The Smart and Connected Vehicle and the Internet of Things · PDF file• An Introduction...
Transcript of The Smart and Connected Vehicle and the Internet of Things · PDF file• An Introduction...
Flavio BonomiCisco Fellow, Vice President
and Many Others
Advanced Architecture and ResearchCisco Systems
The Smart and Connected Vehicleand the
Internet of Things
WSTS 2013, San Jose’
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 2
• An Introduction to the Internet of Things• The Future Infrastructure for the Internet of
Things• The Connected Vehicle and Intelligent
Transportation• Enabling Technologies • Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 3
• An Introduction to the Internet of Things• The Future Infrastructure for the Internet of
Things• The Connected Vehicle and Intelligent
Transportation• Enabling Technologies • Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 4
A good way to go beyond the “naming” confusion:(IoT, M2M, Cyber-Physical Systems, Intelligent Systems,
Industrial Internet, Connected Devices, etc., etc.)
People
Home Mobile
Business
Things DataWhite Paper at:http://www.cisco.com/web/about/ac79/docs/innov/IoE_Economy.p
df
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 5
MillionPC /
Laptop
BillionIP Device
Office & Home
The Evolution of IP Networks
MillionVoice
Source: Cisco ([email protected])
One Common (Computing, Storage and Networking) Infrastructure: The Ultimate Convergence
of Enterprise, Service Provider, and Data Center
Technologies
TrillionEnd Points
From RFID to Smart Sensors to Machines to More Complex Objects
(e.g., a car)
BillionMobile Voice, Internet, SMS
The Evolution of IP Networks The Evolution of Mobile Networks
“The IoT Computer”
Cisco Confidential 6© 2010 Cisco and/or its affiliates. All rights reserved.
Enable New Knowledge
Agriculture
Energy Saving (I2E)
Predictive maintenance
Enhance Safety & Security
Smart Home
Healthcare
Defense
Intelligent Buildings
Smart Grid
Industrial Automation
Transportation and Connected Vehicles
Smart City
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 7
• An Introduction to the Internet of Things• The Future Infrastructure for the Internet of
Things• The Connected Vehicle and Intelligent
Transportation• Enabling Technologies • Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 8
CoreIP/MPLS, QoS, Multicast, Security, Network Services, Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/Ethernet/PLC
Embedded Systems and Sensorssmart and less smart things, vehicles, machines
Wired or Wireless
Data Center CloudApplication Hosting, Management
Field Area Network
Smart Things Network
The “Swarm”
IP/MPLS Core
End-Point Intelligence
Centralized Intelligence: CLOUD
Computing
Dumb NetworkFabric
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 9
CoreIP/MPLS, QoS, Multicast, Security, Network Services,Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/Ethernet/PLC
Embedded Systems and Sensorssmart and less smart things, vehicles, machines
Wired or Wireless
Data Center CloudApplication Hosting, Management
Field Area Network
Smart Things Network
The “Swarm”
IP/MPLS Core
……
…
…
…
…
…Distributed
Intelligence: FOG Computing
Di t ib t d
Computing
Distributed Intelligence:
CLOUD/FOG Computing
Centralized Intelligence: CLOUD
Computing
End-Point Intelligence
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 10
CoreIP/MPLS, QoS, Multicast, Security, Network Services, Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/Ethernet/PLC
Embedded Systems and Sensorssmart and less smart things, vehicles, machines
Wired or Wireless
Data Center CloudApplication Hosting, Management
Field Area Network
Smart Things Network
IP/MPLS Core
……
…
…
…
…
…Distributed
Intelligence: FOG Computing
Di t ib t d
Computing
Distributed Intelligence:
CLOUD/FOG Computing
Centralized Intelligence: CLOUD
Computing
End-Point Intelligence
IngestNetwork DataSecurity on Data
Sensor networksSmart gridSmart citiesSCV & Transportation
IngestNetwork DataSecurity on Data
Sensor networksSmart gridSmart citiesSCV & Transportation
StoreNetwork Management LogsSecurity Logs
Smart Cities DataTraffic InformationEnvironmental data
StoreNetwork Management LogsSecurity Logs
Smart Cities DataTraffic InformationEnvironmental data
Analyze/act on the Fly
