1 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015 Where are the opportunities for ICN in Sensor Networks?

Slides:



Advertisements
Similar presentations
Phil Buonadonna, Jason Hill CS-268, Spring 2000 MOTE Active Messages Communication Architectures for Networked Mini-Devices Networked sub-devicesActive.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
MMT (Multi Meshed Tree) Protocols for Cognitive Airborne Networks Nirmala Shenoy Lab for Wireless Networking and Security Rochester Institute of Technology.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—8-1 MPLS TE Overview Introducing the TE Concept.
IPv6 at NCAR 8/28/2002. Overview What is IPv6? What’s wrong with IPv4? Features of IPv6 IPv6 will soon be available at NCAR How to use IPv6.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v2.2—4-1 MPLS VPN Technology Introducing VPNs.
© 2007 Cisco Systems, Inc. All rights reserved. Valašské Meziříčí Connecting to the Network.
Group #1: Protocols for Wireless Mobile Environments.
IPv4 and IPv6 Mobility Support Using MPLS and MP-BGP draft-berzin-malis-mpls-mobility-00 Oleg Berzin, Andy Malis {oleg.berzin,
IPv6: The Next Generation Internet Dipen Chauhan.
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Inside the Internet. INTERNET ARCHITECTURE The Internet system consists of a number of interconnected packet networks supporting communication among host.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 4: Frame Mode MPLS Implementation.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
Lecture Week 7 Implementing IP Addressing Services.
6LoWPAN Overview, Assumptions, Problem Statement & Goals (draft-kushalnagar-lowpan-goals-assumptions-00) Nandu Kushalnagar & Gabriel Montenegro.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Impact of the Internet of Things on Computer Networks James Byars December 12, 2013 IT422 – Computer Networks Professor Tim Johnson.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Cisco Certified Network Associate CCNA Access the WAN Asst.Prof. It-arun.
Control Over WirelessHART Network S. Han, X. Zhu, Al Mok University of Texas at Austin M. Nixon, T. Blevins, D. Chen Emerson Process Management.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Common Devices Used In Computer Networks
1Presentation_ID Spring VON 2001 Session G Wireless: Future of VoIP 4G: The End of the Intelligent Network Dana blair
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Implementing IP Addressing Services Accessing the WAN – Chapter 7.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Connecting to the Network Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Message-Based Communications for Pipeline SCADA Stephen Koenig, P.E. Smarter Infrastructure for Oil and Gas December 3, 2013 Houston, TX source:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
6LoWPAN (Introduction, Problem Statement & Goals) Nandakishore Kushalnagar Intel Corporation.
Technology Training that Works Setting Up, Understanding & Troubleshooting of Industrial Ethernet & Automation Networks.
Chapter 5: Implementing Intrusion Prevention
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy.
William Anderson, Interim Branch Manager California Emergency Communications Branch September 5, Next Generation (NG9-1-1) In California.
1 Events that Took Place... Exposure to interesting applications and their requirements (buildings, fountains, theatre,...) Discussion about radically.
William Stallings Data and Computer Communications
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
BY SANTHOSH G. What is Networking Network Requirements What is Topology Types of Topologies.
6lowpan Working Group 62 nd IETF, Minneapolis WG Chair: Geoff Mulligan, Invensys Mailing List:
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
An Application of VoIP and MPLS Advisor: Dr. Kevin Ryan
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-01 presented by Adeel Malik IRTF ICNRG Interim ICNRG meeting, Paris.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 10 Routing Fundamentals and Subnets.
Chapter 3: Network Protocols and Communications
How to Sell: Errol Hayward, Marketing Manager January 2015 Cisco CCNA Collaboration and CCNP Collaboration Training.
Introduction to Networks v5.1 Chapter 6: Network Layer.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
IEEE l2r  Project: IEEE Layer 2 Routing Interest Group  Submission Title: Mesh Under Routing in a 15.4e/6LoWPAN Stack  Date.
Slide #1IETF 71 – Roll WG – March 2008 Routing Requirements for Urban Sensor Networks draft-dohler-r2ln-routing-reqs-00.txt M. Dohler G. Madhusudan G.
Seminar On AppleTalk.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Bluetooth Based Smart Sensor Network
Presentation transcript:

1 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015 Where are the opportunities for ICN in Sensor Networks? Ralph Droms, Distinguished Engineer Cisco,

2 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  Intuitively, data objects are a match for the requirements of applications using sensor networks, as opposed to communication endpoints and sessions  The characteristics of sensors and related network technologies may not match the requirements of IP very well  ICN architecture is feasible for sensor networks; where are the specific advantages in implementation, deployment, operation and application support?  If ICN is going to have an impact in the sensor network space, it has to do something better than current technologies. Why is ICN for Sensor Networks interesting?

3 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  There are many standards required for an IPv6 wireless mesh stack. Does ICN require fewer resources (CPU, memory, energy) for a stack/application implementation? Are there opportunities to take advantage of specific characteristics of the MAC/PHY transport to optimize the ICN application/stack? Opportunities in Wireless Mesh Networking

4 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  Routing IP in a mesh network requires mesh establishment, ongoing route management and other overhead. Can ICN name-based routing and object forwarding reduce overhead by using on-demand or geoloc routing?  There is overhead is associated with address assignment and management. Can ICN reduce overhead by using named objects rather than host addresses? Routing and Addressing

5 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  The IP model requires session security, access controls and other security features in a constrained device. Can ICN reduce or refactor operational overhead by using purely object security? Object Security… Application

6 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  Before ICN replaces IP, there will have to be a gateway function somewhere between ICN sensor networks and IP networks Can a “secure object” architecture bridge the gap? Application Layer Application Repo IP networkICN network

7 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  …or, more generally, a push model for data object delivery  Not directly related to “what can ICN do better”, but some way is needed to address applications that currently don’t fit the Interest/Object message paradigm Is there an ICN solution for “push” model that is an improvement over the existing IP models? Designing for Actuators

8 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015 Backup…

9 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015  Constrained devices  Limited computing resources  Automated provisioning  Sleeping devices  Constrained networks  Limited bandwidth  Dynamic network topology  Tend to generate time series of data, with various scheduling models  Periodic  Exception  Polling Sensor Network characteristics