Upload
independent
View
0
Download
0
Embed Size (px)
Citation preview
DRAFT
Open Specifications for Wireless Grids
Technical Requirements
Version 0.2 approved: WiGiT Group Dr. Lee W. McKnight, Editor
Kauffman Professor of Entrepreneurship and Innovation School of Information Studies
Syracuse University
Prepared by Syracuse University, University of Arizona, Rochester Institute of Technology, Tufts University,
and WiGiT partners http://WiGiT.ischool.syr.edu
March 21st, 2013
2
Authors: Lee W. McKnight, Janet Marsden, Joe Treglia, Ed Nanno, Aashik Hameed and Ying Lu,
Syracuse University WiGiT Lab
Revision History: Name Date Reason For Changes Version
3
Table of Contents
Revision History
1. Introduction 1. Purpose
2. Project Scope
3. References to Related Documents
2. Overall Description 1. WiGiT v0.2 Technical Specification Overview
2. Features and Functionality
3. User Classes and Characteristics
4. Operating Environment
5. Design and Implementation Constraints
6. User Documentation
7. Assumptions and Dependencies
3. WiGiT v0.2 System Features and Components 1. System Logical Components Overview
2. Authentication and Authorization Component (AAC)
3. Billing, Accounting, and Charging Component (BAC)
4. Messaging and Presence Component (MPC)
5. Metadata Component (MC)
6. Resource Management Component (RMC)
7. Economic and Legal Policy Component (ELP)
7.1 Internet Rights and Principles
7.2 RFC 6852. Affirmation of the Modern Paradigm for Standards
8. Communication Protocols Component (CPC)
9. Security Component (SC)
4. External Interface Requirements 1. User Interfaces
2. Hardware Interfaces
3. Software Interfaces
4. Communications Interfaces
5. Data Interfaces
5. Other Nonfunctional Requirements 1. Performance Requirements
1.1 Guidelines for Web Accessibility
2. Safety Requirements
3. Security Requirements
4. Software Quality Attributes
6.0 Other Requirements
Appendix A: Glossary
Appendix B: Analysis Models
Appendix C: Issues List
Appendix D: References
4
1. Introduction
The Wireless Grid Innovation Testbed (WiGiT) and its Wireless Grid architecture and edgeware
have been developed under the auspices of the National Science Foundation Partnerships for
Innovation (PFI) grant #0227879. Syracuse University (SU) and Virginia Tech (VT) created the
first national WiGiT distributed experimental testbed in 2009. Working software prototypes were
first demonstrated at Syracuse University in 2003, and field tested since 2005. Hardware
implementations have been lab tested iteratively over the years, with initial field testing in
2008/9 and a new series of field trials begun again in 2011/2012. In August 2012 an enhanced
iDAWG (intelligent deployable augmented wireless gateway) was demonstrated, with additional
evaluations scheduled for 2013. Field tests of WiGiT specifications, applications, services, and
devices are ongoing in cooperation with WiGiT partner firms, schools, public agencies,
healthcare institutions, universities, and emergency managers. All are welcome to join WiGiT,
at no cost, and no obligation. (http://wigit.ischool.syr.edu/joinwigit)
The project is currently primarily supported by the National Science Foundation Partnership for
Innovation (NSF/PFI) program, NSF # 0917973. The WiGiT v0.2 Open Specifications presented
below have been developed in cooperation with Enterprise Cloud Leadership Council (ECLC) of
TM Forum. The ECLC ‘Workplace as a Service’ Whitepaper TR194, January 2013; and TR192,
October 2012, ‘Workplace as a Service Requirements.’ These are accessible at
www.tmforum.com. First, we explain the purpose for WiGiT open specifications. The
relationship between WiGiT v0.2 open specifications and Enterprise Cloud Leadership Council
Workplace as a Service is illustrated in Figure 1. Then we review functional requirements, and
components. Use Cases, such as for Workplace as a Service, are also elaborated on in separate
documents, such as WeJay, iDAWG (Intelligent Deployable Augmented Wireless Gateway),
NEERS (Networked Edgeware for Energy Resource Sharing).
1.1 Purpose
The purpose of this Version 0.2 initial release of open specification technical requirements is to
further define and describe the core components of the Wireless Grid Innovation Testbed
(WiGiT) first described in Version 0.1, released March 27, 2012. WiGiT is a wireless grid
network platform, and several edgeware applications associated with certain use cases for
WiGiT have been released (see WiGiT Group Use Cases). New use cases and implementable
software are in development and being prepared for testing. Edgeware is a new class of software
specifically designed for software applications deployed on wireless grids. Edgeware refers to
the software capability to deploy network ‘edge’ devices (aka nodes) as acting servers, hence the
‘serverless’ logic of the architecture. The WiGiT wireless grid architecture and platform enables
heterogeneous resource discovery and sharing through the formation of wireless grid virtual
networks. Wireless grids are dynamic virtual cognitive networks that exist only while they are in
use. Users are able to share and manage available and accessible hardware and software
5
resources through edgeware applications based on the WiGiT product’s core components.
WiGiT platform components and edgeware have built in security at multiple levels of the
network and are energy and bandwidth efficient by design. These open specifications further
define the WiGiT platform and the logical functions of the WiGiT core components in additional
detail based upon the 0.1 version.
Intended Audience and Reading Suggestions
The intended audience for these specifications includes entrepreneurs, executives, software
developers, network technicians and managers, computer programmers, project managers,
academics, students, and all global citizens that have an interest in new forms of application
development, network technology and wireless cognitive heterogeneous networks.
Because certain terms, such as ‘edgeware’, are new, and others are repurposed, a glossary of
terms is included in Appendix A.
Document Conventions
Terms that appear in the glossary are denoted by appearing in italics where they first are used in
the text.
1.2 Project Scope
Ultimately, WiGiT expects to be at the center of an emerging industry serving new markets
through its distributed incubation of wireless grid applications, training and workshops. By
incubating technology and teaching, both knowledge spillover and transfer between testbed
partners and their real/virtual communities flow, creating an entrepreneurial ecosystem that
encourages exploitation of opportunities to transform user practices and system designs into
novel tools and products. The WiGiT technology diffusion model could be one of several
artifacts produced by this project with wide applicability in other entrepreneurial ecosystems.
Please refer to the Open Specifications for Wireless Grids Vision and Scope Document for a full
discussion of the vision and scope.
Figure 1: Open Edgeware-Enabled Approach to WPaaS
6
(Source: McKnight, ed. WiGiT v0.2 in process.)
The Enterprise Cloud Leadership Council (ECLC) Catalyst Project is delivering end-user
computing, communications, and collaboration capabilities through a set of world-class services
that we call Workplace as a Service (WPaaS), in a context of everything as a service across an
internet of things within the enterprise. This Open Edgeware-Enabled Approach proposed a
flexible secure cloud service delivery framework for edge applications based on Bring Your
Own Devices (BYOD) for enterprise level services. (Source: Workplace as a Service
Requirements, TM Forum TR192, 2012)
Product Perspective
The WiGiT architecture and edgeware has been in development since the early 2000’s. Wireless
grids software applications were implemented in 2002-2005 within the Syracuse University (SU)
Wireless Grids Lab under the NSF PFI grant #0227879 [1]. As a proof of concept the team
developed a modest initial application that allowed devices with no prior knowledge of each
other to collectively record and mix an audio signal such as a concert, speech, lecture or
emergency event. The project demonstrated the potential of wireless grids and distributed ad-hoc
resource sharing to harness the combined abilities of mobile devices in social contexts [1]. Note,
in 2013 Syracuse University was awarded a patent related to that original work, for ‘Distributed
Audie Recording and Collaborative Mixing.’ A wireless grid application, WeJay, developed by
7
Wireless Grids Corporation, which spun out of the university lab, has been developed under
license to Syracuse University, and is undergoing current testing in several school systems and
potentially soon with other WiGiT partner organizations.
Building on prior research Syracuse University (SU) and Virginia Tech (VT) created the first
national WiGiT. The project is currently supported by the National Science Foundation
Partnership for Innovation (NSF/PFI) grants, NSF # 0917973.
