SlideShare a Scribd company logo
IoT System Management
with
NETCONF-YANG
Need for IoT Systems Management
• Automating Configuration
• Monitoring Operational & Statistical Data
• Improved Reliability
• System Wide Configurations
• Multiple System Configurations
• Retrieving & Reusing Configurations
Simple Network Management Protocol
(SNMP)
Limitations of SNMP
SNMP is stateless in nature and each SNMP request contains
all the information to process the request. The application
needs to be intelligent to manage the device.
SNMP is a connectionless protocol which uses UDP as the
transport protocol, making it unreliable as there was no
support for acknowledgement of requests.
MIBs often lack writable objects without which device
configuration is not possible using SNMP.
Limitations of SNMP
It is difficult to differentiate between configuration and
state data in MIBs.
Retrieving the current configuration from a device can
be difficult with SNMP.
Earlier versions of SNMP did not have strong security
features.
Network Operator Requirements
• Ease of use
• Distinction between configuration and state data
• Fetch configuration and state data separately
• Configuration of the network as a whole
• Configuration transactions across devices
• Configuration deltas
• Dump and restore configurations
• Configuration validation
• Configuration database schemas
• Comparing configurations
• Role-based access control
• Consistency of access control lists:
• Multiple configuration sets
• Support for both data-oriented & task oriented access control
NETCONF
• Network Configuration Protocol (NETCONF) is a
session-based network management protocol.
• NETCONF allows retrieving state data or
configuration data and manipulating configuration
data on network devices.
• NETCONF works on SSH transport protocol.
NETCONF
 Transport layer provides end-to-end connectivity and
ensure reliable delivery of messages.
 NETCONF uses XML-encoded Remote Procedure
Calls (RPCs) for framing request and response
messages.
 The RPC layer provides mechanism for encoding of
RPC calls and notifications.
 NETCONF provides various operations to retrieve and
edit configuration data from network devices.
• The Content Layer consists of configuration and
state data which is XML-encoded.
• The schema of the configuration and state data is
defined in a data modeling language called YANG.
• NETCONF provides a clear separation of the
configuration and state data.
• The configuration data resides within a NETCONF
configuration datastore on the server.
YANG
• YANG is a data modeling language used to model
configuration and state data manipulated by the
NETCONF protocol
• YANG modules contain the definitions of the
configuration data, state data, RPC calls that can be
issued and the format of the notifications.
• YANG modules defines the data exchanged between
the NETCONF client and server.
• A module comprises of a number of 'leaf' nodes
which are organized into a hierarchical tree
structure.
• The 'leaf' nodes are specified using the 'leaf' or 'leaf-
list' constructs.
• Leaf nodes are organized using 'container' or 'list'
constructs.
• A YANG module can import definitions from other
modules.
• Constraints can be defined on the data nodes
Eg: allowed values.
• YANG can model both configuration data and state
data using the 'config' statement.
YANG Module Example
• This YANG module is a YANG version of the toaster MIB
• The toaster YANG module begins with the header
information followed by identity declarations which
define various bread types.
• ‘toaster’ container has the following Leaf node definition
‘toasterManufacturer’
‘toasterModelNumber’
'toasterStatus’
YANG Module Example
• Each leaf node definition has a type and optionally
a description and default value.
• The module has two RPC definitions
‘make-toast’ and ‘cancel-toast’
IoT Systems Management
with
NETCONF-YANG
Management System : The operator uses a management
system to send NETCONF messages to configure the IoT
device and receives state information and notifications
from the device as NETCONF messages.
Management API : allows management application to
start NETCONF sessions.
Transaction Manager: executes all the NETCONF
transactions and ensures that ACID properties hold true
for the trasactions.
 Rollback Manager : is responsible for generating all the
transactions necessary to rollback a current configuration to
its original state.
 Data Model Manager : Keeps track of all the YANG data
models and the corresponding managed objects. Also keeps
track of the applications which provide data for each part of
a data model.
 Configuration Validator : checks if the resulting
configuration after applying a transaction would be a valid
configuration.
Configuration Database : contains both configuration and
operational data.
Configuration API : Using the configuration API the
application on the IoT device can be read configuration data
from the configuration datastore and write opeartional data
to the opearational datastore.
Data Provider API: Applications on the IoT device can
register for callbacks for variousevents using the Data
Provider API. Through the Data Provider API, the
applications can report statistics and opeartional data.
Steps for IoT device Management with
NETCONF-YANG
1) Create a YANG model of the system that defines the
configuration and state data of the system.
2) Complete the YANG model with the ‘Inctool’ which
comes with Libnetconf.
3) Fill in the IoT device mangement code in the
TransAPImodule .
4) Build the callbacks C file to generate the library file.
5) Load the YANG module and the TransAPImodule into
the Netopeer server using Netopeer manager tool.
6) The operator can now connect from the management
system to the Netopeer server using the Netopeer CLI.
7) Operator can issue NETCONF commands from the
Netopeer CLI. Command can be issued to change the
configuration data, get operational data or execute an RPC
on the IoT device.

