© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 1.

Slides:



Advertisements
Similar presentations
Eclipse, M2M and the Internet of Things
Advertisements

Encrypting Wireless Data with VPN Techniques
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Gateway Agent Product & Architecture
Dexter Team IPv6 in Connection 8.5.
© 2011 Rainforest Automation, Inc.. 2 ● Rainforest introduction ● Product overview: EMU™, RAVEn™ ● Partner solutions ● Prepay solution ● STB opportunity.
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
WSO2 Identity Server Road Map
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—2-1 Ethernet LANs Operating Cisco IOS Software.
Approaches to EJB Replication. Overview J2EE architecture –EJB, components, services Replication –Clustering, container, application Conclusions –Advantages.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Smart Services April 28, 2008 Ammar Rayes, Ph.D. Sr. Manager Cisco.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
The Architecture of Transaction Processing Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Cisco VOIP & Unified Communications ICTF 2008.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 ANNOUNCING Command Lookup Tool 2.0 Something new is happening!
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
RoA and SoA Integration for Message Brokers Group Name: WG2-ARC Source: ALU Meeting Date: Agenda Item:
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING Fifth International Symposium July, 2006, Patras, Greece Security in Wireless Networks:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
Mark J. Salamango Chief Pervasive Architect USA TACOM Tel: Fax: Pervasive Computing: Why did the logistics.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
A Comparative Study of Signaling Protocols for Data Management and Synchronization # Department of Computer Engineering, Kocaeli University.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Cisco Discovery Protocol. CDP and Router Boot Up When a Cisco device boots up, CDP starts up automatically and allows the device to detect neighbor devices.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
SOA-21: Integrating SAP and Other Packaged Applications into your SOA Infrastructure Wayne Lockhart Sr. Product Manager.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
ICT Strategy Intelligent Highways: Endpoint Adapters.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Sept, 2015 How to Choose Collection Options for Smart Net Total Care.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Kemal Baykal Rasim Ismayilov
How to Deploy and Configure the Smart Net Total Care CSPC Collector
CU-Boulder Timothy X Brown Interdisciplinary Telecommunications Electrical and Computer Engineering University of Colorado Presented to L3 Comcept at the.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
© 2002 ConnecTerra, Inc. ConnecTerra Confidential/Proprietary.
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
April, 2016 How to Choose Collection Options for Smart Net Total Care.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
WEB SERVICES.
Chapter 8: Monitoring the Network
Remedy Integration Strategy Leverage the power of the industry’s leading service management solution via open APIs February 2018.
Presentation transcript:

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 1

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Machine to Machine connectivity Over the Internet Proposal October 6, 2010 Ammar Rayes Cisco Systems

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 3 Machine to Machine Connectivity Over the Internet Proposal Overview  Interface mechanism for communication between remote entities (devices/networks at the customer site, the network vendor backend system, and/or a managing partner backend system) via the Internet.  Meant to be used in conjunction with other mechanism to realize overall, end-to-end connectivity e.g. – A backend application might contact an embedded client at the network/customer site via a chain of transports consisting of a LAN at the backend, XMPP messaging via the internet (this proposal) and another LAN between GW and devices at the customer site – Backend application and embedded client might communicate via a JAVA Message Service (JMS) or Enterprise Service Bus (ESB).

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 4 Machine to Machine Connectivity Over the Internet Overview Internet Service Appliance (optional) TAC Support IT infra App servers Network Vendor Vendor’s Partner Network 1 Managed by Partner Service Appliance (optional) Collects configuration,syslogand inventory,.. from all devices Backhauls to backend for analysis (periodic or on-demand) S/W updates,.. Message based commands, Remote access,.. Network 2 Managed by Vendor

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 5 Machine to Machine Connectivity Over the Internet Overview Internet Service Appliance (optional) TAC Support IT infra App servers Network Vendor Vendor’s Partner Network 1 Managed by Partner Service Appliance (optional) Collects configuration,syslogand inventory,.. from all devices Backhauls to backend for analysis (periodic or on-demand) S/W updates,.. Message based commands, Remote access,.. Network 2 Managed by Vendor

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 6 Machine to Machine Connectivity Over the Internet Overview Internet Service Appliance (optional) TAC Support IT infra App servers Network Vendor Vendor’s Partner Network 1 Managed by Partner Service Appliance (optional) Network 2 Managed by Vendor Connectivity CSO endpoints

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 7 Supported Devices/Networks  Direct interface to ad device  Small Networks: – Up to 10+ devices – One device support service appliance functions  Medium Networks: – Up to 100+ devices – Small External appliance  Medium Networks: – Up to 100+ devices – Large External appliance Small Enterprise Service Appliance Service Appliance

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 8 Entities Used by the Proposed Solution  Vendor Site: Backend servers for operation support and business support applications, transport gateways  Partner Site: Service appliances, transport gateways and application processing servers.  Customer/Network Site: Service appliances, transport gateways, end devices

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 9 Modes of Transport  The connectivity supports two modes of transport: – Messaging based on the Extensible Messaging and Presence Protocol (XMPP). Control, data and signaling are conveyed via XMPP stanzas. – Secure, layer 3 point to point tunnels that are set up between connectivity endpoints using XMPP as the signaling mechanism.  The Protocol Adaptation function (not an integral part of the connectivity), allows endpoints to adapt their communication protocols (e.g. SOAP, syslog, SNMP etc.) to one of the transports supported connectivity. An endpoint might use XMPP for one communication protocol and layer 3 tunneling for another.  Several XMPP protocol adaptations are defined as standard XMPP extension protocols (XEPs). Other extensions can be defined as needed.  On booting, connectivity instances authenticate themselves to an XMPP server. This is followed by authentication, registration and any necessary contract validation with the back end

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 10 Logical Overview Connectivity in partner infra, appliance or TG Partner end functions (Inv, Monitoring, etc.) Customer end functions (e.g. Discovery, Collection, Monitoring, etc.) LAN API Partner Connectivity in backend server, connectivity, or TG Protocol Adaption (e.g. SOAP to XMPP, ESB to L3 tunnel) Back-office end functions (Inv, Monitoring.) LAN API Vendor Backend Connectivity in customer device, appliance or TG Protocol Adaption (e.g. SOAP to XMPP, ESB to L3 tunnel) Customer end functions (e.g. Discovery, Collection, Monitoring, etc.) LAN API Customer Network LAN API XMPP Server Control, signaling & Data XMPP servers could be located in the “cloud”, vendor backend, and partner sites XMPP-Signaled PTP L3 Tunnel

© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialNetwork-level Smart Services 11 Gateways APIs  Head-end and tail-end gateway exist on vendor backend and network/customer appliance respectively.  The main advantage of gateways being used on both end-points is that, that the gateways shield the aggregator and collector APIs from the connectivity CSO’s API.  Using the JMS (Java message service) mediation between: Head-end  aggregator instance and Tail-end  collector instance, the collector and aggregator APIs remain indifferent to any changes in the connectivity CSO’s API.