Efficient Management of the Traffic Flows in Wireless Internet. Contents. The mobile Internet. Evolution in telecom technologies

Size: px
Start display at page:

Download "Efficient Management of the Traffic Flows in Wireless Internet. Contents. The mobile Internet. Evolution in telecom technologies"

Transcription

1 Efficient Management of the Traffic Flows in Wireless Internet An Introduction to Wireless IP International Workshop on Internet Security and Management 28 Jan, Sendai, Japan Abbas Jamalipour 1 Abbas Jamalipour The University of Sydney Australia Contents The mobile Internet Can mobile Internet be defined like this? 1. An Introduction to Wireless IP 2. Wireless Internet Security 3. Quality of Service Global Internet To other telecommunication?? Location-independent access Wire-free access 4. Conclusions IP-based core network INTERNET ACCESS IP-based access network Access Node Mobile Node Seamless access?? ISP-independent access A. Jamalipour 2 A. Jamalipour 4 Evolution in telecom technologies Trend 2: Voice to data Telephony Wired Wireless Cellular Internet Fixed Wireless Mobile AP Internet? Increase in: No of s Accessibility (time/space) No of applications Network Traffic: Voice, Text, Data, Image, Video,, Multimedia Available options: Working independently Replacing Complementing Significant increase in no. of multimedia users compared with voice 3m mobile data users in 1998 to 77m in 2005: 70% increase per year Today s Internet users: potential users of tomorrow s mobile Internet Pbit/day Voice Traffic Volume Data Traffic Volume A. Jamalipour 5 A. Jamalipour 7 Trend 1: Fixed to mobile access Get the first 50m users Saturation of fixed access for voice in near future 400m mobile subscribers worldwide in 2000 and 1800m in 2010 Similar exponential increase pattern in number of Internet subscribers Million Users Fixed Lines Mobile Lines Fixed Internet Years S Public Telephony Radio Television CellularMobile Inte rnet Network Broadcasting Broadcasting C om m unications (years) A. Jamalipour 6 A. Jamalipour 8

2 The application-oriented oriented Internet Telecom of the future Number of Internet users FTP Telnet WWW Variety Growth of Internet Applications embedded Internet and wireless Internet Internet to: connect people connect devices connect people/ devices Supporting new and existing applications Horizontal communication between different access technology cellular, cordless, WLAN, short-range connectivity, wired On a common platform to complement each other s Connected through a common, flexible, seamless IP-based core network An advanced media access technology that connects the core network to different access technologies Global roaming and inter-working between different access technologies both horizontal (intra-system) and vertical (intersystem) handover Seamless negotiation including mobility, security, QoS A. Jamalipour 9 A. Jamalipour 11 Mobile Internet applications Interoperated telecom architecture Office Information virtual working groups Education??? mobile office Public tele-working Financial virtual school Services schedule Services synchronisation on-line public elections laboratories and voting on-line banking on-line library public information universal SIM- Information on-line training help & credit card Leisure internet-surfing remote broadcast s Communication home shopping intelligent search- consultation yellow pages video telephony stock quotes virtual book store & filtering agents video conferencing music on demand on-line media speech games on demand on-line translation video-clips Special Telemetric local information announcing s virtual sight seeing booking & Services Services SMS ski net, Disney net (Machine-Machine reservation electronic postcard lottery s security Services) news s location based??? hotline tracking (GPS) tele-medicine navigation assistance travel information fleet management remote diagnostics??? 3G UMTS/cdma2000 other wireless/wired common core network indoor highspeed public telephony switched packet data A. Jamalipour 10 A. Jamalipour 12 A network architecture of the future mobile Summary Global Internet Wireless LAN GSM cdmaone Private IP Network cdma2000 Core cdma2000 Access Network ADSL Satellite Backbone IP Core Network Internetwork Access Technology DECT GPRS/UMTS Core PSTN/ISDN UMTS Access Network Applications were and will be the driving wheels in evolution of all telecommunication. Success of the Internet is mainly due to its accessibility and the usage of an open architecture. Mobility is a recognized feature of the future telecommunication. Multimedia mobile applications will force the future to be united under a common platform and incorporate efficiently to complement s of each other. But, wouldn t this integration add new complications to QoS and network security? A. Jamalipour 13 A. Jamalipour 15 Two Dimensional Internetworking Requirements Global Networks 3G Mobile Networks 2G Mobile Networks Hot Spot Networks Personal Networks Wired Networks GEO SAT MEO/LEO SAT DAB/DVB UMTS cdma2000 UWC-136 GSM GPRS cdmaone PDC Wireless LAN PHS Ad Hoc DECT Bluetooth PSTN ADSL Internet Efficient homogeneous traffic flow management as well as QoS management techniques are required. Capable of delivering QoS and security on an end-to-end basis within the heterogeneous (wired/wireless) Traffic flow volume is needed to be controlled by discriminatory preferences given to individual users and application data. A. Jamalipour 14 A. Jamalipour 16

