Internet of Things (2IMN15) 2016-2017

---------------------------------------------------------------------------------

Update (14-02-2017):

-        the exam results are here

-        practical and essay grades are here

-        the essay grades are here.

-        (for completeness) the take-home exercise grades are here

-        (for completeness) the video presentation results are here.

-        students with a score <4 on the first assignment only should contact me; please put 2IMN15 in the subject line

 

 

---------------------------------------------------------------------------------

Update (15-11-2016):

-        added literature for studying (see lecture on 14-11);

-        added the practical assignment description;

-        added papers for creating presentation.

---------------------------------------------------------------------------------------

Update (23-11-2016):

-        minor change in ‘networks’ lecture

-        notice literature with the lectures; ‘mandatory’ is part of exam

---------------------------------------------------------------------------------------

Update (27-11-2016):

-        added new lectures

-        added tutorial reference to the practical

---------------------------------------------------------------------------------------

Update (07-12-2016):

-        added new lecture, on data

---------------------------------------------------------------------------------------

Update (08-12-2016):

-        added presentation slides on practical

---------------------------------------------------------------------------------------

Update (11-12-2016):

-        added new lecture slides

---------------------------------------------------------------------------------------

Update (18-12-2016):

-        added homework 1 results

---------------------------------------------------------------------------------------

Update (19-12-2016):

-        added new lecture slides on 6LoWPAN

-        update op lecture of 12-12 (last few slides)

---------------------------------------------------------------------------------------

 

 

Introduction

Kevin Ashton originally coined the term IoT to express that internet databases would be filled by data obtained from things, as opposed to documents typed in by people. Computer systems would obtain real truth about the world, being able to see, feel and smell it. Since then, IoT is a catchy name for the trend that everyday objects get enriched with embedded electronics, and that these objects communicate using a unified protocol and naming scheme (indeed, the Internet protocols). 

 

IoT includes the field of sensor networks, but differs in that in IoT the network is a platform and not identical to the application. From the sensor network domain, concerns of effective resource management (like size, energy, memory, communication bandwidth), scalability and physical constraints are derived. IoT needs to address systems and application heterogeneity. Quality metrics for IoT include performance (latency, throughput), dependability (quality of service) and scalability, but also in ease of use for all stakeholders. Besides these, IoT challenges lie in the architecture of system and software, in management and sharing of distributed resources and in application development. 

 

While it is fairly easy to sketch advanced IoT applications, it is not straightforward to realize these in a cost-effective manner. Relevant background topics are: distributed systems (architecture and protocols), networked systems, and resource management.

 

IoT systems span the range from tiny embedded devices to big server farms and anything in between. They come with huge concerns regarding abuse of information, security and safety. Recent news reports include security breaches of IoT devices which are difficult to counter due to the embedded nature of the devices.

 

IoT systems typically generate massive amounts of data and are therefore sources for data analytics. Although this is an essential aspects we will concern ourselves only in a limited way with this data processing aspect as it is a separate topic by itself. A similar remark holds for cloud computing.

 

The course is a master level course and aims at providing

 

This is the first time that this course is taught. The topic has a significant hype factor, so expectations are that this course will be in this form for some three years. We expect to learn from you some forthcoming insight in what was a good and what was not a good idea in running this course, so provide us with feedback.

 

A the time of preparation the course attracts over one 100 students. This means we have to use a teaching method and a way of working that scales.

 

Fraud

1.   Fraud is not permitted!

2.      Whenever you hand in something, you implicitly declare that this is your own original work. 

3.      I work on the basis of trust as I think students are responsible adults. If this turns out to be misplaced I hand it off immediately to the examination committee.

4.      You can infer easily what is considered fraud from the scientific code document that you have signed. To be clear, following are examples:

a.      Copying work from your fellow students.

b.      Copying text or figures/ pictures from publications or internet sites or anything you did not write yourself without proper marking as such. Such markings include quotation marks and a reference to the cited material. 

c.      Making your work available to fellow students.

d.      Making your work available to an anonymous crowd by publishing it into a website or repository.

