Security of Bluetooth: An overview of Bluetooth Security
|
|
- Ann Newton
- 5 years ago
- Views:
Transcription
1 Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give a overview of Bluetooth security ad how it was desiged. At the ed there is also a short discussio of its weakesses o a geeral level. Keywords Bluetooth, Security, Architecture, Autheticatio, Ecryptio 1. INTRODUCTION Bluetooth is a ew techology for wireless commuicatio. The target of the desig is to coect differet devices together wirelessly i a small eviromet like i a office or at home. The BT rage restricts the eviromet, which at the momet is about 10 meters. Before acceptig the techology a close look at the security fuctio has to be take. Especially i office the iformatio broadcasted over the Bluetooth picoet ca be sesitive ad requires a good security. Bluetooth employs several layers of data ecryptio ad user autheticatio measures. Bluetooth devices use a combiatio of the Persoal Idetificatio Number (PIN) ad a Bluetooth address to idetify other Bluetooth devices. Data ecryptio ca be used to further ehace the degree of bluetooth security. [3] Bluetooth uses trasmissio scheme that provides a level of security i itself. Istead of trasmittig over oe frequecy withi the 2.4 GHz bad, Bluetooth radios use a fast frequecy-hoppig spread spectrum (FHSS) techique, allowig oly sychroised receivers to access the trasmitted data. [3] 2. BLUETOOTH SECURITY BT uses authorisatio ad autheticatio to kow who is the user ad what are the devices ad their rights. The terms are defied as follows: Autheticatio: The process of verifyig who is at the other ed of the lik. Autheticatio is performed for devices. I Bluetooth, this is achieved by the autheticatio procedure based o the stored lik key or by pairig (eterig a PIN). [12] Authorisatio: This is the process of decidig if device X is allowed to have access to service Y. This is where the cocept of trusted exist (explaied below). [4 pg. 14] Bluetooth uses lik level security where each coectio is give a uique secret autheticatio key ad ecryptio key that is derived from the first oe. More of these later i the paper. Commuicatio betwee differet Bluetooth (BT) devices use fast frequecy-hoppig spread spectrum (FHSS) techique, which uses 79 differet radio chaels. Bluetooth uses the same frequecy tha other household machies, example microwave ove, which ca cause iterferece. FHSS prevets this iterferece to cause too much harm, sice it chages trasmissio frequecy 1600
2 User Iterface Geeral Mgmt RFCOMM (or other Security Etity multiplexig Protocol) Maager Service L2CAP Database Device Database HCI Lik Maager / Lik cotroller Leged Registratio Query Figure 1. Security Architecture (based o [4]) times per secod ad if there is a iterferece at some frequecy, oly that oe trasmissio is damaged. FHSS also add security o data trasmissio betwee devices sice it makes it harder to eavesdrop. O the other had the low trasmissio power prevets the trasmissio to propagate far ad makes it harder to cut betwee the trasmissio. The iformatio o a BT packet ca be protected by ecryptio. Oly the packet payload is ecrypted, ever the access code ad the packet header. The ecryptio is doe with a stream cipher E0, which is sychroised for each payload. 2.1 Security Architecture The Bluetooth architecture is show i figure 1. The security maager stores iformatio about the security of services ad devices. It decides o acceptig the access or discoectio ad requires autheticatio ad ecryptio if they are eeded. Security maager also iitiates settig up a trusted relatioship ad pairig ad asks for PIN code from the user. 2.2 Security Levels Bluetooth has several differet security levels that ca be defied for devices ad services. All the devices get a status whe they coect the first time to aother device Device Trust Level The devices ca have two trust levels; trusted ad utrusted. The trusted level requires a fixed ad trusted relatioship ad it has urestricted access to all services. The device has to be previously autheticated. The utrusted device does t have fixed relatioship ad its access to services is limited. A utrusted device ca also have a fixed relatioship, but it s ot cosidered as trusted. A ew device is labelled as ukow device ad it is always utrusted Security Modes Bluetooth has three differet security modes build i it ad they are as follows: Security Mode 1 A device will ot iitiate ay security. A o-secure mode. [12] Security Mode 2 A device does ot iitiate security procedures before chael establishmet o L2CAP level This mode allows differet ad flexible access policies for applicatios, especially ruig applicatios with differet security requiremets i parallel. A service level eforced security mode. [12] Security Mode 3 A device iitiates security procedures before the lik set-up o LPM level is completed. A lik level eforced security mode. [12] This paper exploits most the security mode 2.