More Related Content

What's hot

Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
FabMinds
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
kumari36
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
Iot architecture
Iot architectureIot architecture
Iot architecture
Anam Iqbal
 
Unit 4
Unit 4Unit 4
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
MansiMehta96928
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
ShilpaKrishna6
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
Sagar Rai
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
FabMinds
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
skumartarget
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
Software Park Thailand
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Sensors in IOT
Sensors in IOTSensors in IOT
Sensors in IOT
ATS SBGI MIRAJ
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
Samip jain
 
Distributed System ppt
Distributed System pptDistributed System ppt
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
AmberSinghal1
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
Yu-Ting Chen
 

What's hot (20)

Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)Sources of IoT (JNTUK - UNIT 1)
Sources of IoT (JNTUK - UNIT 1)
 
Levels of Virtualization.docx
Levels of Virtualization.docxLevels of Virtualization.docx
Levels of Virtualization.docx
 
Wot
WotWot
Wot
 
ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
Unit 4
Unit 4Unit 4
Unit 4
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Physical design of io t
Physical design of io tPhysical design of io t
Physical design of io t
 
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
SDN( Software Defined Network) and NFV(Network Function Virtualization) for I...
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
web connectivity in IoT
web connectivity in IoTweb connectivity in IoT
web connectivity in IoT
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Sensors in IOT
Sensors in IOTSensors in IOT
Sensors in IOT
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
IOT and Characteristics of IOT
IOT and  Characteristics of IOTIOT and  Characteristics of IOT
IOT and Characteristics of IOT
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 

Similar to Io t system management with

IoT Heaps 3
IoT Heaps 3IoT Heaps 3
IoT Heaps 3
SushrutaMishra1
 
IOT-Network Management.pptx
IOT-Network Management.pptxIOT-Network Management.pptx
IOT-Network Management.pptx
V.V.Vanniaperumal College for Women
 
IoT System Management.pptx
IoT System Management.pptxIoT System Management.pptx
IoT System Management.pptx
DrFaridaAshrafAli
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
VelmuruganTECE
 
Chapter-4.pdf
Chapter-4.pdfChapter-4.pdf
Chapter-4.pdf
ssuser01a3d0
 
Unit IOT NETCONF.pptx
Unit IOT NETCONF.pptxUnit IOT NETCONF.pptx
Unit IOT NETCONF.pptx
sridharan83
 
Untitled presentation (2).pptx
Untitled presentation (2).pptxUntitled presentation (2).pptx
Untitled presentation (2).pptx
ArchanaPandiyan
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
BharaniDharan195623
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
venui2
 
Bringing SDN to the Management Plane
Bringing SDN to the Management PlaneBringing SDN to the Management Plane
Bringing SDN to the Management Plane
Anees Shaikh
 
ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
Vikram Nandini
 
Introduction to YANG data models and their use in OpenDaylight: an overview
Introduction to YANG data models and their use in OpenDaylight: an overviewIntroduction to YANG data models and their use in OpenDaylight: an overview
Introduction to YANG data models and their use in OpenDaylight: an overview
Cisco DevNet
 
Tail-f - Why NETCONF
Tail-f - Why NETCONFTail-f - Why NETCONF
Tail-f - Why NETCONF
Tail-f Systems
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
ThomasGraf42
 
IBM Programmable Network Controller
IBM Programmable Network ControllerIBM Programmable Network Controller
IBM Programmable Network Controller
IBM India Smarter Computing
 
