By Topic

Automatic test equipment (ATE) on a network (securing access to equipment and data)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
McCarty, J.R. ; ESCDIWI, San Antonio, TX

Integrating ATE into a network allows faster software upgrades to operating systems and Test Program Sets (TPS) for ATE systems. Upgrades to operating systems can be made to several ATE stations at one time from one computer TPS can be stored onto a sewer that can be shared by all the ATE stations. This allows upgrades to TPS at one location and not across ad of the ATE stations. Test data, calibration data, and other files on ATE stations can be monitored for troubleshooting of the system. Having ATE stations on a network, however, could pose some security risks if security is not addressed during the integration design process. The designer must have intimate knowledge of the network architecture and network security products to secure access to the equipment and protect the information flow to and from the ATE. The OSI model can assist the designer in understanding the network architecture and understanding at which level of the architecture the different security products can be applied to meet the security goals. At the network architectural level the ATE integrator becomes familiar with routers, switches, hubs, and methods of controlling traffic on a network. At the secured level the ATE integrator addresses which level of the OSI model to secure. Security can be applied at the top of the model at the application layer with products like Public Key Infrastructure (PKI), at the middle of the model at the session layer with products like firewalls, or at the bottom of the model at the physical layer with cryptographic devices. The last item that the designer needs to include during the integration of ATE onto a network is the network administrators

Published in:

AUTOTESTCON Proceedings, 2000 IEEE

Date of Conference: