M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.

Slides:



Advertisements
Similar presentations
TRAINING SERVICES NIGTEL-CS TRAINING SERVICE Mobile Telecommunications in Africa especially Nigeria has recorded rapid growth and expansion in the.
Advertisements

Computer Networks TCP/IP Protocol Suite.
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Who Are You? Geoff Huston APNIC Identity and Location in IP.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Security Issues In Mobile IP
Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
M2M middleware service Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum MEF 17 Service OAM Framework and Requirements February 2008.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Ivan Gaboli, Virgilio Puglia.
1 Voice over IP Signaling: H.323 and Beyond Communications Magazine, IEEE Volume 38, Issue 10, Oct Page(s): Reporter: ssu-han wang.
Identifying MPLS Applications
1 Data-Oriented Network Architecture (DONA) Scott Shenker (M. Chowla, T. Koponen, K. Lakshminarayanan, A. Ramachandran, A. Tavakoli, I. Stoica)
IPSec.
1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
A global Service layer platform for M2M communications
Application Server Based on SoftSwitch
Mobile RFID Service and Its Security in Korea 17 Nov Keon Woo Kim.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
PSIRP Publish-Subscribe Internet Routing Paradigm 08-Oct /27.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA TCP/IP Protocol Suite and IP Addressing Halmstad University Olga Torstensson
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Internet of Things (IoT) Work Group
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
IP Version 6 Next generation IP Prof. P Venkataram ECE Dept. IISc.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Presents H.323 Forum ETSI TIPHON Presented by: Richard Brennan - Telxxis LLC Vice-Chair ETSI-TIPHON.
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
CS 6401 IPv6 Outline Background Structure Deployment.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Host Identity Protocol
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
An ID/locator split architecture for future networks Ved P. Kafle, Hideki Otsuki, and Masugi Inoue, National Institute of Information and Communications.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Completing the Convergence Puzzle: A Survey and A Roadmap IEEE Wireless Communications ‧ June 2009 DJAMAL-EDDINE MEDDOUR, USMAN JAVAID, AND NICOLAS BIHANNIC,
Geneva, Switzerland, 11 June 2012 Switching and routing in Future Network John Grant Nine Tiles
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Wireless Network Design Principles Mobility Addressing Capacity Security.
Data Communications and Networks
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Internet Protocol Storage Area Networks (IP SAN)
1 The Features of the IoT and Some Extension Considerations China Communications Standards Association Subin Shen 21th meeting CJK.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
K. Salah1 Security Protocols in the Internet IPSec.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Zueyong Zhu† and J. William Atwood‡
An Update on Multihoming in IPv6 Report on IETF Activity
Presentation transcript:

M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007

RFID and The Internet Of Things, ETSI, December Outline Introduction Ubiquitous topology examples Service requirements and API Role of API and example service Requirements Service aggregation and sub-layering RESTful approach to API Allocation of functionality to each layer Architecture New network elements Allocation of functionality to network elements Protocol stacks Reference points and interfaces NGN and IMS capabilities Implementation Alternatives for concrete API

RFID and The Internet Of Things, ETSI, December Example Architecture

RFID and The Internet Of Things, ETSI, December Leaf topology – (Ref.FP6 IP RUNES) Telco hub Service C Device Network co

RFID and The Internet Of Things, ETSI, December Functionality and network elements RVS: Rendezvous Server RH: Resolution Handler ONS: Object Naming Server GW: Gateway

RFID and The Internet Of Things, ETSI, December HIT gateway The HIT gateway supports global addressing while allowing IPv4 addresses. (A single public IP-address is assigned to a gateway potentially controlling large group of COs.) The gateway applies the HIT (Host Identity Tag) for addressing and/or identifying the actual CO. The HIT gateway also support localized mobility management as the IP- address of a CO would only change when the CO moves outside the control of its current gateway. The HIT gateway shall keep track of the location of all COs under its control. Each gateway shall be allocated a coverage area allowing identification of objects within that area. Each gateway shall furthermore keep track of all its physical neighbours to allow extended area search for COs.

