S&D PPTs sensors and devices presentation

ssuser0b643d 17 views 87 slides Aug 20, 2024
Slide 1
Slide 1 of 87
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87

About This Presentation

S&D PPTs sensors and devices presentation


Slide Content

Sensors and Devices
Unit-II
4/4/2024 1

Syllabus
4/4/2024 2

Machine-to-Machine (M2M)
•Machine-to-Machine(M2M)refersto
networkingofmachines(ordevices)forthe
purposeofremotemonitoringandcontroland
dataexchange.
4/4/2024 3

Machine-to-Machine (M2M)
•AnM2Mareanetworkcomprisesofmachines(orM2Mnodes)whichhave
embeddedhardwaremodulesforsensing,actuationandcommunication.
•VariouscommunicationprotocolscanbeusedforM2Mlocalareanetworkssuchas
ZigBee,Bluetooh,ModBus,M-Bus,WirlessM-Bus,PowerLineCommunication
(PLC),6LoWPAN,IEEE802.15.4,etc.
•ThecommunicationnetworkprovidesconnectivitytoremoteM2Mareanetworks.
•Thecommunicationnetworkcanuseeitherwiredorwirelessnetworks(IPbased).
•WhiletheM2Mareanetworksuseeitherproprietaryornon-IPbasedcommunication
protocols,thecommunicationnetworkusesIP-basednetwork.
4/4/2024 4

M2M Network
4/4/2024 5

M2M gateway
•Sincenon-IPbasedprotocolsareusedwithinM2Marea
networks,theM2Mnodeswithinonenetworkcannot
communicatewithnodesinanexternalnetwork.
•ToenablethecommunicationbetweenremoteM2Marea
networksM2Mgatewaysareused.
4/4/2024 6

M2M gateway
4/4/2024 7

Difference between IoTand M2M
CommunicationProtocols
•M2MandIoTcandifferinhowthecommunicationbetweenthemachinesordevices
happens.
•M2Museseitherproprietaryornon-IPbasedcommunicationprotocolsfor
communicationwithintheM2Mareanetworks.
MachinesinM2MvsThingsinIoT
•The"Things"inIoTreferstophysicalobjectsthathaveuniqueidentifiersandcan
senseandcommunicatewiththeirexternalenvironment(anduserapplications)or
theirinternalphysicalstates.
•M2Msystems,incontrasttoIoT,typicallyhavehomogeneousmachinetypeswithin
anM2Mareanetwork.
4/4/2024 8

Difference between IoTand M2M
HardwarevsSoftwareEmphasis
•WhiletheemphasisofM2Mismorehardwarewithembedded
modules,theemphasisofIoTismoreonsoftware.
DataCollection&Analysis
•M2Mdataiscollectedinpointsolutionsandofteninon-premises
storageinfrastructure.
•IncontrasttoM2M,thedatainIoTiscollectedinthecloud(canbe
public,privateorhybridcloud).
4/4/2024 9

Difference between IoTand M2M
Applications
•M2Mdataiscollectedinpointsolutionsandcanbeaccessedbyon-
premisesapplicationssuchasdiagnosisapplications,service
managementapplications,andonpremisesenterpriseapplications.
•IoTdataiscollectedinthecloudandcanbeaccessedbycloud
applicationssuchasanalyticsapplications,enterpriseapplications,
remotediagnosisandmanagementapplications,etc.
4/4/2024 10

Communication in IoTvsM2M
4/4/2024 11

Software-Defined Networking –PartI
1
Restructuring the Current NetworkInfrastructure

Overview of CurrentNetwork
UserI
UserII
OSPF Protocol executes
at theswitches
the switch has beenattacked!
needs to route through an alternate path!
Present: No centralizedcontrol.

