Mobile IPv6 : architectures et protocoles
|
|
- Edmund Horatio Mathews
- 8 years ago
- Views:
Transcription
1 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par Guillaume Valadon pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Mobile IPv6 : architectures et protocoles soutenue le 27 Juin 2008 devant le jury composé de MM. : Eric Fleury Rapporteurs Thomas Noel MM. : Rui Aguiar Examinateurs Hiroshi Esaki Sébastien Tixeuil M. : Serge Fdida Directeur M. : Ryuji Wakikawa Encadrant
2
3 Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par Guillaume Valadon pour obtenir le grade de Docteur de l Université Pierre et Marie Curie Mobile IPv6 : architectures et protocoles soutenue le 27 Juin 2008 devant le jury composé de MM. : Eric Fleury Rapporteurs Thomas Noel MM. : Rui Aguiar Examinateurs Hiroshi Esaki Sébastien Tixeuil M. : Serge Fdida Directeur M. : Ryuji Wakikawa Encadrant
4
5 Remerciements Je remercie Eric FLEURY, Professeur à l École Normale Supérieure de Lyon, et Thomas NOEL, Professeur à l Université Louis Pasteur de Strasbourg, d avoir bien voulu accepter la charge de rapporteurs. Je remercie Rui AGUIAR, Professeur à l Université d Aveiro au Portugal, Hiroshi ESAKI, Professeur à l Université de Tokyo au Japon, et Sébastien TIXEUIL, Professeur à l Université Pierre et Marie Curie, d avoir bien voulu juger ce travail. Je remercie Serge FDIDA, Professeur à l Université Pierre et Marie, d avoir bien voulu encadrer cette thèse. Je tiens également à remercier Ryuji WAKIKAWA, désormais Chercheur chez Toyota ITC au Japon, avec qui j ai eu l honneur de travailler sur différents projets liés à la mobilité comme Home Agent Migration, présenté dans cette thèse. Ses qualités scientifiques et humaines ont tout particulièrement contribué au très bon déroulement de mon séjour au Japon. Je remercie enfin Clémence MAGNIEN, Chargée de Recherche au CNRS, pour m avoir apporté une aide très précieuse dans la rédaction et les multiples relectures de ce manuscrit. Mon expérience japonaise, quant à elle, n aurait pas été possible sans l aide de nombreuses personnes dont Atau TANAKA, Professeur à l Université de Newcastle en Angleterre, et Kenjiro CHO, Chercheur chez Internet Initiative Japan, qui m ont présenté différents chercheurs japonais, et de ce fait ont activement participé aux premières étapes de mon projet de thèse au Japon. Dans ce contexte, je tiens tout d abord à remercier Hiroshi ESAKI pour m avoir chaleureusement accueilli dans son laboratoire à l Université de Tokyo et financé pendant les derniers mois de mon séjour. Je remercie également mes collègues de Murai lab, à l Université de Keio, ainsi que mes collègues d Esaki lab, à l Université de Tokyo. Qu il me soit permis de remercier séparément Seiichi YAMAMOTO pour tout le temps qu il a passé à m aider lors de mon installation à Tokyo, ainsi que dans les différentes démarches administratives précédant mon arrivée. J ai également rencontré de nombreuses personnes durant mes deux années au Japon qui resteront, je l espère, des amis malgré la distance. Pèle-mêle, merci à Daphne, Romain, Koshiro, Lou, Marin, Martin, Mai, et Yukie. Mention spéciale au master du meilleur restaurant du monde (à Yokohama) : le teppan et la bière sont deux éléments indissociables des recherches réussies! Finalement, je remercie Ema pour l aide qu elle m a apportée avant et pendant mon séjour. Sans elle, tout aurait été beaucoup plus compliqué, voire impossible. Merci de m avoir fait découvrir le Japon, et permis de pratiquer le peu de japonais que je connais! i
6 Merci aux membres du bureau 720 : Laurent, Georges, Florian, et Christophe, pour leurs délires, leur aide, et leur bonne humeur. Merci aux anciens et autres dinosaures, Augustin, Julien, Chantal, et Matthieu, pour m avoir montré la voie de la sagesse ; parce que c est important. Merci également aux autres membres du labo pour les discussions autour d un café et les dépannages de clopes! Finalement, merci à ma famille, mes amis et mes relectrices. Merci aux hipss, barbus, zedou et autres clubers du week-end. Merci à celles et ceux qui ont eu la patience et le courage de me supporter durant ces quatre années. Merci également à celles et ceux qui n ont pas eu cette chance. Merci à celles et ceux qui ont fait un détour par Tokyo. Merci à celles et ceux qui sont venus me chercher un mercredi matin à 4h30 à Roissy. Merci au Limoncello et à Radio Head. Merci à ceux qui m ont mis une red hat entre les mains par un beau dimanche de juin 98. Merci aux globotruncanidés. Merci aux Urgences (et surtout bienvenue). Merci à Philibert et au Quick. Merci aux joggings du vendredi soir. Par ordre alphabétique, sans ordre de préférence, et sur un air des Bérus, merci à toi : Alexis, Adeline, Arnaud, Boulette, Bozze, Carter, Ceache, Citrouille, Delphine, Emilie, Etis, Evy, Faustine, Flavie, Fred, Galipette, Gratoune, Grizz, Hélène, IKR, Julio, Karim, Kat, Kinou, Kozette, Léo, Manu, Marion, Mat, Mel, Michel, Philippe, Pingouin, Pwetty, Renaud, Romain, Sail, Séverine, Shai, Sly, Spyou, Thierry, troglocan, Vincent, Virginie, et Zoro. Si jamais malgré toute mon attention, je t ai oublié (ou alors si tu es mégalomane), ajoute ton nom ici : Enfin, merci à tous ceux qui ont relevé le défi d affronter la soutenance! ii
