presented by: chaitanya k. sambhara paper by: karl mayer and wolfgang fritsche iabg mbh germany -...

30
Presented by: Presented by: Chaitanya K. Sambhara Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany IABG mbH Germany - Instructor : Dr Yingshu Li - Instructor : Dr Yingshu Li

Upload: nathan-byrd

Post on 30-Dec-2015

236 views

Category:

Documents


2 download

TRANSCRIPT

Presented by: Presented by: Chaitanya K. SambharaChaitanya K. Sambhara

Paper by: Karl Mayer and Wolfgang Fritsche Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany IABG mbH Germany

- Instructor : Dr Yingshu Li- Instructor : Dr Yingshu Li

Why this topic ?Why this topic ?

Sensor networks are becoming more Sensor networks are becoming more and important in various application and important in various application areas.areas.

These networks will require the These networks will require the internet connection.internet connection.

One of the major applications could One of the major applications could be disaster management. be disaster management.

IntroductionIntroduction

With growing wireless technology With growing wireless technology sensors are allowed to be mobile and sensors are allowed to be mobile and move around a sensor network.move around a sensor network.

In IEEE 802.15 working group wireless In IEEE 802.15 working group wireless technologies for WPAN’s are under technologies for WPAN’s are under development and standardization.development and standardization.

Core DifferenceCore Difference

IP for a general network is not IP for a general network is not designed with constraints in mind. designed with constraints in mind.

Sensor networks face a lot more Sensor networks face a lot more requirements and constraints on requirements and constraints on communication protocols.communication protocols.

Why this idea came?Why this idea came?

Integrating WSNs with wired or Integrating WSNs with wired or wireless IP-based infrastructures wireless IP-based infrastructures could play a revolutionary role.could play a revolutionary role.

Internet is obviously the biggest Internet is obviously the biggest known network.known network.

AimAim

In order to realize IP-enabled sensor In order to realize IP-enabled sensor networks we need to know –networks we need to know –

How to adapt IP networking to the How to adapt IP networking to the constraints of WSNs.constraints of WSNs.

How to integrate IP-enabled sensor How to integrate IP-enabled sensor networks into the internet.networks into the internet.

Scope for thisScope for this

Traditionally sensor networks are not Traditionally sensor networks are not IP-enabled. Hence we require IP-enabled. Hence we require proxies.proxies.

Problems with this Problems with this approachapproach

Network address needs to be Network address needs to be translated.translated.

We will need to develop new control We will need to develop new control and communication protocols that and communication protocols that would be already standardized for IP would be already standardized for IP communicationcommunication

What we needWhat we need

Sensor networks with IP support which Sensor networks with IP support which can integrate with WAN’s since they can integrate with WAN’s since they could be considered just another part of could be considered just another part of the internetthe internet

Applications that require direct Applications that require direct communication between nodes in the communication between nodes in the internet.internet.

No special proxies should be needed to No special proxies should be needed to be installed.be installed.

Another ApproachAnother Approach

Gateways can be deployed that Gateways can be deployed that interconnect WAN infrastructures interconnect WAN infrastructures and wireless sensor nodes. and wireless sensor nodes.

Applications of this Applications of this technologytechnology

The need for early detection to limit the disaster The need for early detection to limit the disaster impact.impact.

The need for becoming aware of the extend of The need for becoming aware of the extend of the disasterthe disaster

Establishment of a communication infrastructureEstablishment of a communication infrastructure Detection of injured people that require medical Detection of injured people that require medical

carecare Detection of dangerous goods (e.g. toxin or Detection of dangerous goods (e.g. toxin or

explosiveexplosive material) that need special treatment.material) that need special treatment.

Applications of this Applications of this technologytechnology

Temperature sensors could be used to Temperature sensors could be used to determine the movement of fires and determine the movement of fires and microphones and cameras could be used microphones and cameras could be used to detect injured and non-injured people to detect injured and non-injured people that need evacuation. that need evacuation.

The attributes are independent of each The attributes are independent of each other because disasters are often other because disasters are often accompanied by a non-existing or a accompanied by a non-existing or a destroyed infrastructure.destroyed infrastructure.

Required FunctionalitiesRequired Functionalities

Specification of IP over sensor Specification of IP over sensor network technologiesnetwork technologies

Ad hoc networkingAd hoc networking

Auto configurationAuto configuration

Auto ConfigurationAuto Configuration

To become ready for communication To become ready for communication at network layer, sensor network at network layer, sensor network nodes need to be configured with nodes need to be configured with several parameters, e.g. IP addresses.several parameters, e.g. IP addresses.