The WiGiT allows researchers to experiment with grids available throughout the community,
with the objective that WiGiT would enable transformative technologies by bridging the gap
between wireless network middleware and grid application layers, creating new markets and
realigning existing ones. WiGiT serves industry needs for intra-system, or crossover work,
bridging grid or cloud computing on one platform and wireless Internet on another, and
contributing to open standards for application programming interfaces on wireless grids.
Product Features
The evolution of computing has lead to networks which are characterized by decentralization and
decreasing institutional control over resources. Wireless Grids, mobile ad-hoc resource sharing
networks, are challenging environments in which users strategic behaviors are crucial to system
performance. We discuss technical, social, legal and economic trends in their operation and
application within distributed, Grid, and cloud computing [2].
1.3 References to Related Documents
WiGiT Group Open Specifications for Wireless Grids Vision and Scope document
WiGiT Group Open Specifications for Wireless Grids Use Cases: Wejay, iDAWG, VT CROSS,
Workplace as a Service (WPaaS)
2. Overall Description
WiGiT technology creates wireless grids or infrastructure-less mobile ad hoc networks. Wireless
grids can intelligently and dynamically interconnect users and stakeholders at multiple sites,
transfer digital media, assume and respond to different equipment types, and adapt to low power
conditions and diminished communications capabilities.
Figure 2 shows the wireless grid framework. Wireless grids’ functionality can be viewed in
multiple ways: as a front-end/user interface to heterogeneous resources, a mesh network used for
sharing resources, as low-powered sensors networked together, or as ultra wideband, eg, or other
high-capability spectrum sharing technologies. Characteristics of wireless grids include small,
low powered devices that can address concerns about power efficiency. Wireless grids are
compatible with many device types, including mobile and nomadic devices, phones, tablets,
8
laptops, and network computers. The omnivorous intelligence of wireless grid edgeware offers
spontaneous, simultaneous access to telematics, eg. Onstar and capabilities of meshing groups of
devices together and pooling resources to enable new applications based on networks of wireless
sensors for environmental, health, security monitoring, and other potential applications.
Figure 2. WiGiT Open Framework
2.1 Overview There are two modes of wireless grid creation; user mode and node-based mode. Figure 2 and
Figure 3 and 4 show these two modes. Comparing a ‘human user’-centric grid with a ‘node-
based’ grid in purely conceptual terms, it is evident that in both cases the outermost frontier of
what is currently possible, i.e., engaging the full range of user types (with device heterogeneity
considered on an infinite axis) only goes so far. As of today the successful interoperability in an
entirely localized setting is difficult and not achievable without flash drives, uploads, downloads,
drivers, and ultimately wires. The promise of the wireless grid technology is the capability of
machine-to-machine communication via a virtual distributed operating system that enables the
‘internet of things’.
Figure3. User View Figure 4. Machine View
9
In contrast to today’s internet, the wireless grid or ‘Grid’ is software-driven, serverless and
infrastructureless (in the sense of dedicated infrastructure). The Grid is made possible by the
‘Grid Core’. This is a piece of software that is installed on any Grid-enabled device. It consists of
a common core library with binding for the local environment. It runs as a low level system
process and as a result is always available, though its function and capability is dictated by user
assertion. Users are allowed to share and manage the digital resources at their fingertips through
applications of the architecture’s eight core components: the Authentication and Authorization
Component (AAC), the Billing, Accounting and Charging Component (BAC), the Messaging
and Presence Component (MPC), the Metadata Component (MC), the Resource Management
Component (RMC), the Economic and Legal Policy Component (ELP), the Communication
Protocols Component (CPC), and the Security Component (SC).
2.2 Features and Functionality
Interacting with or using the Grid is dependent upon the key functionality of the resource
sharing protocol (RSP), which has the primary function of enabling service discovery for
nomadic ad hoc heterogeneous resource allocation through the following attributes:
○ Resource Advertisement/Discovery
○ Resource Identification
○ Resource Acquisition
○ Resource Description
○ Clearing Mechanisms
○ Coordination of Systems
○ Trust Establishment and Security
2.3 User Classes and Characteristics
Please refer to the illustrative use cases contained in the WiGiT Group Open Specifications for
Wireless Grids Use Cases: WeJay, iDAWG, NEERS and VT CROSS.
2.4 Operating Environment
The Wireless Grid operating environment is based on agnostic acquisition and utilization of
existing networked and network compatible devices, and other resources. In that sense, there is
only one operating environment – the Wireless Grid – but in another sense, there are limitless
potential operating environments.
2.5 Design and Implementation Constraints
10
As a preliminary specification for a technology that is still in development and exists mainly in
testbeds at this time, this is beyond the scope of this document. Suffice it to say, the security,
policy, privacy and cost considerations of this technology have been closely scrutinized, and will
continue to be evaluated as development continues. However, those applications that are now
public have met or surpassed every test or challenge that they have been subjected to, and in
every evaluation have been found to be superior to the standards now in use.
2.6 User Documentation
At this time, this document and the documents noted as ‘Related Documents’ in section 1.3 are
the only planned documentation. However, full user manuals, online help, and other academic
and professional documentation will be defined, produced and published appropriately in
conjunction with associated edgeware releases. The WiGiT Group expects to perform this
function for the wireless grid community of users and developers and will establish a library of
shared resources.
2.7 Assumptions and Dependencies
The Wireless Grid technology is based on known wired and wireless network protocols and
network architectures such as OSI and TCP/IP. The Wireless Grid is compatible with but not
dependent upon these networking models. The intent of the technology is to enable
interoperability between and among these and other existing networks, such as cellular
telephony, satellite communications, cognitive radio and more, the obvious assumption and
dependency is that these technologies will continue to exist. However, the flexibility of the
Wireless Grid is such that it will be adaptable to new and emerging systems and devices.
3. System Features and Components
The blue boxes in Figure 5 represent edgeware applications that sit on a user interface which in
turn sits on an API. These may represent dozens or hundreds of different sorts of mini-programs
that enable different kinds of resource sharing and functionality. Edgeware applications are
typically delivered as a service; and come in 2 primary varieties: gridlets, that is, proprietary
edgeware applications, and wiglets, that is, non-proprietary open edgeware applications. Not all
devices enabled on a wireless grid need to have an edgeware application sitting on them to be
accessible and active. The only thing that must be deployed for a wireless grid to work is for the
Grid Core to be on some intelligent machine, somewhere, with rights to control other ‘edge’
resources such as sensors that may not have the capability to have the core components installed;
which may be facilitated by one or more gridlets and/or wiglets. Other network hardware,
software, services, and content may be controlled and shared through the wireless grid
‘edgeware’. These may not be or cannot become self-aware devices on the grid. However, if
those ‘edge’ resources are in a relationship with other hardware, software, and services which are
part of the wireless grid, they may function as if they were fully cognitive. A further
11
differentiation in the varieties of edgeware applications may also be drawn between peer to peer
implementations, and cloud to edge applications which may appear at first glance to be a basic
client-server implementation. In both cases however, the edgeware application may be able to
interact dynamically with other types of edgeware applications. Meaning, the architecture and
open specifications presented here allow for ad hoc, peer to peer applications and services to
interact with cloud services.
The Core components are represented by the green box and embedded in certain devices or
sensors depending on their capability. This makes every device a node on the wireless grid.
This core is extremely ‘light’ and easy to embed on a wide range of different kinds of equipment.
Users are allowed to share and manage the digital resources at their fingertips through
applications of the architecture’s eight core components.
Figure 5 A Grid Core (courtesy of WiGiT Lab & WGC, 2013)
The wireless grid architecture core components handle four primary functions: management of
identification (ID) and presence, permissions management, data transfer ability, and
API/interfacing. These are the elements that make the grid-enabled ecosystem possible. The
layers above the core are comprised of the API which enables connections with other
applications and services, the User Interface (which may or may not be necessary depending on
the device upon which it sits), and finally the edgeware applications are shown in blue. Once a
grid is established then resources can be published or accessed across the grid, enabling the
infinite functional possibilities of the Grid technology.
There are three classes of wireless grid applications:
Class 1: Applications aggregating information from the range of input/output interfaces
found in nomadic and mobile devices.
