Abstracted Network For Iot
Abstracted Network For Iot
Abstracted Network For Iot
But three emerging factors are requiring a fresh look at this worldview. The
first is the coming wave of sensors, actuators, and devices making up the
Internet of Things (IOT). Although not yet widely recognized, it is beginning
to be understood that a majority of these devices will be too small, too
cheap, too dumb, and too copious to run the hegemonic IPv6 protocol. Instead,
much simpler protocols will predominate (see below), which must somehow be
incorporated into the IP networks of Enterprises and the Internet.
At the other end of the scale from these tiny devices are huge Enterprise
networks, increasing movingly to the cloud for computing and communication
resources. An important requirement of these Enterprises is the capacity to
manage, control, and tune their networks using a variety of Software Defined
Networking (SDN) technologies and protocols. These depend on computing
resource at the edges of the network to manage the interactions.
The third element is a conundrum presented by the first two: Enterprises will
be struggling with the need to bring vast numbers of simple IOT devices into
their networks. Though many of these devices will lack computing and protocol
smarts, the requirement will still remain to manage everything via SDN. Along
with this, many legacy Machine-to-Machine (M2M) networks (such as those on
the factory floor) present the same challenges as the IOT: simple and/or
proprietary protocols operating in operational silos today that Enterprises
desire to manage and tune with SDN techniques.
And by the way, any new networking solution to address these factors must be
tolerant of disruption, mobility, and change, with operation continuing
despite perturbation.
Figure 1b: The Abstracted Network based on propagator nodes emulates separate
networks but allows Enterprise control and publish/discover/subscribe
With “more eggs in one basket”, survivability and non-stop operation of the
Abstracted Network becomes vitally important. But because the interconnected
propagators maintain databases for both their own topology and for the
logical network configuration, disruption tolerance is provided inherently.
The capabilities of the propagator node and the Abstracted Network Concept
will be especially important for integrating the coming explosion of Internet
of Things devices and their terse M2M communications schemes, discussed in
the next section.
For the same reasons, this tidal wave of IOT devices cannot be controlled by
existing operational techniques and tools. Instead, lessons from Nature’s
massive scale will guide a new architecture for the IOT.
Taking cues from Nature, and in collaboration with our OEM licensees,
MeshDynamics is extending concepts outlined in the book “Rethinking the
Internet of Things” to real-world problems of supporting “smart: secure and
scalable” IOT M2M communities at the edge.
As noted above, the key to integrating simple devices at the edge of the
network is off-loading networking complexity to the MeshDynamics propagator
nodes in an Abstracted Network. Propagator nodes are the “gasket” between
simple devices and higher-level Enterprise computing (Figure 6b below).
Like Nature treats pollen, the (scalable) IOT must treat any single chirp as
truly "best effort" – so heavy broadcast storms caused by an external event
will die out pretty quickly. IOT chirps are digital pollen – lightweight,
broadly “published”, with meaning only to "interested" receivers/subscribers.
Each IOT chirp message has some short and simple markers, a short data field,
and a checksum. As described in my book, the simplest chirps may be only 5
bytes (contrast this with 40 bytes for the smallest sender-oriented IPv6
packet). [Slides]
Chirps are what IP Datagrams were meant to be. The bandwidth savings are
immediately obvious, but pale in comparison to the reduction in memory,
processing, and power consumption at each of myriad end devices compared to
running an IP stack. The cost and complexity burden on the end devices will
be very low, as it must be in the IOT.
Propagators listen for data "chirping" from any device. Based on a simple set
of “markers” in the chirps (described below), propagator nodes decide how to
broadcast these chirps to other propagator nodes and on to the higher-level
Integrator (Big Data) subscribers.
FIG 7: Applications for Aggregation, Pruning and Real Time M2M “Shuttles”
Pub Sub aware Applications on the Propagator nodes serve as aggregation and
pruning “hubs”, see Figure 7 above. Chirps passing from-and-to end devices
may be combined with other traffic for forwarding. Applications provide this
networking on behalf of devices and integrators at levels "above" and "below"
Other trusted applications and agents, many residing inside the Propagators,
coordinate the function and control of dumb small, cheap, and copious IOT
devices through Software Defined Networking (SDN) paradigms for the edge.
