Efficient information lookup for the Internet of Things G.F. Marias, N. Fotiou, G.C. Polyzos Mobile Multimedia Laboratory, Department of Informatics Athens.

Slides:



Advertisements
Similar presentations
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Advertisements

Chapter 14 – Authentication Applications
Hierarchical Routing Architecture Introduction draft-xu-rrg-hra-00.txt Routing Research Group Xiaohu XU
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Chapter 7 Enterprise-Wide Information Systems
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Reliable Internetworking using the Pub/Sub Paradigm Nikos Fotiou Advisor: Prof. George C. Polyzos Mobile Multimedia Laboratory, Department of Informatics.
Illustrating a Publish-Subscribe Internet Architecture Nikolaos Fotiou 1 George C. Polyzos 1 Dirk Trossen 2 Presenter: Konstantinos Katsaros 1 1 Athens.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
NamingCS-4513, D-Term Naming CS-4513 Distributed Computing Systems (Slides include materials from Operating System Concepts, 7 th ed., by Silbershatz,
1 CS 502: Computing Methods for Digital Libraries Lecture 4 Identifiers and Reference Links.
1 Introducing Scenario Network Data Editing and Enterprise GIS January 27, 2010 Minhua Wang, Ph.D. Citilabs, Inc.
Naming And Directory Services Geetika Sharma 09/22/200 8 CSC8320.
Understanding Active Directory
11.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Distributed Computing COEN 317 DC2: Naming, part 1.
Overview of Active Directory Domain Services Lesson 1.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing in an Enterprise Network Introducing Routing and Switching in the.
Domain names and IP addresses Resolver and name server DNS Name hierarchy Domain name system Domain names Top-level domains Hierarchy of name servers.
Chapter 7: WORKING WITH GROUPS
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
Domain Name System CH 25 Aseel Alturki
Component 4: Introduction to Information and Computer Science Unit 6: Databases and SQL Lecture 2 This material was developed by Oregon Health & Science.
Distributed Computing COEN 317 DC2: Naming, part 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
Chapter Two ( Data Model) Objectives Introduction to Data Models What are the Data Models Why they are important Learn how to design a DBMS.
DATABASE MANAGEMENT SYSTEMS AND THEIR USES
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Esri UC 2014 | Technical Workshop | Editing Versioned Geodatabases : An Introduction Cheryl Cleghorn and Shawn Thorne.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
CSUN eCommons Submitting Learning Objects to CSUN eCommons: A Preliminary Guide February 7, 2008.
CIS 250 Advanced Computer Applications Database Management Systems.
Routing in the Inernet Outcomes: –What are routing protocols used for Intra-ASs Routing in the Internet? –The Working Principle of RIP and OSPF –What is.
Database Management Systems
Introduction to Active Directory
Informatics Institute of Technology 3SFE611 Network Design 1 DNS (Domain Name System) RFC1035 Why names? Computers use addresses. Humans cannot remember.
Introduction to Databases Angela Clark University of South Alabama.
Chapter 25 Internet Routing. Static Routing manually configured routes that do not change Used by hosts whose routing table contains one static route.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Planning an Active Directory Deployment Lesson 1.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Overview of Active Directory Domain Services Lesson 1.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Address Resolution Protocol (ARP)
Module 8: Networking Services
Cryptography and Network Security
IMPLEMENTING NAME RESOLUTION USING DNS
Discussions on Heterogeneous Identification Service
Active Directory Administration
DNS.
Internet Networking recitation #12
Net 323 D: Networks Protocols
Subject Name: Computer Communication Networks Subject Code: 10EC71
Choosing the Discovery Model Martin Forsberg
Database.
MANAGING DATA RESOURCES
Introducing Scenario Network Data Editing and Enterprise GIS
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Introducing Citilabs’ Scenario Based Master Network Data Model
Presentation transcript:

Efficient information lookup for the Internet of Things G.F. Marias, N. Fotiou, G.C. Polyzos Mobile Multimedia Laboratory, Department of Informatics Athens University of Economics and Business

The Internet of Things vision  Every object (thing) is uniquely identified  Each object is associated with information  Great amount of data distributed in databases around the world  How can this information be discovered?  How can this information be managed? 2Efficient information lookup for the IoT

Structuring information Efficient information lookup for the IoT3  Stakeholders: object creators and object holders (e.g., manufacturer and reseller)  Objects are associated with pairs  Global Read-Only  Well known, values set by creators once (e.g., “ingredients” )  Global Editable  Well known, each holder may set value (e.g., “price”)  Local  Specific to a holder (e.g., “shelf number in which the product is stored”)

Information lookup Efficient information lookup for the IoT4  Attribute values are learned using lookup services  Lookup services are accessed using scopes “Scope: a meta-service that accepts as input attribute queries and forwards them to the appropriate lookup service”  Scopes are accessed through a URI known as the Scope Id (SId)  SId can act as a network level access control mechanism (e.g., private IP vs. public IP)  Scopes are hierarchically organized: child scopes have access to the information stored in parent scopes

Operations Efficient information lookup for the IoT5  Scope Creation  Creates a new scope and positions it in the scope hierarchy  Scope-level access control policies can be defined  Attribute Advertisement  Populates a scope’s lookup tables  Attribute-level access control policies can be defined  Attribute Subscription  Query the “default scope” for the value of an attribute  The query eventually reaches the lookup service  Value Forwarding  Send the value of the attribute to the requestor

Example: Medicine supply chain Real World Structure Information Structure Information Structure Creation Information lookup Efficient information lookup for the IoT6 Sells to Administrates Object Lookup service URL Object attributes

Example: Medicine supply chain Real World Structure Information Structure Information Structure Creation Information lookup Efficient information lookup for the IoT7

Example: Medicine supply chain Real World Structure Information Structure Information Structure Creation Information lookup Efficient information lookup for the IoT8

Example: Medicine supply chain Real World Structure Information Structure Information Structure Creation Information lookup Efficient information lookup for the IoT9

Benefits Efficient information lookup for the IoT10  Faster information lookup as information is structured  Context based lookup  The context of a user can define the scope in which a query will be sent  An attribute may exist in multiple scopes with different value in each scope  Better information administration  A stakeholder never looses control of the attribute’s values  Attributes can be “revocated”  Scalability  New scopes can be easily added  Global read only attributes can be cached  It is possible to create isolated enterprise specific versions of the system  No global authorities (as for example in DNS->ONS)

Thank you