Class 2: Applications utilizing the locational and contextual characteristics in which the
devices will be found.
Class 3: Applications leveraging the mesh network capabilities of groups of devices.
12
3.1 System Logical Components Overview
3.1.1 Everything as a Service and Bring Your Own Device
This new computing model allows people use their web browsers to access a wide range of
‘cloud services’ available on-demand over the Internet without installing packaged software
applications on end-users’ computers. In the future, the intelligent cloud service gives users a
seamless, consistent experience across all of the different devices the users own, and all of the
various on-demand services they care about. (Shane Robison, 2008)
Smarter devices and more intelligent networks help deliver this new category of services, and
software is the important element that powers these new services and shapes the quality of the
user experience. But Software as a Service is not the comprehensive solution; the future state is
everything will be delivered to users as a service, from the work life to entertainment to various
communities. Individuals and businesses will have full control to customize their computing
environments by dynamic cloud-based offerings and to shape the experiences they want to have.
(Shane Robison, 2008)
BYOD is a business policy of employees bringing personally owned mobile devices to their
work place and using those devices to access privileged company resources such as email, file
servers and database as well as their personal applications and data.
Business values include mainly the 3 following perspectives:
Productivity: Business people, especially for the financial services employees, have on-demand
access to more information and the tools to use it. Also they can more readily collaborate and
share information, expertise, and other resources. For IT staff, they can spend much less effort on
operations and management of everyday information systems and can focus more on technology-
enabled business improvement which can bring in more profit for the company.
Agility: With on-demand access to modular information assets, people can assemble new
business capabilities and bring innovations to market quickly. They can then scale those
innovations up and integrate them into business operations with minimal disruption.
Profitability: Commodity services like email and collaborative workspaces can be provisioned at
lower cost because of the scale economics of the public cloud. The cost of using and maintaining
business applications can be reduced. Additionally, with pay-by-usage, the ongoing cost of
applications and other services will decline and align with real business need. By optimizing the
distribution and management of workloads across public, private, and hybrid clouds, an
organization can obviously lower its total infrastructure and personnel IT spend. What is more,
the footprint and cost (including energy cost) of its physical infrastructure is reduced, and
traditional data center costs is declined significantly.
13
Other benefits contain manageability, information access, new capability deployment,
coordination and collaboration, business continuity and security, business invocation, growth,
and etc. (Source: Optimizing the journey to the cloud: balancing trust, economics, and
functionality, EMC perspective)
3.1.2 A Reference Architecture Comparison: VPC/WPaaS/CIaaS
Workplace as A Service (WPaaS), Compute Infrastructure as a Service (CIaaS) and Virtual
Private Cloud (VPC) are reference architectures that potentially can meet the unique
requirements to satisfy enterprise-grade customers. VPC fully implemented implies WPaaS and
CIaaS development for enterprise-grade operations. We define “enterprise-grade” as the ability
to deploy business critical services that match or exceed the level of security, quality, reliability,
and availability found in internal corporate data centers. VPC enterprise level requirements are
typically not cost effective or practical to implement for external public clouds and a general
purpose customer base. VPC requirements include:
High levels of automation, including automated provisioning and dynamic configuration of
diverse workloads and multi-tier application topologies including web servers, application
servers, database servers, security components (e.g. firewalls) and infrastructure
components (e.g. DHCP).
Unified workload management interface across all internal and external cloud providers.
A vendor agnostic solution that is not locked into a hardware vendor, software vendor, or
service provider.
Portability to move running workloads from one physical host to another in an automated
manner.
The ability to create and enforce automated workload management policies for stateless
computing architectures including:
Instance management (e.g. creating and deleting VMs, starting and stopping
VMs, etc.)
Storage configuration and management (e.g. creating and deleting storage
volumes, attaching volumes to VMs, initiating backups/snapshots, etc.)
Network configuration and management (e.g. VPN, NAT, VLANs, IP address
overlays, etc.)
Security configuration and management (e.g. creating and deleting security
zones, dynamically configuring firewalls in accordance with security zones,
etc.)
User account management (e.g. authentication and authorization)
Service level management (e.g. instance scalability limitations, automated
recovery, etc.)
Capacity management (e.g. auto-scaling, cloud-bursting, etc.)
14
Encryption services for data in transit and for data at rest.
Secure management of encryption keys (including private key certificates or pre-shared keys).
Flexible reporting including support for billing and accounting processes and the capture of historical data for predictive usage models and analytical efforts.
Integrated monitoring and metering of workloads, including monitoring of bandwidth, performance, latency, storage, etc., provided through a portal or an AP.
VPC is a modular, flexible design with minimal complexity. The VPC reference architecture has
four major components: workload lifecycle management, automated infrastructure as a
service, zoned security model, and optimized physical infrastructure.
Figure 6: VPC Reference Architecture Overview
(Source: TM Forum, TR174 Addendum C V0.1 Enterprise-Grade Virtual Private Cloud from a State-of-the-Art Implementation, 2012)
Based on results which were tested and validated in a lab environment, VPCs offer an agile and
less costly IT operating model for enterprise customers. These results show that VPCs can be
implemented rapidly and that they deliver high levels of automation and time savings. They
also operate VMs at costs up to 75% less than comparable public cloud offering. (TM Forum,
TR174 Addendum C V0.1 Enterprise-Grade Virtual Private Cloud from a State-of-the-Art
Implementation)
E d g e w a r e
15
The Resource Sharing Protocol (RSP) is the primary Grid function provided by the eight core
components.
Authentication and Authorization
Component (AAC)
Billing, Accounting, and Charging
Component (BAC)
Messaging and Presence Component
(MPC)
Metadata Component (MC)
Resource Management
Component (RMC)
Economic and Legal Policy Component
(ELP)
Communication Protocols Component
(CPC)
Security Component (SC)
Resource Sharing Protocol (RSP) Open API
External users, apps, devices, etc
Menu
Figure 7: Open API Map (Source: Lee McKnight & Ying Lu)
The RSP enables creating, joining and subscribing to a wireless grid through provision of the
following services:
○ Resource Identification
○ Resource Acquisition
○ Resource Advertisement/Discovery
○ Communication among wireless grids
○ Communication with the internet
○ Creating a wireless grid
○ Joining and subscribing to a wireless grid
The eight core components discussed in detail below are the functional elements and components
needed to create a wireless grid.
3.2 Authentication and Authorization Component (AAC)
The Authentication and Authorization Component (AAC) – This is the component that handles
the authentication of the user and the authorization of resources. In effect, the AAC provides the
protocols to identify the individual and understand that individual’s relationship to a resource,
i.e. what the individual can or can’t do with a resource. This component must also provide
protocols to manage multiple identities mapped to a given resource; possibly in later, more
advanced iterations of the core, in order to support the abstractions of multi-layered access that
16
the AAC should support. The AAC does not manage permissions. Permission management is
handled through the meta-data in the resource.
The AAC utilizes a Global Unique Identifier (GUID). Every grid creates with it a globally
unique identifier that is used by all grid members.
The AAC has an identity system that looks at users across all their devices and allows policies to
be made regarding the user’s grid profile – without the user having to think about all of their
user/device accounts. At the enterprise level, this identity system may look at users across their
office-related devices and accounts. A tremendous potential exists here for integration with
combined social network offerings that bring together services like Facebook and Twitter®, and
provides a way to access some subset of features from outside the consumer/home office through
a web browser and mobile phones.
The AAC incorporates a policy engine based on the notion of identity that allows users to make
simple statements such as “visitors cannot access my shared photos”, or “Kevin cannot use the
Internet after 8pm.”
3.3 Billing, Accounting, and Charging Component (BAC)
The BAC segment highlighted many benefits that are attractive to banks in particular. The
WiGiT can offer extraordinary improvements to service for many of the largest banks in the
world. The customers of these large banks will be able to securely access all of the information
regarding their accounts from any location they want so long as the customer has either internet
or 3G access at the time. The infrastructure will offer the customer an all-in-one experience as
they will be able to view all accounts and transactions from one interface. (Goldsmith, Kettel and
Chen, 2012) The technology can help banks save money from reduced overhead costs and
potentially provide better service to end users. Bank and other financial institution employees
will also see benefits from using the WiGiT platform. Employees who are preparing documents
for their clients will have instant access to all financial information they need from one place.
