Mobile IPv6 : architectures et protocoles

Size: px
Start display at page:

Download "Mobile IPv6 : architectures et protocoles"

Transcription

1 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par Guillaume Valadon pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Mobile IPv6 : architectures et protocoles soutenue le 27 Juin 2008 devant le jury composé de MM. : Eric Fleury Rapporteurs Thomas Noel MM. : Rui Aguiar Examinateurs Hiroshi Esaki Sébastien Tixeuil M. : Serge Fdida Directeur M. : Ryuji Wakikawa Encadrant

2

3 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par Guillaume Valadon pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Mobile IPv6 : architectures et protocoles soutenue le 27 Juin 2008 devant le jury composé de MM. : Eric Fleury Rapporteurs Thomas Noel MM. : Rui Aguiar Examinateurs Hiroshi Esaki Sébastien Tixeuil M. : Serge Fdida Directeur M. : Ryuji Wakikawa Encadrant

4

5 Remerciements Je remercie Eric FLEURY, Professeur à l École Normale Supérieure de Lyon, et Thomas NOEL, Professeur à l Université Louis Pasteur de Strasbourg, d avoir bien voulu accepter la charge de rapporteurs. Je remercie Rui AGUIAR, Professeur à l Université d Aveiro au Portugal, Hiroshi ESAKI, Professeur à l Université de Tokyo au Japon, et Sébastien TIXEUIL, Professeur à l Université Pierre et Marie Curie, d avoir bien voulu juger ce travail. Je remercie Serge FDIDA, Professeur à l Université Pierre et Marie, d avoir bien voulu encadrer cette thèse. Je tiens également à remercier Ryuji WAKIKAWA, désormais Chercheur chez Toyota ITC au Japon, avec qui j ai eu l honneur de travailler sur différents projets liés à la mobilité comme Home Agent Migration, présenté dans cette thèse. Ses qualités scientifiques et humaines ont tout particulièrement contribué au très bon déroulement de mon séjour au Japon. Je remercie enfin Clémence MAGNIEN, Chargée de Recherche au CNRS, pour m avoir apporté une aide très précieuse dans la rédaction et les multiples relectures de ce manuscrit. Mon expérience japonaise, quant à elle, n aurait pas été possible sans l aide de nombreuses personnes dont Atau TANAKA, Professeur à l Université de Newcastle en Angleterre, et Kenjiro CHO, Chercheur chez Internet Initiative Japan, qui m ont présenté différents chercheurs japonais, et de ce fait ont activement participé aux premières étapes de mon projet de thèse au Japon. Dans ce contexte, je tiens tout d abord à remercier Hiroshi ESAKI pour m avoir chaleureusement accueilli dans son laboratoire à l Université de Tokyo et financé pendant les derniers mois de mon séjour. Je remercie également mes collègues de Murai lab, à l Université de Keio, ainsi que mes collègues d Esaki lab, à l Université de Tokyo. Qu il me soit permis de remercier séparément Seiichi YAMAMOTO pour tout le temps qu il a passé à m aider lors de mon installation à Tokyo, ainsi que dans les différentes démarches administratives précédant mon arrivée. J ai également rencontré de nombreuses personnes durant mes deux années au Japon qui resteront, je l espère, des amis malgré la distance. Pèle-mêle, merci à Daphne, Romain, Koshiro, Lou, Marin, Martin, Mai, et Yukie. Mention spéciale au master du meilleur restaurant du monde (à Yokohama) : le teppan et la bière sont deux éléments indissociables des recherches réussies! Finalement, je remercie Ema pour l aide qu elle m a apportée avant et pendant mon séjour. Sans elle, tout aurait été beaucoup plus compliqué, voire impossible. Merci de m avoir fait découvrir le Japon, et permis de pratiquer le peu de japonais que je connais! i

