evaluating the functionality of an industrial internet of things...
TRANSCRIPT
![Page 1: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/1.jpg)
MÄLARDALEN UNIVERSITY
SCHOOL OF INNOVATION, DESIGN AND ENGINEERING
VÄSTERÅS, SWEDEN
THESIS FOR THE DEGREE OF BACHELOR OF SCIENCE IN ENGINEERING –
COMPUTER NETWORK ENGINEERING 15.0 CREDITS
EVALUATING THE FUNCTIONALITY OF AN
INDUSTRIAL INTERNET OF THINGS SYSTEM
IN THE FOG
Examiner: Moris Behnam Mälardalen University, Västerås, Sweden
Supervisor: Hossein Fotouhi Mälardalen University, Västerås, Sweden
2018-05-16
![Page 2: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/2.jpg)
2
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Abstract The Internet is one of the greatest innovations ever created by mankind, and it is a technical
trend that has moved into industries to facilitate automation, supervision and management in
the form of IoT devices. These devices are designed to be extremely lightweight and operate
in low-power and lossy networks, and therefore run a low duty cycle and CPU-clock
frequency to reserve battery life. Fog nodes are located on site to minimize network delay and
provide centralized processing to handle data from hundreds of connected devices in wireless
sensor networks. This is the future of industrial automation. Our goal is to show the
functionality of an industrial IoT network within the scope of Fog computing by
implementing a closed-loop control system in Cooja. Performance evaluations considered
network reliability in terms of packet delivery ratio and timeliness. We assume that wireless
IoT devices are running RPL routing (one of the most common standard routing protocols for
IoT applications). We implement a mobility controller at the Fog-server in order to collect
measurements made by the Fog nodes and send commands to IoT devices. In this thesis work,
we assume that the commands are related to the mobility pattern of mobile node (e.g. AGVs
in industrial automation) in order to avoid collision. From the simulation results we can
conclude that sampling rates and node density have a greater impact on performance
compared to payload size. We cannot be sure that our results reflect what a real-world
evaluation would imply as we are running an emulation software, even though it has a very
realistic physical layer. We do however believe that with substantial testing and
improvements to both Cooja and our implementation, an accurate representation can be
accomplished and algorithms in Cooja can be moved to real-world implementations.
![Page 3: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/3.jpg)
3
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Table of Contents
1. Introduction ...................................................................................................................... 5
2. Background ....................................................................................................................... 6
2.1. Internet of Things.................................................................................................................................................. 6 2.1.1. Industrial Internet of Things ........................................................................................................ 6
2.2. Real-time Operating System ............................................................................................................................ 6 2.2.1. Embedded systems ........................................................................................................................... 7
2.3. Contiki-OS ................................................................................................................................................................. 7 2.3.1. Cooja ....................................................................................................................................................... 7
2.4. Closed-loop control system ............................................................................................................................... 7 2.5. Cloud Computing ................................................................................................................................................... 8
2.5.1. Fog Computing .................................................................................................................................... 9 2.6. Transmission Control Protocol and User Datagram Protocol .......................................................10 2.7. Comparison of Contiki netstack and OSI-Model ...................................................................................10 2.8. Constrained Application Protocol ...............................................................................................................11 2.9. Directed Acyclic Graph .....................................................................................................................................11 2.10. Destination Oriented Directed Acyclic Graph ........................................................................................11 2.11. Routing Protocol for Low-Power and Lossy Networks ......................................................................12
2.11.1. Objective Function .......................................................................................................................... 13 2.11.2. DODAG Goal ....................................................................................................................................... 14 2.11.3. Use case for RPL ............................................................................................................................... 14
2.12. IEEE 802.15.4 - Low-Rate Wireless Personal Area Networks ........................................................14 2.13. 6LoWPAN ................................................................................................................................................................15
3. Problem Formulation ..................................................................................................... 16
4. Method ............................................................................................................................. 17
5. Cooja implementation .................................................................................................... 18
5.1. Simulation scrip editor .....................................................................................................................................18 5.2. RPL node ..................................................................................................................................................................19 5.3. RPL root ...................................................................................................................................................................19 5.4. Application example ..........................................................................................................................................20 5.5. Simulation scenarios .........................................................................................................................................20 5.6. Hardware and software used in Cooja implementation ...................................................................23
6. Result ............................................................................................................................... 24
6.1. Scenario 1 ...............................................................................................................................................................24 6.2. Scenario 2 ...............................................................................................................................................................28 6.3. Scenario 3 ...............................................................................................................................................................32 6.4. Scenario 4 ...............................................................................................................................................................36 6.5. Scenario 5 ...............................................................................................................................................................40 6.6. Collisions..................................................................................................................................................................44 6.7. Summary of the results .....................................................................................................................................45
![Page 4: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/4.jpg)
4
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
7. Discussion ........................................................................................................................ 46
8. Conclusion ....................................................................................................................... 49
9. Future Work ................................................................................................................... 50
10. References ....................................................................................................................... 51
![Page 5: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/5.jpg)
5
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
1. Introduction
The Internet is one of the greatest innovations ever created by mankind [1]. It has become an
integral part of everyday life, especially with the advance of Internet of Things (IoT)
applications and Cloud computing platforms. Although, what is considered to be the first IoT
device, a toaster, was constructed back in the 1990s [2], it was not until recently that a major
increase in smart home connected devices and wearable technologies utilizing Cloud
computing started to develop [3]. This technical trend has begun to move into industries and
that is what this thesis will focus on; the development and use of Internet of Things
applications in Industrial environments such as factories in the Fog. Specifically, on Wireless
sensor nodes (e.g. TmoteSky) used in the Cooja emulation software found in Contiki-OS [4].
This work is intended for readers with a basic to intermediate understanding of traditional
networking. Some networking concepts will be used without explanation of what it is or how
it works, terminology and technologies that are more relevant to the subject of Industrial IoT,
Fog computing and this Thesis will however be covered in more detail.
Previous works within the field of IoT, Wireless Sensor Networks (WSNs) and Cloud will
form the basis of this thesis. A work on Big Data Delivery [5] investigates new
communication protocols that can handle the immense amount of data created by IoT devices
used in healthcare systems. Their aim is for a faster, safer and more energy efficient algorithm
to be used in healthcare systems and hospital buildings to transmit and manage big data. They
use the emulation software Cooja to simulate a working environment and collect large
amounts of data that will be used to test their algorithm. Another work on IP based protocol
stack for WSNs [6] evaluates the performance of CoAP and 6LoWPAN over the IEEE
802.15.4 wireless link using the Cooja emulation software. Their focus lies in throughput,
end-to-end delay and packet loss when using protocols in Cooja simulations. Thirdly a work
on Fog- and Cloud-based Control loops [7] that examine the possibilities of introducing these
kinds of control systems into industrial environments. [8] analyzes the end-to-end delay for
single-hop and multi-hop configurations of TelosB motes and [9] studies RPL in different
mobility models for IoT devices. [10] compared the performance between MAC protocols in
Contiki while using packet delivery ratio and delay as metrics.
This thesis will expand on the above-mentioned works in a couple of ways. First and
foremost, our work will be based around implementing a Closed-loop control system between
a Fog-server and IoT devices. Secondly, performance evaluations will be made where packet
delivery ratio, and timeliness in terms of packet delay will be conducted for the Fog-based
network implementation. We envision a system with a Fog-server which is located close to
IoT network, that can provide responsive feedback to connected IoT devices. This requires a
literature review in the areas of Cloud computing, Fog computing, Industrial IoT, IEEE
802.15.4, Contiki-OS, and closed-loop control systems. An emulation environment will be set
up within Contiki using Cooja in conjunction with the IEEE 802.15.4 wireless protocol such
as 6LoWPAN, RPL and CoAP. The idea is to employ some of these IPv6-enabled IoT
standard protocols for emulation in Contiki.
![Page 6: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/6.jpg)
6
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
2. Background
This Thesis work aims at solving potential problems regarding future development of
Industrial Internet of Things (IIoT) devices regarding Future Factories in the Cloud. The
following section will describe relevant concepts and technologies to make this work coherent
to all.
2.1. Internet of Things
Internet of Things or IoT for short, is usually defined to be anything with a built-in computer
that does not look like a traditional computer. But a more precise definition requires the
device to (i) be capable of connecting to the Internet, (ii) have built-in sensors and or
actuators that can be monitored or controlled, (iii) a unique identifier to make it
distinguishable from other devices, (iv) underlying software to handle and process any in or
outgoing information [11, p. 2]. This is a fairly new concept, with more and more connected
devices making their way into our everyday lives. Some of these are smart TVs, intelligent
refrigerators, remote controlled lamps and self-regulating air conditioning systems. This has
become an integral part in an enormous number of peoples lives, yet they may not even be
aware of it. For example, if you use your phone to start the heater in your car, it can connect
over the Internet to your car in order to accomplish this task. Since the car is connected to the
Internet, the car, or at least part of it can be considered an IoT device. This applies to basically
everything that can be controlled or monitored through a phone or computer.
