Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols

Size: px
Start display at page:

Download "Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols"

Transcription

1 Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols Oxford University Press All rights reserved. 1

2 SyncML provisions for an open standard Representation protocol Synchronization protocol Ways of formatting the document Ways of description of architecture for synchronization Ways for binding an application with the well known transport protocols Oxford University Press All rights reserved. 2

3 Ways of binding SyncML codes bind the WAP, Bluetooth, or IrDA protocols and a mobile application run for synchronization and synchronize with Bluetooth, WAP 2.0, or IrDA level 5 connection using a SyncML client and engine Oxford University Press All rights reserved. 3

4 SyncML provisions for an open standard Interfaces for binding the programming languages which are very common, for example, Java, C, and C++. Prototype implementation for using the SyncML Oxford University Press All rights reserved. 4

5 SyncML programming Based on two protocols the SyncML representation protocol and the SyncML synchronization protocol The SyncML representation protocol defines the representation format of SyncML messages which are in XML It gives details about the inner working of the SyncML framework Oxford University Press All rights reserved. 5

6 SyncML Message SyncML protocol specifies that a message has SyncHdr and SyncBody, with meta info as well as device info present within SyncHdr Meta info is placed between the start and end tags <MetInf> and </MetInf> and device info between <DevInfo> and </DevInfo> Oxford University Press All rights reserved. 6

7 Universal Resource Identifier (URI) A full path specification for a device resource Assume a PIM data structured like a tree Oxford University Press All rights reserved. 7

8 Universal Resource Identifier (URI) The parent PIM data object is the root object At the branches of the root object, there are objects called daughter data record copies, these are calendar, address_book, and tasks_to_do Oxford University Press All rights reserved. 8

9 Address_book object Has the branches having the contacts. Each of the contacts object has branches and daughter objects which may be leaves The leaves are name, office, home, mobile and fax numbers, home and office addresses, web addresses, and IDs Oxford University Press All rights reserved. 9

10 Root object of device PIM data dev_pim_data Assume that the root object of device PIM data dev_pim_data Server PIM data PIM_data The root PIM_data hierarchy at the server PIM_data address_book contacts Raj Kamal telnum_rk Oxford University Press All rights reserved. 10

11 PIM data object address_book branches Further has the object Contacts Contacts has the object Raj Kamal Raj Kamal object has a leaf, the resource telephone number, telnum_rk Oxford University Press All rights reserved. 11

12 PIM data object address_book telnum_rk contains the telephone number data in digits, where resource refers to an entity used in the computations or for synchronization For an API, the resource is at the leaf during computations using the telnum_rk Oxford University Press All rights reserved. 12

13 Protocol specification of the URI Used to identify any resource at the object PIM_data/address_book/contacts/Raj Kamal is URI for identifying a resource at the Contacts at the server PIM_data/address_book/contacts/Raj Kamal/telNumRK is URI for the resource at the leaf telnum_rk Oxford University Press All rights reserved. 13

14 Protocol specification of the URI If the object Raj Kamal has two branches, telnum_rk and address_rk, then the URI for the leaf object address_rk will be PIM_data/contacts/Raj Kamal/address_RK, where address_rk has the text of address Oxford University Press All rights reserved. 14

15 Commands Create, Delete, Add, Update, Sync, Alert, Atomic, Search, Read, Get, Exec, Put, Copy, Results, Map, and Status Refer Table 9.1 for the meaning of the commands Alert command is a special SyncML feature by which the server alerts the client Oxford University Press All rights reserved. 15

16 Sample Code <SyncBody> <Status> <Cmd>SyncHdr</Cmd> <CmdRef>0</CmdRef> <MsgRef>1</MsgRef> <TargetRef> IMEI:49 800</TargetRef> <SourceRef> </SourceRef> <Data>212</Data> </Status> Oxford University Press All rights reserved. 16

17 Sample Code <Status> <Cmd>Alert</Cmd> <CmdRef>1</CmdRef> <MsgRef>1</MsgRef> <!- - Assume that Device contact data object at the device is dev_contacts, which was the target defined at the header and assume that new contact added at the server is URI./contacts/Raj Kamal and Alert is sent to client device - - > Oxford University Press All rights reserved. 17

