Advanced Computer Networks (Summer2020): Difference between revisions
Jump to navigation
Jump to search
(3 intermediate revisions by the same user not shown) | |||
Line 30: | Line 30: | ||
|{{Hl2}} |'''Lecturer''' | |{{Hl2}} |'''Lecturer''' | ||
|{{Hl2}} |'''Lecture slides''' | |{{Hl2}} |'''Lecture slides''' | ||
|{{Hl2}} |'''Exercise | |{{Hl2}} |'''Exercise''' | ||
|- | |- | ||
| align="right" | | | align="right" | 14.04.2020 | ||
| Introduction to Internet of Things | | Introduction to Internet of Things | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 38: | Line 38: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 16.04.2020 | ||
| The Arm Architecture (Cortex M-class vs. Cortex A-class) | | The Arm Architecture (Cortex M-class vs. Cortex A-class) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Get hardware& software working | ||
|- | |- | ||
| align="right" | | | align="right" | 21.04.2020 | ||
| Local Communication (UART, I2C, SPI) | | Local Communication (UART, I2C, SPI) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Use of sensor communication | ||
|- | |- | ||
| align="right" | | | align="right" | 23.04.2020 | ||
| Radio Technologies (BLE, Thread, NB-IoT, LoRa) | | Radio Technologies (BLE, Thread, NB-IoT, LoRa) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Use of a radio technology | ||
|- | |- | ||
| align="right" | | | align="right" |28.04.2020 | ||
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | | Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 62: | Line 62: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 30.04.2020 | ||
| Security Threats and Security Requirements | | Security Threats and Security Requirements | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 68: | Line 68: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 05.05.2020 | ||
| Device Management | | Device Management | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Use of LwM2M | ||
|- | |- | ||
| align="right" | | | align="right" | 07.05.2020 | ||
| Securing IoT - Communication Security | | Securing IoT - Communication Security | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Secure IoT communication | ||
|- | |- | ||
| align="right" | | | align="right" | 12.05.2019 | ||
| Securing IoT – Hardware Security Technology (TEEs and TrustZone) | | Securing IoT – Hardware Security Technology (TEEs and TrustZone) | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Use hardware security mechanisms | ||
|- | |- | ||
| align="right" | | | align="right" | 14.05.2020 | ||
| Securing IoT – Firmware Updates, Secure Boot and Attestation | | Securing IoT – Firmware Updates, Secure Boot and Attestation | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
| | | | ||
| | | Write your own bootloader | ||
|- | |- | ||
| align="right" | | | align="right" | 19.05.2020 | ||
| Privacy | | Privacy | ||
| Hannes Tschofenig | | Hannes Tschofenig | ||
Line 98: | Line 98: | ||
| | | | ||
|- | |- | ||
| align="right" | | | align="right" | 26.05.2020 | ||
| Exam | | Exam | ||
| Hannes Tschofenig | | Hannes Tschofenig |
Latest revision as of 19:49, 7 January 2020
Details
Workload/ECTS Credits: | 5ECTS |
Module: | M.Inf.1223.Mp OR 3.17: Selected Topics in Advanced Networking (ITIS) |
Lecturer: | Hannes Tschofenig |
Teaching assistant: | Bangbang Ren |
Time: | Tuesday, Thursdays, 10-12am. |
Place: | Rom:2.101 |
Course description
This lecture will introduce concepts of computer networking related to Internet of Things devices. The goal of the course is to make you feel comfortable designing and secure IoT-based Internet communication. The course gives you an understanding of
- The hardware used in IoT devices
- Embedded software development
- Local communication to sensors and actuators
- Internet protocols specifically designed for IoT devices
- Protocols to manage the lifecycle of IoT devices
- Security technologies used on constrained device, and
- Data protection and privacy
There will be exercises and it is mandatory to complete all the exercises to attend the final exam. Each student will be provided with IoT hardware. For software development the preferred tool is a professional IDE developed by Keil.
Schedule (Tentative)
Date | Topic | Lecturer | Lecture slides | Exercise |
14.04.2020 | Introduction to Internet of Things | Hannes Tschofenig | ||
16.04.2020 | The Arm Architecture (Cortex M-class vs. Cortex A-class) | Hannes Tschofenig | Get hardware& software working | |
21.04.2020 | Local Communication (UART, I2C, SPI) | Hannes Tschofenig | Use of sensor communication | |
23.04.2020 | Radio Technologies (BLE, Thread, NB-IoT, LoRa) | Hannes Tschofenig | Use of a radio technology | |
28.04.2020 | Internet Protocols for IoT (CoAP and MQTT vs. HTTP) | Hannes Tschofenig | ||
30.04.2020 | Security Threats and Security Requirements | Hannes Tschofenig | ||
05.05.2020 | Device Management | Hannes Tschofenig | Use of LwM2M | |
07.05.2020 | Securing IoT - Communication Security | Hannes Tschofenig | Secure IoT communication | |
12.05.2019 | Securing IoT – Hardware Security Technology (TEEs and TrustZone) | Hannes Tschofenig | Use hardware security mechanisms | |
14.05.2020 | Securing IoT – Firmware Updates, Secure Boot and Attestation | Hannes Tschofenig | Write your own bootloader | |
19.05.2020 | Privacy | Hannes Tschofenig | ||
26.05.2020 | Exam | Hannes Tschofenig |
Prerequisites
- Computer Science I, II; Computer Networks