For instance, a mortgage officer preparing a mortgage for a client who is trying to buy a house
will be able to prepare the mortgage must faster than what has currently been possible in the past
with the use of the legacy systems that are not integrated. (Goldsmith, Kettel and Chen, 2012)
Assuming the WiGiT platform is integrated with the three major credit agencies; the mortgage
officer will be able to instantly view a person’s credit scores. This is currently a process that
takes days or even weeks as bank employees need to contact credit agencies and credit reports
are then individually sent to the banks in whatever timeframe the credit agency wishes to operate
at. Another benefit that bank employees will realize is the ability to access all of the before
mentioned information in a secure manner from any location that they wish to access the
information from. (Goldsmith, Kettel and Chen, 2012) Bring Your Own Device is becoming a
necessity as employees are working from remote locations. The banks and their employees will
see the greatest benefits from the adoption of the WiGiT platform and the efficiency that will
come from the use of the platform will be immense.
17
See also: McKnight, L. M. , J Howison. J. (2003), Towards a Sharing Protocol for Wireless
Grids. In Proceedings of the International Conference on Computer Communication and Control
Technologies. CCCT '03, Orlando, Florida, USA, July 31 - August 2, 2003.
See also: Term Paper from IST 456, Professor: McKnight; Team Member: Paul Goldsmith,
Kevin Kettel, Maggie Chen, 2012
3.4 Messaging and Presence Component (MPC) The Messaging and Presence Component (MPC) – This is a scalable messaging and presence
system. It manages the availability of a resource and the method or language of communication
with that resource. The messaging and presence component remains under development.
3.5 Metadata Component (MC) The Metadata Component (MC) – This component creates, edits, and generally manages the
metadata for a resource, i.e. it facilitates the creation of metadata around resources. For example,
this resource is a File with a name of “fall events calendar.pdf” that belongs to Dave, and is
accessible on his laptop. This metadata component from an interface perspective in later
iterations of the core can look like a dynamic, advanced search tool allowing for user-defined
tags to drive the process of identifying which resources need to be manipulated at any given
time.
3.6 Resource Management Component (RMC) The Resource Management Component (RMC) – This component is responsible for aggregating
and searching metadata about resources within the context of authentication, it therefore works
closely with the AAC and MPC. In actual fact this component may be considered extended
functionality of the MC, but defining its operation separately here is useful for clarity. The RMC
must be tied methodically to the function of the user interface to support the richness of the
search mechanisms supported by the MC.
The RMC has a scheduler to manage and coordinate resources, such as video recorders, network
access, lights, air conditioning, and security systems, and a virtual file system that seamlessly
integrates files from any of the multiple machines that a user has access to.
The RMC provides a search mechanism that allows a user to find files that may be on their
laptop, desktop, or on their mobile phone.
The RMC Grid advertising/discovery protocol allows for devices to be identified as being
available. A Grid “hello” packet is established
18
3.7 Economic Legal and Policy Component
Microsoft
Alcatel Lucent
W-Pass
UBS
P1P2
P3
Policy Governance Compliance
Proof Point 1
Proof Point 2
Proof Point 3
CLOUD OPERATING MODEL
Boundary
API
OS
Figure 8: Cloud Operating Model – Policy, Governance, Compliance
(Source: ECLC, New York, Sept. 25, 2012.)
Business Policy, Corporate Governance, and Compliance policies are necessary for
edgeware applications to provide service to large enterprises and other
organizations with stringent procedural reporting and legally mandated monitoring
obligations. While cloud services can be configured to maintain conformance to
economic, legal and policy conditions and reporting obligations, truly assuring
compliance – without use of wireless grids edgeware – can be challenging in a
19
cloud and especially multi-mobile cloud environment. WiGiT v0.2 is architected to
meet the cloud operating model conditions of policy, governance and compliance
assurance, that the Enterprise Cloud leadership Council envisions for Workplace as
a Service has established. See Figure 8 above. Admittedly, in time WiGiT could
run into many more problems in international policies rather than domestic. The
reason for this is because international economics deals more with the flow of
commodities, services, and capital across national boundaries. (Psatha and
Vavassoeur, 2012) Due to the fact that WiGiT works in a global economy,
understanding and implementing these policies would greatly help WiGiT’s
progress.
Areas that WiGiT open specification may eventually align with include exchange
rates, commercial policies, domestic policies, statistical data, productive factors,
and marketing considerations. For WiGiT operations to flow smoothly on an
international level, understanding each of these areas may be required to
effectively understand WiGiT’s needs. (Psatha and Vavassoeur, 2012)
Exchange rates dealt mainly with transactions within a country that are financed by
the country’s own currency, usually through the writing of checks. Due to the fact
that each country has its own currency, the price of one currency in terms of
another can vary greatly which is known as the exchange rate. Many of these
exchange rates vary from day to day due to supply and demand conditions in the
foreign exchange markets. Such international transactions require payments in
foreign currencies, which mean that the domestic currency needs to be converted.
This process introduces some risks and complications that don’t exist in domestic
trade which WiGiT needs to incorporate in order to avoid problems when buying
or selling products and services internationally. (Psatha and Vavassoeur, 2012)
Another and more complicated factor that WiGiT needs to pay attention to is
commercial policies. A national government may introduce new restrictions on
international transactions that cannot be imposed on domestic transactions. Such
restrictions can include tariffs, import quotas, voluntary export restraints which is a
negotiated quantitative limitation on the export of certain commodities between
countries, export subsidies, and exchange control which is a restriction that a
country places to not allow the conversion of currency. Such measures can have a
major effect on WiGiT and their operations when dealing with international
transactions. (Psatha and Vavassoeur, 2012) Other countries can consider some
transactions that WiGiT makes unlawful, which is why understanding the
commercial policy is so important.
20
Statistical data is also an aspect that WiGiT needs to pay attention to when only
dealing on an international basis. If WiGiT needed to move a product within the
US, there would be no problem, but when moving products in and out of the
country, WiGiT would need to fill out a declaration describing its weight, value,
destination, size, direction, and other characteristics. All countries require these
regulations. (Psatha and Vavassoeur, 2012) Understanding that WiGiT is an
organization that deals with numerous projects such as the iDAWG and wireless
grid technology, they need to understand the importance of relative immobility and
productive factors. Factors of production are obviously much more mobile
domestically than they are internationally. There are no restrictions that WiGiT
would need to face when moving workers or products domestically like there are
internationally. Immigration restrictions, language barriers, and different social
customs can halt mobility between countries for WiGiT employees.
The last area that we focused on was marketing considerations. Understanding this
concept is very important for WiGiT because differences in demand patterns, sales
techniques, market requirements and the overall “like factor” make international
transactions difficult to deal with (Psatha and Vavassoeur, 2012). What this means
is that WiGiT will need to make special adjustments on their product design if they
wish to enter the foreign market.
Source: Term Paper From IST 456, Professor: McKnight; Team Member: Anthony
Psatha & Gerren Vavassoeur
The Dynamic Coalition on Internet Rights and Principles of the UN Internet
Governance Forum developed a Charter of Internet Rights and Principles, which is
accessible at http://internetrightsandprinciples.org/campaign/. While expecting
WiGiT developer and user communities to uphold the entire Charter, the 10
Internet Rights and Principles summary is appended below, as a reference.
10 Internet Rights and Principles
1) Universality and Equality
All humans are born free and equal in dignity and rights, which must be respected,
protected and fulfilled in the online environment.
2) Rights and Social Justice
21
The Internet is a space for the promotion, protection and fulfillment of human
rights and the advancement of social justice. Everyone has the duty to respect the
human rights of all others in the online environment.
3) Accessibility
Everyone has an equal right to access and use a secure and open Internet.
4) Expression and Association
Everyone has the right to seek, receive, and impart information freely on the
Internet without censorship or other interference. Everyone also has the right to
associate freely through and on the Internet, for social, political, cultural or other
purposes.
