A Standardized and Flexible Ipv6 Architecture for Field Area Networks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Solutions to Chapter 2
CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1). -
Wireless Home Automation Networks: a Survey of Architectures and Technologies
GOMEZ MONTENEGRO LAYOUT 5/18/10 11:46 AM Page 92 CONSUMER COMMUNICATIONS AND NETWORKING Wireless Home Automation Networks: A Survey of Architectures and Technologies Carles Gomez and Josep Paradells, Technical University of Catalonia ABSTRACT USE CASES AND MAIN FEATURES OF Wireless home automation networks com- WHANS prise wireless embedded sensors and actuators that enable monitoring and control applications WHANs enable a variety of use cases, as illus- for home user comfort and efficient home man- trated in Fig. 1. A non-exhaustive list of exam- agement. This article surveys the main current ples is provided below and emerging solutions that are suitable for Light control: A new light can be controlled WHANs, including ZigBee, Z-Wave, INSTEON, from any switch, which reduces the need for new Wavenis, and IP-based technology. wired connections. Lights can also be activated in response to a command from a remote con- INTRODUCTION trol. Furthermore, they can be turned on auto- matically when presence and luminance sensors In recent years, wireless sensor and actuator net- detect that people are in a poorly illuminated works have gained high momentum, receiving room. significant attention from academia, industry, Remote control: Infrared technology has been and standards development organizations. One used for wireless communication between a of the primary application domains of this tech- remote control and devices such as TVs, HiFi nology is home automation. Wireless home equipment, and heating, ventilating, and air con- automation networks (WHANs) enable monitor- ditioning (HVAC) systems. However, infrared ing and control applications for home user com- requires line-of-sight (LOS) and short-distance fort and efficient home management. -
Data Link Layer
Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random -
OSI Data Link Layer
OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Data Link Layer – Accessing the Media Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Data Link Layer – Accessing the Media Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Data Link Layer – Accessing the Media Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Data Link Layer – Accessing the Media Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Data Link Layer – Accessing the Media Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc. -
Medium Access Control Layer
Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access .. -
Introduction to 6Lowpan And
NetworkingNetworking LayerLayer ProtocolsProtocols forfor InternetInternet ofof Things:Things: . 6LoWPAN6LoWPAN andand RPLRPL Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse574-18/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-1 OverviewOverview 6LowPAN Adaptation Layer Address Formation Compression RPL RPL Concepts RPL Control Messages RPL Data Forwarding Note: This is part 3 of a series of class lectures on IoT. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-2 RecentRecent ProtocolsProtocols forfor IoTIoT MQTT, SMQTT, CoRE, DDS, Security Management AMQP , XMPP, CoAP, IEC, IEEE 1888, … IEEE 1888.3, IEEE 1905, TCG, IEEE 1451, Encapsulation: 6LowPAN, Oath 2.0, IEEE 1377, 6TiSCH, 6Lo, Thread… SMACK, IEEE P1828, Routing: RPL, CORPL, CARP SASL, IEEE P1856 EDSA, WiFi, Bluetooth Low Energy, Z-Wave, ZigBee Smart, ace, DECT/ULE, 3G/LTE, NFC, DTLS, Weightless, HomePlug GP, Dice, … 802.11ah, 802.15.4e, G.9959, WirelessHART, DASH7, ANT+, LTE-A, LoRaWAN, ISA100.11a, DigiMesh, WiMAX, … Ref: Tara Salman, Raj Jain, "A Survey of Protocols and Standards for Internet of Things," Advanced Computing and Communications, Vol. 1, No. 1, March 2017, http://www.cse.wustl.edu/~jain/papers/iot_accs.htm Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse574-18/ ©2018 Raj Jain 14-3 IEEEIEEE 802.15.4802.15.4 Wireless Personal Area Network (WPAN) Allows mesh networking. Full function nodes can forward packets to other nodes. -
6Lowpan Platform Introduction