RFID and The Internet Of Things, ETSI, December HIT gateway protocol stack

RFID and The Internet Of Things, ETSI, December IP header IPSec (ESP) Encrypted Header and Transport Payload Host Identity (HI) is public/private key pair: Identity defined by holder of private key Public key used by others to authenticate control messages SHA-1 hash of public key forms a Host Identity Tag (HIT) - used where 128 bit fields are needed - self-referential (i.e., HIT can be securely used instead of HI) HIT is implied by the SPI value in IPsec header HIP incurs no per-packet overhead Host Identity Protocol security architecture

RFID and The Internet Of Things, ETSI, December Rendezvous Server (RVS) The basic functionality of the Rendezvous Server (RVS) is to offer mobility- and multicast group anchoring, i.e. Maintenance of the HIT to address bindings. It will also engage in location of COs outside gateway control. It may also be engaged in traffic forwarding in cases where privacy is required. Event reporting shall also be handled by the RVS serving the target CO (i.e. the CO at which events are monitored for reporting). The Registrar and notification functionality is located at the RVS.

RFID and The Internet Of Things, ETSI, December Name resolution (additional to DNS) Resolution Handler (RH) URI -> (HI -> HIT) -> IP address -> CO characteristics (e.g. protocol stack support) Object Name Server (ONS) EPC -> EPC-IS (EPC Information Service offered by manager) EPC-DS (EPC Discovery Services ) an application.

RFID and The Internet Of Things, ETSI, December GPRS/HIP interworking protocol stack

RFID and The Internet Of Things, ETSI, December CO reference points

RFID and The Internet Of Things, ETSI, December Interface at reference point A The initial interface and protocol stack at reference point A is based on the IP protocol as shown in the figure. The choice of lower layer (i.e. sub IP) protocol is not restricted at the interface.

RFID and The Internet Of Things, ETSI, December Interface at reference point B The figure depicts the protocol stack at the CO-core to CO-core NNI. (is considered the best choice to meet the generic CO requirements in the short timeframe).

RFID and The Internet Of Things, ETSI, December Interface at other reference points The interface at reference point C equals reference point B. The interface at reference point D equals reference point A. The interface at reference point E is currently proprietary, but the HIT gateway architecture defined in this document to be applied for mapping between the interface at reference point E and the interface at reference point B (=C). The interface at reference point F equals the reference point B. The interface at reference point G equals reference point B. HIT based nodes communicate transparently (e.g. via or helped by the RVS). The GPRS HIT gateway provides interconnect of the GPRS and CO architectures allowing native non HIT GPRS nodes to communicate with HIT COs. The interface at reference point H is identical to reference point B/C except for the radio access.

RFID and The Internet Of Things, ETSI, December NGN and IMS capabilities IMS may be used to support the functionality of the CO service- primitives. The major challenge is to handle small amounts of real-time data efficient within the session oriented framework of IMS. The Use of the SIP MESSAGE method for such data exchange is a possible solution. A better solution would be to offer a general QoS controlled connectionless service at the network layer, i.e. the IP bearer. The session orientation of IMS makes it very suitable for high volume streaming, but multicast is missing for low volume transient real-time data. The bottom line is that IMS supports high volume streaming very well, but IMS needs to be upgraded to effectively support the class of non session oriented applications.

RFID and The Internet Of Things, ETSI, December Alternative concrete API approaches (1) Web Services Parlay CORBA(too heavy) Parlay-X(For IMS service access) Based on SOAP REST (excluding SOAP envelope) J2ME(Not mature before 2010) Native APIs(required for constrained applications)

RFID and The Internet Of Things, ETSI, December Summary of supported functionality Ubiquitous (cross domain) support of CO services. Name and addressing flexibility, e.g. not limited by IP constraints. New services require only additional data definitions and builds on existing service components accessed via standard API. CO service connectivity with UMTS/GPRS. Access to OSA Parlay functionality. Security. Privacy (in terms of location and identity). Mobility management (including network mobility). M:N multicast also for mobile objects. Presence, location and Notification. Efficient interfacing of proprietary and/or power constrained devices. Protocol-stack flexibility. Topological hierarchy