Event-Driven Software-Architecture for Delay- and Disruption-Tolerant Networking

Total Page:16

File Type:pdf, Size:1020Kb

Event-Driven Software-Architecture for Delay- and Disruption-Tolerant Networking Event-driven Software-Architecture for Delay- and Disruption-Tolerant Networking Der Carl-Friedrich-Gauß-Fakultät der Technischen Universität Carolo-Wilhelmina zu Braunschweig zur Erlangung des Grades eines Doktoringenieurs (Dr.-Ing.) genehmigte Disseration von Johannes Morgenroth geboren am 28.08.1981 in Braunschweig Eingereicht am: 19.12.2014 Disputation am: 17.07.2015 1. Referent: Prof. Dr.-Ing. Lars Wolf 2. Referent: Prof. Dr.-Ing. Klaus Wehrle 2015 Bibliografische Information der Deutschen Nationalbibliothek: Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografie; detaillierte bibliografische Daten sind im Internet über www.dnb.de abrufbar. Diss., Technische Universität Carolo Wilhelmina zu Braunschweig, 2015 © 2015 Johannes Morgenroth Herstellung: BoD – Books on Demand, Norderstedt BoD Ref. 0011632925 Abstract Continuous end-to-end connectivity is not available all the time, not even in wired networks. Thus, the »Off-line first« paradigm is applied to applications of mobile devices to deal with intermittent connectivity without annoying the users every time the network is going to be flaky. But since mobile devices, particularly smart- phones, are typically bound to the Internet, they become almost useless as soon as their connectivity is gone. Delay- and Disruption-Tolerant Networking (DTN) al- lows devices to communicate even if there is no continuous path to the destination by replacing the end-to-end semantics with a hop-by-hop store-carry-and-forward approach. Since existing implementations of DTN software suffer from various limita- tions, this thesis presents an event-driven software architecture for Delay- and Disruption-Tolerant Networking and a lean, lightweight, and extensible imple- mentation of a bundle node. Beside general considerations of requirements and use-cases, special attention is paid to the performance and portability to embed- ded platforms. Further, a set of helpful extensions is selected and integrated to gain a bundle node implementation which is ready to get deployed to common scenarios. In a comprehensive description of the architecture and the underlying design decisions, this work focuses on eliminating weaknesses of the Bundle Protocol (RFC 5050). One of these is the dependency on synchronized clocks. Thus, this work takes a closer look on that requirement and presents approaches to bypass that dependency for some cases. For scenarios which require synchronized clocks, an approach is presented to distribute time information which is used to adjust the individual clock of nodes. To compare the accuracy of time information provided by each node, this approach introduces a clock rating. Additionally, a self-aligning algorithm is used to automatically adjust the node’s clock rating parameters ac- cording to the estimated accuracy of the node’s clock. In an evaluation, the general portability of the bundle node software is proven by porting it to various systems. Further, a performance analysis compares the new implementation with existing software. To perform an evaluation of the time- synchronization algorithm, the ONE simulator is modified to provide individual clocks with randomized clock errors for every node. Additionally, a specialized iv testbed, called Hydra, is being developed to test the implementation of the time- synchronization approach in real software. Hydra instantiates virtualized nodes running a complete operating system and provides a way to test real software in large DTN scenarios. Both the simulation and the emulation in Hydra show that the algorithm for time-synchronization can provide an adequate accuracy depend- ing on the inter-contact times. Kurzfassung Eine kontinuierliche Ende-zu-Ende-Konnektivität ist nicht immer verfügbar, nicht einmal in drahtgebundenen Netzen. Daher wird das »Off-line first« Para- digma bei Anwendungen auf Mobilgeräten angewendet um die Anwender nicht zu irritieren, falls die Verbindung unzuverlässig wird. Aber da Mobilgeräte, insbe- sondere Smartphones, typischerweise abhängig von dem Internet sind, werden sie fast nutzlos sobald keine Verbindung mehr existiert. Verzögerungs- und