The main objective of this project is to analyse Smart Home

advertisement
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Aalborg University Copenhagen
Semester: ITCOM 4, Spring 2013
Title: Smart Home Networks
Aalborg University Copenhagen
A.C. Mayers Vænge 15,
2450København SV, Denmark
Project Period: February-June 2013
Semester Coordinator: Morten Falch
Secretary: Maiken Keller
Semester Theme: Smart Home
Technologies
Abstract:
Semester Coordinator:
The main objective of this project is to analyse Smart
Home networks. The theme
of the project stated that the
Secretary:
Supervisor(s):
project has to include the learning goals of the course
Niels Kofoed
Communication and Media technologies and use them in
the project.
Project group no.: 5
We choose the topic of Smart Home Networks, which we
analysed in many sorts of ways.
Members:
Frederik Guldbaek Nielsen
This report contains various elements about the process
in which we created the Smart Home ideas: Methodology
describes the methods used and what we did. Market
analysis like SWOT and Stakeholders are also factors in
the process of creating Smart Home ideas.
The first part of this report clarifies the network part of
________________________
Martynas Mackopetris
the project. It describes technologies, what tools that can
be used and it includes Smart Home architectures. It gives
the reader a good overview of the Smart Home
technologies. The second part focus on marketing and
user scenarios, where the reader can get an insight of
how the Smart Home works.
________________________
The report is focused on creating ideas for “Smart Home
Networks” rather than actual developing a final product.
Copies: 3
Pages: 104
Finished: 2013-06-04
It is therefore more focusing on being an overview of all
the “Smart Home Network” technologies, rather than
making a final product for the market. Using theory only,
this report gives a written concept of a Smart Home
network, which must be tested before it is a final product.
1
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Smart Home Networks
Semester project 4, 2013
Written by:
Martynas Mockapetris
Frederik Guldbæk
2
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Table of content
Introduction ....................................................................................................................................................... 7
Problem Formulation......................................................................................................................................... 8
State of the art................................................................................................................................................... 8
Introduction ................................................................................................................................................... 8
Philips Smart Home development – Philips Dynalite .................................................................................... 8
LG’s Smart Home Service............................................................................................................................. 11
Methodology ................................................................................................................................................... 12
Process for idea ........................................................................................................................................... 12
Different research methods and how we used them in our project ........................................................... 12
Data Collection ............................................................................................................................................ 12
Deduction and Induction ......................................................................................................................... 13
Qualitative and quantitative data ........................................................................................................... 13
Our goals...................................................................................................................................................... 13
From idea to actual writing ......................................................................................................................... 15
Testing ......................................................................................................................................................... 15
Smart home system principles ........................................................................................................................ 15
Artificial intelligence .................................................................................................................................... 15
Monitoring ................................................................................................................................................... 17
Network ....................................................................................................................................................... 18
Internet .................................................................................................................................................... 18
Telecommunication network .................................................................................................................. 19
Computer Network .................................................................................................................................. 20
Wi-Fi......................................................................................................................................................... 20
IP Addresses............................................................................................................................................. 20
Sub Conclusion ............................................................................................................................................ 21
Technologies .................................................................................................................................................... 21
Topologies ....................................................................................................................................................... 27
Basic architecture ........................................................................................................................................ 27
Topology compare ....................................................................................................................................... 28
Which one is the best one? ......................................................................................................................... 30
Quality of Service............................................................................................................................................. 30
Definition ..................................................................................................................................................... 30
Traffic qualities ............................................................................................................................................ 31
3
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Media Delivery Index (MDI)......................................................................................................................... 33
Mobile IP-Bases Smart Home Architecture ..................................................................................................... 34
Introduction ................................................................................................................................................. 34
Smart Home systems ................................................................................................................................... 35
Proposed architectures for Smart Homes ................................................................................................... 37
Sub Conclusion ............................................................................................................................................ 37
Working principles ....................................................................................................................................... 38
OPNET .............................................................................................................................................................. 40
Sub Conclusion ............................................................................................................................................ 42
SWOT ............................................................................................................................................................... 42
Comments to the maxi-maxi strategies: ..................................................................................................... 46
Comments to the mini-maxi strategies: ...................................................................................................... 46
Comments to the maxi-mini strategies: ...................................................................................................... 47
Comments to the mini-mini strategies:....................................................................................................... 47
Sub conclusion: ............................................................................................................................................ 48
Stakeholders .................................................................................................................................................... 48
Introduction ................................................................................................................................................. 48
Our customers ............................................................................................................................................. 50
Average Household (Family).................................................................................................................... 51
Engineer ................................................................................................................................................... 52
Government (Schools, Universities, etc.) ................................................................................................ 53
Government................................................................................................................................................. 53
Perfect Competition ................................................................................................................................ 53
Monopoly ................................................................................................................................................ 54
Oligopoly .................................................................................................................................................. 54
Other developers (competition) .................................................................................................................. 54
People who does not have a smart phone .................................................................................................. 55
Celebrities contributing to the project ........................................................................................................ 55
Big fish companies seeking for the newcomers with high potential........................................................... 55
Philips ...................................................................................................................................................... 55
Siemens ................................................................................................................................................... 55
Sub Conclusion ............................................................................................................................................ 56
Requirement Specifications............................................................................................................................. 56
Functional requirements ............................................................................................................................. 57
4
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Non-Functional requirements ..................................................................................................................... 62
User Scenarios ................................................................................................................................................. 64
Smart Home idea ......................................................................................................................................... 65
Entrance................................................................................................................................................... 66
Living room .............................................................................................................................................. 67
Kitchen ..................................................................................................................................................... 69
Bedroom .................................................................................................................................................. 71
Bathroom ................................................................................................................................................. 73
Basement ................................................................................................................................................. 75
Shelter...................................................................................................................................................... 76
Smart Home cons and pros ............................................................................................................................. 76
Advantages .................................................................................................................................................. 76
Disadvantages.............................................................................................................................................. 77
Use-cases ......................................................................................................................................................... 78
Use case 1 Connection between smartphone and control panel ............................................................... 78
Use case 2 - Connection other devices to the bridge .................................................................................. 79
Use case 3 - Connection between smartphone and Fridge: ....................................................................... 80
Use case 4 - Connection between smartphone and Bathroom lights ......................................................... 82
Use case 5 - Connection between smartphone and curtains ...................................................................... 83
Use case 6 - Connection between smartphone and sink ............................................................................ 84
Use case 7 - Connection between smartphone and OLED Screen .............................................................. 85
Discussion ........................................................................................................................................................ 87
Introduction ................................................................................................................................................. 87
Routing and Addressing............................................................................................................................... 87
Internet Connections ................................................................................................................................... 88
Dial-up access .......................................................................................................................................... 88
Cable – Broadband Internet Connection ................................................................................................. 88
Wireless Internet connections................................................................................................................. 88
OC3 – Optical Carrier ............................................................................................................................... 89
Tier Carrier ............................................................................................................................................... 89
Routing and Forwarding .............................................................................................................................. 89
Routing algorithms ...................................................................................................................................... 90
Link State Algorithms................................................................................................................................... 91
Routing protocols ........................................................................................................................................ 92
5
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Addressing ................................................................................................................................................... 94
Quality of Service for Streaming Media ...................................................................................................... 95
Building the concept .................................................................................................................................... 97
CONCLUSION ................................................................................................................................................... 99
Shortcuts:....................................................................................................................................................... 101
Reference list: ................................................................................................................................................ 103
6
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Introduction
In this paper we will clarify the state of the art, technologies and market perspectives in Smart
Home development. By getting a great overview of the Smart Home state of the art in the
beginning of the paper we set a founding understanding used in the rest of the project. The paper
then give an insight in Smart Home technologies, which are used in Smart Homes and completes
the analysis with a comparison of which technologies are best in our Smart Home case. This
project specifies the requirements and gives realistic use scenarios in which Smart Homes are
relevant. The information is also used in the market perspectives with SWOT and Stakeholder
analysis. The paper ends with a discussion which leads to a conclusion where ideas and facts a put
into a perspective in order to answer the problem formulation.
7
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Problem Formulation
How do smart home technologies work and what requirements does it take to
create a Smart Home network?
1. Which technologies and protocols are more efficient and reliable than others, when
creating a Smart Home network?
In which way did Smart Home affect the daily life of people using it?
1. How are people capable of using Smart Home technologies?
2. Who are the different stakeholders and how do we address them?
How to make 21st century homes smarter than it is already?
1. How to provide a better security for intelligent homes?
2. How to merge different technologies together?
State of the art
Introduction
Before starting to go deeper into Smart Home networks, a research of already existing Smart
Homes was done. This kind of research gave a clearer look on what has to be done in order to
make homes smarter and which parts that has to be improved over time in order to make homes
more advanced. In this part we will give you a brief overview of Philips and LG already developed
technologies.
Philips Smart Home development – Philips Dynalite1
Orchard House
Is an eight bedroom detached residence in Wimbledon Common in South London, to offer
customers unparalleled scale and luxury. The house has 3 floors and provides indoor pool and spa
complex, multiple car garage and security lodge. Philips Dynalite systems control the lighting
1
http://www.lighting.philips.com/main/subsites/dynalite/index.wpd?gclid=CMKHotGZmLYCFREfzQod0VQAbQ
8
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
circuits, heating, gas fires and air conditioning. The house is also provided with the mood lighting,
the control panel is located in the entrance so the customer can set up the mood of each floor in a
colour touchscreen panel. Schematic control allows controlling LED display in every room
separately. The innovation was designed not only to fulfil the customer demands but also to
reduce the energy waste and save lamps lifespan.
Figure 1
2
Products and technologies used:
Each of the climate control systems are fully integrated into the Philips Dynalite network also
including the under-floor water heating system and air conditioning system which is integrated via
a LonWorks interface. This solution helps to integrate all Smart Home ideas into Philips Dynalite
control panel.
Client benefits:

Control panel with OLED display can be used to control the lighting in the whole house,
each room separately.

All the light circuits are programmed to operate at 95 per cent just in order to save up the
energy waste and enlarge lamps lifespan.
2
www.phillips.com
9
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
Hello and Goodbye modes which alternatively turn on or off all of the lighting circuits.
Al-Yamamah University:
The scope of the system included the installation of an intelligent home automation system in all
224 apartments of Al-Yamamah University. System was designed to control HVAC, lighting and
electrical sockets and monitoring power usage in each room. System controls in each apartment
are implemented in the way that in the future it can be updated or upgraded at any time. Each
apartment control system works as standalone entity, in order to make it more advanced, rooms
were provided with wireless connection in order to allow control the system via iPad or iPhone
using the Philips Dynalite DynamicTouch software.
Rozelle Residence:
For this project LEDS throughout with RGB LEDs used to illuminate the courtyard and fountain
located in a glass-roofed enclosure below ground level. Combination of controllers were used with
Philips Dynalite, including DDLE802 leading edge, DDRC1220FR-GL relay, DDBC1200 ballast and
DDMC802 multipurpose controllers.
Dynalite DR2P keypads were used, featuring stainless steel fascia, charcoal buttons, blue LED
indicators and white LED backlights, although much of the system is automated through the use of
a built-in DDTC001 time clock and DUS804C sensors. System modes as “welcome home”,
“goodbye” or “holiday” helps to make the home safer since first two options helps to lock up the
garage indicating the way to the living room from the garage and vice versa. “Holiday” mode helps
to prevent apartments from burglary since it activates preprogramed cycle of lights to make it look
that someone is living in the apartment also “holiday” mode completely turns off heating to
prevent extra costs. In more advanced way there are master bed room additional feature like “his”
and “hers” switch to control all lights at night downstairs. This can be achieved by iPad software.
Customer Benefits:

Very stylish house that keeps its heritage roots while delivering a modern, luxurious living
environment.

Automation is very simple and practical.
10
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Philips Dynalite has done more projects:3

Tennyson Point

George Apartments

Finchley House

Coast Apartments

Ensor Mews

North Narrabeen Residence
LG’s Smart Home Service
“LG Electronics showcased the convenience-enhancing features of its Smart Home Service at the
2013 International Consumer Electronics Show (CES). The advanced system combines the
sophisticated media sharing technologies of SmartShare with the integrated home appliance
management capabilities of SmartControl, enabling the user to take complete command of their
Smart Home environment”.4
Consumers can start their laundry, check what is in the fridge, or have the floor vacuumed, all
while they are away from home. Additionally, it is possible to control the washer or range oven
from the couch with LG’s Smart TV and Magic Remote. Thanks to LG’s SmartControl app,
household chores no longer have to get in the way of watching a favourite movie or show.
SmartShare is featured with a one-touch NFC tagging to instantaneously transfer media content
from one device to another using WiFi or 3G/4G. Users can easily share photos, videos and other
content stored on a smartphone or laptop with their LG Smart TV. The SmartShare application
offers an integrated content view which lists all files located on each connected device; making
searching and accessing content easier than ever.
LG’s convergent home appliance management system, SmartControl, adds further value to LG’s
exceptional range of Smart Home appliances. After NFC one-touch registration, it is possible to
3
4
http://www.lighting.philips.com/main/subsites/dynalite/projects/smart_home/
www.lg.com
11
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
effectively manage LG’s smart washer, refrigerator, range oven, or HOM-BOT from the
SmartControl interface. Delivering greater convenience, the easy-to-use application keeps the user
firmly in control, regardless of their physical location. SmartControl also enables the user to
remotely monitor LG’s super-efficient Smart Home system and to give simple voice commands to
their appliances via smartphone.
Methodology
Process for idea
This is a short summery of how we came up for the idea to this semester project.
First we got a few different topics for the semester project and then chose Smart Home as our
topic for the project.
Then we brainstormed ideas within the Smart Home topic to find out what we already knew about
the topic.
We then choose to focus on Phillips LED lights as a Smart Home solution and then evolved our
project around that system.
After realizing that the project had enormous depth we chose to try to make our own Smart Home
solution using the idea from Phillips LED lights and having it in mind as we wrote.
Different research methods and how we used them in our project
This part explains some of the research methods used in the project and how they were or could
be implemented when working with Smart Homes.
Data Collection
As we did not have any user involvement beside friends and family in this project the Data
Collection was strictly literature reading and other explicit knowledge written or quoted by other
researches. If the project should be investigated further Data Collection methods with user
involvement would be preferred. Sample surveys where a certain amount of a target group is
asked and analysed would give a great and fast overview of our target groups. A disadvantage of
this is that every person in each target group is different, which gives a sample survey less details
12
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
than an all-round survey, however an all-round survey demands a huge workload and efforts
compared to a sample survey.
Deduction and Induction
Deductive reasoning works from the more general to the more specific. It begins with thinking or
making up a theory about Smart Home technologies. Then it is narrowed down into more specific
hypotheses that we can test, which we can do by using OPNET, when trying to create our Smart
Home. It can then be narrowed down even further when we collect observations to address the
hypotheses about our Smart Home technologies. This ultimately leads us to be able to test the
hypotheses with specific data -- a confirmation (or not) of our original theories to see if these
technologies really can merge or not.
Inductive reasoning works the other way around, moving from specific observations to broader
generalizations and theories. In inductive reasoning, we begin with specific observations and
measures, this could be an already installed Smart Home application seen in OPNET. We then
begin to detect patterns and regularities, formulate some tentative hypotheses about how the
system is working and we can now explore if they are true. Finally in the end based on our
observations we can end up developing some general conclusions or theories about the Smart
Home application or technology.
Qualitative and quantitative data
Another research fact is that when dealing with user involvement you have two types of data:
qualitative and quantitative data. If qualitative data is necessary interview of professors or Smart
Home developers would provide depth and great knowledge of the subject would provide us with
qualitative data. If quantitative data is necessary surveys are a good way of getting an overview
and lots of data to use in statistics and other ways.
Our goals
For this project lot of goals was created of which we tried to for fill them while writing this paper.
In this next part it is described how some of these goals were approached and which methods
were used to reach the goals.

Find the technologies that are used in Smart Homes.
13
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
We used data collection methods that are very objective since these were literature reading of
hard facts and no personal opinions or interviews were done to for fill this goal.

Specify Stakeholders
This was actually one of the hardest goals to reach as we had to imagine which person would use
this kind of technologies, how they would and if they are capable of doing so. After we imagined
the persons of whom could have an interest we needed to find out exactly how they fit in a Smart
Home comparing them in all sorts of way. So this method started with a theory of our
stakeholders and then ended with a confirmation, which in any case of finding our stakeholders
was a deductive reasoning.

How to merge more technologies
After choosing which technologies we would like, a program called OPNET, which is explained
later, was used. So our method was using data preparation and from testing to see if the
technologies would merge and how the design would look like.

