Vous êtes sur la page 1sur 70

Pervasive Computing

Dr. Muhammad Taha Jilani

Lecture - 10
Pervasive Network

ENABLING TECHNOLOGIES

Pervasive Computing by Dr. M.Taha


Pervasive Network Enabling
Technologies
WWAN WLAN WPAN
(Backbone Network) (Access Network) (Sensor Network)
Satellite WiFi IEEE 802.15
Cellular Bluetooth
2/3/4G ZigBEE
Broadband Access 6LoWPAN
WiMAX RFID /NFC

Network Layer Perception Layer

Pervasive Computing by Dr. M.Taha


Access Network

WLAN

Pervasive Computing by Dr. M.Taha


Wireless LAN
WiFi IEEE 802.11 Standard
One of the most popular wireless technology to
date.
Offers higher bit rate, reasonable security mechanism,
The network may contains below components:
Stations (STA),
wireless access point (AP),
independent basic service set (IBSS),
basic service set (BSS),
distribution system (DS), and
extended service set (ESS).
Pervasive Computing by Dr. M.Taha
802.11 Network Architecture
Topologies/Operating Modes
Infrastructure networks Access
Point

Independent networks
Ad-Hoc networks
Peer to peer (P2P) network

Pervasive Computing by Dr. M.Taha


802.11 Network Architecture
Topologies/Operating Modes
Independent networks
An independent basic service set (IBSS) is a wireless
network, consisting of at least two STAs, used where no
access to a DS is available. An IBSS is also sometimes
referred to as
Ad-Hoc networks

Pervasive Computing by Dr. M.Taha


802.11 Network Architecture
Topologies/Operating Modes
Infrastructure Network/Mode
A basic service set BSS is a wireless network, consisting of a single
wireless AP supporting one or multiple wireless clients.
A BSS is also sometimes referred to as an infrastructure wireless
network. All STAs in a BSS communicate through the AP.
The AP provides connectivity to the wired LAN and one STA initiates
communication to another STA or a node on the DS.

Pervasive Computing by Dr. M.Taha


802.11 Network Architecture
Topologies/Operating Modes
Infrastructure Network/Mode
The network can be further extended, and formed an ESS
The wired network can be an organization intranet or the Internet,
depending on the placement of the wireless AP.

Extended Service
Set (ESS)

Distribution
Sytem (DS)

Pervasive Computing by Dr. M.Taha


WLAN Layered Architecture
Protocols / Technologies

Apps

TCP / UDP

IP

Pervasive Computing by Dr. M.Taha


Frequency Hopping Spread Spectrum
WLAN is based on Frequency Hopping Spread
Spectrum (FHSS)
Hollywood actress Hedy Lamarr produce this method
during World War II, and patent it in 1942
Frequency Hopping Spread Spectrum (FHSS) is a
method of transmitting radio signals by rapidly
switching a carrier among many frequency
channels, using a pseudorandom sequence
known to both transmitter and receiver.
In addition to WiFi, it is widely used in other
communication technologies such as GPS,
CDMA, and Bluetooth.
Pervasive Computing by Dr. M.Taha
Variants of 802.11
Most popular
IEEE IEEE IEEE IEEE IEEE
802.11 802.11b 802.11a 802.11g 802.11n

Frequency 2.4G Hz 2.4G Hz 5 G Hz 2.4G Hz 2.4 / 5 GHz

Transmission 6~54
1~2 Mbps 1~11Mbps 22~54Mbps 54-600 Mbps
Rate Mbps
Transmission FHSS/ FHSS/ CCK- MIMO
OFDM
Technique DSSS DSSS OFDM Antennas

Consideration for an IoT?


High power is required by STA for transmission (higher frequencies)
Higher bit-rates that are often not efficient for typical IoT network
Limited range

Pervasive Computing by Dr. M.Taha


WiFi for an IoT Network
IEEE 802.11ah
First proposed in 2014, released in 2016, it is a new PHY and
MAC design that operates in the sub-one-gigahertz (900MHz)
band.
Intended to support IoT things and M2M communication.
The most prominent features are the
Support for large number of stations
Extended WiFi coverage
Power saving
Throughput enhancements

Pervasive Computing by Dr. M.Taha


WiFi for an IoT Network
IEEE 802.11ah specially designed for IoT

Pervasive Computing by Dr. M.Taha


WiFi for an IoT Network
IEEE 802.11ah vs a/g
IEEE IEEE
IEEE 802.11a
802.11g 802.11ah