Limitations in CurrentNetwork
OS
hardware
app
OS
hardware
app
OS
hardware
app
OS
hardware
app
OS
hardware
app
OS
hardware
app
Switches forward traffic
in a distributed manner.
They do not have a
global view of the
network

Limitations in CurrentNetwork
7
✓Vendor Specific Architecture of switches limitsdynamic
configuration according to application-specificrequirements.
✓Switches are required to configure according to the installed
operating system(OS).
✓Centralized control is not feasible in traditionalnetwork.

Limitations in CurrentNetwork
Specialized packet
forwardinghardware
appappapp
Operatingsystem
Routing, mobility
management,etc.
Cost-expensive
Millions ofgates,
~10GBRAM
Thousands
lines of
code

Current Network toSDN
hardware
OS
app
hardware
OS
app
hardware
OS
app
hardware
OS
app
hardware
OS
app
hardware
OS
app

Current Network toSDN
packet
forwarding
hardware
Operatingsystem
app app app
packet
forwarding
hardware
packet
forwarding
hardware

Origin ofSDN
✓2006Stanforduniversityteamproposesaclean-slatesecurityarchitecture
(SANE)tocontrolsecuritypoliciesinacentralizedmannerinsteadofdoingitat
edges.
✓2008:Theideaofsoftware-definednetworkisoriginatedfromOpenFlowproject
(ACMSIGCOMM2008).
✓2009: Stanford publishes OpenFlow V1.0.0specs.
✓June 2009: Nicira network isfounded.
✓March 2011: Open Networking Foundation isformed.
✓Oct 2011: First Open Networking Summit. Many Industries (Juniper, Cisco
announced toincorporate.

SDNArchitecture
Notes
-NorthboundAPI
-SouthboundAPI
(viaOpenFlow)
NetworkFunction
Virtualization

Basic Concepts ofSDN
✓Separate control logic from hardware switches
✓Define the control logic in a centralizedmanner
✓Control the entire network including individualswitches
✓Communication between the application, control, and data
planes are done throughAPIs

Components/Attributes ofSDN
✓Hardware switches
✓Controller
✓Applications
✓Flow Rules
✓Application programming interfaces(APIs)

Current Status ofSDN
✓Companies such as Google have started to implement SDN at
their datacenternetworks.
✓It is required to change the current network with SDN in a
phasedmanner.
✓Operational cost and delay caused due to link failure can be
significantlyminimized.

Challenges
✓Ruleplacement
✓Controllerplacement

Rule PlacementI
✓Switches forward traffic based on a rule –‘Flow-Rule’ –
defined by the centralized controller.
▪Traditionally, Routing Table in every switch (L3 switch/router). SDN
maintains Flow Table at everyswitch.
▪Flow Rule Entry in the FlowTable.
✓Each rule has a specific format, which is also defined by a
protocol (e.g.,OpenFlow).

Rule PlacementII
Example of a flow-rule based on OpenFlowprotocol

Rule Placement ChallengesI
✓Size of ternary content-addressable memory (TCAM) is limited
at theswitches.
▪Limited number of rules can beinserted.
✓Fast processing is done using TCAM at theswitches.
✓TCAM is verycost-expensive.

RulePlacementChallengesII
✓On receiving a request, for which no flow-rule is present in
the switch, the switch sends a PACKET-IN message tothe
controller.
✓The controller decides a suitable
flow-rule for therequest.
✓The flow rule is insertedat the
switch.
✓Typically, 3-5ms delay is involved in a
new ruleplacement
Controller

Rule PlacementIII
✓How to define/place the rules at switches, while considering
availableTCAM.
✓How to define rules, so that less number ofPACKET-IN
messages are sent tocontroller.

OpenFlow ProtocolI
✓Only one protocol is available for rule placement –OpenFlow.
✓It has different versions –1.0, 1.1, 1.2, 1.3, etc. –to have
different number ofmatch-fields.

OpenFlow ProtocolII
✓Differentmatch-fields
▪SourceIP
▪DestinationIP
▪SourcePort
▪Priority
▪etc.