The end result is a Publish/Subscribe (Pub Sub) network that can be extended
from Big Data servers all the way to the edge of the network while still
maintaining a degree of responsive local autonomy. A variety of standards-
based SDN protocols may be implemented on the distributed applications
agents.
Along with the ability to manage change and disruption, the unique multi-
radio architecture for propagator nodes allows the extension of the network
along many “hops” (node-to-node links) without additional wired connections.
This “string of pearls” capability allows large outdoor Enterprises to be
connected as well as extending services to new remote locations. These
extended propagator node links are simply treated as another element of the
Abstracted Network and may be managed by Enterprise SDN tools and techniques.
Individual OEMS may create a new chirp genre or add private extensions to
existing chirps to allow more end-to-end capabilities and control. It is
expected that a number of industry working groups and SIGs will join together
to refine sub-classifications to suit their needs. Importantly, this data
structure allows a “start fast and accommodate change” evolutionary approach
that will speed deployment of the IOT versus waiting for a conventional
standards process. Nature didn’t.
Chirps marked with a type ID open a truly powerful opportunity within the
IOT. In many cases, an Enterprise IOT network may be “closed”, using the
private markers within the IOT packets to secure the data within. (Chirp data
security is discussed in more detail in “What about security?” below.) But in
many other cases, individuals and organizations will open their chirp data
streams to the public, allowing anyone to make use of the published data.
(This is somewhat analogous to the streaming webcams that are made available
on the Internet today)
Because these chirp streams are tagged with device type, “interested”
integrator functions may “discover” potentially useful chirp streams based on
geographic location, device type, or data patterns. Thus, the architecture is
receiver-based, with integrator functions seeking out and subscribing to data
streams of interest.
While the chirp data structure is very different from traditional networking
protocols, it will be all that is needed for the majority of sensors,
actuators, and devices on the IOT. And type-marked chirp data streams open
tremendous opportunity for leveraging the expected tsunami of data.
One of the hidden security benefits of the chirp architecture is that there
is no end-to-end direct connectivity to end devices – the propagator is
always in the data path. With the potential for sophisticated security
applications within the propagator, end devices are invisible to hackers and
vandals. This approach is far simpler and cheaper than managing encryption
and security at millions (or billions) of end devices – which further need
not be burdened themselves with the processing power and memory needed for
security applications. Small, dumb, cheap, copious – and secure. Security is
obviously a key concern for MeshDynamics Military OEM licensees.
The “Standards conundrum” suffers from the same misleading logic as requiring
unique MAC IDs to address an IOT device. I alluded to this fallacy in my book
where I describe how there are many John Smiths in the world, but the ones I
have in my rolodex are sufficiently distinctive (to me, based on context) to
be "uniquely" addressable. Local Uniqueness is enough. Nature concurs. In
combination with receiver-oriented messaging, it is even exploited in how
prolonged “broadcast” storms of spring disseminate pollen. The winds that
carry the pollen are not “global” and time to live is inherently constrained.
The same sort of broadcast over IP networks would be crippling, but each
propagator effectively and automatically segments its local end devices from
the network and vice-versa.
Figure 11: Applications for low level Device protocol translation services.
From a fault tolerant control system perspective there are two control loops
in operation at all times, see Figure 12 above. One manages seamless
connectivity to mobile end devices (e.g. VOIP phones) by sharing information
across meshed propagator nodes using their own protocols and leveraging a
periodic, time sensitive pub/sub shuttle service.
Big Data subscribers may tune system level behavior with modified triggers,
schedules and failover strategies. These include the ability to drill down,
to an atomic task being performed by the network and provide suggestions and
automated “tuning”.
Using an open source framework engenders OEM interests in using it for device
to cloud end to end management of all resources in the network.
