A New EAP-based Signaling Protocol for IEEE Wireless LANs

Size: px
Start display at page:

Download "A New EAP-based Signaling Protocol for IEEE 802.11 Wireless LANs"

Transcription

1 A New EAP-based Signaling Protocol for IEEE Wireless LANs Artur Hecker, Houda Labiod Département Informatique et Réseaux GET/Télécom Paris, LTCI-UMR 5141 CNRS 46 rue Barrault, Paris Cedex 13, France {hecker, Abstract In this paper, we propose a generalization of the 802.1X architecture introducing a new EAP-based protocol capable of transporting signaling data for various new purposes in future IEEE WLANs (Wireless Local Area s). The user will have the possibility of choosing between various services in different networks managed by different administrative authorities. We analyze the implications of the prevalent 802.1X access control usage in this context. We illustrate several negative effects instancing early service discovery and IP micromobility support. To overcome these difficulties arising from the missing signaling, we develop EAP- SIG (Extensible Authentication Protocol - SIGnaling), an effective and easy-to-implement generic signaling protocol for future wireless LANs. We discuss the advantages of this approach and provide some implementation guidelines. Our approach is extensible, being capable of transporting any signaling payload with a security support. Our approach does not require any changes to IEEE and 802.1X standards. Keywords-wireless access; system design; 802.1X; IEEE , EAP, EAP/SIG. I. INTRODUCTION Wireless local area networks (WLAN) have received a lot of interest in the last years resulting in the development and release of numerous standards like HIPERLAN2, HomeRF and IEEE Although originally meant as a mere wire replacement for the wired Ethernets (IEEE 802.3), the standard [1] has become the technology of choice for the emerging Wireless Internet Service Providers (WISP) and hotspot operators. Several international network operators (Orange, T-Mobile, Vodafone, etc.) already offer access to their data services. In the light of these events, is also actively discussed as an access network technology candidate for the future 4 th generation cellular networks. However, if is to be used in the 4G scope, it desperately needs additional signaling mechanisms. For now, as a pure LAN, only defines some indispensable access related signaling on a very low level [1]. However, as an access network in 4G, it will need to provide users means for service discovery, quality of service, inter-domain mobility support and, from the point of view of an operator, additional management functions. The latter include both terminal and network management. Future WLANs will thus require a flexible signaling channel between the concerned instances (as e.g. in GSM or Bluetooth). Obviously, enterprise-level WLANs and public hot spots could also profit from these new opportunities. Yet the standard does not natively provide any distinct signaling channels. Generally, no data communication is possible prior to authentication. Second, while the establishment of such signaling channels after the link layer (L2) access is feasible (e.g. on higher layers), it suffers from higher access delays and needs a delay-prone service endpoint discovery. We illustrate these shortcomings through the examples of service discovery mechanisms and micromobility support. The expected access control and security enhancement for the WLANs currently being finalized in the Task Group I of the IEEE Working Group is based on the IEEE 802.1X standard for port-based network access control [2] X features a centralized network access control architecture by defining a station authentication framework using IETF s Extensible Authentication Protocol (EAP). EAP [3] serves as a method-independent authentication payload transporter. We expect future WLANs to implement the new L2 security standards. In this paper we propose a generalization of the 802.1X framework using EAP as a flexible signaling transporter for future WLANs. We propose an implementation for our approach. Our implementation is a software solution and easy to deploy. It is backwards compatible with the existing WLANs since it does not require any changes to the and 802.1X standards. We then show how our approach can help to resolve the problems discussed above. Finally, we discuss some further new opportunities proposed by our approach and give a conclusion. II. RELATED WORK IETF s EAP WG is currently working on several issues regarding EAP. It has recently released the new base EAP standard reflecting the new usage scenarios of EAP [3]. Current work includes clarifications on the key framework and the EAP state machine. A panoply of new authentication methods has been proposed for EAP including e.g. EAP/TTLS, PEAP,

