Efficient Management of the Traffic Flows in Wireless Internet. Contents. The mobile Internet. Evolution in telecom technologies
|
|
- Baldric Pierce
- 8 years ago
- Views:
Transcription
1 Efficient Management of the Traffic Flows in Wireless Internet An Introduction to Wireless IP International Workshop on Internet Security and Management 28 Jan, Sendai, Japan Abbas Jamalipour 1 Abbas Jamalipour The University of Sydney Australia Contents The mobile Internet Can mobile Internet be defined like this? 1. An Introduction to Wireless IP 2. Wireless Internet Security 3. Quality of Service Global Internet To other telecommunication?? Location-independent access Wire-free access 4. Conclusions IP-based core network INTERNET ACCESS IP-based access network Access Node Mobile Node Seamless access?? ISP-independent access A. Jamalipour 2 A. Jamalipour 4 Evolution in telecom technologies Trend 2: Voice to data Telephony Wired Wireless Cellular Internet Fixed Wireless Mobile AP Internet? Increase in: No of s Accessibility (time/space) No of applications Network Traffic: Voice, Text, Data, Image, Video,, Multimedia Available options: Working independently Replacing Complementing Significant increase in no. of multimedia users compared with voice 3m mobile data users in 1998 to 77m in 2005: 70% increase per year Today s Internet users: potential users of tomorrow s mobile Internet Pbit/day Voice Traffic Volume Data Traffic Volume A. Jamalipour 5 A. Jamalipour 7 Trend 1: Fixed to mobile access Get the first 50m users Saturation of fixed access for voice in near future 400m mobile subscribers worldwide in 2000 and 1800m in 2010 Similar exponential increase pattern in number of Internet subscribers Million Users Fixed Lines Mobile Lines Fixed Internet Years S Public Telephony Radio Television CellularMobile Inte rnet Network Broadcasting Broadcasting C om m unications (years) A. Jamalipour 6 A. Jamalipour 8
2 The application-oriented oriented Internet Telecom of the future Number of Internet users FTP Telnet WWW Variety Growth of Internet Applications embedded Internet and wireless Internet Internet to: connect people connect devices connect people/ devices Supporting new and existing applications Horizontal communication between different access technology cellular, cordless, WLAN, short-range connectivity, wired On a common platform to complement each other s Connected through a common, flexible, seamless IP-based core network An advanced media access technology that connects the core network to different access technologies Global roaming and inter-working between different access technologies both horizontal (intra-system) and vertical (intersystem) handover Seamless negotiation including mobility, security, QoS A. Jamalipour 9 A. Jamalipour 11 Mobile Internet applications Interoperated telecom architecture Office Information virtual working groups Education??? mobile office Public tele-working Financial virtual school Services schedule Services synchronisation on-line public elections laboratories and voting on-line banking on-line library public information universal SIM- Information on-line training help & credit card Leisure internet-surfing remote broadcast s Communication home shopping intelligent search- consultation yellow pages video telephony stock quotes virtual book store & filtering agents video conferencing music on demand on-line media speech games on demand on-line translation video-clips Special Telemetric local information announcing s virtual sight seeing booking & Services Services SMS ski net, Disney net (Machine-Machine reservation electronic postcard lottery s security Services) news s location based??? hotline tracking (GPS) tele-medicine navigation assistance travel information fleet management remote diagnostics??? 3G UMTS/cdma2000 other wireless/wired common core network indoor highspeed public telephony switched packet data A. Jamalipour 10 A. Jamalipour 12 A network architecture of the future mobile Summary Global Internet Wireless LAN GSM cdmaone Private IP Network cdma2000 Core cdma2000 Access Network ADSL Satellite Backbone IP Core Network Internetwork Access Technology DECT GPRS/UMTS Core PSTN/ISDN UMTS Access Network Applications were and will be the driving wheels in evolution of all telecommunication. Success of the Internet is mainly due to its accessibility and the usage of an open architecture. Mobility is a recognized feature of the future telecommunication. Multimedia mobile applications will force the future to be united under a common platform and incorporate efficiently to complement s of each other. But, wouldn t this integration add new complications to QoS and network security? A. Jamalipour 13 A. Jamalipour 15 Two Dimensional Internetworking Requirements Global Networks 3G Mobile Networks 2G Mobile Networks Hot Spot Networks Personal Networks Wired Networks GEO SAT MEO/LEO SAT DAB/DVB UMTS cdma2000 UWC-136 GSM GPRS cdmaone PDC Wireless LAN PHS Ad Hoc DECT Bluetooth PSTN ADSL Internet Efficient homogeneous traffic flow management as well as QoS management techniques are required. Capable of delivering QoS and security on an end-to-end basis within the heterogeneous (wired/wireless) Traffic flow volume is needed to be controlled by discriminatory preferences given to individual users and application data. A. Jamalipour 14 A. Jamalipour 16
