6 research outputs found

    Semantic Gateway as a Service architecture for IoT Interoperability

    Get PDF
    The Internet of Things (IoT) is set to occupy a substantial component of future Internet. The IoT connects sensors and devices that record physical observations to applications and services of the Internet. As a successor to technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has stumbled into vertical silos of proprietary systems, providing little or no interoperability with similar systems. As the IoT represents future state of the Internet, an intelligent and scalable architecture is required to provide connectivity between these silos, enabling discovery of physical sensors and interpretation of messages between things. This paper proposes a gateway and Semantic Web enabled IoT architecture to provide interoperability between systems using established communication and data standards. The Semantic Gateway as Service (SGS) allows translation between messaging protocols such as XMPP, CoAP and MQTT via a multi-protocol proxy architecture. Utilization of broadly accepted specifications such as W3C's Semantic Sensor Network (SSN) ontology for semantic annotations of sensor data provide semantic interoperability between messages and support semantic reasoning to obtain higher-level actionable knowledge from low-level sensor data.Comment: 16 page

    Solución de dos estudios de caso bajo el uso de tecnología CISCO

    Get PDF
    El desarrollo de esta actividad es de vital importancia como profesional, se van a desarrollar, documentar y configurar 2 redes las cuales tienen una serie de exigencias bien marcadas las cuales se debe cumplir como responsables del diseño de las mismas. Para el primer caso ESCENARIO 1 se va a configurar una red pequeña en la cual se va a configurar los parámetros básicos dentro de cada uno de los dispositivos que hacen parte de la misma, la configuración se realizará de los routers, switches y PC, se configurará las contraseñas, interfaces y para el direccionamiento de la RED se aplicará VLSM con el fin de ajustar el diseño de la misma a las necesidades reales de la organización. Para el caso del ESCENARIO 2 la red es un poco más compleja ya que se profundiza un poco más en aspectos muy importantes dentro del diseño de las redes, igualmente se realiza la configuración básica de cada uno de los dispositivos, contraseñas, interfaces, subinterfaces tanto aplicando direccionamiento IPV4 como IPV6 mediante VLSM. Algo nuevo que se configura en este ESCENARIO es lo relacionado con las VLAN aspecto que como se verá es vital con el fin de organizar y brindar seguridad a la red mejorando su rendimiento y eficiencia. Se realiza igualmente la configuración de DHCP en los routers, esto con el fin de brindar direcciones IPV4 de manera automática de algunas de sus VLAN. Como vemos este trabajo permitirá practicar muchos de los temas tratados en el DIPLOMADO desarrollando diversas actitudes. Se espera que este trabajo sea del agrado de todos ustedes. Palabras Clave: CISCO, CCNA, Conmutación, Enrutamiento, Redes, Electrónica.The development of this activity is of vital importance as a professional, 2 networks will be developed, documented and configured, which have a series of well-defined requirements which must be met as those responsible for their design. For the first case SCENARIO 1, a small network will be configured in which the basic parameters will be configured within each of the devices that are part of it, the configuration will be made of the routers, switches and PCs, configure the passwords, interfaces and for the addressing of the NETWORK, VLSM will be applied in order to adjust its design to the real needs of the organization. In the case of SCENARIO 2, the network is a little more complex since it goes deeper into very important aspects within the design of the networks, the basic configuration of each of the devices, passwords, interfaces, subinterfaces, both applying IPV4 as IPV6 addressing via VLSM. Something new that is configured in this SCENARIO is related to VLANs, an aspect that, as will be seen, is vital in order to organize and provide security to the network, improving its performance and efficiency. The DHCP configuration is also carried out on the routers, in order to automatically provide IPV4 addresses for some of their VLANs. As we can see, this work will allow practicing many of the topics covered in the DIPLOMA, developing different attitudes. It is hoped that this work will be to the liking of all of you. Keywords: CISCO, CCNA, Switching, Routing, Networks, Electronics

