Thingsquare Technology
|
|
- Derick Powell
- 8 years ago
- Views:
Transcription
1 Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware. The wireless chip and the Thingsquare firmware securely connects the device to the Thingsquare cloud backend server. The cloud backend provides an API for smartphone apps. Thingsquare works with a range of wireless chips from several different chip manufacturers. To provide flexibility for Thingsquarebased products, Thingsquare works with many different types of wireless radios, offering both long-range and short-range alternatives. Thingsquare is fully based on open Internet standards and the Thingsquare firmware is open source. Key Facts Fully based on open Internet Protocol standards Firmware based on open source Contiki OS Full AES128 encryption Self-healing network Open source Open standards Low power duty cycling Online IDE Cloud heartbeat service 1(12)
2 2(12) Technology The World s Smallest IPv6 Stack Thingsquare uses IP, the Internet Protocol, for all communication. Thingsquare devices run the world's smallest fully certified Internet Protocol version 6 (IPv6) stack. The router runs both IPv6 and IPv4. The mesh runs IPv6 routing based on the IETF RPL protocol. Seamless Internet Access Thanks to the router, all devices can reach the Internet, do DNS lookups, and reach Internet hosts. The router runs NAT64 routing and DNS64 address translation combined with a firewall to translate between the internal IPv6 network and the Internet. Thingsquare devices use either regular DNS or mdns to do domain name lookups. Industry Strength Encryption Thingsquare uses the symmetric block cipher Advanced encryption Standard, AES, with 128 bits keys for encryption. AES is implemented in software but can optionally use AES acceleration hardware if available. Thingsquare uses AES CCM for all wireless communication and an AES MIC for authentication. Frequency Hopping Thingsquare networks automatically adapt to their wireless environment. To avoid interference from other systems, and to avoid interfering with others, Thingsquare devices use frequency hopping. For sub GHz radios, frequency hopping is mandated to meet ETSI and FCC regulations. Over the Air Firmware Updates Software changes, features are added, and bugs are found, even after the system has been deployed. Thingsquare devices can be securely updated with new firmware when the need arises. The new firmware is encrypted and signed to ensure the authenticity of the new code. Network Debugging Tools Wireless communication may be unpredictable and it is difficult to know what goes on inside the network. To ease network deployment and debugging, Thingsquare provides network sniffing and graphical network inspection tools.
3 Components Thingsquare service The mesh The router Private server The cloud The Mesh The Thingsquare devices have low-power radios and automatically form a mesh network. To increase reliability and range without sacrificing battery life, the Thingsquare sleepy mesh technology allows devices to relay messages from others while sleeping between each message to save precious battery power. Thingsquare mesh networks use the Internet Protocol version 6 (IPv6). The Router One of the mesh nodes have an Internet connection, either via Ethernet or WiFi. This node is called the router. The other nodes reach the Internet through the router. The Thingsquare router software is exceptionally lightweight: only 5 kilobytes of ROM and 1 kilobyte of RAM is needed. The router runs on tiny, low-cost microcontrollers and systems-on-a-chip: no need for a computer gateway or a bulky Linux board. The Cloud Thingsquare networks are connected to the Internet without the hassle of manual configuration. When the Thingsquare router connects to the Internet, it automatically obtains its configuration, allowing the Thingsquare devices to reach the Internet. The Thingsquare router contains a firewall with a simple policy: the Thingsquare network can reach the Internet, but the Internet cannot reach the Thingsquare network. 3(12)
4 4(12) Terminology IPv4 The Internet Protocol version 4 is the Internet Protocol used on the global Internet. With its seamless router, Thingsquare devices connect to IPv4 networks, such as Wifi and Ethernet networks. IPv6 The Internet Protocol version 6 is the network protocol used in Thingsquare networks. With its huge address space, IPv6 can address any Thingsquare devices it needs. RPL The Routing Protocol for Lossy networks, RPL, is the IETF standard routing protocol for low-power IPv6 networks. Thingsquare uses RPL to automatically build wireless mesh networks. 6lowpan 6lowpan is the name of a header compression and adaptation format for the transmission of IPv6 packets over IEEE radios. Thingsquare uses 6lowpan compression to reduce packet header overhead. IEEE GHz IEEE and sub GHz 2.4 GHz radios are globally license-free but share the spectrum with many other wireless technologies. Sub GHz radios have longer range but have different frequencies in different continents. Thingsquare works with both 2.4 GHz IEEE and sub GHz radios. Contiki All Thingsquare devices run the open source Contiki operating system, drawing from the expertise in the Contiki community and its growing ecosystem while contributing back to the community. Websockets Websockets provide a way to keep HTTP connections open, through firewalls and proxies, with a very low overhead. Thingsquare devices use Websockets to communicate with cloud services. AES The Advanced Encryption Standard, AES, is the industry standard encryption used for all wireless communication in Thingsquare. It provides a strong guarantee against eavesdropping while being efficient enough for the low-power microprocessors used by Thingsquare.