18 Sample Code <TargetRef>./dev_contacts</TargetRef> <SourceRef>./contacts/ Raj Kamal </SourceRef> <Data>200</Data> </Status> </SyncBody> Oxford University Press All rights reserved. 18

19 Security For secure synchronization of messages between source and destination, a message M sent from a source to destination needs verification of its integrity and authenticity of the source Oxford University Press All rights reserved. 19

20 keyed hash message authentication code (HMAC) HMAC source of message M sent along with M Generated after computations at the source At the destination, the HMAC dest is regenerated Oxford University Press All rights reserved. 20

21 Keyed hash message authentication code (HMAC) If the HMAC dest computed at the destination matches with the received HMAC source, the integrity of M stands verified Oxford University Press All rights reserved. 21

22 Computations for HMAC Done using M, a secret key S and an iterative hash function Iterative function is a function repeatedly operated on the operand Two of the several iterative hash functions can be used SHA-1 (secure hash algorithm-1) and MD-5 (message digest algorithm-5) Oxford University Press All rights reserved. 22

23 Handling Large Objects Using <MoreData> tag Wireless transmission, there are interruptions Therefore, a large data object should be broken into many chunks <MoreData> tag for transmitting large object data in chunks Oxford University Press All rights reserved. 23

24 Handling Large Objects Using <MoreData> tag Using <MoreData> tag, a large object can be exchanged by dividing it into data chunks. Each chunk has a start tag <MoreData> and an end tag </Moredata> Oxford University Press All rights reserved. 24

25 Handling Large Objects Using <MoreData> tag This indicates that next chunk expected in next session The receiving objects join the chucks to recreate a large object Oxford University Press All rights reserved. 25

26 Use of status codes in case of Errors SyncML protocol defines error codes in the event of data conflict, incomplete document, and other errors that occur during synchronization Status codes between 500 and 599 are received for response from the receiver For example,code 511 which implies server failure Oxford University Press All rights reserved. 26

27 Example of status codes For example, assume that a status code sent by the receiver of SyncML message is error code 501 This implies that the command could not be implemented at the receiver because the SyncML client or server did not support it for any of the resources Oxford University Press All rights reserved. 27

28 Setup and Synchronization phases SyncML DM protocol specifies a standard method for set up and synchronization Device management one-way synchronization of the device from the server Oxford University Press All rights reserved. 28

29 Setup and Synchronization phases The server sets and updates the data on the client device It also requests for the device data, for example, data for enabling device authentication by it Oxford University Press All rights reserved. 29

30 Setup and Synchronization phases Data exchange occurs in phases using packages 0 4 A package is a SyncML message containing XML document Phases of data exchanges in packages 0 2 are called setup phases Phases of data exchanges in packages 3 and 4 are called synchronization or management phases Oxford University Press All rights reserved. 30

31 Setup and Synchronization phases Oxford University Press All rights reserved. 31

32 Summary Representation protocol Synchronization protocol Ways of formatting the document Ways of description of architecture for synchronization Interfaces for Binding Prototype implementation Oxford University Press All rights reserved. 32

33 Summary Universal resource Identifier by full path from root to leaf Commands for message exchanges for synchronization and client-server exchanges HMAC security Oxford University Press All rights reserved. 33

34 Summary <MoreData> for handling large objects Four phases for set-up and synchronization Oxford University Press All rights reserved. 34

35 End of Lesson 10 SyncML Protocol Oxford University Press All rights reserved. 35

Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features

Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features Oxford University Press 2007. All rights reserved. 1 A mobile computing system Consists of (i) mobile device, (ii) personal

More information

SyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1

SyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1 SyncML Implementation Conformance Statement (SICS) 1 of 20 Pages SyncML Implementation Conformance Statement Proforma SyncML DataSync V1.1.1 Abstract The SyncML Implementation Conformance Statement is

More information

SyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1

SyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1 SyncML Implementation Conformance Statement (SICS) 1 of 19 Pages SyncML DataSync (V1.1.1) Version 0.4 SyncML Implementation Conformance Statement Proforma SyncML DataSync V1.1.1 Abstract The SyncML Implementation