OpenFlow ProtocolIII
How much time a flow-rule is to be kept at theswitch?
✓Hard timeout
▪All rules are deleted from the switch at hardtimeout.
▪This can used to reset theswitch.
✓Softtimeout
▪If NO flow is received associated with a rule for a particular time, the
rule isdeleted.
▪This is used to empty the rule-space by deleting an unusedrule.

OpenFlow ProtocolIV
✓SDN is NOTOpenFlow
▪SDN is atechnology/concept
▪OpenFlow is a protocol used to communicate between data-plane and
control-plane.
▪We may have other protocols for this purpose. However, OpenFlow is
the only protocol presenttoday.
▪Open vSwitch: Open Source, it is the MOST popular one present
today.

Summary
✓Basics ofSDN
✓Challenges present inSDN
✓Rule Placement withOpenFlow
✓Controller Placement –to be discussed in nextlecture

APIs inSDN
✓SouthboundAPI
▪Used to communicate between control layer and infrastructurelayer.
▪OpenFlow protocol isused.
✓NorthboundAPI
▪Used to communicate between control layer and applicationlayer.
▪Standard APIs areused.
✓East West Bound APIs
▪Used to communicate among multiple controllers in the controllayer.

Controller PlacementI
✓Controllers define flow-rule according to the application-
specificrequirements.
✓The controllers must be able to handle all incoming requests
fromswitches.
✓Rule should be placed without incurring muchdelay.
✓Typically, a controller can handle 200 requests in a second
(through a singlethread).

Controller PlacementII
✓The controllers are logically connected to the switches in one-
hopdistance.
▪Physically, they are connected to the switches in multi-hopdistance.
✓If we have a very small number of controllers for a large
network, the network might be congested with control
packets (i.e., PACKET-INmessages).

FlatArchitecture
Packet-IN
Flow-Rule

Hierarchical (tree)Architecture

RingArchitecture

MeshArchitecture
UserI
UserII

ControlMechanisms
✓Distributed
▪The control decisions can be taken in a distributedmanner
▪Ex: each subnetwork is controlled by different controller
✓Centralized
▪The control decisions are taken in a centralizedmanner.
▪Ex: A network is controlled by a singlecontroller.

BackupController
✓If a controller is down, what willhappen?
▪Backup controller isintroduced
▪Replica of the main controller iscreated
▪If the main controller is down, backup controller controls the network
to have uninterrupted networkmanagement.

SecurityI
✓Enhanced security usingSDN
▪Firewall
▪Proxy
▪HTTP
▪Intrusion detection system(IDS)

SecurityII
Example of potential data plane ambiguity to implement the policy chain
Firewall-IDS-Proxy in the exampletopology.
3

Experimenting withSDN
✓Simulator/Emulator
▪Infrastructure deployment –MUST be supported withOpenFlow
▪Controller placement –MUST supportOpenFlow
▪oRenmtroltler–ccan be situated in a remote place, and communicated
using IP address and portnumber
▪Local

SwitchDeployment
✓Mininet
▪Used to create a virtual network with OpenFlow-enabledswitches
▪Based on Pythonlanguage
▪Supports remote and localcontrollers

Controller ConfigurationSoftware
✓Pox
✓Nox
✓FloodLight
✓OpenDayLight[Popular!]

Summary
✓Performance of SDN depends on rule placement and
controller placement in thenetwork.
✓Control message overhead may be increased due to
additional number of packets (PACKET-INmessages).
✓Unified network management is possible using SDN, while
leveraging global view of thenetwork.