7 Résumé L architecture de l Internet est telle que, lorsqu un utilisateur se déplace et change de réseau, l adresse IP de son périphérique est modifiée, entraînant la perte des communications en cours. Afin de résoudre ce problème, des protocoles de gestion de la mobilité ont été définis pour rendre les communications insensibles aux mouvements et indépendantes du réseau où se trouve l utilisateur. Cependant, la plupart des propositions souffrent de problèmes affectant leurs performances, ou bien encore leur utilisation dans l architecture actuelle de l Internet. Par exemple, certaines d entre elles, comme le protocole HIP, imposent que tous les périphériques, y compris ceux qui sont fixes, implémentent le protocole de mobilité. D autres encore, tel que le protocole Mobile IPv6, induisent des chemins plus longs et donc des délais de communication plus importants. Ce travail de thèse vise à améliorer les performances du protocole Mobile IPv6 en contrôlant les différentes limitations induites par l utilisation d un routeur gérant la mobilité : le home agent. Pour ce faire, nous proposons deux approches complémentaires qui tout en étant compatibles avec l infrastructure actuelle de l Internet, permettent de gérer la mobilité de façon transparente à la fois pour le réseau et les périphériques fixes. Tout d abord, nous décrivons une nouvelle architecture distribuée de gestion de la mobilité appelée Home Agent Migration qui permet d utiliser plusieurs home agents simultanément. Grâce à un déploiement réel, nous montrons qu il est possible d obtenir des performances comparables à celles de communications n utilisant pas Mobile IPv6. Ensuite, nous définissons formellement les propriétés des emplacements des home agents en termes de théorie des graphes. En s appuyant sur cette étude, nous quantifions l impact du protocole Mobile IPv6 sur les communications. Finalement, nous proposons un nouvel algorithme qui permet de traiter les problématiques de déploiement de Mobile IPv6 et de Home Agent Migration dans des graphes qui modélisent des réseaux de communication. Mots-Clés Mobile IPv6, gestion de la mobilité, anycast, graphe, centralité iii
8
9 Abstract Nowadays, mobile devices, such as laptops, are commonly used to access the Internet from different locations during the same day. With the current Internet architecture, a change of location requires a mandatory modification of the IP address, and as a result the loss of ongoing communications. Under these constraints, mobility protocols were designed to make communications resilient to movements and location independent. So far, diverse mobility protocols were defined that efficiently solve mobility related issues. Unfortunately, most of them suffer from design choices that impact their performances, or make them impractical for immediate deployments. For example, some protocols require that every node implements mobility support, including non-mobile ones; or causes longer paths and higher communications delays. In this thesis, we present two possible approaches to improving Mobile IPv6 performances, and to control its current shortcomings. These approaches are completely compatible with the current networking technologies, and can be used to perform immediate deployments of mobility support on the Internet. We first propose Home Agent Migration, an additional mobility management plane, which distributes home agents (specific mobility routers) inside the Internet topology. Practical experiments show that it is possible to obtain performances almost identical to communications without Mobile IPv6. Then, we formally define the properties of home agent locations in terms of graph theory, and quantify the impact of Mobile IPv6 on communications. Finally, based on this study, we describe a new algorithm that addresses deployment issues of Mobile IPv6 and Home Agent Migration that could be applied to any operator s network. Keywords Mobile IPv6, mobility management, anycast, graph, betweenness centrality v
10
11 Contents Remerciements Résumé Abstract Contents i iii v vii 1 Introduction Standard problems induced by Mobility What is mobility support anyway? Approaches for Internet mobility support Locators and identifiers Which identifiers? Design constraints Overview of Mobile IPv Contributions Outline Background on Mobile IPv Mobile IPv Preliminary terminology Operation of Mobile IPv Return Routability Procedure NEMO Home Agent Discovery vii
12 2.2 Protocols limitations Mobile IPv Return Routability Procedure NEMO Security overview Possible attacks against Mobile IPv IPsec protection Standardized optimizations Hierarchical Mobile IPv Fast Handover for Mobile IPv Multiple Care-of Address Conclusion Home Agent Migration General overview How it works Typical deployments Advantages Drawbacks Practical implementation Notion of Binding Cache Communication examples Movements of mobile nodes Example of a typical deployment The underlying protocol NEMO support Security considerations Evaluation Performances comparisons Experimental results Related Work Conclusion Mobile IPv6 deployments Graph theory reminders Preliminary definitions Importance of vertices viii
13 4.2 Networks as graphs Observing networks Modeling networks Weights on edges Home Agents locations Impact on paths lengths Optimal locations Comparison methodology Evaluation Studied networks Relationship between the degree and the betweenness Mobile IPv Home Agent Migration Related work Conclusion Conclusion 87 A Scapy: IPv6 and BPF extensions 93 A.1 Contributed extensions A.1.1 Scapy A.1.2 BPF extension A.2 Routing Header Type A.2.1 In a nutshell A.2.2 Advanced traceroutes A.2.3 Amplification attacks B Thesis French Version 107 B.1 Introduction B.1.1 Protocoles de mobilité B.1.2 Plan B.2 Mobile IPv6 et ses limitations B.2.1 Fonctionnement de Mobile IPv B.2.2 Limitations de Mobile IPv B.2.3 Conclusion B.3 Home Agent Migration B.3.1 Aperçu ix