    User interface design of meta model repository for IoT devices

    Get PDF
    Internet of Things (IoT) has become prevalent in recent years. IoT works as a gigantic network in which the vast set of devices are integrated and interconnected. These devices include sensors, gateways and other smart objects. Accordingly, plenty of data models are produced to define and describe IoT devices by various organizations and manufacturers. Those data models significantly help in device management. However, it seems that the sharing and presenting of data models is not so effective. For a variety of organizations have different standardized ways exist to manage and present data models. Particularly, one device may have multiple data models. They are generated as diverse data formats of defining a device and distributed in different platforms. Consequently, to facilitate developers and enterprises’ work with data models, existing practices of data model management still need to be upgraded. This master’s thesis proposes a user interface design solution for a meta model repository for IoT devices. Based on the exploration of various collaboration platforms, it analyses the selected platform with its aspects that make it easy to share the models while allow collaboration. Additionally, the study includes the research work on exploring current state of data models. The analysis of different collaboration platforms is also reported. Throughout the design process, user-centered design (UCD) methodology was applied to help create a usable repository in terms of both its user interface and its functionality. In this regard, two rounds of usability testing (6 and 7 participants, respectively) were conducted, which aimed to collect insights and requirements from users. The relevant results are presented and discussed. The outcome of this thesis is a functional meta model repository which has been designed iteratively during user tests. It starts with support of Lightweight machine to machine (LWM2M) data models. With more data models appear, the repository will be more valuable and significant. More importantly, the repository can be extended to machine to machine communication in future. Therefore, the result of this thesis also demonstrates perceptions about the possibilities of the repository in future use

    Implementasi Konsep Internet of Things pada Sistem Monitoring Banjir menggunakan Protokol MQTT

    Get PDF
    Secara umum, Internet of Things dapat diartikan sebagai terhubungnya berbagai benda di sekitar dengan sebuah jaringan internet. Untuk menerapkannya, Internet of Things membutuhkan suatu jalur komunikasi yang sesuai dengan kebutuhan sistem. Salah satu protokol yang sesuai dengan penerapan konsep Internet of Things adalah protokol Message Queue Telemetry Transport (MQTT). Protokol MQTT sering digunakan dalam berbagai sistem yang menggunakan konsep Internet of Things, salah satunya adalah sistem monitoring. Salah satu aspek dalam kehidupan yang memerlukan suatu sistem monitoring adalah bencana alam. Dari berbagai bencana alam yang terjadi di Indonesia, banjir merupakan bencana alam yang cukup sering melanda berbagai kota di Indonesia. Oleh karena itu, penelitian ini mengimplementasikan konsep Internet of Things pada sistem monitoring banjir dengan menggunakan protokol MQTT. Berdasarkan hasil pengujian, didapatkan kesimpulan bahwa protokol MQTT dapat digunakan pada sistem monitoring banjir. Tingkat akurasi yang di dapat dari pengujian sistem adalah 97,801% dengan standar deviasi yang diperoleh sebesar ± 0.0309 cm. Pada pengujian skalabilitas diperoleh persentase rata-rata tingkat keberhasilan sebesar 100%, 99,87% dan 99,93% pada percobaan publisher 100, 250 dan 500 yang masing-masing dilakukan 3 kali. Dan pada pengujian integritas data, protokol MQTT memperoleh kesamaan data sebesar 100% di setiap percobaan dengan interval 10ms, 100ms dan 1000ms