3 Internet security Wireless Internet Security Network Security Privacy Authentication Integrity Non-repudiation 2 Abbas Jamalipour aka secrecy: Only sender and intended receiver should understand the message S: Encryption R: Decryption Receiver is confident of the sender s identity The content of the received message is exactly same as what was sent by original sender Receiver must be able to prove that the sender did send the message (sender cannot deny it) A. Jamalipour 19 Why security? Internet attacks Sniffing Original reasons in necessity of Internet security Internet is a broadcasting medium PLUS A third party can intercept a message which is not encrypted Read, write, or delete the data being transferred Increase in number of internetworking A C Growth in number and variety of network hosts Increase in variety of network applications Increase in amount of data stored in network and their storage locations src:b dest:a payload B Increase in volume of data being exchanged A. Jamalipour 18 A. Jamalipour 20 Internet attacks IP spoofing Where to secure? Internet is a broadcasting medium Application layer A third party can pretend to be the original sender by putting the original sender s IP address in the source IP field For private, authenticated transactions using certificate infrastructure; e.g. SET (secure electronic transaction), digital signatures, Pretty Good Privacy (PGP) and Secure Shell A C Transport layer Data encryption using certificate infrastructure; e.g. SSL, TLS Network layer src:b dest:a payload Data protection across the network; e.g. IPSec, Firewall, AAA B Link layer Physical layer Encoding the data before sending on air for physical isolation A. Jamalipour 21 A. Jamalipour 23 Internet attacks Denial of Basic security techniques Internet is a broadcasting medium Encryption and decryption A third party can overloading the receiver by flooding malicious packets A C Also Distributed DoS: by multiple coordinated sources B Mainly to create privacy but are also applied in the other three parts of the network security Secret key (aka symmetric key) Using the same key shared between sender and receiver pair and common encryption/decryption algorithms Use of short keys: ideal for encrypt/decrypt long messages One key for each pair: too many keys are needed for all Public key Use of a private key and a public key Private key is kept by receiver, public key is announced to public Less keys required, but more complex algorithms: good for short messages A. Jamalipour 22 A. Jamalipour 24

4 Digital signature Service agreement (SA) Handles authentication, integrity and non-repudiation Signing the message using encryption techniques Sender encrypt the message using his private key Receiver decrypt the message using sender s public key Integrity: If the message is changed by an intruder, there is a high probability that the message is unreadable. Authentication: Using a different private key will result a different message than the one sent by the sender. Non-repudiation: The private key of the sender can be tested on the original plaintext thus the sender cannot deny sending the message. A source-destination handshake for AH and ESP protocols Creating network-layer logical channel called a agreement (SA) Each SA is unidirectional and uniquely determined by: The security protocol (AH or ESP) The source IP address A 32-bit connection ID A. Jamalipour 25 A. Jamalipour 27 IPSec: : Network layer security Encapsulating security payload Providing a framework and a mechanism only Encryption/authentication selections are left to the user Can provide network layer secrecy and authentication Network layer secrecy: sending host encrypts TCP and UDP segments, ICMP and SNMP messages in IP datagram Network layer authentication: destination host can authenticate the source IP address Defining two protocols at the network layer Authentication header (AH) protocol To provide integrity and authentication (digital signature) Encapsulating Security Payload (ESP) protocol To provide privacy plus integrity and message authentication Provides secrecy, host authentication, data integrity Data and ESP trailer are encrypted Next header field is in ESP trailer ESP authentication field is similar to AH authentication field Protocol = 50 Authenticated Encrypted IP Header ESP Header TCP/UDP Segment ESP Trailer ESP Auth Protocol = 50 A. Jamalipour 26 A. Jamalipour 28 Authentication header protocol Provides source host authentication, data integrity, but not secrecy AH header inserted between IP header and data field Protocol field = 51 Intermediate s process datagrams as usual AH header includes: IP Header AH Header TCP/UDP Segment connection ID authentication data: signed message digest, calculated over original IP datagram, providing source, authentication, data integrity Next header field: specifies type of data (TCP, UDP, ICMP, etc.) 3 Quality of Service Abbas Jamalipour A. Jamalipour 29 Security in wireless Internet General QoS requirements All issues and techniques explained so far are also applicable to the wireless Internet security, but Are they still sufficient? Are they still efficient? Are they all supportable in heterogeneous? Are those techniques scalable enough? Are the security threats limited to those considered? Security should be considered as an end-to-end issue So, in order to resolve the above doubts and to implement security (which would be redefined at a later time), security has to be treated similar to other quality of themes Technology-based quality of requirements Timeliness delay response time delay variation Bandwidth system level data rate application level data rate transaction rate Reliability mean time to failure mean time to repair meantime between failures loss or corruption rate A. Jamalipour 30 A. Jamalipour 32

