750 likes | 972 Views
Internet of Things, Mobile Interent, and Cloud Computing. Xu Yongnan, PhD Network Architect Network Engineering Department Transaction Network Services. End Devices. Computers Desktops Notebooks Mobile Devices Tablets Phones Smart Devices Sensors RFIDs Human Being?.
E N D
Internet of Things,Mobile Interent, and Cloud Computing Xu Yongnan, PhD Network Architect Network Engineering Department Transaction Network Services
End Devices • Computers • Desktops • Notebooks • Mobile Devices • Tablets • Phones • Smart Devices • Sensors • RFIDs • Human Being?
Network Accesses • Ethernet • Dial-up • DSL • Cable • Radio • Bluetooth • Wi-Fi • Cell • GPS
Edge Networks • LAN (Local Area Network) • Computers • Information sharing • Wireless/Sensor Network (WSN) • Sensors and RFID tags • Monitoring environment/objects • RAN (Radio Access Network) • Mobile devices • Wireless communication
ISP (Internet Service Provider) • POPs (Point of Presence) • Connect edge networks • Private Line (Layer 1) • Frame Relay/ATM (Layer 2) • MPLS (Layer 3) • Carrier Ethernet
Carrier • Network Backbone • Interconnect ISPs’ POPs • NAPs (Network Access Point) • IXPs (Internet exchange point) • Peering • ISP to ISP at peering site • Interconnect networks to exchange traffic • Colocation • Host servers/services • Cloud Computing
Cloud • Contents • Applications • Servers • Storage • Backup
Mobile Internet • Technologies • Cell • Wi-Fi • WiMAX • Services • Location: Social networking • Control: Internet of Things • Sharing: Cloud • OneAPI
LTE(Long Term Evolution) • Motivated by mobile data usage and emergence of new applications • Expected to substantially improve end-user throughputs • Provide voice traffic as Voice over IP (VoIP) • New Enhanced Packet Core (EPC) network architecture • IP-based IMS (IP Multimedia Subsystem)
SS7 (Signaling System #7) • Address signaling transport of Public Switched Telephone Network (PSTN) • Provide call control, remote network management, and maintenance capabilities • Out-of-Band signaling • More data at higher speeds • Signaling during call • Short Message Service (SMS) • A/B/C/D: SSP (Service Switching Point) • • W/X/Y/Z: STP (Signal Transfer Point) • • L/M/P/Q: SCP (Service Control Point)
Sensor • Measure physical environment • Convert to analog or digital signal • Transfer radio to networks • Applications • Temperature • Motion detection • Power consumption
WSN(Wireless Sensor Network) • Distributed sensors to monitor environment • Sensors communicate to gateway and Internet • Networking Topologies • Star topology • Tree topology • Mesh network • Mobile Wireless Sensor Network
RFID (Radio-Frequency Identification) • RFID tags – Smart objects • Use radio waves to identify objects • Microchips attached to antennas • Store serial numbers, for example, Electronic Product Code (EPC)
RFID System • Reader sends out electromagnetic waves • Tag antenna tuned to receive these waves • Tag draws power from the field created by the reader • Antenna enables the chip to transmit identification to the reader • Reader converts radio waves from the tag to digital information • Reader passes on to network
IoT(Internet of Things) • Smart objects • Not traditional computers • Readable, recognizable, locatable, addressable, controllable • Network of smart objects • Sensors • RFIDs • Wireless devices • Machine-to-Machine Communications (M2M)
Applications layer Middleware layer Internet layer Access Networks Access Gateway layer Edge Technology layer RFID Network Architecture
EPCglobal Network • Trading partner community captures, shares, and discovers EPC related data using EPCglobal certified standard • EPC Electronic Product Code (EPC) Identification scheme via RFID tags • RFID System RFID tags and RFID readers • EPC MiddlewareManages real-time event and information • EPC Information Services (EPC IS)Exchange EPC-related data with trading partners • Discovery Services Object Naming Service (ONS) enable users to find data related to a specific EPC
IoT Applications • RFID and WSN solution • Transportation/Logistics • Manufacture/Consumer-electronics/Auto • Security/Smart buildings/Health care/Airports • Expansion driven by • Standardized tags • Tag and reader prices • Global radio-frequency regulations • Internet • Visibility and control • Asset-tracking and environment monitoing (closed-loop) • Supply-chain management (open-loop)
Cloud Computing • Uses Internet to maintain data and run applications remotely • Increases efficient computing by centralizing software, applications, storage, memory, processing and bandwidth. ‘If you only need milk , would you buy a cow?'
