PegaxEducationWiki
☰
Menu
jtt
kotitehtaevaet
laboratoriotyoe
luennot
Johdatus tietoturvaan
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
Tietoturvan perusteet
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
muu_materiaali
netsec
exercises
ex1
ex2
ex3
ex4
decrypt.py
encrypt.py
hash.py
verify.py
ex5
ex5_example_answer
ex6
labworks
Laboratory work 1: Network monitoring (14p)
Laboratory Work: Intrusion detection (20p)
Laboratory work: firewalls (16p)
luennot
Secured Communications
CT30A8800 Secured communications
CT30A8800 Secured communications
CT30A9700 Network Security
Network Security
CT30A9700 Network Security
Symmetric cryptography
practical_assignment
old_courses
csa
Communication software and architecture
ASN.1
asn1-2009
assistant
Communications Software and architecture
Communications Software and architecture
Wireless Service engineering
ommunications software and architecture
Communication software and architecture
Communication software and architecture
Communications Software and architecture
Software Design Document
Specification & Description Language (SDL)
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications Software and architecture
Communication software and architecture
Communication software and architecture
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
Communications software and architecture
Communications software and architecture
Communications Software and architecture
SDL
Links
A Need for Standards
State Machines
Communications software and architecture
requirements model
Communications Software and Architecture
Communications Software and Architecture
Unified Modeling language (UML)
cspa
CSPA
Communication software and architecture
Communication software, Protocols and architecture
Communications Software Protocols and Architecture
Byte Count Coding
Code
Communications software, Protocols and Architecture
Common comments for phase1 specification
Communication Software, Protocols and architecture
Communications Software, Protocols and Architecture
cspa -- Communications Software, Protocols and Architectures
Exercises finding generic software requirements
CSA Exercises & Project Work Arrangements
CSA Exercises 0901
Communications Software Architecture Exercies
CSA Homework 2: Entity - Message - Interface Modeling
CSA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
CSPA Implementation demonstration times
CSPA Development environment
Communications Software, Protocols and Architecture
CSPA Exercise 01: Introduction to development environment, eclipse and python
CSPA Exercise 02: Intro to Visual Paradigm and Sequence diagrams
CSPA Exercise 03: Modeling with State Machines
Exercise 04: Programming with state machines
CSPA Exercise 05: Communications system architecture, modeling
Exercise 06: Modeling abstract messages
Exercise 07: Specifications
Exercise 08 Concrete Message Coding
CSPA Exercise 09: TCP and BSD Socket usage
Exercise 09 code
Exercise 10: Introduction to concrete message coding
Exercise 10 code
CSPA Exercise 11: Chat system over tcp with PyQt
Exercise 11 Code
CSPA Exercises and Project Work Schedule
Communications software, protocols and architecture
Glossary
Review checklist
CSPA Project Work Groups
Homework 02: State Machines and Sequence Diagrams
Homework 03, messages
CSPA Homework 04, coding
CSPA Homework 05
CSA Homework: Communications system
Communication software and architecture
Communication software and architecture
Communication software and architecture
test
Communications software, protocols and architecture
Lectures
Communications Software, Protocols and architecture
CSPA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
Python resources
Returning works
Communications Software Protocols and Architecture
CSPA
Specification
Communications Software, Protocols and Architecture
Communication Software, Protocols and Architecture
TCP Package
Communications Software Protocols and Architecture
Communications Software Protocols and Architecture
Util package
Visual Paradigm Instructions
langatontietoliikenne
Langaton Tietoliikenne
Analogiset järjestelmät
Wireless communications (langaton tietoliikenne) Course contents
Langaton Tietoliikenne
GPRS ja EDGE
Matkapuhelintekniikat
Langaton tietoliikenne: MAC
Matkapuhelinverkot
Langaton tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
oldintro
wse
wse2013
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Touch Zones
Wireless Service Engineering
rfid_security
RFID security
Report for European Union on RFID
secured_communications
Secured Communications
ElGamal
Secured Communications
CT30A8800 Secured communications
ECDSA
Domain parameters
Exercises 2009 - 2010
CT30A8800 Secured communications
CT30A8800 Secured communications
Course material
lectures_2009
Introduction to lightweight security protocols
CT30A8800 Secured communications
CT30A8800 Secured Communications
Practical assigment
Secured communications Practical assignment 2010
CT30A8800 Secured communications
Seminars
Seminars
CT30A8800 Secured communications
Symmetric cryptography
tietoturvanperusteet
2009
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Luennot
Tietoturvan perusteet
Tietoturvan perusteet
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan Perusteet
2010
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
courses
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva kirjallisuutta
Luennot
Luennot
Luennot
Tietoturvan perusteet -luentomateriaali 2007 (pdf)
Tietoturvan perusteet
Yleiset tietoturvaongelmat ohjelmissa
TIETOTURVAN PERUSTEET
TIETOTURVAN PERUSTEET
Palomuurit
Tietoturvan perusteet
Tietoturvan perusteet
salaus
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietosuoja
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
other
sai_rfid_security
ssotc-prelecture
Introduction to lightweight security protocols
Wireless service engineering
theses
dsc
Guide for Doctorate studies and thesis work
msc
tietoturva
harjoitukset
calc_key.py
Tietoturvahyökkäykset mediassa
Tietoturvahyökkäykset mediassa
Tiedon salaus Pythonilla
Lohkosalaimen teko Pythonilla
Matematiikkaa
Python Cryptography Toolkit
Sähköinen allekirjoitus pythonilla
Diffie-Hellman avaimenvaihto
Python Cryptography Toolkit - Tiedon salaus
Epäsymmetrinen salaus
Snort
harjoitukset2011
Sähköinen allekirjoitus pythonilla
Snort
aes_crypt.py
aes_decrypt.py
cbc.py
check_md5.py
ecb.py
Tietoturvahyökkäykset mediassa
hash.py
Matematiikkaa
Diffie-Hellman avaimenvaihto
Lohkosalaimen teko Pythonilla
rsa_sign.py
salaa_ja_avaa
Python Cryptography Toolkit - Tiedon salaus
Tiedon salaus Pythonilla
Python Cryptography Toolkit
Wireshark - verkkoliikenteen kaappaus
luennot
Tietoturva
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva
Tietoturva
Tietoturva
Tietoturva
Lisämateriaalia
Tietoturva
Tietoturvan perusteet
Tietoturva
Tietoturva
Steganografia
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturva
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturva
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Harjoitustyö 2013
Laboratoriotyö 1
Linkkejä
wse
wse2008
Wireless service engineering
Wireless Service Engineering
Wireless Service engineering
Bluetooth SDP
bthildon.py
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
dl-services
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Instructions
Resources
Mobile environment used at course
Resources
Packaging
Wireless Service engineering
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Wireless service engineering
Wireless Services engineering
Source Code
hah
Wireless Service engineering
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2010
Wireless service engineering
Architectures
Wireless Service Engineering
Wireless Service engineering
Bluetooth
Bluetooth 2.
