Toward an IPv6 world in mobile networks
|
|
|
- Dale Black
- 10 years ago
- Views:
Transcription
1 The advance to Toward an world in mobile s has served the internet well, but the world has to shift to and soon. Mobile s need to be among the first to make the change. Fortunately, there are good mechanisms available to ease this transition... ARI KERANEN, JARI ARKKO, SURESH KRISHNAN AND FREDRIK GARNEIJ The internet has outgrown the limits of its current address space. solves the address space problem, but migrating to the new version still requires some effort and a set of transition mechanisms. This article presents mechanisms for providing connectivity, and outlines their benefits, applicability and the challenges faced during different phases of the transition, particularly by mobile s. Measurements relating to use, as well as user trials are also presented. Background The address space with roughly 4 billion globally unique addresses has turned out to be inadequate for the billions of devices that are part of the global internet today, and the tens of billions of devices that are expected to exist in the near future. BOX A Terms and abbreviations ALG APNIC DHCP DNS DNS64 EPC GPRS GTP IANA IETF IKE IMS IP application-level gateway Asia Pacific Network Information Centre Dynamic Host Configuration Protocol Domain Name System DNS translation for NAT64 Evolved Packet Core general packet radio service GPRS Tuneling Protocol Internet Assigned Numbers Authority Internet Engineering Task Force Internet Key Exchange IP Multimedia Subsystem Internet Protocol IANA, the main authority responsible for assigning IP addresses, recently allocated the last address blocks to the Regional Internet Registries (RIRs), which in turn will assign these blocks within their geographical regions through ISPs. In mid-april 2011, the first RIR to run out of major address blocks was APNIC. The other RIRs will follow suit within a few years. The problem of a shortage of addresses was identified back in the late 1980s. Solutions were developed for both sharing addresses and for increasing the size of the address space. Network address translation (NAT) has since become a common mechanism for sharing a small number of globally unique addresses among a large number of hosts. NAT works by providing private (usually RFC ) addresses to hosts and translating them into public address/port pairs on demand when the hosts send packets to the internet. NAT provides effective statistical multiplexing, but constantly IP version 4 IP version 6 ISP internet service provider MSP Multiservice Proxy MTU maximum transmission unit NAT address translation NAT44 NAT between and s NAT64 NAT between and s PDP Packet Data Protocol RIR Regional Internet Registry user equipment XMPP Extensible Messaging and Presence Protocol connected hosts reduce this effectiveness, as do many web applications that demand multiple ports. NAT also introduces further complications (Box B). Nevertheless, many mobile s employ NAT today, and more will do so in the future. While NAT was devised as a shortterm solution, the IETF defined the next version of IP,, as the long-term solution for the address shortage. has numerous improvements over, but one key feature is the fact that the new address space is orders of magnitude larger. Now facing an enormous increase in the number of connected devices, mobile s are among the first that need the address space. migration models Migration to is essential if the internet is to continue to grow, but it will not happen overnight; rather it will take place over a number of years and in several phases. Different s may end up utilizing different migration mechanisms, depending on their specific needs and constraints. Dual-stack Network equipment and dual-stack hosts have stack support and IP addresses from both and. When services are available over, hosts use native connectivity, but for services available only over, that version is used instead. If the equipment supports, dual-stack can be utilized simply by configuring the nodes appropriately. Existing mobile nodes, such as the Ericsson GPRS and
2 EPC core nodes, have such support. Dual-stack and native connectivity do not introduce additional encapsulation, processing or new nodes, so dual-stack s are robust and reliable. As such, dual-stack is the recommended transition model for the majority of the s. Most mobile s may need to employ the dual-stack model together with a NAT on the side, because they may not have enough public addresses for all their users. This is particularly true for the growing set of constantly connected applications. Fortunately, with dual-stack, an increasing amount of traffic can be moved to. A large proportion of all internet traffic is directed to a few large content providers, such as Akamai and Google 2. When these s enable, dualstack s can move much of this traffic to and reduce the load on the NAT device. Most of these large content providers along with Ericsson are participating in World Day on June 8, On that day, will be enabled by default for 24 hours on numerous s and sites that previously supported only. The aim is to identify any remaining issues with widespread usage in these s. Most of the potential problems associated with using are, after all, of a practical nature, such as: ensuring that the necessary components have turned on; that configurations are correct; and that any implementation bugs have been removed. The native dual-stack model is shown in Figure 1. Here the entire from the to the servers