Distributed Control: Echelons view of the Internet of Things Bob Dolins position paper Fred Bakers presentation.

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Internet Peer-to-Peer Application Infrastructure Darren New Invisible Worlds, Inc.
Akshat Sharma Samarth Shah
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Laboratório de Teleprocessamento e Redes1 Unix Network Programming Prof. Nelson Fonseca
Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.
CCNA – Network Fundamentals
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
The Internet Useful Definitions and Concepts About the Internet.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
An Introduction to Internetworking. Why distributed systems - Share resources (devices & CPU) - Communicate people (by transmitting data)
PPP (Point to Point protocol).  On WAN connection, the protocol depends on the WAN technology and communicating equipment:  Examples:  HDLC –  The.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
PPP (Point to Point Protocol)
Process-to-Process Delivery:
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Chapter 9.
Presentation on Osi & TCP/IP MODEL
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
Service Primitives Six service primitives that provide a simple connection-oriented service 4/23/2017
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Data and Computer Communications Chapter 2 – Protocol Architecture, TCP/IP, and Internet-Based Applications.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
IT 606 Computer Networks (CN). 1.Evolution of Computer Networks & Application Layer. 2.Transport Layer & Network Layer. 3.Routing & Data link Layer. 4.Physical.
Dec 5, 2007NEA Working Group1 NEA Requirement I-D IETF 70 – Vancouver Mahalingam Mani Avaya Inc.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Midterm Review Chapter 1: Introduction Chapter 2: Application Layer
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Mr. Sathish Kumar. M Department of Electronics and Communication Engineering I’ve learned that people will forget what you said, people will forget what.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
Lecture (2).
Zueyong Zhu† and J. William Atwood‡
Transport layer.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Understand Networking Services
Working at a Small-to-Medium Business or ISP – Chapter 7
Client-Server Interaction
Working at a Small-to-Medium Business or ISP – Chapter 7
Congestion Control, Internet transport protocols: udp
Transport Layer Unit 5.
Reliable Multicast Group
Working at a Small-to-Medium Business or ISP – Chapter 7
Process-to-Process Delivery:
Chapter 15 – Part 2 Networks The Internal Operating System
An Introduction to Internetworking
Process-to-Process Delivery: UDP, TCP
Computer Networks Protocols
Computer Networks Protocols
Distributed Systems and Algorithms
Presentation transcript:

Distributed Control: Echelons view of the Internet of Things Bob Dolins position paper Fred Bakers presentation

Distributed control in the Internet of Things Types of real time in communications – Normal Internet communications Moving files, exchanging text, in a static network Human time scales, nobody dies if something is late – Space: Command/Telemetry Constant feedback, occasional configuration changes Remote object time scales, nobody dies if something is late – Distributed Control – machine to machine Continuously changing variables to control the behavior of an application In some applications, people die, or are annoyed, or the purpose is not served if time scales of interest are not observed

Example of distributed control: ANSI/CEA 709.1, EN , GB/Z Bellagio Fountain Numerous control points Sometimes addressed as a group Sometimes addressed individually Paradigm: Central controller sets variables Actions are published as status Status changes published on a node affect the actions of the nodes that are subscribed to the status change NACKs May be appropriate for scaling when moving large amounts of data Positive Acknowledgement Need for commands Retransmission within loss variance

Network stack requirements (assumptions made by application) #1 Retransmission: – Network recovers from packet loss or informs application – Recovery is timely: on the order of RTTs, not seconds Network engineering meets application requirements Network independent of MAC/PHY Scale – Thousands of nodes – Multiple link speeds Multicast – Throughout network – Reliable (positive Ack) Duplicate suppression

Network stack requirements (assumptions made by application) #2 Emergency messages – Routed and/or queued around other traffic – Other traffic slushed as delivered Routine traffic delivered in sequence Separate timers by peer/message Polling of nodes – Sequential – Independent of responses Paradigm supports peer-to-peer – Not everything is client/server

Network stack requirements (assumptions made by application) #3 Capabilities: – Discover nodes – Discover node capabilities – Deliver multi-segment records (files) Exchange of multi- segment records Network and application versioning Simple Publish/Subscribe parsers Security – Strong encryption, – Mutual authentication, – Protection against record/playback attacks – Suite B ciphers