How can we make improvements for Smart Homes?
This was the largest goal and we had to use both theoretical knowledge and empirical as we tried
to reach this goal. Using empirical knowledge already known we could imagine the causal
hypothesis which comes to effect when working with people. Cause-effects and relationships were
imagined in our stakeholders analysis and user scenarios – where also our friends and family came
with insight in how they would use a Smart Home. For theoretical knowledge we kept using our
literature review as guidance to remember what was previously and what the state of the art
technologies for Smart Homes are. If we would want to test our Smart Home solution and ideas
later, we would have to take in count the nomathetics5 to remember what the norms and
standard is for a Smart Home and the probalistics. Basing our statistics from OPNET with our
research finding out what the probabilities of a successful Smart Home system would be.
5
Mayr, E. This Is The Norms: The Science of the Living World. Cambridge, MA: Harvard University Press, 1997
14
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
From idea to actual writing
After the foundation was found for the project we did researching by knowledge collecting. We
did literature reading and explicit knowledge gathering too.
Technological analysing was done, where all the different techniques were analyse to give a
comparison to see which technologies were best in our case.
To give an understanding of what our ideas was like if they were used in real life we did user
scenarios where we picture the Smart Homes both graphic and in words.
Testing
If we will continue our further investigations about the Smart Home development and to build our
concept OPNET will be the solution, a brief description of OPNET is explained below.
In order to realize the ideas it is less expensive to do it over special software where developer can
follow all actions and performance over the computer. OPNET is one of the solutions to do this,
this application helps to analyse tests or improve the existing Smart Home network with a new
protocols or devices. By that developer can see how the performance of Smart Home is changing.
Whenever by the time adding more and more devices it is obvious that it will take more protocols
to connect devices with each other and OPNET allows developers to do so and by allowing to do
this the program also shows the reliability of the performing protocol. This leads to a results
whether this protocol is really the best pick to implement in the network in order to connect the
device or not. Assuming the great prospects of this application, great reviews and possibilities this
will be the first step realizing our own Smart Home idea before showing the real concept to the
public.
Smart home system principles
Artificial intelligence
Artificial intelligence is the intelligence of machines or software and also a branch of computer
15
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
science that studies and develops intelligent machines and software. Artificial intelligence in the
future can help many lives, since scientists sees the AI it will be a revolution.
These days artificial intelligence can create an environment where a group of sophisticated
appliances and devices can infer and suitably react according to changing conditions and events 6.
By identifying abnormal or unexpected events and, when necessary alerting the home’s occupants
the home intelligence module can provide an immediate automatic response if desired. Events
describe and define the behaviour of the intelligent home. Events might be related to health,
convenience, security or any other practical issue. Artificial intelligence must enable centralized
management and monitoring of all events, leveraging main alerts and obtaining input from several
devices and the same time. For example, an alert could be initiated if, when the doors are locked
and the house is presumed to be empty, a window is suddenly opened.
Artificial intelligence must have learning module and reasoning capabilities from the home
intelligence by caused events or software setups. Looking to the future artificial intelligence must
have a virtual “brains” in order to have an understanding and conversation capabilities with a
house holder where holder could order to a robot so he could set up the settings to the required
ones. Looking deeper into the future Smart Home artificial intelligence should be so sophisticated
that it could read the mood or behaviour of people how they are entering the house and set up it
automatically without even person ordering home “brains” how to set up the house for best
pleasure. Even though it seems the aim of creating the home “brains” is a hard process to create.
The process seems to develop all the time and it is also improving. This shows that improvements
can be done everywhere and all the time with Smart Home intelligence. However this requires
time in order to develop these intelligences and there can happen all sorts of problems. For
example intruders can falsify the commands since the sophisticated intelligence will only read the
commands and fulfil them, by not knowing if the person is a true house holder. This requires voice
recognition in order to make it suitable and address the security issues to make it safe to use.
Additional ideas like person identification by hand or eye or simply by scanning cameras
information by the height of person can identify if the person is really the house holder. All in all
we could imagine and presume a future home when Peter and Ann comes back from a party and
6
http://www.sersc.org/journals/IJSH/vol4_no4_2010/4.pdf
16
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
by their voices command and they are setting up the orders to make them a cup of coffee, turn in
the romantic music, change the LCD screen icons to more atmosphere suitable, dim the light to
more suitable and cosier atmosphere. Unfortunately when thinking about state of the art
technologies which we take in consideration multi functioning devices as a connection between
the intelligence and person to make homes smart are not available in such functions. Furthermore
this step can be considered as a middle line between the past and future homes and how
researchers would like it to be as.
Monitoring
There are different screens that can be used when monitoring the performance of the Smart
Home energy usage. They can be displaying wallpapers on them, starting from Plasma screens
finishing with OLED screens7. All four technologies including LCD screens are vastly different,
particularly how each screen is lit. Plasma screens using the phosphors that create the image on
the screen light up themselves, and do not require backlighting. Comparing to a LCD screen liquid
does not illuminate which requires a separate light source. This is where the difference from
regular LCD and LED screen comes in. Traditional LCD screens use cold cathode fluorescent lights
(CCFL) to illuminate the screen. LED screens use light emitting diodes (LED) to illuminate the
display. LED backlighting has become more common than CCFLs is only used on “budget” screens.
OLED is a new large-screen technology. The panel is made out of millions of tiny LED’s. The letter O
stands for organic which means there is carbon within the molecules of the emissive layer of the
panel. Comparing separately several factors can be influenced by the type of screen that is used to
display the images. Among them there are factors such as screen thickness, brightness, darkness,
energy efficiency and price. Closest to fulfil all these goals are LED screens, unfortunately the price
of these screens comparing to other two technologies are the highest.
Taking in consideration that the user wants to have the best image quality he can possibly get it
comes a fact that some tests has to be made to understand which screen is actually providing that
quality. Black and white colour tests helps to analyse which screens can actually display shadows
and sun flashes, since it is very common that something that is behind those shadows or flashes
are also very important. In the testing reviews LED screens showed the best results by giving the
7
http://www.pcmag.com/article2/0,2817,2387377,00.asp
17
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
lowest level of black which can possibly be – 0.01 cd/m2 and giving the highest white level of
382.62 cd/m2 comparing these two numbers we are getting an outstanding contrast ratio of
382262:1 while plasma screens can only offer 2848:1 ratio. Looking at the power and size is a
winner everywhere LED screens are thinner, lighter and the energy efficiency is nearly three times
lower comparing to plasma screen.
If the Smart Home must be provided with the best technologies the OLED is by far the best
customer can have, however considering the cost cheaper products can be installed to save the
primary costs of the house.
Network
Internet8
The internet is a global system of interconnected computer networks that use standard TCP/IP
internet protocol suite. The internet carries an extensive range of information resources and
services.
Every computer that is connected to the internet is a part of a network. All computers connected
to the internet has a service provider, however before that a group of computers can create a
local area network. In every region internet providers have a point of presence (POP), the place for
local users to access the internet provider’s network. All networks rely on network access points
(NAP), backbones and routers to reach each other. Routers determine where the information has
to be sent from one computer or device to another. A router is useful in dealing with two separate
computer networks, it joins the two networks, passing information from one to the other. It also
protects the networks from one another. What is more it also protects networks from one another
preventing the traffic on one from unnecessarily spilling over to the other.
Internet backbones are fiber optic trunk lines, that has multiple fiber optic cables combined
together to increase the capacity.
8
http://www.hgb-leipzig.de/artnine/huber/writings/internete.html
18
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Telecommunication network9
Telecommunication network is what brings Smart Homes into one big piece. Telecommunication
networks are a collection of terminal nodes, intermediate nodes and links which are connected so
as to enable telecommunication between the terminals.
The transmission links connects nodes together; nodes are using circuit, message or packet
switching methods to pass the signal trough the correct links and nodes to reach the correct
destination terminal10. Each terminal in the network usually has unique addresses so messages or
connection can be routed to the correct recipients. However if the address is the same a solution
of different ports can be implement to reach the specific recipient. All this unique address
collection is called the address space.
Messages are generated by a sending terminal, then passing through the network of links and
nodes until they reach the destination terminal. It is the job of the intermediate nodes to handle
the messages and route them the correct link toward their end destination. This kind of messages
consisting of control and bearer parts which can be sent both ways, separated or at once. Control
message is consisting instructions how the message should be routed though the network. Bearer
part is consisted of the content the user wants to transmit: Requests, voice commands etc.
Network tree11
Figure 2
9
http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Telecom_Whitepaper_Telecommunication
_Networks_Security_Management_01_2012.pdf
10
Introduction to Telecommunication network Engineering, Second edition, Anttalainen Tarmo, 2003, Chapter 2
11
http://farm5.staticflickr.com/4040/4266789711_65d733e2c4_z.jpg?zz=1
19
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Computer Network12
Before even starting to develop a Smart Home it is very important to understand what a system
needs, how it has to be created and to know even very basics of the computer network to even
start pairing devices. A computer network is a telecommunications network that connects a
collection of computers or devices to allow communication and data exchange between systems,
software applications and users. Computers that are involved in the network that originate and
terminate the data are called nodes. Two devices are networked when a process in one device is
able to exchange information with a process in another device.
Wi-Fi13
It is a popular technology that allows users using electronic devices to exchange data wirelessly
using radio waves over a computer network including high speed internet connections. The device
that can use Wi-Fi can connect to a network resource such as the internet via a wireless network
access point. Wi-Fi can be less secure than wired connections because an intruder does not need a
physical connection.
In order to use Wi-Fi a device must be a station14 which means that the device has to have a
wireless network interface controller. All these stations using single radio frequency
communication channel. Wi-Fi these days provides services in private houses, public spaces Wi-Fi
hotspots which are set up free-of-charge or commercially, and independent businesses.
IP Addresses15
Every device which is using internet has a unique Internet protocol (IP) address. There are two
versions of IP that are used these days IPv4/IPv6. IPv4 is offering approx. 4.3 billion addresses.
However the population is growing and so is the number of devices that are being used. This is
what led to the realization of IPv6 which offers 2128 possible addresses. IPv4 is a 32bit numbers
and IP address is show: 62.61.145.89. IPv6 is a 128bit and IP address is displayed like this:
2001:0:5ef5:79fd:1022:14e8:c1c2:6ea6. Each of the versions has reserved a part of IP addresses
for private networks, multicasting, private addresses or internal networks.
12
http://tecschange.org/classic/networks/network-syllabus.html
http://www.webopedia.com/TERM/W/Wi_Fi.html
14
Mobile Communications, Second Edition, Jochen Schiller
15
http://netforbeginners.about.com/od/i/f/ipv4_vs_ipv6.htm
13
20
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Sub Conclusion
It is necessary to analyse the whole network structure to get a better overview of what it takes to
make a Smart Home and to make the system efficient and reliable, secure and fast. It is obvious in
order to make a development of a Smart Home, the developer must have deep skills in many
sections to start creating something useful. When making this kind of deep researches in each
possible way it gives more threats of where the system can fail, however it can give a better
solution, inspiration or replacements to make the system work better.
Technologies
These days it is still hard to develop Smart Home ideas since the communication between each
object is very different and this requires a lot of protocols to be used in order to combine a Smart
Home as a one piece. Using many protocols can be inefficient and unreliable since malfunctions
can occur during the process. To give a better overview about the protocols used in Smart Homes
we will describe them each individually below16:

INSTEON17 - Wireless home controlling system. It is a dual-mesh control and sensing
remote control technology. Lighting control, leak, door and motion sensing, garage door
control are amongst the most popular applications.
INSTEON uses unique, dual-band approach to provide reliability not attainable by single
band technologies. Using both existing power lines in the home and radio-frequency
communication INSTEON adds remote control for lighting and home applications of all
types. INSTEON allows customer to manage his property system in the way the customer
wants. Furthermore INSTEON technologies are easy to install, INSTEON is a good example
how to make Smart Home, how to make them fun and safe.
Advantages:
-
Using both radio frequency signals and electrical wiring to connect to each other.
-
Every device is acting as a repeater
-
Simple and universal
16
http://hometoys.com/emagazine.php?url=/ezine/11.10/calderone15/index.htm
17
http://www.insteon.com/about-home.html
21
ITCOM4
2013
-
AAU-CPH
Group 5
Martynas & Frederik
No controller or network setup is required
Disadvantages:
-
Cloud-based offering, which relies on Smart Home continuing to run this service for
years to come
-
Not as full featured as some higher end products with complex macros and scene
configurations

Smartphone (Android/iOS) only, no PC software or no decent direct web interface
ZigBee18 – “green” technologies that offers global wireless standards connecting the widest
range of devices to work together intelligently. ZigBee allows user too easily and cost
reducing add features which improves the efficiency, safety, security, reliability and
convenience of customer products.
Advantages:
-
Very low power requirements
-
Zigbee devices have many applications
-
Medical monitoring of residents
-
Operates on several different bands, including 2.4 GHz, 915 MHz, and 868 MHz,
sending wireless signals to communicate between nodes.
Disadvantages:
-
Low complexity
-
Short range
-
Low data speed
-
High costs
-
Used mainly in concentrators, data collectors, repeaters, and meters installed in the
urban distribution AMR systems and prepayment systems
18
http://www.zigbee.org/About/UnderstandingZigBee.aspx
22
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
Z-Wave19 is one of the newest control systems developed for Smart Homes, Z-Wave differ
from others that they can provide a full package with all existing features to control a
Smart Home or each feature individually. Furthermore Z-Wave is capable of offering a low
price products comparing to other protocols. Z-Wave lets customer to build their Smart
Home step by step expanding technologies all over the house adding feature by feature.
Using Z-Wave technologies user is able to create his own “end day chain” user can combine
couple of features in one to finish the day for example: When the lights are dimmed off
coffee machine prepares coffee, temperature sets to a different level and air conditioning
humidity sets to a mild sea atmosphere.
Advantages:
-
Convenience
-
Easy to set up20
-
Almost 800 interoperable products
Disadvantages21:

-
All modules have to be polled if you want to get two way status
-
Slow network
-
The more modules are used the higher latency is reached
HomePlug22 is an industry Alliance comprised of industry leaders at each level of the value
chain starting from technologies ending with services and content. HomePlug is providing
new services, content to pull demand for network devices, requirements to support
devices over the network, custom care and etc.
Advantages:
-
Easy to install
-
Very high speed – 200Mbps
19
http://www.z-wave.com/modules/Z-WaveSolutions/
http://www.zwave4u.com/content/en/Quick-Start-Guide.html
21
http://www.avsforum.com/t/743146/z-wave
22
http://www.thinkypedia.com/question/34776/
20
23
ITCOM4
2013
-
AAU-CPH
Group 5
Martynas & Frederik
No cables are needed
Disadvantages:

-
Cost – Main price 80-100 pounds + 50pounds more for each extra adapter
-
No ability to listen to radio while using radio, since wires will act like antennas 23.
USNAP24 - the technology which was developed to manage the thermostat to be built in an
inexpensive way so that they could communicate with different other utility systems, such
as mentioned above. The first problem that was occurring the company that not all
systems are operating over the same networks and protocols. Company goal was not to
make another separate network and protocol, but use already existing one in order to
connect system into one family.
Advantages:
-
Off-the-shelf residential devices can be compatible with various demand response
programs, including OpenADR, Smart Energy Profile, pager, FM, AMI or a proprietary
interface.
-
Consumer products can also connect to a Home Area Network (HAN), Local Area
Network (LAN) or home automation network based on wireless standards (ZigBee, ZWave, EnOcean), power line carrier (PLC) standards (HomePlug, LonWorks, G.hn) or
wired standards (ClimateTalk or Ethernet).
-
Consumer purchases could be decoupled from the local utility's technology choices, so
a consumer that is relocating can take their appliances with them, and they will be
compatible with other programs wherever they go.
-
Utilities may select and evolve their communication systems and DR program
characteristics over time without impacting the consumer's products.
-
Appliance service can last for 20 to 30 years without risk of obsolescence due to
evolving communication systems.
-
23
24
A single communication module may work on multiple end devices.
http://news.bbc.co.uk/2/hi/programmes/click_online/4080566.stm
http://www.usnap.org/
24
ITCOM4
2013
-
AAU-CPH
Group 5
Martynas & Frederik
No electrician or utility service calls are required to add a new device to a program.
Disadvantages:

-
Slow data rate
-
Requires a large infrastructure of repeaters
X1025: Is a protocol primarily uses power line wiring for signalling and control. Packets
transmitted using the X10 control protocol consists of a four bit house code followed by
one or more four bit unit codes, finally followed by four bit command. When system is
installed, each controlled device is configured to respond to one of the 256 possible
addresses (16 house codes – letters from A to P and 16 unit codes – numbers from 1 to 16)
each device reacts to commands specifically addressed to it, or possibly to several
broadcast commands. X10 is using one method what means that devices only receives
commands and do not respond acknowledge about their status to the network, this makes
it cheaper. There are 3 type of controllers, simple ones where 4 X10 devices can be
controlled, more sophisticated where user can control more units and set timers, and most
advanced which can be fully programmed to control the whole house. There are bridges to
translate X10 to other home automated standards for example: ioBridge can be used to
translate the X10 protocol to a web service API. It is estimated that X10 compatible
products can be found in over 10 million American homes. This is because it has so many
advantages over other types of remote control products and systems
Advantages:
25
-
Inexpensive
-
No new wiring is required -- perfect for retrofit
-
Simple to install
-
100's of compatible products
-
Control up to 256 lights and appliances
-
Time proven -- it has been around for over 30 years
http://www.smarthome.com/about_x10.html
25
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Disadvantages:
-
Signals from a transmitter on one live conductor may not propagate trough the high
impedance of the distribution transformer winding to the other live conductor
-
It is not suitable as a safety device. Switching a device off via X10 doesn't necessarily
mean the device is now isolated from the power supply since the X10 module is still
live.
-
The X10 protocol does not include any form of error analysis. If two X10 controllers
send a signal to a device at one time, they may interfere with each other and neither
command may be carried out.
-
There is a time delay in sending signals - up to one second.
-
Other electrical devices in the house can create interference on the power lines, which
may prevent X10 signals being received by modules.
-
It doesn't allow more complex forms of communication, e.g. selecting a channel on a
television.