User experienceNetwork PerformanceIntrusion DetectionFraud DetectionSensor MonitoringEnvironmental monitoringSurveillanceContact Center
Analyze/act on the Fly
User experienceNetwork PerformanceIntrusion DetectionFraud DetectionSensor MonitoringEnvironmental monitoringSurveillanceContact Center
Mine in-depth
HealthCareSecuritySurveillanceEnvironmental studies
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 11
CoreIP/MPLS, QoS, Multicast, Security, Network Services, Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/Ethernet/PLC
Embedded Systems and Sensorssmart and less smart things, vehicles, machines
Wired or Wireless
Data Center CloudApplication Hosting, Management
Field Area Network
Smart Things Network
IP/MPLS Core
……
…
…
…
…
…Distributed
Intelligence: FOG Computing
Di t ib t d
Computing
Distributed Intelligence:
CLOUD/FOG Computing
Centralized Intelligence: CLOUD
Computing
End-Point Intelligence
Edge-Point, Swarm, Fastest ControlEdge-Point, Swarm, Fastest Control
Fog-Based ControlFog-Based Control
Core-Based ControlCore-Based Control
Cloud-Based (Slowest) Control
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 12
CoreIP/MPLS, QoS, Multicast, Security, Network Services, Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/Ethernet/PLC
Embedded Systems and Sensorssmart and less smart things, vehicles, machines
Wired or Wireless
Data Center CloudApplication Hosting, Management
Field Area Network
Smart Things Network
IP/MPLS Core
……
…
…
…
…
…Distributed
Intelligence: FOG Computing
Di t ib t d
Computing
Distributed Intelligence:
CLOUD/FOG Computing
Centralized Intelligence: CLOUD
Computing
End-Point Intelligence
F Cl dFrom Cloud towards
Fog/Endpoints
Video/ContentSoftware UpdatesControl Policies
VMs/Context/Applications
From Endpoints towards Fog/Cloud
MeasurementsTelematics
EventsVideo SurveillanceVMs/Context/Apps
Peer-to-Peer(Fog, Endpoints)
ContentStatus
Mobile DataVMs/ContextApplications
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 13
CoreIP/MPLS, Security, QoS, Multicast, Network Services, Mobile Packet Core
Multi-Service Edge3G/4G/LTE/WiFi/802.11pWired
Embedded Systems and SensorsLow power & bandwidth, smart things, vehicles, machines
MillionsMillions
Data Center/CloudHosting IoT analytics
Field Area Network
Smart Things Network
IP/MPLS CoreNetwork ManagementNetwork Management
Distributed Intelligence: FOG
Computing
ApplicationsApplications
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 14
• An Introduction to the Internet of Things• The Future Infrastructure for the Internet of
Things• Intelligent Transportation and the Connected
Vehicle• Enabling Technologies • Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 15
Intelligent Transportation
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 16
Ope
ratio
nIn
fras
truc
ture
End
Poin
tsSe
rvic
es
Public Cloud
Subscription-based Services
Subscription-based Services
Private (OEM) Cloud
Data Center/Virtual Servers
Data Center/Virtual Servers
Enterprise Cloud
Enterprise Video, Voice, Data
Enterprise Video, Voice, Data
V2V Communication (802.11p)
Electrical Charging NetworkCharging Stations,
Other Services (802.11p ?)
Electrical Charging NetworkCharging Stations,
Other Services (802.11p ?)
Mobile WiFi OffloadWi-Fi Hotspots, 802.11u, 3G/4G
Mobile WiFi OffloadWi-Fi Hotspots, 802.11u, 3G/4G
Consumer NetworkHome/Dealership Wi-Fi Hotspots, Femtocells
Consumer NetworkHome/Dealership Wi-Fi Hotspots, Femtocells
Mobile SP 1Mobile SP 1Communications Service Providers, “Fog”
VNOPolicy Enforcement, Flow-based
Management, DPI
VNOPolicy Enforcement, Flow-based
Management, DPI
Software
DSRC RoadsideInfrastructure802.11p (V2I)
DSRC RoadsideInfrastructure802.11p (V2I)
Mobile SP 1Mobile SP 1
Energy Service Providers
(Smart Grid)
V2I/Upstream Communication (Wi-Fi, 3G/4G, 802.11p, etc.)
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 17
Smart Phone
Wheel-Sensor
Collision Radar
Low Speed NetworkLIN, Lo-speed CAN
Electronic Control Unit (ECU)
Entertainment networkMOST, internal WiFiX-by-Wire/
Safety Network Flexray
Wirelessin-car network,Bluetooth, Low
Power WiFi, RFID
High-speed network
Hi-speed CAN
Central Gateway
IOS
Wireless car-to-X networkDSRC 802.11p, WiFi,
WiMAX, Multiple 3G/LTE
Home Enterprise Web OEM Roadside Grid
Audio/ Video DiagnosticsTelematics ADAS ….