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIIot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
VenkatRaoJ
 
Iot unit i
Iot unit iIot unit i
Iot unit i
VenkatRaoJ
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
Tara Smith
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
Aalok Shah
 

Similar to Io t system management with (20)

IoT Heaps 3
IoT Heaps 3IoT Heaps 3
IoT Heaps 3
 
IOT-Network Management.pptx
IOT-Network Management.pptxIOT-Network Management.pptx
IOT-Network Management.pptx
 
IoT System Management.pptx
IoT System Management.pptxIoT System Management.pptx
IoT System Management.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Chapter-4.pdf
Chapter-4.pdfChapter-4.pdf
Chapter-4.pdf
 
Unit IOT NETCONF.pptx
Unit IOT NETCONF.pptxUnit IOT NETCONF.pptx
Unit IOT NETCONF.pptx
 
Untitled presentation (2).pptx
Untitled presentation (2).pptxUntitled presentation (2).pptx
Untitled presentation (2).pptx
 
Configuration of IoT devices - Systems managament
Configuration of IoT devices - Systems managamentConfiguration of IoT devices - Systems managament
Configuration of IoT devices - Systems managament
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
YANG (哪)
YANG (哪)YANG (哪)
YANG (哪)
 
Bringing SDN to the Management Plane
Bringing SDN to the Management PlaneBringing SDN to the Management Plane
Bringing SDN to the Management Plane
 
ioT and Machine 2 Machine Computing
ioT and Machine 2 Machine ComputingioT and Machine 2 Machine Computing
ioT and Machine 2 Machine Computing
 
Introduction to YANG data models and their use in OpenDaylight: an overview
Introduction to YANG data models and their use in OpenDaylight: an overviewIntroduction to YANG data models and their use in OpenDaylight: an overview
Introduction to YANG data models and their use in OpenDaylight: an overview
 
Tail-f - Why NETCONF
Tail-f - Why NETCONFTail-f - Why NETCONF
Tail-f - Why NETCONF
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
 
IBM Programmable Network Controller
IBM Programmable Network ControllerIBM Programmable Network Controller
IBM Programmable Network Controller
 
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATIIot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
Iot unit i present by JAVVAJI VENKATRAO SVEC,TIRUPATI
 
Iot unit i
Iot unit iIot unit i
Iot unit i
 
BSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment EssayBSA 385 Week 3 Individual Assignment Essay
BSA 385 Week 3 Individual Assignment Essay
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
 

More from xyxz

Optimal reception-of-digital-signals
Optimal reception-of-digital-signalsOptimal reception-of-digital-signals
Optimal reception-of-digital-signals
xyxz
 
Optimal reception-of-digital-signals-2
Optimal reception-of-digital-signals-2Optimal reception-of-digital-signals-2
Optimal reception-of-digital-signals-2
xyxz
 
Optimal reception-of-digital-signals
Optimal reception-of-digital-signalsOptimal reception-of-digital-signals
Optimal reception-of-digital-signals
xyxz
 
Complex propagation
Complex propagationComplex propagation
Complex propagation
xyxz
 
Digital class
Digital classDigital class
Digital class
xyxz
 
New ways of teaching entrepreneurship
New ways of teaching entrepreneurshipNew ways of teaching entrepreneurship
New ways of teaching entrepreneurship
xyxz
 
Bits and bandwidth
Bits and bandwidthBits and bandwidth
Bits and bandwidth
xyxz
 
Mpmc unit-string manipulation
Mpmc unit-string manipulationMpmc unit-string manipulation
Mpmc unit-string manipulation
xyxz
 
Lp iot-iv-ece- 2019-20
Lp iot-iv-ece- 2019-20Lp iot-iv-ece- 2019-20
Lp iot-iv-ece- 2019-20
xyxz
 
Jntuh b.tech 3 year ece r16 syllabus
Jntuh b.tech 3 year ece r16 syllabusJntuh b.tech 3 year ece r16 syllabus
Jntuh b.tech 3 year ece r16 syllabus
xyxz
 