UPB26: Is a protocol for communication among devices used for home automation. It uses
power line wiring for signalling the control. UPB was developed by Power Systems of
Northridge. In compare against X10, X10 have 70-80 percent reliability without firewalls,
while UPB has more than 99 percent reliability.
Power line carrier control overview - UPB communication method consists of a series of
precisely timed electrical pulses (called UPB Pulses) that are superimposed on top of the
normal AC power waveform (sine wave). Receiving UPB devices can easily detect and
analyse these UPB Pulses and pull out the encoded digital information from them.
Controllers - They differ from extremely simple plug-in modules to a very sophisticated
whole house automation controllers. Simplest controllers are used to carry out a small
range of devices. Advanced controllers can control more units incorporate timers that
performs pre-programmed functions in a specific time of the day. Whole house automation
26
http://www.pulseworx.com/UPB_.htm
26
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
can be fully programmer, system can execute many different timed events, execute and
respond to external sensors.
Advantages:
-
Very reliable
-
Different controllers to fulfil user needs
Disadvantages:
-
Can be affected by devices on the powerline
Topologies
Basic architecture
Communication networks based on serial data transmission are the platform of up-to-date
systems. Task always stays the same – transfer data from one device to other. Network topology
describes the physical arrangement of the participants in relation to each other within a network.
There can be different types of connection, all of them showed below in the picture, ring, mesh,
star, line, tree, bus, fully connected topologies. Over the internet people are connected to the
servers, servers connected to the control stations, this chain allows people to have different
topology in different server and allow them to connect even though they have different typology
type.
27
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
27
Figure 3
Topology compare
Tree and bus topologies, they are very similar to each other. Bus topology has a simple structure,
all participants communicate over the same line and connected via short stub lines so each
participant requires only one interface to the bus. When using the same line, message send to
other receiver can be seen within all other bus topology users, which also allows them easily do
broadcasting or multicasting. Transmission is controlled by a special bus access control unit which
maintain the functions of the bus operated system even if one station fails. Tree topology28 can be
called a multiple bus line chain since a tree topology is consisting of multiple bus topologies
connect into one group. Using this topology it helps to create larger network areas while bus
structure without line repeaters is limited.
Ring and star topology; both of them are connected via two-point line. In a ring topology the signal
can be amplified whenever it is forwarded, which means long distances can be covered. The
disadvantage of the ring topology is that transmission speed depends on the number and
processing speed of the participants. Unfortunately this means that the failure of single participant
can lead network failure if no extra ring is provided. Star topology centre works in two different
ways. It can be as a master for controlling the network or be passive and assume the tasks of star
coupler, which allows to establish a connection between the current transmitter and receiver. The
27
28
http://upload.wikimedia.org/wikipedia/commons/9/96/NetworkTopologies.png
http://fcit.usf.edu/network/chap5/chap5.htm
28
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
main disadvantage of both topologies is that it can cause an entire network failure due to the
central station.
Circuit switched networks require dedicated point-to-point connection during the calls. Packet
switched networks move data in separate, small blocks (packets) based on the destination address
in each packets. When packets are received they are reorganized in the right order in the
receiver’s device to display the message. Both technologies are widely used and has its own place
to work in, circuit switched network is used to make calls while packet switched is used to retrieve
data. Packet switching is much more efficient since it can transfer a huge amount of data.
Connectionless: 29the word itself means that to set up a connection in a dedicated end-to-end way
you do not need any effort. The connection is usually achieved by transmitting information in one
direction from source to destination, without checking to see if the destination did not changed
and is still there or if the receiver is ready to receive the information. The system works fine when
high speeds are used, disadvantages can be seen in this connection when the speed is low and
when it requires to retransmit lost segments before the complete message is received.
Connectionless protocols are: IP, UDP, DNS, SNMP, TFTP, ICMP.
Connection-Oriented:30 this method is more advanced it uses handshake method to set up endto-end connection. Methods that can be used in handshaking can be very simple like in TCP or
difficult communications like in modems. System can only work in bi-directional environment, to
negotiate a connection; both sides must be able to communicate with each other.
By this analysis we can see that even though Connectionless method has an advantage when high
communication speeds are reached and no retransmission is required, but if the retransmission is
used there are no data what segments are been lost what will require to retransmit the whole
segment again till it will be good. Even though the Connection Oriented method is slower it has its
advantage that it follows the segments and if one of them is lost missing packet can be sent again
29
http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml
30
http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml
29
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
in order not to send whole segments from beginning. Which means this at some points can be a
more efficient and secure way to transfer data between users.
Which one is the best one?
Talking about Smart Home innovation, from the first look it seems that using a chained star
topology would be the best in order to connect the whole house devices with the routers and
routers with the control panel. However it seems that fully connected topology would allow Smart
Home to work more efficient, reliable and more secured. From our point of view as developers we
think that using two topologies together would cause the best performance. Using star topology
to connect and control the control panel with the routers, by using this it will use the secure
sending of packets from the control to the router which is responsible for the receiving device.
This also means that if any of the packets were lost or out of order the distance between the
transmitter and receiver is reduced which also means that it is easier to detect where the problem
was caused and to resend the missing packet. Using fully connected topology in the rooms would
allow devices to communicate between each other and track the entire working environment in
the room where the settings must be set up. Furthermore it would be easier to collect the reports
of the done actions. Looking from the perspective way if this kind of report sending might be
implemented it can also give a good solution how to track working, not responding, out of order
devices. If this would be the issue the report would be sent to the router that the report was failed
to collect information for example from the coffee machine and from router it would be directly
send to the control panel from where the user would be reached.
Quality of Service
Definition
Quality of service comprises requirements on all the aspects of a connection31, such as service
response time, loss, signal-to-noise ratio, cross-talk, echo, interrupts, frequency response,
loudness levels and many others. In the field of computer networking and other packet-switched
telecommunication networks, the traffic engineering term refers to resource reservation control
mechanisms rather than achieved service quality. Quality of service is the ability to provide
31
The Industrial Communication Technology Handbook, Wolfgang Kampichler, 2005, Chapter 4
30
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
different priority to different application, users or data flows, or to guarantee a certain level of
performance to a data flow. For example, a required delay, jitter, bit rate, packet dropping
probability and bit error rate may be guaranteed. Quality of service guarantees are important if
the network capacity is insufficient.
A network or protocol that supports QoS may agree on a traffic contract with the application
software and reserve capacity in the network nodes, for example during a session establishment
phase. During the session it may monitor the achieved level of performance, for example the data
rate and delay and dynamically control scheduling priorities in the network nodes. It may release
the reserved capacity during a tear down phase. QoS is sometimes used as a quality measure, with
many alternative definitions, rather than referring to the ability to reserve resources. Quality of
service sometimes refers to the level of quality of service, the guaranteed service quality.
Traffic qualities
In packet-switched networks, quality of service is affected by various factors, which can be
separated into two factors, technical and human. Technical factor is affected by: reliability,
scalability, effectiveness, maintainability, grade of service. Human factors can include: stability of
service, delays, availability of service, user information. Different things can happen to packets as
they go through from transmitter to receiver, resulting these following problems can occur:
Low throughput: Due to varying load from other sharing devices on the same network resources,
the bit rate that can be provided to a certain data stream might be too low for real-time
multimedia services. If for example all data streams get the same scheduling priority. Throughput
is usually measured in bits per second in rare cases in data packets per second or data packets per
time slot.
Talking about the Smart Homes quality as a high throughput is necessary in order to make Smart
Home vision real. Throughput describes the rate of successfully delivered messages or requests in
this case over a communication channel. This data might be delivered over logical or physical link.
Throughput can be analysed mathematically by means of queuing theory, where the load in
packets per time unit is denoted arrival rate – λ and the throughput in packets per time unit is
denoted departure rate – μ.
31
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Figure 4
Dropped packets: The routers might fail to deliver some packets if their data is corrupted or they
arrive when their buffers are already full. The receiving device might ask for this information to be
retransmitted, possibly causing severe delays in the overall transmission. Measuring this it is
necessary to assure that the dropped packets would reach the device in the first attempt. In order
to this some additional packet scanners could be implemented in the control panel to scan the
packets before sending them to the receiver to make system reliable, fast and efficient. If system
would fail to send packets to the receiver Smart Home control panel might check the whole
parameter setup between the transmitter and receiver before starting to resend the packets what
would cause customer to complain about the slow product work and a potential delay of efficient
Smart Home installation worldwide.
Errors: Sometimes packets are corrupted due to bit errors caused by interference and noise,
especially when talking about copper wires and wireless communications. The receiver has to
detect this and, just as if the packet was dropped, may ask for this information to be
retransmitted. This problem might be very touching when trying to develop ideas about the voice
recognition commands technologies. Recording devices are almost impossible to record only
human voice, recording devices always record everything they are hearing and scanning with the
filters the commands that were given by the human. However commands can often be heard less
than the extraneous sounds and artificial intelligence which has the possibility to read commands
trough the voice commands may not understand the orders and ask to repeat them.
Latency: It is one of the most important aspects when talking on system efficiency. Latency is
depending on packets reaching their destination and the long time they might take to do that. This
might be caused by held up in long queues or by avoiding congestion taking longer routes to reach
the receiver. The difference between latency and throughput is that the delay can be built up over
the time, even if the throughput is almost normal.
Jitter: Packets from the transmitter would reach the receiver with different delays. The packet
delays vary with its position in the queues of the router along the path between sender and
receiver and the destination can change unpredictably. This variation in delay can seriously affect
32
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
the quality of streaming audio or video. Taking in consideration Smart Home application it is
obvious that humans by making request will not be in the same place all the time it is more likely
he will move back and forth in the house or make a request for example while driving a car. These
different destinations can cause connection slowdowns or even connection loss what will cause
jitter while sending packets with the set ups to control panel. In order to solve this issue strong
routers and high private network connections must be developed in each home.
Out-of-order delivery: When a number of related packets are routed through a network, different
packet might choose different road to reach the receiver what can cause different delays. What
this means that the sent packets even though were sent in the right order, by choosing different
way and receiving different delays the order might be lost in the receivers side. This kind of
problem requires special additional protocols responsible for the rearranging out-of-order packets
to an isochronous state on they reach the receiver.
Media Delivery Index (MDI)
The MDI provides a relative indicator of needed buffer depths at the consumer node due to packet
jitter as well as an indication of lost packets. By probing a streaming media service network at
various nodes and under varying load conditions, it is possible to quickly identify devices or locales
that introduce significant jitter or packet loss to the packet stream. By monitoring a network
continuously, deviations from nominal jitter or loss behaviour can be used to indicate an
impending or ongoing fault condition such as excessive load. It is believed that the MDI provides
the necessary information to detect all network-induced impairments for streaming video or VoIP
applications. Other parameters may be required to troubleshoot and correct impairments.
MDI consists of two components: the Delay Factor (DF) and the Media Loss Rate (MLR). Delay
factor is the maximum difference, observed at the end of each media stream packet, between the
arrival of media data and the drain of media data. This assumes the drain rate is the normal
constant traffic rate for constant bit rate streams. The DF is the maximum observed value of the
flow rate imbalance over a calculation interval. This buffered media data in bytes is expressed in
terms how long, it would take to fill this data at the nominal traffic rate to obtain the DF. The delay
factor gives a hint of the minimum size of the buffer required at the next downstream node. As a
stream progresses, the variation of the DF indicates packet bunching or packet jitter.
33
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
The DF is computed at the arrival time of each packet at the point of measurement and displayed
and/or recorded at time intervals. A time interval is typically about 1 second. The DF is updated
and displayed at the end of an interval. Given a virtual buffer level X where DF is being measured,
X = |Bytes Received – Bytes Drained| then, DF = [max(X) – min(X)] / media rate32
Media Loss Rate is the count of lost flow packets over the selected time frame, where the flow
packets are packets that are carrying streaming information. There might be more than zero
streaming packets in one IP packet. Including out-of-order packets is important as many stream
consumer-type devices do not attempt to reorder packets that are received out of order.
MLR = (Packets Expected – Packets Received) / interval time in seconds33
The MDI combines the Delay Factor, which measures potential impending data loss, Media Loss
Rate is the indicator of lost data. By monitoring both components minimum and maximum
excursions over a measurement period and at multiple strategic locations in a network, traffic
congestion or device impairments may be detected and isolated for a network carrying streaming
media content.34
35
Figure 5
Mobile IP-Bases Smart Home Architecture
Introduction
Smart home is a set of technologies and services through home network to provide a better
quality life. In this section we will talk about technologies for mobile IP and potential applications
in Smart Homes security and automation. The qualities of a perfect Smart Home application
32
http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf
http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf
34
http://tools.ietf.org/html/rfc4445
35
http://www.ineoquest.com/sites/default/files/mdi_0.jpg
33
34
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
system are also identified and serve as the basis for the design of a ubiquitous architecture for IPbased Smart Home system. The principles of MIPv636 for moving nodes are adopted for a more
refined mobility solution. Furthermore we will describe how Smart Home works; architecture for
mobile IP-based Smart Home.
Smart Home systems
Smart Home is defined as a home equipped with structured wiring to allow occupants to remotely
control or request an array of automated home electrical devices by entering a command.
Automation of Smart Home is always expanding since more and more electronic technologies
covers human work. In traditional Smart Home architectures components in home network are
controlled by the home gateway, which is a service provider for customers. All protocols for
operating the home devices are defined in this server.
37
Figure 6
Some of the devices and appliances can work as a peer-to-peer network setup, but is on applicable
to home devices that are using same protocols. Therefore home gateway is enable as the service
gateway, translating between different protocols for appliances. The different technologies that
could provide for Smart Home communication are X10, Insteon, ZigBee, Z-wave and others. All the
appliances and devices connected to the home network are receivers and the means of controlling
the system, such as remote control or keypads, are transmitters. Smart Homes are trying to give
ability to make persons like easier and more convenient. Whether you are at work or on holiday’s
36
ITCOM_course_-_CMT_-_mobile_IP_and_TCP.pdf – CMT Reza Tadayoni
37
http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
35
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Smart Home gives you possibility to be always alerted to what is going on in your apartment and
security systems can be built to provide an immense amount of help in emergency case. If some
kind of emergency would happen the fire alarm would wake up the occupant it would also light
the way to the exit, dial the fire department and unlock the doors.
Figure 7
38
Smart Home technologies promises a bright future benefits for an elderly person living alone.
Smart Home will allow notifications that resident has to take medicine, it will also alert the
hospital if the resident is not fallowing the medicine instructions or if he felt or how much the
patient was eating. In the figure above shows what kind of applications Smart Home can offer, this
project was developed by Nokia. However getting back on track, Smart Home development is not
only based on elderly people, Smart Home is based on all human beings to help their life make
much easier and in some cases “luxurious”.
38
http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
36
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Proposed architectures for Smart Homes
The proposed architecture for Smart Home is based on the integration of the emerging
technologies of wireless sensor networks and mobile IP. Mobile IPv6 is a version of mobile IP that
allows users with a mobile device whose IP addresses are associated with one network to stay
connected when moving to a network with a different IP address. Whenever user leaves the
network with which his device is connected – home network – and enters the domain of a
foreigner network, the foreign network uses the Mobile IP protocol to inform the home network
of an address to which all packets for the user device should be delivered. Each mobile node is
identified by its home address according to its current location in the network. While away from
its home network, a mobile node is associated with a care-of address which identifies its current
location and its home address is associated with the local endpoint of a tunnel to its home agent.
Mobile IP is most often found in wireless WAN environments where users need to carry their
mobile devices across multiple LANs with different IP addresses.39
Standard mobile IPv6 message format will be utilized for communication among nodes and
exchange of home information within the Smart Home system. The communication signals from
the user will go through authentication process as for the standard MIPv6 handover scheme to
ensure that the home network is under control and managed by the current resident or home
owner. There are many different types of MIPv6 Smart Home system services that can be offered
to the customer such as:

Comfort and ease of use

Communications

Entertainment systems and Multimedia

Health care

Medical emergencies

Security and Safety
Sub Conclusion
The utilization of Mobile IPv6 with the Smart Home systems is optimized to provide mobility and
enhanced communications and interconnection for home networking that could lead to efficient,
39
http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
37
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
reliable, and emergent services a home networking could offer. The proposed architecture could
provide a seamless convergence for communicating between the users and the home devices and
equipment as he leaves his residence. The user can have autonomous control of the home device
and equipment even if he changes location or network provider since the system is installed with
IP addresses recognized with proper authentications.
Working principles
In order to make a system efficient it must have a chain. This chain is where the control panel
could interact over with different room routers in order to reach a device which is connected or
compatible with the control panel. In order to do this the system must work as a transmitter (main
panel) and receiver (device).
40
Figure 8
In typical home, the original message signal will reach the majority of the devices that are
compatible with the main panel. When the message is made control panel sends a signal and
device as a repeater, every product in the home that received the original
40
http://www.insteon.com/about-howitworks.html
38
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
41
Figure 9
transmission repeats the message simultaneously. These simulcasts build on one another is like a
musical instrument in a symphony, greatly amplifying the signal. Most products
42
Figure 10
will receive the first repeated signal if they haven’t already received the signal – figure 10.
41
42
http://www.insteon.com/about-howitworks.html
http://www.insteon.com/about-howitworks.html
39
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
43
Figure 11
As a factor of safety, another repeat is sent – figure 11. Again every product that received the
transmission, also the original or the first repeat, will now repeat the transmission again. With
almost the entire network repeating the message, virtually every device in your home will get the
signal. In order to make the system reliable a third repeat of the transmission must be done to
provide the ultimate reliability – figure 12. The connection between the control panel and the
receiver is finally established. When the control panel finally has a direct access to the device, the
control panel can set up the settings, which were required to set up at the very beginning.
44
Figure 12
OPNET
In order to develop such system a good analysis of a system is needed. OPNET is a good solution to
do this - since it is a software business that provides analysis for computer networks and
applications. The company was founded in 1986.
43
44
http://www.insteon.com/about-howitworks.html
http://www.insteon.com/about-howitworks.html
40
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
OPNET offers a good modeller for analysing and designing communication networks, 45devices,
protocols and applications. Users are allowed to analyse simulated networks to compare the
impacts of different technology designs of end-to-end behaviour. OPNET modeller incorporates a
broad suite of protocols and technologies what also includes development environments to
enable modelling of all network types and technologies including:

VoIP

TCP

OSPFv3

MPLS

IPv6

Others
OPNET simulator is very useful when working with complex networks with a big number of devices
and traffic flows or in networks where a little change could be critical. Before implementing any
change it is possible to predict the behaviour and to verify the configurations of the devices.
OPNET is offering different tools that allow administrators or home users to analyse their
networks and the future implementations they want to make in order to improve the system they
have.
OPNET simulator features and goals are very simple, to be the best and provide the best
technologies that are possible:46
45
46

Object oriented modelling

Hierarchical modelling environment

Discrete event, hybrid and optional analytical simulation

Open interface for integrating internal files, libraries and other simulators

GUI based debugging and analysis

Fastest discrete event simulation engine among leading industry solutions
http://users.salleurl.edu/~zaballos/opnet_interna/pdf/OPNET%20Simulator.pdf
http://www.opnet.com/solutions/network_rd/modeler.html
41
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
Hundreds of protocols and vendor device models with source code (complete OPNET
model library)

Others
Sub Conclusion
In order to develop this kind of Smart Home it is necessary to try the entire system being as
administrator and provider to understand or find out how system is reacting to one or other
change, protocol, device, etc. What is more important to secure the system is would be a smart
idea to implement OPNET into Smart Home so before house holder tries to implement the device
into the system OPNET could check and give a report of implementing device how it is interacting
with other system devices and if it is safe to install it in order to avoid malfunctions or errors in the
whole network.
SWOT
SWOT analysis is a necessary tool and element of the research necessary preliminary stage in the
preparation of strategic and market plans. By using “brainstormed” data and ideas based on
different situations, you can develop different goals and objectives, which can be helpful when
trying to make the addition to the Phillips system successful. Those strategies can help the
developers to reach their goals by giving us a strategic advantaged, which can be useful for future
development too.
SWOT stands for Strengths, Weaknesses, Opportunities, and Threats47, all which are factors, which
should be encountered for when creating new ideas and features for the Phillips system.
Strengths characteristics the strength and upper hand advantage the new Phillips system might
have over other similar websites and products, these strengths can be improvements, new
features and any of these matters.
Weaknesses characteristics the disadvantages and inconveniences the Phillips system might have
in relation to other similar systems, features and products, these weaknesses can be lack of
knowledge, lack of experience and other negative factors.
47
The SWOT Analysis: Using Your Strength to Overcome Weaknesses, Using Opportunities to Overcome Threats
42
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Opportunities are known as which external opportunities, which can help make the new Phillips
features more successful in a market perspective, these opportunities can be knowing the target
group, better use of internet marketing and other market advantaged that other companies lack.
Threats are known as which external threats that might have a negative effect, which can damage
the process of creating new features for the Phillips system or the popularity of the system, these
threats can be more power, more experienced or other harmful threats from other companies.
The internal factors are the strength and weaknesses between the developers and the final new
features idea for the Phillips system, when they are thought of, while external factors are the
opportunities and threats which may affect the outcome of the features and idea both in the
process and after they are developed. By using the different knowledge now known in our four
different factors, we will be able to make four different strategies based on this knowledge.
Maximizing both the external opportunities and internal strengths of the organization creates
what is called the maxi-maxi strategies. Maximizing the external opportunities and minimizing
internal weaknesses creates the maxi-mini strategies. Minimizing external threats and maximizing
internal strengths creates the mini-maxi strategies. Minimizing both the external threats and the
internal weaknesses is called the mini-mini strategies.
[Matrix no. 1]
Internal strengths:
1. 1 The Phillips system is already developed.
Internal weaknesses:
1. 1 No real ideas of selling the ideas when it is
2.
created.
3. 2 Unique new features
2.
4.
3. 2 The group does not have a person responsible
5. 3 Does not have to develop the ideas.
for decision-making and scheduling, which can
6.
lead to conflicts.
7. 4 Great understanding of the system by doing a4.
lot of background research.
5. 3 Different nationalities in the group with
8.
9. 5 A great will to learn about Smart Homes.
different work ethics and talents.
6.
43
ITCOM4
2013
10.
AAU-CPH
Group 5
Martynas & Frederik
7. 4 Ideas can easily be irrelevant.
11. 6 Ideas and features can easily be sold to Phillips
8.
9. 5 There is a lot of learning from idea to new
12. 7 Phillips has many products for the average
feature.
home
External opportunities:
External threats:
1. 1 Phillips might like to invest in our ideas, making
1. 1 Other Students or companies with more power
the development easier.
and capital might steal the idea and make it more
2.
successful with their contacts.
3. 2 Phillips might also buy the undeveloped idea2.
4.
3. 2 Finding funds to finance our ideas is a
5. 3 Use guides and inspiration from other
challenge, when the features are free.
developers, who work with the system before 4.
6.
5. 3 Getting our new feature ideas further expanded
7. 4 Use social media to intact with people and
and popular can be difficult after using our social
know what they would like to have in their Smart contacts and directly contacting Phillips, with no
Home.
8.
start capital or support.
6.
9. 5 Go to Phillips interventions in order to make 7. 4 When creating the idea other new technologies
contacts and so on!
might outdate our ideas and make it unappealing.
44
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
[Matrix no. 2]
Maxi-maxi strategies:
1.
Mini-maxi strategies:
If Phillips thinks our idea is worth investing in, 1. In order not to create irrelevant ideas we can
they might give us some capital for our work.
read and learn about what kind of Smart Home
(addressing S1, O1)
technologies that has already been addressed or
2.
3.
studied (addressing W3, O4)
Seeking information about programming can be
2.
easier if we divide the work individually.
3. Without a goal selling the ideas to Phillips or a
(addressing S3, O3)
larger company or University might be smart
4.
5.
after it is developed. (addressing W1, O1)
It Is hard to create irrelevant ideas when we
already have a clear idea of the system and how
it works (addressing S4, O4, O5)
Maxi-mini strategies:
1.
The threat of not being able to market our
1. Create the new features for the Phillips system
features can be solved by using our knowledge
based on success of making it rather the success
of system. (addressing S5, T3)
of Phillips using it. (addressing W1, T2)
2.
3.
Mini-mini strategies:
2.
If the features are not good enough to be used3. Dividing work into what people are good at.
we can quickly modify them in order to fit our
system (addressing S4, T1)
4.
5.
(addressing W3, T4)
4.
5. New ideas can be relevant if someone else
When selling the idea to Phillips, we do not
comes up with a similar feature and therefore
have to take money and finances in count.
would our features keep being updated
45
ITCOM4
2013
AAU-CPH
(addressing S6, T2)
Group 5
Martynas & Frederik
(addressing W4, T5)
Comments to the maxi-maxi strategies:
1. By selling the idea of our new features to Phillips, we as developers would not have to care about
selling the features and use our own money on promotion and advertisements either because we
get a percent of the profit or if we have sold the features for an arranged amount.
2. By dividing our work, so that some of it is made individually, reading and learning about feature
development can be easier for each of us because we can manage our own time.
3. When we already know how the system is working and what kinds of products that are already
created, we have a great opportunity not to create any irrelevant new features for the Phillips
system.
Comments to the mini-maxi strategies:
1. When coming up with new ideas for features to the Phillips system, many of these can easily
become irrelevant. When doing a lot of research about the State of the Art and the already
created Phillips system, we would have a great knowledge of what features that would be great to
work with.
2. Selling our idea for an amount to Phillips could be a good strategy, when our main goal is to come
46
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
up with new features and have people in the future using it. If our goal was to make money and
contribute active, selling our features to Phillips with a clause that would give us some part of the
profit could be a better idea. We as the creators could then use our contacts create hype about
these new features.
Comments to the maxi-mini strategies:
1. Because of our great knowledge of the State of the Art and the system we will also know where
and how to market our features. Therefore it will not have a negative effect that we might not
have the required equipment and finances in order to market the features.
2. We as idea makers do not have any start capital and because there are a lot of expenses of having
the features created we as the idea makers need to find a way to pay those fees. If we do not want
to pay them by ourselves, we could merge with other creators to split the cost or we could simply
sell the idea to Phillips, which is actually common for creators, who are creating new ideas.
3. We have a great understanding of how the Phillips system works since we made a lot of research
involving the system. If the users of the new features then have a certain problem when they are
using it and if it is working wrong, we as the creators can easily change these ideas in order to
satisfy our costumers’ needs and demand.
Comments to the mini-mini strategies:
1. While working we can divide work to what people are good at. The project and the features will
then be created faster and maybe with a better result even though each part of the project would
become more subjective and everyone need to learn the other ones parts in the end of the
project.
2. If our ultimate goal for success is based on creating ideas and features, it would not be as
important whatever people would use these features after the project is done. That way we will
be more focused on thinking of these features and implement them as we imagined it to be rather
than using time on thinking what the users demand and the requirement specification.
3. If the new features or settings get outdated, either by technology or user interface, it could be a
great idea to discuss some of the other ideas from the brainstorm that was not used or features
47
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
which were not implemented. These ideas could prove to be useful in such a situation.
Sub conclusion:
By writing a SWOT analysis you do not necessarily get the right strategies, but you do get a great
overview of which methods, we as creators could use to make successful features and to give
Smart Homes users ideas and technologies that can help creating a better home. The strategies
above are not classified, but just created in order of the ideas from the brainstorm.
It is clear that SWOT is useful when coming up with new ideas. The unique way SWOT connects
four different factors (Strength, Weakness, Opportunities, and Threats) is really helpful. Making
these factors in to four strategies give the creators an upper hand advantaged from a market
perspective, because it gives the knowledge about which strategy to apply, when certain
situations happen. The most important strategy is mini-mini, because in those situations where
mini-mini is valuable both threat and weaknesses are optimized. It is essential to minimize those
two factors. If you take a look at the first mini-mini strategy you will see how we minimize the
workload by dividing it between group members, this would create a faster pace minimizing time
issues, while also minimizing the workload. These two factors are minimized, while we are both
doing what we are best at, which make this a good mini-mini strategy. A strategy that seems to be
easy to apply is the maxi-maxi strategy, where the focus is to maximize the strength and
opportunities. Take the first strategy as an example. The main goal for this project is just to create
it, so therefore an opportunity like selling the ideas we come up with to a Phillips could become
relevant, it would become someone else’s problem to handle things like sales, advertising and
implementing the features. SWOT strategies are guidelines that give us an overview on which
strategies to implement and this is the main reason why we choose to make one and implement it
in our rapport.
Stakeholders
Introduction
Stakeholder analysis is usually used at the very beginning stages of planning. It outlines the
importance of key people or institutions. This helps to determine whether these people can
significantly influence a project or not. Stakeholder analysis helps developing strategies and
48
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
scenarios to become more effective and to prevent any potential trouble.48We also used
stakeholder to define the consumers and people who could be interested in a Smart Home
solution.
We chose to include the stakeholder analysis in our rapport because it can determine which kind
of influential powers we as developers might be faced with (Stakeholders’ interests). A
stakeholder analysis might reveal potential risks and opportunities in the when creating new ideas
and help identify costumers, companies and other “actors”. We as the developers can then
combine the knowledge from SWOT and the stakeholder analysis to prepare ourselves for these
potential scenarios. A stakeholder analysis can also help to define key people or a key organization
and make sure that the right stakeholders are informed properly about the status of the
development.
Figure 13
The illustration shows the different stakeholders and their position in an interest/power matrix.
The horizontal line illustrates power from low → high and the vertical line illustrates interest rising
from low → high. The blue boxes represent stakeholders with a positive effect and the red boxes
48 http://www.reference.com/motif/Business/stakeholder-analysis
49
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
are stakeholders who might have a negative effect. The government can both be positive and
negative and is therefore marked as colourless, same goes with people who do not have a
smartphone. The illustration also shows with which kind of focus we as the developers should
approach each boxes in the matrix. “Subjects” (low power, high interest) should be kept
adequately informed and be heard so no major issues are arising. “Subjects” are institutions to
keep in mind with their high interest in the project they can both be very helpful and very
interfering. “Players” (high power, high interest) are the ones that need the most attention; both
the ones that have a positive and a negative influence must be attended to and we as the
developers must work on satisfying them. “Crowd” (low power, low interest) should be
monitored. However, we as the developers should not use too much time on reflecting the crowd.
“Context setters” (high power, low interest) should be kept satisfied, but we as the developers
should not use time on approaching them.
Our customers
Every single customer can have an influence on the project's popularity. The customers can either
increase or decrease the popularity of our ideas and project. It is very important to keep the
customers happy, they will return with positive feedback and spread the word of their good
experience. Customers can be both profitable and unprofitable. Bad critique of the project can
become a big threat to us as the developers and can lower the amount of customers and future
customers. In order to define our costumers we made an overview of potential customer’s profile
in the following section.
Academics
Income:
Minimum wage of 33.000 Danish crowns monthly basis.
Age:
With a PhD age would be probable +26 at least.
Investment percent:
An academic would be willing to invest as much money as they can afford. Being able to provide
the family would more money than an average household, the academic would have an extra
50
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
money to spend on gadgets and other Smart Home technologies.
Reason for interest:
The reason could be many, but as an academic you would see the idea of creating your own
personal Smart Home. Factors like controlling the lights, radiators and even setting a specific
“mood” in each room could be a huge surplus for someone who works most of the day and really
need to relax after work. Having the advantage of controlling your Smart Home from a distance or
while commuting home from work is also a huge interest point, which we in marketing could focus
on.
Capability of using Smart Home technologies:
Academics are fully capable of using a smart phone and therefore also fully capable of using the
applications, which are featured in a Smart Home. Technologies difficulties should not be a
problem as they would know how to read and understand the manual to complete.
Average Household (Family)
Income:
Average wage of 53858.33 monthly (Family)
Age:
A family with two kids and steady jobs would be around +25 years of age.
Investments percent:
A household with kids always has extra expensive on field trips, sports and hobbies. It can
therefore be hard to find extra money to invest in a home that is already working fine. The family
has therefore little money to spend on Smart Homes, but if investment in advertising in Smart
Home technologies that can easy the everyday life of the family is done well, they might consider
using some of the budget.
Reason for interest:
Simple things like knowing what is in the fridge, if the alarm is on and if the door is locked can help
a family live an easier life and in the future give them energy to have extra time with the family.
51
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Capability of using Smart Home technologies:
You would not consider family mothers as being really good at high tech, but in recent years even
family mothers have been showing improvement in those areas. Everyone can handle a smart
phone and an application and if they do not know how to implement new features or something is
broken, they can then call a hotline with techniques eager to help.
Engineer
Income:
Average wage of 45.409 kr. monthly (1 person)49
Age:
The age for an engineer is an average 35 years in Copenhagen.
Investments percent:
An engineer is a highly educated individual, who excel in technologies and modern things. It is
right to say that they would have a lot of money and also a great interest in Smart Home
technologies they would therefore like to invest in our ideas without thinking of the eventual cost
of the product.
Reason for interest:
Personal of course. Working with technologies and having a great understanding of how they
works and engineer would therefore be more than happy to welcome new technologies in his or
her Smart Home. Also the interest would have them coming up with new ideas or implement
something for themselves.
Capability of using Smart Home technologies:
Fully capable of implementing and using the Smart Home technologies and as mentioned before
they might even develop something that can use the already known technologies and be
implemented in their own Smart Home.
49
http://ing.dk/infografik/se-hvor-meget-andre-ingeniorer-tjener-i-forhold-til-dig-115852
52
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Government (Schools, Universities, etc.)
Income:
Money is not an issue
Investments percent:
Governments are always trying to invest in new ideas and universities, high schools and other
higher education seems like a perfect match for new ideas regarding lightning etc.. They will also
have a huge amount of money to spend on ideas already developed and ideas being developed.
Reason for interest:
Government would like to invest because it is the future of the world. And any country and
university would like to have credit or been credited for invention that help ease the life on earth.
Furthermore investments in lighting, air condition, and other everyday stuff can make a university
an experiment for further improvement of Smart Home technologies.
Capability of using Smart Home technologies:
Fully capable of implementing and using the Smart Home technologies and as mentioned before
they might even use these developments in universities to get further development.
Government
Every developer is under governmental influence/pressure, the same will apply for us as the
developers of Smart Home ideas. The governments' main way of influence can slow the
development of the ideas through taxes, restrictions and other effects which will increase our time
and expenses. The market is also different in each country and the next section will explain about
different market situations and which countries may have what50.
Perfect Competition51
Perfect competition is a market system characterized by many different buyers and sellers. In the
classic theoretical definition of perfect competition, there are an infinite number of buyers and
sellers. With so many market players, it is impossible for any one participant to alter the prevailing
price in the market. If they attempt to do so, buyers and sellers have infinite alternatives to
50
51
Note: These markets may vary with other products, these markets are strictly used in a Smart Home perspective.
http://www.unc.edu/depts/econ/byrns_web/Economicae/monocompt.html
53
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
pursue. This would be a perfect example of a market we could face in a country with liberal
market restriction. Western countries and especially the United States would have these types of
markets, where every developer has his change of succeeding with an idea.
Monopoly
A monopoly is the exact opposite form of market system as perfect competition. In a pure
monopoly, there is only one producer of a particular good or service, and generally no reasonable
substitute. In such a market system, the government is able to charge whatever price they wish
due to the absence of competition, but their overall revenue will be limited by the ability or
willingness of customers to pay their price or in a dictatorship they will not have any will of their
own. Countries with a dictatorship or limited market due to government restrictions would have
this type of market. North Korea, China Cuba, Venezuela and multiple African countries would
have this type if market and we as developers must therefore see the government as the main
player and include the government in all processes of the project.
Oligopoly
An oligopoly is similar in many ways to a monopoly. The primary difference is that rather than
having only one producer of an idea or service, there are a handful of producers, or at least a
handful of producers that make up a dominant majority of the production in the market system.
While the government do not have the same pricing power as in a monopoly, it is possible,
without diligent government regulation, that the government would have the oligopolists to
collude with one another to set prices in the same way a government with monopoly would.
Countries with limited market would have this type of system, former dictatorships like Russia
(Soviet Union), Burma and others would have this type of market and we as developers might
have to make deals with the government in order to be ahead of the competition.
Other developers (competition)
Other developers have their own ideas and all the developers are fighting for every possible
costumer and consumer. The competition leads to cheaper products, better quality, cheaper ideas
and fewer opportunities. All these factors are making it difficult for us as developers going forward
in our project.
54
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
People who does not have a smart phone
People who do not own a smart phone are difficult to address, when a smart phone is a specific
requirement. We as the developers should try our best to advertise our services to these people,
so that they can eventually buy a smart phone and furthermore invest in our ideas and the
project.
Celebrities contributing to the project
Famous people and celebrities may be highly interested in creating their own Smart Homes, giving
us ideas and then contribute in commercials, magazines and other publicity. They do not have any
direct power over us, however their popularity and influence on their fans, may increase or
decrease our project’s popularity and a positive influence could also be an increase in the demand
of our ideas.
Big fish companies seeking for the newcomers with high potential
Large companies, such as: Phillips, Google, Siemens etc. may be interested in investing their own
money in our ideas and project, to later make profits for themselves. They are the actual players
with a big amount of cash, that are able to even buy us out completely - that is why there should
be additional caution taken when dealing with those kind of companies. The following section will
have a brief description of two of the companies and their interest.
Philips
Philips is a Dutch electrical company founded in 1891 and now housing over 120.000 employees
all over the world. Philips might always have been associated with radio and TV technologies, but
recent years it has also grown a large interest for Smart Homes. Philips have bought multiple
companies working with kitchens, lights and other Smart Home ideas in which they now are ahead
of. Philips also has the LED lights, we describe, already on the market and they are therefore
extremely interested in Smart Home technologies, they could either buy our idea or invest in it.
Siemens
Siemens is a German company located in Munich, Germany. It was original founded in 1847 and it
is now housing 360.000 employees all over the world. Original focusing on telegraphs Siemens
expanded in the 1950’s focusing on TV, Radio, Telescopes and Washing Machines. Siemens
55
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
therefore already had the hardware to work with when they started building Smart Homes. While
Siemens in many years has been the leaders on kitchen Smart Home technologies recent years
have them trying to do more work on other areas of a house. They therefore have the same
interest at Philips in new ideas and projects.
Sub Conclusion
In this analysis different kinds of stakeholders have been identified in order to determine which of
them should have the biggest shares of attention from us as the developers. The most important
stakeholders are the players, which was determined to be: “Big fish companies”, “other
developers” and to some degree also “celebrities”, and “our customers and consumers”. These
factors are the ones that have major influence on our project in the future.
These institutions must be attended to in order to keep the popularity of the idea high and in
order to gain any kind of market share or our ideas to be used and implemented.
By identifying the customers and the companies more closely, we also get an advantaged in those
areas as we know what kind of interest they have for our project and how we should address them
personally.
Requirement Specifications
The purpose of requirement specification is to specify the criteria that our system should fulfil.
These criteria determine how the system should be used, how it should be designer, who must be
allowed to use the system and how.
The systems main functionality will be to serve human to make his or her life as much modernized
as possible, this also leads to a new luxury level. The solution must provide easier and faster
interface within the device and human. The main functionality is to give orders via mobile device
or voice commands to artificial intelligence to communicate to the devices that are connected to
the system in order to reach final goal (for example: make coffee). Process must be done within
couple of minutes or at least faster than human can make on his own in order to make the system
fast and more reliable than human work.
Our developing system must be an independent stand-alone system that will be able to run on its
own even when the house holder is not at home, it must also be able to run on the mobile devices
56
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
that support android and iOS operating systems. System requires a chained network connection
between the main control panel or artificial intelligence and all connected devices and house
holder since if the system is controlled over mobile device it must send a report by a SMS
message. The system will give opportunity to interact with home in a whole new level which must
be easier than in nowadays. Instead of making house duties, daily routine things you will have
interface in which you can either use mobile device or artificial intelligence to give order to the
system which will make duties for you. It should be possible to make order to the system simpler
after the first use over mobile device user will be required to set up the preferences for various
occasions. If user is using artificial intelligence, system must take own decisions when commands
over voice is given. The system is open for everyone since the main idea of Smart Home is to help
people in their daily routine. User is require to have basic knowledge about the technology since it
can be used over mobile device. However it will be user friendly and easy to use which makes it
easier to understand due to simple application interface.
Functional requirements
The functional requirements define actions/outputs the system must perform in coherence with
the input given by the user or the artificial intelligence. Functional requirements also define how
certain input should look, the sequence of certain operations are described in the use cases.
1. The system must accept input from the application which is built in Android or iOS.

