1 Why do Smart Meters need a Local Port?
|
|
- Stephanie Butler
- 6 years ago
- Views:
Transcription
1 Memorandum To cc Prepared by DECC Smart Metering Programme Subject: All GB Smart Metering Equipment should have a LocalPort 1 Why do Smart Meters need a Local Port? Avoid bricked meters Only interface that will work in all installations for decades Will ease installation and maintenance 3 2 Should the LocalPort be Wired or Optical? 3 3 Is there a Security Problem with an Opto Port? Existing meters contain opto ports Opto ports have not been banned Opto v RS Opto v RF HAN How to make an Opto Port secure 5 4 Conclusion 6 1 Why do Smart Meters need a Local Port? At present DECC mandates (SMETS1) that all domestic smart metering equipment should contain a HAN interface. DECC does not prevent smart metering equipment from containing a LocalPort, but it does not mandate that they must. We think there are a number of reasons why it would be sensible for DECC to mandate that all domestic smart metering equipment must contain a LocalPort (certainly for the electricity and gas meters, and maybe for the comms hub and IHD too). 1.1 Avoid bricked meters There is a danger that if Smart Meters contain a HAN, but no LocalPort, that there will be an occasion where some are bricked as a result of a software upgrade. We will require some software upgrades to be of the HAN itself (e.g from ZigBee Pro to 6LoWPAN). i.e the software upgrade is done via the HAN, yet modifies that very same HAN channel. If something goes wrong in this process, we would end up with a meter that cannot communicate at all. i.e it will not be possible to make a further software upgrade to rectify the problem. In such a case, the device is considered to be bricked, as the only thing it could be used as is a brick! We need to allow for human error. With 100M devices (E and G meters, displays, comms hubs) it is likely that something will go wrong at some point. esmart-m-039 v1.4 Page 1 of 7
2 Most devices that support RF software upgrades, provide a secondary LocalPort as a get out of jail card. No matter how corrupt the internal software has become, it is always possible to boot up new software via the LocalPort. All mobile phones contain a wired LocalPort (normally USB). This allows them to boot up new software from scratch if the radio links stop working. It is not really good engineering practise for any RF device to be manufactured without any LocalPort. If the meters contain a LocalPort, then that could be used to install new software if the HAN has been corrupted. This will require a house visit, but this will still be cheaper than a house visit to remove the old meter and install a new one. The software upgrade can be performed by less qualified technicians than would be required for a full meter change. It also reduces the inconvenience to the consumer as the energy supply does not need to be disconnected. A full meter change is very bad PR for the energy suppliers as it exposes any system error very publicly. If a software upgrade does corrupt the HAN, it is likely to affect a number of houses in a geographic cluster, so the cost of visiting each house (to install new software via the LocalPort) should not be so high, as the houses are likely to be close to each other. A bricked meter without a LocalPort has a problem for resolving bill disputes between a consumer and a supplier. It is very hard work to get 13 months of 30-minute time-ofuse readings out of the meter via the user interface alone. The requirement for a LocalPort exists on all the devices that have software upgrades via the HAN (for the reasons given above). So it might apply to the Comms Hub and the IHD, as well as the electricity and gas meters. 1.2 Only interface that will work in all installations for decades We are struggling to find a single RF HAN interface that will work well enough in all GB homes. Indeed we are struggling to find a HAN that will even work everywhere at the start, let alone for decades to come. We believe that the comms interfaces need to operate correctly in a backward compatible manner for 2 or 3 meter lives (30 or 45 years), not just for one meter life (15 years). This is because the 4 devices in a single home are unlikely to all be changed at the same time. So there will be a rolling requirement for new devices to operate correctly with old devices. We don t seem to be able to find an RF technology that is able to meet all the above functional requirements. But we can easily meet the above requirements with several wired or opto interface options. We think the only way to have a single interface that will work to all GB smart metering devices for several decades, is for that interface to be wired or opto. Wired and opto interfaces are much simpler than RF interfaces. As the years go by, RF interfaces can suffer from more and more interference problems, but wired and opto interfaces don t. They are much simpler, defined and controlled interfaces than RF. The chips required for an RF interface also have a shorter lifetime esmart-m-039 v1.4 Page 2 of 7
