The iLab Experience a blended learning hands-on course concept you - - PowerPoint PPT Presentation

the ilab experience
SMART_READER_LITE
LIVE PREVIEW

The iLab Experience a blended learning hands-on course concept you - - PowerPoint PPT Presentation

The iLab Experience a blended learning hands-on course concept you set the focus Do It Yourself - Hardware YE - Topic Outline May 29, 2018 10.4. Kick Off, IPv6 1 IPv6 BGP 17.4. 2 Minilab 1 2 mini labs Advanced Wireless Playground BGP


slide-1
SLIDE 1

you set the focus

The iLab Experience

a blended learning hands-on course concept

Do It Yourself - Hardware YE - Topic Outline

May 29, 2018

slide-2
SLIDE 2 1 2 3 4 5 6 7 8 9 11 12 13 BGP IPv6 2 mini labs SEC Advanced WL 14 Your Exercise IoT1 IoT2

YE 1st Lecture IoT DIY HW YE Topic Outline Kick Off, IPv6 IoT Smart Space SW & measr Advanced Wireless Playground Minilab 2 YE Didactics, Tools & iAdvise YE Review Presentation YE Final Presentation, Wrap-Up

10.4. 17.4. 24.4. (1.5.) 8.5. 15.5. (22.5.) 29.5. 5.6. (12.6.) 19.6. 26.6. 3.7.

BGP Minilab 1 WWW Security Your Exercise Topic Pitch summer term 2018

10.7.

Giving good Feedback Prepare Your Exercise Prepare Your Exercise

10
slide-3
SLIDE 3

Collaborative Memory

what are the most important things to remember from the last lab?

slide-4
SLIDE 4
slide-5
SLIDE 5

Oral Attestations

  • Overall went well.
  • Congratulations to you all for passing!
  • Tipp for next time: meet with your team partner some days before

the exam and ask each other for some time about the topics. Do actually fully answer them to each other.

slide-6
SLIDE 6

you set the focus

The iLab Experience

a blended learning hands-on course concept

Your Exercise - Topic Ouline

slide-7
SLIDE 7

Your Exercise Sequence

Voting Outline 1st Lecture Review Final Lecture

Get topic ideas Present 1st ideas Introduce the relevant background to your topic Get and give feedback Present the main learning points and background. 5.6. 19.6. 26.6. 3.7. 10.7. 29.5. 14.5. underlined = you present something here

Didactics Giving Feedback

8.5. Intense Tutoring
slide-8
SLIDE 8

Security

slide-9
SLIDE 9

Available Topics

  • 1. DNS delegations to other zones & querying DNS with GO. —> 205
  • 2. MassDNS. —> 208
  • 3. DNSSec with Linux Tools and GO. —> 206
  • 4. Scanning DNS and DNSSec and mapping results to ASN/ Geolocations. —> 203
  • 5. RPKI Validation. —> 201
  • 6. DANE-TLSA. —> 209
  • 7. CAA. —> 204
  • 8. Certificate Transparency and OCSP revocation. —> 202
  • 9. go-tlsscanner, BGPStream, and AS dynamics. —> 207
slide-10
SLIDE 10

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-11
SLIDE 11

create your own exercise

Scanning DNS + DNSSEC and mapping to ASN/Geolocation

Victoria Simon, Kostiantyn Redko, Group 203

1
slide-12
SLIDE 12

Outline Lecture

  • DNS/DNSSEC

– DNS introduction – DNS file example – DNS operators – DNSSEC overview

  • Practical applications of IP address mapping

– What is it used for

2
slide-13
SLIDE 13

Outline PreLab

  • Plan:

– Give some more background on DNS/DNSSEC – Give a short introduction to command line tools and Go – Give an example program that uses geoip2 database

  • Requirements:

– Basic understanding of DNS and DNSSEC – Introduction to Go programming language

  • Тооls:

– Dig, whois – geoip2-golang tool and database

3
slide-14
SLIDE 14

Outline Lab

  • Create a DNS server on the local setup
  • Scan the sample DNS file
  • Identify common errors when scanning
  • Perform a large-scale scan for:

– Alexa 10k – Random 10k

  • Parse the output and map IP addresses to locations/ASNs
  • Create several charts from that data
4
slide-15
SLIDE 15

Learning Goals

5

The Following Learning Goals are Covered in the Lecture PreLab Lab

Better understanding of DNS and DNSSEC

X X X

Identify common errors when scanning

X

large-scale Scan DNS and DNSSEC

X

Better understanding of Go

X X

Use Go to perform IP address mapping and to do statistics

X

slide-16
SLIDE 16

Teaser Practical Part

6

DNS Server Client

slide-17
SLIDE 17

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-18
SLIDE 18
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21
slide-22
SLIDE 22
slide-23
SLIDE 23 Client Switch Root DNS Server Registrar Server 1 TLD .com DNS server Registrar Server 2
slide-24
SLIDE 24

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-25
SLIDE 25

DNSSEC - reach the website you asked for

Alvin, J.Erasmus - group 206

1
slide-26
SLIDE 26

Outline - Lecture

  • quickly revisit DNS
  • Why is DNS bad? (show shortcomings)
  • Motivation for DNSSEC
  • How does DNSSEC work
2
slide-27
SLIDE 27

Outline PreLab

  • Teach how DNSSEC is deployed and used
  • Required Background:

○ DNS (small revision) ○ GO programming (small tutorial?)

  • Tools: everything needed to check

DNS/DNSSEC records

3
slide-28
SLIDE 28

Outline Lab

  • Setup DNSSEC for own domain
  • manually verify DNSSEC
  • automatic verification (GO programming)
4
slide-29
SLIDE 29

What Will Your Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab DNSSEC security and the concept of delegation X X DNSSEC zone walking X x The use of DS, DNSKEY, RRSIG, NSEC and NSEC3 x X X Use Go to query DNSSEC records, verify signature of RRSIG, and complete DNSSEC chain X x

slide-30
SLIDE 30

Teaser Practical Part

6

webserver serv.sub.top DNS-Server (for sub.top) DNS-server (for top) sub domain .sub.top top domain .top client

1 2 5 4

slide-31
SLIDE 31

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-32
SLIDE 32

create your own exercise

Securing Internet Routing using RPKI

Team 201: Eidenmüller, Thomas; Schwarzenberg, Christoph

1
slide-33
SLIDE 33

Outline Lecture

  • Motivation: Securing BGP
  • Introduction: RPKI & ROA
  • Current deployment state
2
slide-34
SLIDE 34

Outline PreLab

  • Recap: BGP
  • Security issues in BGP
  • RPKI & ROA
  • Prefixes and their maximum length
  • Tools:
  • Dragon Research Labs RPKI Toolkit
  • Quagga/Cisco 800 series
3
slide-35
SLIDE 35

Outline Lab

  • Setup small Internet (similar to BGP lab)
  • Deploy own RPKI Validation server
  • Set up validated router
  • Set up “bad“ router
  • 1. Announce “forbidden” prefixes
  • 2. Exploit maximum length quirk

➢ Discover effects of secured routing

4
slide-36
SLIDE 36

What Will Your Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab Learn about RPKI and RPKI ROA X X Deploy a partially RPKI validated Internet X X Understand and exploit the max. prefix length problem X X Understand and verify the chain of trust X X X Discover the effects of secured routing X X X

slide-37
SLIDE 37

Teaser Practical Part

6

RPKI Validator AS 1 “Good AS“ AS 2 “Good AS“ AS 3 “Bad AS“ User (Ping) Monitor3

slide-38
SLIDE 38

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-39
SLIDE 39

iLab2 —Your own exercise BGP Anomaly Analysis

207 Inkeri Sepp¨ al¨ a & Philipp Trucks¨ aß

slide-40
SLIDE 40

Outline Lecture

TLS encryption & authentication Routing, BGP artifacts, prefixes, anomalies & hijacks Recognizing attacks and differentiate from accidents

