SlideShare a Scribd company logo
1 of 32
vision for an IoT open protocol


      [ bicocca, 12th february 2009 ]




                                        roberto ostinelli
                                        roberto@widetag.com
<1>
vision for a IoT protocol
Questions?
IoT protocol | vision [1/5]
1. independant from media access




                                    [...]



                                      images: WikiPedia
IoT protocol | vision [2/5]
2. support for self configuring & dynamic p2p network
(eg. MANET - mesh networks)




                                               images: WikiPedia
IoT protocol | vision [3/5]
3. service discovery [what & how]




    sensor
                              display
                                                     light source




                                                                [...]
             moveable parts             microphone

                                                                    images: WikiPedia
IoT protocol | vision [4/5]
4. device discovery [where, relative positioning]




       device discovery

                               ex: multi screen displays




                               images: WikiPedia (left) and http://cunning.sharp.fm (right)
IoT protocol | vision [5/5]
5. communication [message, presence, commands,
encryption, signature,...]


                                               ad hoc commands


                                 -----BEGIN RSA PRIVATE KEY-----
                                 MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5
                                 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo
                                 AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH
                                 +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn
                                 Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/
                                 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew
                                 ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs
                                 FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb
                                 weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG
                                 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U=
                                 -----END RSA PRIVATE KEY-----
   just like instant messaging
                                           encryption & digital signature

                                                                                     images: WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                  example

                            software applications that implement a        HTTP, SMTP, SNMP, FTP,
7     application
                                 communicating component                Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application        XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                          AFP,...
                            controls the dialogues/connections          TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers             X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                         TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the         ethernet, wireless, token ring,
2   [network interface]              physical layer                       PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                          electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                               source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite | OSI [1/2]
#         layer                            purpose                                   example

                           interacts with software applications that       HTTP, SMTP, SNMP, FTP,
7     application
                           implement a communicating component           Telnet, DNS, NNTP, XMPP,...
                          establishes a context between Application         XML, XDR, ASN.1, SMB,
6    presentation
                                          Layer entities                           AFP,...
                            controls the dialogues/connections           TLS, SSH, ISO 8327 / CCITT
5       session
                               (sessions) between computers              X.225, RPC, NetBIOS, ASP,...
                            reliability (was the packet received?),
4      transport                                                          TCP, UDP, RTP, SCTP, ATP,...
                           ordering (correct sequence of packets)
                           getting packets across networks, from          IP (IPv4, IPv6), ICMP, IGMP,
3      network
                                source to destination (routing)               CLNP, ARP, RARP,...
        data link          how packets are transported over the          ethernet, wireless, token ring,
2   [network interface]              physical layer                        PPP, DSL, ISDN, drivers,...
        physical          physical characteristics of communication
1                                                                           electricity, radio, laser,...
        [hardware]                   [signal strength,...]

                                                                source: http://www.domainsarefree.com & WikiPedia
Internet Protocol Suite [2/2]
#      layer                       purpose                               example



                   interacts with software applications that     HTTP, SMTP, SNMP, FTP,
4   application
                   implement a communicating component         Telnet, DNS, NNTP, XMPP, ...


                    reliability (was the packet received?),
3   transport                                                  TCP, UDP, RTP, SCTP, ATP, ...
                   ordering (correct sequence of packets)


                   getting packets across networks, from        IP (IPv4, IPv6), ICMP, IGMP,
2    internet
                        source to destination (routing)                    IPsec, ...


                                                                ARP, RARP, tunnels, media
                  physical characteristics of communication
1      link                                                     access control (ethernet,
                             [signal strength,...]
                                                                DSL, ISDN,...), drivers, ...

