Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols
|
|
- Maximilian Johnston
- 6 years ago
- Views:
Transcription
1 Data Synchronization in Mobile Computing Systems Lesson 10 SyncML Protocols Oxford University Press All rights reserved. 1
2 SyncML provisions for an open standard Representation protocol Synchronization protocol Ways of formatting the document Ways of description of architecture for synchronization Ways for binding an application with the well known transport protocols Oxford University Press All rights reserved. 2
3 Ways of binding SyncML codes bind the WAP, Bluetooth, or IrDA protocols and a mobile application run for synchronization and synchronize with Bluetooth, WAP 2.0, or IrDA level 5 connection using a SyncML client and engine Oxford University Press All rights reserved. 3
4 SyncML provisions for an open standard Interfaces for binding the programming languages which are very common, for example, Java, C, and C++. Prototype implementation for using the SyncML Oxford University Press All rights reserved. 4
5 SyncML programming Based on two protocols the SyncML representation protocol and the SyncML synchronization protocol The SyncML representation protocol defines the representation format of SyncML messages which are in XML It gives details about the inner working of the SyncML framework Oxford University Press All rights reserved. 5
6 SyncML Message SyncML protocol specifies that a message has SyncHdr and SyncBody, with meta info as well as device info present within SyncHdr Meta info is placed between the start and end tags <MetInf> and </MetInf> and device info between <DevInfo> and </DevInfo> Oxford University Press All rights reserved. 6
7 Universal Resource Identifier (URI) A full path specification for a device resource Assume a PIM data structured like a tree Oxford University Press All rights reserved. 7
8 Universal Resource Identifier (URI) The parent PIM data object is the root object At the branches of the root object, there are objects called daughter data record copies, these are calendar, address_book, and tasks_to_do Oxford University Press All rights reserved. 8
9 Address_book object Has the branches having the contacts. Each of the contacts object has branches and daughter objects which may be leaves The leaves are name, office, home, mobile and fax numbers, home and office addresses, web addresses, and IDs Oxford University Press All rights reserved. 9
10 Root object of device PIM data dev_pim_data Assume that the root object of device PIM data dev_pim_data Server PIM data PIM_data The root PIM_data hierarchy at the server PIM_data address_book contacts Raj Kamal telnum_rk Oxford University Press All rights reserved. 10
11 PIM data object address_book branches Further has the object Contacts Contacts has the object Raj Kamal Raj Kamal object has a leaf, the resource telephone number, telnum_rk Oxford University Press All rights reserved. 11
12 PIM data object address_book telnum_rk contains the telephone number data in digits, where resource refers to an entity used in the computations or for synchronization For an API, the resource is at the leaf during computations using the telnum_rk Oxford University Press All rights reserved. 12
13 Protocol specification of the URI Used to identify any resource at the object PIM_data/address_book/contacts/Raj Kamal is URI for identifying a resource at the Contacts at the server PIM_data/address_book/contacts/Raj Kamal/telNumRK is URI for the resource at the leaf telnum_rk Oxford University Press All rights reserved. 13
14 Protocol specification of the URI If the object Raj Kamal has two branches, telnum_rk and address_rk, then the URI for the leaf object address_rk will be PIM_data/contacts/Raj Kamal/address_RK, where address_rk has the text of address Oxford University Press All rights reserved. 14
15 Commands Create, Delete, Add, Update, Sync, Alert, Atomic, Search, Read, Get, Exec, Put, Copy, Results, Map, and Status Refer Table 9.1 for the meaning of the commands Alert command is a special SyncML feature by which the server alerts the client Oxford University Press All rights reserved. 15
16 Sample Code <SyncBody> <Status> <Cmd>SyncHdr</Cmd> <CmdRef>0</CmdRef> <MsgRef>1</MsgRef> <TargetRef> IMEI:49 800</TargetRef> <SourceRef> </SourceRef> <Data>212</Data> </Status> Oxford University Press All rights reserved. 16
