Survey on ID code schemes for NID applications and services NID-WG, the 9 th CJK meeting, April 2009 Noboru Koshizuka Tetsuo.

Slides:



Advertisements
Similar presentations
IPv6 View video on IPv6 compared to IPv4 SHMU.
Advertisements

Some random thoughts of IPv6 Marcial White University of Advancing Technology.
RFIDs and the Future Logistic System Dr. Hayden So Department of Electrical and Electronic Engineering 17 Sep, 2008.
Distributed Computing. Spring 2002Computer Networks Applications Networking Master-slave: A large, central computer controls small I/O devices Peer-to-peer.
“The Meat of BE1010” OS & Applications OS Communication with Applications and the User Applications System Software File Size Binary Application Software.
Data Model Examples USER SPECIFICATIONS.
Barcoding in the supply chain
Geolocation with ColdFusion Oğuz Demirkapı CTO | NicheClick Media.
Week 3 - IP addressing 4 Introduction to IP addressing 4 Classes of IP addressing 4 Why Subnet Masks are necessary? 4 How to create subnet masks.
4: Addressing Working At A Small-to-Medium Business or ISP.
Chap 10 Routing and Addressing Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
Dedupe, Merge and Purge Tyler Bell & The Art of Normalization.
Naming & Addressing ENUM, EPC, WINC overview JaeYoung Choi
Information Technology Networked Computer Systems –Linking individual computers to create an organizational network for communication and information.
Cyber-Identity for organisations – Unique identification of business entities Adrian Mueller Dr. Otto Mueller Consulting 11 April 2008.
Clifford Poulard Team C – Cliff Po
Users Guide. Connect to RFID System Assure connection to local WiFi node Attempt to connect to Internet. If connection cannot be achieved have IT department.
Proposal for OID-based M2M Node ID Group Name: WG2 Architecture at TP#8 (Miyazaki, December 2013) Source: Yong-Suk Park, KETI, Meeting.
NID Expert Group Activities in ASTAP Jun Seob Lee Hyoung Jun Kim ETRI, Korea.
1 CJK9, Zhangjiajie, China NID-related activities in ITU-T Document number Zhangjiajia, China 8-10 April 2009 Hyoung Jun KIM, Jun Seob LEE
Mathieu AUBERT Emilie POCCIOLI Pierre SCHAMBACHER.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
CENG 490/510 Network Programming Russell Deaton Rm
Chapter 4 Objectives Upon completion you will be able to: Classful Internet Addressing Understand IPv4 addresses and classes Identify the class of an.
The status of OID policy in Korea 李昇宰 (Yi, Seung-Jai) TTA.
Networks Computer Technology Day 17. Network  Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
© Cengage Learning 2014 How IP Addresses Get Assigned A MAC address is embedded on a network adapter at a factory IP addresses are assigned manually or.
1 Chapter 2 Technology Applications in Purchasing.
Proposal of ID Resolution Protocol Standard for Multimedia Information Access Services Triggered by Tag-Based Identification Noboru Koshizuka and Youichi.
CJK Standards Collaboration - Brief overview of CJK NID WG HyoungJun Kim Telecommunications Technology Association.
Team 9 - myRoom Software Design Considerations. Team 9 - myRoom Customizable control system Interfaces with household appliances –Light –TV –DVD player.
When Supply Chain meets Care Delivery: Background on GS1 and HL7 Ulrike Kreysa Director Healthcare, GS1 Global Office.
1 CJK9, Zhangjiajie, China NID OID allocation status and registration process Document number Zhangjiajia, China 8-10 April 2009 JungJung Na
Cisco – Chapter 10 - Routers IP Addressing Subnetmasking.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Planning the Addressing Structure
Discussions on Heterogeneous Identification Service
OID for Global ID system
1st Draft for Defining IoT (1)
DNS Server is…? 2CP – C Lee Kyu Don.
IPV4.
Jun Seob Lee Rapporteur of ASTAP NID EG TTA
Objective: Classful Internet Addressing
De-anonymizing the Internet Using Unreliable IDs
Yong-Woon KIM HyoungJun KIM TTA
Created By Kamila Zhakupova
28 May ~ 2 June, 2006 HyoungJun KIM TTA/ETRI
Protocols 1 Key Revision Points.
What you will need to Register
Planning the Addressing Structure
Planning the Addressing Structure
5 × 7 = × 7 = 70 9 × 7 = CONNECTIONS IN 7 × TABLE
5 × 8 = 40 4 × 8 = 32 9 × 8 = CONNECTIONS IN 8 × TABLE
28 May ~ 2 June, 2006 Hyoungjun KIM TTA/ETRI
4 × 6 = 24 8 × 6 = 48 7 × 6 = CONNECTIONS IN 6 × TABLE
5 × 6 = 30 2 × 6 = 12 7 × 6 = CONNECTIONS IN 6 × TABLE
Delivering the Data.
N-ID Definition Proposal
10 × 8 = 80 5 × 8 = 40 6 × 8 = CONNECTIONS IN 8 × TABLE MULTIPLICATION.
3 × 12 = 36 6 × 12 = 72 7 × 12 = CONNECTIONS IN 12 × TABLE
Lecture 8 Exercise 8 1. Describe similarities and differences between a network bridge and Internet router. 2. Describe similarities and differences between.
5 × 12 = × 12 = × 12 = CONNECTIONS IN 12 × TABLE MULTIPLICATION.
5 × 9 = 45 6 × 9 = 54 7 × 9 = CONNECTIONS IN 9 × TABLE
Chapter 15 - IP: Software To Create A Virtual Network
3 × 7 = 21 6 × 7 = 42 7 × 7 = CONNECTIONS IN 7 × TABLE
Presentation transcript:

