This document proposes a system called SmartHealth-NDNoT, which uses Named Data Networking (NDN) for healthcare services in an Internet of Things (IoT) environment. It aims to develop an intelligent remote patient monitoring system using NDN. The key components of the proposed system include NDN routers, sensors to collect patient data, mobile applications, and hospital servers to process and analyze the data. The system uses NDN's features like hierarchical naming and in-network caching to efficiently distribute sensor data in the network while preserving privacy and security. A prototype of the mobile healthcare application was tested to demonstrate data collection, transfer, and visualization on hospital servers.
he Named Data Networking (NDN) project proposed an evolution of the IP architecture that generalizes the role of this thin waist, such that packets can name objects other than communication endpoints. More specifically, NDN changes the semantics of network service from delivering the packet to a given destination address to fetching data identified by a given name. The name in an NDN packet can name anything – an endpoint, a data chunk in a movie or a book, a command to turn on some lights, etc. The hope is that this conceptually simple change allows NDN networks to apply almost all of the Internet’s well-tested engineering properties to broader range of problems beyond end-to-end communications.
Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
he Named Data Networking (NDN) project proposed an evolution of the IP architecture that generalizes the role of this thin waist, such that packets can name objects other than communication endpoints. More specifically, NDN changes the semantics of network service from delivering the packet to a given destination address to fetching data identified by a given name. The name in an NDN packet can name anything – an endpoint, a data chunk in a movie or a book, a command to turn on some lights, etc. The hope is that this conceptually simple change allows NDN networks to apply almost all of the Internet’s well-tested engineering properties to broader range of problems beyond end-to-end communications.
Named Data Networking, for Computer Communications course presentation
pictures are cropped from that slides:
http://www.slideshare.net/wanderer_from/named-date?qid=1abab327-219a-4b69-a114-46e7f1634d42&v=qf1
http://www.slideshare.net/haroonrashidlone/named-data-networking?qid=bb7c7b7b-ee1b-4c2f-8df5-c4194282e8e2&v=qf1
http://named-data.net/content-centric-networking-video/
https://hal.inria.fr/file/index/docid/785298/filename/AIMS12_tutorial_CCN.pdf
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
This slideshow shows the threat ARP poisoning poses by allowing Packet sniffing attacks using Wireshark on a college network and provides possible mitigation action for the vulnerability
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
This slideshow shows the threat ARP poisoning poses by allowing Packet sniffing attacks using Wireshark on a college network and provides possible mitigation action for the vulnerability
Overview of SCTP (Stream Control Transmission Protocol)Peter R. Egli
Overview of SCTP (Stream Control Transmission Protocol), outlining the main features and capabilities of SCTP.
SCTP is a transport protocol that overcomes many of the shortcomings of TCP, namely head-of-line blocking and stream-oriented transmission.
SCTP supports multiple streams within a connection and preserves boundaries of application messages thus greatly simplifying communication.
Additionally, SCTP supports multi-homing which increases availability in applications with high reliability demands.
SCTP inherits much of the congestion, flow and error control mechanisms of TCP.
SCTP has its roots in telecom carrier networks for use in transitional voice over IP scenarios.
However, SCTP is generic so that it is applicable in many enterprise applications as well.
Building nTier Applications with Entity Framework Services (Part 2)David McCarter
Learn how to build real world nTier applications with the new Entity Framework and related services. This second part to the series will focus on using the Entity Framework in an nTier/ SOA world by separating out the different layers using T4 templates and using the new WCF Data Services to easily expose entity models via REST and to Silverlight clients.
Building nTier Applications with Entity Framework Services (Part 2)David McCarter
Learn how to build real world nTier applications with the new Entity Framework and related services. Make sure to attend Part 1. This second part to the series will focus on using the Entity Framework in an nTier/ SOA world by separating out the different layers using T4 templates and using the new WCF Data Services to easily expose entity models via REST and to Silverlight clients. Lots of code!
What happens in the Innovation of Things?Kim Escherich
From the ComputerWorld Internet of Things conference in Copenhagen October 27 2015. On definitions, markets, trends, needed capabilities and how to implement using IBM BlueMix.
