Advanced Computer Networks (Summer 2020): Difference between revisions

No edit summary
Line 31: Line 31:
|{{Hl2}} |'''Exercise'''
|{{Hl2}} |'''Exercise'''
|-
|-
| align="right" | 14.04.2020
| align="right" | 21.04.2020
| Introduction to Internet of Things
| Introduction to Internet of Things
| Hannes Tschofenig
| Hannes Tschofenig
Line 37: Line 37:
|
|
|-
|-
| align="right" | 16.04.2020
| align="right" | 23.04.2020
| The Arm Architecture (Cortex M-class vs. Cortex A-class)
| The Arm Architecture (Cortex M-class vs. Cortex A-class)
| Hannes Tschofenig
| Hannes Tschofenig
Line 43: Line 43:
| Get hardware & software working
| Get hardware & software working
|-
|-
| align="right" | 21.04.2020
| align="right" | 28.04.2020
| Local Communication (UART, I2C, SPI)
| Local Communication (UART, I2C, SPI)
| Hannes Tschofenig
| Hannes Tschofenig
Line 49: Line 49:
| Use of a sensor communication
| Use of a sensor communication
|-
|-
| align="right" | 23.04.2020
| align="right" | 30.04.2020
| Radio Technologies (BLE, Thread, NB-IoT, LoRa)
| Radio Technologies (BLE, Thread, NB-IoT, LoRa)
| Hannes Tschofenig
| Hannes Tschofenig
Line 55: Line 55:
| Use of a radio technology
| Use of a radio technology
|-
|-
| align="right" |28.04.2020
| align="right" |05.05.2020
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP)
| Internet Protocols for IoT (CoAP and MQTT vs. HTTP)
| Hannes Tschofenig
| Hannes Tschofenig
Line 61: Line 61:
|  
|  
|-
|-
| align="right" | 30.04.2020
| align="right" | 07.05.2020
| Security Threats and Security Requirements
| Security Threats and Security Requirements
| Hannes Tschofenig
| Hannes Tschofenig
Line 67: Line 67:
|  
|  
|-
|-
| align="right" | 50.05.2020
| align="right" | 12.05.2020
| Device Management
| Device Management
| Hannes Tschofenig
| Hannes Tschofenig
Line 73: Line 73:
| Use of LwM2M
| Use of LwM2M
|-
|-
| align="right" | 07.05.2020
| align="right" | 14.05.2020
| Securing IoT - Communication Security
| Securing IoT - Communication Security
| Hannes Tschofenig
| Hannes Tschofenig
Line 79: Line 79:
| Secure IoT communication
| Secure IoT communication
|-
|-
| align="right" | 12.05.2020
| align="right" | 19.05.2020
| Securing IoT – Hardware Security Technology (TEEs and TrustZone)
| Securing IoT – Hardware Security Technology (TEEs and TrustZone)
| Hannes Tschofenig
| Hannes Tschofenig
Line 85: Line 85:
| Use hardware security mechanisms
| Use hardware security mechanisms
|-
|-
| align="right" | 14.05.2020
| align="right" | 21.05.2020
| Securing IoT – Firmware Updates, Secure Boot and Attestation
| Securing IoT – Firmware Updates, Secure Boot and Attestation
| Hannes Tschofenig
| Hannes Tschofenig
Line 91: Line 91:
| Write your own bootloader
| Write your own bootloader
|-
|-
| align="right" | 19.05.2020
| align="right" | 26.05.2020
| Privacy
| Privacy
| Hannes Tschofenig
| Hannes Tschofenig
Line 97: Line 97:
|  
|  
|-
|-
| align="right" |26.05.2020
| align="right" |28.05.2020
| Exam
| Exam
| Hannes Tschofenig
| Hannes Tschofenig
94

edits