Meshdynamics
Chirp Primer. Rationale for Soft Chips
Anchor    Glossary     One Page     Primer      Slides     Soft ChipsTM    Blogs     Book     Mesh     ACG     SlideShare   Linkedin     Bio 
        


Fig.1 Above Left.  Key Challenges to “Massive IoT” are Energy, Complexity, Density + Security.
Fig.2 Above Right. Nature's Massive IoT uses light, innately secure receiver biased messaging.



Fig.3 Consumer: Medical Sensor Patches -> Makes Data Logs -> Delivers to Carrier Pigeons -> Cloud -> "Edge" Intelligence



Fig.4 Enterprise:  "Imprinted" Sensor Patches ->  Makes Data Logs -> Delivers to Pigeons -> Cloud -> "Edge" Intelligence

The Rationale behind Small Dumb Cheap Copious Innately Secure

Over next decades, billions of IoT devices will be monitoring farms, forests, oceans, and other natural resources with sparse and intermittent cloud connectivity. As IIoT becomes more autonomous, connectivity is both sufficient and ubiquitous. Edge sensors may now provide logs for intermittent pickup and delivery.  

IPV6 protocol is heavy - intended for humans. In sharp contrast, Nature’s IoT messaging is terse, cryptic, receiver-oriented and self-classifying. And intentionally lightweight - like Pollen. Taking cues from Nature, “Chirps” were developed for SPAWAR for stealth messaging across global networks. Sharp Corp. licensed a version for Asia. In this Cloud->Edge thinking, Soft Chips providing Edge Intelligence are imprinted to send trusted ground truth data logs - on cloud managed schedules and RF channels.

Soft Chips just need wireless serial modems. All radios can or do support that. Chirps thus piggyback on existing radios and protocols and widely used encrypted, trusted and ubiquitous messaging infrastructure - SMS, WhatsApp, Email on connected devices. If phones don't support desired radio frequencies (for range, obfuscation etc) then USB powered receivers are a simple fix. The phones just need protocol handlers. Iphones and Amazon Sidewalk  networks - currently  walled gardens - now support lighter versions of AirTagTM  for mobile asset tracking.  Simpler, lower cost and low power devices engender Massive IoT.  Security is addressed next.


  Soft Chips, Security and CHIPS initiatives

Soft Chips embodiments are intended for dual use (military and industrial) since the security is in the imprinting services provided by trusted hosted services. Also the ends of wireless modems at the Edge are "paired" - know of each others' schedules and RF channel usage and handshake protocols. In other words, the probability of bad actors intercepting terse - intentionally stealth-like messaging is low simply because the combined probability of multiple variables all being detected correctly is infinitesimally small- and the variables are being changed with each encounter. When pigeons arrive,  data logs are transferred based on  imprinting protocols.  Schedules and protocol framing  are private and changed  - using temporal keys  and frequency hopping. Innately Secure. End-to-End and Zero Trust.

Our current Edge->Cloud thinking around End-to-End security and trust is driven by onerously "heavy" encryption - which conflicts with low power usage and cheap hardware objectives. Based on Nature's consensus approach to "small dumb cheap copious", corroborated edge intelligence from multiple sensors (a sensor grid) leverages many sensing devices, operating on different "channels". See  Image.

 Total Cost of Ownership  plummets with economies of scale driving down  dense sensor grids deployed  in remote or hostile areas and for many applications. In our polarized world, governments and military deploy edge devices imprinted by them to provide womb-to-tomb ground truth verification. Sensitive data is not sent over foreign networks and equipment. Covert networks over trusted devices are used. Business is war watered down. Today, all Global enterprises and Regulatory agencies run on federated “Clouds” and expect authentic data from their assets on the ground.  Our AI systems need large, reliable and corroborated data logs - else its all GIGO.

CHIPS initiatives - "integral to America’s economic and national security" benefit from collaborative sharing of trusted, previously walled private gardens. Global scale challenges mandate Globally Relevant Edge à Cloud solutions.


Global Impact of Simple Devices Speaking Simply. -> Cloud Orchestration Models

Today’s last mile is crippled by fractured MAC-centric protocols: all un-scalable solutions. The Cloud Orchestration model cuts Gordian knots in Fig. 1 and unleashes the full power of IIoT.  Challenges in Fig. 1 are exacerbated for currently un-connected Legacy machines.