slide-41
SLIDE 41

Outline PreLab

Basic understanding of certificates & BGP routing Differentiate anomalies & attacks through continuous TLS scanning Tools: BGPStream, go-tlsscanner, golang scripting

slide-42
SLIDE 42

Outline Lab

Run TLS scan on Alexa Top 1M & hash certificates Use BGPStream for historical and live data & evaluate output Write go-script to detect (sub)MOAS events from the stream Detect affected domains Extend script to identify legitimate anomalies via TLS key consistency

slide-43
SLIDE 43

What will your students learn?

The following learning goals are covered in the Lecture PreLab Lab Understand BGP and its vulnerabilities x x Understand what TLS is used for x x Use BGPStream & understand output x x Take advantage of go-tlsscaner x x Identify & understand BGP anomalies x x Utilize TLS to distinguish artifacts & attacks x x Write scripts for massive data evaluation x
slide-44
SLIDE 44

Teaser practical part

WWW 1x PC pp. Access to WWW golang development setup

slide-45
SLIDE 45

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-46
SLIDE 46

create your own exercise

Who has the DNS?

Shen Hu and Andreas Wehe (208)

1
slide-47
SLIDE 47

Outline Lecture

  • DNS mechanism at scale
  • Who is the DNS authority, slight trust issues
  • DNS outsourcing & censorship
  • Teaser: measurement to plot to paper
2
slide-48
SLIDE 48

Outline PreLab

  • DNS components in detail
  • DNS basics: authority, cache, resolver
  • “Manual crawl” with dig
  • Man massDNS
  • Ipynb simple plot
3
slide-49
SLIDE 49

Outline Lab

  • Warm up: Dig, probe one website
  • Analyse the DNS response: What do we get?
  • Setup Massdns & explore Alexa top 1M
  • Ipynb: graphical impression of DNS sources
  • Focus on outsourcing DNS
4
slide-50
SLIDE 50

What Will Your Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab Understand DNS participants: authority, cache, resolver X X X Understand challenge of probing the internet at scale X X Learn to use tools: dig, massDNS/Zmap X X Employ IpyNB for number crunching for visualization X X Reflect roles of DNS providers in the infrastructure X X X

slide-51
SLIDE 51

Teaser Practical Part

6

This is your playground:

The Internet

slide-52
SLIDE 52

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-53
SLIDE 53

Trust me, I am a DANE-TLSA

Sebastian Borchers, Mihailo Rajacic, Team 209

1
slide-54
SLIDE 54

Outline Lecture

➢ Problems with CA we are facing currently ➢ If CA is hacked/breached, attackers can issue certificates and fake for example to be your bank's website. Knowing that lots of CA’s exist, it can bring a lot of potential attacks ➢ Solution: DANE-TLSA ➢ We explain what it is and how it can solve the problem ➢ Why is it not yet mass deployed? ➢ What is so interesting? ➢ DNS is one of the key components of the Internet, but it is also vulnerable -> you enhance this and make it more secure ➢ Imagine you want to do your online banking, but somebody fakes the certificate of your bank's website and scams you. With Dane-TLS it would not have happened

2
slide-55
SLIDE 55

Outline PreLab

In prelab we are planning to show: ➢ Brief reminder of how basic DNS works Introduce NSLookUp/Dig/... ➢ Why DANE-TLSA is necessary (Security, independence of CAs) ➢ TLSA-Record: Usage and Structure ➢ How DNS is more secure with DANE ➢ Highlighting the necessity of DNSSEC, in order for DANE to be trustworthy

