ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Aalborg University Copenhagen Semester: ITCOM 4, Spring 2013 Title: Smart Home Networks Aalborg University Copenhagen A.C. Mayers Vænge 15, 2450København SV, Denmark Project Period: February-June 2013 Semester Coordinator: Morten Falch Secretary: Maiken Keller Semester Theme: Smart Home Technologies Abstract: Semester Coordinator: The main objective of this project is to analyse Smart Home networks. The theme of the project stated that the Secretary: Supervisor(s): project has to include the learning goals of the course Niels Kofoed Communication and Media technologies and use them in the project. Project group no.: 5 We choose the topic of Smart Home Networks, which we analysed in many sorts of ways. Members: Frederik Guldbaek Nielsen This report contains various elements about the process in which we created the Smart Home ideas: Methodology describes the methods used and what we did. Market analysis like SWOT and Stakeholders are also factors in the process of creating Smart Home ideas. The first part of this report clarifies the network part of ________________________ Martynas Mackopetris the project. It describes technologies, what tools that can be used and it includes Smart Home architectures. It gives the reader a good overview of the Smart Home technologies. The second part focus on marketing and user scenarios, where the reader can get an insight of how the Smart Home works. ________________________ The report is focused on creating ideas for “Smart Home Networks” rather than actual developing a final product. Copies: 3 Pages: 104 Finished: 2013-06-04 It is therefore more focusing on being an overview of all the “Smart Home Network” technologies, rather than making a final product for the market. Using theory only, this report gives a written concept of a Smart Home network, which must be tested before it is a final product. 1 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Smart Home Networks Semester project 4, 2013 Written by: Martynas Mockapetris Frederik Guldbæk 2 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Table of content Introduction ....................................................................................................................................................... 7 Problem Formulation......................................................................................................................................... 8 State of the art................................................................................................................................................... 8 Introduction ................................................................................................................................................... 8 Philips Smart Home development – Philips Dynalite .................................................................................... 8 LG’s Smart Home Service............................................................................................................................. 11 Methodology ................................................................................................................................................... 12 Process for idea ........................................................................................................................................... 12 Different research methods and how we used them in our project ........................................................... 12 Data Collection ............................................................................................................................................ 12 Deduction and Induction ......................................................................................................................... 13 Qualitative and quantitative data ........................................................................................................... 13 Our goals...................................................................................................................................................... 13 From idea to actual writing ......................................................................................................................... 15 Testing ......................................................................................................................................................... 15 Smart home system principles ........................................................................................................................ 15 Artificial intelligence .................................................................................................................................... 15 Monitoring ................................................................................................................................................... 17 Network ....................................................................................................................................................... 18 Internet .................................................................................................................................................... 18 Telecommunication network .................................................................................................................. 19 Computer Network .................................................................................................................................. 20 Wi-Fi......................................................................................................................................................... 20 IP Addresses............................................................................................................................................. 20 Sub Conclusion ............................................................................................................................................ 21 Technologies .................................................................................................................................................... 21 Topologies ....................................................................................................................................................... 27 Basic architecture ........................................................................................................................................ 27 Topology compare ....................................................................................................................................... 28 Which one is the best one? ......................................................................................................................... 30 Quality of Service............................................................................................................................................. 30 Definition ..................................................................................................................................................... 30 Traffic qualities ............................................................................................................................................ 31 3 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Media Delivery Index (MDI)......................................................................................................................... 33 Mobile IP-Bases Smart Home Architecture ..................................................................................................... 34 Introduction ................................................................................................................................................. 34 Smart Home systems ................................................................................................................................... 35 Proposed architectures for Smart Homes ................................................................................................... 37 Sub Conclusion ............................................................................................................................................ 37 Working principles ....................................................................................................................................... 38 OPNET .............................................................................................................................................................. 40 Sub Conclusion ............................................................................................................................................ 42 SWOT ............................................................................................................................................................... 42 Comments to the maxi-maxi strategies: ..................................................................................................... 46 Comments to the mini-maxi strategies: ...................................................................................................... 46 Comments to the maxi-mini strategies: ...................................................................................................... 47 Comments to the mini-mini strategies:....................................................................................................... 47 Sub conclusion: ............................................................................................................................................ 48 Stakeholders .................................................................................................................................................... 48 Introduction ................................................................................................................................................. 48 Our customers ............................................................................................................................................. 50 Average Household (Family).................................................................................................................... 51 Engineer ................................................................................................................................................... 52 Government (Schools, Universities, etc.) ................................................................................................ 53 Government................................................................................................................................................. 53 Perfect Competition ................................................................................................................................ 53 Monopoly ................................................................................................................................................ 54 Oligopoly .................................................................................................................................................. 54 Other developers (competition) .................................................................................................................. 54 People who does not have a smart phone .................................................................................................. 55 Celebrities contributing to the project ........................................................................................................ 55 Big fish companies seeking for the newcomers with high potential........................................................... 55 Philips ...................................................................................................................................................... 55 Siemens ................................................................................................................................................... 55 Sub Conclusion ............................................................................................................................................ 56 Requirement Specifications............................................................................................................................. 56 Functional requirements ............................................................................................................................. 57 4 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Non-Functional requirements ..................................................................................................................... 62 User Scenarios ................................................................................................................................................. 64 Smart Home idea ......................................................................................................................................... 65 Entrance................................................................................................................................................... 66 Living room .............................................................................................................................................. 67 Kitchen ..................................................................................................................................................... 69 Bedroom .................................................................................................................................................. 71 Bathroom ................................................................................................................................................. 73 Basement ................................................................................................................................................. 75 Shelter...................................................................................................................................................... 76 Smart Home cons and pros ............................................................................................................................. 76 Advantages .................................................................................................................................................. 76 Disadvantages.............................................................................................................................................. 77 Use-cases ......................................................................................................................................................... 78 Use case 1 Connection between smartphone and control panel ............................................................... 78 Use case 2 - Connection other devices to the bridge .................................................................................. 79 Use case 3 - Connection between smartphone and Fridge: ....................................................................... 80 Use case 4 - Connection between smartphone and Bathroom lights ......................................................... 82 Use case 5 - Connection between smartphone and curtains ...................................................................... 83 Use case 6 - Connection between smartphone and sink ............................................................................ 84 Use case 7 - Connection between smartphone and OLED Screen .............................................................. 85 Discussion ........................................................................................................................................................ 87 Introduction ................................................................................................................................................. 87 Routing and Addressing............................................................................................................................... 87 Internet Connections ................................................................................................................................... 88 Dial-up access .......................................................................................................................................... 88 Cable – Broadband Internet Connection ................................................................................................. 88 Wireless Internet connections................................................................................................................. 88 OC3 – Optical Carrier ............................................................................................................................... 89 Tier Carrier ............................................................................................................................................... 89 Routing and Forwarding .............................................................................................................................. 89 Routing algorithms ...................................................................................................................................... 90 Link State Algorithms................................................................................................................................... 91 Routing protocols ........................................................................................................................................ 92 5 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Addressing ................................................................................................................................................... 94 Quality of Service for Streaming Media ...................................................................................................... 95 Building the concept .................................................................................................................................... 97 CONCLUSION ................................................................................................................................................... 99 Shortcuts:....................................................................................................................................................... 101 Reference list: ................................................................................................................................................ 103 6 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Introduction In this paper we will clarify the state of the art, technologies and market perspectives in Smart Home development. By getting a great overview of the Smart Home state of the art in the beginning of the paper we set a founding understanding used in the rest of the project. The paper then give an insight in Smart Home technologies, which are used in Smart Homes and completes the analysis with a comparison of which technologies are best in our Smart Home case. This project specifies the requirements and gives realistic use scenarios in which Smart Homes are relevant. The information is also used in the market perspectives with SWOT and Stakeholder analysis. The paper ends with a discussion which leads to a conclusion where ideas and facts a put into a perspective in order to answer the problem formulation. 7 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Problem Formulation How do smart home technologies work and what requirements does it take to create a Smart Home network? 1. Which technologies and protocols are more efficient and reliable than others, when creating a Smart Home network? In which way did Smart Home affect the daily life of people using it? 1. How are people capable of using Smart Home technologies? 2. Who are the different stakeholders and how do we address them? How to make 21st century homes smarter than it is already? 1. How to provide a better security for intelligent homes? 2. How to merge different technologies together? State of the art Introduction Before starting to go deeper into Smart Home networks, a research of already existing Smart Homes was done. This kind of research gave a clearer look on what has to be done in order to make homes smarter and which parts that has to be improved over time in order to make homes more advanced. In this part we will give you a brief overview of Philips and LG already developed technologies. Philips Smart Home development – Philips Dynalite1 Orchard House Is an eight bedroom detached residence in Wimbledon Common in South London, to offer customers unparalleled scale and luxury. The house has 3 floors and provides indoor pool and spa complex, multiple car garage and security lodge. Philips Dynalite systems control the lighting 1 http://www.lighting.philips.com/main/subsites/dynalite/index.wpd?gclid=CMKHotGZmLYCFREfzQod0VQAbQ 8 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik circuits, heating, gas fires and air conditioning. The house is also provided with the mood lighting, the control panel is located in the entrance so the customer can set up the mood of each floor in a colour touchscreen panel. Schematic control allows controlling LED display in every room separately. The innovation was designed not only to fulfil the customer demands but also to reduce the energy waste and save lamps lifespan. Figure 1 2 Products and technologies used: Each of the climate control systems are fully integrated into the Philips Dynalite network also including the under-floor water heating system and air conditioning system which is integrated via a LonWorks interface. This solution helps to integrate all Smart Home ideas into Philips Dynalite control panel. Client benefits: Control panel with OLED display can be used to control the lighting in the whole house, each room separately. All the light circuits are programmed to operate at 95 per cent just in order to save up the energy waste and enlarge lamps lifespan. 2 www.phillips.com 9 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Hello and Goodbye modes which alternatively turn on or off all of the lighting circuits. Al-Yamamah University: The scope of the system included the installation of an intelligent home automation system in all 224 apartments of Al-Yamamah University. System was designed to control HVAC, lighting and electrical sockets and monitoring power usage in each room. System controls in each apartment are implemented in the way that in the future it can be updated or upgraded at any time. Each apartment control system works as standalone entity, in order to make it more advanced, rooms were provided with wireless connection in order to allow control the system via iPad or iPhone using the Philips Dynalite DynamicTouch software. Rozelle Residence: For this project LEDS throughout with RGB LEDs used to illuminate the courtyard and fountain located in a glass-roofed enclosure below ground level. Combination of controllers were used with Philips Dynalite, including DDLE802 leading edge, DDRC1220FR-GL relay, DDBC1200 ballast and DDMC802 multipurpose controllers. Dynalite DR2P keypads were used, featuring stainless steel fascia, charcoal buttons, blue LED indicators and white LED backlights, although much of the system is automated through the use of a built-in DDTC001 time clock and DUS804C sensors. System modes as “welcome home”, “goodbye” or “holiday” helps to make the home safer since first two options helps to lock up the garage indicating the way to the living room from the garage and vice versa. “Holiday” mode helps to prevent apartments from burglary since it activates preprogramed cycle of lights to make it look that someone is living in the apartment also “holiday” mode completely turns off heating to prevent extra costs. In more advanced way there are master bed room additional feature like “his” and “hers” switch to control all lights at night downstairs. This can be achieved by iPad software. Customer Benefits: Very stylish house that keeps its heritage roots while delivering a modern, luxurious living environment. Automation is very simple and practical. 