3 than the components needed for a wired or opto interface. It will be possible to build meters with the same LocalPort for many decades. 1.3 Will ease installation and maintenance Ongoing costs of installation and maintenance will be lower if national systems can be developed on the assumption that there is a single interface that will always be available into all the devices. This is why we think it would be good if all devices contained a single standardised LocalPort. This is the logic that was being applied to the HAN. The intention (a good one) was that the HAN would be that single standardised interface available into every GB smart metering device. The problem is that we have not been able to find a single HAN interface that can work in every installation, even from the start, let alone for decades into the future. The idea to have a single standardised interface available to every device is still a good one. Even if we can t achieve this with an RF HAN, we can with a wired or opto LocalPort. It will be much easier for the installers if they can have a single HHT (Hand Held Terminal) that will work with every smart metering device in every home. They can achieve this if every HHT contains the agreed LocalPort. Indeed it is much more sensible for the HHT to contain a LocalPort than the HAN. There is a bootstrap problem if the installer tries to connect and pair the smart metering devices to the HAN, with commands from the same HAN. The bootstrap problem is avoided if the HHT connects the devices to the HAN with commands via the LocalPort. 2 Should the LocalPort be Wired or Optical? The LocalPort could be wired or opto. We would be happy with either solution, so long as we agree on a single interface that can be used universally into all the GB smart metering devices. Many consumer products use USB successfully as a LocalPort. However, energy suppliers don t like wired connectors as they fear tampering with a screwdriver by bad customers. An opto port is also safer (ATEX) in a gas meter than a wired connector. This is why most meters have used an opto port as the LocalPort. The European standard for an opto port is EN :2002. You can download the spec for this from the BSI at : Most domestic electricity meters already contain this opto port. Most current domestic gas meters are mechanical and so do not contain any electronic interface. However, most of the new smart gas meters do already contain this opto port. esmart-m-039 v1.4 Page 3 of 7
4 This opto port adds very little cost to the meter. It is a slow (e.g 4800 bps) UART interface connecting to an LED and a photo-diode. It is implemented with a standard UART interface in a microcontroller and all the protocol is done in software. The meter body has to contain a small circular clear window and a steel washer (that the magnetic read head attaches to). It is easy to see that this has added very little cost to the many meters that already use this interface. The interface is mature and has already been used in many European meters for many years. It would therefore seem to be a sensible option for the LocalPort in GB smart metering devices. 3 Is there a Security Problem with an Opto Port? Some people in the smart metering community seem to think that there is an inherent security risk for meters to contain an opto port. We do not agree with this. All communications interfaces consist of a 2-way data pipe that can be implemented in a secure or in an insecure manner. There is nothing inherently different between RF, wired and opto data pipes. 3.1 Existing meters contain opto ports Some of the energy suppliers are already installing smart metering systems in GB. There are already hundreds of thousands of GB homes that have had such systems installed. Most of these have electricity meters with opto ports. If there is an inherent risk for a meter to contain an opto port, why haven t such installations been banned? 3.2 Opto ports have not been banned If there is an inherent security risk for a meter to contain an opto port, why haven t the DECC specs (SMETS1) banned the use of opto ports? 3.3 Opto v RS232 An RS232 wired interface is based on a UART (Universal Asynchronous Receiver Transmitter). A simple protocol that connects 2 devices with plaintext is not secure. But the same physical link can adopt a protocol that uses symmetric or asymmetric cryptography to implement signatures and encryption. By adopting such techniques, the same wired interface can be made into a secure link. The opto port is exactly the same. It is just another UART link. It can adopt a simple protocol that is not secure, or it can adopt a more sophisticated protocol that is secure. We think the reason why some people think that opto ports are insecure, is that the way they are often used is with a simple DLMS protocol. We agree that such protocols are not secure enough. EN :2002 defines a set of low level requirements, including : esmart-m-039 v1.4 Page 4 of 7
