XMPP Tactical Chat Don McGregor (mcgredo at nps.edu)

Slides:



Advertisements
Similar presentations
웹 서비스 개요.
Advertisements

Implementing Tableau Server in an Enterprise Environment
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
IETF in the Browser Harald Alvestrand. The Purpose of the IETF The goal of the IETF is to make the Internet work better. The mission of the IETF is to.
Encrypting Wireless Data with VPN Techniques
GT 4 Security Goals & Plans Sam Meder
Jabber and Extensible Messaging and Presence Protocol (XMPP) Presenter: Michael Smith Cisc 856 Dec. 6, 2005.
Reza hooshangi ( ). short history  One of the last major challenges for the web is to enable human communication via voice and video: Real Time.
AUV Workbench: Integrated 3D for Interoperable Mission Rehearsal, Reality and Replay Jeffrey Weekley Naval Postgraduate School, Monterey, CA USA
INTRANET MAIL SERVER (DESIGN OF SMTP and POP3)
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Developers: Alexey Rastvortsev, Ilya Kolchinsky Supervisors: Roy Friedman, Alex Kogan.
CONFUSED? DON’T BE. IT’S ACTUALLY REALLY STRAIGHTFORWARD. RICK FREEMAN FEBRUARY 4, 2015 The HSPC Tier 1 & Tier 2 Technical Specification Explained.
P2P (Peer To Peer) Used: when applications need to communicate between devices. Examples: – Interactive game of checkers – Instant Messaging P2P can be.
Oracle Beehive Vivek Pavle Orabyte LLC Orabyte.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
Title put our names here. General Problem Statement Ability to give customized information to a user based on the user’s current location, the current.
XMPP (eXtensible Messaging and Presence Protocol ) Reporter : Allen.
Design & Development Tools: Visual Studio 2005 SQL Server 2005 Biztalk Server 2006 David Gristwood, Mike Taulty Developer & Platform Group Microsoft Ltd.
POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements.
Interoperability and API Open, standards based architecture Bruno Van Haetsdaele Chief Architect.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
The Voice Security Company Kirk Vaughan Product Director –VoIP SIP Application Security.
Introduction to Skype A. Name -. Applies to Skype for home and small business accounts.
UC Security with Microsoft Office Communication Server R1/R2 FRHACK Sept 8, 2009 Abhijeet Hatekar Vulnerability Research Engineer.
XMPP Extensible Messaging and Presence Protocol. Chat In the beginning there was instant messaging and chat. Lots of binary standards: Unix talk, IRC,
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Honeypot and Intrusion Detection System
XMPP – Extensible Messaging and Presence Protocol Vidya Satyanarayanan.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Mark J. Salamango Chief Pervasive Architect USA TACOM Tel: Fax: Pervasive Computing: Why did the logistics.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Open-DIS Open Source Distributed Interactive Simulation Protocol in C++ and Java Don McGregor (mcgredo nps.edu)
1 Don Brutzman Naval Postgraduate School (NPS) Modeling, Virtual Environments & Simulation (MOVES) Institute Naval Postgraduate School 8 June 2006 NPS.
1 Welcome to CSC 301 Web Programming Charles Frank.
Accada – Open Source EPC Network Prototyping Platform Christian Floerkemeier Christof Roduner SAP October 2006.
Web Client-Server Server Client Hypertext link TCP port 80.
SOA-based Collaborative Authoring Andrew Roczniak Multimedia Research Lab University of Ottawa.
Introduction to 學校:大同大學 班級: GI1 學號: 姓名:李奕銳 教師:葉慶隆 Jabber 1.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
Integrating Discussion Baseline-- increasing baseline based on what we see in the experiments with a focus on not leaving behind the coalitions Interoperability-
Efficient XML Interchange High Performance XML Don McGregor (mcgredo (at) nps.edu) Don Brutzman (brutzman (at) nps.edu)
Plug-in for Singleton Service in Clustered environment and improving failure detection methodology Advisor:By: Dr. Chung-E-WangSrinivasa c Kodali Department.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
ROVER TECHNOLOGY PRESENTED BY Gaurav Dhuppar Final Year I.T. GUIDED BY Ms. Kavita Bhatt Lecturer I.T.
Test Enabled and Training Architecture (TENA) Don McGregor Research Associate MOVES Institute
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
Presentation Title 1 1/27/2016 Lucent Technologies - Proprietary Voice Interface On Wireless Applications Protocol A PDA Implementation Sherif Abdou Qiru.
Message Store CORE SYSTEMS MANAGEMENT AND AVAILABILITY INTEGRATION – COPPERPOINT.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
ZIMBRA ROADMAP. Contains proprietary and confidential information owned by Synacor, Inc. © / 2015 Synacor, Inc. Deliver an advanced, feature rich collaboration.
What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Kerberos is a three-headed dog Available as open source or in supported.
WebSphere Diego Leone.
Principles of Network Applications
Client-Server Computing
Reactive Android Development
Reactive Android Development
Web Services Interoperability Organization
Requirements and Approach
Information Retrieval and Web Design
Requirements and Approach
Presentation transcript:

