Circle Image

Communication

Descriptive part


The Communication course is composed of five modules in which we study protocols for IoT networks. It was an interesting module with a lot of different subjects around the IoT. We study energy harvesting, wireless communication, security of the networks and evolution in these fields.
The first module concerns the main communication protocols for connected objects towards sutdents presentations. Furthermore, we have studied precisely the MAC layer and the various associated protocols. This course is directly related to the one concerning the evolution of cellular networks (3G to 6G) and their characteristics.
The second module, is about digital wireless communication for connected objects. we learnt modulation techniques used for wireless protocols.
The third module is about energy for connected objects. We saw how to energy management and storage for connected objects, but also energy recovery from different sources.
The fourth module is about security for network of connected objects. The concepts introduced revolve around the security management of all types of connected devices and the problems that arise from them.
Finally, the fifth module is about emerging networks. We saw tehnologies that can be interesting for current networks. Furthermore, we talk about the SDN (a network architecture model) and LISP (network protocol).
In this page you will find all the information about the different modules and the technical challenges around them. I also highlight the knowledge and skills acquired during this entire course.

Protocols for connected objects


Communication protocols

Throughout the course sessions, there were a lot of assignments in order to evaluate how well we understood the notions. Indeed, We conducted group research (consisting of a written report and an oral presentation) for which we had to choose among the WSN protocols proposed: LoRA, Sigfox, BLE, ZigBee, NB-IoT and M2M. We chose to focus our study on the Narrow-Band IoT (NB-IoT) in a 5G context. We explain the characteristics of the physical layer and the radio interface (frequency, modulations...), as well as the description of the MAC layer. Also, power consumption and safety around this protocol were discussed.
I also realized a second deliverable individually this time on the MAC protocols dedicated to the WSN (this work is explained in the Technical part).

From 3G to 6G

During the "3G to 6G" module, we were able to discuss technological developments concerning cellular networks and future ambitions. I was also able to be made aware of the importance this brings in a more connected society in search of the quality, speed and reliability of wireless communications. The challenge was to achieve a state-of-the-art 5G technology and the contribution of the Swedish telecommunications company, Ericsson. We focused our analysis on the IoT world. Through this research work, I was able to soak up improved features on the network connection that 5G brings. Below is our presentation for more details.

Emerging networks


The Emerging networks module focused on current network advances. Moreover, I was able to see in detail the technologies SDN (Software Defined Networks) and NFV (Network Functions Virtualisation) which are in smooth to revolutionize in the long term the architectures of the networks of the operators and allow new services to be deployed much faster and with significantly lower costs.
Through two lab sessions, I was able to get an experimental overview of the SDN and everything related to network virtualization. This was an interesting challenge for me, having previously only minimum network bases.
Moreover, a knowledge MCQ on the concepts covered during the course sessions allowed me to properly test my understanding of the important notions around these networks. The second part of the evaluation of this module was the analysis of a scientific paper on SDN technologies for the field of IoT. It was an interesting exercise, the IoT being predominant in our semester courses.

Energy for connected objects


During the course sessions, I had an overview of energy harvesting storage, both electrochemical and electrostatic storages. Indeed, depending on the application field (aeronautic...), we can choose primary or secondary batteries, and also associate them with a serial or parallel association in order to fulfill the storage requirements. Then, I again saw in details the use and characteristics of supercapacitors for the electrostatic storage purpose. For instance they can be use in cars, in association with the battery, for the start of the vehicle (acceleration...).
Moreover, we were aware of some IoT use cases, on engineering fields. At the end, we were a written test in order to put into practice our understanding in batteries and supercapacitors uses and the energy storage process. There was no particular difficulties for me because I have already had background knowledge thanks to last year Energy sources course.