3
slide-56
SLIDE 56

Outline Lab

4

In Lab part our goal is to: ➢ Setup Lab system script ➢ Write Go code template to retrieve certificates with TLS ➢ Write Go code template to retrieve DANE-TLSA records and parse them according to the 2x3 different storage options defined by the IETF ➢ Write Go code template to determine whether a certificate retrieved via TLS is correctly specified in DANE-TLSA ➢ Perform Man In the Middle attack ➢ Make efficient hints for students to complete Go code templates and make them work

slide-57
SLIDE 57

What Will Your Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab Understand theoretical aspect of DANE-TLSA X X Learn why DANE-TLSA is important, but not yet in mass use X X Understand and use TLS certificates X X X Learn importance of DNS security X X X Complete Go code exercises on DANE-TLSA X

slide-58
SLIDE 58

Teaser Practical Part

6 PC3: Attacker PC1: Client PC5: DNS Server PC4: Web server
slide-59
SLIDE 59

LiteratureYour Students Learn?

[1.] https://tools.ietf.org/html/rfc6698 [2.]https://docs.google.com/document/d/1UFdNEBR65OPrLNlvfWIyyolSF0U2WrnateKl7o s5yaE/edit?usp=sharing [3.] https://datatracker.ietf.org/meeting/87/materials/slides-87-dane-2

slide-60
SLIDE 60

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-61
SLIDE 61

create your own exercise

Certification Authority Authorization (CAA)

Caroline Gergen | Juan Jaramillo | 204

1
slide-62
SLIDE 62

Outline Lecture

  • Theoretical background of CAA
  • Importance of CAA
  • Structure and how to obtain CAA records
  • Pros and contras of CAA
2
slide-63
SLIDE 63

Outline PreLab

  • Introduction to the CAA format and records
  • Vulnerabilities and alternatives to CAA
  • Error potential of CAA
3
slide-64
SLIDE 64

Outline Lab

  • Usage of the „dnscaa“ tool
  • Retrieve, parse and evaluate CAA records
  • Handle revoked CAA Records
4
slide-65
SLIDE 65

What Will The Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab Theoretical background of CAA X Pros and contras of CAA X Understand the CAA format X X Retrieve and parse CAA Records X X Usage of the „dnscaa“ tool X Handle revoked CAA Records X

slide-66
SLIDE 66

Teaser Practical Part

6

This is your playground:

3x Quad Core fast PC with 3-4 usable LAN interfaces per machine. 2x Ethernet switch 2x Work Place with KVM DNS Server Webserver (Domain) PC for retrieving CAA records, etc.
slide-67
SLIDE 67

Order of Presentations

Team Topic 203 Scanning DNS and DNSSec and mapping results to ASN/Geolocations 205 DNS delegations to other zones & querying DNS with GO 206 DNSSec with Linux Tools and GO 201 RPKI Validation 207 go-tlsscanner, BGPStream, and AS dynamics 208 MassDNS 209 DANE-TLSA 204 CAA 202 Certificate Transparency and OCSP revocation

slide-68
SLIDE 68

create your own exercise

Guess the correct log – CT insights

Berkay Kozan, Jan Krol Group 202

1
slide-69
SLIDE 69

Outline Lecture

  • What do you plan to teach in the lecture?
  • The vulnerabilites of SSL.
  • How CT operation works.
  • How log proofs work.
  • Why is your topic interesting?
  • It shows modern and future technology in web security.
  • Every secure website has to use CT nowadays.
  • What cool stuff do you want to communicate to those doing

your planned lab?

  • This lab will be in the style of a TV game-show for IT experts(nerds)
2
slide-70
SLIDE 70

Outline PreLab

  • What do you plan to do in the PreLab?
  • Deepen the SSL handshake and vulnerabilities
  • Show the technology behind CT like Auditors, Monitors and Log Proofs
  • What is the required Background for the lab?
  • The students should know SSL handshake
  • Understand how log proofs work
  • What are relevant tools you present?
  • Chrome Developer Tools & openSSL
3
slide-71
SLIDE 71

Outline Lab

  • What do you plan to do in the Lab?
  • In the theme of a nerdy TV game show, the participants have to fetch data from CT log and

establish a TLS connection to the game show safe

  • What is the general setup?
  • There will be 2 computers needed: a web server and a client.
  • In which parts do you structure the lab?
  • Setting up and establishing SSL connection
  • Fetch data from CT log
  • Compare SCT in TLS connection with logged SCT
  • Students write a small auditor which fetches SCTs regularly in order to win the big prize in the

game

4
slide-72
SLIDE 72

What Will Your Students Learn?