Software-Defined IoT Networking –PartI
RecentAdvancesofSDNinIoT

IoTArchitecture

BenefitsofIntegratingSDNinIoT
✓Intelligent routing decisions can be deployed usingSDN
✓Simplification of information collection, analysis and decision
making
✓Visibility of network resources –network management is
simplified based on user, device and application-specific
requirements
✓Intelligent traffic pattern analysis and coordinateddecisions

SDN for IoTI

SDN for IoTII
Control of end-devices, such as sensors
andactuators

SDN for IoTIII
R
u
w
h
e
le-placement at access
devices, hile
considering mobility
and terogeneity ofend-
users

SDN for IoTIV
Rule-placement and traffic
engineering at backbonenetworks

SDN for IoTV
Flow classification and enhanced
security at data centernetworks

Wireless Sensor NetworkI
✓Challenges
▪iRmeael-ptrogramming of sensornodes
▪Vpencidfiocra-srchitecture
▪Resource constrained –heavy computation cannot beperformed
▪Limited memory –cannot insert too many controlprograms

Wireless Sensor NetworkII
✓Opportunities
▪Can we program the sensor nodes inreal-time?
▪Can we change the forwarding path inreal-time?
▪Can we integrate different sensor nodes in aWSN?

Software-Defined WSNI
✓Sensor OpenFlow (Luo et al., IEEE Comm. Letters’12)
▪nVatrliuced-caetaforwarding
▪Forward the sensed data if exceeds a certainvalue
▪nIDtr-cicedataforwarding
▪Forward the sensed data based on the ID of the sourcenode
Real-life implementation of such method NOTdone

Software-Defined WSNII
✓SNo(ft-WSBera et al., IEEE SJ’16)
▪Sensor DeviceManagement
▪Sensormanagement
▪Multiple sensors can be implemented in a single sensorboard
▪Sensors can be used depending on application-specificrequirements
▪Delaymanagement
▪Delay for sensing can be changed dynamically inreal-time
▪AeectpivMe-aSnlagement
▪States of active and sleep mode can be changeddynamically

Software-Defined WSNIII
–forwarding logic of a particular sensorcan
✓SNoft-WS
▪TopologyManagement
▪Npeocdifei-csmanagement
bemodified
▪Npectiwfioc rmk-asnagement
▪Forward all traffic of a node in thenetwork
▪Drop all traffic of a node in thenetwork
Experimental results show that network performance can be improved using
software-defined WSN over traditionalWSN

Soft-WSN: ResultI
Packet delivery ratio in the network increases using Soft-WSN
compared to the traditionalWSN.

Soft-WSN: ResultII
Number of replicated data packets is reduced using Soft-WSN over
the traditionalWSN.

Soft-WSN: ResultIII
Number of control messages in the network is higher using Soft-WSN over the
traditional WSN. This is due to the PACKET-IN message in the network. Each time a
node receives a new packet, it asks the controller for getting adequate forwardinglogic.

Software-Defined WSNIII
✓SISDEN(-WGalluccio et al., IEEE INFOCOM’15)
▪A software-defined WSN platform isdesigned
▪Falbolwe-ftor rule placement at sensor nodes isdesigned
▪Any programming language can be used through API to program the
nodes inreal-time

SDN-WISE ProtocolStack
✓Sensor nodeincludes
▪IEEE 802.15.4protocol
▪Micro control unit(MCU)
▪Above IEEE 802.15.4stack,
Forwarding layer consists of
Flow-rules.
▪INPP –In Network Packet
Processing
Source: Galluccio et al., IEEE INFOCOM’15

Summary
19
✓SDN is useful to manage and control IoTnetwork
✓Wireless sensor nodes and network can be controlled using
SDN-basedapplications
✓Network performance can be improved significantly using
SDN-based approaches over the traditionalapproaches

Traditional (Wireless) Mobile
Network
✓Problems in Traditional MobileNetwork
▪Difficult to Scale –static over-provisioned network are inflexible to
manage the mobile traffic with highdemand
▪Difficult to manage –many times lead tomisconfigurations
▪Inflexible –Requires too much time to introduce a new service as the
hardware architecture isinflexible
▪Cxpoestn-seive – Both capital expenditure and operational expenditure are
high
•*Based on information from Open Networking Foundation(ONF)