running the services supports both and. s can be accessed using either protocol, depending on which one is supported by the particular service. If NAT44 is used, the connections go through address translation at the edge of the two s, but for connections there is no need for any address translation. In 3GPP-based mobile s, s can request or Packet Data Protocol (PDP) contexts. user-traffic support was added to the Ericsson GPRS product family in , enabling native connectivity in mobile s. The main driver was IMS, which initially supported only. BOX B Among other issues, NAT may: prevent un soli cited incoming connections to hosts inside the behind the NAT. While this was fine when hosts were merely clients for services provided over the internet, this complicates the new contentcreation models where hosts also provide services to the internet; require that hosts send keep-alive messages so that NAT bindings remain active. This can cause excessive (and unnecessary) traffic on expensive and spectrum-bound radio interfaces, and reduce battery life on mobile devices; require the use of ALGs to enable certain classes of application to work through the NAT; and cause complications related to debugging and management. FIGURE 1 Native dual-stack model / (NAT44) Dual-stack connectivity requires both and PDP contexts, however, having separate PDP contexts consumes resources. Release 8 of the 3GPP standards included the introduction of a dual-stack connection capability making it possible to use both and over a single bearer. This capability is now being introduced into Ericsson products. The dual-stack mechanism is useful when actual destinations advertise addresses. How many websites are - enabled? The top three of the 1 million Probability (%) / most popular websites 4 google.com, facebook.com and youtube.com provide addresses, at least for parts of their sites. However, the likelihood of finding an address falls dramatically beyond these three. The top 100 sites include 24 that are -enabled, but for the top 1 million sites the rate is only 3.2 percent. The probability of finding an -enabled site, as a function of the most popular sites examined, is shown in Figure 2. After falling below 2 percent around 50,000 sites, the probability starts to increase slowly as many FIGURE 2 address record probability by Alexa Rating Number of sites examined (in thousands)
3 The advance to FIGURE 3 Tunneling over -only (over ) Tunnel endpoint of the sites positioned below the first 50,000 are in fact hosted by Google. Delay and failure rates for downloading websites over and were measured. For most of the 6,884 topranked sites accesible using both and, the delay penalty for was insignificant. For 90 percent of the sites tested, was either faster or up to 2.6ms slower than in delivering the first two packets of the TCP handshake. On the other hand, 5 percent of sites had an average additional delay of more than 37ms, possibly due to packet loss or bad routing. TCP connections over failed more often than their counterparts: whereas roughly 1 percent of sites were inaccessible with, around 2 percent failed with. / Some content providers have been reluctant to enable. The reasons for this include delays for applications attempting to connect over broken links before falling back to, and unreliable connectivity. Bad routing has been behind many of the problems. Among the causes are broken 6to4 tunneling protocol 5 connectivity, experimental setups that are untested and unmonitored, and configuration problems with firewalls. The situation is improving as more users and operators put to use and fix the problems that emerge. Technical measures, such as deprioritizing 6to4, have also proven helpful. World Day will help to uncover further problems and, more importantly, resolve them. FIGURE 4 Address translation with NAT64 and DNS64 -only DNS64 (to/from destination) NAT64 / BOX C Figure 3 shows an example of tunneling over. The is in an -only, and when services are used, the packets are sent over to the tunnel endpoint. The tunnel endpoint removes the encapsulating header and sends the packets forward. In the reverse direction, incoming packets that are addressed to the are encapsulated by the tunnel endpoint in before forwarding them on to the. Tunneling Tunneling mechanisms can provide access over s (the most common form of access today) and access over s, which is set to become more popular as becomes more widespread. Tunneling mechanisms work by encapsulating the payload IP version into the transport IP version in order to travel across a that does not recognize the payload IP version. The IP packets used by the endpoints are encapsulated in IP packets using the version supported by the, then decapsulated before the other endpoint uses them. The tunnel endpoints that perform encapsulation and decapsulation can be either elements or the endpoints themselves. Commonly, one tunnel endpoint is a dual-stack host, the access of which supports only one IP version while the other endpoint is a dual-stack element with both and access. Regardless of the mechanism used, a host using tunneling for (or ) connectivity appears as a dualstack host for local applications and for other hosts. Tunneling mechanisms have some drawbacks such as a smaller maximum transmission unit (MTU, the biggest packet size that can be used without fragmentation) due to the additional IP headers and reliance on the tunnel endpoints to provide the encapsulation service. However, many of these problems can be mitigated with proper design. Mobile s employ GTP to allow terminals to move around while retaining connectivity. Because these tunnels effectively separate the IP s, an operator can enable for subscribers without requiring that every router in its own or its roaming partners s supports. -only s with / NAT When all devices in a support, sometimes the simplest configuration is to employ only. NAT64, along with DNS64, can provide access to services from -only s 6. This is important in the final phases of transition, because for quite some time certain content will be available only in the internet. NAT64
