resource sharing of portable computers using wireless communication
DESCRIPTION
Resource Sharing of Portable Computers Using Wireless Communication. By Christine Meyer. Outline. Routing Protocols Load Balancing Techniques Cluster Computing Software Wireless Security Attacks Conclusion. Wireless Adhoc Mode. Peer-to-Peer Communication. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/1.jpg)
Resource Sharing of Portable Computers Using Wireless Communication
By Christine Meyer
![Page 2: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/2.jpg)
Outline• Routing Protocols
• Load Balancing Techniques
• Cluster Computing Software
• Wireless Security Attacks
• Conclusion
![Page 3: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/3.jpg)
Wireless Adhoc Mode
Peer-to-Peer Communication
![Page 4: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/4.jpg)
Wireless Infrastructure Mode
Communication through Access Point
![Page 5: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/5.jpg)
Direct Sequence Spread Spectrum (DSSS)
![Page 6: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/6.jpg)
Wireless Range
![Page 7: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/7.jpg)
Routing Protocols
• Dynamic Source Routing (DSR)
• Destination Sequence Distance Vector (DSDV)
• Temporary-Ordered Routing Algorithm (TORA) • Ad Hoc On-Demand Distance Vector (AODV)
![Page 8: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/8.jpg)
Comparison of Routing Protocols
Packet Delivery Ratio Routing Overhead
![Page 9: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/9.jpg)
Diffusive Load Balancing on Domain
![Page 10: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/10.jpg)
Windows Management Instrumentation
Namespace: root\WMI for signal strength root\CIMV2 for LB information
![Page 11: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/11.jpg)
Cluster Computing Software
Resource Manager
Server
Job Manager Client Manager
Application
ClientDisplay
Manager
![Page 12: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/12.jpg)
Wireless Network Display
![Page 13: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/13.jpg)
Client to Server Routing 1
ServerClient A
Client B
Routing A
Routing A
![Page 14: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/14.jpg)
Client to Server Routing 2
ServerClient A
Client B
Routing A, B
Routing A, B
Routing to Server
![Page 15: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/15.jpg)
Encryption using Javaimport javax.crypto.*;import javax.crypto.spec.*;import java.security.*;
SecretKey key = KeyGenerator.getInstance("DESede").generateKey();byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher ecipher = Cipher.getInstance("DESede"); ecipher.init(Cipher.ENCRYPT_MODE, key); // Seal (encrypt) the object s1 = new SealedObject(mat1, ecipher); s2 = new SealedObject(mat2, ecipher); } catch (Exception e) {}
![Page 16: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/16.jpg)
Decryption with Java byte[] keyBytes = new byte[] {107,127,4,115,-23,55,93,47, -36,-105, -26, 4, 38, -83,-29, 62, 107,127,4,115,-23,55,93,47}; try { SecretKey key = new SecretKeySpec(keyBytes, "DESede"); Cipher dcipher = Cipher.getInstance("DESede"); dcipher.init(Cipher.DECRYPT_MODE, key); // Unseal (decrypt) the class a = (Matrix)s1.getObject(dcipher); b = (Matrix)s2.getObject(dcipher); } catch (Exception e) {}
![Page 17: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/17.jpg)
Java Transformation String• Algorithm AES, Blowfish, DES, DESede, RSA, RC2, RC4, RC5
• Mode None, CBC (Cipher Block Chaining), CFB (Cipher Feedback Mode), ECB (Electronic Codebook), OFB (Output Feedback Mode), PCBC (Propagating Cipher Block Chaining)
• Padding No Padding, PKCS5Padding SSL3Padding
Default: DES/CBC/PKCS5Padding (64 bits to 128 bits)
DES 64 bits to 64 bits:transform = "DES/ECB/NoPadding“
![Page 18: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/18.jpg)
Passive attacks to decrypt traffic
Destination
Eavesdropper
Packet 1 XOR Packet 2= Plaintext
Access Point
![Page 19: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/19.jpg)
Active attack to inject new traffic
Destination
Eavesdropper
RC4(X) XOR X XOR Y= RC4(Y)
Access Point
![Page 20: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/20.jpg)
Active attacks to decrypt traffic
Eavesdropper
Access Point Internet Eavesdropper’sComputerEncrypted
Message
DecryptedMessage
DecryptedMessage
![Page 21: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/21.jpg)
Table based Attack
Destination
Eavesdropper
Access Point
Table of IV andKey Streams
![Page 22: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/22.jpg)
WPA Denial of Service Attack
WPA can shutdown the system if it receives two failed packets within a one-second period
Wi-Fi Encryption Fix Not Perfecthttp://www.wired.com/news/business/0,1367,56350,00.html
![Page 23: Resource Sharing of Portable Computers Using Wireless Communication](https://reader035.vdocuments.mx/reader035/viewer/2022062814/56816835550346895dddeac7/html5/thumbnails/23.jpg)
Conclusion• It is possible to improve performance through resource sharing of portable computers
• In the future, the transfer rate for wireless will be greater therefore reducing transfer time
• Security is provided for access points but not for ad-hoc mode
• Encryption is possible through Java with a small overhead factor