5 QoS requirements, more Challenging wireless QoS management User-level quality of requirements critically perceived QoS based on data transmission application type picture detail picture color accuracy video rate video smoothness audio quality video/audio synchronization cost per-use cost per-unit cost security confidentiality (information access only by appropriate users) integrity (information not to be corrupted) digital signatures authentication (verification of a user s identity and right to access) Data applications over wireless channel require sophisticated techniques of quality of management short loss of communications during handover is not desirable, though it is acceptable in voice applications similar facilities required in the new point of attachment after any handover blind spots are unavoidable in wireless End-user QoS is also affected by certain specifications of portable terminals battery limit screen size processing power screen resolution More importantly, traffic flows are transported by a variety of, each with its QoS and security treatment techniques A. Jamalipour 33 A. Jamalipour 35 BW vs. coverage in wireless Improving QoS in IP Wider coverage and higher mobility equal to higher cost but not necessarily higher data rate Wireless network Coverage Data rate Infrared Room 19.2 kbps-4 Mbps IEEE /b/a m around each AP 1, 2/11/54 Mbps GSM (HSCSD) Cellular network 9.6 (56) kbps CDPD (for AMPS, IS-95, IS-136) Cellular network 19.2 kbps DECT, PHS Cellular network 32 kbps GPRS (for GSM) Cellular network 155 kbps UMTS/IMT-2000 Cellular network 384 kbps to 2 Mbps Iridium LEO Satellite Global 2.4 kbps Broadband satellites Global/regional 2 Mbps Harmonic QoS adjustment on an end-to-end basis is also challenging when more than one network involved Looking for an ideal and general network QoS model IETF groups are working on proposals to provide better QoS control in IP, i.e., going beyond best effort to provide some assurance for QoS Work in Progress includes RSVP, Differentiated Services, and Integrated Services Simple model for sharing and congestion studies: A. Jamalipour 34 A. Jamalipour 36 Principles for QoS guarantees QoS guarantees, more Consider a phone application at 1Mbps and an FTP application sharing a 1.5 Mbps link bursts of FTP can congest the and cause audio packets to be dropped want to give priority to audio over FTP Alternative to marking and policing: allocate a set portion of bandwidth to each application flow can lead to inefficient use of bandwidth if one of the flows does not use its allocation PRINCIPLE 1: marking of packets is needed for to distinguish between different classes; and new policy to treat packets accordingly PRINCIPLE 3: while providing isolation, it is desirable to use resources as efficiently as possible A. Jamalipour 37 A. Jamalipour 39 QoS guarantees, more QoS guarantees, more Applications misbehave (audio sends packets at a rate higher than 1Mbps assumed above) PRINCIPLE 2: provide protection (isolation) for one class from other classes Require policing mechanisms to ensure sources adhere to bandwidth requirements; marking and policing need to be done at the edges Cannot support traffic beyond link capacity PRINCIPLE 4: need a Call Admission Process application flow declares its needs network may block call if it cannot satisfy the needs A. Jamalipour 38 A. Jamalipour 40