More information

OMA Device Management Protocol

OMA Device Management Protocol OMA Device Management Protocol Candidate Version 1.2 07 Jun 2005 Open Mobile Alliance OMA-TS-DM-Protocol-V1_2-20050607-C OMA-TS-DM-Protocol-V1_2-20050607-C Page 2 (49) Use of this document is subject to

More information

Client Profile of OMA Device Management v1.3

Client Profile of OMA Device Management v1.3 Client Profile of v1.3 Candidate Version 1.0 30 Apr 2013 Open Mobile Alliance OMA-PD-DM_Client_Profile-V1_3-20130430-C OMA-PD-DM_Client_Profile-V1_3-20130430-C Page 2 (18) Use of this document is subject

More information

SyncML Device Management Protocol. Version 1.1

SyncML Device Management Protocol. Version 1.1 1 of 37 Pages SyncML Device Management Protocol Version 1.1 Abstract This document specifies the SyncML Device Management Protocol. This protocol is used to transfer management actions between the client

More information

SyncML Implementation Conformance Statement

SyncML Implementation Conformance Statement SyncML Implementation Conformance Statement 1 of 171111117177 Pages http://www.syncml.org/docs/syncml_ics_v0810_20010161202.doc Version 10.087 2001-06-202001-06-01 SyncML Implementation Conformance Statement

More information

Data Synchronization in Mobile Computing Systems Lesson 12 Synchronized Multimedia Markup Language (SMIL)

Data Synchronization in Mobile Computing Systems Lesson 12 Synchronized Multimedia Markup Language (SMIL) Data Synchronization in Mobile Computing Systems Lesson 12 Synchronized Multimedia Markup Language (SMIL) Oxford University Press 2007. All rights reserved. 1 Language required to specify the multimodal

More information

1.2. Terminal Configuration Use-Cases SyncML Device Management

1.2. Terminal Configuration Use-Cases SyncML Device Management MOBILE DEVICE MANAGEMENT WITH SYNCML Alan Bok, Alan.Bok@motorola.com, Sandeep Adwankar, Sandeep.Adwankar@motorola.com, John Grosspietsch, John.Grosspietsch@motorola.com, Venu Vasudevan, venuv@labs.mot.com,

More information

Enabler Test Specification for Device Management

Enabler Test Specification for Device Management Enabler Test Specification for Device Management Candidate Version 1.2 17 Jul 2007 Open Mobile Alliance OMA-ETS-DM-V1_2-20070717-C OMA-ETS-DM-V1_2-20070717-C Page 2 (161) Use of this document is subject

More information

isync SyncML Guide

isync SyncML Guide isync SyncML Guide 2006-07-14 Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form

More information

SyncML Implementation Conformance Statement

SyncML Implementation Conformance Statement 1 of 13 Pages SyncML Implementation Conformance Statement Proforma Version 1.0 Abstract The SyncML Implementation Conformance Statement is designed to be used by vendors to show their level of conformance

More information

WAP/ WML : Wireless Protocol wireless protocol

WAP/ WML : Wireless Protocol wireless protocol Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity

More information

[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation [MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,

More information

Enabler Test Specification for Device Management

Enabler Test Specification for Device Management Enabler Test Specification for Device Management Candidate Version 1.3 08 Dec 2015 Open Mobile Alliance OMA-ETS-DM-V1_3-20151208-C OMA-ETS-DM-V1_3-20151208-C Page 2 (175) Use of this document is subject

More information

Enabler Test Specification for Device Management

Enabler Test Specification for Device Management Enabler Test Specification for Device Management Candidate Version 1.2 19 Apr 2007 Open Mobile Alliance OMA-ETS-DM-V1_2-20070419-C OMA-ETS-DM-V1_2-20070419-C Page 2 (106) Use of this document is subject

More information

SyncML Sync Protocol, version 1.0

SyncML Sync Protocol, version 1.0 1 of 60 Pages, version 1.0 Abstract This specification defines synchronization protocol between a SyncML client and server in form of message sequence charts. It specifies how to use the SyncML Representation

More information

Enabler Test Specification for Device Management

Enabler Test Specification for Device Management Enabler Test Specification for Device Management Candidate Version 1.2 06 Jul 2006 Open Mobile Alliance OMA-ETS-DM-V1_2-20060706-C OMA-ETS-DM-V1_2-20060706-C Page 2 (87) Use of this document is subject

