This module, taught on 26th September (morning) covered basics of IP networks. Instructor was Ms. Monika Machnik (ITE). Course duration was 5 hours. The course material included:
On the left: Ms. Monika Machnik (ITE) explaining IP routing. |
This module, taught on 26th September in the afternoon, covered the following topics:
This was a 90-minute presentation from Ms. Justyna Woś from OMC Envag company, which is a distributor of environmental monitoring systems of leading manufacturers such as Hach-Lange and OTT. The presentation covered existing off-the-shelf solution for water monitoring, and was intended to provide ESRs with overview of real-world environmental monitoring systems.
In this module, students have assembled and configured off-the-shelf network equipment to create an operational IP-based network. The equipment included:
Mikrotik equipment has been chosen due to low cost and popularity in wireless ISP installations in Central Europe.
The software used included:
Network topology and assembled equipment are shown in figures below. The core network (red part) consisted of four MikroTik routers. Connections between core routers have been realized using Ethernet cables and wireless point-to-point links at 5GHz (operating as layer 2 bridges). OSPF has been used as dynamic routing protocol due to ease of configuration. Dynamic routing has been demonstrated by introducing faults (i.e. disconnecting cables) after the network has been set up. Four leaf networks (green) have been connected to the core network. Students could study network behavior by means of programs such as ping, traceroute and Wireshark protocol analyzer.
It should be noted that the exercise had a strong collaborative focus, as different students have been assigned roles in configuring different devices which had to work together correctly.
Below: network topology and OSPF routing status.
The purpose of the module has been to demonstrate to students basic concepts related to programming of TCP/IP applications.
A scripting language AutoIt! for Microsoft Windows platform has been chosen due to its ease of use. Students have been tasked with writing a simple TCP client program and a simple TCP server program; netcat program has been used for testing. Subsequently, students have achieved TCP-based communication in pairs (one running the client, the other running the server).
|
Wireshark protocol analyzer has been used to study network exchanges. Finally, design patterns for multi-user servers have been discussed. Discussion of UDP-based communication has been dropped due to time constraints. On the left: ESR Katarina Cvejin studying a TCP connection using Wireshark protocol analyzer. |
The aim of the module was to familiarize ESRs with basics of microcontroller programming for use in building sensor networks, i.e. creating sensor nodes.
Arduino development platform has been chosen due to high popularity and small learning curve. Each of students has been given a set of Arduino boards including: a microcintroller board, a network interface board (Ethernet), a board for connecting sensors.
Students have also been given different sensors and actuators, such as: potentiometers, joysticks, LEDs, electric motors, temperature sensors, Hall effect sensors (magnetic field sensors), ultrasound distance sensors.
Each of the students has implemented the following set of programs:
After the ESRs have constructed the basic building blocks, a second part of the exercise was started. Students were given a small self-driving robot. The task has been defined as follows:
On the left: Robot used during the exercise. |
The goal of this module was to familiarize students with basic cryptographic techniques by means of a hands-on demonstration. Students have been provided with a set of computer programs implementing basic cryptographic operations:
On the right: Example screenshot of the program used - calculation of message digest and message authentication code. |
Students, working in pairs, had to implement secure message exchanges using the above programs. Specifically, the exercises included:
Finally, students have been asked to design a message exchange protocol providing: encryption of message contents using a symmetric algorithm, key exchange using asymmetric algorithm and message authentication.
Group photo after completing the exercise, left-to-right: Srdjan Ajkalo (ESR), Monika Machnik (instructor, ITE), Katarina Cvejin (ESR), Aleksandar Pajkanovic (ESR), Mitar Simic (ESR), Krzysztof Zaraska (instructor, ITE).