Abstract
The success of the Internet is attributed, in part, to the Internet Protocol stack that offers two key characteristics: A normalization layer (the IP layer), which guarantees system interoperability while accommodating a multitude of link layer technologies, in addition to a plethora of application protocols. IP constitutes the thin waist of the proverbial hourglass that is the Internet’s protocol stack. Layered abstractions that hide the specifics of a given layer from the one above or below it. Such abstractions define contracts or “slip surfaces” allowing innovations in one layer to proceed independent of the adjacent layersIn this chapter, we will discuss the key IoT requirements and their impact on each of the layers of the protocol stack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Next century challenges: Scalable coordination in sensor networks, in MobiCom ‘99: Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, (ACM, New York, 1999), pp. 263–270
Bormann, et al., “Terminology for Constrained-Node Networks”. Internet Engineering Task Force RFC 7228. May 2014
V. Cantoni, L. Lombardi, P. Lombardi, Challenges for data Mining in Distributed Sensor Networks, in 18th International Conference on Pattern Recognition (ICPR'06), (2006), pp. 1000–1007
J. Bradley, J. Barbier, D. Handler, Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion, Cisco Whitepaper, (2013)
The Zettabyte Era: Trends and Analysis, Cisco Whitepaper, (June 2016)
D. Evans , The Internet of Things – How the Next Evolution of the Internet is Changing Everything, Cisco Whitepaper, (April 2011)
“Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2014–2019”, Cisco Whitepaper, February 2015
http://www.ieee802.org/802_tutorials/2012-11/8021-tutorial-final-v4.pdf, IEEE 802.1 Tutorial on Deterministic Ethernet, November 2012
N. Finn, P. Thubert, “Deterministic Networking Problem Statement”, draft-finn-detnet-problem-statement-01, work in progress, (October 2014)
W. Steiner, N. Finn, Deterministic Ethernet: Standardization in Progress and Beyond, RATE Workshop, (December 2013)
P. Barnaghi et al., Semantics for the internet of things: Early progress and back to the future. Int. J. Semant. Web. Inf. Syst 8(1) (2012)
Securing the Internet of Things: A Proposed Framework, Cisco Whitepaper
Author information
Authors and Affiliations
Problems and Exercises
Problems and Exercises
-
1.
What are “constrained” devices? Name their classes and characteristics.
-
2.
What makes a network “deterministic”?
-
3.
In what three areas does the massive scalability of IoT impact networking protocols?
-
4.
What is the importance of standard APIs in the success of IoT?
-
5.
Why is scalability a major requirement for IoT protocols?
-
6.
What is an ontology? Why are ontologies applicable in the IoT?
-
7.
Name three key IoT requirements that have impact on networking protocols.
-
8.
What characteristics of the IP stack contributed to the success of the Internet?
-
9.
Was the choice of the Internet as the underlying network for IoT always a given or agreed upon fact?
-
10.
Name the various options by which IoT devices can be supplied with power.
-
11.
Describe the characteristics of Class 0-constrained devices.
-
12.
What is “semantic interoperability”? Why is it important in IoT?
-
13.
How does scalability impact the network control plane? Explain the various dimensions impacted.
-
14.
How much of the IPv4 address space is still available for allocation?
-
15.
What common IoT functions can be abstracted through APIs in order to simplify application development and improve the time to market new IoT applications and services?
-
16.
What types of applications can be migrated to IP technologies with the advent of Deterministic Networking?
-
17.
Which is more expensive in terms of power consumption: Communication or local processing? What does this imply to IoT devices?
-
18.
How does the addition of billions of devices to the internet affect the wireless spectrum?
-
19.
How does the complexity of developing, deploying, and managing IoT applications today affect the state of the industry?
-
20.
What makes existing credentials management techniques inadequate for IoT?
-
21.
What are two shortcomings of the state-of-the-art security protocols (for authentication/authorization/encryption) when applied to the IoT?
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Rayes, A., Salam, S. (2019). IoT Requirements for Networking Protocols. In: Internet of Things From Hype to Reality. Springer, Cham. https://doi.org/10.1007/978-3-319-99516-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-99516-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99515-1
Online ISBN: 978-3-319-99516-8
eBook Packages: EngineeringEngineering (R0)