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 18
Main EngineController
Transmission
Energy
ChassisModule
DSC
ChassisSatellite 2
Vehicle Control SW/GW
Chassis Satellite 3.3C
AN
Flex
Ray
AssistanceCoordinator
ReversingCamera
Park AssistantCamera
MO
ST
InfotainmentController
HMI Satellite
Telephone
InfotainmentSatellite 1M
OST
Main BodyController
Body Satellite 1.2
Body Satellite 2
Body Satellite 3
BodySatellite 4LI
N
CANFlex Ray MOST CAN
Multiple busesAutomotive specificLow speedMultiple separate ECUsDifficult to communicate with
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 19
Central Gateway
SatGPSBT
• All ECUs networked directly or indirectly via gateways / DLC Connector• Unsecure access into in-vehicle network via DLC• Network security implemented in IVI Headunit
CAN
CAN
CAN
CAN
CAN
LIN
Powertrain
Chassis/Safety
Body/Control
TetheredSmartphone
Video Cam
Bridge
Instrument Cluster WiFi/Cell/DSRC
OBD DLC Connector
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 20
SatGPS
CAN
Powertrain
Chassis/Safety
Body Control
Tethered Smartphone /Owner connectivity
Instrument Cluster
SCV Gateway
Ethernet
• Ethernet-based Central Vehicle Gateway• Mini-switches/hubs aggregate ECUs/Sensors depending on location within vehicle• Potential reduction in wiring harness density and bus splices
IVI /Headunit
USB/ WiFi/ BT
OBD DLC Connector
RearVideo Cams
Ethernet
Ethernet
Ethernet
Chassis/Safety
Powertrain
Body Control
Body Control
FrontVideo Cams
Telemetry ModuleWiFi//BT/Cell/GPS/DSRC
Rear View Mirror
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 21
SatGPS
CAN
Powertrain
Chassis/Safety
Body Control
Tethered Smartphone /Owner connectivity
Instrument Cluster
SCV Gateway and CentralECU
Ethernet
• Ethernet-based Central Vehicle Gateway• Mini-switches/hubs aggregate ECUs/Sensors depending on location within vehicle• Potential reduction in wiring harness density and bus splices
IVI /Headunit
USB/ WiFi/ BT
OBD DLC Connector
RearVideo Cams
Ethernet
Ethernet
Ethernet
Chassis/Safety
Powertrain
Body Control
Body Control
FrontVideo Cams
Telemetry ModuleWiFi//BT/Cell/GPS/DSRC
Rear View Mirror
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 22
SCV Gateway and CentralData Center
SatGPS
CAN
Powertrain
Chassis/Safety
Body Control
Tethered Smartphone /Owner connectivity
Instrument Cluster
SCV Gateway and CentralData Center
IVI /Headunit
USB/ WiFi/ BT
OBD DLC Connector
RearVideo Cams
DeterministicEthernet
DeteraministicEthernet
DetaerministicEthernet
Chassis/Safety
Powertrain
Body Control
Body Control
FrontVideo Cams
Telemetry ModuleWiFi//BT/Cell/GPS/DSRC
Rear View Mirror
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 23
• An Introduction to the Internet of Things• The Future Infrastructure for the Internet of
Things• The Connected Vehicle and Intelligent
Transportation• Enabling Technologies • Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 24
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 25
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
Cisco Confidential 26© 2010 Cisco and/or its affiliates. All rights reserved.
Ope
ratio
nVe
hicl
e
802.11p
V2VV2I/Road-side
VPN Aggregation
Infr
astr
uctu
re
Highly secure communication from car to wider network Encryption Wide range of VPN technologies Secure tunnels to OEM, partners,
third party applications providers
Comprehensive secure In-vehicle protection Strong firewall Intrusion Prevention Anti-virus/malware protection
On-demand secure connectivity vehicle-to-vehicle, vehicle-to-
infrastructure
Easy to deploy and manage Centralized identity & policy
management Authentication, authorization,
accounting
Private Cloud
802.11p
Firewall
VPN Tunnels
3rd Party App Provider
Smart CenterPartner CloudSmart Center
Identity Management
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 27
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 28
• Systematic, highly virtualized, secure, and network-integrated computing and storage located between End-points and Clouds, supporting many of the same techniques/approaches applied to Cloud Computing:
Virtualization, multi-tenancy, IaaS, PaaS, SaaS, automation, ….