2 EAP/AKA and EAP/PSK. The new EAP base standard reflects this popularity by extending the number space reserved for the new EAP types. Probably the most close work is the EAP network selection problem discussed in [4]. The authors define a mechanism to enable a wireless client to discover roaming partners of an access network over EAP. From our point of view, it is a valid example of the EAP signaling. The main difference between the two propositions is that the authors propose a solution for a special problem whereas we try to establish a generic signaling channel much in the same manner as EAP serves as a generic authentication transport & 3G Terminal IP core (3G) (other) III. FUTURE WLAN ENVIRONMENT A. WLANs in the 4G scope Several major operators, 3GPP and others currently discuss the usage of in the 4G scope. Though the current 4G vision is still quite blur, we expect 4G work to focus on the integration of heterogeneous access technologies rather than to try to enhance the terminal links. Our 4G vision thus basically follows the 4G All-IP approach [5]. This is represented in Figure 1 where a common IP core (e.g. the Internet or a reserved part of it) interconnects different access networks such as 3G, , , etc. Combined terminals capable of establishing physical connections to different network types will need to be able to use available services transparently, independently of the access technology. Because of its relatively limited coverage but attractive prices, several independently operated access networks are likely to co-exist in the popular public areas such as business venues, city centers or airports. These networks will thus overlap with each other offering users different services. The offered services could vary from the basic L2 connectivity to typical Internet-services like SMTP, HTTP and more sophisticated services (seamless mobility support, telephony, Instant Messaging, etc.) Evidently, common access protocols and free service discovery are crucial in such an environment since otherwise the users will be required to have valid subscriptions with all potential operators. Instead, we expect the users to follow the concept of the virtual operator (VO) [6], validating one existing subscription over different access networks using his operator s roaming agreements. Also, some access networks could access the IP core by the means of another access networks. A typical example would be an WLAN accessing the backbone over a MAN or a different WLAN, thus building a radio mesh network. Security will also be a major concern in 4G. We expect future operators to protect their physical infrastructure and thus to establish a reliable L2 network access control. More precisely, we presume that any network technology provides appropriate L2 network access control measures. In particular, the access networks will use the i security [7] with the underlying 802.1X access control. Figure 1 Future WLANs in the 4G context B. Anticipated Shortcomings of in 4G 1) Common Protocol The service access problem in a heterogeneous environment can be solved by using some higher level protocol (e.g. IP because of its pervasiveness) as a common access protocol. However, in presence of the aforementioned L2 access control this solution is not very efficient since it merely doubles the access control measures and the associated delays. Besides, a higher level access method will have to additionally perform an access router discovery (usually involving broadcast) and a higher level configuration. Conversely, leaving the access control untouched (i.e. limited to the respective link layer access control) lacks integration, necessary for a consistent 4G access. 2) Discovery The roaming user faces the problem of choice between different available access networks. One of the problems is e.g. the selection of a network having a roaming agreement with the user s virtual operator [4]. However, even supposing that all users can freely roam in all networks, the problem of choice persists. If presented with two available networks of the same technology, how can a user decide which network to choose? Natively, only delivers a SSID an abstract network identifier without any guarantees. The user thus needs to fetch some network information in before he finally accesses the network. Such information could include e.g. the prices and the available services for this user (if an authentication is already possible). Practically, this could be easily achieved by the means of an existing service discovery protocol [8][9][10]. However, as data exchange protocols these can not be currently used prior to the successful L2 network access. Using these protocols after the L2 network access is a twofold problem. First, this is much less efficient since the actual L2 network access procedure has to be completed and higher level configuration and service discovery procedures have to be accomplished first. The latter will unavoidable involve broadcast messaging or a station pre-configuration. Second, in the commercial networks the user will be (unfairly) billed before being able to choose, since the billing is typically activated immediately after a successful L2 access.