“IoT is the network of things, with clear element identification, embedded with software
intelligence, sensors, and ubiquitous connectivity to the Internet.” [11, p. 2]
2.1.1. Industrial Internet of Things
Industrial Internet of Things are IoT devices used within industrial environments. Compared
to regular IoT devices that, in many cases are designed for home or personal use, IIoT devices
are designed to operate in factories and production lines. IIoT devices use sensors and
actuator to monitor and manage parts of the factory and collected data that can be analyzed to
make incremental improvements to the assembly lines. These devices need to be cost-
efficient, durable and have a long battery life since there can be hundreds or even thousands
of them in a large factory. Many of them will be difficult to access when deployed, so
replacing them or needing to change the battery is not always an option. Every IIoT device
can be separately configurated to perform a specific task, and devices can also be grouped to
work together as a larger unit. By introducing IoT to the industry, the opportunity has been
given to streamline the production with both economic and environmental aspects in mind.
2.2. Real-time Operating System
A Real-Time Operating System (RTOS) is designed to handle time-sensitive data and deliver
high predictability. Applications running on this kind of operating system requires data to be
processed within pre-defined time-intervals, otherwise the system will fail. Being able to
reliably ensure applications that resources will be available at a specific time, and that
processing will be complete within a specified time-interval is what separates Real-Time
Operating Systems to general purpose operating systems. A programmer has the ability to
prioritize operations to comply with a systems inherent requirement, these qualities make
RTOS suitable for use in embedded systems [12]. General purpose operating system can run
![Page 7: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/7.jpg)
7
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
on a multitude of applications all at once. They cannot however guarantee availability and
system resources in the same way as a Real-time Operating System. General purpose
operating systems are designed for varied, commercial use, not specified time critical
operations.
2.2.1. Embedded systems
RTOS can be used in conjunction with embedded systems to meet time-critical requirements.
Embedded systems are designed to perform a specific function of a larger system, where this
function can for instance be to monitor the temperature of a machine, device or location in
industrial environments. These systems generally require a controller to make decisions, to
decide whether the temperature is to be raised or lowered. Embedded systems are in many
situations resource restricted with limited amounts of memory and CPU power. These
embedded systems are often needed in places that are hard to access and therefore are usually
wireless. It can also mean that there is no possibility of connecting these to an external power
source, it is therefor essential that they are energy efficient because the devices will be
powered by battery [13, p. 13]. There are numerous RTOS, a well-known is Contiki-OS, this
is a lightweight operating system that focuses on IoT devices within low-powered and lossy
networks (LLN).
2.3. Contiki-OS
Contiki-OS is an open source, Real-time operating system which supports a multitude of
different functions, features and applications. This makes it versatile as a mean of connecting
IoT devices within WSNs. One of these applications is Cooja, a simulation program used to
emulate a wide range of motes such as TmoteSky and Z1 in a WSN [4].
2.3.1. Cooja
Cooja can be run on Contiki-OS to emulate and debug mote configuration before being
applied to physical motes. This is a valuable tool which aids with visualizing how a certain
configuration will act. The advantage of Cooja is that the same code running on simulatated
nodes can be directly implemented on real hardware. This makes it a powerful tool for
developing and debugging. Contiki-OS also makes it possible to access individual nodes
through web browsers due to the implemented protocol stack.
The integrated Graphical User Interface (GUI) is created in Java and interacts with Contiki-
OS on a level which grants the ability of managing some aspects of nodes functions. It is
possible to create modules that automatically preforms GUI actions on set timers or when
prompt to. It is also possible for the nodes to communicate with the Java interface through the
Simulation Script Editor, this is done via the serial line interface. The nodes can reach the
serial line interface via terminal output with either printf of putchar, this output can be up to
128 bytes and is read until a new-line symbol [14].
2.4. Closed-loop control system
A closed-loop control system is made up of three main parts, sensor, controller and actuator.
The sensor is used to monitor, detect or measure some form of analogue data, this can be
light, temperature, movement, vibrations etc. and relay the information onwards. The
controller is the brain of the control system, it takes the sensor data and preforms logical
![Page 8: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/8.jpg)
8
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
operations which generates an output dependent on the configuration. This output is sent to
the actuator and the actuator uses the output as instructions which it then executes. A good
example of this is how a thermostat works. First a predetermined or desired temperature is set
on the thermostat, one or more sensors measure the current temperature and the control unit
determines if the heater should increase or decrease the temperature [15]. A diagram depicting
a closed-loop control system is showed below in Figure 1.
Figure 1 - Diagram of a closed-loop control system
2.5. Cloud Computing
The Cloud can be defined as any large amount of powerful hardware gathered in a remote
location and is accessible over the Internet. A Cloud can comprise of any type of
computational hardware, e.g. switches, routers and storage units, as well as software. Cloud
computing enables devices with limited computational power to process data more efficiently
by sending it to the Cloud and receive the answer instead of performing the calculations itself.
This is a trade-off, very similar to how compression algorithms balance the need for storage
and compute power. A choice can be made to either store larger files or spend time processing
to compress and decompress files before and after use. The smart thing to do is to use
whichever resource you have more of. In the case of devices with lacking computational
power, it may be more efficient to send data to the Cloud instead of processing it locally.
One of the most important features of Cloud computing services is that it is heterogeneous
and can support full compability with all kinds of different platforms [11]. Both individuals
and a wide range of corporations make use Cloud computing services, and for several
different reasons. Cloud storage is a common service for personal use, and there is a wide
range of platforms that enables off site secure storage. Companies can with the use of the
Cloud, customize their infrastructure based on current needs. For instance, if the required
computing power for a certain application changes during the year, they can alter this in the
Cloud instead of having hardware sitting doing nothing. This give companies the flexibility to
change. Company growth may scale better due to the possibility of incremental change, and it
can be more cost effective compared to buying hardware that cannot be fully utilized.
![Page 9: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/9.jpg)
9
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Cloud computing has brought many benefits to the field of IoT, but as with any other
technology, there are problems which cannot be handled properly. For closed-loop control
systems, a Cloud controller solution may be to slow when it comes to decision making for an
actuator, this is due to the physical distance between the Cloud and actuator, light can only
travel so fast. There is a need for something that can deliver rapid response where the Cloud
fails. The solution is Fog computing.
2.5.1. Fog Computing
Fog computing is a way to bring the Cloud closer to the source. Structurally, there is no major
difference between a Fog and Cloud, with two exceptions. (i) the available compute power of
the Fog is far less compared to a Cloud but is still vastly more powerful compared to IoT and
embedded devices. (ii) the Fog is supposed to be located within the local network at the edge
where is will be used, this will enable much faster response times and enables the option to
act as a control unit in a closed-loop control system [16].
The Fog can also be used to preform part of other devices calculations, and pass on data for
heavier calculations to the Cloud server [11, p. 139]. Fog computing is not meant to replace
Cloud computing, it is an extension to complement what the Cloud is lacking. Fog computing
is better suited for real-time analysis of streaming data as opposed to batch processing which
is a better fit for Cloud solutions. With a Fog-server at the edge of the network it is also
possible to get a layer of security when the data is sent to the Cloud over the internet, if the
wireless sensor, controllers or actuator are to computationally weak to encrypt the data by
them self. Figure 2 displays the different strengths between a Fog and Cloud [11, p. 143].
Requirement Cloud computing Fog computing
Latency and jitter High/medium Low
Low Location of
service
Within Internet Network edge Distance
Distance between data
sources/consumers
Multiple hops Single hop
Location awareness No Yes
Geo-distribution Centralized (data center) Distributed
Number of nodes Large Large
Support for mobility No Yes
Data analytics Data at rest Data in motion
Connectivity Wireline Wireless
Table 1 - Comparison between Cloud and Fog
![Page 10: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/10.jpg)
10
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
2.6. Transmission Control Protocol and User Datagram Protocol
The two most common transport is Transmission Control Protocol (TCP) and User Datagram
Protocol (UDP). What separates these protocols is that TCP is connection-oriented, meaning
it keeps track of data streams and can detect packet-loss, while UDP is connectionless and
lacks these control functions. What this means it that TCP has the capability of retransmitting
packets that were dropped during a data transfer, while UDP cannot. Due to the structure of
TCP being connection-oriented leads to more overhead compared to UDP thus making it
considered a slower protocol than UDP [17].
IoT devices, embedded systems and LLNs therefor usually opt to use UDP because of the
overhead TCP adds. To add reliability and compensate what UDP lacks, control functions and
error handling is usually implemented on controllers or actuators. This allows UDP to be used
by gaining some of the advantages of TCP while still keeping a lower overhead. Contiki-OS
has adapted TCP and UDP into its own protocol stack to increase performance and
compatibility with constraint devices.
2.7. Comparison of Contiki netstack and OSI-Model
Contiki-OS uses a specific protocol stack designed for WSN compared to the commonly used
OSI-model [18]. This protocol stack is called Contiki netstack [19], the various protocols used
are designed to be lightweight when it comes to using system resources and power
consumption in consideration of IoT devices. The main goal is to fulfill the requirements of
IoT devices limitations. The Contiki netstack can take advantage of features designed for
devices that does not have the restrictions of an IoT device. Figure 2 shows the design
similarities between the OSI-model and the Contiki netstack [19].
OSI-Model
Application
Transport
Session
Presentation
Network
Datalink
Physical
Contiki Netstack
Application
Adaptation
Network, Routing
Transport
MAC
Duty Cycling
Radio
Figure 2 - Protocol stack comparison
![Page 11: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/11.jpg)
11
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
2.8. Constrained Application Protocol
Constrained Application Protocol (CoAP) is an application protocol used to manage
constraint network devices in terms of memory and CPU, such as low-capacity
microcontrollers via a web interface. To reach these types of devices over the network is one
of the problems that CoAP has solved. In order to achieve this, the web architecture
Representational state transfer (REST) [20, p. 62] is used in CoAP to enable access to these
devices through web transfer. REST is intended to use for distributed systems and how
Machine-to-Machine communication through the internet can be performed. HTTP is also
using REST and that is one of the reasons why CoAP is easily integrated with web services.