Architecture • Front end • Client computers • Applications to access cloud computing systems • Back end • Applications/Servers • Data storage • Back-up • Network • Internet
Benefits • Increase • Capability • Capacity • Reduce • Investing new infrastructure • Training new personnel • Licensing new software • Share • Applications • Storage • Backup
Categories • Private: owns file storage, backup, email and calendaring services, access to printers, document sharing, etc. • Provider: offers the same services through cloud service providers and delivers over Internet from remote data centers and paid for on a subscription basis • Hybrid: enables the benefits of owning your own server and the benefits of subscribing to cloud services
Characteristics • On Demand • By computing time, by storage size, etc. • Flexibility • As much or as little wanted at any given time • Hosted • Managed by providers
Models • Software-as-a-service(SaaS) • Provides software • Platform-as-a-service(PaaS) • Provide product development tool/API • Infrastructure-as-a-Service(IaaS) • Provide virtual computing power
Storage and Backup • Local storage and backup • Store date with dedicated appliance or storage device • Backup data to a secondary data center • Cloud storage and backup • Ensure backup data stored securely offsite “in the cloud” at a backup provider’s data center • Hybrid approach for backup • Quick access to locally backed up data • Data is secure and available even in the event of a disaster
Security • Client • Privacy (who/where/when) • Cell phone/Electronic money? • Client migrates from one cloud to another? • ISP and Carrier • Security? Not much! • MPLS VPN: virtual private routing/network • Content provider • Count on Cloud provider or protect themselves? • AAA (Authentication, authorization and Accounting) • Infrastructure Operator • Guaranteed availability • Connectivity options • Safety and security
Risks • Dependency on network • Bandwidth issues • Difficulty Creating Hybrid Systems • Centralization • Data Integrity
Concerns • Cloud service vendor goes out of business? • Who owns the data in cloud computing service? • Can cloud deny client access to client's data? • How will cloud computing affect other industries? • 15 % use cloud computing for low-risk services • 45% believes the risk outweighs the benefits • 26% doesn't expect to tap into the cloud at all
Finance (Security) Transparent to the processor PSTN Dialup TNAC Acquirers’ Hosts TNIP VNAC SSL Cloud Network Internet/Mobile DAP TNSConnect INAC DAP VSP Decryption Appliance Merchant WAN Replication VSP Decryption Appliance Track data encrypted Administration Track data unencrypted via secured network Non-cardholder data VSP Remote Administration “In the Cloud” decryption – away from the merchant = minimal risk
All in One • Thing-to-thing communications • Objects interact each other • Ad-hoc network • Thing-to-person communications • Objects/sensors report status and data • Wireless Radio Network • Person-to-Thing communications • Human accesses information/status • Cloud Computing/Access • Person-to-Person communications • Anytime and anywhere • Internet • Internet of Things/Cloud Computing/Internet
Internet of People • Flows • Information flow • Object flow • People flow • Internet of People • Mobile device • Human-Implantable RFID? • Software agent?
Technical Driver • Mobile Internet • 3G/4G • More wireless communications • Internet of Things • Improved distributed computing • Technologies to connect moving objects • Cloud Computing • Access to high-speed Internet • Innovations in virtualization
Security Services • Confidentiality • Data integrity • Access Control • Authentication • Non-repudiation
Security Technologies • Algorithms and Encryption • Fast chosen-plaintext attack against SSL 3.0 and TLS 1.0 • Decrypt authentication tokens embedded in HTTPS • Exploits work for major web browsers • Identity Management • Single Sign-on • Public Key Infrastructure • Firewall/VPN/SBC • IDS/IPS/DDoS
Security Solutions • Applications Security • Database Security • Operating Systems Security • Network Security • Wireless Security
Security Training • Academic vs. Professional • 2011 (ISC)2 Global Information Security Workforce Study • Cloud computing illustrates gap between technology implementation and skills necessary to provide security • Information Security Administrator/Analyst/Manager • Network Security Engineer/Architect • System Security Engineer/Architect • CISSP (Certified Information Systems Security Professional) • 10 domains • 6 hours exam • 5 years experience required
Domain Name Registration • Registration of Domain Names • Hundreds of registrars or thousands of resellers • Verifies domain name available • Registrar registers domain names with a registry • Registrars may assist with building a Web site • Top-Level Domain Names • Over 270 top-level domain names • Country-code TLDs (ccTLDs) • Sponsored generic TLDs (gTLDs), such as .edu • Unsponsored generic TLDs (gTLDs), such as .com • Internationalized Domain Names (IDNs) • Represented by local language characters, such as 东南大学.edu
Domain Name Resolution • Resolution Operation • 13 Root DNS servers • Peak loads of billions per day • 100 percent stability • Resolution process • www.example.com. • User types a domain name into a browser • Computer checks from right to left • local name server will check a root name server, a TLD name server and finally the name server for the domain name itself • Why not com.example.www? • Better/secure resolution solutions? • Private cloud?
DNSSEC(Domain Name System Security Extension) • Making attacks detectable • Adding data origin authentication and data integrity • Signing by public key cryptography • Using chain of trust • Zone owners deploy DNSSEC in their zones • End users update resolvers to become security-aware
New gTLD • Exciting new gTLD program • Expecting 300 to 1000 applications • Why New gTLDs? • Openness • Change • Innovation • Profitable business? • Security? Trust DNS domain?
IPv6/IPsec • Internet Protocol v6, RFC 2460, in 1998 • 128 bit binary addressing represented by 8 groups of hex 2001:0001:0000:0000:00A1:0CC0:0AAB:397A • IPv6 intended to supplement, IPv6 tackles some of IPv4's shortcomings - most notably a limited amount of remaining addresses • IPsec built in. PKI required?
IPv4 to IPv6 Migration • Content Driven • Parallel Infrastructure • Dual-Stack Content • 6-to-4 conversion • 4-to-6 conversion • Access or Client Driven • IPv6 Only with No Conversion • Dual-Stack • Dual-Stack with v4 NAT • Any Security impact in migration?