Prof. Neil Gershenfeld Director NSF CCR-0122419.

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
Internet Protocols Steven Low CS/EE netlab.CALTECH.edu October 2004 with J. Doyle, L. Li, A. Tang, J. Wang.
Oliver Pankiewicz EEL 6935 Embedded Systems
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Mobile IP Security Dominic Maguire Research Essay Presentation Communications Infrastructure Module MSc Communications Software, WIT
11 Distributed Middleware for Container Transport: Lessons Learned (Klaas Thoelen, Sam Michiels, Wouter Joosen) 7th MiNEMA Workshop August 21, Lappeenranta,
Three-Layer Model Distributed data communications involves three primary components: Networks Computers Applications Three corresponding layers Network.
Topic 3: Sensor Networks and RFIDs Part 4 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Network control Frank Kelly University of Cambridge Conference on Information Science and Systems Princeton, 22 March 2006.
Network Bandwidth Allocation (and Stability) In Three Acts.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Computer Network Architecture and Programming
Data Communications I & II Project Sequence Tom Costello.
Transport Layer Flow. Socket Connections UDP Segment Structure.
EECS 122, Midterm Review Kevin Fall Jean Walrand
INTRODUCTION Chapter 1.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Distributed Systems Principles and Paradigms Chapter 02 Communication 00 – 1.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Internet Ø: Introduction Karen Sollins MIT CSAIL October 12, 2006.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
© Cambridge University Press 2013 Thomson_alphaem.
© Cambridge University Press 2013 Thomson_Fig
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Network Computing Lab. ( 1 Network Programming: Syllabus Spring 2009, Prof. Kihyun Pyun.
Prof. Neil Gershenfeld Director NSF CCR
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Virtual Private Networks: An Overview with Performance Evaluation Shashank Khanvilkar and Ashfaq Khokhar, University of Illinois at Chicago Presented by:
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
© Oxford University Press 2011 Computer Networks Bhushan Trivedi, Director, MCA Programme, at the GLS Institute of Computer Technology, Ahmadabad.
Prof. Neil Gershenfeld NSF CCR MIT Media Labs.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
Thin Servers, Thinner Clients Kerry Lynn Cisco Systems, Inc. Boxborough, MA USA.
Ch. 2 Protocol Architecture. 2.1 The Need for a Protocol Architecture Same set of layered functions need to exist in the two communicating systems. Key.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 10 Routing Fundamentals and Subnets.
end-to-end modulation interdevice internetworking.
© Cambridge University Press 2013 Thomson_Fig
Approximate Networking H. T. Kung Harvard University Panel 1 on “What Are the Biggest Opportunities in Networking Problem?” NITRD Workshop on Complex Engineered.
Programming Bits and Atoms
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Security of the Internet of Things: perspectives and challenges
Kittiphan Techakittiroj (25/06/59 19:10 น. 25/06/59 19:10 น. 25/06/59 19:10 น.) Network Address Translation Kittiphan Techakittiroj
COMPUTER NETWORKS COMPUTER NETWORKS AIM To understand the basic concepts of data communication, networking and the usage of protocols. OBJECTIVES To study.
Neha Jain Shashwat Yadav
© Cambridge University Press 2011
Thomson_eeWWtgc © Cambridge University Press 2013.
Thomson_atlascmsEventsAlt
Networking B.Ramamurthy Chapter 3 1/11/2019 B.Ramamurthy.
Chapter 15 – Part 2 Networks The Internal Operating System
Chapter 1. Introduction Data Communications
Building Embedded IP Raffi Krikorian Physics and Media.
Thomson_CandP © Cambridge University Press 2013.
Networking for Home and Small Businesses – Chapter 6
Communication Networks
Thomson_AFBCartoon © Cambridge University Press 2013.
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Prof. Neil Gershenfeld Director NSF CCR

I0 Beliefs IP to leaf nodes peers don’t need servers physical identity compiled standards open standards big bits end-to-end modulation

Big Bits 3x10 8 m/s / 100 m = 3x10 6 s -1 time frequency RFIRAC

End-To-End Modulation UDP, TCP IP SLIP ASCII 8N1 startstop “I” ΔtΔt no numbers

Click Coding

SEA: a Scalable Encryption Algorithm for Small Embedded Applications F.-X.Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater ECRYPT Workshop on RFID and Lightweight Crypto, Graz, Austria (July 13-15, 2005) Scalable Provable security against linear, differential cryptanalysis Provable diffusion Parallel encryption/decryption On-the-fly key derivation Space → time tradeoff

IP TCP PHY layering: TCP flow control: networking: utility routes capacities Protocols as Distributed Optimization (Low, Chiang, Doyle, Kelly, Maulloo, Tan, Mo, Walrand,...)

IR RF powerline multidrop RFID bar codes mag stripe telephone telegraph IRDA Bluetooth Homeplug RS-485 ISO 18000/EPC UPC ANSI/ISO V.92 Morse Code IØIØ

end-to-end modulation interdevice internetworking

Cambridge University Press Henry Holt and Company Basic Books