5

The Following Learning Goals are Covered in the Lecture PreLab Lab Students understand CT operation X X X Students understand the vulnerabilities of SSL. X X Students understand how log proof works X X Students write code to fetch data from CT log X X Students write code to compare SCT in TLS connection with logged SCT X X Students write a small Auditor for CT that fetches SCTs regularly and compares with what it sees in the TLS connection X

Adapted from Your Exercise: Topic Presentation
slide-73
SLIDE 73

Teaser Practical Part

6
slide-74
SLIDE 74

ds2os.org/

Orchestration Distributed Smart 2pace System

DIY - Hardware Creation

slide-75
SLIDE 75

Orchestration Distributed Smart 2pace System

Smart Space Orchestration

Physical World Physical World Computer Virtual World Computer

}

Image Source: http://blogs.imediaconnection.com/blog/2013/05/30/the-true-impact-of-an-app-economy/
slide-76
SLIDE 76

Three parts

  • DIY HW
  • Build an actual hardware device
  • Work with a microcontroller
  • DIY SW
  • Learn about semantic modeling, middleware, blackboard coupling,

autonomous management, …

  • P2P Measurements
  • Learn about doing and evaluating measurements in a distributed

system.

slide-77
SLIDE 77

ds2os.org/

Orchestration Distributed Smart 2pace System

ID card-based Reconfiguration of a Smart Room

77
slide-78
SLIDE 78

Profile mop Profile b Profile Standby

The ID cards can be used to configure Smart Environments

Profile Store 78
slide-79
SLIDE 79

Profile mop Profile b Profile Standby

ID card Profile Store Profile mop Profile b Profile Standby

The ID cards can be used to configure Smart Environments

alarm ceiling light PC shutters … 79
slide-80
SLIDE 80 80
slide-81
SLIDE 81

“So what?”

81
slide-82
SLIDE 82

DIY Hardware

13€ 60€ 10€ 40€

<200€

82
slide-83
SLIDE 83

Dave Mellis Tom Igoe Gianluca Martino David Cuartielles Massimo Banzi time 2005 Creating your own hardware is difficult. Creating your own hardware is easy. *HW Maker Culture

83
slide-84
SLIDE 84

Orchestration Distributed Smart 2pace System

TWO DIY Maker Cultures

DIY Hardware

DIY Software

Arduino DS2OS Smart Device Smart Space App time ?

A computing system that is typically embedded, interfaces its environment via sensors and actuators, and can be remotely managed.

2005

Portable easy-to-program applications that manage smart environments. 84

Creating your own IoT Software Apps is difficult. Creating your own IoT Software Apps is easy.

slide-85
SLIDE 85

Orchestration Distributed Smart 2pace System

DIY Hardware

DIY Hardware

DIY Software Arduino DS2OS Smart Device Smart Space App time 2016

slide-86
SLIDE 86

ds2os.org/

Orchestration Distributed Smart 2pace System

s2o - hardware

Marc-Oliver Pahl

slide-87
SLIDE 87

Orchestration Distributed Smart 2pace System

What is this about?

Smart Devices

A hardware device that can sense and interact with its environment via sensors and actuators, and that can be managed remotely using software is called Smart Device.

Smart Spaces

A physical space that contains smart devices is called Smart Space.