The Scheduler modifies FIFO queues so some packets shift left/right in time,
to accommodate packets that would otherwise be late (Figure 13 above). The
illustration on the left indicates a small increase in expected latency,
which in FIFO accumulates (see Stack). The illustration on the right
alleviates this is real time, based on application delivery stipulations.
Far from being a homogenous computing and networking environment, the next
generation of Enterprise communications will actually require the integration
of an even wider variety of protocols and devices as legacy and IOT
applications are finally incorporated into the Enterprise network.
Conversely, Enterprises will wish to extend their Software Defined Networking
capabilities to encompass these “things” at the edge.
For IOT in particular, the future world of small, dumb, cheap, and copious
sensors, actuators, and devices demands rethinking at both ends of the scale.
At the far reaches of the network, simplified chirps will minimize lifetime
costs for the myriad end points of the Internet of Things.
At the same time, the concept of Abstracted Networks and powerful networking
and applications tools concentrated in propagator node devices will allow
unprecedented control and flexibility in creating huge Enterprise networks of
diverse elements by extending industry-standard SDN tools and techniques.
Fully exploiting the power of the Internet of Things will grow from a total
rethinking of network architectures. MeshDynamics, in collaboration with our
OEM partners, is exploring a machine-centric Abstracted Networks approach to
managing “things”.
Internet of Things
Application-to-Application Networking
Real time Machine to Machine Communications
Low Cost IC Chips for IOT Chirp Devices
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 2
Abstracted Network Emulates Separate Networks
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 3
Manage:
•Latency
•Multicast
•Control Loops
•Protocol Translation
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 4
The Abstracted Network
Internet of Things
Application-to-Application Networking
Real time Machine to Machine Communications
Low Cost IC Chips for IOT Chirp Devices
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 5
Nodes may move, disappear,
change ‐‐ network stays up
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 6
Disruption Tolerance Maintains Operation
Even if network lost completely,
local operations continue
Applications agent maintains
functions
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 7
Publish/Discover/
Subscribe
Enterprise control of
legacy applications
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 8
Abstracted Network Connects Old and New IOT Devices
“Chirp”, legacy
protocols
Integrators
(Big Data)
Devices Propagator Nodes
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 9
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 10
SPAWAR Autonomous Network Example
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 11
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 12
Intel Supporting MeshDynamics Propagator Model
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 13
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 14
(Autonomous) Applications Running on Mesh Node
..
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 15
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 16
(Autonomous) Applications Running on Mesh Node
NMS Displays Machine Status History
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 17
Internet of Things
Application-to-Application Networking
Real time Machine to Machine Communications
Low Cost IC Chips for IOT Chirp Devices
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 18
Objectives of Autonomous Network Test Bed
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 19
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 20
Managing Application Latency (Task Scheduling)
Arrival Stack
Task Stack
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 21
“Shuttles” to/from
different integrator
functions
Chirps
unloaded/
reloaded
Shuttles to/from
different destinations
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 22
Managing Latency at the 802.11 MAC Radio Level
CAP QTDMA
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 23
CAP TDMA
BEACONING PERIOD
MAX : ~9.08 ms (16+16 SLOTS)
Assume
MIN : ~2.26 ms (4+4 SLOTS)
1. we use QTDMA and CSM/RSCM.
@ 55 mbps
2. Queues unloaded/loaded on 10 ms hard real time clock
3. Allocations are made within each Class of Service COS.
4. Within each COS there is a QOS to sort within COS Queue.
Then
Every 20 ms
1.Reconstruct Super Frame to order Sort inside Super Frame
Every 10 ms 2.In side super frame of any size, always 10 ms intervals
3.In example below 40 ms -> 4 10 ms intervals.
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 24
Timed Concatenation State Machine (QTDMA)
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 25
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 26
The Abstracted Network
Internet of Things
Application-to-Application Networking
Real time Machine to Machine Communications
Low Cost IC Chips for IOT Chirp Devices
Shared Resource for Autonomous Network OEM Applications © 2002-2016 MeshDynamics. All Rights Reserved. 27