17 Sample Code <Status> <Cmd>Alert</Cmd> <CmdRef>1</CmdRef> <MsgRef>1</MsgRef> <!- - Assume that Device contact data object at the device is dev_contacts, which was the target defined at the header and assume that new contact added at the server is URI./contacts/Raj Kamal and Alert is sent to client device - - > Oxford University Press All rights reserved. 17
18 Sample Code <TargetRef>./dev_contacts</TargetRef> <SourceRef>./contacts/ Raj Kamal </SourceRef> <Data>200</Data> </Status> </SyncBody> Oxford University Press All rights reserved. 18
19 Security For secure synchronization of messages between source and destination, a message M sent from a source to destination needs verification of its integrity and authenticity of the source Oxford University Press All rights reserved. 19
20 keyed hash message authentication code (HMAC) HMAC source of message M sent along with M Generated after computations at the source At the destination, the HMAC dest is regenerated Oxford University Press All rights reserved. 20
21 Keyed hash message authentication code (HMAC) If the HMAC dest computed at the destination matches with the received HMAC source, the integrity of M stands verified Oxford University Press All rights reserved. 21
22 Computations for HMAC Done using M, a secret key S and an iterative hash function Iterative function is a function repeatedly operated on the operand Two of the several iterative hash functions can be used SHA-1 (secure hash algorithm-1) and MD-5 (message digest algorithm-5) Oxford University Press All rights reserved. 22
23 Handling Large Objects Using <MoreData> tag Wireless transmission, there are interruptions Therefore, a large data object should be broken into many chunks <MoreData> tag for transmitting large object data in chunks Oxford University Press All rights reserved. 23
24 Handling Large Objects Using <MoreData> tag Using <MoreData> tag, a large object can be exchanged by dividing it into data chunks. Each chunk has a start tag <MoreData> and an end tag </Moredata> Oxford University Press All rights reserved. 24
25 Handling Large Objects Using <MoreData> tag This indicates that next chunk expected in next session The receiving objects join the chucks to recreate a large object Oxford University Press All rights reserved. 25
26 Use of status codes in case of Errors SyncML protocol defines error codes in the event of data conflict, incomplete document, and other errors that occur during synchronization Status codes between 500 and 599 are received for response from the receiver For example,code 511 which implies server failure Oxford University Press All rights reserved. 26
27 Example of status codes For example, assume that a status code sent by the receiver of SyncML message is error code 501 This implies that the command could not be implemented at the receiver because the SyncML client or server did not support it for any of the resources Oxford University Press All rights reserved. 27
28 Setup and Synchronization phases SyncML DM protocol specifies a standard method for set up and synchronization Device management one-way synchronization of the device from the server Oxford University Press All rights reserved. 28
29 Setup and Synchronization phases The server sets and updates the data on the client device It also requests for the device data, for example, data for enabling device authentication by it Oxford University Press All rights reserved. 29
30 Setup and Synchronization phases Data exchange occurs in phases using packages 0 4 A package is a SyncML message containing XML document Phases of data exchanges in packages 0 2 are called setup phases Phases of data exchanges in packages 3 and 4 are called synchronization or management phases Oxford University Press All rights reserved. 30
31 Setup and Synchronization phases Oxford University Press All rights reserved. 31
32 Summary Representation protocol Synchronization protocol Ways of formatting the document Ways of description of architecture for synchronization Interfaces for Binding Prototype implementation Oxford University Press All rights reserved. 32
33 Summary Universal resource Identifier by full path from root to leaf Commands for message exchanges for synchronization and client-server exchanges HMAC security Oxford University Press All rights reserved. 33
34 Summary <MoreData> for handling large objects Four phases for set-up and synchronization Oxford University Press All rights reserved. 34
35 End of Lesson 10 SyncML Protocol Oxford University Press All rights reserved. 35
Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features