10 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Philips Dynalite has done more projects:3 Tennyson Point George Apartments Finchley House Coast Apartments Ensor Mews North Narrabeen Residence LG’s Smart Home Service “LG Electronics showcased the convenience-enhancing features of its Smart Home Service at the 2013 International Consumer Electronics Show (CES). The advanced system combines the sophisticated media sharing technologies of SmartShare with the integrated home appliance management capabilities of SmartControl, enabling the user to take complete command of their Smart Home environment”.4 Consumers can start their laundry, check what is in the fridge, or have the floor vacuumed, all while they are away from home. Additionally, it is possible to control the washer or range oven from the couch with LG’s Smart TV and Magic Remote. Thanks to LG’s SmartControl app, household chores no longer have to get in the way of watching a favourite movie or show. SmartShare is featured with a one-touch NFC tagging to instantaneously transfer media content from one device to another using WiFi or 3G/4G. Users can easily share photos, videos and other content stored on a smartphone or laptop with their LG Smart TV. The SmartShare application offers an integrated content view which lists all files located on each connected device; making searching and accessing content easier than ever. LG’s convergent home appliance management system, SmartControl, adds further value to LG’s exceptional range of Smart Home appliances. After NFC one-touch registration, it is possible to 3 4 http://www.lighting.philips.com/main/subsites/dynalite/projects/smart_home/ www.lg.com 11 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik effectively manage LG’s smart washer, refrigerator, range oven, or HOM-BOT from the SmartControl interface. Delivering greater convenience, the easy-to-use application keeps the user firmly in control, regardless of their physical location. SmartControl also enables the user to remotely monitor LG’s super-efficient Smart Home system and to give simple voice commands to their appliances via smartphone. Methodology Process for idea This is a short summery of how we came up for the idea to this semester project. First we got a few different topics for the semester project and then chose Smart Home as our topic for the project. Then we brainstormed ideas within the Smart Home topic to find out what we already knew about the topic. We then choose to focus on Phillips LED lights as a Smart Home solution and then evolved our project around that system. After realizing that the project had enormous depth we chose to try to make our own Smart Home solution using the idea from Phillips LED lights and having it in mind as we wrote. Different research methods and how we used them in our project This part explains some of the research methods used in the project and how they were or could be implemented when working with Smart Homes. Data Collection As we did not have any user involvement beside friends and family in this project the Data Collection was strictly literature reading and other explicit knowledge written or quoted by other researches. If the project should be investigated further Data Collection methods with user involvement would be preferred. Sample surveys where a certain amount of a target group is asked and analysed would give a great and fast overview of our target groups. A disadvantage of this is that every person in each target group is different, which gives a sample survey less details 12 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik than an all-round survey, however an all-round survey demands a huge workload and efforts compared to a sample survey. Deduction and Induction Deductive reasoning works from the more general to the more specific. It begins with thinking or making up a theory about Smart Home technologies. Then it is narrowed down into more specific hypotheses that we can test, which we can do by using OPNET, when trying to create our Smart Home. It can then be narrowed down even further when we collect observations to address the hypotheses about our Smart Home technologies. This ultimately leads us to be able to test the hypotheses with specific data -- a confirmation (or not) of our original theories to see if these technologies really can merge or not. Inductive reasoning works the other way around, moving from specific observations to broader generalizations and theories. In inductive reasoning, we begin with specific observations and measures, this could be an already installed Smart Home application seen in OPNET. We then begin to detect patterns and regularities, formulate some tentative hypotheses about how the system is working and we can now explore if they are true. Finally in the end based on our observations we can end up developing some general conclusions or theories about the Smart Home application or technology. Qualitative and quantitative data Another research fact is that when dealing with user involvement you have two types of data: qualitative and quantitative data. If qualitative data is necessary interview of professors or Smart Home developers would provide depth and great knowledge of the subject would provide us with qualitative data. If quantitative data is necessary surveys are a good way of getting an overview and lots of data to use in statistics and other ways. Our goals For this project lot of goals was created of which we tried to for fill them while writing this paper. In this next part it is described how some of these goals were approached and which methods were used to reach the goals. Find the technologies that are used in Smart Homes. 13 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik We used data collection methods that are very objective since these were literature reading of hard facts and no personal opinions or interviews were done to for fill this goal. Specify Stakeholders This was actually one of the hardest goals to reach as we had to imagine which person would use this kind of technologies, how they would and if they are capable of doing so. After we imagined the persons of whom could have an interest we needed to find out exactly how they fit in a Smart Home comparing them in all sorts of way. So this method started with a theory of our stakeholders and then ended with a confirmation, which in any case of finding our stakeholders was a deductive reasoning. How to merge more technologies After choosing which technologies we would like, a program called OPNET, which is explained later, was used. So our method was using data preparation and from testing to see if the technologies would merge and how the design would look like. How can we make improvements for Smart Homes? This was the largest goal and we had to use both theoretical knowledge and empirical as we tried to reach this goal. Using empirical knowledge already known we could imagine the causal hypothesis which comes to effect when working with people. Cause-effects and relationships were imagined in our stakeholders analysis and user scenarios – where also our friends and family came with insight in how they would use a Smart Home. For theoretical knowledge we kept using our literature review as guidance to remember what was previously and what the state of the art technologies for Smart Homes are. If we would want to test our Smart Home solution and ideas later, we would have to take in count the nomathetics5 to remember what the norms and standard is for a Smart Home and the probalistics. Basing our statistics from OPNET with our research finding out what the probabilities of a successful Smart Home system would be. 5 Mayr, E. This Is The Norms: The Science of the Living World. Cambridge, MA: Harvard University Press, 1997 14 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik From idea to actual writing After the foundation was found for the project we did researching by knowledge collecting. We did literature reading and explicit knowledge gathering too. Technological analysing was done, where all the different techniques were analyse to give a comparison to see which technologies were best in our case. To give an understanding of what our ideas was like if they were used in real life we did user scenarios where we picture the Smart Homes both graphic and in words. Testing If we will continue our further investigations about the Smart Home development and to build our concept OPNET will be the solution, a brief description of OPNET is explained below. In order to realize the ideas it is less expensive to do it over special software where developer can follow all actions and performance over the computer. OPNET is one of the solutions to do this, this application helps to analyse tests or improve the existing Smart Home network with a new protocols or devices. By that developer can see how the performance of Smart Home is changing. Whenever by the time adding more and more devices it is obvious that it will take more protocols to connect devices with each other and OPNET allows developers to do so and by allowing to do this the program also shows the reliability of the performing protocol. This leads to a results whether this protocol is really the best pick to implement in the network in order to connect the device or not. Assuming the great prospects of this application, great reviews and possibilities this will be the first step realizing our own Smart Home idea before showing the real concept to the public. Smart home system principles Artificial intelligence Artificial intelligence is the intelligence of machines or software and also a branch of computer 15 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik science that studies and develops intelligent machines and software. Artificial intelligence in the future can help many lives, since scientists sees the AI it will be a revolution. These days artificial intelligence can create an environment where a group of sophisticated appliances and devices can infer and suitably react according to changing conditions and events 6. By identifying abnormal or unexpected events and, when necessary alerting the home’s occupants the home intelligence module can provide an immediate automatic response if desired. Events describe and define the behaviour of the intelligent home. Events might be related to health, convenience, security or any other practical issue. Artificial intelligence must enable centralized management and monitoring of all events, leveraging main alerts and obtaining input from several devices and the same time. For example, an alert could be initiated if, when the doors are locked and the house is presumed to be empty, a window is suddenly opened. Artificial intelligence must have learning module and reasoning capabilities from the home intelligence by caused events or software setups. Looking to the future artificial intelligence must have a virtual “brains” in order to have an understanding and conversation capabilities with a house holder where holder could order to a robot so he could set up the settings to the required ones. Looking deeper into the future Smart Home artificial intelligence should be so sophisticated that it could read the mood or behaviour of people how they are entering the house and set up it automatically without even person ordering home “brains” how to set up the house for best pleasure. Even though it seems the aim of creating the home “brains” is a hard process to create. The process seems to develop all the time and it is also improving. This shows that improvements can be done everywhere and all the time with Smart Home intelligence. However this requires time in order to develop these intelligences and there can happen all sorts of problems. For example intruders can falsify the commands since the sophisticated intelligence will only read the commands and fulfil them, by not knowing if the person is a true house holder. This requires voice recognition in order to make it suitable and address the security issues to make it safe to use. Additional ideas like person identification by hand or eye or simply by scanning cameras information by the height of person can identify if the person is really the house holder. All in all we could imagine and presume a future home when Peter and Ann comes back from a party and 6 http://www.sersc.org/journals/IJSH/vol4_no4_2010/4.pdf 16 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik by their voices command and they are setting up the orders to make them a cup of coffee, turn in the romantic music, change the LCD screen icons to more atmosphere suitable, dim the light to more suitable and cosier atmosphere. Unfortunately when thinking about state of the art technologies which we take in consideration multi functioning devices as a connection between the intelligence and person to make homes smart are not available in such functions. Furthermore this step can be considered as a middle line between the past and future homes and how researchers would like it to be as. Monitoring There are different screens that can be used when monitoring the performance of the Smart Home energy usage. They can be displaying wallpapers on them, starting from Plasma screens finishing with OLED screens7. All four technologies including LCD screens are vastly different, particularly how each screen is lit. Plasma screens using the phosphors that create the image on the screen light up themselves, and do not require backlighting. Comparing to a LCD screen liquid does not illuminate which requires a separate light source. This is where the difference from regular LCD and LED screen comes in. Traditional LCD screens use cold cathode fluorescent lights (CCFL) to illuminate the screen. LED screens use light emitting diodes (LED) to illuminate the display. LED backlighting has become more common than CCFLs is only used on “budget” screens. OLED is a new large-screen technology. The panel is made out of millions of tiny LED’s. The letter O stands for organic which means there is carbon within the molecules of the emissive layer of the panel. Comparing separately several factors can be influenced by the type of screen that is used to display the images. Among them there are factors such as screen thickness, brightness, darkness, energy efficiency and price. Closest to fulfil all these goals are LED screens, unfortunately the price of these screens comparing to other two technologies are the highest. Taking in consideration that the user wants to have the best image quality he can possibly get it comes a fact that some tests has to be made to understand which screen is actually providing that quality. Black and white colour tests helps to analyse which screens can actually display shadows and sun flashes, since it is very common that something that is behind those shadows or flashes are also very important. In the testing reviews LED screens showed the best results by giving the 7 http://www.pcmag.com/article2/0,2817,2387377,00.asp 17 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik lowest level of black which can possibly be – 0.01 cd/m2 and giving the highest white level of 382.62 cd/m2 comparing these two numbers we are getting an outstanding contrast ratio of 382262:1 while plasma screens can only offer 2848:1 ratio. Looking at the power and size is a winner everywhere LED screens are thinner, lighter and the energy efficiency is nearly three times lower comparing to plasma screen. If the Smart Home must be provided with the best technologies the OLED is by far the best customer can have, however considering the cost cheaper products can be installed to save the primary costs of the house. Network Internet8 The internet is a global system of interconnected computer networks that use standard TCP/IP internet protocol suite. The internet carries an extensive range of information resources and services. Every computer that is connected to the internet is a part of a network. All computers connected to the internet has a service provider, however before that a group of computers can create a local area network. In every region internet providers have a point of presence (POP), the place for local users to access the internet provider’s network. All networks rely on network access points (NAP), backbones and routers to reach each other. Routers determine where the information has to be sent from one computer or device to another. A router is useful in dealing with two separate computer networks, it joins the two networks, passing information from one to the other. It also protects the networks from one another. What is more it also protects networks from one another preventing the traffic on one from unnecessarily spilling over to the other. Internet backbones are fiber optic trunk lines, that has multiple fiber optic cables combined together to increase the capacity. 8 http://www.hgb-leipzig.de/artnine/huber/writings/internete.html 18 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Telecommunication network9 Telecommunication network is what brings Smart Homes into one big piece. Telecommunication networks are a collection of terminal nodes, intermediate nodes and links which are connected so as to enable telecommunication between the terminals. The transmission links connects nodes together; nodes are using circuit, message or packet switching methods to pass the signal trough the correct links and nodes to reach the correct destination terminal10. Each terminal in the network usually has unique addresses so messages or connection can be routed to the correct recipients. However if the address is the same a solution of different ports can be implement to reach the specific recipient. All this unique address collection is called the address space. Messages are generated by a sending terminal, then passing through the network of links and nodes until they reach the destination terminal. It is the job of the intermediate nodes to handle the messages and route them the correct link toward their end destination. This kind of messages consisting of control and bearer parts which can be sent both ways, separated or at once. Control message is consisting instructions how the message should be routed though the network. Bearer part is consisted of the content the user wants to transmit: Requests, voice commands etc. Network tree11 Figure 2 9 http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Telecom_Whitepaper_Telecommunication _Networks_Security_Management_01_2012.pdf 10 Introduction to Telecommunication network Engineering, Second edition, Anttalainen Tarmo, 2003, Chapter 2 11 http://farm5.staticflickr.com/4040/4266789711_65d733e2c4_z.jpg?zz=1 19 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Computer Network12 Before even starting to develop a Smart Home it is very important to understand what a system needs, how it has to be created and to know even very basics of the computer network to even start pairing devices. A computer network is a telecommunications network that connects a collection of computers or devices to allow communication and data exchange between systems, software applications and users. Computers that are involved in the network that originate and terminate the data are called nodes. Two devices are networked when a process in one device is able to exchange information with a process in another device. Wi-Fi13 It is a popular technology that allows users using electronic devices to exchange data wirelessly using radio waves over a computer network including high speed internet connections. The device that can use Wi-Fi can connect to a network resource such as the internet via a wireless network access point. Wi-Fi can be less secure than wired connections because an intruder does not need a physical connection. In order to use Wi-Fi a device must be a station14 which means that the device has to have a wireless network interface controller. All these stations using single radio frequency communication channel. Wi-Fi these days provides services in private houses, public spaces Wi-Fi hotspots which are set up free-of-charge or commercially, and independent businesses. IP Addresses15 Every device which is using internet has a unique Internet protocol (IP) address. There are two versions of IP that are used these days IPv4/IPv6. IPv4 is offering approx. 4.3 billion addresses. However the population is growing and so is the number of devices that are being used. This is what led to the realization of IPv6 which offers 2128 possible addresses. IPv4 is a 32bit numbers and IP address is show: 62.61.145.89. IPv6 is a 128bit and IP address is displayed like this: 2001:0:5ef5:79fd:1022:14e8:c1c2:6ea6. Each of the versions has reserved a part of IP addresses for private networks, multicasting, private addresses or internal networks. 