CoAP has support of multicast and it provides low overhead which is ideal for low-powered
and lossy networks with an immense number of nodes. The simplicity of the protocol makes it
work well for resource restricted devices.
2.9. Directed Acyclic Graph
A graph is usually plotted on an x and y-axis coordinate system, but the term graph within the
mathematical field of graph theory, has a different meaning. Here a graph is any structure of
points connected by lines, the points will be referenced as nodes from here on out. A Directed
Acyclic Graph [21, p. 10] (DAG) has two special conditions compared to a regular graph.
Directed, means that a path can be taken between two nodes in the direction of the line
connecting two nodes. Acyclic, means that there is no way of making its way back to the
origin point in the graph, in other words there can be no loops. Every DAG has at least one
node with no outgoing lines, this is the DAG root. An example of a DAG is represented in
Figure 3.
ROOT
Sensor
Node
Wireless
link
Figure 3 - Diagram of a Directed Acyclic Graph
2.10. Destination Oriented Directed Acyclic Graph
A Destination Oriented Directed Acyclic Graph [21, p. 10] (DODAG) is just like a regular
DAG. Every line is pointed in a certain direction and there is no way of going back to the
origin point. The one thing distinguishing the two is that the DODAG is destination oriented,
meaning there can be a maximum of one endpoint. Compared to a DAG, which can have one
![Page 12: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/12.jpg)
12
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
or more roots, a DODAG can only have one point in which every line converges to. An
example of a DODAG is represented in Figure 4.
ROOT
Sensor
Node
Wireless
link
Figure 4 - Diagram of a Destination Oriented Directed Acyclic Graph
2.11. Routing Protocol for Low-Power and Lossy Networks
The Routing Protocol for Low-Power and Lossy Networks [21] (RPL) uses the rules of a
DAG to create its routing structure. This structure is often described as a tree, with the DAG
root at the top of the tree and DAG nodes making up the rest of the tree. Every node is in a
parent/child relationship, where the DAG root is a node with no outgoing lines and the
endpoint of the graph, therefor it is always a parent and cannot be a child. Every other node in
the graph can either be a parent or a child, nodes can however be in more than one
relationship at once. What determines whether a node is a parent, or a child is its rank and
relative position to its connected nodes. The nodes with highest rank are called leaf's. A node
is considered either a parent, child or leaf depending on the decision process called Objective
Function. An example of the RPL parent/child relationship can be seen in Figure 5.
![Page 13: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/13.jpg)
13
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Node relationship
ROOT/Parent
Parent/child
Child/Leaf
Child/Leaf
ROOT
Sensor
Node
Wireless
link
Figure 5 - Diagram depicting the parent and child relationship in RPL
2.11.1. Objective Function
The rank of a node is determined by the Objective Function [21, p. 11], this is an algorithm
that decides what rank a node will get in the routing structure and what type of node it will be.
Nodes with a lower rank is topologically closer to the DAG root, it is worth mentioning that
physical location of a node can impact its rank, but it is not necessarily important. For
example, if the Objective Function heavily depends on latency or signal strength actual
distance of the nodes will be of great importance. Figure 6 shows how a physical topology
and the RPL tree structure can differ. For each level of parent/child relationship the rank
increases. It is up to the developer to construct the Objective Function so that the RPL
network acts as intended, to achieve its goal, there is however default values that will
construct a tree topology if nothing specific is implemented.
RPL STRUCTURE
ROOT
Rank 1
Rank 2
PHYSICAL TOPOLOGY
ROOT
Rank 1
Rank 2
Rank 2
Rank 1
Rank 2
ROOT
Sensor
Node
Wireless
link
Figure 6 - Diagram showing how Physical topology and tree structure can differ
![Page 14: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/14.jpg)
14
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
2.11.2. DODAG Goal
The DODAG Goal is application-specific for every RPL network. A DODAG Goal can for
example be to have an overall local network latency below a certain threshold, to minimize
the overall energy consumption or to always have the lowest possible amount of different
ranks in the tree. The Objective Function should be designed in a way, that the nodes behave
accordingly to achieve said goal. The DODAG can be in two different states, and the RPL
root advertises which is the case. If the DODAG has achieved its goal it will be in a grounded
state, if the network does not have the necessary properties to accomplish the goal it will be
set to a floating state, the DODAG can however still provide connectivity to other nodes
within the DODAG [21, p. 18].
2.11.3. Use case for RPL
RPL was developed to achieve routing for resource-constraint devices within a network with
high packet loss and low data rate, also called Low-power and Lossy Networks, this can for
example be a wireless sensor network. For a Wireless Sensor Network, conventional routing
protocols such as OSPF or BGP do not work, this is because they are too resource demanding.
A Low-powerd and Lossy Network can contain thousands of nodes and the traffic sent can be
point-to-point, point-to-multipoint or multipoint-to-point [21, p. 19].
2.12. IEEE 802.15.4 - Low-Rate Wireless Personal Area Networks
IEEE 802.15.4 is a network standard developed by the IEEE Working Group for Wireless
Specialty network and is part of the 802.15 class. The protocol is developed for Low-Rate
Wireless Personal Area Networks (LR-WPAN) and is designed to be used with low-power
consuming wireless devices with extremely low data rates. Wireless sensor nodes and IoT
devices often has these limitations, LR-WPAN is therefor suitable to be used with these kinds
of devices. The protocol is separated into two different layers, MAC and physical.
The MAC sublayer manages transmission of frames between the physical and upper layers.
This is handled through several different functions within the MAC layer. It uses Carrier-
Sense Multiple Access with collision avoidance (CSMA/CA) and Time Synchronized
Channel Hopping (TSCH) to avoid and reduce different kinds of interference, TSCH also
provide low-power properties [22].
The physical layer handles transmission and reception of data on a hardware level, it also
detects the link quality and decides which channel frequency to use [23, p. 381]. Clear
Channel Assessment uses Carrier Sense and Energy Detection to determine if it is possible to
access the medium. Carrier Sense works by listening to wireless signals with a specific
modulation and frequency to determine if someone else is transmitting data on a given
channel. If a sufficiently strong and valid signal is detected the medium will be reported as
busy, otherwise it will be marked as idle and able to start transmitting data. Energy Detection
is used to determine if there are any interfering sources in the nearby area. Any form of
background noise which exceeds the maximum power level threshold, will mark the medium
as busy. This is a mechanism that determines if it is worth, or even possible to transmit data at
that moment [23, p. 402].
Radio duty cycle is the amount of time the radio is active before going to sleep. By reducing
the duty cycle energy consumption will be reduced, this is managed by activating and
![Page 15: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/15.jpg)
15
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
deactivating the radio transceivers, thus minimizing the battery usage of a device [24, p. 12].
Contiki-OS uses several protocols to manage the radio duty cycle; the ContikiMAC protocol,
Contiki X-MAC and Contiki LPP, these have different properties to help lower the energy
consumption [25].
Link quality Indicator calculates an approximated link quality for every received transmission
by determining the strength of the received signal, either by using Energy detection or with a
signal-to-noise ratio [23, p. 402]. Signal-to-noise ratio is the difference between the strength
of a received, valid signal and the ambient background noise floor. A greater difference in
signal-to-noise ratio results in a stronger signal [26].
The 802.15.4 standard utilize low transfer rates to achieve low power consumption, these
transfer rates can be as low as 20 kbit/s up to 250 kbit/s [27]. This creates a major problem
for IEEE 802.15.4. It is limited to handle big data packets since its standard Maximum
Transmission Unit (MTU) size is 127 bytes, with the header accounted for, this leave 44 bytes
to the payload. Wireless Sensor Networks typically use IPv6 to address devices [28] and the
default IPv6 MTU size is 1280 bytes this creates problems when sending data over 802.15.4.
There is a solution to this problem which is IPv6 over Low-Power Wireless Personal Area
Networks (6LoWPAN).
2.13. 6LoWPAN
6LoWPAN was developed as an adaptation layer between 802.15.4 and IPv6 to solve
problems of MTU size, the use of compression, fragmentation and reassembly of packets
solves the problem with the different packet sizes. The header compression is done by
compressing common values in the ipv6 header field. IPv6 header fields are compressed by
assuming usage of common values. To meet the requirements of the MTU size of IPv6, the
frames are fragmented in to several frames to manage the transition and when the frames
come from 802.15.4, they reassemble to be sent as IPv6 packages. By implementing
6LoWPAN issues were solved and made it easier to connect IoT devices to the Internet using
the established IP architecture [24, pp. 4-5].
![Page 16: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/16.jpg)
16
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
3. Problem Formulation
This Thesis work aims at solving potential problems regarding future development of
Industrial Internet of Things devices with regard to Future Factories in the Cloud. The main
goal of this work is to evaluate the performance of an industrial IoT network within the scope
of Fog computing with mobile IoT devices. The performance evaluations will consider
network reliability in terms of packet delivery ratio, and timeliness in terms of packet delay.