Data Synchronization in Mobile Computing Systems Lesson 08 SyncML Language Features Oxford University Press 2007. All rights reserved. 1 A mobile computing system Consists of (i) mobile device, (ii) personal
More informationSyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1
SyncML Implementation Conformance Statement (SICS) 1 of 20 Pages SyncML Implementation Conformance Statement Proforma SyncML DataSync V1.1.1 Abstract The SyncML Implementation Conformance Statement is
More informationSyncML Implementation Conformance Statement Proforma. SyncML DataSync V1.1.1
SyncML Implementation Conformance Statement (SICS) 1 of 19 Pages SyncML DataSync (V1.1.1) Version 0.4 SyncML Implementation Conformance Statement Proforma SyncML DataSync V1.1.1 Abstract The SyncML Implementation
More informationOMA Device Management Protocol
OMA Device Management Protocol Candidate Version 1.2 07 Jun 2005 Open Mobile Alliance OMA-TS-DM-Protocol-V1_2-20050607-C OMA-TS-DM-Protocol-V1_2-20050607-C Page 2 (49) Use of this document is subject to
More informationClient Profile of OMA Device Management v1.3
Client Profile of v1.3 Candidate Version 1.0 30 Apr 2013 Open Mobile Alliance OMA-PD-DM_Client_Profile-V1_3-20130430-C OMA-PD-DM_Client_Profile-V1_3-20130430-C Page 2 (18) Use of this document is subject
More informationSyncML Device Management Protocol. Version 1.1
1 of 37 Pages SyncML Device Management Protocol Version 1.1 Abstract This document specifies the SyncML Device Management Protocol. This protocol is used to transfer management actions between the client
More informationSyncML Implementation Conformance Statement
SyncML Implementation Conformance Statement 1 of 171111117177 Pages http://www.syncml.org/docs/syncml_ics_v0810_20010161202.doc Version 10.087 2001-06-202001-06-01 SyncML Implementation Conformance Statement
More informationData Synchronization in Mobile Computing Systems Lesson 12 Synchronized Multimedia Markup Language (SMIL)
Data Synchronization in Mobile Computing Systems Lesson 12 Synchronized Multimedia Markup Language (SMIL) Oxford University Press 2007. All rights reserved. 1 Language required to specify the multimodal
More information1.2. Terminal Configuration Use-Cases SyncML Device Management
MOBILE DEVICE MANAGEMENT WITH SYNCML Alan Bok, Alan.Bok@motorola.com, Sandeep Adwankar, Sandeep.Adwankar@motorola.com, John Grosspietsch, John.Grosspietsch@motorola.com, Venu Vasudevan, venuv@labs.mot.com,
More informationEnabler Test Specification for Device Management
Enabler Test Specification for Device Management Candidate Version 1.2 17 Jul 2007 Open Mobile Alliance OMA-ETS-DM-V1_2-20070717-C OMA-ETS-DM-V1_2-20070717-C Page 2 (161) Use of this document is subject
More informationisync SyncML Guide
isync SyncML Guide 2006-07-14 Apple Computer, Inc. 2006 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form
More informationSyncML Implementation Conformance Statement
1 of 13 Pages SyncML Implementation Conformance Statement Proforma Version 1.0 Abstract The SyncML Implementation Conformance Statement is designed to be used by vendors to show their level of conformance
More informationWAP/ WML : Wireless Protocol wireless protocol
Device Connectivity Device Connectivity Pervasive computing devices do not develop their full potential unless they are connected to applications and services through the Internet. Device connectivity
More information[MS-MDM]: Mobile Device Management Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-MDM]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation ( this documentation ) for protocols,
More informationEnabler Test Specification for Device Management
Enabler Test Specification for Device Management Candidate Version 1.3 08 Dec 2015 Open Mobile Alliance OMA-ETS-DM-V1_3-20151208-C OMA-ETS-DM-V1_3-20151208-C Page 2 (175) Use of this document is subject
More informationEnabler Test Specification for Device Management
Enabler Test Specification for Device Management Candidate Version 1.2 19 Apr 2007 Open Mobile Alliance OMA-ETS-DM-V1_2-20070419-C OMA-ETS-DM-V1_2-20070419-C Page 2 (106) Use of this document is subject
More informationSyncML Sync Protocol, version 1.0
1 of 60 Pages, version 1.0 Abstract This specification defines synchronization protocol between a SyncML client and server in form of message sequence charts. It specifies how to use the SyncML Representation
More informationEnabler Test Specification for Device Management
Enabler Test Specification for Device Management Candidate Version 1.2 06 Jul 2006 Open Mobile Alliance OMA-ETS-DM-V1_2-20060706-C OMA-ETS-DM-V1_2-20060706-C Page 2 (87) Use of this document is subject