                                                                                 source: WikiPedia
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
IPS & IoT protocol
    IoT wish list                    #    IPS layer



1. media access                      4   application



2. p2p network
                                     3   transport

3. service discovery
                                     2    internet
4. device discovery

5. communication                     1      link
Internet of Things
</1>
<2>
OpenSpime
Intro | what is OpenSpime [1/3]




addresses only IoT protocol wish list #5:
          communication
    [message, presence, commands, encryption, signature,...]


      this is just a beginning!
the IoT has far more implications!

      The OpenSpime Protocol is
    a custom XMPP extension
Intro | XMPP Advantages [2/3]



• fully distributed
• unique identity handling
• presence [online status]
• synchronous [event-driven] / asynchronous communication [data-polling]
• one-way [direct messaging] / two-way communications [request-response]
• XMPP servers are well-known robust applications [open source]
• message broadcasting [PubSub]
• XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
Intro | Architecture [3/3]
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.
Protocol | Overview [1/9]

an XMPP extension, which consists of:


  • the core protocol itself, which is an XML container
  • the core protocol extensions, i.e. a set of extensions which extend the
  core protocol, and are already available to be used for a series of
  functionalities.




                        XMPP               Core Protocol     Extensions
                 [message, iq, presence]     [openspime]     [datareporting,
                                                              spimeseek, ...]
Protocol | Core Protocol [2/9]



it’s a container which allows to:


  • encrypt the content sent between two entities (end-to-end encryption)
  • digitally sign the content sent between two entities
  • claim the authority to perform operations in the name of another entity
Protocol | Core Protocol [3/9]


Core Protocol: OpenSpime XML container
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
             ...
    </transport>
</openspime>
Protocol | Core Protocol Extensions [4/9]



these allow:


  • Data Reporting from an entity to another entity
  • SpimeSeek, i.e. the process which allows to seek for entities' data across
  the network

  • Claiming, i.e. the mechanism which authorizes an entity of the
  OpenSpime network to perform trustful operations in the name of
  another entity which has allowed it
Protocol | Core Protocol Extensions [5/9]



Core Protocol Extension: ex: data reporting XML
<data xmlns='openspime:protocol:extension:data' version='0.9'>
    <entry>
        <date>...</date>
        <exposure>...</exposure>
        <lat>...</lat>
        <lon>...</lon>
        <ele unit='{unit-type}'>...</ele>
        <.../>
    </entry>
</data>
Protocol | Example[6/9]


ex: OpenSpime XML message for data reporting
<openspime xmlns='openspime:protocol:core' version='0.9'>
    <originator cert='{cert-servid}' osid='{originator-osid}'>
        <sign>...</sign>
        <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey>
        <...>
    </originator>
    <transport to='{recipient-osid}' content-type='{content-type}'
        transport-key='{transport-key}'>
        <data xmlns='openspime:protocol:extension:data' version='0.9'>
              <entry>
                   <date>...</date>
                   <exposure>...</exposure>
                   <lat>...</lat>
                   <lon>...</lon>
                   <ele unit='{unit-type}'>...</ele>
                   <.../>
              </entry>
        </data>
    </transport>
</openspime>
Protocol | Core Protocol Extensions [7/9]

data reporting architecture
Protocol | Custom Protocol Extensions [8/9]




the Core Protocol Extensions are just a start, and it is extremely
  easy to build other Custom OpenSpime protocol extensions
              which can be used for specific needs.



 these custom extension would then immediately benefit from
   all the encryption, digital signature and management rights
handling that come with the OpenSpime core protocol, and the
         overall OpenSpime architecture based on XMPP.
Protocol | Advantages [9/9]




• Open Source, Open Protocol [3rd party integration, network extensibility]
• The Core Protocol takes care of encryption, digital signature and
management rights handling

• The Core Protocol Extensions allow already multiple functionalities: Data
Reporting, SpimeSeek, and Claiming