We envision a system where a Fog-server provides responsive feedback to connected IIoT
devices by acting as a mobility controller for the closed-loop control system. In such a
system, the Fog-server acts as a local processing unit, where it collects information from the
network, and then provides new rules based on network/application requirements. The
feedback command updates rules in the network. In this Thesis, we assume that the Fog-
server runs a collision avoidance algorithm, where it avoids mobile nodes’ collision in real-
time by sending packets to sensor nodes to either stop moving, change speed or direction. We
want to show how a Fog-server can function as an extension to a Cloud service and work with
wireless sensor networks. We believe that Fog-servers are a natural development for
managing and processing time critical data from devices, and therefore decided to:
• Develop and implement a collision avoidance algorithm for a mobility controller in a
closed-loop control system between IoT devices and a Fog-server.
• Evaluate network performance in various situations in terms of accuracy and
timeliness when dealing with the existence of a Fog-server within a wireless sensor
network.
![Page 17: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/17.jpg)
17
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
4. Method
Different methods were used to answer the individual problem formulations of this thesis
work. Firstly, a literature study was conducted to review different technologies with the
intention of getting an understanding of cloud computing, Fog computing, IIoT, closed-loop
control systems, Contiki-OS and the necessary components of Cooja. This was required since
a lot of these technologies are used together in different ways. In parallel with the literature
study, the process of setting up a lab environment to conduct experiments and gather
quantitative data was also initiated. We worked in Cooja, which is a Linux based emulation
tool used to debug microcontrollers such as TmoteSky in a wireless sensor network. Here it
was possible to create emulated motes that could communicate over RPL. The experiments
resulted in a vast amount of data, which was compiled by calculating the minimum, maximum
and averages of delay and packet delivery ratio for the individual motes.
![Page 18: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/18.jpg)
18
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
5. Cooja implementation
Cooja was used to create a simulated environment in order to evaluate the performance of our
closed-loop control system with regard to network reliability in terms of packet delivery and
delay between a Fog-server and a wireless sensor network. The simulations employed a fixed
number of RPL nodes depending on the scenario with a single RPL root to act as a Fog-server
for all of them. All nodes were of the type TmoteSky. RPL was used as the underlying routing
protocol for the simulations with a single RPL root for simplicity. The only purpose for RPL
in our case was to enable routing between the Fog-server and client nodes therefore we let the
DODAG stay in a floating state since we did not need to configure a specific goal. 6LoWPAN
was used to fragment eventual packets that exceeds the maximum MTU size supported by the
IEEE 802.15.4 radio link.
5.1. Simulation scrip editor
The simulation script editor is a way to access the Java interface within Cooja, which is done
by writing Java code that runs alongside the simulation. This makes it possible to perform
GUI actions, either on set timers or based on logical if statements. It also enables interaction
with motes via the serial line interface. The simulation scrip editor is a capable tool and can
be used to run simulations directly from the terminal window without any graphics, which
saves a lot of system resources for large implementations. This can all be automated to run
several iterations of an implementation and saving the output to files for later examination or
debugging. We used the simulation script editor for two different GUI functions, (i) to get the
nodes current position and (ii) to set a new position based on the decision made by the Fog-
server. The simulation script was written to look at the terminal output and check for certain
strings, getPosition or setPosition. If getPosition was printed to the terminal by an RPL node,
the script would answer with the current position. If the string setPosition was printed, the
script would format the string and split on a white space, the split string contained two values,
x and y cooridinates, which were used to update the position of the node. All communication
between the RPL nodes and simulation script went through the serial line interface. A flow
chart of the simulation script is descripbed in Figure 7.
Wait of inputYIELD
Start
SetPosistion()If setPosistion
If getPosistion GetPosistion()Yes
Yes
No
No
Figure 7 - Event script flow chart
![Page 19: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/19.jpg)
19
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
5.2. RPL node
The RPL nodes emulate physical TmoteSky devices by running C code in Cooja. They can
communicate wirelessly with one another and the Fog-server by using RPL and are also able
to communicate with Cooja over the serial line interface. This is used to get the current
position of a node and move it to a new location based on the decition of the Fog-server. The
purpose of the RPL nodes was to collect and transmit its position to the Fog-server and wait
for instructions on how to move. It does this by contacting the Cooja interface once every
specified time interval depending on the scenario. The time interval, or sampling rate is set by
the etimer [29], a clock function counting in milliseconds (ms) which when expired would
trigger a getPosition request. At the samt time it would also contact the Fog-server with the
new position and wait for a response. When the RPL node detected a response from the Fog-
server, a tcpip event would trigger, which is a process in Cooja that handles incoming data
streams. Depending on the Fog-servers decision, a new position would be set with setPosition.
A flow chart of the RPL node logic is descripbed in figure 8.
Start
getPosistion()Etimer?
TCPIP event?
setPosistion()
Yes
Yes
No
No
update Posistion
No
Figure 8 - RPL node flow chart
5.3. RPL root
The RPL root, which is also the Fog-server, acts as the mobility controller for the closed-loop
control system and is an emulation of a physical TmoteSky running in Cooja just as the RPL
nodes. It is designed to monitor the connected RPL node and determine how they should
move. It does this by creating a database containing the last known position, and the pre-
determined destination of all connected nodes. When a node informs the Fog-server of its new
position a tcpip event is triggered, this initiates the movement algorithm and a decition of how
the node should move is sent as a reply. The Fog-server also checks for collisions between
nodes, we use this data for one part of the performance evaluation. A flow chart of the RPL
root logic is descripbed in figure 9.
![Page 20: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/20.jpg)
20
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
RPL-Node
Start
Movement algorithm
TCPIP event
Update position
Figure 9 - RPL root flow chart
5.4. Application example
The structure of our closed-loop control system could be applied to work in an industrial
environment with automated guided vehicles (AGVs). Here the RPL nodes would be placed
on the AGVs with one or more RPL root in the vicinity, they would however most likely not
act as a Fog-server. Instead they would simply enable the RPL nodes to reach a remote Fog or
cloud server, extending the industry to the Fog. This server would make the decision of how
and when any given AGV could and would move based on an improved version of our
movement algorithm.
5.5. Simulation scenarios
Data was collected from a total of 80 simulations of different configurations all running for
five minutes. The simulations were conducted in a confined space of 10 x 10 m. The reason
for this was to determine if, and how, node density affects communication with respect to
packet delivery ratio and delay. Packet delivery ratio is the calculated delta between the
number of transmitted and received packets from RPL node to RPL root and RPL root to RPL
node. Delay is the time between a packet being transmitted until being received by the
endpoint, RPL node to RPL root and RPL root to RPL node. The payload size was altered
between simulations to see how that would affect performance.
The RPL nodes were positioned on the edges of the grid with a starting distance of two meter
apart from one another. Even numbered nodes were placed on the x-axis and odd numbered
nodes on the y-axis, in conjunction with the pre-defined destination set by the Fog-server, a
known movement pattern for each node could then be calculated. Figure 10 displays an
example of how the nodes were positioned. By doing this, we could anticipate where collision
would occur and create an estimate of how many collisions statistically would occur within
the given simulation time. The result of this is a collision avoidance closed-loop control
system between the Fog-server and individual RPL nodes.
![Page 21: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/21.jpg)
21
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
10m
10m
Figure 10 - Diagram of the positioning from scenario five
The amount of collision points is the square of the number of RPL nodes in the simulation
divided by two, see Equation 1.
𝑐 = (𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑛𝑜𝑑𝑒𝑠
2)
2
(1)
Equation 1 – Number of collision points
The nodes were able to move one or two meters at a time per movement, dependant of what
the Fog-server calculated. The nodes movement speed can thereby be calculated to be the
average movement of 1.5 meter divided by a high estimated delay from the Fog-server of
500ms plus the sampling rate for the current simulation in meter/s, see Equation 2.
𝑠 =1.5𝑚
500𝑚𝑠 𝑑𝑒𝑙𝑎𝑦 + 𝑠𝑎𝑚𝑝𝑙𝑖𝑛𝑔 𝑟𝑎𝑡𝑒 (2)
Equation 2 – Estimated node movement speed
The effective movement speed was however slightly different between nodes due to their
sampling rates being 1-10ms out of phase to minimize congestion, this is a miniscule
difference and was not considered when compiling the data. With an estimated movement
speed and known simulation run time an approximation of the nodes travel distance could be
calculated as movement speed multiplied by simulation run time, see Equation 3.
𝑑 = 𝑠 × 𝑠𝑖𝑚𝑢𝑙𝑎𝑡𝑖𝑜𝑛 𝑡𝑖𝑚𝑒 𝑖𝑛 𝑠𝑒𝑐𝑜𝑛𝑑𝑠 (3) Equation 3 – Estimated travel distance
![Page 22: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/22.jpg)
22
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
The average distance nodes need to move before reaching a collision point is half the length
in whichever direction they are moving. A rough estimate of the theoretical number of
collisions per simulation was calculated based on the above asumptions. Possible travel
distance divided by the length of the x or y-axis depending on the nodes travel direction
divided by two multiplied by the number of collision points, see Equation 4.
𝑁𝑐 =𝑑
(𝑎𝑥𝑖𝑥 𝑙𝑒𝑛𝑔𝑡ℎ
2 )× 𝑐 (4)
Equation 4 – Estimated number of collision
The number of RPL nodes separates the scenarios, scenario one consists of two RPL nodes
and one RPL root, scenario two increases the number of RPL nodes to four and so on up to
scenario five with ten RPL nodes. Each scenario runs four simulations with alternating
sampling rates between 100 – 1000ms aswell as an alternating payload sizes between 8 – 44
byte, this totals 16 different simulations per scenario as seen in Table 2 and 80 simulations
overall.
