1 / 71

Internet of Things, Mobile Interent, and Cloud Computing

Internet of Things, Mobile Interent, and Cloud Computing. Xu Yongnan, PhD Network Architect Network Engineering Department Transaction Network Services. End Devices. Computers Desktops Notebooks Mobile Devices Tablets Phones Smart Devices Sensors RFIDs Human Being?.

bina
Télécharger la présentation

Internet of Things, Mobile Interent, and Cloud Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet of Things,Mobile Interent, and Cloud Computing Xu Yongnan, PhD Network Architect Network Engineering Department Transaction Network Services

  2. End Devices • Computers • Desktops • Notebooks • Mobile Devices • Tablets • Phones • Smart Devices • Sensors • RFIDs • Human Being?

  3. Network Accesses • Ethernet • Dial-up • DSL • Cable • Radio • Bluetooth • Wi-Fi • Cell • GPS

  4. Edge Networks • LAN (Local Area Network) • Computers • Information sharing • Wireless/Sensor Network (WSN) • Sensors and RFID tags • Monitoring environment/objects • RAN (Radio Access Network) • Mobile devices • Wireless communication

  5. ISP (Internet Service Provider) • POPs (Point of Presence) • Connect edge networks • Private Line (Layer 1) • Frame Relay/ATM (Layer 2) • MPLS (Layer 3) • Carrier Ethernet

  6. Carrier • Network Backbone • Interconnect ISPs’ POPs • NAPs (Network Access Point) • IXPs (Internet exchange point) • Peering • ISP to ISP at peering site • Interconnect networks to exchange traffic • Colocation • Host servers/services • Cloud Computing

  7. Cloud • Contents • Applications • Servers • Storage • Backup

  8. Internet

  9. Mobile Internet • Technologies • Cell • Wi-Fi • WiMAX • Services • Location: Social networking • Control: Internet of Things • Sharing: Cloud • OneAPI

  10. LTE(Long Term Evolution) • Motivated by mobile data usage and emergence of new applications • Expected to substantially improve end-user throughputs • Provide voice traffic as Voice over IP (VoIP) • New Enhanced Packet Core (EPC) network architecture • IP-based IMS (IP Multimedia Subsystem)

  11. Beyond 3G

  12. SS7 (Signaling System #7) • Address signaling transport of Public Switched Telephone Network (PSTN) • Provide call control, remote network management, and maintenance capabilities • Out-of-Band signaling • More data at higher speeds • Signaling during call • Short Message Service (SMS) • A/B/C/D: SSP (Service Switching Point) • • W/X/Y/Z: STP (Signal Transfer Point) • • L/M/P/Q: SCP (Service Control Point)

  13. Sensor • Measure physical environment • Convert to analog or digital signal • Transfer radio to networks • Applications • Temperature • Motion detection • Power consumption

  14. WSN(Wireless Sensor Network) • Distributed sensors to monitor environment • Sensors communicate to gateway and Internet • Networking Topologies • Star topology • Tree topology • Mesh network • Mobile Wireless Sensor Network

  15. RFID (Radio-Frequency Identification) • RFID tags – Smart objects • Use radio waves to identify objects • Microchips attached to antennas • Store serial numbers, for example, Electronic Product Code (EPC)

  16. RFID Tag

  17. RFID System • Reader sends out electromagnetic waves • Tag antenna tuned to receive these waves • Tag draws power from the field created by the reader • Antenna enables the chip to transmit identification to the reader • Reader converts radio waves from the tag to digital information • Reader passes on to network

  18. IoT(Internet of Things) • Smart objects • Not traditional computers • Readable, recognizable, locatable, addressable, controllable • Network of smart objects • Sensors • RFIDs • Wireless devices • Machine-to-Machine Communications (M2M)

  19. Applications layer Middleware layer Internet layer Access Networks Access Gateway layer Edge Technology layer RFID Network Architecture

  20. EPCglobal Network • Trading partner community captures, shares, and discovers EPC related data using EPCglobal certified standard • EPC Electronic Product Code (EPC) Identification scheme via RFID tags • RFID System RFID tags and RFID readers • EPC MiddlewareManages real-time event and information • EPC Information Services (EPC IS)Exchange EPC-related data with trading partners • Discovery Services Object Naming Service (ONS) enable users to find data related to a specific EPC

  21. IoT Applications • RFID and WSN solution • Transportation/Logistics • Manufacture/Consumer-electronics/Auto • Security/Smart buildings/Health care/Airports • Expansion driven by • Standardized tags • Tag and reader prices • Global radio-frequency regulations • Internet • Visibility and control • Asset-tracking and environment monitoing (closed-loop) • Supply-chain management (open-loop)

  22. Supply Chain

  23. Cloud Computing • Uses Internet to maintain data and run applications remotely • Increases efficient computing by centralizing software, applications, storage, memory, processing and bandwidth. ‘If you only need milk , would you buy a cow?'