14 B.3.2 Fonctionnement B.3.3 Résultats expérimentaux B.3.4 Conclusion B.4 Déploiement de Mobile IPv B.4.1 Emplacements des home agents B.4.2 Méthodologie B.4.3 Évaluation B.4.4 Conclusion B.5 Conclusion B.5.1 Contributions B.5.2 Perspectives Bibliography 131 List of Figures 141 List of Tables 143 x
15 Chapter 1 Introduction Contents 1.1 Standard problems induced by Mobility What is mobility support anyway? Approaches for Internet mobility support Locators and identifiers Which identifiers? Design constraints Overview of Mobile IPv Contributions Outline
16 Standard problems induced by Mobility Since 2000, both computing and networking landscapes have drastically changed. In developed countries, networks are accessible virtually everywhere, thanks to heterogeneous wireless technologies and computing devices that can easily fit in one s pocket and are powerful enough to compete with desktops. Moreover these technical evolutions also change how we interact with the technology itself. Mobile phones are indeed entirely part of our daily life. We use them not only for work but also to communicate with friends, access the Internet or play games. They are slowly modifying the way we socialize with each other [80] and how we access the information: in 2006, mobile devices in Japan represents 57% 1 of all user access to the Internet. Nowadays, users can do with their mobile phones what they would sitting in front of their desktops: exchange s [2], access maps [6] or buy music [7]. For decades, people had been mobile on a daily basis but they can only use technology on the go since a few years. Another change in mobile phones usages recently took place thanks to dual-mode GSM/Wi-Fi handsets and Voice over IP (VoIP) services. In metropolitan areas, wireless networks are available in diverse locations such as workplaces, cafés, parks or homes. As a consequence, the high density of Wi-Fi access points [55, 68, 67] and their wide communication ranges allow mobile devices to detect tens of access points from the same location while walking in the streets. Users can therefore take advantage of their VoIP accounts by using Wi-Fi to make cheap phone calls wherever they are. 1.1 Standard problems induced by Mobility A high density of Wi-Fi access points is however not synonym of mobility. Strictly speaking, a mobile device is only connected to one access point at the same time. Traditionally, if the device goes out of the access point s range, it looses its network connectivity and must connect to another access point. Previous works addressed this issue by expanding a unique network broadcast domain across several Wi-Fi access points by relying on wired or wireless [17, 61] backbones. Nevertheless, as of today, it is not possible to perform vertical handovers in order to provide seamless voice calls between different access technologies such as Wi-Fi and HSDPA. Such handovers would for example allow a mobile phone to automatically switch a phone call from a paying HSDPA link to a free Wi-Fi one when the user comes in range of well-known Wi-Fi access points. From the Internet Protocol (IP) perspective, a handover 2 occurs when a node moves from one subnetwork to another. 1 owned by approximately 48 million people, according to The Japanese Ministry of Internal Affairs and Communications. 2 either horizontal or vertical.
17 Chapter 1. Introduction 3 Technically, it currently implies a mandatory change of the node s IP address and therefore the termination of ongoing UDP and TCP connections. They cannot be recovered, and must be restarted using the newly acquired address. If we consider phone calls, this change of address means that the call is first stopped then restarted. As of today, handovers in Internet-like architecture are far from being easy to recover from, as they must be handled either manually by the users, or independently in every single application. This example intelligibly lays down the context of mobility support on the Internet as well as technical constraints that it must deal with. We list the main categories of such constraints below. 1. Change of IP address Due to the Internet routing and addressing architectures, a node s IP address must correspond to its physical location at all times. Otherwise it is not able to receive and send IP packets to its correspondents. Consequently, a node cannot use the same address everywhere it goes, and must obtain a new address when it joins a new subnetwork. 2. Connection losses The most popular transport protocols (TCP and UDP) were not designed to handle changes of IP address. As a result, ongoing communications stop working after a movement. Similarly, applications need to implement mechanisms to automatically recover from connection losses. However, most applications do not have such mechanisms and, in practice, users must manually restart lost connections. 3. End-to-end communications The recent arrival of Voice over IP makes the first move towards the come back of real end-to-end communications. Today, client/server communications prevail and close to zero application makes use of end-to-end communications. Even though some applications 3 are able to establish direct communications in Network Address Traversal (NAT) environments, they cannot be considered as pure end-toend communications as a third party is necessary to punch holes into NAT [51]. In a mobility context, end-to-end communications represent an important technical challenge, as they must survive both changes of IP address and connection losses. So far, various protocols [93, 91, 83, 94, 74, 100, 20] were defined at the Internet Engineering Task Force (IETF) to provide mobility support to mobile nodes and to 3 such as Skype.
