The Internet of Things Wilfrid Laurier University

Size: px
Start display at page:

Download "The Internet of Things Wilfrid Laurier University"

Transcription

1 The Internet of Things Wilfrid Laurier University Wilfrid Laurier University March 11, 2015

2 Overview

3 Overview?

4 Overview?

5 Overview? Why does one need the other?

6 ?

7 ? Started in about 1950s (USA, DARPA)

8 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing

9 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing Originally for military, governments and universities

10 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing Originally for military, governments and universities A network of networks (internet(work))

11 Introduction

12 Before the Internet; phone network

13 Before the Internet; phone network Telegraph began in 1830 s

14 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish)

15 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish) Point-to-point connection requires switches

16 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish) Point-to-point connection requires switches Connection is maintained for the duration of the call

17 How does the Internet work?

18 How does the Internet work? Every unique host has an address

19 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned

20 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts

21 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets

22 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets All packets don t need to travel the same route

23 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets All packets don t need to travel the same route The packets don t need to arrive in the correct order

24

25

26

27

28

29 How many Internet addresses are there?

30 How many Internet addresses are there? The version of internet protocol in current use is IPV4

31 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses

32 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 =

33 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = =

34 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = = About 4 billion IPV4 addresses

35 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = = About 4 billion IPV4 addresses There are over 7 billion people on Earth

36 Address exhaustion

37 Address exhaustion As early as the 1980s it was apparent the address space would get used up

38 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone

39 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone When I started programming in the late 70s the mainframe had 500KB of memory

40 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone When I started programming in the late 70s the mainframe had 500KB of memory In the early 1990s, Tim Berners-Lee developed the World Wide web, which led to massive expansion beyond the original audience

41

42 Introduction

43 Other option; MAC address

44 Other option; MAC address Any internet connected device has a MAC address

45 Other option; MAC address Any internet connected device has a MAC address Media Access Control

46 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer)

47 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits

48 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits That means there are MAC addresses for every IPV4 address

49 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits That means there are MAC addresses for every IPV4 address Why not use them instead?

50 Why MAC addresses won t work

51 Why MAC addresses won t work Remember: assigned by manufacturer

52 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical?

53 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975

54 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table?

55 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses

56 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses If a router can search 1 billion (i.e ) addresses per second, a complete lookup table search would take about seconds (or about 71 hours)

57 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses If a router can search 1 billion (i.e ) addresses per second, a complete lookup table search would take about seconds (or about 71 hours) This won t work; addresses have to contain routing information

58 Solution: IPV6

59 Solution: IPV6 A new internet protocol, IPV6, has been created

60 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses

61 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses That means there are addresses

62 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses That means there are addresses Is that enough for the foreseeable future?

63 Are there enough IPV6 addresses?

64 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m

65 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2

66 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m

67 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3

68 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3 There are about seconds in a year

69 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3 There are about seconds in a year We could assign a new IPV6 address to every cubic millimetre in the atmosphere for about 1000 years before exhausting them.

70

71 Originally the internet was conceived to connect people to people

72 Originally the internet was conceived to connect people to people Early on, some saw it as a means of automation

73

74 The first thing on the Internet?

75 The first thing on the Internet? The Trojan Room coffee pot

76 The first thing on the Internet? The Trojan Room coffee pot Cambridge University

77 The first thing on the Internet? The Trojan Room coffee pot Cambridge University Computer Laboratory

78 The Trojan Room coffee pot

79 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds

80 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds A web server posted the image to a web page

81 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds A web server posted the image to a web page When a new pot was brewed, a feeding (actually, drinking) frenzy could occur

82

83 Options included:

84 Options included: Radio

85 Options included: Radio Satellite

86 Options included: Radio Satellite Dedicated phone line

87 Options included: Radio Satellite Dedicated phone line All specialized and relatively expensive, since path needs to be approved and/or created

88 Remote sensing using the Internet

89 Remote sensing using the Internet Wifi fairly ubiquitous

90 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations

91 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations Satellite internet possible as well

92 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations Satellite internet possible as well Access to internet at each end is all that s required, since path between device and monitor is already established.

93

94

95 Devices each need TCP/IP stack

96

97 Medical Applications Security Applications Home Automation Applications

98 Medical Applications Security Applications Home Automation Applications Medical

99 Medical Applications Security Applications Home Automation Applications Medical Security and safety

100 Medical Applications Security Applications Home Automation Applications Medical Security and safety Home automation

101 Medical Applications Security Applications Home Automation Applications Medical Applications

102 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices

103 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps

104 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps allows real-time remote monitoring and logging

105 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps allows real-time remote monitoring and logging timed release of medication; e.g. chemotherapy, pain relievers, etc.