4 works by translating packets into packets, and vice versa. Every address has a special representation in the address space, and a DNS64 service automatically synthesizes addresses for hosts that only have an address. In the address translation process outlined in Figure 4, first performs a DNS query to DNS64 for the address of the server providing the service. If the server has an address in the domain name system records, the DNS64 returns this record unchanged and the uses to connect to the server directly. Otherwise, the DNS64 returns a synthesized address, and packets using that address are automatically routed to the NAT64. The NAT64 will perform address translation and forward packets to the right destination. Return traffic is translated back to and forwarded to the. In mobile s, the Ericsson MSP 5.3 can be configured to provide a carrier-grade NAT64 translation service. There are many reasons for using only : cost reductions, ease of management, simplified planning and, of course, the availability of IP addresses for the. An -only does, however, place demands on the devices and applications using it, and even claimed compatibility may not always be sufficient for smooth operation. To gather practical experience of -only ing, a small number of volunteers used an -only at two sites. Based on their experiences, office and home users can already rely entirely on an -only. In terms of web browsers and clients, the volunteers observed no difference when comparing the -only experience with that offered by a dual-stack. Software updates, operating system services, many chat systems and streaming media all worked well. On the other hand, switching off creates challenges for some applications that still do not have support and consequently require additional tunneling mechanisms to work in - only s. When and DHCP are not available, manual configuration of DNS servers is required for some operating systems. The test s used address translation to connect to the -only parts of the internet. In this kind of environment, protocols that use plain addresses (also known as literals) in their payloads can cause problems because those addresses are not translated by the NAT64 unless ALGs are used. The number of literals can be measured from internet content. Of the 10,000 most popular websites, there were no problems with the top 100 in terms of their home pages and the resources required to render them, such as images and JavaScript files. Beyond the most popular sites, the probability of finding an literal increases to roughly 2 percent. The actual effect of these literals depends on how the site uses these resources; some may not be visible or usable in any. Some sites were fixed after the owners were notified of such problems. The practical effect of this problem with web-based content is negligible: the volunteers ran into it only a couple of times over the course of a year. With instant messaging (IM), games, applications, and peripheral devices such as webcams, experiences vary. Some IM applications, particularly those using Extensible Messaging and Presence Protocol (XMPP) or web interfaces, work without problems, while others, such as Skype, do not currently support at all. Games that run on a web browser work flawlessly, but there have been only a few stand-alone game applications that have a functioning mode without connectivity. Many peripherals also still support only. On the other hand, applications such as the widely used BitTorrent clients Vuze and μtorrent, as well as the video-streaming service Netflix, have already added support. Switching such bandwidth-intensive applications to run over can provide major relief on the NAT of the side of s. The situation is improving for applications that did not previously work with : a recent release of the massively multiplayer online role-playing game World of Warcraft supports, and support is on the roadmap for Skype to do the same. Experiments have also shown that -only ing is easy to arrange on mobile devices; as long as the device itself supports, the applications tend to work without any problems. Conclusions The number of internet-connected devices has exceeded the capabilities of and adoption of is needed to deal with the growth especially in mobile s, where the number of new users is increasing fastest. The dual-stack mechanism, whereby and operate side-by-side, is the recommended model for migration. If dual-stack is not possible, tunneling mechanisms can be used to provide both IP versions to users. While the number of hosts accessible with has historically been low and the connectivity unreliable, initiatives such as World Day are improving the situation. will no longer be needed in local s during the final phase of the migration, but NAT64 can be used to connect to the internet. While a lot of work remains to be done on support for various applications and devices, it is already possible to live and work with an -only.