18 What is mobility support anyway? solve problems such as previously described. This thesis focuses on the Mobile IPv6 protocol [66], described in Section 1.4, which aims at achieving immediate deployments of mobility services over the Internet through incremental upgrades of its current architecture. This thesis proposes solutions to improve the performance of Mobile IPv6 and solve its various limitations. It specifically concentrates on the IPv6 protocol that makes up a favorable environment for mobility with the disappearance of NAT, and a flat addressing space. Unless stated otherwise, this manuscript will only discuss IPv6 [41, 18], therefore terms such as IP address or IP must be interpreted as IPv6 address and IPv What is mobility support anyway? With mobile phones technologies, such as GSM [118], users keep the same phone number, a unique identifier, when they move or even travel to a different country; they can be reached whatever their locations. Handovers are appropriately supported: voice calls are not stopped during or after movements. Using these technologies as a reference, mobility can be interpreted as the capacity to move easily and freely without impacting the ongoing communications. Accordingly from an end-user perspective, being mobile is being able to move a device around while seamlessly accessing the communication network with no modification to the device applications nor configurations. This implies that every device must be uniquely and permanently identified independently of its physical location. From the network architecture point of view, an address is required to deliver data from, and to users. On the Internet, as described in Section 1.1, when a node moves, its IP address changes. Because, the address is strongly linked to the node s physical location and the subnetwork it is connected to, it is called a locator. Providing mobility support on the Internet is therefore offering a permanent identifier to a mobile device 4 along with a temporary locator which can change over time, and defining mechanisms to store and retrieve the binding between identifiers and locators. Nowadays, many research works try to address mobility support on the Internet: they range from local to Internet scopes, are implemented at the transport or network level, or target modifications of end-nodes or the infrastructure. Their application time lines are also different: some research aim at providing near future deployments [66], while other ones require heavy changes to the current Internet architecture [49] that will not be possible until several tens of years. In the remainder of this chapter, we 4 also referred as a mobile node.
19 Chapter 1. Introduction 5 will first provide a deeper analysis of requirements to support mobility on the Internet. Then, we will briefly present our work to improve the performance of the Mobile IPv6 protocol. 1.3 Approaches for Internet mobility support In this section, we summarize the issues and technical choices that arise while designing mobility protocols for the Internet. Our goal is to describe the common requirements of Internet mobility support and briefly present typical mobility protocols as well as their design constraints Locators and identifiers As previously discussed, the primary property of a mobility protocol is to give both an identifier and a locator to mobile nodes; two elements that describe a node s identity and its physical location. However, in order to make mobility protocols complete, there must be some mechanisms to map a locator to an identifier, and retrieve a locator given its corresponding identifier. For example, in a phone book, people s names are the identifiers and phone numbers are the locators that change over time as people move to new residences. In order to make a phone call to a friend, a user can look up into a phone book and find the corresponding phone number. If it changes, the user can look up into an updated phone book and find its friends new phone number. From the network perspective, this metaphor brings several problematic questions that affect mobility protocols design. 1. What are identifiers and locators exactly? Phone numbers; IPv6 addresses; domain names; people names? 2. How is the mapping performed? In mobile nodes; with an external database; in a peer-to-peer fashion; by pushing only the mapping to well-known correspondents? 3. When does a correspondent choose to retrieve the mapping? Each time it needs to communicate with the mobile node; at fixed time interval; with a cache that uses a timer to make entries expire; never? On the Internet, the addressing and routing architectures strongly constrain the location of a node. An IPv6 address belonging to an IPv6 prefix allocated to a French
20 Approaches for Internet mobility support Names Domain names ID IP addresses Protocols DNS HIP, SCTP MIPv6, LISP, NETLMM Table 1.1: Identifiers examples Internet Service Provider cannot be used to receive packets in Japan. Consequently, the current Internet architecture makes it impossible to keep the same address when a node moves. This problem is linked to the dual function of the IP address. First, it implicitly provides the position of a node on the globe (the locator). Then, it uniquely identifies the node in the whole Internet topology (the identifier). As a consequence, mobility protocols simply rely on the Internet routing architecture to ensure the delivery of mobile nodes packets, and use IP addresses as mobile nodes locators. The different protocols will therefore compete in the way they provide permanent identifiers and efficient mapping mechanisms Which identifiers? The elements used as identifiers are deeply related to the design of mobility protocols. As listed in Table 1.1, several possibilities to supply permanent identifiers are available. For example, if we consider domain names as the identifier, we can define an elementary application-based mobility protocol as follows. Every time a mobile node joins a new subnetwork, it updates its DNS Resource Record [82] with its newly acquired IPv6 address. This could be easily implemented with virtually no modification to correspondents or mobile nodes, and will work on the current Internet. However, this protocol presents drawbacks as ongoing connections are lost after handovers, and as correspondents must access the DNS server frequently to retrieve the most recent IP address. On the other hand, HIP [83] and SCTP [91, 104] are designed as new transport 5 protocols implemented in both mobile and correspondent nodes. Connections in these protocols are able to survive to a handover by automatically notifying correspondents of a change of IP address: ongoing connections can therefore be used after a movement. 5 although HIP is often referred as a layer 3.5 protocol.
