SlideShare a Scribd company logo
Slide share Assignment for Thesis
           Presentation
             S1160127
           Yuta Takahashi
Abstract
• The data-store grids helps to construct and
  manage .

      Flexible, elastic, secure, sustainable

• It loosely coupled integration of sensor data
  and related services.
Keyword
•   Brief Description of Content
•   Network-Centric Approach
•   Loosely Coupled Service Integration
•   Messaging Network
•   Smart Grid
•   Health Care
Introduction
• Brief Description of Content: In the present
  paper, a network-centric information scheme
  is proposed to satisfy the above requirements
  for an enterprise including sensor net.
• The proposed scheme uses structured overlay
  network.
• This network, hereafter referred to as a
  “messaging network” is used to exhange and
  process application-level messages.
Proposed Scheme using a Content-
          Aware Network
• The sensor data are directly to a content-
  aware network messaging network.
• Messaging network is constructed as a
  structured overlay network over the existing
  network.
• The data are immediately sent to distributed
  data store grids.
Messaging Network
• A publisher merely sends new content to a
  content-aware network configured on a
  messaging network whenever the new
  content becomes available.
Data Store Grid for data-service
              Integration
• The data are delivered with varying interests
  to individual selective consumer applications
  in the messaging of the data.
• Content-based summary the proposed
  scheme provides the following basic functions
  to the sensor network.
Integration of overlay Networks with
           Policy Mediation
• Content-aware router can realize policy
  mediation between different overlay networks.
• We have constructed a experimental networks
  and examine the policy mediation between
  overlay networks having different policies.
Conclusion
• The proposed scheme can be realized by a
  structured overlay network over an ordinary
  IP network.
• Therefore, it is easy to introduce the proposed
  scheme in order to create a sensor network
  based system if the individual system is
  connected to the legacy IP network.
• The proposed scheme can also be used with
  non-IP networks as a virtual overlay network.
Thank you for your kind
      attention.

More Related Content

Viewers also liked

Mdo 0
Mdo 0Mdo 0
Mdo 0mdotn
 
Slide share assignment for thesis presentation
Slide share assignment for thesis presentationSlide share assignment for thesis presentation
Slide share assignment for thesis presentation
Yuuta Takahashi
 
Galería Fotográfica
Galería FotográficaGalería Fotográfica
Galería Fotográfica
Tandem579
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature reviewYuuta Takahashi
 
Slide share assignment for thesis presentation
Slide share assignment for thesis presentationSlide share assignment for thesis presentation
Slide share assignment for thesis presentationYuuta Takahashi
 
1958 llega a la unam la ibm 650
1958  llega a la unam la ibm 6501958  llega a la unam la ibm 650
1958 llega a la unam la ibm 650moyocabeza
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
Yuuta Takahashi
 
Nutrició animals
Nutrició animalsNutrició animals
Nutrició animals
rocamon6
 
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي wael zedan
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
Yuuta Takahashi
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysis
Ayush Khandelwal
 

Viewers also liked (11)

Mdo 0
Mdo 0Mdo 0
Mdo 0
 
Slide share assignment for thesis presentation
Slide share assignment for thesis presentationSlide share assignment for thesis presentation
Slide share assignment for thesis presentation
 
Galería Fotográfica
Galería FotográficaGalería Fotográfica
Galería Fotográfica
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
 
Slide share assignment for thesis presentation
Slide share assignment for thesis presentationSlide share assignment for thesis presentation
Slide share assignment for thesis presentation
 
1958 llega a la unam la ibm 650
1958  llega a la unam la ibm 6501958  llega a la unam la ibm 650
1958 llega a la unam la ibm 650
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
 
Nutrició animals
Nutrició animalsNutrició animals
Nutrició animals
 
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي
ورشة عمل منظمات المجتمع المدني حول مهارات كتابة المقترح التمويلي
 
Assignment on literature review
Assignment on literature reviewAssignment on literature review
Assignment on literature review
 
Twitter Sentiment Analysis
Twitter Sentiment AnalysisTwitter Sentiment Analysis
Twitter Sentiment Analysis
 

Similar to Slide share assignment for thesis presentation

Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
nikshaikh786
 
Connect - Using SDN to drive the development of Network Aware Services. Prof ...
Connect - Using SDN to drive the development of Network Aware Services. Prof ...Connect - Using SDN to drive the development of Network Aware Services. Prof ...
Connect - Using SDN to drive the development of Network Aware Services. Prof ...
Walton Institute
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
saritasingh19866
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnTAIWAN
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
NiviV4
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
Nehaam3
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
Tekle12
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
NiviV4
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
20TUCS251VIJAYASHARA
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
Syed Mustafa
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
mayurbankar2
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
IrawanAbiyantoro1
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
IJCNCJournal
 
section1.1.pptx
section1.1.pptxsection1.1.pptx
section1.1.pptx
mani651780
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
devika g
 
Mr.sami mubarki
Mr.sami mubarkiMr.sami mubarki
Mr.sami mubarki
Sami Elwan Mubarki
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
Protik Roy
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
revathiyadavb
 

Similar to Slide share assignment for thesis presentation (20)

Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Connect - Using SDN to drive the development of Network Aware Services. Prof ...
Connect - Using SDN to drive the development of Network Aware Services. Prof ...Connect - Using SDN to drive the development of Network Aware Services. Prof ...
Connect - Using SDN to drive the development of Network Aware Services. Prof ...
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsn
 
Grid computing
Grid computingGrid computing
Grid computing
 
CCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptxCCS335 – CLOUD COMPUTING.pptx
CCS335 – CLOUD COMPUTING.pptx
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
CCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructureCCS335 - Cloud architecture model and infrastructure
CCS335 - Cloud architecture model and infrastructure
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
Grid computing notes
Grid computing notesGrid computing notes
Grid computing notes
 
wireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptxwireless mesh netowrk Seminar.pptx
wireless mesh netowrk Seminar.pptx
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
section1.1.pptx
section1.1.pptxsection1.1.pptx
section1.1.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Mr.sami mubarki
Mr.sami mubarkiMr.sami mubarki
Mr.sami mubarki
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Slide share assignment for thesis presentation

  • 1. Slide share Assignment for Thesis Presentation S1160127 Yuta Takahashi
  • 2. Abstract • The data-store grids helps to construct and manage . Flexible, elastic, secure, sustainable • It loosely coupled integration of sensor data and related services.
  • 3. Keyword • Brief Description of Content • Network-Centric Approach • Loosely Coupled Service Integration • Messaging Network • Smart Grid • Health Care
  • 4. Introduction • Brief Description of Content: In the present paper, a network-centric information scheme is proposed to satisfy the above requirements for an enterprise including sensor net. • The proposed scheme uses structured overlay network. • This network, hereafter referred to as a “messaging network” is used to exhange and process application-level messages.
  • 5. Proposed Scheme using a Content- Aware Network • The sensor data are directly to a content- aware network messaging network. • Messaging network is constructed as a structured overlay network over the existing network. • The data are immediately sent to distributed data store grids.
  • 6. Messaging Network • A publisher merely sends new content to a content-aware network configured on a messaging network whenever the new content becomes available.
  • 7. Data Store Grid for data-service Integration • The data are delivered with varying interests to individual selective consumer applications in the messaging of the data. • Content-based summary the proposed scheme provides the following basic functions to the sensor network.
  • 8. Integration of overlay Networks with Policy Mediation • Content-aware router can realize policy mediation between different overlay networks. • We have constructed a experimental networks and examine the policy mediation between overlay networks having different policies.
  • 9. Conclusion • The proposed scheme can be realized by a structured overlay network over an ordinary IP network. • Therefore, it is easy to introduce the proposed scheme in order to create a sensor network based system if the individual system is connected to the legacy IP network. • The proposed scheme can also be used with non-IP networks as a virtual overlay network.
  • 10. Thank you for your kind attention.