Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

Size: px
Start display at page:

Download "Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example"

Transcription

1 Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example 2018 IEEE-SA Ethernet & Automotive Technology Day Harald Zweck, Infineon Technologies Ronny Schulze, Infineon Technologies

2 Motivation Statement given by I Am The Cavalry Evidence Capture Safety investigations drive substantial improvements, and records of electronic systems operations give visibility into root causes that may otherwise be opaque. These records can plainly show sources of error, be they malfunctions, design defects, human error or deliberate attack. Those waiting for proof of hacking or electronic sabotage will not find evidence without such logging and evidence collection in place. This capability will require more effort, over time, than others on this list, but it is foundational for improving safety in the long-term so starting now will help us achieve this goal. Do your vehicle systems provide tamper evident, forensically-sound logging and evidence capture to facilitate safety investigations? I read => Electronic systems shall record events like malfunctions, defects, errors, attacks etc. Source: I Am The Cavalry / Five Star Automotive Cyber Safety Framework / February 2015 / Link: 2

3 Network OBD Antenna Automotive Ethernet CAN / Sensor Bus ECU with Ethernet connectivity ECU 3

4 Network Traffic Clustering Unexpected traffic example related to Units Software Stack Ethernet MAC Unused VLAN priority levels Software Stack Ethernet MAC PHY Connector Unexpected packets unknown packet addresses Unknown multicasts PHY Connector connector defect cable defect 4

5 Network Traffic Clustering Unexpected traffic example related to OSI Layer 1 / 2 / 2.5 Software Stack Ethernet MAC Unused priority levels VLAN Tag PHY Unexpected packets unknown packet addresses MAC Address Ethertype Connector Unknown multicasts connector defect cable defect Physical Layer 5

6 From Task Fps To Task Fps Network Traffic Monitoring Layer 1 Layer 1 Traffic Evaluation Side Processing Task 1 Task 2 Stack Stack Front Processing Ethernet MAC Task 1 Task 2 Stack Stack Ethernet MAC Rear Processing Task 1 Task 2 Stack Stack Ethernet MAC From Task Fps To Task Fps to / from Side Processing and Rear Processing 6

7 Network Traffic Monitoring Layer 1 Layer 1 Traffic Evaluation Example Based on Frame Length Task Fps Task Fps Front Processing Task 1 Task 2 Stack Stack Ethernet MAC Frame Profile (length in bytes) Task 1 reception Task 2 reception Total Short frame < % of 1000Fps => 500Fps 30% of 500Fps => 150Fps 500Fps + 150Fps => 650Fps Mid range frame 128 < frame < % of 1000Fps => 250Fps 40% of 500Fps => 200Fps 250Fps + 200Fps => 450Fps Long frame > % of 1000Fps => 250Fps 30% of 500Fps => 150Fps 250Fps + 150Fps => 400Fps 7

8 IEEE Standard Ethernet Frame Application Layer Data Session Layer Data (D)TLS Record Transport Layer TCP/UDP Data TCP/UDP Datagram Network Layer IP Header TCP/UDP Data IP Packet Link Layer MAC Address VLAN Tag Ethertype IP Header TCP/UDP Data CRC Ethernet Frame Addressing Schemes 8

9 Ethernet MAC Queues Network Traffic Monitoring Layer 1 Layer 1 Traffic Monitoring Example Based on Frame Length Security Task Security Stack Task 1 Task 2 Task 3 Stack Frame Filters Short Frame Counter Mid Size Frame Counter Long Frame Counter 4x 3x 2x Inbound Ethernet Frames 9

10 Ethernet MAC Network Traffic Profiling Layer 1 Layer 1 Traffic Profiling Example Based on Frame Length Security Task Snapshot Snapshot Snapshot Security Stack Counter Value Frame Length Profiles for Forensic Center Short Frame Counter Mid Size Frame Counter Long Frame Counter time 10

11 Queues Network Traffic Profiling Layer 1 Layer 1 - Limitations Ethernet MAC Frame Filters VLAN Tag Priority (PCP) VLAN Tag Not Covered Packet Addresses MAC Address Counters Covered Broadcast Multicast Frame Length CRC Error Physical Layer Frame Layer 11

12 Network Traffic Profiling Layer 2 Layer 2 - Challenges MAC Address VLAN Tag Ethertype IP Header TCP/UDP 6 bytes = 48 bits 4 bytes = 32 bits 2 48 counters?? Realistic solution: Capture counters for passing frames -> 2 digit number range Capture rejected frames in one special stack process 12

13 Ethernet MAC Queues Network Traffic Profiling Layer 2 Layer 2 Ethernet Frame Profiling Task 1 Task 2 Task 3 Intrusion Detection Stack Stack Stack MAC Addr. Range 1 MAC Addr. Range 2 MAC Addr. Range 3 Residual Addr. Range Address Filters Inbound Ethernet Frames 13

14 Queue Network Traffic Profiling Layer 2 Intrusion Detection Profile Values Task / Code Intrusion Detection TCP/UDP Port IP Header VLAN Tag Value Range Rate Stack MAC Address Ethertype Count Multi-Layer Profiling Example Classify property ranges Capture property rate Count properties Stack Residual Addr. Range Address Filters 14

15 Simplified Network Demo Switched networks Expectations Intelligent packet routing by switches Switches provide as well features for traffic analyzes Demo Network Device A Switch Device B Device c 15

16 Traffic profiling/monitoring Using Hardware support in form of IETF MIB counter inside the Ethernet MAC Using register for number of good and bad packets with different length We count frames with a length of 64to 256 bytes, bytes and 512 to 1023 bytes Device B and C will send there profile in a cyclic way to device A Device B Device A Switch Device C 16

17 Filter Residual Filter Ethernet MAC Queues DMAs Layer 2 implementation of residual Filter Packets which not pass the Uni/multicast addresses or VLAN filter will not be dropped These packets are forwarded to a residual filter queue Separating these traffic allows to route the traffic to a independent CPU inside the MCU to analyze VLAN Tag / PCP FAIL MAC Addresses FAIL xmii 17

18 Ethernet MAC Separating traffics inside the MCU Sorted packets inside the residual queue can be forwarded to an separate/isolated CPU to process the data independent CPU 0 RAM Data Status CPU x RAM Data Status CPU x counts periodical packets based on MAC addresses, Types etc Crossbar Control Control Queues DMAs DMAs Queues 18

19 At the End What to do with all that data? Device B and C will report their traffic behavior to Device A which manage the switch Device A can analyze and may change the configuration of the switch ports for Device B and C Device A sends the network healthiness state to a forensic center See the Demo at the Infineon booth! 19

20 20

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Monitoring Ports. Port State

Monitoring Ports. Port State The Ports feature available on the ME 1200 Web GUI allows you to monitor the various port parameters on the ME 1200 switch. Port State, page 1 Port Statistics Overview, page 2 QoS Statistics, page 2 QCL

More information

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016 Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:

More information

OPEN TC11 Switch Semiconductor Test Specification Version 1.0

OPEN TC11 Switch Semiconductor Test Specification Version 1.0 OPEN TC11 Switch Semiconductor Specification Version 1.0 Author & Company Title OPEN Alliance TC11 Members Switch Semiconductor Specification Version 1.0 Date December 13, 2018 Status Restriction Level

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Introduction to Ethernet. Guy Hutchison 8/30/2006

Introduction to Ethernet. Guy Hutchison 8/30/2006 Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original

More information

ITexamGuide. High-quality IT Cert Exam study guide

ITexamGuide.  High-quality IT Cert Exam study guide ITexamGuide High-quality IT Cert Exam study guide Exam : 310-302 Title : Sun Certified Network Administrator for Solaris 10 OS Vendors : SUN Version : DEMO Get Latest & Valid 310-302 Exam's Question and

More information

Intel Media Switch IXE Port Gigabit Device

Intel Media Switch IXE Port Gigabit Device Intel Media Switch IXE5416 16-Port Gigabit Device Data Sheet Product Features/Benefits Advance Information Single-chip, 16-port Gigabit switch/router with Layer 2/3/4 support High integration, compact

More information

Overview of the Cisco OpenFlow Agent

Overview of the Cisco OpenFlow Agent About OpenFlow, page 1 Information About Cisco OpenFlow Agent, page 2 About OpenFlow OpenFlow is an open standardized interface that allows a software-defined networking (SDN) controller to manage the

More information

Configuring Tap Aggregation and MPLS Stripping

Configuring Tap Aggregation and MPLS Stripping This chapter contains the following sections: Information About Tap Aggregation, page 1 Information About MPLS Stripping, page 3 Configuring Tap Aggregation, page 4 Verifying the Tap Aggregation Configuration,

More information

Automotive Cybersecurity: A steep learning curve

Automotive Cybersecurity: A steep learning curve Automotive Cybersecurity: A steep learning curve Vector Congress 2018 V1.0 2018-11-07 Motivation Attack Surface and Attack History Automotive megatrends Attacks with safety-critical effects Connectivity

More information

14 Port AMC Managed Layer Two Switch

14 Port AMC Managed Layer Two Switch TM THE POWER OF VISION KEY FEATURES AMC.2 compliant Managed Layer two switch Twelve 10/100 Mbit Ethernet ports Front panel I/O via MRJ-21 Two GbE ports routed to the rear Support up to 8K MAC address 4K

More information

Network Infrastructure

Network Infrastructure Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

Configuring Firewall Filters (J-Web Procedure)

Configuring Firewall Filters (J-Web Procedure) Configuring Firewall Filters (J-Web Procedure) You configure firewall filters on EX Series switches to control traffic that enters ports on the switch or enters and exits VLANs on the network and Layer

More information

Introduction to Ethernet and IP in automotive vehicles

Introduction to Ethernet and IP in automotive vehicles Introduction to Ethernet and IP in automotive vehicles Webinar V1.02 2014-05-14 Agenda > Information 3 Introduction 6 Physical layers 8 IEEE Ethernet MAC + VLAN 14 Internet Protocol (IPv4/IPv6) 18 TCP

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control Overview of Port-Based Traffic Control, page 2 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Finding Feature Information, page 9 Information

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

Exam : Title : Sun Certified Network Administrator for Solaris 10 OS. Version : DEMO

Exam : Title : Sun Certified Network Administrator for Solaris 10 OS. Version : DEMO Exam : 310-302 Title : Sun Certified Network Administrator for Solaris 10 OS Version : DEMO 1. In certain configurations, Gigabit Ethernet can use 9000 byte Ethernet frames instead of the standard 1500

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Cisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems

Cisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems Class of Service in 802.1 Norman Finn Cisco Systems, Inc. July 9, 1996 1/12 CoS Bridging Example sw2 16 Mb T-R 100 Mb Ether sw3 sw1 10 Mb Ether FDDI X Y 100 Mb and 10 Mb Ethernet prevent passing access

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 41 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Configuring SPAN and RSPAN

Configuring SPAN and RSPAN 34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network

More information

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,

More information

Configure Virtual LANs in Layer 2 VPNs

Configure Virtual LANs in Layer 2 VPNs The Layer 2 Virtual Private Network (L2VPN) feature enables Service Providers (SPs) to provide L2 services to geographically disparate customer sites. A virtual local area network (VLAN) is a group of

More information

Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions

Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions 1 Agenda Business disconnect Why is troubleshooting so hard? Troubleshooting methodology Tool selection Finding the

More information

Countermeasures against Cyber-attacks

Countermeasures against Cyber-attacks Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure

More information

ASIX Multi-Port Embedded Ethernet Product Introduction

ASIX Multi-Port Embedded Ethernet Product Introduction ASIX Multi-Port Embedded Ethernet Revision 1.1 Mar. 20th, 2008 1 Revision History Revision Date Description 1.0 2008/3/7 Initial release 1.1 2008/3/20 1. Change the document name to ASIX Multi-Port Embedded

More information

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles

How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles How to Hack Your Mini Cooper: Reverse Engineering CAN Messages on Passenger Automobiles Jason Staggs Who is this guy? Jason Staggs Graduate Research Assistant Institute for Information Security (isec)

More information

Draft AVBTP over IEEE 802.3

Draft AVBTP over IEEE 802.3 Draft AVBTP over IEEE 802.3 AVB stream data format Version 0.01, 2007-03-21 Alan K. Bartky alan@bartky.net Send comments to AVBTP@listserv.ieee.org March 21, 2007 AVB transport SG IEEE???.? 1 Draft AVBTP

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

First Exam for ECE671 Spring /22/18

First Exam for ECE671 Spring /22/18 ECE67: First Exam First Exam for ECE67 Spring 208 02/22/8 Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 75 minutes to complete the exam. Be a

More information

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration

Modular Policy Framework. Class Maps SECTION 4. Advanced Configuration [ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

Ethernet Design Challenges The requirements and use of Ethernet with AUTOSAR

Ethernet Design Challenges The requirements and use of Ethernet with AUTOSAR Ethernet Design Challenges The requirements and use of Ethernet with AUTOSAR Anders Kallerdahl Product Manager AUTOSAR tools mentor.com/automotive Android is a trademark of Google Inc. Use of this trademark

More information

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ECPE / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Course Organization Top-Down! Starting with Applications / App programming Then Transport Layer (TCP/UDP) Then

More information

Introducing Cisco Data Center Networking

Introducing Cisco Data Center Networking Introducing Cisco Data Center Networking Cisco 640-911 Dumps Available Here at: /cisco-exam/640-911-dumps.html Enrolling now you will get access to 209 questions in a unique set of 640-911 dumps Question

More information

Configuring IPv6 ACLs

Configuring IPv6 ACLs CHAPTER 37 When the Cisco ME 3400 Ethernet Access switch is running the metro IP access image, you can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them

More information

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec CIS 6930/4930 Computer and Network Security Topic 8.1 IPsec 1 IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality

More information

Advanced WiFi Attacks Using Commodity Hardware

Advanced WiFi Attacks Using Commodity Hardware Advanced WiFi Attacks Using Commodity Hardware Mathy Vanhoef and Frank Piessens (KU Leuven) ACSAC 2014 Background WiFi assumes each station acts fairly With special hardware this isn t the case Continuous

More information

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections:

Configuring sflow. Information About sflow. sflow Agent. This chapter contains the following sections: This chapter contains the following sections: Information About sflow, page 1 Licensing Requirements, page 2 Prerequisites, page 2 Guidelines and Limitations for sflow, page 2 Default Settings for sflow,

More information

Chapter 3 Packet Switching

Chapter 3 Packet Switching Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination

More information

Telematics Chapter 7: MPLS

Telematics Chapter 7: MPLS Telematics Chapter 7: MPLS User watching video clip Beispielbild Application Layer Presentation Layer Session Layer Transport Layer Server with video clips Application Layer Presentation Layer Session

More information

PCI Express System Interconnect Software Architecture for PowerQUICC TM III-based Systems

PCI Express System Interconnect Software Architecture for PowerQUICC TM III-based Systems PCI Express System Interconnect Software Architecture for PowerQUICC TM III-based Systems Application Note AN-573 By Craig Hackney Introduction A multi-peer system using a standard-based PCI Express multi-port

More information

A Single Chip Shared Memory Switch with Twelve 10Gb Ethernet Ports

A Single Chip Shared Memory Switch with Twelve 10Gb Ethernet Ports A Single Chip Shared Memory Switch with Twelve 10Gb Ethernet Ports Takeshi Shimizu, Yukihiro Nakagawa, Sridhar Pathi, Yasushi Umezawa, Takashi Miyoshi, Yoichi Koyanagi, Takeshi Horie, Akira Hattori Hot

More information

Virtual Networks: Host Perspective

Virtual Networks: Host Perspective Networks: Host Perspective IETF-77 Anaheim, CA Network Research Group March 23rd, 2010 Sunay Tripathi Sunay.Tripathi@Oracle.Com 1 Evolving ization Landscape Physical OS Hypervisor Server Server Server

More information

Draft AVBTP over IEEE 802.3

Draft AVBTP over IEEE 802.3 Draft AVBTP over IEEE 802.3 AVB stream data format Version 0.02, 2007-03-27 Alan K. Bartky alan@bartky.net Send comments to AVBTP@listserv.ieee.org March 27, 2007 AVB transport SG working paper 1 Revision

More information

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017 Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution

More information

Table of Contents 1 Ethernet Interface Configuration Commands 1-1

Table of Contents 1 Ethernet Interface Configuration Commands 1-1 Table of Contents 1 Ethernet Interface Configuration Commands 1-1 broadcast-suppression 1-1 description 1-2 display brief interface 1-3 display interface 1-4 display loopback-detection 1-8 duplex 1-9 flow-control

More information

Configuring Web Cache Services By Using WCCP

Configuring Web Cache Services By Using WCCP CHAPTER 44 Configuring Web Cache Services By Using WCCP This chapter describes how to configure your Catalyst 3560 switch to redirect traffic to wide-area application engines (such as the Cisco Cache Engine

More information

Configuring Port-Based Traffic Control

Configuring Port-Based Traffic Control CHAPTER 22 This chapter describes how to configure the port-based traffic control features on the Cisco ME 3400 Ethernet Access switch. For complete syntax and usage information for the commands used in

More information

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

LOCAL AREA NETWORKS Q&A Topic 4: VLAN A. Indicate whether the sentence or statement is true or false: 1. VLANs are more flexible in handling moves and additions of ports than routers 2. VLANs logically segment the physical LAN infrastructure

More information

OBD Simulator. Software to simulate and re-play a vehicle.

OBD Simulator. Software to simulate and re-play a vehicle. OBD Simulator Software to simulate and re-play a vehicle. Contents OBD Simulator... 1 Software to simulate and re-play a vehicle... 1 Introduction... 3 Configuration... 4 Vector Hardware... 4 Start Simulator...

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Debugging Common USB Issues. Total Phase, Inc.

Debugging Common USB Issues. Total Phase, Inc. Debugging Common USB Issues Total Phase, Inc. The widespread integration of USB into embedded applications presents many developers with the challenge of working with this protocol for the first time.

More information

Junos Enterprise Switching

Junos Enterprise Switching Junos Enterprise Switching Chapter 6: Device Security and Firewall Filters 2011 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use

More information

Chances and challenges

Chances and challenges Chances and challenges CAN FD for commercial vehicles Holger Zeltwanger Commercial vehicles CAN in mobile machinery Truck network architecture Trunk, fuel Switches CAN (FD) Instrumentation train (125 or

More information

Introduction to Routers and LAN Switches

Introduction to Routers and LAN Switches Introduction to Routers and LAN Switches Session 3048_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Prerequisites OSI Model Networking Fundamentals 3048_05_2001_c1 2001, Cisco Systems, Inc.

More information

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER

UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER 1 UNDERSTANDING SENETAS LAYER 2 ENCRYPTION TECHNICAL-PAPER CN encryption devices are purpose built hardware appliances that have been designed and developed in Australia by Senetas Corporation since 1997.