106 Medical Applications Security Applications Home Automation Applications

107 Medical Applications Security Applications Home Automation Applications

108 Medical Applications Security Applications Home Automation Applications Security Applications

109 Medical Applications Security Applications Home Automation Applications Security Applications Home

110 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera

111 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking

112 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto

113 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto tracking of vehicle and components; e.g. stereo

114 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto tracking of vehicle and components; e.g. stereo real-time logging of black box status information

115 Medical Applications Security Applications Home Automation Applications

116 Medical Applications Security Applications Home Automation Applications

117 Medical Applications Security Applications Home Automation Applications

118 Medical Applications Security Applications Home Automation Applications Home Automation Applications

119 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home

120 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control

121 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking

122 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto

123 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto cloud based entertainment

124 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto cloud based entertainment reminders of maintenance; automatic appointment scheduling, diagnosis

125 Medical Applications Security Applications Home Automation Applications

126 Medical Applications Security Applications Home Automation Applications

127 Environmental Challenges Security Challenges

128 Environmental Challenges Security Challenges Environmental

129 Environmental Challenges Security Challenges Environmental Security

130 Environmental Challenges Security Challenges Environmental Security Communication

131 Environmental Challenges Security Challenges Environmental challenges

132 Environmental Challenges Security Challenges Environmental challenges IoT devices are more complex

133 Environmental Challenges Security Challenges Environmental challenges IoT devices are more complex Devices get frequent upgrades

134 Environmental Challenges Security Challenges

135 Environmental Challenges Security Challenges

136 Environmental Challenges Security Challenges

137 Environmental Challenges Security Challenges Security challenges

138 Environmental Challenges Security Challenges Security challenges Remote monitoring could be by anyone

139 Environmental Challenges Security Challenges Security challenges Remote monitoring could be by anyone Remote control...!!!!!!

140 Environmental Challenges Security Challenges

141 Environmental Challenges Security Challenges

142 Environmental Challenges Security Challenges Communication

143 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning

144 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning Devices talking to each other will follow

145 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning Devices talking to each other will follow What sort of language could allow for all kinds of devices to talk to each other?

146 Environmental Challenges Security Challenges

147 Environmental Challenges Security Challenges

148 Environmental Challenges Security Challenges The future?

Masters of Science in Information Technology

Masters of Science in Information Technology Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity

More information

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.

This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same. This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Internet Packets. Forwarding Datagrams

Internet Packets. Forwarding Datagrams Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

1.1 Prior Knowledge and Revision

1.1 Prior Knowledge and Revision 1.1. PRIOR KNOWLEDGE AND REVISION 3 1.1 Prior Knowledge and Revision This topic assumes you already have some background knowledge of the Internet. You may have studied The Internet unit of Intermediate

More information

9 Steps to Selecting and Implementing an IP Business Phone System

9 Steps to Selecting and Implementing an IP Business Phone System 9 Steps to Selecting and Implementing an IP Business Phone System 2011, GWI Introduction: GWI has written this whitepaper in an effort to provide our customers with an overview of the process of identifying,

More information

TCP/IP Protocol Suite. Marshal Miller Chris Chase

TCP/IP Protocol Suite. Marshal Miller Chris Chase TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0

Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0 Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Life of a Packet CS 640, 2015-01-22

Life of a Packet CS 640, 2015-01-22 Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have

More information

Securing the Internet of Things WHITEPAPER

Securing the Internet of Things WHITEPAPER Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible

More information

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering

More information

IP Multicast Backgrounder An IP Multicast Initiative White Paper

IP Multicast Backgrounder An IP Multicast Initiative White Paper Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast

More information

The Internet and Network Technologies

The Internet and Network Technologies The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

GPS Vehicle Tracking. The Complete Reference Guide

GPS Vehicle Tracking. The Complete Reference Guide GPS Vehicle Tracking The Complete Reference Guide GPS Vehicle Tracking: The Complete Reference Guide GPS vehicle tracking has gained popularity in many segments of the business world. Two main reasons

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

architecture: what the pieces are and how they fit together names and addresses: what's your name and number? Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and

More information

Network Functions Virtualization in Home Networks

Network Functions Virtualization in Home Networks Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention

More information

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots

A Brief History of the Internet. Chris Brooks Computing, Python, and Robots A Brief History of the Internet Chris Brooks Computing, Python, and Robots Outline Prehistory Birth of the Internet The Web is Born The Dot-Com Gold Rush Web 2.0 - everything old is new again The future?

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

EHRs and Contexts of Use

EHRs and Contexts of Use 2 EHRs and Contexts of Use A Providers Perspective on EHR User Experience Presented by March 2013 1 EHRs and Contexts of Use It s not a new concept. Most modern EHRs, descending from products designed

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Vehicle Tracking System,

Vehicle Tracking System, Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show

More information

Wireless Security and the Internet of Things Nick Hunn

Wireless Security and the Internet of Things Nick Hunn Wireless Security and the Internet of Things Nick Hunn WiFore Consulting The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications Disruption Tolerant Networks and its relevance to IOT/M2M Extensible NMS Support for DTN Mesh Networks + Applications MAC80211+OpenWRT Framework for Proprietary Devices Representative SBC computers with

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Internet of Things: IoT Day Special Edition

Internet of Things: IoT Day Special Edition Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)

More information

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1

More information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Wireless Internet. Is an system to provide connectivity to customers to the Internet. Service Provider (WISP) TECHNICAL INFO.

