Mesh routing is difficult, mesh routing for low power and lossy networks is straight up comatose. This session will help understand how the signalling/messaging works and depict sample packet captures for RPL signalling from real environments. It will also introduce tools apart from wireshark, such as scapy that can help construct/deconstruct the messaging. Obtaining performance data for mesh networks is another aspect covered in the session. What makes taking performance difficult? What are the best practices and some of the case studies? The session will also provide a demo into creating a sample 10 node RPL network on a laptop and getting the packet capture for the network formation.
Rahul Jadhav is an avid coder, and a system engineer working on solutions involving network and transport optimization. I have contributed towards more than a dozen open sources including Linux Kernel and worked closely with IETF Standards Working Groups (such as ROLL, 6lo, LWIG) and Linux Foundation Groups. Taken several projects from conception to market. Architected metering infrastructure based on 802.15.4G + PLC/6lo/RPL for Smart Grids and has a special interest in scalable mesh network architectures for low-power networks and has contributed towards IETF protocol standardization in the domain. Currently, I am part of the Accuknox team figuring out the best way to handle Zero-Trust based Security solutions involving Cloud/Edge/IoT.
IPv6 ND was designed for P2P and transit subnetworks with cheap and reliable broadcast capabilities. This session will explain how this is unfit with IoT wireless operation, and explain the operation of SFAAC (stateful address autoconfiguration) that was introduced with 6LoWPAN ND.
The talk will discuss how SFAAC interacts with RPL and proxy ND to build scalable multi-link subnetworks, where the L3 concepts of Link and Subnet are not necessarily congruent with the layer 2 broadcast domain.
Pascal’s Bio:
Pascal Thubert has been actively involved in research, development, and standards efforts on Internet mobility and wireless technologies since joining Cisco in 2000; he currently works at Cisco’s Chief Technology Office. Standards-wise, Pascal mostly contributes to the ETSI and the IETF. At the IETF, he co-chairs two IoT-related Working Groups and contributes to several others in the Internet and routing areas, where he authored 20+ RFCs the general context of IPv6, wireless, and the Internet of Things; he also contributed to the creation of DetNet and RAW and participates to the IEEE/IETF coordination, the INT Area and the IoT directorates. Pascal holds an Engineering Degree from the Ecole Centrale de Lyon and a Ph.D. from IMT Atlantique, and above 300 patents.
RPL, the IETF standard for routing in low power lossy networks, was designed to meet unusual constraints in terms of scale (high), device capabilities (limited), and link reliability and capacity (very low). To meet those constraints, RFC 6550 introduced a number of innovations with the use of anisotropic routing, stretched P2P path, autonomic properties, objective functions, multi-topology routing, and a distance-vector operation that is proactive in setup but reactive in maintenance. RPL is now being extended at one extreme with a fully ADHOC mode called AODV RPL, and a centrally controlled mode called Route Projection. This session will browse through the main features of RFC 6550 and the route projection work.
Pascal’s Bio:
The presenter, Pascal Thubert from Cisco, is a co-editor of RFC 8655 (the DetNet architecture), RFC 9030 (the 6TiSCH architecture), and the WIP draft RAW architecture, and well as the RPL routing protocol (RFC 6550), the 6LoWPAN Header Compression (RFC 6282) and Neighbor Discovery (RFC 8505 / 8928 / 8929) protocols.
In this IPv6 and 6LoWPAN Webinar, a detailed overview of the 6LoWPAN Adaptation layer will be given. Indeed, this webinar is dedicated on how 6LoWPAN enables to use of IPv6 over IEEE Std 802.15.4 networks. During this webinar, the following three objectives will be covered:
- First, the principles of IPv6 Header Format overview will be given, then the constraints that IPv6 presents over IEEE Std 802.15.4 technology are explored, and finally, an overview on 6LoWPAN Adaptation layer is introduced.