3 Internet security Wireless Internet Security Network Security Privacy Authentication Integrity Non-repudiation 2 Abbas Jamalipour aka secrecy: Only sender and intended receiver should understand the message S: Encryption R: Decryption Receiver is confident of the sender s identity The content of the received message is exactly same as what was sent by original sender Receiver must be able to prove that the sender did send the message (sender cannot deny it) A. Jamalipour 19 Why security? Internet attacks Sniffing Original reasons in necessity of Internet security Internet is a broadcasting medium PLUS A third party can intercept a message which is not encrypted Read, write, or delete the data being transferred Increase in number of internetworking A C Growth in number and variety of network hosts Increase in variety of network applications Increase in amount of data stored in network and their storage locations src:b dest:a payload B Increase in volume of data being exchanged A. Jamalipour 18 A. Jamalipour 20 Internet attacks IP spoofing Where to secure? Internet is a broadcasting medium Application layer A third party can pretend to be the original sender by putting the original sender s IP address in the source IP field For private, authenticated transactions using certificate infrastructure; e.g. SET (secure electronic transaction), digital signatures, Pretty Good Privacy (PGP) and Secure Shell A C Transport layer Data encryption using certificate infrastructure; e.g. SSL, TLS Network layer src:b dest:a payload Data protection across the network; e.g. IPSec, Firewall, AAA B Link layer Physical layer Encoding the data before sending on air for physical isolation A. Jamalipour 21 A. Jamalipour 23 Internet attacks Denial of Basic security techniques Internet is a broadcasting medium Encryption and decryption A third party can overloading the receiver by flooding malicious packets A C Also Distributed DoS: by multiple coordinated sources B Mainly to create privacy but are also applied in the other three parts of the network security Secret key (aka symmetric key) Using the same key shared between sender and receiver pair and common encryption/decryption algorithms Use of short keys: ideal for encrypt/decrypt long messages One key for each pair: too many keys are needed for all Public key Use of a private key and a public key Private key is kept by receiver, public key is announced to public Less keys required, but more complex algorithms: good for short messages A. Jamalipour 22 A. Jamalipour 24
4 Digital signature Service agreement (SA) Handles authentication, integrity and non-repudiation Signing the message using encryption techniques Sender encrypt the message using his private key Receiver decrypt the message using sender s public key Integrity: If the message is changed by an intruder, there is a high probability that the message is unreadable. Authentication: Using a different private key will result a different message than the one sent by the sender. Non-repudiation: The private key of the sender can be tested on the original plaintext thus the sender cannot deny sending the message. A source-destination handshake for AH and ESP protocols Creating network-layer logical channel called a agreement (SA) Each SA is unidirectional and uniquely determined by: The security protocol (AH or ESP) The source IP address A 32-bit connection ID A. Jamalipour 25 A. Jamalipour 27 IPSec: : Network layer security Encapsulating security payload Providing a framework and a mechanism only Encryption/authentication selections are left to the user Can provide network layer secrecy and authentication Network layer secrecy: sending host encrypts TCP and UDP segments, ICMP and SNMP messages in IP datagram Network layer authentication: destination host can authenticate the source IP address Defining two protocols at the network layer Authentication header (AH) protocol To provide integrity and authentication (digital signature) Encapsulating Security Payload (ESP) protocol To provide privacy plus integrity and message authentication Provides secrecy, host authentication, data integrity Data and ESP trailer are encrypted Next header field is in ESP trailer ESP authentication field is similar to AH authentication field Protocol = 50 Authenticated Encrypted IP Header ESP Header TCP/UDP Segment ESP Trailer ESP Auth Protocol = 50 A. Jamalipour 26 A. Jamalipour 28 Authentication header protocol Provides source host authentication, data integrity, but not secrecy AH header inserted between IP header and data field Protocol field = 51 Intermediate s process datagrams as usual AH header includes: IP Header AH Header TCP/UDP Segment connection ID authentication data: signed message digest, calculated over original IP datagram, providing source, authentication, data integrity Next header field: specifies type of data (TCP, UDP, ICMP, etc.) 3 Quality of Service Abbas Jamalipour A. Jamalipour 29 Security in wireless Internet General QoS requirements All issues and techniques explained so far are also applicable to the wireless Internet security, but Are they still sufficient? Are they still efficient? Are they all supportable in heterogeneous? Are those techniques scalable enough? Are the security threats limited to those considered? Security should be considered as an end-to-end issue So, in order to resolve the above doubts and to implement security (which would be redefined at a later time), security has to be treated similar to other quality of themes Technology-based quality of requirements Timeliness delay response time delay variation Bandwidth system level data rate application level data rate transaction rate Reliability mean time to failure mean time to repair meantime between failures loss or corruption rate A. Jamalipour 30 A. Jamalipour 32
