• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Signposts
 

Signposts

on

  • 219 views

 

Statistics

Views

Total Views
219
Views on SlideShare
213
Embed Views
6

Actions

Likes
0
Downloads
0
Comments
2

1 Embed 6

http://hh360.user.srcf.net 6

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Thanks Haris, I hope I did all your hard work justice
    Are you sure you want to
    Your message goes here
    Processing…
  • Very nice presentation. well done. Sorry I missed it.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Signposts Signposts Presentation Transcript

    • SignpostsTaking back the dark edges of the internetOpen Hardware, Software, Internet & Jobs Monday 11 March Heidi Howard hh360@cam.ac.uk
    • The good old days ... 45.204.13.2 53.128.123.2753.123.123.2 53.123.193.87 53.137.123.29 79.183.123.82 103.193.123.234
    • Todays reality... Firewall Box Box NATNAT Box Firewall NAT Firewall Box NAT Box NAT
    • my iPhoneThe ProblemDevice-device connectivity ispretty broken right now due tomiddleboxes at the edges ofthe internet my machine here at the lab
    • Existing SolutionsTechnical Centralised & 3rd Party- Dynamic DNS - Skype & Google talk- Port Forwarding - Dropbox, Google Drive,- uPnP Ubuntu One- STUN - iCloud- VPN - Remote Desktop- Iodine Software e.g. LogMeIn- NAT Punching - Email- Rendezvous - Facebook, Twitter- HTTP/SMTP proxyAlthough you can fix this with a range of tools, its very fiddly andcomplex to do so or the solutions are platform specific
    • ... and the Signpost Solution Signposts turn these technical solutions into tactics, it automates and manages the range of tactics to bring back this end-to-end dream Its a framework to manage the maze of tactics so its highly extensible Signposts point devices in the right direction to find each other
    • Signposts View of the Worlddesktop.heidi.signpost.io Heidis Signpost Server workmachine.heidi.signpost.io dark edge of dark edge of internet internet Internet dark edge of internet Now my devices all have their own domain names which they can use to refer to each other iphone.heidi.signpost.io
    • Signposts View of the World Heidis Signpost Server workmachine.heidi.signpost.io desktop.heidi.signpost.io Anils Signpost Server tablet.anil.signpost.io dark edge dark edge of internet of internet Internetmac.anil.signpost.io dark edge dark edge of internet of internet iphone.heidi.signpost.io desktop.anil.signpost.io laptop.heidi.signpost.io iphone.anil.signpost.io
    • Abstract away the internet edge laptoplaptop jon.signpost.io iphone heidi.signpost.io iphonedesktop anil.signpost.io mac Empower individuals to create their “own personal cloud” and regain desktop control of their digital footprint iphone
    • Your Personal Signpost Server● Each virtual personal cloud has a Signpost server, this has a public IP address● It maintains up-to date information on the whereabouts of all the devices in the users personal cloud● It has a set of policies which control sharing with other Signposts users● There is a persistent connection between the Signpost server and all devices in the users cloud● Whenever a device in the users cloud moves location or network, the Signpost server is notified
    • Making connections Heidis Signpost Serverdesktop.heidi.signpost.io workmachine.heidi.signpost.io ● The device that wants to initiate the connection performs an "effectful" DNS lookup of the domain name of the other device ● This DNS lookup is destined for the Signpost server of the other devices owner ● When the Signpost server receives this query, it creates a path between the devices and returns an IP address ● The two devices are now happily connected
    • Goal Of TacticsTo create a satisfactory connection between two end nodesthat meets the users requirements.Possible requirements include: ● Authentication ● Encryption ● Bi-directionality ● Anonymity ● Bypassing firewallsSignposts can also allow for constraints, such as batterylife, and price of network connections
    • Example - Syncing DirectoriesMy work machine My home machine Box NAT Firewall
    • Example - Video StreamingMy home machine
    • Example - Photo Sharing
    • The Project HomeSignposts is part of the OCaml Labs Projectwww.cl.cam.ac.uk/projects/ocamllabs/Signposts is Open Source & hosted on GitHubwww.github.com/crotsos/signpostdSome of the Signposts team that I would like to thank and probably embarrass
    • More information...Signpostswww.signpost.iochat to me or some of the other guys on thesignposts team