180 likes | 296 Views
Monitoring vehicles The potential and the challenge. Kohei OHTA. Introduction. Connect CARs with Internet Seamless connectivity Connect to World Connect to various personal equipments Many new technologies available MIPv6 Auto configuration Ad-hoc networking
E N D
Monitoring vehicles The potential and the challenge Kohei OHTA
Introduction • Connect CARs with Internet • Seamless connectivity • Connect to World • Connect to various personal equipments • Many new technologies available • MIPv6 • Auto configuration • Ad-hoc networking • Many NEW mobile applications for CARs • Road service • On-line customer service
Probe Car project • Develop new applications with car related information like • Velocity, Acceleration • GPS information • Winker status • Wiper status • Etc… How to collect these information?
Requirements for information collection from Cars • Security • Protect privacy information • Standardization • Naming • Common scheme and methods the various types of information • Transport protocol • Tough transport protocol under wireless environment • Efficiency • High resolution and row bandwidth transport
Security • There are many privacy sensitive information in cars • Geographical location • Velocity • Passengers • Etc • Strong security mechanism is required • Encryption • Authentication • Access control
Standardization • Naming • To support multi vendor environment, common scheme to specify a information item. • For example, we have to be able to access vehicle velocity from any vendor’s car with SAME method. • Transport • Simple and tough transport protocol is suitable for mobile wireless environment
Efficiency • Mobile wireless environment is worse than wired network • Connectivity is NOT guaranteed at all • There is less chance of stable connectivity • The bandwidth is often narrow • It is difficult to collect high resolution information in such environment • UDP is preferable to TCP • Effective aggregation for high resolution with less bandwidth under unreliable line
Applicability of SNMPv3 [1] • Information collection in TCP/IP is • Basic issue for network management • That is already existing • There are many management information for various networked devices and applications, router, switch, server, printer, and so on • Well standardized
SNMPv3 has • For Privacy • DES/AES encryption support • For authentication • Multiple user support • MD5/SHA1 digital signature • Key management • Different key management with single pass phrase • For access control • Allow access to iitsVehicleVelocity from center ADeny access to iitsLongitude from service center BDeny access to iitsLatude from service center B • Strandardization • Well standardized consistent naming scheme • .1.3.6.1.4.1.282.16.108.1.3.3.3 iitsVehicleVelocity • Transport • Connectionless UDP • Per packet authentication/encryption
Current configurations Information collection center Encrypted A IPv6 Information collection center Velocity B Logitude Latitude Defined as MIB in ASN.1 Winker Wiper status
Polling and Trap • There are two modes in SNMP to collect information • Polling is good to collect periodic data • Trap is good to notify a event
Manager Agent Name-1 Name-1 Name-n Name-n Value-1 Value-n null null Manager Agent 646213932 Response Get 1.3.6.4.1.282.16.107.2.1.1.3 For effectivenessSNMP Packet Payload
60 MOs/packet Current Method Manager Manager Query and response Query and response time Agent Agent Delay Name-(n-1) Name-2 Name-1 Value-1 Value-2 Value-n Responze Polling at small intervals time PDU SIZE = 60 * (length (Name) + length(Value)) Length(Name) = 12; length (Value) = 6 =60 * (12 + 6 ) = 1.08K bytes !!
Manager Agent Name-A null Manager Agent Val(t1+(n-2)I) Name-A Val(t1) Val(t1+I) t1 Val(t1+(n-1)I Name-A Value-A Response Get Responze t1,Val(t1),Val(t1+I),Val(t1+2I),….Val(t1+(n-1)I) Time-based (History) Aggregation MO MO: n values of ifInOctets.1 intervalI PDU SIZE ~ 60 * length(Value)) length (Value) = 6 ~60 * 6 = 360 bytes !!
For reliable information collection • Data collection with SNMP has been based on Polling • Mobile node is often disappeared from data collector because of the physical condition and occasional shadowing. • Data collector can not know and control the connectivity to mobile node. • Conventional polling based data collection no longer work well.