher levels, Filter data to
reduce traffic in higher level processing.
Layer 4 - Data Accumulation
Captures data and stores it so it usable by applications when necessary. Converts event-based
data to query based processing.
Layer 5 - Data Abstraction
Reconciles multiple data formats and ensures consistent semantics from various sources.
Confirms that the data set is complete and consolidates data into one place or multiple data
stores.
Layer 6 - Application
Interprets data using software applications. Applications may monitor, control and provide
reports based on the analysis of the data.
Layer 7 - Collaboration
Consumes and shares the application information. This layer can change business processes and
delivers benefits of IoT.
The bottom of the stack is generally in the domain of IoT (Layer 1 to Layer 4), this includes sensors
and the data generated here is event based real-time data. The top of the stack (Layer 4 to Layer 7)
is in the IT area and includes things like the servers, databases and applications, the date generated
here is query based ‘data in rest’.
Using this reference model, we are able to achieve the following:
Decompose the IoT problem into smaller parts.
Identify different technologies at each layer and how they relate to one another.
Define a system in which different parts can be provided by different vendors.
Have a process of defining interfaces that leads to interoperability.
Define a tiered security model that is enforced at the transition points between levels.
1.1.4 A Simplified IoT Architecture - The Core IoT Functional Stack, IoT Data Management
and Compute Stack
Simplified IoT Architecture is an IoT framework that highlights the fundamental building blocks
that are common to most IoT systems. Simplified IoT Architecture also intended to help you in
designing an IoT network.
A Simplified IoT Architecture is presented as two parallel stacks; Core IoT Functional Stack and
IoT Data Management and Compute Stack.
Note that, Data Management and Compute Stack is aligned with each of the three layers of the Core
IoT Functional Stack. The three data management layers are the edge layer (data management
within the sensors themselves), the fog layer (data management in the gateways and transit
network), and the cloud layer (data management in the cloud or central data centre). An expanded
view of the Simplified IoT architecture is presented below:
THE CORE IOT FUNCTIONAL STACK
Three layers presented in Core IoT Functional Stack represents the most foundational building
blocks of IoT architecture.
Layer 1: Things: Sensors and Actuators Layer
This layer represents the "things" in IoT. Things are actuators and sensors, the smart objects,
embedded with software, and other technologies for the purpose of connecting and exchanging
data with other devices and systems. Architectural classification of this "things" could be done on
basis of;
• Battery-powered or power-connected
• Mobile or static
• Low or high reporting frequency
• Simple or rich data (quantity of data exchanged at each report cycle)
• Report range (distance at which the gateway is located)
• Object density per cell
Layer 2: Communications Network Layer
Smart objects are not self contained, they need to communicate with an external system. In most
of the cases, this communication uses a wireless technology. This layer has four sublayers:
1. Access Network Sublayer
2. Gateways and backhaul network sublayer
3. Network transport sublayer
4. IoT network management sublayer
1. Access Network Sublayer
There is a direct relationship between the IoT network technology (for connectivity between
things) we choose and the type of connectivity and topology this chosen technology allows.
Each network technology was designed with a certain number of use cases in mind, like what to
connect, where to connect, how much data to transport at what interval and over what distance.
Common network groups represented by Access network Sublayer are as follows;
PAN (personal area network): Scale of a few meters. This is the personal space around a person.
A common wireless technology for this scale is Bluetooth.
HAN (home area network): Scale of a few tens of meters. At this scale, common wireless
technologies for IoT include ZigBee and Bluetooth Low Energy
NAN (neighbourhood area network): Scale of a few hundreds of meters. The term NAN is often
used to refer to a group of house units from which data is collected.
FAN (field area network): Scale of several tens of meters to several hundred meters. FAN typically
refers to an outdoor area larger than a single group of house units.
LAN (local area network): Scale of up to 100 m. This term is very common in networking, and it
is therefore also commonly used in the IoT space where standard networking technologies
(such as Ethernet or IEEE 802.11) are used.
Common topologies represented by Access network Sublayer are as follows;
SATELLITE
always involves
negotiating a balance
between three <= 45
PERSONAL AREA
fundamental connectivity PAN NETWORK METERS
parameters:
a) Range/Distance Covered
b) Bandwidth - Speed LPWAN LOW POWER WIDE
AREA NETWORK
FEW THOUSANDS
KILO METERS
c) Power consumption
Technologies that are widely
used in IoT now-a-days, are
mentioned in the figure;
IOT CONNECTIVITY TECHNOLOGIES - DEPLOYMENT RANGE
1.2.2 IEEE 802.15.4 - Overview
IEEE 802.15.4 (LR-WPAN) is a technical standard which defines the operation of wireless personal
area network which focuses on low data rate but very long battery life and very low complexity.