    Digital Twins and Blockchain for IoT Management

    Get PDF
    We live in a data-driven world powered by sensors getting data from anywhere at any time. This advancement is possible thanks to the Internet of Things (IoT). IoT embeds common physical objects with heterogeneous sensing, actuating, and communication capabilities to collect data from the environment and people. These objects are generally known as things and exchange data with other things, entities, computational processes, and systems over the internet. Consequently, a web of devices and computational processes emerges involving billions of entities collecting, processing, and sharing data. As a result, we now have an internet of entities/things that process and produce data, an ever-growing volume that can easily exceed petabytes. Therefore, there is a need for novel management approaches to handle the previously unheard number of IoT devices, processes, and data streams. This dissertation focuses on solutions for IoT management using decentralized technologies. A massive number of IoT devices interact with software and hardware components and are owned by different people. Therefore, there is a need for decentralized management. Blockchain is a capable and promising distributed ledger technology with features to support decentralized systems with large numbers of devices. People should not have to interact with these devices or data streams directly. Therefore, there is a need to abstract access to these components. Digital twins are software artifacts that can abstract an object, a process, or a system to enable communication between the physical and digital worlds. Fog/edge computing is the alternative to the cloud to provide services with less latency. This research uses blockchain technology, digital twins, and fog/edge computing for IoT management. The systems developed in this dissertation enable configuration, self-management, zero-trust management, and data streaming view provisioning from a fog/edge layer. In this way, this massive number of things and the data they produce are managed through services distributed across nodes close to them, providing access and configuration security and privacy protection

    New Architectures for ubiquitous networks : use and adaptation of internet protocols over wireless sensor networks