6 QoS summary IntServ: : Advantages and disadvantages Now, let s have some examples from Internet and cellular Advantages provides classes which closely match different apps leaves the existing best-effort unchanged no change to the existing apps, efficient as current Internet leaves forwarding mechanism in the network unchanged non-upgraded can receive data from IntServ Disadvantages E2E guarantee requires IntServ support by all nodes subdivision of best-effort may cause problems in commercial A. Jamalipour 41 A. Jamalipour 43 IP solutions for QoS support Differentiated s (DiffServ( DiffServ) Integrated s (IntServ) Three classes of guaranteed- class provides for delay-bounded agreements controlled-load class provides for a form of statistical delay agreement (nominal mean delay) best-effort s interactive burst (e.g. Web), interactive bulk (e.g. FTP), and asynchronous (e.g. ) Guaranteed and controlled-load s are based on quantitative requirements and require signaling and admission control in network nodes usually Resource Reservation Protocol (RSVP) is used Aims at providing simple, scalable and flexible differentiation using a hierarchical model interdomain resource management unidirectional levels are agreed at each boundary point between a customer and a provider for traffic entering the provider network intradomain resource management provider is solely responsible for configuration and provisioning of resources within its domain Provider builds its offered s with a combination of traffic classes, traffic conditioning, and billing DiffServ does not impose either the number of traffic classes or their characteristics on a provider Based on local agreements at customer/provider boundaries Per-flow state is avoided within the network since individual flows are aggregated in classes A. Jamalipour 42 A. Jamalipour 44 DiffServ,, more DiffServ: : Advantages and disadvantages Aggregates the entire customer s requirements for QoS The customer must have a level agreement (SLA) with provider SLA specifies the forwarding the customer receives static or dynamic static SLA: negotiated on a long-term basis (e.g., monthly) dynamic SLA: changes more frequently For receiving different levels, the customer must mark its packets by specific values in TOS filed (renamed DS field) DSCP (differentiated s codepoint) unused DS field supersedes the existing definition of IPv4 TOS octet and the IPv6 traffic class octet Advantages provides discrimination based on payment for traffic classes are accessible without signaling as a traffic class is predefined aggregate of traffic classification of the traffic needs not be performed in the end system (simpler network management) Disadvantages DiffServ tries to keep the operating mode of the network simple by pushing as much complexity as possible onto network provisioning and configuration DiffServ does not make providing several s with different qualities within the same network easier A. Jamalipour 45 A. Jamalipour 47 DiffServ 3-level s IntServ and DiffServ A A comparison access s Local Differentiated Services Domain interior access s interior access s border contracted link border Transit Internet Network interior IntServ Requires flow-specific state for each flow at s increase of state information based on number of flows need huge storage space and processing power at make s much more complex DiffServ Simpler and more scalable Scalability: per-flow replaced with per-aggregate complex processing is moved from the core of network to the edge A. Jamalipour 46 A. Jamalipour 48

7 GPRS example of QoS support UMTS architectural improvements SMS-GMSC SMS-IWMSC QoS profile assigned to every subscriber E traffic precedence class MSC/VLR high, normal, and low priority Gs D A delay class Gb four classes R Um reliability class SGSN Gn GGSN five classes peak throughput class 8, 16, 32, 64, 128, 256, 512, 1024, 2048 kbps mean throughput class 19 classes from best-effort to 111 kbps Profile requested by user or as default defined in the home location register (HLR) SGSN responsible for fulfilling the QoS profile Gd Gn TE MT BSS SGSN GGSN Gp Other PLMN C Gr SMS-SC HLR Gc Gf Gi EIR PDN TE Signaling Signaling & Data Compared with GSM Wideband access higher bit rates toward mobile multimedia applications Mobile-fixed-Internet convergence a uniform way to offer cross-domain s to users portability across and terminals Flexible architecture enhancing creativity and flexibility for new s standardizing the blocks that make up s and not s themselves A. Jamalipour 49 A. Jamalipour 51 UMTS network architecture UMTS and open architecture GSM Circuit Switched MSC (Real-Time) CS BSC ATM MSCu BTS IP Core Non-Real-Time Data Services SGSN GGSN UMTS RNC ATM IP Node B PSTN Feature Servers Providing access of UMTS architecture via OSA to third party providers To enhance portability of telecommunications s between and terminals (Rel-5, TS ) Virtual Home Environment (VHE) A system concept for personalized portability across boundaries and between terminals Considered by 3GPP (Rel-5, TS ) Use of s available at home network even after roaming into another network e.g., VHE converts a WAP into SMS when WAP is not available in the visiting network A. Jamalipour 50 A. Jamalipour 52 VHE for UMTS VHE SCS specifications application SCS 1 call control network layer SCS 2 home location register application SCS 5 CAMEL application layer standardized -network UMTS interfaces SCS 3 mobile execution environment SCS 4 SIM application toolkit Call control (CC) : MSC to support circuit-switched telephony using CC protocol (R99) Home location register (HLR): database for location and subscriber information using MAP protocol Mobile execution environment (MExE) server: for value-added s through WAP SIM application toolkit (SAT) server: to offer additional capabilities to communications protocol between SIM and mobile terminal Customized application for mobile enhanced logic (CAMEL) server: extends the scope of IN provisioning to the mobile environment and to exchange mobile-specific information between CAMEL and switching point (SSP) and control point (SCP) A. Jamalipour 53 A. Jamalipour 55 VHE elements UMTS QoS support Enabling development of s independent of the underlying A layered UMTS architecture Service capability (SCS): that provide functionality used to construct s (e.g. MSC) Service capability features (): the classes of OSA interface SCSs are network elements whereas s are only additional software layer of interface classes on top of SCSs Examples of s: call control, location/positioning, notifications Traffic class Fundamental characteristics BER Example of the application Conversational class Preserve time relation between information entities of the stream Conversational pattern (stringent and low delay) 10-3 Voice, videotelephony, video games Streaming class Preserve time relation between information entities of the stream 10-5 Streaming multimedia Interactive class Request response pattern Preserve data integrity 10-8 Web browsing, network games Background class Destination is not expecting the data within a certain time Preserve data integrity 10-8 Background download of s A. Jamalipour 54 A. Jamalipour 56