More information

SyncML Representation Protocol, Data Synchronization Usage

SyncML Representation Protocol, Data Synchronization Usage SyncML Representation Protocol, Data Synchronization Usage Approved Version 1.2.1 10 Aug 2007 Open Mobile Alliance OMA-TS-DS_DataSyncRep-V1_2_1-20070810-A OMA-TS-DS_DataSyncRep-V1_2_1-20070810-A Page 2

More information

Continues the Technical Activities Originated in the SyncML Initiative

Continues the Technical Activities Originated in the SyncML Initiative SyncML Device Management Security, Version 1.1.2 Approved Version 09-December-2003 Open Mobile Alliance OMA-SyncML-DMSecurity-V1_1_2-20031209-A Continues the Technical Activities Originated in the SyncML

More information

SyncML Overview. Noel Poore, Psion Computers PLC

SyncML Overview. Noel Poore, Psion Computers PLC SyncML Overview Noel Poore, Psion Computers PLC Data synchronization is a field of growing importance. As the number of mobile devices increases rapidly in the next few years, more and more data is going

More information

ETSI TS V5.0.0 ( )

ETSI TS V5.0.0 ( ) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Wide Area Network Synchronization () GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS

More information

Synchronization. Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory. Abstract

Synchronization. Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory. Abstract Synchronization Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory Kari.Pihkala@hut.fi Abstract This paper discusses various synchronization methods for mobile devices. It gives an

More information

Data Synchronization in Mobile Computing Systems Lesson 05 Synchronization Engine and Mobile Agent for Synchronization

Data Synchronization in Mobile Computing Systems Lesson 05 Synchronization Engine and Mobile Agent for Synchronization Data Synchronization in Mobile Computing Systems Lesson 05 Synchronization Engine and Mobile Agent for Synchronization Oxford University Press 2007. All rights reserved. 1 Synchronizer (synchronization

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Deployment of software components: Application to Wireless System

Deployment of software components: Application to Wireless System Deployment of software components: Application to Wireless System KOUNINEF Belkacem 1, BOUZERITA Mohamed 2 Institut National des Télécommunications et des Technologies de l Information et de la Communication

More information

Message Authentication and Hash function 2

Message Authentication and Hash function 2 Message Authentication and Hash function 2 Concept and Example 1 SHA : Secure Hash Algorithm Four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative,

More information

Version 1.0.1

Version 1.0.1 1 of 19 Pages SyncML OBEX Binding Abstract This document describes how to use SyncML over OBEX. The document uses the primitives and methods defined in the OBEX specification V1.2 as defined in [1]. The

More information

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending

More information

OMA Device Management Security

OMA Device Management Security OMA Device Management Security Approved Version 1.2.1 17 Jun 2008 Open Mobile Alliance OMA-TS-DM_Security-V1_2_1-20080617-A OMA-TS-DM_Security-V1_2_1-20080617-A Page 2 (27) Use of this document is subject

More information

Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA

Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA Oxford University Press 2007. All rights reserved. 1 Features of a File System Hierarchical organization Storage Modification

More information

Lesson 9 Programming Arduino Hash, Encryption and Decryption Functions Usages (Examples 9.8 and 9.9)

Lesson 9 Programming Arduino Hash, Encryption and Decryption Functions Usages (Examples 9.8 and 9.9) Lesson 9 Programming Arduino Hash, Encryption and Decryption Functions Usages (Examples 9.8 and 9.9) 1 Authentication and Encryption Authentication using a secret key and a hash function in place of communicating

More information

OMA Device Management Security

OMA Device Management Security OMA Device Management Security Candidate Version 1.3 25 May 2010 Open Mobile Alliance OMA-TS-DM_Security-V1_3-20100525-C OMA-TS-DM_Security-V1_3-20100525-C Page 2 (30) Use of this document is subject to

More information

SyncML OBEX Binding. Candidate Version Apr Open Mobile Alliance OMA-TS-SyncML_OBEXBinding-V1_ C

SyncML OBEX Binding. Candidate Version Apr Open Mobile Alliance OMA-TS-SyncML_OBEXBinding-V1_ C SyncML OBEX Binding Candidate Version 1.2 09 Apr 2005 Open Mobile Alliance OMA-TS-SyncML_OBEXBinding-V1_2-20050509-C OMA-TS-SyncML_OBEXBinding-V1_2-20050509-C Page 2 (30) Use of this document is subject

More information

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools

More information

Level 3 Media Portal API Guide

Level 3 Media Portal API Guide Level 3 Media Portal API Guide Updated June 9, 2017 Contents Media Web Services (API)... 1 Getting Started with Media Portal APIs... 3 Using APIs... 3 Determining the Access Group ID... 3 API Interfaces...