More informationSyncML Representation Protocol, Data Synchronization Usage
SyncML Representation Protocol, Data Synchronization Usage Approved Version 1.2.1 10 Aug 2007 Open Mobile Alliance OMA-TS-DS_DataSyncRep-V1_2_1-20070810-A OMA-TS-DS_DataSyncRep-V1_2_1-20070810-A Page 2
More informationContinues the Technical Activities Originated in the SyncML Initiative
SyncML Device Management Security, Version 1.1.2 Approved Version 09-December-2003 Open Mobile Alliance OMA-SyncML-DMSecurity-V1_1_2-20031209-A Continues the Technical Activities Originated in the SyncML
More informationSyncML Overview. Noel Poore, Psion Computers PLC
SyncML Overview Noel Poore, Psion Computers PLC Data synchronization is a field of growing importance. As the number of mobile devices increases rapidly in the next few years, more and more data is going
More informationETSI TS V5.0.0 ( )
Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Wide Area Network Synchronization () GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationSynchronization. Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory. Abstract
Synchronization Kari Pihkala HUT, Telecommunications Software and Multimedia Laboratory Kari.Pihkala@hut.fi Abstract This paper discusses various synchronization methods for mobile devices. It gives an
More informationData Synchronization in Mobile Computing Systems Lesson 05 Synchronization Engine and Mobile Agent for Synchronization
Data Synchronization in Mobile Computing Systems Lesson 05 Synchronization Engine and Mobile Agent for Synchronization Oxford University Press 2007. All rights reserved. 1 Synchronizer (synchronization
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationDeployment of software components: Application to Wireless System
Deployment of software components: Application to Wireless System KOUNINEF Belkacem 1, BOUZERITA Mohamed 2 Institut National des Télécommunications et des Technologies de l Information et de la Communication
More informationMessage Authentication and Hash function 2
Message Authentication and Hash function 2 Concept and Example 1 SHA : Secure Hash Algorithm Four secure hash algorithms, SHA-11, SHA-256, SHA-384, and SHA-512. All four of the algorithms are iterative,
More informationVersion 1.0.1
1 of 19 Pages SyncML OBEX Binding Abstract This document describes how to use SyncML over OBEX. The document uses the primitives and methods defined in the OBEX specification V1.2 as defined in [1]. The
More informationLesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network
Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending
More informationOMA Device Management Security
OMA Device Management Security Approved Version 1.2.1 17 Jun 2008 Open Mobile Alliance OMA-TS-DM_Security-V1_2_1-20080617-A OMA-TS-DM_Security-V1_2_1-20080617-A Page 2 (27) Use of this document is subject
More informationMobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA
Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA Oxford University Press 2007. All rights reserved. 1 Features of a File System Hierarchical organization Storage Modification
More informationLesson 9 Programming Arduino Hash, Encryption and Decryption Functions Usages (Examples 9.8 and 9.9)
Lesson 9 Programming Arduino Hash, Encryption and Decryption Functions Usages (Examples 9.8 and 9.9) 1 Authentication and Encryption Authentication using a secret key and a hash function in place of communicating
More informationOMA Device Management Security
OMA Device Management Security Candidate Version 1.3 25 May 2010 Open Mobile Alliance OMA-TS-DM_Security-V1_3-20100525-C OMA-TS-DM_Security-V1_3-20100525-C Page 2 (30) Use of this document is subject to
More informationSyncML OBEX Binding. Candidate Version Apr Open Mobile Alliance OMA-TS-SyncML_OBEXBinding-V1_ C
SyncML OBEX Binding Candidate Version 1.2 09 Apr 2005 Open Mobile Alliance OMA-TS-SyncML_OBEXBinding-V1_2-20050509-C OMA-TS-SyncML_OBEXBinding-V1_2-20050509-C Page 2 (30) Use of this document is subject
More informationSonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide
SonicWALL 6.2.0.0 Addendum A Supplement to the SonicWALL Internet Security Appliance User's Guide Contents SonicWALL Addendum 6.2.0.0... 3 New Network Features... 3 NAT with L2TP Client... 3 New Tools
More informationLevel 3 Media Portal API Guide
Level 3 Media Portal API Guide Updated June 9, 2017 Contents Media Web Services (API)... 1 Getting Started with Media Portal APIs... 3 Using APIs... 3 Determining the Access Group ID... 3 API Interfaces...
