0% found this document useful (0 votes)
22 views

Module 5

Uploaded by

gaya3devi.2003b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Module 5

Uploaded by

gaya3devi.2003b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

IOT PRESENTATION

By
Gayathri Devi B
Module 5

Topic: Introduction
and Infrastructure
protocol
Introduction
These nodes where regular features of
Internet-communicating devices are
generally not available.

CONSTRAINED NODES
Suffer from restrictions in memory,
processing power, and network features,
often due to cost, size, weight, and power
constraints.

These nodes typically have limited Layer


2 capabilities, lack full connectivity, and
may not support broadcasting.

Energy optimization and bandwidth


utilization are key research areas for
improving the performance of constrained
nodes in networks.
Constrained networks
Constrained networks are those in which some or all of the constituent nodes are limited in usage aspects
due to the following constraints:

 Limited processing power resulting in restrictions


on achieving smaller duty cycles.
 IOT communication technologies low data rates
and low throughput.
 Asymmetric links and increased packet losses.
 Restrictions on supported packet sizes due to
increased packet losses.
 Lack of advanced layer 3 functions such as
multicasting and broadcasting.
 Limited temporal device reachability from outside
the network due to the inclusion of sleep states for
power management in the devices.
Class 0:
• The barely feasible memory and do not allow for direct
communication to the Internet.
• The security of the device are not supported at all due to
the device’s reduced capabilities.
• Typically, this class of device communicates to the Internet
through a gateway or a proxy.
Class 1:
• These devices are constrained concerning available
Types of constrained devices code space and processing power and can primarily
talk to the Internet or CoAP, but cannot employ a
regular full protocol stack such as HTTP.
Class 2: • It has a comparatively increased power budget; with
They function similar to regular portable increased functionalities it supports over Class 0
computers such as laptops and PDAs (personal devices.
digital assistants). • This class does not need a gateway and can be armed
They have the ability and capacity to support full with security features for ensuring safer
protocol stacks of commonly used protocols such communication over the Internet.
as HTTP, TLS, and others.
However, as compared to the previous two classes
of devices, these devices have a significantly
higher power budget.
Comprises devices or nodes with limited power, small
usable memory space, and limited available processing
resources.

The network links between the devices in this network


may be composed if low power Wi-Fi .
Low Power and lossy
network
The physical layers are characterized by high variations
in delivery rates, packet losses and unreliability.

Widely used in industrial automation, smart homes, logistics,


environment monitoring and energy management.
Infrastructure Protocols
IPv6 It is much better than IPv4 because
• Larger Addressing Range
• Simplified Header Structure
• End-to-end connectivity
• In-built security and faster packet forwarding

It stands for Lightweight On-demand Ad hoc Distance vector Routing Protocol-Next


LOADng Generation.
• Bi-directional network route discovery between a source and destination
• Route establishment and maintenance between the source and destination where the data is sent through the route.
• Generation of control and signaling traffic in the network during data transmission between source and destination.

RPL It stands for Routing Protocol for low-power and lossy networks.
• It constructs a destination-oriented acyclic graph (DODAG) based on objective functions and network metrics.
• It supports QoS- aware and constraint-based routing by allowing nodes to multiple RPL instances and take on various
network roles.
• The RPL border router, acting as a root, manages intra-mesh addressing to accommodate diverse network requirements
and objective functions.
6LoWPAN

1.6LoWPAN enables IPv6 support for low-power and constrained


wireless personal area networks (WPANs).
2.It is designed to be simple, low-cost, and operational over IEEE
802.15.4-based networks.
3.6LoWPAN allows constrained devices to use 128-bit IPv6 addresses
through header compression.
4.6LoWPAN networks consist of reduced function devices (RFDs)
and full function devices (FFDs).
5.RFDs, with limited capabilities, rely on FFDs to forward their data
to 6LoWPAN gateways.
6.FFDs forward the data from RFDs to 6LoWPAN gateways in a
multi-hop manner.
7.Gateways connect 6LoWPAN networks to the larger IPv6 internet.
Low-latency, independent TCP
connection designed to reduce latency
and improve performance.

UIC
Q

It aims to achieve near-zero Uses advanced techniques like packet


It employs header compression
round-trip-time pacing and proactive speculative
to reduce redundancy
communication with stream retransmission to avoid congestion.

net
t e r
i n s
DP on
U c t i
i c k ne
Q u c on
Leverages UDP and multiple
transmission paths to significantly
improve streaming performance.
Sequential OS-
independent Manages
connection
network
handling
behavior

Hardware
Application Micro-IP driver
provides
retransmitted (uIP) handles
packet
data protocol operations

No data
buffering for Uses minimal
retransmission packet buffer
Half-duplex
packet buffer
usage.

You might also like