• The protocol can be easily extended with Custom Extensions
Protocol | Support




OpenSpime developer community                   openspime.org




                          pyOpenSpime library
</2>
roberto ostinelli
roberto@widetag.com

More Related Content

What's hot

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูBeauso English
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るsamemoon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1amphaiboon
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingTakuyaFukuoka2
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvementsOSLL
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Researchnathomas82
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)mashiur
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceTakuyaFukuoka2
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Networkpauldeng
 
internet applications
 internet applications internet applications
internet applicationsSrinivasa Rao
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersJuniper Networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programmingnpinto
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Andy Piper
 

What's hot (19)

เทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครูเทคโนโลยีสารสนเทศสำหรับครู
เทคโนโลยีสารสนเทศสำหรับครู
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫る
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1งานPowerpoint ลูกศร1
งานPowerpoint ลูกศร1
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet scheduling
 
OLPC Mesh networking improvements
OLPC Mesh networking improvementsOLPC Mesh networking improvements
OLPC Mesh networking improvements
 
Web Dev Research
Web Dev ResearchWeb Dev Research
Web Dev Research
 
Moushumi Maria (071464056)
Moushumi Maria (071464056)Moushumi Maria (071464056)
Moushumi Maria (071464056)
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address Space
 
Anonymous Network
Anonymous NetworkAnonymous Network
Anonymous Network
 
internet applications
 internet applications internet applications
internet applications
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 RoutersTechnology Overview: Policer Implementation on MX Series, M120, and M320 Routers
Technology Overview: Policer Implementation on MX Series, M120, and M320 Routers
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming[Harvard CS264] 05 - Advanced-level CUDA Programming
[Harvard CS264] 05 - Advanced-level CUDA Programming
 
Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement Condroid WSN/DTN Gateway - System Architecture & Requirement
Condroid WSN/DTN Gateway - System Architecture & Requirement
 
Hkpark apan030828
Hkpark apan030828Hkpark apan030828
Hkpark apan030828
 
Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)Lightweight Messaging (Apache Retreat Hursley 2010)
Lightweight Messaging (Apache Retreat Hursley 2010)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 

Viewers also liked

Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGSRamana Reddy
 

Viewers also liked (7)

Iot
IotIot
Iot
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Polandirenazd
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..amphaiboon
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questionszahadath
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1ahmady
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack monad bobo
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture designEnterpriseGRC Solutions, Inc.
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amiePanduga Kumar
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUICFarzad Soltani
 

Similar to Internet Of Things: Vision, Prerequisites and OpenSpime (20)

"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland"Internet Protocol Suite" prepared by Szymon M. from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
 
OSI TCP-IP.pptx
OSI TCP-IP.pptxOSI TCP-IP.pptx
OSI TCP-IP.pptx
 
งานนำเสนอ..
งานนำเสนอ..งานนำเสนอ..
งานนำเสนอ..
 
Networking interview questions
Networking interview questionsNetworking interview questions
Networking interview questions
 
Ccent notes part 1
Ccent notes part 1Ccent notes part 1
Ccent notes part 1
 
subnet.pptx
subnet.pptxsubnet.pptx
subnet.pptx
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack
 
CCNA
CCNACCNA
CCNA
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Computing and informatics class notes for amie
Computing and informatics class notes for amieComputing and informatics class notes for amie
Computing and informatics class notes for amie
 
ipbasics.ppt
ipbasics.pptipbasics.ppt
ipbasics.ppt
 
MoteChat
MoteChatMoteChat
MoteChat
 
Multi Process Message Formats
Multi Process Message FormatsMulti Process Message Formats
Multi Process Message Formats
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
Introduction to OSI and QUIC
Introduction to OSI and QUICIntroduction to OSI and QUIC
Introduction to OSI and QUIC
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Internet Of Things: Vision, Prerequisites and OpenSpime

