Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Overview of Windows Vista Devices and Windows Communication Foundation (WCF)

1,117 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Overview of Windows Vista Devices and Windows Communication Foundation (WCF)

  1. 2. The Windows Communication Foundation Jorgen Thelin Connected Systems Division Microsoft Corporation [email_address]
  2. 3. The Imperative to Connect MOBILE EMPLOYEES CUSTOMERS MOBILE EMPLOYEES CUSTOMERS
  3. 4. What We Heard From People “ What API should I use?” “ How do I build service-oriented systems?” “ How can I send messages securely & reliably?” “ How do I develop interoperable applications?”
  4. 5. Windows Communication Foundation The Unified Programming Model For Rapidly Building Service-Oriented Applications
  5. 6. Windows Communication Foundation INTEROPERABILITY PRODUCTIVITY SERVICE-ORIENTED DEVELOPMENT <ul><li>Broad Support for WS-* specifications </li></ul><ul><li>Compatible with existing MS distributed application technologies </li></ul><ul><li>Unifies today’s distributed technologies </li></ul><ul><li>Attribute-based development </li></ul><ul><li>Visual Studio 2005 integration </li></ul><ul><li>Enables development of loosely-coupled services </li></ul><ul><li>Config-based communication </li></ul>
  6. 7. PRODUCTIVITY
  7. 8. Unified Programming Model Interop with other platforms ASMX Attribute- Based Programming Enterprise Services WS-* Protocol Support WSE Message- Oriented Programming System.Messaging Extensibility Location transparency .NET Remoting Unified Programming Model
  8. 9. <ul><li>WCF extends the .NET Framework </li></ul><ul><li>Services are built in Visual Studio 2005 using any .NET programming language </li></ul>
  9. 10. WCF Composable Architecture Service Code Service Model Layer Influences and adds to the programming model based on incoming messages Messaging Layer Moves messages back and forth and adds transfer semantics (channels) Transaction Behavior CLR Type Integration Instancing Behavior Security Channel TCP Transport Security Channel TCP Transport Transaction Behavior CLR Type Integration
  10. 11. WCF Composability in Action Service Model Layer Messaging Layer Behaviors Channels Transaction Behavior CLR Type Integration Instancing Behavior Security Channel HTTP Transport Custom Channel Reliable Messaging Queue Transport MSMQ Integration TCP Transport Named Pipes Throttling Behavior Error Handling Behavior Concurrency Behavior Metadata Behavior Custom Behavior HTTP Transport TCP Transport Security Channel Custom Channel Reliable Messaging CLR Type Integration Instancing Behavior Transaction Behavior
  11. 12. WCF Runtime Architecture Binding Address Contract
  12. 13. Productivity - DIY Using Visual Studio .NET 2003 20,379 lines security 5,988 lines reliable messaging 25,507 lines transactions Total lines 56,296 4,442 lines infrastructure <ul><li>class HelloService { </li></ul><ul><li>[WebMethod] </li></ul><ul><li>public String Hello(String Greeting) { </li></ul><ul><ul><li>X509CertificateCollection collection = new X509CertificateCollection(); </li></ul></ul><ul><ul><li>IntPtr blob = Marshal.AllocHGlobal(Marshal.SizeOf( typeof(CRYPTOAPI_BLOB))); </li></ul></ul><ul><ul><li>IntPtr data = (IntPtr)((int)blob + </li></ul></ul><ul><ul><li>Marshal.SizeOf(typeof(CRYPTOAPI_BLOB))); </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><ul><li>SeqAckRange range = new SeqAcknRange(id, low, high ); </li></ul></ul><ul><ul><li>SeqAckRange[] ranges = { range }; </li></ul></ul><ul><ul><li>ReliableQueue.ProcessAcks( ranges ); </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><ul><li>hr = pITxDispenser->BeginTransaction (NULL, </li></ul></ul><ul><ul><li>ISOLATIONLEVEL_SERIALIZABLE, 0, pITxOptions, </li></ul></ul><ul><ul><li>&pITransaction); </li></ul></ul><ul><ul><li>… </li></ul></ul><ul><li>return Greeting; </li></ul><ul><li>} </li></ul><ul><li>} </li></ul>