5) Privacy and Data Protection
Everyone has the right to privacy online. This includes freedom from surveillance,
the right to use encryption, and the right to online anonymity. Everyone also has
the right to data protection, including control over personal data collection,
retention, processing, disposal and disclosure.
6) Life, Liberty and Security
The rights to life, liberty, and security must be respected, protected and fulfilled
online. These rights must not be infringed upon, or used to infringe other rights, in
the online environment.
7) Diversity
Cultural and linguistic diversity on the Internet must be promoted, and technical
and policy innovation should be encouraged to facilitate plurality of expression.
8) Network Equality
Everyone shall have universal and open access to the Internet’s content, free from
discriminatory prioritization, filtering or traffic control on commercial, political or
other grounds.
9) Standards and Regulation
22
The Internet’s architecture, communication systems, and document and data
formats shall be based on open standards that ensure complete interoperability,
inclusion and equal opportunity for all.
10) Governance
Human rights and social justice must form the legal and normative foundations
upon which the Internet operates and is governed. This shall happen in a
transparent and multilateral manner, based on principles of openness, inclusive
participation and accountability.
(Source: Dynamic Coalition on Internet Rights and Principles,
http://internetrightsandprinciples.org/campaign/)
Affirmation of the Modern Paradigm for Standards
On 29 August 2012, the leaders of the IEEE Standards Association, the IAB, the
IETF, the Internet Society, and the W3C signed a statement affirming the
importance of a jointly developed set of principles establishing a modern paradigm
for global, open standards. These principles have become known as the
OpenStand" principles. This document contains the text of the affirmation that was
signed.
Status of This Memo
This document is not an Internet Standards Track specification; it is published for
informational purposes.
This document is a product of the Internet Architecture Board (IAB) and represents
information that the IAB has deemed valuable to provide for permanent record. It
represents the consensus of the Internet Architecture Board (IAB). Documents
approved for publication by the IAB are not a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata, and how to
provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6852.
RFC 6852 Modern Paradigm for Standards January 2013
Copyright Notice
23
Copyright (c) 2013 IETF Trust and the persons identified as the document
authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions
Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the
date of publication of this document. Please review these documents carefully, as
they describe your rights and restrictions with respect to this document.
1. Introduction
On 29 August 2012, the leaders of the IEEE Standards Association, the IAB, the
IETF, the Internet Society, and the W3C signed a statement affirming the
importance of a jointly developed set of principles establishing a modern paradigm
for global, open standards. These principles have become known as the
"OpenStand" principles.
Section 2 of this document describes the five OpenStand principles. Section 3 of
this document contains the text of the signed affirmation of the five OpenStand
principles. Section 4 contains a call for others to support the five OpenStand
principles.
2. Modern Paradigm for Standards
Over the past several decades, the global economy has realized a huge bounty due
to the Internet and the World Wide Web. These could not have been possible
without the innovations and standardization of many underlying
technologies. This standardization occurred with great speed and effectiveness
only because of key characteristics of a modern global standards paradigm. The
affirmation below characterizes the principles that have led to this success as a
means to ensure acceptance of standards activities that adhere to the principles.
We embrace a modern paradigm for standards where the economics of global
markets, fueled by technological advancements, drive global deployment of
standards regardless of their formal status.
In this paradigm standards support interoperability, foster global competition and
collaboration, are developed through an open participatory process, and
are voluntarily adopted globally.
24
These voluntary standards serve as building blocks for products and services
targeted at meeting the needs of the market and consumer, citizens and the public
interest thereby driving innovation. Innovation in turn contributes to the creation of
new products and services including those presented in the marketplace and those
provided in the public interest and towards the development of the Internet as a
global public good.
Participation in the modern paradigm demands:
1. Cooperation. Respectful cooperation between standards organizations, whereby
each respects the autonomy, integrity, processes, and intellectual property rules of
the others.
2. Adherence to principles. Adherence to the five fundamental principles of
standards development:
* Due process. Decisions are made with equity and fairness among
participants. No one party dominates or guides standards development. Standards
processes are transparent and opportunities exist to appeal decisions. Processes for
periodic standards review and updating are well defined.
* Broad consensus. Processes allow for all views to be considered and addressed,
such that agreement can be found across a range of interests.
* Transparency. Standards organizations provide advance public notice of
proposed standards development activities, the scope of work to be undertaken,
and conditions for participation. Easily accessible records of decisions and the
materials used in reaching those decisions are provided. Public comment periods
are provided before final standards approval and adoption.
* Balance. Standards activities are not exclusively dominated by any particular
person, company or interest group.
* Openness. Standards processes are open to all interested and informed parties.
3. Collective empowerment. Commitment by affirming standards organizations
and their participants to collective empowerment by striving for standards that are
chosen and defined based on technical merit, as judged by the contributed expertise
of each participant; provide global interoperability, scalability, stability, and
resiliency; enable global competition and collaboration serve as building blocks
25
for further innovation; are inclusive and are directed to support the broadest base
of inclusion including for those with disabilities, those in rural and remote
locations, and those of modest economic means contribute to the creation of global
communities, benefiting humanity.
MG: WHAT ABOUT CONTRIBUTING TO THE PUBLIC INTEREST AND TO ENABLING THE DEVELOPMENT OF THE INTERNET AS A GLOBAL PUBLIC GOOD?
4. Availability. Standards specifications are made accessible to all for
implementation and deployment. Affirming standards organizations have defined
procedures to develop specifications that can be implemented under fair
terms. Given market diversity, fair terms may vary from royalty-free to fair,
reasonable, and non-discriminatory terms (FRAND) and including those which are
non-market based
5. Voluntary adoption. Standards are voluntarily adopted and success is
determined by the market, their contribution to the public good among other
criteria.
3. Affirmation
We embrace a modern paradigm for standards where the economics of global
markets, support for the public good at national and global levels, fueled by
technological advancements, drive global deployment of standards regardless of
their formal status.
In this paradigm standards support interoperability, foster global competition and
collaboration, are developed through an open participatory process, and are
voluntarily adopted globally. These voluntary standards serve as building blocks
for products and services targeted at meeting the needs of the market and
consumer, citizens and the public interest thereby driving innovation.
Innovation in turn contributes to the creation of new markets and public benefits
and the growth and expansion of existing markets and realization of public
developments in the public interest.
Affirmation of the Modern Paradigm for Standards
draft-iab-modern-paradigm-01, Housley, et. al.
Expires: 20 April 2013 INTERNET DRAFT 6 September 2012
26
Over the past several decades, the global economy has realized a huge bounty due
to the Internet and the World Wide Web. These could not have been possible
without the innovations and standardization of many underlying technologies. This
standardization occurred with great speed and effectiveness only because of key
characteristics of a modern global standards paradigm. The affirmation below
characterizes the principles that have led to this success as a means to ensure
acceptance of standards activities that adhere to the principles.
We embrace a modern paradigm for standards where the economics of global
markets, fueled by technological advancements, drive global deployment of
standards regardless of their formal status.
In this paradigm standards support interoperability, foster global competition, are
developed through an open participatory process, and are voluntarily adopted
globally. These voluntary standards serve as building blocks for products and
services targeted at meeting the needs of the market and consumer, thereby
driving innovation. Innovation in turn contributes to the creation of new markets
and the growth and expansion of existing markets.
Participation in the modern paradigm demands:
1. Cooperation. Respectful cooperation between standards organizations, whereby
each respects the autonomy, integrity, processes, and intellectual property rules of
the others.
2. Adherence to principles. Adherence to the five fundamental principles of
standards development:
* Due process. Decisions are made with equity and fairness among
participants. No one party dominates or guides standards development. Standards
processes are transparent and opportunities exist to appeal decisions. Processes for
periodic standards review and updating are well defined.
* Broad consensus. Processes allow for all views to be considered and addressed,
such that agreement can be found across a range of interests.
* Transparency. Standards organizations provide advance public notice of
proposed standards development activities, the scope of work to be undertaken,
and conditions for participation. Easily accessible records of decisions and the
27
materials used in reaching those decisions are provided. Public comment periods
are provided before final standards approval and adoption.
* Balance. Standards activities are not exclusively dominated by any particular
person, company or interest group.
* Openness. Standards processes are open to all interested and informed parties.