12 http://tecschange.org/classic/networks/network-syllabus.html http://www.webopedia.com/TERM/W/Wi_Fi.html 14 Mobile Communications, Second Edition, Jochen Schiller 15 http://netforbeginners.about.com/od/i/f/ipv4_vs_ipv6.htm 13 20 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Sub Conclusion It is necessary to analyse the whole network structure to get a better overview of what it takes to make a Smart Home and to make the system efficient and reliable, secure and fast. It is obvious in order to make a development of a Smart Home, the developer must have deep skills in many sections to start creating something useful. When making this kind of deep researches in each possible way it gives more threats of where the system can fail, however it can give a better solution, inspiration or replacements to make the system work better. Technologies These days it is still hard to develop Smart Home ideas since the communication between each object is very different and this requires a lot of protocols to be used in order to combine a Smart Home as a one piece. Using many protocols can be inefficient and unreliable since malfunctions can occur during the process. To give a better overview about the protocols used in Smart Homes we will describe them each individually below16: INSTEON17 - Wireless home controlling system. It is a dual-mesh control and sensing remote control technology. Lighting control, leak, door and motion sensing, garage door control are amongst the most popular applications. INSTEON uses unique, dual-band approach to provide reliability not attainable by single band technologies. Using both existing power lines in the home and radio-frequency communication INSTEON adds remote control for lighting and home applications of all types. INSTEON allows customer to manage his property system in the way the customer wants. Furthermore INSTEON technologies are easy to install, INSTEON is a good example how to make Smart Home, how to make them fun and safe. Advantages: - Using both radio frequency signals and electrical wiring to connect to each other. - Every device is acting as a repeater - Simple and universal 16 http://hometoys.com/emagazine.php?url=/ezine/11.10/calderone15/index.htm 17 http://www.insteon.com/about-home.html 21 ITCOM4 2013 - AAU-CPH Group 5 Martynas & Frederik No controller or network setup is required Disadvantages: - Cloud-based offering, which relies on Smart Home continuing to run this service for years to come - Not as full featured as some higher end products with complex macros and scene configurations Smartphone (Android/iOS) only, no PC software or no decent direct web interface ZigBee18 – “green” technologies that offers global wireless standards connecting the widest range of devices to work together intelligently. ZigBee allows user too easily and cost reducing add features which improves the efficiency, safety, security, reliability and convenience of customer products. Advantages: - Very low power requirements - Zigbee devices have many applications - Medical monitoring of residents - Operates on several different bands, including 2.4 GHz, 915 MHz, and 868 MHz, sending wireless signals to communicate between nodes. Disadvantages: - Low complexity - Short range - Low data speed - High costs - Used mainly in concentrators, data collectors, repeaters, and meters installed in the urban distribution AMR systems and prepayment systems 18 http://www.zigbee.org/About/UnderstandingZigBee.aspx 22 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Z-Wave19 is one of the newest control systems developed for Smart Homes, Z-Wave differ from others that they can provide a full package with all existing features to control a Smart Home or each feature individually. Furthermore Z-Wave is capable of offering a low price products comparing to other protocols. Z-Wave lets customer to build their Smart Home step by step expanding technologies all over the house adding feature by feature. Using Z-Wave technologies user is able to create his own “end day chain” user can combine couple of features in one to finish the day for example: When the lights are dimmed off coffee machine prepares coffee, temperature sets to a different level and air conditioning humidity sets to a mild sea atmosphere. Advantages: - Convenience - Easy to set up20 - Almost 800 interoperable products Disadvantages21: - All modules have to be polled if you want to get two way status - Slow network - The more modules are used the higher latency is reached HomePlug22 is an industry Alliance comprised of industry leaders at each level of the value chain starting from technologies ending with services and content. HomePlug is providing new services, content to pull demand for network devices, requirements to support devices over the network, custom care and etc. Advantages: - Easy to install - Very high speed – 200Mbps 19 http://www.z-wave.com/modules/Z-WaveSolutions/ http://www.zwave4u.com/content/en/Quick-Start-Guide.html 21 http://www.avsforum.com/t/743146/z-wave 22 http://www.thinkypedia.com/question/34776/ 20 23 ITCOM4 2013 - AAU-CPH Group 5 Martynas & Frederik No cables are needed Disadvantages: - Cost – Main price 80-100 pounds + 50pounds more for each extra adapter - No ability to listen to radio while using radio, since wires will act like antennas 23. USNAP24 - the technology which was developed to manage the thermostat to be built in an inexpensive way so that they could communicate with different other utility systems, such as mentioned above. The first problem that was occurring the company that not all systems are operating over the same networks and protocols. Company goal was not to make another separate network and protocol, but use already existing one in order to connect system into one family. Advantages: - Off-the-shelf residential devices can be compatible with various demand response programs, including OpenADR, Smart Energy Profile, pager, FM, AMI or a proprietary interface. - Consumer products can also connect to a Home Area Network (HAN), Local Area Network (LAN) or home automation network based on wireless standards (ZigBee, ZWave, EnOcean), power line carrier (PLC) standards (HomePlug, LonWorks, G.hn) or wired standards (ClimateTalk or Ethernet). - Consumer purchases could be decoupled from the local utility's technology choices, so a consumer that is relocating can take their appliances with them, and they will be compatible with other programs wherever they go. - Utilities may select and evolve their communication systems and DR program characteristics over time without impacting the consumer's products. - Appliance service can last for 20 to 30 years without risk of obsolescence due to evolving communication systems. - 23 24 A single communication module may work on multiple end devices. http://news.bbc.co.uk/2/hi/programmes/click_online/4080566.stm http://www.usnap.org/ 24 ITCOM4 2013 - AAU-CPH Group 5 Martynas & Frederik No electrician or utility service calls are required to add a new device to a program. Disadvantages: - Slow data rate - Requires a large infrastructure of repeaters X1025: Is a protocol primarily uses power line wiring for signalling and control. Packets transmitted using the X10 control protocol consists of a four bit house code followed by one or more four bit unit codes, finally followed by four bit command. When system is installed, each controlled device is configured to respond to one of the 256 possible addresses (16 house codes – letters from A to P and 16 unit codes – numbers from 1 to 16) each device reacts to commands specifically addressed to it, or possibly to several broadcast commands. X10 is using one method what means that devices only receives commands and do not respond acknowledge about their status to the network, this makes it cheaper. There are 3 type of controllers, simple ones where 4 X10 devices can be controlled, more sophisticated where user can control more units and set timers, and most advanced which can be fully programmed to control the whole house. There are bridges to translate X10 to other home automated standards for example: ioBridge can be used to translate the X10 protocol to a web service API. It is estimated that X10 compatible products can be found in over 10 million American homes. This is because it has so many advantages over other types of remote control products and systems Advantages: 25 - Inexpensive - No new wiring is required -- perfect for retrofit - Simple to install - 100's of compatible products - Control up to 256 lights and appliances - Time proven -- it has been around for over 30 years http://www.smarthome.com/about_x10.html 25 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Disadvantages: - Signals from a transmitter on one live conductor may not propagate trough the high impedance of the distribution transformer winding to the other live conductor - It is not suitable as a safety device. Switching a device off via X10 doesn't necessarily mean the device is now isolated from the power supply since the X10 module is still live. - The X10 protocol does not include any form of error analysis. If two X10 controllers send a signal to a device at one time, they may interfere with each other and neither command may be carried out. - There is a time delay in sending signals - up to one second. - Other electrical devices in the house can create interference on the power lines, which may prevent X10 signals being received by modules. - It doesn't allow more complex forms of communication, e.g. selecting a channel on a television. UPB26: Is a protocol for communication among devices used for home automation. It uses power line wiring for signalling the control. UPB was developed by Power Systems of Northridge. In compare against X10, X10 have 70-80 percent reliability without firewalls, while UPB has more than 99 percent reliability. Power line carrier control overview - UPB communication method consists of a series of precisely timed electrical pulses (called UPB Pulses) that are superimposed on top of the normal AC power waveform (sine wave). Receiving UPB devices can easily detect and analyse these UPB Pulses and pull out the encoded digital information from them. Controllers - They differ from extremely simple plug-in modules to a very sophisticated whole house automation controllers. Simplest controllers are used to carry out a small range of devices. Advanced controllers can control more units incorporate timers that performs pre-programmed functions in a specific time of the day. Whole house automation 26 http://www.pulseworx.com/UPB_.htm 26 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik can be fully programmer, system can execute many different timed events, execute and respond to external sensors. Advantages: - Very reliable - Different controllers to fulfil user needs Disadvantages: - Can be affected by devices on the powerline Topologies Basic architecture Communication networks based on serial data transmission are the platform of up-to-date systems. Task always stays the same – transfer data from one device to other. Network topology describes the physical arrangement of the participants in relation to each other within a network. There can be different types of connection, all of them showed below in the picture, ring, mesh, star, line, tree, bus, fully connected topologies. Over the internet people are connected to the servers, servers connected to the control stations, this chain allows people to have different topology in different server and allow them to connect even though they have different typology type. 27 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 27 Figure 3 Topology compare Tree and bus topologies, they are very similar to each other. Bus topology has a simple structure, all participants communicate over the same line and connected via short stub lines so each participant requires only one interface to the bus. When using the same line, message send to other receiver can be seen within all other bus topology users, which also allows them easily do broadcasting or multicasting. Transmission is controlled by a special bus access control unit which maintain the functions of the bus operated system even if one station fails. Tree topology28 can be called a multiple bus line chain since a tree topology is consisting of multiple bus topologies connect into one group. Using this topology it helps to create larger network areas while bus structure without line repeaters is limited. Ring and star topology; both of them are connected via two-point line. In a ring topology the signal can be amplified whenever it is forwarded, which means long distances can be covered. The disadvantage of the ring topology is that transmission speed depends on the number and processing speed of the participants. Unfortunately this means that the failure of single participant can lead network failure if no extra ring is provided. Star topology centre works in two different ways. It can be as a master for controlling the network or be passive and assume the tasks of star coupler, which allows to establish a connection between the current transmitter and receiver. The 27 28 http://upload.wikimedia.org/wikipedia/commons/9/96/NetworkTopologies.png http://fcit.usf.edu/network/chap5/chap5.htm 28 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik main disadvantage of both topologies is that it can cause an entire network failure due to the central station. Circuit switched networks require dedicated point-to-point connection during the calls. Packet switched networks move data in separate, small blocks (packets) based on the destination address in each packets. When packets are received they are reorganized in the right order in the receiver’s device to display the message. Both technologies are widely used and has its own place to work in, circuit switched network is used to make calls while packet switched is used to retrieve data. Packet switching is much more efficient since it can transfer a huge amount of data. Connectionless: 29the word itself means that to set up a connection in a dedicated end-to-end way you do not need any effort. The connection is usually achieved by transmitting information in one direction from source to destination, without checking to see if the destination did not changed and is still there or if the receiver is ready to receive the information. The system works fine when high speeds are used, disadvantages can be seen in this connection when the speed is low and when it requires to retransmit lost segments before the complete message is received. Connectionless protocols are: IP, UDP, DNS, SNMP, TFTP, ICMP. Connection-Oriented:30 this method is more advanced it uses handshake method to set up endto-end connection. Methods that can be used in handshaking can be very simple like in TCP or difficult communications like in modems. System can only work in bi-directional environment, to negotiate a connection; both sides must be able to communicate with each other. By this analysis we can see that even though Connectionless method has an advantage when high communication speeds are reached and no retransmission is required, but if the retransmission is used there are no data what segments are been lost what will require to retransmit the whole segment again till it will be good. Even though the Connection Oriented method is slower it has its advantage that it follows the segments and if one of them is lost missing packet can be sent again 29 http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml 30 http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml 29 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik in order not to send whole segments from beginning. Which means this at some points can be a more efficient and secure way to transfer data between users. Which one is the best one? Talking about Smart Home innovation, from the first look it seems that using a chained star topology would be the best in order to connect the whole house devices with the routers and routers with the control panel. However it seems that fully connected topology would allow Smart Home to work more efficient, reliable and more secured. From our point of view as developers we think that using two topologies together would cause the best performance. Using star topology to connect and control the control panel with the routers, by using this it will use the secure sending of packets from the control to the router which is responsible for the receiving device. This also means that if any of the packets were lost or out of order the distance between the transmitter and receiver is reduced which also means that it is easier to detect where the problem was caused and to resend the missing packet. Using fully connected topology in the rooms would allow devices to communicate between each other and track the entire working environment in the room where the settings must be set up. Furthermore it would be easier to collect the reports of the done actions. Looking from the perspective way if this kind of report sending might be implemented it can also give a good solution how to track working, not responding, out of order devices. If this would be the issue the report would be sent to the router that the report was failed to collect information for example from the coffee machine and from router it would be directly send to the control panel from where the user would be reached. Quality of Service Definition Quality of service comprises requirements on all the aspects of a connection31, such as service response time, loss, signal-to-noise ratio, cross-talk, echo, interrupts, frequency response, loudness levels and many others. In the field of computer networking and other packet-switched telecommunication networks, the traffic engineering term refers to resource reservation control mechanisms rather than achieved service quality. Quality of service is the ability to provide 31 The Industrial Communication Technology Handbook, Wolfgang Kampichler, 2005, Chapter 4 30 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik different priority to different application, users or data flows, or to guarantee a certain level of performance to a data flow. For example, a required delay, jitter, bit rate, packet dropping probability and bit error rate may be guaranteed. Quality of service guarantees are important if the network capacity is insufficient. A network or protocol that supports QoS may agree on a traffic contract with the application software and reserve capacity in the network nodes, for example during a session establishment phase. During the session it may monitor the achieved level of performance, for example the data rate and delay and dynamically control scheduling priorities in the network nodes. It may release the reserved capacity during a tear down phase. QoS is sometimes used as a quality measure, with many alternative definitions, rather than referring to the ability to reserve resources. Quality of service sometimes refers to the level of quality of service, the guaranteed service quality. Traffic qualities In packet-switched networks, quality of service is affected by various factors, which can be separated into two factors, technical and human. Technical factor is affected by: reliability, scalability, effectiveness, maintainability, grade of service. Human factors can include: stability of service, delays, availability of service, user information. Different things can happen to packets as they go through from transmitter to receiver, resulting these following problems can occur: Low throughput: Due to varying load from other sharing devices on the same network resources, the bit rate that can be provided to a certain data stream might be too low for real-time multimedia services. If for example all data streams get the same scheduling priority. Throughput is usually measured in bits per second in rare cases in data packets per second or data packets per time slot. Talking about the Smart Homes quality as a high throughput is necessary in order to make Smart Home vision real. Throughput describes the rate of successfully delivered messages or requests in this case over a communication channel. This data might be delivered over logical or physical link. Throughput can be analysed mathematically by means of queuing theory, where the load in packets per time unit is denoted arrival rate – λ and the throughput in packets per time unit is denoted departure rate – μ. 31 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Figure 4 Dropped packets: The routers might fail to deliver some packets if their data is corrupted or they arrive when their buffers are already full. The receiving device might ask for this information to be retransmitted, possibly causing severe delays in the overall transmission. Measuring this it is necessary to assure that the dropped packets would reach the device in the first attempt. In order to this some additional packet scanners could be implemented in the control panel to scan the packets before sending them to the receiver to make system reliable, fast and efficient. If system would fail to send packets to the receiver Smart Home control panel might check the whole parameter setup between the transmitter and receiver before starting to resend the packets what would cause customer to complain about the slow product work and a potential delay of efficient Smart Home installation worldwide. Errors: Sometimes packets are corrupted due to bit errors caused by interference and noise, especially when talking about copper wires and wireless communications. The receiver has to detect this and, just as if the packet was dropped, may ask for this information to be retransmitted. This problem might be very touching when trying to develop ideas about the voice recognition commands technologies. Recording devices are almost impossible to record only human voice, recording devices always record everything they are hearing and scanning with the filters the commands that were given by the human. However commands can often be heard less than the extraneous sounds and artificial intelligence which has the possibility to read commands trough the voice commands may not understand the orders and ask to repeat them. Latency: It is one of the most important aspects when talking on system efficiency. Latency is depending on packets reaching their destination and the long time they might take to do that. This might be caused by held up in long queues or by avoiding congestion taking longer routes to reach the receiver. The difference between latency and throughput is that the delay can be built up over the time, even if the throughput is almost normal. Jitter: Packets from the transmitter would reach the receiver with different delays. The packet delays vary with its position in the queues of the router along the path between sender and receiver and the destination can change unpredictably. This variation in delay can seriously affect 32 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik the quality of streaming audio or video. Taking in consideration Smart Home application it is obvious that humans by making request will not be in the same place all the time it is more likely he will move back and forth in the house or make a request for example while driving a car. These different destinations can cause connection slowdowns or even connection loss what will cause jitter while sending packets with the set ups to control panel. In order to solve this issue strong routers and high private network connections must be developed in each home. Out-of-order delivery: When a number of related packets are routed through a network, different packet might choose different road to reach the receiver what can cause different delays. What this means that the sent packets even though were sent in the right order, by choosing different way and receiving different delays the order might be lost in the receivers side. This kind of problem requires special additional protocols responsible for the rearranging out-of-order packets to an isochronous state on they reach the receiver. Media Delivery Index (MDI) The MDI provides a relative indicator of needed buffer depths at the consumer node due to packet jitter as well as an indication of lost packets. By probing a streaming media service network at various nodes and under varying load conditions, it is possible to quickly identify devices or locales that introduce significant jitter or packet loss to the packet stream. By monitoring a network continuously, deviations from nominal jitter or loss behaviour can be used to indicate an impending or ongoing fault condition such as excessive load. It is believed that the MDI provides the necessary information to detect all network-induced impairments for streaming video or VoIP applications. Other parameters may be required to troubleshoot and correct impairments. MDI consists of two components: the Delay Factor (DF) and the Media Loss Rate (MLR). Delay factor is the maximum difference, observed at the end of each media stream packet, between the arrival of media data and the drain of media data. This assumes the drain rate is the normal constant traffic rate for constant bit rate streams. The DF is the maximum observed value of the flow rate imbalance over a calculation interval. This buffered media data in bytes is expressed in terms how long, it would take to fill this data at the nominal traffic rate to obtain the DF. The delay factor gives a hint of the minimum size of the buffer required at the next downstream node. As a stream progresses, the variation of the DF indicates packet bunching or packet jitter. 