  13. 14. Productivity - WSE Using Visual Studio .NET 2003 and WSE 10 lines security 1,804 lines reliable messaging 25,507 lines transactions Total lines 27,321 class HelloService { [WebMethod] public String Hello(String Greeting) { foreach ( SecurityToken tok in requestContext.Security.Tokens { X509SecurityToken token = tok as X509SecToken } … SeqAckRange range = new SeqAcknRange(id,low,high ); SeqAckRange[] ranges = { range }; ReliableQueue.ProcessAcks( ranges ); … hr = pITxDispenser->BeginTransaction (NULL, ISOLATIONLEVEL_SERIALIZABLE, 0, pITxOptions, &pITransaction); … return Greeting; } }
  14. 15. Productivity - WCF Using Visual Studio 2005 and Indigo 1 line security 1 line reliable messaging 1 line transactions Total lines 3 [ServiceContract(SecureChannel, SecurityMode =“Windows&quot;)] [Reliability(Guarantees.ExactlyOnce | Guarantees.InOrder)] [ServiceContract] class HelloService { [ServiceOperation(TransactionFlowAllowed = true)] String Hello(String Greeting) { return Greeting; } }
  15. 16. INTEROPERABILITY
  16. 17. Investment Protection SIDE-BY-SIDE Interop UPGRADE
  17. 18. WS-* Protocol Support XML Messaging Security Transactions Reliable Messaging Metadata
  18. 19. Components of Business Interoperability <ul><li>Agreed syntax representations </li></ul><ul><ul><li>E.g. XML </li></ul></ul><ul><li>Agreed protocols </li></ul><ul><ul><li>E.g. SOAP + WS-* specs (such as WS-ReliableMessaging) </li></ul></ul><ul><li>Agreed payload formats </li></ul><ul><ul><li>E.g. HL7 schemas for healthcare data </li></ul></ul><ul><li>Profiled composition </li></ul><ul><ul><li>E.g. Pre-defined options to ensure functionality </li></ul></ul><ul><li>Agreed business scenarios </li></ul><ul><ul><li>E.g. Well defined interaction scenarios / use cases </li></ul></ul>
  19. 20. Interop Profiles <ul><li>Define a subset of specifications that are: </li></ul><ul><ul><li>Composable </li></ul></ul><ul><ul><li>Scoped </li></ul></ul><ul><ul><li>Work together </li></ul></ul><ul><li>Examples: </li></ul><ul><ul><li>Secure RM – WS-ReliableMessaging + WS-Trust/SecureConversation/Security </li></ul></ul><ul><ul><li>ACORD Messaging Profile – WS-* + ACORD payload schemas </li></ul></ul><ul><li>Who defines the profile? </li></ul><ul><ul><li>Vertical domain org – eg. ACORD </li></ul></ul><ul><ul><li>Horizontal org – eg. WS-I </li></ul></ul><ul><ul><li>Customer – singly or in groups </li></ul></ul>
  20. 21. Profile Recipe: Staple, Redline, Glue – Device Profile Example <ul><li>“ Staple” </li></ul><ul><ul><li>Pull relevant specs into scope </li></ul></ul><ul><li>“ Redline” </li></ul><ul><ul><li>Add constraints on use of those specs </li></ul></ul><ul><li>“ Glue” </li></ul><ul><ul><li>Define missing bits between specs </li></ul></ul><ul><ul><li>Some will migrate back into specs </li></ul></ul>ThisModel Metadata ThisDevice Metadata Action Filter Conformance Claim Policy Assertions Policy Assertions SOAP 1.2 WS-Addressing WS-Metadata Exchange WSDL 1.1 WS-Discovery WS-Eventing
  21. 22. Why Do We Need Interop Profiles? <ul><li>Need to constrain (soften) runtime options to achieve out-of-box interoperability </li></ul><ul><ul><li>WS-* Architecture is designed for general applicability across a wide range of industries / scenarios </li></ul></ul><ul><ul><ul><li>Often too much optionality in the base specifications </li></ul></ul></ul><ul><ul><li>Tailor to specific domain / environment </li></ul></ul><ul><ul><ul><li>E.g. Devices Profile only requires SOAP 1.2 not SOAP 1.1 to lower implementation footprint </li></ul></ul></ul><ul><li>Guide implementation and deployment choices </li></ul><ul><li>Achieve a proven composition of protocols and payloads </li></ul><ul><li>Allows simplification of application deployment </li></ul><ul><ul><li>e.g. WCF allows selection of interop profile to use </li></ul></ul>
