PegaxEducationWiki
☰
Menu
jtt
kotitehtaevaet
laboratoriotyoe
luennot
Johdatus tietoturvaan
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
Tietoturvan perusteet
Johdatus tietoturvaan
Johdatus tietoturvaan
Tietoturvan perusteet
muu_materiaali
netsec
exercises
ex1
ex2
ex3
ex4
decrypt.py
encrypt.py
hash.py
verify.py
ex5
ex5_example_answer
ex6
labworks
Laboratory work 1: Network monitoring (14p)
Laboratory Work: Intrusion detection (20p)
Laboratory work: firewalls (16p)
luennot
Secured Communications
CT30A8800 Secured communications
CT30A8800 Secured communications
CT30A9700 Network Security
Network Security
CT30A9700 Network Security
Symmetric cryptography
practical_assignment
old_courses
csa
Communication software and architecture
ASN.1
asn1-2009
assistant
Communications Software and architecture
Communications Software and architecture
Wireless Service engineering
ommunications software and architecture
Communication software and architecture
Communication software and architecture
Communications Software and architecture
Software Design Document
Specification & Description Language (SDL)
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications software and architecture
Communications Software and architecture
Communication software and architecture
Communication software and architecture
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
CT30A5800 - COMMUNICATIONS SOFTWARE AND ARCHITECTURE
Communications software and architecture
Communications software and architecture
Communications Software and architecture
SDL
Links
A Need for Standards
State Machines
Communications software and architecture
requirements model
Communications Software and Architecture
Communications Software and Architecture
Unified Modeling language (UML)
cspa
CSPA
Communication software and architecture
Communication software, Protocols and architecture
Communications Software Protocols and Architecture
Byte Count Coding
Code
Communications software, Protocols and Architecture
Common comments for phase1 specification
Communication Software, Protocols and architecture
Communications Software, Protocols and Architecture
cspa -- Communications Software, Protocols and Architectures
Exercises finding generic software requirements
CSA Exercises & Project Work Arrangements
CSA Exercises 0901
Communications Software Architecture Exercies
CSA Homework 2: Entity - Message - Interface Modeling
CSA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
CSPA Implementation demonstration times
CSPA Development environment
Communications Software, Protocols and Architecture
CSPA Exercise 01: Introduction to development environment, eclipse and python
CSPA Exercise 02: Intro to Visual Paradigm and Sequence diagrams
CSPA Exercise 03: Modeling with State Machines
Exercise 04: Programming with state machines
CSPA Exercise 05: Communications system architecture, modeling
Exercise 06: Modeling abstract messages
Exercise 07: Specifications
Exercise 08 Concrete Message Coding
CSPA Exercise 09: TCP and BSD Socket usage
Exercise 09 code
Exercise 10: Introduction to concrete message coding
Exercise 10 code
CSPA Exercise 11: Chat system over tcp with PyQt
Exercise 11 Code
CSPA Exercises and Project Work Schedule
Communications software, protocols and architecture
Glossary
Review checklist
CSPA Project Work Groups
Homework 02: State Machines and Sequence Diagrams
Homework 03, messages
CSPA Homework 04, coding
CSPA Homework 05
CSA Homework: Communications system
Communication software and architecture
Communication software and architecture
Communication software and architecture
test
Communications software, protocols and architecture
Lectures
Communications Software, Protocols and architecture
CSPA Project Work
CT30A6000 - COMMUNICATIONS SOFTWARE, PROTOCOLS AND ARCHITECTURE
Python resources
Returning works
Communications Software Protocols and Architecture
CSPA
Specification
Communications Software, Protocols and Architecture
Communication Software, Protocols and Architecture
TCP Package
Communications Software Protocols and Architecture
Communications Software Protocols and Architecture
Util package
Visual Paradigm Instructions
langatontietoliikenne
Langaton Tietoliikenne
Analogiset järjestelmät
Wireless communications (langaton tietoliikenne) Course contents
Langaton Tietoliikenne
GPRS ja EDGE
Matkapuhelintekniikat
Langaton tietoliikenne: MAC
Matkapuhelinverkot
Langaton tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
Langaton Tietoliikenne
oldintro
wse
wse2013
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Touch Zones
Wireless Service Engineering
rfid_security
RFID security
Report for European Union on RFID
secured_communications
Secured Communications
ElGamal
Secured Communications
CT30A8800 Secured communications
ECDSA
Domain parameters
Exercises 2009 - 2010
CT30A8800 Secured communications
CT30A8800 Secured communications
Course material
lectures_2009
Introduction to lightweight security protocols
CT30A8800 Secured communications
CT30A8800 Secured Communications
Practical assigment
Secured communications Practical assignment 2010
CT30A8800 Secured communications
Seminars
Seminars
CT30A8800 Secured communications
Symmetric cryptography
tietoturvanperusteet