5 Physical shape of circular read head and associated meter port. Light frequency range. Simple light-on/light-off UART connection. Standard sign on procedure. Branch to a proprietary protocol. The final protocol that is branched to, can be a secure one. DECC needs to agree on what this secure protocol should be for GB. 3.4 Opto v RF HAN The same argument can be made for a security comparison between an opto port and an RF HAN. Data can be transferred over the RF HAN as : Plaintext (insecure) Cryptotext (can be secure) There is nothing that makes an RF link inherently more secure than an opto link. Indeed it is actually harder to control the RF link, as unknown snoopers can connect, even when out of the line of sight. If an RF HAN link can be made secure, then so can an opto link. 3.5 How to make an Opto Port secure EN :2002 defines the low levels for an opto port. GB needs to agree on the higher level protocol to make the opto link secure. There are several ways in which this could be achieved. In practise, security is achieved with one or both of : Channel security. A device must provide some credentials before it is allowed to join a network (e.g WAP2 for WiFi). Endpoint security. Secure packets can be unicast tunnelled through one or more communications channels from one source node to one destination node. The packet can be signed and encrypted. This can achieve several goals : o The packet can only be read by the destination node and not by any other intermediate nodes. o The destination node can verify that the packet really did come from the source node, and not from some other node pretending to be the source node. o The destination node can verify that the packet has not been tampered with or modified. It can know that the packet it receives is exactly the same as the packet the source node sent. esmart-m-039 v1.4 Page 5 of 7
6 o The security between source and destination nodes does not rely on any of the intermediate channels being secure. Indeed for a long message journey, it is almost impossible to know that every intermediate channel is secure. It is better to build a system that does not require any of the intermediate channels to be secure. This has the added benefit that it enables cheaper communications channels to be adopted. This enables new communications technologies to be adopted earlier (as they do not have to be secure). o Endpoint security is easier to implement if every node has a globally unique identifier (or address). One option is the 64-bit ID scheme (EUI- 64) managed by the IEEE. Equipment manufacturers apply to the IEEE for an OUI-24 prefix, then allocate unique 40-bit suffixes to each device they produce. More information on this scheme can be found at : These security solutions can be based on asymmetric (e.g ECC) or symmetric (e.g AES) cryptography. The security protocol for the opto port can adopt any of these techniques. It would be best if the opto port security was based on the same security strategy as that chosen by DECC for all communications interface between GB smart metering devices. i.e the security method between 2 endpoints is the same whether the communications is between : Meter and HHT via opto port. Meter and Comms Hub via HAN. Meter and DCC via HAN and WAN. DECC and the equipment manufacturers can achieve this by developing or selecting a new high level protocol to make the opto link secure. Such protocols do already exist and are freely available. One of the major meter manufacturers has already used this approach to make the EN :2002 opto port in their smart domestic gas meter secure. 4 Conclusion We recommend that DECC mandates that all GB smart metering equipment should contain a LocalPort. We think that the metrological devices (electricity and gas meters) should adopt an opto port based on : EN :2002. This defines the low layers. A high level protocol that makes the opto port secure. DECC should develop or select the required protocol. esmart-m-039 v1.4 Page 6 of 7
7 We think that the Comms Hub and IHD should also contain a LocalPort, but we don t have enough information to recommend what type yet. It is likely to be USB or the same opto port as recommended for the meters above. esmart-m-039 v1.4 Page 7 of 7
The Home Area Network & CADs. Eric Taylor Solutions Director System Level Solutions
The Home Area Network & CADs Eric Taylor Solutions Director System Level Solutions eric.taylor@slscorp.com 07584 415 480 The Home Area Network Scope 10 Minutes An very high level outline of HAN connectivity
More informationX / LX COMPARISON CHART - General
X / LX COMPARISON CHART - General Feature Set X-Line LX-Line Comparison On-Board Hardware Main Processor 386EX Sitara ARM Cortex-A8 Processor Clock Speed 25 MHz 1GHz 40 X Million Instructions/Sec (MIPS)
More informationSMART METERING EQUIPMENT READINESS UPDATE JUNE Dr Howard Porter Chief Executive Officer, BEAMA
SMART METERING EQUIPMENT READINESS UPDATE JUNE 2014 Dr Howard Porter Chief Executive Officer, BEAMA Mandated smart metering group 2 BEAMA has been asked to give the view from manufacturers on the state
More informationGB experience with smart meters
Presentation by Energy UK Best practice for a successful smart technology roll-out Lessons learnt and recommendations from first movers GB experience with smart meters Introduction to Energy UK and the
More informationIoT for the Smart Home
In-Home M2M Connectivity for Smart Meters, Plugs and Appliances IoT for the Smart Home Russell Haggar, Xsilon CIR SGCP Conference 5 June 2013 Cambridge www.cir-strategy.com/events Synopsis Connectivity
More informationWelcome to my presentation: Message Denial and Alteration on IEEE Low- Power Radio Networks.
