Intel Confidential — Do Not Forward Look Inside. ™ Intel-Samsung Conference Call – 2014/09/10 Topic 1: Device Description & Discovery Resource 1.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
TU/e Service Discovery Mechanisms: two case studies / IC2002 Service Discovery Mechanisms: Two case studies Control point Device UPnP Terminal Domain Host.
Hypertext Transfer PROTOCOL ----HTTP Sen Wang CSE5232 Network Programming.
IPV6. Features of IPv6 New header format Large address space More efficient routing IPsec header support required Simple automatic configuration New protocol.
Semantic Web Introduction
DHCP Dynamic Host Configuration Part 7 NVCC Professional Development TCP/IP.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CGI Programming: Part 1. What is CGI? CGI = Common Gateway Interface Provides a standardized way for web browsers to: –Call programs on a server. –Pass.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 8: Network Load Balancing (NLB)
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
5.1 Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
oneM2M-OIC Interworking Technical Comparison
USING PERL FOR CGI PROGRAMMING
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Chapter 8: Virtual LAN (VLAN)
IoTivity.
Local IPv6 Networking March 2000 Adelaide IETF Bob Hinden / Nokia.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 7 Internet Protocol (IP) Routing.
SNOWTAM Trial: REST Interface. AIXM XML Developers' Seminar 2 Contents Digital-SNOWTAM Trial Introduction REST Introduction REST in the Digital-SNOWTAM.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
SNOWTAM Trial: REST Interface. AIXM XML Developers' Seminar 2 Contents Digital-SNOWTAM Trial Introduction REST Introduction REST in the Digital-SNOWTAM.
DHCP Options for Configuring Tenant Identifier and Multicast Addresses in Overlay Networks Behcet Sarikaya Frank Xia.
Lab 11 Overview Windows Server Last Labs Lab 12  Cisco Firewall.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
RESTful Web Services What is RESTful?
OIC INTERWORKING Resource mapping
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Redmond Protocols Plugfest 2016 Andrew Davidoff Mail, Calendar, and Contacts Graph API Demonstration Senior Software Engineer.
Lab 11 Overview Windows Server Last Labs wk14
Virtual Local Area Networks In Security By Mark Reed.
Ahoy: A Proximity-Based Discovery Protocol Robbert Haarman.
4.01 How Web Pages Work.
Chapter 9 Introduction To Data-Link Layer 9.# 1
Dynamic Host Configuration Protocol
Chapter 5 Network and Transport Layers
Application layer Lecture 7.
Instructor Materials Chapter 5 Providing Network Services
IPv6 Addressing Overview IPv6 increases the number of address bits by a factor of 4, from 32 to 128, providing a very large number of addressable.
Virtual Local Area Networks or VLANs
Module 8: Networking Services
Content from Python Docs.
Implementing TCP/IP.
IMPLEMENTING NAME RESOLUTION USING DNS
Chapter 10: DHCP Routing & Switching Chapter 10: DHCP
Introduction to Networking
Net 323 D: Networks Protocols
IIS.
WEB API.
Network Services Interface
Application layer Lecture 7.
5.2 FLAT NAMING.
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
Bina Ramamurthy Chapter 9
COMPUTER NETWORKS PRESENTATION
Week 05 Node.js Week 05
4.01 How Web Pages Work.
Uniform Resource Locators (URLs)
Chengyu Sun California State University, Los Angeles
IPv6 Addresses Hwajung Lee Key Reference:
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Intel Confidential — Do Not Forward Look Inside. ™ Intel-Samsung Conference Call – 2014/09/10 Topic 1: Device Description & Discovery Resource 1

Intel Confidential — Do Not Forward Overview The device description resource is a virtual resource that provides a representation that that contains information about the device. Problem Statement The device description resource addresses two issues: It provides a standard mechanism to query well-known device meta-data including but not limited to device id, name, description, etc. (All-Seen’s About Feature) The framework already provides discovery service allowing a client to find resources that are currently on the network. However, as a resource-based query mechanism, the mechanism finds all resources or resources that have specific interfaces. It does not provide a mechanism to find devices based on specific device-level attributes. 2 Overview and Problem Statement

Intel Confidential — Do Not Forward Server offers the description resource at “/oc/core/d” GET allows querying the resource with or without a filter PUT, POST, DELETE are not currently supported GET request can be sent directly (unicast) or to all nodes (multicast) GET returns a complete representation or empty representation (if filtered) 3 Basic Operation

Intel Confidential — Do Not Forward Representation is in JSON A number of standard attributes are defined Currently, all attributes are optional 4 Representation

Intel Confidential — Do Not Forward The following standard attributes have been defined: 5 Standard Attributes NameTagDescription Device Namedn Human friendly name For example, “Bob’s Thermostat” Host Namehn Fully qualified (domain segmented) hostname For example, “thermostat1.home.com” IP AddressipIP address Device IDdiUnique identifier for device (UUID) Content TypectDefault content type – this is a hint to see if client supports this content type VersionicvVersion of the OIC server Manufacturer Name mnmnName of manufacturer (not to exceed 16 characters) Manufacturer Details Link (URL) mnmlURL to manufacturer (not to exceed 32 characters) Model NumbermnmoModel number as designated by manufacturer Date of Manufacturemndt Platform VersionmnpvVersion of platform – string (defined by manufacturer) Firmware versionmnfv Support URLmnslURL that points to support information from manufacturer

Intel Confidential — Do Not Forward Simple Temperature Sensor at { “dn” : “Outdoor Temperature”, “di” : “3c3e4483-c8eb-4870-ab8c dcfc64”, “mnmn” : “Sensors Emporium” } Simple Humidity Sensor at { “dn” : “Outdoor Humidity”, “di” : “83f3f101-8c09-4ad1-8cb5-bfab83c618e6”, “mnmn” : “Sensors Emporium” } 6 Sample Representations

Intel Confidential — Do Not Forward Request (Unicast) GET // /oc/core/d Response (Unicast) { “dn” : “Outdoor Temperature”, “di” : “3c3e4483-c8eb-4870-ab8c dcfc64”, “mnmn” : “Sensors Emporium” } 7 Direct Query Example

Intel Confidential — Do Not Forward Request (Multicast) GET // /oc/core/d?di=83f3f101-8c09-4ad1-8cb5-bfab83c618e6” Response from (Unicast) No response as “di” attribute does not match Response from (Unicast) { “dn” : “Outdoor Humidity”, “di” : “83f3f101-8c09-4ad1-8cb5-bfab83c618e6”, “mnmn” : “Sensors Emporium” } 8 Discovery Using Device Description Resource