unterbre- chungstolerante Kommunikation (DTN) ersetzt die Ende-zu-Ende-Semantik mit einem Hop-by-Hop Store-Carry-and-Forward Ansatz und erlaubt es so Geräten miteinander zu kommunizieren, auch wenn es keinen kontinuierlichen Pfad gibt. Da bestehende DTN Implementierungen unter verschiedenen Einschränkun- gen leiden, stellt diese Arbeit eine ereignisgesteuerte Software-Architektur für Verzögerungs- und unterbrechungstolerante Netze sowie eine schlanke, leichte und erweiterbare Implementierung eines Bündelknotens vor. Neben den allge- meinen Überlegungen zu den Anforderungen und den Anwendungsfällen wird besonderes Augenmerk auf die Leistung und die Portabilität zu eingebetteten Systemen gelegt. Ferner wird eine Reihe von hilfreichen Erweiterungen ausge- wählt und integriert, um eine Implementierung eines Bündelknotens zu erhalten, welche bereit ist in üblichen Szenarien eingesetzt zu werden. In einer umfassenden Beschreibung der Architektur und den zugrunde liegen- den Design-Entscheidungen, konzentriert sich diese Arbeit auf die Beseitigung von Schwächen des Bundle Protocols (RFC 5050). Eine davon ist die Abhängig- keit zu synchronisierten Uhren. Daher wirft diese Arbeit einen genaueren Blick auf diese Anforderung und präsentiert Ansätze, um diese Abhängigkeit in einigen Fällen zu umgehen. Für Szenarien die synchronisierte Uhren voraussetzen wird außerdem ein Ansatz vorgestellt, um die Uhren der einzelnen Knoten mit Hilfe von verteilten Zeitinformationen zu korrigieren. Um die Genauigkeit der Zeitin- formationen von jedem Knoten vergleichen zu können, wird eine Bewertung der Uhren eingeführt. Zusätzlich wird ein Algorithmus vorgestellt, der die Parameter der Bewertung in Abhängigkeit von der ermittelten Genauigkeit der lokalen Uhr anpasst. In einer Evaluation wird die allgemeine Portabilität der Software zu verschiede- nen Systemen gezeigt. Ferner wird bei einer Performance-Analyse die neue Soft- vi ware mit existierenden Implementierungen verglichen. Um eine Evaluation des Zeitsynchronisationsalgorithmus durchzuführen, wird der ONE Simlator so an- gepasst, dass jeder Knoten eine individuelle Uhr mit zufälligem Fehler besitzt. Außerdem wird eine spezielle Testumgebung namens Hydra vorgestellt um ei- ne echte Implementierung des Zeitsynchronisationsalgorithmus zu testen. Hydra instanziiert virtualisierte Knoten mit einem kompletten Betriebssystem und bie- tet die Möglichkeit echte Software in großen DTN Szenarien zu testen. Sowohl die Simulation als auch die Emulation in Hydra zeigen, dass der Algorithmus für die Zeitsynchronisation eine ausreichende Genauigkeit in Abhängigkeit von Kontakt- häufigkeit erreicht. Danksagung Nach einigen Jahren interessanter Forschung hatte ich nun die Gelegenheit meine bisherigen gesammelten Erkenntnisse und Erfahrungen in diesem Werk nieder zu schreiben. Auch wenn die Schrift von mir verfasst wurde, haben dennoch viele mir wichtige Menschen einen ganz wesentlichen Beitrag zu dieser Arbeit geleistet. Auf diesem Wege möchte ich all’ jenen meinen herzlichsten Dank aussprechen. Meinem Doktorvater und ehem. Arbeitgeber Prof. Dr.-Ing. Lars Wolf danke ich in erster Linie für die umfangreiche Betreuung und Unterstützung bei der Entwicklung meiner Fähigkeiten und Forscher-Tätigkeiten. Ohne den gebotenen Freiraum kombiniert mit sehr zielgerichteten Stößen in die richtige Richtung, wäre meine Arbeit sicherlich nicht das was sie nun ist. Selbstverständlich danke ich auch für seine Arbeit als Gutachter und Prüfer im Rahmen meiner Promotion. Ebenso danke ich Prof. Dr.-Ing. Klaus Wehrle für seinen Einsatz bei der Begut- achtung meiner Arbeit und der abschließenden Prüfung. Meinen ehem. Kollegen des Instituts für Betriebssysteme und Rechnerverbund der TU Braunschweig danke ich für die moralische Unterstützung und für die vielen Diskussions- runden, welche mir mehr als einmal erlaubt haben einen anderen Blickwinkel einzunehmen. Meiner Familie und dabei insbesondere meiner Frau, Julia Morgenroth, danke ich für die tatkräftige Unterstützung bei der Bewältigung des Alltags während der anspruchsvollen Phasen meiner Arbeit. Außerdem Danke ich für das mir entge- gen gebrachte Verständnis und für die Ermutigungen die mir halfen diese Arbeit schließlich zu vollenden. Johannes Morgenroth, August 2015 viii Contents 1 Introduction 1 1.1 Off-line First . .1 1.2 Living without Internet . .2 1.3 Store, Carry, and Forward . .2 1.4 Delay- and Disruption-Tolerant Networking . .3 1.5 Outline . .4 2 Fundamentals 7 2.1 Applications . .7 2.1.1 ZebraNet . .7 2.1.2 DakNet . .8 2.1.3 N4C .................................8 2.1.4 Astronaut E-mail Challenge . .9 2.1.5 EMMA . 