This can be realized manually or This can be realized manually or through Auto configurationthrough Auto configuration

Advantages of Auto Advantages of Auto ConfigurationConfiguration

Sensor networks may consist of Sensor networks may consist of hundreds of nodes, making manual hundreds of nodes, making manual configuration impossibleconfiguration impossible

Enables IP nodes to become Enables IP nodes to become communication ready without user communication ready without user involvement.involvement.

Basic requirements of Basic requirements of auto configurationsauto configurations

Sensor networks are envisaged Sensor networks are envisaged to be set up in an ad hoc fashion.to be set up in an ad hoc fashion.

Nodes may be mobile as wellNodes may be mobile as well

Flexibility of ad hoc sensor networksFlexibility of ad hoc sensor networks need to be taken in to account.need to be taken in to account.

Basic requirements of Basic requirements of auto configurationsauto configurations

Scope of auto-configurationScope of auto-configuration

Address auto-configurationAddress auto-configuration Gateway discoveryGateway discovery Service DiscoveryService Discovery

Mobility ManagementMobility Management

The point of attachment of the sensor The point of attachment of the sensor network to the Internet could be fix or network to the Internet could be fix or dynamic.dynamic.

The roaming of moving networks The roaming of moving networks between different geographic between different geographic locations is often handled by the locations is often handled by the subnet technology in usesubnet technology in use

Mobility ManagementMobility Management

For scalability reasons, IP For scalability reasons, IP addressing in the Internet is location addressing in the Internet is location dependent and IP prefixes and dependent and IP prefixes and addresses are assigned in a addresses are assigned in a hierarchical way.hierarchical way.

Routers in the Internet learn from IP Routers in the Internet learn from IP destination addresses where to route destination addresses where to route a packet toa packet to

Network MobilityNetwork Mobility

SecuritySecurity

Security is a major concern in every Security is a major concern in every part of the Internet, covering e.g. part of the Internet, covering e.g. authentication, authorization, and authentication, authorization, and access control, integrity protection, access control, integrity protection, encryption, intrusion detection, encryption, intrusion detection, denial of service prevention.denial of service prevention.

New lightweight security New lightweight security mechanisms appropriate for sensor mechanisms appropriate for sensor networks have to be used.networks have to be used.

REALIZATION OF AN IPV6-ENABLED REALIZATION OF AN IPV6-ENABLED SENSOR NETWORK CONNECTED TO SENSOR NETWORK CONNECTED TO

THE INTERNETTHE INTERNET

In the disaster management scenario In the disaster management scenario sensor nodes are deployed on demand sensor nodes are deployed on demand in an ad hoc fashion, measuring in an ad hoc fashion, measuring temperature or detecting vital signs, temperature or detecting vital signs, and communicate with a central and communicate with a central disaster management centre disaster management centre somewhere in the Internet.somewhere in the Internet.

The sensor network is connected via a The sensor network is connected via a gateway to the WAN infrastructure.gateway to the WAN infrastructure.

Proposed ArchitectureProposed Architecture

Protocol stack of an IPv6-enabled Protocol stack of an IPv6-enabled sensor node.sensor node.

Proposed ArchitectureProposed Architecture

Gateway routerGateway router

Proposed ArchitectureProposed Architecture

Network ArchitectureNetwork Architecture

ConclusionConclusion

Benefit of IP-enabled sensor Benefit of IP-enabled sensor networks connected to the Internet networks connected to the Internet in the scenario of disaster in the scenario of disaster managementmanagement

We discussed required functions in We discussed required functions in such system like IP support over the such system like IP support over the respective sensor link technology, ad respective sensor link technology, ad hoc networking, auto-configuration, hoc networking, auto-configuration, mobility management and security.mobility management and security.

ConclusionConclusion

For most required functions so far For most required functions so far just first ideas exist and further just first ideas exist and further research and development effort is research and development effort is required until standardization.required until standardization.

ReferenceReference

IP-enabled Wireless Sensor IP-enabled Wireless Sensor Networks and their integration into Networks and their integration into the Internetthe Internet

By :By :

Karl Mayer and Wolfgang Fritsche,Karl Mayer and Wolfgang Fritsche,

IABG mbH, GermanyIABG mbH, Germany

Suggestions/ Question Suggestions/ Question timetime