Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

Mitigate Unauthorized Tracking in RFID Discovery Service Qiang Yan 1, Robert H. Deng 1, Zheng Yan 2, Yingjiu Li 1, Tieyan Li 3 1 Singapore Management University,
Carrier/Infrastructure ENUM Requirements draft-lind-infrastructure-enum-reqs-01.
Domain Name System. DNS is a client/server protocol which provides Name to IP Address Resolution.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
A Dynamic Binary Hash Scheme for IPv6 Lookup Q. Sun 1, X. Huang 1, X. Zhou 1, and Y. Ma 1,2 1. School of Computer Science and Technology 2. Beijing Key.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ENUM Chris Wong Converging Services Branch International Training Program 7 September 2006.
Grid Computing, B. Wilkinson, 20043a.1 WEB SERVICES Introduction.
11 October HTML: Links and Forms. Agenda News: William Knight Review of HTML Pages Meeting sheet passed HTML Links Networking and the Internet HTML Forms.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
DOMAIN NAME SYSTEM. Introduction  There are several applications that follow client server paradigm.  The client/server programs can be divided into.
Domain Name System ( DNS )  DNS is the system that provides name to address mapping for the internet.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
DNS.
Omniran ZigBee SEP2 Smart Grid Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Introduction to Object Identifiers (OIDs) France Telecom Orange Olivier Dubuisson 15 June 2009.
Locating objects identified by DDI3 Uniform Resource Names Part of Session: Concurrent B2: Reports and Updates on DDI activities 2nd Annual European DDI.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Name Resolution Domain Name System.
Naming & Addressing ENUM, EPC, WINC overview JaeYoung Choi
Objectives  Basic Introduction to DNS  Purpose of Domain Naming  DNS Features: Global Distribution  Fully Qualified Domain Name  DNS Lookup Types.
Module 2: Implementing DNS to Support Active Directory
DNS and Basic Resources Service Terence Zhang. Outline The Nature of the IOT Our Research in Basic Resources Services The Basic Resources Service for.
Enabling Embedded Systems to access Internet Resources.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
DHCPv6 Redundancy Considerations Redundancy Proposals in RFC 6853.
The status of OID system in Korea 李昇宰 (Yi, Seung-Jai) TTA.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
1 Kyung Hee University Chapter 18 Domain Name System.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
The status of OID policy in Korea 李昇宰 (Yi, Seung-Jai) TTA.
Interoperable marine monitoring systems Toma Daniel Mihai Technical University of Catalonia Mentor: Tom O’Reilly MBARI 2010.
Configuring Name Resolution and Additional Services Lesson 12.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Doc.: IEEE /0040r1 Submission May 2011 Miika Laaksonen, NokiaSlide 1 Coexistence Discovery Procedures Notice: This document has been prepared.
N-ID Kong Ning CNNIC CCSA Feb. 21, 2008.
RFID ODS(Object Directory Service) 金鍾表 (Kim, Jong-Pyo) TTA.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 19 Domain Name System (DNS)
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Linux Operations and Administration
Introduction to Active Directory
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
1 CMPT 471 Networking II DNS © Janice Regan,
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
TCP/IP Protocol Suite 1 Chapter 17 Upon completion you will be able to: Domain Name System: DNS Understand how the DNS is organized Know the domains in.
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China.
Broadband Application and Service Optimization: Mobile Edge Computing (MEC) and Fog Computing Phone No.: +1 (214)
1 Introduction to ENUM Technical and operational aspects Marco Bernardi NeuStar, Inc
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Domain Name System The Technology Context Presentation.
Security in Internet of Things Begins with the Data
Gijeong Kim ,Junho Kim ,Sungwon Lee Kyunghee University
Chapter 25 Domain Name System.
Discussions on Heterogeneous Identification Service
Benefits of Using Domain Name System (DNS)
Net 323 D: Networks Protocols
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing

Outline Introduction Related Work The Properties of the RA-IOT The Model of the RA-IOT The Universal Resource Addressing System Experiments Conclusion References

Introduction Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders [1]. The internet reports 2005 "The Internet of Things (IOT)" of the International Telecommunication Union takes a look at the next step in "always on" communications, in which new technologies like RFID and smart computing promise a world of networked and interconnected devices.