6LoWPAN Platform Introduction Zengxu Yang May 3, 2018 6LoWPAN Platform Introduction May 3, 2018 1 / 16 Internet of Things I The Internet, which is based on the TCP/IP protocol stack and connects computers and mobile devices worldwide, has been very successful and deeply changed our lives. I Internet of Things, abbreviated as IoT, connects billions of objects that currently are not connected, like your microwave, cars, refrigirators, medical devices. I Ubiquitos computing and connected things makes everything smarter. Productivity can be improved, wastes and certain disasters can be avoided or reduced. Social life will be changed, just like the current Internet. I Internet of Things is based on the current Internet technology but it needs adaptation to solve some unique challenges. 6LoWPAN Platform Introduction May 3, 2018 2 / 16 Layers of IoT Just like the Internet can be divided into different layers, roughly, IoT networks can be divided into three layers: Application layer (some further divide it into application layer and middleware layer) It is responsible for deliverying application specific services to users. Network layer It connects to other smart devices and servers, transferring and communicating between them. Perception layer It is the physical layer that gathering sensor information about the environment. 6LoWPAN Platform Introduction May 3, 2018 3 / 16 IPv6 I The most successful and widely used IP protocol is called IPv4 with a 32 bit address space. IPv4 has its limitations. One of the biggest limitations is short of available addresses. I IPv6 is the next generation IP protocol with a 128 bit address space. It is large enough for the foreseeable future and especially important for the billions of devices on the IoT. -
6Lowpan: the Wireless Embedded Internet by Zach Shelby, Carsten Bormann Length: 254 Pages Publisher: John Wiley & Sons
The Book 6LoWPAN: The Wireless Embedded Internet by Zach Shelby, Carsten Bormann Length: 254 pages Publisher: John Wiley & Sons The world’s first book on IPv6 over low power wireless networks and the new 6LoWPAN standards. http://6lowpan.net Companion web‐site with blog, full companion course slides and exercises v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 1 Outline • Introduction – The Internet of Things – Applications of 6LoWPAN • The Internet Architecture and Protocols • Introduction to 6LoWPAN • Link‐Layer Technologies – IEEE 802.15.4 • The 6LoWPAN Format • Bootstrapping – Link‐Layer Commissioning – Neighbour Discovery v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 2 Outline • Security • Mobility & Routing – IP Mobility Solutions – Ad‐hoc Routing Protocols – The IETF RPL Protocol • Application Formats and Protocols • System Examples – ISA100 Industrial Automation – Wireless RFID Infrastructure – Building Energy Savings v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 3 Introduction v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 4 v6.12.2009 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann 5 Benefits of 6LoWPAN Technology • Low‐power RF + IPv6 = The Wireless Embedded Internet • 6LoWPAN makes this possible • The benefits of 6LoWPAN include: – Open, long‐lived, reliable standards – Easy learning‐curve – Transparent Internet integration – Network maintainability – Global scalability – End‐to‐end data flows v6.12.2009 6LoWPAN: The Wireless -
A Survey of Iot Protocols and Their Security Issues Through the Lens of A
A survey of IoT protocols and their security issues through the lens of a generic IoT stack Jonathan Tournier, François Lesueur, Frédéric Le Mouël, Laurent Guyon, Hicham Ben-Hassine To cite this version: Jonathan Tournier, François Lesueur, Frédéric Le Mouël, Laurent Guyon, Hicham Ben-Hassine. A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, Elsevier, 2020, pp.100264. 10.1016/j.iot.2020.100264. hal-02918332 HAL Id: hal-02918332 https://hal.inria.fr/hal-02918332 Submitted on 20 Aug 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A survey of IoT protocols and their security issues through the lens of a generic IoT stack Jonathan Tourniera,b, François Lesueurb, Frédéric Le Mouëlb, Laurent Guyona, Hicham Ben-Hassinea aAlgosSecure, 57 bd Vivier Merle, Lyon, France bUniversité de Lyon, INSA-Lyon, CITI, F-69621, Villeurbanne, France Abstract The Internet of things (IoT) is rapidly growing, and many security issues relate to its wireless technology. These security issues are challenging because IoT protocols are heterogeneous, suit different needs, and are used in different application domains. -
Z-Wave to IP Software