More information

Content Synchronization

Content Synchronization Content Synchronization T-110.5120 Next generation wireless networks Helsinki University of Technology Jin ZhiHua (77168L) Chia PernHui (77146H 46H) Introduction Overview Why do we need sync? What Sync

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Data Synchronization in Mobile Computing Systems Lesson 03 Domain dependent Specific Rules and Conflict resolution Strategies

Data Synchronization in Mobile Computing Systems Lesson 03 Domain dependent Specific Rules and Conflict resolution Strategies Data Synchronization in Mobile Computing Systems Lesson 03 Domain dependent Specific Rules and Conflict resolution Strategies Oxford University Press 2007. All rights reserved. 1 1. Data synchronization

More information

In this chapter we have described DM Configuration both in Policy Builder and Control Center.

In this chapter we have described DM Configuration both in Policy Builder and Control Center. In Policy Builder, page 1 In Control Center, page 15 Using REST APIs, page 37 In Policy Builder In this chapter we have described both in Policy Builder and Control Center. Note Any DM configuration changes

More information

MS-FSSHTTP. Simon Clarke, SharePoint/OneDrive

MS-FSSHTTP. Simon Clarke, SharePoint/OneDrive MS-FSSHTTP Simon Clarke, SharePoint/OneDrive Agenda What is MS-FSSHTTP? Requests File Model and Co-auth Storage/Sync Model Storage Graph Object Graph Application Schema Sync Example The documents (MS-FSSHTTP,

More information

Configuring the Cisco APIC-EM Settings

Configuring the Cisco APIC-EM Settings Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page

More information

win Grey Matter India - An Idhasoft Company Idhasoft is a global world-class

win Grey Matter India - An Idhasoft Company Idhasoft is a global world-class Streaming Location-Based Wireless Mobile Unified Technological Spying Messaging Network Multimedia Launcher Expertise dows logger, Shell' the from that capable application proximity for enhances users

More information

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section

More information

Criptext s end-to-end encryption system. Technical white paper

Criptext s end-to-end encryption system. Technical white paper Criptext s end-to-end encryption system Technical white paper Contents Introduction 3 Sending Emails 7 Terms 4 Sending Attachments 8 Client Registration Initiating Session Setup 5 Linking new devices 9

More information

Project Title REPRESENTATION OF ELECTRICAL NETWORK USING GOOGLE MAP API. Submitted by: Submitted to: SEMANTA RAJ NEUPANE, Research Assistant,

Project Title REPRESENTATION OF ELECTRICAL NETWORK USING GOOGLE MAP API. Submitted by: Submitted to: SEMANTA RAJ NEUPANE, Research Assistant, - 1 - Project Title REPRESENTATION OF ELECTRICAL NETWORK USING GOOGLE MAP API Submitted by: SEMANTA RAJ NEUPANE, Research Assistant, Department of Electrical Energy Engineering, Tampere University of Technology

More information

FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely

More information

Office Co-Authoring Chalk Talk (MS-FSSHTTP)

Office Co-Authoring Chalk Talk (MS-FSSHTTP) Office Co-Authoring Chalk Talk (MS-FSSHTTP) Office 365 DevDays 2017.11.4-6 上海 Jinghui Zhang Software Engineer @Microsoft What is MS-FSSHTTP? Requests 目录 CONTENTS File Model and Co-auth Storage/Sync Model

More information

IPSec. Overview. Overview. Levente Buttyán

IPSec. Overview. Overview. Levente Buttyán IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet

More information

SIP Compliance APPENDIX

SIP Compliance APPENDIX APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

In this chapter we have described DM Configuration both in Policy Builder and Control Center.