Technical part



Protocols for connected objects


Communication protocols

This task was challenging, because I do not really have a huge knowledge in networking and communication protocols. I did the security part. This protocol offers services in terms of security in accordance with the requirements of 5G and connected objects. There were not a lot of scientific papers on the subject, but extensive research gathered much of the information on the security mechanisms implemented in a NB-IoT network. Indeed, it is an important service because data is increasingly bound to be altered and cyber-attacks can multiply against connected devices. Furthermore, the presentations of the other protocols allowed me to have an overview of the security services offered by each (authentication mechanism, data encryption...). Please find attached our report on the NB-IoT protocol.

Concerning the study of the MAC protocols dedicated to the WSN, I realized a brief state of the art of each protocol for which I explained their different characteristics at the level of:
- Clock synchronization
- Localization capability
- Security mechanisms
- Nodes mobility
In addition, I made a brief comparison of these different MAC protocols.

Software Defined Radio (SDR)

This module focused mainly on signal processing, that I already have notions about it thanks to last year. We had a series of labs that focused on Software Defined Radio. The idea with SDR is to use a minimum of hardware components, the main features will be implemented by software (demodulation process...). So theses operations are made with a single device, and the signal decoding process is done by software.
The main objective of the labs is to focus on the reception of real communication signals. First of all, we have studied theoretically the behavior of the USRP, by using signal processing formulas, about how demodulation, signal amplitude and data transmission are made. Then, we made an analysis of the receiver. We studied a FM broadcasting record with the GNURadio development environment. Finally, we focused on the reception of VOLMET messages in AM.
To achieve these goals, we made different signal processing: filtering (unwanted frequencies, some noise), frequency transposition... With the GNUradio GUI, we can easily implement these operations. I didn't have many difficulties to understand this software because it was close to Matlab that I used every year.

Analytical part


This course came at the end of the semester. It gathered a lot of networking notions applied for the IoT field.

For the "Protocols and communication" modules, I have acquired the required skills. Indeed, thanks to my basic knowledge of networks that I was able to develop in the 3rd and 4th year during a dedicated module, I could not have great difficulty in understanding the theoretical notions concerning communication protocols, the emergence of new network architectures, and to apply them in concrete labs. Moreover, concerning the energy of the IoT systems, having already been made aware last year on the sources of energy for the onboard systems, I did not have any difficulty in this part of the module.

However, the "security for IoT networks" was more challenging for me. I didn't have enough theoretical knowledge about security mechanisms at the communications level. However, with the help of colleagues from the IT and network sectors, I was able to understand in depth the security mechanisms to be applied to IoT needs.

Skills to acquire Learning mode (?) IP: Initial Training
SP: Self Training
PE: Peer Exchange
PP: Professional Practice
Expected level (AE) (?) 1 = level of application: follow-up of instructions or procedures
2 = level analysis: improvement or optimization of solutions or proposals
3 = level of control: design of programs or definitions of specifications
4 = level of expertise: definition of guidelines or strategies
Self-evaluation (?) 1 = level of application: follow-up of instructions or procedures
2 = level analysis: improvement or optimization of solutions or proposals
3 = level of control: design of programs or definitions of specifications
4 = level of expertise: definition of guidelines or strategies
Protocols and communication
Understand the major development phases for mobile communications and development of the associated technology IT 4 4
Understand the impact of new mobile technology IT 4 4
Be able to analyse and evaluate optimal wireless network technologies IT + PE 4 4
Be able to suggest optimal technological solutions for IoT networks IT 4 4
Understand and master optimisation of communication protocols for IoT with respect to energy limitations IT + PE 4 4
Understand and master optimisation of communication protocols with respect to security concerns IT 4 3
Know the main processing techniques used for digital communication and know how to explain the basic structure of digital RF transmitter-receiver IT + PE 3 3
Mastering the architecture of an energy management system, simple storage, energy recovery, know how to size the storage element according to the specifications IT 3 3
Security for IoT networks
Understand the fundamentals of security IT + ST 4 3
Be able to identify security weaknesses in an IoT architecture IT + PE 3 3
Be able to assess the impact of exploiting a security vulnerability in an IoT architecture IT 3 3
Be able to propose adequate security counter-measures IT + ST 3 2