SlideShare a Scribd company logo
1 of 32
vision for an IoT open protocol


      [ bicocca, 12th february 2009 ]




                                        roberto ostinelli
                                        roberto@widetag.com
<1>
vision for a IoT protocol
Questions?
IoT protocol | vision [1/5]
1. independant from media access




                                    [...]



                                      images: WikiPedia
IoT protocol | vision [2/5]
2. support for self configuring & dynamic p2p network
(eg. MANET - mesh networks)




                                               images: WikiPedia
IoT protocol | vision [3/5]
3. service discovery [what & how]




    sensor
                              display
                                                     light source




                                                                [...]
             moveable parts             microphone

                                                                    images: WikiPedia
IoT protocol | vision [4/5]
4. device discovery [where, relative positioning]




       device discovery

                               ex: multi screen displays




                               images: WikiPedia (left) and http://cunning.sharp.fm (right)
IoT protocol | vision [5/5]
5. communication [message, presence, commands,
encryption, signature,...]


                                               ad hoc commands


                                 -----BEGIN RSA PRIVATE KEY-----
                                 MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5
                                 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo
                                 AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH
                                 +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn
                                 Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/
                                 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew
                                 ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs
                                 FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb
                                 weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG
                                 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U=
                                 -----END RSA PRIVATE KEY-----
   just like instant messaging
                                           encryption & digital signature

                                                                                     images: WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                  example

                            software applications that implement a        HTTP, SMTP, SNMP, FTP,
7     application
                                 communicating component                Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application        XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                          AFP,...
                            controls the dialogues/connections          TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers             X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                         TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the         ethernet, wireless, token ring,
2   [network interface]              physical layer                       PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                          electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                               source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                   example

                           interacts with software applications that       HTTP, SMTP, SNMP, FTP,
7     application
                           implement a communicating component           Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application         XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                           AFP,...
                            controls the dialogues/connections           TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers              X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                          TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the          ethernet, wireless, token ring,
2   [network interface]              physical layer                        PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                           electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                                source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite [2/2]
#      layer                       purpose                               example



                   interacts with software applications that     HTTP, SMTP, SNMP, FTP,
4   application
                   implement a communicating component         Telnet, DNS, NNTP, XMPP, ...


                    reliability (was the packet received?),
3   transport                                                  TCP, UDP, RTP, SCTP, ATP, ...
                   ordering (correct sequence of packets)


                   getting packets across networks, from        IP (IPv4, IPv6), ICMP, IGMP,
2    internet
                        source to destination (routing)                    IPsec, ...


                                                                ARP, RARP, tunnels, media
                  physical characteristics of communication
1      link                                                     access control (ethernet,
                             [signal strength,...]
                                                                DSL, ISDN,...), drivers, ...

                                                                                 source: WikiPedia
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
Internet of Things
</1>
<2>
OpenSpime
Intro | what is OpenSpime [1/3]




addresses only IoT protocol wish list #5:
          communication
    [message, presence, commands, encryption, signature,...]


      this is just a beginning!
the IoT has far more implications!

      The OpenSpime Protocol is
    a custom XMPP extension
Intro | XMPP Advantages [2/3]



• fully distributed
• unique identity handling
• presence [online status]
• synchronous [event-driven] / asynchronous communication [data-polling]
• one-way [direct messaging] / two-way communications [request-response]
• XMPP servers are well-known robust applications [open source]
• message broadcasting [PubSub]
• XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
Intro | Architecture [3/3]
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.