5 QoS requirements, more Challenging wireless QoS management User-level quality of requirements critically perceived QoS based on data transmission application type picture detail picture color accuracy video rate video smoothness audio quality video/audio synchronization cost per-use cost per-unit cost security confidentiality (information access only by appropriate users) integrity (information not to be corrupted) digital signatures authentication (verification of a user s identity and right to access) Data applications over wireless channel require sophisticated techniques of quality of management short loss of communications during handover is not desirable, though it is acceptable in voice applications similar facilities required in the new point of attachment after any handover blind spots are unavoidable in wireless End-user QoS is also affected by certain specifications of portable terminals battery limit screen size processing power screen resolution More importantly, traffic flows are transported by a variety of, each with its QoS and security treatment techniques A. Jamalipour 33 A. Jamalipour 35 BW vs. coverage in wireless Improving QoS in IP Wider coverage and higher mobility equal to higher cost but not necessarily higher data rate Wireless network Coverage Data rate Infrared Room 19.2 kbps-4 Mbps IEEE /b/a m around each AP 1, 2/11/54 Mbps GSM (HSCSD) Cellular network 9.6 (56) kbps CDPD (for AMPS, IS-95, IS-136) Cellular network 19.2 kbps DECT, PHS Cellular network 32 kbps GPRS (for GSM) Cellular network 155 kbps UMTS/IMT-2000 Cellular network 384 kbps to 2 Mbps Iridium LEO Satellite Global 2.4 kbps Broadband satellites Global/regional 2 Mbps Harmonic QoS adjustment on an end-to-end basis is also challenging when more than one network involved Looking for an ideal and general network QoS model IETF groups are working on proposals to provide better QoS control in IP, i.e., going beyond best effort to provide some assurance for QoS Work in Progress includes RSVP, Differentiated Services, and Integrated Services Simple model for sharing and congestion studies: A. Jamalipour 34 A. Jamalipour 36 Principles for QoS guarantees QoS guarantees, more Consider a phone application at 1Mbps and an FTP application sharing a 1.5 Mbps link bursts of FTP can congest the and cause audio packets to be dropped want to give priority to audio over FTP Alternative to marking and policing: allocate a set portion of bandwidth to each application flow can lead to inefficient use of bandwidth if one of the flows does not use its allocation PRINCIPLE 1: marking of packets is needed for to distinguish between different classes; and new policy to treat packets accordingly PRINCIPLE 3: while providing isolation, it is desirable to use resources as efficiently as possible A. Jamalipour 37 A. Jamalipour 39 QoS guarantees, more QoS guarantees, more Applications misbehave (audio sends packets at a rate higher than 1Mbps assumed above) PRINCIPLE 2: provide protection (isolation) for one class from other classes Require policing mechanisms to ensure sources adhere to bandwidth requirements; marking and policing need to be done at the edges Cannot support traffic beyond link capacity PRINCIPLE 4: need a Call Admission Process application flow declares its needs network may block call if it cannot satisfy the needs A. Jamalipour 38 A. Jamalipour 40
6 QoS summary IntServ: : Advantages and disadvantages Now, let s have some examples from Internet and cellular Advantages provides classes which closely match different apps leaves the existing best-effort unchanged no change to the existing apps, efficient as current Internet leaves forwarding mechanism in the network unchanged non-upgraded can receive data from IntServ Disadvantages E2E guarantee requires IntServ support by all nodes subdivision of best-effort may cause problems in commercial A. Jamalipour 41 A. Jamalipour 43 IP solutions for QoS support Differentiated s (DiffServ( DiffServ) Integrated s (IntServ) Three classes of guaranteed- class provides for delay-bounded agreements controlled-load class provides for a form of statistical delay agreement (nominal mean delay) best-effort s interactive burst (e.g. Web), interactive bulk (e.g. FTP), and asynchronous (e.g. ) Guaranteed and controlled-load s are based on quantitative requirements and require signaling and admission control in network nodes usually Resource Reservation Protocol (RSVP) is used Aims at providing simple, scalable and flexible differentiation using a