- The second objective is dedicated on 6LoWPAN header compression (i.e., RFC 6282) and IPv6 packet fragmentation mechanisms (i.e., RFC 4944) that allow the transmission of IPv6 packets over IEEE Std 802.15.4 radio links.
- The third and the last objective of this webinar is dedicated on standardized fragment forwarding approaches. This objective is split in two parts. In the first part, the two Frame Delivery modes (i.e., Mesh-Under and Route-Over) are described, while in the second part, an alternate approach called 6LoWPAN Fragment Forwarding (6LFF) is introduced, whereby an intermediate node forwards a fragment without reassembling the complete IPv6 datagram first (i.e., RFC 8930). Moreover, a 6LoWPAN Selective Fragment Recovery mechanism will be presented (i.e.,RFC 8931).
Georgios’s Bio:
Georgios Z. Papadopoulos (MIEEE) serves as an Associate Professor at the IMT Atlantique in Rennes, France. Previously, he was a Postdoctoral Researcher at the University of Bristol. He received his Ph.D. from University of Strasbourg, in 2015 with honors, his M.Sc. in Telematics Engineering from University Carlos III of Madrid in 2012 and his B.Sc. in Informatics from Alexander T.E.I. of Thessaloniki in 2011. Dr. Papadopoulos has participated in numerous international and national research projects on diverse networking verticals. He has received the prestigious French national ANR JCJC 2017 grant for young researchers. He has been involved in the organization and program committee of many international events, such as IEEE ISCC’20, IEEE DIPI’19, AdHoc-Now’18, IEEE CSCN’18, GIIS’18, IEEE ISCC’17. Moreover, he has been serving as Associate Editor for Wireless Networks journal and Internet Technology Letters since 2018. He is author of more than 60 peer-reviewed publications in the area of computer communications, networks and cybersecurity. He actively participates at the IETF standards organization with multiple drafts in the ROLL and RAW Working Groups. His research interests include Industrial IoT, 6TiSCH, 6lo, LoRa & LPWAN, Wireless Battery Management System, Smart Grid, Cybersecurity and Moving Target Defense. Dr. Papadopoulos has received the Best Ph.D. Thesis Award granted by the University of Strasbourg and he was a recipient of two Best Paper Awards (IFIP Med-Hoc-Net’14 and IEEE SENSORS’14).
Despite the general benefits experienced with converging data, mail, voice, and video over IP, a number of domains in Operational Technology (OT) including Industrial IoT, vehicular automation, professional audio, and so on, still rely on semi-proprietary technologies for their the network operations. This is because machine-to-machine communications require deterministic properties such as guaranteed worst case latency and jitter and high reliability that traditional IP, which is based on statistical multiplexing and reactive congestion management, cannot offer.
In recent years, new work at IEEE 802.1 TSN and at the IETF with 6TiSCH, DetNet, and RAW, propose an evolution to IP networks that enable those deterministic properties for well characterized flows, over initially wired and then wireless networks. This session will introduce the concept of deterministic networking and how it applies to IoT, keeping in mind that machines are not necessarily small and constrained, and that automation applies to large things such as trains and nuclear plants. The architectures behind DetNet, 6TiSCH, and RAW, how they relate and specifically how they can leverage IPv6, will be browsed at a high level.
Pascal’s Bio:
The presenter, Pascal Thubert from Cisco, is a co-editor of RFC 8655 (the DetNet architecture), RFC 9030 (the 6TiSCH architecture), and the WIP draft RAW architecture, and well as the RPL routing protocol (RFC 6550), the 6LoWPAN Header Compression (RFC 6282) and Neighbor Discovery (RFC 8505 / 8928 / 8929) protocols.
Microcontrollers have enabled adding processing and communication to many physical objects, but the result is not a simple copy of a general-purpose computing environment. Bringing these objects into the Internet requires attention to their specific constraints. Since 2005, the Internet Engineering Task Force (IETF) has been shaping Internet protocols towards the special requirements of such constrained devices, addressing a full stack from adaptation layers to the application layer, including security protocols. Looking at 17 years of standardization, what have we achieved, and what still needs to be completed to arrive at a true Internet of Things?