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

The WAVE Communications Stack: IEEE p, and, September, 2007

The WAVE Communications Stack: IEEE p, and, September, 2007 The WAVE Communications Stack: IEEE 802.11p, 1609.4 and, 1609.3 September, 2007 WAVE System Components External Systems ROAD SIDE UNIT Covered by WAVE Standards ON-BOARD UNITS External Systems Host Host

More information

DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM

DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM Alberto Perez, Technical Manager, Test & Integration John Hildin, Director of Network s John Roach, Vice President

More information

Troubleshooting DECnet

Troubleshooting DECnet CHAPTER 11 Digital Equipment Corporation (Digital) developed the DECnet protocol family to provide a well-thought-out way for its computers to communicate with one another. The first version of DECnet,

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017

Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Software-Defined Networking (SDN) Now for Operational Technology (OT) Networks SEL 2017 Traditional Ethernet Challenges Plug-and-play Allow all ROOT D D D D Nondeterministic Reactive failover Difficult

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols. Assignments INTERNET CONTROL MESSAGE PROTOCOL

Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols. Assignments INTERNET CONTROL MESSAGE PROTOCOL Computer Networks LECTURE 10 ICMP, SNMP, Inside a Router, Link Layer Protocols Sandhya Dwarkadas Department of Computer Science University of Rochester Assignments Lab 3: IP DUE Friday, October 7 th Assignment

More information

Configuring Layer 3 Interfaces

Configuring Layer 3 Interfaces This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page

More information

IEEE YANG Data Modeling Overview

IEEE YANG Data Modeling Overview Joint IEEE 802 and ITU-T SG15 Workshop Building Tomorrow s Networks IEEE 802.1 YANG Data Modeling Overview Marc Holness, Ciena mholness@ciena.com Current Active 802.1 YANG Projects Several active YANG

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Network Layer II Dmitri Loguinov Texas A&M University April 3, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter 4:

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

OPEN ALLIANCE TC8. Compliance Verification for Ethernet ECUs. Stuttgart, May 3rd Georg Janker.

OPEN ALLIANCE TC8. Compliance Verification for Ethernet ECUs. Stuttgart, May 3rd Georg Janker. OPEN ALLIANCE TC8 Compliance Verification for Ethernet ECUs Stuttgart, May 3rd 2017 Georg Janker CTO Agenda 1. Motivation 2. The Compliance Verification Process 3. OPEN Alliance Automotive Ethernet ECU

More information

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah). Volume: 245 Questions Question No: 1 Which of the following statements best describes ARPANET? A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara,

More information

Lesson 9 OpenFlow. Objectives :

Lesson 9 OpenFlow. Objectives : 1 Lesson 9 Objectives : is new technology developed in 2004 which introduce Flow for D-plane. The Flow can be defined any combinations of Source/Destination MAC, VLAN Tag, IP address or port number etc.

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Understanding and Using the Controller Area Network Communication Protocol

Understanding and Using the Controller Area Network Communication Protocol Marco Di Natale Haibo Zeng Paolo Giusto Arkadeb Ghosal Understanding and Using the Controller Area Network Communication Protocol Theory and Practice ^Spri ringer Contents..? 1 The CAN 2.0b Standard 1

More information

Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide

Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide Grandstream Networks, Inc. VLAN (Virtual Local Area Network) Guide Table of Contents SUPPORTED DEVICES... 4 INTRODUCTION... 5 ABOUT VLAN... 6 General... 6 Voice VLAN... 7 VLAN CONFIGURATION... 8 LLDP (Link

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU

IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU IP Network Troubleshooting Part 3 Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU February 2016 Today s Outline: Focused Upon Protocol Analysis with Wireshark Review

More information

Set Inner CoS Bits for QinQ

Set Inner CoS Bits for QinQ Set Inner CoS Bits for QinQ First Published: September 2007 Revised: August 2008 This document describes the Set Inner CoS Bits for QinQ feature that allows you to mark both inner and outer VLAN tags of