5 The advance to Ari Keränen is a research scientist at Technologies in Finland. Ari received his M.Sc. in telecommunications from Helsinki University of Technology in He first joined Ericsson R&D in 2005 to do an internship. Then, after working as a researcher at the university, he returned to Ericsson as a researcher in His research areas, and the topics of his academic publications and IETF standardization contributions, have included delay-tolerant s, host identity protocol and peer-to-peer s. His current focus areas are and the Internet of Things. Jari Arkko is a research scientist at Technologies in Finland. His main interests include internet architecture,, the Internet of Things and social media. He also serves as one of the area directors at the IETF. He has authored 28 RFCs and managed several standards efforts relating to, mobile, EAP, secure neighbor discovery, and MOBIKE. He also builds and operates some of this technology for his own ing needs, including running an -only home automation. Suresh Krishnan is a researcher at Technologies in Montreal, Canada. He has been working with since 1998, and has authored several RFCs related to this area. His main areas of interest include, IP mobility and the smart grid. Fredrik Garneij works with at Ericsson Mobile Packet Core products and participates in 3GPP/IETF standardization. He studied automation engineering at Chalmers University of Technology in Gothenburg, Sweden. He has extensive experience in early deployment of upcoming key internet technologies and is a champion for IP and end-to-end. In 2001 he deployed the first commercial in Europe, while working with Telia. In 2000, he engineered a SIP-based solution that made all Telia employees accessible via their /sip addresses. He has participated in several EC projects related to and has served as an expert in project audits. His passion and hands-on ability have led to several firsts, Lisa and on Android over 3G. References 1. Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.J. and Lear, E. Address Allocation for Private Internets, BCP 5, RFC 1918, February Craig Labovitz, Scott Iekel-Johnson, Danny McPherson, Jon Oberheide and Farnam Jahanian, Internet Inter-Domain Traffic, Proceedings of ACM SIGCOMM 2010, New Delhi. August, Internet Society, World Day, 4. Alexa the Web Information Company, Top 1,000,000 Sites, top-1m.csv.zip 5. B. Carpenter and K. Moore, Connection of Domains via Clouds, RFC 3056, February Bagnulo, M., Matthews, P., and van Beijnum, I., Stateful NAT64: Network Address and Protocol Translation from Clients to Servers, RFC 6146, April 2011.
IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
Industry Automation White Paper Januar 2013 IPv6 in automation technology
Table of contents: 1 Why another White Paper IPv6?... 3 2 IPv6 for automation technology... 3 3 Basics of IPv6... 3 3.1 Turning point/initial situation... 3 3.2 Standardization... 4 3.2.1 IPv6 address
IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas
IPv6 Fundamentals Chapter 1: Introduction ti to IPv6 Copyright Cisco Academy Yannis Xydas The Network Today The Internet of today is much different that it was 30, 15 or 5 years ago. 2 Technology Tomorrow
Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6)
WHITE PAPER www.brocade.com APPLICATION DELIVERY Ensuring a Smooth Transition to Internet Protocol Version 6 (IPv6) As IPv4 addresses dwindle, companies face the reality of a dual-protocol world The transition
Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series
Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly
Whitepaper IPv6. OpenScape UC Suite IPv6 Transition Strategy
Whitepaper IPv6 OpenScape UC Suite IPv6 Transition Strategy Table of Contents 1. Executive Summary 3 2. Introduction 4 3. Technical Basics 5 3.1. IPv4 IPv6 Translation 6 3.2. IP-in-IP Tunneling 7 4. Selecting
464XLAT: Breaking Free of IPv4. [email protected] APRICOT 2014
464XLAT: Breaking Free of IPv4 [email protected] APRICOT 2014 1 Background T-Mobile US is a GSM / UMTS / LTE provider in the USA with 45+ Million subscribers In 2008, T-Mobile launched the first
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
Internet Traffic and Content Consolidation
Internet Traffic and Content Consolidation Craig Labovitz Chief Scientist, Arbor Networks S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan Talk Outline
Deploying IPv6 Service Across Local IPv4 Access Networks
Deploying IPv6 Service Across Local IPv4 Access Networks ALA HAMARSHEH 1, MARNIX GOOSSENS 1, RAFE ALASEM 2 1 Vrije Universiteit Brussel Department of Electronics and Informatics ETRO Building K, Office
WHITE PAPER. Best Practices for Deploying IPv6 over Broadband Access
WHITE PAPER Best Practices for Deploying IPv6 over Broadband Access www.ixiacom.com 915-0123-01 Rev. C, December 2013 2 Table of Contents Udi cusciamenis minctorpos... 4 Toreptur aut dolo cone verum aute