  22. 23. SERVICE ORIENTATION
  23. 24. From Objects to Services <ul><li>Polymorphism </li></ul><ul><li>Encapsulation </li></ul><ul><li>Subclassing </li></ul><ul><li>Message-based </li></ul><ul><li>Schema+Contract+Policy </li></ul><ul><li>Broad Interop </li></ul><ul><li>Location Transparent </li></ul><ul><li>Tight Coupling </li></ul><ul><li>Runtime Metadata </li></ul>Object-Oriented Service-Oriented Component-Oriented 1980s 2000s 1990s
  24. 25. Four Tenets of Service Orientation SERVICE ORIENTATION Compatibility Based On Policy Share Schema & Contract, Not Class Services Are Autonomous Boundaries Are Explicit
  25. 26. WS DEVICES
  26. 27. Connected Devices – Ad-hoc / Unmanaged Environment Example <ul><li>Joe works for a health care provider. He visits a patient at home and uses his laptop to discover and configure a sensor in the client’s location in ad-hoc mode. After device discovery, Joe changes the sensitivity level of the sensor and directs the sensor to send notifications to a monitoring server in his office. </li></ul>Provider’s Office Customer’s Home Notifications Configure Ad-hoc Discovery Sensor
  27. 28. Devices Profile Protocol DMR Capabilities DMR Commands DMR Events Protocol IGD Capabilities IGD Commands IGD Events Assurances Messaging SOAP WS-Security MTOM WS-Addressing Metadata WSDL WS-Metadata Exchange XML Schema TLS Foundation SOAP / HTTP MIME XML Infoset XML 1.0 XML Namespaces BP 1.1 Sec. 4 Device Extensions Protocol Print Capabilities Print Commands Print Events WS-Eventing WS-Transfer WS-Policy SOAP / UDP WS-Discovery
  28. 29. Vista WS device support <ul><li>Printers </li></ul><ul><ul><li>“ Plug and Play” experience for network printers </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><ul><ul><li>Control over who can connect to the printer </li></ul></ul></ul><ul><ul><ul><li>Privacy of data sent to the printer </li></ul></ul></ul><ul><ul><li>Rich printer status </li></ul></ul><ul><li>Scanners </li></ul><ul><ul><li>“ Plug and Play” experience for network scanners </li></ul></ul><ul><ul><li>enable one-button scanning </li></ul></ul><ul><ul><li>Secure scan delivery </li></ul></ul>
  29. 30. Vista WS device support <ul><li>PC Discovery </li></ul><ul><li>Messenger - People Near Me </li></ul><ul><li>BITS - Background Intelligent Transfer Service </li></ul><ul><li>Projectors </li></ul><ul><ul><li>Integration with current IT systems </li></ul></ul><ul><ul><ul><li>Remote diagnostics and configuration </li></ul></ul></ul><ul><ul><ul><li>Asset and usage tracking </li></ul></ul></ul><ul><ul><li>Speeds flow of meeting </li></ul></ul><ul><ul><ul><li>Automatic display and audio settings </li></ul></ul></ul><ul><ul><ul><li>Easy to transition between presenters </li></ul></ul></ul>
  30. 31. Resources - Web Services On Devices <ul><ul><li>Web Services </li></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/webservices/default.aspx </li></ul></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/windowsvista/connected/ </li></ul></ul></ul><ul><ul><li>Web Services Feedback Workshops </li></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/webservices/community/workshops/ </li></ul></ul></ul><ul><ul><li>Web Services Basics </li></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/webservices/understanding/webservicebasics/default.aspx </li></ul></ul></ul><ul><ul><li>Devices Profile for Web Services </li></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/ws/2006/02/devprof/ </li></ul></ul></ul><ul><ul><li>WS-Discovery </li></ul></ul><ul><ul><ul><li>http://msdn.microsoft.com/ws/2005/04/ws-discovery/ </li></ul></ul></ul>
  31. 32. THE BIGGER PICTURE – WCF and WINFX