3 2.2.3 Security Level of Services The eed for authorisatio, autheticatio ad ecryptio chages. Whe the coectio is set there are differet levels of security where the user ca choose from. The security level of a service is defied by three attributes: Authorisatio required: Access is oly grated automatically to trusted devices or utrusted devices after a authorisatio procedure. [4 pg. 15] Autheticatio required: Before coectig to the applicatio, the remote device must be autheticated. [4 pg. 15] Ecryptio Required: The lik must be chaged to ecrypted mode, before access to the service is possible. [4 pg. 15] O the lowest level the services ca be set to be accessible to all devices. Usually there is a eed for restrictios so the user ca set the service so that it eeds autheticatio. Whe the highest level of security is eeded the service ca require authorisatio ad autheticatio. At this level trusted device has access to the services, but utrusted device eeds maual authorisatio. 2.3 Lik Layer At the lik layer, autheticatio of the peers ad ecryptio of the iformatio maitai security. For basic security we eed a devices uique public address (BD_ADDR), two secret keys (autheticatio keys ad ecryptio key) ad a radom umber geerator. BD_ADDR is used i the autheticatio process. Whe a challege is give. The device has to respose with it s ow challege that is based o the icomig challege, its BD_ADDR ad a lik key shared with the two devices. Other devices BD_ADDRs are stored i the device database for further use. 2.4 Radom umber Geeratio Each Bluetooth device has a radom umber geerator to be used i the security fuctios. This geerator is usually implemeted with software. BT devices use radom umbers for cotactig other devices ad for the autheticatio ad ecryptio. 3.1 Lik key There are four lik keys to cover the differet applicatios it is used for. All the keys are 128-bit radom umbers ad are either temporary or semi-permaet. Uit key, K A, is derived at the istallatio of the Bluetooth device from a uit A. The storage of K A requires little memory space ad is ofte used whe device has little memory or whe the device should be accessible to a large group of users. Combiatio key, K AB, is derived from two uits A ad B. This key is geerated for each pair of devices ad is used whe more security is eeded. This requires more memory, sice device has to store oe combiatio key for each coectio it has. The master key, K master, is used whe the master device wats to trasmit to several devices at oes. It over rides the curret lik key oly for oe sessio. The iitialisatio key, K iit, is used i the iitialisatio process. This key protects iitialisatio parameters whe they are trasmitted. This key is formed from a radom umber, a L-octet PIN code, ad the BD_ADDR of the claimat uit. 3.2 Ecryptio key Ecryptio key is derived from the curret lik key. Each time ecryptio is eeded the ecryptio key will be automatically chaged. The purpose of separatig the autheticatio key ad ecryptio key is to facilitate the use of a shorter ecryptio key without weakeig the stregth of the autheticatio procedure. [1 pg. 152] 3.3 PIN code This is a umber, which ca be fixed or selected by the user. The legth is usually 4 digits, but it ca be aythig betwee 1 to 16 octets. The user ca chage it whe it wats to ad this adds security to the system. The PIN ca be used eterig it ito oe device (fixed PIN), but it is safer to eter it to both uits. Example the latter oe ca be used whe there is a laptop ad a phoe to be coected. 3. KEY MANAGEMENT There are several kids of keys i the Bluetooth system to esure secure trasmissio. The most importat key is the lik key, which is used betwee two BT devices for autheticatio purpose. Usig the lik key a ecryptio key is derived. This secures the data of the packet ad is regeerated for all ew trasmissios. Figure 2. Ecryptio ad key cotrol [5]
4 3.4 Key Geeratio ad Iitialisatio The exchage of the keys takes place durig a iitialisatio phase, which has to be carried out separately for each two uits that wat to implemet autheticatio ad ecryptio. All iitialisatio procedures cosists of the followig five parts: - Geeratio of a iitialisatio key - Autheticatio - Geeratio of lik key - Lik key exchage - Geeratig of ecryptio key i each uit [1 pg. 153] After this procedure the coectio is build or the lik ca be aborted. 4. AUTHENTICATION Autheticatio starts by issuig a challege to aother device ad it has to the sed a respose to that challege which is based o the challege, it s BD_ADDR ad lik key shared betwee them. After autheticatio, ecryptio may be used to commuicate. [10] Without kowig the PIN, oe uit ca t logo to the other uit if autheticatio is activated. To make matters easier, the PIN ca be stored somewhere iside the uit (i Memory/Hard Drive etc.) so if you wish to establish the coectio, a user may ot have to maually type i the PIN (Note: the level of security is oe i this case). [14] Bluetooth uses a challege-respose scheme i which a Verifier (Uit A) Claimat (Uit B) AU_RAND A BD_RAND B Lik key ACO E 1? = AU_RAND A Figure 3. Challege-respose for BT [based o 1] claimat s kowledge of a secret key is checked through a 2-move protocol usig symmetric secret keys. [1 pg. 169] It has bee represeted i figure 3. The uit A seds a radom iput, deoted by AU_RAND A, with a E 2 AU_RAN BD_RAN Lik key ACO autheticatio code, deoted by E1 for the uit B. Uit B calculates as stated i Figure 4 ad returs the result to uit A. Uit A will derive (i figure 4) ad will autheticate the Uit B if ad are equal. E1 cosist of the tuple AU_RAND A ad the BT device address (BD_ADDR) of the claimat. O each autheticatio a ew AU_RAND A (a radom umber) is issued. [1 pg. 169] The challege-respose scheme for the symmetric keys used i the bluetooth are show i figure 4. The applicatio idicates who has to be autheticated by whom. Certai applicatios oly require a oe-way autheticatio. However, i some peer-to-peer commuicatios oe might prefer a mutual autheticatio i which each uit is subsequetly the challeger (verifier) i two autheticatio procedures. The Lik Maager coordiates the idicated autheticatio prefereces by the applicatio to determie i which directio(s) the = Verifier E(key,IDB,RAND) autheticatio(s) has to take place. [1 pg. 170] 5. ENCRYPTION Claimat (User A) (User B) RAND Checks: = = E(key,IDB,RAND) Figure 4. Challege-respose for symmetric key system. [based o 1] The Bluetooth specificatio 1.0 describes the lik ecryptio algorithm as a stream cipher usig 4 LFSR (liear feedback shift registers). The sum of the width of the LFSR is 128, ad the spec says the effective key legth is selectable betwee 8 ad 128 bits. This arragemet allows Bluetooth to be used i coutries with regulatios limitig ecryptio stregth, ad "facilitate a future upgrade path for the security without the eed for a costly redesig of the algorithms ad ecryptio hardware" accordig to the Bluetooth specificatio. Key geeratio ad autheticatio seems to be usig the 8- roud SAFER+ ecryptio algorithm. [3] [6] The iformatio available suggests that Bluetooth security will be adequate for most purposes; but users with higher security requiremets will eed to employ stroger algorithms to esure the security of their data. [3] [6]
5 6. SECURITY LIMITATIONS Bluetooth security is ot all satisfactory ad it has some limitatios. First about the autheticatio: oly the device is autheticated, ot the user. If this feature is eeded it have to be accomplished with applicatio level security. Secodly BT does t defie authorisatio separately for each service either. This ca be applied i the Bluetooth architecture without chagig the BT protocol stack, but chages i the security maager ad the registratio processes would be ecessary. At the momet BT oly allows access cotrol at coectio set-up. The access check ca be asymmetric, but oce a coectio is established, data flow is i priciple bi-directioal. It is ot possible withi the scope of this architecture to eforce uidirectioal traffic. [4 pg. 11] There is o support of legacy applicatios: It will ot make calls to the security maager. Istead Bluetoothaware adapter applicatio is required to make securityrelated calls to the BT security maager o behalf of the legacy applicatio. [4 pg. 11] 7. CONCLUSIONS AND FURTHER WORK Bluetooth security is ot complete, but is seems like it was t meat to be that way. More security ca be accomplished easily with additioal software that is all ready available. More detailed iformatio ca be foud from chapter 14 of the Specificatio of the Bluetooth System. Further work will be doe i the other semiar papers o the Bluetooth security. 8. REFERENCES 1. Specificatio of the Bluetooth System, volume 1B, December 1 st Kowledge Base for Bluetooth iformatio 3. Geeral iformatio o bluetooth 4. Thomas Muller, Bluetooth WHITE PAPER: Bluetooth Security Architecture, Versio 1.0, 15July Aikka Aalto, Bluetooth bluetooth.html 6. Bluetooth iformatio, 7. Oraskari, Jyrki, Bluetooth How Stuff Works, iformatio o BT 9. Iformatio o Bluetooth (Official Homepage) Bluetooth Basebad Bluetooth - a iferior LAN cocept? htm 12. Bluetooth Glossary Autheticatio process i Bluetooth Autheticatio i Bluetooth
