6Lowpan Overview and Implementations

6Lowpan Overview and Implementations

6LoWPAN Overview and Implementations Zengxu Yang C. Hwa Chang Tufts Wireless Lab Tufts Wireless Lab Department of Electric and Computer Engineering Department of Electric and Computer Engineering Tufts University Tufts University [email protected] [email protected] Abstract Table 1. Classes of constrained devices Name data size (e.g., RAM) code size (e.g., Flash) This paper provides an overview of the 6LoWPAN stan- dard. 6LoWPAN is an open standard developed by IETF. It Class 0, C0 10 KB 100 KB is an IPv6 adaptation layer running on top of IEEE 802.15.4 Class 1, C1 ~ 10 KB ~ 100 KB standard. This paper reviews the history that led to the con- Class 2, C2 ~ 50 KB ~ 250 KB cept of Internet of Things (IoT) and how IoT evolved from simple, non-IP networks to 6LoWPAN based IP networks. In this paper, we argue why 6LoWPAN is an important building or adaptation of popular protocols are used. Class 0 devices block for the future of IoT. We also describe the challenges are too limited even for specially designed IoT network pro- and most important features of 6LoWPAN, including two ap- tocols, while class 1 devices are capable of communicating plication protocol standards CoAP and MQTT-SN that are with the external Internet using network protocols specially used in 6LoWPAN. We also list some of the popular imple- designed for IoT devices and some gateway/router devices. mentations of 6LoWPAN, including some Thread products Even if class 2 devices are capable of running some normal based on 6LoWPAN. network protocols like TCP and HTTP, they can still ben- efit from specially designed IoT network protocols. A cer- 1 Introduction tain type of constrained networks called Low Power Wire- The Internet evolved from ARPANET in the 1970s and less Personal Area Networks (LoWPANs) has been widely has been the most popular, globally interconnected network used in a variety of applications in the field of Internet of based on the TCP/IP suite. It has replaced several propri- Things, including wearable or implantable devices, urban etary and incompatible network protocols such as Novell In- monitoring, control of large buildings, and industrial con- ternetwork Packet Exchange (IPX) and IBM Systems Net- trol applications. The LoWPANs are not limited to personal work Architecture (SNA). Currently the IPv4 based Internet usage and the “Personal” is just a vestige[13]. The most is the most important network and has revolutionized peo- popular LoWPAN implementations are IEEE 802.15.4 de- ple’s lives. Internet of Things (IoT) is a new technology fined by the IEEE 802.15 working group[26] and Bluetooth that has wide potential applications and has the potential of Low Energy (BLE)1 developed by the Bluetooth Special In- changing our lives even more profoundly[9]. terest Group[24]. Several network protocols based on IEEE Constrained networks formed by connected constrained 802.15.4 like ZigBee[19] and 6LoWPAN[32] have been de- nodes are the backbone of IoT. Constrained networks and veloped and standardized. constrained nodes have unique challenges and the normal 6LoWPAN brings IPv6 to the constrained IoT networks, network protocols usually cannot be directly applied. Con- reusing the time-proven TCP/IP protocols on IoT, making it strained nodes falls into different classes, as show in Table a natural and future proof choice for IoT network protocols. 1. 2 6LoWPAN Most of the popular network protocols, like TCP/IP, need more resources than the constrained nodes can afford, espe- 2.1 Why 6LoWPAN cially for class 0 and class 1 devices. Either new protocols There are two different categories of constrained IoT net- works, non-IP or IP. For a non-IP IoT network, an applica- tion layer gateway is used to translate the communications between the IoT network and the Internet. One benefit of an IP IoT network is that only an IP layer gateway is needed, which is much more lightweight and more flexible. And be- cause of the success of the IP, an IP IoT network can reuse applications by using existing, proven protocol implementa- tions, thus greatly shortening development time. The disad- vantage of IP IoT network is that TCP/IP is a fairly complex 1Marketed as Bluetooth Smart 2011-2016. International Conference on Embedded Wireless Systems and Networks (EWSN) 2019 25–27 February, Beijing, China © 2019 Copyright is held by the authors. 357 Permission is granted for indexing in the ACM Digital Library ISBN: 978-0-9949886-3-8 protocol suite compared to simple IoT network protocols like Simplified OSI model 6LoWPAN stack ZigBee, so it is more difficult to implement on constrained nodes. Because of hardware advancement, the processing Application layer CoAP, MQTT, HTTP power has become more affordable even for constrained de- vices and networks now, making an IP IoT network more Transport layer UDP, TCP (TLS, DTLS) attractive[33]. 