© MATERNA GmbH 2012www.materna.com1 MATERNA WS4D-JMEDS Addons Jannis Müthing MATERNA GmbH.

Slides:



Advertisements
Similar presentations
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Enabling Secure Internet Access with ISA Server
Siebel Web Services Siebel Web Services March, From
31242/32549 Advanced Internet Programming Advanced Java Programming
SOAP.
1 Understanding Web Services Presented By: Woodas Lai.
© 2007 Cisco Systems, Inc. All rights reserved. 1 Network Addressing Networking for Home and Small Businesses – Chapter 5.
C# and Windows Programming Application Domains and Remoting.
Firewall Configuration Strategies
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Slide 1 EE557: Server-Side Development Lecturer: David Molloy Room: XG19 Mondays 10am-1pm Notes:
PROGRESS project: Internet-enabled monitoring and control of embedded systems (EES.5413)  Introduction Networked devices make their capabilities known.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Interpret Application Specifications
Definitions, Definitions, Definitions Lead to Understanding.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Universal Plug and Play (UPnP) Presented by: Kamal Kamal Kamal Kamal Mohammad Atieh Mohammad Atieh.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IT 210 The Internet & World Wide Web introduction.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Presented by Robert Zaremba.  Remote messages must be sent to a message queue so that components are decoupled  Both sides of a communication must be.
Chapter 6: Packet Filtering
SDPL 2002Notes 7: Apache Cocoon1 7 XML Web Site Architecture Example: Apache Cocoon, a Web publishing architecture based on XML technology
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Enabling Embedded Systems to access Internet Resources.
Small Devices on DBGlobe System George Samaras Chara Skouteli.
Web Services Description Language CS409 Application Services Even Semester 2007.
Implementing Universal Plug And Play In Smart Objects And Intelligent Appliances Bengt Christensson CTO Axis Communications.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Network Address Translations Project no. : 12 Prof. Edmund Gean Presented by DhruvaPatel( ) Sweta Patel( ) Rushika Patel ( ) Guided.
INMIDIO: an INteroperable MIddleware for service Discovery and service InteractiOn Daniele Sacchetti
© Materna GmbH 2014www.materna.com1 Materna JMEDS Explorer.
© MATERNA GmbH 2012www.materna.com1 MATERNA WS4D-JMEDS and Explorer Bastian Schierbaum MATERNA GmbH.
Getting Started with OPC.NET OPC.NET Software Client Interface Client Base Server Base OPC Wrapper OPC COM Server Server Interface WCF Alternate.
Integrating and Troubleshooting Citrix Access Gateway.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Module 7: Advanced Application and Web Filtering.
TCP/IP (Transmission Control Protocol / Internet Protocol)
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
JS (Java Servlets). Internet evolution [1] The internet Internet started of as a static content dispersal and delivery mechanism, where files residing.
4 m 9K Copyright 2002 Forum 9000, LLC Slide 1 Forum 9000 Quality Systems for Quality Care.
Web Services An Introduction Copyright © Curt Hill.
REST By: Vishwanath Vineet.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Apache Web Server Architecture Chaitanya Kulkarni MSCS rd April /23/20081Apache Web Server Architecture.
CORBA AND SOAP Unmesh Kulkarni i2 Group Ashish V. Tendulkar Directory Database integration group ( Persistent Systems Pvt. Ltd.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
Input for issues resolution Antoine Mensch Odonata 16 july 2009.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Module 3: Enabling Access to Internet Resources
WWW and HTTP King Fahd University of Petroleum & Minerals
WEB SERVICES.
MCA – 405 Elective –I (A) Java Programming & Technology
Implementing TMG Server Publishing
IIS.
Planning the Addressing Structure
AbbottLink™ - IP Address Overview
Presentation transcript:

© MATERNA GmbH 2012www.materna.com1 MATERNA WS4D-JMEDS Addons Jannis Müthing MATERNA GmbH

© MATERNA GmbH 2012www.materna.com2 Contents  Introduction  Efficient XML Interchange (EXI)  Communication Managers:  UPnP and  Bluetooth  Presentation URL  Authorization  DPWS Subnetproxy

© MATERNA GmbH 2012www.materna.com3 Introduction  JMEDS modularity enables:  Staying lightweight  Going beyond DPWS  Extensibility  This presentation:  from improvements of the current (EXI)  over additions (Communication Managers)  to solutions for more specific challenges

© MATERNA GmbH 2012www.materna.com4 Efficient XML Interchange (EXI)  Compression of XML encoded content  Binary representation; similar to a Huffmann encoding  Every DPWS message consists of XML content  Reduction in size leads to  Less congestion of the network  Better performance esp. for low end devices EXI

