M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals.

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

1/17/20141 Leveraging Cloudbursting To Drive Down IT Costs Eric Burgener Senior Vice President, Product Marketing March 9, 2010.
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Eclipse, M2M and the Internet of Things
Eclipse, M2M and the Internet of Things
Encrypting Wireless Data with VPN Techniques
Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
anywhere and everywhere. omnipresent A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements.
l2r Submission September 2012 Geoff Mulligan, Proto6 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Home Internet and Appliance Automation Using Ultra Tiny Linux TM Kim Rowe.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK ZIGBEE PROTOCOL FOR WIRLEESS SENSOR NETWORK Research paper Lina kazem
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
ZigBee.  ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
Plan Introduction What is Cloud Computing?
Machine-to-Machine (M2M) Communication
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
Vision/Benefits/Introduction Randy Armstrong (OPC Foundation)
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Effectively Explaining the Cloud to Your Colleagues.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Advisor: Quincy Wu Speaker: Kuan-Ta Lu Date: Aug. 19, 2010
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
6LoWPAN (Introduction, Problem Statement & Goals) Nandakishore Kushalnagar Intel Corporation.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
IoTs Capabilities. IoTs Capabilities What is IoTs? Control / Information Internet Devices.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
IoT Standards Harm Jan Arendshorst Head of Product Management Professional Services Confidential and proprietary materials for authorized Verizon personnel.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Jan 2016 IES SF | What’s Next Enlighted. Designed to Change Everything.
Prepared by : Nur Syafikin Shaheera bt Mat Zaini TSK Prof Madya Mohd Hazali bin Mohamed Halip.
Internet of Things. Creating Our Future Together.
CloudMAC: Moving MAC frames processing of the Sink to Cloud.
ZigBee
Lightweight security protocols for the IoT
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
Clouding with Microsoft Azure
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Connected Infrastructure
Developing IoT endpoints with mbed Client
Smart Building Solution
Smart Building Solution
Connected Infrastructure
Algorithms for Big Data Delivery over the Internet of Things
Internet of Things (IoT)
Bluetooth Based Smart Sensor Network
Extending IP to Low-Power, Wireless Personal Area Networks
Global megatrends (relevant for our business)
Internet of Things (IoT)
Presentation transcript:

M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals February 19, 2014

TuWay Story Capabilities Sixty year history of providing and servicing advanced wireless solutions. Proven record with mission critical applications in both Public Safety and Enterprise markets. Local, highly trained and certificated technicians, installers and designers. Design Engineering, Project Management, Installation, Service & Maintenance. Select Client List 911 Centers Lehigh County Authority Bethlehem Water Authority Air Products Sanofi Pastuer SLUHN, LVHN

What is M2M? M2M technology automates processes and streamlines workflow by enabling machines to communicate with each other. Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.

Why Now? Vendors Need to Find Ways to Make $$

Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

Market Drivers Improvements in Cellular  Coverage  Reliability  Capacity  Cost Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

Market Drivers Improvements in Cellular Sensor Advancements  Size  Battery Life  Cost More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage  Size  Speed  Cost Advent of Big Data Resurgence of Cloud Computing

Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data  Better Software  Mobility Resurgence of Cloud Computing

Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing  Fast, Low Cost Implementation  Shift from CapEx to OpEx

Security Issues What is the #1 Security Risk?? COMPLACENCY

Security Issues What Can Be Done? Pay Attention Perceived Threat/ Loss Quantification Determines Response ($$) There is no “Silver Bullet” or “One Size Fits All” Effective Security Uses Layers

Security Strategies COBIT 5 Now Included in Framework Core: Executive Order NEW Cyber Security Framework

Security Strategies What is the same?  The Need for a Strategy  IP Network and Devices  Need to Protect Hardware, Data, Processes What is different?  Scale  Remoteness  No Human Oversight  Minimal Processing Power  Reliance on Battery Power  Intermittent or Limited Connectivity/ Bandwidth  Ability to Create Critical, Widespread Problems

Security Strategies VPN, VLAN, Encryption (requires processing and power) Physical Security (including use of analytic video, access control) GPS Overlay Physical Network Separation Industry Specific Firewall or IPS Device Level  Secure Booting  Device Based Authentication & Access Control  Locking/ Wiping Updates and Patches Specific to Environment Third Party Services: Verizon Universal Identity Services

Case Studies Water/ Sewer Authority Water Supply

What Does the Future Hold? IPv6/ MIPv6 (HMIPv6)  Nearly unlimited addressing  Better Header Compression  No NAT  DHCPv6 vs. Stateless Address Autoconfiguration (SLAAC) But…  No private addressing

What Does the Future Hold? IPv6/ MIPv6 (HMIPv6) ZigBee (2003): a networking layer built on top of IEEE standard MAC designed to provide a standards-based protocol for interoperability of sensor networks. ZigBee IP (March 2013)  adds network and security layers and an application framework  incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways  based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP  security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite

What Does the Future Hold? 6LoWPAN (2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of:  limited power, memory and processing resources  hard upper bounds on state, code space and processing cycles  optimization of energy and network bandwidth usage  lack of some layer 2 services like complete device connectivity and broadcast/multicast

What Does the Future Hold? Open Source Platforms and Programming  Arduino ( : an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.  Eclipse Foundation ( a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.  The Mihini Project ( delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.  Kura ( OSGi- based Application Framework for M2M Service Gatewayswww.eclipse.org/proposals/technology.kura

What Does the Future Hold? Arduino  Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators.  The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) Arduino programming languageWiring  Utilizes the Arduino development environment (based on Processing) Processing  Flutter ( : an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption. Flutterwww.flutterwireless.com

Thank You Derek Storm, Business Development Director TuWay Communications 2115 City Line Road Bethlehem, PA