It specifies the physical layer (PHY) and media access control layer (MAC) layers for LR-WPANs,
and is maintained by the IEEE 802.15 working group, which defined the standard in 2003.
It is the basis for the Zigbee, ISA100.11a, Wireless HART, Thread and few other specifications,
each of which further extends their standard by developing the upper layers which are not
defined in IEEE 802.15.4.
IEEE standard 802.15.4 intends to offer the fundamental lower network layers of a type of
wireless personal area network (WPAN) which focuses on low-cost, low-speed ubiquitous
communication between devices. It can be contrasted with other approaches, such as Wi-Fi,
which offer more bandwidth and requires more power. The basic framework conceives a 10-
meter communications range with line-of-sight at a transfer rate of 250 kbit/s.
Networks based on IEEE 802.15.4 can be developed in a star, peer-to-peer, or mesh topology.
Mesh can connect large number of devices, where devices doesn't have to communicate directly
to a gateway, but just forward its message to the next closest device.
IEEE 802.15.4 - Key Features
Real-Time Suitability by reservation of Guaranteed Time Slots (GTS), I.e. One or more slots of time
reserved for a particular node for it’s operation.
Collision Avoidance through CSMA/CA - Carrier-sense multiple access with collision avoidance, it
is a protocol for carrier transmission in 802.11 networks. It was developed to minimize the
potential of a collision occurring when two or more stations send their signals over a data link
layer. CSMA requires each station to first check the state of the medium before initiating a
transmission. This helps to avert potential collisions by listening to the broadcasting nodes and
then informing devices to transmit when the channel is free.
Integrated support for Secure Communications, ensuring Data Confidentiality, Data Integrity,
Data Authentication, Data Freshness. It also offers Power Management functions such as link
speed/quality and energy detection.
Support for time and data rate sensitive applications because of its ability to operate either as
CSMA/CA or TDMA (Time Division Multiple Access) access modes. The TDMA mode of operation is
supported via the GTS feature of the standard.
IEEE 802.15.4 supported devices may use one of three possible frequency bands for operation
868/915/2450 MHz
IEEE 802.15.4 - Architecture
IEEE 802.15.4 PHY
The PHY provides two services: the PHY Data
Service and PHY Management Service interfacing to
the physical layer management entity (PLME).
The PHY data service enables the transmission and
reception of PHY protocol data units (PPDUs) across
the physical radio channel.
The PHY management services are activation and
deactivation of the radio transceiver, energy
detection (ED), link quality indication (LQI), channel
selection, clear channel assessment (CCA) and
transmitting as well as receiving packets across the
physical medium.
To maintain a common simple interface with MAC,
both PHY data service and management service
share a single packet structure.
IEEE 802.15.4 MAC
The purpose of the IEEE 802.15.4 MAC layer is to provide an interface between the physical layer
(PHY) and the application layer. The as IEEE 802.15.4 does not specify an application layer, this is
generally an application system such as Zigbee. The IEEE 802.15.4 MAC provides the interface to
the application layer using two elements:
The MAC provides two services: the MAC Data Service and MAC Management Service
interfacing to the MAC layer management entity (MLME).
The MAC data service enables the transmission and reception of MAC protocol data units
(MPDUs) across the media access control (MAC) entities.
The MAC management services are scheduling and routing of data packets, Beaconing for devices
that operate as controllers in a network, associate and dissociate PANs with the help of devices,
safety of the device and make sure of Consistent communication between MAC devices.
UPPER LAYERS
No upper/higher-level layers and interoperability sublayers are defined in the standard. Other
specifications, such as Zigbee and many more, build upper layers of their own making IEEE
802.15.4 as their base layer.
LLC & SSCS
logical link control (LLC) and service specific convergence sub-layer (SSCS) are used to
communicate with all upper layers. LLC controls the synchronization, flow control, and error-
checking functions of the Upper Layers. SSCS is an intermediate layer of a layer model, which is
responsible for the converted traffic. SSCS is service-dependent and provides secured data
transmission.
IEEE 802.15.4 - Security
the MAC sublayer of IEEE 802.15.4 offers facilities which can be harnessed by upper layers to
achieve the desired level of security. For data security, the IEEE 802.15.4 standard employs the
Advanced Encryption Standard (AES) with a 128-bit key length as the basic encryption technique.
Furthermore, MAC computes freshness checks between successive receptions to ensure that
presumably old frames, or data which is no longer considered valid, does not transcend to higher
layers.
The IEEE 802.15.4 PHY and MAC layers serve as a basis for a variety of networking profiles that
operate in different IoT access scenarios. DASH7 is a competing radio technology with distinct PHY
and MAC layers.