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storageijtsrd
As a significant application in distributed computing, distributed storage offers client adaptable, adaptable and top notch information stockpiling and calculation administrations. A developing number of information proprietors decide to re appropriate information records to the cloud. Since distributed storage workers are not completely reliable, information proprietors need trustworthy intends to check the ownership for their documents moved operations to far off cloud workers. To address this vital issue, some distant information ownership checking RDPC conventions have been introduced. However, many existing plans have weaknesses in effectiveness or information elements. In this paper, we give another productive RDPC convention dependent on homomorphic hash work. The new plan is provably secure against phony assault, supplant assault and replay assault dependent on a run of the mill security model. To help information elements, an activity record table ORT is acquainted with track procedure on document blocks. We further give another streamlined execution for the ORT which makes the expense of getting to ORT almost steady. Besides, we make the far reaching execution investigation which shows that our plan has preferences in calculation and correspondence costs. Model usage and examinations show that the plan is plausible for genuine applications. A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35727.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35727/a-novel-efficient-remote-data-possession-checking-protocol-in-cloud-storage/a-brahma-reddy
Splunk for Industrial Data and the Internet of ThingsSplunk
Splunk software provides a scalable and versatile platform for machine data generated by all of the devices, control systems, sensors, SCADA, networks, applications and end users connected by today's networks. In this session we will discuss and demo how you can use Splunk software to gain insights into machine data generated by devices and control systems. We’ll cover common themes in use cases, and show you how to access the free apps and add-ons that simplify the connection and collection of data from both industrial systems and the Internet of Things. In addition we will introduce you to Splunk’s growing ecosystem of IoT and Industrial focused technology partners.
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
GICT Certified Internet of Things Specialist (CIoTS) course focuses on the core technologies behind Internet of Things (IoT).
Find Out More : https://globalicttraining.com
This webinar talks about how to successfully implement IoT to make your enterprise more connected, analytically capable, highly secure, and strongly cognitive.
Fin fest 2014 - Internet of Things and APIsRobert Greiner
An overview of the core concepts behind the ultra-hyped Internet of Things. We start the presentation with an overview and slight re-classification of what the Internet of Things is. Then, we jump into how to *serve* the internet of things - discussing a homebrew project using the RaspberryPi and Microsoft Azure.
IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4ijtsrd
The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. The ongoing progress in the field of Internet of Things IoT permits to embed security system as a part of it. In order to deal with security, authentication of legit users and in turn warning of unauthorized person plays an essential task. This report proposes to design an intelligent entrance control system based on biometric train in terms of fingerprint which also incorporates IoT functionality for indication of illegitimate users. Prof. S. D. Lavange | Mr Girish Goalit | Mr. Sachin Kshirsagar | Mr Prasad Barhate "IoT Assisted Fingerprint Based Door Security System using Raspberry PI 4" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30271.pdf Paper Url :https://www.ijtsrd.com/engineering/electrical-engineering/30271/iot-assisted-fingerprint-based-door-security-system-using-raspberry-pi-4/prof-s-d-lavange
In IoT StreamConf's keynote, Todd Greene, CEO of PubNub, kicked off the conference with an optimistic keynote address, looking forward to solving the challenges of Internet of Things communication.
Similar to Smart health NDNoT named data network of things for healthcare services (20)
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
Smart health NDNoT named data network of things for healthcare services
1. Divya Saxena
Dr. Vaskar Raychoudhury
Nalluri SriMahathi
Department of Computer Science & Engineering
Indian Institute of Technology, Roorkee, India
SmartHealth-NDNoT: Named Data
Network of Things for Healthcare
Services
September 7, 2015 SmartHealth-NDNoT 1
2. Organization
Introduction
Internet of Things
Research gaps
Named Data Networking
Characteristics / features and main components
Open mHealth architecture
Proposed system architecture
Naming conventions
Testing of the prototype mobile healthcare
application
September 7, 2015 SmartHealth-NDNoT 2
3. Introduction
Availability of services
Infrastructure is needed to cater the needs
of growing population
Patient’s inconvenience, long wait,
exposure to germs, leave from work
September 7, 2015 SmartHealth-NDNoT <3>
4. Internet of Things (IoT) for
Healthcare Services
Smart healthcare aims to build an IoT using wearable vital-
sign sensors connected through low-power wireless
technologies
September 7, 2015 SmartHealth-NDNoT <4>
http://www.mobile-sensing.com/products.html
5. Smart Objects
September 7, 2015 SmartHealth-NDNoT <5>
Smart Object
Sensing
Capability
Communication
Capability
Unique
Identifier
6. Requirements of IoT
Every object must be uniquely identifiable
Sender’s privacy and content security
must be preserved
Sensors data must be efficiently
distributed in the network
September 7, 2015 SmartHealth-NDNoT <6>
9. Research gaps
Huge number of devices
Unstable wireless communication
channels
Requirements of high security and privacy
September 7, 2015 SmartHealth-NDNoT <9>
10. Named Data Networking (NDN)
No name translation to IP address
Contents are well distributed across the
hosts, reduces the effect of node failure
User mobility
Security and Privacy
September 7, 2015 SmartHealth-NDNoT <10>
11. Smart Healthcare
Objectives
To develop an intelligent system for real-time
remote patient monitoring, diagnosis and
clinical care using Named Data Networking
(NDN)
September 7, 2015 SmartHealth-NDNoT 11
15. Packets in NDN Architecture
September 7, 2015 SmartHealth-NDNoT 15
Content Name Selector Nonce
order preference, publisher filter, scope,...
