Exercise Thomas Basmer

Ähnliche Dokumente
Virtual PBX and SMS-Server

Asynchronous Generators

Latency Scenarios of Bridged Networks

Eingebettete Taktübertragung auf Speicherbussen

Hazards and measures against hazards by implementation of safe pneumatic circuits

Cameraserver mini. commissioning. Ihre Vision ist unsere Aufgabe

Shock pulse measurement principle

Fundamentals of Electrical Engineering 1 Grundlagen der Elektrotechnik 1

Mitglied der Leibniz-Gemeinschaft

JONATHAN JONA WISLER WHD.global

Netzwerke und Sicherheit auf mobilen Geräten

p^db=`oj===pìééçêíáåñçêã~íáçå=

Mehr erreichen mit der bestehenden Infrastuktur. Mathias Widler Regional Sales Manager DACH

M-CRAMER TRACKING. ONLINE TRACKING PLATTFORM Sie finden unsere Online Tracking Plattform unter

SELF-STUDY DIARY (or Lerntagebuch) GER102

Titelbild1 ANSYS. Customer Portal LogIn

Context-adaptation based on Ontologies and Spreading Activation

... Chair of Mobile Business & Multilateral Security. Lecture 14 Business Informatics 2 (PWIN) FAQ WS 2015/16

WP2. Communication and Dissemination. Wirtschafts- und Wissenschaftsförderung im Freistaat Thüringen

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

HIR Method & Tools for Fit Gap analysis

GRIPS - GIS basiertes Risikoanalyse-, Informations- und Planungssystem

Presentation of a diagnostic tool for hybrid and module testing

SAP Simple Service Request. Add-on for SAP Solution Manager by SAP Consulting SAP Deutschland SE & Co. KG

Instruktionen Mozilla Thunderbird Seite 1

SARA 1. Project Meeting

Simulation of a Battery Electric Vehicle

Westfalia Bedienungsanleitung. Nr

Software development with continuous integration

p^db=`oj===pìééçêíáåñçêã~íáçå=

Challenges for the future between extern and intern evaluation

Einsatz einer Dokumentenverwaltungslösung zur Optimierung der unternehmensübergreifenden Kommunikation

Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str Jena

KOBIL SecOVID Token III Manual

Customer-specific software for autonomous driving and driver assistance (ADAS)

Developing Interactive Integrated. Receiver Decoders: DAB/GSM Integration

Tuning des Weblogic /Oracle Fusion Middleware 11g. Jan-Peter Timmermann Principal Consultant PITSS

Car-to-Car Communication

Sampling Rate / Sample rate. Modulation (gem. DVB-Standard) Modulation (DVB standard) 16 QAM 256 QAM QPSK, 16 QAM, 64 QAM

ReadMe zur Installation der BRICKware for Windows, Version ReadMe on Installing BRICKware for Windows, Version 6.1.2

Die Dokumentation kann auf einem angeschlossenen Sartorius Messwertdrucker erfolgen.

Mul$media im Netz (Online Mul$media) Wintersemester 2014/15. Übung 02 (Nebenfach)

Cloud Computing in der öffentlichen Verwaltung

TMF projects on IT infrastructure for clinical research

Selbstlernmodul bearbeitet von: begonnen: Inhaltsverzeichnis:

ONLINE LICENCE GENERATOR

Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str Jena

GridMate The Grid Matlab Extension

August Macke Abschied, 1914 Museum Ludwig, Köln

German English Firmware translation for T-Sinus 154 Access Point

Produktinformation Access-Gateway. Product information Access gateway AGW 670-0

There are 10 weeks this summer vacation the weeks beginning: June 23, June 30, July 7, July 14, July 21, Jul 28, Aug 4, Aug 11, Aug 18, Aug 25


Training, Präsentation, Wettbewerb in der KNX city

Investigation of the Nonlinear Characteristic of Costas Loop based Carrier Recovery Systems

NVR Mobile Viewer for iphone/ipad/ipod Touch

Prediction Market, 28th July 2012 Information and Instructions. Prognosemärkte Lehrstuhl für Betriebswirtschaftslehre insbes.

RFID Media Access. Roland Schneider. Betreuer: Christian Flörkemeier. SS 2003 RFID Media Access 1

Fleet Manager 100 Bedienungsanleitung User Manual Hardware

Browser- gestützte Visualisierung komplexer Datensätze: Das ROAD System

Installation Instructions

Geometrie und Bedeutung: Kap 5

AS Path-Prepending in the Internet And Its Impact on Routing Decisions

Kurzanleitung um Transponder mit einem scemtec TT Reader und der Software UniDemo zu lesen

Frequently asked Questions for Kaercher Citrix (apps.kaercher.com)

Support Technologies based on Bi-Modal Network Analysis. H. Ulrich Hoppe. Virtuelles Arbeiten und Lernen in projektartigen Netzwerken

TomTom WEBFLEET Tachograph

The Single Point Entry Computer for the Dry End

Abteilung Internationales CampusCenter

Product Lifecycle Manager

Corporate Digital Learning, How to Get It Right. Learning Café

C R 2025 C LOSE PUSH OPEN

Bedienungsanleitung User Manual

Beschreibung. Process Description: Sartorius Bestellnummer / Order No.:

Exercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

Elektronische Identifikation und Vertrauensdienste für Europa

Fluid-Particle Multiphase Flow Simulations for the Study of Sand Infiltration into Immobile Gravel-Beds

How to access licensed products from providers who are already operating productively in. General Information Shibboleth login...