More informationContent Synchronization
Content Synchronization T-110.5120 Next generation wireless networks Helsinki University of Technology Jin ZhiHua (77168L) Chia PernHui (77146H 46H) Introduction Overview Why do we need sync? What Sync
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationData Synchronization in Mobile Computing Systems Lesson 03 Domain dependent Specific Rules and Conflict resolution Strategies
Data Synchronization in Mobile Computing Systems Lesson 03 Domain dependent Specific Rules and Conflict resolution Strategies Oxford University Press 2007. All rights reserved. 1 1. Data synchronization
More informationIn this chapter we have described DM Configuration both in Policy Builder and Control Center.
In Policy Builder, page 1 In Control Center, page 15 Using REST APIs, page 37 In Policy Builder In this chapter we have described both in Policy Builder and Control Center. Note Any DM configuration changes
More informationMS-FSSHTTP. Simon Clarke, SharePoint/OneDrive
MS-FSSHTTP Simon Clarke, SharePoint/OneDrive Agenda What is MS-FSSHTTP? Requests File Model and Co-auth Storage/Sync Model Storage Graph Object Graph Application Schema Sync Example The documents (MS-FSSHTTP,
More informationConfiguring the Cisco APIC-EM Settings
Logging into the Cisco APIC-EM, page 1 Quick Tour of the APIC-EM Graphical User Interface (GUI), page 2 Configuring the Prime Infrastructure Settings, page 3 Discovery Credentials, page 4 Security, page
More informationwin Grey Matter India - An Idhasoft Company Idhasoft is a global world-class
Streaming Location-Based Wireless Mobile Unified Technological Spying Messaging Network Multimedia Launcher Expertise dows logger, Shell' the from that capable application proximity for enhances users
More informationCitrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.
Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section
More informationCriptext s end-to-end encryption system. Technical white paper
Criptext s end-to-end encryption system Technical white paper Contents Introduction 3 Sending Emails 7 Terms 4 Sending Attachments 8 Client Registration Initiating Session Setup 5 Linking new devices 9
More informationProject Title REPRESENTATION OF ELECTRICAL NETWORK USING GOOGLE MAP API. Submitted by: Submitted to: SEMANTA RAJ NEUPANE, Research Assistant,
- 1 - Project Title REPRESENTATION OF ELECTRICAL NETWORK USING GOOGLE MAP API Submitted by: SEMANTA RAJ NEUPANE, Research Assistant, Department of Electrical Energy Engineering, Tampere University of Technology
More informationFIPS Non-Proprietary Security Policy
Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely
More informationOffice Co-Authoring Chalk Talk (MS-FSSHTTP)
Office Co-Authoring Chalk Talk (MS-FSSHTTP) Office 365 DevDays 2017.11.4-6 上海 Jinghui Zhang Software Engineer @Microsoft What is MS-FSSHTTP? Requests 目录 CONTENTS File Model and Co-auth Storage/Sync Model
More informationIPSec. Overview. Overview. Levente Buttyán
IPSec - brief overview - security associations (SAs) - Authentication Header (AH) protocol - Encapsulated Security Payload () protocol - combining SAs (examples) Overview Overview IPSec is an Internet
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationIn this chapter we have described DM Configuration both in Policy Builder and Control Center.