33 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik The DF is computed at the arrival time of each packet at the point of measurement and displayed and/or recorded at time intervals. A time interval is typically about 1 second. The DF is updated and displayed at the end of an interval. Given a virtual buffer level X where DF is being measured, X = |Bytes Received – Bytes Drained| then, DF = [max(X) – min(X)] / media rate32 Media Loss Rate is the count of lost flow packets over the selected time frame, where the flow packets are packets that are carrying streaming information. There might be more than zero streaming packets in one IP packet. Including out-of-order packets is important as many stream consumer-type devices do not attempt to reorder packets that are received out of order. MLR = (Packets Expected – Packets Received) / interval time in seconds33 The MDI combines the Delay Factor, which measures potential impending data loss, Media Loss Rate is the indicator of lost data. By monitoring both components minimum and maximum excursions over a measurement period and at multiple strategic locations in a network, traffic congestion or device impairments may be detected and isolated for a network carrying streaming media content.34 35 Figure 5 Mobile IP-Bases Smart Home Architecture Introduction Smart home is a set of technologies and services through home network to provide a better quality life. In this section we will talk about technologies for mobile IP and potential applications in Smart Homes security and automation. The qualities of a perfect Smart Home application 32 http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf 34 http://tools.ietf.org/html/rfc4445 35 http://www.ineoquest.com/sites/default/files/mdi_0.jpg 33 34 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik system are also identified and serve as the basis for the design of a ubiquitous architecture for IPbased Smart Home system. The principles of MIPv636 for moving nodes are adopted for a more refined mobility solution. Furthermore we will describe how Smart Home works; architecture for mobile IP-based Smart Home. Smart Home systems Smart Home is defined as a home equipped with structured wiring to allow occupants to remotely control or request an array of automated home electrical devices by entering a command. Automation of Smart Home is always expanding since more and more electronic technologies covers human work. In traditional Smart Home architectures components in home network are controlled by the home gateway, which is a service provider for customers. All protocols for operating the home devices are defined in this server. 37 Figure 6 Some of the devices and appliances can work as a peer-to-peer network setup, but is on applicable to home devices that are using same protocols. Therefore home gateway is enable as the service gateway, translating between different protocols for appliances. The different technologies that could provide for Smart Home communication are X10, Insteon, ZigBee, Z-wave and others. All the appliances and devices connected to the home network are receivers and the means of controlling the system, such as remote control or keypads, are transmitters. Smart Homes are trying to give ability to make persons like easier and more convenient. Whether you are at work or on holiday’s 36 ITCOM_course_-_CMT_-_mobile_IP_and_TCP.pdf – CMT Reza Tadayoni 37 http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 35 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Smart Home gives you possibility to be always alerted to what is going on in your apartment and security systems can be built to provide an immense amount of help in emergency case. If some kind of emergency would happen the fire alarm would wake up the occupant it would also light the way to the exit, dial the fire department and unlock the doors. Figure 7 38 Smart Home technologies promises a bright future benefits for an elderly person living alone. Smart Home will allow notifications that resident has to take medicine, it will also alert the hospital if the resident is not fallowing the medicine instructions or if he felt or how much the patient was eating. In the figure above shows what kind of applications Smart Home can offer, this project was developed by Nokia. However getting back on track, Smart Home development is not only based on elderly people, Smart Home is based on all human beings to help their life make much easier and in some cases “luxurious”. 38 http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 36 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Proposed architectures for Smart Homes The proposed architecture for Smart Home is based on the integration of the emerging technologies of wireless sensor networks and mobile IP. Mobile IPv6 is a version of mobile IP that allows users with a mobile device whose IP addresses are associated with one network to stay connected when moving to a network with a different IP address. Whenever user leaves the network with which his device is connected – home network – and enters the domain of a foreigner network, the foreign network uses the Mobile IP protocol to inform the home network of an address to which all packets for the user device should be delivered. Each mobile node is identified by its home address according to its current location in the network. While away from its home network, a mobile node is associated with a care-of address which identifies its current location and its home address is associated with the local endpoint of a tunnel to its home agent. Mobile IP is most often found in wireless WAN environments where users need to carry their mobile devices across multiple LANs with different IP addresses.39 Standard mobile IPv6 message format will be utilized for communication among nodes and exchange of home information within the Smart Home system. The communication signals from the user will go through authentication process as for the standard MIPv6 handover scheme to ensure that the home network is under control and managed by the current resident or home owner. There are many different types of MIPv6 Smart Home system services that can be offered to the customer such as: Comfort and ease of use Communications Entertainment systems and Multimedia Health care Medical emergencies Security and Safety Sub Conclusion The utilization of Mobile IPv6 with the Smart Home systems is optimized to provide mobility and enhanced communications and interconnection for home networking that could lead to efficient, 39 http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 37 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik reliable, and emergent services a home networking could offer. The proposed architecture could provide a seamless convergence for communicating between the users and the home devices and equipment as he leaves his residence. The user can have autonomous control of the home device and equipment even if he changes location or network provider since the system is installed with IP addresses recognized with proper authentications. Working principles In order to make a system efficient it must have a chain. This chain is where the control panel could interact over with different room routers in order to reach a device which is connected or compatible with the control panel. In order to do this the system must work as a transmitter (main panel) and receiver (device). 40 Figure 8 In typical home, the original message signal will reach the majority of the devices that are compatible with the main panel. When the message is made control panel sends a signal and device as a repeater, every product in the home that received the original 40 http://www.insteon.com/about-howitworks.html 38 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 41 Figure 9 transmission repeats the message simultaneously. These simulcasts build on one another is like a musical instrument in a symphony, greatly amplifying the signal. Most products 42 Figure 10 will receive the first repeated signal if they haven’t already received the signal – figure 10. 41 42 http://www.insteon.com/about-howitworks.html http://www.insteon.com/about-howitworks.html 39 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 43 Figure 11 As a factor of safety, another repeat is sent – figure 11. Again every product that received the transmission, also the original or the first repeat, will now repeat the transmission again. With almost the entire network repeating the message, virtually every device in your home will get the signal. In order to make the system reliable a third repeat of the transmission must be done to provide the ultimate reliability – figure 12. The connection between the control panel and the receiver is finally established. When the control panel finally has a direct access to the device, the control panel can set up the settings, which were required to set up at the very beginning. 44 Figure 12 OPNET In order to develop such system a good analysis of a system is needed. OPNET is a good solution to do this - since it is a software business that provides analysis for computer networks and applications. The company was founded in 1986. 43 44 http://www.insteon.com/about-howitworks.html http://www.insteon.com/about-howitworks.html 40 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik OPNET offers a good modeller for analysing and designing communication networks, 45devices, protocols and applications. Users are allowed to analyse simulated networks to compare the impacts of different technology designs of end-to-end behaviour. OPNET modeller incorporates a broad suite of protocols and technologies what also includes development environments to enable modelling of all network types and technologies including: VoIP TCP OSPFv3 MPLS IPv6 Others OPNET simulator is very useful when working with complex networks with a big number of devices and traffic flows or in networks where a little change could be critical. Before implementing any change it is possible to predict the behaviour and to verify the configurations of the devices. OPNET is offering different tools that allow administrators or home users to analyse their networks and the future implementations they want to make in order to improve the system they have. OPNET simulator features and goals are very simple, to be the best and provide the best technologies that are possible:46 45 46 Object oriented modelling Hierarchical modelling environment Discrete event, hybrid and optional analytical simulation Open interface for integrating internal files, libraries and other simulators GUI based debugging and analysis Fastest discrete event simulation engine among leading industry solutions http://users.salleurl.edu/~zaballos/opnet_interna/pdf/OPNET%20Simulator.pdf http://www.opnet.com/solutions/network_rd/modeler.html 41 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Hundreds of protocols and vendor device models with source code (complete OPNET model library) Others Sub Conclusion In order to develop this kind of Smart Home it is necessary to try the entire system being as administrator and provider to understand or find out how system is reacting to one or other change, protocol, device, etc. What is more important to secure the system is would be a smart idea to implement OPNET into Smart Home so before house holder tries to implement the device into the system OPNET could check and give a report of implementing device how it is interacting with other system devices and if it is safe to install it in order to avoid malfunctions or errors in the whole network. SWOT SWOT analysis is a necessary tool and element of the research necessary preliminary stage in the preparation of strategic and market plans. By using “brainstormed” data and ideas based on different situations, you can develop different goals and objectives, which can be helpful when trying to make the addition to the Phillips system successful. Those strategies can help the developers to reach their goals by giving us a strategic advantaged, which can be useful for future development too. SWOT stands for Strengths, Weaknesses, Opportunities, and Threats47, all which are factors, which should be encountered for when creating new ideas and features for the Phillips system. Strengths characteristics the strength and upper hand advantage the new Phillips system might have over other similar websites and products, these strengths can be improvements, new features and any of these matters. Weaknesses characteristics the disadvantages and inconveniences the Phillips system might have in relation to other similar systems, features and products, these weaknesses can be lack of knowledge, lack of experience and other negative factors. 47 The SWOT Analysis: Using Your Strength to Overcome Weaknesses, Using Opportunities to Overcome Threats 42 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Opportunities are known as which external opportunities, which can help make the new Phillips features more successful in a market perspective, these opportunities can be knowing the target group, better use of internet marketing and other market advantaged that other companies lack. Threats are known as which external threats that might have a negative effect, which can damage the process of creating new features for the Phillips system or the popularity of the system, these threats can be more power, more experienced or other harmful threats from other companies. The internal factors are the strength and weaknesses between the developers and the final new features idea for the Phillips system, when they are thought of, while external factors are the opportunities and threats which may affect the outcome of the features and idea both in the process and after they are developed. By using the different knowledge now known in our four different factors, we will be able to make four different strategies based on this knowledge. Maximizing both the external opportunities and internal strengths of the organization creates what is called the maxi-maxi strategies. Maximizing the external opportunities and minimizing internal weaknesses creates the maxi-mini strategies. Minimizing external threats and maximizing internal strengths creates the mini-maxi strategies. Minimizing both the external threats and the internal weaknesses is called the mini-mini strategies. [Matrix no. 1] Internal strengths: 1. 1 The Phillips system is already developed. Internal weaknesses: 1. 1 No real ideas of selling the ideas when it is 2. created. 3. 2 Unique new features 2. 4. 3. 2 The group does not have a person responsible 5. 3 Does not have to develop the ideas. for decision-making and scheduling, which can 6. lead to conflicts. 7. 4 Great understanding of the system by doing a4. lot of background research. 5. 3 Different nationalities in the group with 8. 9. 5 A great will to learn about Smart Homes. different work ethics and talents. 6. 43 ITCOM4 2013 10. AAU-CPH Group 5 Martynas & Frederik 7. 4 Ideas can easily be irrelevant. 11. 6 Ideas and features can easily be sold to Phillips 8. 9. 5 There is a lot of learning from idea to new 12. 7 Phillips has many products for the average feature. home External opportunities: External threats: 1. 1 Phillips might like to invest in our ideas, making 1. 1 Other Students or companies with more power the development easier. and capital might steal the idea and make it more 2. successful with their contacts. 3. 2 Phillips might also buy the undeveloped idea2. 4. 3. 2 Finding funds to finance our ideas is a 5. 3 Use guides and inspiration from other challenge, when the features are free. developers, who work with the system before 4. 6. 5. 3 Getting our new feature ideas further expanded 7. 4 Use social media to intact with people and and popular can be difficult after using our social know what they would like to have in their Smart contacts and directly contacting Phillips, with no Home. 8. start capital or support. 6. 9. 5 Go to Phillips interventions in order to make 7. 4 When creating the idea other new technologies contacts and so on! might outdate our ideas and make it unappealing. 44 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik [Matrix no. 2] Maxi-maxi strategies: 1. Mini-maxi strategies: If Phillips thinks our idea is worth investing in, 1. In order not to create irrelevant ideas we can they might give us some capital for our work. read and learn about what kind of Smart Home (addressing S1, O1) technologies that has already been addressed or 2. 3. studied (addressing W3, O4) Seeking information about programming can be 2. easier if we divide the work individually. 3. Without a goal selling the ideas to Phillips or a (addressing S3, O3) larger company or University might be smart 4. 5. after it is developed. (addressing W1, O1) It Is hard to create irrelevant ideas when we already have a clear idea of the system and how it works (addressing S4, O4, O5) Maxi-mini strategies: 1. The threat of not being able to market our 1. Create the new features for the Phillips system features can be solved by using our knowledge based on success of making it rather the success of system. (addressing S5, T3) of Phillips using it. (addressing W1, T2) 2. 3. Mini-mini strategies: 2. If the features are not good enough to be used3. Dividing work into what people are good at. we can quickly modify them in order to fit our system (addressing S4, T1) 4. 5. (addressing W3, T4) 4. 5. New ideas can be relevant if someone else When selling the idea to Phillips, we do not comes up with a similar feature and therefore have to take money and finances in count. would our features keep being updated 45 ITCOM4 2013 AAU-CPH (addressing S6, T2) Group 5 Martynas & Frederik (addressing W4, T5) Comments to the maxi-maxi strategies: 1. By selling the idea of our new features to Phillips, we as developers would not have to care about selling the features and use our own money on promotion and advertisements either because we get a percent of the profit or if we have sold the features for an arranged amount. 2. By dividing our work, so that some of it is made individually, reading and learning about feature development can be easier for each of us because we can manage our own time. 3. When we already know how the system is working and what kinds of products that are already created, we have a great opportunity not to create any irrelevant new features for the Phillips system. Comments to the mini-maxi strategies: 1. When coming up with new ideas for features to the Phillips system, many of these can easily become irrelevant. When doing a lot of research about the State of the Art and the already created Phillips system, we would have a great knowledge of what features that would be great to work with. 2. Selling our idea for an amount to Phillips could be a good strategy, when our main goal is to come 46 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik up with new features and have people in the future using it. If our goal was to make money and contribute active, selling our features to Phillips with a clause that would give us some part of the profit could be a better idea. We as the creators could then use our contacts create hype about these new features. Comments to the maxi-mini strategies: 1. Because of our great knowledge of the State of the Art and the system we will also know where and how to market our features. Therefore it will not have a negative effect that we might not have the required equipment and finances in order to market the features. 2. We as idea makers do not have any start capital and because there are a lot of expenses of having the features created we as the idea makers need to find a way to pay those fees. If we do not want to pay them by ourselves, we could merge with other creators to split the cost or we could simply sell the idea to Phillips, which is actually common for creators, who are creating new ideas. 3. We have a great understanding of how the Phillips system works since we made a lot of research involving the system. If the users of the new features then have a certain problem when they are using it and if it is working wrong, we as the creators can easily change these ideas in order to satisfy our costumers’ needs and demand. Comments to the mini-mini strategies: 1. While working we can divide work to what people are good at. The project and the features will then be created faster and maybe with a better result even though each part of the project would become more subjective and everyone need to learn the other ones parts in the end of the project. 2. If our ultimate goal for success is based on creating ideas and features, it would not be as important whatever people would use these features after the project is done. That way we will be more focused on thinking of these features and implement them as we imagined it to be rather than using time on thinking what the users demand and the requirement specification. 3. If the new features or settings get outdated, either by technology or user interface, it could be a great idea to discuss some of the other ideas from the brainstorm that was not used or features 47 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik which were not implemented. These ideas could prove to be useful in such a situation. Sub conclusion: By writing a SWOT analysis you do not necessarily get the right strategies, but you do get a great overview of which methods, we as creators could use to make successful features and to give Smart Homes users ideas and technologies that can help creating a better home. The strategies above are not classified, but just created in order of the ideas from the brainstorm. It is clear that SWOT is useful when coming up with new ideas. The unique way SWOT connects four different factors (Strength, Weakness, Opportunities, and Threats) is really helpful. Making these factors in to four strategies give the creators an upper hand advantaged from a market perspective, because it gives the knowledge about which strategy to apply, when certain situations happen. The most important strategy is mini-mini, because in those situations where mini-mini is valuable both threat and weaknesses are optimized. It is essential to minimize those two factors. If you take a look at the first mini-mini strategy you will see how we minimize the workload by dividing it between group members, this would create a faster pace minimizing time issues, while also minimizing the workload. These two factors are minimized, while we are both doing what we are best at, which make this a good mini-mini strategy. A strategy that seems to be easy to apply is the maxi-maxi strategy, where the focus is to maximize the strength and opportunities. Take the first strategy as an example. The main goal for this project is just to create it, so therefore an opportunity like selling the ideas we come up with to a Phillips could become relevant, it would become someone else’s problem to handle things like sales, advertising and implementing the features. SWOT strategies are guidelines that give us an overview on which strategies to implement and this is the main reason why we choose to make one and implement it in our rapport. Stakeholders Introduction Stakeholder analysis is usually used at the very beginning stages of planning. It outlines the importance of key people or institutions. This helps to determine whether these people can significantly influence a project or not. Stakeholder analysis helps developing strategies and 48 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik scenarios to become more effective and to prevent any potential trouble.48We also used stakeholder to define the consumers and people who could be interested in a Smart Home solution. We chose to include the stakeholder analysis in our rapport because it can determine which kind of influential powers we as developers might be faced with (Stakeholders’ interests). A stakeholder analysis might reveal potential risks and opportunities in the when creating new ideas and help identify costumers, companies and other “actors”. We as the developers can then combine the knowledge from SWOT and the stakeholder analysis to prepare ourselves for these potential scenarios. A stakeholder analysis can also help to define key people or a key organization and make sure that the right stakeholders are informed properly about the status of the development. Figure 13 The illustration shows the different stakeholders and their position in an interest/power matrix. The horizontal line illustrates power from low → high and the vertical line illustrates interest rising from low → high. The blue boxes represent stakeholders with a positive effect and the red boxes 48 http://www.reference.com/motif/Business/stakeholder-analysis 49 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik are stakeholders who might have a negative effect. The government can both be positive and negative and is therefore marked as colourless, same goes with people who do not have a smartphone. The illustration also shows with which kind of focus we as the developers should approach each boxes in the matrix. “Subjects” (low power, high interest) should be kept adequately informed and be heard so no major issues are arising. “Subjects” are institutions to keep in mind with their high interest in the project they can both be very helpful and very interfering. “Players” (high power, high interest) are the ones that need the most attention; both the ones that have a positive and a negative influence must be attended to and we as the developers must work on satisfying them. “Crowd” (low power, low interest) should be monitored. However, we as the developers should not use too much time on reflecting the crowd. “Context setters” (high power, low interest) should be kept satisfied, but we as the developers should not use time on approaching them. Our customers Every single customer can have an influence on the project's popularity. The customers can either increase or decrease the popularity of our ideas and project. It is very important to keep the customers happy, they will return with positive feedback and spread the word of their good experience. Customers can be both profitable and unprofitable. Bad critique of the project can become a big threat to us as the developers and can lower the amount of customers and future customers. In order to define our costumers we made an overview of potential customer’s profile in the following section. Academics Income: Minimum wage of 33.000 Danish crowns monthly basis. Age: With a PhD age would be probable +26 at least. Investment percent: An academic would be willing to invest as much money as they can afford. Being able to provide the family would more money than an average household, the academic would have an extra 50 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik money to spend on gadgets and other Smart Home technologies. Reason for interest: The reason could be many, but as an academic you would see the idea of creating your own personal Smart Home. Factors like controlling the lights, radiators and even setting a specific “mood” in each room could be a huge surplus for someone who works most of the day and really need to relax after work. Having the advantage of controlling your Smart Home from a distance or while commuting home from work is also a huge interest point, which we in marketing could focus on. Capability of using Smart Home technologies: Academics are fully capable of using a smart phone and therefore also fully capable of using the applications, which are featured in a Smart Home. Technologies difficulties should not be a problem as they would know how to read and understand the manual to complete. Average Household (Family) Income: Average wage of 53858.33 monthly (Family) Age: A family with two kids and steady jobs would be around +25 years of age. Investments percent: A household with kids always has extra expensive on field trips, sports and hobbies. It can therefore be hard to find extra money to invest in a home that is already working fine. The family has therefore little money to spend on Smart Homes, but if investment in advertising in Smart Home technologies that can easy the everyday life of the family is done well, they might consider using some of the budget. Reason for interest: Simple things like knowing what is in the fridge, if the alarm is on and if the door is locked can help a family live an easier life and in the future give them energy to have extra time with the family. 