Smart Space Orchestration

Monitoring and controlling (managing) Smart Devices within a Smart Space with software is called Smart Space Orchestration.

slide-88
SLIDE 88

Orchestration Distributed Smart 2pace System

Creating Hardware

time 2005 Creating your own hardware is difficult. Creating your own hardware is easy.

slide-89
SLIDE 89

Orchestration Distributed Smart 2pace System

Massimo Banzi - one of the creators of Arduino 2012 TED talk

slide-90
SLIDE 90
slide-91
SLIDE 91

Orchestration Distributed Smart 2pace System

Arduino Video

  • Arduino
  • Created 2005 at IVREA for simplifying interaction design class
  • Industrie 3.0 (create objects on your own)
  • Open Source Hardware => Makers Movement
  • “you have unlocked” … “I just feel overwhelmed” … “going into

every field you could imagine”

slide-92
SLIDE 92

Orchestration Distributed Smart 2pace System

Do It Yourself (DIY) Hardware

You will experience it in this lab…

slide-93
SLIDE 93

Orchestration Distributed Smart 2pace System

Introduction to Electronics

The electrical engineering details will not be part of the exam. Slides by Alexander Güssow

slide-94
SLIDE 94

Orchestration Distributed Smart 2pace System

How is a Breadboard cabled?

slide-95
SLIDE 95

Agenda

  • Introduction to Electronics

– Voltage and current – Units and parameters – Resistance: Ohms Law and Kirchhoff's Laws – (Light Emitting) Diodes

  • Common Sensor types
2
slide-96
SLIDE 96

Voltage in practice

  • Voltage 𝒗 𝒖 : ℝ → ℝ
  • Always measured between two points
  • 𝑣 𝑢 = 𝑑 where 𝑑 ∈ ℝ

DC Voltage

  • 𝑣 𝑢 = û sin 2𝜌𝑔𝑢

AC Voltage

  • Touching >50V AC or >120V DC can harm you
7
slide-97
SLIDE 97

Voltmeters measure static and fluctuating voltages

Source: Fluke 80 Series V User Manual, May 2004 Rev.2, 11/08, page 14 8
slide-98
SLIDE 98

Oscilloscopes display time-variant voltage curves

Source: https://www.adafruit.com/products/2145, 18.11.2015
slide-99
SLIDE 99

Current

  • Voltage sources: Pump analogy
  • Closing the circuit

– Charge Flow?

Current is the charge flow rate in a circuit in Coulomb/s.

10
slide-100
SLIDE 100

Current in practice

  • Current 𝒋 𝒖 : ℝ → ℝ
  • Different charged particles
  • Actual direction unknown
  • Closed electric circuit
  • Stopping large currents quickly is dangerous
11
slide-101
SLIDE 101

Ammeters measure static and fluctuating currents

Source: Fluke 80 Series V User Manual, May 2004 Rev.2, 11/08, page 25 12
slide-102
SLIDE 102

Voltage and Current

Measurements

14 Source: https://commons.wikimedia.org/wiki/File:Masc henregel.svg, 19.11.15 Source: Adapted from http://www.elektronik-kompendium.de/sites/grd/0201113.htm, 19.11.15
slide-103
SLIDE 103

Common units and parameters

15

Name Symbol SI-Unit Formula Voltage U or u(t) or V V Current I or i(t) A Electric Power P W 𝑄 = 𝑉 ⋅ 𝐽 Electric Energy W Ws, J 𝑋 = 𝑄 ⋅ 𝑢 Electrical resistance R Ohm (Ω) 𝑆 = 𝑉/𝐽

slide-104
SLIDE 104

Ohms Law

  • R is constant
  • One free variable remains
  • Intrinsic property
  • Physical device: Resistor
  • Color of the rings encodes

their value

Resistance

𝑆 = 𝑉 𝐽 Resistor (circuit symbol) Resistor (picture)

slide-105
SLIDE 105 Source: Adapted from https://upload.wikimedia.org/wikipedia/commons/d/d7/FourIVcurves.svg, 19.11.15

𝐽(𝑉) = 𝑉 ⋅ 1 𝑆

Resistor Current-Voltage characteristic

slide-106
SLIDE 106

Resistor color codes

Source: http://www.digikey.com/- /media/Images/Marketing/Resources/Calcul ators/resistor-color-chart.jpg, 19.11.15 18
slide-107
SLIDE 107

Kirchhoffs 1st Law

„The sum of currents into and out of any single node of a network is always zero.“ Pay attention to the direction of the current-arrows:

  • Arrows into a node are positive
  • Arrows out of a node are negative

Kirchhoffs 1st law holds for all nodes in a circuit.