2009
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Luennot
Tietoturvan perusteet
Tietoturvan perusteet
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan Perusteet
2010
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
courses
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva kirjallisuutta
Luennot
Luennot
Luennot
Tietoturvan perusteet -luentomateriaali 2007 (pdf)
Tietoturvan perusteet
Yleiset tietoturvaongelmat ohjelmissa
TIETOTURVAN PERUSTEET
TIETOTURVAN PERUSTEET
Palomuurit
Tietoturvan perusteet
Tietoturvan perusteet
salaus
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietosuoja
Tietoturvan Perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturvan Perusteet
other
sai_rfid_security
ssotc-prelecture
Introduction to lightweight security protocols
Wireless service engineering
theses
dsc
Guide for Doctorate studies and thesis work
msc
tietoturva
harjoitukset
calc_key.py
Tietoturvahyökkäykset mediassa
Tietoturvahyökkäykset mediassa
Tiedon salaus Pythonilla
Lohkosalaimen teko Pythonilla
Matematiikkaa
Python Cryptography Toolkit
Sähköinen allekirjoitus pythonilla
Diffie-Hellman avaimenvaihto
Python Cryptography Toolkit - Tiedon salaus
Epäsymmetrinen salaus
Snort
harjoitukset2011
Sähköinen allekirjoitus pythonilla
Snort
aes_crypt.py
aes_decrypt.py
cbc.py
check_md5.py
ecb.py
Tietoturvahyökkäykset mediassa
hash.py
Matematiikkaa
Diffie-Hellman avaimenvaihto
Lohkosalaimen teko Pythonilla
rsa_sign.py
salaa_ja_avaa
Python Cryptography Toolkit - Tiedon salaus
Tiedon salaus Pythonilla
Python Cryptography Toolkit
Wireshark - verkkoliikenteen kaappaus
luennot
Tietoturva
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan perusteet
Tietoturva
Tietoturva
Tietoturva
Tietoturva
Lisämateriaalia
Tietoturva
Tietoturvan perusteet
Tietoturva
Tietoturva
Steganografia
Tietoturva
Tietoturva
Tietoturvan perusteet
Tietoturvan Perusteet
Tietoturva
Tietoturvan perusteet: johdanto uhkaajat ja yleiset suojausmentelmät
Tietoturva
TIETOTURVAN PERUSTEET
Tietoturvan Perusteet
Harjoitustyö 2013
Laboratoriotyö 1
Linkkejä
wse
wse2008
Wireless service engineering
Wireless Service Engineering
Wireless Service engineering
Bluetooth SDP
bthildon.py
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
dl-services
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Instructions
Resources
Mobile environment used at course
Resources
Packaging
Wireless Service engineering
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Wireless service engineering
Wireless Services engineering
Source Code
hah
Wireless Service engineering
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2010
Wireless service engineering
Architectures
Wireless Service Engineering
Wireless Service engineering
Bluetooth
Bluetooth 2.
Bluetooth
Bluetooth SDP
bthildon.py
Cellular technologies
Wireless Service Engineering
Basement 6218 Connectivity with N810
Wireless service engineering
Context-Awareness
WSE Demonstration Day Schedule
Wireless Service Engineering
Wireless Service Engineering
Device capabilities
dl-services
Environment
WSE Exercises
Exercises, Introduction
Exercises, Environment
Exercises, GUI
Exercises, libosso
Exerciseses Bluetooth with Python
Connectivity
Exerciseses Bluetooth with Python 2
N810 and Connectivity
WSE Project Work Groups
Example Code for GUI programming
Graphical User Interfaces (GUI)
Instructions
LibOSSO
Resources
Mobile environment used at course
Maemo4.1 development environment
Maemo Connectivity
Resources
Mobile Payment
Environment background
Packaging
Wireless Service engineering
Personal Area Networks
WSE Project Work, Phase 1 specification and design feedback
Practical assignment Phase I
Project Work Implementation
Problems in development
WSE Resource and links
Wireless Service Engineering
Security
Wireless service engineering
Service Discovery
Wireless Services engineering
Services
Source Code
hah
Wireless Service engineering
Touch Zones
Wireless communication medium
Wireless service engineering
Wireless Service Engineering
Wireless Service Engineering
Wireless Services
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
WSE2010 Course Overview
NOTE
wse2011
Wireless Service Engineering
wse2012
Architectures
Arduino
Background
Bluetooth
Device capabilities
Cellular technologies
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Services
Touch Zones
Wireless communication medium
Wireless devices & their development issues
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering
NOTE
wse2013
Arduino
Bluetooth
Device capabilities
Context-Awareness
Location
Personal Area Networks
Mobile Payment
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
NOTE
wse2014
Arduino
Bluetooth
Device capabilities
Context-Awareness
Wireless Service Engineering: Location
Personal Area Networks
Mobile Payment
Overview of the project
Security
Service Discovery
Wireless Services
Visions
Touch Zones
Wireless communication medium
Wireless devices (Hardware)
Wireless devices software and software development
Wireless Local Area Networks
Wireless Service Engineering
Wireless Service Engineering - Exercises
You are here:
start
»
wse
»
wse2012
»
background2012
Table of Contents
Background
Defined
Background
Layers on service use
Layers on service use ...