21 Chapter 1. Introduction 7 From the application perspective, packet losses put aside, handovers have no impact. These protocols allow both end-nodes to move inside the Internet topology. However, they require all applications to be modified so as to benefit from their mobility support: HIP and SCTP sockets are not compatible with regular TCP and UDP ones. Finally with mobility protocols that use IPv6 addresses as identifiers, such as Mobile IPv6, LISP (Locator/ID Separation Protocol) [49] or NETLMM (Network-based Localized Mobility Management) [56], correspondents nodes are not concerned by mobile nodes mobility and communicate with them using the IPv6 address as they would do with non-mobile nodes. Consequently, such protocols are fully compatible with current implementations of TCP and UDP. Applications are not aware that mobility support is being used, even on the mobile node s side. In such protocols, mobility is either supported by mobile nodes or by the network. These protocols can however introduce longer communication delays due to non-optimal communication paths Design constraints As previously discussed, all mobility protocols designed at the IETF take different approaches to provide mobility support over the Internet. While these protocols may sometime look divergent, they can however be classified and compared using the following requirements. 1. Realistic utilization In order to ease its deployment and accelerate its adoption, a mobility protocol must not require any modification on correspondents sides: they should be able to communicate with mobile nodes as if they were not mobile. Concerning an immediate usage of mobility support on the Internet, it is indeed unreasonable to assume that all nodes will be upgraded to support mobility. Moreover, it is unlikely that any mobility protocol will be implemented on the server side, such as Google or MSN, as this leads to higher operational costs without any performance benefit for the service provider. 2. Small impact on the existing network architecture This is somehow similar to (1) but from a network perspective. All required changes to the network architecture should remain compatible with the current Internet technologies. Concerning immediate deployments, only incremental changes could be seriously considered for practical mobility support: it is not feasible to break the current addressing and routing architectures.
22 Approaches for Internet mobility support Protocols DNS-based x x SCTP, HIP x x LISP x x x MIPv6 x x x MIPv6 & RRP x x x OLSR, AODV x x Table 1.2: Design constraints and mobility protocols examples 3. Transparency to transport layers and applications We allow packet losses, but ongoing connections must smoothly survive handovers. Moreover, mobility support must not require any modification to applications. This is impracticable, as every application would need to be upgraded. In terms of network layers, this means that the mobility protocol must either reside below transport layers, or provide its functionalities through transparent application proxies such as SOCKS [75]. 4. Similar performances A mobility protocol should not seriously impact the communications performances, nor increase the load on the network. Moreover, it should also scale to provide acceptable performances when the number of mobile nodes increases. Ultimately, the users experience should remain the same as in a non-mobile context. Giving the four design constraints, we provide an overview of different mobility protocols alternatives in Table 1.2. It easily highlights that the implementation choices (such as the networking layer, the locator/identifier mapping, or the locator types) impact application scopes of mobility protocols. For example, the Optimized Link State Routing (OLSR) routing protocol [33], designed to support Mobile Ad-hoc Networks (MANET), must be implemented in every node that want to benefit from its features. However, it allows nodes to communicate in areas where there is no communication infrastructure by automatically adapting itself to nodes movements. On the other hand, LISP efficiently separates nodes identifiers from routing locators while remaining
Tomás P. de Miguel DIT-UPM. dit UPM
Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability
More informationDedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.