10 2.2 Scenarios . 11 2.2.1 Space and Interplanetary Networking . 11 2.2.2 Military and Tactical Communications . 11 2.2.3 Disaster and Emergency Systems . 11 2.2.4 Internet Deployment . 12 2.2.5 Wireless Sensor-networks . 12 2.2.6 Mobile Internet . 13 2.3 Bundle Protocol . 13 2.3.1 Architecture . 14 2.3.2 Addressing . 16 2.3.3 Data-structures . 17 2.3.4 Fragmentation . 22 2.3.5 Administrative Records . 23 2.3.6 Custody Transfer . 26 2.3.7 Application Agent . 27 2.3.8 Security . 28 2.3.9 Dependency on Synchronized Clocks . 29 2.4 Implementations . 29 x Contents 2.4.1 DTN2 Reference Implementation . 30 2.4.2 Interplanetary Overlay Network . 31 2.4.3 Postellation . 33 2.4.4 Bytewalla . 34 2.4.5 Other . 35 2.5 Time-synchronization . 35 2.5.1 Synchronicity in Computer Networks
Recommended publications
  • Emerging Cyber Threats to the United States Hearing
    EMERGING CYBER THREATS TO THE UNITED STATES HEARING BEFORE THE SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION FEBRUARY 25, 2016 Serial No. 114–55 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PUBLISHING OFFICE 21–527 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas CANDICE S. MILLER, Michigan, Vice Chair JAMES R. LANGEVIN, Rhode Island JEFF DUNCAN, South Carolina BRIAN HIGGINS, New York TOM MARINO, Pennsylvania CEDRIC L. RICHMOND, Louisiana LOU BARLETTA, Pennsylvania WILLIAM R. KEATING, Massachusetts SCOTT PERRY, Pennsylvania DONALD M. PAYNE, JR., New Jersey CURT CLAWSON, Florida FILEMON VELA, Texas JOHN KATKO, New York BONNIE WATSON COLEMAN, New Jersey WILL HURD, Texas KATHLEEN M. RICE, New York EARL L. ‘‘BUDDY’’ CARTER, Georgia NORMA J. TORRES, California MARK WALKER, North Carolina BARRY LOUDERMILK, Georgia MARTHA MCSALLY, Arizona JOHN RATCLIFFE, Texas DANIEL M. DONOVAN, JR., New York BRENDAN P. SHIELDS, Staff Director JOAN V. O’HARA, General Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON CYBERSECURITY, INFRASTRUCTURE PROTECTION, AND SECURITY TECHNOLOGIES JOHN RATCLIFFE, Texas, Chairman PETER T.
    [Show full text]
  • Code Structure by Miklos Vajna Senior Software Engineer at Collabora Productivity 2017-10-11
    LibreOffice: Code Structure By Miklos Vajna Senior Software Engineer at Collabora Productivity 2017-10-11 @CollaboraOffice www.CollaboraOffice.com About Miklos ● From Hungary ● More blurb: http://vmiklos.hu/ ● Google Summer of Code 2010/2011 ● Rewrite of the Writer RTF import/export ● Writer developer since 2012 ● Contractor at Collabora since 2013 LibreOffice Conference 2017, Rome | Miklos Vajna 2 / 30 Thanks ● This is an updated version of Michael Meeks’ talk from last year LibreOffice Conference 2017, Rome | Miklos Vajna 3 / 30 Overview ● Code-base overview ● Internal core modules, internal leaf ● Ignoring externals ● Building / packaging: gnumake, scp2 ● Code organisation, git bits ● Keep in mind: this is a 20 years old code-base ● The quality is much better than you would expect after knowing its age ● Things continue to improve over time LibreOffice Conference 2017, Rome | Miklos Vajna 4 / 30 Module overview lowest level Internal non-leaf modules: UNO modules ● Module = toplevel dir ● make dumps-deps-png ● Each module has a README ● e.g. sal/README ● sal: at the bottom ● The system abstraction layer ● tools is an obsolete internal (more or less) duplication of this ● salhelper: wrapper code around sal, also part of the URE LibreOffice Conference 2017, Rome | Miklos Vajna 6 / 30 What is the Uno Runtime Environment (URE)? ● We’ll come to UNO in detail a bit later, but for now: ● Uno Runtime Environment ● See also JRE, Java Runtime Env. ● Belongs to the idea that UNO would be reused somewhere else ● Provides an API/ABI-stable abstraction layer for the suite URE ● Allows writing C++ extensions ● Modify carefully: ● Should not change the ABI ● ABI control via C .map files LibreOffice Conference 2017, Rome | Miklos Vajna 7 / 30 UNO modules ● store: legacy .rdb format ● registry: UNO type regisistry ● unoidl: a .idl file compiler ● cppu: C++ UNO ● Implements basic UNO types and infrastructure for C++, e.g.
