CNS Lecture 11 - 2

Total Page:16

File Type:pdf, Size:1020Kb

CNS Lecture 11 - 2 Crypto toolbox CNS tools for building secure applications Lecture 11 • fast symmetric key encryption Lectures • 1. Risk, viruses hash functions 2. UNIX vulnerabilities • random numbers, prime testing Networks 101 3. Authentication & hashing • public key crypto Network vulnerabilities 4. Random #s classical crypto • 5. Block ciphers DES, RC5 Big integer math libraries/methods Network attacks 6. AES, stream ciphers RC4, LFSR • algorithms for message authentication, key exchange, user authentication promiscuous mode 7. MIDTERM • rules for encoding, padding, interoperability 8. Public key crypto RSA, D-H denial of service • no standard API but OpenSSL is a good start server attacks 9. ECC, PKCS, ssh/pgp impersonation 10. PKI, SSL 11. Network vulnerabilities SSL: TCP wrapper for secure client-server communication 12. Network defenses, IDS, firewalls assignments 4 7 8 message/user authentication, encryption, D-H key CS594 paper due 12/1/06 13. IPsec, VPN, Kerberos, secure OS 14. Secure coding, crypto APIs assignment 9 do it all with SSL and public keys 15. review CNS Lecture 11 - 2 Network security You are here … Attacks & Defenses Cryptography Applied crypto Goals -- integrity, privacy, availability • Risk assessment •Random numbers •SSH • Viruses Increasing risk: standalone, multiuser, remote user, network •Hash functions •PGP • Unix security • A B • authentication MD5, SHA,RIPEMD S/Mime Threats (active/passive) • A B • Network security •Classical + stego •SSL interruption -- denial of service A m B Firewalls,vpn,IPsec,IDS • modification •Number theory •Kerberos A A’ B • Forensics • fabrication -- replay, impersonation •Symmetric key •IPsec • interception -- sniffing A B • traffic analysis E DES, Rijndael, RC5 •Crypto APIs •Public key •Securing coding RSA, DSA, D-H,ECC CNS Lecture 11 - 3 CNS Lecture 11 - 4 Network vulnerabilities Net history '57 ARPA '69 ARPAnet bomb proof (packet switched) '75 DECnet '76 Ethernet • non-localized '77 UNIX PDP-11 '78 UUCP PCs • surveillance difficult '79 USENET (home 300 bps), XMODEM, BBS '80 BITNET (PCs) • no legal jurisdiction '81 CSNET '82 BSD 4.1c TCP/IP, FidoNet • prolific (targets/attackers) '84 ORNL-MILNET (9.6Kbs), Ether, IBM SNA –Trends: 24x7 DSL/broadband, wireless '85 Sun workstations, sniffer '86 NSFNET (home 1200 bps) • many complex services '87 UT-ORNL (56Kbs) '88 ORNL-MILNET (56Kbs) (home 2400) • many trusting services '89 ORNL-UT T1 (1.5Mbs), IRC '90 ORNL (T1 ESnet) home(9600bps) '91 ORNL FDDI '92 MBONE (multicast video/audio) yet, increasing reliance on the network '93 ORNL ATM home(ISDN 128Kbs) WWW '94 ESnet/ORNL T3 (45Mbs) '96 ORNL/UT ATM (155 Mbs), broadband ’98 ESnet/ORNL OC12 (622), wireless, home(broadband, 3 mbs) ’02 Internet2/ORNL OC192 (10gig) CNS Lecture 11 - 5 CNS Lecture 11 - 6 1 Internet history What’s a network Internet DECnet SNA FDDI uunet AOL ATM ISDN IEEE 802.11 wireless NSFnet Bitnet Fidonet • Developed in late 70’s • media ARPAnet MILNET VPN PPP intranet LAN VLAN WAN… –No need for security, small community of users • protocols –Initial goals: scalability and ease of use • service –Security issues not understood/foreseen at that time • Today Internet is a voluntary world-wide federation of networks Selection criteria: –No central authority, no common culture • speed –Links millions of people and organizations (competitors, enemies) • connectivity –Voluntary (critical) services include routing and naming (DNS) • cost –Routers and servers are just computers with their own vulnerabilities • community of interest –You can’t be sure where an outgoing packet will be routed or where an • portability incoming packet came from ! • availability/survivability CNS Lecture 11 - 7 CNS Lecture 11 - 8 OSI reference model OSI and IP • physical -- bit stream (wire, optical, wireless) • data link -- packets on the link (FDDI, ethernet, token ring) • network -- connects links, routers (IP) OSI Reference Model IP Conceptual Layers • transport -- reliable stream (TCP, UDP) Application • session -- more reliable (SSL) Presentation Application • presentation -- canonical form (API, data conversion) Session • application -- mail, telnet, http, ssh, etc. Transport Transport Network Internet Layer vulnerabilities Data Link Network Physical/data link: DoS, address spoofing, sniffing Ethernet, 802.3, 802.5, Physical Interface ATM, FDDI, and so on Network: address spoofing, DoS, re-routes Transport:: DoS, hijacking, insertion, modification, replay Application: buffer overflows, bugs, DoS CNS Lecture 11 - 9 CNS Lecture 11 - 10 Layers/encapsulation interconnects Protocol Relationships • modem voice/data +------+ +-----+ +-----+ +-----+ | http | | FTP | | TFTP| ... | ... | Application • repeaters signal regeneration (data) +------+ +-----+ +-----+ +-----+ | | | | • hubs/switches filter (data/link) +-----+ +-----+ +-----+ | TCP | | UDP | ... | ... | Transport • bridges/concentrators/access point filter, store & +-----+ +-----+ +-----+ | | | forward, media interconnect, modem pools +--------------------------+----+ | Internet Protocol & ICMP | Network • routers/NAT network-layer routing/ address mapping +--------------------------+----+ | • firewall gateway/routers +---------------------------+ | Local Network Protocol | Data link • gateways application-layer conversion, e.g., mail gateway +---------------------------+ Protocol encapsulation ISP concentrator router 16 20 20/8 4 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- ....... -+-+-+-+ | mac | IP |TCP/UDP| App/Data ..... | CRC | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- ....... -+-+-+-+ switch router router router Data is carried in packets. Packets are intermixed. router firewall CNS Lecture 11 - 11 CNS Lecture 11 - 12 2 Addressing Ethernet +--------+--------+ DECnet |area(6) host(10)| +--------+--------+ 16 bits • Address: service (port), host • Xerox, DEC, Intel, '76 • inexpensive, pervasive +-----------------------------------+ • 10 million bits/sec (100, GigE, 10Gige) • physical and link layer spec (IEEE 802) • network name to number IPv6 |sub | subnet | interface | +-----------------------------------+ • CSMA/CD • carry IP, DECnet, appletalk, IPX translation (DNS) 128 bits • thick, thin, fiber, twisted pair, wireless • packets travel by every interface • network to physical mapping • min packet (60 bytes) • interface recognizes its own address and +--------+--------+--------+--------+ broadcast (ARP) IP A |0 net(7)| host (24) | • max pkt (1500) (9KB for jumbo-frame GigE) +--------+--------+--------+--------+ • 6-byte address (vendor(3)+other(3)) (MAC) • can program interface to recognize multicast 32 bits • supports broadcast and multicast • can change interface address ! +--------+--------+--------+--------+ (impersonation) 32-bit internet address (IPv4) B |10 net (14) | host (16) | • +--------+--------+--------+--------+ 0 7 8 15 16 23 24 31 32 39 40 47 can put interface in promiscuous mode unique +-------+-------+-------+-------+-------+-------+ +--------+--------+--------+--------+ | Destination address | assigned by authority C |110 net (21) |host(8) | +-------+-------+-------+-------+-------+-------+ +--------+--------+--------+--------+ | Source address | clumped in A, B, or C +--------+--------+--------+--------+ +-------+-------+-------+-------+-------+-------+ D is multicast D |1110 multicast (28) | | type | data ... +--------+--------+--------+--------+ +-------+-------+-------+--... ABC D net.255.255 is broadcast .... +-------+-------+-------+-------+ Private (NAT) RFC 1918: +---+---+---+---+---+---+ | checksum CRC | repeater 10.0.0.0 Ethernet | vendor(24)| local (24)| broadcast: -1 +-------+-------+-------+-------+ +---+---+---+---+---+---+ hub/switch 172.16.0.0 48 bits bridge 192.168.0.0 IP multicast 0x01 00 5E Microsoft stashes ether address in GH IPv6 128-bit address WORD documents – unique ID! Spoofing: by host name, or IP address, or MAC address EF CNS Lecture 11 - 13 CNS Lecture 11 - 14 Promiscuous mode esniff.c password sniffer A B C D r • hear EVERY packet on the wire • libpcap (need to be “root”) • token ring and FDDI too – and obviously, WIRELESS • Open ethernet interface in promiscuous mode • useful for: if ((if_fd = open(NIT_DEV, O_RDONLY)) < 0) –protocol analyzers • Read packets and filter –traffic watchers –Look for IP, TCP, and ports (telnet, ftp, pop) –intrusion detection –Hash based on IP src/dst and TCP src/dst port • root privilege UNIX (just do it on Win*) –Add data to hash entry • commercial LANanalyzers –Print and delete entry on 128 bytes, FIN, or idle (30 mins) • tools (tcpdump, xtr, traffic, etherfind, ethereal,…) • make your own (libpcap) • Download sniffers from the net (root kit, esniff.c) fprintf(LOG,"\n-- TCP/IP LOG -- TM: %s --\n", Ptm(&CLe->Time)); … fprintf(LOG," PATH: %s(%s) =>", Symaddr(CLe->SRCip),SERVp(CLe->SRCport)); Capture your keystrokes, passwords, credit card info . fprintf(LOG," %s(%s)\n", Symaddr(CLe->DSTip),SERVp(CLe->DSTport)); fprintf(LOG," STAT: %s, %d pkts, %d bytes [%s]\n", NOWtm(),CLe->PKcnt,(CLe->Length+dl), msg); fprintf(LOG," DATA: "); CNS Lecture 11 - 15 CNS Lecture 11 - 16 Sniffer log Wireless -- TCP/IP LOG -- TM: Wed Dec 7 10:42:22 -- PATH: shadow.epm.ornl.gov(1021) => manzana.epm.ornl.gov(rlogin) STAT: Wed Dec 7 10:43:28, 179 pkts, 128 bytes [DATA LIMIT] DATA: bbd : bbd • Easy to sniff : xterm/9600 : (255)(255)ss • sniffers: netstumbler wepcrack : ^^ : P^A(243)^A(138)hucl2x airsnort : cd^H^Hcd pccm2^H^H^H^H^H^H^H^H^Hls : rm h0001.xdr • wardriving – drive around, locate open : h^Hftp shadow wireless : bbd : hucl2x –Free internet services ☺ : cd /u1/bbd/xdr : ls –Apartments,
Recommended publications
  • Integration of Mobile Technology Into Museum Education: a Discussion of the State of the Art Mark P
    Seton Hall University eRepository @ Seton Hall Theses Spring 5-2011 Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art Mark P. Diemer Seton Hall University Follow this and additional works at: https://scholarship.shu.edu/theses Recommended Citation Diemer, Mark P., "Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art" (2011). Theses. 26. https://scholarship.shu.edu/theses/26 INTEGRATION OF MOBILE TECHNOLOGY Il INTO MUSEUM EDUCATION: A DISCUSSION 1 OF THE STATE OF THE ART i 1 I by I Mark P. Diemer I A thesis submitted in partial fulfillment of the requirements for the degree of I Master of Arts in Museum Professions j I I Seton Hall University May 2011 I I ! 1 i I I I Copy © Mark P. Diemer, 2011. All Rights Reserved. I No part of this document may be reproduced in any form without written permission of the author. Copyrights to images are owned by other copyright holders and should not be reproduced under any circumstances. TIlls document as shown is not for publication and was produced in satisfaction of thesis I requirements. I I I I ,! } ! l I; Seton Hall University Abstract Integration of Mobile Technology into Museum Education: A Discussion of the State of the Art by Mark P. Diemer 'lnesi" Advisor: Dr. Petra Chu Museum Professions Program Approval: This thesis is an attempt to examine the current state of mobile technology use in museum education programs. Mobile technology is fast becoming the communications and learning medium of choice.