Industrial versions of Sensor Patches may now be copiously and non-invasively - attached to un-connected legacy remote assets for their predictive maintenance - driving new efficiencies in managing the Edge.

Chirpers just need wireless serial modems. All radios support that. Chirps thus piggyback on existing radios and protocols. If Chirpers need to use an unsupported radio, USB powered receivers are a simple fix. Iphones just need protocol handlers (at the radios). Iphones and Amazon Sidewalk - previously walled gardens - now support lighter versions of AirTagTM . Simpler devices - e.g. Soft ChipsTM  - engender Massive IoT.

      1.  Small.     Small Radio Power Usage and Footprint - Long Battery life.
      2.  Dumb.    Limited Ant-like processing capabilities - but re-programmable.
      3.  Cheap.    Intended to be produced in billions - since multi-use
      4.  Copious. Intended to be used like Smart Dust - dense ground truth verification.
      5.  Secure.   Imprinting process - end-to-end - is innately secure. Also see Provenance
      6.  Organic. No central standards needed. Modem based Chirp protocol Enterprise specific.
      7. Agnostic. Chirps radio and protocol agnostic. Can coexist with other protocols.

Edge->Cloud thinking thus shifts to a more sustainable, scalable, secure Cloud->Edge thinking:

        1. Cloud Orchestrator -> Trusted Pigeon -> Imprints Chirp with new Logic, Schedules.
        2. Chirper -> Runs Logic -> dumb wireless modems -> Receiver Radios on Phones, Drones etc.
        3. Receivers harvest Chirps -> Add tagging -> Pub/Sub messaging -> Cloud Subscribers.
        4. Chirpers with Ant-like imprinted logic run on billions of chipsets -> “Massive IoT”.

Key Conjectures when thinking shifts from Edge->Cloud to Cloud->Edge thinking:

        1. Global-Scale “Edge” challenges are: simplicity, cost, energy & (as always) security.
        2. Chirpers don’t need heavy OSI stack -> minimal power and cost for connectivity.
        3. Software Defined Networking for the Edge -> Moves Chirping Intelligence to Cloud.
        4. Trusted walled gardens become globally relevant through our imprinted chipsets.
        5. Massive IIoT - with no legacy systems left behind - burgeons. 


Soft ChipsTM Exemplary Embodiments



Fig. 5. Left.  Soft Chips don’t need the full OSI stack  -> minimizing power and cost.
Fig. 6. Right. Exemplary Soft Chip are packaged sensors +  UART based wireless serial modem.

images/Soft_Chip_Sensor_Patch_With_Modem_Labelled.jpg

Fig. 7. COTS available Development Tools, 16 bit MCU and Simple, Cheap Sensors to engender Soft Chips. 

Soft Chips and its low cost and power embodiments may be deployed with little or no electricity, in developing regions or where remote natural resources reside - the "Edge". Platform as a service providers - PaaS - will use carrier pigeons (cars, drones) to forward chirps for Edge Intelligence and SLA compliance. Chirp Networks  with imprinted edge intelligence may then glean trends from sensor data collected within food systems, agriculture production, factory distribution, and climate preparedness.  Logically contiguous clouds cross over previously walled garden boundaries - engendering Massive IIoT which can now support:

A. Global Health Diseases can spread like wildfire in dense unsanitary make shift housing in slums and refugee camps. We "chip" our pets so we can track them. We may also track disease spread through small dumb cheap and most importantly copiously used Sensor Patches. A USB or BLE modem paired to phones readily serve as carrier pigeons for global scale regulatory and monitoring agencies - proactive preparation for future epidemics.

B. Legacy Assets are unconnected - they were not designed initially to be networked. Sensor patches - attached non-invasively can monitor sounds, temperature, vibration of rotating machinery. Actionable intelligence gleaned by AI driven pattern analysis - operating on huge datasets - will drive new efficiencies in remote asset management - with no legacy assets left behind.

C. Forest Fires and Early Warning Systems. Soft Chips are intentionally dumb - to minimize power consumption and cost. Their radios can listen, chirp, or relay (listen then chirp on non-interfering RF channel or time interval. A Chirper Grid then rapidly spreads the word so to any available carrier pigeons (patrol drones, park rangers), saving billions.

D. Global Food Systems and their management. Data logs sent over SMS from Africa feed data lakes and drives new efficiencies.

E. Military uses - covert mobile asset tracking and intrusion detection in DMZ or hostile regions (has been field tested).