XMPP Tactical Chat Don McGregor (mcgredo at nps.edu) Don Brutzman (brutzman at nps.edu)

Military Chat Chat is used for a lot of things in the military: • Navy bridge to bridge comms • Logistics support • Mission planning In theory it’s not an official command & control link--in reality it is

Military Chat: Standards Chat grew from the bottom up; individual commands and organizations “unofficially” deployed it. This means there was no initial standards or design effort; lots of incompatible chat systems out there There may be other problems: unaudited code, no authentication of users/roles, etc

Military Chat Human factors is huge and unexplored • Often one user monitoring dozens of chat rooms; designated guy to monitor chat • Vigilance task, which humans are notoriously bad at; “sit here and wait for something to happen” • How do we scale to very large numbers of people in a chat room? • The military uses chat for different things than the public; often goal-oriented rather than open-ended • Multi-level security, coalition security, etc.

Military Domain-Specific Chat Right now many chat clients attempt to be general purpose. But why shouldn’t we have different chat applications for different tasks? When working in a 2,000 user chat room, use an application that does that well. When working w/ something that requires vigilance, have an app that alerts you to new data Platoon leader can’t be heads down in a firefight; have an implementation that does voice or audio from a PDA AUV Workbench uses embedded chat

XMPP XMPP has been adopted as the mandatory standard for chat by the DoD IT Standards Registry; no other chat protocol has been approved http://www.xmpp.org/ http://www.igniterealtime.org/ Open standards and open source implementations

XMPP XMPP IDs are very similar to mail addresses smith@xmpp.nps.edu, jones@xmpp.navy.mil, etc The usernames can be tied to existing enterprise LDAP user databases No one grand user database for all of XMPP--each server maintains its own user database

XMPP Server-to-Server XML Comms on TCP 5269 XMPP Server XMPP Server TLS encrypted XML stream on Port TCP 5222 Client Client

XMPP JFCOM has been working on a military, multi-level security XMPP client implementation, Transverse Translation, coalition features, etc

XMPP as Comms Backplane Since XMPP is XML and distributes messages well, why not use this capability to have devices talk to each other? Distributed Interactive Simulation--use XMPP as a data bridge for real-time data JTC--use XMPP as a planning tool, sending maps and drawings across XMPP

XMPP Shared Chatroom Blackboard Device w/ JID XMPP XML-Enabled Communications Backplane Device User

JTC JTC uses XMPP chat rooms as shared blackboards to pass information: • Conventional chat • Specify map regions • Collaborative map modification

XMPP: Conclusions The standard provides a platform on which to build Focus should now shift to using the standard to solve problems DoD should encourage innovation at the application level; it is much too early to standardize or limit XMPP-enabled applications