6 Merci aux membres du bureau 720 : Laurent, Georges, Florian, et Christophe, pour leurs délires, leur aide, et leur bonne humeur. Merci aux anciens et autres dinosaures, Augustin, Julien, Chantal, et Matthieu, pour m avoir montré la voie de la sagesse ; parce que c est important. Merci également aux autres membres du labo pour les discussions autour d un café et les dépannages de clopes! Finalement, merci à ma famille, mes amis et mes relectrices. Merci aux hipss, barbus, zedou et autres clubers du week-end. Merci à celles et ceux qui ont eu la patience et le courage de me supporter durant ces quatre années. Merci également à celles et ceux qui n ont pas eu cette chance. Merci à celles et ceux qui ont fait un détour par Tokyo. Merci à celles et ceux qui sont venus me chercher un mercredi matin à 4h30 à Roissy. Merci au Limoncello et à Radio Head. Merci à ceux qui m ont mis une red hat entre les mains par un beau dimanche de juin 98. Merci aux globotruncanidés. Merci aux Urgences (et surtout bienvenue). Merci à Philibert et au Quick. Merci aux joggings du vendredi soir. Par ordre alphabétique, sans ordre de préférence, et sur un air des Bérus, merci à toi : Alexis, Adeline, Arnaud, Boulette, Bozze, Carter, Ceache, Citrouille, Delphine, Emilie, Etis, Evy, Faustine, Flavie, Fred, Galipette, Gratoune, Grizz, Hélène, IKR, Julio, Karim, Kat, Kinou, Kozette, Léo, Manu, Marion, Mat, Mel, Michel, Philippe, Pingouin, Pwetty, Renaud, Romain, Sail, Séverine, Shai, Sly, Spyou, Thierry, troglocan, Vincent, Virginie, et Zoro. Si jamais malgré toute mon attention, je t ai oublié (ou alors si tu es mégalomane), ajoute ton nom ici : Enfin, merci à tous ceux qui ont relevé le défi d affronter la soutenance! ii

7 Résumé L architecture de l Internet est telle que, lorsqu un utilisateur se déplace et change de réseau, l adresse IP de son périphérique est modifiée, entraînant la perte des communications en cours. Afin de résoudre ce problème, des protocoles de gestion de la mobilité ont été définis pour rendre les communications insensibles aux mouvements et indépendantes du réseau où se trouve l utilisateur. Cependant, la plupart des propositions souffrent de problèmes affectant leurs performances, ou bien encore leur utilisation dans l architecture actuelle de l Internet. Par exemple, certaines d entre elles, comme le protocole HIP, imposent que tous les périphériques, y compris ceux qui sont fixes, implémentent le protocole de mobilité. D autres encore, tel que le protocole Mobile IPv6, induisent des chemins plus longs et donc des délais de communication plus importants. Ce travail de thèse vise à améliorer les performances du protocole Mobile IPv6 en contrôlant les différentes limitations induites par l utilisation d un routeur gérant la mobilité : le home agent. Pour ce faire, nous proposons deux approches complémentaires qui tout en étant compatibles avec l infrastructure actuelle de l Internet, permettent de gérer la mobilité de façon transparente à la fois pour le réseau et les périphériques fixes. Tout d abord, nous décrivons une nouvelle architecture distribuée de gestion de la mobilité appelée Home Agent Migration qui permet d utiliser plusieurs home agents simultanément. Grâce à un déploiement réel, nous montrons qu il est possible d obtenir des performances comparables à celles de communications n utilisant pas Mobile IPv6. Ensuite, nous définissons formellement les propriétés des emplacements des home agents en termes de théorie des graphes. En s appuyant sur cette étude, nous quantifions l impact du protocole Mobile IPv6 sur les communications. Finalement, nous proposons un nouvel algorithme qui permet de traiter les problématiques de déploiement de Mobile IPv6 et de Home Agent Migration dans des graphes qui modélisent des réseaux de communication. Mots-Clés Mobile IPv6, gestion de la mobilité, anycast, graphe, centralité iii

8

9 Abstract Nowadays, mobile devices, such as laptops, are commonly used to access the Internet from different locations during the same day. With the current Internet architecture, a change of location requires a mandatory modification of the IP address, and as a result the loss of ongoing communications. Under these constraints, mobility protocols were designed to make communications resilient to movements and location independent. So far, diverse mobility protocols were defined that efficiently solve mobility related issues. Unfortunately, most of them suffer from design choices that impact their performances, or make them impractical for immediate deployments. For example, some protocols require that every node implements mobility support, including non-mobile ones; or causes longer paths and higher communications delays. In this thesis, we present two possible approaches to improving Mobile IPv6 performances, and to control its current shortcomings. These approaches are completely compatible with the current networking technologies, and can be used to perform immediate deployments of mobility support on the Internet. We first propose Home Agent Migration, an additional mobility management plane, which distributes home agents (specific mobility routers) inside the Internet topology. Practical experiments show that it is possible to obtain performances almost identical to communications without Mobile IPv6. Then, we formally define the properties of home agent locations in terms of graph theory, and quantify the impact of Mobile IPv6 on communications. Finally, based on this study, we describe a new algorithm that addresses deployment issues of Mobile IPv6 and Home Agent Migration that could be applied to any operator s network. Keywords Mobile IPv6, mobility management, anycast, graph, betweenness centrality v