8 E2E quality of in 3G/UMTS Access layer MT TE MS RAN CN TE local bearer terminal-to-terminal QoS 3G/UMTS bearer external bearer Mobile station supports in regard to provider radio access technology signaling standards supporting only a single packet data (Simple IP or Mobile IP); differentiation at higher layers Access network authenticates and authorizes MS for access establishes a connection to IMT-2000 network initializes a data link layer After this link layer establishment, network layer protocols are executed to establish the packet data session 3G/UMTS QoS A. Jamalipour 57 A. Jamalipour 59 cdma2000 Data link layer cdmaone cdma2000 cdma2000 network architecture BTS AN BSC PCF PCF AN- AAA MSC/ VLR PDSN PCN AAA HLR HA PSTN Data Link Layer Internet Higher Layers Network Layer Access Layer Security Packet data reference model to other packet data Service Access Provider Support of two types of data link layers by IMT network PPP for Version 1 and 2 PPP protocol in compliance with RFC 1661 PPP compression control protocol (RFC 1962) used to negotiate a PPP payload compression algorithm In Mobile IP, higher layers will not be reset when the mobile re-establishes PPP to a new IMT-2000 serving area Simple data link-layer protocol for Version 2 A. Jamalipour 58 A. Jamalipour 60 Network layer Two types of network access methods Mobile IP Local and public network access HA resides in IMT-2000 provider network (SPN) Authentication and authorization by SPN or a private network Private network access HA resides in a private network Authentication and authorization by the private network Simple IP Local and public network access IP address is dynamically assigned from the serving network Private network access Same with addition of VPN software in mobile station 4 Abbas Conclusions Jamalipour A. Jamalipour 61 Security Layered manageable architecture Three levels of security from mobile station perspective Radio access security Authentication of the mobile station Support of air interface encryption IP network security For Mobile IP, use of FA challenge to authenticate mobile station For Simple IP, use of CHAP or PAP to authenticate mobile station CHAP: Challenge Handshake Authentication Protocol PAP: Password Authentication Protocol Both at the data link layer User end-to-end security Additional security measures provided by the user (optional) A generic architecture that covers all under same assumptions and I/O traffic flows Application level: harmonization of all different data into a unified form, prioritization of data according to the application and requested Physical level: optimization of data transmission based on the unified data Network level: management of the traffic flow transportation by resolving shortfall of the access network in providing requested to the application; should be open, configurable, and scalable Tasks include: traffic management, mobility management, QoS management, security management, and resource management Packet-based Traffic Application Level Non-packetbased Traffic Encapsulated Data Network Management Level Traffic Security QoS Mobility Physical Level Wireless Cellular ADSL Wireless LAN Wired Networks A. Jamalipour 62 A. Jamalipour 64

