ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
Pengantar Teknologi Mobile 4 Antonius Rachmat C, S.Kom Wireless Fidelity.
Security in Wireless Networks Juan Camilo Quintero D
1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
WLAN What is WLAN? Physical vs. Wireless LAN
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Network Admin Course Plan Accede Institute Of Science & Technology.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Bluetooth Techniques ECE 591. Overview  Universal short-range wireless capability  Uses 2.4-GHz band  Available globally for unlicensed users  Devices.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
PRESENTATION ON WI-FI TECHNOLOGY
10/15/ Short-Range Radio Frequency Networking B. Ramamuthy.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
ECE 526 – Network Processing Systems Design Networking: protocols and packet format Chapter 3: D. E. Comer Fall 2008.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
University of Kansas Motivation Wireless networks based on the IEEE standard require lengthy layer two configuration parameters to be set SSID (Network.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Wireless Networks: Physical and Link Layers Wired Typically point-to- point connections Interference effects are not significant Not power constrained.
Sonal Jain, IT-BHU Bluetooth Mobile Ad Hoc Networks Sonal Jain B.Tech (IV), Electrical Engg. Dept.,ITBHU IEEE SPAVes Sept 14, 15 Institute.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Chapter-7 Basic Wireless Concepts and Configuration.
What is Bluetooth? A cable-replacement technology that can be used to connect almost any device to any other device Radio interface enabling electronic.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
4 Mobile Computing 2 SKS Dedy Alamsyah, S.Kom..
CSE 4905 Network Security Overview
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless Networking Chapter 23.
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
FIGURE 12.1 Current and Projected Global Internet Bandwidth.
Short-Range Radio Frequency Networking
Short-Range Radio Frequency Networking
Introduction Wireless communication is one of the fastest-growing technologies The demand for connecting devices without the use of cables is increasing.
Bluetooth Bluetooth is a wireless LAN technology designed to connect devices of different functions when they are at a short distance from each other A.
Presentation transcript:

ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng

Networking Overview Goal: key concepts and system details to integrate network connectivity into embedded systems Ning WengECE 4242

Global Internet Bandwidth Ning WengECE 4243

UDP Packet Sender Ning WengECE 4244

UDP Packet Sender in C Ning WengECE 4245

Socket API Ning WengECE 4246

Protocol Layers Ning WengECE 4247

IP Layer Packet Headers Ning WengECE 4248

9 Comparison: IPv4&6 header

Transport Layer Headers Ning WengECE 42410

TCP connections  This diagram shows the start of a TCP connection. A sends packet X with SYN. “Hello I would like to talk”. B sends a SYN, ACK pair “I got your message. I would also like to talk” A sends an ACK (and some data) “I got your message, here is some data.”

TCP Window Increase/Decrease Transmission no Threshold Congestion window The initial doubling of the window size is called “slow start”. Timeout

Encapsulation Ning WengECE 42413

Example of Switched Ethernet LAN Ning WengECE 42414

Ethernet Frame Format Ning WengECE 42415

Ethernet Controller Ning WengECE 42416

WI-FI Short of wireless fidelity ─ Dominant wireless LAN technologies ─ Relying on availability of unlicensed radio frequency High f -> affected by various medium Security: dos, unauthorized access and etc. Wireless medium access control Ning WengECE 42417

IEEE Data Frame Ning WengECE 42418

Basic Security Strategies Block your Service Set Identifier (SSID) from being broadcast. ─ Wireless beacon so PCs can easily find the access point. Change the default network name in the access point. Change the default access point password. Center the access point in the middle of the building/house.

Media Access Control (MAC) Filtering Every network device has a unique MAC address ─ Allocated by the manufacturer. MAC Filtering only allows certain addresses access. Mostly for home use. ─ Tedious to implement on a large scale

Wired Equivalency Protocol (WEP) Basic encryption technology. ─ Uses an RC4 stream cipher. Pseudo-random bytes. ─ Two versions: 64-bit and 128-bit versions. Built into Wi-Fi certified equipment. ─ Implemented at the MAC level. Protects radio signal between device and access point. ─ Does not protect data beyond the access point. Uses static encryption keys. ─ Easy to crack. Still better then nothing.

Wi-Fi Protected Access (WPA) Designed to replace WEP. ─ Firmware update. ─ 128-bit Temporal Key Integrity Protocol (TKIP) encryption. Uses a master key that is regularly changed. ─ User authentication. ─ Data Integrity. Protects radio signal between device and access point. Built into Wi-Fi certified equipment. ─ Implemented at the MAC level. Available in two versions: ─ WPA2 Personal. ─ WPA2 Enterprise.

Wi-Fi Protected Access 2 (WPA2) Designed to replace WEP. ─ 128-bit Advanced Encryption Standard (AES). Based on the IEEE i standard. Provides government level security. Also available in two versions: ─ WPA2 Personal. ─ WPA2 Enterprise.

Wireless Media Access Control MAC protocol: shared media scheduling maximize number of communications Ensure fairness among all transmitters CSMA – carrier sensing multiple access CD – collision detection ─ If (Transmitted_Signal != Sensed_Signal)  Sender knows it’s a Collision  ABORT Wireless problem ─ Can not send and listen ─ Signal not same at same Ning WengECE 42424

25 Bluetooth Overview Bluetooth is a global, RF-based (ISM band: 2.4 GHz), short-range, connectivity solution for portable, personal devices ─ it is not just a radio, it is an end-to-end solution The Bluetooth spec comprises ─ a HW & SW protocol specification ─ usage case scenario profiles and interoperability requirements IEEE is working on standardizing the PHY and MAC layers in Bluetooth More Info: ─ ─

Bluetooth - Piconet A collection of devices connected via Bluetooth technology in an ad hoc fashion. A piconet starts with two connected devices, and may grow to eight connected devices. All Bluetooth devices are peer units and have identical implementations. However, when establishing a piconet, one unit will act as a Master and the other(s) as slave(s) for the duration of the piconet connection.

27 Application Framework and Support Link Manager and L2CAP Radio & Baseband Host Controller Interface RF Baseband Audio Link Manager L2CAP OtherTCSRFCOMM Data The Bluetooth protocols A hardware/software description An application framework SDP Applications Control

Linux Networking Networking utilities ─ Ipcofig ─ Netstat Socket implementations Networking kernel structures Ning WengECE 42428

Linux Network Stack Ning WengECE 42429

Struct SK_buff Ning WengECE 42430