Bayerisches Landesamt für Statistik und Datenverarbeitung Rechenzentrum Süd. z/os Requirements 95. z/os Guide in Lahnstein 13.

eurex rundschreiben 094/10

GmbH, Stettiner Str. 38, D Paderborn

Inequality Utilitarian and Capabilities Perspectives (and what they may imply for public health)

FOR ENGLISCH VERSION PLEASE SCROLL FORWARD SOME PAGES. THANK YOU!

TVHD800x0. Port-Weiterleitung. Version 1.1

TIn 1: Feedback Laboratories. Lecture 4 Data transfer. Question: What is the IP? Institut für Embedded Systems. Institut für Embedded Systems

INDEX. 3. Package Contents Connection and Operation...4

Quadt Kunststoffapparatebau GmbH

RS232-Verbindung, RXU10 Herstellen einer RS232-Verbindung zwischen PC und Messgerät oder Modem und Messgerät

MATLAB driver for Spectrum boards

KURZANLEITUNG. Firmware-Upgrade: Wie geht das eigentlich?

HAMNET: WLAN Introduction

Hör auf zu ziehen! Erziehungsleine Training Leash

ANLAGENANALYSE PLANT ANALYSIS

Fastlane einloggen, KlICK UnD FeRtIG

Invitation - Benutzerhandbuch. User Manual. User Manual. I. Deutsch Produktübersicht Beschreibung... 2

Model-based Development of Hybrid-specific ECU Software for a Hybrid Vehicle with Compressed- Natural-Gas Engine

Wireless Personal Area Networks Spezielle Techniken der Rechnerkommunikation

Workflows, Ansprüche und Grenzen der GNSS- Datenerfassung im Feld

Künstliche Intelligenz

Transkript:

Exercise Thomas Basmer telefon: 0335 5625 334 fax: 0335 5625 671 e-mail: basmer [ at ] ihp-microelectronics.com web:

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 2

Sensor node components Components of Sensor node? Requirements to a sensor node? Kapitel 1 Seite 3

IHP sensor nodes FeuerWhere Node Tandem Stack TSN Kapitel 1 Seite 4

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 5

Signals signal is a function of location and time 1 y Period -1 Amplitude(A) t G(t) = A t sin(2 f t t + t ) Phase drift( ) Kapitel 1 Seite 6

Signals sender Analog baseband signal 1001011001 Digital modulation Analog modulation receiver Analog baseband signal carrier 1001011001 synchronizer/ decider Analog demodulation Kapitel 1 Seite 7

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 8

Amplitude Shift Keying(1) Digital signals 0 and 1 are represented by different amplitudes of the carrier signal A 1 1 1 0 t -1 Kapitel 1 Seite 9

Amplitude Shift Keying(2) Simplest form is On-Off-Keying(OOK) Carrier signal ON transmit 1 Carrier signal OFF transmit 0 also possible to use more then 2 diff. Amplitudes for more complex coding Amplitudes are very fragile to disturbance Kapitel 1 Seite 10

Amplitude Shift Keying(3) Example: OOK Data G(t) Signal Kapitel 1 Seite 11

Frequency Shift Keying(1) Digital signals are represented by different frequencies A 1 0 1 t -1 Kapitel 1 Seite 12

Frequency Shift Keying(2) Simplest form is binary FSK (only two different frequencies needed) It is necessary to prevent phase drifts between the signals (Continous Phase Modulation) Kapitel 1 Seite 13

Frequency Shift Keying(3) Example: MSK (Minimum Shift Keying) Two frequencies f1, f2 (f2 = 2*f1) Bitstream divided into even and odd bits Duration of every bit is doubled If even = 0, odd = 0 use f2 inverted If even = 1, odd = 0 use f1 inverted If even = 0, odd = 1 use f1 If even = 1, odd = 1 use f2 Kapitel 1 Seite 14

Frequency Shift Keying(4) 1 2 3 4 5 6 7 8 9 10 Data Odd bits 1 3 5 7 9 2 4 6 8 10 Even bits Kapitel 1 Seite 15

Frequency Shift Keying(5) - Data bits are doubled in the next step: Odd bits 1 2 3 4 5 6 7 8 9 10 1 2 3 4 5 6 7 8 9 10 Even bits Kapitel 1 Seite 16

Frequency Shift Keying(6) - Generating the signal following the formular on slide 14: Odd bits 1 2 3 4 5 6 7 8 9 10 Even Bits G1(t) G2(t) Signal Kapitel 1 Seite 17

Phase Shift Keying(1) Switching between the digital data is represented by a phase drift 1 A 0 1 0 t -1 Kapitel 1 Seite 18