10

11 Contents Remerciements Résumé Abstract Contents i iii v vii 1 Introduction Standard problems induced by Mobility What is mobility support anyway? Approaches for Internet mobility support Locators and identifiers Which identifiers? Design constraints Overview of Mobile IPv Contributions Outline Background on Mobile IPv Mobile IPv Preliminary terminology Operation of Mobile IPv Return Routability Procedure NEMO Home Agent Discovery vii

12 2.2 Protocols limitations Mobile IPv Return Routability Procedure NEMO Security overview Possible attacks against Mobile IPv IPsec protection Standardized optimizations Hierarchical Mobile IPv Fast Handover for Mobile IPv Multiple Care-of Address Conclusion Home Agent Migration General overview How it works Typical deployments Advantages Drawbacks Practical implementation Notion of Binding Cache Communication examples Movements of mobile nodes Example of a typical deployment The underlying protocol NEMO support Security considerations Evaluation Performances comparisons Experimental results Related Work Conclusion Mobile IPv6 deployments Graph theory reminders Preliminary definitions Importance of vertices viii

13 4.2 Networks as graphs Observing networks Modeling networks Weights on edges Home Agents locations Impact on paths lengths Optimal locations Comparison methodology Evaluation Studied networks Relationship between the degree and the betweenness Mobile IPv Home Agent Migration Related work Conclusion Conclusion 87 A Scapy: IPv6 and BPF extensions 93 A.1 Contributed extensions A.1.1 Scapy A.1.2 BPF extension A.2 Routing Header Type A.2.1 In a nutshell A.2.2 Advanced traceroutes A.2.3 Amplification attacks B Thesis French Version 107 B.1 Introduction B.1.1 Protocoles de mobilité B.1.2 Plan B.2 Mobile IPv6 et ses limitations B.2.1 Fonctionnement de Mobile IPv B.2.2 Limitations de Mobile IPv B.2.3 Conclusion B.3 Home Agent Migration B.3.1 Aperçu ix

14 B.3.2 Fonctionnement B.3.3 Résultats expérimentaux B.3.4 Conclusion B.4 Déploiement de Mobile IPv B.4.1 Emplacements des home agents B.4.2 Méthodologie B.4.3 Évaluation B.4.4 Conclusion B.5 Conclusion B.5.1 Contributions B.5.2 Perspectives Bibliography 131 List of Figures 141 List of Tables 143 x

15 Chapter 1 Introduction Contents 1.1 Standard problems induced by Mobility What is mobility support anyway? Approaches for Internet mobility support Locators and identifiers Which identifiers? Design constraints Overview of Mobile IPv Contributions Outline

16 Standard problems induced by Mobility Since 2000, both computing and networking landscapes have drastically changed. In developed countries, networks are accessible virtually everywhere, thanks to heterogeneous wireless technologies and computing devices that can easily fit in one s pocket and are powerful enough to compete with desktops. Moreover these technical evolutions also change how we interact with the technology itself. Mobile phones are indeed entirely part of our daily life. We use them not only for work but also to communicate with friends, access the Internet or play games. They are slowly modifying the way we socialize with each other [80] and how we access the information: in 2006, mobile devices in Japan represents 57% 1 of all user access to the Internet. Nowadays, users can do with their mobile phones what they would sitting in front of their desktops: exchange s [2], access maps [6] or buy music [7]. For decades, people had been mobile on a daily basis but they can only use technology on the go since a few years. Another change in mobile phones usages recently took place thanks to dual-mode GSM/Wi-Fi handsets and Voice over IP (VoIP) services. In metropolitan areas, wireless networks are available in diverse locations such as workplaces, cafés, parks or homes. As a consequence, the high density of Wi-Fi access points [55, 68, 67] and their wide communication ranges allow mobile devices to detect tens of access points from the same location while walking in the streets. Users can therefore take advantage of their VoIP accounts by using Wi-Fi to make cheap phone calls wherever they are. 1.1 Standard problems induced by Mobility A high density of Wi-Fi access points is however not synonym of mobility. Strictly speaking, a mobile device is only connected to one access point at the same time. Traditionally, if the device goes out of the access point s range, it looses its network connectivity and must connect to another access point. Previous works addressed this issue by expanding a unique network broadcast domain across several Wi-Fi access points by relying on wired or wireless [17, 61] backbones. Nevertheless, as of today, it is not possible to perform vertical handovers in order to provide seamless voice calls between different access technologies such as Wi-Fi and HSDPA. Such handovers would for example allow a mobile phone to automatically switch a phone call from a paying HSDPA link to a free Wi-Fi one when the user comes in range of well-known Wi-Fi access points. From the Internet Protocol (IP) perspective, a handover 2 occurs when a node moves from one subnetwork to another. 1 owned by approximately 48 million people, according to The Japanese Ministry of Internal Affairs and Communications. 2 either horizontal or vertical.

