BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.

Slides:



Advertisements
Similar presentations
WECC EIDE Training Workshop Data Exchange Work Group.
Advertisements

Enabling Secure Internet Access with ISA Server
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Service Oriented Architecture Terry Woods Session 50.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
September 20, 2002G2E 2002 GSA Technical Forum1 Best Of Breed (BOB) Standard.
SCSC 455 Computer Security Virtual Private Network (VPN)
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
2 Systems Architecture, Fifth Edition Chapter Goals Describe client/server and multi-tier application architecture and discuss their advantages compared.
WAP: Wireless Application Protocol Mike Mc Ardle ACSG April, 2005.
MyVRM Architectural Review October Agenda myVRM Quick Review Overall Architectural Concepts Design Principals Implementation Detail Q&A.
NETWORK MODELS T.Najah Al_Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Understanding Active Directory
September 20, 2002G2E 2002 GSA Technology Forum1 Gaming Device Standards Workgroup.
Network Architecture and Protocol Concepts. Network Architectures (1) The network provides one or more communication services to applications –A service.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet-Based Client Access
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Presentation on Osi & TCP/IP MODEL
Chapter 13 – Network Security
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Enabling Embedded Systems to access Internet Resources.
Web Services Igor Wasinski Olumide Asojo Scott Hannan.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
第十四章 J2EE 入门 Introduction What is J2EE ?
Web Services An introduction for eWiSACWIS May 2008.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
Web Services (SOAP, WSDL, UDDI) SNU OOPSLA Lab. October 2005.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
The Year of Implementation and Value Creation!Gaming Technology Summit The Power of One Solution.
The Year of Implementation and Value Creation!Global Gaming Expo 2006 Good Things Happen When We All Pull Together The World of Transport.
BOB - GSA’s Best Of Breed Protocol. Global Gaming Expo - October 2004 BOB: “Best of Breed” - EGM to System.
Overview Web Session 3 Matakuliah: Web Database Tahun: 2008.
Web Services Presented By : Noam Ben Haim. Agenda Introduction What is a web service Basic Architecture Extended Architecture WS Stacks.
Data Communications and Networks
TCP/IP (Transmission Control Protocol / Internet Protocol)
G2E Session 4051 The Future of Electronic Gaming Devices; From Game-Centric to System Enabled to System-Centric September 20, 2002.
Kemal Baykal Rasim Ismayilov
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
1 G52IWS: Web Services Chris Greenhalgh. 2 Contents The World Wide Web Web Services example scenario Motivations Basic Operational Model Supporting standards.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
1 Chap. 2 Protocol. 2 Communication model Simplified communication model  source node  gather data from sensor or switch using ADC (analog-to-digital.
OSI Model. Open Systems Interconnection (OSI) is a set of internationally recognized, non proprietary standards for networking and for operating system.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
TOPIC: Applications of Web Technologies in Distributed Systems
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Level 2 Diploma Unit 10 Setting up an IT Network
Sabri Kızanlık Ural Emekçi
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Chapter 3: Open Systems Interconnection (OSI) Model
Working at a Small-to-Medium Business or ISP – Chapter 7
IST346: Services: Monitoring and Logging
Unit 8 Network Security.
Presentation transcript:

BOB Tech Demo 2003 G2E – Las Vegas

Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom up - the slot floor topology of BoB explained  Messaging for the Casino Gaming industry XML– the good stuff  What do you see in front of you?  Real, working hardware demonstration  You question, we’ll answer

BoB Protocol Layers (stack) GSA’s contribution

Protocol Glossary ProtocolUsage and Benefits to BoB DHCP Dynamic Host Configuration Protocol Automatic network admission and IP Address assignment for gaming machines and host systems. LDAP Lightweight Directory Access Protocol Automatic configuration of gaming machines and host systems. Automatic notifications of configuration updates. Can store arbitrary binary objects including images, software updates, etc. Provides a secure access control mechanism to allow only authorized users to gain access to the portions of the LDAP directory they are allowed to access. NTP Network Time Protocol Automatic synchronization of time across all gaming machines and host systems in a gaming network. SOAP/HTTP/TCP Simple Object Access Protocol/Hypertext Transfer Protocol/Transmission Control Protocol Transport layer protocols to carry point-to-point ordered and reliable BoB XML messages between gaming machines and host systems. XML Extensible Markup Language All messages between gaming machines and host systems are encoded in XML. XML allows a flexible and extensible method of encoding data. XML Schema The BoB protocol defines a set of XML schema. A schema is a blueprint for what an XML document can contain. SSL Secure Sockets Layer All messages between gaming machines and host systems are secured using SSL. SSL is used to authenticate both ends of a communication session and to encrypt all traffic flowing on that session.

Why XML?  BoB strategy is to use “Off the Shelf” standards from computer industry Reduces engineering costs – training, etc Proprietary solutions are more difficult to implement and incompatible on the casino floor Enables manufacturers to deliver products more quickly and focus on value added game content  XML is a language useful for defining data exchange XML is a rich language for expressing data structures and defining the interface (schema) Easily extensible to ensure backwards compatibility  Implementing Products with XML Rapid development environment Numerous tools support XML including most major browsers Integrates well with HTML and other Web standards Human readable and understandable protocol traces Allows automatic data validation against schema for development and debugging

Sample BoB Message Exchanges

Top Schema

Header Schema

Body Schema

Meter Schema

Example XML Document - response :20:0005:00 meters meterInfo

GSA – Best of Breed Back Office Systems Bally Systems Atronic Foxwoods BOB Messaging Gaming Machines

BoB - Floor Topology

BoB - Network Architecture

BoB – Gaming Machine Bootstrap Process

Live Demo

Q & A 2003 G2E – Las Vegas