Devicemgmt
DevicemgmtDevicemgmt
Devicemgmt
xyxz
 
29fe586301a42c2d2e7279d658da178ae1e6
29fe586301a42c2d2e7279d658da178ae1e629fe586301a42c2d2e7279d658da178ae1e6
29fe586301a42c2d2e7279d658da178ae1e6
xyxz
 
Lecture notes front page sample (1) copy
Lecture notes front page sample (1)   copyLecture notes front page sample (1)   copy
Lecture notes front page sample (1) copy
xyxz
 
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
xyxz
 
Ilovepdf merged
Ilovepdf mergedIlovepdf merged
Ilovepdf merged
xyxz
 
Dc lab manual
Dc lab manualDc lab manual
Dc lab manual
xyxz
 
Adc lab
Adc labAdc lab
Adc lab
xyxz
 
Dcs lesson plan 18 19
Dcs lesson plan 18 19Dcs lesson plan 18 19
Dcs lesson plan 18 19
xyxz
 
04 sequential circuits
04 sequential circuits04 sequential circuits
04 sequential circuits
xyxz
 
507 block 1_lesson_1
507 block 1_lesson_1507 block 1_lesson_1
507 block 1_lesson_1
xyxz
 

More from xyxz (20)

Optimal reception-of-digital-signals
Optimal reception-of-digital-signalsOptimal reception-of-digital-signals
Optimal reception-of-digital-signals
 
Optimal reception-of-digital-signals-2
Optimal reception-of-digital-signals-2Optimal reception-of-digital-signals-2
Optimal reception-of-digital-signals-2
 
Optimal reception-of-digital-signals
Optimal reception-of-digital-signalsOptimal reception-of-digital-signals
Optimal reception-of-digital-signals
 
Complex propagation
Complex propagationComplex propagation
Complex propagation
 
Digital class
Digital classDigital class
Digital class
 
New ways of teaching entrepreneurship
New ways of teaching entrepreneurshipNew ways of teaching entrepreneurship
New ways of teaching entrepreneurship
 
Bits and bandwidth
Bits and bandwidthBits and bandwidth
Bits and bandwidth
 
Mpmc unit-string manipulation
Mpmc unit-string manipulationMpmc unit-string manipulation
Mpmc unit-string manipulation
 
Lp iot-iv-ece- 2019-20
Lp iot-iv-ece- 2019-20Lp iot-iv-ece- 2019-20
Lp iot-iv-ece- 2019-20
 
Jntuh b.tech 3 year ece r16 syllabus
Jntuh b.tech 3 year ece r16 syllabusJntuh b.tech 3 year ece r16 syllabus
Jntuh b.tech 3 year ece r16 syllabus
 
Devicemgmt
DevicemgmtDevicemgmt
Devicemgmt
 
29fe586301a42c2d2e7279d658da178ae1e6
29fe586301a42c2d2e7279d658da178ae1e629fe586301a42c2d2e7279d658da178ae1e6
29fe586301a42c2d2e7279d658da178ae1e6
 
Lecture notes front page sample (1) copy
Lecture notes front page sample (1)   copyLecture notes front page sample (1)   copy
Lecture notes front page sample (1) copy
 
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
Jntua ece 3rd & 4th year (r15) syllabus (1) split-merge-1-4-1-2
 
Ilovepdf merged
Ilovepdf mergedIlovepdf merged
Ilovepdf merged
 
Dc lab manual
Dc lab manualDc lab manual
Dc lab manual
 
Adc lab
Adc labAdc lab
Adc lab
 
Dcs lesson plan 18 19
Dcs lesson plan 18 19Dcs lesson plan 18 19
Dcs lesson plan 18 19
 
04 sequential circuits
04 sequential circuits04 sequential circuits
04 sequential circuits
 
507 block 1_lesson_1
507 block 1_lesson_1507 block 1_lesson_1
507 block 1_lesson_1
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Io t system management with

