ning kong china internet network information center the 9 th cjk n-id meeting in beijing 2009.7.22

28
Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Upload: rosaline-byrd

Post on 27-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Ning Kong

China Internet Network Information Center

The 9th CJK N-ID Meeting in Beijing2009.7.22

Page 2: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

OutlineIntroductionRelated WorkThe Properties of the RA-IOTThe Model of the RA-IOTThe Universal Resource Addressing SystemExperimentsConclusionReferences

Page 3: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

IntroductionRadio Frequency Identification (RFID) is an

automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders [1].

The internet reports 2005 "The Internet of Things (IOT)" of the International Telecommunication Union takes a look at the next step in "always on" communications, in which new technologies like RFID and smart computing promise a world of networked and interconnected devices.

Page 4: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

IntroductionThe IOT has the similar requirement of the

resource addressing as the Internet. The properties of the IOT make the

differences between the Resource Addressing in the IOT (RA-IOT) and that in the Internet.

There are multiple Product Code Standards (PCSs) in the IOT, and they will cause the conflict of the resource addressing.

Page 5: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

IntroductionIn this paper, we present a new model

supporting any PCS for the RA-IOT, and develop a Universal Resource Addressing System (URAS) based on the model.

By testing the performance, the URAS can effectively resolve the above problem.

Page 6: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Related WorkEPCglobal puts forward the Object Name Service

(ONS) [4], which makes use of the Domain Name System (DNS) protocol [5] to realize the RA-IOT.

The main design idea is to first encode the Electronic Product Code (EPC) into a Fully Qualified Domain Name (FQDN), then to use the existing DNS infrastructure to query for additional information. This procedure makes use of the Name Authority Pointer (NAPTR) DNS record [6], which is also used by E.164 NUmber Mapping (ENUM) [7].

The ONS can only support the EPC standard.

Page 7: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Related WorkUbiquitous ID Center (uID Center) brings

forward the analogous resource addressing service named uCode Resolution Protocol (uCodeRP) [8], which also utilizes the protocol similar to DNS.

The uCodeRP can also support only one uCode standard.

Existing technologies of the RA-IOT can only support single PCS. So far, there is no proper model or system for the RA-IOT to support multiple PCSs.

Page 8: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The properties of the RA-IOTThe resource name, the resource address and

the mechanism of resource addressing are the three key components of the resource addressing.

We summarize the properties of the RA-IOT by analyzing the three key components.

Page 9: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The properties of the RA-IOTDefinition 1: The Inexplicability property (I-

property) refers to the structure of the resource name cannot be accurately acquired by the corresponding Resource Addressing System (RAS).

Definition 2: The Apprehensibility property (A-property) refers to the structure of the resource name can be accurately acquired by the corresponding RAS.

Definition 3: The Decentralization property (D-property) refers to the structure of the resource name is not unified in terms of the namespace of the RAS.

Page 10: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The properties of the RA-IOTDefinition 4: The Unity property (U-property)

refers to the structure of the resource name is unified in terms of the namespace of the RAS.

Definition 5: The NRAI refers to the information used to transform the I-property into the A-property.

Definition 6: The ERAI refers to the information used to transform the D-property into the U-property.

The mechanism of the RA-IOT should provide not only the Function of the Resource Addressing (FRA), but also the Function of the Resource Transformation (FRT) of the ORN into the CRN.

Page 11: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOTRAI m (N-2)

ORN (N-1) CRN (N-1)

RAL N-1

The GLM of the resource addressing in the IOT

RAS (N-1)RAIs m (N-1)

… … … … … … … … … … … … … … … … … … … … … … … … …

RAI 1 (N-1)ORN (N) CRN 1(N)

RAL NRAS (N)

RAIs 1 (N)

RAI 2 (N-1)ORN (N) CRN 2(N)

RAS (N)RAIs 2 (N)

RAI m (N-1)ORN (N) CRN m(N)

RAS (N)RAIs m (N)

… … … … … … … … … … … … … … … … … … … … … … … … …

RAI m1 (N)ORN (N+1) CRN m1(N+1)

RAS (N+1)RAIs m1 (N+1)

RAI m2 (N)ORN (N+1) CRN m2(N+1)

RAS (N+1)RAIs m2 (N+1)

RAI mm (N)ORN (N+1) CRN mm(N+1)

RAS (N+1)RAIs mm (N+1)

RAL N+1

Based on the properties of the RA-IOT , we put forward the General Layered Model (GLM) of the RA-IOT based on the Layered Iteration Model (LIM) [9] of that in the Internet.