9 MWIF layered functional network architecture Application Third party applications API Security Applications/ Services Service Directory Services Authorization API Global Name Servers Policy Servers Location Servers Mobility Management Resource Management API OAM&P Control Communication Session Management Access Specific Core Access Gateway Transport Access Network Network Gateways Terminals Other Networks PSTN/external CS External IP Legacy 2G Signaling A. Jamalipour 65 References A. Jamalipour, The Wireless Mobile Internet Architectures, Protocols and Services, John Wiley & Sons, Chichester, England,. J. Kurose and K. Ross, Computer Networking A Top-Down Approach Featuring the Internet, Second Edition, Addison Wesley, Boston, D. Wisely, P. Eardley, and L. Burness, IP For 3G, John Wiley & Sons, Chichester, England, A. Jamalipour 66

King Fahd University of Petroleum & Minerals Computer Engineering g Dept

King Fahd University of Petroleum & Minerals Computer Engineering g Dept King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 543 Mobile and Wireless Networks Term 111 Dr. Ashraf S. Hasan Mahmoud Rm 22-148-3 Ext. 1724 Email: ashraf@kfupm.edu.sa 12/24/2011

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

IP QoS Interoperability Issues

IP QoS Interoperability Issues SP-030371 IP QoS Interoperability Issues Source: Contact: SBC Communications, BT Randolph Wohlert Randolph_Wohlert@labs.sbc.com 2 Industry Trend: IP Based Services Next Generation Networks Multi-service

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.

ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel. Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; Suresh.Leroy@alcatel.be +32/3/240.7830; Guy.Reyniers@alcatel.be Voice over (Vo) was developed at some universities to diminish

More information

IMT-2000 Network Architecture

IMT-2000 Network Architecture IMT-2000 Network Architecture vtoshio Shimoe vtakamichi Sano (Manuscript received May 31, 2002) International Mobile Telecommunication-2000 (IMT-2000) is a third-generation mobile communication system.

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing

More information

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated 3GPP2 Workshop, Boston, MA Title: Source: Contact: Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated Jen M. Chen QUALCOMM Incorporated 858-658-2543

More information

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: marketing.citi@cominfosys.com

More information

Index. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284

Index. Common Packet Channel (CPCH) 25 Compression 265, 279 82, 288 header compression 284 bindex.fm Page 296 Tuesday, March 22, 2005 7:17 AM Index 2G, 2.5G, 3G 13 3GPP 118 Release 5 (Rel 5) 124 Release 6 (Rel 6) 125 Release 97/98 (Rel 97/98) 119 Release 99 (Rel 99) 120 4 3GPP2 129 4G 13, 44

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

Evolution of GSM in to 2.5G and 3G

Evolution of GSM in to 2.5G and 3G CMPE 477 Wireless and Mobile Networks Evolution of GSM in to 2.5G and 3G New Data Services for GSM CMPE 477 HSCSD GPRS 3G UMTS IMT2000 UMTS Architecture UTRAN Architecture Data services in GSM I Data transmission

More information

Advanced SIP Series: SIP and 3GPP

Advanced SIP Series: SIP and 3GPP Advanced SIP Series: SIP and 3GPP, Award Solutions, Inc Abstract The Session Initiation Protocol has been selected as the main signaling protocol of the Third Generation Partnership Projects IP Multimedia

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre 1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

IP Telephony (Voice over IP)

IP Telephony (Voice over IP) (Voice over IP) Instructor Ai-Chun Pang, acpang@csie.ntu.edu.tw Office Number: 417, New building of CSIE Textbook Carrier Grade Voice over IP, D. Collins, McGraw-Hill, Second Edition, 2003. Requirements

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

GPRS and 3G Services: Connectivity Options

GPRS and 3G Services: Connectivity Options GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview

More information

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com

IP-based Mobility Management for a Distributed Radio Access Network Architecture. helmut.becker@siemens.com IP-based Mobility Management for a Distributed Radio Access Network Architecture helmut.becker@siemens.com Outline - Definition IP-based Mobility Management for a Distributed RAN Architecture Page 2 Siemens

More information

Wireless Access of GSM

Wireless Access of GSM Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade

More information

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks

Realising the Virtual Home Environment (VHE) concept in ALL-IP UMTS networks December 2000 European Institute for Research and Strategic Studies in Telecommunications GmbH AT THE THEATRE: Remove the Theatre Bookmark from her homepage PDA ONLINE THEATRE-TICKETS BOOKING Project P920

More information

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)

Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Jyh-Cheng Chen and Tao Zhang IP-Based Next-Generation Wireless Networks Published by John Wiley & Sons, Inc. January 2004 This material is protected under all Copyright Laws as