Carsten Bormann likes bringing the Internet to odd places. Honorary professor for Internet Technology at the Universität Bremen, he is a member of its Center for Computing and Communications Technology (TZI). His research interests are in protocol design and system architectures for networking. In the IETF, he mainly has been working on bringing Internet Technology to new links, applications, or radios. Since 2005, he has co-chaired, initiated, or co-authored many of the IETF efforts that now make up its Internet of Things (IoT) stack: he initiated the IETF work on Constrained RESTful Environments (CoRE) and the CoAP (Constrained Application) Protocol and co-chaired the IETF CoRE WG for its first ten years. Most recently, he launched the Thing-to-Thing Research Group (T2TRG) in the Internet Research Task Force (IRTF). He has authored and co-authored 48 Internet RFCs, which have 439 citations in other Internet RFCs.
Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The fourth day will include the following presentations:
- IoT Landscape by Carsten Bormann
- IoT MOOC Kickoff by Pascal Thubert & Georgios Z. Papadopoulos
- Panel Discussion on IoT deployments with Carsten Bormann, Pascal Thubert, Georgios Z. Papadopoulos, Rahul Jadhav, Ravi Shiroor, Sundar Ramakrishna, Shwetha Bhandari (Moderator)
This webinar will be taught by Michael Richardson and Dr. Anna Maria Mandalari.
Between the number and type of IoT devices that may be used by enterprises, in short order, there will not be enough people on the earth to administer them. New means of scale are required. Do old assumptions hold? Standards such as Manufacturer Usage Descriptions and CoAP are emerging.
Anna Maria’s talk:
The emerging complicated Internet of Things (IoT) ecosystem will not only rely on collection and processing of personal data, but also performs actuations in the real world and thus, have physical consequences. The potential harms to individuals and society are significantly more serious than privacy alone. This greatly increases the challenge in delivering public safety, acceptability and trust as identified in the large number of government and independent reviews and research findings.
We have been developing the opensource Databox Platform. Beyond its research impact, Databox is currently turning into a popular opensource platform for privacy-preserving data analysis. In this talk, I will explore what we are invisible trading in exchange for these devices, and discuss potential future mitigation through Databox.
Biography:
Dr. Anna Maria Mandalari works as research associate in the Dyson School of Design Engineering at the Faculty of Engineering at Imperial College London. She was a Marie Curie Early Stage Researcher affiliated with the University Carlos III of Madrid, within the European project ITN METRICS. During her PhD she was research visitor at Telefonica I+D (Spain) and Simula Research Laboratory (Norway). Her research interests are related to IoT, privacy, large-scale Internet measurements, Internet measurement platforms, middleboxes and new Internet protocols.
Michael Richardson’s talk:
A critical part of managing privacy and authorization in enterprise networks involves managing identity. There is a rich field of identity management offerings from big and small. There are multiple identity management conferences one can attend (now going virtual). There are no dominant identity management mechanisms, and no dominant onboarding systems for IoT devices.
What kinds of devices should enterprises expect to deal with?
What should enterprises look for in feature sets of devices that they expect to acquire?
This is a interactive discussion dealing with the question of how enterprises can navigate managing identities for IoT, BYOD, and remote workers.
Biography:
Michael Richardson is an open source and open standards consultant. An autodidact, he wrote mail transfer agents as a teenager, and in the 1990s, found his calling designing and building embedded networking products, in the security sector. Michael has built multiple IPsec systems, joining the FreeS/WAN team in 2001, and founding Xelerance in 2003. Since 2008 Michael has worked in and chaired the IETF ROLL working group, doing routing protocols for IoT mesh systems. Michael has authored a number of IoT related RFCs including RFC8366 and RFC7416. Michael currently works on IoT security systems in the 6tisch, ANIMA and ACE WG, specializing in the problem of initial bootstrap trust.