Wireless Internet. Is an system to provide connectivity to customers to the Internet. Service Provider (WISP) TECHNICAL INFO. Description The Service Provider System (WISP) is an integrated Metropolitan Area Network (MAN) system of connecting customers to the. High-speed wireless data links are used to provide access on a point-to-point

More information

October 2014. Field Area Communication Networks for Digital Oil and Gas Fields

October 2014. Field Area Communication Networks for Digital Oil and Gas Fields October 2014 Field Area Communication Networks for Digital Oil and Gas Fields The digital oil and gas field The challenge More wells More area More monitoring and control More information The old SCADA

More information

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

CITS1231 Web Technologies. Client, Server, the Internet, and the Web CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the

More information

A G E N D A I O T P R E S S T O U R

A G E N D A I O T P R E S S T O U R I O T P R E S S T O U R A G E N D A _ Introduction Opening What is IoT The IoT Market _ AVM Strategy What does IoT mean to Avnet Memec? Where does Avnet Memec fit? _ AVM Solutions _ What s Next _ Summary

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

A very short history of networking

A very short history of networking A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the

More information

Terminology. Internet Addressing System

Terminology. Internet Addressing System Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics

More information

VitalPBX. Hosted Voice That Works. For You

VitalPBX. Hosted Voice That Works. For You VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

Enabling the SmartGrid through Cloud Computing

Enabling the SmartGrid through Cloud Computing Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from

More information

THE UNIVERSITY OF AUCKLAND

THE UNIVERSITY OF AUCKLAND COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.

More information

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything Bill Morelli Associate Director SEMI Texas Fall Outlook October 30, 2013 IoT vs Connected Devices Internet

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com

VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP

More information

M2M & Internet of Things Opportunities

M2M & Internet of Things Opportunities M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP

LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Planning the transition to IPv6

Planning the transition to IPv6 Planning the transition to IPv6 An Allstream White Paper 1 Table of contents Why transition now? 1 Transition mechanisms 2 Transition phases 2 IPv6 transition challenges 3 Taking advantage of IPv6 benefits

More information

System Development and Life-Cycle Management (SDLCM) Methodology

System Development and Life-Cycle Management (SDLCM) Methodology System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies the format and conventions to be used in developing

More information

End-to-End M2M and IoT Services

End-to-End M2M and IoT Services End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there

More information

Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren

Lecture 1: Course Introduction CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1 Overview" Class overview Expected outcomes Structure of the course Policies and procedures A brief review

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories: Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

HMS Industrial Networks. Putting industrial applications on the cloud

HMS Industrial Networks. Putting industrial applications on the cloud HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

BONEMA TECHNOLOGIES PRODUCT FEATURES. The following training provides information on the Bonema product features.

BONEMA TECHNOLOGIES PRODUCT FEATURES. The following training provides information on the Bonema product features. BONEMA TECHNOLOGIES PRODUCT FEATURES The following training provides information on the Bonema product features. Real-time tracking Vehicle tracking relies both on the Global Positioning satellites (GPS)

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

A NIMS Smart Practice

A NIMS Smart Practice NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED

More information

Should and Can a Communication System. Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk

Should and Can a Communication System. Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk Should and Can a Communication System MSOffice1 Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk Erol Gelenbe www.ee.ic.ac.uk/gelenbe Imperial College London SW7 2BT e.gelenbe@imperial.ac.uk

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Lab 10.4.1 IP Addressing Overview

Lab 10.4.1 IP Addressing Overview Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

UPnP: The Discovery & Service Layer For The Internet of Things April 2015

UPnP: The Discovery & Service Layer For The Internet of Things April 2015 UPnP: The Discovery & Service Layer For The Internet of Things April 2015 The First Chapter: The Connected Home In late 1999, the founding members of what would become the UPnP Forum started to put together

More information

Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are

Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are White Paper Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn The Internet of Things (IoT) is generating an unprecedented volume and variety of data.

More information

Chapter 2 Introduction

Chapter 2 Introduction Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

IP Addressing Introductory material.

IP Addressing Introductory material. IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport

More information

WSNetServer User Manual. Date: July 13 2003

WSNetServer User Manual. Date: July 13 2003 Date: July 13 2003 1 Revision History... 2 2 Introduction... 2 3 Installation... 2 4 Normal Operation... 2 4.1 Startup... 2 4.2 About Box... 3 4.3 Specifying The Cross Point XY Broadcast Port... 3 4.4

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

New Cloud Networking Enabled by ProgrammableFlow

New Cloud Networking Enabled by ProgrammableFlow New Cloud Networking Enabled by ProgrammableFlow NISHIHARA Motoo, IWATA Atsushi, YUN Su-hun WATANABE Hiroyuki, IIJIMA Akio, KANOH Toshiyuki Abstract Network virtualization, network programmability, and

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Uploading files to FTP server

Uploading files to FTP server V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications

More information

IPv6 Potential Routing Table Size

IPv6 Potential Routing Table Size IPv6 Potential Routing Table Size Jason Schiller schiller@uu.net Sven Maduschke sven.maduschke@verizonbusiness.com IP Core Infrastructure Engineering Verizon Business Aggregation is Holy Grail IETF and

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information