More information

IEEE P1722 AVBTP. Version 0.01, Alan K. Bartky Bartky Networks Send comments to

IEEE P1722 AVBTP. Version 0.01, Alan K. Bartky Bartky Networks  Send comments to IEEE P1722 AVBTP assumptions Version 0.01, 2007-06-24 Alan K. Bartky alan@bartky.net Send comments to AVBTP@listserv.ieee.org 1 Notice of copyright release Notice: This document has been prepared to assist

More information

CPGS-B9142ET-C. Features. Introduction

CPGS-B9142ET-C. Features. Introduction Features 3U CompactPCI EN50155 16-port managed Gigabit Ethernet switch with 8x10/100/1000Base-T(X) in CompactPCI sockets, and 6x10/100/1000Base- T(X) with 2 Extension Ports Leading EN50155 compliant Ethernet

More information

Configure Link Layer Discovery Protocol

Configure Link Layer Discovery Protocol This chapter describes the procedures to configure Link Layer Discovery Protocol on Cisco NCS 4000 Series routers. Link Layer Discovery Protocol (LLDP) - Overview, on page 1 LLDP Frame Format, on page

More information

IEEE 802.1Q YANG Interface Framework in support of Link Aggregation (802.1AX), Security (802.1X), and CFM (802.1ag)

IEEE 802.1Q YANG Interface Framework in support of Link Aggregation (802.1AX), Security (802.1X), and CFM (802.1ag) IEEE 802.1Q YANG Interface Framework in support of Link Aggregation (802.1AX), Security (802.1X), and CFM (802.1ag) Marc Holness Version 1.4 26 July 2016 IEEE 802.1Q Bridge Port Each Bridge Port is associated

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

AT-S41 Version 1.1.7C Management Software for the AT-8326GB and AT-8350GB Series Fast Ethernet Switches. Software Release Notes

AT-S41 Version 1.1.7C Management Software for the AT-8326GB and AT-8350GB Series Fast Ethernet Switches. Software Release Notes AT-S41 Version 1.1.7C Management Software for the AT-8326GB and AT-8350GB Series Fast Ethernet Switches Software Release Notes Please read this document before you begin to use the AT-S41 management software.

More information

Always Keep IT Purely Simple

Always Keep IT Purely Simple Always Keep IT Purely Simple Network Monitoring Software Page 1 CEO Message AKiPS is a scalable, fully featured monitoring tool that collects, reports and alerts on the performance of your network infrastructure.

More information

H3C S7500E-XS Switch Series FAQ

H3C S7500E-XS Switch Series FAQ H3C S7500E-XS Switch Series FAQ Copyright 2016 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any means without prior

More information

Register Bit Name Description Default Global Ctrl Reg 2 SGCR2. Table 1. Registers are used for Common and Egress Port Setting

Register Bit Name Description Default Global Ctrl Reg 2 SGCR2. Table 1. Registers are used for Common and Egress Port Setting QoS Priority Support In the KSZ8842 Family Introduction Latency critical applications such as Voice over IP (VoIP) and video typically need to guarantee a high quality of service (QoS) throughout the network.

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

... Application Note AN-531. PCI Express System Interconnect Software Architecture. Notes Introduction. System Architecture.

... Application Note AN-531. PCI Express System Interconnect Software Architecture. Notes Introduction. System Architecture. PCI Express System Interconnect Software Architecture Application Note AN-531 Introduction By Kwok Kong A multi-peer system using a standard-based PCI Express (PCIe ) multi-port switch as the system interconnect

More information

L6: OSI Reference Model

L6: OSI Reference Model EECS 3213 Fall 2014 L6: OSI Reference Model Sebastian Magierowski York University 1 Outline The OSI Reference Model An organized way of thinking about network design (from low-level to high-level considerations)

More information

Configuring Layer 3 Interfaces

Configuring Layer 3 Interfaces This chapter contains the following sections: Information About Layer 3 Interfaces, page 1 Licensing Requirements for Layer 3 Interfaces, page 4 Guidelines and Limitations for Layer 3 Interfaces, page

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information