More information

LTE Overview October 6, 2011

LTE Overview October 6, 2011 LTE Overview October 6, 2011 Robert Barringer Enterprise Architect AT&T Proprietary (Internal Use Only) Not for use or disclosure outside the AT&T companies except under written agreement LTE Long Term

More information

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

White Paper ON Dual Mode Phone (GSM & Wi-Fi) White Paper ON Dual Mode Phone (GSM & Wi-Fi) Author: N Group 1.0 Abstract Dual Mode Handset is in demand for converged Network, Access, Billing, and Operation environment. Dual mode handsets provide cost

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen

UMTS/GPRS system overview from an IP addressing perspective. David Kessens Jonne Soininen UMTS/GPRS system overview from an IP addressing perspective David Kessens Jonne Soininen Introduction 1) Introduction to 3GPP networks (GPRS, UMTS) Technical overview and concepts for 3GPP networks Mobility

More information

Private DNS for Mobile Operators

Private DNS for Mobile Operators Private for James Yu Senior Director - Strategic Technical Initiatives NeuStar, Inc. james.yu@neustar.biz +1-571-434-5572 (B) +1-703-622-5187 (M) Richard Xu Chief Architect Aicent, Inc richard.xu@aicent.com

More information

PDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS

PDF vytvořeno zkušební verzí pdffactory www.fineprint.cz UMTS UMTS Generations of mobile systems Generation 1 (1980-1995) 2 (1992-2000) 2,5 (1999-2010) 3 (2004-20?) Names NMT (Nordic Mobile Telephone); 450 MHz, 900 MHz AMPS (Advance Mobile Telephone System); USA

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Voice over IP. Presentation Outline. Objectives

Voice over IP. Presentation Outline. Objectives Voice over IP Professor Richard Harris Presentation Outline Brief overview of VoIP and applications Challenges of VoIP IP Support for Voice Protocols used for VoIP (current views) RTP RTCP RSVP H.323 Semester

More information

12 Quality of Service (QoS)

12 Quality of Service (QoS) Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, prajaks@buu.ac.th

More information

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks

Contents. Preface. Acknowledgement. About the Author. Part I UMTS Networks Contents Preface Acknowledgement About the Author Acronyms xv xxi xxiii xxv Part I UMTS Networks 1 Introduction 3 1.1 Mobile Telecommunication Networks and Computer Networks 4 1.2 Network Design Principles

More information

Delivery of Voice and Text Messages over LTE

Delivery of Voice and Text Messages over LTE Delivery of Voice and Text Messages over LTE 1. The Market for Voice and SMS! 2. Third Party Voice over IP! 3. The IP Multimedia Subsystem! 4. Circuit Switched Fallback! 5. VoLGA LTE was designed as a

More information

Krishan Sabnani Bell Labs. Converged Networks of the Future

Krishan Sabnani Bell Labs. Converged Networks of the Future Krishan Sabnani Bell Labs Converged Networks of the Future Today s Networks 3G Cellular Networks Radio Controller Aggregation Access Enterprise Networks Metro Networks Access Packet-Based Network Aggregation

More information

High Performance VPN Solutions Over Satellite Networks

High Performance VPN Solutions Over Satellite Networks High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have

More information

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility) Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile IP Session Initiation Protocol (SIP) SIP is a protocol

More information

EDGE: The Introduction of High Speed Data in GSM / GPRS Networks

EDGE: The Introduction of High Speed Data in GSM / GPRS Networks 10 September 2003 EDGE: The Introduction of High Speed Data in GSM / GPRS Networks Wendy Florence Ericsson South Africa Rev A 10 September 2003 1 Agenda What is EDGE? Implementing EDGE Network and transmission

More information

02-QOS-ADVANCED-DIFFSRV

02-QOS-ADVANCED-DIFFSRV IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

End-to-End QoS Network Design

End-to-End QoS Network Design End-to-End QoS Network Design Tim Szigeti, CCIE No. 9794, and Christina Hattingh Cisco Press Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA Table of Contents Introduction xxii Part I Introduction

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Packet Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report

Packet Switched Voice (over IP) and Video Telephony Services End-to-end System Design Technical Report GPP X.R00-0 Version:.0 Date: November 00 Packet Switched Voice (over ) and Video Telephony Services End-to-end System Design Technical Report COPYRIGHT GPP and its Organizational Partners claim copyright