  • 1. vision for an IoT open protocol [ bicocca, 12th february 2009 ] roberto ostinelli roberto@widetag.com
  • 2. <1> vision for a IoT protocol
  • 4. IoT protocol | vision [1/5] 1. independant from media access [...] images: WikiPedia
  • 5. IoT protocol | vision [2/5] 2. support for self configuring & dynamic p2p network (eg. MANET - mesh networks) images: WikiPedia
  • 6. IoT protocol | vision [3/5] 3. service discovery [what & how] sensor display light source [...] moveable parts microphone images: WikiPedia
  • 7. IoT protocol | vision [4/5] 4. device discovery [where, relative positioning] device discovery ex: multi screen displays images: WikiPedia (left) and http://cunning.sharp.fm (right)
  • 8. IoT protocol | vision [5/5] 5. communication [message, presence, commands, encryption, signature,...] ad hoc commands -----BEGIN RSA PRIVATE KEY----- MIIByQIBAAJhAKJ2lzDLZ8XlVambQfMXn3LRGKOD5o6lMIgulclWjZwP56LRqdg5 ZX15bhc/GsvW8xW/R5Sh1NnkJNyL/cqY1a+GzzL47t7EXzVc+nRLWT1kwTvFNGIo AUsFUq+J6+OprwIDAQABAmBOX0UaLdWWusYzNol++nNZ0RLAtr1/LKMX3tk1MkLH +Ug13EzB2RZjjDOWlUOY98yxW9/hX05Uc9V5MPo+q2Lzg8wBtyRLqlORd7pfxYCn Kapi2RPMcR1CxEJdXOkLCFECMQDTO0fzuShRvL8q0m5sitIHlLA/L+0+r9KaSRM/ 3WQrmUpV+fAC3C31XGjhHv2EuAkCMQDE5U2nP2ZWVlSbxOKBqX724amoL7rrkUew ti9TEjfaBndGKF2yYF7/+g53ZowRkfcCME/xOJr58VN17pejSl1T8Icj88wGNHCs FDWGAH4EKNwDSMnfLMG4WMBqd9rzYpkvGQIwLhAHDq2CX4hq2tZAt1zT2yYH7tTb weiHAQxeHe0RK+x/UuZ2pRhuoSv63mwbMLEZAjAP2vy6Yn+f9SKw2mKuj1zLjEhG 6ppw+nKD50ncnPoP322UMxVNG4Eah0GYJ4DLP0U= -----END RSA PRIVATE KEY----- just like instant messaging encryption & digital signature images: WikiPedia
  • 9. Internet Protocol Suite | OSI [1/2] # layer purpose example software applications that implement a HTTP, SMTP, SNMP, FTP, 7 application communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 10. Internet Protocol Suite | OSI [1/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 7 application implement a communicating component Telnet, DNS, NNTP, XMPP,... establishes a context between Application XML, XDR, ASN.1, SMB, 6 presentation Layer entities AFP,... controls the dialogues/connections TLS, SSH, ISO 8327 / CCITT 5 session (sessions) between computers X.225, RPC, NetBIOS, ASP,... reliability (was the packet received?), 4 transport TCP, UDP, RTP, SCTP, ATP,... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 3 network source to destination (routing) CLNP, ARP, RARP,... data link how packets are transported over the ethernet, wireless, token ring, 2 [network interface] physical layer PPP, DSL, ISDN, drivers,... physical physical characteristics of communication 1 electricity, radio, laser,... [hardware] [signal strength,...] source: http://www.domainsarefree.com & WikiPedia
  • 11. Internet Protocol Suite [2/2] # layer purpose example interacts with software applications that HTTP, SMTP, SNMP, FTP, 4 application implement a communicating component Telnet, DNS, NNTP, XMPP, ... reliability (was the packet received?), 3 transport TCP, UDP, RTP, SCTP, ATP, ... ordering (correct sequence of packets) getting packets across networks, from IP (IPv4, IPv6), ICMP, IGMP, 2 internet source to destination (routing) IPsec, ... ARP, RARP, tunnels, media physical characteristics of communication 1 link access control (ethernet, [signal strength,...] DSL, ISDN,...), drivers, ... source: WikiPedia
  • 12. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 13. IPS & IoT protocol IoT wish list # IPS layer 1. media access 4 application 2. p2p network 3 transport 3. service discovery 2 internet 4. device discovery 5. communication 1 link
  • 15. </1>
  • 17. Intro | what is OpenSpime [1/3] addresses only IoT protocol wish list #5: communication [message, presence, commands, encryption, signature,...] this is just a beginning! the IoT has far more implications! The OpenSpime Protocol is a custom XMPP extension
