Networked Appliances. Reference r Service Portability of Networked Applicances by S. Moyer, D. Marples, S. Tsang, A. Ghosh.

Slides:



Advertisements
Similar presentations
SIP, Presence and Instant Messaging
Advertisements

Presence and IM as SIP Services Jonathan Rosenberg Chief Scientist.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
IM May 24, 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Categories of I/O Devices
SIP for Light Bulbs Using SIP to Support Communication with Networked Appliances SIP for Light Bulbs Using SIP to Support Communication with Networked.
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
H. 323 Chapter 4.
Voice over IP Fundamentals
IP Communications Services Redefining Communications Teresa Hastings Director WorldCom SIP Services Conference – April 18-20, 2001.
Packetizer ® Copyright © 2009 H.325 Overview Paul E. Jones Rapporteur, Q12/16 H.325 Experts Group April 7,
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
Instant Messaging and Presence for SIP Enabled Networked Appliances (Authors: S. Moyer, A. Roychowdhury) Telcordia Technologies Proprietary – Internal.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Session Initiation Protocol Winelfred G. Pasamba.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
A Generic Event Notification System Using XML and SIP Knarig Arabshian and Henning Schulzrinne Department of Computer Science Columbia University
Building Applications Using SIP Scott Hoffpauir Vice President, Engineering Fall 1999 VON, Atlanta.
An Introduction to SIP Moshe Sambol Services Research Lab November 18, 1998.
SIP-Based Emergency Notification System Knarig Arabshian IRT Laboratory Columbia University December 5, 2001.
1 Extending SIP Speaker: Hsuan-Ming Chen Adviser: Ho-Ting Wu Date: 2005/04/26.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
12 July 2015 Requirements for prioritized access to PSTN resources Henning Schulzrinne Columbia University superset of draft-schulzrinne-ieprep-resource-req-00.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
A Guide to major network components
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Packetizer ® Copyright © 2009 H.325: An Application Platform A Closer Look at the “Container” Paul E. Jones Rapporteur Q12/16 April 7,
Session Initialization Protocol (SIP)
Virtual Private Network
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
DTMF & Universal User Key Input Skip Cave InterVoice-Brite Inc.
Session Initiation Protocol Team Members: Manjiri Ayyar Pallavi Murudkar Sriusha Kottalanka Vamsi Ambati Girish Satya LeeAnn Tam.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
Chapter 6: Packet Filtering
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 4 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
H.323 An International Telecommunications Union (ITU) standard. Architecture consisting of several protocols oG.711: Encoding and decoding of speech (other.
Appendix A UM in Microsoft® Exchange Server 2010.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Toshiba Confidential 1 Presented by: Philipe BC Da’Silva SESSION INITIATION PROTOCOL.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Project Objectives A multi-function programmable SIP user agent for multimedia communications, such as audio, video, white board, desktop sharing, shared.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
SIP-H.323 Interworking Group RRR-1 IETF-48 SIP-H.323 Interworking Requirements draft-agrawal-sip-h323-interworking-reqs-00.txt Hemant.
MEGACO SIP State Machine Inter-conversion and Message Translation
Wide Area Communication with and Interworking of Networked Appliances An SAIC Company © Telcordia Technologies, Inc Prepared for: 49 th IETF 12/11/2000.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
The Session Initiation Protocol - SIP
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
How to develop a VoIP softphone in C# that enables SIP Instant Messaging (IM) This presentation describes how to create a softphone in C# that allows you.
IP Telephony (VoIP).
Introduction to Computers
Session Initiation Protocol (SIP)
User to User Key Signaling Protocols
AbbottLink™ - IP Address Overview
Presentation transcript:

Networked Appliances

Reference r Service Portability of Networked Applicances by S. Moyer, D. Marples, S. Tsang, A. Ghosh

Introduction r A network appliance (NA) is a dedicated function consumer device containing a network processor. r Examples: m Lamps, coffee makers, alarm clocks, phones m The alarm clock should be able to adjust its wake-up time based on your calendar, current weather and traffic conditions. m A refrigerator reports to a service station when it needs maintenance.

Introduction

r The end-user service is tied to the actual appliance (e.g., refrigerator) and provides an enhancement to the functionality of the device. r However, the service may be separated from the physical appliance. r The appliance (alarm clock) is considered a convenient way to present or render the service for presentation. r The network infrastructure should enable service portability which allows the service to be rendered onto any suitable delivery platform. r The service that automatically starts your coffee maker should work whether you are at home or in a hotel room.