  32. 33. Next Gen Windows Technology Foundation <ul><li>Vector-based </li></ul><ul><li>Resolution independent </li></ul><ul><li>Rich media </li></ul><ul><li>3D user interfaces </li></ul>Windows Communication Foundation <ul><li>Secure Web services </li></ul><ul><li>Reliable transacted distributed apps </li></ul><ul><li>Interoperability with WS-* protocols </li></ul><ul><li>Any transport and any host </li></ul><ul><li>Engine built into platform </li></ul><ul><li>System and human workflow </li></ul><ul><li>Composite apps </li></ul>Windows Presentation Foundation Windows Workflow Foundation Windows InfoCard <ul><li>Streamlines user registration and one-click login </li></ul><ul><li>Mitigates common attack vectors (Phishing) </li></ul><ul><li>Seamless integration with WCF </li></ul>
  33. 34. Services, Workflow & BizTalk WCF WF Tools and engine for building workflow-enable apps API for building secure, reliable interoperable services <ul><li>Application to application and B2B integration </li></ul><ul><ul><ul><li>Connects multiple services built with WCF </li></ul></ul></ul><ul><ul><ul><li>Adapters to multiple products like SAP and MQSeries </li></ul></ul></ul><ul><ul><ul><li>Business activity monitoring </li></ul></ul></ul><ul><ul><ul><li>Vertical solutions and industry accelerators </li></ul></ul></ul><ul><ul><ul><li>Message transformation services </li></ul></ul></ul><ul><ul><ul><li>Enterprise single sign-on </li></ul></ul></ul><ul><ul><ul><li>End-to-end health and activity tracking </li></ul></ul></ul><ul><ul><ul><li>And more… </li></ul></ul></ul>
  34. 35. WinFX Ship Vehicle <ul><li>Down-level support on Windows XP and Windows Server 2003 </li></ul><ul><li>Consistent development experience </li></ul><ul><li>Optimizations for Vista </li></ul>Windows Vista introduces breakthroughs in user experience, security and reliability, enabling you to build applications that bring clarity to the user's complex world of information.
  35. 36. Getting WinFX <ul><li>WinFX Beta1 </li></ul><ul><li>WinFX Ships! </li></ul>July 2005 Nov 2006 <ul><li>WinFX Feb CTP </li></ul>Feb 2006
  36. 37. <ul><li>Start programming with Visual Studio 2005 </li></ul><ul><li>Download and evaluate WinFX </li></ul><ul><li>Give us your feedback! </li></ul>Take the Next Step
  37. 39. Backup Slides
  38. 40. The Four Tenets of Service-Orientation Services and consumers are independently versioned, deployed, operated, and secured. Services are autonomous Data never includes behavior; Objects with data and behavior are a local phenomenon. Share schema & contract, not class Capabilities and requirements represented by a unique public name; Used to establish service suitability. Compatibility based on policy Developers opt-in to consuming, exposing, and defining public-facing service façade. Boundaries are Explicit
  39. 41. <ul><li>Facilitates implementation/platform interop </li></ul><ul><li>Independent deployment, versioning, mgmt </li></ul><ul><li>Promotes technology reuse </li></ul>Benefits of Service Orientation
  40. 42. WCF Architecture Detail Application Service Model Messaging Hosting Environments TCP Channel HTTP Channel Queue Channel Secure Channel Reliable Channel Binary Encoder Text/XML Encoder … … ASP.NET Avalon WinForm NT Service COM+ Instance Behavior Throttling Behavior Type Integ. Behavior Transaction Behavior Concurrency Behavior Error Behavior Metadata Behavior … WAS
  41. 43. <ul><li>End-to-end Security </li></ul><ul><ul><li>Confidentiality, integrity, authentication, authorization </li></ul></ul><ul><ul><li>X509, Username/Password, Kerberos, SAML, custom </li></ul></ul><ul><li>End-to-end Reliable messaging </li></ul><ul><ul><li>In-order guarantees </li></ul></ul><ul><ul><li>Exactly once guarantees </li></ul></ul><ul><li>Transactions </li></ul><ul><ul><li>Guaranteed atomic success or failure across services </li></ul></ul>WCF Feature Overview Security, Reliability, Transactions
