distributed computer systems

Teaching

Organisation

News:

This lecture will be organized via OLAT

Examination:

To be announced

Lecture:

Every Monday, 11:45-13:15, in room 42-110

Contact:

Matthias Schäfer
Markus Espen
or follow us on Twitter

Course Overview

This course covers aspects and principles of network security. Based on many attacks on common technologies used in communication systems, this course illustrates how things can go wrong and provides basic measures to protect a network from mistakes committed in the past. It covers furthermore the fundamental concepts of security and security problems.

Areas covered in this lecture:

  • Physical and Link Layer Security
  • Network Layer Security
  • Transport Layer Security
  • Application Layer Security

Please note that it is strongly recommended to attend communication systems first since it provides the background knowledge for this lecture.

Registration & Organization

The lecture is organized via OLAT. To register for the lecture and get access to the material, please proceed to this link:

https://olat.vcrp.de/url/RepositoryEntry/3888808832

You will have to register in order to receive updates and to get access to material (slides).

 

Organisation

Contact:

Prof. Dr.-Ing. Jens Schmitt
Christopher Kohlstruck

News:

This lecture will be organized via OLAT

Examination:

To be announced

 

Registration & Organization

The lecture is organized via OLAT. To register for the lecture and get access to the material, please proceed to this link:

https://olat.vcrp.de/url/RepositoryEntry/3872260988

You will have to register in order to receive updates and to get access to material (slides).

Organisation

News:

This lecture will be organized via OLAT

Examination:

To be announced

Lecture:

Every Monday, 11:45-13:15, in room 42-110

Contact:

Matthias Schäfer
Markus Espen

Course Overview

This course covers aspects and principles of network security. Based on many attacks on common technologies used in communication systems, this course illustrates how things can go wrong and provides basic measures to protect a network from mistakes committed in the past. It covers furthermore the fundamental concepts of security and security problems.

Areas covered in this lecture:

  • Physical and Link Layer Security
  • Network Layer Security
  • Transport Layer Security
  • Application Layer Security

Please note that it is strongly recommended to attend communication systems first since it provides the background knowledge for this lecture.

Registration & Organization

The lecture is organized via OLAT:
https://olat.vcrp.de/url/RepositoryEntry/4319543383

 

 

News

The Project is managed via OLAT.
Olat-Password: integer
Olat-Link: https://olat.vcrp.de/url/RepositoryEntry/3455222340

Contact

M.Sc. Eric Jedermann

Topic

This year's project will be about Bluetooth Low Energy (BLE) security. BLE is a part of the Bluetooth communication technology, designed for embedded devices with local connectivity and low data rates.

Many "smart" devices, available in every tech-market, are controllable via BLE. Often the security of those devices is insufficient. We plan to get some of these devices, analyze their security, create an application to control the device and break the security.

 Official module entry: [89-4245] INF-42-45-M-7 (old module nr: INF-42-45-L-6)

 

Requirements

  • Programming knowledge is required (we will use Android Studio Java/Kotlin).
  • Lecture "Communication systems" is required.
  • Lectures "Network security" and "Protocols and Algorithms for Network Security" are recommended.
  • ... You should be interested in security.

Organization

It will be a group project. It is planned to have group sizes of 2 to 4 people.

Recommended Readings

 

 

 

 

 

Organization

News:

The OLAT course is now live: https://olat.vcrp.de/auth/RepositoryEntry/3392341868/CourseNode/104427912376092

password: output

Exam:

TBA

Lecture:

Mon 10:00 - 11:30 in 48-210, starting on 25.10.

Exercises:

Mon 14:00 - 15:30 in 48-453, dates will be announced beforehand

Contact:

Prof. Dr.-Ing. Jens Schmitt
M.Sc. Anja Hamscher
or follow us on Twitter (WoCADS)

Course Overview

The objective of this lecture is to introduce the art of performance-related modeling of distributed systems. We will use worst-case assumptions in order to obtain robust results. 

Literature

  • Jean-Yves Le Boudec, Patrick Thiran. Network Calculus. Springer, 2001. (Also →available online)
  • Cheng-Shang Chang, Performance Guarantees in Communication Networks. Springer, 2000.
  • Anne Bouillard, Marc Boyer, and Euriell Le Corronc. Deterministic Network Calculus: From Theory to Practical Implementation. John Wiley & Sons, 2018.
  • Jörg Liebeherr. Duality of the Max-Plus and Min-Plus Network Calculus. Foundations and Trends® in Networking 11, 2017.

University of Kaiserslautern

Write your thesis with a disco advisor

We offer a variety of bachelor and master theses at any point in the academic year. Also check out some of our completed theses. Read more...

Go to top