Welcome to my presentation: Message Denial and Alteration on IEEE 802.15.4 Low- Power Radio Networks. This presentation discusses the susceptibility of IEEE 802.15.4 radio networks to several different
More informationReview of IEC/EN Standards for Data Exchange between Smart Meters and Devices
Review of IEC/EN s for Data Exchange between Smart Meters and Devices Erietta Zountouridou, Evangelos Karfopoulos, Stavros Papathanassiou, and Nikos Hatziargyriou National Technical University of Athens,
More informationDanube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks. Thilo Sauter Albert Treytl
Danube University Krems. The University for Continuing Education. Security Issues in Resource-limited Sensor Networks Thilo Sauter Albert Treytl Wireless Sensor Network Vision High-level company functions
More informationCOMP asynchronous buses April 5, 2016
All the I/O examples we have discussed use the system bus to send data between the CPU, main memory, and I/O controllers. The system bus runs at a slower clock speed than the CPU because of greater distances
More informationChapter 1.5 Data Transmission and Networking.
Chapter 1.5 Data Transmission and Networking. 1.5 (a) Networks All the systems that have been mentioned so far have been individual computers, sometimes with more than one user, but single processors.
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationModule 11 Technical Troubleshooting for Restaurant Managers
Module 11 Technical Troubleshooting for Restaurant Managers Overview This module is about troubleshooting at an introductory level and to help you gain confidence and knowledge to problem-solve Pilot POS
More informationSmart Meters Programme Schedule 6.3. (Development Process) (CSP North version)
Smart Meters Programme Schedule 6.3 (Development Process) (CSP North version) Schedule 6.3 (Development Process) (CSP North version) Amendment History Version Date Status v.1 Signature Date Execution copy
More informationSmart Metering Implementation Programme: Consultation on the second version of the Smart Metering Equipment Technical Specifications (URN 12D/258).
IET Ref: (S)945/hf Your ref: URN 12D/258 The Institution of Engineering and Technology Michael Faraday House Six Hills Way, Stevenage Hertfordshire, SG1 2AY United Kingdom T +44 (0) 1438 313311 F +44 (0)
More informationOpenWay by Itron Security Overview
Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent
More informationSmart meters Enabling or postponing Smart Energy Systems and Communities
Good Practices in Research, Innovation and Education Session 1: Smart metering and instrumentation Smart meters Enabling or postponing Smart Energy Systems and Communities Dr. Mihai Sanduleac Faculty of
More informationThe Unofficial XBee FAQ (version 1.3)
The Unofficial XBee FAQ (version 1.3) johnf January 30, 2012 1. I m a newbie to XBees. How do I get started? That s a Big Question. Are you committed to a particular model of XBee (perhaps because you
More informationEE 122: Network Applications
Network EE 122: Network Applications Kevin Lai Aug 28, 2002 Network functionality is only useful if it benefits users - also applies to any computer system, but easier to forget in networking - e.g., Is
More informationDCC SMETS1 PROGRAMME SMETS1 USER INTERFACE FORUM. March 2017 DCC PUBLIC
DCC SMETS1 PROGRAMME SMETS1 USER INTERFACE FORUM March 2017 DCC PUBLIC AGENDA Agenda Item Times Coffee / Breakfast From 09:00 Welcome and introduction Agenda walkthrough UI Options Recap Breakout 1: Impact
More informationDr./ Ahmed Mohamed Rabie Sayed
1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)
More informationWAVECOM All rights reserved Erik Rasmussen Key Accounts Manager. Meter Communications: What Makes Sense?