Dedication Preface 1. The Age of IPv6 1.1 INTRODUCTION 1.2 PROTOCOL STACK 1.3 CONCLUSIONS 2. Protocol Architecture 2.1 INTRODUCTION 2.2 COMPARISONS OF IP HEADER FORMATS 2.3 EXTENSION HEADERS 2.3.1 Options
More informationMOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
More informationMobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
More information6 Mobility Management
Politecnico di Milano Facoltà di Ingegneria dell Informazione 6 Mobility Management Reti Mobili Distribuite Prof. Antonio Capone Introduction Mobility management allows a terminal to change its point of
More informationNetwork Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. sgmin@korea.ac.kr
More informationBoosting mobility performance with Multi-Path TCP
Boosting mobility performance with Multi-Path TCP Name SURNAME 1, Name SURNAME 2 1 Organisation, Address, City, Postcode, Country Tel: +countrycode localcode number, Fax: + countrycode localcode number,
More informationMobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744. The problem
Mobility (and philosophical questions about names and identity) David Andersen CMU CS 15-744 The problem How to support mobile users What do we mean by support? Make it easy and convenient to effectively
More informationIP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP
IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS
More informationSHISA: The IPv6 Mobility Framework for BSD Operating Systems
SHISA: The IPv6 Mobility Framework for BSD Operating Systems Keiichi Shima Internet Initiative Japan Inc. Ryuji Wakikawa, Koshiro Mitsuya, Keisuke Uehara Keio University Tsuyoshi Momose NEC Corporation
More informationMobile Internet Protocol v6 MIPv6
Mobile Internet Protocol v6 MIPv6 A brief introduction Holger.Zuleger@hznet.de 13-dec-2005 Holger Zuleger 1/15 > c Defined by MIPv6 RFC3775: Mobility Support in IPv6 (June 2004) RFC3776: Using IPsec to
More informationMobility on IPv6 Networks
Mobility on IPv6 Networks Pedro M. Ruiz Project Manager Agora Systems S.A. Global IPv6 Summit Madrid 13-15 March 2002 Pedro M. Ruiz (c) Agora Systems S.A, 2002 1 Outline Motivation MIPv6 architecture MIPv6
More informationIntroduction to Mobile IPv6
1 Introduction to Mobile IPv6 III IPv6 Global Summit Moscow Dr. Dimitrios Kalogeras dkalo@grnet.gr GRNET Outline Introduction Relevant Features of IPv6 Major Differences between MIPv4 and MIPv6 Mobile
More informationIntegrating IP-based Micro-Mobility in Future Cellular Multimedia Networks
Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Youssef Khouaja, Emmanuel Coelho-Alves, Philippe Bertin Le présent document contient des informations qui sont la propriété de
More informationIntroducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA jfaizan@engr.smu.edu Hesham El-Rewini Southern Methodist University
More information5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
More informationMobility Management 嚴 力 行 高 雄 大 學 資 工 系
Mobility Management 嚴 力 行 高 雄 大 學 資 工 系 Mobility Management in Cellular Systems Cellular System HLR PSTN MSC MSC VLR BSC BSC BSC cell BTS BTS BTS BTS MT BTS BTS BTS BTS HLR and VLR HLR (Home Location Register)
More informationSurvey on Conference Services provided by the United Nations Office at Geneva
Survey on Conference Services provided by the United Nations Office at Geneva Trade and Development Board, fifty-eighth session Geneva, 12-23 September 2011 Contents Survey contents Evaluation criteria
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationIPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
More informationAAA considerations within several NEMO deployment scenarios
AAA considerations within several NEMO deployment scenarios Julien Bournelle 1, Guillaume Valadon 3, David Binet 2, Saber Zrelli 4, Maryline Laurent-Maknavicius 1, and Jean-Michel Combes 2 1 GET/INT, France
More informationMetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:
More informationMobility Management in DECT/IPv6 Networks
Mobility Management in DECT/IPv6 Networks Sarantis Paskalis 1, Georgios Lampropoulos 1, and Georgios Stefanou 1 Department of Informatics and Telecommunications University of Athens, Greece Abstract. The
More informationMobility Management Advanced
Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model
More informationREDUCING PACKET OVERHEAD IN MOBILE IPV6
REDUCING PACKET OVERHEAD IN MOBILE IPV6 ABSTRACT Hooshiar Zolfagharnasab 1 1 Department of Computer Engineering, University of Isfahan, Isfahan, Iran hoppico@eng.ui.ac.ir hozo19@gmail.com Common Mobile
More informationPerformance Modeling of TCP/IP in a Wide-Area Network
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Performance Modeling of TCP/IP in a Wide-Area Network Eitan Altman, Jean Bolot, Philippe Nain, Driss Elouadghiri, Mohammed Erramdani, Patrick
More informationThe SIST-GIRE Plate-form, an example of link between research and communication for the development
1 The SIST-GIRE Plate-form, an example of link between research and communication for the development Patrick BISSON 1, MAHAMAT 5 Abou AMANI 2, Robert DESSOUASSI 3, Christophe LE PAGE 4, Brahim 1. UMR
More informationLoad Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
More informationEarly Binding Updates for Mobile IPv6
Early Binding Updates for Mobile IPv6 Christian Vogt, chvogt@tm.uka.de Roland Bless, bless@tm.uka.de Mark Doll, doll@tm.uka.de Tobias Küfner, kuefner@tm.uka.de IEEE Wireless and Communications and Networking
More informationITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
More informationNote concernant votre accord de souscription au service «Trusted Certificate Service» (TCS)
Note concernant votre accord de souscription au service «Trusted Certificate Service» (TCS) Veuillez vérifier les éléments suivants avant de nous soumettre votre accord : 1. Vous avez bien lu et paraphé
More informationA Study on Mobile IPv6 Based Mobility Management Architecture
UDC 621.396.69:681.32 A Study on Mobile IPv6 Based Mobility Management Architecture VTsuguo Kato VRyuichi Takechi VHideaki Ono (Manuscript received January 19, 2001) Mobile IPv6 is considered to be one