TR-296 IPv6 Transition Mechanisms Test Plan
Technical Report TR-296 IPv6 Transition Mechanisms Test Plan Issue:1 Issue Date: November 2013 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit corporation organized
Network Address Translation (NAT)
Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network
Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan
Internet Inter-Domain Traffic Craig Labovitz, Scott Iekel-Johnson, Danny McPherson Arbor Networks Jon Oberheide, Farnam Jahanian University of Michigan Motivation Measuring the Internet is hard Significant
IPV6 IN MOBILE NETWORKS
TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 IPV6 IN MOBILE NETWORKS SANOG24 IPV6 PRESENTATION 2ND AUGUST 2014 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering Telstra Unrestricted
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
IPV6 IN MOBILE NETWORKS
IPV6 IN MOBILE NETWORKS APNIC37 - TUTORIAL PRESENTATION TUESDAY 25/02/2014 TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 Sunny Yeung Senior Technology Specialist Telstra Wireless Data Engineering AGENDA 1. Why
Application Delivery Networking
Application Delivery Networking. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: 8-1 Overview
464XLAT: Breaking Free of IPv4. Cameron.Byrne @ T-Mobile.com NANOG 61 June 2014
464XLAT: Breaking Free of IPv4 Cameron.Byrne @ T-Mobile.com NANOG 61 June 2014 1 Goals of Talk 1. Declare victory for IPv6 2. Explain IPv6-only approach at T-Mobile US 3. Discuss risks related to IPv4-only
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
IPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Introduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect
Trends in Internet Traffic Patterns Darren Anstee, EMEA Solutions Architect This Talk The End of the Internet as we Know it We present the largest study of Internet traffic every conducted Peer-reviewed
Strategies for Getting Started with IPv6
Strategies for Getting Started with IPv6 IPv6 Transition Acceleration Options for Web Applications and Services By Scott Hogg GTRI - Director of Technology Solutions CCIE #5133, CISSP #4610 IPv6 Transition
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Firewalls und IPv6 worauf Sie achten müssen!
Firewalls und IPv6 worauf Sie achten müssen! Pascal Raemy CTO Asecus AG [email protected] Asecus AG Asecus AG Security (Firewall, Web-Gateway, Mail-Gateway) Application Delivery (F5 Neworks with BIGIP)
VDE Tagung Mobilkommunikation 2014, Osnabruck 22.05.2014
Gabriel Bertram, Detecon International GmbH, Cologne Andreas Grebe, Cologne University of Applied Sciences, Computer Networks Research Group Holger Metschulat, Deutsche Telekom Technik GmbH, Darmstadt
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues
IPv4/IPv6 Transition Using DNS64/NAT64: Deployment Issues Enis Hodzic BH Telecom.d.o.o Sarajevo, Bosnia & Herzegovina [email protected] Sasa Mrdovic Faculty of Electrical Engineering University
Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing
White Paper Transition to IPv6 for Managed Service Providers: Meet Customer Requirements for IP Addressing What You Will Learn With the exhaustion of IPv4 addresses, businesses and government agencies
THE ADOPTION OF IPv6 *
THE ADOPTION OF IPv6 * STUDENT PAPER Brian Childress Southwest Texas State University [email protected] Bryan Cathey Southwest Texas State University [email protected] Sara Dixon Southwest Texas State University
TSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan
Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan TSGS#27(05)0115 Source: TSG SA WG2 Title: CR(s) to 23.981 Agenda item: 7.2.3 Document for: APPROVAL
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Chapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
Efficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
Next Generation Networks Convergence, evolution and roadmaps
Next Generation Networks Convergence, evolution and roadmaps Dr. Sathya Rao,Telscom Consulting, Berne [email protected] NGN Applications Requirement IP Everywhere The Internet Protocol is becoming pervasive
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
IPv6-only hosts in a dual stack environnment
IPv6-only hosts in a dual stack environnment using Free Software Frédéric Gargula, Grégoire Huet Background on IPv4 and IPv6 usage IPv4 addresses depletion doesn't need to be reminded No straight way exists
Planning the transition to IPv6
Planning the transition to IPv6 An Allstream White Paper 1 Table of contents Why transition now? 1 Transition mechanisms 2 Transition phases 2 IPv6 transition challenges 3 Taking advantage of IPv6 benefits
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
GPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
ExamPDF. Higher Quality,Better service!