hierarchical model interdomain resource management unidirectional levels are agreed at each boundary point between a customer and a provider for traffic entering the provider network intradomain resource management provider is solely responsible for configuration and provisioning of resources within its domain Provider builds its offered s with a combination of traffic classes, traffic conditioning, and billing DiffServ does not impose either the number of traffic classes or their characteristics on a provider Based on local agreements at customer/provider boundaries Per-flow state is avoided within the network since individual flows are aggregated in classes A. Jamalipour 42 A. Jamalipour 44 DiffServ,, more DiffServ: : Advantages and disadvantages Aggregates the entire customer s requirements for QoS The customer must have a level agreement (SLA) with provider SLA specifies the forwarding the customer receives static or dynamic static SLA: negotiated on a long-term basis (e.g., monthly) dynamic SLA: changes more frequently For receiving different levels, the customer must mark its packets by specific values in TOS filed (renamed DS field) DSCP (differentiated s codepoint) unused DS field supersedes the existing definition of IPv4 TOS octet and the IPv6 traffic class octet Advantages provides discrimination based on payment for traffic classes are accessible without signaling as a traffic class is predefined aggregate of traffic classification of the traffic needs not be performed in the end system (simpler network management) Disadvantages DiffServ tries to keep the operating mode of the network simple by pushing as much complexity as possible onto network provisioning and configuration DiffServ does not make providing several s with different qualities within the same network easier A. Jamalipour 45 A. Jamalipour 47 DiffServ 3-level s IntServ and DiffServ A A comparison access s Local Differentiated Services Domain interior access s interior access s border contracted link border Transit Internet Network interior IntServ Requires flow-specific state for each flow at s increase of state information based on number of flows need huge storage space and processing power at make s much more complex DiffServ Simpler and more scalable Scalability: per-flow replaced with per-aggregate complex processing is moved from the core of network to the edge A. Jamalipour 46 A. Jamalipour 48
7 GPRS example of QoS support UMTS architectural improvements SMS-GMSC SMS-IWMSC QoS profile assigned to every subscriber E traffic precedence class MSC/VLR high, normal, and low priority Gs D A delay class Gb four classes R Um reliability class SGSN Gn GGSN five classes peak throughput class 8, 16, 32, 64, 128, 256, 512, 1024, 2048 kbps mean throughput class 19 classes from best-effort to 111 kbps Profile requested by user or as default defined in the home location register (HLR) SGSN responsible for fulfilling the QoS profile Gd Gn TE MT BSS SGSN GGSN Gp Other PLMN C Gr SMS-SC HLR Gc Gf Gi EIR PDN TE Signaling Signaling & Data Compared with GSM Wideband access higher bit rates toward mobile multimedia applications Mobile-fixed-Internet convergence a uniform way to offer cross-domain s to users portability across and terminals Flexible architecture enhancing creativity and flexibility for new s standardizing the blocks that make up s and not s themselves A. Jamalipour 49 A. Jamalipour 51 UMTS network architecture UMTS and open architecture GSM Circuit Switched MSC (Real-Time) CS BSC ATM MSCu BTS IP Core Non-Real-Time Data Services SGSN GGSN UMTS RNC ATM IP Node B PSTN Feature Servers Providing access of UMTS architecture via OSA to third party providers To enhance portability of telecommunications s between and terminals (Rel-5, TS ) Virtual Home Environment (VHE) A system concept for personalized portability across boundaries and between terminals Considered by 3GPP (Rel-5, TS ) Use of s available at home network even after roaming into another network e.g., VHE converts a WAP into SMS when WAP is not available in the visiting network A. Jamalipour 50 A. Jamalipour 52 VHE for UMTS VHE SCS specifications application SCS 1 call control network layer SCS 2 home location register application SCS 5 CAMEL application layer standardized -network UMTS interfaces SCS 3 mobile execution environment SCS 4 SIM application toolkit Call control (CC) : MSC to support circuit-switched telephony using CC protocol (R99) Home location register (HLR): database for location and subscriber information using MAP protocol Mobile execution environment (MExE) server: for value-added s through WAP SIM application toolkit (SAT) server: to offer additional capabilities to communications protocol between SIM and mobile terminal Customized application for mobile enhanced logic (CAMEL) server: extends the scope of IN provisioning to the mobile environment and to exchange mobile-specific information between CAMEL and switching point (SSP) and control point (SCP) A. Jamalipour 53 A. Jamalipour 55 VHE elements UMTS QoS support Enabling development of s independent of the underlying A layered UMTS architecture Service capability (SCS): that provide functionality used to construct s (e.g. MSC) Service capability features (): the classes of OSA interface SCSs are network elements whereas s are only additional software layer of interface classes on top of SCSs Examples of s: call control, location/positioning, notifications Traffic class Fundamental characteristics BER Example of the application Conversational class Preserve time relation between information entities of the stream Conversational pattern (stringent and low delay) 10-3 Voice, videotelephony, video games Streaming class Preserve time relation between information entities of the stream 10-5 Streaming multimedia Interactive class Request response pattern Preserve data integrity 10-8 Web browsing, network games Background class Destination is not expecting the data within a certain time Preserve data integrity 10-8 Background download of s A. Jamalipour 54 A. Jamalipour 56
8 E2E quality of in 3G/UMTS Access layer MT TE MS RAN CN TE local bearer terminal-to-terminal QoS 3G/UMTS bearer external bearer Mobile station supports in regard to provider radio access technology signaling standards supporting only a single packet data (Simple IP or Mobile IP); differentiation at higher layers Access network authenticates and authorizes MS for access establishes a connection to IMT-2000 network initializes a data link layer After this link layer establishment, network layer protocols are executed to establish the packet data session 3G/UMTS QoS A. Jamalipour 57 A. Jamalipour 59 cdma2000 Data link layer cdmaone cdma2000 cdma2000 network architecture BTS AN BSC PCF PCF AN- AAA MSC/ VLR PDSN PCN AAA HLR HA PSTN Data Link Layer Internet Higher Layers Network Layer Access Layer Security Packet data reference model to other packet data Service Access Provider Support of two types of data link layers by IMT network PPP for Version 1 and 2 PPP protocol in compliance with RFC 1661 PPP compression control protocol (RFC 1962) used to negotiate a PPP payload compression algorithm In Mobile IP, higher layers will not be reset when the mobile re-establishes PPP to a new IMT-2000 serving area Simple data link-layer protocol for Version 2 A. Jamalipour 58 A. Jamalipour 60 Network layer Two types of network access methods Mobile IP Local and public network access HA resides in IMT-2000 provider network (SPN) Authentication and authorization by SPN or a private network Private network access HA resides in a private network Authentication and authorization by the private network Simple IP Local and public network access IP address is dynamically assigned from the serving network Private network access Same with addition of VPN software in mobile station 4 Abbas Conclusions Jamalipour A. Jamalipour 61 Security Layered manageable architecture Three levels of security from mobile station perspective Radio access security Authentication of the mobile station Support of air interface encryption IP network security For Mobile IP, use of FA challenge to authenticate mobile station For Simple IP, use of CHAP or PAP to authenticate mobile station CHAP: Challenge Handshake Authentication Protocol PAP: Password Authentication Protocol Both at the data link layer User end-to-end security Additional security measures provided by the user (optional) A generic architecture that covers all under same assumptions and I/O traffic flows Application level: harmonization of all different data into a unified form, prioritization of data according to the application and requested Physical level: optimization of data transmission based on the unified data Network level: management of the traffic flow transportation by resolving shortfall of the access network in providing requested to the application; should be open, configurable, and scalable Tasks include: traffic management, mobility management, QoS management, security management, and resource management Packet-based Traffic Application Level Non-packetbased Traffic Encapsulated Data Network Management Level Traffic Security QoS Mobility Physical Level Wireless Cellular ADSL Wireless LAN Wired Networks A. Jamalipour 62 A. Jamalipour 64
9 MWIF layered functional network architecture Application Third party applications API Security Applications/ Services Service Directory Services Authorization API Global Name Servers Policy Servers Location Servers Mobility Management Resource Management API OAM&P Control Communication Session Management Access Specific Core Access Gateway Transport Access Network Network Gateways Terminals Other Networks PSTN/external CS External IP Legacy 2G Signaling A. Jamalipour 65 References A. Jamalipour, The Wireless Mobile Internet Architectures, Protocols and Services, John Wiley & Sons, Chichester, England,. J. Kurose and K. Ross, Computer Networking A Top-Down Approach Featuring the Internet, Second Edition, Addison Wesley, Boston, D. Wisely, P. Eardley, and L. Burness, IP For 3G, John Wiley & Sons, Chichester, England, A. Jamalipour 66
King Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 111 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@kfupm.edu.sa 12/24/2011
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More informationIP QoS Interoperability Issues
SP-030371 IP QoS Interoperability Issues Source: Contact: SBC Communications, BT Randolph Wohlert Randolph_Wohlert@labs.sbc.com 2 Industry Trend: IP Based Services Next Generation Networks Multi-service
More informationChapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks
Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National
More informationTelecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
More informationALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish
More informationIMT-2000 Network Architecture
IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.
More informationMobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
More informationHandoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
More informationOverview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated
3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543
More informationSTAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com
More informationIndex. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284
bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationEvolution of GSM in to 2.5G and 3G
CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission
More informationAdvanced SIP Series: SIP and 3GPP
Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More information1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre
1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones
More informationAPNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0
APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
More informationA Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationIP Telephony (Voice over IP)
(Voice over IP) Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements
More informationAnalysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
More informationGPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
More informationIP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com
IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens
More informationWireless Access of GSM
Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade
More informationRealising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks
December 2000 European Institute for Research and Strategic Studies in Telecommunications GmbH AT THE THEATRE: Remove the Theatre Bookmark from her homepage PDA ONLINE THEATRE-TICKETS BOOKING Project P920
More informationCisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
More informationCOPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments
Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures
More informationChapter 1: Introduction
Chapter 1: Introduction Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 This material is protected under all Copyright Laws as
More informationLTE Overview October 6, 2011
LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term
More informationWhite Paper ON Dual Mode Phone (GSM & Wi-Fi)
White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost
More informationThe 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction
The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola
More informationUMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen
UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility
More informationPrivate DNS for Mobile Operators
Private for James Yu Senior Director - Strategic Technical Initiatives NeuStar, Inc. james.yu@neustar.biz +1-571-434-5572 (B) +1-703-622-5187 (M) Richard Xu Chief Architect Aicent, Inc richard.xu@aicent.com
More informationPDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS
UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA
More informationAbout Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
More informationUnlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi
More informationChapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
More informationManagement of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
More informationVoice over IP. Presentation Outline. Objectives
Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester
More information12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th
More informationContents. Preface. Acknowledgement. About the Author. Part I UMTS Networks
Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles
More informationDelivery of Voice and Text Messages over LTE
Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a
More informationKrishan Sabnani Bell Labs. Converged Networks of the Future
Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation
More informationHigh Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
More informationInternet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol
More informationEDGE: The Introduction of High Speed Data in GSM / GPRS Networks
10 September 2003 EDGE: The Introduction of High Speed Data in GSM / GPRS Networks Wendy Florence Ericsson South Africa Rev A 10 September 2003 1 Agenda What is EDGE? Implementing EDGE Network and transmission
More information02-QOS-ADVANCED-DIFFSRV
IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments
More informationBCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationImproving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationEnd-to-End QoS Network Design
End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationPacket Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report