More informationIPv6 mobility and ad hoc network mobility overview report
Institut Eurecom 1 Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia Antipolis FRANCE Research Report RR-08-217 IPv6 mobility and ad hoc network mobility overview report
More informationIntegrated DNS and IPv6 mobility for next generation Internet
Integrated DNS and IPv6 mobility for next generation Internet Winston K G SEAH Seng Kee TAN Institute for Infocomm Research 21, Heng Mui Keng Terrace, Singapore 119613 Tel: +65 68742012 Email: winston@i2r.a-star.edu.sg
More informationMobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP
Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses
More informationFOR TEACHERS ONLY The University of the State of New York
FOR TEACHERS ONLY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION F COMPREHENSIVE EXAMINATION IN FRENCH Friday, June 16, 2006 1:15 to 4:15 p.m., only SCORING KEY Updated information
More informationMobility Management for All-IP Core Network
Mobility Management for All-IP Core Network Mobility Management All-IP Core Network Standardization Special Articles on SAE Standardization Technology Mobility Management for All-IP Core Network PMIPv6
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationSun Management Center Change Manager 1.0.1 Release Notes
Sun Management Center Change Manager 1.0.1 Release Notes Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817 0891 10 May 2003 Copyright 2003 Sun Microsystems, Inc. 4150
More informationFinal Network Exam 01-02
1 ENSTB ITAM Final Network Exam 01-02 This exam is focused on Load balancing mechanisms. First part is related to "RFC 2391 : Load Sharing using IP Network Address Translation (LSNAT)" that was previously
More informationMobility Management Framework in Software Defined Networks
, pp. 1-10 http://dx.doi.org/10.14257/ijseia.2014.8.8,01 Mobility Management Framework in Software Defined Networks Kyoung-Hee Lee Department of Computer Engineering, Pai Chai University, Korea leekhe@pcu.ac.kr
More informationLinux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6
Linux Based Implementation and Performance Measurements of Dual Stack Mobile IPv6 CHAMAN SINGH 1 K.L.BANSAL 2 1 Assistant Professor 2 Associate Professor chaman83mca@gmail.com kishorilalbansal@yahoo.co.in
More informationOffice of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA
Office of the Auditor General / Bureau du vérificateur général FOLLOW-UP TO THE 2010 AUDIT OF COMPRESSED WORK WEEK AGREEMENTS 2012 SUIVI DE LA VÉRIFICATION DES ENTENTES DE SEMAINE DE TRAVAIL COMPRIMÉE
More informationSecurity for Mobility on IP
Security for Mobility on IP Olivier CHARLES MTM 2000, Dublin 17 February 2000 Le présent document contient des informations qui sont la propriété de France Télécom. L'acceptation de ce document par son
More informationIPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
More informationSecurity of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
More informationStatic and Dynamic Network Configuration
CHAPTER 6 This chapter describes: Static Networks Dynamic Networks Static Networks The mobile access router can be part of a static network or a dynamic network. A static network supports stub routers
More informationCHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
1 Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo-Pascual Abstract A foreseeable scenario is where on the Internet Mobile IPv6 is deployed
More informationLoad Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents
Load Balancing in Mobile IPv6 s Correspondent Networks with Mobility Agents Albert Cabellos-Aparicio, Jordi Domingo Pascual Departament d Arquitectura de Computadors Universitat Politècnica de Catalunya
More informationHP and IPv6 Deployment. Bill Medlin HP-UX IPv6 Project Manager
HP and IPv6 Deployment Bill Medlin HP-UX IPv6 Project Manager OUTLINE Why IPv6? Current HP-UX IPv6 Features IPv6 Customer Experience HP-UX and IPv6 Deployment HP Strategy for IPv6 page 2 Why IPv6? Immediate
More informationManaging the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms
Managing the Co-existing Network of IPv6 and IPv4 under Various Transition Mechanisms I-Ping Hsieh Shang-Juh Kao Department of Computer Science National Chung-Hsing University 250 Kuo-Kuang Rd., Taichung,
More informationLive Migration of Guest Computers Using the NEMO BS Mobility Function. 3.1 Background. 3.2 Live Migration Issues. 3. Cloud Computing Technology
3. Live Migration of s Using the Mobility Function In order to construct an efficient virtual computing environment, a system for ensuring the availability of virtual computers and managing them flexibly
More informationChallenges and Opportunities in Deploying IPv6 Applications
Challenges and Opportunities in Deploying IPv6 Applications Marc Blanchet CTO, Hexago ( Director, North American IPv6 Task Force Member of the Board and Technical Directorate, IPv6Forum ) {mailto sip}:
More informationBluetooth Low Energy
Bluetooth Low Energy Responsable de l épreuve : L. Toutain Tous documents autorisés. Répondez uniquement sur la copie en annexe. Lisez bien tout le document avant de commencer à répondre 1 Bluetooth Low
More informationEnterprise Risk Management & Board members. GUBERNA Alumni Event June 19 th 2014 Prepared by Gaëtan LEFEVRE
Enterprise Risk Management & Board members GUBERNA Alumni Event June 19 th 2014 Prepared by Gaëtan LEFEVRE Agenda Introduction Do we need Risk Management? The 8 th EU Company Law Directive Art 41, 2b Three
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationArchived Content. Contenu archivé
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationMPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationSolaris Bandwidth Manager
Solaris Bandwidth Manager By Evert Hoogendoorn - Enterprise Engineering Sun BluePrints Online - June 1999 http://www.sun.com/blueprints Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA
More information464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
More informationMobile Routing. When a host moves, its point of attachment in the network changes. This is called a handoff.