In Policy Builder, page 1 In Control Center, page 15 Using REST APIs, page 38 In Policy Builder In this chapter we have described both in Policy Builder and Control Center. Note Any DM configuration changes
More informationOMA Device Management Tree and Description Serialization
OMA Device Management Tree and Description Serialization Approved 1.2 09 Feb 2007 Open Mobile Alliance OMA-TS-DM_TNDS-V1_2-20070209-A OMA-TS-DM_TNDS-V1_2-20070209-A Page 2 (19) Use of this document is
More informationWAP-Sync-Spec. Data Synchronisation Specification Version 30-May Wireless Application Protocol WAP-234-SYNC a
WAP-Sync-Spec Data Synchronisation Specification Version 30-May-2001 Wireless Application Protocol WAP-234-SYNC-20010530-a A list of errata and updates to this document is available from the WAP Forum
More informationConfiguring a VPN Using Easy VPN and an IPSec Tunnel, page 1
Configuring a VPN Using Easy VPN and an IPSec Tunnel This chapter provides an overview of the creation of Virtual Private Networks (VPNs) that can be configured on the Cisco 819, Cisco 860, and Cisco 880
More informationCommunication in Broadband Wireless Networks. Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA
Secure Multicast and Broadcast Communication in Broadband Wireless Networks Jaydip Sen Convergence Innovation Lab Tata Consultancy Services Ltd. Kolkata, INDIA Agenda Network entry procedure for a mobile
More informationConfiguring 802.1X Settings on the WAP351
Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X
More informationStorageGRID Webscale 10.2
StorageGRID Webscale 10.2 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
More informationIntroduction to Cisco TV CDS Software APIs
CHAPTER 1 Cisco TV Content Delivery System (CDS) software provides two sets of application program interfaces (APIs): Monitoring Real Time Streaming Protocol (RTSP) Stream Diagnostics The Monitoring APIs
More informationOMA Device Management Standardized Objects
OMA Device Management Standardized Objects Candidate Version 1.3 25 May 2010 Open Mobile Alliance OMA-TS-DM_StdObj-V1_3-20100525-C [OMA-Template-Spec-20100101-I] OMA-TS-DM_StdObj-V1_3-20100525-C.doc Page
More informationCryptoAuthentication Firmware Protection
CryptoAuthentication Firmware Protection Atmel...Everywhere You Are...Securely September 09 1 CRYPTOAUTHENTICATION Device basics Agenda Keys and OTP fuses Operational block diagram Firmware protection
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationStorageGRID Webscale 10.0
StorageGRID Webscale 10.0 Cloud Data Management Interface Implementation Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
More informationVPN Ports and LAN-to-LAN Tunnels
CHAPTER 6 A VPN port is a virtual port which handles tunneled traffic. Tunnels are virtual point-to-point connections through a public network such as the Internet. All packets sent through a VPN tunnel
More informationBy FaaDoOEngineers.com
ABSTRACT The seemingly endless entanglement of data wires connecting today s electronic devices has become slightly less jumbled with the introduction of Bluetooth technology and the creation of a wireless
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationComponentSpace SAML v2.0 Configuration Guide
ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2017-2018. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration JSON... 1 Identity Provider
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationCSC 6575: Internet Security Fall 2017
CSC 6575: Internet Security Fall 2017 Network Security Devices IP Security Mohammad Ashiqur Rahman Department of Computer Science College of Engineering Tennessee Tech University 2 IPSec Agenda Architecture
More informationCOSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS
COSC 301 Network Management Lecture 15: SSL/TLS and HTTPS Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 15: SSL/TLS and HTTPS 1 Today s Focus WWW WWW How to secure web applications?