Maybe just another funny name for “Edge of the Network Computing” …..
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 29
Wireless Edge Device
Video Servers
IP Network
Fog Server Mobile
Clients
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 30
• Roadside multi-purpose equipment based on convergence of routing, computing and wireless technologies
• Distributed, multi-tenancy computing model
• Supporting multiple wireless technologies
• Located with other traffic control equipment
• Purpose - Managed ServiceRegulate traffic (Traffic Router – cars, IP packets, same)Collect tolls taxes (per transaction fee collection)E-Commerce supportContent deliveryTraffic sensor management (e.g., Sensys)
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 31
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
Cisco Confidential 32© 2010 Cisco and/or its affiliates. All rights reserved.
Ope
ratio
nIn
fras
truc
ture
Vehi
cle
3G/4G
In-Home Devices
• Wi-Fi: HotSpot 2.0
Home Network
Dealers / Parking / SA,PA / Energy Station • Wi-Fi: HotSpot 2.0
Public Network
Wireless SP Antenna
• Cellular 3G/4G
Carrier Network
Home Agent
Multiple Wireless WAN interfaces 3G/4G(LTE), WiFi
Highly Scalable Secure Mobility Industry leading architectures:
LISP, PFR
Mobile IPv6, NEtwork MObility(NEMO)
Single-IP reachability
Seamless User Experience Non-stop 99.99% reliable
connection management Application-aware, flow-based
connectivity Seamless Handover: 3G -> wifi
Session persistency
Optimized Communications Over 3G/4G, WiFi, …
Public/Private Cloud
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 33
• LISP (Location Identity Separation Protocol with IP-in-IP) was originally designed as a scalable routing architecture for the Internet
• It turns out that LISP offers native support for:
Mobility with route optimization,Multi-homing,Dual Stack (IPv4, IPv6)Network Mobility
• Clear separation between control and data plane is well suited for over-the-top deployments
Enabling an ecosystem of LISP Service providers to deploy global mobility applications such as the Connected Vehicle
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 34
LISP Unaware Infrastructure
WiFi
3G
Data Center
LISP Mapping Service Providers
I’m @ 3G
I’m @ WiFi
Map‐Server
Map‐Resolver
LISPmob.org
LISP Data Path
Services
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 35
IP NetworkIP Network
Data Center (Cloud)
Data Center (Cloud)
L3 FabricL3 Fabric
App
OS
FogFog
LISP Mapping System
+Fog Controller
LISP Mapping System
+Fog Controller
Update GeoLocation
Move Appto FogApp
OS
Data PathControl Path
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 36
IP NetworkIP Network
Data Center (Cloud)
Data Center (Cloud)
L3 FabricL3 Fabric
App
OS
FogFog
LISP Mapping System
+Fog Controller
LISP Mapping System
+Fog Controller
ViideoApp
OS
vWAAS
VideoAppVideoAppAccess Policy:Use vWAASService on Fog
VideoAppLocation?
Go to vWAAS first,
then VideoApp
VideoAppLocation?
Data PathControl Path
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 37
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 38
• Enabling more “natural” ways of collaborating and socializing
• Communications for highly mobile exchanges• Critical for a large set of real life applications• Fundamental for transportation• Enabling collaboration when not core connectivity is
available• Exploiting “opportunities” to communicate (Delay
Tolerance)• Tolerating high loss situations (Disruption Tolerance)
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 39
• Key technology to provide non-line-of-sight communication in next generation advanced driver assist systems
• DSRC is the global industry standard for latency critical V2V/ V2Icommunication
• eCall + DSRC are key triggers for broader CV deployment• Cisco is investing in DSRC Communications
Joint Projects with Cohda WirelessWorking with University of Porto on Taxi Deployment
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 40
• Need to Support Multiple Modes
End-to-end
Proxy-ed
Multi-Hop
Delay Tolerant
Disruption Tolerant
• Working with:
U. Porto and Veniam
ITTC/UPC Barcelona
UCLA
WiFi Rail/McLaren
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 41
41
3
S
D1
2
4
5
6
7
8
9
10
11
12 13
14
1615
Take Advantage of Node Mobility: e.g., Store-Carry-and-Forward (DTN)
– Store a message, carry it until an appropriate communication opportunity arises, forward it to a new node
Work and Cisco Collaboration with UCLA (Prof. Mario Gerla, Kevin Lee, Giovanni Pau)
– VANET Research, Hybrid Routing Models with Navigation Assistance
Work and Cisco Collaboration with USC (Prof. Costas Psounis)
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 42
Copyright 2011 Persistent Systems, LLC Proprietary All Rights Reserved
Video Cameras
Mobile Devices
Unmanned Ground Robots Sensor Network
Gateways
The Internet
SATCOM
UAVs Manned Aircraft
Biometric Scanners Radio Over IP
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 43
Disaster Response Network Large WRoIP Network with nodes in:
o NYC & at FDNY Fire Department Operation Center in Brooklyn o State of Connecticut Governors Office and Emergency Operations Center
Multiple mobile vehicle nodes with 4G Backhaul o Boston at USCG Stations and Logan International Airport
Backhaul via 4G
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 44
• Security• Fog computing • Seamless, optimized connectivity, mobility, LISP• Ad hoc networking for mobility• Deterministic networking (wired and wireless)• ….....
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 45
• Required in Industrial Automation, System Control, Automotive, Smart Grid, Robotics, Building Automation, etc.
• Key Elements: (Both wired and wireless)
Network Ingress shapingNetwork synchronizationTimely transmissionCentralized scheduling(NP-complete optimization problem)
• Wired: Time Triggered Ethernet
• Wireless: Over 802.15.4 for low power low rate (4Hz), over WIFI (802.11ac) for higher rate (100Hz)
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 46
DETERMINISM
“Non-Deterministic”
Information
Input/Output
Motion
Closed-Loop Control,
“More Deterministic” “Very Deterministic” “Strictly Deterministic”
UNMANAGED10Mb/s, Half-Duplex,
slow convergence
MANAGED10/100Mbs, 802.11 a/b/g, QoS,
RSTP Fast Convergence (s), IGMP, Full-Duplex, Wirelss Mesh
REAL TIMEGb/s, IEEE 1588 PTP, 802.11n,
Low-latency, CleanAir, Very Fast Convergence (ms)
TIME-SYNCHRONIZED10 Gb/s, Low Jitter, Precise Scheduling,
Loss-less Convergence, Multi-path switching
IND
UST
RIA
L AP
PLIC
ATIO
NS
Wireless
Wired
Future
Safety-CriticalRelevant Innovations to Standard Networks
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 47
Source: TTTech
TIME
TT1 TT2 TT2TT1 TT1TT2
30 msec
40 msec 40 msec 40 msec
30 msec 30 msec 30 msec
TT1 TT1RC RC RC RC RCRCBE BE BE BE BE RCBE
Longest Communication Cycle in this Example: LCM(30,40) = 120msec
TTEthernet
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 48
• Value PropIPv6 for mission-critical Applications
Industrial, Avionics, Telematics, spatial C&C
Cisco business in wired and wireless backboneConverged Campus / Enterprise (adding IoE)
• ObjectivesIETF standards Trigger open source implementationBuild Ecosystem
• Status: IETF WG creation starting
• ¼ people initially
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 49
6TSCH
DeterministicDeterministicWi-Fi or Ethernet(RPL Domain or IPv6 ND)
6TSCH
Enterprise
- ISA100 BackboneRouter
- Wi-Fi Border Router
- WiHart BackboneRouter
- WiFi/6LoWPAN RPL Backbone Router - 6LoWPAN Host
- ISA100 Host
- WiHart Host
- WiFi Host
Plant Control Network
• Plant Firewall
• Wireless Lan Controller
• Integrated Plant Security & Identity services
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 50
• An Introduction to the Internet of Things• The Future Infrastructure and the Huge Role for
Wireless Communications!!• Enabling Technologies and Relevant Case
Studies• Conclusions
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 51
• A time of exciting developments in Networking and beyond• We need strong Research Collaborations: WE NEED YOU!!!• Profound impact at human, social, and environmental levels• Virtuous cycle between new applications, services, and innovative
platforms
© 2011 Cisco and/or its affiliates. All rights reserved. Attorney-Client Privileged Cisco Confidential 52
• More Traditional Industry-University Focused Research Initiatives
• Multi-Way Research Partnerships are KeyNetworking Industry-Car OEMs-UniversitiesNetworking Industry-Silicon Providers-Service Providers Content Providers-OEMsUniversity-Industry (e.g., GSRC, Clean Slate, RadLab)
• Government InvolvementNSF – GENIDOT - DOELeveraging of Defense Technologies