51 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Capability of using Smart Home technologies: You would not consider family mothers as being really good at high tech, but in recent years even family mothers have been showing improvement in those areas. Everyone can handle a smart phone and an application and if they do not know how to implement new features or something is broken, they can then call a hotline with techniques eager to help. Engineer Income: Average wage of 45.409 kr. monthly (1 person)49 Age: The age for an engineer is an average 35 years in Copenhagen. Investments percent: An engineer is a highly educated individual, who excel in technologies and modern things. It is right to say that they would have a lot of money and also a great interest in Smart Home technologies they would therefore like to invest in our ideas without thinking of the eventual cost of the product. Reason for interest: Personal of course. Working with technologies and having a great understanding of how they works and engineer would therefore be more than happy to welcome new technologies in his or her Smart Home. Also the interest would have them coming up with new ideas or implement something for themselves. Capability of using Smart Home technologies: Fully capable of implementing and using the Smart Home technologies and as mentioned before they might even develop something that can use the already known technologies and be implemented in their own Smart Home. 49 http://ing.dk/infografik/se-hvor-meget-andre-ingeniorer-tjener-i-forhold-til-dig-115852 52 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Government (Schools, Universities, etc.) Income: Money is not an issue Investments percent: Governments are always trying to invest in new ideas and universities, high schools and other higher education seems like a perfect match for new ideas regarding lightning etc.. They will also have a huge amount of money to spend on ideas already developed and ideas being developed. Reason for interest: Government would like to invest because it is the future of the world. And any country and university would like to have credit or been credited for invention that help ease the life on earth. Furthermore investments in lighting, air condition, and other everyday stuff can make a university an experiment for further improvement of Smart Home technologies. Capability of using Smart Home technologies: Fully capable of implementing and using the Smart Home technologies and as mentioned before they might even use these developments in universities to get further development. Government Every developer is under governmental influence/pressure, the same will apply for us as the developers of Smart Home ideas. The governments' main way of influence can slow the development of the ideas through taxes, restrictions and other effects which will increase our time and expenses. The market is also different in each country and the next section will explain about different market situations and which countries may have what50. Perfect Competition51 Perfect competition is a market system characterized by many different buyers and sellers. In the classic theoretical definition of perfect competition, there are an infinite number of buyers and sellers. With so many market players, it is impossible for any one participant to alter the prevailing price in the market. If they attempt to do so, buyers and sellers have infinite alternatives to 50 51 Note: These markets may vary with other products, these markets are strictly used in a Smart Home perspective. http://www.unc.edu/depts/econ/byrns_web/Economicae/monocompt.html 53 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik pursue. This would be a perfect example of a market we could face in a country with liberal market restriction. Western countries and especially the United States would have these types of markets, where every developer has his change of succeeding with an idea. Monopoly A monopoly is the exact opposite form of market system as perfect competition. In a pure monopoly, there is only one producer of a particular good or service, and generally no reasonable substitute. In such a market system, the government is able to charge whatever price they wish due to the absence of competition, but their overall revenue will be limited by the ability or willingness of customers to pay their price or in a dictatorship they will not have any will of their own. Countries with a dictatorship or limited market due to government restrictions would have this type of market. North Korea, China Cuba, Venezuela and multiple African countries would have this type if market and we as developers must therefore see the government as the main player and include the government in all processes of the project. Oligopoly An oligopoly is similar in many ways to a monopoly. The primary difference is that rather than having only one producer of an idea or service, there are a handful of producers, or at least a handful of producers that make up a dominant majority of the production in the market system. While the government do not have the same pricing power as in a monopoly, it is possible, without diligent government regulation, that the government would have the oligopolists to collude with one another to set prices in the same way a government with monopoly would. Countries with limited market would have this type of system, former dictatorships like Russia (Soviet Union), Burma and others would have this type of market and we as developers might have to make deals with the government in order to be ahead of the competition. Other developers (competition) Other developers have their own ideas and all the developers are fighting for every possible costumer and consumer. The competition leads to cheaper products, better quality, cheaper ideas and fewer opportunities. All these factors are making it difficult for us as developers going forward in our project. 54 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik People who does not have a smart phone People who do not own a smart phone are difficult to address, when a smart phone is a specific requirement. We as the developers should try our best to advertise our services to these people, so that they can eventually buy a smart phone and furthermore invest in our ideas and the project. Celebrities contributing to the project Famous people and celebrities may be highly interested in creating their own Smart Homes, giving us ideas and then contribute in commercials, magazines and other publicity. They do not have any direct power over us, however their popularity and influence on their fans, may increase or decrease our project’s popularity and a positive influence could also be an increase in the demand of our ideas. Big fish companies seeking for the newcomers with high potential Large companies, such as: Phillips, Google, Siemens etc. may be interested in investing their own money in our ideas and project, to later make profits for themselves. They are the actual players with a big amount of cash, that are able to even buy us out completely - that is why there should be additional caution taken when dealing with those kind of companies. The following section will have a brief description of two of the companies and their interest. Philips Philips is a Dutch electrical company founded in 1891 and now housing over 120.000 employees all over the world. Philips might always have been associated with radio and TV technologies, but recent years it has also grown a large interest for Smart Homes. Philips have bought multiple companies working with kitchens, lights and other Smart Home ideas in which they now are ahead of. Philips also has the LED lights, we describe, already on the market and they are therefore extremely interested in Smart Home technologies, they could either buy our idea or invest in it. Siemens Siemens is a German company located in Munich, Germany. It was original founded in 1847 and it is now housing 360.000 employees all over the world. Original focusing on telegraphs Siemens expanded in the 1950’s focusing on TV, Radio, Telescopes and Washing Machines. Siemens 55 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik therefore already had the hardware to work with when they started building Smart Homes. While Siemens in many years has been the leaders on kitchen Smart Home technologies recent years have them trying to do more work on other areas of a house. They therefore have the same interest at Philips in new ideas and projects. Sub Conclusion In this analysis different kinds of stakeholders have been identified in order to determine which of them should have the biggest shares of attention from us as the developers. The most important stakeholders are the players, which was determined to be: “Big fish companies”, “other developers” and to some degree also “celebrities”, and “our customers and consumers”. These factors are the ones that have major influence on our project in the future. These institutions must be attended to in order to keep the popularity of the idea high and in order to gain any kind of market share or our ideas to be used and implemented. By identifying the customers and the companies more closely, we also get an advantaged in those areas as we know what kind of interest they have for our project and how we should address them personally. Requirement Specifications The purpose of requirement specification is to specify the criteria that our system should fulfil. These criteria determine how the system should be used, how it should be designer, who must be allowed to use the system and how. The systems main functionality will be to serve human to make his or her life as much modernized as possible, this also leads to a new luxury level. The solution must provide easier and faster interface within the device and human. The main functionality is to give orders via mobile device or voice commands to artificial intelligence to communicate to the devices that are connected to the system in order to reach final goal (for example: make coffee). Process must be done within couple of minutes or at least faster than human can make on his own in order to make the system fast and more reliable than human work. Our developing system must be an independent stand-alone system that will be able to run on its own even when the house holder is not at home, it must also be able to run on the mobile devices 56 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik that support android and iOS operating systems. System requires a chained network connection between the main control panel or artificial intelligence and all connected devices and house holder since if the system is controlled over mobile device it must send a report by a SMS message. The system will give opportunity to interact with home in a whole new level which must be easier than in nowadays. Instead of making house duties, daily routine things you will have interface in which you can either use mobile device or artificial intelligence to give order to the system which will make duties for you. It should be possible to make order to the system simpler after the first use over mobile device user will be required to set up the preferences for various occasions. If user is using artificial intelligence, system must take own decisions when commands over voice is given. The system is open for everyone since the main idea of Smart Home is to help people in their daily routine. User is require to have basic knowledge about the technology since it can be used over mobile device. However it will be user friendly and easy to use which makes it easier to understand due to simple application interface. Functional requirements The functional requirements define actions/outputs the system must perform in coherence with the input given by the user or the artificial intelligence. Functional requirements also define how certain input should look, the sequence of certain operations are described in the use cases. 1. The system must accept input from the application which is built in Android or iOS. Application must have a simple menu with a sorted list of connected devices. o List can be made manually o List can be arranged by tracking each router and dividing devices in parts for each room that has a router and controls part of devices. When device is picked up it must show all possible processes that can be done by a chosen device. o Control panel must analyse all possible events that can be done by a device and display all of them in the application 2. The system must accept input from human over the voice commands. First time use instruction must be provided 57 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Voice recognition has to be implemented in order not to misunderstand with other random people. o To make system safer o Reliable 3. Mobile device application must have a short instruction of its usage Short video of the first use must be provided when a first connection with control panel is made Help button in main menu to provide hints or usage information if customer is not sure what he is doing “?” In each final command to explain what will be done after current move. 4. The artificial intelligence must include a detailed instruction how to start using “Smart Home” Video display how to use Smart Home must be displayed in control panel o Additional feature can be used and introduction could be played over the TV which is already connected to a Smart Home system Instruction can be skipped o Customer already used this kind of system o Customer wants to find things on his own a) Additional helpful information will be implemented in control panels menu. 5. The mobile device application must require for a setup of different occasions before starting to use it. User can skip this step User can set up multiple devices for a different occasion o If occasions are set up additional button in main menu has to be made a) In the occasion section customer can customize occasion moods any time he wants while using the application o Auto save must be created if telephone crashes or shuts down. 6. Well-developed router system must be installed in apartment. One router in each room must be installed 58 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik All routers must be connected with each other All routers must have an easy access to the control panel and vice versa. 7. High speed internet connection shall be developed – 1Gbit/s o Higher speeds are preferable o User can choose the speed limits 8. The system must save information of the last setup for faster performance next time. Control panel must save last configuration of a device or occasion without overwriting the previous one. User should have a choice to pick use the previous one, the last one or create a new configuration. o All configuration can be saved over the specific device section o Occasions can be set different so it will be saved as one of them 9. The system must have option of daily routine repeating. System all the time must analyse what occupant is doing on his daily basis and offer occupant to let the system do all the requests at once without using single requests or multiple requests from user 10. The system will send response to mobile device of the performance. System must send back a report of done performances System must send error message if one of the device malfunctioned System sends back a report of a calories, fat, costs, etc. o Kitchen only o User choice whether to send or not 11. To make system reliable 3 attempt connection between transmitter and receiver must be made. 12. Additional features as adding more devices over the time to expand system in control panel shall be implemented. Can be implemented in mobile device as well Separate button in control panel must be implemented o When button pushed control panel scans for all devices in the apartment a) All devices that are not added to the system must appear 59 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik b) User presses on the device he wants to add and control panel adds it c) Response from control panel and device has to be made to assure occupant device was installed successfully and is ready to use 13. Application GUI must be simple and understandable for whole public No bright colours or fast flashing images o Might affect ill people Big buttons in mobile application and control panel After each mobile application press a vibration should be done do help elder people. o Vibrations can be disabled 14. The system must have alarm system with a different sound to provide better safety system. Someone unidentified tries to get into the house Fridge is running low on ingredients A specific device did not gave a response Device is malfunctioning Fire starts in apartment o Doors needs to be unlocked after the sensors detects the fire o Light path to the exit has to be provided o Contacting fire department 15. The system must be well connected with cameras and eye detection system, fingerprint recognition to give best security that is possible. User can manually pick which systems he can use both, before using the system or before installing the system to the house If user is leaving home for a longer time full security check must be done before entering the house If user is gone for a several hours 1 security check performance is enough 16. Security cameras must be able to identify the house holder and set up the house to holders default parameters. 60 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Control panel must set most common occasion theme for house holder which he is setting up all the time when occupant is home o Control panel must take actions after 3-5 same manual picks in time Function can be enabled/disable if occupant does not want it 17. All system requests related with a kitchen or simply eating habits must be provided with all characteristics about the dish (fat, calories, vitamins, preparation time, etc.) Control panel can provide healthier life style to the system o Suggest what to eat and what not o Count the portions o Sitting styles o Eating conditions and offer different eating habits Control panel can suggest shortest preparation time dish Control panel can order food to home if occupant does not want to make food. Occupant can disable this functionality [10] 18. Whenever the system detects a problem about malfunctioning device it must send a picture from security camera to a mobile device of which device is not working. User then can choose to fix the problem now or later o User can try fixing on his own o Control panel suggest to call company and report the problem o User can postpone the fixing for later a) Picture is saved in control panel memory b) User can activate the problem later for further display and investigation o Whenever house holder wants to inspect the not working device through mobile device or artificial intelligence he can request a laser which is connected with the camera to point it at malfunctioning device. 