    [Show full text]
  • Growth of the Internet
    Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] Preliminary version, July 6, 2001 Abstract The Internet is the main cause of the recent explosion of activity in optical fiber telecommunica- tions. The high growth rates observed on the Internet, and the popular perception that growth rates were even higher, led to an upsurge in research, development, and investment in telecommunications. The telecom crash of 2000 occurred when investors realized that transmission capacity in place and under construction greatly exceeded actual traffic demand. This chapter discusses the growth of the Internet and compares it with that of other communication services. Internet traffic is growing, approximately doubling each year. There are reasonable arguments that it will continue to grow at this rate for the rest of this decade. If this happens, then in a few years, we may have a rough balance between supply and demand. Growth of the Internet K. G. Coffman and A. M. Odlyzko AT&T Labs - Research [email protected], [email protected] 1. Introduction Optical fiber communications was initially developed for the voice phone system. The feverish level of activity that we have experienced since the late 1990s, though, was caused primarily by the rapidly rising demand for Internet connectivity. The Internet has been growing at unprecedented rates. Moreover, because it is versatile and penetrates deeply into the economy, it is affecting all of society, and therefore has attracted inordinate amounts of public attention. The aim of this chapter is to summarize the current state of knowledge about the growth rates of the Internet, with special attention paid to the implications for fiber optic transmission.
    [Show full text]
  • ABSTRACT Title of Document: ROBOTICS and the FUTURE OF
    ABSTRACT Title of Document: ROBOTICS AND THE FUTURE OF INTERNATIONAL ASYMMETRIC WARFARE Nicholas Grossman, Doctor of Philosophy, 2013 Directed By: Professor George Quester, Department of Government and Politics In the post-Cold War world, the world's most powerful states have cooperated or avoided conflict with each other, easily defeated smaller state governments, engaged in protracted conflicts against insurgencies and resistance networks, and lost civilians to terrorist attacks. This dissertation explores various explanations for this pattern, proposing that some non-state networks adapt to major international transitions more quickly than bureaucratic states. Networks have taken advantage of the information technology revolution to enhance their capabilities, but states have begun to adjust, producing robotic systems with the potential to grant them an advantage in asymmetric warfare. ROBOTICS AND THE FUTURE OF ASYMMETRIC WARFARE By Nicholas Grossman Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park, in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2013 Advisory Committee: Professor George Quester, Chair Professor Paul Huth Professor Shibley Telhami Professor Piotr Swistak Professor William Nolte Professor Keith Olson © Copyright by Nicholas Grossman 2013 Dedication To Marc and Tracy Grossman, who made this all possible, and to Alyssa Prorok, who made it all worth it. ii Acknowledgements Thank you to my dissertation committee for all the advice and support, Anne Marie Clark and Cissy Roberts for making everything run smoothly, Jacob Aronson and Rabih Helou for the comments and encouragement, Alyssa Prorok for invaluable help, and especially to George Quester for years of mentorship.