900 MHz
Frequency 5 G Hz 2.4G Hz
2.4 / 5GHz

Transmission
6~54 Mbps 22~54Mbps 150 Kbps
Rate

Better Indoor Moderate


Improvement Long Range
coverage Outdoor

Pervasive Computing by Dr. M.Taha


WiFi for an IoT Network
IEEE 802.11ah Features
Up to 8,191 devices associated with an access point (AP)
through a hierarchical identifier structure
Carrier frequencies of approx. 900 MHz (license-exempt)
that are less congested and guarantee a long range
Transmission range up to 1 km in outdoor areas
Data rates of at least 100 kbps,
Short and infrequent data transmissions (data packet size
approximately 100 bytes and packet inter-arrival time greater than 30 s)
Very low energy consumption by adopting power saving
strategies
Cost-effective solution (for both useer and device
manufacturer)

Pervasive Computing by Dr. M.Taha


RFID

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification
Radio Frequency Identification (RFID), is an Automatic Data
Capture technology that uses radio-frequency waves to read
a movable item to identify, categorize & track.
It is fast, reliable, and does not require physical line of sight or
contact between reader/scanner and the RFID tagged item.

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
Components of an RFID System
RFID Tags
Host Computer / Server EM Waves

Customer-Specific
Application Software
Antenna

Application
Application
Program
Program
Interface
Interface
(API)
(API)

RFID API Software Reader


(Communicates with the RFID Reader) Wire / Cable
RS232
TCP/IP
Pervasive Computing by Dr. M.Taha
Radio Frequency Identification
Components in RFID System
Tags and antennae
An RFID tag consists of an integrated circuit with memory, which is
essentially a microprocessor chip. RFID tags can be with or without
batteries. The tag has an identity (ID) that can be broadcast to a reader
that is operating on the same frequency and under the same tag protocol.
Electromagnetic waves from antenna energize the tag, tag sends the data
that is received from the reader, again from antenna.
As like, torch light reflected back from object
Reader
It can read data from and write data to compatible RFID tags.
Communication between tag and reader enables the location information
of an item to be recorded and transferred to a server through a computer
network,
To tracked and traced
To ensure the compatibility of the communication, the tag and reader
must work at the same frequency and protocols. Readers come in four
types: handheld, vehicle-mounted, post-mounted, and hybrid.
Pervasive Computing by Dr. M.Taha
Radio Frequency Identification (RFID)
Working of RFID
Code write onto the Tag
Reader/Scanner retrieve that information
(manually/automatically)

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification
RF Tags can be attached to almost anything:
pallets or cases of product
vehicles
company assets or personnel
items such as apparel,
luggage, laundry
livestock, or pets
high value electronics such
as computers, TVs, camcorders

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
Working of RFID
Italian retailer Benetton on the plan to tag a complete line of clothes
(around 15 million RFIDs)

How to manage them?

Code Assigning schemes


Electronic Product Code (EPC)
Ubiquitous IDentifier (uID)

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
Electronic Product Code (EPC) by EPC Global Network
EPCs are classified into four types:
96-bit, The 96-bit type supports about 268 million companies with
unique identities, 16 million classes of products and 68 billion
64-bit (I),
serial numbers for each class.
64-bit (II)
64-bit (III). All types of 64-bit EPCs support about 16,000 companies with
unique identities and cover 1 to 9 million types of products and
33 million serial numbers for each type.

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification
Types of Tags
Passive Tags Semi-Passive Tags
No battery Battery for processing only
Low cost
Active Tags
On-board transceiver
Battery must be replaced
Longer range
High cost

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification
Functionality of Tags
Read Only :
factory programmed
usually chipless
Tag memory can be factory or field programmed and optionally
permanently locked (security)
Read / Write
Data written to the tag left unlocked, can be modified over more
than 10,0000 times, allowing the the tag to be reused or
updated
on-board memory
can save data
can change ID
higher cost

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
RFID tags are classified as Class 0 through Class 5, depending
on their functionality:
Class 0 UHFl read-only, preprogrammed passive tag Low End

Class 1 UHF or HF; write once, read many (WORM)