Scenarios Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5
Number of nodes 2 4 6 8 10
Sampling rate (ms) 100 - 1000 100 - 1000 100 - 1000 100 - 1000 100 - 1000
Payload Size (byte)
8 8 8 8 8
20 20 20 20 20
30 30 30 30 30
44 44 44 44 44 Table 2 - Scenario parameters
Based on the above assumptions we have constructed the following hypotheses; (i) more
nodes will lead to more collisions (ii) more nodes will lead to higher delay (iii) larger
payload size will lead to higher delay (iv) higher sampling rate will lead to higher packet
loss.
![Page 23: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/23.jpg)
23
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
5.6. Hardware and software used in Cooja implementation
The host hardware and software used during implementation and evaluation can be seen in
Table 3 and 4.
Operating system Windows 10 pro
64-bit version KB4056887
CPU Intel Intel(R) Core(TM) i7-8700
CUP @ 4.7GHz
Internal memory (RAM) 16 GB 3200Mhz
Table 3 - Hardware used for implementation
Operating system Contiki-OS version 3.0
Virtualization Platform VMware Workstation version
12.5.9
Sensor Network Simulation Cooja 3.0
Table 4 - Software used for implementation
![Page 24: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/24.jpg)
24
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6. Result
The results of the data obtained using the tests are presented in graphs with a brief explanation
of what the graph means and a shorter analysis of these. A brief summary of all results will be
specified at the end of this section.
6.1. Scenario 1
Figure 11 shows how delay is affected by different payload sizes. The results reveal that there
is no noticeable impact on the end-to-end delay when the packet size went from 8 bytes to 44
bytes.
Figure 11 - Delay with respect to payload size for two RPL nodes
Figure 12 show how delay is affected by different sampling rates, there is a noticeable
difference between simulations with two RPL nodes, a sampling rate of 200ms leads the
lowest delay.
Figure 12 - Delay with respect to sampling rate for two RPL nodes
64
99
82
46
74
6064
102
83
45
74
5964
101
83
46
74
6064
99
81
46
73
60
0
20
40
60
80
100
120
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 1 - Delay with respect to payload size
8(byte) 20(byte) 30(byte) 44(byte)
65
116
90
36
73
55
41
104
72
19
73
46
69
9381
57
7362
8189 85
73 73 73
0
20
40
60
80
100
120
140
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 1 - Delay with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 25: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/25.jpg)
25
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 13 show how packet loss is affected by different payload sizes, there is no noticeable
difference between simulations with two RPL nodes.
Figure 13 - Packet loss with respect to payload size for two RPL nodes
Figure 14 show how packet loss is affected by different sampling rates, there is a considerable
difference between simulations with two RPL nodes, where a sampling rate of 100ms has the
most packet loss.
Figure 14 - Packet loss with respect to sampling size for two RPL nodes
20 20 2019
11 11 1112
0
5
10
15
20
25
8byte 20byte 30byte 44byte
PA
CK
ET
S
Scenario 1 - Packet loss with respect to payload size
Root to node packet loss Node to root packet loss
36
20
12 11
32
16
0 00
5
10
15
20
25
30
35
40
100ms 200ms 500ms 1000ms
PA
CK
ET
S
Scenario 1 - Packet loss with respect to sampling rate
Root to node packet loss Node to root packet loss
![Page 26: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/26.jpg)
26
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 15 show how packet delivery is affected by different payload sizes, there is no
noticeable difference between simulations with two RPL nodes.
Figure 15 - Packet delivery with respect to payload size for two RPL nodes
Figure 16 show how packet delivery is affected by different sampling rates, there is no
noticeable difference between simulations with two RPL nodes.
Figure 16 - Packet delivery with respect to sampling rate for two RPL nodes
1282
1302
1313
1302
1282
1302
1313
1302
1282
1302
1313
1302
1282
1301
1313
1301
1265
1270
1275
1280
1285
1290
1295
1300
1305
1310
1315
1320
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 1 - Packet delivery with respect to payload size
8byte 20byte 30byte 44byte
2804 2840 2872 2840
1444 1464 1480 1464
588 600 600 600
292 303 303 303
0
500
1000
1500
2000
2500
3000
3500
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 1 - Packet delivery with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 27: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/27.jpg)
27
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 17 show how the packet delivery ratio is affected by different payload sizes, there is no
noticeable difference between simulations with two RPL nodes.
Figure 17 - Packet delivery ratio with respect to payload size for two RPL nodes
Figure 18 show how the packet delivery ratio is affected by different payload sizes, there is no
noticeable difference between simulations with two RPL nodes.
Figure 18 - Packet delivery ratio with respect to sampling rate for two RPL nodes
98% 98% 98%99%
99% 99% 99%99%
8byte 20byte 30byte 44byte
RA
TIO
Scenario 1 - Packet delivery ratio with respect to payload size
Root to node ratio Node to root ratio
99% 99%98%
96%
99% 99%
100% 100%
100ms 200ms 500ms 1000ms
RA
TIO
Scenario 1 - Packet delivery ratio with respect to sampling rate
Root to node ratio Node to root ratio
![Page 28: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/28.jpg)
28
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.2. Scenario 2
Figure 19 show how delay is affected by different payload sizes, there is no noticeable
difference between simulations with four RPL nodes.
Figure 19 - Delay with respect to payload size for four RPL nodes
Figure 20 show how delay is affected by different sampling rates, there is a noticeable
difference between simulations with four RPL nodes for the minimum and maximum delay.
Figure 20 - Delay with respect to sampling rate for four RPL nodes
34
81
58
15
60 62
35
76
56
16
58
3734
74
54
17
58
3734
91
63
13
62
38
0
10
20
30
40
50
60
70
80
90
100
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 2 - Delay with respect to payload size
8byte 20byte 30byte 44byte
27
89
58
6
75
58
25
78
52
12
54
3342
88
65
19
48
34
45
67
56
19
46
33
0
10
20
30
40
50
60
70
80
90
100
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 2 - Delay with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 29: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/29.jpg)
29
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 21 show how packet loss is affected by different payload sizes, there is a considerable
difference between simulations with four RPL nodes with a payload size of 30 bytes.
Figure 21 - Packet loss with respect to payload size for four RPL nodes
Figure 22 show how packet loss is affected by different sampling rates, there is a considerable
difference between simulations with four RPL nodes for 100 and 500ms.
Figure 22 - Packet loss with respect to sampling rate for four RPL nodes
44 45 42 44
12 12
88
13
0
10
20
30
40
50
60
70
80
90
100
8byte 20byte 30byte 44byte
PA
CK
ET
S
Scenario 2 - Packet loss with respect to payload size
Root to node packet loss Node to root packet loss
93
44
20 18
36
16
150
-2-20
0
20
40
60
80
100
120
140
160
100ms 200ms 500ms 1000ms
PA
CK
ET
S
Scenario 2 - Packet loss with respect to sampling rate
Root to node packet loss Node to root packet loss
![Page 30: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/30.jpg)
30
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 23 show how packet delivery is affected by different payload sizes, there is a
noticeable difference between simulations with four RPL nodes with a payload size of 30byte.
Figure 23 - Packet delivery with respect to payload size for four RPL nodes
Figure 24 show how packet delivery is affected by different sampling rates, there is no
noticeable difference between simulations with four RPL nodes.
Figure 24 - Packet delivery with respect to sampling rate for four RPL nodes
2587
26312643
2631
2587
26322644
2632
2589
2631
2719
2631
2586
26302643
2630
2500
2550
2600
2650
2700
2750
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
TE
S
Scenario 2 - Packet delivery with respect to payload size
8byte 20byte 30byte 44byte
5669 5762 5798 5762
2912 2956 2972 2956
1184 1204 1354 1204584 602 600 602
0
1000
2000
3000
4000
5000
6000
7000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 2 - Packet delivery with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 31: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/31.jpg)
31
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 25 show how the packet delivery ratio is affected by different payload sizes, there is no
noticeable difference between simulations with four RPL nodes.
Figure 25 - Packet delivery Ratio with respect to payload size for four RPL nodes
Figure 26 show how the packet delivery ratio is affected by different sampling rates, there is a
noticeable difference between simulations with four RPL nodes with a sampling rate of
500ms.
Figure 26 - Packet delivery Ratio with respect to sampling rate for four RPL nodes
98% 98% 98% 98%
100% 100%
97%
100%
8byte 20byte 30byte 44byte
RA
TIO
Scenario 2 - Packet delivery Ratio with respect to payload size
Root to node ratio Node to root ratio
98% 99% 98%97%
99% 99%
89%
100%
100ms 200ms 500ms 1000ms
RA
TIO
Scenario 2 - Packet delivery Ratio with respect to sampling rate
Root to node ratio Node to root ratio
![Page 32: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/32.jpg)
32
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.3. Scenario 3
Figure 27 show how delay is affected by different payload sizes, there is a noticeable
difference between simulations with four RPL nodes with payload sizes of 8 and 30 byte.
Figure 27 - Delay with respect to payload size for six RPL nodes
Figure 28 show how delay is affected by different sampling rates, there is a significant
difference in maximum delay between simulations with four RPL nodes with a sampling rate
of 100ms
Figure 28 - Delay with respect to sampling rate for six RPL nodes
18
99
58
14
105
59
14
85
50
17
133
75
15
57
36
19
125
72
15
63
39
17
140
79
0
20
40
60
80
100
120
140
160
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 3 - Delay with respect to payload size
8byte 20byte 30byte 44byte
10
90
50
9
284
146
10
6136
19
97
58
18
76
4721
91
56
1838 28 20
5035
0
50
100
150
200
250
300
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 3 - Delay with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 33: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/33.jpg)
33
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 29 show how packet loss is affected by different payload sizes, there is a significant
difference between simulations with four RPL nodes with a payload size of 30 and 44 byte.
Figure 29 - Packet loss with respect to payload size for six RPL nodes
Figure 30 show how packet loss is affected by different sampling rates, there is an enormous
difference between simulations of four RPL nodes with a sampling rate of 500ms.
Figure 30 - Packet loss with respect to sampling rate for six RPL nodes
222 221241
257
31 30
1
326
0
50
100
150
200
250
300
350
8byte 20byte 30byte 44byte
PA
CK
ET
S
Scenario 3 - Packet loss with respect to payload size
Root to node packet loss Node to root packet loss
806
76
2648
889
86 40
2616
60
0
500
1000
1500
2000
2500
3000
100ms 200ms 500ms 1000ms
PA
CK
ET
S
Scenario 3 - Packet loss with respect to sampling rate
Root to node packet loss Node to root packet loss
![Page 34: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/34.jpg)
34
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 31 show how packet delivery is affected by different payload sizes, there is a
considerable difference between simulations with four RPL nodes and a payload size of 44
byte for packets received by the RPL root.
Figure 31 - Packet delivery with respect to payload size for six RPL nodes
Figure 32 show how packet delivery is affected by different sampling rates, there is no
noticeable difference between simulations with four RPL nodes.
Figure 32 - Packet delivery with respect to sampling rate for six RPL nodes
3720
39423973
3942
3723
39443974
3944
3703
3943 3944 3944
36833647
39733940
3400
3500
3600
3700
3800
3900
4000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 3 - Packet delivery with respect to payload size
8byte 20byte 30byte 44byte
78308636 8722 8636
4348 4424 4464 4424
1776 1808
4424 4424
875 840 900
1764
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
10000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 3 - Packet delivery with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 35: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/35.jpg)
35
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 33 show how the packet delivery ratio is affected by different payload sizes, there is a
noticeable difference between simulations with four RPL nodes and a payload size of 44 byte
from RPL node to RPL root.
Figure 33 - Packet delivery ratio with respect to payload size for six RPL nodes
Figure 34 show how the packet delivery ratio is affected by different sampling sizes, there is a
significant difference between simulations with four RP-nodes and a sampling rate of 500ms.
Figure 34 - Packet delivery Ratio with respect to sampling rate for six RPL nodes
94% 94% 94% 93%
99% 99%100%
92%
8byte 20byte 30byte 44byte
RA
TIO
Scenario 3 - Packet delivery ratio with respect to payload size
Root to node ratio Node to root ratio
91%98%
40%50%
99% 99%
41%
93%
100ms 200ms 500ms 1000ms
RA
TIO
Scenario 3 - Packet delivery Ratio with respect to sampling rate
Root to node ratio Node to root ratio
![Page 36: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/36.jpg)
36
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.4. Scenario 4
Figure 35 show how delay is affected by different payload sizes, there is no noticeable
difference between simulations with six RPL nodes.
Figure 35 - Delay with respect to payload size for eight RPL nodes
Figure 36 show how delay is affected by different sampling rates, there is a significant
difference between simulations with six RPL nodes and a sampling rate of 100ms.
Figure 36 - Delay with respect to sampling rate for eight RPL nodes
39
103
71
6
145
76
38
106
72
6
137
72
38
111
75
7
128
67
39
118
79
6
144
75
0
20
40
60
80
100
120
140
160
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 4 - Delay with respect to payload size
8byte 20byte 30byte 44byte
32
173
102
4
327
165
37
103
70
5
105
5541
8061
8
643645
8264
9
5833
0
50
100
150
200
250
300
350
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 4 - Delay with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 37: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/37.jpg)
37
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 37 show how packet loss is affected by different payload sizes, there is no noticeable
difference between simulations with six RPL nodes.
Figure 37 - Packet loss with respect to payload size for eight RPL nodes
Figure 38 show how packet loss is affected by different sampling rates, there is a significant
difference between simulations with six RPL nodes over all except for a sampling rate of
500ms.
Figure 38 - Packet loss with respect to sampling rate for eight RPL nodes
924 928
1036 1005
22 25 24 26
0
200
400
600
800
1000
1200
8byte 20byte 30byte 44byte
PA
CK
ET
S
Scenario 4 - Packet loss with respect to payload size
Root to node packet loss Node to root packet loss
3605
163
2113
1219
71 29
2064
10
500
1000
1500
2000
2500
3000
3500
4000
100ms 200ms 500ms 1000ms
PA
CK
ET
S
Scenario 4 - Packet loss with respect to sampling rate
Root to node packet loss Node to root packet loss
![Page 38: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/38.jpg)
38
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 39 show how packet delivery is affected by different payload sizes, there is no
noticeable difference between simulations with six RPL nodes.
Figure 39 - Packet delivery with respect to payload size for eight RPL nodes
Figure 40 show how packet delivery is affected by different sampling rates, there is no
noticeable difference between simulations with six RPL nodes.
Figure 40 - Packet delivery with respect to sampling rate for eight RPL nodes
4343
5267 5289 5267
4340
5268 5293 5268
4257
5269 5293 5293
4260
5265 5291 5265
0
1000
2000
3000
4000
5000
6000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 4 - Packet delivery with respect to payload size
8byte 20byte 30byte 44byte
7931
11536 11607 11536
5757 5920 5949 5920
2359 2408
4472 4472
1153 1205 1204
2372
0
2000
4000
6000
8000
10000
12000
14000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 4 - Packet delivery with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 39: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/39.jpg)
39
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 41 show how the packet delivery ratio is affected by different payload sizes, there is no
noticeable difference between simulations with six RPL nodes.
Figure 41 - Packet delivery Ratio with respect to payload size for eight RPL nodes
Figure 42 show how the packet delivery ratio is affected by different sampling rates, there is a
considerable difference between simulations with six RPL nodes and a sampling rate of
500ms.
Figure 42 - Packet delivery ratio with respect to sampling rate for eight RPL nodes
82% 82% 80% 81%
100% 100% 100% 100%
8byte 20byte 30byte 44byte
RA
TIO
Scenario 4 - Packet delivery Ratio with respect to payload size
Root to node ratio Node to root ratio
69%
97%
53% 49%
99% 100%
54%
100%
100ms 200ms 500ms 1000ms
RA
TIO
Scenartio 4 - Packet delivery ratio with respect to sampling rate
Root to node ratio Node to root ratio
![Page 40: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/40.jpg)
40
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.5. Scenario 5
Figure 43 show how delay is affected by different payload sizes, there is no noticeable
difference between simulations with ten RPL nodes.
Figure 43 - Delay with respect to payload size for ten RPL nodes
Figure 44 show how delay is affected by different sampling rates, there is a considerable
difference between the maximum delay to nodes is simulations with ten RPL nodes and a
sampling rate of 100 ms.
Figure 44 - Delay with respect to sampling rate for ten RPL nodes
9
73
41 35
216
126
8
73
40 33
231
132
8
74
41 33
209
121
6
72
39 34
220
127
0
50
100
150
200
250
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 5 - Delay with respect to payload size
8(byte) 20(byte) 30(byte) 44(byte)
2
128
65
22
398
210
4
6635 36
209
123
1148
30 38
144
91
1351
32 38
126
82
0
50
100
150
200
250
300
350
400
450
Minimum delayto root
Maximum delayto root
Average delay toroot
Minimum delayto nodes
Maximum delayto nodes
Average delay tonodes
MS
Scenario 5 - Delay with respect to sampling rate
100ms 200ms 500ms 1000ms
![Page 41: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/41.jpg)
41
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 45 show how packet loss is affected by different payload sizes, there is no noticeable
difference between simulations with ten RPL nodes.
Figure 45 - Packet loss with respect to payload size for ten RPL nodes
Figure 46 show how packet loss is affected by different sampling rates, there is an enormous
difference in simulations with ten RPL nodes and a sampling rates of 100ms.
Figure 46 - Packet loss with respect to sampling rate for ten RPL nodes
1815 18321928 1989
41 39 37 42
0
500
1000
1500
2000
2500
8(byte) 20(byte) 30(byte) 44(byte)
PA
CK
ET
S
Scenario 5 - Packet loss with respect to payload size
Root to node packet loss Node to root packet loss
6911
49183 7998 61 0 0
0
1000
2000
3000
4000
5000
6000
7000
8000
100ms 200ms 500ms 1000ms
PA
CK
ET
S
Scenario 5 - Packet loss with respect to sampling rate
Root to node packet loss Node to root packet loss
![Page 42: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/42.jpg)
42
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 47 show how packet delivery is affected by different payload sizes, there is no
noticeable difference between simulations with ten RPL nodes.
Figure 47 - Packet delivery with respect to payload size for ten RPL nodes
Figure 48 show how packet delivery is affected by different sampling rates, there is no
noticeable difference between simulations with two RPL nodes.