Baan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationBluetooth Basics. Bluetooth Overview
Bluetooth Basics Bluetooth Overview Wireless techology for short-rage voice ad data commuicatio Low-cost ad low-power Provides a commuicatio platform betwee a wide rage of smart devices Not limited to
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationWYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET
WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationK-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns
K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationSecure Software Upload in an Intelligent Vehicle via Wireless Communication Links
Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002
ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationChapter 4 The Datapath
The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that
More informationThe CCITT Communication Protocol for Videophone Teleconferencing Equipment
The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract
More informationPrivate Key Cryptography. TELE3119: Week2
Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationMessage Authentication Codes. Reading: Chapter 4 of Katz & Lindell
Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.
More informationBAAN IVb/c. Structure, master data, and configuration of BEMIS
BAAN IVb/c Structure, master data, ad cofiguratio of BEMIS A publicatio of: Baa Developmet BV POBox 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet BV 1998 All rights reserved
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationCHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs
CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics
More informationBezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only
Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationCTx / CTx-II. Ultra Compact SD COFDM Concealment Transmitters. Features: Options: Accessories: Applications:
Ultra Compact SD COFDM Cocealmet Trasmitters Features: Optimized for size Broadcast quality video H.264 Part 10 2 moo audio chaels Very low power cosumptio Remote cotrol via micro USB Bluetooth * Adroid
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationSERIAL COMMUNICATION INTERFACE FOR ESA ESTRO
Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationApplication Notes for Configuring Dasan Electron Headsets from JPL Europe with Avaya 9600 Series IP Deskphones using a DA-30 Cord Issue 1.
Avaya Solutio & Iteroperability Test Lab Applicatio Notes for Cofigurig Dasa Electro Headsets from JPL Europe with Avaya 9600 Series IP Deskphoes usig a DA-30 Cord Issue 1.0 Abstract These Applicatio Notes
More informationNVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE
NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationSECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationParabolic Path to a Best Best-Fit Line:
Studet Activity : Fidig the Least Squares Regressio Lie By Explorig the Relatioship betwee Slope ad Residuals Objective: How does oe determie a best best-fit lie for a set of data? Eyeballig it may be
More informationUSB TO PARALLEL USB to DB25 Parallel Adapter Cable
USB TO PARALLEL USB to DB25 Parallel Adapter Cable User Maual XUPP25 www.hamletcom.com Dear Customer, thaks for choosig a Hamlet product. Please carefully follow the istructios for its use ad maiteace
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationMR-2010I %MktBSize Macro 989. %MktBSize Macro
MR-2010I %MktBSize Macro 989 %MktBSize Macro The %MktBSize autocall macro suggests sizes for balaced icomplete block desigs (BIBDs). The sizes that it reports are sizes that meet ecessary but ot sufficiet
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationIntroduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationOperating System Concepts. Operating System Concepts
Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationIn this chapter, you learn the concepts and terminology of databases and
A Itroductio to Database Developmet I this chapter, you lear the cocepts ad termiology of databases ad how to desig the tables that your forms ad reports will use. Fially, you build the actual tables used
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationWindows Server 2008 R2 networking
Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationApplication Notes for configuring Agent AG Headsets from Corporate Telecommunications with Avaya one-x Communicator using a USB 2.0 Chord Issue 1.