In this chapter we have described DM Configuration both in Policy Builder and Control Center. In Policy Builder, page 1 In Control Center, page 15 Using REST APIs, page 38 In Policy Builder In this chapter we have described both in Policy Builder and Control Center. Note Any DM configuration changes

More information

OMA Device Management Tree and Description Serialization

OMA Device Management Tree and Description Serialization OMA Device Management Tree and Description Serialization Approved 1.2 09 Feb 2007 Open Mobile Alliance OMA-TS-DM_TNDS-V1_2-20070209-A OMA-TS-DM_TNDS-V1_2-20070209-A Page 2 (19) Use of this document is

More information

WAP-Sync-Spec. Data Synchronisation Specification Version 30-May Wireless Application Protocol WAP-234-SYNC a

WAP-Sync-Spec. Data Synchronisation Specification Version 30-May Wireless Application Protocol WAP-234-SYNC a WAP-Sync-Spec Data Synchronisation Specification Version 30-May-2001 Wireless Application Protocol WAP-234-SYNC-20010530-a A list of errata and updates to this document is available from the WAP Forum

More information

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1 Configuring a VPN Using Easy VPN and an IPSec Tunnel This chapter provides an overview of the creation of Virtual Private Networks (VPNs) that can be configured on the Cisco 819, Cisco 860, and Cisco 880

More information

Communication in Broadband Wireless Networks. Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA

Communication in Broadband Wireless Networks. Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA Secure Multicast and Broadcast Communication in Broadband Wireless Networks Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA Agenda Network entry procedure for a mobile

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

StorageGRID Webscale 10.2

StorageGRID Webscale 10.2 StorageGRID Webscale 10.2 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:

More information

Introduction to Cisco TV CDS Software APIs

Introduction to Cisco TV CDS Software APIs CHAPTER 1 Cisco TV Content Delivery System (CDS) software provides two sets of application program interfaces (APIs): Monitoring Real Time Streaming Protocol (RTSP) Stream Diagnostics The Monitoring APIs

More information

OMA Device Management Standardized Objects

OMA Device Management Standardized Objects OMA Device Management Standardized Objects Candidate Version 1.3 25 May 2010 Open Mobile Alliance OMA-TS-DM_StdObj-V1_3-20100525-C [OMA-Template-Spec-20100101-I] OMA-TS-DM_StdObj-V1_3-20100525-C.doc Page

More information

CryptoAuthentication Firmware Protection

CryptoAuthentication Firmware Protection CryptoAuthentication Firmware Protection Atmel...Everywhere You Are...Securely September 09 1 CRYPTOAUTHENTICATION Device basics Agenda Keys and OTP fuses Operational block diagram Firmware protection

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

StorageGRID Webscale 10.0

StorageGRID Webscale 10.0 StorageGRID Webscale 10.0 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:

More information

VPN Ports and LAN-to-LAN Tunnels

VPN Ports and LAN-to-LAN Tunnels CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel

More information

By FaaDoOEngineers.com

By FaaDoOEngineers.com ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

ComponentSpace SAML v2.0 Configuration Guide

ComponentSpace SAML v2.0 Configuration Guide ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2017-2018. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration JSON... 1 Identity Provider

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

CSC 6575: Internet Security Fall 2017

CSC 6575: Internet Security Fall 2017 CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture

More information

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS COSC 301 Network Management Lecture 15: SSL/TLS and HTTPS Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 15: SSL/TLS and HTTPS 1 Today s Focus WWW WWW How to secure web applications?

More information

IPSec Site-to-Site VPN (SVTI)

IPSec Site-to-Site VPN (SVTI) 13 CHAPTER Resource Summary for IPSec VPN IKE Crypto Key Ring Resource IKE Keyring Collection Resource IKE Policy Resource IKE Policy Collection Resource IPSec Policy Resource IPSec Policy Collection Resource

More information

Lesson 5 Nimbits. Chapter-6 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 Nimbits. Chapter-6 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 Nimbits 1 Cloud IoT cloud-based Service Using Server at the Edges A server can be deployed at the edges (device nodes) which communicates the feeds to the cloud service. The server also provisions

More information

Lesson 5 Case Study: Connected RFIDs Supply Chain Monitoring Project. Chapter-12 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 5 Case Study: Connected RFIDs Supply Chain Monitoring Project. Chapter-12 L05: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 5 Case Study: Connected RFIDs Supply Chain Monitoring Project 1 Supply-chain Monitoring Process Supply-chain order verification, Automated reordering and Shipping (SCOVARS) operations 2 SCOVARS