Z-Wave to IP Software/ Firmware Bridges the Worlds of Z-Wave and IoT By Raoul Wijgergangs, Vice President Z-Wave Business IoT via Z-Wave: Bridging IP& Z-Wave for Low Power Mesh Network IoT Abstract/Executive Summary: The Z/IP Gateway bridges the low-power and ultra-reliable Z-Wave wireless communications protocol with the Internet of Things (IoT) by assigning a unique IP address to each device within a Z-Wave network. This provides the best of both worlds: a super reliable, low-power smart home network combined with standard Internet protocol on the LAN network. Z-Wave is already widely deployed in home security and home automation systems as the protocol of choice for low-power wireless communications. Now, with the Z/IP Gateway, every device in a Z-Wave network can be directly accessible over the Internet using IP communications. The Z/IP Gateway is a soft- ware/firmware technology that is incorporated into new Z-Wave controllers, effectively transforming these home automation hubs into gateways for IP communication with Z-Wave devices. With the Z/IP Gateway technology, product designers can add IoT connectivity to practically any device in the home with minimal power consumption and minimal added cost. ----------------------- IoT – the Internet of Things – is a hot tech trend, envisioning a future where practically everything will be connected, but exactly how they will be connected remains fuzzy. While consumers may simply assume everything will have Wi-Fi, engineers know better. Wi-Fi has inherent problems with power consumption and topology that make it impractical for many battery-powered devices. -
Comparisons of 6Lowpan Implementations on Wireless Sensor Networks
2009 Third International Conference on Sensor Technologies and Applications Comparisons of 6LoWPAN Implementations on Wireless Sensor Networks Yannis Mazzer, Bernard Tourancheau LIP UMR 5668 of CNRS-ENS-INRIA-Universite´ Lyon1 Lyon, France [email protected] Abstract approach choices for the design of a modular 6LoWPAN stack for sensor network. This paper introduces our work on the communication stack of wireless sensor networks. We present the IPv6 ap- 2. Presentation of 6LoWPAN proach for wireless sensor networks called 6LoWPAN in its IETF charter. We then compare the different implementations 6LoWPAN [1][2] enables all the capabilities of IPv6 of 6LoWPAN subsets for several sensor nodes platforms. on WSN. This standard access to the IP world opens the We present our approach for the 6LoWPAN implementation usage of WSN in the field of, for instance, distributed which aims to preserve the advantages of modularity while computation with the classical Message Passing Interfaces keeping a small memory footprint and a good efficiency. [3], the implementation of sensing device on-line control [4] and tools for the user interfaces [5]. Index Terms The adaption of IPv6 to constrained devices starts by compressing the long IPv6 headers to 6 bytes, taking into Wireless Sensor Network, Communication Stack for Sen- account the link-local informations. The routing is adapted sor, 6LoWPAN, IPv6. to the hop-by-hop ”meshed” point of view of the WSN. The routing main capabilities are placed at the border routers for each node to have limited routing tables. 1. Introduction Sensor network is a growing technology which aims to 3. -
Traceroute Is One of the Key Tools Used for Network Troubleshooting and Scouting
1 Introduction Traceroute is one of the key tools used for network troubleshooting and scouting. It has been available since networking's early days. Because traceroute is based on TTL header modification, it crafts its own network packets. The goal of this assignment is to re-implement a traceroute with cutting edge techniques designed to improve its scouting capabilities and bypass SPI firewalls. In this assignment you will learn about packet injection and sniffing. The assignment also teaches about more subtle topics such as network latency, packet filtering, and Q.O.S. 1.1 Instructions This project has to be completed sequentially as each part depends on the previous ones. The required coding language is C. You should consider using libnet [1] and libpcap [2], however using raw sockets is permitted as well. Note that the exercises become progressively more difficult, with Exercise 5 likely to consume the greatest amount of effort. 1.2 Submission and Grading To compile your project, the script will use the command make, executed in the project directory. Then it will launch our tests, using an executable name "traceng" you have to make sure your make file results in this executable name, in the same project directory. Make sure that the command line options and the output format are correctly implemented as they will be used by our script during the grading process. Specific examples of how we are going to test your executable are provided later in this document, for each exercise. Your project directory should also contain a file called README which is text file describing the highlights of your solution to each exercise anything special that you did, information required in the specific exercise, what is the most interesting thing you learned in the exercise, and anything else we need to take into account.