𝑗𝑙

𝑜 𝑙=1

= 0

Source: http://www.elektronik-kompendium.de/sites/grd/0608011.htm, 19.11.2015

𝐽 − 𝐽1 − 𝐽2 − 𝐽3 = 0

Source: https://commons.wikimedia.org/wiki/File:Kirchhoff%27s_Current_Law.svg, 19.11.2015
slide-108
SLIDE 108

Kirchhoffs 2nd Law

„The sum of Voltages in any closed loop through a cirquit is always zero.“ Source: http://www.elektronik-kompendium.de/sites/grd/0608011.htm, as of 19.11.2015

𝑉2 + 𝑉1 − 𝑉𝑟1 − 𝑉𝑟2 = 0

Source: https://en.wikipedia.org/wiki/File:Kirshhoff-example.svg, as of 19.11.2015

𝜁1 − 𝑆1 ⋅ 𝑗1

𝑃ℎ𝑛𝑡 𝑀𝑏𝑥

− 𝑆2 ⋅ 𝑗2 = 0 𝜁2 − 𝜁1 − 𝑆2 ⋅ 𝑗2 − 𝑆3 ⋅ 𝑗3 = 0

slide-109
SLIDE 109

Resistor superposition

Series circuit 𝑆𝑢𝑝𝑢𝑏𝑚 = 𝑆𝑙 𝑜 𝑙=1 Parallel circuit 𝑆𝑢𝑝𝑢𝑏𝑚 = 1 1 𝑆𝑙 𝑜 𝑙=1

Source: http://www.iris.uni-stuttgart.de/lehre/eggenberger/eti/, Chapter 8, as of 19.11.2015

slide-110
SLIDE 110

Voltage divider circuit

Known: U Wanted: R1 and R2 such that U1 and U2 are what we want

  • Choose two of: I, R1, R2
  • Then solve:

𝑉1 = 𝑉 𝑆1 𝑆𝑘

𝑜 𝑘=0

  • Loading the output also

changes U1 and U2

Source: https://commons.wikimedia.org/wiki/File:Einfacher- unbelasteter-Spannungsteiler.svg, as of 19.11.2015
slide-111
SLIDE 111

Current divider circuit

Given I, R1 and R2, what are I1 and I2? 𝐽1 = 𝐽 1/ 1/𝑆𝑘

𝑜 𝑘=0

𝑆1

Source: https://commons.wikimedia.org/wiki/File:Stromteiler.svg, as of 19.11.2015
slide-112
SLIDE 112

(Light Emitting) Diodes – I-V Diagram

Source: http://electronics.stackexchange.com/questions/76367/accounting-for- led-resistance, as of 19.11.15

slide-113
SLIDE 113

LEDs I-V Diagram, Case specs

Source: http://www.electronics.dit.ie/staff/tscarff/DT089_Physical_Computing_1 /LEDS/Leds.htm, as of 19.11.15

slide-114
SLIDE 114

How to actually use LEDs

  • 𝐽𝐸𝑗𝑝𝑒𝑓 𝑊

𝐸 = 𝐽𝑇 𝑓

𝑊𝐸 𝑜⋅𝑊𝑈 − 1

  • Current rises exponentially with voltage
  • Diodes will break if the 𝐽𝐺 current is exceeded
  • Linearize & shift this using a Resistor in Series
  • Kirchhoff‘s 1st gives: 𝐽𝑀𝐹𝐸 = 𝐽𝑆 so let 𝐽 = 𝐽𝐺