Interest packet
Content Name Signature Signed info
digest algorithm, witness,...
Data packet
publisher ID, key locator, stale time,...
Data
16. NDN Router Data Structures
September 7, 2015 SmartHealth-NDNoT 16
Names List of nonce List of incoming interfaces List of outgoing interfaces
Content
Name
Nonce Interface ID Lifetime Interface ID Send-time
Name
Prefixes
Stale Time Interfaces Ranked by Forwarding Policies
Name
Prefix
Time
Interface
ID
Routing
Preference
RTT Status Rate Limit
Pending Information Table (PIT) New
Forwarding Information Base (FIB) New
Content Store (CS) New
Responsible for caching data items
17. Forwarding Process at NDN Node
September 7, 2015 SmartHealth-NDNoT 17
Content Store
(CS)
Content Store
(CS)
Pending Interest
Table (PIT)
Pending Interest
Table (PIT)
FIB
Add Request Port
Create PIT entry
Drop Interest Packet
Return data
Content Store
(CS)
Content Store
(CS)
Pending Interest
Table (PIT)
Pending Interest
Table (PIT)
Drop Data
Data Packet
Process
Interest Packet
Process
Delete PIT Entry
Forward Data
Cache Data
Data
Packet
Interest
Packet
Miss
MatchedExact Matching
Longest Prefix Matching
18. NDN Forwarding Process
September 7, 2015 SmartHealth-NDNoT 18
Interest Packet
Data Packet
Content Requester
Content
Provider
Destination Address
Source Address
IP Packet
Content
Store
FIB
Content Requester
Content Store
(CS)
Content Store
(CS)
Pending Interest
Table (PIT)
Pending Interest
Table (PIT)
FIB
Add Request Port
Create PIT entry
Drop Interest Packet
Return data
Content Store
(CS)
Content Store
(CS)
Pending Interest
Table (PIT)
Pending Interest
Table (PIT)
Drop Data
Data Packet
Process
Interest Packet
Process
Delete PIT Entry
Forward Data
Cache Data
Data
Packet
Interest
Packet
Miss
MatchedExact Matching
Longest Prefix Matching
19. Naming
September 7, 2015 SmartHealth-NDNoT 19
Content requester/Application generated name
Version/Segment
Organizational nameGlobally-routable name
in/ac/iitr/btech/CS/ACN/lec/chapter1.ppt/2
Coventional/automatic
11 3322
iitr.ac.in
btech
CS
lec
Chapter1.ppt
ACN
20. Open mHealth Architecture
September 7, 2015 SmartHealth-NDNoT <20>
Standardized personal
data vaults and health
specific data exchange
protocols
Re-usable health data
and knowledge
services
Mobile plateforms iPhone/
Android/Feature Phones
mHealth Architecture
Analysis/visualization/
feedback
Storage
Data transport
Processing
Data capture
Patient/Caregivers
Open
21. System Architecture
September 7, 2015 SmartHealth-NDNoT <21>
Home
Network
Centralized
Enviroment
Distributedenviroment
Services
Operational
Servers
Network
Endpoints
Central Controller
Networking Services
& Database
NDNoT Gateway
Embedded Systems
& Sensors
Data
Collection
Data
Transfer
Data
Processing&
analysis/
Visualization.
Service
Locator
NDNofThings(NDNoT)
24. Topology for Proposed NDN-based
Healthcare Architecture
September 7, 2015 SmartHealth-NDNoT 24
Controller C
Hospital
Server B
(HSB)
Hospital
Server A
(HSA)
Mobile User M
IR1
IR2
25. September 7, 2015 SmartHealth-NDNoT <25>
Testing of the Prototype Mobile
Healthcare Application
26. Step 1: Mobile User M’s
Updated FIB
September 7, 2015 SmartHealth-NDNoT 26
27. Step 2: Sending Interest from
Mobile User M Interface
September 7, 2015 SmartHealth-NDNoT 27
28. Step 3: Data packet Received at
Hospital Server B Interface
September 7, 2015 SmartHealth-NDNoT 28
29. Step 4: Healthcare Server Interface
for Report Generation
September 7, 2015 SmartHealth-NDNoT 29
30. Step 5: Healthcare Server Interface
for Graph Plotting
September 7, 2015 SmartHealth-NDNoT 30