Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
00s : All is a digital, fluid & live stream distributed over networks
Nomadic user, virtual presence (user or sw/content move), Virtual Machine & JavaBeans Ubiquitous IT (networked planet grid) & Mobile computing infrastructure (Xeo satellites)
Software
Content
Individuals
end-user Profile, smart card software object, Agent Application, Service Telephone, Set Top Box, PDA PC, Server, Printer Trusted Third Party Router, Switch Home Network, Local Network Virtual Private Network for Businesses, Internet
Communicating, autonomous, configurable, mobile, automatically plugged ENTITIES onto an interoperable secured, Plug & Play, scaleable dynamically INFRASTRUCTURE, All being distributedly managed by various Actors, according several point of view
Feb-02 4
Multimedia Hyperdocument
Mobile/fix, wired/wireless
Extra/Inter/Intranet
Mobile Terminals Network Computers
Interface : XML Protocol: IP
New Services & Usage
biometric Authentication Adaptive & multi-modal Human Interface Speech recognition Adaptability & customization of applications according terminal configuration & end-users Feb-02 services
Java Applet
New Services
Indexation by content Protection of digital Objects Navigation, Search engine information filtering
System Architecture
distribution & services: M2M, P2P Middleware, XML, Corba & mobile Code
Content
Feb-02
Communication
Properties
6
Bluetooth
Ad hoc
IEEE802.11
Access / Intermediation
IPv6
Core Network
UMTS
Feb-02
Common challenges to be solved: . Plug & play . Configurability . Management . Quality of Service . Upgradeability . Adaptability . Security, privacy . Stability, safety . Costs
Mobiles
More Heterogeneity
No Esperanto : W-Corba, JavaRMI, J2EE, agents, do not fit M2M (middleware to middleware) Selectivity, Resource management,
Global Roaming
8
Feb-02
Dynamic Links :
heterogeneity & mobility
WAP
GSM
More Dynamicity
Policy, Traffic,
Opportunities, locations, context, resource
Global Handover
9
Feb-02
Achilles
Barbara
VoIP, "QoS" real time, critical flows, audio-video streaming Content processing (searching, watermarking, )
Feb-02
QoS
10
Key technology Cellular Mobile Telecommunications, Mobility, roaming Internet, Data Grid, Cache Architecture 11 Satellite, Broadcast
Dedicated Infrastructure
Need of Global Interoperability & Roaming For "Beyond 3G networks", Routes do not exist any more The OSI model is no more "the" reference
Feb-02
13
Potential solution
Virtualization
Openness Hw Trivial (not simple !) & Sw Virtual
Technological issues
Complexity reduction Software engineering does not follow
Feb-02 14
Management
subsidiarity
Orientation
Open Network (Next seism in Computing & networking) Software radio, software Terminal, "Software Network" : Ad hoc & Active Networks New Architectures : P2P, M2M,
Feb-02
15
Convergence :
Virtualization & Externalization
Wireless
Mobility & autonomy Adaptation, Configurability
Depending of the context
Ambient Networks
Embedded Internet, Desegregating terminals Disappearing computing, pervasive computing
ubiquity of access communicating objects and devices remote work (medicine, surgery)
Augmented reality
Conclusions
Convergence / Divergence dialectic
Merging wired & wireless
high date rate core networks diversity of access to the network
Decentralization
Network
Management of Space & I/O Semantic : Store & Forward
Bandwidth
PC & Server
Mips & Gigabytes
Bottleneck : I/O
1000 x
10,000
100
2x/18 months
97
99
01
03
05
07
Feb-02
19
Personalization
Mobility Localization
Feb-02
Ambience Contextualization :
communication infrastructure, equipment, environment
20
Tomorrow
Multi-service/client-server Network
Portal Servers
Content
Data/IP Networks
PSTN/ISDN
Mobile Internet
CATV
PLMN
Clients
From Ericsson 21
Feb-02 Devices
Communication Providers
Services
22
Quality of Service
QoS defined by UIT-T E.800 norm
Ease of use
Accessibility
Security Integrity
Feb-02
23
INFORMATION DOCUMENTS
Sensors Actuators
Synthesis
Sensors& Actuators
Feb-02
24
Knowledge networks
who knows what => Knowledge Management
Information networks
who informs what => la Internet
Work networks
who works where => GroupWare
Competency networks
what is where => Knowledge with time and space
Inter-organizational network
organizational linkages => Semantic Interoperability
Feb-02
25
PAN-Bluetooth-WLan-UMTS-Internet
permanent links through IPv6 As spaces become intelligent individual's infospheres grow, changes occur in the and in which people are embedded. Infospheres : circles interaction : bold lines knowledge network : dashed line
Feb-02 26
Dynamic
Presentation
Multimode Browser & Players Between TCP & UDP, there are thousands of upper transport protocols
Active Networks : computation within Nodes Ad hoc Networks : moving nodes, No fix Routes Turbocode Wireless & Optics
27
Session
Transport
Network
Link
Physics
Feb-02
Communication Infrastructure :
Client-server is dead =>Policy Aware Networks
A: client
B: server
28
Execution Environment
EE 1 Java
(Capsule)
EE 2
(IPv4)
EE 3
(IPv6)
EE 4 Asm
Intel
NodeOS
Router
Feb-02
29
Dfinir une interface (API) de programmation des rseaux Un rseau programmable est un rseau de transmission de paquets ouvert et extensible disposant d'une infrastructure ddie l'intgration et la mise en uvre rapide de nouveaux services Rseau extensible qui offre des facilits pour changer dynamiquement son comportement (tel quil est peru par lusager)
Ouvrir le rseau Virtualiser les composants Configurer dynamiquement Le Rseau devient une machine virtuelle programmable
Feb-02 30
Active Networks
To keep the Network proprietary ! over an Open Infrastructure To distribute intelligence within the Network DiffServ is a straightforward Active Network !