Mobile Routing Basic Notions of Mobility When a host moves, its point of attachment in the changes. This is called a handoff. The point of attachment is a base station (BS) for cellular, or an access point
More informationVulnerabili3es and A7acks
IPv6 Security Vulnerabili3es and A7acks Inherent vulnerabili3es Less experience working with IPv6 New protocol stack implementa3ons Security devices such as Firewalls and IDSs have less support for IPv6
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationSERVICE DISCOVERY AND MOBILITY MANAGEMENT
Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)
More informationA Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com
More informationMore Internet Support Protocols
Domain Name System (DNS) Ch 2.5 More Internet Support Protocols Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationNetwork Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
More informationAP FRENCH LANGUAGE AND CULTURE 2013 SCORING GUIDELINES
AP FRENCH LANGUAGE AND CULTURE 2013 SCORING GUIDELINES Interpersonal Writing: E-mail Reply 5: STRONG performance in Interpersonal Writing Maintains the exchange with a response that is clearly appropriate
More informationMIP6 Route Optimization Enhancements
MIP6 Route Optimization Enhancements draft-arkko-mip6-ro-enhancements-00 Jari Arkko, jari.arkko@ericsson.com Christian Vogt, chvogt@tm.uka.de IETF 61, Washington D.C. Mobopts Meeting, November 10, 2004
More informationGeneral Certificate of Education Advanced Level Examination June 2012
General Certificate of Education Advanced Level Examination June 2012 French Unit 4 Speaking Test Candidate s Material To be conducted by the teacher examiner between 7 March and 15 May 2012 (FRE4T) To
More informationAgroMarketDay. Research Application Summary pp: 371-375. Abstract
Fourth RUFORUM Biennial Regional Conference 21-25 July 2014, Maputo, Mozambique 371 Research Application Summary pp: 371-375 AgroMarketDay Katusiime, L. 1 & Omiat, I. 1 1 Kampala, Uganda Corresponding
More informationMPLS L2VPN (VLL) Technology White Paper
MPLS L2VPN (VLL) Technology White Paper Issue 1.0 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationWireless Networks: Network Protocols/Mobile IP
Wireless Networks: Network Protocols/Mobile IP Mo$va$on Data transfer Encapsula$on Security IPv6 Problems DHCP Adapted from J. Schiller, Mobile Communications 1 Mo$va$on for Mobile IP Rou$ng based on IP
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationCost Analysis of NEMO Protocol Entities
Cost Analysis of NEMO Protocol Entities Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science, University of Oklahoma, Norman, OK 73019. Email: {shohrab, atiq}@ou.edu William Ivancic NASA
More informationDefinition. A Historical Example
Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,
More informationCIRA s experience in deploying IPv6
CIRA s experience in deploying IPv6 Canadian Internet Registration Authority (CIRA) Jacques Latour Director, Information Technology Ottawa, April 29, 2011 1 About CIRA The Registry that operates the Country
More informationUnlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi
More informationSchool of Computer Science
Cost and Scalability Analysis of Mobility Management Entities of NEMO Md. Shohrab Hossain and Mohammed Atiquzzaman TR-OU-TNRL-11-102 February 2011 Telecommunication & Network Research Lab School of Computer
More informationRoutage Cross-Layer et Gestion de la Mobilité dans les Réseaux Maillés Sans fil
Thèse de Doctorat de l Université Paris VI Pierre et Marie Curie Spécialité Systèmes Informatiques présentée par M. Luigi Iannone pour obtenir le grade de Docteur de l Université Pierre et Marie Curie
More informationSecure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol
More informationArchived Content. Contenu archivé
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
More informationAudit de sécurité avec Backtrack 5
Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI Habib Université de Versailles Saint-Quentin-En-Yvelines 24-05-2012 UVSQ - Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI
More informationSecurity Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org
More informationDeploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series
Brochure More information from http://www.researchandmarkets.com/reports/2379605/ Deploying IPv6 in 3GPP Networks. Evolving Mobile Broadband from 2G to LTE and Beyond. NSN/Nokia Series Description: Deploying
More informationIP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com
IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
More informationIPv6 Tunneling Over IPV4
www.ijcsi.org 599 IPv6 Tunneling Over IPV4 A.Sankara Narayanan 1, M.Syed Khaja Mohideen 2, M.Chithik Raja 3 Department of Information Technology Salalah College of Technology Sultanate of Oman ABSTRACT
More informationSuperior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution
Superior Disaster Recovery with Radware s Global Server Load Balancing (GSLB) Solution White Paper January 2012 Radware GSLB Solution White Paper Page 1 Table of Contents 1. EXECUTIVE SUMMARY... 3 2. GLOBAL
More informationVoice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the
Voice over IP, or "VoIP" for Voice over IP is a technology that allows to communicate by voice over IP compatible networks, either networks or the Internet. Several solutions exist to make VoIP: Some use
More informationIPv6 associated protocols. Piers O Hanlon
IPv6 associated protocols Piers O Hanlon Contributions Main authors Jean-Marc Barozet, Cisco, France Faycal Hadj, Cisco, France Patrick Grossetete, Cisco, France Gunter Van de Velde, Cisco, Belgium Bernard
More informationIPv6 First Hop Security Protecting Your IPv6 Access Network
IPv6 First Hop Security Protecting Your IPv6 Access Network What You Will Learn This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More information