  42. 44. WCF Feature Overview Hosting Models <ul><li>Indigo services can be hosted in any managed application </li></ul><ul><ul><li>ASP.NET, COM+, EXE, NT Service, Windows Forms, Avalon </li></ul></ul><ul><li>Windows Activation Service – Used by Indigo and IIS7 </li></ul>Windows Activation Service (WAS) HTTP.SYS TCP Transport Listener Named Pipes Transport Listener HTTP Listener Adapter (IIS7) NP Listener Adapter TCP Listener Adapter
  43. 45. WCF Runtime Overview
  44. 46. WS-* Architecture Assurances Messaging SOAP WS-Security MTOM WS-Addressing Metadata WS-Policy WSDL WS-Discovery UDDI WS-Metadata Exchange WS-Transfer WS-Enumeration WS-Eventing XML Schema WS-Reliable Messaging WS-Coordination WS-Atomic Transaction WS-Business Activity WS-Trust WS-Secure Conversation Infrastructure and Profiles WS-Management WS-Federation Devices Profile Foundation SOAP / HTTP SOAP / UDP MIME XML Infoset XML 1.0 XML Namespaces
  45. 47. WS-* Specifications Process Step 2 Broader Community Participation Step 1 Initial Development <ul><li>Process reconciles conflicting goals </li></ul><ul><li>Quality of engineering </li></ul><ul><li>Time to market </li></ul><ul><li>Breadth of industry support </li></ul>Step 3 Standardization Step 4 Profiling Increasing Industry Participation Specification Published Feedback and Interop Workshops Revise spec Standards Org WS-I Idea
  46. 48. WS-* Spec Status Assurances Messaging SOAP WS-Security MTOM WS-Addressing Metadata WS-Policy WSDL WS-Discovery UDDI WS-Metadata Exchange WS-Transfer WS-Enumeration WS-Eventing XML Schema WS-Reliable Messaging WS-Coordination WS-Atomic Transaction WS-Business Activity WS-Trust WS-Secure Conversation Infrastructure and Profiles WS-Management WS-Federation Devices Profile Foundation SOAP / HTTP SOAP / UDP MIME XML Infoset XML 1.0 XML Namespaces Step 4 – Approved Standard Step 3 – Standardization Step 2 – Workshops & Community Dev
  47. 49. 80+ WS-* Workshop Participants Actional Fujitsu Newisys Sharp Labs AMD Grand Central Nokia Siebel American Megatrends Hewlett-Packard Oasis Semiconductor Software AG ANL IBM Oblix Sonic Software Apache Project iDesign OPC Foundation Sun Axalto Intel OpenNetwork Systinet BEA Intermec Oracle Tibco Blue Titan Iona OSA Technologies Toshiba Boeing IPO Group Peerless Tyco Safety Systems Brother Jboss Ping Identity Univ of Sydney Canon JibxSoap Printronix VeriSign Choreology KnowNow QuickTree Veritas CommerceOne Layer 7 Tech Quovadx Visa Computer Associates Lexmark Reactivity Vitria Content Guard Lockheed Martin Ricoh WRQ Cornell University Microsoft Roxio webMethods Dell Motive RSA Security WSO2 Epson NEC SAP Xerox Exceptional Innovation NEON Schneider Electric Zoran Feature Software Netegrity SeeBeyond Unaffiliated
  48. 50. Delivering WS-* - Microsoft <ul><li>Microsoft is delivering implementations of all WS-* specs </li></ul><ul><ul><li>WSE 2.0 / 3.0 </li></ul></ul><ul><ul><ul><li>Interim coverage of evolving security and policy specs </li></ul></ul></ul><ul><ul><li>Indigo </li></ul></ul><ul><ul><ul><li>Full coverage of all SRTP Advanced Web Services specs </li></ul></ul></ul><ul><ul><ul><ul><li>Security </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Reliable Messaging </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Transactions </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Policy </li></ul></ul></ul></ul><ul><ul><li>Windows Server 2003 Release 2 </li></ul></ul><ul><ul><ul><li>WS-Management stack for interoperable system management </li></ul></ul></ul><ul><ul><li>Windows Longhorn </li></ul></ul><ul><ul><ul><li>WS-Devices stack for printer and networked device connectivity </li></ul></ul></ul>
