SlideShare a Scribd company logo
1 of 32
vision for an IoT open protocol


      [ bicocca, 12th february 2009 ]




                                        roberto ostinelli
                                        roberto@widetag.com
<1>
vision for a IoT protocol
Questions?
IoT protocol | vision [1/5]
1. independant from media access




                                    [...]



                                      images: WikiPedia
IoT protocol | vision [2/5]
2. support for self configuring & dynamic p2p network
(eg. MANET - mesh networks)




                                               images: WikiPedia
IoT protocol | vision [3/5]
3. service discovery [what & how]




    sensor
                              display
                                                     light source




                                                                [...]
             moveable parts             microphone

                                                                    images: WikiPedia
IoT protocol | vision [4/5]
4. device discovery [where, relative positioning]




       device discovery

                               ex: multi screen displays




                               images: WikiPedia (left) and http://cunning.sharp.fm (right)
IoT protocol | vision [5/5]
5. communication [message, presence, commands,
encryption, signature,...]


                                               ad hoc commands


                                 -----BEGIN RSA PRIVATE KEY-----
                                 MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5
                                 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo
                                 AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH
                                 +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn
                                 Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/
                                 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew
                                 ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs
                                 FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb
                                 weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG
                                 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U=
                                 -----END RSA PRIVATE KEY-----
   just like instant messaging
                                           encryption & digital signature

                                                                                     images: WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                  example

                            software applications that implement a        HTTP, SMTP, SNMP, FTP,
7     application
                                 communicating component                Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application        XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                          AFP,...
                            controls the dialogues/connections          TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers             X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                         TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the         ethernet, wireless, token ring,
2   [network interface]              physical layer                       PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                          electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                               source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                   example

                           interacts with software applications that       HTTP, SMTP, SNMP, FTP,
7     application
                           implement a communicating component           Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application         XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                           AFP,...
                            controls the dialogues/connections           TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers              X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                          TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the          ethernet, wireless, token ring,
2   [network interface]              physical layer                        PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                           electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                                source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite [2/2]
#      layer                       purpose                               example



                   interacts with software applications that     HTTP, SMTP, SNMP, FTP,
4   application
                   implement a communicating component         Telnet, DNS, NNTP, XMPP, ...


                    reliability (was the packet received?),
3   transport                                                  TCP, UDP, RTP, SCTP, ATP, ...
                   ordering (correct sequence of packets)


                   getting packets across networks, from        IP (IPv4, IPv6), ICMP, IGMP,
2    internet
                        source to destination (routing)                    IPsec, ...


                                                                ARP, RARP, tunnels, media
                  physical characteristics of communication
1      link                                                     access control (ethernet,
                             [signal strength,...]
                                                                DSL, ISDN,...), drivers, ...

                                                                                 source: WikiPedia
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
Internet of Things
</1>
<2>
OpenSpime
Intro | what is OpenSpime [1/3]




addresses only IoT protocol wish list #5:
          communication
    [message, presence, commands, encryption, signature,...]


      this is just a beginning!
the IoT has far more implications!

      The OpenSpime Protocol is
    a custom XMPP extension
Intro | XMPP Advantages [2/3]



• fully distributed
• unique identity handling
• presence [online status]
• synchronous [event-driven] / asynchronous communication [data-polling]
• one-way [direct messaging] / two-way communications [request-response]
• XMPP servers are well-known robust applications [open source]
• message broadcasting [PubSub]
• XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
Intro | Architecture [3/3]
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.