Application must have a simple menu with a sorted list of connected devices.
o List can be made manually
o List can be arranged by tracking each router and dividing devices in parts for
each room that has a router and controls part of devices.

When device is picked up it must show all possible processes that can be done by a
chosen device.
o Control panel must analyse all possible events that can be done by a device
and display all of them in the application
2. The system must accept input from human over the voice commands.

First time use instruction must be provided
57
ITCOM4
2013
AAU-CPH

Group 5
Martynas & Frederik
Voice recognition has to be implemented in order not to misunderstand with other
random people.
o To make system safer
o Reliable
3. Mobile device application must have a short instruction of its usage

Short video of the first use must be provided when a first connection with control
panel is made

Help button in main menu to provide hints or usage information if customer is not
sure what he is doing

“?” In each final command to explain what will be done after current move.
4. The artificial intelligence must include a detailed instruction how to start using “Smart
Home”

Video display how to use Smart Home must be displayed in control panel
o Additional feature can be used and introduction could be played over the TV
which is already connected to a Smart Home system

Instruction can be skipped
o Customer already used this kind of system
o Customer wants to find things on his own
a) Additional helpful information will be implemented in control panels
menu.
5. The mobile device application must require for a setup of different occasions before
starting to use it.

User can skip this step

User can set up multiple devices for a different occasion
o If occasions are set up additional button in main menu has to be made
a) In the occasion section customer can customize occasion moods any
time he wants while using the application
o Auto save must be created if telephone crashes or shuts down.
6. Well-developed router system must be installed in apartment.

One router in each room must be installed
58
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik

All routers must be connected with each other

All routers must have an easy access to the control panel and vice versa.
7. High speed internet connection shall be developed – 1Gbit/s
o Higher speeds are preferable
o User can choose the speed limits
8. The system must save information of the last setup for faster performance next time.

Control panel must save last configuration of a device or occasion without
overwriting the previous one.

User should have a choice to pick use the previous one, the last one or create a new
configuration.
o All configuration can be saved over the specific device section
o Occasions can be set different so it will be saved as one of them
9. The system must have option of daily routine repeating.

System all the time must analyse what occupant is doing on his daily basis and offer
occupant to let the system do all the requests at once without using single requests
or multiple requests from user
10. The system will send response to mobile device of the performance.

System must send back a report of done performances

System must send error message if one of the device malfunctioned

System sends back a report of a calories, fat, costs, etc.
o Kitchen only
o User choice whether to send or not
11. To make system reliable 3 attempt connection between transmitter and receiver must be
made.
12. Additional features as adding more devices over the time to expand system in control
panel shall be implemented.

Can be implemented in mobile device as well

Separate button in control panel must be implemented
o When button pushed control panel scans for all devices in the apartment
a) All devices that are not added to the system must appear
59
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
b) User presses on the device he wants to add and control panel adds it
c) Response from control panel and device has to be made to assure
occupant device was installed successfully and is ready to use
13. Application GUI must be simple and understandable for whole public

No bright colours or fast flashing images
o Might affect ill people

Big buttons in mobile application and control panel

After each mobile application press a vibration should be done do help elder
people.
o Vibrations can be disabled
14. The system must have alarm system with a different sound to provide better safety
system.

Someone unidentified tries to get into the house

Fridge is running low on ingredients

A specific device did not gave a response

Device is malfunctioning

Fire starts in apartment
o Doors needs to be unlocked after the sensors detects the fire
o Light path to the exit has to be provided
o Contacting fire department
15. The system must be well connected with cameras and eye detection system, fingerprint
recognition to give best security that is possible.

User can manually pick which systems he can use both, before using the system or
before installing the system to the house

If user is leaving home for a longer time full security check must be done before
entering the house

If user is gone for a several hours 1 security check performance is enough
16. Security cameras must be able to identify the house holder and set up the house to holders
default parameters.
60
ITCOM4
2013
AAU-CPH

Group 5
Martynas & Frederik
Control panel must set most common occasion theme for house holder which he is
setting up all the time when occupant is home
o Control panel must take actions after 3-5 same manual picks in time

Function can be enabled/disable if occupant does not want it
17. All system requests related with a kitchen or simply eating habits must be provided with all
characteristics about the dish (fat, calories, vitamins, preparation time, etc.)

Control panel can provide healthier life style to the system
o Suggest what to eat and what not
o Count the portions
o Sitting styles
o Eating conditions and offer different eating habits

Control panel can suggest shortest preparation time dish

Control panel can order food to home if occupant does not want to make food.

Occupant can disable this functionality [10]
18. Whenever the system detects a problem about malfunctioning device it must send a
picture from security camera to a mobile device of which device is not working.

User then can choose to fix the problem now or later
o User can try fixing on his own
o Control panel suggest to call company and report the problem
o User can postpone the fixing for later
a) Picture is saved in control panel memory
b) User can activate the problem later for further display and investigation
o Whenever house holder wants to inspect the not working device through mobile
device or artificial intelligence he can request a laser which is connected with the
camera to point it at malfunctioning device.
19. Whole system must have different packages for different user needs – targeting people
with different ills/capabilities.