ExamPDF Higher Quality,Better service! Q&A Exam : 1Y0-A21 Title : Basic Administration for Citrix NetScaler 9.2 Version : Demo 1 / 5 1.Scenario: An administrator is working with a Citrix consultant to
IPv6 The Big Picture. Rob Evans, Janet [email protected]
IPv6 The Big Picture Rob Evans, Janet [email protected] Where are we? IPv4 32 bit addresses 4,294,967,296 possible addresses In practice much less than this. History of large allocations /8s Inefficiency
Migrating to IPv6 Opportunity or threat for network security?
Migrating to IPv6 Opportunity or threat for network security? Executive summary Contents 02 Executive summary 03 1. Introduction 03 2. IPv6 security check 03 2.1 Addresses 04 2.2 NAT free operation 05
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Virtualized Domain Name System and IP Addressing Environments. White Paper September 2010
Virtualized Domain Name System and IP Addressing Environments White Paper September 2010 Virtualized DNS and IP Addressing Environments As organizations initiate virtualization projects in their operating
IPv4 to IPv6 Transition
An overview of the new Internet addressing protocol, its implications for wholesale customers, and Telstra s approach to the transition. Audience Chief Information Officers IT Managers Network Managers
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks
Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer
Telepresence in an IPv6 World. Simplify the Transition
Telepresence in an IPv6 World Simplify the Transition IPV6 has the potential to transform communications, collaboration, learning, entertainment, physical security and more. What You Will Learn If you
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
IMS Interconnect: Peering, Roaming and Security Part One
T E C H N O L O G Y W H I T E P A P E R IMS Interconnect: Peering, Roaming and Security Part One IMS interconnection promises to enable greater reach and richer offerings for the providers that establish
Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010
IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for
Application Note. Onsight TeamLink And Firewall Detect v6.3
Application Note Onsight And Firewall Detect v6.3 1 ONSIGHT TEAMLINK HTTPS TUNNELING SERVER... 3 1.1 Encapsulation... 3 1.2 Firewall Detect... 3 1.2.1 Firewall Detect Test Server Options:... 5 1.2.2 Firewall
Table of Contents. Cisco Cisco VPN Client FAQ
Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Advanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
Terminology. Internet Addressing System
Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Residential IPv6 IPv6 a t at S wisscom Swisscom a, n an overview overview Martin Gysi
Residential IPv6 at Swisscom, an overview Martin Gysi What is Required for an IPv6 Internet Access Service? ADSL L2 platform, IPv6 not required VDSL Complex Infrastructure is Barrier to Cost-efficient
Internet Traffic Evolution 2007-2011
Internet Traffic Evolution 2007-2011 Craig Labovitz April 6, 2011 Talk Outline Four-year ongoing inter-domain traffic study Review of 2010 results (NANOG / IETF / SIGCOMM) Methodology Changing carrier
Charter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
Managing SIP-based Applications With WAN Optimization
Managing SIP-based Applications With WAN Optimization Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Managing SIP-based Applications With
Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty
Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 3 Firewalls Specific Instructional Objectives On completion of this lesson, the students will be able to answer: What a firewall is? What are the design goals of Firewalls
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,
REDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran [email protected] [email protected] Common Mobile
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