17 Chapter 1. Introduction 3 Technically, it currently implies a mandatory change of the node s IP address and therefore the termination of ongoing UDP and TCP connections. They cannot be recovered, and must be restarted using the newly acquired address. If we consider phone calls, this change of address means that the call is first stopped then restarted. As of today, handovers in Internet-like architecture are far from being easy to recover from, as they must be handled either manually by the users, or independently in every single application. This example intelligibly lays down the context of mobility support on the Internet as well as technical constraints that it must deal with. We list the main categories of such constraints below. 1. Change of IP address Due to the Internet routing and addressing architectures, a node s IP address must correspond to its physical location at all times. Otherwise it is not able to receive and send IP packets to its correspondents. Consequently, a node cannot use the same address everywhere it goes, and must obtain a new address when it joins a new subnetwork. 2. Connection losses The most popular transport protocols (TCP and UDP) were not designed to handle changes of IP address. As a result, ongoing communications stop working after a movement. Similarly, applications need to implement mechanisms to automatically recover from connection losses. However, most applications do not have such mechanisms and, in practice, users must manually restart lost connections. 3. End-to-end communications The recent arrival of Voice over IP makes the first move towards the come back of real end-to-end communications. Today, client/server communications prevail and close to zero application makes use of end-to-end communications. Even though some applications 3 are able to establish direct communications in Network Address Traversal (NAT) environments, they cannot be considered as pure end-toend communications as a third party is necessary to punch holes into NAT [51]. In a mobility context, end-to-end communications represent an important technical challenge, as they must survive both changes of IP address and connection losses. So far, various protocols [93, 91, 83, 94, 74, 100, 20] were defined at the Internet Engineering Task Force (IETF) to provide mobility support to mobile nodes and to 3 such as Skype.

18 What is mobility support anyway? solve problems such as previously described. This thesis focuses on the Mobile IPv6 protocol [66], described in Section 1.4, which aims at achieving immediate deployments of mobility services over the Internet through incremental upgrades of its current architecture. This thesis proposes solutions to improve the performance of Mobile IPv6 and solve its various limitations. It specifically concentrates on the IPv6 protocol that makes up a favorable environment for mobility with the disappearance of NAT, and a flat addressing space. Unless stated otherwise, this manuscript will only discuss IPv6 [41, 18], therefore terms such as IP address or IP must be interpreted as IPv6 address and IPv What is mobility support anyway? With mobile phones technologies, such as GSM [118], users keep the same phone number, a unique identifier, when they move or even travel to a different country; they can be reached whatever their locations. Handovers are appropriately supported: voice calls are not stopped during or after movements. Using these technologies as a reference, mobility can be interpreted as the capacity to move easily and freely without impacting the ongoing communications. Accordingly from an end-user perspective, being mobile is being able to move a device around while seamlessly accessing the communication network with no modification to the device applications nor configurations. This implies that every device must be uniquely and permanently identified independently of its physical location. From the network architecture point of view, an address is required to deliver data from, and to users. On the Internet, as described in Section 1.1, when a node moves, its IP address changes. Because, the address is strongly linked to the node s physical location and the subnetwork it is connected to, it is called a locator. Providing mobility support on the Internet is therefore offering a permanent identifier to a mobile device 4 along with a temporary locator which can change over time, and defining mechanisms to store and retrieve the binding between identifiers and locators. Nowadays, many research works try to address mobility support on the Internet: they range from local to Internet scopes, are implemented at the transport or network level, or target modifications of end-nodes or the infrastructure. Their application time lines are also different: some research aim at providing near future deployments [66], while other ones require heavy changes to the current Internet architecture [49] that will not be possible until several tens of years. In the remainder of this chapter, we 4 also referred as a mobile node.