  • 18. Intro | XMPP Advantages [2/3] • fully distributed • unique identity handling • presence [online status] • synchronous [event-driven] / asynchronous communication [data-polling] • one-way [direct messaging] / two-way communications [request-response] • XMPP servers are well-known robust applications [open source] • message broadcasting [PubSub] • XMPP extensions [file transfer, remote ad-hoc commands, service discovery,…]
  • 20. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities.
  • 21. Protocol | Overview [1/9] an XMPP extension, which consists of: • the core protocol itself, which is an XML container • the core protocol extensions, i.e. a set of extensions which extend the core protocol, and are already available to be used for a series of functionalities. XMPP Core Protocol Extensions [message, iq, presence] [openspime] [datareporting, spimeseek, ...]
  • 22. Protocol | Core Protocol [2/9] it’s a container which allows to: • encrypt the content sent between two entities (end-to-end encryption) • digitally sign the content sent between two entities • claim the authority to perform operations in the name of another entity
  • 23. Protocol | Core Protocol [3/9] Core Protocol: OpenSpime XML container <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> ... </transport> </openspime>
  • 24. Protocol | Core Protocol Extensions [4/9] these allow: • Data Reporting from an entity to another entity • SpimeSeek, i.e. the process which allows to seek for entities' data across the network • Claiming, i.e. the mechanism which authorizes an entity of the OpenSpime network to perform trustful operations in the name of another entity which has allowed it
  • 25. Protocol | Core Protocol Extensions [5/9] Core Protocol Extension: ex: data reporting XML <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data>
  • 26. Protocol | Example[6/9] ex: OpenSpime XML message for data reporting <openspime xmlns='openspime:protocol:core' version='0.9'> <originator cert='{cert-servid}' osid='{originator-osid}'> <sign>...</sign> <claimkey cert='{cert-servid}' claims='{claimed-osid}'>...</claimkey> <...> </originator> <transport to='{recipient-osid}' content-type='{content-type}' transport-key='{transport-key}'> <data xmlns='openspime:protocol:extension:data' version='0.9'> <entry> <date>...</date> <exposure>...</exposure> <lat>...</lat> <lon>...</lon> <ele unit='{unit-type}'>...</ele> <.../> </entry> </data> </transport> </openspime>
  • 27. Protocol | Core Protocol Extensions [7/9] data reporting architecture
  • 28. Protocol | Custom Protocol Extensions [8/9] the Core Protocol Extensions are just a start, and it is extremely easy to build other Custom OpenSpime protocol extensions which can be used for specific needs. these custom extension would then immediately benefit from all the encryption, digital signature and management rights handling that come with the OpenSpime core protocol, and the overall OpenSpime architecture based on XMPP.
  • 29. Protocol | Advantages [9/9] • Open Source, Open Protocol [3rd party integration, network extensibility] • The Core Protocol takes care of encryption, digital signature and management rights handling • The Core Protocol Extensions allow already multiple functionalities: Data Reporting, SpimeSeek, and Claiming • The protocol can be easily extended with Custom Extensions
  • 30. Protocol | Support OpenSpime developer community openspime.org pyOpenSpime library
  • 31. </2>

Editor's Notes

  1. internet of things: things on the internet?
  2. 2 cars exchanging traffic info: hw access does not exist yet
  3. why should you always pass through a server?
  4. games