Introduction The IOT has the similar requirement of the resource addressing as the Internet. The properties of the IOT make the differences between the Resource Addressing in the IOT (RA-IOT) and that in the Internet. There are multiple Product Code Standards (PCSs) in the IOT, and they will cause the conflict of the resource addressing.

Introduction In this paper, we present a new model supporting any PCS for the RA-IOT, and develop a Universal Resource Addressing System (URAS) based on the model. By testing the performance, the URAS can effectively resolve the above problem.

Related Work EPCglobal puts forward the Object Name Service (ONS) [4], which makes use of the Domain Name System (DNS) protocol [5] to realize the RA-IOT. The main design idea is to first encode the Electronic Product Code (EPC) into a Fully Qualified Domain Name (FQDN), then to use the existing DNS infrastructure to query for additional information. This procedure makes use of the Name Authority Pointer (NAPTR) DNS record [6], which is also used by E.164 NUmber Mapping (ENUM) [7]. The ONS can only support the EPC standard.

Related Work Ubiquitous ID Center (uID Center) brings forward the analogous resource addressing service named uCode Resolution Protocol (uCodeRP) [8], which also utilizes the protocol similar to DNS. The uCodeRP can also support only one uCode standard. Existing technologies of the RA-IOT can only support single PCS. So far, there is no proper model or system for the RA-IOT to support multiple PCSs.

The properties of the RA-IOT The resource name, the resource address and the mechanism of resource addressing are the three key components of the resource addressing. We summarize the properties of the RA-IOT by analyzing the three key components.

The properties of the RA-IOT Definition 1: The Inexplicability property (I-property) refers to the structure of the resource name cannot be accurately acquired by the corresponding Resource Addressing System (RAS). Definition 2: The Apprehensibility property (A- property) refers to the structure of the resource name can be accurately acquired by the corresponding RAS. Definition 3: The Decentralization property (D- property) refers to the structure of the resource name is not unified in terms of the namespace of the RAS.

The properties of the RA-IOT Definition 4: The Unity property (U-property) refers to the structure of the resource name is unified in terms of the namespace of the RAS. Definition 5: The NRAI refers to the information used to transform the I-property into the A-property. Definition 6: The ERAI refers to the information used to transform the D-property into the U-property. The mechanism of the RA-IOT should provide not only the Function of the Resource Addressing (FRA), but also the Function of the Resource Transformation (FRT) of the ORN into the CRN.

The Model of the RA-IOT Based on the properties of the RA- IOT, we put forward the General Layered Model (GLM) of the RA-IOT based on the Layered Iteration Model (LIM) [9] of that in the Internet. The GLM in the IOT contains several Resource Addressing Layers (RALs).

The Model of the RA-IOT We define the resource name and the resource address of the N th RAL in the Internet as R N and D N. (1) (2) We define the FRA of the N th RAL in the Internet as AS N. (3) Then the LIM in the Internet can be represented by the following expression. (4)

The Model of the RA-IOT We define the ORN, the CRN and the resource address of the N th RAL in the IOT as O N, C N and D N. (5) (6) (7) We define the FRT of the ORN into the CRN of the N th RAL in the IOT as TS N. (8) (9) (10)

The Model of the RA-IOT We define the FRA of the Nth RAL in the IOT as AS N. (11) Then the GLM in the IOT can be represented by the following expression. (12)

The Model of the RA-IOT Theorem: The GLM in the IOT is the extended model of the LIM in the Internet, and the LIM in the Internet is the specific model of the GLM in the IOT. We prove the theorem 1 as follows. We firstly assume the OK has the A-property and the U-property, so it can be directly used as the input of the RAS (K). Then the DK-1 is empty. We further assume every ORN in the RAL lower than the RAL (K) is empty. (13) (14)

The Model of the RA-IOT (15) (16) (17) (18) (19)

The Model of the RA-IOT (20) (21) (22) Then we make the process of the deduction from the GLM in the IOT to the LIM in the Internet. By the similar way, we can make the process of the deduction from the LIM in the Internet to the GLM in the IOT. Then theorem is proved. The GLM in the IOT shows the rule of the RA-IOT, and can support us to develop the appropriate RAS in the IOT.