Erik Rasmussen Key Accounts Manager Meter Communications: What Makes Sense? Agenda Technologies: Private RF, PLC, mesh, cellular? What is the right choice for AMI? Smart Metering: what is required, what
More informationzigb232 & zigb485 User Guide User Guide TANGENT TECHNOLABS
TANGENT TECHNOLABS Device: Power Supply (9-36V) Yellow LED (Traffic) Green LED (Router Device) Blue LED (Coordinator Device) RS232/485 Connector Power Indication LED Technical Specifications: Input Power:
More informationSecuring Smart Meters with MULTOS Technical Overview
Securing Smart Meters with MULTOS Technical Overview Introduction This paper is written for those involved in the specification, procuring and design of smart metering infrastructure at a technical level.
More informationFoxtel Broadband on ADSL Service Description
Foxtel Broadband & Home Phone Agreement Foxtel Broadband on ADSL Service Description Effective from 23 February, 2016 CONTENTS 1. ABOUT THIS SERVICE DESCRIPTION 1 2. FOXTEL BROADBAND ON ADSL 1 3. PLANS
More informationApplication Note AN013
Implementing ZigBee Smart Energy (SE) s with RC2400-ZNM by Ø. Nottveit Introduction Radiocrafts offers two ZigBee Network Modules (ZNM, and ZNM-SE) with preloaded ZigBee PRO compliant stack. The ZigBee
More information2
1 2 3 4 5 All resources: how fast, how many? If all the CPUs are pegged, that s as fast as you can go. CPUs have followed Moore s law, the rest of the system hasn t. Not everything can be made threaded,
More informationWhy Optically Isolate Your Data Communication Lines?
Why Optically Isolate Your Data Communication Lines? A RS-232 Connection Look at the direct RS-232 connection at the figure.1. Do notice the direct ground connection through the RS-232? Being trained to
More informationEvolving Standards in Security. Michael Garrison Stuber
Evolving Standards in Security Michael Garrison Stuber Sad but true... Cartoon courtesy of xkcd.com Trends & Responses Evolution from unsecure to secure Acceptance of ECC Struggling with certificates Demand
More informationSecurity analysis of Dutch smart metering systems
Sander Keemink and Bart Roos July 2, 2008 1 / 19 1 Smart metering introduction 2 Theoretical research 3 Practical research 4 Recommendations 5 Conclusion 2 / 19 Smart metering introduction Smart Metering
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationSOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS
SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS When discussing business networking and communications solutions, the conversation seems invariably to revolve around cloud services, and more
More informationCOMP 273 Winter asynchronous I/O April 5, 2012
All the I/O examples we have discussed use the system bus to send data between the CPU, main memory, and I/O controllers. The system bus runs at a slower clock speed than the CPU because of greater distances
More informationOperator s Manual. For FreshStart Service Providers by CyberSpa LLC. All rights reserved.
Operator s Manual For FreshStart Service Providers 2017 by CyberSpa LLC. All rights reserved. 1 What is a PC FreshStart? A PC FreshStart is an automated tool that allows you to image your customer s new
More informationData Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)
Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.