19 Chapter 1. Introduction 5 will first provide a deeper analysis of requirements to support mobility on the Internet. Then, we will briefly present our work to improve the performance of the Mobile IPv6 protocol. 1.3 Approaches for Internet mobility support In this section, we summarize the issues and technical choices that arise while designing mobility protocols for the Internet. Our goal is to describe the common requirements of Internet mobility support and briefly present typical mobility protocols as well as their design constraints Locators and identifiers As previously discussed, the primary property of a mobility protocol is to give both an identifier and a locator to mobile nodes; two elements that describe a node s identity and its physical location. However, in order to make mobility protocols complete, there must be some mechanisms to map a locator to an identifier, and retrieve a locator given its corresponding identifier. For example, in a phone book, people s names are the identifiers and phone numbers are the locators that change over time as people move to new residences. In order to make a phone call to a friend, a user can look up into a phone book and find the corresponding phone number. If it changes, the user can look up into an updated phone book and find its friends new phone number. From the network perspective, this metaphor brings several problematic questions that affect mobility protocols design. 1. What are identifiers and locators exactly? Phone numbers; IPv6 addresses; domain names; people names? 2. How is the mapping performed? In mobile nodes; with an external database; in a peer-to-peer fashion; by pushing only the mapping to well-known correspondents? 3. When does a correspondent choose to retrieve the mapping? Each time it needs to communicate with the mobile node; at fixed time interval; with a cache that uses a timer to make entries expire; never? On the Internet, the addressing and routing architectures strongly constrain the location of a node. An IPv6 address belonging to an IPv6 prefix allocated to a French

20 Approaches for Internet mobility support Names Domain names ID IP addresses Protocols DNS HIP, SCTP MIPv6, LISP, NETLMM Table 1.1: Identifiers examples Internet Service Provider cannot be used to receive packets in Japan. Consequently, the current Internet architecture makes it impossible to keep the same address when a node moves. This problem is linked to the dual function of the IP address. First, it implicitly provides the position of a node on the globe (the locator). Then, it uniquely identifies the node in the whole Internet topology (the identifier). As a consequence, mobility protocols simply rely on the Internet routing architecture to ensure the delivery of mobile nodes packets, and use IP addresses as mobile nodes locators. The different protocols will therefore compete in the way they provide permanent identifiers and efficient mapping mechanisms Which identifiers? The elements used as identifiers are deeply related to the design of mobility protocols. As listed in Table 1.1, several possibilities to supply permanent identifiers are available. For example, if we consider domain names as the identifier, we can define an elementary application-based mobility protocol as follows. Every time a mobile node joins a new subnetwork, it updates its DNS Resource Record [82] with its newly acquired IPv6 address. This could be easily implemented with virtually no modification to correspondents or mobile nodes, and will work on the current Internet. However, this protocol presents drawbacks as ongoing connections are lost after handovers, and as correspondents must access the DNS server frequently to retrieve the most recent IP address. On the other hand, HIP [83] and SCTP [91, 104] are designed as new transport 5 protocols implemented in both mobile and correspondent nodes. Connections in these protocols are able to survive to a handover by automatically notifying correspondents of a change of IP address: ongoing connections can therefore be used after a movement. 5 although HIP is often referred as a layer 3.5 protocol.

21 Chapter 1. Introduction 7 From the application perspective, packet losses put aside, handovers have no impact. These protocols allow both end-nodes to move inside the Internet topology. However, they require all applications to be modified so as to benefit from their mobility support: HIP and SCTP sockets are not compatible with regular TCP and UDP ones. Finally with mobility protocols that use IPv6 addresses as identifiers, such as Mobile IPv6, LISP (Locator/ID Separation Protocol) [49] or NETLMM (Network-based Localized Mobility Management) [56], correspondents nodes are not concerned by mobile nodes mobility and communicate with them using the IPv6 address as they would do with non-mobile nodes. Consequently, such protocols are fully compatible with current implementations of TCP and UDP. Applications are not aware that mobility support is being used, even on the mobile node s side. In such protocols, mobility is either supported by mobile nodes or by the network. These protocols can however introduce longer communication delays due to non-optimal communication paths Design constraints As previously discussed, all mobility protocols designed at the IETF take different approaches to provide mobility support over the Internet. While these protocols may sometime look divergent, they can however be classified and compared using the following requirements. 1. Realistic utilization In order to ease its deployment and accelerate its adoption, a mobility protocol must not require any modification on correspondents sides: they should be able to communicate with mobile nodes as if they were not mobile. Concerning an immediate usage of mobility support on the Internet, it is indeed unreasonable to assume that all nodes will be upgraded to support mobility. Moreover, it is unlikely that any mobility protocol will be implemented on the server side, such as Google or MSN, as this leads to higher operational costs without any performance benefit for the service provider. 2. Small impact on the existing network architecture This is somehow similar to (1) but from a network perspective. All required changes to the network architecture should remain compatible with the current Internet technologies. Concerning immediate deployments, only incremental changes could be seriously considered for practical mobility support: it is not feasible to break the current addressing and routing architectures.