3. Collective empowerment. Commitment by affirming standards organizations
and their participants to collective empowerment by striving for standards that:
* are chosen and defined based on technical merit, as judged by the contributed
expertise of each participant; provide global interoperability, scalability, stability,
and resiliency; enable global competition; serve as building blocks for further
innovation; and contribute to the creation of global communities, benefiting
humanity.
4. Availability. Standards specifications are made accessible to all for
implementation and deployment. Affirming standards organizations have defined
procedures to develop specifications that can be implemented under fair terms.
Given market diversity, fair terms may vary from royalty-free to fair, reasonable,
and non-discriminatory terms (FRAND).
5. Voluntary adoption. Standards are voluntarily adopted and success is determined
by the market.
http://tools.ietf.org/html/draft-iab-modern-paradigm-01
<Note for v0.3: Need to Modify Open Standards doc to meet Michael Gurstein’s
criticisms>
3.8 Communication Protocols Component (CPC) The Communication Protocols Component (CPC) – This is a sub-system that manages the
communication protocols needed to interact with specific types of resources, such as Printers,
Files, Service Accounts, etc. The CPC Manages the communications protocol needed to interact
within a wireless grid, and identifies and manages network and internetwork communications.
The CPC includes IP and other protocols (eg Bluetooth), providing connections with other
wireless grids and across the internet. The Communication Protocols Component is still under
development. Note however that the framework has been expanded since v0.1 to include Zigbee
and 802.22; and explicitly assumes IPv6. See Figure
28
3.9 Security Component (SC) Security Component (SC) – Security component is built of five sub components of each of the
listed core components above; AAC, MPC, MC, RMC and CPC. Security has three levels: grid
owner, user access control, and guest. The security capabilities for each core component are
listed below.
AAC: three levels of authentication: simple, crowd, centralized authentication and three levels of
authorization: open (minimum security, maximum accessibility), restricted (uses locally defined
access control list) and managed (uses grid defined policy-based access control).
MPC: Security is derived from resource metadata
MC: Metadata component uses a distributed database describing resource and user profile.
RMC: Security component includes scheduled authorization monitoring and access verification,
resource denial of service protection:
○ End-to-end security and trust
○ Content Monitoring vs Privacy
○ Distribution Volume Tracking Systems
CPC: denial of service protection for network communication, protection mechanisms for
resources and metadata
While many of the attacks are common across wireless environments, the highly distributed and
collaborative nature of the wireless cloud will have to take on increased security protocols to
protect against threats from the wireless grid environment, the cloud environment and the data
transported from the cloud to the grid (see Figure 9, Wireless Cloud Threat Model). While
threats focus on specific attacks to computing environments, the model below takes into
consideration that threats should consider the skill of the attacker, their propensity to actually
launch an attack, their concern for risk of detection or attribution and the likelihood of success.
The assumption is that the most highly skilled, motivated hackers would attack organizations that
implement a wireless cloud within its environment. [5]
29
Figure 9 : Wireless Cloud Threat Model
Therefore, in a secure wireless cloud environment, organizations will need to shift their focus
from perimeter-based security models to a service-level view of security, with emphasis not so
much on ownership and control, but on network identities, trust, and authorization of both users
and applications. The architectural construct of a secure wireless cloud computing environment
is identified in Figure 10 [9] identifies the wireless cloud as a natural extension of the wireless
grid, which provides seamless access to the internet, networked devices and computing
capabilities. The wireless cloud is a kind of next-generation wireless grid, an emerging
technology and the publication on it is limited [9].
Figure 10. A Future Wireless Cloud Security Architecture
The wireless cloud security architecture is purposely kept technology-agnostic: there is no
mention of any specific wire protocols, interfaces, or data models, except that everything will be
web services based since the WiGLET interfaces directly with the cloud. Over time, the security
30
standards will evolve and new standards will continue to emerge and the conceptual architecture
will not be inherently stable and may not remain the same. For this architecture, data exchanges
will be transmitted through the use of encrypted data via a secure tunnel EAP-TLS/TTLS [10,
11]. This secure tunnel provides a secure interaction amongst the WiGLET and the Cloud
software. A security token-based authentication (e.g. x.509 certificates) model could be used
before invoking any secure web services. A cloud client needs to explicitly authenticate itself to
a security token service which is one of the services offered by the WiGLET. After successful
authentication, the client will be given a one-time security token, which is then passed in the
regular web service request message to invoke a target service. The token essentially establishes
a session whose duration is the lifespan of the token. During the session, the client can use the
same token to invoke any services (subjecting to the local access control policy of course) and
doesn‟t have to be authenticated again, thereby achieving service-level Single Sign-On (SSO).
Compared with the direct authentication model specified in the WS-Security [WSS] standard
[12], this approach improves performance by eliminating per-message authentication overhead,
which is quite significant when asymmetric key exchange is involved.
4.1 Hardware Requirements
The radio components support the connectivity for wireless grid, and also carry the information
exchanging functionalities among heterogeneous nodes.
4.1.1 Connectivity
Each node shall have at least one radio. This radio provides the connectivity between the service
request node and service nodes, or between the service request node and one access point to
wired networks, which connects the service nodes. The radio components may have capabilities
to access multiple wireless standards. A radio combo module may include multiple standard
radio interfaces, such as WiFi and Bluetooth. It may be one ultra wideband software defined
radio supporting those commercial wireless standards. The radio may have capabilities to hand
over among different wireless access networks. The radio may maintain connections to two
different wireless systems while executing this hand over process. The radio components may
support both remote access and local access. Remote access may be supported with cellular
networks or WiFi networks. Local access may be supported with shorter-range wireless
standards, such as Bluetooth and Zigbee. Ad-hoc or mesh networks are an option for
connectivity when hierarchical systems are not available or a different option is preferred. Co-
existence mechanisms among multiple radios may be defined by each system.
4.1.2 Protocol
Service access and service provision may map to different physical channels in terms of
frequency, time, or code. The protocols and interfaces of Wireless Grids run within the
31
application layer, which may be carried by commercial wireless standards, such as WiFi and
cellular. TCP and UDP may be used as data communication protocol.
4.1.3 Power Consumption
Battery life reduction should be less than 25% for nodes joining wireless grids compared their
free-run mode. Power efficient platforms may be introduced in order to reduce power
consumption. Resource management may be introduced in order to improve the power
efficiency.
4.1.4 Platforms
The devices joined into a wireless grid include but are not limited to sensors, mobile devices,
personal computers, and high performance servers.
4.2 Software Requirements
Software components allow wireless grids to dynamically interconnect cell phones, Macs and
PC’s based on multiple software platforms such as droid OS, Mac, IOS, or Android. Specified
software modules that account for these and other devices/applications are based on the logical
components outlined in section 3.0.
4.3 Data Interfaces
(AUDIO, VIDEO (files, documents, unstructured data, streams), IMAGING, DOCUMENTS
(text files, etc.) AUDIO
This section describes interfaces for wireless grids. More details for general grid systems can be
found in reference [3]. Figure 5 shows the transactions for an example of the resource sharing
protocol described in section 3.0. This process can be divided into two phases. The first phase is
the service access phase and the second is the service provision phase.
32
Figure 11 Resource Sharing Protocol (RSP)
Service access phase
Service request node sends out resource discovery and issue service request once received
response from service nodes. Service nodes response to service request node with their resource
reservations. Service request node responses with a resource reservation acknowledgment. Then
service request node gets access to the resource.
Service provision phase
Service nodes share their resource with service request node. Both service request and service
nodes monitor the usage and exceptions of resource. When service is done, the resource will be
released or recycled.
33
There are several types of interfaces dedicated to wireless grids systems. Each interface can be
included into one frame with several control domains.
Resource Discovery: Resource discovery can be used for a service request node to search for its
desired resource. Broadcasting protocol should be used.
Source ID (SID):
Definition: ID used to identify the node that issues resource discovery.
Value: IP address
Example: 192.168.1.1
Description: the node has an ip address of 192.168.1.1
Resource Type(RTP):
Definition: description of resource type.
Value: 0-255. 0-127 for software; 128 -255 for hardware.