5 How Thingsquare Works Thingsquare builds a resilient wireless mesh network where one router provides seamless Internet access for all mesh nodes. All based on open Internet standards. Wireless Mesh Formation Every Thingsquare device has a low-power radio that allows them to communicate with each other and the Thingsquare router. The Thingsquare router has both a low-power radio and an Internet connection, typically Ethernet or WiFi. The Thingsquare router is responsible for the formation of the Thingsquare mesh network. Boot-up When a Thingsquare device boots up, it starts to send RPL DIS messages announcing that it would like to connect to a nearby Thingsquare network. Since the messages are encrypted, only the devices that belong together can hear the messages. The Thingsquare router is the root of the RPL network. All other devices have routes to the root device as well as routes to all its children in the routing graph. The root begins to form the RPL network by sending out RPL DIO messages to its neighbor devices. 5(12)
6 Route Setup Devices that hear the DIO messages from the root attach to a RPL network and begin sending their own RPL DIO messages. The DIO messages contain a routing metric that holds information about how far away from the root a device is. Devices closer to the root have lower metrics. Devices use the routing metric when determining how to send packets in the network: routes with lower routing metrics are preferred. After a few minutes, all devices have exchanged DIOs and the network has stabilized. The devices will keep sending DIO messages, but increasingly seldom. To avoid overloading the network, the devices will also refrain from sending DIOs if they have already heard DIOs from others, within their send interval. Network Routing 6(12) The Thingsquare devices have multiple ways to reach the root of the network. To choose which way to take, the devices continuously measure the quality of the paths and use the one that needs fewer transmissions to reach the root. If a path goes bad, more retransmissions are needed, and the device will switch to a better path. To setup routes in the downward direction, from the root to the devices in the network, the devices exchange RPL DAO messages. The root device knows the route to all other devices, and the other devices know the route to all devices below them in the routing graph. Packets going between devices in the network are routed through common ancestors.
