resource sharing of portable computers using wireless communication by christine meyer
Post on 20-Dec-2015
216 views
TRANSCRIPT
![Page 1: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/1.jpg)
Resource Sharing of Portable Computers Using Wireless Communication
By Christine Meyer
![Page 2: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/2.jpg)
Outline
• Routing Protocols
• Load Balancing Techniques
• Cluster Computing Software
• Wireless Security Attacks
• Conclusion
![Page 3: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/3.jpg)
Wireless Adhoc Mode
Peer-to-Peer Communication
![Page 4: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/4.jpg)
Wireless Infrastructure Mode
Communication through Access Point
![Page 5: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/5.jpg)
Direct Sequence Spread Spectrum (DSSS)
![Page 6: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/6.jpg)
Wireless Range
![Page 7: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/7.jpg)
Routing Protocols
• Dynamic Source Routing (DSR)
• Destination Sequence Distance Vector (DSDV)
• Temporary-Ordered Routing Algorithm (TORA) • Ad Hoc On-Demand Distance Vector (AODV)
![Page 8: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/8.jpg)
Comparison of Routing Protocols
Packet Delivery Ratio Routing Overhead
![Page 9: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/9.jpg)
Diffusive Load Balancing on Domain
![Page 10: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/10.jpg)
Windows Management Instrumentation
Namespace: root\WMI for signal strength root\CIMV2 for LB information
![Page 11: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/11.jpg)
Cluster Computing Software
Resource Manager
Server
Job Manager Client Manager
Application
ClientDisplay
Manager
![Page 12: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/12.jpg)
Wireless Network Display
![Page 13: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/13.jpg)
Client to Server Routing 1
ServerClient A
Client B
Routing A
Routing A
![Page 14: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/14.jpg)
Client to Server Routing 2
Server
Client A
Client B
Routing A, B
Routing A, B
Routing to Server
![Page 15: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/15.jpg)
Encryption using Javaimport javax.crypto.*;import javax.crypto.spec.*;import java.security.*;
SecretKey key = KeyGenerator.getInstance("DESede").generateKey();byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}
![Page 16: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/16.jpg)
Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}
![Page 17: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/17.jpg)
Java Transformation String• Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5
• Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining)
• Padding No Padding, PKCS5Padding SSL3Padding
Default: DES/CBC/PKCS5Padding (64 bits to 128 bits)
DES 64 bits to 64 bits:transform = "DES/ECB/NoPadding“
![Page 18: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/18.jpg)
Passive attacks to decrypt traffic
Destination
Eavesdropper
Packet 1 XOR Packet 2= Plaintext
Access Point
![Page 19: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/19.jpg)
Active attack to inject new traffic
Destination
Eavesdropper
RC4(X) XOR X XOR Y= RC4(Y)
Access Point
![Page 20: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/20.jpg)
Active attacks to decrypt traffic
Eavesdropper
Access Point Internet Eavesdropper’sComputerEncrypted
Message
DecryptedMessage
DecryptedMessage
![Page 21: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/21.jpg)
Table based Attack
Destination
Eavesdropper
Access Point
Table of IV andKey Streams
![Page 22: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/22.jpg)
WPA Denial of Service Attack
WPA can shutdown the system if it receives two failed packets within a one-second period
Wi-Fi Encryption Fix Not Perfecthttp://www.wired.com/news/business/0,1367,56350,00.html
![Page 23: Resource Sharing of Portable Computers Using Wireless Communication By Christine Meyer](https://reader035.vdocument.in/reader035/viewer/2022062516/56649d445503460f94a213f1/html5/thumbnails/23.jpg)
Conclusion• It is possible to improve performance through resource sharing of portable computers
• In the future, the transfer rate for wireless will be greater therefore reducing transfer time
• Security is provided for access points but not for ad-hoc mode
• Encryption is possible through Java with a small overhead factor