                        XMPP               Core Protocol     Extensions
                 [message, iq, presence]     [openspime]     [datareporting,
                                                              spimeseek, ...]
Protocol | Core Protocol [2/9]



it’s a container which allows to:


  • encrypt the content sent between two entities (end-to-end encryption)
  • digitally sign the content sent between two entities
  • claim the authority to perform operations in the name of another entity
Protocol | Core Protocol [3/9]


Core Protocol: OpenSpime XML container
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
             ...
    </transport>
</openspime>
Protocol | Core Protocol Extensions [4/9]



these allow:


  • Data Reporting from an entity to another entity
  • SpimeSeek, i.e. the process which allows to seek for entities' data across
  the network

  • Claiming, i.e. the mechanism which authorizes an entity of the
  OpenSpime network to perform trustful operations in the name of
  another entity which has allowed it
Protocol | Core Protocol Extensions [5/9]



Core Protocol Extension: ex: data reporting XML
<data xmlns='openspime:protocol:extension:data' version='0.9'>
    <entry>
        <date>...</date>
        <exposure>...</exposure>
        <lat>...</lat>
        <lon>...</lon>
        <ele unit='{unit-type}'>...</ele>
        <.../>
    </entry>
</data>
Protocol | Example[6/9]


ex: OpenSpime XML message for data reporting
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
        <data xmlns='openspime:protocol:extension:data' version='0.9'>
              <entry>
                   <date>...</date>
                   <exposure>...</exposure>
                   <lat>...</lat>
                   <lon>...</lon>
                   <ele unit='{unit-type}'>...</ele>
                   <.../>
              </entry>
        </data>
    </transport>
</openspime>
Protocol | Core Protocol Extensions [7/9]

data reporting architecture
Protocol | Custom Protocol Extensions [8/9]




the Core Protocol Extensions are just a start, and it is extremely
  easy to build other Custom OpenSpime protocol extensions
              which can be used for specific needs.



 these custom extension would then immediately benefit from
   all the encryption, digital signature and management rights
handling that come with the OpenSpime core protocol, and the
         overall OpenSpime architecture based on XMPP.
Protocol | Advantages [9/9]




• Open Source, Open Protocol [3rd party integration, network extensibility]
• The Core Protocol takes care of encryption, digital signature and
management rights handling

• The Core Protocol Extensions allow already multiple functionalities: Data
Reporting, SpimeSeek, and Claiming

• The protocol can be easily extended with Custom Extensions
Protocol | Support




OpenSpime developer community                   openspime.org




                          pyOpenSpime library
</2>
roberto ostinelli
roberto@widetag.com

More Related Content

What's hot

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูBeauso English
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るsamemoon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingTakuyaFukuoka2
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvementsOSLL
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Researchnathomas82
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceTakuyaFukuoka2
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Networkpauldeng
 
internet applications
 internet applications internet applications
internet applicationsSrinivasa Rao
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersJuniper Networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programmingnpinto
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Andy Piper
 

What's hot (19)

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫る
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet scheduling
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvements
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Research
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address Space
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Network
 
internet applications
 internet applications internet applications
internet applications
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement
 
Hkpark apan030828
Hkpark apan030828Hkpark apan030828
Hkpark apan030828
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 

Viewers also liked

Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 

Viewers also liked (7)

Iot
IotIot
Iot
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Polandirenazd
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..amphaiboon
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack monad bobo
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amiePanduga Kumar
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime (20)

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
OSI TCP-IP.pptx
OSI TCP-IP.pptxOSI TCP-IP.pptx
OSI TCP-IP.pptx
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack
 
CCNA
CCNACCNA
CCNA
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amie
 
ipbasics.ppt
ipbasics.pptipbasics.ppt
ipbasics.ppt
 
MoteChat
MoteChatMoteChat
MoteChat
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Internet Of Things: Vision, Prerequisites and OpenSpime