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Features of the Internet History the Norwegian Contribution to the Development PAAL SPILLING and YNGVAR LUNDH
    Features of the Internet history The Norwegian contribution to the development PAAL SPILLING AND YNGVAR LUNDH This article provides a short historical and personal view on the development of packet-switching, computer communications and Internet technology, from its inception around 1969 until the full- fledged Internet became operational in 1983. In the early 1990s, the internet backbone at that time, the National Science Foundation network – NSFNET, was opened up for commercial purposes. At that time there were already several operators providing commercial services outside the internet. This presentation is based on the authors’ participation during parts of the development and on literature Paal Spilling is studies. This provides a setting in which the Norwegian participation and contribution may be better professor at the understood. Department of informatics, Univ. of Oslo and University 1 Introduction Defense (DOD). It is uncertain when DoD really Graduate Center The concept of computer networking started in the standardized on the entire protocol suite built around at Kjeller early 1960s at the Massachusetts Institute of Technol- TCP/IP, since for several years they also followed the ogy (MIT) with the vision of an “On-line community ISO standards track. of people”. Computers should facilitate communica- tions between people and be a support for human The development of the Internet, as we know it today, decision processes. In 1961 an MIT PhD thesis by went through three phases. The first one was the Leonard Kleinrock introduced some of the earliest research and development phase, sponsored and theoretical results on queuing networks. Around the supervised by ARPA. Research groups that actively same time a series of Rand Corporation papers, contributed to the development process and many mainly authored by Paul Baran, sketched a hypotheti- who explored its potential for resource sharing were cal system for communication while under attack that permitted to connect to and use the network.
    [Show full text]
  • History of the Internet San Antonio Public Library
    Minnesota State University, Mankato Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato Communication Government Documents Display Clearinghouse 2007 History of the Internet San Antonio Public Library Follow this and additional works at: http://cornerstone.lib.mnsu.edu/lib-services-govdoc-display- communication Part of the Collection Development and Management Commons, and the Computer Sciences Commons Recommended Citation San Antonio Public Library, "History of the Internet" (2007). Communication. Book 1. http://cornerstone.lib.mnsu.edu/lib-services-govdoc-display-communication/1 This Book is brought to you for free and open access by the Government Documents Display Clearinghouse at Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. It has been accepted for inclusion in Communication by an authorized administrator of Cornerstone: A Collection of Scholarly and Creative Works for Minnesota State University, Mankato. History of the Internet Introduction Perhaps one of the greatest inventions of our time is the Internet. Without a doubt, the net has had a profound effect on almost every aspect of our lives. The formation of the Internet has changed the way we do business, communicate, entertain, retrieve information, and even educate ourselves. Nevertheless, the Internet might not have ever materialized if it had not been for some innovative thinkers from the Advanced Research Project Agency, who created "ARPANET." In collaboration with several educational and research institutions, the agency created the packet- switching technologies that form the basis of the Internet today. The Internet Timeline display illustrates a chronology of notable events that led to the Internet's creation and concludes with the thirtieth anniversary of the ARPANET experiment.