Devices
RF comm technos
RF comm technos ...
Non RF comm technos
Protocols & protocol stacks
Manners of service use
General service use
Service discovery
Service discovery in the Internet
Wireless service discovery
Service access
Service access ...
AAA
Service categorisation
Standardisation & definitions
Considerations
Considerations ...
Next lecture
Background
Defined
Service
“Contribution to the welfare of others”, Merriam-Webster
intent to ease someone' life/task/duties
Act of helpful activity - public / military / civil service
Wireless
Having no wire / wires
Operated by or actuated by electromagnetic waves
Relating to radiotelegraphy / radio telephony / radio
Wireless service
Service utilising wireless communication technology
Background
Compactness / shrinking of computing devices
But with more powerful CPUs
Efficiencies of memory, storage & battery
Proliferation of mobile devices
Most people in developed countries have a mobile phone(s)
1.15B phones sold in 2007, 1.28B in 2008 (Gartner market research)
Emergence of new wireless comm technos
Built into new devices
Inter-connected future?
Paradigm challenges
P2P. Ad-hoc, Client-Server
Local communication increasingly popular
Layers on service use
Different types of users
Different knowledge / background / interest
Several access devices
Different capabilities
Numerous comm technologies & protocols
Different challenges
Multiple types of services
Layers on service use ...
Devices
Desktops
Laptops, notebooks, netbooks
Tablets, touchpads, ipads
PDA's
Mobile phones (dumb / smart phones)
Small widgets / gadgets
RF comm technos
PAN technos (IEEE 802.15x)
Bluetooth
ZigBee
UWB (> 500
MHz
)
Wireless USB
Bluetooth
LAN
technos
Wi-Fi (IEEE 802.11x)
HiperLAN (ETSI)
RF comm technos ...
Cellular technos
GSM, GPRS, EDGE, UMTS
Touch Zone
RFID
NFC
Others
Zensys
WiMAX
Many smaller ones (sensor nodes)
Non RF comm technos
Optical
Infrared (IR) - IrDA, Remote controllers
Laser
LED based
Visible light
Accoustic technos
Ultra sonic transmitter & receivers
Protocols & protocol stacks
TCP/IP
WAP
OBEX
VOIP
Web services (SOAP, WSDL, …)
SyncML
Comm techno specific protocols
propriety protocols
Manners of service use
Fixed use
Access device is in a fixed location
Nomadic use
User wanders from location A to B
Stops at location B to access service
Mobile use
Service consumed while the accessing device is moving
General service use
Service discovery
Service access / initiation
By user or service provider
Authentication
Service &/or user authentication
Authorisation
Service consumption
Accounting & charging / billing
Order of event may vary
E.g. pay before use (pre-paid) / pay after use
Service discovery
2 approaches
Find specific service
Where is a certain service?
E.g. where is a printer
Find available services
What services are offered to me?
What services exist around here?
Service discovery in the Internet
IP address & dedicated port,
URL
Service location protocol (SLP), IETF
UDDI (web services)
Google
Wireless service discovery
2 common phases
Device discovery
What devices exist within my comm range
Service discovery
What services the found devices offer?
Does any of found devices offer the service am looking for?
Service access
Service access ...
a - Access from desktop PC to Internet service
b - Access to Internet service from wireless device
c - Access to local service from wireless device
d - Access of telecom service from mobile phone
e - P2P access between 2 mobile devices
(a, b, c, d, e) service pushed to customer
AAA
Authentication
Establish/confirm a claim
Device authentication
User authentication
Authorisation
What is the device/user permitted to do
Accounting
What this device/user has done?
How much to we charge/bill from it?
Service categorisation
Different ways to categorise services:
Access methonds (P2P, telcom, Ad-hoc, ..)
How it looks to the user (transparent, interactive, …)
How the data delivery works (push/pull - user/service initiated)
What service ehancing techno is it based on
E.g. Location based, personalised, proximity, …
What type of service is provided
E.g. Security, information, payment, …
Standardisation & definitions
Radio
IEEE
ETSI
Apps
OMA
Open upper layer standards for mobile phone industry
Bluetooth SIG
ZigBee Alliance
Location Interoperability forum - (OMA consolidatee)
Mobile wireless Internet forum (MWIF)
Many more dedicated to specific aspects
Considerations
What kind of service do we want to provide?
To what environment do we provide the services?
What comm techno can we use?
To whom
What type/kind access device do they have
Can we force them to use an access device we want?
Should we adapt the service for different device types?
How can we help the service use
Considerations ...
Provide neccessary funtionalities just in server side?
Service accessible via standard apps on device (browser)
Else, how to provided needed apps to customers
How about P2P paradigms
What do we gain in service provision?
Profits through increased sales?
Payed service - charging/billing of service consumption
Additional value for company
Next lecture
Wireless devices
Properties,
OS
, …
Development issues on devices
TODO
Different categories of wireless services
Manners of service use
Last modified:
2013/07/01 14:42
Log In
Show pagesource