5.      Experience learns that nevertheless such fraud happens. Please think twice as this is really opposite to what science is about.

 

Examination

Grading will be on four points:

 

Minimal scores for each part is 4.0 out of 10 points. Reports, take-home exercises and pactical are done in groups of two. All work is handed in via CANVAS, http://canvas.tue.nl. Register yourself with that system.

 

The written exam

The exam is – of course – “closed book”: you cannot bring any documents or books with you to the exam. It is based on the slides and on the obligatory reading.

 

The type of questions you may expect on the exam target knowledge and insight. A one or two line answer will usually suffice and questions may be multiple choice. Here are a few example questions:

 

1.     (1 pt) Describe in one line the goal of k-means clustering.

2.     (1 pt) Consider the following statements, with a one line explanation:

a.      For scalability, wireless nodes should have similar firmware. (true/false)

b.     For scalability, IoT nodes must be updated via their network. (true/false)

c.      Each individual IoT node must be reachable from any IP device. (true/false)

3.     (2 pt) Consider the following wireless medium sharing techniques.

a.      Master/Slave

b.     CSMA/CA

c.      TDMA

Indicate for these technologies whether they are positive (enable) or negative for the following properties with a one line explanation.

a.      latency

b.     predictability

 

The way multiple choice questions are graded is as follows:

-        More than one option can be possible.

-        The number of correct answers receives the maximum grade of that question. A lower actual score scales the grade accordingly.

-        Correct choices  score +1; incorrect choices score -1. Score is not negative.

Example: question 3 has a maximal grade of 2. There are in total 5 correct answers. 4 correct answers and 1 incorrect answer give a score of 3 and a grade of 3 x 2/5 = 1.2.

 

 

The take-home exercise

 

Exercise 1:              Deployment views of HomeKit and Nest. The results are here.

                                                             

Notice that the grading of this exercises is according to a matrix included in the exercise description.

 

Presentation/movie, and topics

 

Exercise 2:        Detailed instructions are found here
 

The Practical

We provide two options. 

1.      The practial as we designed it entails the design of an IoT application and its implementation. It is specified here.

2.      You may come up with a proposal yourself. This has to be done before December 1 and it is subject to our approval. Mind that you need to hand in a well thought-through proposal.

 

For the practical work you use frameworks for the used protocols. See https://www.win.tue.nl/~lrahman/iot_2016/tutorial/ for tutorials. See here for slides on the practical.

 

The Essay

For students without any background in software engineering and programming we provide an alternative to the practical in the form of a literature study resulting in an essay. Find three possible essay topics here. Please send an email before December 1 when you want to follow this option.

 

 

Lecturers

 

Schedule

See the schedule on OASE/Canvas.

 

DUE DATES - Tentative

This is just a table. Find the description elsewhere in the text.

 

November 19, 9.00h                  Partnership for exercises 

November 28, 9.00h                  First homework

December 12, 9.00h                  Presentation/Movie

December 21, 9.00h                  Movie grading

Week of January 9                     Plugfest tryout

Week of January 16                   Plugfest final

January 18, 9.00h                     Practical report

  

Program & Lectures & slides (on a weekly basis)

There are four hours of lectures per week used for formal lectures and for help/instructions with the practical, In the first few weeks there will be mostly lectures. Students are expected to study the material to a large extent by themselves. The material placed below may change, but from the moment it has been presented it will not, unless explicitly mentioned.

 

If you systematically cannot come in time, please contact the teacher. If you do come late, refrain from entering until the 2nd hour.

 

Topical outline of the program, which is also tentative. The course will grow while it runs.

 

-        Introduction and overview

-        Low power devices and networks

-        Architectural aspects and elements

-     An application

-        Protocols

-        Frameworks

-        Data

-        Security and Privacy

 

=======================Lectures========================

 

Find here a series of definitions

 

November 14: Lecture

-        Introduction

-        The Things

 Reading:

-        Mandatory: IoT: a survey

-        References in slides

-        The book, chapters 1+2

 

Actions for students:

-     Examine the site and plan your work; don’t delay

-     Register with Canvas.