Figure 48 - Packet delivery with respect to Sampling rate for ten RPL nodes
4747
6562 6603 6562
4730
6562 6601 6562
4636
6564 6601 6564
4576
6565 6607 6565
0
1000
2000
3000
4000
5000
6000
7000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 5 - Packet delivery with respect to payload size
8(byte) 20(byte) 30(byte) 44(byte)
7456
14367 14465 14367
6879 7370 7431 7370
2925 3008 3008 3008
1429 1508 1508 1508
0
2000
4000
6000
8000
10000
12000
14000
16000
RPL-node received RPL-root received RPL-node sent RPL-root sent
PA
CK
ET
S
Scenario 5 - Packet delivery with respect to Sampling rate
100ms 200ms 500ms 1000ms
![Page 43: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/43.jpg)
43
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Figure 49 show how the packet delivery ratio is affected by different payload sizes, there is no
noticeable difference between simulations with ten RPL nodes.
Figure 49 - Packet delivery ratio with respect to payload size for ten RPL nodes
Figure 50 show how the packet delivery ratio is affected by different sampling rates, there is a
significant difference in simulations with ten RPL nodes and a sampling rate of 100ms
between RPL node and RPL root.
Figure 50 - Packet delivery ratio with respect to sampling rate for ten RPL nodes
72% 72% 71% 70%
99% 99% 99% 99%
8(byte) 20(byte) 30(byte) 44(byte)
RA
TIO
Scenario 5 - Packet delivery ratio with respect to payload size
Root to node ratio Node to root ratio
52%
93% 97% 95%99% 99% 100% 100%
100ms 200ms 500ms 1000ms
RA
TIO
Scenario 5 - Packet delivery ratio with respect to sampling rate
Root to node ratio Node to root ratio
![Page 44: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/44.jpg)
44
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.6. Collisions
Figure 51 show the theoretical number of expected collisions based on the calculations made
in chapter 5.5 on Simulation scenarios.
Figur 51 - Theoretical number of collisions for all scenarios
Figure 52 show the number of collisions that occurred for each simulated scenario. There is a
noticeable trend and linear growth with an increasing number of nodes per simulation. The
practical simulations show much fewer collisions compared to the theoretical estimate, with
peek performance of 91% reduced number of collision for scenario 1 with the collision
avoidance algorithm running.
Figure 52 – Practical number of collisions for all scenarios
429
1714
4204
7474
10714
60 240 540960
1500
150600
1350
2400
3750
86 343841
14952143
0
2000
4000
6000
8000
10000
12000
Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5
CO
LL
ISIO
NS
All scenarios - Theoretical number of collisions
Total number of collisions Minimum number of collisions
Maximum number of collisions Average number of collisions
38
186
569
705
1250
0 1 7 0 108 48 82 121197
2 12 36 44 78
0
200
400
600
800
1000
1200
1400
Scenario 1 Scenario 2 Scenario 3 Scenario 4 Scenario 5
CO
LL
ISIO
NS
All scenarios - Practical number of collisions
Total number of collision Minimum number of collision
Maximum number of collision Average number of collision
![Page 45: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/45.jpg)
45
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
6.7. Summary of the results
From the results above, one can see a pattern emerging; sampling rate has a greater
performance impact compared to the payload size and this applies to almost all scenarios.
Packet loss was not affected by the payload size in a noticeable way in any of the scenarios,
sampling rate did however have quite the impact, especially sampling rates of 100 and 500ms.
Packet delivery was not affected by sampling rate or payload size, it increased linearly with
the increase of nodes for each scenario. Packet delivery ratio however was greatly affected by
the sampling rate of 500ms, simulations with a sampling rate of 100ms also followed this
pattern to some extent, payload size did not on the other hand seem to have any real
performance impact. Delay was mostly increased by the sampling rate of 100ms but did also
seem to be affected by the number of nodes, this became prominent at scenario 3 and
continued through to scenario 5, payload size did not seem to influence the delay. The number
of collisions has a strict linear increase with an incrementing number of nodes and the results
align with our estimated calculations. The theoretical expected number of collisions and the
practical number of collisions based on our simulations follow the same trend, only on
different scales.
![Page 46: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/46.jpg)
46
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
7. Discussion
The results show that higher sampling rates impacts the performance on all, but one
evaluation point and that payload size had a little to no impact on the wireless sensor network
this can be due to several reasons. The results also show that the number of nodes used had
different effects depending on what the test would evaluate.
The result shows that higher sampling rates lead to increased packet loss, this can be
explained by the Fog-server inability to respond to every packet sent by the RPL nodes. It is
obvious that the packet loss was at its highest with a sampling rate of 100 and 500ms with
more than four RPL nodes. For some reason the sampling rate of 200ms contributed less to
packet loss compared to 500ms, we cannot determine why this is and what the causing factor
might be, since there might be several reasons for this, only assumptions can be made. One
possible answer might be that Cooja has some suboptimal code which makes it difficult to
handle 100 and 500ms sampling rates, the same results can be seen in several of the simulated
scenarios and can therefore not be a coincidence. Another possible reason might have to do
with the placement and movement patterns of the nodes that make the ratio favorable for
sampling rates of 200ms. In order to determine why this is the case, a lot more simulations
need to be evaluated with different placement of the nodes as well as moment patterns. Our
hypotosis that higher sampling rate would lead to greater delay can be confirmed, the
sampling rate seems to have the most impact for every evaluation point.
Regarding the payload size, it is possible to see that it did not have any major impact on the
performance, no matter the sampling rate or scenario. One factor for this might be the size of
the payload. Since we evaluated payload sizes between 8 and 44 byte we unintentionally
designed the nodes to never having to fragment the packets with 6LoWPAN, this can explain
the non-noticeable difference in performance. To get more accurate results the evaluation
should be recreated with a larger range of payload sizes, and with some that exceeds the
maximum payload size of IEEE 802.15.4.
Neither the sampling rate or payload size had any major performance impact on the package
delivery, it scaled linearly with the number of nodes in the simulations. This is in hindsight
not surprising at all, given that if the RPL nodes can handle the varying sampling rates and
payload sizes in one scenario it will also be able to handle it in all scenarios. Since the RPL
nodes do not depend on each other to generate data, increasing the number of nodes will not
change the package delivery.
When it comes to package delivery ratio the results show once more that sampling rates of
100 and 500ms had an adverse affected. Here too, it is difficult to determine which factors
might be the cause of this. As previously mentioned, extended tests with expanded
performance points may be able to explain why the outcome is like this. The payload size did
not seem to have any overall impact on the performance. In scenario 3 we did however notice
a performance drop with a payload size of 44 byte, we cannot find any conclusive reason for
this, and it may very well just be an anomaly in the simulations.
The result shows that delay was greatly affected by the sampling rate in almost every
scenario. It turns out that with a sampling rate of 100ms the delay is at its highest for every
scenario but 1 and 2. We interpret this to be the result of increasing the number of nodes
between scenarios. Scenario 3 through 5 indicate that the sampling rate had a major impact on
![Page 47: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/47.jpg)
47
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
the delay, this can be associated with the fact that a greater number of RPL nodes will
generate more data traffic. This in turn require the Fog-server to process an increasing amount
of data which it appears not being able to handle. One reason to why the Fog-server cannot
process the incoming data might be due to hardware limitation since both the RPL nodes and
the Fog-server run separate software on the same type of hardware. A better idea would be to
allocate more powerful hardware to the Fog-server. Our hypotosis that more nodes would lead
to higher delay appears to be correct. Our other hypotosis regarding payload size leading to
higher delay does not seem to be accurate, the payload size had a miniscule affect over all.
The number of collisions recorded from the simulations with the existance of a mobility
controller (Fog-server) is roughly 10 times less compared to the theoretical estimate based on
our calculations. This is most likely the result of our collision avoidance algorithm working
and thereby drastically reducing the number of collisions. Our hypotosis seem to be accurate,
the number of collisions did increase linearly as a result of the increased number of nodes
while the sampling rate and delay did not have the same impact.
There are many different factors that affect the outcome of this type of evaluation, and there
will always be areas to develop to enhance performance. One area of improvement would be
to manage the duty cycle of the RPL nodes. By decreasing the duty cycle both delay and
power consumption could be improved. Delay could be lowered since nodes would go to
sleep for a longer period of time, this would allocate more processing power of the Fog-server
for every individual active RPL node and possibly relieve congestion.
Another area of improvement would be the algorithm for how the RPL nodes should move,
this could be expanded to implement collision avoidance. This would be necessary for real
world implementations such as with AGVs, with this, a priority system would have to exist in
order for the Fog-server to decide which RPL node can move and which needs to stop to
avoid a collision. The priority system could also work to decrease delay. Instead of processing
data as it is received by the RPL nodes, the Fog-server would have a way of sorting which
client it has serviced already and which it has not, by doing this the delay could be lowered
and leveled out between RPL nodes.
We consider the implementation of our closed-loop control system between IoT devices and a
Fog-server in a wirelsee sensor network was a sucsess. The performance evaluations enabled
us to find a correlation between higher sampling rates and a loss in performance, the number
of connected nodes also had a minor impact, but not to the same extent. We cannot be sure
that our results reflect what a real-world evaluation would imply, this is due to us running
simulations with emulation software and suboptimal code. We also do not have the sample
size necessary to draw such conclusions. We do however beleve that with substantial testing
and improvements to both Cooja and our implementation, an accurate representation can be
accomplished.