The GLM in the IOT contains several Resource Addressing Layers (RALs).

Page 12: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOTWe define the resource name and the resource

address of the Nth RAL in the Internet as RN and DN. (1) (2)

We define the FRA of the Nth RAL in the Internet as ASN. (3)

Then the LIM in the Internet can be represented by the following expression.

(4)

},,,,,{ 21 kjR RRRRNameSpace N

},,,,,{ 21 kjD DDDDNameSpace N

)( 1 NN RN

D NameSpaceASNameSpace

)))))(((...(( 121KN R

KKNNND NameSpaceASASASASASNameSpace

Page 13: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOTWe define the ORN, the CRN and the resource

address of the Nth RAL in the IOT as ON, CN and DN. (5) (6) (7)

We define the FRT of the ORN into the CRN of the Nth RAL in the IOT as TSN. (8) (9)

(10)

},,,,,{ 21 kjO OOOONameSpace N

},,,,,{ 21 kjC CCCCNameSpace N

},,,,,{ 21 kjD DDDDNameSpace N

),( 1 NNN DON

C NameSpaceNameSpaceTSNameSpace

NNN CDDN NameSpaceNameSpaceNameSpaceTS 11 ),(

NNN COON NameSpaceNameSpaceNameSpaceTS ),(

Page 14: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOTWe define the FRA of the Nth RAL in the IOT

as ASN. (11)

Then the GLM in the IOT can be represented by the following expression.

(12)

)( NN CN

D NameSpaceASNameSpace

))))))))),((,(((...,(

(,((

1

11112

11

KK

KN

NN

DOKK

OKKN

ONN

ONN

D

NameSpaceNameSpaceTSASNameSpaceTSASASNameSpace

TSASNameSpaceTSASNameSpace

Page 15: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOTTheorem: The GLM in the IOT is the extended

model of the LIM in the Internet, and the LIM in the Internet is the specific model of the GLM in the IOT.We prove the theorem 1 as follows. We firstly

assume the OK has the A-property and the U-property, so it can be directly used as the input of the RAS (K). Then the DK-1 is empty. We further assume every ORN in the RAL lower than the RAL (K) is empty.

(13) (14)

1KDNameSpace

))))))))),((,(

((...,((

,(()12(

1

111211

KK

N

NN

OKK

O

KKNO

NN

ONN

D

NameSpaceTSASNameSpace

TSASASNameSpaceTSAS

NameSpaceTSASNameSpace

Page 16: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOT (15) (16)

(17) (18)

(19)

NN OON NameSpaceNameSpaceTS ),(

))))))))(,((

(......,((

,(()14(

1

1

1

1211

KK

N

NN

OK

OK

KNO

NN

ONN

D

NameSpaceASNameSpaceTS

ASASNameSpaceTSAS

NameSpaceTSASNameSpace

)1( NJKNameSpace JY

))))))))(,((

(...,((

,(()16(

11

211

K

N

OKKK

NNN

NND

NameSpaceASTSAS

ASTSAS

TSASNameSpace

11 ),( NN DDN NameSpaceNameSpaceTS

Page 17: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The Model of the RA-IOT (20)

(21) (22)

Then we make the process of the deduction from the GLM in the IOT to the LIM in the Internet. By the similar way, we can make the process of the deduction from the LIM in the Internet to the GLM in the IOT. Then theorem is proved.

The GLM in the IOT shows the rule of the RA-IOT, and can support us to develop the appropriate RAS in the IOT.

)))))(((...

(()18(

12

1

K

N

OKKN

NND

NameSpaceASASAS

ASASNameSpace

KK RO NameSpaceNameSpace

)))))(((......

(()20(

12

1

K

N

RKKN

NND

NameSpaceASASAS

ASASNameSpace

Page 18: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemIn order to enable the URAS to support any PCS,

we must uniquely identify every PCS. We define the Identifier of PCS (IPCS) as follows.Definition 7: The IPCS refers to the unique

identifier for each PCS.The Object Identifier (OID) [10] is one kind of the

IPCS. ISO/IEC uses it to identify all of the PCSs except EPC standard.

If the IPCS can identify each type of every PCS, we name this kind of IPCS as the Fine-grained IPCS (F-IPCS); otherwise we named it as the coarse-grained IPCS (C-IPCS).

Page 19: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemThe descriptive mechanism for RAI

In order to enable the RAI of the URAS can be automatically used by the FRT, we design the Descriptive Mechanism for RAI (DM4RAI) based on the regular expressions.