    [Show full text]
  • Art-Workbook-V0 84
    Intensity Frontier Common Offline Documentation: art Workbook and Users Guide Alpha Release 0.84 August 18, 2014 This version of the documentation is written for version v0_00_27 of the art-workbook code. Scientific Computing Division Future Programs and Experiments Department Scientific Software Infrastructure Group Principal Author: Rob Kutschke Editor: Anne Heavey art Developers: L. Garren, C. Green, J. Kowalkowski, M. Paterno and P. Russo 1 2 List of Chapters Detailed Table of Contents iv List of Figures xx List of Tables xxii List of Code and Output Listings xxii art Glossary xxvii I Introduction 1 1 How to Read this Documentation 2 2 Conventions Used in this Documentation 4 3 Introduction to the art Event Processing Framework 7 4 Unix Prerequisites 34 5 Site-Specific Setup Procedure 45 i 6 Get your C++ up to Speed 47 7 Using External Products in UPS 107 II Workbook 119 8 Preparation for Running the Workbook Exercises 120 9 Exercise 1: Running Pre-built art Modules 124 10 Exercise 2: Building and Running Your First Module 163 11 General Setup for Login Sessions 220 12 Keeping Up to Date with Workbook Code and Documentation 222 13 Exercise 3: Some other Member Functions of Modules 228 14 Exercise 4: A First Look at Parameter Sets 240 15 Exercise 5: Making Multiple Instances of a Module 265 16 Exercise 6: Accessing Data Products 272 17 Exercise 7: Making a Histogram 291 18 Exercise 8: Looping Over Collections 317 19 3D Event Displays 341 20 Troubleshooting 377 ii III User’s Guide 379 21 Obtaining Credentials to Access Fermilab Computing Resources 380 22 git 382 23 art Run-time and Development Environments 391 24 art Framework Parameters 399 25 Job Configuration in art: FHiCL 405 IV Appendices 424 A art Completion Codes 425 B Viewing and Printing Figure Files 428 C CLHEP 430 D Include Guards 446 V Index 448 Index 449 iii Detailed Table of Contents Detailed Table of Contents iv List of Figures xx List of Tables xxii List of Code and Output Listings xxii art Glossary xxvii I Introduction 1 1 How to Read this Documentation 2 1.1 If you are new to HEP Software..
    [Show full text]
  • Release 0.11 Todd Gamblin
    Spack Documentation Release 0.11 Todd Gamblin Feb 07, 2018 Basics 1 Feature Overview 3 1.1 Simple package installation.......................................3 1.2 Custom versions & configurations....................................3 1.3 Customize dependencies.........................................4 1.4 Non-destructive installs.........................................4 1.5 Packages can peacefully coexist.....................................4 1.6 Creating packages is easy........................................4 2 Getting Started 7 2.1 Prerequisites...............................................7 2.2 Installation................................................7 2.3 Compiler configuration..........................................9 2.4 Vendor-Specific Compiler Configuration................................ 13 2.5 System Packages............................................. 16 2.6 Utilities Configuration.......................................... 18 2.7 GPG Signing............................................... 20 2.8 Spack on Cray.............................................. 21 3 Basic Usage 25 3.1 Listing available packages........................................ 25 3.2 Installing and uninstalling........................................ 42 3.3 Seeing installed packages........................................ 44 3.4 Specs & dependencies.......................................... 46 3.5 Virtual dependencies........................................... 50 3.6 Extensions & Python support...................................... 53 3.7 Filesystem requirements........................................