More informationOpting to have your own Dark Fiber. 10 Reasons why it makes sense to have your own Dark Fiber set-up
Opting to have your own Dark Fiber 10 Reasons why it makes sense to have your own Dark Fiber set-up Why it makes sense to have your own Dark Fiber set-up 1. 6. It s cheaper Invest in your customer 2. Multiple
More informationAn introduction to wireless security at home, on the road and on campus. Sherry Callahan and Kyle Crane
Out of Thin Air! An introduction to wireless security at home, on the road and on campus Sherry Callahan and Kyle Crane University of Kansas Medical Center October 5, 2009 Wireless Networking at Home Sherry
More informationUnderstanding Managed Services
Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean
More informationComputer science..pharmacy college
Is the facility to transfer data to remote locations quickly & conveniently, the data is transferred by means of a telecommunication network. Note: Data communication is the transmission of electronic
More informationNetworking Fundamentals Tom Brett
Networking Fundamentals Tom Brett Data Before we look at networking, it is important for us to understand what Data is and how it is stored and represented Data According to Webopedia, data is distinct
More informationComputer Science Department 2 nd semester- Lecture13
Network Devices: The network devices (connecting devices) are divided into five different categories based on the layer in which they operate in a network. NIC (Network Interface Card) is used to enable
More informationOutline Key Management CS 239 Computer Security February 9, 2004
Outline Key Management CS 239 Computer Security February 9, 2004 Properties of keys Key management Key servers Certificates Page 1 Page 2 Introduction Properties of Keys It doesn t matter how strong your
More information4. SECURITY ASPECTS IN EMBEDDED SYSTEMS
4. SECURITY ASPECTS IN EMBEDDED SYSTEMS 4.0 Introduction Now a day embedded systems and other wireless devices are increasingly being connected to each other and are very much involved in network communications.
More informationSecuring Americans Identities: The Future of the Social Security Number
Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationCSC Introduction to Computers and Their Applications
CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in
More informationTHE CHAIN OF TRUST. Keeping Computing Systems More Secure. Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd.
THE CHAIN OF TRUST Keeping Computing Systems More Secure Authors: Richard Wilkins, Ph.D. Phoenix Technologies, Ltd. Dick_Wilkins@phoenix.com Toby Nixon, Senior Standards Program Manager Windows and Devices
More informationMeeting the OMB FY2012 Objective: Experiences, Observations, Lessons-Learned, and Other Thoughts
Meeting the OMB FY2012 Objective: Experiences, Observations, Lessons-Learned, and Other Thoughts 2013 Federal Interagency Workshop 9 December, 2013 Ron Broersma DREN Chief Engineer ron@dren.mil Introduction
More informationUSB Type-C TM, IEEE CSNV
USB Type-C TM, IEEE CSNV Ken Shoemaker 10 May, 2016 Credits, Trademarks, Disclaimers USB Type-C TM and USB-C TM are trademarks of the Universal Serial Bus Implementers Forum (USB-IF). DisplayPort TM is
More informationMultihoming Complex Cases & Caveats
Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming
More informationChapter 9: Key Management
Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange
More informationCS 332 Computer Networks Security
CS 332 Computer Networks Security Professor Szajda Last Time We talked about mobility as a matter of context: How is mobility handled as you move around a room? Between rooms in the same building? As your
More informationThe Internet of Things. Steven M. Bellovin November 24,
The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationClient Code - the code that uses the classes under discussion. Coupling - code in one module depends on code in another module
Basic Class Design Goal of OOP: Reduce complexity of software development by keeping details, and especially changes to details, from spreading throughout the entire program. Actually, the same goal as
More informationNetwork Security - ISA 656 IPsec IPsec Key Management (IKE)
Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating
More informationTHE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!
THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible
More informationAutomating VPN Management
Automating VPN Management By Scott Hilton, Vice President Product Management Assured Digital, Inc. Although many network managers, users and executives agree on the benefits of virtual private networking,
More informationOutline More Security Protocols CS 239 Computer Security February 6, 2006
Outline More Security Protocols CS 239 Computer Security February 6, 2006 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and Authentication
More informationThe EU OPEN meter project
Open Public Extended Network ing 7 TH FRAMEWORK PROGRAMME The EU project ERGEG workshop on Smart Metering Authors: Date: Nicolas Arcauz 14th December 2009, Brussels ENERGY 2008.7.1.1 Official Journal of
More informationEnabling Flexibility Through Demand Response
Enabling Flexibility Through Demand Response Britton Sanderford, Chief Technology Officer, Sensus Metering Systems Smart Metering East Coast, Raleigh NC DR MASS ADOPTION IMPEDIMENTS UTILITY Must Enter
More informationFirmware Revision Information
1 Firmware Revision Information Product Code(s): ACR1000A, ACR1000A-T, ACR1000A-R Product Name(s): ServSwitch Agility Transmitters and Receivers Date Modified: December 9 th, 2014 Important Notice: The
More informationTHE TRUTH ABOUT CLOUD SECURITY. It s More Secure Than You Think
THE TRUTH ABOUT CLOUD SECURITY It s More Secure Than You Think TABLE OF CONTENTS Cloud Security Problems Hyperbole Or Reality? It All Starts With Traversing The Internet It s Not The Cloud Itself The Major
More informationAndrews & Arnold Ltd
Andrews & Arnold Ltd Digital Economy Bill 2016 Automatic Compensation Andrews & Arnold Ltd Enterprise Court Downmill Road BRACKNELL RG21 1QS 1st Oct 2016 Dear Sirs, In response for your call for inputs
More informationWireless Personal Area Networks & Wide Area Networks
Wireless Personal Area Networks & Wide Area Networks Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline In the lecture we will: Look at PAN s in more detail Look at example networks
More informationWIRED VERSUS WIRELESS
WIRED VERSUS WIRELESS WIRELESS CONNECTIVITY HAS CHANGED THE WAY WE STREAM MUSIC, MOVIES, BROWSE THE INTERNET AND COMMUNICATE WITH FRIENDS. YOU WOULD BE HARD PUSHED TO FIND A PLACE IN TODAY S WORLD WITHOUT
More informationFull file at
Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics
More information1.7 Limit of a Function
1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:
More informationHow to Configure Outlook 2016 to connect to Exchange 2010
How to Configure Outlook 2016 to connect to Exchange 2010 Currently Outlook 2016 is the version of Outlook supplied with Office 365. Outlook 2016 will install and work correctly on any version of Windows
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationThe ZigBee Architecture An Introduction
The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4
More informationSMiRF v1 Serial Miniature RF Link 8/25/2004
interface and protocol requirements for the SMiRF USB Powered Wireless link. Please report typos, inaccuracies, and especially unclear explanations to us at spark@sparkfun.com. Suggestions for improvements
More informationHow Secured2 Uses Beyond Encryption Security to Protect Your Data
Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document
More informationMoving to Windows 10. Mike Sandells Computing Services Department
Moving to Windows 10 Mike Sandells mikejs@liverpool.ac.uk Computing Services Department Summary of our environment Russell Group University, 25,000 students, one main campus, no WAN. 2,900 Student PCs:
More informationQUIZ. What is wrong with this code that uses default arguments?
QUIZ What is wrong with this code that uses default arguments? Solution The value of the default argument should be placed in either declaration or definition, not both! QUIZ What is wrong with this code
More informationEAGLE-200. Intelligent Control Gateway. User Manual
Intelligent Control Gateway Version 1.00 Oct 2017 Copyright 2017 by RAINFOREST AUTOMATION, INC ( RFA ). All rights reserved. No part of this manual may be reproduced or transmitted in any from without
More informationA NEW MODEL FOR AUTHENTICATION
All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world
More informationWireless Communication Using Zigbee Module and Aurdino
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 6 Issue 4 Ver. I ǁ 2018 ǁ PP. 66-70 Wireless Communication Using Zigbee Module
More informationBe sure to download and utilize the correct version. If the incorrect version is utilized, then an error message will be shown.
599 EAGLE RADIO USB TO UART DRIVER INSTALLATION INSTRUCTIONS FOR WINDOWS XP, VISTA, AND WINDOWS 7 32-BIT AND 64-BIT VERSION 1.xxx FIRMWARE Rev. B 2/24/2011 Overview The Eagle provides a standard USB 1.0/2.0
More informationPaper. It s all about input, connectivity, decision making, and output instructions.
main menu SCADALESS SCADA USING WIRELESS MESH RADIO TELEMETRY Submitted January 23, 2007 by Louis F. De Silvio President, Industrial Telemetry, Inc. For Presentation at ISA Conference in Tulsa, April,
More informationRadiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.
Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12
More informationMesh Networking Principles
Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationCopyright Link Technologies, Inc.
3/15/2011 Mikrotik Certified Trainer / Engineer MikroTik Certified Dude Consultant Consulting Since 1997 Enterprise Class Networks WAN Connectivity Certifications Cisco, Microsoft, MikroTik BGP/OSPF Experience
More informationChapter 12. Network Organization and Architecture
Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified
More informationFree Fall. Objective. Materials. Part 1: Determining Gravitational Acceleration, g
Free Fall Objective Students will work in groups to investigate free fall acceleration on the Earth. Students will measure the fundamental physical constant, g, and evaluate the dependence of free fall
More informationOutline. More Security Protocols CS 239 Security for System Software April 22, Needham-Schroeder Key Exchange
Outline More Security Protocols CS 239 Security for System Software April 22, 2002 Combining key distribution and authentication Verifying security protocols Page 1 Page 2 Combined Key Distribution and
More informationWhy do we really want an ID/locator split anyway?
Why do we really want an ID/locator split anyway? Dave Thaler dthaler@microsoft.com MobiArch 2008 1 Starting from basics Users deal with names, not addresses (esp. in IPv6) Humans need friendly identifiers
More informationIn the name of God, the most merciful Communication and Networking
In the name of God, the most merciful Communication and Networking In these slides, many figures have been taken from the Internet during my search in Google. Due to the lack of space and diversity of
More informationGap analysis. Gireesh Shrimali Visiting Scholar, Stanford University Assistant Professor, Indian School of Business
Gap analysis Gireesh Shrimali Visiting Scholar, Stanford University Assistant Professor, Indian School of Business The data path Smart meter Meter ANSI C12.19 Communication card WAN (to the utility) HAN
More information2. BOM integration? Variable BOMs? No-pop? How is all that handled in ODB++?
High Level f a c t s h e e t Table of Contents 1. Is ODB++ available to the whole industry? 2. Is ODB++ a standard? 3, Who should implement ODB++ and why? 4. Which CAD systems can support ODB++ output?
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationDiaphragm gas meters with Absolute ENCODER
Gas Metering Diaphragm gas meters with Absolute ENCODER Absolute ENCODER index AE5 for diaphragm gas meters BK-G..A Diaphragm gas meters BK-G1.6 to BK-G1 Applications The electronically readable mechanical
More informationTech note. Submetering? Don t Take the Hardware for Granted
Tech note Submetering? Don t Take the Hardware for Granted Introduction Submetering is also know as automatic meter reading, or AMR, and is the most accurate option available for multifamily housing utility
More informationComputer Upgrades CAUTION
D Computer Upgrades If there s one thing you should take away from this book, it s not to be afraid of the computer. I realize that until you crack open the case of your (expensive) computer, the idea
More informationPROTECTING CONVERSATIONS
PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication
More informationWhy mesh? Why ad-hoc?
Ad-hoc Networking Why mesh? Why ad-hoc? Requires no central authority (no access points); extreme flexibility Self-organizing into local micronetworks based on the population of users rather than the availability
More informationFAST EnergyCam. The Smart Clip-on Meter Reader for Home and Business
FAST EnergyCam The Smart Clip-on Meter Reader for Home and Business FAST EnergyCam The Smart Clip-on Meter Reader for Home and Business FAST EnergyCam Smart metering power in a well designed and tiny package
More informationFractal Data Modeling
Fractal Data Modeling Fractal geometry creates beautiful patterns from simple recursive algorithms. One of the things we find so appealing is their self- similarity at different scales. That is, as you
More informationGuide to Wireless Communications, 3 rd Edition. Objectives
Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications
More informationIntegrating Password Management with Enterprise Single Sign-On
Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................
More information