19. Whole system must have different packages for different user needs – targeting people with different ills/capabilities. Senior package with biggest focus on health care Average package with manual construction 3 differed default packets 61 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik o Simplest (TV, conditioning, lighting) o Medium (TV, conditioning, lighting, kitchen devices, audio system) o All in one (Full packet to connect all electrical devices in one network) Non-Functional requirements Users who are going to buy our product are expecting more than just having the product working. They are especially interested in the performance, the reliability and so on. A number of characteristics defined as non-functional requirements for the system. We will enumerate the constraints on implementing what the system we developed should be able to do. Usability: As the product is used by people all over the world, the instructions should be in English at least. Therefore we as the developers have decided that the language of the instructions should be in English, so that the info is almost available for everyone to understand, but because it is a worldwide product we also should offer the instructions in both Spanish and French. The product should therefore be usable enough for the consumer to install and to use the product. If the product still is not working after following the instructions, then we as the developers should offer some sort of telephone hotline where the consumer can get help with getting the product working. Availability: The Smart Home technologies should be available at all times. So when the consumer is somewhere else than his home, he should be able to still use the product as he would have done when he is at home. The only thing required for the availability is that the product is installed and the power is on. Reliability: Reliability is the most difficult thing to test; when we do not know how the system should be like. It would be tested from our side, when it is developed. Of course we would not put a product that is not working on the market, but we cannot be a 100 percent sure that this product work all the time and therefore we would have a hotline where people can get their question answered. The hotline is almost always available unless there is a power out or something extreme like that. The product can also go down, if there is a power out where it is installed. When there is an update for 62 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik the system it can easily be downloaded and implied so that the system is up and running right after the update is installed. Performance: The system should be working at all hour and the performance of the system should make sure the routers are speaking with each other whenever the connection is on. That is the most necessary performance requirement. Security: The security of the product is also essential so that the product the consumer buys only works for him and cannot be hack by any other persons or even burglars who wants to check if people really are at home or the light is just on. We would make sure when you download our application that the product is only synced with the consumers Smartphone and therefore he or she is the only one who can access the system. The system does also offer a security code so when you want to access the system you will need to enter a password in order to control the settings for the lights. Portability: When the product has to be designed we recognized that our consumers would be using different smartphones with different functionalities, operating systems and application handling. Therefore we will have to look into the smartphone compatibility; the product therefore has to be tested on Android phones, Iphones and Blackberries so that it could be able to be used on every smartphone device. The result probably should be that the application is available in Google Play, Apple Store and also Blackberries will be capable of using the application. Maintainability: The product will be designed in such a way that in a future development it will be easy to add new features and updates by simply downloading them. The application on the consumer’s smartphone tells whenever there is an update available and if that update is urgent or not. The consumer can then decide if he wants to do the update immediately or he might be out of town or at work, so he can postpone the update until he gets home – so that he can make sure that the new update is installed correct and that the system is still working. Scalability: 63 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Well for our product we would try to find new products, which could be able to be working with the application in order to create an even smarter home. Therefore we will then be able to make the routers and bridge able to expand to other products in order to satisfy the needs from the consumer. If they do so they would have an advantage over our competition. User Scenarios Peter and Anna 52 Figure 14 Peter(32) and Anna(30) is a middle class couple which has a basic knowledge about new age technologies and furthermore they are always keen to try out something new and innovative. Peter finished his PhD degree and decided to carry on by working on a study related job, which is a house salesman in a small company. Anna is a student, which is defending her second Master 52 http://o.onionstatic.com/images/8/8278/original/700.hq.jpg?3926 64 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik degree in tourism and also she is working part time job in tourism agency to get practice. Since Peter is working as a salesman he was introduced with different types of houses and he was interested in “Smart Home” technologies so without big talks Peter and Anna decided to implement “Smart Home” into their life. Smart Home idea In order to get a better overview how to analyze and use technologies to make a home smart it is always a good idea to draw your dream house sketch and technologies you would like to have in your house. In this sketch we have a simple house with 2 floors and a small basement, we will take a deeper look into each room separately and describe how room should look like and what technologies should be implemented to make life more luxurious, comfortable and easier. Scenarios will include two different methods, method when person can control all his apartment devices via mobile application communicating with control panel and voice recognition via artificial intelligence technology. 65 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Figure 15 Entrance The Smart Home’s first job should begin by the main entrance, where the Smart Home system must recognize the house holder by camera help or additional technologies such as eye read or fingerprint matching. If the system can recognize the house holder from a camera view security system like eye read can be disable, however this should be left to decide to the house holder if he or she want to perform full security scan all the time even though the system recognized the person from a first attempt or just a faster security check, when a person is recognized by the first security check all the other systems should be disabled. After the security finds out that this is the real owner of the house artificial intelligence or a control panel preferences must identify the default settings for the house and set everything up when the main doors are being opened. 66 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Living room House holders, Peter and Anna gets home after the night out and want to finish the night in romantic mood, Peter through his application over the iPhone using UDP protocol sends a mood settings for the living room to set up the right lightning, to light up some electrical candles, set up conditioning, play romantic music and cool down wine in the mini bar, which stands in the living room also change the living room interior by changing the LCD screen wallpapers to more appropriate for the night. If Peter for example forgot to set the mood before they get home, Peter is allowed to set up everything by voice controlling, giving orders to artificial intelligence. After the request with the settings is being filtered through the firewall in order to understand that user is unique and packets are necessary to be fulfilled. When Smart Home control panel receives the request from the householder it instantly sends configuration settings to the separate technologies. Lightning When a request from control panel via ZigBee protocol is received the first thing what is done is checking if all the LED’s are working. After that the default 95percent brightness light is being dimmed to the request set brightness, in this case 50percent. When the settings are setup the ZigBee sends the report, that the lights were dimmed to the right percentage and that all LED’s are working properly. (If the system would face malfunction the system should receive a report with a detailed report what failed or which LED’s are not working properly. If the case was that the request of dimming lights was failed, it should repeat and set up one more time and if the repeating fails send a message to the control panel with failed operation) In order to develop this kind of LED system error detection, ideas like dividing the LED system into blocks can make it realistic. For example it can have a tree system when from the main tree it goes into branches and branches goes into more branches. In this case system can set up all lights at once but can detect which “branch” is not working starting from the mother “tree” and going deeper until the specific leaf – LED is reached. By determining the exact LED which is not working laser implemented in each room will point the laser to the LED which is not working. Moreover this idea can be improved by making connections with the application so when the house holder is worried about the LED lighting he can activate the laser over the application and see which LED is not functioning or has to be replaced. 67 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Mini Bar/Conditioning Control panel sends options to a thermostat control to set up the proper temperature for the wine to get its best flavours as well to the conditioning system to set up the heating. Two different packets must be sent with the set up in order not to set up the same temperature with the mini bar and conditioning, different ports must be set to not over cross the set ups, port for mini bar in this case would be port 8000 and conditioning port would be 9000. Thermostat controller sends back report that the temperature has been changed, control panel archives the report. Electric candles Have a direct connection with the candles, control panel sets the candles on and archives report that candles were turned on. Music Control panel sends a music request to the Airport Express base station which wirelessly connects all speakers over the house, since house holder requested set up only for the living room, music will be played only in the living room. Music is taken out from ITunes where music is listed by genres, romantic music is filtered up and a compilation of romantic music starts stream in the living room. If the connection to the Airport Express, ITunes or internet connection was terminated then control panel will receive a report of the information which part failed to start up. LCD screens LCD screens are a late technology which helps to reduce space and money on frames for the images. All in all it is a good technology that can be used in order to change the images according to the mood. Control panel will determine what kind of mood Peter wants and will send images from person memory storage to all LCD screens image that will perfectly fit the mood house holder requested. In other case by receiving a request from Peter control panel can access the browser and search for the wallpapers that can fit exact dimensions of the LCD frame in order not to distort the image. After the setup is finished control panel checks the LCD screens if all the frames are filled up with image and if not control panel will determine which LCD screen does not have a wallpaper and try to set it up again if the setup was failed second time it will collect data and send to Peter information that LCD screen number 2 in living room was not able to set up the image. Different alert message must be sent if control panel failed to connect with the LCD screen while setting up the connection to apply the image. Since the Smart Home must be provided with a high security system, cameras that are filming the whole house could also track LCD screen 68 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik functioning and send images with the not working LCD screen to a Peters mobile device. Furthermore if artificial intelligence would have to detect problems security system could be the “eyes” and where the malfunctioning screen would be detected by the cameras artificial intelligence would instantly inform Peter or Anna about not working screen. 53 Kitchen Peter is in the shop and is wondering if he needs to buy something extra for dinner, but his wife is not at home so he is using his smartphone application to find out what they have in the fridge, Figure 16 which products are soon out of date and what extra ingredients could be bought in order not to throw the existing ingredients in the fridge. Fridge After the request passed through all security bridges, the control panel sends a request to update the list and expire date times of food which is in the fridge. After the fridge received a request scanners filtering the data of the food what quantity and when food was stored in the fridge after this process is done, scanners of the whole fridge begins to examine the condition of the food after everything is done, a report is being structured. In respond fridge sends back a complete list of food, quantity and expiration date, after control panel receives the list it goes to the internet and search for the best meal that could be made in order to lower the costs for food in the shop. 53 http://www.decodir.com/wp-content/uploads/2009/10/beautiful-living-room-3d-render.jpg 69 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Browser After a full report about the condition in the fridge is received, control panel goes to the internet webpage: www.food.com and searches for the best solutions of what could be made with the food in the fridge. After the researches are done top 10 best solutions is being sent to the Peters smartphone with all the information what he needs to make that dish, calories, fat, approx. time. All the process must be done within couple of seconds, maximum 10-25seconds. Anna got back home from a long day at work and is wondering what she could eat and go to rest. Anna gives a request to artificial intelligence of what is the status in the fridge and cupboards and what could be made through all of that. After artificial intelligence recognize the voice it starts to do a research of all products that are available. After a complete scan of products is done artificial intelligence tries to recover dishes that were made before and if some products are missing artificial intelligence gives a response a question if Anna wants to buy additional ingredients to make one or other dish or should artificial intelligence look for a new meal this includes only ingredients that are available in home at that time. After Anna gives a response that she wants a meal that includes things that are only in home artificial intelligence is accessing the internet and starts to look for a dish. Using www.food.com intelligence finds couple of meals and suggests them all to Anna. Response of calories, fat, preparation time and ingredient portions are displayed in the application in the mobile device or in the monitor in the kitchen. 70 ITCOM4 2013 AAU-CPH 54 Group 5 Martynas & Frederik Figure 17 Bedroom After a long day Peter and Anna are going to bed, but they feel too tired to set up the bed. So while Peter is laying in the living room he takes out his smartphone and opens the application. On the application Peter is allowed to set the light dim, close the curtains, set the air conditioning and many other minor things. Lights After the Smart Home control panel received the request for the bedroom set up, the control panel starts to read his request and begins to fulfil the request. The control panel sends request to a dynalite system which is responsible for the bedroom. Dynalite system checks the received data if all data is correct and there are no errors made while receiving the packets the dynalite system starts to dim the lights to the requested value. 54 http://www.real-visuals.com/wp-content/uploads/2010/02/3d-photograph-realistic-quality-InteriorDesign-kitchen-rendering-animation.jpg 71 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Curtains Has a direct connection with the control panel and al the hydraulics are connected with different ports in order not to overcome other curtain sets in other rooms, in this case port would be 9800 and curtains in the bedroom would be closed without any difficulties. Conditioning HVAC system control receives a request from a control panel. The first thing the system must do is to check Freon if it is okay, then the conditioning starts its work and begins to cool down the air to the value, which was received from the control panel. Appropriate music/images Some people are facing issues when they are trying to fall asleep. In order to help those people to pass through this issue some solutions can be implemented. For example Peter has a phobia of falling asleep and not waking up, however every human needs to fall asleep. In order to help Peter easier to overcome his phobia the control panel is setting up the window wall into an image where it has a view of a beach and sundown. The control panel also sets up the music on speakers, which are implemented in the bed back. Silent sounds of a beach and birds start to play so Peter can finally fall asleep. Same security and setups must be made for the window wall as it is on LCD screens, more over more advanced things can be used in this feature like .gif images or a whole video. In order to determine where to play music the control panel has to determine the port over which it has to connect in order to play music in the right place. Then after the port is determined the music from an audio system (for example from living room) will start to play. If issues are faced everything is collected into one report and sent as a response to Peters phone that some of the bedroom features are not working properly or not working at all. 72 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 55 Figure 18 Bathroom Peter wakes up and he is going to the bathroom to wash his teeth and take a shower. Lights Lights are controlled by the censor, which react when a human enters the bathroom. In order to save up some extra money two censors are installed, in order to scan when a person got in and got out. First censor would scan people got in the bathroom number and the other one people got out from bathroom, after everyone left the bathroom, lights and all the technologies shuts down. Sink When Peter enters bathroom, he is going to the sink. During the time he spend on reaching the sink, the water temperature is being set up and another censor, which is in the sink, detects that Peter wants to wash his face and start to clean his teeth, because censor detected his hands in the sink. The right temperature water starts to run. Due to efficiency the water runs only for a period of time (5-10 seconds.) after that the water stop running. 55 http://us.123rf.com/400wm/400/400/hemul75/hemul750803/hemul75080300010/2710202luxurious-bedroom-in-red-3d-rendering.jpg 73 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Shower After Peter finished washing his face, he decided to take a shower. A defined temperature starts to run and Peter is allowed to change the parameters in the touch screen, which is in the shower. He can turn it into a higher or lower temperature in order to fulfil his needs. The touchscreen, which would be in the shower, could be connected in different ways. It could be directly connected to the water heating or it could be connected to the main control panel which would filter the request. If the panel would be connected with the main control system it could have a memory and record all set ups of the water heating, for example, if Peter every time lowers the water temperature to 30 degrees after 3rd set up main control system would renew the settings and for the 4th time water instead of 35 degrees which were set before would instantly set up 30 degrees as Peter sets up for the past 3 days. If shower would be connected to the heating directly then it could have memory set ups also where it would be shown either different default temperatures, or the history of set temperatures. 56 Figure 19 56 http://www.3dartweb.com/portfolio/bathroom2_post.jpg 74 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Basement Peter goes to the basement with his friends to play pool, when the censor detects that someone is going down the stairs the Phillips dynalite system instantly lights up the room, with a little extra help music is being set up and the guys can chill out for the evening. Lights The censor which is integrated at the bottom of the stairs detects a movement and instantly turns on the lights. Same idea with bathroom 2 censors should be implemented. Music With his application in the smartphone Peter sets up the music to set up the mood for the evening. Request is being sent over the UDP protocol to make it more efficient since Peter does not mind what song will play so the only request is to turn on the music player. Music player receives the request and starts playing from the last song it were turned off previous time. 57 Figure 20 57 http://s3images.coroflot.com/user_files/individual_files/original_150801_ExPgZjzVnIpSgZLB t1AbGIGbe.jpeg 75 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Shelter Anna after a long day at work wants to enjoy the sun and decides to go to the shelter read some book. When she goes to the shelter lights turns on, extra features such as lifting roof with window can be implemented. Lights Lights should be developed the same way as it is described in the basement and bathroom sections. Lifting roof with window With additional feature like this Anna can be lying on the couch and then she can lift the roof by using her smartphone application. In this application Anna is allowed to access the main control panel of the home and lift the roof by her needed percentage. After the settings have been set up, the control panel is checking for the system. If it is working properly and if the are no errors received, after the safety check is done, the control panel is sending the request by TCP connection after the right packet order is received the system begins to set up the roof after the settings were fulfilled system sends back the report that the request is done to the control panel where the information is being stored, if the system sends back the faulty control panel forwards the error to the Anna’s app that the system is not working and it has to be fixed. Smart Home cons and pros Advantages The basic advantages to the ordinary person of Smart Home is just another way to show up how luxurious their life can be. These days’ wealthy house holders can order a project from an electronic items providing company such as – Philips. Philips Dynalite projects can provide a smart house for a fair amount of money which would include full control of lights, heating and air conditioning, to make it more luxurious it can be controlled separately in each room and control panel can be accessed within iPhone or iPad. Talking about the other technologies and protocols we can conclude that most of the technology providers wants to provide Smart Home for a low cost including the best performance. However different systems understand low costs differently and to reduce them for one system can be easier than for other. Another advantage of these technologies is that it is very easy to install them and user does not have to be a programmer in 76 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik order to understand how the whole system how it should work. Mentioning the protocols, after a deeper look into them it is very clear that reliability is the most important thing to protocols. Trying to perform a high speed information transfer in order to make system work faster is one of the most important goals for developers to obtain the best performance. One of the most extraordinary advantages for the Z-Wave is that it is capable of setting up one device to be controlled over the smartphone and over the time if customer wants he is able to add more and more devices to the Z-Wave system to make home more smarter. Disadvantages The disadvantages seems to be mostly only in the technical part. The only disadvantage by today for the end user is that in order to make a home smart it will require a lot of money since the prices for these types of products and its expansion costs a lot. The technical part is on the programmers’ hands, they must work on the product to make it more advanced. The main problems are connection and speed. In the connection part there are many problems that some devices are blocked by others or that when using the radio waves to transfer the signal radio will not work since wires are being used as antennas, what requires either a better solution to transfer data or better protection to home wires in order to prevent this kind of problem. Issues like speed is always being updated, engineers always trying to expand the range of file transferring and so far some of the technologies are stating that they are capable to transfer files at 200Mbps unfortunately user reviews says different that the best performance they could reach was 1014Mbps and when the distance was increased up to 100meters the sending decreased to 58Mbps. 77 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Use-cases In this section we will describe how system should behave on a specific action of user. Figure 21 Use case 1 Connection between smartphone and control panel Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: Costumer wants to create a connection in order to get the product he bought working. Preconditions: 78 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik -Smartphone/Artificial intelligence -Internet connection on the smartphone and on the control panel. -The protocol, which is responsible for creating the connection Success Guarantee or Post condition: -The costumer will be able via the application to create and establish a connection between his smartphone and the control panel. Main success scenario: 1) The costumer goes to the app store on his smartphone and downloads the application. 