    [Show full text]
  • GNAT User's Guide
    GNAT User's Guide GNAT, The GNU Ada Compiler For gcc version 4.7.4 (GCC) AdaCore Copyright c 1995-2009 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". About This Guide 1 About This Guide This guide describes the use of GNAT, a compiler and software development toolset for the full Ada programming language. It documents the features of the compiler and tools, and explains how to use them to build Ada applications. GNAT implements Ada 95 and Ada 2005, and it may also be invoked in Ada 83 compat- ibility mode. By default, GNAT assumes Ada 2005, but you can override with a compiler switch (see Section 3.2.9 [Compiling Different Versions of Ada], page 78) to explicitly specify the language version. Throughout this manual, references to \Ada" without a year suffix apply to both the Ada 95 and Ada 2005 versions of the language. What This Guide Contains This guide contains the following chapters: • Chapter 1 [Getting Started with GNAT], page 5, describes how to get started compiling and running Ada programs with the GNAT Ada programming environment. • Chapter 2 [The GNAT Compilation Model], page 13, describes the compilation model used by GNAT. • Chapter 3 [Compiling Using gcc], page 41, describes how to compile Ada programs with gcc, the Ada compiler.
    [Show full text]
  • Machine-To-Machine Communication in Rural Conditions: Realizing Kasadakanet
    Machine-to-machine communication in rural conditions: Realizing KasadakaNet Fahad Ali VU Amsterdam [email protected] Supervised by Victor de Boer ABSTRACT the explored concepts is using Semantic Web technologies Contextual constraints play an important role in ICT for De- to facilitate knowledge sharing in rural areas (Gu´eret et al., velopment (ICT4D) projects. These ICT4D projects include 2011). those whose goal is to enable information and knowledge sharing in rural areas while keeping constraints such as lack One of the resulting products that came out of this research of electricity and technological infrastructure or (technical) is the Kasadaka2, a low-resource Raspberry Pi-based device illiteracy of end-users in mind. The Kasadaka project offers that provides an infrastructure on which voice-based appli- a solution for locals in rural areas in Sub-Saharan Africa to cations can be built and deployed locally. These applica- share knowledge. Due to a lack of technological infrastruc- tions for the Kasadaka are usually custom-built for specific ture, networks and internet connections are often not avail- needs and use cases. New applications can also be created able. Therefore, many ICT implementations in those areas fairly easily, making the platform ideal for rapid prototyping are not able to share data among each other. This paper (Baart, 2016). Essentially, these Kasadaka's are deployed on explores the possibilities of a machine to machine communi- a one-per-village basis, giving each village access to its own cation method to enable information sharing between geo- little piece of technology that facilitates local information graphically distributed devices.
    [Show full text]
  • Mvbluefox3 Technical Manual (Pdf)
    mvBlueFOX3 Technical Manual English - Version 3.04 i 1.1 About this manual............................................ 1 1.1.1 Goal of the manual ....................................... 1 1.1.2 Contents of the manual..................................... 1 1.2 Imprint.................................................. 2 1.2.1 Introduction ........................................... 3 1.2.2 wxWidgets............................................ 3 1.2.3 Sarissa ............................................. 3 1.2.4 GenICam ............................................ 3 1.2.5 libusb .............................................. 3 1.2.6 libusbK.............................................. 3 1.2.6.1 libusbK license .................................... 3 1.2.7 Doxygen............................................. 4 1.2.7.1 Doxygen license ................................... 4 1.2.8 SHA1 algorithm......................................... 4 1.2.9 Expat .............................................. 5 1.2.9.1 Expat Copyright.................................... 5 1.2.10 CppUnit ............................................ 5 1.2.11 NUnit.............................................. 5 1.2.11.1 NUnit License.................................... 5 1.3 Legal notice............................................... 6 1.3.1 Introduction ........................................... 6 1.3.2 cJSON.............................................. 6 1.3.3 Unity............................................... 6 1.4 Revisions ...............................................