22 Approaches for Internet mobility support Protocols DNS-based x x SCTP, HIP x x LISP x x x MIPv6 x x x MIPv6 & RRP x x x OLSR, AODV x x Table 1.2: Design constraints and mobility protocols examples 3. Transparency to transport layers and applications We allow packet losses, but ongoing connections must smoothly survive handovers. Moreover, mobility support must not require any modification to applications. This is impracticable, as every application would need to be upgraded. In terms of network layers, this means that the mobility protocol must either reside below transport layers, or provide its functionalities through transparent application proxies such as SOCKS [75]. 4. Similar performances A mobility protocol should not seriously impact the communications performances, nor increase the load on the network. Moreover, it should also scale to provide acceptable performances when the number of mobile nodes increases. Ultimately, the users experience should remain the same as in a non-mobile context. Giving the four design constraints, we provide an overview of different mobility protocols alternatives in Table 1.2. It easily highlights that the implementation choices (such as the networking layer, the locator/identifier mapping, or the locator types) impact application scopes of mobility protocols. For example, the Optimized Link State Routing (OLSR) routing protocol [33], designed to support Mobile Ad-hoc Networks (MANET), must be implemented in every node that want to benefit from its features. However, it allows nodes to communicate in areas where there is no communication infrastructure by automatically adapting itself to nodes movements. On the other hand, LISP efficiently separates nodes identifiers from routing locators while remaining

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.

Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2. Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options

More information

MOBILE VIDEO WITH MOBILE IPv6

MOBILE VIDEO WITH MOBILE IPv6 MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),

More information

Mobile IP Part I: IPv4

Mobile IP Part I: IPv4 Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile

More information

6 Mobility Management

6 Mobility Management Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of

More information

Network Mobility Support Scheme on PMIPv6 Networks

Network Mobility Support Scheme on PMIPv6 Networks Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr

More information

Boosting mobility performance with Multi-Path TCP

Boosting mobility performance with Multi-Path TCP Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,

More information

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem

Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

SHISA: The IPv6 Mobility Framework for BSD Operating Systems

SHISA: The IPv6 Mobility Framework for BSD Operating Systems SHISA: The IPv6 Mobility Framework for BSD Operating Systems Keiichi Shima Internet Initiative Japan Inc. Ryuji Wakikawa, Koshiro Mitsuya, Keisuke Uehara Keio University Tsuyoshi Momose NEC Corporation

More information

Mobile Internet Protocol v6 MIPv6

Mobile Internet Protocol v6 MIPv6 Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to

More information

Mobility on IPv6 Networks

Mobility on IPv6 Networks Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6

More information

Introduction to Mobile IPv6

Introduction to Mobile IPv6 1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile

More information

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Youssef Khouaja, Emmanuel Coelho-Alves, Philippe Bertin Le présent document contient des informations qui sont la propriété de

More information

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks

Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)

More information

Survey on Conference Services provided by the United Nations Office at Geneva

Survey on Conference Services provided by the United Nations Office at Geneva Survey on Conference Services provided by the United Nations Office at Geneva Trade and Development Board, fifty-eighth session Geneva, 12-23 September 2011 Contents Survey contents Evaluation criteria

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

AAA considerations within several NEMO deployment scenarios

AAA considerations within several NEMO deployment scenarios AAA considerations within several NEMO deployment scenarios Julien Bournelle 1, Guillaume Valadon 3, David Binet 2, Saber Zrelli 4, Maryline Laurent-Maknavicius 1, and Jean-Michel Combes 2 1 GET/INT, France

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

Mobility Management in DECT/IPv6 Networks

Mobility Management in DECT/IPv6 Networks Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

REDUCING PACKET OVERHEAD IN MOBILE IPV6

REDUCING PACKET OVERHEAD IN MOBILE IPV6 REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile

More information

Performance Modeling of TCP/IP in a Wide-Area Network

Performance Modeling of TCP/IP in a Wide-Area Network INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Performance Modeling of TCP/IP in a Wide-Area Network Eitan Altman, Jean Bolot, Philippe Nain, Driss Elouadghiri, Mohammed Erramdani, Patrick

More information

The SIST-GIRE Plate-form, an example of link between research and communication for the development

The SIST-GIRE Plate-form, an example of link between research and communication for the development 1 The SIST-GIRE Plate-form, an example of link between research and communication for the development Patrick BISSON 1, MAHAMAT 5 Abou AMANI 2, Robert DESSOUASSI 3, Christophe LE PAGE 4, Brahim 1. UMR

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Early Binding Updates for Mobile IPv6