2) The costumer needs to fill in the information from the control panel in order for the application to work. 3) The costumer press in is information and the control panel response positive. NOTE: By using the information from the control panel it makes sure that the product is authenticated. After receiving the authentication the smartphone and the control panel are now connected to each other. Extensions: 4) The costumer gets a message from the control panel on his application that the connection is established. The costumer will also get a notification if there is any problems with the connection afterwards, he can therefore always now if there is any problem and how to solve it. Special Requirements: -User needs to buy the product. -The costumer need the lights to be installed Use case 2 - Connection other devices to the bridge Scope: Smart Home technologies Level: Developers goal Primary Actor: technology Stakeholders and Interests: -The developers would like to connect more devices to the bridge so that it can be controlled by a smartphone or artificial intelligence. 79 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Preconditions: - -Connection between Smartphone and Control panel. - -Connection between Control panel and other devices. Success Guarantee: - Controlling more devices using the costumer’s smartphone - Being able to do so, whenever there is a wireless connection between the smartphone and the control panel. Main success scenario: 1) The costumer will turn on his smartphone and go to the application 2) The costumer will then create the connection between his smartphone and the devices in the house which he wants to control. NOTE: This connection should have been modified and created beforehand. 3) User makes his first request and the device or product answer by following the command. If the connection works probably the costumer can then use the product he bought. Extensions: Costumer would be able to control more devices and simply use the control panel when he wants to add more products Costumer can control other than Phillips products using his smartphone Special Requirements: - Power Smartphone the Phillips product - Other products - Wireless connection Use case 3 - Connection between smartphone and Fridge: Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: 80 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Costumer wants to find out what is in the fridge and what he can make of existing ingredients. Preconditions: -Smartphone/Artificial intelligence. -Internet connection on the smartphone and on the control panel. -Connection between control panel and fridge. -The application, which is responsible for creating the connection. -Browser application. Success Guarantee or Post condition: -The costumer will be able via the application to create and establish a connection between his smartphone and the control panel where control panel will analyze the request and connect to the fridge for further actions. Main success scenario: 1) The costumer goes to the app store on his smartphone and downloads the application. 2) The costumer needs to fill in the information from the control panel in order for the application to work. 3) The costumer press in is information and the control panel response positive. 4) Control panel makes connection with the fridge. 5) Fridge reads the request and analyzes the ingredients in the fridge. Analyzing finished, browser searching for a dish with available ingredients. Research is done and response to control panel is sent, from where a converted message will reach customers smartphone. Extensions: The costumer gets a message from the control panel on his application that the connection was successful and information what meal can be done. The costumer will also get a notification if there is any problems with the connection afterwards. Special Requirements: -User needs to buy the product. -The costumer need the fridge to be connected with control panel. 81 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik -Control panel must have access to the internet browser. -Control panel must have set defaults where to check for possible meal (ex: www.food.com) -Fridge scanners must determine how old food is and what food is in the fridge. -Food expire date and health must be an option to customer to choose to display or not. Use case 4 - Connection between smartphone and Bathroom lights Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: Costumer wants to go to the bathroom Preconditions: -Artificial intelligence. -Censor. -Connection between control panel and censor. -The protocol, which is responsible for creating the connection. Success Guarantee or Post condition: -The costumer will go to the bathroom and censor will detect his movement and will establish connection with a control panel and give a signal to the control panel that bathroom lights must be lighted on since the house holder is entering the bathroom. Main success scenario: 6) The costumer goes to the bathroom. 7) The customer crosses censor line. 8) The censor establishes connection with a control panel and sends a request to light the lights. 9) Control panel receives the incoming request and turns the light on in the bathroom. Process is done, gives a response to the control panel: - Command failed, check the system. - Command fulfilled. Extensions: 82 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik The costumer will also get a notification if there is any problems with the connection afterwards. The customer will also get a notification if lights or censor is not working Special Requirements: -User needs to buy the product. -The costumer need the censors to be connected with control panel. -Control panel must have direct access to the lights. -Control panel must turn on the lights Use case 5 - Connection between smartphone and curtains Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: Costumer wants to go to sleep or wakes up and wants curtains to close/open. Preconditions: -Smartphone/Artificial intelligence. -Internet connection on the smartphone and on the control panel. -Connection between control panel and curtains. -The protocol, which is responsible for creating the connection. Success Guarantee or Post condition: -The costumer will be able via the application to create and establish a connection between his smartphone and the control panel where control panel will analyse the request and connect to the curtains for further actions. -The customer will be able via the artificial intelligence give a command (ex: Bedroom curtains close) artificial intelligence analyse if the curtains already closed or not if not it will take the actions – close it. Main success scenario: The costumer goes to the app store on his smartphone and downloads the application. The customer needs to connect curtains to the Smart Home network. 83 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik The customer needs to give a command whether smartphone or artificial intelligence. Control panel receives the command. Control panel analyses the command: - Command is good, continue the process. - Command is wrong, give a response to repeat the command/request. Control panel makes connection with the curtains. Curtains is being checked if they are already closed if not they are being closed and vice versa. Process is done, gives a response to the control panel: - Command failed, check the system. - Command fulfilled. Extensions: The costumer gets a message from the control panel on his application that the connection was successful/failed and information with successful/failed operation. Special Requirements: -User needs to buy the product. -The costumer need the curtains to be connected with control panel. Use case 6 - Connection between smartphone and sink Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: Costumer wants to wash his hands or wash the dishes. Preconditions: -Artificial intelligence. -Censors -Connection between control panel and sinks. -The protocol which is responsible for creating the connection. Success Guarantee or Post condition: 84 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik -The costumer will be able via censor help put his hands to the sink where censor detect a movement and water will begin to leak. Main success scenario: Control panel makes connection with the sinks. Sink censor will detect within 1second that water must be poured. Movement stopped water is stopped within same time frame 1second. After the process is done a brief report of the performed work is sent to the control panel. Extensions: The costumer gets a message from the control panel on his application that the connection was successful. The costumer will also get a notification if there is any problems with the connection afterwards. The customer can see water consumption in control panel report sum ups. Special Requirements: -User needs to buy the product. -The costumer need the sinks to be connected with censors. -Censors must be connected to the control panel. -Control panel must have access to the water system. -Control panel must have set defaults what pressure water must pour. Use case 7 - Connection between smartphone and OLED Screen Scope: Smart Home technologies Level: Costumer goal Primary Actor: Costumer Stakeholders and Interests: Costumer wants to change wallpaper on one of the screens. Preconditions: -Smartphone/Artificial intelligence. -Internet connection on the smartphone and on the control panel. -Connection between control panel and OLED screen. 85 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik -Connect OLED screens to the Smart Home network. -The protocol, which is responsible for creating the connection. -Browser application. Success Guarantee or Post condition: -The costumer will be able via the application to create and establish a connection between his smartphone and the control panel where control panel will analyse the request and connect to the OLED screen for further actions. Main success scenario: The costumer goes to the app store on his smartphone and downloads the application. The costumer needs to fill in the information from the control panel in order for the application to work. Control panel makes connection with the OLED screen. Control panel searches for the wallpaper in the internet or from memory. Control panel sends request with the wallpaper. OLED Screen reads the request and analyses the resolution. Analysing finished, OLED Screen sets up new wallpaper. Extensions: The costumer gets a message from the control panel on his application that the connection was successful and information that wallpaper was set. The costumer will also get a notification if there is any problems with the connection afterwards. Special Requirements: -User needs to buy the product. -The costumer need the OLED screen to be connected with control panel. -Control panel must have access to the internet browser. -Control panel must have set defaults where to check for possible meal (ex: www.wallpaper.com) -Control panel must search for the proper dimensions of the wallpaper. -When OLED screen is added to the control panel it must send its own resolution to control panel archives. 86 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Discussion Introduction Taking in consideration our first goals, that we set in the very beginning. We more or less have all goals satisfied. The most important goal for us was to understand how Smart Home technologies work and how they are developed. Discussing the report we find it clear that all has to begin from a problem formulation. The problem formulation helps to raise goals, which you have to answer in the report concerning all lectures involved. Writing this report and analyzing the technologies gave us a great amount of knowledge, which will help to develop a concept much easier. In the report we had a goal to create a fully functioning Smart Home system and all those functionalities are stated in the user scenarios. Literature review gave a better overview where Smart Home technologies stand at this point and this also lead to more “realistic” Smart Home ideas. Discussions with class students, teachers and supervisor that were done all the semester project time helped us to develop the project structure and involve all lectures, knowledge and skills from the courses we had to cover the semester project requirements. Deeper researches in the technical part lead us to the literature that helped us to understand how Smart Home technologies can help people out when they are ill or when a disaster in home appears. In the very beginning we were struggling to understand or find out how Smart Home can help people so the most of the report description is targeted to a more luxurious life style than helping people. For further discussions we decided to make a written concept, which will give a clearer look how the concept really looks like in the technical part not including the end product. In this section we will describe various technologies and aspects that are needed to include in the concept in order to build it. The very end of the discussion will give a final look of from our point of view the best technologies that could be used in the development of this kind of product. Routing and Addressing To connect a network to the internet user needs a router. Routing and addressing are two main 87 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik pieces of the internet architecture, since any changes to them will cause impact to all of the “IP stack”, from packet forwarding to applications58. Internet Connections59 Before going deeper into the theory of IP routing and addressing it is necessary to discuss the best possible internet connection that could and would be the best for Smart Home network, many aspects must be considered such as: costs, speeds, reliability etc. There are many internet connection types, we will discuss couple of them and define the best solutions. Dial-up access Is an analog connection which is both economical and slow. In order to connect to the network using dial-up access connection which is using modem and which is connected to the PC, has to allow PC to dial up phone number which is provided by the ISP. Dial-up is an analog connection since data is sent over an analog – public-switched telephone network. The modem converts digital data to analog and vice versa. However since the connection is using telephone lines the quality of the connection is not always good and data rate is limited. Normal Dial-Up connection speeds range is 2.6Kbps to 56 Kbps what is incredibly low these days. Cable – Broadband Internet Connection60 Internet connection that is designed to operate over a cable TV lines. Cable internet work is based on using TV channel space for data transmission with certain channels used for downstream transmission and others for upstream transmissions. Comparing to a telephone line connection broadband internet connection is able to offer much greater speeds. Cable provider typically implement a cat to limit capacity and accommodate more customers. Normal cable speed range varies from 0.5Mbps to 30Mbps61. Wireless Internet connections62 Wireless broadband which is one of the newer connection type, instead of using telephone or cable networks for your internet connection, customer is using radio frequency bands. Wireless 58 http://tools.ietf.org/html/rfc4984#page-8 http://www.webopedia.com/quick_ref/internet_connection_types.asp 60 http://www.webopedia.com/quick_ref/internet_connection_types.asp 61 http://compnetworking.about.com/od/internetaccessbestuses/f/cablespeed.htm 62 http://www.webopedia.com/quick_ref/internet_connection_types.asp 59 88 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik internet connection is an always-on mode which can be accessed from any place as long as network is covering the area customer is trying to use the internet connection. Wireless access is considered to be a widely spread up connection type and it is not hard to find a wireless service provider taking in consideration countries like Denmark. Comparing to the costs it is more expensive than wire based connection comparing the same speeds. OC3 – Optical Carrier63 Level 3 is used to specify the speed of fiber optic network conforming to the SONET standard. OC3 is used as a fiber optic backbone for a wide network with huge data, video and traffic needs. Optical Carrier is capable to offer 155Mbps and higher speed. Tier Carrier64 Is a connection that can be connected to the backbone of the internet itself. Connection is widely used by ISP. Tier carrier has many different types that vary in speed and individual channels that they are carrying. T-3 can carry up to 670 channels and carry the speed which can get lower than 43Mbps while T-5 can reach a speed of 400Mbps. Even though it is almost impractical to use such of speeds on home based computer sets, Tier Carrier connection is one of the answer in reach our product goals of having 1Gbps speed in Smart Home network system. Routing and Forwarding Virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the same router at the same time. Since the routing instances are independent, the same or overlapping IP can be used without conflicting with each other. VRF may be implemented on a network device by distinct routing tables. A network device may have the ability to configure different virtual routers where each one has its own forwarding information bases that are not accessible to any other virtual router model on the same device65. There are two ways to implement the virtual routing and forwarding. Simple implementation is a form of VRF Lite. In such implementation each router within the network perform in the virtual routing environment in a peer-based method. VRF lite does not scale to the size required by global 63 http://www.webopedia.com/quick_ref/internet_connection_types.asp http://lignup.com/computer-tips/149-internet.html 65 http://classes.soe.ucsc.edu/cmpe080n/Winter04/quizzes/Practice_Quiz3_soln.pdf 64 89 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. More advanced implementation of VRF Lite is done by implementing the IPVPN. In this kind of implementation, a core backbone network is responsible for the transmission of data across the great range area between VRF instances at each edge location. IPVPNs was deployed by carriers to make a shared wide area backbone network for multiple customers. This is also reasonable to be implemented in shared data center environments. In general, customer routers handling local routing in a traditional way and disseminate routing information into providers side where the routing tables are displayed. The provider side then encapsulates the traffic, marks it so the VRF instance could identify it, and transmits it across provider backbone provider network to providers’ router. Then provider side router decapsulates the traffic and forwards it to the customer router. The customer equipment in backbone network is completely transparent, allowing multi utilization of the common backbone network while maintaining end-to-end traffic separation. Routes along the provider backbone network are handled using Interior Gateway Protocol, it uses extended attributes in a common routing table to differentiate the customers’ routes with overlapping IP addresses. Mentioning IPVPN it is mostly used across Multi-protocol Label Switching backbone the labelling of packets in MPLS leads to the identification of the customer VRF. Some of the IPVPN implementations are utilizing simpler IP in IP encapsulation over a pure IP backbone what allows to disable MLPS environment since there is no need to maintain and support it. Routing algorithms Routers using routing algorithms to find out which path is the best to reach the destination. Routing algorithms taking in consideration parameters such as hops, time delays and communication costs of packet transmission. To specify the best path it is all based on how routers are capable to gather information of a network and their analysis of information. There are two major routing algorithms66: global routing algorithms and decentralized routing algorithms. In global routing algorithms every router has a complete information about all routers that are connected to the network and traffic status 66 http://computer.howstuffworks.com/routing-algorithm1.htm 90 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik of the network. These kind of algorithms also known as link state algorithms (LS). In decentralized routing algorithms each router has information about other routers only if they are directly connected to it, what means that it might not know all routers in the network. Decentralized routing algorithm is also known as distance vector (DV). Link State Algorithms67 Routers that are connected link state algorithms must follow a set of steps. In the beginning algorithm must identify the routers that connected to them and get their IP addresses. In response when router starts to work it sends back a packet over network. Every router that receives that packet replies with a message that includes their IP address. The next following step is measuring the average traffic or delay time for nearby routers. In order to make this happen, routers sending echo packets over the network. Every router that receives that packet must respond with the same packet back. Third step is broadcasting its information over the network and receive others information back. In this step all routers have to share their information. All routers sharing their knowledge and broadcasting their information to each other. By doing this every router is capable to understand the structure and status of the network. Last step is to identify the best route between two nodes of the network using the right algorithm, routers choose the best route to every node. Routers do this using algorithm such as the shortest path algorithm Dijkstra. Using this algorithm it is basing everything on information which he collected from other routers, by that information it builds a graph of the network. This graph can show the location of the router in the network and their links to each other. Every link is labeled with a number called the cost or weight. This number is a function of average traffic, number of hops between nodes and delay time. The algorithm working principle is: if there are more than one link between the nodes and a destination, router is picking the link that has the lowest weight or cost. Dijkstra algorithm68 working principle: 67 68 http://computer.howstuffworks.com/routing-algorithm2.htm http://optlab-server.sce.carleton.ca/POAnimations2007/DijkstrasAlgo.html 91 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik The router builds a graph of the network and identifies source and destination nodes. If there is no direct link between nodes, weight or cost is identified as “infinity” Router builds a status record for each node in the network. Record is including the fields: o Length field – Shows the sum of the costs from the source to the node o Label field – Status of the node o Processor field – Showing the previous node Each node can be either “tentative” or “permanent” The router initializes the parameters of the status record set for all nodes and sets their length to “infinity” and label is set to “tentative” The router is setting a t-node if the node is to be the source t-node, router changes label to “permanent”, when it is changed, it never changes again. The router updates the status record set for all tentative nodes that are directly linked to the source t-node. Router looks at all tentative nodes and chooses the lowest one – that node is then the destination t-node. If that node is not the intended destination router was looking for the router repeats the point 5. If this node is the intended destination, the router extracts its previous node from the status record set and does this until it arrives at the initiator. Routing protocols69 Routing protocols specifies how routers are communicating with each other, disseminating information which enables them to select routes between any two nodes on a computer network. Using routing algorithms determines the specific choice of the route. Even though there are many different type of routing protocols there are three categories used in IP networks: Interior gateway routing via link state routing protocol, interior gateway routing via path vector and exterior gateway routing (Used for exchanging traffic between autonomous systems). Interior gateway system protocol is used in exchanging information within an autonomous system. 