Survey on ID code schemes for NID applications and services NID-WG, the 9 th CJK meeting, April 2009 Noboru Koshizuka Tetsuo Kamina TTC tel: /fax:

2 Purpose To investigate which ID schemes satisfy the requirements presented in F Comments from France Telecom at the last SG16 meeting ID requirements from F ID001: Identifier is recommended to be used by different applications - ID002: Identifier is required to be assigned for real-world entities such as physical/logical objects, persons, and places - ID003: Identifiers is required to be issuable by any organizations such as business companies, non-profit organizations, governments and individual users - ID004: Identifier is required to be globally unique so that the multimedia information access triggered by the identifier is to be globally available - ID005: Multiple identifier schemes are required to be supported

3 ID schemes for supply chain management (1) DescriptionID00 1 ID00 2 ID00 3 ID00 4 EPCID numbers used in supply chain management. It is difficult for individuals to issue new numbers. ×○ △ ○ JAN codeID numbers used in supply chain management in Japan. It is difficult for individuals to issue new numbers. ×○ △ ○ UPC codeID numbers used in supply chain management in US. It is difficult for individuals to issue new numbers. ×○ △ ○ Global Location Number (GLN) Business code mainly used for EDI. 13 digits decimal number. ×○×○

4 ID schemes for supply chain management (2) DescriptionID00 1 ID00 2 ID00 3 ID00 4 ISO 15418Application Identifier that is used for identifying the kind of following data. ×××○ ISO 15424Data carrier identifier that is used for detecting data carrier by the reader. ×××○ ISO 15459ID for products that RF tag is attached. Mainly used in supply chain management. ×○ △ ○ ISO 15963Standard numbering system for RFID. Issued by RFID makers. ○○×○

5 Miscellaneous ID schemes (1) ID schemeDescriptionID00 1 ID00 2 ID00 3 ID00 4 ISO 6709Standard representation of latitude, longitude and altitude ×○×○ Zip codeA kind of place identifier (PI). Assured to be unique only inside the country. ×○×× E.164Recommendation for telephone numbering. ×××○ Residents identification number Identifying citizens. Generally assigned by the government. ×○×○

6 Miscellaneous ID schemes (2) DescriptionID00 1 ID00 2 ID00 3 ID00 4 ISBN/ISSNInternational standards for numbering books or publications. ×○×○ DOIIdentifier for digital objects such as papers, figures, and tables. Mainly used in online journals. ×○×○ IPv6 address Numbering scheme for identifying devices connected to the IPv6 network. ○×○○ MAC address Identifying physical objects connected to the networks. ×○×○ Open IDUsed as a login name across the Internet. A person may possess multiple ID numbers. ×○××

7 General purpose ID schemes DescriptionID00 1 ID00 2 ID00 3 ID00 4 GUID(UUID)Pseudo random number used in software as identifier. Not assured to be unique number. ○○○× OIDNumeric string that is used to uniquely identify an object. ○○×○ URIIdentifying resources on the Internet. No predefined method for issuing is proposed. ○○○× xCodeAn ID scheme managed by Korea. It can be assigned for everything that we want to identify. ○○○○ ucodeAn ID scheme managed by Ubiquitous ID Center. It can be assigned for everything that we want to identify. ○○○○