SDN for Mobile NetworkingI
✓Falbolwe-PTaradigm ofSDN
▪Well suited for end-to-end communication over multiple technologies
such as WiFi, 3G, 4G,etc.
✓Logically CentralizedControl
▪Particularly useful for efficent base-station coordination for
addressing inter-cellinterference

SDN for Mobile NetworkingII
✓Path Management
▪Data can be routed based on service requirements without depending
on core routingpolicies
✓NetworkVirtualization
▪Abstracts the physical resources from the networkservices
▪Helps in providing seamless connectivity and service differentiation
amongusers

SDWMN-Use Case: InterferenceManagement
TraditionalMobileNetwork Software-Defined MobileNetwork
Signals of
eNodeB 2will
not affect
signals of
eNodeB3

SDWMN-Use Case: Mobile Traffic
Management
Mobile traffic offloading based onOpenFlow
ANDSF –access
network discovery
and servicefunction

KeyBenefits
✓Centralized control of devices manufactured by multiple
vendors
✓Higher rate of integration of newservices
✓Abstracted network control andmanagement
▪Network abstracted from theuser

Rule Placement at Access
Devices
✓Challenges
▪General OpenFlow does not support wirelessnetwork
▪Modified version of OpenFlow isrequired
▪Typically, users are mobile in nature –network is highlydynamic
▪Frequent changes in rule placement is alsorequired
▪Presence of heterogeneous devices in thenetwork
▪How to support such heterogeneous devices in a singleplatform

Approaches
Introduction to Internet ofThings
76
✓ODIN
✓Uwbi-Flo
✓wMobi-Flo

ODINI
✓An agent is placed at access points to communicatewith
controller
✓Two components arepresent
▪Odin agent –placed with the physicaldevices
▪Odin master –placed at the controllerend
77

ODINII
✓Conversion of802.11
✓LigVhAtPv–irtLualAP

Ubi-FlowI
✓Mobility management inSDIoT
▪Scalable control of the APs
▪Faulttolerance
✓Fchloewd-uSling
▪Networkpartition
▪Networkmatching
▪Loadbalancing

Mobi-FlowI
✓wMaorbeilfiltoyw-a -rule placement inSDIoT
80

Mobi-FlowII
81
✓Proactive rule placement depending on users’ movement in
thenetwork
✓Approach
▪Predict location of end-users at (t+1) time, while the users are at (t)
time
▪Pulecseatfltohwe-rAPswhich can be associated to the users based
on their predictedlocations

Mobi-FlowIII
–takes last k-th location instances topredict
✓Locationprediction
▪OMrdaerkro-Kvpredictor
next location
✓Flelopwla-cruement
▪Linear programming can be used to select optimalAP

Mobi-
FlowIV
Message Overhead intheNetwork Energy consumption in theNetwork
Control message overhead and energy consumption can be minimized significantly
using Mobi-Flow compared to the conventional flow-rule placementschemes.

Rule Placement at Backbone
Network
✓Existing rule placement schemes for wired network can be
used
✓Load balancing is an important issue due to the dynamic
nature of the IoTnetwork
✓Dynamic resource allocation can also beintegrated

Data CenterNetworking
–Wildcard rules can be placed to deal withmice-✓Mwice-Flo
flows
✓Elephant Flow –Exact match rules areuseful
✓We need to classify the flows before inserting flow-rules at
the switches to adequately forward them in thenetwork

AnomalyDetectioninIoT
Network
✓Monitor the network through OpenFlow to detect any
anomaly in thenetwork
▪This can be done by monitoring each flow in thenetwork
▪We can also collect the port statistics of theswitches
▪If there is any anomaly, it may generate large number of packets in the
network –it can be detected by monitoring the flows

Experimenting with Wireless
Network
✓iMFiininet-W
▪Can be used to deploy anetwork
▪Supports both wired and wirelessnetwork
▪tWheirrende–tpErotocol
▪Wireless –WiFi protocol (IEEE 802.11group)
✓ONOS
▪Can be used to place the controllers
Tags