  49. 51. Microsoft WS-* Product Roadmap <ul><li>VS 2005 + WSE 3.0 </li></ul><ul><li>SOAP 1.1, 1.2 </li></ul><ul><li>WSDL 1.1 </li></ul><ul><li>MTOM </li></ul><ul><li>WS-Addressing 2004/08 (or REC) </li></ul><ul><li>WS-Security 1.0 (U/P, X509, Kerberos) </li></ul><ul><li>WS-Secure Conversation </li></ul><ul><li>WS-Trust </li></ul><ul><li>WS-Policy based </li></ul><ul><li>Limited wire Interop with WSE 2.0 </li></ul><ul><li>AD Federation Services in R2 </li></ul><ul><li>Cross-organizational Identity Federation </li></ul><ul><li>Web SSO </li></ul><ul><li>SQL Server 2005 </li></ul><ul><li>SOAP 1.1,1.2 </li></ul><ul><li>WSDL1.1 </li></ul><ul><li>WS-Security 1.0 </li></ul><ul><li>Management </li></ul><ul><li>WS-Management </li></ul><ul><li>VS2003 + Web Services </li></ul><ul><li>Enhancements (WSE) 2.0 </li></ul><ul><li>SOAP 1.1 </li></ul><ul><li>WSDL 1.1 </li></ul><ul><li>WS-Addressing 2004/03 </li></ul><ul><li>WS-Security 1.0 (U/P, X509, Kerberos) </li></ul><ul><li>WS-Secure Conversation 2004/04 </li></ul><ul><li>WS-Trust 2004/04 </li></ul><ul><li>WS-Policy based </li></ul><ul><li>Indigo </li></ul><ul><li>Wire-level interop with WSE3.0 </li></ul><ul><li>In addition: </li></ul><ul><li>MTOM </li></ul><ul><li>SAML Token Profile 1.0 </li></ul><ul><li>Security Policy </li></ul><ul><li>WS-Federation Active Client </li></ul><ul><li>- Enables easy to build STS </li></ul><ul><li>WS-RM 2005/02, Policy </li></ul><ul><li>WS-AT/WS-C 2005/02, Policy </li></ul><ul><li>WS-Policy/PolicyAttachment </li></ul><ul><li>WS-MEX </li></ul><ul><li>Easy to use Digital Identity / InfoCard </li></ul><ul><li>Active Directory: Federation </li></ul><ul><li>WSD API: Device Profile </li></ul>Longhorn Wave Windows Server 2003 “ R2” Wave
  50. 52. WS-* - Industry Adoption WS-P Messaging Security Assurances Devices Mgmt Metadata DPWS WS-SecureConv WS-Security WS-Trust WS-RM WS-AT MEX WS-D SOAP / WSDL MTOM © 2003-2006 Microsoft Corporation. All rights reserved. The information contained in this document represents the current view at the time of publication and is subject to change. WS-M WS-XFer / Enum WS-Fed Microsoft   Intel   Sun   Dell   AMD A CA A Sonic A gSOAP  Systinet A WEBM   NetIQ    Released product  Public interop A Co-Author Only Microsoft   IBM   BEA  A Cape Clear  Systinet  Blue Titan  Rogue Wave  Sonic  IONA   JBoss  Choreology  Apache   Tibco  Microsoft     IBM     BEA    A RSA    A Systinet    Apache    Layer7  A  DataPower   CA  A A SUN  SAP  Tibco  IONA  WebMethods  Nokia  Cape Clear  Sonic  gSOAP  Ping ID  A   Netegrity  A A  Verisign  A A A OpenNetwork A A A  Oracle/Oblix     Microsoft   IBM  BEA  SUN   Google  Amazon  eBay  Apache   Whitemesa   gSOAP   Ricoh   Epson   HP   Xerox   Fuji-Xerox   Intel   Canon   Microsoft   Intel   Canon   BEA A WebMethods A Ricoh   Epson   HP   Xerox   Fuji-Xerox   Brother   Toshiba   Exceptional Innovation   Peerless   Schneider   Systinet  gSOAP  Lexmark A Microsoft   IBM A  BEA A  SAP A  Sun A  Verisign A Sonic  Layer 7  Apache  CA A WebMethods A Systinet  gSOAP 
  51. 53. Connected Devices – Ad-hoc / Unmanaged Environment Example <ul><li>Joe works for a health care provider. He visits a patient at home and uses his laptop to discover and configure a sensor in the client’s location in ad-hoc mode. After device discovery, Joe changes the sensitivity level of the sensor and directs the sensor to send notifications to a monitoring server in his office. </li></ul>Provider’s Office Customer’s Home Notifications Configure Ad-hoc Discovery Sensor
  52. 54. Connected Devices – Managed Environment Example <ul><li>Joe works for a health care provider. He visits a patient at home and uses his laptop to discover and configure a sensor via discovery proxy. After device discovery, Joe changes the sensitivity level of the sensor and directs the sensor to send notifications to a monitoring server in his office. </li></ul>Provider’s Office Customer’s Home Notifications Configure Sensor Discover via DP Hello DP

×