Network Appliances Today r A multitude of devices and technologies with limited interaction with each other and with the network. r Examples of some things we cannot do or can’t do with ease from a remote location: m “Turn off all lamps at home” m “Enable house alarms” m Ask “What’s the kitchen temperature? m Ask “Are all the doors locked” m Ask “Is there milk in the fridge” m “Let the plumber in”

View

r The RGW provides secure access to the wide-area network (e.g., the Internet) and the ASP within that network. r At a minimum the RGW provides: m Firewall capabilities m Network Address Translation (NAT), m NA m IP interworking capabilities r Appliances that are IP capable may connect to the RGW through a home local area network (LAN).

Issues r Naming and addressing m Location of the device and the physical device can vary; thus it must be possible to support both location and device independence. m Devices within the home need to be unambiguously named and their location identified from outside of it. m Can’t assume that all devices are IP addressable m Selection between multiple instances. m Must be possible to browse for available NAs. m Movement of NAs within a given domain and across domains should not be restricted.

Issues r Security considerations m NAs and their users must be authenticated and authorized when the NA first enters. m The entity trying to enter into the home needs to be unambiguously identified prior to permitting access. r Wide-Area Accessibility m Should be possible for NAs to be accessible from outside of the home.

Issues r Protocol transparency and independence m It must be possible work with different in- domain networking technologies transparently. Within a single home it is acceptable (not that we have much choice) that many different protocols are used for inter-device communication. m Must be lightweight m Preferably connectionless protocol

Architecture r Two types of network-based service providers: Application service provider (ASP) and Network service provider (NSP). r The ASPs provides the platform for service logic execution. r The NSPs are responsible for the transport infrastructure from the ASP to the NA.

Example Architecture

Issues r Sounds simple, but …. r The home domain isn’t really going to allow just anyone to access it. r Most likely the network service provider will be the entity that provides a ‘trusted’ Proxy between the applications provided by the ASPs and the home domain. Will the trusted proxy be the point where charges are applied? r What about portability? There are many different makers of the same type of appliance (e.g., lamp). r ASP services may vary based on the current geographical or logical location of the user at a given point in time e.g., the user may be on a business trip in a different city but wants the same alarm service.

IETF Initiative r The IETF is developing a network protocol for Networked Appliances based the Session Initiation Protocol (SIP). r SIP is a signalling protocol for Internet conferencing, telephony, events notification and instant messaging. r Address devices in SIP: m Encode a hierarchical device naming scheme (e.g., SLP URL) to left of sign in a To or From field. m Encrypt encoded address to ensure privacy. m Example: slp:/d=lamp,r=bedroom,u=stsang

IETF Initiative r SIP was initially created with call set-up in mind. r It is intended to establish a relationship or session between two endpoints r Important Methods: m INVITE – Used to initiate a session with state m DO – Indicates the action to be done at destination. m SUBSCRIBE & NOTIFY – Enables event notification from and between networked appliances

Application Scenario (1) r The user wishes to turn on a lamp within their home from their office PC. r home.net is a NSP. r co.com is a NSP.

Application Scenario (1)

r The SIP messages for the remote control are shown below: (1) DO SIP/2.0 From: To: Via: SIP/2.0/UDP anypc.co.com Content-function: render Content-type: application/dmp On This can be sent from any PC in the company. This is routed to a SIP server on co.com

Application Scenario (1) (2) DO SIP/2.0 From: To: Via SIP/2.0/UDP co.com Via SIP/2.0/UDP anypc.co.com Content-function: render Content-type: application/dmp On The co.com proxy (a SIP server) does lookup in DNS for for the SIP server for the destination domain. It gets the value of home.net.

Application Scenario (1) (3) DO SIP/2.0 From: To: Via SIP/2.0/UDP home.net Via SIP/2.0/UDP co.com Via SIP/2.0/UDP anypc.co.com Content-function: render Content-type: application/dmp On The user name is unique within the domain of the SIP server on home.net; This is sent to stan.home.net which is able to deal with resolving the network address to the device address and deal with firewall issues.

Application Scenario (1) (4) DO SIP/2.0 From: To: Via SIP/2.0/UDP stan.home.net Via SIP/2.0/UDP home.net Via SIP/2.0/UDP co.com Via SIP/2.0/UDP anypc.co.com Content-function: render Content-type: application/dmp On This is received by an appliance controller for a lamp.

Application Scenario (2) r Now let us deal with the case that the lamp from stan.home.net has temporarily been moved to simon.home.net r To accommodate the change, a re-direction is added to the home.net proxy. r The SIP messages for this scenario are shown now shown. r The first two SIP messages are as before.

