The Internet of Things Wilfrid Laurier University
|
|
- Avice Simon
- 8 years ago
- Views:
Transcription
1 The Internet of Things Wilfrid Laurier University Wilfrid Laurier University March 11, 2015
2 Overview
3 Overview?
4 Overview?
5 Overview? Why does one need the other?
6 ?
7 ? Started in about 1950s (USA, DARPA)
8 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing
9 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing Originally for military, governments and universities
10 ? Started in about 1950s (USA, DARPA) Goal was to have a robust communications network that could function with pieces missing Originally for military, governments and universities A network of networks (internet(work))
11 Introduction
12 Before the Internet; phone network
13 Before the Internet; phone network Telegraph began in 1830 s
14 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish)
15 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish) Point-to-point connection requires switches
16 Before the Internet; phone network Telegraph began in 1830 s Telephone began in 1876 (ish) Point-to-point connection requires switches Connection is maintained for the duration of the call
17 How does the Internet work?
18 How does the Internet work? Every unique host has an address
19 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned
20 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts
21 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets
22 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets All packets don t need to travel the same route
23 How does the Internet work? Every unique host has an address Countries and organizations have banks of addresses which can be assigned Information is sent in packets between hosts A message can consist of several packets All packets don t need to travel the same route The packets don t need to arrive in the correct order
24
25
26
27
28
29 How many Internet addresses are there?
30 How many Internet addresses are there? The version of internet protocol in current use is IPV4
31 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses
32 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 =
33 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = =
34 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = = About 4 billion IPV4 addresses
35 How many Internet addresses are there? The version of internet protocol in current use is IPV4 IPV4 uses 32 bit addresses Useful fact: 2 10 = = About 4 billion IPV4 addresses There are over 7 billion people on Earth
36 Address exhaustion
37 Address exhaustion As early as the 1980s it was apparent the address space would get used up
38 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone
39 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone When I started programming in the late 70s the mainframe had 500KB of memory
40 Address exhaustion As early as the 1980s it was apparent the address space would get used up NB: Bill Gates once said 640KB of memory should be enough for anyone When I started programming in the late 70s the mainframe had 500KB of memory In the early 1990s, Tim Berners-Lee developed the World Wide web, which led to massive expansion beyond the original audience
41
42 Introduction
43 Other option; MAC address
44 Other option; MAC address Any internet connected device has a MAC address
45 Other option; MAC address Any internet connected device has a MAC address Media Access Control
46 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer)
47 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits
48 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits That means there are MAC addresses for every IPV4 address
49 Other option; MAC address Any internet connected device has a MAC address Media Access Control unique (assigned by manufacturer) 48 bits That means there are MAC addresses for every IPV4 address Why not use them instead?
50 Why MAC addresses won t work
51 Why MAC addresses won t work Remember: assigned by manufacturer
52 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical?
53 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975
54 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table?
55 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses
56 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses If a router can search 1 billion (i.e ) addresses per second, a complete lookup table search would take about seconds (or about 71 hours)
57 Why MAC addresses won t work Remember: assigned by manufacturer How do you know where to route a message if the address is not geographical? That would be like trying to deliver mail to Jane Elizabeth Smith born May 12, 1975 Why not use a lookup table? Remember there are MAC addresses If a router can search 1 billion (i.e ) addresses per second, a complete lookup table search would take about seconds (or about 71 hours) This won t work; addresses have to contain routing information
58 Solution: IPV6
59 Solution: IPV6 A new internet protocol, IPV6, has been created
60 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses
61 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses That means there are addresses
62 Solution: IPV6 A new internet protocol, IPV6, has been created It uses 128 bit addresses That means there are addresses Is that enough for the foreseeable future?
63 Are there enough IPV6 addresses?
64 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m
65 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2
66 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m
67 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3
68 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3 There are about seconds in a year
69 Are there enough IPV6 addresses? The radius of the earth is about 6000 km or m That means its surface area is 4πR m 2 The atmosphere is about 100km thick, or 10 5 m Thus the volume of the atmosphere is about m 3, or = mm 3 There are about seconds in a year We could assign a new IPV6 address to every cubic millimetre in the atmosphere for about 1000 years before exhausting them.