𝑛𝑏𝑦

  • Choose suitable R such that the LED is only at about

80% 𝐽𝐺

𝑛𝑏𝑦 when the circuit is operating

slide-115
SLIDE 115

Resistor-Diode and Diode I-V Diagram

Source: Own work using LTSpice simulation program, IN4148 Diode

slide-116
SLIDE 116

Common Sensors

Resistive type

  • Used like a resistor
  • Resistance will change

with measure

  • Correlation can be non-

linear Digital type

  • Analog – Digital

conversion on-chip

  • Digital signal

– PWM (Automotive) – Manufacturer specific protocol – Bus (I2C, CAN, ...)

slide-117
SLIDE 117

Microcontroller interfaces

I2C / TWI GND, TCL, SDA Master-Slave-Bus GPIOs PxN, i.e. PB1

29

UART / Serial TIA-232-F GND, Rx, Tx Point-to-Point SPI SCLK, MOSI, MISO, nSS / nCS Master-Slave-Bus Selected Star or Daisy-Chaining

slide-118
SLIDE 118

Using Manufacturer Specific Interfaces

  • Read Datasheet

– Voltage levels – Timing requirements – Sample comm diagrams

  • Debugging tools (multimeter, oscilloscope

protocol analyzer)

  • Real time requirements
slide-119
SLIDE 119

(Embedded) Computer Architecture

Bare metal

  • Avoid non-determination
  • Get maximum run time
  • Similar to OS-like solutions

– Preemption – Priorities – Cyclic approach – Event driven approach

Operating system

  • Desktop OS are non-

deterministic

  • Real time OS (RTOS)

– Priority Scheduling – Preemptive Scheduling

  • System libraries run time is

known / bounded

slide-120
SLIDE 120

Arduino Mega 2560

  • 16 MHz ATmega2560
  • 8 kB RAM
  • GPIO, max. 1 MHz
  • UART, I2C, SPI
  • ADC, (PWMDAC)
  • Bare Bones
34
slide-121
SLIDE 121

Arduino Hardware Architecture

36

ATmegaX: 8-Bit Harvard RISC

Source(s): https://nishantnath.com/2012/03/23/introduction-to-atmega-microcontrollers/, as of 23.05.16

USB/Programmer (ATmega16U2)

slide-122
SLIDE 122

you set the focus

The iLab Experience

a blended learning hands-on course concept

Your Exercise - Topic Ouline

slide-123
SLIDE 123
  • Week -4: Concept & T
  • pic Pitch
  • Prepare your outline talk
  • Week -1:Outline Presentation
  • Present a first structure for your lab, prelab, and lecture.
  • Week 1: Didactics & T

echniques & Preparation

  • Lecture Preparation (most relevant concepts?)
  • Prelab Preparation (detailing the lecture content + tools + more)
  • Practical Part Lab Preparation (no cooking recipe)
  • Week 2: Your lecture
  • Finalise and improve your content.
  • Week 3: Review and Get Reviewed
  • Review other team
  • Get reviewed by other team
  • Week 4+5: Present the lab and the feedback received & next steps
  • Improve by materialising the feedback
  • Week 6: Final presentation (Lecture with lab outlook, highlights)

peer grading

  • 1 slide deck for topic outline

presentation (both talk!)

* 1st structure => mature structure
  • Slide deck lecture (both talk!)
  • Ready PreLab, Lab
  • Review report
  • Slide on review feedback &

planned improvements

  • Final lecture slides
  • Final PreLab, Lab, Peer Grade

Expected Artefacts

your exercise

Marc-Oliver Pahl 2017 5.6. 19.6. 26.6. 3.7. 10.7. 29.5. 8.5. Intense Tutoring
slide-124
SLIDE 124

iAdvise

ralph.holz@sydney.edu.au Mon Tue Wed Thu Fri

Exchanging about the Plan Progress Report and remaining Steps Each team ~1h Each team ~1h

slide-125
SLIDE 125

Enjoy =)

Flickr:nist6dh