Application Scenario (2)

r The third SIP message is as follows: (3) DO SIP/2.0 From: To: Via SIP/2.0/UDP home.net Via SIP/2.0/UDP co.com Via SIP/2.0/UDP anypc.co.com Content-function: render Content-type: application/dmp On The home.net proxy did a look-up and finds that Stan’s bedroom lamp is now in Simon’s spare room.

Application Scenario (3) r Stan is riding with Dave in Dave’s car and remembers that he was expecting a service person to come and fix the dishwasher and he does not have his web phone. r He asks to borrow Dave’s phone and sends a message to his service provider to notify him if someone “rings” the doorbell. r When the service person “rings” the doorbell (and authenticates themselves with their ID badge), a message is sent to Dave’s web phone for Stan that the service person is at the front door.

Application Scenario (3)

r The SIP messages needed are below: (1) SUBSCRIBE SIP/2.0 From: To: Via: SIP/2.0/UDP dave.mobile.net Contact: Content-type: application/dmp ring

Application Scenario (3) (2) SUBSCRIBE SIP/2.0 From: To: Via: SIP/2.0/UDP mobile.net Via: SIP/2.0/UDP dave.mobile.net Contact: Content-type: application/dmp ring

Application Scenario (3) (3) SUBSCRIBE SIP/2.0 From: To: Via: SIP/2.0/UDP home.net Via: SIP/2.0/UDP mobile.net Via: SIP/2.0/UDP dave.mobile.net Contact: Content-type: application/dmp ring

Application Scenario (3) (4) SUBSCRIBE SIP/2.0 From: To: Via: SIP/2.0/UDP stan.home.net Via: SIP/2.0/UDP home.net Via: SIP/2.0/UDP mobile.net Via: SIP/2.0/UDP dave.mobile.net Contact: Content-type: application/dmp ring

Application Scenario (3) (5) Door Bell Rings; Credentials established (6) NOTIFY SIP/2.0 From: To: Via: ua.stan.home.net Contact: ring Maytag Repairman

Application Scenario (3) (7) NOTIFY SIP/2.0 From: To: Via: stan.home.net Via: ua.stan.home.net Contact: ring Maytag Repairman

Application Scenario (3) (8) NOTIFY SIP/2.0 From: To: Via: mobile.net Via: stan.home.net Via: ua.stan.home.net Contact: ring Maytag Repairman

Application Scenario (3) r The user is alerted and decides to unlock the door. r A DO message to unlock the door is sent along the same route as the SUBSCRIBE message sent earlier.

Application Scenario (4) r A network-based alarm clock service attempts to deliver a wake-up alert and announcement to the user. r Assume that the user has previously configured the service to be delivered to him/her. r The `alarm clock’ used to deliver the service does not have to be a physical clock, but simply a device, discovered by the service, capable of receiving an audio stream.

Application Scenario (4) r SIP is used to set-up the audio session. r The network-based alarm clock service provider (called alarmclock.net) establishes the audio session and plays the audio announcement(s) at the appropriate wake-up time which is configured through the user’s personal calendar and adjusted based on current traffic and weather conditions. r Note the difference between this scenario and the others: The others were session-less. This is not.

Application Scenario (4)

INVITE sip: SIP 2.0 From: To: Content-type: application/sdp [SDP Parameters for uni-directional RTP stream] Messages 2 and 3 are basically the same with the additional routing information. A response is then returned to the alarm clock service provider with the alarm clock’s RTP parameters and an audio stream is initiated.

Application Scenario (4) r Let’s say that Stan is staying over at a friend’s house and would like the alarm clock service to wake them up there. r Stan doesn’t want to bring his clock. r A redirection is done which is handled by REGISTER messages.

Security Considerations r Authentication of all SIP messages is needed. r There is a need for “trusted” proxies. Network Service Providers may end up being these “trusted” proxies. r How do we control access? r Currently, SIP requires some form of public-key technology. This makes sense for Internet phones since communication can potentially occur between any two parties. r Many believe that in the case of remote access to NAs within the home that shared secret keys are better. Here communication can’t just occur between any two parties. r Do we encrypt end-to-end or hop-by-hop? SIP allows both.

Initiatives r There are lots of initiatives that focus on making networked appliances successful. SIP is specifically focussed on being a network protocol. Other initiatives include: m Open Services Gateway Initiative (OSGi) – Middleware for delivering and managing multiple applications. m UPnP – in-home inter-device communication m HAVi for in-home inter-device communication m SLP – Location and identification of services m Salutation – Location and identification of services