70
71 Originally the internet was conceived to connect people to people
72 Originally the internet was conceived to connect people to people Early on, some saw it as a means of automation
73
74 The first thing on the Internet?
75 The first thing on the Internet? The Trojan Room coffee pot
76 The first thing on the Internet? The Trojan Room coffee pot Cambridge University
77 The first thing on the Internet? The Trojan Room coffee pot Cambridge University Computer Laboratory
78 The Trojan Room coffee pot
79 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds
80 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds A web server posted the image to a web page
81 The Trojan Room coffee pot Long before webcams, (early 1990s), a digital framegrabber took pictures every few seconds A web server posted the image to a web page When a new pot was brewed, a feeding (actually, drinking) frenzy could occur
82
83 Options included:
84 Options included: Radio
85 Options included: Radio Satellite
86 Options included: Radio Satellite Dedicated phone line
87 Options included: Radio Satellite Dedicated phone line All specialized and relatively expensive, since path needs to be approved and/or created
88 Remote sensing using the Internet
89 Remote sensing using the Internet Wifi fairly ubiquitous
90 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations
91 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations Satellite internet possible as well
92 Remote sensing using the Internet Wifi fairly ubiquitous Cellular possible in many more locations Satellite internet possible as well Access to internet at each end is all that s required, since path between device and monitor is already established.
93
94
95 Devices each need TCP/IP stack
96
97 Medical Applications Security Applications Home Automation Applications
98 Medical Applications Security Applications Home Automation Applications Medical
99 Medical Applications Security Applications Home Automation Applications Medical Security and safety
100 Medical Applications Security Applications Home Automation Applications Medical Security and safety Home automation
101 Medical Applications Security Applications Home Automation Applications Medical Applications
102 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices
103 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps
104 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps allows real-time remote monitoring and logging
105 Medical Applications Security Applications Home Automation Applications Medical Applications Implanted devices pacemakers, insulin pumps allows real-time remote monitoring and logging timed release of medication; e.g. chemotherapy, pain relievers, etc.
106 Medical Applications Security Applications Home Automation Applications
107 Medical Applications Security Applications Home Automation Applications
108 Medical Applications Security Applications Home Automation Applications Security Applications
109 Medical Applications Security Applications Home Automation Applications Security Applications Home
110 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera
111 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking
112 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto
113 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto tracking of vehicle and components; e.g. stereo
114 Medical Applications Security Applications Home Automation Applications Security Applications Home remote monitoring of security system, cameras, baby monitor/camera pet/child tracking Auto tracking of vehicle and components; e.g. stereo real-time logging of black box status information
115 Medical Applications Security Applications Home Automation Applications
116 Medical Applications Security Applications Home Automation Applications
117 Medical Applications Security Applications Home Automation Applications
118 Medical Applications Security Applications Home Automation Applications Home Automation Applications
119 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home
120 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control
121 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking
122 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto
123 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto cloud based entertainment
124 Medical Applications Security Applications Home Automation Applications Home Automation Applications Home environment monitoring and control pet/child tracking Auto cloud based entertainment reminders of maintenance; automatic appointment scheduling, diagnosis
125 Medical Applications Security Applications Home Automation Applications
126 Medical Applications Security Applications Home Automation Applications
127 Environmental Challenges Security Challenges
128 Environmental Challenges Security Challenges Environmental
129 Environmental Challenges Security Challenges Environmental Security
130 Environmental Challenges Security Challenges Environmental Security Communication
131 Environmental Challenges Security Challenges Environmental challenges
132 Environmental Challenges Security Challenges Environmental challenges IoT devices are more complex
133 Environmental Challenges Security Challenges Environmental challenges IoT devices are more complex Devices get frequent upgrades
134 Environmental Challenges Security Challenges
135 Environmental Challenges Security Challenges
136 Environmental Challenges Security Challenges
137 Environmental Challenges Security Challenges Security challenges
138 Environmental Challenges Security Challenges Security challenges Remote monitoring could be by anyone
139 Environmental Challenges Security Challenges Security challenges Remote monitoring could be by anyone Remote control...!!!!!!
140 Environmental Challenges Security Challenges
141 Environmental Challenges Security Challenges
142 Environmental Challenges Security Challenges Communication
143 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning
144 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning Devices talking to each other will follow
145 Environmental Challenges Security Challenges Communication Devices talking to a server or user is only the beginning Devices talking to each other will follow What sort of language could allow for all kinds of devices to talk to each other?