Bluetooth
Bluetooth SDP
bthildon.py
Cellular technologies
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
Context-Awareness
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
Device capabilities
dl-services
Environment
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Graphical User Interfaces (GUI)
Instructions
LibOSSO
Resources
Mobile environment used at course
Maemo4.1 development environment
Maemo Connectivity
Resources
Mobile Payment
Environment background
Packaging
Wireless Service engineering
Personal Area Networks
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Security
Wireless service engineering
Service Discovery
Wireless Services engineering
Services
Source Code
hah
Wireless Service engineering
Touch Zones
Wireless communication medium
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Services
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
WSE2010 Course Overview
NOTE
wse2011
Wireless Service Engineering
wse2012
Architectures
Arduino
Background
Bluetooth
Device capabilities
Cellular technologies
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Services
Touch Zones
Wireless communication medium
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2013
Arduino
Bluetooth
Device capabilities
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Arduino
Bluetooth
Device capabilities
Context-Awareness
Wireless Service Engineering: Location
Personal Area Networks
Mobile Payment
Overview of the project
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering - Exercises
You are here:
start
»
wse
»
wse2010
»
wireless_lans
Wireless Service Engineering
Properties of Communication technologies
Communication range
Lower frequency → less power required to gain longer distance,
Latency
Data transfer rate
Architecture
Price for creating network
Wireless LANs
IEEE 802.11 family, HiperLAN…
IEEE Standards dominant
Wi-Fi (Wireless Fidelity)
Certified 802.11 standard family compliant product
Trademark of Wi-Fi Alliance
Supported by most types of devices
built-in on most laptops and some PDA's and evenn mobile phone
Adding the capability to the device
PCMCIA cards
CF cards
Global standard → same client works everywhere.
Core elements of Ethernet present
48-bit MAC
Frames delivered based on MAC
Additional reliability mechanisms
HiperLAN is ETSI standard
co-operation on 2.4Ghz spectrum
Topology
Infrastructure mode/network
Terminals connected to access point
Peer-to-peer or ad hoc mode or independent network
Terminals connected to each other directly
Access points
Directional or omnidirectional RF
range is from tens to hundreds of meters
Access points usually have an ethernet connection.
Many brands to choose from
Lower cost
2.4GHz ISM band (Industrial Scientific Medical) (used by most WLAN standards)
Free for using, no regulations
Maximum transmission power
Creating own network free, no licenses needed
No regulation → interference problems
s
No strong authentication
Nominal speed from 1Mb/s to 100Mb/s
Power consumption rather high
IEEE 802.11 family
spec
speed
Frequency
802.11a
54Mbps
5Ghz
non free frequency
802.11b
11Mbps
2.4Ghz
Wi-FI
802.11g
54Mbps
2.4Ghz
speed update to b
802.11n
100Mbps
2.4Ghz
next step after g
Connectivity
Connection forming between AP and mobile or between several mobiles
The desired network is found through scanning
SSID is the identifier of network (service set identifier)
Active scan
Sending probe frame to inform SSID of the network the device wants to join
using Broadcast SSID in probe results response from all networks within range
Passive scanning
Listening communication on each WLAN channel to found out which is used by desired SSID
Responses
Access points responses to the probes
On ad hoc networks station that generated last beacon frame responds
After the desired network is found authentication and association is conducted
Open system authentication
Authentication based on MAC address
Shared key authentication
WEP must be enabled
One access point can serve up to 100 devices
Latency
from few milliseconds to hundreds of illiseconds
Processing the connections increase latency
The more there is users the higher the latency
Roaming is possible
Not always supported
Some compatibility issues between different vendors products.
Things to consider
Who creates network?
How big network is required?
What is the cost for upkeeping own network?
What kind of billing we can arrange?
Rely on TCP/IP?
How to conduct service discovery?
Dedicated SSID for a device providing certain type of service?
How about security?
Last modified:
2013/07/01 14:42
Log In
Show pagesource