    Get PDF
    This thesis focuses on the study of low-resource demanding protocols, communication techniques and software solutions to evaluate, optimise and implement Web service in WSNs. We start analysing the Web service architectures in order to choose the most appropriate for the constraints of WSNs, which is REST. Based on this analysis, we review the state-of-the-art of protocols that allows implementing REST Web services. To this end, we adopt the IEEE 802.15.4 standard for the physical and data-link layers, 6LoWPAN for the network layer and CoAP for the application layer. 6LoWPAN defines two forwarding techniques, which are called mesh under (MU) and route over (RO). It also provides a mechanism to fragment packets, which is called 6LoWPAN fragmentation. In part of the thesis, we study the effects that MU and RO have on communications using 6LoWPAN fragmentation. In particular, MU does not prevent forwarding unnecessary fragments and out-of-order delivery, which could lead to an inefficient use of bandwidth and a growth of energy consumption. We propose, then, a novel technique able to improve the performance of MU with fragmented packets, which we refer to as controlled mesh under (CMU). The results of a performance evaluation in a real WSN show that CMU is able to enhance the performance of MU by reducing its packet loss and end-to-end delay. In 6LoWPAN fragmentation, the loss of a fragment forces the retransmission of the entire packet. To overcome this limitation, CoAP defines blockwise transfer. It splits the packet into blocks and sends each one in reliable transactions, which introduces a significant communication overhead. We propose a novel analytical model to study blockwise and 6LoWPAN fragmentation, which is validated trough Monte Carlo simulations. Both techniques are compared in terms of reliability and delay. The results show that 6LoWPAN fragmentation is preferable for delay-constrained applications. For highly congested networks, blockwise slightly outperforms 6LoWPAN fragmentation in terms of reliability. CoAP defines the observe option to allow a client to register to a resource exposed by a server and to receive updates of its state. Existing QoS in the observe option supports partially timeliness. It allows specifying the validity of an update but it does not guarantee its on-time delivery. This approach is inefficient and does not consider applications, i.e. e-health, that requires the delivery of an update within a deadline. With this limitation in mind, we design and evaluate a novel mechanism for update delivery based on priority. The evaluation proves that implementing a delivery order improves the delay and delivery ratio of updates. Our proposal is also able to reduce the energy consumption allowing clients to express the class of updates that they wish to receive. In part of this thesis, we present our original library for TinyOS, which we referred to as TinyCoAP, and the design and implementation of a CoAP proxy. We compare TinyCoAP to CoapBlip, which is the CoAP implementation distributed with TinyOS. TinyCoAP proves to be able to reach a high code optimization and to reduce the impact over the memory of WSN nodes. The evaluation includes also the analysis of the CoAP reliability mechanism, which was still uncovered in the literature. As a novelty, we also compare CoAP with HTTP considering different solutions for the transport layer protocol such as UDP and persistent TCP connections. The CoAP proxy enables Web applications to transparently access the resources hosted in CoAP devices. It supports long-lived communications by including the WebSocket protocol. It also supports Web applications that use the traditional HTTP long-polling technique. Finally, one of the main contributions of the proxy design is the proposal of a standard URI path format to be used by Web applications to access to a CoAP resource.Esta tesis se enfoca en el estudio de protocolos de bajo consumo, técnicas de comunicación y software con el fin de evaluar, optimizar y desarrollar servicios Web en WSNs. Empezamos analizando la arquitectura de servicios Web con el objetivo de elegir la arquitectura más apropiada debido a las limitaciones de WSNs. Ésta se denomina REST. En base a este análisis, revisamos el estado del arte de los protocolos que permiten desarrollar servicios Web. Con este objetivo adoptamos el estándar IEEE 802.15.4 por la capa física y de enlace, 6LoWPAN por la de red y CoAP por la capa de aplicación. 6LoWPAN define dos técnicas de enrutamiento, denominadas 'Mesh Under' (MU) y 'Route Over' (RO). Asimismo ofrece un mecanismo para fragmentar paquetes, llamado 6LoWPAN fragmentation. En parte de la tesis estudiamos los efectos que MU y RO tienen sobre la comunicación que utiliza 6LoWPAN fragmentation. En particular, MU no previene enrutar fragmentos innecesarios y la entrega fuera de orden, lo cual podría provocar un uso ineficiente de ancho de banda y un crecimiento del consumo energía. Proponemos entonces nueva técnica capaz de mejorar las prestaciones de MU con paquetes fragmentados que denominamos 'Controlled Mesh Under' (CMU). Los resultados de una evaluación en una WSN real demuestran que CMU es capaz de mejorar las prestaciones de MU reduciendo la pérdida de paquetes y el retraso end-to-end. En 6LoWPAN fragmentation, la pérdida de un fragmento causa la retransmisión del paquete entero. Para evitar esta limitación CoAP define blockwise transfer. Esto divide el paquete en bloques y los envía en comunicaciones fiables provocando overhead. Proponemos un nuevo modelo analítico para estudiar blockwise y 6LoWPAN fragmentation cuya validación se realiza mediante simulaciones de Monte Carlo. Ambas técnicas se comparan en términos de fiabilidad y retraso. Los resultados muestran que es preferible usar 6LoWPAN fragmentation para las aplicaciones con restricciones en retraso. Para las redes mas congestionadas, blockwise mejora ligeramente 6LoWPAN fragmentation en términos de fiabilidad. CoAP define la opción observe para permitir a un cliente registrarse a un recurso proporcionado por un servidor y recibir actualizaciones de su estado. La QoS ofrecida por la opción observe proporciona soporte parcial por el timeliness. Esta permite especificar la validez de una actualización pero no garantiza su entrega a tiempo. Este enfoque es ineficiente y no incluye aplicaciones, como por ejemplo e-health que requieren la entrega de las actualizaciones en un plazo determinado. Teniendo en cuenta esta limitación, diseñamos y evaluamos un mecanismo novedoso para la entrega de actualizaciones basada en la prioridad. La evaluación demuestra que la implementación de una orden de entrega mejora la tasa de llegada y el retraso de las actualizaciones. Nuestra propuesta es capaz de reducir el consumo de energía permitiendo a los clientes expresar el tipo de actualización que desean recibir. En parte de esta tesis presentamos nuestra librería original pro TinyOS a la que nos referimos como TinyCoAP, así como el diseño y desarrollo de un Proxy CoAP. Comparamos TinyCoAP a CoapBlip, que es la aplicación distribuida con TinyOS. TinyCoAP demuestra ser capaz de alcanzar una alta optimización de código y reducir el impacto sobre la memoria de nodos de WSNs. La evaluación también incluye el análisis de la fiabilidad de CoAP que no había sido estudiada en la literatura. Como novedad también comparamos CoAP con HTTP, considerando diferentes soluciones para el protocolo de transporte como UDP y conexiones TCP persistentes. El Proxy CoAP permite a las aplicaciones Web acceder de manera transparente a los recursos almacenados en dispositivos CoAP. Éste incluye el protocolo WebSocket, que permite el establecimiento de conexiones long-lived. También permite el uso de aplicaciones Web con la tradicional técnica HTTP long-pollin
    corecore