7 Cloud Connectivity Thingsquare devices can communicate directly with Internet services, via the Thingsquare router. The router translates the low-power IPv6 mesh traffic from within the Thingsquare network to IPv4 that can be routed onto the Internet. When the mesh network is formed, the Thingsquare router distributes DNS information to the devices. When a device wants to reach an Internet server, it sends a DNS request to the DNS server provided by the router. The request is sent through the mesh network and routed onto the Internet. The DNS server responds with the IPv4 address of the server that the DNS name points to. The router intercepts the DNS response and rewrites the IPv4 address in the response to an IPv6 address with a special prefix that corresponds to the IPv4 address of the Internet server. The Thingsquare device can now communicate with the Internet server by using the IPv6 address in the DNS response. The router translates the IPv6 address to the real IPv4 address of the Internet server. Packets going back to the Thingsquare device are also translated. The Thingsquare device is now connected to the Internet server, via the Thingsquare low-power mesh network. 7(12)
8 Sleepy Meshing Radio communication drains batteries. Not only do radio transmissions draw battery, idle listening for transmissions from others consume much more energy. To save battery, devices must completely shut off their radios, but must have them turned on often enough to be able to receive and relay messages from others. Thingsquare devices periodically wake up, 2-16 times per second, to quickly check if there is any activity over the radio. If a signal is detected, they keep the radio on for a longer while to see if there is a message being transmitted. When the message is received, the receiver sends an acknowledgment message. To send a message, the sender repeatedly sends its message until it hears the acknowledgment. This allows devices to keep their radio off more than 99% of the time, thereby increasing lifetime from days to years. Current draw during a sleepy mesh transmission 8(12)
9 Technology Key Takeaways Wireless Mesh Thingsquare uses the IETF RPL IPv6 mesh routing protocol - pronounced "ripple". Devices relay messages for each other to extend range and increase reliability. RPL mesh networks are energy-efficient and adapt to changing radio conditions. The mesh network is self-forming and selfhealing. Sleepy Meshing Sleepy meshing allows all mesh devices to be battery-operated - even traffic relays. Relaying increases reliability and range. Cloud Connectivity Thingsquare mesh devices reach the Internet through the router. The router is transparent: devices do not know it is there. All they see is the Internet. The router firewall policy is simple: allow traffic out but no traffic in. 9(12)
10 Memory Footprint Thingsquare typically runs on hardware with kilobytes of flash and kilobytes of RAM. The graphs below show a breakdown for the flash and RAM footprint, measured in kilobytes, for an example device configuration and a router configuration. The device configuration runs a WebSocket client that talks to a cloud-hosted server. The router runs the seamless router software and firewall in addition to the full Thingsquare stack. The code was compiled with gcc for two popular embedded microcontrollers, one 16-bit and one 32-bit. Node configuration Router configuration 10(12)
11 Network Simulator Thingsquare users develop custom software for their products in the C programming language. The C code is compiled with either GCC or IAR, depending on what platform is being used. Developers may use the open source Instant Contiki development environment: a single-file download that makes compiler and tool chain installation simple. Writing software for networked devices is difficult. To make development and debugging easier, Thingsquare provides a visual simulation environment in which networks of Thingsquare devices can be simulated. The simulator emulates the hardware of each device, providing a detailed view of the behavior of the Thingsquare-based system before deploying on actual hardware. The Cooja network simulator 11(12)
12 Hardware Partner Network The Thingsquare hardware partner network gives Thingsquare customers access to the best hardware vendors available. Hardware Platforms Microcontroller Architecture Radio Frequency TI CC2538 ARM Cortex M3 SoC 2.4 GHz Atmel R21 ARM Cortex M0+ SoC 2.4 GHz Atmel D20 ARM Cortex M0+ RF GHz TI MSP430F5438 MSP430x CC1120 Sub-GHz TI MSP430F5438 MSP430x CC1101 Sub-GHz 12(12)
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More information11 Internet of Things (IoT) Protocols You Need to Know About
11 Internet of Things (IoT) Protocols You Need to Know About by RS Components There exists an almost bewildering choice of connectivity options for electronics engineers and application developers working
More informationUsing IPv6 and 6LoWPAN for Home Automation Networks
Using IPv6 and 6LoWPAN for Home Automation Networks Thomas Scheffler / Bernd Dörge ICCE-Berlin Berlin, 06.09.2011 Overview IPv6 and 6LoWPAN for Home Automation Networks 6LoWPAN Application & Network Architecture
More informationSynapse s SNAP Network Operating System
Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment
More informationMaximizing Range and Battery Life in Low-Cost Wireless Networks
Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More information6PANview: A Network Monitoring System for the Internet of Things
6PANview: A Network Monitoring System for the Internet of Things 23-August-2011 Lohith Y S, Brinda M C, Anand SVR, Malati Hegde Department of ECE Indian Institute of Science Bangalore Funded by DIT, Government
More informationShort-range Low Power Wireless Devices and Internet of Things (IoT)
Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February
More informationApplying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
More informationAnalyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012
Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012 Background While IP protocols are widely spread over broadband wireline and wireless communication means, transferring
More informationQuestions from The New SensorTag - IoT Made Easy Webinar
Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,
More informationENHWI-N3. 802.11n Wireless Router
ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home
More informationMobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
More information6LoWPAN: An Open IoT Networking Protocol
6LoWPAN: An Open IoT Networking Protocol OpenIoT Summit 2016 San Diego Stefan Schmidt stefan@osg.samsung.com 1 6LoWPAN: An Open IoT Networking Protocol Open: Specified by the IETF Specifications available
More informationCommunications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationUshering in a New Era of Internet Connectivity
Ushering in a New Era of Internet Connectivity Thread Networking Protocol Simplifies Connecting Things in the Home and Beyond Introduction Thread is the future of wireless mesh networking, and it is poised
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationAPPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description
APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This
More informationARM mbed IoT Device Platform. November 3 rd, 2014
ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the
More informationReduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
More informationInternet of Things based approach to Agriculture Monitoring
Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based
More information920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
More informationZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
More informationThe Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
More informationAPx4 Wireless System-on-Module 5/8/2013 1
APx4 Wireless System-on-Module 5/8/2013 1 Table of Contents Key Features Benefits APx4 Software APx4 Development Kit Certifications Use Cases Summary 5/8/2013 2 Key Features APx4 is a computing platform
More informationAP200 VoIP Gateway Series Design Features & Concept. 2002. 3.5 AddPac R&D Center
AP200 VoIP Gateway Series Design Features & Concept 2002. 3.5 AddPac R&D Center Contents Design Features Design Specifications AP200 Series QoS Features AP200 Series PSTN Backup Features AP200 Series Easy
More informationChapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationAnnual review FLORENCE 2013. WP4 Network: prototypes
Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and
More informationNetwork Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
More informationwww.mindteck.com 6LoWPAN Technical Overview
www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction
More informationHacking. Aims. Naming, Acronyms, etc. Sources
Free Technology Workshop Hacking Hands on with wireless LAN routers, packet capture and wireless security Organised by Steven Gordon Bangkadi 3 rd floor IT Lab 10:30-13:30 Friday 18 July 2014 http://ict.siit.tu.ac.th/moodle/.-----.-----.-----..----.
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationarchitecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
More informationESR-9753 802.11b/g/n SOHO Router
ESR-9753 is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices. ESR-9753 supports home network with superior throughput and performance and unparalleled
More informationLoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
More informationA UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS. MultiConnect Conduit
A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS MultiConnect Conduit 1 A Universal Machine for the Industrial Internet of Things The term Universal Machine, introduced in 1936 by the mathematician
More informationGetting the Most Out of Your WirelessHART System
Getting the Most Out of Your WirelessHART System A White Paper presented by: Garrett Schmidt Wireless Product Manager Phoenix Contact Americas Business Unit P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
More informationESR-9752 802.11b/g/n SOHO Router
ESR-9752 is a 2T2R Wireless Single chip 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. ESR-9752 supports home network with superior throughput
More informationSecure data aggregation in mobile sink wireless sensor networks
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):2927-2933 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Secure data aggregation in mobile sink wireless
More informationIOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center
IOTIVITY AND EMBEDDED LINUX SUPPORT Kishen Maloor Intel Open Source Technology Center Outline Brief introduction to IoTivity Software development challenges in embedded Yocto Project and how it addresses
More informationInternet of Things: TI's Wireless Connectivity Solutions
Internet of Things: TI's Wireless Connectivity Solutions Market Size (units) Why the IoT is attractive 10B + The IoT is an enabling technology that will serve thousands of end products IoT 1B Cell phone
More information802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router
802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router ESR-9753 PRODUCT DESCRIPTION ESR-9753 is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices.
More informationZorp and KZorp: Integrating Packet Filtering and Userspace proxying
Zorp and KZorp: Integrating Packet Filtering and Userspace proxying Balázs Scheidler Zorp Has been established in 2000, as the first BalaBit product Code was GPLd right from the start
More informationThe Future of IoT. Zach Shelby VP Marketing, IoT Feb 3 rd, 2015
The Future of IoT Zach Shelby VP Marketing, IoT Feb 3 rd, 2015 1 Internet of (really nerdy) People 1980s 2 Internet of (content silo) People 1990s 3 Internet of (Web) People 2000s 4 Internet of (really
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationEasy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.