Passive read-write tags that can be written to at any point
Class 2
in the supply chain
Read-write with onboard sensors capable of recording
Class 3 parameters like temperature, pressure, and motion; can be
semipassive or active

Read-write active tags with integrated transmitters; can


Class 4
communicate with other tags and readers

Similar to Class 4 tags but with additional functionality; can


Class 5 provide power to other tags and communicate with
devices other than readers High End
Pervasive Computing by Dr. M.Taha
Frequency Ranges
Low 100-500 kHz
short range, low data rate, cost, & power
Intermediate 10-16 MHz
medium range and data rate
High 850-950 MHz & 2.4-5.8GHz
large range, high cost, high data rate

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
RFID Frequency Ranges

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
Features of RFID
Read data without visual access
Ability to read data from moving objects
Can read at distance, from 3cm to 100 metres
Secure the tag data
Can also update data in the tag (write)
Automated reading of tags (within a industrial apps)
Variety of tag form according to the application

Pervasive Computing by Dr. M.Taha


Radio Frequency Identification (RFID)
Due to flexibility of RFID system, it can be used in several applications
however, due to specific nature of application, RFID usually used in
following formation
1. Companion Animals, Livestock and Access Control (low frequency)
2. Used in Security, Access & Payment Systems (High Frequency)
3. Used in Supply Chain, Asset Management, Mining, Retail and Livestock
(Ultra High Frequency)
4. Used in Manufacturing & Long Range Asset Management (100-200M)
(Active - Battery Operated)

Pervasive Computing by Dr. M.Taha


Applications
Automated Toll Collection

Pervasive Computing by Dr. M.Taha


Applications

Smart Grocery Store


Add an RFID tag to all
items in the grocery.
As the cart leaves the
store, it passes
through an RFID
transceiver
The cart can checkout
in seconds.

Pervasive Computing by Dr. M.Taha


Applications

Wild Life Tracking (For research)

Pervasive Computing by Dr. M.Taha


Applications

Wild Life Tracking (For research)

Alongwith GPS

Pervasive Computing by Dr. M.Taha


Applications
RFID Application
RFID Barcode Reader
For Inventory management in
hyper stores

RFID count is 100 times as fast as a barcode count


Read at a time

Pervasive Computing by Dr. M.Taha


RFID IN THE LIBRARY
Automatic item identification using RFID
technology, for a modern informatics-based
library systems
Supported functions are self-service
borrowing and returning
Advantages:
Searching
Inventory management
Grouped transfer, deposition
Theft protection
Dropbox, sorting
Non-stop opening hours
Less manual workforce

Pervasive Computing by Dr. M.Taha


Technological Limitations
New technologies are like new marriages

Requirements for Success in IoT Context


Constrained device/network
Low Cost
Better performance in scalable network
Support for killer applications
Manageability
Interoperability
Pervasive Computing by Dr. M.Taha
Technological Limitations
Technology Life Cycle : S-shaped curve

Pervasive Computing by Dr. M.Taha


WIRELESS PERSONAL AREA
NETWORKS (WPAN)

Pervasive Computing by Dr. M.Taha


Wireless Personal Area Networks
(WPAN)
Wireless personal area networks (WPANs) are used to convey
information over short distances among a private, close group
of participant devices.
Unlike a wireless local area network (WLAN), a connection
made through a WPAN involves little or no infrastructure or
direct connectivity to the outside network.
This allows small, power-efficient, inexpensive solutions to be
implemented for a wide range of devices.

Pervasive Computing by Dr. M.Taha


Wireless Personal Area Networks
(WPAN)
WPAN is specified in IEEE 802.15 standard in 2005.
It defines PHY and MAC layer specifications for wireless connectivity with
fixed, portable, and moving devices within a personal operating space
(POS).
POS is the space about a person or object that typically extends up to
10 m in all directions, whether stationary or in motion.
Different technologies that are defined within WPAN umbrella are the:
802.15.1 is Bluetooth,
802.15.3 is a high data rate category for Ultra-Wide Band (UWB)
IEEE 802.15.4 (often called Low-rate WPAN (LR WPAN)
ZigBee complete protocol suit
6LoWPAN
802.15.6 is for body area networks (BAN)
802.15.7 is for Visible Light Communication
Pervasive Computing by Dr. M.Taha
Bluetooth - IEEE 802.15.1
Origins in the BodyLAN project that is initiated in the 1990s for
military networking, to connect personal devices around a solider
Goal was to develop smart technology that self configures,
recognizes other units within range and provides on the fly
communications
Provide low power communication over shorter distances
Commercial launch by Ericsson in 1994
range of devices available with Bluetooth functionality, including:
keyboards,
pointing devices,
audio head sets,
printers may connect to personal digital assistants (PDAs),
cell phones

