The Consolidated Protocols Maribor Meeting October 2013 Anartz Nuin & David Remón.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Network Certification Preparation. Module - 1 Communication methods OSI reference model and layered communication TCP/IP model TCP and UDP IP addressing.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
ISO/OSI Model Layers Application: applications that use the network. This is were mail, browsers, ftp, etc reside Presentation: data formats, character.
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Review of Important Networking Concepts
Davide Rossi 2002 Using Sockets in Java. 2Davide Rossi 2002 TCP/IP  A protocol is a set of rules that determine how things communicate with each other.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Seguridad en Sistemas de Información Francisco Rodríguez Henríquez SSL/TLS: An Introduction.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Network and Internet Security
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Secure connections.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
12 September 2015 CCENT ICND1 Exam Topics Review TCP/IP and OSI Networking Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
7. WWW Internet Service Provider (ISP) E.g. AOL, Freeserve Internet Service Provider (ISP) E.g. AOL, Freeserve ISDN (64kbps/128kbps) Modem (28.8/56kbps)
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.
Human-Computer Interface Course 4. Content History of Internet What is Internet ? Internet Protocols The OSI 7 layers model TCP/IP The World Wide Web.
TCP/IP Transport and Application (Topic 6)
Establishing communication with Envirobat using TCP/IP Presented by Apourva Parthasarathy Date : 18/06/13.
TCP/IP Protocols Contains Five Layers
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
WP04: Wireless Networking Libelium David Remón & Anartz Nuin Brussels, March 31, 2014 Midterm Review1 31/03/2014.
4061 Session 25 (4/17). Today Briefly: Select and Poll Layered Protocols and the Internets Intro to Network Programming.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
CS101 Lecture 9 Network Basics. Computers love bytes and a factor of ____ Up to now we have been using bytes as our main unit of measurement with a factor.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Components of wireless LAN & Its connection to the Internet
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Transmission Control Protocol (TCP) Internet Protocol (IP)
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Point-to-Point Protocol
- 1 - DPNM Review of Important Networking Concepts J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH Tel:
Secure Socket Layer Protocol Dr. John P. Abraham Professor, UTRGV.
A quick intro to networking
Working at a Small-to-Medium Business or ISP – Chapter 7
Network Architecture Introductory material
Computer Network.
Working at a Small-to-Medium Business or ISP – Chapter 7
TASK 4 Guideline.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Review of Important Networking Concepts
ما هي خدمة بروتوكول نقل الملفات؟
Working at a Small-to-Medium Business or ISP – Chapter 7
IS 4506 Server Configuration (HTTP Server)
Computer Network.
When you connect with DHCP, you are assigned a
Protocol Application TCP/IP Layer Model
IS 4506 Configuring the FTP Service
Presentation transcript:

The Consolidated Protocols Maribor Meeting October 2013 Anartz Nuin & David Remón

The Consolidated Protocols

WIFI TCP/IP TLS MQTT

The Consolidated Protocols WIFI WIFI

The Consolidated Protocols WIFI l By default wireless protocol at home l No need of gateway/concentrator: a commercial router present in every house. If not, easily acquirable and cheap. l High Data rate (802.11n → over 100Mbps) l Allows the use of MQTT (lightweight messaging protocol) l Implements Security → WEP, WPA, WPA2

The Consolidated Protocols model TCP/IP TCP/IP

IP addresses Not defined yet The Consolidated Protocols model TCP/IP

l Implements Error control and Flow control: reliable connexion. l Widespread protocol used in the Internet home ↔ DI Connection Manager l Allows a TCP connexion always open: Appliance ↔ DI Connection Manager The Consolidated Protocols model TCP/IP

The Consolidated Protocols TLS TLS TLS encryption/decryption

The Consolidated Protocols TLS HTTP TLS in the Internet HTTP TLS in the Internet =https

The Consolidated Protocols TLS HTTP TLS in the Internet HTTP TLS HTTP TLS in SandS MQTT TLS =https

The Consolidated Protocols TLS l Standard security protocol in the Internet l DI and all the appliances share a certificate. l Together with Wifi Security → Double Encryption

The Consolidated Protocols TLS + WIFI l Standard security protocol in the Internet l DI and all the appliances share a certificate. l Together with Wifi Security → Double Encryption Double Encryption

The Consolidated Protocols TLS + WIFI WIFI encryption WEP/WPA/WPA2 TLS encryption Double Encryption

The Consolidated Protocols MQTT MQTT MQTT encoding/decoding

The Consolidated Protocols MQTT l Extremely lightweight messaging protocol Only 2 bytes of fixed headers l Type of data does not influence the communication l Widespread Application layer protocol for: IOT Internet of things M2M Machine to machine communications

WIFI TCP/IP TLS MQTT The Consolidated Protocols in SandS

The Consolidated Protocols in SandS WIFI TCP/IP TLS MQTT SandS frame:

The Consolidated Protocols in SandS First Experiments Tested all the protocols together

The Consolidated Protocols Implemented in node.js

Implemented in node.js The Consolidated Protocols socket

DI Connection Manager Test Environment

DI Connection Manager DI socket 8001

DI Connection Manager DI socket DI emulator 8001

DI Connection Manager DI socket DI emulator Browser

DI Connection Manager DI socket DI emulator 8001 Client = Appliances Browser

DI Connection Manager DI socket DI emulator Browser Client = Appliances 1883

DI Connection Manager DI socket DI emulator 8001 Client - Appliances Browser

Thanks for your attention