F. Asset Tracking from "birth". Establishing Provenance - where raw materials are sourced - and  audit trails for logistics supply chains is increasingly relevant today.  Soft Chip products are imprinted – establishing provenance to “Mother”. On power up chirp devices first scan/listen for “Mother” on private channels and cryptic protocols. Receiver radios on phones or drones respond to imprint the devices. If RF interference occurs, they are directed to to other channels schedules etc. Imprints provide a reliable end-to-end trusted system.

Soft Chips have a minimal - but extensible - base vocabulary: Send, Listen, Relay, Log. Transmissions are either scheduled - e.g. Cron  - or trigged by events - a listener on activated sensor on a Sensor PatchTM  This Extensible Soft Chips family addresses multiple military and industrial - dual use - applications.


Soft ChipsTM Terse Protocol  Framing Example. (Leveraging SMS like messaging services)

 
 
A  minimal viable Soft Chip work flow may use SMS as message broker and BLE/USB on pigeons to store and forward.  More

Consider a potential use case for a farmer in rural Africa. His phone has no connectivity in the field where the sensors are. A store and forward mechanism is needed – see this email based thin device for Asian rural distribution chains.  We also wish to leverage SMS like free messaging services so  we limit the total payload to 160 bytes  and for SMS transmissions. There will also be tagging at the Smart phone application end before it is transmitted to SMS message brokers - when the farmer has connectivity. We thus further limit data log payload to not exceed 110 bytes, with 10 bytes reserved for Chirp-ID etc. The 100 byte data log will be sent on SMS, so we may further restrict it to ASCII and  CSV-like format.

For the 100 bytes payload (the data log) our options are based on how many samples and each sample size in bytes :

#Samples : Sample_Size_in_Bytes: 100:1,  50:2,  25:4,  20:5,  10:10,   5:20,  4:25,  2:50,  1:100  (100 bytes each).

Thus 4 sensors, each providing 1 byte may be sampled 25 times during pigeon pickup sessions.  This specific Chirp payload framing is thus fleshed out to be 25 samples of |Sensor_1|Sensor_2|Sensor_3|Sensor_4| = 25 *4*1  bytes.  This is generous because  2 bits (00  01, 10, 11 ) can define “black or dead”, “red”, ”yellow”, “green”  mapping to programmed sensor data ranges.   4 sensor feeds can be condensed to one byte (8 bits).  Edge intelligence can be terse  yet meaningful- especially in receiver-oriented communications. .

When pigeons arrive,  data logs are transferred based on handshaking supplied in the imprinting protocols- and could be  as simple as an obfuscated version of  Chirp-IDs. Recall schedules and protocol framing  are private and can be changed each trip - using temporal keys  and frequency hopping. Innately Secure. 

After data logs are delivered, the data log is erased and effectively a soft reboot begins the next data logging schedule - which may include a new programs or framing. The soft chip may not have GPS to conserve both cost and power, but pigeons may  - then time/location are synched. Mobile asset tracking at this level of granularity may suffice.

The farmer transfers the data log (110 bytes) from the pigeon to apps on his phone with BLE pairing between his phone and the BLE radio on the pigeon. The phone app can add GPS and time stamp tags and eventually forwards it to message brokers - SMS, WhatsApp  etc. These trusted community networks may include oversight  agencies who rely on remote ground data to drive forecasting etc.

A minimal viable - and self sufficient - product emerges which may also leverage existing BLE connectivity, already in use for indoor IoT to connect with BLE mesh on local WLANs.  The farmer's phone may thus use other phones in the network to connect to cloud services. 

Consider now two WhatsApp  accounts on the farmers phone. One is admin protected and provides  programs and schedule templates. The phone app adds  jitter settings so soft chips avoid collisions and generates new imprints for all Soft Chips on the farm- a poor man's Cloud Orchestrated Model.  The pigeon- like postal workers - carry community "mail" and distributes it.  Data logs from soft chip  grids, collected through the region are sent to another SMS or WhatsApp account to collectively provide actionable intelligence available to  digital and human subscribers - operating at a Globally relevant scale.  Thus two messaging accounts, an intermittently connected device and store-and-forward pigeons support dense sensor grids relevant to food supply, climate preparedness, asset tracking etc. 