1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean
More informationKey requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationPerformance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
More informationCédric CHAUVENET & Bernard Tourancheau - WATTECO LIG. Séminaire ASPROM «Internet du Futur» 23/10/2012 - C. Chauvenet WaBeco LIG, France.
Cédric CHAUVENET & Bernard Tourancheau - WATTECO LIG Séminaire ASPROM «Internet du Futur» 23/10/2012 - C. Chauvenet WaBeco LIG, France. Séminaire ASPROM «Internet du Futur» 23/10/2012 - C. Chauvenet WaBeco
More informationService and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
More informationPortable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
More informationUG103.8 APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS
APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS This document provides an overview of the toolchain used to develop, build, and deploy EmberZNet and Silicon Labs Thread applications, and discusses some additional
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More information3G Wireless-N Smart Energy Gateway
Join BEsmart Partner Alliance Network at www.smartgrid.com.tw/besmart Ideal for 3G Wireless-N Smart Energy Gateway The, 3G Wireless-N Smart Energy Gateway, is an all-in-one router designed for users to
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationWI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
More informationNetwork Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall
More informationIPv6 Challenges for Embedded Systems István Gyürki 30.08.2011
IPv6 Challenges for Embedded Systems István Gyürki 30.08.2011 AGENDA Introduction IPv6 why do we need it? Selecting the right TCP/IP stack Case study Conclusions Page 2 Company Profile Wireless Products
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationTomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More informationHow To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses
Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
More informationZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile
Document Part Number 53-301017 Rev 0.1 April 2013 ii Exegin Technologies Limited Printed in Canada The information in this document is subject to change without notice. No part of this document may be
More informationShort range low power wireless devices and Internet of Things (IoT)
Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses
More informationInternet of Things. Opportunities for device differentiation
Internet of Things Opportunities for device differentiation What is the Internet of Things? The Internet of Things (IoT) is an emerging market trend impacting semiconductor devices, system OEMs, cloud
More informationAn Embedded Wireless Mini-Server with Database Support
An Embedded Wireless Mini-Server with Database Support Hungchi Chang, Sy-Yen Kuo and Yennun Huang Department of Electrical Engineering National Taiwan University Taipei, Taiwan, R.O.C. Abstract Due to
More informationCitrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
More informationSmart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
More informationRadiocrafts Embedded Wireless Solutions
Implementing ZigBee /IEEE 802.15.4 Solutions Based on Radiocrafts modules by Ø. Nottveit Introduction Radiocrafts offers a family of miniature modules intended for radio networks based on the IEEE 802.15.4
More informationTechnical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
More informationLecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
More informationRouting Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
More informationUK Interconnect White Paper
UK Interconnect White Paper 460 Management Management Management Management 460 Management Management Management Management AI073 AI067 UK Interconnect White Paper Introduction The UK will probably have
More informationCloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
More informationNetworking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationUse case possibilities with Bluetooth low energy in IoT applications
Use case possibilities with Bluetooth low energy in IoT applications White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract With yearly shipments
More informationTamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
More informationBit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
More informationMetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationApplication Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
More informationH MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch
H MICRO CASE STUDY HMicro HMicro is a wireless healthcare chip company to enable industry s first fully disposable wireless patches with high reliability, high data integrity, low cost, small form factor
More informationIntroduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
More informationHands-on MESH Network Exercise Workbook
Hands-on MESH Network Exercise Workbook Santa Clara County RACES Date: 18 March 2015 Version: 1.0 scco_wifi_intro_exonly_v150318.docx 1 Table of Contents HANDS ON! Exercise #1: Looking at your Network
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationWireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationVPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert
VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationAccess Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
More informationThe Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationSoftware Defined Networking What is it, how does it work, and what is it good for?
Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David
More information