Pervasive Computing by Dr. M.Taha


Bluetooth - IEEE 802.15.1
Standardization
Versions proposed by Bluetooth SIG
Bluetooth v. 1.2 in 2002 : 1 Mbit/s practically 721 kbit/s (Classic)
Bluetooth v. 2.0 in 2004 : 3 Mbit/s practically 2.1 Mbit/s ( Enhanced
Data Rate EDR)
Bluetooth v. 3.0 in 2009 : 24 Mbit/s (High speed and Alternative
MAC/PHY) - addition of 802.11 as a high speed transport co-located
link
Bluetooth v. 4.0 in 2010 : 24 Mbit/s (Bluetooth Low energy BTLE or
Bluetooth Smart: Power consumption = 0.01 to 0.5 W )
Bluetooth v. 5.0 in Dec 2016 : Focused on Internet of Things , IoT and
capable for low-energy and high speed communication

Pervasive Computing by Dr. M.Taha


Bluetooth Network Architecture
Bluetooth enabled electronic devices connect and
communicate wirelessly through short-range, ad-hoc
networks known as Piconets
Piconets are established dynamically and automatically as
Bluetooth enabled devices enter and leave radio proximity.

Up to 8 devices in one Piconet


(1 master and 7 slave devices).
Beyond that?
Master
Collection of Piconets forms
Slaves Scatternets
But it does not necessarily imply any
network routing capability or
Pervasive Computing by Dr. M.Taha function in the Bluetooth device.
Bluetooth - Communication

Pervasive Computing by Dr. M.Taha


Bluetooth - Communication

Pervasive Computing by Dr. M.Taha


Bluetooth - Communication
Scenario 1
A device with Slave status cannot be
communicate between two piconets

But if one device is serving as Slave


in one piconet and Master in other
piconet, than it may communicate
within both piconets (but not necessary,
depend on version)

Communication between two piconet Scenario 2


that forms scatternet, does not
support relaying of data through
common slave in the basic bluetooth
protocol

Pervasive Computing by Dr. M.Taha


Bluetooth For IoT
Bluetooth was originally designed for continuous, streaming
data applications.
Continuous exchange a lot of data at a close range.
Thats why Bluetooth is such a good fit for consumer
products.
People like to receive data and talk at the same time, and exchange
videos from one device from another.
In other hand, Bluetooth-Low energy (BLE) remains in sleep
mode constantly except for when a connection is initiated.
The actual connection times are only a few mS, unlike Bluetooth
which would take ~100mS.

Pervasive Computing by Dr. M.Taha


IEEE 802.15.4
Due to continuous development in low-scale data
communication, there is a need for more simpler and less
expensive communication for small & low-power devices.
Comparing with WiFi & Bluetooth technologies
IEEE established a working group to specify the standards for
physical layer and media access control for low-rate wireless
personal area networks (LR-WPANs).
Eventually, they release LR-WPANs in IEEE 802.15.4 standard

Pervasive Computing by Dr. M.Taha


Low-Rate Wireless Personal Area Networks
(LR-WPANs) IEEE 802.15.4
LR-WPANs deals with low data rate but very long battery life
(months or even years) and very low complexity.
IEEE defines standard for both the physical (Layer 1) and data-
link (Layer 2) layers in May 2003
Several standardized and proprietary networks protocols run
over 802.15.4-based networks
Standard Characteristics
Data rate from 20kbps to 250kbps
Star or Mesh operation
Support for low latency devices
CSMA-CA Channel access
Dynamic device addressing
Pervasive Computing by Dr. M.Taha
LR-WPAN Network
Network Topology

Pervasive Computing by Dr. M.Taha


LR-WPAN
In LR-WPAN, since a node has limited transmit range, the
transmission of a message beyond this range, requires that
the node calls upon one or more of its neighbor in order to
relay the message to its final destination
This technique is commonly called multi-hop communication.