69 http://www.cisco.com/en/US/docs/net_mgmt/active_network_abstraction/3.7/reference/guide/routpro.html 92 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Exterior gateway protocol is used between autonomous systems. Routing Information Protocol (RIP)70 It is a forceful protocol type which is used in local area network and wide area network. RIP type is categorized interior gateway protocol within the use of DV algorithm. Open Shortest Path First (OSPF)71 It is an active routing protocol used in the internet protocol. OSPF is a link state routing protocol that belongs to an interior gateway protocol. Open shortest path first operating inside a distinct autonomous system. This protocol is widely used in the network of big business companies. Border Gateway Protocol (BGP)72 BGP is the core routing protocol of the internet and responsible for maintaining a table of the internet protocol networks which are authorizing network reaching capability between autonomous systems. The border gateway protocol is a path vector protocol. It was created to replace the Exterior Gateway Protocol (EGP) routing protocol to permit completely decentralized routing in order to permit the removal of the NSF Net which consent to internet to turn into a truly decentralized system. Intermediate System-to-Intermediate System A great protocol used by network devices to determine the best way to promoted datagram from side to side a packet switched network. 70 http://freewimaxinfo.com/routing-protocol-types.html http://freewimaxinfo.com/routing-protocol-types.html 72 http://freewimaxinfo.com/routing-protocol-types.html 71 93 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Addressing Even though the original scheme is relatively simple Figure 22 73 It has become complex over the years since a numerous changes in order to allow to deal with various addressing requirements. However there are more advanced styles of IP addressing, like subnetting and classless addressing. Subnetting74 A subnetwork, part of subdivision of an IP network. Subnetting is when network is dividing into two or more networks. All computers that are belonging to a subnet are addressed with an identical bit-group in their IP addresses. Subnetting in IPv4 was to improve efficiency in the utilization of the small address space available, particularly to enterprises. In IPv6 there are no limitations since the large address space is available. Subnet always using IPv6 addresses with 73 74 https://learningnetwork.cisco.com/servlet/JiveServlet/showImage/2-126319-29676/IP+addressing+scheme.jpg https://supportforums.cisco.com/docs/DOC-17232 94 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 64bits for host, technically there is possibility to use smaller subnets. However they are impractical for local area networks whom are based on Ethernet technology. IPv6 is not implementing special address formats for broadcast traffic or network numbers, thus all addresses in a subnet are available as a host addresses. Quality of Service for Streaming Media75 Errors in streaming audio application can cause interruption to the audio stream or cause gaps in audio stream for periods of time what will make audio play with pauses which will be noticeable for a human ear. Assuming that audio format is normally “.mp3” audio stream can use OverQoS to smoother out audio streaming by spreading out the pauses over time. MPEG Streaming consists of a Group of Pictures each comprising of I-frames, P-frames and Bframes. Among all these I-frames are the most important because they represent the start of the video sequence in a Group of Pictures while P-frames and B-frames are inter coded-frames. Since the frame is larger than a packet frames are sent through multiple consecutive packets. All packets corresponding to I-frame occur in succession. If the error will occur in the streaming it can eliminate I-frame completely what will cause player to disconnect since the Group of Pictures cannot be reconstructed. The B-frame and P-frame are useless without starting I-frame. When using OverQoS76, it can associate packets to belonging I-frames with a higher priority to recover packets within an I-frame at the expense of P or B-frames. All in all taking in consideration the lag of B and P frame packets affects the whole quality of one Group of Pictures in an MPEG stream. Dropping P and B packets smoothly can affect the quality of multiple Group of Pictures. The type of frame of a packet is embedded in the MPEG Video-Specific header within the payload of a packet. Quality of Service for Voice Over IP77 Quality of service is a major issue for VoIP implementation. It is important to assure that packet traffic for a voice or other media connection will not be delayed or dropped due to other lower priority traffic. VoIP QoS requirements are: 75 http://static.usenix.org/events/nsdi0/tech/full_papers/subramanianOver/subramanianOver_html/node15.html http://www.cs.unc.edu/~kmp/comp832-s08/readings/krasic-qos-scalability.pdf 77 http://www.cisco.com/en/US/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoIP.html 76 95 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Latency Normally people notice roundtrip voice delay of 250ms. Recommendations of a maximum latency are 150ms one-way. However we are considering to have a lower latency in our local area network. Many network service-level agreement maximum latency: o Axiovave SLA 65ms maximum latency78 o Internap SLA 45ms maximum latency o Qwest SLA 50ms maximum latency o Verio SLA 55ms maximum latency The numbers show the total latency for a VoIP. Jitter Jitter can be measured in several ways. Unfortunately equipment and network vendors often do not include exactly how they are measuring the values they are providing for measured jitter. The discussion that gave a big question of what level is acceptable of a jitter in a network lead us into a researches of a network providers. o Axiowave has a 0.5ms jitter* o Internap has a 0.5ms jitter* o Qwest has a 2ms jitter* o Verio has an average of 0.5ms jitter* Packet loss Packet loss is a very big issue for VoIP, even a small percentage of a packet loss can damage a VoIP call. Maximum packet loss: o Axiowave 0% packet loss o Internat 0.3% packet loss o Qwest 0.5% packet loss o Verio 0.1% packet loss. 78 http://www.businesswire.com/news/home/20040913005122/en/Axiowave-Partners-TeleGea-Offer-CarriersAutomated-Provisioning *Numbers specify the maximum jitter 96 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Building the concept Making a discussion of all necessary parts to develop our product, we will try to pick the best performance and software to build our own smart home. As mentioned in the first part and in the report that our goal is to provide a fast home network we decided to choose a tier carrier T-5 type since its maximum speed is 400Mbps and the lowest is 43Mbps, which currently satisfying our needs for the basic use of smart home development. It is necessary to implement the virtual routing and forwarding that would allow us to use the same IP’s in the same network and. Our group has decided to implement more advanced virtual routing and forwarding by using IPVPN. It is necessary to pick up the right algorithms for our concept and it is considerably wise to choose global routing algorithms since we want to provide a fully connected tree where each router could have full information about other devices and if the problem occurs could instantly forward process over to other device. As mentioned before these algorithms are called link state algorithms and they have to follow strict steps what is very important for our system. As it was mentioned in Dijkstra algorithm, we would use this algorithm since it is handy in finding the shortest paths between the transmitter and receiver in our case. What is even more important when the algorithm finds the best shortest road is decreasing the “weight” and improves the performance it keeps it permanently. However when the path gets corrupted it starts to look next shortest path which is also a great advantage of this algorithm. Concerning the routing protocols we decided that we should give a try for OSPF or Intermediate system-to-Intermediate system (IS to IS) protocols. The case that we chose these two protocols are that picking the shortest paths will give lower latency results and will not overload our system. IS to IS protocol is using a packet switched method which means that it groups all transmitted data which is important while streaming images or audio messages or streams. When having all these settings it is important to define the topology and as it was mentioned in the report we decided to use two different topologies which are: chained start topology and fully connected topology. The reason why it was chosen is to make smart home performance more efficient. Using start chained topology between the control panel and routers and fully connected topology between the devices taking in consideration if control panel needs to collect information from them or to check the problems caused for some reasons. Even though this kind of connection 97 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik seems to be slower, but more reliable, and our group is preferring reliability more than the small speed improvement. Our main IP addressing is subnetwork, since we want to have a two different network types where control panel is connected with a routers and each of the router is sharing their own information between each other. Next network is when router is fully connected to the devices that are connected to the smart home environment. When having the basic skeleton of the concept the next important issue is Quality of service for media streaming and VoIP since we want to implement the artificial intelligence in our smart home network. Even a slight error in media streaming can affect whole movie or video customer wants to see, taking in consideration the window that can be turned into a huge TV displaying the sunset or a mountain view. In this case we came to a solution to implement OverQoS what will lead us to a more reliable streaming since it is setting higher priorities to important I-frames. VoIP can be solved within a separate network, we have described most important issues that can occur while using VoIP and the issues are latency, jitter and packet loss. In the very beginning of the analysis of VoIP we discussed that the Internap network would be most reliable to use. However the issues with the packet loss lead us to choose Axiowave network since in VoIP technology the most important thing is packet loss. Whenever a packet is lost it can cause a whole performance failure and Axiowave results were more than perfect scoring a 0% of a packet loss. In the very end when already having all this background it already starts to give a clearer look how our concept will look or at least what it will use when we will do our visual concept in OPNET. In future development we are keen to continue reaching our goals and one of the main goal was to build our own concept which can be done over OPNET. OPNET will help us to answer if our chosen technologies were right to build a reliable and fast system in order to satisfy ours as developers’ goals and customer needs. Taking all commercial facts it is very important to build a concept on a software before starting to create a real product due to the huge costs. However this is a far future which will hopefully take place after the concept realization and stable work in OPNET. 98 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik CONCLUSION During this project we tried to answer the questions we stated in our problem formulation. We decided to pick the subject of Smart Home and create a problem formulation that if answered would give a great overview of Smart Homes and the technologies evolving Smart Homes. By solving and answering these problems we can have a great understanding of what the Smart Home state of the art is and how we can improve it in the future. In order to figure out the key issues evolving Smart Homes we had to do a lot of background research, which was used in almost the entire project. After collecting our data we now had a foundation to answer the first of our problems. The Smart Home technologies all work by human settings. That means if you would like to have preferred settings in your house you can simply modify the Smart Home system so it would act as you command. We also got into details about the Smart Home technologies as we discussed and compared different technologies and protocols relevant for our project. The technology analyses in the report also conclude on which technologies and protocols are more efficient and reliable, in our case it was the UBP protocol which had the highest reliability even though it is not the newest protocol. We then use our stakeholder analysis in order to create realistic user scenarios, where Smart Home technologies are used to create an easier life for people living in Smart Homes. The stakeholder analysis also defines how the different “players” are capable of using a Smart Home and what to consider when addressing them. The scenarios are relevant, when finding the requirement specification so a developer would have a smoother transaction if he had to help us build Smart Home technologies. In the market perspective part of the project we also had a SWOT that imagines selling our product if it is created at some point. Furthermore creating user scenarios helps to create a realistic idea of how Smart Home security systems can be created or how it could be improved considering the previous security ideas that were developed in the past. Mobile IP Smart Home researches also gave a clear overview how Smart Home occupants should be provided with high security technologies in order to increase safety normative in Smart Homes. The written concept gave a clear look what kind of technologies are used in this kind of products. Analysing all useful materials gave results which allowed us to build our imagined concept. All in all creating a Smart Home network or just your own network 99 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik then OPNET is a great tool when trying to merge different technologies in the same network. Merging written report and OPNET possibilities will allow us to test in the future whether our picked technologies work in the way we described them. OPNET also gives a great solution in finding out the best reliable and most efficient technologies for a smart network. As we did not have time for using OPNET we tried to visualize the concept by writing and discussing the different technologies available. This led to a “fictive” Smart Home network, which can be used in further research. To conclude on our project we are satisfied with the project we delivered and we got so caught up in the process that we will work on future development and try testing our Smart Home ideas with OPNET even after the project is handed in. 100 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Shortcuts: 1. AC – Air conditioning 2. AMI – Advanced metering infrastructures 3. BGP – Border Gateway Protocol 4. CCFL – Cold cathode fluorescent lamp 5. DDBC1200 – Dynalite HF ballast controllers 6. DDLE802 – Dynalite Leading Edge Dimmers 7. DDMC802 – Dynalite multipurpose controllers 8. DDTC001 – Dynalite time clocks 9. DDRC1220FR-GL – Dynalite relay controllers 10. DF – Delay factor 11. DNS – Domain name system 12. DR – Demand/Response 13. DR2P – Control keypad 14. DV – Distance vector 15. FM – Frequency modulation 16. HAN – Home area network 17. HF – High frequency 18. HVAC – Heating, ventilation and air conditioning 19. ICMP – Internet control message protocol 20. IP – Internet protocol 21. IPv4 – Internet protocol version 4 22. IPv6 – Internet protocol version 6 23. IPVPN – Internet protocol virtual private network 24. IS-IS – Intermediate System-to-Intermediate system 25. ISP – Internet service provider 26. LAN – Local area network 27. LCD – Liquid-crystal display 28. LED – Light-emitting diode 29. LS – Link state 101 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 30. MDI – Media Delivery Index 31. MLR – Media loss rate 32. MPEG – Moving picture expert group 33. MPLS – Multiprotocol Label Switching 34. OC – Optical carrier 35. OLED – Organic liquid-crystal display 36. OSPFv3 – Open shortest path first 37. PC – Personal computer 38. PLC – Programmable logic controller 39. POP – Post office protocol 40. TCP – Transmission control protocol 41. TV - Television 42. QoS – Quality of Service 43. RGB – Red, Green, Blue 44. RIP – Routing information protocol 45. SLA – Service-level agreement 46. SNMP – Simple network management protocol 47. SONET – Synchronous Optical Network 48. T-3, T-5 – Tier 3, Tier 5 49. TFTP – Trivial file transfer protocol 50. UDP – User datagram protocol 51. UPB – Universal powerline bus 52. VoIP – Voice over internet protocol 53. VRF – Virtual Routing Forwarding 102 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik Reference list: 1. Mayr, E. This Is The Norms: The Science of the Living World. Cambridge, MA: Harvard University Press, 1997 2. The Industrial Communication Technology Handbook, Wolfgang Kampichler, 2005, Chapter 4 3. Introduction to Telecommunication network Engineering, Second edition, Anttalainen Tarmo, 2003, Chapter 2 4. ITCOM_course_-_CMT_-_mobile_IP_and_TCP.pdf – CMT Reza Tadayoni 5. The SWOT Analysis: Using Your Strength to Overcome Weaknesses, Using Opportunities to Overcome Threats 6. Ian Graham Requirements Modelling and Specification for Service Oriented Architecture 1. http://www.lighting.philips.com/main/subsites/dynalite/index.wpd?gclid=CMKHotGZm LYCFREfzQod0VQAbQ 2. http://www.phillips.com 3. http://www.lighting.philips.com/main/subsites/dynalite/projects/smart_home/ 4. www.lg.com 5. http://www.sersc.org/journals/IJSH/vol4_no4_2010/4.pdf 6. http://www.pcmag.com/article2/0,2817,2387377,00.asp 7. http://www.hgb-leipzig.de/artnine/huber/writings/internete.html 8. http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Telecom_Whitepaper _Telecommunication_Networks_Security_Management_01_2012.pdf 9. http://farm5.staticflickr.com/4040/4266789711_65d733e2c4_z.jpg?zz=1 10. http://tecschange.org/classic/networks/network-syllabus.html 11. http://www.webopedia.com/TERM/W/Wi_Fi.html 12. http://netforbeginners.about.com/od/i/f/ipv4_vs_ipv6.htm 13. http://hometoys.com/emagazine.php?url=/ezine/11.10/calderone15/index.htm 14. http://www.insteon.com/about-home.html 15. http://www.zigbee.org/About/UnderstandingZigBee.aspx 16. http://www.z-wave.com/modules/Z-WaveSolutions/ 17. http://www.zwave4u.com/content/en/Quick-Start-Guide.html 18. http://www.avsforum.com/t/743146/z-wave 19. http://www.thinkypedia.com/question/34776/ 103 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 20. http://news.bbc.co.uk/2/hi/programmes/click_online/4080566.stm 21. http://www.usnap.org/ 22. http://www.smarthome.com/about_x10.html 23. http://www.pulseworx.com/UPB_.htm 24. http://upload.wikimedia.org/wikipedia/commons/9/96/NetworkTopologies.png 25. http://fcit.usf.edu/network/chap5/chap5.htm 26. http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml 27. http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf 28. http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf 29. http://tools.ietf.org/html/rfc4445 30. http://www.ineoquest.com/sites/default/files/mdi_0.jpg 31. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 32. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 33. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf 34. http://users.salleurl.edu/~zaballos/opnet_interna/pdf/OPNET%20Simulator.pdf 35. http://www.opnet.com/solutions/network_rd/modeler.html 36. http://www.insteon.com/about-howitworks.html 37. http://www.insteon.com/about-howitworks.html 38. http://www.reference.com/motif/Business/stakeholder-analysis 39. http://www.unc.edu/depts/econ/byrns_web/Economicae/monocompt.html 40. http://o.onionstatic.com/images/8/8278/original/700.hq.jpg?3926 41. http://www.decodir.com/wp-content/uploads/2009/10/beautiful-living-room-3drender.jpg 42. http://www.real-visuals.com/wp-content/uploads/2010/02/3d-photograph-realisticquality-Interior-Design-kitchen-rendering-animation.jpg 43. http://us.123rf.com/400wm/400/400/hemul75/hemul750803/hemul75080300010/27 10202-luxurious-bedroom-in-red-3d-rendering.jpg 44. http://www.3dartweb.com/portfolio/bathroom2_post.jpg 104 ITCOM4 2013 AAU-CPH Group 5 Martynas & Frederik 45. http://s3images.coroflot.com/user_files/individual_files/original_150801_ExPgZjzVnIpS gZLBt1AbGIGbe.jpeg 46. http://tools.ietf.org/html/rfc4984#page-8 47. http://www.webopedia.com/quick_ref/internet_connection_types.asp 48. http://compnetworking.about.com/od/internetaccessbestuses/f/cablespeed.htm 49. http://lignup.com/computer-tips/149-internet.html 50. http://classes.soe.ucsc.edu/cmpe080n/Winter04/quizzes/Practice_Quiz3_soln.pdf 51. http://computer.howstuffworks.com/routing-algorithm1.htm 52. http://computer.howstuffworks.com/routing-algorithm2.htm 53. http://optlab-server.sce.carleton.ca/POAnimations2007/DijkstrasAlgo.html 54. http://www.cisco.com/en/US/docs/net_mgmt/active_network_abstraction/3.7/refere nce/guide/routpro.html 55. http://freewimaxinfo.com/routing-protocol-types.html 56. https://learningnetwork.cisco.com/servlet/JiveServlet/showImage/2-12631929676/IP+addressing+scheme.jpg 57. https://supportforums.cisco.com/docs/DOC-17232 58. http://static.usenix.org/events/nsdi0/tech/full_papers/subramanianOver/subramanian Over_html/node15.html 59. http://www.cs.unc.edu/~kmp/comp832-s08/readings/krasic-qos-scalability.pdf 60. http://www.cisco.com/en/US/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoI P.html 61. http://www.businesswire.com/news/home/20040913005122/en/Axiowave-PartnersTeleGea-Offer-Carriers-Automated-Provisioning 105