  • 2. Need for IoT Systems Management • Automating Configuration • Monitoring Operational & Statistical Data • Improved Reliability • System Wide Configurations • Multiple System Configurations • Retrieving & Reusing Configurations
  • 3. Simple Network Management Protocol (SNMP)
  • 4. Limitations of SNMP SNMP is stateless in nature and each SNMP request contains all the information to process the request. The application needs to be intelligent to manage the device. SNMP is a connectionless protocol which uses UDP as the transport protocol, making it unreliable as there was no support for acknowledgement of requests. MIBs often lack writable objects without which device configuration is not possible using SNMP.
  • 5. Limitations of SNMP It is difficult to differentiate between configuration and state data in MIBs. Retrieving the current configuration from a device can be difficult with SNMP. Earlier versions of SNMP did not have strong security features.
  • 6. Network Operator Requirements • Ease of use • Distinction between configuration and state data • Fetch configuration and state data separately • Configuration of the network as a whole • Configuration transactions across devices • Configuration deltas • Dump and restore configurations
  • 7. • Configuration validation • Configuration database schemas • Comparing configurations • Role-based access control • Consistency of access control lists: • Multiple configuration sets • Support for both data-oriented & task oriented access control
  • 8. NETCONF • Network Configuration Protocol (NETCONF) is a session-based network management protocol. • NETCONF allows retrieving state data or configuration data and manipulating configuration data on network devices. • NETCONF works on SSH transport protocol.
  • 9.
  • 10. NETCONF  Transport layer provides end-to-end connectivity and ensure reliable delivery of messages.  NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages.  The RPC layer provides mechanism for encoding of RPC calls and notifications.  NETCONF provides various operations to retrieve and edit configuration data from network devices.
  • 11. • The Content Layer consists of configuration and state data which is XML-encoded. • The schema of the configuration and state data is defined in a data modeling language called YANG. • NETCONF provides a clear separation of the configuration and state data. • The configuration data resides within a NETCONF configuration datastore on the server.
  • 12. YANG • YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol • YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and the format of the notifications. • YANG modules defines the data exchanged between the NETCONF client and server.
  • 13. • A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure. • The 'leaf' nodes are specified using the 'leaf' or 'leaf- list' constructs. • Leaf nodes are organized using 'container' or 'list' constructs.
  • 14. • A YANG module can import definitions from other modules. • Constraints can be defined on the data nodes Eg: allowed values. • YANG can model both configuration data and state data using the 'config' statement.
  • 15. YANG Module Example • This YANG module is a YANG version of the toaster MIB • The toaster YANG module begins with the header information followed by identity declarations which define various bread types. • ‘toaster’ container has the following Leaf node definition ‘toasterManufacturer’ ‘toasterModelNumber’ 'toasterStatus’
  • 16. YANG Module Example • Each leaf node definition has a type and optionally a description and default value. • The module has two RPC definitions ‘make-toast’ and ‘cancel-toast’
  • 17.
  • 19.
  • 20. Management System : The operator uses a management system to send NETCONF messages to configure the IoT device and receives state information and notifications from the device as NETCONF messages. Management API : allows management application to start NETCONF sessions. Transaction Manager: executes all the NETCONF transactions and ensures that ACID properties hold true for the trasactions.
  • 21.  Rollback Manager : is responsible for generating all the transactions necessary to rollback a current configuration to its original state.  Data Model Manager : Keeps track of all the YANG data models and the corresponding managed objects. Also keeps track of the applications which provide data for each part of a data model.  Configuration Validator : checks if the resulting configuration after applying a transaction would be a valid configuration.
  • 22. Configuration Database : contains both configuration and operational data. Configuration API : Using the configuration API the application on the IoT device can be read configuration data from the configuration datastore and write opeartional data to the opearational datastore. Data Provider API: Applications on the IoT device can register for callbacks for variousevents using the Data Provider API. Through the Data Provider API, the applications can report statistics and opeartional data.
  • 23. Steps for IoT device Management with NETCONF-YANG 1) Create a YANG model of the system that defines the configuration and state data of the system. 2) Complete the YANG model with the ‘Inctool’ which comes with Libnetconf. 3) Fill in the IoT device mangement code in the TransAPImodule . 4) Build the callbacks C file to generate the library file.
  • 24. 5) Load the YANG module and the TransAPImodule into the Netopeer server using Netopeer manager tool. 6) The operator can now connect from the management system to the Netopeer server using the Netopeer CLI. 7) Operator can issue NETCONF commands from the Netopeer CLI. Command can be issued to change the configuration data, get operational data or execute an RPC on the IoT device.