1 / 9

Service discovery and configuration

Service discovery and configuration. CSE481M: Home Networking Capstone April 27, 2011. Problems. How do you get network connectivity (securely)? How does the network know that you should be allowed to connect? How do you find other services of interest (securely)?

kim
Download Presentation

Service discovery and configuration

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Service discovery and configuration CSE481M: Home Networking Capstone April 27, 2011

  2. Problems • How do you get network connectivity (securely)? • How does the network know that you should be allowed to connect? • How do you find other services of interest (securely)? • How do the services know that you are a permitted client?

  3. Fundamental tension Scalability Security Usability Non-technical factors: Implementation cost and competition among companies

  4. The early days MIT Address-based, manual Name-based, manual DNS DHCP UCLA

  5. What if there is no DHCP/DNS servers?How do we find network services? • Zeroconf • Automatic address allocation • Automatic name resolution • Automatic service discovery • Apple  Bonjour • Microsoft  UPnP

  6. Open problems / rough edges Design: Going across subnets Implementation: Incompleteness and incompatibility

  7. Then came wireless • Decouples physical security from network security • Need mutual authentication and secure communication • No eavesdropping or packet injection • Options: • Out of band secrets (WiFi today) • Blind pairing (Z-Wave) • Pairing with secrets (Bluetooth) • Proximity-based security (Network-in-a-box, Z-Wave)

  8. How does the phone network do it? • Landlines • Provider-based addressing • Name or service lookup: 411 or out-of-band • Access controlled through physical access • Cellular phones • Centrally administered and over-the-air programming

  9. Real-world analogues • Snail mail (postal) addresses • Top-down scoped allocation (variable #bits) • Name and service lookup is out of band • No access restrictions • Buying alcohol • Local identity issuers and federation

More Related