Example: 0
Description: the node has type 0 resource (software, hardware)
Methods (MET)
Definition: Methods for resource discovery.
Value: 0-31: 0-15 for time based, 16-31 for propagation based.
Example: 16
Description: Flooding method.
Timestamp (TIM):
Definition: time when resource discovery issued.
Value: GMT
Example: 06:00AM 02/01/2012
Description: Resource discovery issued on 06:00AM 02/01/2012
Expire Time (EXP)
Definition: The period after which the receiver can ignore the discovery.
Value: 0-24hrs.
Example: 2 hours
Description: resource discovery can be ignored after two hours from its issued time.
Restrictions (RES)
Definition: policies of restrictions.
Value: 0-16.
Example: 0
Description: resource discovery cannot go beyond 10 hops.
Resource Description: resource description can be used by service node to broadcast its
available resource.
34
Node ID (NID):
Definition: ID used to identify the node that the resource attached to.
Value: IP address
Example: 192.168.1.1
Description: the node has an ip address of 192.168.1.1
Resource Type(RTP):
Definition: description of resource type.
Value: 0-255. 0-127 for software; 128 -255 for hardware.
Example: 0
Description: the node has type 0 resource (software, hardware)
Availability_T (AVT):
Definition: The period when the resource is available
Value: GMT
Example: 01:00AM 02/01/2012- 01:00AM 02/02/2012
Definition: The resource will be available for 24 hours.
Availability_A (AVA):
Definition: The area where the resource is available
Value: IP on Gateway
Example: 192.168.XXX.XXX
Description: all the nodes within 192.168.XXX.XXX domain can share this resource.
Restriction (RES)
Definition: rules for restrictions
Value: 0-16
Example: 0
Description: This resource has a restriction rule type 0.
Resource Reservation: resource reservation provides an interface for the reservation of resource
along with an authorization.
Source ID (SID):
Definition: ID used to identify source node.
Value: IP address
Example: 192.168.1.1
Description: the service request node has an ip address of 192.168.1.1
Destination ID (DID):
Definition: ID used to identify destination node.
Value: IP address
Example: 192.168.1.2
Description: the service node has an ip address of 192.168.1.2
Resource Type(RTP):
Definition: description of resource type.
35
Value: 0-255. 0-127 for software; 128 -255 for hardware.
Example: 0
Description: the node has type 0 resource (software, hardware)
Method (MET):
Definition: resource request methods.
Value: 0-16
Example: 0/1
Description: 0 Request for one server, 1 request for more than one server.
Timestamp (TIM):
Definition: Length for reservation.
Value: GMT
Example: 06:00AM 02/12/2012
Description: time when a resource request/ack is issued.
Reservation_T (RST):
Value: 0-24hrs.
Example: 2 hours
Description: resource need to be available at least for 2 hours.
Restrictions (RES)
Definition: policies of restrictions.
Value: 0-16.
Example: 0/1
Description: 0 for Preemptive; 1 for non-Preemptive.
TYPE (TYP)
Definition: interface types.
Value: (0,1).
Example: 0/1
Description: 0 for request; 1 for Acknowledgment.
Resource Monitoring: resource monitoring provides a method to monitor the status of the
desired resource. Point-to-point protocol can be used.
Source ID (SID):
Definition: ID used to identify source node.
Value: IP address
Example: 192.168.1.1
Description: the service request node has an ip address of 192.168.1.1
Destination ID (DID):
Definition: ID used to identify destination node.
Value: IP address
Example: 192.168.1.2
Description: the service node has an ip address of 192.168.1.2
Resource Type (RTP):
Definition: description of resource type.
36
Value: 0-255. 0-127 for software; 128 -255 for hardware.
Example: 0
Description: the node has type 0 resource (software, hardware)
Resource Status(RSS)
Definition: status of resource.
Value: 0/1.
Example: 0
Description: 0 for idle; 1 for busy
Method (MET):
Definition: resource monitoring methods.
Value: 0-16
Example: 0/1
Description: 0 for polling, 1 for reporting.
Timestamp (TIM):
Definition: time when resource discovery issued or responsed.
Value: GMT
Example: 06:00AM 02/01/2012
Description: Resource discovery issued on 06:00AM 02/01/2012
TYPE (TYP)
Definition: interface type
Value: (0,1).
Example: 0/1
Description: 0 for monitoring interface; 1 for its ack.
Resource Recycle: resource recycle interface can be used to predict the future resource status. It
can also be used to request release a resource immediately.
This interface provides an exit for resource occupation. Both point-to-point and broadcast
protocol can be used.
Source ID (SID):
Definition: node id that the resource attached to.
Value: IP address
Example: 192.168.1.1
Description: the service request node has an ip address of 192.168.1.1
Resource Type (RTP):
Definition: description of resource type.
Value: 0-255. 0-127 for software; 128 -255 for hardware.
Example: 0
Description: the node has type 0 resource (software, hardware)
Resource Status(RSS)
Definition: status of resource.
Value: 0/1.
Example: 0
Description: 0 for idle; 1 for busy
37
Timestamp (TIM):
Definition: time when the resource recycle is issued.
Value: GMT
Example: 06:00AM 02/01/2012
Description: Resource discovery issued on 06:00AM 02/01/2012
Length (LEN)
Definition: length for resource to be occupied in the future.
Value: hours
Example: 2 hours
Description: the indicated resource will be released in 2 hours
Expiration (EXP)
Definition: Expiration time
Value: hours
Example: 3 hours
Description: The resource recycle can not be guaranteed after 3 hours.
5 Other Requirements
5.1 Performance Requirements
<14 Guidelines for Web Accessibility>
1. Provide equivalent alternatives to auditory and visual content
2. Do not rely on color alone
3. Use markup and style sheets and do so properly
4. Clarify natural language usage
5. Create tables that transform gracefully
6. Ensure that pages featuring new technologies transform gracefully
7. Ensure user control of time-sensitive content changes
8. Ensure direct accessibility of embedded user interfaces
9. Design for device-independence
10. Use interim solutions
11. Use W3C technologies and guidelines
12. Provide context and orientation information
13. Provide clear navigation mechanisms
14. Ensure that documents are clear and simple
(cite + link
http://www.w3.org/TR/1999/WAI-WEBCONTENT-19990505/#themes
38
Universal Access - Disability studies (COTELCO, BBI, CDL) to be included.
(Minimum required level of service and response and quality)
39
Appendix A: Glossary
Ad- hoc UDDI (Universal Description Discovery and Integration): UDDI is a
directory where web service descriptions that follow WSDL (Web Service
Description Language) are registered. Ad- hoc UDDI allows broadcasting of the
services. It has methods to list all its services to a client that does not know what
services are available.
Ad- hoc Environment for Wireless grid: It demands a combination of distributed
(because connection to centralized control cannot be guaranteed) and centralized
architecture (to be scalable, and allow efficient provision of services).
Computing Capability: different platforms may need different computing
capabilities.
Cloud Computing: while there are many different definitions of Cloud computing,
we prefer the following NIST definition as the basis for our understanding of
Cloud Computing: (http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-def-
v15.doc)
“Cloud Computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources (e.g., network, servers,
storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction.”
Demand and supply Aggregation: Allowance of wireless device access to near-by
computing devices or wireless systems for proxy-resources (like cached files and
storages). Aggregation of shared processing power provides the availability of
extensive computing and storage power by sharing unused resource of many
personal computers.
The existing concepts of Dialogue Independence and UIMS are extended to
provide users a wide range of different access and interaction mechanisms to the
same underlying data and functionality:
Dialogue Independence: It refers to the separation of user interface-related code
from the rest of the application code. It therefore supports the development of
alternative user interfaces for the same application (semantics).
40
Edgeware: a new class of software that operates at the edges of networks (hence
‘edgeware’) in order to take advantage of the capabilities of grid architecture. The
Wireless Grids Corporation, a corporate sponsor of WiGiT, has developed
commercial applications including WeJay, a social networking applications that
allows music and other file sharing, and several other edgeware application
products that are currently in beta test.
Edge Node (EN): Service node in charge of inter-cluster or remote access
communication.