Early Binding Updates for Mobile IPv6 Early Binding Updates for Mobile IPv6 Christian Vogt, chvogt@tm.uka.de Roland Bless, bless@tm.uka.de Mark Doll, doll@tm.uka.de Tobias Küfner, kuefner@tm.uka.de IEEE Wireless and Communications and Networking

More information

ITL BULLETIN FOR JANUARY 2011

ITL BULLETIN FOR JANUARY 2011 ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division

More information

Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS)

Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS) Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS) Veuillez vérifier les éléments suivants avant de nous soumettre votre accord : 1. Vous avez bien lu et paraphé

More information

A Study on Mobile IPv6 Based Mobility Management Architecture

A Study on Mobile IPv6 Based Mobility Management Architecture UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one

More information

IPv6 mobility and ad hoc network mobility overview report

IPv6 mobility and ad hoc network mobility overview report Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report

More information

Integrated DNS and IPv6 mobility for next generation Internet

Integrated DNS and IPv6 mobility for next generation Internet Integrated DNS and IPv6 mobility for next generation Internet Winston K G SEAH Seng Kee TAN Institute for Infocomm Research 21, Heng Mui Keng Terrace, Singapore 119613 Tel: +65 68742012 Email: winston@i2r.a-star.edu.sg

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

FOR TEACHERS ONLY The University of the State of New York

FOR TEACHERS ONLY The University of the State of New York FOR TEACHERS ONLY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION F COMPREHENSIVE EXAMINATION IN FRENCH Friday, June 16, 2006 1:15 to 4:15 p.m., only SCORING KEY Updated information

More information

Mobility Management for All-IP Core Network

Mobility Management for All-IP Core Network Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6

More information

ProCurve Networking IPv6 The Next Generation of Networking

ProCurve Networking IPv6 The Next Generation of Networking ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Sun Management Center Change Manager 1.0.1 Release Notes

Sun Management Center Change Manager 1.0.1 Release Notes Sun Management Center Change Manager 1.0.1 Release Notes Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0891 10 May 2003 Copyright 2003 Sun Microsystems, Inc. 4150

More information

Final Network Exam 01-02

Final Network Exam 01-02 1 ENSTB ITAM Final Network Exam 01-02 This exam is focused on Load balancing mechanisms. First part is related to "RFC 2391 : Load Sharing using IP Network Address Translation (LSNAT)" that was previously

More information

Mobility Management Framework in Software Defined Networks

Mobility Management Framework in Software Defined Networks , pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea leekhe@pcu.ac.kr

More information

Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6

Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6 Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6 CHAMAN SINGH 1 K.L.BANSAL 2 1 Assistant Professor 2 Associate Professor chaman83mca@gmail.com kishorilalbansal@yahoo.co.in

More information

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA

Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA VÉRIFICATION DES ENTENTES DE SEMAINE DE TRAVAIL COMPRIMÉE

More information

Security for Mobility on IP

Security for Mobility on IP Security for Mobility on IP Olivier CHARLES MTM 2000, Dublin 17 February 2000 Le présent document contient des informations qui sont la propriété de France Télécom. L'acceptation de ce document par son

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

Security of IPv6 and DNSSEC for penetration testers

Security of IPv6 and DNSSEC for penetration testers Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions

More information

Static and Dynamic Network Configuration

Static and Dynamic Network Configuration CHAPTER 6 This chapter describes: Static Networks Dynamic Networks Static Networks The mobile access router can be part of a static network or a dynamic network. A static network supports stub routers

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents 1 Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo-Pascual Abstract A foreseeable scenario is where on the Internet Mobile IPv6 is deployed

More information

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents

Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo Pascual Departament d Arquitectura de Computadors Universitat Politècnica de Catalunya

More information

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager

HP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager HP and IPv6 Deployment Bill Medlin HP-UX IPv6 Project Manager OUTLINE Why IPv6? Current HP-UX IPv6 Features IPv6 Customer Experience HP-UX and IPv6 Deployment HP Strategy for IPv6 page 2 Why IPv6? Immediate

More information

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms

Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms I-Ping Hsieh Shang-Juh Kao Department of Computer Science National Chung-Hsing University 250 Kuo-Kuang Rd., Taichung,

More information

Live Migration of Guest Computers Using the NEMO BS Mobility Function. 3.1 Background. 3.2 Live Migration Issues. 3. Cloud Computing Technology

Live Migration of Guest Computers Using the NEMO BS Mobility Function. 3.1 Background. 3.2 Live Migration Issues. 3. Cloud Computing Technology 3. Live Migration of s Using the Mobility Function In order to construct an efficient virtual computing environment, a system for ensuring the availability of virtual computers and managing them flexibly