  • 1. vision for an IoT open protocol [ bicocca, 12th february 2009 ] roberto ostinelli roberto@widetag.com
  • 2. <1> vision for a IoT protocol
  • 4. IoT protocol | vision [1/5] 1. independant from media access [...] images: WikiPedia
  • 5. IoT protocol | vision [2/5] 2. support for self configuring & dynamic p2p network (eg. MANET - mesh networks) images: WikiPedia
  • 6. IoT protocol | vision [3/5] 3. service discovery [what & how] sensor display light source [...] moveable parts microphone images: WikiPedia
  • 7. IoT protocol | vision [4/5] 4. device discovery [where, relative positioning] device discovery ex: multi screen displays images: WikiPedia (left) and http://cunning.sharp.fm (right)
  • 8. IoT protocol | vision [5/5] 5. communication [message, presence, commands, encryption, signature,...] ad hoc commands -----BEGIN RSA PRIVATE KEY----- MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/ 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U= -----END RSA PRIVATE KEY----- just like instant messaging encryption & digital signature images: WikiPedia
  • 9. Internet Protocol Suite | OSI [1/2] # layer purpose example software applications that implement a HTTP, SMTP, SNMP, FTP, 7 application communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 10. Internet Protocol Suite | OSI [1/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 7 application implement a communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 11. Internet Protocol Suite [2/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 4 application implement a communicating component Telnet, DNS, NNTP, XMPP, ... reliability (was the packet received?), 3 transport TCP, UDP, RTP, SCTP, ATP, ... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 2 internet source to destination (routing) IPsec, ... ARP, RARP, tunnels, media physical characteristics of communication 1 link access control (ethernet, [signal strength,...] DSL, ISDN,...), drivers, ... source: WikiPedia
  • 12. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 13. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 15. </1>
  • 17. Intro | what is OpenSpime [1/3] addresses only IoT protocol wish list #5: communication [message, presence, commands, encryption, signature,...] this is just a beginning! the IoT has far more implications! The OpenSpime Protocol is a custom XMPP extension
  • 18. Intro | XMPP Advantages [2/3] • fully distributed • unique identity handling • presence [online status] • synchronous [event-driven] / asynchronous communication [data-polling] • one-way [direct messaging] / two-way communications [request-response] • XMPP servers are well-known robust applications [open source] • message broadcasting [PubSub] • XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
  • 20. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities.
  • 21. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities. XMPP Core Protocol Extensions [message, iq, presence] [openspime] [datareporting, spimeseek, ...]
  • 22. Protocol | Core Protocol [2/9] it’s a container which allows to: • encrypt the content sent between two entities (end-to-end encryption) • digitally sign the content sent between two entities • claim the authority to perform operations in the name of another entity
  • 23. Protocol | Core Protocol [3/9] Core Protocol: OpenSpime XML container <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> ... </transport> </openspime>
  • 24. Protocol | Core Protocol Extensions [4/9] these allow: • Data Reporting from an entity to another entity • SpimeSeek, i.e. the process which allows to seek for entities' data across the network • Claiming, i.e. the mechanism which authorizes an entity of the OpenSpime network to perform trustful operations in the name of another entity which has allowed it
  • 25. Protocol | Core Protocol Extensions [5/9] Core Protocol Extension: ex: data reporting XML <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data>
  • 26. Protocol | Example[6/9] ex: OpenSpime XML message for data reporting <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data> </transport> </openspime>
  • 27. Protocol | Core Protocol Extensions [7/9] data reporting architecture
  • 28. Protocol | Custom Protocol Extensions [8/9] the Core Protocol Extensions are just a start, and it is extremely easy to build other Custom OpenSpime protocol extensions which can be used for specific needs. these custom extension would then immediately benefit from all the encryption, digital signature and management rights handling that come with the OpenSpime core protocol, and the overall OpenSpime architecture based on XMPP.
  • 29. Protocol | Advantages [9/9] • Open Source, Open Protocol [3rd party integration, network extensibility] • The Core Protocol takes care of encryption, digital signature and management rights handling • The Core Protocol Extensions allow already multiple functionalities: Data Reporting, SpimeSeek, and Claiming • The protocol can be easily extended with Custom Extensions
  • 30. Protocol | Support OpenSpime developer community openspime.org pyOpenSpime library
  • 31. </2>

Editor's Notes

  1. internet of things: things on the internet?
  2. 2 cars exchanging traffic info: hw access does not exist yet
  3. why should you always pass through a server?
  4. games