From reading previous reserch within the same field but with a different angle of approach we
have found our results having both differences and similarities. A work on end-to-end delay
in WSNs with TelosB motes [8, pp. 17-18], show the results of average delay between nodes
when positioned 1 and 10 meters apart. They calculate delay in terms of system ticks per
microsecond, which converted to milliseconds is an average delay of 4.6ms, while our results
display an average delay over all scenarios of 66ms, this is an average delay which is 14 times
longer. We do not know why this is, but the results are interesting and require more reserch.
![Page 48: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/48.jpg)
48
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
Another work that evaluates the performance of MAC protocols used in WSNs [10] found
that when using a certain MAC protocol packet loss started to occur with a sampling rate of
500ms. These results correspond with our own, as we found that the samling rates of 100 and
500ms lead to the higest packet loss and is probably the result of congestion at the Fog-server.
Thirdly a work on mobility support for low-power and lossy networks [9] compared five
metrics when evaluating mobility models of sensor nodes for IoT. They concluded that every
metric was negatively affected by a larger number of nodes, which we also could see in the
amount of packet loss and number of collisions with an increased number of nodes.
![Page 49: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/49.jpg)
49
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
8. Conclusion
After compiling a comprehensive study of a closed-loop control systems in a wireless sensor
network in conjunction with a Fog-server, we can conclude that a well-timed sampling rate is
of utmost importance. We did not find that payload size had any actual impact, and that the
node density only slightly contributed to performance loss. The Fog-server should be
designed with sufficient hardware to meet the requirements necessary to accommodate the
wireless sensor network. Finding an appropriate sampling rate depends on many parameters
which are application specific and requires tuning. There is most likely not an optimal
sampling rate for all applications, the number of nodes, their mobility pattern, interference
and many other parameters will way in to this decision.
![Page 50: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/50.jpg)
50
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
9. Future Work
A reasonable continuation of this work would be to introduce more RPL nodes and extend the
simulation time, then try to get realistic elements in the simulations and move on to a physical
test environment. These elements could be background interference that may be typical of a
factory environment and evaluate how these affect the functionality of a wireless sensor
network with a Fog-server. This also require tuning of the algorithm in use. It is also possible
to investigate how to implement a Fog-server connected to a wireless sensor network together
with a Cloud-server to investigate which cloud services would be suitable for industrial
internet of things devices and then determine how Fog-servers and cloud servers can perform
different tasks. Another interesting approach would be to set up a simulation environment
where the nodes are not allowed collide with static elements and how to develop an algorithm
for how to handle that situation. This can also be tested with an open-loop system or a closed-
loop system to evaluate how different control systems works for this kind of experiment.
![Page 51: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/51.jpg)
51
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
10. References
[1] N. Ismail, “3 of the greatest technological inventions of the time and the labs that they were discovered in,” information
age, 02 02 2017. [Online]. Available: http://www.information-age.com/greatest-technological-inventions-history-
123464254/. [Accessed 13 03 2018].
[2] J. Romkey, “Toast of the IoT: The 1990 Interop Internet Toaster,” IEEE Consumer Electronics Magazine, vol. 6, no. 1,
pp. 116-119, 01 01 2017.
[3] IoT Innovation, “Increasing Consumer Adoption of Smart Home Technology,” IoT Innovation, 17 08 2017. [Online].
Available: https://internet-of-things-innovation.com/insights/the-blog/increasing-consumer-adoption-smart-home-
technology/#.WqewDOjOU2w. [Accessed 13 03 2018].
[4] contiki-os.org, “Contiki: The Open Source OS for the Internet of Things,” 13 04 2018. [Online]. Available:
http://www.contiki-os.org/. [Accessed 03 05 2018].
[5] A. P. Plageras and K. E. Psannis, “Algorithms for Big Data Delivery over the Internet of Things,” in 2017 IEEE 19th
Conference on Business Informatics, 2017.
[6] S. Thombre, R. U. Islam, K. Andersson and M. S. Hossain, “Performance Analysis of an IP based Protocol Stack for
WSNs,” in 2016 IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future
World, 2016.
[7] D. Ismahil, “Investigating Fog- and Cloud-based Control Loops for Future Smart Factories,” MDH, Västerås, 2017.
[8] H. Chen, “End-to-end Delay Analysis and Measurements in Wireless Sensor,” Mittuniversitetet, Sundsvall, 2012.
[9] H. Lamaazi, N. Benamar, M. I. Imaduddin, A. Habbal and A. J. Jara, “Mobility Support for the Routing Protocol in
Low Power and Lossy Networks,” in 2016 30th International Conference on Advanced Information Networking and
Applications Workshops, Crans-montana, 2016.
[10] M. Orell, “Performance Evaluation of MAC protocols in Wireless Sensor Networks,” Mälardalen University Sweden,
Västerås, 2016.
[11] A. Rayes and S. Salam, Internet of Things–From Hype to Reality, The Road to Digitization, Springer Nature, 2017, pp.
19-21.
[12] National Instruments, “What is a Real-Time Operating System (RTOS)?,” 22 10 2013. [Online]. Available:
http://www.ni.com/white-paper/3938/en/. [Accessed 03 05 2018].
[13] Hermann-Kopetz, Real-Time Systems Design Principles for Distributed Embedded Applications, Vienna, Austria,
2011.
[14] greg-king5, “Input and output,” 02 10 2016. [Online]. Available: https://github.com/contiki-os/contiki/wiki/Input-and-
output#Serial_Communication. [Accessed 15 05 2018].
[15] “electronics tutorials,” 1 08 2017. [Online]. Available: https://www.electronics-tutorials.ws/systems/closed-loop-
system.html. [Accessed 28 01 2018].
[16] I. Stojmenovic and S. Wen, “The Fog Computing Paradigm: Scenarios and Security Issues,” in Proceedings of the 2014
Federated Conference on Computer Science and Information Systems, Warsaw, 2014.
[17] K. T, P. Sehgal, N. Jasuja, L. G. M. Estrada, H. Malik, A. Singh and Anujan, “TCP vs. UDP,” 30 03 2018. [Online].
Available: https://www.diffen.com/difference/TCP_vs_UDP. [Accessed 04 05 2018].
[18] Microsoft, “The OSI Model's Seven Layers Defined and Functions Explained,” 17 04 2017. [Online]. Available:
https://support.microsoft.com/en-us/help/103884/the-osi-model-s-seven-layers-defined-and-functions-explained.
[Accessed 04 05 2018].
[19] Autonomous Network Research Group, “Protocols stack,” 14 10 2014. [Online]. Available:
http://anrg.usc.edu/contiki/index.php/Protocols_stack. [Accessed 04 05 2018].
[20] W. Colitti, N. T. Long, N. D. Caro and K. Steenhaut, “Internet of Things,” Springer, 2014, pp. 55-73.
[21] Internet Engineering Task Force (IETF), “ RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks,” 03 2012.
[Online]. Available: https://tools.ietf.org/html/rfc6550. [Accessed 18 03 2018].
[22] Internet Engineering Task Force (IETF) , “Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the
Internet of Things (IoT): Problem Statement,” 05 2015. [Online]. Available: https://tools.ietf.org/html/rfc7554.
[Accessed 06 04 2018].
[23] The Institute of Electrical and Electronics Engineers inc (IEEE), IEEE Standard for Low-Rate Wireless Networks, New
York, NY: The Institute of Electrical and Electronics Engineers inc (IEEE), 2016.
[24] J. Hui, D. Culler and S. Chakrabarti, “6LoWPAN: Incorporating IEEE 802.15.4 into the IP architecture,” Internet
Protocol for Smart Objects (IPSO) Alliance, 2009.
[25] A. Dunkels, “Radio duty cycling,” 18 09 2015. [Online]. Available: https://github.com/contiki-os/contiki/wiki/Radio-
duty-cycling. [Accessed 06 04 2018].
![Page 52: EVALUATING THE FUNCTIONALITY OF AN INDUSTRIAL INTERNET OF THINGS …mdh.diva-portal.org/smash/get/diva2:1217073/FULLTEXT01.pdf · 2018. 6. 12. · Internet of Things System in the](https://reader033.vdocuments.mx/reader033/viewer/2022060600/6053ec5f63893d11381853e5/html5/thumbnails/52.jpg)
52
Mathias Granlund & Christoffer Hoppe
Evaluating the Functionality of an Industrial
Internet of Things System in the Fog
[26] Cisco Systems, Inc, “Wireless fundamentals: Signal-to-Noise Ratio (SNR) and wireless signal strength,” 30 07 2017.
[Online]. Available:
https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Wireless_fundamentals%3A_Signal-to-
Noise_Ratio_(SNR)__and_wireless_signal_strength. [Accessed 04 05 2018].
[27] J. Gutierrez, “IEEE 802.15 WPAN™ Task Group 4 (TG4),” 27 01 2010. [Online]. Available:
http://www.ieee802.org/15/pub/TG4.html. [Accessed 04 05 2018].
[28] L. M. L. Oliveira, J. J. P. C. Rodrigues, A. G. F. Elias and ·. G. Han, “Wireless Sensor Networks in IPv4/IPv6
Transition Scenarios,” Wireless personal communications, vol. 78, no. 4, pp. 1849-1862, 2014.
[29] sieben, “Timers,” 10 12 2014. [Online]. Available: https://github.com/contiki-os/contiki/wiki/Timers. [Accessed 15 05
2018].