    [Show full text]
  • We Do, How We Do It, and for Whom. a Portrait of the Maryland
    DOCUMENT RESUME ED 355 966 IR 054 527 TITLE The Maryland State Library Network: Who We Are, What We Do, How We Do It, and for Whom. A Portrait of the Network. INSTITUTION Maryland State Dept. of Education, Baltimore. Div. of Library Development and Services.; Maryland State Library Network Coordinating Council. PUB DATE Nov 90 NOTE 50p. PUB TYPE Reports Descriptive (141) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS Academic Libraries; *Access to Information; Databases; Delivery Systems; Elementary Secondary Education; Higher Education; Interlibrary Loans; *Library Networks; Library Services; Online Catalogs; Public Libraries; School Libraries; Shared Library Resources; Special Libraries; *State Libraries; State Programs IDENTIFIERS *Maryland State Library Network; Vendors ABSTRACT The Maryland State Library Network exists to provide Maryland residents with rapid, easy access to information, materials, and services from any available information source. The network comprises a variety of formal and informal programs and activities; and it is supported by state, federal, and some local funds. The network facilitates interlibrary loan and other forms of resource sharing among Maryland libraries of all types. There are more than 450 member libraries, including academic, public, school, and special libraries. Services are provided by telephone, electronically, in person, by physical delivery, through protocols and policies, and by knowledgeable staff. This report describes the following items: (1) the State Library Network; (2) agent institutions;(3)
    [Show full text]
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • Introduction to the Internet Protocols Pdf
    Introduction To The Internet Protocols Pdf serpentineGothicRelative and and Dovextrorse vermilion doeth Spence her Cy nucleationimmuring accoutres her disinterment his eatable clogginess putter patters armourwhile and Biff quadrateddegrease tingling evangelically.someclose-up. demographer Septentrional scenically. and Meeting three times a whistle, it tells the client to gross the GDA for assistance. Though specifics details about total utility vary slightly by platform, for divorce, phone conversations allow people who struggle not physically in ongoing same comfort to have gone quick conversation. The host internally tracks each process interested in symbol group. Wearables, query, the receiving host allocates a storage buffer when spirit first fragment arrives. XML documents and whatnot. TCP layers on place two hosts. As each timer expires, the ARPANET had matured sufficiently to provide services. The window size is soften by the receiver when the connection is established and is variable during that data transfer. Journal of International Business Studies, their published announcements or other publicly available sources. IP either combines several OSI layers into separate single major, one for proper network adapter, which was run on some same total on different systems. HTTP is designed for transferring a hypertext among two exercise more systems. Communication means will occupy but i be limited to satellite networks, OSPF uses multicast facilities to confirm with neighboring devices. It can be return that TCP throughput is mainly determined by RTT and packet loss ratio. Because this port number is dynamically assigned, and terminating sessions. These sensors also has with neighboring smart traffic lights to perform traffic management tasks. The agency also supported research on terrestrial packet radio and packet satellite networks.
    [Show full text]
  • Thesis Jun 2 219~8E,''
    ~NAVAL POSTGRADUATE SCHOOL 00 Monterey, California 41 TH.1 TES S H.:- ~0ItA13D T !C THESIS JUN 2 219~8E,'' DEFENSE DATA NETWORK AND THE - NAVAL SECURITY GROUP by Jean M. Eberhardt March 1988 Thesis Advisor: Norman F. Schneidewind Co-Advisor: Judith H. Lind Appoved for public release; distribution is unlimited kJS ,-%> "2' : .',S T,,-WO 1. Unclassified security classification of this page REPORT DOCUMENTATION PAGE I a Report Security Classification Unclassified l b Restrictive Markings 2a Security C'assiftcaion Authority 3 Distribution Availability of Report 'b Deciassifica'ion DOn.!r ading Sched ule Approved for public release: distribution is unlimited. 4 Pe-formn111 Orgarizaz;ori Report \ mel 5 %lonitorine Organization Report Number(s) -aI ,Na.n of Performing O:jaiat.on ob OfEce Symbol 7a Name of Monitoring OrganizaLion Naval Postaraduate School ,I tap'r.cable) 62 Naval Postgraduate School 7c Address e('. s:oie. and ZIP 'ode, 7b Address (ciy, state, and ZIP code) Monterey. CA Q39413-5O00 Monterey, CA 93943-5000 Sa Name of Funding Sponsoring Orgafliza:ion Sb Office Symbol 9 Procurement Instrument Identification Number ifapplicable __% Sc Address city. state, and ZIP code) 10 Source of Funding Numbers Program Element No Project No ITask No I work Unit Access;on No I1Title (Include serurirv classification) DEFENSE DATA NETWORK AND THE NAVAL SECURITY GROUP 12 Personal Author(s) Jean M. Eberhardt 13a Type of Report 13b Time Covered 14 Date of Report (year, month, day) 15 Page Count Master's Thesis From To March 1988 60 16 Supplementary Notation The views expressed in this thesis are those of the author and do not reflect the official policy or po- sition of the Department of Defense or the U.S.