  24. Architecture • Front end • Client computers • Applications to access cloud computing systems • Back end • Applications/Servers • Data storage • Back-up • Network • Internet

  25. How Cloud Computing Works

  26. Benefits • Increase • Capability • Capacity • Reduce • Investing new infrastructure • Training new personnel • Licensing new software • Share • Applications • Storage • Backup

  27. Categories • Private: owns file storage, backup, email and calendaring services, access to printers, document sharing, etc. • Provider: offers the same services through cloud service providers and delivers over Internet from remote data centers and paid for on a subscription basis • Hybrid: enables the benefits of owning your own server and the benefits of subscribing to cloud services

  28. Characteristics • On Demand • By computing time, by storage size, etc. • Flexibility • As much or as little wanted at any given time • Hosted • Managed by providers

  29. Models • Software-as-a-service(SaaS) • Provides software • Platform-as-a-service(PaaS) • Provide product development tool/API • Infrastructure-as-a-Service(IaaS) • Provide virtual computing power

  30. Storage and Backup • Local storage and backup • Store date with dedicated appliance or storage device • Backup data to a secondary data center • Cloud storage and backup • Ensure backup data stored securely offsite “in the cloud” at a backup provider’s data center • Hybrid approach for backup • Quick access to locally backed up data • Data is secure and available even in the event of a disaster

  31. Security • Client • Privacy (who/where/when) • Cell phone/Electronic money? • Client migrates from one cloud to another? • ISP and Carrier • Security? Not much! • MPLS VPN: virtual private routing/network • Content provider • Count on Cloud provider or protect themselves? • AAA (Authentication, authorization and Accounting) • Infrastructure Operator • Guaranteed availability • Connectivity options • Safety and security

  32. Risks • Dependency on network • Bandwidth issues • Difficulty Creating Hybrid Systems • Centralization • Data Integrity

  33. Concerns • Cloud service vendor goes out of business? • Who owns the data in cloud computing service? • Can cloud deny client access to client's data? • How will cloud computing affect other industries? • 15 % use cloud computing for low-risk services • 45% believes the risk outweighs the benefits • 26% doesn't expect to tap into the cloud at all

  34. Cloud (Performance)

  35. Telecom (Connectivity)

  36. Finance (Security) Transparent to the processor PSTN Dialup TNAC Acquirers’ Hosts TNIP VNAC SSL Cloud Network Internet/Mobile DAP TNSConnect INAC DAP VSP Decryption Appliance Merchant WAN Replication VSP Decryption Appliance Track data encrypted Administration Track data unencrypted via secured network Non-cardholder data VSP Remote Administration “In the Cloud” decryption – away from the merchant = minimal risk

  37. All in One • Thing-to-thing communications • Objects interact each other • Ad-hoc network • Thing-to-person communications • Objects/sensors report status and data • Wireless Radio Network • Person-to-Thing communications • Human accesses information/status • Cloud Computing/Access • Person-to-Person communications • Anytime and anywhere • Internet • Internet of Things/Cloud Computing/Internet

  38. Internet of People • Flows • Information flow • Object flow • People flow • Internet of People • Mobile device • Human-Implantable RFID? • Software agent?

  39. Thank You

  40. Technical Driver • Mobile Internet • 3G/4G • More wireless communications • Internet of Things • Improved distributed computing • Technologies to connect moving objects • Cloud Computing • Access to high-speed Internet • Innovations in virtualization

  41. Security Services • Confidentiality • Data integrity • Access Control • Authentication • Non-repudiation

  42. Security Technologies • Algorithms and Encryption • Fast chosen-plaintext attack against SSL 3.0 and TLS 1.0 • Decrypt authentication tokens embedded in HTTPS • Exploits work for major web browsers • Identity Management • Single Sign-on • Public Key Infrastructure • Firewall/VPN/SBC • IDS/IPS/DDoS

  43. Security Solutions • Applications Security • Database Security • Operating Systems Security • Network Security • Wireless Security

  44. Security Training • Academic vs. Professional • 2011 (ISC)2 Global Information Security Workforce Study • Cloud computing illustrates gap between technology implementation and skills necessary to provide security • Information Security Administrator/Analyst/Manager • Network Security Engineer/Architect • System Security Engineer/Architect • CISSP (Certified Information Systems Security Professional) • 10 domains • 6 hours exam • 5 years experience required

  45. Domain Name Registration • Registration of Domain Names • Hundreds of registrars or thousands of resellers • Verifies domain name available • Registrar registers domain names with a registry • Registrars may assist with building a Web site • Top-Level Domain Names • Over 270 top-level domain names • Country-code TLDs (ccTLDs) • Sponsored generic TLDs (gTLDs), such as .edu • Unsponsored generic TLDs (gTLDs), such as .com • Internationalized Domain Names (IDNs) • Represented by local language characters, such as 东南大学.edu

  46. Domain Name Resolution • Resolution Operation • 13 Root DNS servers • Peak loads of billions per day • 100 percent stability • Resolution process • www.example.com. • User types a domain name into a browser • Computer checks from right to left • local name server will check a root name server, a TLD name server and finally the name server for the domain name itself • Why not com.example.www? • Better/secure resolution solutions? • Private cloud?

  47. DNSSEC(Domain Name System Security Extension) • Making attacks detectable • Adding data origin authentication and data integrity • Signing by public key cryptography • Using chain of trust • Zone owners deploy DNSSEC in their zones • End users update resolvers to become security-aware

  48. New gTLD • Exciting new gTLD program • Expecting 300 to 1000 applications • Why New gTLDs? • Openness • Change • Innovation • Profitable business? • Security? Trust DNS domain?

  49. IPv6/IPsec • Internet Protocol v6, RFC 2460, in 1998 • 128 bit binary addressing represented by 8 groups of hex 2001:0001:0000:0000:00A1:0CC0:0AAB:397A • IPv6 intended to supplement, IPv6 tackles some of IPv4's shortcomings - most notably a limited amount of remaining addresses • IPsec built in. PKI required?

  50. IPv4 to IPv6 Migration • Content Driven • Parallel Infrastructure • Dual-Stack Content • 6-to-4 conversion • 4-to-6 conversion • Access or Client Driven • IPv6 Only with No Conversion • Dual-Stack • Dual-Stack with v4 NAT • Any Security impact in migration?

More Related