Senior package with biggest focus on health care

Average package with manual construction

3 differed default packets
61
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
o Simplest (TV, conditioning, lighting)
o Medium (TV, conditioning, lighting, kitchen devices, audio system)
o All in one (Full packet to connect all electrical devices in one network)
Non-Functional requirements
Users who are going to buy our product are expecting more than just having the product working.
They are especially interested in the performance, the reliability and so on. A number of
characteristics defined as non-functional requirements for the system. We will enumerate the
constraints on implementing what the system we developed should be able to do.
Usability: As the product is used by people all over the world, the instructions should be in English
at least. Therefore we as the developers have decided that the language of the instructions should
be in English, so that the info is almost available for everyone to understand, but because it is a
worldwide product we also should offer the instructions in both Spanish and French. The product
should therefore be usable enough for the consumer to install and to use the product. If the
product still is not working after following the instructions, then we as the developers should offer
some sort of telephone hotline where the consumer can get help with getting the product
working.
Availability:
The Smart Home technologies should be available at all times. So when the consumer is
somewhere else than his home, he should be able to still use the product as he would have done
when he is at home. The only thing required for the availability is that the product is installed and
the power is on.
Reliability:
Reliability is the most difficult thing to test; when we do not know how the system should be like.
It would be tested from our side, when it is developed. Of course we would not put a product that
is not working on the market, but we cannot be a 100 percent sure that this product work all the
time and therefore we would have a hotline where people can get their question answered. The
hotline is almost always available unless there is a power out or something extreme like that. The
product can also go down, if there is a power out where it is installed. When there is an update for
62
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
the system it can easily be downloaded and implied so that the system is up and running right
after the update is installed.
Performance:
The system should be working at all hour and the performance of the system should make sure
the routers are speaking with each other whenever the connection is on. That is the most
necessary performance requirement.
Security:
The security of the product is also essential so that the product the consumer buys only works for
him and cannot be hack by any other persons or even burglars who wants to check if people really
are at home or the light is just on. We would make sure when you download our application that
the product is only synced with the consumers Smartphone and therefore he or she is the only
one who can access the system. The system does also offer a security code so when you want to
access the system you will need to enter a password in order to control the settings for the lights.
Portability:
When the product has to be designed we recognized that our consumers would be using different
smartphones with different functionalities, operating systems and application handling. Therefore
we will have to look into the smartphone compatibility; the product therefore has to be tested on
Android phones, Iphones and Blackberries so that it could be able to be used on every smartphone
device. The result probably should be that the application is available in Google Play, Apple Store
and also Blackberries will be capable of using the application.
Maintainability:
The product will be designed in such a way that in a future development it will be easy to add new
features and updates by simply downloading them. The application on the consumer’s
smartphone tells whenever there is an update available and if that update is urgent or not. The
consumer can then decide if he wants to do the update immediately or he might be out of town or
at work, so he can postpone the update until he gets home – so that he can make sure that the
new update is installed correct and that the system is still working.
Scalability:
63
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Well for our product we would try to find new products, which could be able to be working with
the application in order to create an even smarter home. Therefore we will then be able to make
the routers and bridge able to expand to other products in order to satisfy the needs from the
consumer. If they do so they would have an advantage over our competition.
User Scenarios
Peter and Anna
52
Figure 14
Peter(32) and Anna(30) is a middle class couple which has a basic knowledge about new age
technologies and furthermore they are always keen to try out something new and innovative.
Peter finished his PhD degree and decided to carry on by working on a study related job, which is a
house salesman in a small company. Anna is a student, which is defending her second Master
52
http://o.onionstatic.com/images/8/8278/original/700.hq.jpg?3926
64
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
degree in tourism and also she is working part time job in tourism agency to get practice. Since
Peter is working as a salesman he was introduced with different types of houses and he was
interested in “Smart Home” technologies so without big talks Peter and Anna decided to
implement “Smart Home” into their life.
Smart Home idea
In order to get a better overview how to analyze and use technologies to make a home smart it is
always a good idea to draw your dream house sketch and technologies you would like to have in
your house. In this sketch we have a simple house with 2 floors and a small basement, we will take
a deeper look into each room separately and describe how room should look like and what
technologies should be implemented to make life more luxurious, comfortable and easier.
Scenarios will include two different methods, method when person can control all his apartment
devices via mobile application communicating with control panel and voice recognition via
artificial intelligence technology.
65
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Figure 15
Entrance
The Smart Home’s first job should begin by the main entrance, where the Smart Home system
must recognize the house holder by camera help or additional technologies such as eye read or
fingerprint matching. If the system can recognize the house holder from a camera view security
system like eye read can be disable, however this should be left to decide to the house holder if he
or she want to perform full security scan all the time even though the system recognized the
person from a first attempt or just a faster security check, when a person is recognized by the first
security check all the other systems should be disabled. After the security finds out that this is the
real owner of the house artificial intelligence or a control panel preferences must identify the
default settings for the house and set everything up when the main doors are being opened.
66
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Living room
House holders, Peter and Anna gets home after the night out and want to finish the night in
romantic mood, Peter through his application over the iPhone using UDP protocol sends a mood
settings for the living room to set up the right lightning, to light up some electrical candles, set up
conditioning, play romantic music and cool down wine in the mini bar, which stands in the living
room also change the living room interior by changing the LCD screen wallpapers to more
appropriate for the night. If Peter for example forgot to set the mood before they get home, Peter
is allowed to set up everything by voice controlling, giving orders to artificial intelligence. After
the request with the settings is being filtered through the firewall in order to understand that user
is unique and packets are necessary to be fulfilled. When Smart Home control panel receives the
request from the householder it instantly sends configuration settings to the separate
technologies.
Lightning
When a request from control panel via ZigBee protocol is received the first thing what is done is
checking if all the LED’s are working. After that the default 95percent brightness light is being
dimmed to the request set brightness, in this case 50percent. When the settings are setup the
ZigBee sends the report, that the lights were dimmed to the right percentage and that all LED’s are
working properly. (If the system would face malfunction the system should receive a report with a
detailed report what failed or which LED’s are not working properly. If the case was that the
request of dimming lights was failed, it should repeat and set up one more time and if the
repeating fails send a message to the control panel with failed operation)
In order to develop this kind of LED system error detection, ideas like dividing the LED system into
blocks can make it realistic. For example it can have a tree system when from the main tree it goes
into branches and branches goes into more branches. In this case system can set up all lights at
once but can detect which “branch” is not working starting from the mother “tree” and going
deeper until the specific leaf – LED is reached. By determining the exact LED which is not working
laser implemented in each room will point the laser to the LED which is not working. Moreover
this idea can be improved by making connections with the application so when the house holder is
worried about the LED lighting he can activate the laser over the application and see which LED is
not functioning or has to be replaced.
67
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Mini Bar/Conditioning
Control panel sends options to a thermostat control to set up the proper temperature for the wine
to get its best flavours as well to the conditioning system to set up the heating. Two different
packets must be sent with the set up in order not to set up the same temperature with the mini
bar and conditioning, different ports must be set to not over cross the set ups, port for mini bar in
this case would be port 8000 and conditioning port would be 9000. Thermostat controller sends
back report that the temperature has been changed, control panel archives the report.
Electric candles
Have a direct connection with the candles, control panel sets the candles on and archives report
that candles were turned on.
Music
Control panel sends a music request to the Airport Express base station which wirelessly connects
all speakers over the house, since house holder requested set up only for the living room, music
will be played only in the living room. Music is taken out from ITunes where music is listed by
genres, romantic music is filtered up and a compilation of romantic music starts stream in the
living room. If the connection to the Airport Express, ITunes or internet connection was
terminated then control panel will receive a report of the information which part failed to start up.
LCD screens
LCD screens are a late technology which helps to reduce space and money on frames for the
images. All in all it is a good technology that can be used in order to change the images according
to the mood. Control panel will determine what kind of mood Peter wants and will send images
from person memory storage to all LCD screens image that will perfectly fit the mood house
holder requested. In other case by receiving a request from Peter control panel can access the
browser and search for the wallpapers that can fit exact dimensions of the LCD frame in order not
to distort the image. After the setup is finished control panel checks the LCD screens if all the
frames are filled up with image and if not control panel will determine which LCD screen does not
have a wallpaper and try to set it up again if the setup was failed second time it will collect data
and send to Peter information that LCD screen number 2 in living room was not able to set up the
image. Different alert message must be sent if control panel failed to connect with the LCD screen
while setting up the connection to apply the image. Since the Smart Home must be provided with
a high security system, cameras that are filming the whole house could also track LCD screen
68
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
functioning and send images with the not working LCD screen to a Peters mobile device.
Furthermore if artificial intelligence would have to detect problems security system could be the
“eyes” and where the malfunctioning screen would be detected by the cameras artificial
intelligence would instantly inform Peter or Anna about not working screen.
53
Kitchen
Peter is in the shop and is wondering if he needs to buy something extra for dinner, but his wife is
not at home so he is using his smartphone application to find out what they have in the fridge,
Figure 16
which products are soon out of date and what extra ingredients could be bought in order not to
throw the existing ingredients in the fridge.
Fridge
After the request passed through all security bridges, the control panel sends a request to update
the list and expire date times of food which is in the fridge. After the fridge received a request
scanners filtering the data of the food what quantity and when food was stored in the fridge after
this process is done, scanners of the whole fridge begins to examine the condition of the food
after everything is done, a report is being structured. In respond fridge sends back a complete list
of food, quantity and expiration date, after control panel receives the list it goes to the internet
and search for the best meal that could be made in order to lower the costs for food in the shop.
53
http://www.decodir.com/wp-content/uploads/2009/10/beautiful-living-room-3d-render.jpg
69
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Browser
After a full report about the condition in the fridge is received, control panel goes to the internet
webpage: www.food.com and searches for the best solutions of what could be made with the
food in the fridge. After the researches are done top 10 best solutions is being sent to the Peters
smartphone with all the information what he needs to make that dish, calories, fat, approx. time.
All the process must be done within couple of seconds, maximum 10-25seconds.
Anna got back home from a long day at work and is wondering what she could eat and go to rest.
Anna gives a request to artificial intelligence of what is the status in the fridge and cupboards and
what could be made through all of that. After artificial intelligence recognize the voice it starts to
do a research of all products that are available. After a complete scan of products is done artificial
intelligence tries to recover dishes that were made before and if some products are missing
artificial intelligence gives a response a question if Anna wants to buy additional ingredients to
make one or other dish or should artificial intelligence look for a new meal this includes only
ingredients that are available in home at that time. After Anna gives a response that she wants a
meal that includes things that are only in home artificial intelligence is accessing the internet and
starts to look for a dish. Using www.food.com intelligence finds couple of meals and suggests
them all to Anna. Response of calories, fat, preparation time and ingredient portions are displayed
in the application in the mobile device or in the monitor in the kitchen.
70
ITCOM4
2013
AAU-CPH
54
Group 5
Martynas & Frederik
Figure 17
Bedroom
After a long day Peter and Anna are going to bed, but they feel too tired to set up the bed. So
while Peter is laying in the living room he takes out his smartphone and opens the application. On
the application Peter is allowed to set the light dim, close the curtains, set the air conditioning and
many other minor things.
Lights
After the Smart Home control panel received the request for the bedroom set up, the control
panel starts to read his request and begins to fulfil the request. The control panel sends request to
a dynalite system which is responsible for the bedroom. Dynalite system checks the received data
if all data is correct and there are no errors made while receiving the packets the dynalite system
starts to dim the lights to the requested value.
54
http://www.real-visuals.com/wp-content/uploads/2010/02/3d-photograph-realistic-quality-InteriorDesign-kitchen-rendering-animation.jpg
71
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Curtains
Has a direct connection with the control panel and al the hydraulics are connected with different
ports in order not to overcome other curtain sets in other rooms, in this case port would be 9800
and curtains in the bedroom would be closed without any difficulties.
Conditioning
HVAC system control receives a request from a control panel. The first thing the system must do is
to check Freon if it is okay, then the conditioning starts its work and begins to cool down the air to
the value, which was received from the control panel.
Appropriate music/images
Some people are facing issues when they are trying to fall asleep. In order to help those people to
pass through this issue some solutions can be implemented. For example Peter has a phobia of
falling asleep and not waking up, however every human needs to fall asleep. In order to help Peter
easier to overcome his phobia the control panel is setting up the window wall into an image where
it has a view of a beach and sundown. The control panel also sets up the music on speakers, which
are implemented in the bed back. Silent sounds of a beach and birds start to play so Peter can
finally fall asleep. Same security and setups must be made for the window wall as it is on LCD
screens, more over more advanced things can be used in this feature like .gif images or a whole
video. In order to determine where to play music the control panel has to determine the port over
which it has to connect in order to play music in the right place. Then after the port is determined
the music from an audio system (for example from living room) will start to play. If issues are faced
everything is collected into one report and sent as a response to Peters phone that some of the
bedroom features are not working properly or not working at all.
72
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
55
Figure 18
Bathroom
Peter wakes up and he is going to the bathroom to wash his teeth and take a shower.
Lights
Lights are controlled by the censor, which react when a human enters the bathroom. In order to
save up some extra money two censors are installed, in order to scan when a person got in and
got out. First censor would scan people got in the bathroom number and the other one people got
out from bathroom, after everyone left the bathroom, lights and all the technologies shuts down.
Sink
When Peter enters bathroom, he is going to the sink. During the time he spend on reaching the
sink, the water temperature is being set up and another censor, which is in the sink, detects that
Peter wants to wash his face and start to clean his teeth, because censor detected his hands in the
sink. The right temperature water starts to run. Due to efficiency the water runs only for a period
of time (5-10 seconds.) after that the water stop running.
55
http://us.123rf.com/400wm/400/400/hemul75/hemul750803/hemul75080300010/2710202luxurious-bedroom-in-red-3d-rendering.jpg
73
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Shower
After Peter finished washing his face, he decided to take a shower. A defined temperature starts
to run and Peter is allowed to change the parameters in the touch screen, which is in the shower.
He can turn it into a higher or lower temperature in order to fulfil his needs. The touchscreen,
which would be in the shower, could be connected in different ways. It could be directly
connected to the water heating or it could be connected to the main control panel which would
filter the request. If the panel would be connected with the main control system it could have a
memory and record all set ups of the water heating, for example, if Peter every time lowers the
water temperature to 30 degrees after 3rd set up main control system would renew the settings
and for the 4th time water instead of 35 degrees which were set before would instantly set up 30
degrees as Peter sets up for the past 3 days. If shower would be connected to the heating directly
then it could have memory set ups also where it would be shown either different default
temperatures, or the history of set temperatures.
56
Figure 19
56
http://www.3dartweb.com/portfolio/bathroom2_post.jpg
74
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Basement
Peter goes to the basement with his friends to play pool, when the censor detects that someone is
going down the stairs the Phillips dynalite system instantly lights up the room, with a little extra
help music is being set up and the guys can chill out for the evening.
Lights
The censor which is integrated at the bottom of the stairs detects a movement and instantly turns
on the lights. Same idea with bathroom 2 censors should be implemented.
Music
With his application in the smartphone Peter sets up the music to set up the mood for the
evening. Request is being sent over the UDP protocol to make it more efficient since Peter does
not mind what song will play so the only request is to turn on the music player. Music player
receives the request and starts playing from the last song it were turned off previous time.
57
Figure 20
57
http://s3images.coroflot.com/user_files/individual_files/original_150801_ExPgZjzVnIpSgZLB
t1AbGIGbe.jpeg
75
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Shelter
Anna after a long day at work wants to enjoy the sun and decides to go to the shelter read some
book. When she goes to the shelter lights turns on, extra features such as lifting roof with window
can be implemented.
Lights
Lights should be developed the same way as it is described in the basement and bathroom
sections.
Lifting roof with window
With additional feature like this Anna can be lying on the couch and then she can lift the roof by
using her smartphone application. In this application Anna is allowed to access the main control
panel of the home and lift the roof by her needed percentage. After the settings have been set up,
the control panel is checking for the system. If it is working properly and if the are no errors
received, after the safety check is done, the control panel is sending the request by TCP
connection after the right packet order is received the system begins to set up the roof after the
settings were fulfilled system sends back the report that the request is done to the control panel
where the information is being stored, if the system sends back the faulty control panel forwards
the error to the Anna’s app that the system is not working and it has to be fixed.
Smart Home cons and pros
Advantages
The basic advantages to the ordinary person of Smart Home is just another way to show up how
luxurious their life can be. These days’ wealthy house holders can order a project from an
electronic items providing company such as – Philips. Philips Dynalite projects can provide a smart
house for a fair amount of money which would include full control of lights, heating and air
conditioning, to make it more luxurious it can be controlled separately in each room and control
panel can be accessed within iPhone or iPad. Talking about the other technologies and protocols
we can conclude that most of the technology providers wants to provide Smart Home for a low
cost including the best performance. However different systems understand low costs differently
and to reduce them for one system can be easier than for other. Another advantage of these
technologies is that it is very easy to install them and user does not have to be a programmer in
76
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
order to understand how the whole system how it should work. Mentioning the protocols, after a
deeper look into them it is very clear that reliability is the most important thing to protocols.
Trying to perform a high speed information transfer in order to make system work faster is one of
the most important goals for developers to obtain the best performance. One of the most
extraordinary advantages for the Z-Wave is that it is capable of setting up one device to be
controlled over the smartphone and over the time if customer wants he is able to add more and
more devices to the Z-Wave system to make home more smarter.
Disadvantages
The disadvantages seems to be mostly only in the technical part. The only disadvantage by today