Cloud Orchestration Models and Benefits. (A recap)


Fig.8 Left: Apps on receiver phones/drones Prune, Tag and Bundle Chirps for the Cloud.
Fig.9 Right: Cloud Orchestration Model for application aware networking and work flow scheduling More

Cloud->Edge thinking drives a new look at Global Scale Edge Connectivity:

Shifting radio intelligence to the receiver and cloud is functionally equivalent to CSMA/CA and DCF for minimal power Edge. Human driven RF chatter required smarts in phones operating in congested, dynamic RF. This drove BLE devices to use MAC based protocols that phones understood. In military environments RF patterns were learnt, predicted and drove schedules & channels. Incumbent Edge Based processing for Collision avoidance is inherently inefficient see Backoff for reasons why. In contrast Cloud driven collision avoidance has processing power for all devices under its care. For more please see  Evolutionary Networks.  

Radio Agnostic: Chirp protocols are primitive - all radios support serial modems. Chirp versions of Apples' Airtag may run on existing radios. The Chirp is tagged by the carrier pigeons and the imprinting approach is vendor neutral. Apple and Amazon networks may use existing radios, now Chirp aware. Radio not supported by either family of devices can be USB attached - a simple fix. The networks are now extended for both.  

MAC-Less Protocols are light. Chirp packets use topic based addressing - a byte suffices to distinguish 255 distinct chirp species operating at the same time and RF channels. Compare to IP headers of 40+ bytes.  

Imprinting. Chirp products are imprinted – establishing provenance to “Mother”. On power up chirp devices first scan/listen for “Mother” on private channels and cryptic protocols. Receiver radios on phones or drones respond and imprint the devices. If RF interference occurs, the cloud directs them to other channels or schedules - teaches them new tricks.  Imprints provide an end-to-end trusted system.

Establishing provenance of sourced materials - which tree in which forest - has to come from imprinted tags that follow the tree from the forest to the lumber yard and onwards to Home Depot. Provenance chains kick in when the tree is first felled - with re-usable RFID++ tags and then fans into all her finished goods.

Deployment Costs Plummet. The cost of Dual Band radio is $20. 433 MHz Wireless modems are 10 cents. MAC based radios use 45 bytes to transport a 4 byte data packet. Chirpers do it in 5 bytes with one byte for ID tagging. And  CSMA/CA are inefficient compared to scheduled broadcasts. Coin batteries can now last decades.

Cloud managed Scheduling Logistics. Control systems need timely inputs from the field – this is back scheduled from when carrier pigeons arrive, the size of the data logs to be stored etc. The entire data logistics supply chain is visible and used to imprints both sensors and pigeons. The Enterprise tunes it to avoid RF interference by changing channels and schedules.

Discovery. Digital version of Bird Call registries will empower discovery of hidden corroborating intelligence. Symbiotic signaling - as in Nature - is currently lost. More.

Standards. Nature's Massive IoT grew organically, managing collision domains in time and region by evolved differentiated "tunes". The Chirp protocol does not need standards bodies - for these reasons.

Security. Chirp protocols are receiver oriented. Cloud driven scheduling provides dynamic collision avoidance in both time and RF channels. Thus both the USB powered receiver radio pigeon unit and the chirpers have to know both when, where or how to chirp- both being imprinted by trusted hosted PaaS.  

Swarm Intelligence was one objective in Small Dumb Cheap and Copious. Copiously spread Soft Chips – like aerial crop dusting - will drive new efficiencies in addressing climate, food management, regulatory concerns, mobile asset tracking, all requiring trusted Edge Sensors and globally dense ground coverage.

Global Relevance. Chirp NetworksTM are device level authenticated. They are logically contiguous - over previously walled garden boundaries. Thus Chirps picked up by a receiver Apple Phone (with USB Modem) is propagated via Amazon trucks - because these devices have been opted in by federated hosted services. 


Summary and Conclusion.

The rapidly accelerating confluence of  Distributed AI  with Software Defined Networking (SDN) prompted Cloud Orchestration Models. Chirp networks coalesce to be logically contiguous across walled gardens. Cheap, Copious, Global Scale Connectivity then drives new - currently impractical - efficiencies. Soft Chips is a "natural" alternative to key challenges in remote edge asset management. Bio Slides.

1. Today: Radios with BLE, Zigbee, Lora  => Fractured Markets and Silos   ==  Not Massive versus
2. Chirp: Modems with Imprinted Pigeons  => Contiguous Clouds and Pub/Sub  (e.g. SMS, AWS.. ) ==  Massive and Trusted.