Pervasive Computing by Dr. M.Taha


LR-WPAN
Self-Organization
Fully automatic routing
Each node connects with its immediate neighbors
Automatic topology adaptation
The network automatically adapts as its topology changes, i.e. as
nodes arrive at or depart from the network environment

Pervasive Computing by Dr. M.Taha


LR-WPAN
Device Classes
Full Function Device (FFD)
Any topology
PAN coordinator capable
Talks to any other device
Reduced Function Device (RFD)
Limited to star topology
Cannot become a network coordinator capable
Talks only to a network coordinator
Very simple to implement

Pervasive Computing by Dr. M.Taha


LR-WPAN
Star Topology (P2MP)

Pervasive Computing by Dr. M.Taha


LR-WPAN
Peer-to-Peer Mesh (P2P)

Pervasive Computing by Dr. M.Taha


LR-WPAN
Combined Topology
Clustered Stars
Example
Cluster nodes exist between room
of hotel and each room has a star
network

Pervasive Computing by Dr. M.Taha


ZigBee - IEEE 802.15.4
On the basis of IEEE 802.15.4 standard, in
2003 the ZigBee Alliance specified the
standards for ZigBee.
The motive was design a protocol as
assemble and forget,
meaning once you set it up, it can last for months.

Operating standards
Frequency allocation (ISM band) and Data rates

Pervasive Computing by Dr. M.Taha


ZigBee - IEEE 802.15.4
Its low power consumption limits transmission
distances to 10100 meters
depending on power output and environmental
characteristics.
Data can be transmit over long distances through a
mesh network of intermediate devices to reach more
distant ones
ZigBee is typically used in applications that requires
low data rate
long battery life
secure networking (128 bit AES encryption key)

Pervasive Computing by Dr. M.Taha


ZigBee - Network
Coordinator establishes the PAN
ater which router(R) and End
devices(E) can join the
network(PAN).
Only one coordinator in each
network, on mains powered (AC)
and it will not go to sleep mode.
Router (R) can assist in routing the
data through the mesh network and
allows join request from R and E.
It is also mains powered and can not
End Devices (E) cannot allow other devices
go to sleep mode
to join the PAN nor can it assist in routing
the data through the network.
It is battery powered and it may sleep
hence battery consumption can be
minimized to great extent.
Pervasive Computing by Dr. M.Taha
ZigBee - Network

Communication
There are two main steps in completing Zigbee Network
Forming the network by Coordinator and joining the network by Routers and
End devices.
PAN ID is used to communicate between Zigbee devices, and when they join PAN
they are assigned PAN ID by coordinator.
Data is transmitted through Pervasive
Mesh routing
Computing by aM.Taha
by Dr. Coordinator and Routers
ZigBee - Application
IoT Application
An Intelligent Wireless Sensor Network Temperature Acquisition
System with an FPGA

ZigBee, based wireless system that monitors and visualizes periodically the
environment temperature.
Pervasive Computing by Dr. M.Taha
ZigBee - with IoT
IoT Application
Phillips Hue

Pervasive Computing by Dr. M.Taha


ZigBee - Advantages
ZigBees battery life is a major plus over WiFi, the
networks generally consume 25% of the power
of WiFi networks.
Comparing with Bluetooth, although it provide a low
data rate, however, it can communicate over a longer
distance
Considering, same parameters
BLE = 77m
ZigBee = 219 m

Pervasive Computing by Dr. M.Taha


Low-Rate Wireless Personal Area Networks
(LR-WPANs)
Motive behind 6LoWPAN
Internet protocol could and should be applied even to the
smallest devices
Developed by IETF, first draft proposed in 2007
6LoWPAN IPv6
Low Power
Low Data Rate
Low Cost
WPAN

Replaced the IPv6, for additional consideration and


support for resource constrained devices
Based on IEEE 802.15.4 PHY and MAC specifications
Pervasive Computing by Dr. M.Taha
6LoWPAN Network
A typical 6LoWPAN communication

*Edge Router or Gateway

Pervasive Computing by Dr. M.Taha


Layered Architecture
Layered Architecture for 6LoWPAN

Pervasive Computing by Dr. M.Taha


Layered Architecture
Layered Architecture for 6LoWPAN

Pervasive Computing by Dr. M.Taha


6LoWPAN based System
6LoWPAN based Network

Pervasive Computing by Dr. M.Taha

Vous aimerez peut-être aussi