GPP X.R00-0 Version:.0 Date: November 00 Packet Switched Voice (over ) and Video Telephony Services End-to-end System Design Technical Report COPYRIGHT GPP and its Organizational Partners claim copyright
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationDATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
More informationVOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More information2G Cellular Data Networks
1 2 General Mobility Issues 2G Cellular Data Networks Registration and Authentication User Locate local service provider access point Obtain network access Service provider Locate mobile user within network
More informationReview: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
More informationQoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationInternet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
More informationWireless Mobile Telephony
Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog
More informationSecurity (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
More informationApplications that Benefit from IPv6
Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,
More informationCo-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions
Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless
More informationTransport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
More informationMPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
More informationAdvanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
More informationLecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia
Streaming Media Lecture 33 Streaming Audio & Video April 20, 2005 Classes of applications: streaming stored video/audio streaming live video/audio real-time interactive video/audio Examples: distributed
More information1. Public Switched Telephone Networks vs. Internet Protocol Networks
Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol
More informationUse of MPLS in Mobile Backhaul Networks
Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile
More informationVerizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions
Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport
More informationFigure 1: Network Topology
Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationMINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationITU-T Y.2001. General overview of NGN
INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2001 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2004) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
More informationApplication Note How To Determine Bandwidth Requirements
Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP
More informationIntroduction to Differentiated Services (DiffServ) and HP-UX IPQoS
Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS What is Quality of Service (QoS)?... 2 Differentiated Services (DiffServ)... 2 Overview... 2 Example XYZ Corporation... 2 Components of
More informationSecurity and Authentication Concepts
Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy
More informationEnd-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
More informationQUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS
QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS Technical University of Berlin, Franklinstr., Berlin, Germany Keywords: Quality of Service, Telecommunications, Convergence, Congestion Control, Service
More informationDistributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
More informationW H I T E PA P E R. The concept of robust header compression, ROHC
The concept of robust header compression, ROHC F E B R U A R Y 2 0 0 4 W W W. E F F N E T. C O M The concept of robust header compression, ROHC C O N T E N T S The need for IP header compression.....................3
More informationChapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
More informationInternet Quality of Service
Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:
More informationMobile Devices Security: Evolving Threat Profile of Mobile Networks
Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications
More informationMobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
More informationEXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
More informationWhite Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationAccess to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA
Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More informationChapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
More informationAddress Resolution Protocol (ARP)
Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses
More informationData Integrity and Network Security in Wireless LAN/3G Integrated Networks
Data Integrity and Network Security in Wireless LAN/3G Integrated Networks International Workshop on Internet Security and Management 2004 Sendai, Japan, Jan. 29, 2004 Abbas Jamalipour a.jamalipour jamalipour@ieee.org
More information18: Enhanced Quality of Service
18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:
More informationPradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur
Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived
More information