Grid Architecture: a network architecture that enables resource discovery and
sharing through the formation of virtual wireless grids.
Grid: A grid is a collection of distributed resources that are shared among a group
of users. It schedules and coordinates resources to offer a diverse collection of
services over a network of connected devices. It defines methods to define, create,
discover, and manage distributed services.
Leader Node (LN): Service node in charge of resource allocation and monitoring
within a service cluster.
IaaS or (Cloud) Infrastructure as a Service: A generic term for the provision of
core IT infrastructure technology components as a service, with defined service
levels and flexible billing.
There is also an explicit demarcation of responsibility, with the service provider
taking responsibility for the provision of the underlying cloud service, including
data centers, communication, hardware, virtualization, orchestration, and
management up to the virtual machine, and the consumer taking responsibility for
the OS, databases, middleware, and applications hosted on the IaaS service.
Note that IaaS can be provided internally or externally to an enterprise’s data
centers and by the enterprise’s own IT team (acting as an internal service partner)
or provided by an external service partner. In casual language, IaaS is generally
accepted to refer to externally-hosted, externally-provided services from the view
of the enterprise.
Marshalling: Refers to the process of converting native programming language
data types to a format suitable for transmission across a network; the term
41
"unmarshalling" is the conversion of data received over a network from its on-the-
wire representation to data types appropriate to the receiving application.
Nomadic Devices: Refers to devices with the emphasis not on connectivity while
literally in motion, but rather when the user is at various fixed but possibly varying
locations. For example using a notebook computer at a wi-fi hotspot could be seen
as use of a nomadic device.
Network Peering: A form of barter exchange in which interconnecting carriers
agree to exchange traffic at no charge.
Operating Systems: a list of operating systems can be found in [3].
Service Clusters (SC): Clusters formed with multiple service nodes
Service Nodes (SN): nodes response to service requests with desired
hardware/software resources.
Service Process: A typical service process may be divided into two phases:
a.) Service access: SRN send service request to SN through LN. SNs response to
the request based on their own status and observation. LN forms a table
representing the map between service demands and supply.
b.) Service provision: LN makes decisions about resource allocation based on
resource utilization and channel status. SNs start processing service request.
Service Request Nodes (SRN): nodes send out service requests
Sharing Level Agreement: One of the main operations of virtual market that
describes protocols, which define the responsibility of participants within a
wireless communications grid. It not only encompasses the roles and
responsibilities of the users within the grid, but also governs the attainment and
fulfillment of requested resources.
Trusted Computing: Controlling end node behavior by allowing network clients to
ascertain that a peer is running application code without detrimental behaviors like
injecting corrupted content and flooding networks and it excludes misbehaving
clients from the network.
42
Peer-to-Peer (P2P) Networks: These are properly called overlay networks to
emphasize that they run over the existing institutionally owned and managed
infrastructure.
UIMS (User Interface Management System): A software component that is
separate from the application program that performs the underlying task and
supports the concept of dialogue independence.
Virtualization: three types of virtualization methods may be used for wireless
grids: hypervisor, emulator, and OS-level virtualization.
Wireless Grid: a human centric open access gateway to shared resources for
mobile and wireless electronic devices interconnecting at least one device to at
least one other device or resource. A device can establish a grid and become an
member of one or more wireless grids.
WPaaS (Workplace as a Service): Enterprises need a flexible, secure, cloud
services delivery framework for edge applications. The solution described here
delivers end-user computing, communications and collaboration capabilities. We
call that set of world-class services WPaaS.
Appendix B: Analysis Models
V0.3 incorporates and emphasizes standards, including IEEE P2030.4 (Smart Grid
Interoperability Working Group), NIST (Smart Grid Interoperability Panel),
CABA (Continental Automated Building Association), and etc. Also IPV6
Compatible issue is considered.
43
Figure 12. WiGiT V0.3 Open Spec -- Virtual Energy, SmartGrid, Smart Building
Appendix C: Issues List
A listing of issues raised and supported operating systems will be included in the future.
Appendix D: References
[1] Fitzek, F. and Katz, M. “Cellular Controlled Peer to Peer Communications: Overview and Potentials”, Chapter 2 in Cognitive Wireless Networks, Springer, 2007. [2] McKnight, L. W., Lehr, W., & Howison, J. (2003). “Coordinating User and Device Behavior in Wireless Grids, in Inventing the Communications Future”. MIT Media Lab Workshop, 2003. [3] OGF194 from open grid forum: http://www.gridforum.org/ [4] www.cornet.wireless.vt.edu
44
[5] Tyson Brooks, Jerry Robinson, Lee McKnight, “Conceptualizing a Secure Wireless Cloud,”
International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.1, No.3, August
2012, pp. 89-114. Journal homepage: http://iaesjournal.com/online/index.php/IJ-CLOSER
[6] Ian Foster, Carl Kesselman, and Steve Teuke, “The Anatomy of the Grid: Enabling Scalable Virtual
Organizations,” International Journal of High Performance Computing Applications, Volume 15
Issue 3, August 2001, Pages 200 – 222. http://dl.acm.org/citation.cfm?id=1080667
[7] H. Luthria and F.A. Rabhi. “Service-Oriented Architectures: Myth or Reality?” IEEE Software, volume
29, issue 4, July/August 2012, pages 46-52.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6086531&contentType=Journa
ls+%26+Magazines&sortType%3Dasc_p_Sequence%26filter%3DAND%28p_IS_Number%3A6265
068%29
[8] Dr. Lee W. McKnight, Editor, “Open Specifications for Wireless Grids: Technical Requirements,”
Version 0.2 in process. To appear on http://WiGiT.ischool.syr.edu/index.php/news/96-WiGiTs-idawg-communications-elements-progressing-to-field-test-
[9] Tyson, Brooks., Lee, McKnight. "Securing Wireless Grids: Architecture Designs for Secure WiGLET-to-WiGLET Interfaces", International Journal of Information & Network Security (IJINS), Vol.2, No.1, February 2013, pp. 336-351 [10] J. Chen and Y. Wang, “Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience,” IEEE Communications Magazine, vol. 43 (12), pp. 26 – 32, 2005 [11] P. Funk and S. Blake-Wilson, “Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0) RFC 5281, 2008 [online], Internet Engineering Task Force, available: http://www.ietf.org/ [Accessed: February 5, 2012 [12] OASIS Open Standards, "Web Services Security (WSS) 1.1," OASIS, 2005 [online] available: http://www.oasis-open.org/standards#samlv2.0 [Accessed: June 15, 2011 [13] Term Paper from IST 456, Professor: McKnight; Team Member: Paul Goldsmith, Kevin Kettel, Maggie Chen, 2012 [14] Term Paper From IST 456, Professor: McKnight; Team Member: Anthony Psatha & Gerren Vavassoeur [15]Dynamic Coalition on Internet Rights and Principles, http://internetrightsandprinciples.org/campaign/ [16] Affirmation of the Modern Paradigm for Standards, http://www.rfc-editor.org/info/rfc6852; http://tools.ietf.org/html/draft-iab-modern-paradigm-01
45
[17] TR174 Addendum C, Version 0.1, Enterprise-Grade Virtual Private Cloud from a State-of-the-Art Reference Implementation, 2012 [18] TR172 - TM Forum Security Management Model, 2013 [19] TR192, Workplace as a Service Requirements, Version 0.3, 2013 [20] TR194, Version 8.3, Multi-Cloud Service Management Accelerator Pack Introduction, 2012 [21] Marco Di Renzo, Luis Alonso, and Frank H. P. Fitzek. “GREENET – An Early Stage Training Network in Enabling Technologies for Green Radio”, IEEE VTC 2011, Budapest : Hungary, 2011, DOI: 10.1109/VETECS.2011.5956211 [22] Shane Robison, Chief strategy and technology officer, HP, The Next Wave: Everything as a Service, 2008, http://www.hp.com/hpinfo/execteam/articles/robison/08eaas.html [23] http://www.pcworld.com/article/246760/pros_and_cons_of_byod_bring_your_own_device_.html [24] Aberdeen Group, “Enterprise-Grade BYOD Strategies: Flexible, Compliant, Secure”, Analyst Insight, 2011, pp. 1-4