                        XMPP               Core Protocol     Extensions
                 [message, iq, presence]     [openspime]     [datareporting,
                                                              spimeseek, ...]
Protocol | Core Protocol [2/9]



it’s a container which allows to:


  • encrypt the content sent between two entities (end-to-end encryption)
  • digitally sign the content sent between two entities
  • claim the authority to perform operations in the name of another entity
Protocol | Core Protocol [3/9]


Core Protocol: OpenSpime XML container
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
             ...
    </transport>
</openspime>
Protocol | Core Protocol Extensions [4/9]



these allow:


  • Data Reporting from an entity to another entity
  • SpimeSeek, i.e. the process which allows to seek for entities' data across
  the network

  • Claiming, i.e. the mechanism which authorizes an entity of the
  OpenSpime network to perform trustful operations in the name of
  another entity which has allowed it
Protocol | Core Protocol Extensions [5/9]



Core Protocol Extension: ex: data reporting XML
<data xmlns='openspime:protocol:extension:data' version='0.9'>
    <entry>
        <date>...</date>
        <exposure>...</exposure>
        <lat>...</lat>
        <lon>...</lon>
        <ele unit='{unit-type}'>...</ele>
        <.../>
    </entry>
</data>
Protocol | Example[6/9]


ex: OpenSpime XML message for data reporting
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
        <data xmlns='openspime:protocol:extension:data' version='0.9'>
              <entry>
                   <date>...</date>
                   <exposure>...</exposure>
                   <lat>...</lat>
                   <lon>...</lon>
                   <ele unit='{unit-type}'>...</ele>
                   <.../>
              </entry>
        </data>
    </transport>
</openspime>
Protocol | Core Protocol Extensions [7/9]

data reporting architecture
Protocol | Custom Protocol Extensions [8/9]




the Core Protocol Extensions are just a start, and it is extremely
  easy to build other Custom OpenSpime protocol extensions
              which can be used for specific needs.



 these custom extension would then immediately benefit from
   all the encryption, digital signature and management rights
handling that come with the OpenSpime core protocol, and the
         overall OpenSpime architecture based on XMPP.
Protocol | Advantages [9/9]




• Open Source, Open Protocol [3rd party integration, network extensibility]
• The Core Protocol takes care of encryption, digital signature and
management rights handling

• The Core Protocol Extensions allow already multiple functionalities: Data
Reporting, SpimeSeek, and Claiming

• The protocol can be easily extended with Custom Extensions
Protocol | Support




OpenSpime developer community                   openspime.org




                          pyOpenSpime library
</2>
roberto ostinelli
roberto@widetag.com

More Related Content

What's hot

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูBeauso English
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るsamemoon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingTakuyaFukuoka2
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvementsOSLL
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Researchnathomas82
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceTakuyaFukuoka2
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Networkpauldeng
 
internet applications
 internet applications internet applications
internet applicationsSrinivasa Rao
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersJuniper Networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programmingnpinto
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Andy Piper
 

What's hot (19)

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫る
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet scheduling
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvements
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Research
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address Space
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Network
 
internet applications
 internet applications internet applications
internet applications
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement
 
Hkpark apan030828
Hkpark apan030828Hkpark apan030828
Hkpark apan030828
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 

Viewers also liked

Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 

Viewers also liked (7)

Iot
IotIot
Iot
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Polandirenazd
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..amphaiboon
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack monad bobo
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amiePanduga Kumar
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime (20)

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
OSI TCP-IP.pptx
OSI TCP-IP.pptxOSI TCP-IP.pptx
OSI TCP-IP.pptx
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack
 
CCNA
CCNACCNA
CCNA
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amie
 
ipbasics.ppt
ipbasics.pptipbasics.ppt
ipbasics.ppt
 
MoteChat
MoteChatMoteChat
MoteChat
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Internet Of Things: Vision, Prerequisites and OpenSpime