More information

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Diagram illustrating how to sign a message Why do we use a one-way hash? How does a collision

More information

Example: Setting Up Basic Bridging and a VLAN for an EX Series Switch

Example: Setting Up Basic Bridging and a VLAN for an EX Series Switch Example: Setting Up Basic Bridging and a VLAN for an EX Series Switch Requirements EX Series switches use bridging and virtual LANs (VLANs) to connect network devices in a LAN desktop computers, IP telephones,

More information

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections: This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3

More information

Presented By: Niharjyoti Sarangi

Presented By: Niharjyoti Sarangi Presented By: Niharjyoti Sarangi 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT & WHY KEY FEATURES JXTA ARCHITECTURE JXTA LAYERS JXTA JARGONS JXTA PROTOCOLS JXTA SHELLS JXTA ADVANTAGES 2 AN OPEN P2P PROTOCOL

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on

More information

Device Management Implementation Guide for IoT Solutions

Device Management Implementation Guide for IoT Solutions Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 2.3 Stephen Ambrose 6/6/2016 Author(s) Group Phone # E-mail Stephen IoT Solutions +1 (512) 372-5420

More information

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University

More information

USER S GUIDE FOR NOKIA PC SUITE 6.2. Copyright Nokia. All rights reserved. 1/20

USER S GUIDE FOR NOKIA PC SUITE 6.2. Copyright Nokia. All rights reserved. 1/20 USER S GUIDE FOR NOKIA PC SUITE 6.2 1/20 Copyright 2002-2004 Nokia. All rights reserved. Legal Notice Copyright 2002-2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of

More information

Data-at-Rest Encryption

Data-at-Rest Encryption Data-at-Rest Encryption At-rest encryption in SwiftStack encrypts all object data, object etags (checksums), and any user metadata values set on objects. The feature is enabled by a cluster operator and

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Session Capabilities in OBEX

Session Capabilities in OBEX Session Capabilities in OBEX Version 0.14 July 16, 2002 Authors: David Suvak Contributors: Kevin Hendrix Extended Systems Extended Systems Revision History Revision Date Comments 0.1 30-May-01 Initial

More information

Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0

Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These Application Notes describe the steps to configure trunking

More information

IPSec Transform Set Configuration Mode Commands

IPSec Transform Set Configuration Mode Commands IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and

More information

IPv6 Support for LDAP

IPv6 Support for LDAP The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over an IP network. The feature module describes the

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

Auditing TPM Commands

Auditing TPM Commands Chapter 16 Auditing TPM Commands As used in the TPM, audit is the process of logging TPM command and response parameters that pass between the host and the TPM. The host is responsible for maintaining

More information

Structure of Management Information

Structure of Management Information Structure of Management Information Structure of Management Information' (SMI) defines the general framework within which MIBs can be defined and constructed (STD58) SMI identifies data types usable in

More information

ComponentSpace SAML v2.0 Configuration Guide

ComponentSpace SAML v2.0 Configuration Guide ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2004-2019. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration Options... 1 SAML Configuration

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Native SyncClient API 1.1 Programming Guide. Sync4j

Native SyncClient API 1.1 Programming Guide. Sync4j Native SyncClient API 1.1 Programming Guide Sync4j http://www.sync4j.org Table of Contents 1. Overview...3 1.1. SyncClient API Architecture... 3 1.2. Synchronization Overview... 4 1.3. Sync4j SyncClient

More information

JVA-563. Developing RESTful Services in Java

JVA-563. Developing RESTful Services in Java JVA-563. Developing RESTful Services in Java Version 2.0.1 This course shows experienced Java programmers how to build RESTful web services using the Java API for RESTful Web Services, or JAX-RS. We develop

More information

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates 4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order

More information

Device Management Implementation Guide for IoT Solutions

Device Management Implementation Guide for IoT Solutions Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 3.0 Author(s) Group Phone # E-mail Steve Hardin IoT Solutions (AT&T) +1 (404) 713-2651 sh3153@att.com

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Course Outline. Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led

Course Outline. Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led About this Course In this course, experienced developers who know the basics of data access (CRUD)

More information