More informationIPSec Site-to-Site VPN (SVTI)
13 CHAPTER Resource Summary for IPSec VPN IKE Crypto Key Ring Resource IKE Keyring Collection Resource IKE Policy Resource IKE Policy Collection Resource IPSec Policy Resource IPSec Policy Collection Resource
More informationLesson 5 Nimbits. Chapter-6 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 Nimbits 1 Cloud IoT cloud-based Service Using Server at the Edges A server can be deployed at the edges (device nodes) which communicates the feeds to the cloud service. The server also provisions
More informationLesson 5 Case Study: Connected RFIDs Supply Chain Monitoring Project. Chapter-12 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 5 Case Study: Connected RFIDs Supply Chain Monitoring Project 1 Supply-chain Monitoring Process Supply-chain order verification, Automated reordering and Shipping (SCOVARS) operations 2 SCOVARS
More informationSlides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013
Digital Signatures Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013 Digital Signatures Diagram illustrating how to sign a message Why do we use a one-way hash? How does a collision
More informationExample: Setting Up Basic Bridging and a VLAN for an EX Series Switch
Example: Setting Up Basic Bridging and a VLAN for an EX Series Switch Requirements EX Series switches use bridging and virtual LANs (VLANs) to connect network devices in a LAN desktop computers, IP telephones,
More informationManagement Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:
This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3
More informationPresented By: Niharjyoti Sarangi
Presented By: Niharjyoti Sarangi 1. 2. 3. 4. 5. 6. 7. 8. INTRODUCTION WHAT & WHY KEY FEATURES JXTA ARCHITECTURE JXTA LAYERS JXTA JARGONS JXTA PROTOCOLS JXTA SHELLS JXTA ADVANTAGES 2 AN OPEN P2P PROTOCOL
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationDevice Management Implementation Guide for IoT Solutions
Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 2.3 Stephen Ambrose 6/6/2016 Author(s) Group Phone # E-mail Stephen IoT Solutions +1 (512) 372-5420
More informationINTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD
INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD Jeffy Mwakalinga, Prof Louise Yngström Department of Computer and System Sciences Royal Institute of Technology / Stockholm University
More informationUSER S GUIDE FOR NOKIA PC SUITE 6.2. Copyright Nokia. All rights reserved. 1/20
USER S GUIDE FOR NOKIA PC SUITE 6.2 1/20 Copyright 2002-2004 Nokia. All rights reserved. Legal Notice Copyright 2002-2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of
More informationData-at-Rest Encryption
Data-at-Rest Encryption At-rest encryption in SwiftStack encrypts all object data, object etags (checksums), and any user metadata values set on objects. The feature is enabled by a cluster operator and
More informationStream Control Transmission Protocol (SCTP)
Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP
More informationSession Capabilities in OBEX
Session Capabilities in OBEX Version 0.14 July 16, 2002 Authors: David Suvak Contributors: Kevin Hendrix Extended Systems Extended Systems Revision History Revision Date Comments 0.1 30-May-01 Initial
More informationApplication Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0
Application Notes for Configuring SIP Trunking between the Skype SIP Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These Application Notes describe the steps to configure trunking
More informationIPSec Transform Set Configuration Mode Commands
IPSec Transform Set Configuration Mode Commands The IPSec Transform Set Configuration Mode is used to configure IPSec security parameters. There are two core protocols, the Authentication Header (AH) and
More informationIPv6 Support for LDAP
The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over an IP network. The feature module describes the
More informationIP Security. Have a range of application specific security mechanisms
IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security
More informationAuditing TPM Commands
Chapter 16 Auditing TPM Commands As used in the TPM, audit is the process of logging TPM command and response parameters that pass between the host and the TPM. The host is responsible for maintaining
More informationStructure of Management Information
Structure of Management Information Structure of Management Information' (SMI) defines the general framework within which MIBs can be defined and constructed (STD58) SMI identifies data types usable in
More informationComponentSpace SAML v2.0 Configuration Guide
ComponentSpace SAML v2.0 Configuration Guide Copyright ComponentSpace Pty Ltd 2004-2019. All rights reserved. www.componentspace.com Contents Introduction... 1 SAML Configuration Options... 1 SAML Configuration
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationNative SyncClient API 1.1 Programming Guide. Sync4j
Native SyncClient API 1.1 Programming Guide Sync4j http://www.sync4j.org Table of Contents 1. Overview...3 1.1. SyncClient API Architecture... 3 1.2. Synchronization Overview... 4 1.3. Sync4j SyncClient
More informationJVA-563. Developing RESTful Services in Java
JVA-563. Developing RESTful Services in Java Version 2.0.1 This course shows experienced Java programmers how to build RESTful web services using the Java API for RESTful Web Services, or JAX-RS. We develop
More information4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates
4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order
More informationDevice Management Implementation Guide for IoT Solutions
Device Management Implementation Guide Device Management Implementation Guide for IoT Solutions Version 3.0 Author(s) Group Phone # E-mail Steve Hardin IoT Solutions (AT&T) +1 (404) 713-2651 sh3153@att.com
More informationIntegrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
More informationCourse Outline. Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led
Developing Data Access Solutions with Microsoft Visual Studio 2010 Course 10265A: 5 days Instructor Led About this Course In this course, experienced developers who know the basics of data access (CRUD)
More information