6LoWPAN is an IP IoT network and runs IPv6 over IEEE 802.15.4 networks. IPv6 was chosen to be the fabric of 6LoWPAN because the currently widely use Network layer IPv6, RPL IPv4 address space, which uses 32 bit addresses and has no 32 9 6LoWPAN more than 2 = 4:3 × 10 addresses, is facing address ex- Link layer haustion. IPv6 uses 128 bit addresses, which provides up IEEE 802.15.4 MAC to 2128 = 3:4 × 1038 addresses. IPv6 can support the vast number of IoT devices and ubiquitous networks in the fore- Physical layer IEEE 802.15.4 PHY seeable future. Non-IP IoT networks used to be more popular than IP Figure 1. 6LoWPAN stack overview IoT networks because of its simplicity, with some popular protocols such as ZigBee and BLE, but IP IoT networks are gaining momentum as hardware prices go down. IP IoT is so computer networks. The standard TCP/IP networks em- attractive that some previous non-IP IoT networks started to phasize end-to-end security, like the widely used In- support IPv6 recently. For example, Bluetooth used to be a ternet Protocol Security (IPSec) on the network layer point-to-point communication protocol, but since Bluetooth or Transport Layer Security (TLS) on the application 4.2, BLE started to add IPv6 support in its Internet Protocol layer[43, 45, 16]. Those standard security measures Support Profile (IPSP)[41]. RFC 7668 added IPv6 over BLE, usually require more resources than can be provided by but it only supported star network topology[38]. A new IETF the constrained IoT devices. draft plans to add IPv6 mesh network support to BLE, so it Applications One of the most mature and popular ap- is expected that BLE may fully support 6LoWPAN in the plication layer protocols is Hypertext Transfer Pro- future[23]. ZigBee IP also incorporates IP into its ZigBee tocol (HTTP), which is based on TCP and provides networks but it is not widely used[22]. Web services[20]. The Representational State Transfer 2.2 Challenges of 6LoWPAN (REST) architecture based on HTTP has been very pop- Because 6LoWPAN runs IPv6 on constrained nodes, with ular in web services because it minimizes latency and constrained resources like energy, memory, and processing network communication while at the same time maxi- power, there are several challenges present in 6LoWPAN de- mizing the independence and scalability of component sign and implementations. Some of the most important chal- implementations[21]. The vast amount of RESTful web lenges are: services based on HTTP makes it a very attractive pro- tocol for 6LoWPAN applications. Nonetheless the reg- Header overhead The link layer of 6LoWPAN is IEEE ular HTTP and TCP are not suitable for constrained net- 802.15.4, which has an MTU of only 127 bytes, while works that 6LoWPAN runs on because of their com- the IPv6 MTU is at least 1280 bytes with a header plexity and the amount of resources required. length of 40 bytes. This means that directly transmit- ting standard IPv6 packets over IEEE 802.15.4 is ineffi- 2.3 Main Features of 6LoWPAN cient because of high header/payload ratio and frequent 6LoWPAN, an IoT IPv6 adaptation layer, runs on top of fragmentations and defragmentations[36]. IEEE 802.15.4, as shown in Figure 1. IEEE 802.15.4 is a low power, low speed wireless per- Neighbor discovery IPv6 uses Neighbor Discovery Proto- sonal area network (WPAN) standard that uses CSMA/CA col (NDP) to configure itself statelessly by combining and has a typical configuraion with a range of 10 m - 100 the network prefix information from Router Advertise- m and raw data rate of 2 - 250 kbit/s on the 2.4 GHz ISM ment messages and host ID from its link layer address, band[26]. IEEE 802.15.4 can also operate on the 900 MHz forming a 128 bit address[37]. In 6LoWPAN, NDP (sub-G) band, with a lower data rate and a longer range up should also be used because it greatly simplifies the task to a few kilometers. The range and data rate depend on the of assigning IP addresses to a large number of devices. frequency band, environment, and hardware used[4, 5, 6, 7]. Yet it must be revised to accommodate the constrained Header compression To efficiently transmit IPv6 packets networks. over IEEE 802.15.4 links, we need to add an adapta- Lossy networks The wireless links in constrained networks tion layer using header compression, which compresses are usually not reliable because of mobility, interfer- the IPv6 header size from 40 bytes down to 7 bytes. ence, etc. We call such networks lossy networks. Lossy IPv6 Extension headers are compressed as well. Higher networks present a challenge to routing protocol de- layer headers have also been compressed, like UDP signs because most of the routing protocols require a headers[29].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us