Avaya Solutio & Iteroperability Test Lab Applicatio Notes for cofigurig Aget AG Headsets from Corporate Telecommuicatios with Avaya oe-x Commuicator usig a USB 2.0 Chord Issue 1.0 Abstract These Applicatio
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationL5355 Modbus Plus Communications Interface
L5355 Modbus Plus Commuicatios Iterface Techical Maual HA470897 Issue 2 Copyright SSD Drives Ic 2005 All rights strictly reserved. No part of this documet may be stored i a retrieval system, or trasmitted
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationOperating manual for message text display reporter 690
1.95.3 (ed 4.95) Operatig maual for message text display reporter 690 ! Attetio: Read this! Dear customer, the maufacturer is ot liable for ay damage caused as a result of o-observace of the operatig maual.
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationNetwork Time Protocol (NTP)
Network Time Protocol (NTP) Quick ad Dirty for AfNOG 2018 (Michuki Mwagi) Origial slides by Ayitey Bulley About NTP Network Time Protocol project http://tp.org NTP is a protocol desiged to sychroize the
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationNetwork Time Protocol (NTP)
Network Time Protocol (NTP) Quick ad Dirty for AfNOG 2017 (Ayitey Bulley) About NTP Network Time Protocol project http://tp.org NTP is a protocol desiged to sychroize the clocks of computers over a etwork.
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationSchema for the DCE Security Registry Server
Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.
More information1&1 Next Level Hosting
1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat
More informationLecture 10 Collision resolution. Collision resolution
Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags
More informationChapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4
More informationA Proposal of One-Time Biometric Authentication
A Proposal of Oe-Time Biometric Autheticatio Yoshifumi Ueshige* *Istitute of Systems & Iformatio Techologies/ KYUSHU Fukuoka City, Fukuoka Pref., JAPAN Kouichi Sakurai*+ +The Graduate School of Iformatio
More informationUser Guide. Using Caliber Datamart
User Guide Usig Caliber Datamart 11.1.0 Copyright 2013 Micro Focus. All Rights Reserved. Portios Copyright 1998-2009 Borlad Software Corporatio (a Micro Focus compay). All other marks are the property
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationTELETERM M2 Series Programmable RTU s
Model C6xC ad C6xC Teleterm MR Radio RTU s DATASHEET Cofigurable Iputs ad Outputs 868MHz or 900MHz radio port 0/00 Etheret port o C6Cx ISaGRAF 6 Programmable microsd Card Loggig Low power operatio Two
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationMAC Throughput Improvement Using Adaptive Contention Window
Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio
More informationOperating manual for message text display reporter 680
1.95.2. (ed 4.95) Operatig maual for message text display reporter 680 ! Attetio: Read this! Dear customer, the maufacturer is ot liable for ay damage caused as a result of o-observace of the operatig
More informationLecture 18. Optimization in n dimensions
Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solutio & Iteroperability Test Lab Applicatio Notes for Cofigurig JPL X400 Cordless DECT Headset with Hadset Lifter from JPL Limited with Avaya 9400 Series Digital Telephoes Issue 1.0 Abstract These
More informationPrinceton Instruments Reference Manual
Priceto Istrumets Referece Maual Improvisio, Viscout Cetre II, Uiversity of Warwick Sciece Park, Millbur Hill Road, Covetry. CV4 7HS Tel: 0044 (0) 24 7669 2229 Fax: 0044 (0) 24 7669 0091 e-mail: admi@improvisio.com
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More information