-       Form partnership of pairs (no, you cannot work alone; no, you cannot work with 3) and choose a subject to make a movie on.

-       Decide on whether you can do the practical or want to do an essay. In the second case, argue why you cannot do the practical.

-       Enter this partnership and your choice on the practical into Canvas. One .txt file with:

o   Name, Student # (twice)

o   Practical / Essay (plus arguments if you want to do the essay)

 

November 17: Lecture

-        Architecture alternatives 

Reading:

-        The book, chapters 5.1-5.3, 6

-        The book, chapters 7+8

 

November 21: Lecture

-        Summary

-        Life Cycles

-        IoT Networks [update on 23-11-2016]

 

 

November 24: Lecture

-        Last bits of November 21

-        A larger example: Intelligent Transportation Systems. This is a large set but contains five smaller parts. The last part on security is not presented.

 

Reading:

-        Model, Analysis, and Improvements for Inter-Vehicle Communication Using One-Hop Periodic Broadcasting Based on the 802.11p Protocol, T.Batsuuri, R.J.Bril, J.J.Lukkien

-        Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Applications, NHTSA, August 2014

-        Rate-Adaptation Based Congestion Control for Vehicle Safety Communications, PhD thesis Tessa Tielert

 

 

November 28: Lecture

-        Architectural styles for IoT

-        CoAP

 

Reading:

-       Mandatory; RfC7252 describing CoAP. The mandatory reading is in conjunction with the slides, viz., only those parts that are discussed in the slides. This RFC gives rationales for the choices.

 

December 1: Lecture

-        LightWeightM2M

-        Frameworks

 

Reading, for reference with the slides:

-        OMA: Requirements document for LWM2M (local document, do not distribute)

-        OMA: Architecture document for LWM2M (local document, do not distribute)

-        OMA: Technical spec of LWM2M (local document, do not distribute)

-        IPSO: definition of smart objects (local document, do not distribute)

-        Chapter 2 of: 6LoWPAN –The Wireless Embedded Internet, Zach Shelby, Carsten Bormann, 2011

    

December 5:      

-        Data analytics in IoT (by dr. Holenderski)   

 

December 8: Lecture 

-        Leshan

-        An introduction into the practical

 

December 12: Lecture 

-        Service Discovery (UPDATED 19-12-2016)

 

Reading and references

-        RFC 5785: definition of host local directory

-        RFC 5988: web linking

-        RFC 6690: CoRE link format

-        RFC 6762: mDNS

-        RFC 6763: DSN-SD

-        https://en.wikipedia.org/wiki/Zero-configuration_networkingoverview of discovery protocols

-        draft-ietf-core-resource-directory: CoAP resource directory

 

December 15: Q&A about the practical

 

December 19: Lecture 

-        6LoWPAN

 

December 22: No lecture

 

BREAK

 

Slots in January can be used to obtain help or advice with the work.

 

January 9: (last) Lecture on IoT Security by prof. Etalle and prof. Michiels

 

January 12: Plugfest trial

 

January 16: Q&A

 

January 19: Plugfest

 

Exams and grades:

·        the exam of January 20, 2016 and its solutions

·        the exam of January 24, 2017 and solutions

Literature                                  

 

Following books are useful, but none of them is mandatory:

 

·        Book: Internet of Things: A Hands-On Approach, August 2014, Arshdeep Bahga and Vijay Madisetti

·        Fairly broad coverage including some details.

·        eBook (reference): Internet of Things - From Research and Innovation to Market Deployment, ed. Ovidiu Vermesa, Peter Friess

·        Main introduction followed by several chapters discussing aspects.

·        Book (reference) The Internet of Things: Key Applications and Protocols, 2012, Olivier Hersent and David Boswarthick

·        In-depth discussion of protocols, mostly not in the IP domain (but possibly under it).

·        eBook (reference) 6LoWPAN –The Wireless Embedded Internet, Zach Shelby, Carsten Bormann, 2011

·        discusses the internet protocol suite on IEEE 802.15.4

Produkt-Informationimage004Produkt-Informationimage008   Produkt-Information