© MATERNA GmbH 2012www.materna.com5 Efficient XML Interchange (EXI)  Which parts does JEMDS implement?  Schema less  Byte-Alignment (EXI compression)  Schema informed  Bit-Alignment  “EXI Compression” has not been implemented } Performance improvements  Results:  Great!  Byte-Aligned/Schema less EXI better than GZIP  Bit-Aligned/Schema informed EXI performed best  Problematic: Schema informed EXI + dynamically generated schemas

© MATERNA GmbH 2012www.materna.com6 Efficient XML Interchange (EXI)

© MATERNA GmbH 2012www.materna.com7 Communication Managers: UPNP  Differences to DPWS and highlights  Not everything is XML  Discovery relies on HTTP over UDP  Eventing based on variables and per service  Multicast eventing UPNP

© MATERNA GmbH 2012www.materna.com8 Communication Managers: UPNP DPWSUPNP DiscoveryProbe Probe Matches M_SEARCH HTTP OK Bye/HelloNotify Metadata exchangeGet/GetMetadataAccessing resources via HTTP  How to teach a DPWS stack to speak UPNP  Receiving UPNP messages  Translating into an internal representation  Target: hiding underlying technology as best as possible  Users of the API see devices/services not technologies Fig.: Examples of messages that serve similar needs

© MATERNA GmbH 2012www.materna.com9 Communication Managers: Bluetooth  Similar tasks as the UPNP communication manager  Hiding the technology etc.  No eventing at all  Using BlueCove (open source for discoveryhttp://bluecove.org/ Bluetooth

© MATERNA GmbH 2012www.materna.com10 Communication Managers: Bluetooth DPWSBluetooth DiscoveryProbe Probe Matches Inquiry (answered only by configured devices) Inquiry-Response Bye/HelloInquiry (passive) An Inquiry from a device tells other devises about that device ResolveInquiry when answered generating internal ResolveMatches Metadata exchangeGet GetMetadata LMP_name_req SDP_SearchServiceAttributeReq No similar message BT is based on fix profiles Fig.: Examples of messages that serve similar needs

© MATERNA GmbH 2012www.materna.com11 Presentation URL  Web interface for DPWS devices/services  Modern web technology:  Client/Browser side styling (XSLT/CSS/JS)  Device supplies dynamic XML, static XSLT Presentation URL

© MATERNA GmbH 2012www.materna.com12 Presentation URL  Displays metadata e.g.: name, vendor etc.  Displaying input and output of operations (even complex types)  Eventing support utilizing AJAX  Support for attachments (receiving/sending)  No real support for streaming  WSDL inspection

© MATERNA GmbH 2012www.materna.com13 Presentation URL Fig.: Screenshot: Presentation URL

© MATERNA GmbH 2012www.materna.com14 Authorization  Authorization Add-on support enables fine grained security  Implementations are asked when receiving messages  User credentials (username/password) are sent with the messages  Raising an AuthorizationException when credentials are  not recognized or  operation was not permitted for that user Authorization

© MATERNA GmbH 2012www.materna.com15 Authorization: Default implementation  The default authorization manager implementation  Separating only between services and devices  Operations are authorized with the service‘s credentials  Setup via XML file (“encryption.xml“)  Device EPR and Service Id for identification Fig.: Screenshot: JMEDS Explorer 3‘s new authentication dialog

© MATERNA GmbH 2012www.materna.com16 DPWS Subnetproxy  Connecting remote private networks via a common internet  Enabling DPWS communication through a single tunnel  Designed to work in real world restricted network environments:  Allowing only incoming connections (firewalls…)  Networks might use proxy server for all outgoing connections  It‘s not a discovery proxy! Subnetproxy

© MATERNA GmbH 2012www.materna.com17 DPWS Subnetproxy example: discovery process Internet MATERNA network Clinic‘s network subnetproxy persistent multiplexed connection DPWS client DPWS device 1 DPWS device 2

© MATERNA GmbH 2012www.materna.com18 DPWS Subnetproxy  Discovery messages are forwarded/broadcasted in both subnets  On the destination subnetproxy’s side:  Exchanging relevant device/service addresses  with addresses registered with that proxy‘s HTTP server  Incoming connection requests are handled by so called Proxy Entries  Proxy Entry  original url  HTTP connections are made through a multiplexer  Get/GetMatadata -Response messages are relocalized  Invocations or simple HTTP GET requests stay untouched