for the end user is that in order to make a home smart it will require a lot of money since the
prices for these types of products and its expansion costs a lot. The technical part is on the
programmers’ hands, they must work on the product to make it more advanced. The main
problems are connection and speed. In the connection part there are many problems that some
devices are blocked by others or that when using the radio waves to transfer the signal radio will
not work since wires are being used as antennas, what requires either a better solution to transfer
data or better protection to home wires in order to prevent this kind of problem. Issues like speed
is always being updated, engineers always trying to expand the range of file transferring and so far
some of the technologies are stating that they are capable to transfer files at 200Mbps
unfortunately user reviews says different that the best performance they could reach was 1014Mbps and when the distance was increased up to 100meters the sending decreased to 58Mbps.
77
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Use-cases
In this section we will describe how system should behave on a specific action of user.
Figure 21
Use case 1 Connection between smartphone and control panel
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
Costumer wants to create a connection in order to get the product he bought working.
Preconditions:
78
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
-Smartphone/Artificial intelligence
-Internet connection on the smartphone and on the control panel.
-The protocol, which is responsible for creating the connection
Success Guarantee or Post condition:
-The costumer will be able via the application to create and establish a connection between
his smartphone and the control panel.
Main success scenario:
1) The costumer goes to the app store on his smartphone and downloads the application.
2) The costumer needs to fill in the information from the control panel in order for the
application to work.
3) The costumer press in is information and the control panel response positive.
NOTE: By using the information from the control panel it makes sure that the product is
authenticated.
After receiving the authentication the smartphone and the control panel are now connected
to each other.
Extensions:
4) The costumer gets a message from the control panel on his application that the connection
is established.
The costumer will also get a notification if there is any problems with the connection
afterwards, he can therefore always now if there is any problem and how to solve it.
Special Requirements:
-User needs to buy the product.
-The costumer need the lights to be installed
Use case 2 - Connection other devices to the bridge
Scope: Smart Home technologies
Level: Developers goal
Primary Actor: technology
Stakeholders and Interests:
-The developers would like to connect more devices to the bridge so that it can be controlled
by a smartphone or artificial intelligence.
79
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Preconditions:
-
-Connection between Smartphone and Control panel.
-
-Connection between Control panel and other devices.
Success Guarantee:
-
Controlling more devices using the costumer’s smartphone
-
Being able to do so, whenever there is a wireless connection between the smartphone and
the control panel.
Main success scenario:
1) The costumer will turn on his smartphone and go to the application
2) The costumer will then create the connection between his smartphone and the devices in
the house which he wants to control.
NOTE: This connection should have been modified and created beforehand.
3) User makes his first request and the device or product answer by following the command.
If the connection works probably the costumer can then use the product he bought.
Extensions:
Costumer would be able to control more devices and simply use the control panel when he
wants to add more products
Costumer can control other than Phillips products using his smartphone
Special Requirements:
-
Power
Smartphone
the Phillips product
-
Other products
-
Wireless connection
Use case 3 - Connection between smartphone and Fridge:
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
80
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Costumer wants to find out what is in the fridge and what he can make of existing
ingredients.
Preconditions:
-Smartphone/Artificial intelligence.
-Internet connection on the smartphone and on the control panel.
-Connection between control panel and fridge.
-The application, which is responsible for creating the connection.
-Browser application.
Success Guarantee or Post condition:
-The costumer will be able via the application to create and establish a connection between
his smartphone and the control panel where control panel will analyze the request and
connect to the fridge for further actions.
Main success scenario:
1) The costumer goes to the app store on his smartphone and downloads the application.
2) The costumer needs to fill in the information from the control panel in order for the
application to work.
3) The costumer press in is information and the control panel response positive.
4) Control panel makes connection with the fridge.
5) Fridge reads the request and analyzes the ingredients in the fridge.
Analyzing finished, browser searching for a dish with available ingredients.
Research is done and response to control panel is sent, from where a converted message will
reach customers smartphone.
Extensions:
The costumer gets a message from the control panel on his application that the connection
was successful and information what meal can be done.
The costumer will also get a notification if there is any problems with the connection
afterwards.
Special Requirements:
-User needs to buy the product.
-The costumer need the fridge to be connected with control panel.
81
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
-Control panel must have access to the internet browser.
-Control panel must have set defaults where to check for possible meal (ex: www.food.com)
-Fridge scanners must determine how old food is and what food is in the fridge.
-Food expire date and health must be an option to customer to choose to display or not.
Use case 4 - Connection between smartphone and Bathroom lights
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
Costumer wants to go to the bathroom
Preconditions:
-Artificial intelligence.
-Censor.
-Connection between control panel and censor.
-The protocol, which is responsible for creating the connection.
Success Guarantee or Post condition:
-The costumer will go to the bathroom and censor will detect his movement and will
establish connection with a control panel and give a signal to the control panel that
bathroom lights must be lighted on since the house holder is entering the bathroom.
Main success scenario:
6) The costumer goes to the bathroom.
7) The customer crosses censor line.
8) The censor establishes connection with a control panel and sends a request to light the
lights.
9) Control panel receives the incoming request and turns the light on in the bathroom.
Process is done, gives a response to the control panel:
-
Command failed, check the system.
-
Command fulfilled.
Extensions:
82
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
The costumer will also get a notification if there is any problems with the connection
afterwards.
The customer will also get a notification if lights or censor is not working
Special Requirements:
-User needs to buy the product.
-The costumer need the censors to be connected with control panel.
-Control panel must have direct access to the lights.
-Control panel must turn on the lights
Use case 5 - Connection between smartphone and curtains
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
Costumer wants to go to sleep or wakes up and wants curtains to close/open.
Preconditions:
-Smartphone/Artificial intelligence.
-Internet connection on the smartphone and on the control panel.
-Connection between control panel and curtains.
-The protocol, which is responsible for creating the connection.
Success Guarantee or Post condition:
-The costumer will be able via the application to create and establish a connection between
his smartphone and the control panel where control panel will analyse the request and
connect to the curtains for further actions.
-The customer will be able via the artificial intelligence give a command (ex: Bedroom
curtains close) artificial intelligence analyse if the curtains already closed or not if not it will
take the actions – close it.
Main success scenario:
The costumer goes to the app store on his smartphone and downloads the application.
The customer needs to connect curtains to the Smart Home network.
83
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
The customer needs to give a command whether smartphone or artificial intelligence.
Control panel receives the command.
Control panel analyses the command:
-
Command is good, continue the process.
-
Command is wrong, give a response to repeat the command/request.
Control panel makes connection with the curtains.
Curtains is being checked if they are already closed if not they are being closed and vice
versa.
Process is done, gives a response to the control panel:
-
Command failed, check the system.
-
Command fulfilled.
Extensions:
The costumer gets a message from the control panel on his application that the connection
was successful/failed and information with successful/failed operation.
Special Requirements:
-User needs to buy the product.
-The costumer need the curtains to be connected with control panel.
Use case 6 - Connection between smartphone and sink
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
Costumer wants to wash his hands or wash the dishes.
Preconditions:
-Artificial intelligence.
-Censors
-Connection between control panel and sinks.
-The protocol which is responsible for creating the connection.
Success Guarantee or Post condition:
84
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
-The costumer will be able via censor help put his hands to the sink where censor detect a
movement and water will begin to leak.
Main success scenario:
Control panel makes connection with the sinks.
Sink censor will detect within 1second that water must be poured.
Movement stopped water is stopped within same time frame 1second.
After the process is done a brief report of the performed work is sent to the control panel.
Extensions:
The costumer gets a message from the control panel on his application that the connection
was successful.
The costumer will also get a notification if there is any problems with the connection
afterwards.
The customer can see water consumption in control panel report sum ups.
Special Requirements:
-User needs to buy the product.
-The costumer need the sinks to be connected with censors.
-Censors must be connected to the control panel.
-Control panel must have access to the water system.
-Control panel must have set defaults what pressure water must pour.
Use case 7 - Connection between smartphone and OLED Screen
Scope: Smart Home technologies
Level: Costumer goal
Primary Actor: Costumer
Stakeholders and Interests:
Costumer wants to change wallpaper on one of the screens.
Preconditions:
-Smartphone/Artificial intelligence.
-Internet connection on the smartphone and on the control panel.
-Connection between control panel and OLED screen.
85
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
-Connect OLED screens to the Smart Home network.
-The protocol, which is responsible for creating the connection.
-Browser application.
Success Guarantee or Post condition:
-The costumer will be able via the application to create and establish a connection between
his smartphone and the control panel where control panel will analyse the request and
connect to the OLED screen for further actions.
Main success scenario:
The costumer goes to the app store on his smartphone and downloads the application.
The costumer needs to fill in the information from the control panel in order for the
application to work.
Control panel makes connection with the OLED screen.
Control panel searches for the wallpaper in the internet or from memory.
Control panel sends request with the wallpaper.
OLED Screen reads the request and analyses the resolution.
Analysing finished, OLED Screen sets up new wallpaper.
Extensions:
The costumer gets a message from the control panel on his application that the connection
was successful and information that wallpaper was set.
The costumer will also get a notification if there is any problems with the connection
afterwards.
Special Requirements:
-User needs to buy the product.
-The costumer need the OLED screen to be connected with control panel.
-Control panel must have access to the internet browser.
-Control panel must have set defaults where to check for possible meal (ex:
www.wallpaper.com)
-Control panel must search for the proper dimensions of the wallpaper.
-When OLED screen is added to the control panel it must send its own resolution to control
panel archives.
86
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Discussion
Introduction
Taking in consideration our first goals, that we set in the very beginning. We more or less have all
goals satisfied. The most important goal for us was to understand how Smart Home technologies
work and how they are developed. Discussing the report we find it clear that all has to begin from
a problem formulation. The problem formulation helps to raise goals, which you have to answer in
the report concerning all lectures involved. Writing this report and analyzing the technologies gave
us a great amount of knowledge, which will help to develop a concept much easier. In the report
we had a goal to create a fully functioning Smart Home system and all those functionalities are
stated in the user scenarios. Literature review gave a better overview where Smart Home
technologies stand at this point and this also lead to more “realistic” Smart Home ideas.
Discussions with class students, teachers and supervisor that were done all the semester project
time helped us to develop the project structure and involve all lectures, knowledge and skills from
the courses we had to cover the semester project requirements.
Deeper researches in the technical part lead us to the literature that helped us to understand how
Smart Home technologies can help people out when they are ill or when a disaster in home
appears. In the very beginning we were struggling to understand or find out how Smart Home can
help people so the most of the report description is targeted to a more luxurious life style than
helping people.
For further discussions we decided to make a written concept, which will give a clearer look how
the concept really looks like in the technical part not including the end product. In this section we
will describe various technologies and aspects that are needed to include in the concept in order
to build it. The very end of the discussion will give a final look of from our point of view the best
technologies that could be used in the development of this kind of product.
Routing and Addressing
To connect a network to the internet user needs a router. Routing and addressing are two main
87
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
pieces of the internet architecture, since any changes to them will cause impact to all of the “IP
stack”, from packet forwarding to applications58.
Internet Connections59
Before going deeper into the theory of IP routing and addressing it is necessary to discuss the best
possible internet connection that could and would be the best for Smart Home network, many
aspects must be considered such as: costs, speeds, reliability etc. There are many internet
connection types, we will discuss couple of them and define the best solutions.
Dial-up access
Is an analog connection which is both economical and slow. In order to connect to the network
using dial-up access connection which is using modem and which is connected to the PC, has to
allow PC to dial up phone number which is provided by the ISP. Dial-up is an analog connection
since data is sent over an analog – public-switched telephone network. The modem converts
digital data to analog and vice versa. However since the connection is using telephone lines the
quality of the connection is not always good and data rate is limited. Normal Dial-Up connection
speeds range is 2.6Kbps to 56 Kbps what is incredibly low these days.
Cable – Broadband Internet Connection60
Internet connection that is designed to operate over a cable TV lines. Cable internet work is based
on using TV channel space for data transmission with certain channels used for downstream
transmission and others for upstream transmissions. Comparing to a telephone line connection
broadband internet connection is able to offer much greater speeds. Cable provider typically
implement a cat to limit capacity and accommodate more customers. Normal cable speed range
varies from 0.5Mbps to 30Mbps61.
Wireless Internet connections62
Wireless broadband which is one of the newer connection type, instead of using telephone or
cable networks for your internet connection, customer is using radio frequency bands. Wireless
58
http://tools.ietf.org/html/rfc4984#page-8
http://www.webopedia.com/quick_ref/internet_connection_types.asp
60
http://www.webopedia.com/quick_ref/internet_connection_types.asp
61
http://compnetworking.about.com/od/internetaccessbestuses/f/cablespeed.htm
62
http://www.webopedia.com/quick_ref/internet_connection_types.asp
59
88
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
internet connection is an always-on mode which can be accessed from any place as long as
network is covering the area customer is trying to use the internet connection. Wireless access is
considered to be a widely spread up connection type and it is not hard to find a wireless service
provider taking in consideration countries like Denmark. Comparing to the costs it is more
expensive than wire based connection comparing the same speeds.
OC3 – Optical Carrier63
Level 3 is used to specify the speed of fiber optic network conforming to the SONET standard. OC3
is used as a fiber optic backbone for a wide network with huge data, video and traffic needs.
Optical Carrier is capable to offer 155Mbps and higher speed.
Tier Carrier64
Is a connection that can be connected to the backbone of the internet itself. Connection is widely
used by ISP. Tier carrier has many different types that vary in speed and individual channels that
they are carrying. T-3 can carry up to 670 channels and carry the speed which can get lower than
43Mbps while T-5 can reach a speed of 400Mbps. Even though it is almost impractical to use such
of speeds on home based computer sets, Tier Carrier connection is one of the answer in reach our
product goals of having 1Gbps speed in Smart Home network system.
Routing and Forwarding
Virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing
table to co-exist within the same router at the same time. Since the routing instances are
independent, the same or overlapping IP can be used without conflicting with each other. VRF may
be implemented on a network device by distinct routing tables. A network device may have the
ability to configure different virtual routers where each one has its own forwarding information
bases that are not accessible to any other virtual router model on the same device65.
There are two ways to implement the virtual routing and forwarding. Simple implementation is a
form of VRF Lite. In such implementation each router within the network perform in the virtual
routing environment in a peer-based method. VRF lite does not scale to the size required by global
63
http://www.webopedia.com/quick_ref/internet_connection_types.asp
http://lignup.com/computer-tips/149-internet.html
65
http://classes.soe.ucsc.edu/cmpe080n/Winter04/quizzes/Practice_Quiz3_soln.pdf
64
89
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
enterprises or large carriers, as there is the need to implement each VRF instance on every router,
including intermediate routers.
More advanced implementation of VRF Lite is done by implementing the IPVPN. In this kind of
implementation, a core backbone network is responsible for the transmission of data across the
great range area between VRF instances at each edge location. IPVPNs was deployed by carriers to
make a shared wide area backbone network for multiple customers. This is also reasonable to be
implemented in shared data center environments. In general, customer routers handling local
routing in a traditional way and disseminate routing information into providers side where the
routing tables are displayed. The provider side then encapsulates the traffic, marks it so the VRF
instance could identify it, and transmits it across provider backbone provider network to
providers’ router. Then provider side router decapsulates the traffic and forwards it to the
customer router. The customer equipment in backbone network is completely transparent,
allowing multi utilization of the common backbone network while maintaining end-to-end traffic
separation. Routes along the provider backbone network are handled using Interior Gateway
Protocol, it uses extended attributes in a common routing table to differentiate the customers’
routes with overlapping IP addresses. Mentioning IPVPN it is mostly used across Multi-protocol
Label Switching backbone the labelling of packets in MPLS leads to the identification of the
customer VRF. Some of the IPVPN implementations are utilizing simpler IP in IP encapsulation over
a pure IP backbone what allows to disable MLPS environment since there is no need to maintain
and support it.
Routing algorithms
Routers using routing algorithms to find out which path is the best to reach the destination.
Routing algorithms taking in consideration parameters such as hops, time delays and
communication costs of packet transmission.
To specify the best path it is all based on how routers are capable to gather information of a
network and their analysis of information. There are two major routing algorithms66: global
routing algorithms and decentralized routing algorithms. In global routing algorithms every router
has a complete information about all routers that are connected to the network and traffic status
66
http://computer.howstuffworks.com/routing-algorithm1.htm
90
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
of the network. These kind of algorithms also known as link state algorithms (LS). In decentralized
routing algorithms each router has information about other routers only if they are directly
connected to it, what means that it might not know all routers in the network. Decentralized
routing algorithm is also known as distance vector (DV).
Link State Algorithms67
Routers that are connected link state algorithms must follow a set of steps. In the beginning
algorithm must identify the routers that connected to them and get their IP addresses. In response
when router starts to work it sends back a packet over network. Every router that receives that
packet replies with a message that includes their IP address.
The next following step is measuring the average traffic or delay time for nearby routers. In order
to make this happen, routers sending echo packets over the network. Every router that receives
that packet must respond with the same packet back.
Third step is broadcasting its information over the network and receive others information back. In
this step all routers have to share their information. All routers sharing their knowledge and
broadcasting their information to each other. By doing this every router is capable to understand
the structure and status of the network.
Last step is to identify the best route between two nodes of the network using the right algorithm,
routers choose the best route to every node. Routers do this using algorithm such as the shortest
path algorithm Dijkstra. Using this algorithm it is basing everything on information which he
collected from other routers, by that information it builds a graph of the network. This graph can
show the location of the router in the network and their links to each other. Every link is labeled
with a number called the cost or weight. This number is a function of average traffic, number of
hops between nodes and delay time. The algorithm working principle is: if there are more than
one link between the nodes and a destination, router is picking the link that has the lowest weight
or cost.
Dijkstra algorithm68 working principle:
67
68
http://computer.howstuffworks.com/routing-algorithm2.htm
http://optlab-server.sce.carleton.ca/POAnimations2007/DijkstrasAlgo.html
91
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
The router builds a graph of the network and identifies source and destination nodes. If
there is no direct link between nodes, weight or cost is identified as “infinity”