IEEE 802.15.4 - Packet Structure
MAC Packet
Frame Control Field - It is 2 bytes long field which defines type of frame, i.e., management(00),
control(01) or data(10). Data Sequence Number - Following each packet transmission, the firmware
increments the sequence number field by 1. This maintains the data order. Address Information -
Source and Destination address information. Payload - Transmission data unit. Frame Check Sequence
- Error-detecting code added to a frame.
PHY Packet
Preamble Sequence - Provides synchronization between a client and a base station. Each packet is
preceded by a sequence of alternate 1s and 0s to allow the receiving system to synchronize its local
clock with that of the transmitter. Start of frame Delimiter - Iindicates that it is followed by the real
data. Frame Length - Data Frame size. MPDU - MAC Frame/Header.
IEEE 802.15.4 - Addressing Modes
IEEE 802.15.4 address frame will be configured as one of below mentioned three different
addressing modes; that is included in the frame.
1. No address: For example, both addresses are missing from ACK frames as Mobile node senses
the medium for ACK when it wants to. Another scenario is for data and command frames, only
one, either source or destination address field can be omitted - if the source address is omitted,
it means the PAN coordinator sent the frame; if the destination address is missing, it means it
should be received by the PAN coordinator.
2. Long address: 8 Byte EUI-64 address assigned to it during manufacturing. This address is unique
between all devices that supports this address format. This is usually called the long address.
3. Short address: Each device can configure a 2 Byte short address. This should be unique within
the PAN. However, a network layer can also configure a short address to devices, usually during a
join process.
IEEE 802.15.4 - Supporting Topology
In a peer-to-peer topology, it is In a mesh topology, each node Star topology is a type of
not typically feasible for each in a peer-to-peer network also network topology in which
node to be directly connected functions as a router. This every device in the network is
to each other node, so instead routing layer allows you to individually connected to a
they connect to some subset of directly address nodes to which central node, known as the
nodes. Information can be you are not directly connected, switch or hub. If two nodes
published to the network in a because intermediate nodes want to communicate with each
broadcast fashion, where it will pass the message along other, node have to contact
eventually becomes available to until it reaches the target node. central node and central node
everyone, but it is not possible The message is only passed to then transfers the message to
to directly address nodes in the the next, so the data is not intended receiver node.
network to which you are not broadcast to the entire network
directly connected. like peer-to-peer.
IEEE 802.15 Standards
IEEE 802.15.4 - APPLICATIONS IN IoT
The IEEE 802.15. 4 standard specifies the MAC and PHY layers of Low-Rate Wireless Personal Area
Networks (LR-WPANs). The IEEE 802.15. 4 MAC and PHY layers provide the basis of other higher-
layer standards, such as ZigBee, WirelessHart, 6LoWPAN and MiWi.
1.2.3 Zigbee - Overview
ZigBee is a technological standard created
for Control and Sensor Networks.
ZigBee works in close proximity
environment (i.e., personal area networks)
such as for home automation, medical
device data collection, and other low-
power low-bandwidth needs, designed for
small scale projects which need wireless
connection.
ZigBee is Created in 2006 by the ZigBee
Alliance in which, Philips, Motorola, Intel,
HP are the members of this alliance.
ZigBee is Based on the IEEE 802.15.4
Standard. ZigBee supports low power
consumption, allowing batteries to
essentially last for ever.
ZigBee - Characteristics
Low power consumption with battery life ranging from months to years.
High density of nodes per network.
Low cost.
Simple implementation.
Low data rate.
Reliable data.
Adequate security features.
Small packet devices.
ZigBee - Applications
The ZigBee is used in set top boxes and remote controls.
It is used in safety and surveillance system, fire alarms, pressure sensors, meter reading monitors,
health and environmental monitors for live monitoring.
It is used for automation and control such as home, factory, warehouse and building.
It is used for situational awareness and precision asset location like military actions, firefighters
operations, real time tracking of inventory.
It is used for entertainment such as learning games and interactive toys.
It is used in medical data collection.
ZigBee - Device Types
There are three different ZigBee device types that operate on the layers in any self-organizing
application network;
1. Zigbee Coordinator node(ZCN) REDUCED FUNCTION DEVICE
2. Full Function Device(FFD)
3. Reduced Function Device(RFD)
1. Zigbee Coordinator node (ZCN)
It is the root of network tree and a bridge to other network.
Able to store information about the network. Only one ZCN for
a network. It act as a repository for other security keys.
2. Full Function Device (FFD) FULL FUNCTION DEVICE
STAR
TOPOLOGY
MESH
TOPOLOGY
END OF UNIT 1