146 Environmental Challenges Security Challenges
147 Environmental Challenges Security Challenges
148 Environmental Challenges Security Challenges The future?
Masters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
More informationProtocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
More informationEnvironmental Monitoring: Guide to Selecting Wireless Communication Solutions
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity
More informationThis Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
More informationExhibit n.2: The layers of a hierarchical network
3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationInternet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More information1.1 Prior Knowledge and Revision
1.1. PRIOR KNOWLEDGE AND REVISION 3 1.1 Prior Knowledge and Revision This topic assumes you already have some background knowledge of the Internet. You may have studied The Internet unit of Intermediate
More information9 Steps to Selecting and Implementing an IP Business Phone System
9 Steps to Selecting and Implementing an IP Business Phone System 2011, GWI Introduction: GWI has written this whitepaper in an effort to provide our customers with an overview of the process of identifying,
More informationTCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationExam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
More informationLesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationLife of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
More informationSecuring the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
More informationIntroduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen
Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering
More informationIP Multicast Backgrounder An IP Multicast Initiative White Paper
Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast
More informationThe Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationGPS Vehicle Tracking. The Complete Reference Guide
GPS Vehicle Tracking The Complete Reference Guide GPS Vehicle Tracking: The Complete Reference Guide GPS vehicle tracking has gained popularity in many segments of the business world. Two main reasons
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationVPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationMOC 6435A Designing a Windows Server 2008 Network Infrastructure
MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationNetwork Functions Virtualization in Home Networks
Network Functions Virtualization in Home Networks Marion Dillon Timothy Winters Abstract The current model of home networking includes relatively low- cost, failure- prone devices, requiring frequent intervention
More informationA Brief History of the Internet. Chris Brooks Computing, Python, and Robots
A Brief History of the Internet Chris Brooks Computing, Python, and Robots Outline Prehistory Birth of the Internet The Web is Born The Dot-Com Gold Rush Web 2.0 - everything old is new again The future?
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
More informationEHRs and Contexts of Use
2 EHRs and Contexts of Use A Providers Perspective on EHR User Experience Presented by March 2013 1 EHRs and Contexts of Use It s not a new concept. Most modern EHRs, descending from products designed
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationVehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
More informationWireless Security and the Internet of Things Nick Hunn
Wireless Security and the Internet of Things Nick Hunn WiFore Consulting The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall
More informationWAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com
WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
More informationDisruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications
Disruption Tolerant Networks and its relevance to IOT/M2M Extensible NMS Support for DTN Mesh Networks + Applications MAC80211+OpenWRT Framework for Proprietary Devices Representative SBC computers with
More informationUnderstand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
More informationInternet of Things: IoT Day Special Edition
Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)
More informationLOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1
More informationMobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationWireless Internet. Is an system to provide connectivity to customers to the Internet. Service Provider (WISP) TECHNICAL INFO.
Description The Service Provider System (WISP) is an integrated Metropolitan Area Network (MAN) system of connecting customers to the. High-speed wireless data links are used to provide access on a point-to-point
More informationOctober 2014. Field Area Communication Networks for Digital Oil and Gas Fields
October 2014 Field Area Communication Networks for Digital Oil and Gas Fields The digital oil and gas field The challenge More wells More area More monitoring and control More information The old SCADA
More informationCITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
More informationA G E N D A I O T P R E S S T O U R
I O T P R E S S T O U R A G E N D A _ Introduction Opening What is IoT The IoT Market _ AVM Strategy What does IoT mean to Avnet Memec? Where does Avnet Memec fit? _ AVM Solutions _ What s Next _ Summary
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationA very short history of networking
A New vision for network architecture David Clark M.I.T. Laboratory for Computer Science September, 2002 V3.0 Abstract This is a proposal for a long-term program in network research, consistent with the
More informationTerminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
More informationVitalPBX. Hosted Voice That Works. For You
VitalPBX Hosted Voice That Works For You Vital Voice & Data s VitalPBX VVD Hosted PBX solutions provide you with the stability of a traditional telephone PBX system and the flexibility that only a next
More informationWhat You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
More information100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
More informationKey requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
More informationEnabling the SmartGrid through Cloud Computing
Enabling the SmartGrid through Cloud Computing April 2012 Creating Value, Delivering Results 2012 eglobaltech Incorporated. Tech, Inc. All rights reserved. 1 Overall Objective To deliver electricity from
More informationTHE UNIVERSITY OF AUCKLAND
COMPSCI 742 THE UNIVERSITY OF AUCKLAND SECOND SEMESTER, 2008 Campus: City COMPUTER SCIENCE Data Communications and Networks (Time allowed: TWO hours) NOTE: Attempt all questions. Calculators are NOT permitted.