Router builds a status record for each node in the network. Record is including the fields:
o Length field – Shows the sum of the costs from the source to the node
o Label field – Status of the node
o Processor field – Showing the previous node
Each node can be either “tentative” or “permanent”

The router initializes the parameters of the status record set for all nodes and sets their
length to “infinity” and label is set to “tentative”

The router is setting a t-node if the node is to be the source t-node, router changes label to
“permanent”, when it is changed, it never changes again.

The router updates the status record set for all tentative nodes that are directly linked to
the source t-node.

Router looks at all tentative nodes and chooses the lowest one – that node is then the
destination t-node.

If that node is not the intended destination router was looking for the router repeats the
point 5. If this node is the intended destination, the router extracts its previous node from
the status record set and does this until it arrives at the initiator.
Routing protocols69
Routing protocols specifies how routers are communicating with each other, disseminating
information which enables them to select routes between any two nodes on a computer network.
Using routing algorithms determines the specific choice of the route. Even though there are many
different type of routing protocols there are three categories used in IP networks: Interior gateway
routing via link state routing protocol, interior gateway routing via path vector and exterior
gateway routing (Used for exchanging traffic between autonomous systems).

Interior gateway system protocol is used in exchanging information within an autonomous
system.
69
http://www.cisco.com/en/US/docs/net_mgmt/active_network_abstraction/3.7/reference/guide/routpro.html
92
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
Exterior gateway protocol is used between autonomous systems.
Routing Information Protocol (RIP)70
It is a forceful protocol type which is used in local area network and wide area network. RIP type is
categorized interior gateway protocol within the use of DV algorithm.
Open Shortest Path First (OSPF)71
It is an active routing protocol used in the internet protocol. OSPF is a link state routing protocol
that belongs to an interior gateway protocol. Open shortest path first operating inside a distinct
autonomous system. This protocol is widely used in the network of big business companies.
Border Gateway Protocol (BGP)72
BGP is the core routing protocol of the internet and responsible for maintaining a table of the
internet protocol networks which are authorizing network reaching capability between
autonomous systems. The border gateway protocol is a path vector protocol. It was created to
replace the Exterior Gateway Protocol (EGP) routing protocol to permit completely decentralized
routing in order to permit the removal of the NSF Net which consent to internet to turn into a
truly decentralized system.
Intermediate System-to-Intermediate System
A great protocol used by network devices to determine the best way to promoted datagram from
side to side a packet switched network.
70
http://freewimaxinfo.com/routing-protocol-types.html
http://freewimaxinfo.com/routing-protocol-types.html
72
http://freewimaxinfo.com/routing-protocol-types.html
71
93
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Addressing
Even though the original scheme is relatively simple
Figure 22
73
It has become complex over the years since a numerous changes in order to allow to deal with
various addressing requirements. However there are more advanced styles of IP addressing, like
subnetting and classless addressing.
Subnetting74
A subnetwork, part of subdivision of an IP network. Subnetting is when network is dividing into
two or more networks. All computers that are belonging to a subnet are addressed with an
identical bit-group in their IP addresses. Subnetting in IPv4 was to improve efficiency in the
utilization of the small address space available, particularly to enterprises. In IPv6 there are no
limitations since the large address space is available. Subnet always using IPv6 addresses with
73
74
https://learningnetwork.cisco.com/servlet/JiveServlet/showImage/2-126319-29676/IP+addressing+scheme.jpg
https://supportforums.cisco.com/docs/DOC-17232
94
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
64bits for host, technically there is possibility to use smaller subnets. However they are impractical
for local area networks whom are based on Ethernet technology. IPv6 is not implementing special
address formats for broadcast traffic or network numbers, thus all addresses in a subnet are
available as a host addresses.
Quality of Service for Streaming Media75
Errors in streaming audio application can cause interruption to the audio stream or cause gaps in
audio stream for periods of time what will make audio play with pauses which will be noticeable
for a human ear. Assuming that audio format is normally “.mp3” audio stream can use OverQoS to
smoother out audio streaming by spreading out the pauses over time.
MPEG Streaming consists of a Group of Pictures each comprising of I-frames, P-frames and Bframes. Among all these I-frames are the most important because they represent the start of the
video sequence in a Group of Pictures while P-frames and B-frames are inter coded-frames. Since
the frame is larger than a packet frames are sent through multiple consecutive packets. All packets
corresponding to I-frame occur in succession. If the error will occur in the streaming it can
eliminate I-frame completely what will cause player to disconnect since the Group of Pictures
cannot be reconstructed. The B-frame and P-frame are useless without starting I-frame.
When using OverQoS76, it can associate packets to belonging I-frames with a higher priority to
recover packets within an I-frame at the expense of P or B-frames. All in all taking in consideration
the lag of B and P frame packets affects the whole quality of one Group of Pictures in an MPEG
stream. Dropping P and B packets smoothly can affect the quality of multiple Group of Pictures.
The type of frame of a packet is embedded in the MPEG Video-Specific header within the payload
of a packet.
Quality of Service for Voice Over IP77
Quality of service is a major issue for VoIP implementation. It is important to assure that packet
traffic for a voice or other media connection will not be delayed or dropped due to other lower
priority traffic. VoIP QoS requirements are:
75
http://static.usenix.org/events/nsdi0/tech/full_papers/subramanianOver/subramanianOver_html/node15.html
http://www.cs.unc.edu/~kmp/comp832-s08/readings/krasic-qos-scalability.pdf
77
http://www.cisco.com/en/US/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoIP.html
76
95
ITCOM4
2013

AAU-CPH
Group 5
Martynas & Frederik
Latency
Normally people notice roundtrip voice delay of 250ms. Recommendations of a maximum
latency are 150ms one-way. However we are considering to have a lower latency in our
local area network. Many network service-level agreement maximum latency:
o Axiovave SLA 65ms maximum latency78
o Internap SLA 45ms maximum latency
o Qwest SLA 50ms maximum latency
o Verio SLA 55ms maximum latency
The numbers show the total latency for a VoIP.

Jitter
Jitter can be measured in several ways. Unfortunately equipment and network vendors
often do not include exactly how they are measuring the values they are providing for
measured jitter. The discussion that gave a big question of what level is acceptable of a
jitter in a network lead us into a researches of a network providers.
o Axiowave has a 0.5ms jitter*
o Internap has a 0.5ms jitter*
o Qwest has a 2ms jitter*
o Verio has an average of 0.5ms jitter*

Packet loss
Packet loss is a very big issue for VoIP, even a small percentage of a packet loss can damage
a VoIP call. Maximum packet loss:
o Axiowave 0% packet loss
o Internat 0.3% packet loss
o Qwest 0.5% packet loss
o Verio 0.1% packet loss.
78
http://www.businesswire.com/news/home/20040913005122/en/Axiowave-Partners-TeleGea-Offer-CarriersAutomated-Provisioning
*Numbers specify the maximum jitter
96
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Building the concept
Making a discussion of all necessary parts to develop our product, we will try to pick the best
performance and software to build our own smart home. As mentioned in the first part and in the
report that our goal is to provide a fast home network we decided to choose a tier carrier T-5 type
since its maximum speed is 400Mbps and the lowest is 43Mbps, which currently satisfying our
needs for the basic use of smart home development. It is necessary to implement the virtual
routing and forwarding that would allow us to use the same IP’s in the same network and. Our
group has decided to implement more advanced virtual routing and forwarding by using IPVPN.
It is necessary to pick up the right algorithms for our concept and it is considerably wise to choose
global routing algorithms since we want to provide a fully connected tree where each router could
have full information about other devices and if the problem occurs could instantly forward
process over to other device. As mentioned before these algorithms are called link state
algorithms and they have to follow strict steps what is very important for our system. As it was
mentioned in Dijkstra algorithm, we would use this algorithm since it is handy in finding the
shortest paths between the transmitter and receiver in our case. What is even more important
when the algorithm finds the best shortest road is decreasing the “weight” and improves the
performance it keeps it permanently. However when the path gets corrupted it starts to look next
shortest path which is also a great advantage of this algorithm.
Concerning the routing protocols we decided that we should give a try for OSPF or Intermediate
system-to-Intermediate system (IS to IS) protocols. The case that we chose these two protocols
are that picking the shortest paths will give lower latency results and will not overload our system.
IS to IS protocol is using a packet switched method which means that it groups all transmitted data
which is important while streaming images or audio messages or streams.
When having all these settings it is important to define the topology and as it was mentioned in
the report we decided to use two different topologies which are: chained start topology and fully
connected topology. The reason why it was chosen is to make smart home performance more
efficient. Using start chained topology between the control panel and routers and fully connected
topology between the devices taking in consideration if control panel needs to collect information
from them or to check the problems caused for some reasons. Even though this kind of connection
97
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
seems to be slower, but more reliable, and our group is preferring reliability more than the small
speed improvement.
Our main IP addressing is subnetwork, since we want to have a two different network types where
control panel is connected with a routers and each of the router is sharing their own information
between each other. Next network is when router is fully connected to the devices that are
connected to the smart home environment.
When having the basic skeleton of the concept the next important issue is Quality of service for
media streaming and VoIP since we want to implement the artificial intelligence in our smart
home network. Even a slight error in media streaming can affect whole movie or video customer
wants to see, taking in consideration the window that can be turned into a huge TV displaying the
sunset or a mountain view. In this case we came to a solution to implement OverQoS what will
lead us to a more reliable streaming since it is setting higher priorities to important I-frames. VoIP
can be solved within a separate network, we have described most important issues that can occur
while using VoIP and the issues are latency, jitter and packet loss. In the very beginning of the
analysis of VoIP we discussed that the Internap network would be most reliable to use. However
the issues with the packet loss lead us to choose Axiowave network since in VoIP technology the
most important thing is packet loss. Whenever a packet is lost it can cause a whole performance
failure and Axiowave results were more than perfect scoring a 0% of a packet loss.
In the very end when already having all this background it already starts to give a clearer look how
our concept will look or at least what it will use when we will do our visual concept in OPNET. In
future development we are keen to continue reaching our goals and one of the main goal was to
build our own concept which can be done over OPNET. OPNET will help us to answer if our chosen
technologies were right to build a reliable and fast system in order to satisfy ours as developers’
goals and customer needs. Taking all commercial facts it is very important to build a concept on a
software before starting to create a real product due to the huge costs. However this is a far
future which will hopefully take place after the concept realization and stable work in OPNET.
98
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
CONCLUSION
During this project we tried to answer the questions we stated in our problem formulation. We
decided to pick the subject of Smart Home and create a problem formulation that if answered
would give a great overview of Smart Homes and the technologies evolving Smart Homes. By
solving and answering these problems we can have a great understanding of what the Smart
Home state of the art is and how we can improve it in the future. In order to figure out the key
issues evolving Smart Homes we had to do a lot of background research, which was used in almost
the entire project. After collecting our data we now had a foundation to answer the first of our
problems. The Smart Home technologies all work by human settings. That means if you would like
to have preferred settings in your house you can simply modify the Smart Home system so it
would act as you command. We also got into details about the Smart Home technologies as we
discussed and compared different technologies and protocols relevant for our project. The
technology analyses in the report also conclude on which technologies and protocols are more
efficient and reliable, in our case it was the UBP protocol which had the highest reliability even
though it is not the newest protocol.
We then use our stakeholder analysis in order to create realistic user scenarios, where Smart
Home technologies are used to create an easier life for people living in Smart Homes. The
stakeholder analysis also defines how the different “players” are capable of using a Smart Home
and what to consider when addressing them. The scenarios are relevant, when finding the
requirement specification so a developer would have a smoother transaction if he had to help us
build Smart Home technologies. In the market perspective part of the project we also had a SWOT
that imagines selling our product if it is created at some point.
Furthermore creating user scenarios helps to create a realistic idea of how Smart Home security
systems can be created or how it could be improved considering the previous security ideas that
were developed in the past. Mobile IP Smart Home researches also gave a clear overview how
Smart Home occupants should be provided with high security technologies in order to increase
safety normative in Smart Homes. The written concept gave a clear look what kind of technologies
are used in this kind of products. Analysing all useful materials gave results which allowed us to
build our imagined concept. All in all creating a Smart Home network or just your own network
99
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
then OPNET is a great tool when trying to merge different technologies in the same network.
Merging written report and OPNET possibilities will allow us to test in the future whether our
picked technologies work in the way we described them. OPNET also gives a great solution in
finding out the best reliable and most efficient technologies for a smart network. As we did not
have time for using OPNET we tried to visualize the concept by writing and discussing the different
technologies available. This led to a “fictive” Smart Home network, which can be used in further
research.
To conclude on our project we are satisfied with the project we delivered and we got so caught up
in the process that we will work on future development and try testing our Smart Home ideas with
OPNET even after the project is handed in.
100
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Shortcuts:
1. AC – Air conditioning
2. AMI – Advanced metering infrastructures
3. BGP – Border Gateway Protocol
4. CCFL – Cold cathode fluorescent lamp
5. DDBC1200 – Dynalite HF ballast controllers
6. DDLE802 – Dynalite Leading Edge Dimmers
7. DDMC802 – Dynalite multipurpose controllers
8. DDTC001 – Dynalite time clocks
9. DDRC1220FR-GL – Dynalite relay controllers
10. DF – Delay factor
11. DNS – Domain name system
12. DR – Demand/Response
13. DR2P – Control keypad
14. DV – Distance vector
15. FM – Frequency modulation
16. HAN – Home area network
17. HF – High frequency
18. HVAC – Heating, ventilation and air conditioning
19. ICMP – Internet control message protocol
20. IP – Internet protocol
21. IPv4 – Internet protocol version 4
22. IPv6 – Internet protocol version 6
23. IPVPN – Internet protocol virtual private network
24. IS-IS – Intermediate System-to-Intermediate system
25. ISP – Internet service provider
26. LAN – Local area network
27. LCD – Liquid-crystal display
28. LED – Light-emitting diode
29. LS – Link state
101
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
30. MDI – Media Delivery Index
31. MLR – Media loss rate
32. MPEG – Moving picture expert group
33. MPLS – Multiprotocol Label Switching
34. OC – Optical carrier
35. OLED – Organic liquid-crystal display
36. OSPFv3 – Open shortest path first
37. PC – Personal computer
38. PLC – Programmable logic controller
39. POP – Post office protocol
40. TCP – Transmission control protocol
41. TV - Television
42. QoS – Quality of Service
43. RGB – Red, Green, Blue
44. RIP – Routing information protocol
45. SLA – Service-level agreement
46. SNMP – Simple network management protocol
47. SONET – Synchronous Optical Network
48. T-3, T-5 – Tier 3, Tier 5
49. TFTP – Trivial file transfer protocol
50. UDP – User datagram protocol
51. UPB – Universal powerline bus
52. VoIP – Voice over internet protocol
53. VRF – Virtual Routing Forwarding
102
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
Reference list:
1. Mayr, E. This Is The Norms: The Science of the Living World. Cambridge, MA: Harvard
University Press, 1997
2. The Industrial Communication Technology Handbook, Wolfgang Kampichler, 2005,
Chapter 4
3. Introduction to Telecommunication network Engineering, Second edition, Anttalainen
Tarmo, 2003, Chapter 2
4. ITCOM_course_-_CMT_-_mobile_IP_and_TCP.pdf – CMT Reza Tadayoni
5. The SWOT Analysis: Using Your Strength to Overcome Weaknesses, Using
Opportunities to Overcome Threats
6. Ian Graham Requirements Modelling and Specification for Service Oriented
Architecture
1. http://www.lighting.philips.com/main/subsites/dynalite/index.wpd?gclid=CMKHotGZm
LYCFREfzQod0VQAbQ
2. http://www.phillips.com
3. http://www.lighting.philips.com/main/subsites/dynalite/projects/smart_home/
4. www.lg.com
5. http://www.sersc.org/journals/IJSH/vol4_no4_2010/4.pdf
6. http://www.pcmag.com/article2/0,2817,2387377,00.asp
7. http://www.hgb-leipzig.de/artnine/huber/writings/internete.html
8. http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Telecom_Whitepaper
_Telecommunication_Networks_Security_Management_01_2012.pdf
9. http://farm5.staticflickr.com/4040/4266789711_65d733e2c4_z.jpg?zz=1
10. http://tecschange.org/classic/networks/network-syllabus.html
11. http://www.webopedia.com/TERM/W/Wi_Fi.html
12. http://netforbeginners.about.com/od/i/f/ipv4_vs_ipv6.htm
13. http://hometoys.com/emagazine.php?url=/ezine/11.10/calderone15/index.htm
14. http://www.insteon.com/about-home.html
15. http://www.zigbee.org/About/UnderstandingZigBee.aspx
16. http://www.z-wave.com/modules/Z-WaveSolutions/
17. http://www.zwave4u.com/content/en/Quick-Start-Guide.html
18. http://www.avsforum.com/t/743146/z-wave
19. http://www.thinkypedia.com/question/34776/
103
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
20. http://news.bbc.co.uk/2/hi/programmes/click_online/4080566.stm
21. http://www.usnap.org/
22. http://www.smarthome.com/about_x10.html
23. http://www.pulseworx.com/UPB_.htm
24. http://upload.wikimedia.org/wikipedia/commons/9/96/NetworkTopologies.png
25. http://fcit.usf.edu/network/chap5/chap5.htm
26. http://www.inetdaemon.com/tutorials/basic_concepts/communication/connectionoriented_vs_connectionless.shtml
27. http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf
28. http://ftp.ineoquest.com/pub/docs/Datasheets/Media_Delivery_Index.pdf
29. http://tools.ietf.org/html/rfc4445
30. http://www.ineoquest.com/sites/default/files/mdi_0.jpg
31. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
32. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
33. http://www.sersc.org/journals/IJSH/vol6_no1_2012/3.pdf
34. http://users.salleurl.edu/~zaballos/opnet_interna/pdf/OPNET%20Simulator.pdf
35. http://www.opnet.com/solutions/network_rd/modeler.html
36. http://www.insteon.com/about-howitworks.html
37. http://www.insteon.com/about-howitworks.html
38. http://www.reference.com/motif/Business/stakeholder-analysis
39. http://www.unc.edu/depts/econ/byrns_web/Economicae/monocompt.html
40. http://o.onionstatic.com/images/8/8278/original/700.hq.jpg?3926
41. http://www.decodir.com/wp-content/uploads/2009/10/beautiful-living-room-3drender.jpg
42. http://www.real-visuals.com/wp-content/uploads/2010/02/3d-photograph-realisticquality-Interior-Design-kitchen-rendering-animation.jpg
43. http://us.123rf.com/400wm/400/400/hemul75/hemul750803/hemul75080300010/27
10202-luxurious-bedroom-in-red-3d-rendering.jpg
44. http://www.3dartweb.com/portfolio/bathroom2_post.jpg
104
ITCOM4
2013
AAU-CPH
Group 5
Martynas & Frederik
45. http://s3images.coroflot.com/user_files/individual_files/original_150801_ExPgZjzVnIpS
gZLBt1AbGIGbe.jpeg
46. http://tools.ietf.org/html/rfc4984#page-8
47. http://www.webopedia.com/quick_ref/internet_connection_types.asp
48. http://compnetworking.about.com/od/internetaccessbestuses/f/cablespeed.htm
49. http://lignup.com/computer-tips/149-internet.html
50. http://classes.soe.ucsc.edu/cmpe080n/Winter04/quizzes/Practice_Quiz3_soln.pdf
51. http://computer.howstuffworks.com/routing-algorithm1.htm
52. http://computer.howstuffworks.com/routing-algorithm2.htm
53. http://optlab-server.sce.carleton.ca/POAnimations2007/DijkstrasAlgo.html
54. http://www.cisco.com/en/US/docs/net_mgmt/active_network_abstraction/3.7/refere
nce/guide/routpro.html
55. http://freewimaxinfo.com/routing-protocol-types.html
56. https://learningnetwork.cisco.com/servlet/JiveServlet/showImage/2-12631929676/IP+addressing+scheme.jpg
57. https://supportforums.cisco.com/docs/DOC-17232
58. http://static.usenix.org/events/nsdi0/tech/full_papers/subramanianOver/subramanian
Over_html/node15.html
59. http://www.cs.unc.edu/~kmp/comp832-s08/readings/krasic-qos-scalability.pdf
60. http://www.cisco.com/en/US/docs/ios/solutions_docs/qos_solutions/QoSVoIP/QoSVoI
P.html
61. http://www.businesswire.com/news/home/20040913005122/en/Axiowave-PartnersTeleGea-Offer-Carriers-Automated-Provisioning
105
Download