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

2G Cellular Data Networks

2G Cellular Data Networks 1 2 General Mobility Issues 2G Cellular Data Networks Registration and Authentication User Locate local service provider access point Obtain network access Service provider Locate mobile user within network

More information

Review: Lecture 1 - Internet History

Review: Lecture 1 - Internet History Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information

Wireless Mobile Telephony

Wireless Mobile Telephony Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Applications that Benefit from IPv6

Applications that Benefit from IPv6 Applications that Benefit from IPv6 Lawrence E. Hughes Chairman and CTO InfoWeapons, Inc. Relevant Characteristics of IPv6 Larger address space, flat address space restored Integrated support for Multicast,

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations

More information

Advanced SIP Series: SIP and 3GPP Operations

Advanced SIP Series: SIP and 3GPP Operations Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.

More information

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia

Lecture 33. Streaming Media. Streaming Media. Real-Time. Streaming Stored Multimedia. Streaming Stored Multimedia Streaming Media Lecture 33 Streaming Audio & Video April 20, 2005 Classes of applications: streaming stored video/audio streaming live video/audio real-time interactive video/audio Examples: distributed

More information

1. Public Switched Telephone Networks vs. Internet Protocol Networks

1. Public Switched Telephone Networks vs. Internet Protocol Networks Internet Protocol (IP)/Intelligent Network (IN) Integration Tutorial Definition Internet telephony switches enable voice calls between the public switched telephone network (PSTN) and Internet protocol

More information

Use of MPLS in Mobile Backhaul Networks

Use of MPLS in Mobile Backhaul Networks Use of MPLS in Mobile Backhaul Networks Introduction Backhaul plays a vital role in mobile networks by acting as the link between Radio Access Network (RAN) equipment (Eg: radio basestation) and the mobile

More information

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport Solutions Verizon Wireless White Paper Verizon Wireless Broadband Network Connectivity and Data Transport

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

ITU-T Y.2001. General overview of NGN

ITU-T Y.2001. General overview of NGN INTERNATIONAL TELECOMMUNICATION UNION ITU-T Y.2001 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2004) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS

Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS Introduction to Differentiated Services (DiffServ) and HP-UX IPQoS What is Quality of Service (QoS)?... 2 Differentiated Services (DiffServ)... 2 Overview... 2 Example XYZ Corporation... 2 Components of

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

End-2-End QoS Provisioning in UMTS networks

End-2-End QoS Provisioning in UMTS networks End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1

More information

QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS

QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS QUALITY OF SERVICE IN TELECOMMUNICATION NETWORKS Technical University of Berlin, Franklinstr., Berlin, Germany Keywords: Quality of Service, Telecommunications, Convergence, Congestion Control, Service

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

W H I T E PA P E R. The concept of robust header compression, ROHC

W H I T E PA P E R. The concept of robust header compression, ROHC The concept of robust header compression, ROHC F E B R U A R Y 2 0 0 4 W W W. E F F N E T. C O M The concept of robust header compression, ROHC C O N T E N T S The need for IP header compression.....................3

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Mobile Devices Security: Evolving Threat Profile of Mobile Networks Mobile Devices Security: Evolving Threat Profile of Mobile Networks SESSION ID: MBS-T07 Anand R. Prasad, Dr.,ir., Selim Aissi, PhD Objectives Introduction Mobile Network Security Cybersecurity Implications

More information

Mobile@Home GSM services over wireless LAN

Mobile@Home GSM services over wireless LAN Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) Address Resolution Protocol (ARP) Question: how do packets actually get to their destination? IP routing tables: based on network addresses Ethernet physical interfaces only understand ethernet addresses

More information

Data Integrity and Network Security in Wireless LAN/3G Integrated Networks

Data Integrity and Network Security in Wireless LAN/3G Integrated Networks Data Integrity and Network Security in Wireless LAN/3G Integrated Networks International Workshop on Internet Security and Management 2004 Sendai, Japan, Jan. 29, 2004 Abbas Jamalipour a.jamalipour jamalipour@ieee.org

More information

18: Enhanced Quality of Service

18: Enhanced Quality of Service 18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:

More information

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur

Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur Pradipta Biswas Roll No. 04IT6007 M. Tech. (IT) School of Information Technology Indian Institute of Technology, Kharagpur ABSTRACT W-CDMA (Wideband Code-Division Multiple Access), an ITU standard derived

More information