More informationInternet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director
Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything Bill Morelli Associate Director SEMI Texas Fall Outlook October 30, 2013 IoT vs Connected Devices Internet
More informationNETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0
User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationM2M & Internet of Things Opportunities
M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationLESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
More informationCTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
More informationPlanning the transition to IPv6
Planning the transition to IPv6 An Allstream White Paper 1 Table of contents Why transition now? 1 Transition mechanisms 2 Transition phases 2 IPv6 transition challenges 3 Taking advantage of IPv6 benefits
More informationSystem Development and Life-Cycle Management (SDLCM) Methodology
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies the format and conventions to be used in developing
More informationEnd-to-End M2M and IoT Services
End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who
More informationAccelerate Private Clouds with an Optimized Network
Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization
More informationINTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)
INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners
More informationICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
More informationLecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren
Lecture 1: Course Introduction" CSE 222A: Computer Communication Networks Alex C. Snoeren Lecture 1 Overview" Class overview Expected outcomes Structure of the course Policies and procedures A brief review
More informationCCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
More informationTCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:
Due to the number of hardware possibilities for a network, there must be a set of rules for how data should be transmitted across the connection media. A protocol defines how the network devices and computers
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
More informationHMS Industrial Networks. Putting industrial applications on the cloud
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationIT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
More informationBONEMA TECHNOLOGIES PRODUCT FEATURES. The following training provides information on the Bonema product features.
BONEMA TECHNOLOGIES PRODUCT FEATURES The following training provides information on the Bonema product features. Real-time tracking Vehicle tracking relies both on the Global Positioning satellites (GPS)
More informationConference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING
Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future
More informationA NIMS Smart Practice
NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED
More informationShould and Can a Communication System. Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk
Should and Can a Communication System MSOffice1 Adapt Pervasively An Unofficial View http://san.ee.ic.ac.uk Erol Gelenbe www.ee.ic.ac.uk/gelenbe Imperial College London SW7 2BT e.gelenbe@imperial.ac.uk
More informationLecture 28: Internet Protocols
Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further
More informationLab 10.4.1 IP Addressing Overview
Lab 10.4.1 IP ing Overview Estimated time: 30 min. Objectives: Background: This lab will focus on your ability to accomplish the following tasks: Name the five different classes of IP addresses Describe
More informationcnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
More informationGigabit Multi-Homing VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband
More informationUPnP: The Discovery & Service Layer For The Internet of Things April 2015
UPnP: The Discovery & Service Layer For The Internet of Things April 2015 The First Chapter: The Connected Home In late 1999, the founding members of what would become the UPnP Forum started to put together
More informationFog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
White Paper Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn The Internet of Things (IoT) is generating an unprecedented volume and variety of data.
More informationChapter 2 Introduction
Chapter 2 Introduction This chapter describes the features of the NETGEAR 54 Mbps Wireless ADSL Modem Router Model DG834G. The Wireless ADSL Modem Router is a combination of a built-in ADSL modem, ADSL
More informationInterconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
More informationIP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
More informationWSNetServer User Manual. Date: July 13 2003
Date: July 13 2003 1 Revision History... 2 2 Introduction... 2 3 Installation... 2 4 Normal Operation... 2 4.1 Startup... 2 4.2 About Box... 3 4.3 Specifying The Cross Point XY Broadcast Port... 3 4.4
More informationSecuring end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
More informationNew Cloud Networking Enabled by ProgrammableFlow
New Cloud Networking Enabled by ProgrammableFlow NISHIHARA Motoo, IWATA Atsushi, YUN Su-hun WATANABE Hiroyuki, IIJIMA Akio, KANOH Toshiyuki Abstract Network virtualization, network programmability, and
More informationGigabit Content Security Router
Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationIntroduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
More informationUploading files to FTP server
V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications
More informationIPv6 Potential Routing Table Size
IPv6 Potential Routing Table Size Jason Schiller schiller@uu.net Sven Maduschke sven.maduschke@verizonbusiness.com IP Core Infrastructure Engineering Verizon Business Aggregation is Holy Grail IETF and
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationNetwork Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
More information