The Java Packet program is a constant (flow header)
Application
Presentation
Session
Transport
Network
Application
Link
More to come
Filtering,
Feb-02 Physics
31
Some Issues
Service discovery Spectrum coexistence Management Security
Feb-02
32
Ad hoc Networks
Each node can be a router and/or a terminal
Astrid cannot talk to Charlotte (hidden nodes) Basil : potential collisions
Radio range
Feb-02
33
Ad hoc Networks
No more Routes No more Topology Blind search Search with Reminiscence
Application
Presentation
Session
Transport
Network
Link
Physics
Feb-02
34
From top to bottom and from A to B Seven layers model: isotropic, no time and space Homology to win interoperability Vertical software engineering To shred any content into packets, datagrams, frames, and finally bits We ignore content semantics
Feb-02 35
message
emission
Shannon Formula (1948)
C = B log2(1 + q)
Received signal-to-noise power ratio Bandwidth, Hz Channel Capacity, bit/s
The capacity to transmit error-free information is proportional to B, for q = const. Notes Special coding required that may not work with interactive communications Shannon says nothing about the code Isolated system assumed
Property of Ryszard.Struzak@ties.itu.int
reception
Feb-02
30
36
Feb-02
38
Challenges
Years 2001
Distorting reality prism with
Internet (asynchronous messages & meshes of routers) and GSM (voice content & cellular architecture with Base stations)
Building alibis
Ontologies are moving in these virtual spaces Identification and then confirming their existence in a defined location using alibis
Feb-02 39
Main threat
Denial of service for a long time with multiple accidental coincidences
Basic security
Audit, accountability (identification & authentication)
Feb-02 40
WAP security
SSL/TLS/LIPKEY
Articulation : distributed security Infrastructure IPsec IKE/ISAKMP BitStream Ciphering A lot of standard solutions Utilization often complex One protocol does not eliminate all the threats
Feb-02
XML
Network Boundary IP
Route Security
42
Buyer
1100101001010101000011
Seller
0101100 1100101001010
1011000011101001
payment
Bank
Intelligent : can be adjusted and personalized
Feb-02
43
Alibis
are trusted relationships between the infrastructure, S & O E.g. : the individual is going to sign with the station base that he/she was present in this cell
Feb-02 44
Feb-02
45
Object traceability
Trust model
Content security (end-to-end) Container security (depending upon operator, Internet, etc)
Historical signature
Digital signature of the content : integrity Digital signature of the traces
Labeling, watermarking Ephemeral watermarking
Feb-02
46
Authentication
Of the scene:
to exchange a secret with someone that we will see again
Audit
History of the objects /subjects trajectory Ephemeral watermarking
Data Protection
Both Cryptography & steganography
Feb-02 47
The expression of the constraints (QoS, Security, mobility, interoperability) must be incarnate and instantiate through
The network architecture The protocol specification The applications Some expressions will be through markers
In a clear world
Feb-02
48
Master-slave
WLAN
Hierarchical
Cellular networks
Semantics of protocols
Oligarchic
PKIs
Architectures of Applications
Client server architecture model
Audrey & Basil are living in an isotropic world Producer & consumer of content
Administration
management : very often a bureaucracy
Others
Feb-02 49
Metacomputation: grid
Swarm of computers (10 6) running one single application
Dialectic of usages
Feb-02 50
Intelligence everywhere
Inside the network Network have a better throughput Capillarity larger & larger
Secret contents
Delivery Content Network (DCNs), Storage Area Networks Flood the network with machines able to compute secrets
Secret Content Networks : huge repository of keys
Feb-02 51
Conclusion
Lurbanisation des systmes de communication
Ubiquit, universalit Complexit : Structure, Architecture, Urbanisme
La complexit projete dans lurbanisme, larchitecture, les protocoles, les extrmits et la subsidiarit (management rparti)