 
Addendum: Our Robotics and Supervised Autonomy Focus

Meshdynamics' founder Francis previously started Advanced Cybernetics Group.  ACG was contracted by the US Air Force and NIST to work on Supervised Autonomy for remote robots (telerobotics). When it became apparent that last mile connectivity had its challenges, Meshdynamics was formed to develop robust real-time connectivity solutions for semi-autonomous military machines.

In 2002, SPAWAR and USAF funded a multi-year NRE contract for us to develop a distributed, fault-tolerant device/protocol agnostic mesh control layer for use on edge military gear that included stealth “sensor dust”. 

Taking cues from Nature, our work began with tree-based control networks then moved to ants (mobility), pollen (broadcast storms for propagation) and finally birds (Chirp and Chirp protocols).   This journey is driven by  overlapping interests in Edge and Cloud.

1982-2002 Robots > +Sensors > +Tele-robotics > +Supervised Autonomy (Critics)
2002-2012 Time Sensitive Networks for remote machines (scalable mesh networks, Disruption Tolerance, Stealth)
2012-2022 Re-thinking the Internet of things, Proving Cloud Orchestration models


Addendum: Introduction, “Rethinking the Internet of Things”, Intel Press, 2013.

I didn’t set out to develop a new architecture for the Internet of Things (IoT). Rather, I was thinking about the implications of control and scheduling within machine social networks in the context of Metcalfe’s Law. The coming tsunami of machine-to-machine interconnections could yield tremendous flows of information – and knowledge.

Once we free machine social networks (comprised of sensors and other devices) from the drag of human interaction, there is tremendous potential for creating autonomous communities of machines that require occasional interaction or reporting to humans.

The conventional wisdom is that the expansive address space of IPv6 solves the IoT problem of myriad end devices. But the host-to-host assumptions fossilized into the IP protocol in the 1970s fundamentally limited its utility for the very edge of the IoT network.

As the Internet of Things expands exponentially over the coming years, it will be expected to connect to devices that are cheaper, dumber, and more diverse. Traditional networking thinking will fail for multiple reasons.

First, although IPv6 provides an address for these devices, the largest population of these appliances, sensors, and actuators will lack the horsepower in terms of processors, memory, and bandwidth to run the bloated IP protocol stack. It simply does not make financial sense to burden a simple sensor with the protocol overhead needed for host-to-host communications.

Second, the conventional implementation of IP protocols implies networking knowledge on the part of device manufacturers: without centrally authorized MAC IDs and end-to-end management, IP falls flat. Many of the hundreds of thousands of manufacturers, building moisture sensors, streetlights lack the expertise to implement legacy network technology in traditional ways.

Third, the data needs of the IoT are completely different from the global Internet. Most of the communications will be terse machine-to-machine interchanges that are largely asymmetrical, with much more data flowing in one direction (sensor to server, for example) than in the other. And in most cases, losing an individual message to an intermittent or noisy connection will be no big deal. Unlike the traditional Internet, which is primarily human-oriented (and thus averse to data loss), much of the Internet of Things traffic will be analyzed over time, not acted upon immediately. Most of the end devices will be essentially autonomous, operating independently whether anyone is “listening” or not.

Fourth, when there are real-time sensing and response loops needed in the Internet of Things, traditional network architectures with their round-trip control loops will be problematic. Instead, a way would be needed to engender independent local control loops managing the “business” of appliances, sensors, and actuators while still permitting occasional “advise and consent” communications with central servers.

Finally, and most importantly, traditional IP peer-to-peer relationships lock out much of the potential richness of the Internet of Things. There will be vast streams of data flowing, many of which are unknown or unplanned. Only a publish/subscribe architecture allows us to tap into this knowledge by discovering interesting data flows and relationships. And only a publish/subscribe network can scale to the tremendous size of the coming Internet of Things.

The only systems on earth that have ever scaled to the size and scope of the Internet things are natural systems: pollen distribution, ant colonies, redwoods, and so on.

From examining these natural systems, I developed the three-tiered IoT architecture described in this book: simple end devices; networking specialist propagator nodes, and information-seeking integrator functions.

In these pages, I’ll explain why terse, self-classified messages, networking overhead isolated to a specialized tier of devices, and publish subscribe relationships formed are the only way to fully distill the power of the coming Internet of Things.

Francis daCosta LinkedIn
Santa Clara, California, 2013