KVM Verification KVM uses StackMaps generated by the preverifier to verify the trustworthiness of unknown classes. Relatively easy to process on the device,

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Chapter 7: Transport Layer
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
CS 582 / CMPE 481 Distributed Systems Communications.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Introduction To Networking
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad-hoc Network Jaehoon Jeong, ETRI ICACT.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Copyright 2003 CCNA 1 Chapter 7 TCP/IP Protocol Suite and IP Addressing By Your Name.
CS 356 Systems Security Spring Dr. Indrajit Ray
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Protocol Headers Pre DA SA 0800h … version H L 6 TCP Header Data FCS
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Rhys McBreen (How the internet works) X. Contents The Layers and what they do IP Addressing X.
FILE100% FILE 25%. FILE100% Downloadin g Strategy FILE 40% FILE 10%
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Characteristics of Communication Systems
Common Devices Used In Computer Networks
Multi-media Computers and Computer Networks. Questions ? Media is used for ………………… Multimedia computer is capable of integrating ………………………………….. OCR stands.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
© 2002, Cisco Systems, Inc. All rights reserved..
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
CCNA 2 Week 8 TCP/IP Suite Error Control Messages.
W3car project Emmanuel Castellani Laurent Marchese Nicolas Pastorelly Wolfgang Kieß Johannes Walch Claudia Schremmer Teleseminar Nice-Mannheim Year
Copyright © Curt Hill, Client – Server Computing An important paradigm.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Chapter 23: ARP, ICMP, DHCP CS332, IS333 Spring 2014.
Presented by Rebecca Meinhold But How Does the Internet Work?
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 ECE453 - Introduction to Computer Networks Lecture 1: Introduction.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
UDP : User Datagram Protocol 백 일 우
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
Pass Cisco CCIE Data Center Written exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Cisco CCIE Data Center Written Buy Complete.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
INTRODUCTION TO COMPUTER NETWORKS
Understanding the OSI Reference Model
Topic 5: Communication and the Internet
INTRODUCTION TO COMPUTER NETWORKS
CPEG514 Advanced Computer Networkst
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Protocol Application TCP/IP Layer Model
Presentation transcript:

KVM Verification KVM uses StackMaps generated by the preverifier to verify the trustworthiness of unknown classes. Relatively easy to process on the device, but probably as secure as J2SE verification. Generating verification info is difficult, but making sure it is correct is easy.

Consequences It is not necessary to bring J2SE style verification to a J2ME device. We will be pursuing a different project from now on.

Downloading Classes from Peers Many To Many Protocol Lightweight Class Loading Framework Wireless Data Communication

Many to Many Use M2M broadcast communication to request and retrieve classes from nearby devices I want a class

Many to Many All devices that are capable of responding send back an answer Thank you

Reliability Communication is with multiple peers. Redundancy increases reliability over an unreliable link. Checksums to ensure that class files aren’t corrupted.

M2MP Traits Messages are broadcasted to all devices. No need for device addresses. Messages broadcasted within a certain range. Flood the broadcast medium with data packets.

Anhinga Project Goal Dynamic classloading via M2MP Ethernet –Testing grounds for dynamic classloading via M2MP using UDP

Dynamic Class Loading Class loaders implement an interface with a single method DefaultM2M Multicast Our Class Loader

Server Architecture Responds to class file requests Transmits checksum along with the file Exact protocol not yet determined