  • 1. vision for an IoT open protocol [ bicocca, 12th february 2009 ] roberto ostinelli roberto@widetag.com
  • 2. <1> vision for a IoT protocol
  • 4. IoT protocol | vision [1/5] 1. independant from media access [...] images: WikiPedia
  • 5. IoT protocol | vision [2/5] 2. support for self configuring & dynamic p2p network (eg. MANET - mesh networks) images: WikiPedia
  • 6. IoT protocol | vision [3/5] 3. service discovery [what & how] sensor display light source [...] moveable parts microphone images: WikiPedia
  • 7. IoT protocol | vision [4/5] 4. device discovery [where, relative positioning] device discovery ex: multi screen displays images: WikiPedia (left) and http://cunning.sharp.fm (right)
  • 8. IoT protocol | vision [5/5] 5. communication [message, presence, commands, encryption, signature,...] ad hoc commands -----BEGIN RSA PRIVATE KEY----- MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/ 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U= -----END RSA PRIVATE KEY----- just like instant messaging encryption & digital signature images: WikiPedia
  • 9. Internet Protocol Suite | OSI [1/2] # layer purpose example software applications that implement a HTTP, SMTP, SNMP, FTP, 7 application communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 10. Internet Protocol Suite | OSI [1/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 7 application implement a communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 11. Internet Protocol Suite [2/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 4 application implement a communicating component Telnet, DNS, NNTP, XMPP, ... reliability (was the packet received?), 3 transport TCP, UDP, RTP, SCTP, ATP, ... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 2 internet source to destination (routing) IPsec, ... ARP, RARP, tunnels, media physical characteristics of communication 1 link access control (ethernet, [signal strength,...] DSL, ISDN,...), drivers, ... source: WikiPedia
  • 12. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 13. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 15. </1>
  • 17. Intro | what is OpenSpime [1/3] addresses only IoT protocol wish list #5: communication [message, presence, commands, encryption, signature,...] this is just a beginning! the IoT has far more implications! The OpenSpime Protocol is a custom XMPP extension
  • 18. Intro | XMPP Advantages [2/3] • fully distributed • unique identity handling • presence [online status] • synchronous [event-driven] / asynchronous communication [data-polling] • one-way [direct messaging] / two-way communications [request-response] • XMPP servers are well-known robust applications [open source] • message broadcasting [PubSub] • XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
  • 20. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities.
  • 21. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities. XMPP Core Protocol Extensions [message, iq, presence] [openspime] [datareporting, spimeseek, ...]
  • 22. Protocol | Core Protocol [2/9] it’s a container which allows to: • encrypt the content sent between two entities (end-to-end encryption) • digitally sign the content sent between two entities • claim the authority to perform operations in the name of another entity
  • 23. Protocol | Core Protocol [3/9] Core Protocol: OpenSpime XML container <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> ... </transport> </openspime>
  • 24. Protocol | Core Protocol Extensions [4/9] these allow: • Data Reporting from an entity to another entity • SpimeSeek, i.e. the process which allows to seek for entities' data across the network • Claiming, i.e. the mechanism which authorizes an entity of the OpenSpime network to perform trustful operations in the name of another entity which has allowed it
  • 25. Protocol | Core Protocol Extensions [5/9] Core Protocol Extension: ex: data reporting XML <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data>
  • 26. Protocol | Example[6/9] ex: OpenSpime XML message for data reporting <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data> </transport> </openspime>
  • 27. Protocol | Core Protocol Extensions [7/9] data reporting architecture
  • 28. Protocol | Custom Protocol Extensions [8/9] the Core Protocol Extensions are just a start, and it is extremely easy to build other Custom OpenSpime protocol extensions which can be used for specific needs. these custom extension would then immediately benefit from all the encryption, digital signature and management rights handling that come with the OpenSpime core protocol, and the overall OpenSpime architecture based on XMPP.
  • 29. Protocol | Advantages [9/9] • Open Source, Open Protocol [3rd party integration, network extensibility] • The Core Protocol takes care of encryption, digital signature and management rights handling • The Core Protocol Extensions allow already multiple functionalities: Data Reporting, SpimeSeek, and Claiming • The protocol can be easily extended with Custom Extensions
  • 30. Protocol | Support OpenSpime developer community openspime.org pyOpenSpime library
  • 31. </2>

Editor's Notes

  1. internet of things: things on the internet?
  2. 2 cars exchanging traffic info: hw access does not exist yet
  3. why should you always pass through a server?
  4. games