    [Show full text]
  • An Infrastructure to Support Interoperability in Reverse Engineering Nicholas Kraft Clemson University, [email protected]
    Clemson University TigerPrints All Dissertations Dissertations 5-2007 An Infrastructure to Support Interoperability in Reverse Engineering Nicholas Kraft Clemson University, [email protected] Follow this and additional works at: https://tigerprints.clemson.edu/all_dissertations Part of the Computer Sciences Commons Recommended Citation Kraft, Nicholas, "An Infrastructure to Support Interoperability in Reverse Engineering" (2007). All Dissertations. 51. https://tigerprints.clemson.edu/all_dissertations/51 This Dissertation is brought to you for free and open access by the Dissertations at TigerPrints. It has been accepted for inclusion in All Dissertations by an authorized administrator of TigerPrints. For more information, please contact [email protected]. AN INFRASTRUCTURE TO SUPPORT INTEROPERABILITY IN REVERSE ENGINEERING A Dissertation Presented to the Graduate School of Clemson University In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Computer Science by Nicholas A. Kraft May 2007 Accepted by: Dr. Brian A. Malloy, Committee Chair Dr. Harold C. Grossman Dr. James F. Power Dr. Roy P. Pargas ABSTRACT An infrastructure that supports interoperability among reverse engineering tools and other software tools is described. The three major components of the infrastruc- ture are: (1) a hierarchy of schemas for low- and middle-level program representation graphs, (2) g4re, a tool chain for reverse engineering C++ programs, and (3) a repos- itory of reverse engineering artifacts, including the previous two components, a test suite, and tools, GXL instances, and XSLT transformations for graphs at each level of the hierarchy. The results of two case studies that investigated the space and time costs incurred by the infrastructure are provided. The results of two empirical evaluations that were performed using the api module of g4re, and were focused on computation of object-oriented metrics and three-dimensional visualization of class template diagrams, respectively, are also provided.
    [Show full text]
  • Networks & Communications
    PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objectives 1. Discuss the importance of computer networks. 2. Compare different types of LANs and WANs. 3. List and describe the hardware used in both wired and wireless networks. 4. List and describe the software and protocols used in both wired and wireless networks. 5. Explain how to protect a network. Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Objective 1: Overview From Sneakernet to Hotspots 1. Define computer network and network resources 2. Discuss the importance of computer networks 3. Differentiate between peer-to-peer networks and client-server networks Key Terms § Client § Peer-to-peer network § Client-server network § Server § Computer network § Workgroup § Homegroup § Network resource Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Networks § Computer network § Network resources § Two or more § Software computers § Hardware § Share resources § Files § Save time § Save money § Increase productivity § Homegroup § Simple networking feature § Used to network a group of Windows computers Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types § Peer-to-peer (P2P) § Each computer is equal § Client-server network § At least one central server Visualizing Technology Copyright © 2014 Pearson Educaon, Inc. Publishing as Pren=ce Hall Computer Network Types Peer-to-Peer (P2P) § Each device can share resources § No centralized authority § Each computer belongs to workgroup § Do not need to connect to the Internet § Most found in homes and small businesses § Simplest type of network § Do not need network operating system § All computers must be on to access resources Visualizing Technology Copyright © 2014 Pearson Educaon, Inc.
    [Show full text]
  • Pirate Philosophy Leonardo Roger F
    Pirate Philosophy Leonardo Roger F. Malina, Executive Editor Sean Cubitt, Editor-in-Chief Closer: Performance, Technologies, Phenomenology , Susan Kozel, 2007 Video: The Reflexive Medium , Yvonne Spielmann, 2007 Software Studies: A Lexicon , Matthew Fuller, 2008 Tactical Biopolitics: Art, Activism, and Technoscience , edited by Beatriz da Costa and Kavita Philip, 2008 White Heat and Cold Logic: British Computer Art 1960–1980 , edited by Paul Brown, Charlie Gere, Nicholas Lambert, and Catherine Mason, 2008 Rethinking Curating: Art after New Media , Beryl Graham and Sarah Cook, 2010 Green Light: Toward an Art of Evolution , George Gessert, 2010 Enfoldment and Infinity: An Islamic Genealogy of New Media Art , Laura U. Marks, 2010 Synthetics: Aspects of Art & Technology in Australia, 1956–1975 , Stephen Jones, 2011 Hybrid Cultures: Japanese Media Arts in Dialogue with the West , Yvonne Spielmann, 2012 Walking and Mapping: Artists as Cartographers , Karen O’Rourke, 2013 The Fourth Dimension and Non-Euclidean Geometry in Modern Art, revised edition , Linda Dalrymple Henderson, 2013 Illusions in Motion: Media Archaeology of the Moving Panorama and Related Spectacles , Erkki Huhtamo, 2013 Relive: Media Art Histories , edited by Sean Cubitt and Paul Thomas, 2013 Re-collection: Art, New Media, and Social Memory , Richard Rinehart and Jon Ippolito, 2014 Biopolitical Screens: Image, Power, and the Neoliberal Brain , Pasi Väliaho, 2014 The Practice of Light: A Genealogy of Visual Technologies from Prints to Pixels , Sean Cubitt, 2014 The Tone of Our Times: Sound, Sense, Economy, and Ecology , Frances Dyson, 2014 The Experience Machine: Stan VanDerBeek’s Movie-Drome and Expanded Cinema , Gloria Sutton, 2014 Hanan al-Cinema: Affections for the Moving Image , Laura U.