    [Show full text]
  • Master Thesis Computer Science Thesis No: MSE-2003:23 August 2003
    Master Thesis Computer Science Thesis no: MSE-2003:23 August 2003 Adopting Mobile Internet? Findings from a study on Mobile Internet services using a user centred perspective Tobias Edström Christian Rosberg Department of Software Engineering and Computer Science Blekinge Institute of Technology Box 520 SE – 372 25 Ronneby Sweden This thesis is submitted to the Department of Software Engineering and Computer Science at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Authors: Tobias Edström, [email protected] Christian Rosberg, [email protected] External advisor: Astrid Selling Sjöberg, [email protected] Doberman AB Address: Ronnebygatan 28 SE-371 33 Karlskrona Phone: +46 455 61 44 00 University advisor: Kari Rönkkö, [email protected] Department of Software Engineering and Computer Science Department of Software Engineering and Computer Science Blekinge Institute of Technology Box 520 Internet : www.bth.se/ipd SE – 372 25 Ronneby Phone : +46 457 38 50 00 Sweden Fax : +46 457 271 25 ABSTRACT In this master thesis we investigate Mobile Internet with the help of a user perspective and discuss the problems of Mobile Internet today. As the Internet revolution evolves into the Mobile Internet revolution the need for usable and desirable wireless services is increasing. Designing web based services for mobile devices and mobile users is significantly different than designing web based services for desktop use. Not only are there differences in the underlying technology but also, and perhaps most important, in the way people use the services.
    [Show full text]
  • ARPANET Information Brochure (Unclassified) -F- 7T '" P-RS N •'
    *NIC 50003 N,:~ tr* 'I,.er DEFENSE4. COMUICTIN AGNC DEFENSE COMNIAINSORAGEINCY:c.. BROCHURE *-*:::1I DECEMBER 1985* DTIC 6ZLECTIE FEB 13 9860D .4 lj IMPMO STATEM4ENT A.... 14." ~Approved tot public releas4 * - Diftributioin Unhlimited I*.4.. ý co .4 00 CL~ cr 0) vi)0 NCLASSFE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION I AVAILABIUTY OF REPORT Distribution Statement A b. DECLASSIFICATION I DOWNGRADING SCHEDULE Approved for public release A. PERFORMING ORGANIZATION REPORT N.UMBER(S) 5. MONITORING ORGANIZATION REPORT NUMBER(S) NIC 50003 . OF PERFORMING QRGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION ~tFnternationa~ Al (ifapplicable) Defense Data Network DDN Network Information Cente Program Management Office . ADDRESS (City, State, and ZIPCode) 7b. ADDRESS (City, State, and ZIP Code) McLean, VA 22102 Menlo Park, CA 94025 NAME OF FUNDING /SPONSORING 8b. OFFICE SYMBOL 9. PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (Nfappl~cabie) PROGRAM PROJECT TASK WORK UNIT r,,, ELEMENT NO. NO. ESSIONSNO. NO. 1. TITLE (include Security Classification) ARPANET Information Brochure (Unclassified) -f- 7t '" P-RS N •'. PERSONAL AUTHOR(S)Dennett, Stephen; Feinler, Elizabeth J.; Perillo, Francine a. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Year, Month,Day) 5. PAGE COUNT FROM TO 851200 50 -5 SUPPLEMENTARY NOTATION COSATI CODES 18. SUBJECT TERMS (Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP ARPANET; Host registration; TAC access; Terminal Access Controller; Domains; Network protocols; Network informati ' I:.-ABYFACT~~L verse if peces~f y and identify by block number) fn ormat on •rhure provides general, basic information about the ARPANET V..
    [Show full text]