Identity for energy management Bruce Nordman Lawrence Berkeley National Laboratory March 28, 2011 OPSAREA Meeting.

Slides:



Advertisements
Similar presentations
1 Introducing the Specifications of the Metro Ethernet Forum.
Advertisements

Energy, energy flows, energy stores, cycles, and Complex Systems.
What is a People Group?. People Group = Ethno-Linguistic Group People Group = Ethno-Linguistic Group.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
What is a People Group?. People Group = Ethno-Linguistic Group People Group = Ethno-Linguistic Group.
CIM 2465 IP Addressing Scheme1 IP Addressing Scheme (Topic 4) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking Academy.
1 UDDI Jong-Ha Jung 07/28. 2 INDEX INDEX What is UDDI? What is UDDI? Appearance of UDDI Appearance of UDDI Why UDDI? Why UDDI? Analogy with Telephone.
IBM Watson Research © 2004 IBM Corporation BioHaystack: Gateway to the Biological Semantic Web Dennis Quan
University of Michigan Residence Halls Networking In-Room Student Registration System
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
XLink: Open Linking Standard XML / XSL separate  data semantics  presentation semantics Need to also separate out  navigation semantics Single unique.
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
Information systems and databases Database information systems Read the textbook: Chapter 2: Information systems and databases FOR MORE INFO...
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Networking Components
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2007.
Regulatory Affairs Domain
Draft-ietf-eman-energy-aware-mib-01 Energy Management Framework draft-ietf-eman-framework-01 J. Parello, J. Quittek, B. Schoening, B. Claise.
What You Need before You Deploy Master Data Management Presented by Malcolm Chisholm Ph.D. Telephone – Fax
Energy Efficient Digital Networks Rich Brown Lawrence Berkeley National Laboratory Presentation to DOE State Energy Advisory Board Meeting August 14, 2007.
Distributed Computing COEN 317 DC2: Naming, part 1.
Chapter 8: Virtual LAN (VLAN)
Slide 1 Jose Costa-Requena, Raimo Kantola, Nicklas Beijar / MobileMAN Kick-off/ CNR,Pisa MobileMAN kick-off Jose Costa-Requena, Raimo Kantola,
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Creating Business Advantage with IT Chapter 1. Technological Changes The Internet and broadband networks The World Wide Web and high-performance Servers.
Considerations draft-norwin-energy-consider-02 Bruce Nordman (as contributor)
Development of the domain name system Baoning Wu 01/30/2003.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Module 5b: Measuring Household ICT Ms Sheridan Roberts, Consultant Information Society Statistics Tuesday 10 March 2009.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 9: Web Services.
Building a Client Information Management System (CIMS) Pere Ruka – IT Manager MacKillop Family Services.
Implementation Diagrams
Chapter 4  Configuration: Client/Server Components 1 Chapter 4 Overview  Configure client/server components o Network interface card (NIC) o Windows.
Information architecture (basics for app building)
Master Data versus Reference Data
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
DES715 – Database Design Conceptual design. Database Life Cycle Database initial study Database design Implementation Testing Operation Maintenance.
 Introduction  Structure of Management Information  Practical Issues  Summary 2.
Energy Perspectives draft-nordman-eman-energy-perspective-01 Bruce Nordman.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Welcome to Lawrence Berkeley National Laboratory Workshop on Energy Saving Opportunities in Cleanrooms March 15, 1999 Environmental Energy Technologies.
An Overview of Management
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
整合 Wi-Fi 和 WiMAX 之無線網路管理系統 Wireless Network Management System for Wi-Fi and WiMAX Integrated Networks 報告人:李建毅 指導教授:周立德 教授 國立中央大學資工系.
Elements Of Modeling. 1.Data Modeling  Data modeling answers a set of specific questions that are relevant to any data processing application. e.g. ◦
Unit 7: DHCP, APIPA and NTP. Static versus dynamic IP addressing Dynamic IP addresses can change each time you connect to the Internet, while static IP.
IP: Addressing, ARP, Routing
Lec7: SNMP Management Information
Karl Quinn 23rd November 2004 NDS M.Sc.
Instructor Materials Chapter 9: Transport Layer
Improving searches through community clustering of information
Meters in EMAN Bruce Nordman March 28, 2013.
LXI Consortium Presentation Aug 5, 2017
Market Analysis & Social Media Marketing Strategy
Master Data versus Reference Data
Where should services reside in Internet Telephony Systems?
Chapter 1 - Introduction to Computers and the Internet
Communications & Computer Networks Resource Notes - Network Software
Chapter 14: Representing Identity
Protocols 1 Key Revision Points.
Unit 36: Internet Server Management
Module P4 Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled Learning Objectives: Understand the value of data. Understand.
AbbottLink™ - IP Address Overview
Applied Information Technology 2016 Rhys greaney
Presentation transcript:

Identity for energy management Bruce Nordman Lawrence Berkeley National Laboratory March 28, 2011 OPSAREA Meeting

Application Context Energy management systems (buildings) – Gather information from ALL (mains powered) devices on the IP network (and some beyond) Information unrelated to services the device provides – Usually have no other relationship to devices – Mechanisms need to be universal Many buildings will be unmanaged (all partly) – Devices come and go asynchronously First role of EMS is to provide breakdown of how energy is use by different types of devices

Observations Ensure that this data is available from all devices – Some may implement few MIBs other than eman Most identity info is completely static – Human-readable name changed infrequently People may dig into energy data after device is gone from network, or not have access to the network

Identity – what it is “… whatever makes an entity definable and recognizable, in terms of possessing a set of qualities or characteristics that distinguish it from other entities. In layman's terms, identity is whatever makes something the same or different.” (Wikipedia, “Identity (philosophy)”) Element of taxonomy (ontology?) – system of organization – categories – meaning Identity (on network) is self-determined

Identity Needs What – Species: e.g. switch, server, PC, refrigerator, light, … – Origin: e.g. brand X, model Y (URL) Who – Name (human readable) : e.g. “Bruce’s PC”, “Kitchen Light” – Network address/identity: _____________ MAC? What existing MIBs speak to these needs? Need unified view of identity

Network address/identity Purpose – uniquely identify the device in energy management database – Track device when moves to a different subnet What value to reference? What to do for non-IP proxied devices? Set by manufacturer

Name (human readable) Purpose – help user of NMS to know what the device is Should correspond to existing MIB variable(s) that do this Set by user / network manager

Origin Brand (manufacturer), Model, URL Should correspond to existing MIB variable(s) that reference brand, model URL to human-readable page – Machine-readable info would be useful later Set by manufacturer

Species (class?) Purpose – provide basic characterization of type of device – primary function Not intended to be specific or descriptive Not intended to replace any existing mechanisms Assumptions Need IANA registry – (~100 entries ?) Only one species/device Set by manufacturer

Also… I expect identity to be useful in other contexts – Internet of Things – In future, most IP devices will not be traditional (IT-oriented) ones found on network today Also want location (but too early to go there) Discovery – What guidance can we offer for users on how to learn network identity of ALL devices on local network?

Questions What are all relevant existing MIBs? Are there other relevant non-IETF references? What MIBs should identity be part of? Any barriers to doing this? Thank you