More information

Challenges and Opportunities in Deploying IPv6 Applications

Challenges and Opportunities in Deploying IPv6 Applications Challenges and Opportunities in Deploying IPv6 Applications Marc Blanchet CTO, Hexago ( Director, North American IPv6 Task Force Member of the Board and Technical Directorate, IPv6Forum ) {mailto sip}:

More information

Bluetooth Low Energy

Bluetooth Low Energy Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low

More information

Enterprise Risk Management & Board members. GUBERNA Alumni Event June 19 th 2014 Prepared by Gaëtan LEFEVRE

Enterprise Risk Management & Board members. GUBERNA Alumni Event June 19 th 2014 Prepared by Gaëtan LEFEVRE Enterprise Risk Management & Board members GUBERNA Alumni Event June 19 th 2014 Prepared by Gaëtan LEFEVRE Agenda Introduction Do we need Risk Management? The 8 th EU Company Law Directive Art 41, 2b Three

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

3G/Wi-Fi Seamless Offload

3G/Wi-Fi Seamless Offload Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Solaris Bandwidth Manager

Solaris Bandwidth Manager Solaris Bandwidth Manager By Evert Hoogendoorn - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA

More information

464XLAT in mobile networks

464XLAT in mobile networks STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address

More information

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.

Mobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff. Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point

More information

Vulnerabili3es and A7acks

Vulnerabili3es and A7acks IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

A Novel Pathway for Portability of Networks and Handing-on between Networks

A Novel Pathway for Portability of Networks and Handing-on between Networks A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com

More information

More Internet Support Protocols

More Internet Support Protocols Domain Name System (DNS) Ch 2.5 More Internet Support Protocols Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

AP FRENCH LANGUAGE AND CULTURE 2013 SCORING GUIDELINES

AP FRENCH LANGUAGE AND CULTURE 2013 SCORING GUIDELINES AP FRENCH LANGUAGE AND CULTURE 2013 SCORING GUIDELINES Interpersonal Writing: E-mail Reply 5: STRONG performance in Interpersonal Writing Maintains the exchange with a response that is clearly appropriate

More information

MIP6 Route Optimization Enhancements

MIP6 Route Optimization Enhancements MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004

More information

General Certificate of Education Advanced Level Examination June 2012

General Certificate of Education Advanced Level Examination June 2012 General Certificate of Education Advanced Level Examination June 2012 French Unit 4 Speaking Test Candidate s Material To be conducted by the teacher examiner between 7 March and 15 May 2012 (FRE4T) To

More information

AgroMarketDay. Research Application Summary pp: 371-375. Abstract

AgroMarketDay. Research Application Summary pp: 371-375. Abstract Fourth RUFORUM Biennial Regional Conference 21-25 July 2014, Maputo, Mozambique 371 Research Application Summary pp: 371-375 AgroMarketDay Katusiime, L. 1 & Omiat, I. 1 1 Kampala, Uganda Corresponding

More information

MPLS L2VPN (VLL) Technology White Paper

MPLS L2VPN (VLL) Technology White Paper MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Wireless Networks: Network Protocols/Mobile IP

Wireless Networks: Network Protocols/Mobile IP Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Cost Analysis of NEMO Protocol Entities

Cost Analysis of NEMO Protocol Entities Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

CIRA s experience in deploying IPv6

CIRA s experience in deploying IPv6 CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

School of Computer Science

School of Computer Science Cost and Scalability Analysis of Mobility Management Entities of NEMO Md. Shohrab Hossain and Mohammed Atiquzzaman TR-OU-TNRL-11-102 February 2011 Telecommunication & Network Research Lab School of Computer

More information

Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil

Routage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par M. Luigi Iannone pour obtenir le grade de Docteur de l Université Pierre et Marie Curie

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Audit de sécurité avec Backtrack 5

Audit de sécurité avec Backtrack 5 Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI Habib Université de Versailles Saint-Quentin-En-Yvelines 24-05-2012 UVSQ - Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series

Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

IPv6 Tunneling Over IPV4

IPv6 Tunneling Over IPV4 www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT

More information

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution

Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL

More information

Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the

Voice over IP, or VoIP for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Internet. Several solutions exist to make VoIP: Some use

More information

IPv6 associated protocols. Piers O Hanlon

IPv6 associated protocols. Piers O Hanlon IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard

More information

IPv6 First Hop Security Protecting Your IPv6 Access Network

IPv6 First Hop Security Protecting Your IPv6 Access Network IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information