The ERAI can be expressed as follows. (31) (32)

We design three Descriptive Mechanisms for the NRAI (DM4NRAI): the Simple DM4NRAI (S-DM4NRAI), the Centralized DM4NRAI (C-DM4NRAI) and the Distributed DM4NRAI (D-DM4NRAI).

!0\._$!*^.!_Pr ExtendedStringERAIefix !_.0$!\*^.!_ ExtendedStringERAIPostfix

Page 20: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemThe S-DM4NRAI.

The S-DM4NRAI is applicable to the F-IPCS. The S-DM4NRAI only needs one expression to describe its corresponding NRAI. It can be expressed as follows.

(33)!\....\.})$!\_(.{

})..._})...(.{2_(.{

})1_(.{^!_4_

KJINLength

MLengthLength

LengthExpressionNRAIDMS

Page 21: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemThe C-DM4NRAI.

The C-DM4NRAI is applicable to the C-IPCS. The C-DM4NRAI needs several expressions to describe its corresponding NRAI. One of them can be expressed as follows.

(34)

!\....\.})$!\_(.{

})..._})...(.{2_(.{

})1_(.{^!_4_

KJINLength

FieldClassLength

LengthExpressionNRAIDMC

Page 22: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemThe D-DM4NRAI.

The D-DM4NRAI is also applicable to the C-IPCS. The D-DM4NRAI firstly needs one expression to fetch the class field from the product code.

(35)

!})$!\_})...(.{_})...(.{2_(.{})1_(.{^!_4_

INLengthILengthLengthLengthExpressionNRAIDMD

Page 23: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

The universal resource addressing systemWe design the architecture of the URAS

which enables the three DM4NRAI as follows.

IPCS FRT

Product Code

URAS

FRA

RAI4IPCS

RAI4PC

The RAL for the Product Code

Default RAI

Figure. The architecture of the URAS in the IOT

Page 24: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Experimentswe evaluate the performance of URAS with the

three DM4NRAI. The following experiments were conducted on a

Pentium IV 2.4GHZ computer with 512MB main memory running Linux 2.4.21-4.EL and BIND 9.3.2 as the server, and a Pentium D 3.4GHZ computer with 1G main memory running Windows Vista as the client. All algorithms were implemented in Java by using Sun’s JDK version 6.

The datasets used were generated randomly, containing 5000, 10000, 50000, and 100000 mRFID Codes.

Page 25: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

ExperimentsThe result of the experiments is given as

follows. The unit of time in the data is second.

SumType

5,000 10,000 50,000 100,000

S-DM4NRAI 24.35 39.19 192.90 357.20

C-DM4NRAI 29.03 54.66 252.46 504.88

D-DM4NRAI 40.69 93.94 396.37 673.140

200

400

600

800

5,000 10,000 50,000 100,000S-DM C-DM D-DM

Table. The data of the performance testFigure. The performance comparisons for the three DM4NRAI

Page 26: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

ConclusionThe URAS based on the GLM can support any

PCS for the RA-IOT. Actually, the GLM can provide better support for some type of resource addressing in the Internet, such as the ENUM.

The GLM can promote new type of resource addressing in the IOT or in the Internet.

Page 27: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

References [1] J. Landt, “The history of RFID”, Journal, IEEE Potentials, USA, Oct.-Nov. 2005, pp. 8-11.

[2] M. Roberti, “RFID: The cost of being smart”, Online, Sep. 2003.

[3] ITU, The Internet of Things, ITU, Geneva, 2005.

[4] EPCglobal Inc, Object Name Service (ONS) Version 1.0, EPCglobal, US, Oct.2005.

[5] P. Albitz and C. Liu, DNS and BIND, 4th ed. O’Reilly & Associates, 2001.

[6] M. Mealling and R. Daniel, The Naming Authority Pointer (NAPTR) DNS Resource Record, RFC 2915, IETF, September 2000.

[7] P. Faltstrom, “E.164 number and DNS”, IETF RFC2916, September 2000.

[8] Koji Minegishi, On ucode Resolution Server Connection Tests, TRONWARE, 2003, V.84, PP. 71-73.

[9] Li Xiaodong, Research on Computer Network Resources Naming and Addressing Technologies, Ph D dissertation, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, 2003.

[10] ISO/IEC. ISO/IEC 9834-1:2005 Information technology -- Open Systems Interconnection -- Procedures for the operation of OSI Registration Authorities: General procedures and top arcs of the ASN.1 Object Identifier tree. 2005.

Page 28: Ning Kong China Internet Network Information Center The 9 th CJK N-ID Meeting in Beijing 2009.7.22

Thank You & Questions