The universal resource addressing system In order to enable the URAS to support any PCS, we must uniquely identify every PCS. We define the Identifier of PCS (IPCS) as follows. Definition 7: The IPCS refers to the unique identifier for each PCS. The Object Identifier (OID) [10] is one kind of the IPCS. ISO/IEC uses it to identify all of the PCSs except EPC standard. If the IPCS can identify each type of every PCS, we name this kind of IPCS as the Fine-grained IPCS (F-IPCS); otherwise we named it as the coarse-grained IPCS (C-IPCS).

The universal resource addressing system The descriptive mechanism for RAI In order to enable the RAI of the URAS can be automatically used by the FRT, we design the Descriptive Mechanism for RAI (DM4RAI) based on the regular expressions. The ERAI can be expressed as follows. (31) (32) We design three Descriptive Mechanisms for the NRAI (DM4NRAI): the Simple DM4NRAI (S-DM4NRAI), the Centralized DM4NRAI (C-DM4NRAI) and the Distributed DM4NRAI (D-DM4NRAI).

The universal resource addressing system The S-DM4NRAI. The S-DM4NRAI is applicable to the F-IPCS. The S- DM4NRAI only needs one expression to describe its corresponding NRAI. It can be expressed as follows. (33)

The universal resource addressing system The C-DM4NRAI. The C-DM4NRAI is applicable to the C-IPCS. The C- DM4NRAI needs several expressions to describe its corresponding NRAI. One of them can be expressed as follows. (34)

The universal resource addressing system The D-DM4NRAI. The D-DM4NRAI is also applicable to the C-IPCS. The D-DM4NRAI firstly needs one expression to fetch the class field from the product code. (35)

The universal resource addressing system We design the architecture of the URAS which enables the three DM4NRAI as follows. Figure. The architecture of the URAS in the IOT

Experiments we evaluate the performance of URAS with the three DM4NRAI. The following experiments were conducted on a Pentium IV 2.4GHZ computer with 512MB main memory running Linux EL and BIND as the server, and a Pentium D 3.4GHZ computer with 1G main memory running Windows Vista as the client. All algorithms were implemented in Java by using Sun’s JDK version 6. The datasets used were generated randomly, containing 5000, 10000, 50000, and mRFID Codes.

Experiments The result of the experiments is given as follows. The unit of time in the data is second. Sum Type 5,00010,00050,000100,000 S-DM4NRAI C-DM4NRAI D-DM4NRAI Table. The data of the performance test Figure. The performance comparisons for the three DM4NRAI

Conclusion The URAS based on the GLM can support any PCS for the RA-IOT. Actually, the GLM can provide better support for some type of resource addressing in the Internet, such as the ENUM. The GLM can promote new type of resource addressing in the IOT or in the Internet.

References [1] J. Landt, “The history of RFID”, Journal, IEEE Potentials, USA, Oct.-Nov. 2005, pp [2] M. Roberti, “RFID: The cost of being smart”, Online, Sep [3] ITU, The Internet of Things, ITU, Geneva, [4] EPCglobal Inc, Object Name Service (ONS) Version 1.0, EPCglobal, US, Oct [5] P. Albitz and C. Liu, DNS and BIND, 4th ed. O’Reilly & Associates, [6] M. Mealling and R. Daniel, The Naming Authority Pointer (NAPTR) DNS Resource Record, RFC 2915, IETF, September [7] P. Faltstrom, “E.164 number and DNS”, IETF RFC2916, September [8] Koji Minegishi, On ucode Resolution Server Connection Tests, TRONWARE, 2003, V.84, PP [9] Li Xiaodong, Research on Computer Network Resources Naming and Addressing Technologies, Ph D dissertation, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, [10] ISO/IEC. ISO/IEC :2005 Information technology -- Open Systems Interconnection -- Procedures for the operation of OSI Registration Authorities: General procedures and top arcs of the ASN.1 Object Identifier tree

Thank You & Questions