Phase Shift Keying(2) Sender and receiver must be well synchronized It is more robust then FSK but more complex A PLL (Phase locked loop) is needed for synchronization Kapitel 1 Seite 19

Phase Shift Keying(3) Example: BPSK Data Signal is multipied with +1 for binary 1 Signal is multiplied with -1 for binary 0 Phase shift of 180 or G(t) Signal Kapitel 1 Seite 20

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 21

Channel Air(1) Alot of problems when sending data through the air Attenuation Peak disturber Multipath propagation... What can we do to prevent or minimize the effects? Kapitel 1 Seite 22

Channel Air(2) Attenuation Scream louder Higher energy consumption Often not possible Multi-hop communication Protocols needed More nodes involved Receiving also consumps alot of energy Kapitel 1 Seite 23

Channel Air(3) A 3r B A r r r C D B Pr/Pt ~ (1/4 R)² Pt(A,B) = 142 mw Pt(A,C) = 16 mw Pt(A,C,D,B) = 48 mw Kapitel 1 Seite 24

Channel Air(4) Carefull! Screaming louder is often not possible Power consumption does not decrease linear with sending power P in dbm I in ma 0 (1mW) 17.4-10 (0.1mW) 11 Receiving needs often more energy then sending CC2420 17.4mA sending / 18.4 receiving Kapitel 1 Seite 25

Channel Air(5) Peak disturber Need good filters Spread the signal Over time less data rate Direct Sequence Spread Spectrum (DSSS)» XOR with Chipping sequence Over frequency less channels Frequency Hopping Spread Spectrum (FHSS)» Hopping between different Frequencies» Slow and fast hopping Kapitel 1 Seite 26

Frequency Shift Keying(6) Example: DSSS Data Chip Signal Kapitel 1 Seite 27

Channel Air(7) Multipath propagation Signals are smeared Signals overlap (intersymbol interference) Send training sequences Choose a good coding Codes should be orthogonal It should be difficult to get a legal symbol by changing another symbol one Kapitel 1 Seite 28

Channel Air(8) Hamming distance 000 001 010 011 100 101 110 111 000 0 1 1 2 1 2 2 3 001 1 0 2 1 2 1 3 2 010 1 2 0 1 2 3 1 2 011 2 1 1 0 3 2 2 1 100 1 2 2 3 0 1 1 2 101 2 1 3 2 1 0 2 1 110 2 3 1 2 1 2 0 1 111 3 2 2 1 2 1 1 0 Kapitel 1 Seite 29

Channel Air(9) Multiplexing More than one mote wants to use the medium They only can send or receive at once Only one mote can send at once How to share one medium in a meaningfull way? Kapitel 1 Seite 30

Channel Air(10) Time Division Multiple Access (TDMA) Every mote becomes a dedicated time slot to send data(static TDMA, Aloha, Slotted Aloha, CSMA/CA) Space Division Multiple Access (SDMA) Motes are divided by location / sending range Frequency Division Multiple Access (FDMA) Motes using different frequencies Code Division Multiple Access (CDMA) Motes using different codes Kapitel 1 Seite 31

Channel Air(11) Hidden Terminal Problem A B C Exposed Terminal Problem A B C D Kapitel 1 Seite 32

Channel Air(12) Solution: Multiple Access with Collision Avoidance (MACA) Two new packet types Request to send (RTS) Clear to send (CTS) Packets containing sender id, receiver id, duration of the transfer Kapitel 1 Seite 33

Hidden Terminal solution: A B C RTS CTS CTS data CTS CTS RTS Kapitel 1 Seite 34

Channel Air(13) Exposed Terminal solution: A B C D RTS(A,B) CTS(A,B) CTS(A,B) RTS(D,C) CTS(D,C) CTS(D,C) data data Kapitel 1 Seite 35

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 36

Operating system event driven vs. batch process REFLEX, TinyOS, Contiki short latency small memory usage energy management events are triggering activities / tasks using C/C++ or special Languages (nesc) Kapitel 1 Seite 37

Outline Sensor Nodes Physical Layer Signals Modulation Channel Air problems and solutions Operating Systems Security Kapitel 1 Seite 38

Security Low ressources small protocols Low cost (no tamper proof HW) Large networks protocols only P2P Outsider Attacks Eavesdropping, jamming, alter packets, destroying nodes Insider attacks Maleware, authorized paticipant, compatible RF Base Station as point of trust Kapitel 1 Seite 39

Security Challenges simple key management Crypto code must run on simple / slow devices Packet overhead must be minimized Level of security depends on application Service integrity (data aggreagation, synch) Availability (serious harm on denial of service) Authentication (data integrity, intrusion detection) Secrecy (privacy, traffic analysis) Kapitel 1 Seite 40

Security Crypto can t prevent traffic analysis re-transmitted packets replayed packets delayed packets packets from being jammed malicious insiders, captured nodes Kapitel 1 Seite 41

Security Key establishment problem Broadcast Multicast Authentication Attacks Jamming and packet injection Secure MAC protocols Authentication and nuonces on network layer Sybil attack Attacks against routing Kapitel 1 Seite 42

Goodby! Thank you for your attention! Kapitel 1 Seite 43