    [Show full text]
  • Sneakernet on Wheels: Trustworthy NFC-Based Robot to Machine Communication
    Sneakernet on Wheels: Trustworthy NFC-based Robot to Machine Communication Thomas Ulz, Thomas Pieber, Christian Steger Sarah Haas, Rainer Matischek Institute for Technical Informatics Development Center Graz Graz University of Technology Infineon Technologies Austria AG Graz, Austria Graz, Austria fthomas.ulz, thomas.pieber, [email protected] fsarah.haas, rainer.matischekg@infineon.com Abstract—Wireless communication technologies such as WiFi, controlled accessories could potentially operate in the ZigBee, or Bluetooth often suffer from interference due to many 2:4 GHz range [3]. The alternative 5 GHz range for WiFi devices using the same, unregulated frequency spectrum. Also, is also already used by other devices such as cordless wireless coverage can be insufficient in certain areas of a building. At the same time, eavesdropping a wireless communication out- phones, radar, and digital satellites [4]. Due to many de- side a building might be easy due to the extended communication vices operating in the same frequency range, interference range of particular technologies. These issues affect mobile robots will occur and affect wireless communication. and especially industrial mobile robots since the production 2) Insufficient Coverage: Due to certain objects in build- process relies on dependable and trustworthy communication. ings that dampen or even shield wireless communication Therefore, we present an alternative communication approach that uses Near Field Communication (NFC) to transfer confiden- (e.g. walls or large production machines) it is costly tial data such as production-relevant information or configuration to provide good wireless coverage for every part of updates. Due to NFC lacking security mechanisms, we propose a certain area. For IAMRs this is a problem due to a secured communication framework that is supported by dedi- the non-deterministic behavior when navigating on a cated hardware-based secure elements.
    [Show full text]
  • Bitcoin 2: Freedom of Transaction
    Bitcoin 2: Freedom of Transaction Sid Angeles and Eric Gonzalez [email protected] AF76 05E5 EB15 2B00 AB18 204C 11C9 1C8B EA6C 7389 [email protected] 3A85 7ABC 9453 96E4 B9DB 2A11 7370 E15E 8F60 2788 Donations: 1btctwojvohHSLaXaJAHWebZF2RS8n1NB Revision 2 July 23, 2013 Abstract We propose a set of changes to the original Bitcoin protocol (called Bitcoin 2) that allows Bitcoin to evolve into a system that is future-proof against developing threats to its original vision – an alternative, decentralized payment system which allows censorship-resistant, irreversible transac- tions. Bitcoin 2 strives to be a minimal set that lays the foundations for a long-lived system capable of delivering the original Bitcoin vision, with enough room for growth to layer additional im- provements on top of it. These changes include a sliding blockchain with fixed block sizes, the redistribution of dead coins with an unforgeable lottery, enforced mixing, and miner ostracism. The proposed changes require a proactive fork of the original Bitcoin block chain, but they allow final transfers of existing coins into Bitcoin 2 and a reuse of the existing Bitcoin infrastruc- ture. 1 Introduction The Bitcoin peer-to-peer electronic cash system [11] was introduced in 2009 and it proved to be a remarkable piece of work which found widespread adoption. The system was started with the explicit goal of providing a completely alternative payment system without a single point of failure that allows anonymous, but not untraceable, transactions. However, certain shortcomings in the original protocol and unforeseen developments inside and outside of the growing Bitcoin ecosystem threaten these very goals and there is good reason to believe that Bitcoin could develop into a system that is a complete perversion of the original vision – a com- pletely transparent payment system with very few points of control which has been totally absorbed by the established financial and regulatory environment.
    [Show full text]