![](images/graphics/blank.gif)
Resource access control protocols
-
Lecture Real-time systems - Chapter 5: Resource access control protocols provide students with knowledge about definitions of resources; resource access control: non-preemptable critical sections, basic priority inheritance protocol, basic priority ceiling protocol;...
46p
bachnhuocdong
23-12-2021
7
0
Download
-
Carrier Sense Multiple Access (CSMA) is a probabilisticMedia Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium CAN uses a nondestructive bitwise arbitration, which means that messages remain intact after arbitration is completed even if collisions are detected. All the arbitration takes place without corruption or delay of the message that wins the arbitration.
36p
xblue06
13-05-2013
80
10
Download
-
Taking the network scenario of Figure 1, there will be web interfaces (routers and serv- ers), BACnet/IP controllers (connected to interesting devices that are network accessible), and operator workstations that may have vulnerable OS as well as configuration files and other interesting data and resources. The following table is adapted from a Drexel report on network security [Eisenstein et al., 2003a] and lists known IT threats to a BACnet network connected to the public Internet.
8p
khongmuonnghe
04-01-2013
58
5
Download
-
Considering these attack vulnerabilities and scenarios it is clear that the typical BCS is not a desirable target. System resources are limited (storage space, CPU power, common OS and software packages, etc.), and valuable information is limited to the BCS system itself (configuration data, router tables) but no financial or personal information.
6p
khongmuonnghe
04-01-2013
81
10
Download
-
In this example, the intruder gains access to username/password information and sensitive routing protocol data using an Ethernet packet decoder such as EtherPeek. The data packets being sent are captured by the laptop running EtherPeek; the program decodes the hex data into human-readable form. After obtaining access to information, the intruder can use this information to gain access to a machine and then possibly copy-restricted, private infor- mation and programs.
61p
cao_can
02-01-2013
52
3
Download