3 Figure 2 Simulation setup 3) Mobility Support User mobility support appears as an interesting feature since users might want to quickly transfer their open sessions to the neighboring networks. L2 mobility and context transfer support for the WLANs is being developed in the Task Group F of the Working Group. The developed Inter Point Protocol (IAPP) [11] provides the necessary context transfer mechanisms between the old and the new access points and also features a proactive mode. L2 mobility can be very efficient but in the presented context it has two main disadvantages. First, the L2 mobility does not fit in a heterogeneous environment with different L2 technologies. E.g f does not provide 3G to mobility support. Second, the L2 mobility tightly couples the network elements, effectively forming one administrative domain. L2 mobility solutions generally aim LAN-scale network installations since the IP address remains unchanged during all movements. If the IP has to be changed, higher level mobility protocols have to be used in order to provide a seamless handover. Hence, IP mobility solutions seem more appropriate in the heterogeneous network context. However, we argue that IP mobility performance can be disturbed by the presence of a 802.1X access control. We have studied the practical 802.1X delays performing different network access delay measurements in our small test environment with a 802.1X access control. Though our AAA server was in the same network segment as the two access points (<1ms round trip time), the conclusion for all tested EAP authentication methods (EAP/TTLS, PEAP and EAP/TLS) was that the application traffic (CBR traffic over UDP, 50 byte packets sent every 10ms) from/to our client was interrupted for about 1s. This value seems to be confirmed by others [12]. For demonstration purposes, we then used the micromobility simulation suite from the Columbia University [13] under the Simulator 2 and tested the HAWAII and the HFA implementations [13] introducing traffic interruptions on the wireless link. The simulated environment is shown in Figure 2. While the mobile node moves along the illustrated axis from point 0 to point 360 and back, it receives constant bit rate (CBR) traffic (10ms interleave) from the corresponding host (CH), delivered through the used micromobility access network. Without our traffic interruptions no packet loss occurred in spite of L3 handovers (negligible packet loss occurred in HFA). In order to simulate the previously measured 802.1X delay, we interrupted the traffic at three different fixed locations for an average time of 1s (0.1s variation) in each case and could measure a linear increase of the packet loss with the number of L2-handovers. In all three schemes we observed about 8-10% packet loss, which corresponds quite exactly to the simulated environment (one L2 handover of 1s every 12s). We thus conclude that the tested micromobility suites were not able to correct the 802.1X delay of 1s. Even if the 10% packet loss is not per se a bad result, it linearly depends on the L2-handover frequency and proves that with 802.1X the L2-delay can not be considered negligible anymore an assumption which is typically made when designing an IP micromobility protocol [14]. This is analyzed in details in [15]. IV. PROPOSED SOLUTION A. Pervasiveness of EAP: Common Protocol As has been explained before, relying on a higher level access protocol is not efficient while using the native access protocols lacks integration. An alternative to this problem is to find a common part of the used L2 access protocols, to extract it and to transport it by the means of the respective technologies. This would separate the actual access logic from the communications specifics. This protocol would have to be very flexible and simple, being able to transport the security and signaling payloads over different media prior to the higher level access (IP). Originating from the dial-up access control architectures as an alternative to PAP and CHAP [16], EAP can currently be used over a panoply of transport protocols including PPP [17], various AAA protocols [18], IP, UDP, EAPOL [2] and finally EAP itself. Because of this, EAP can be directly used as a user authentication protocol in 2G, 3G, xdsl, dial-up and virtual private networks (over PPP), in wired and wireless Ethernets (over EAPOL) and on higher layers using either IP or UDP or AAA as transport protocols.. EAP thus covers a vast variety of the popular user equipment. Since its introduction for 802, EAP has gained a tremendous popularity. Today, EAP-based authentication methods comprise certificate and password based authentication but also permit the usage of GSM SIM cards [19], SecureID tokens etc. Given that reliable authentication protocols are difficult to design and using the EAP independence of the used medium, we propose to use EAP as the common access protocol in 4G.

4 B. Basic Idea Since the authentication is only one task of the access protocol, the main idea is to extend EAP to build a generic signaling channel. Principally, this could be done by designing a replacement protocol for EAP. However, it can be achieved more easily and preserving full backward-compatibility with the deployed equipment by defining a new EAP method, EAP/SIG. C. EAP/SIG EAP/SIG is defined as any other EAP method but is not limited to authentication transport. As a signaling transport protocol, EAP/SIG is capable of transporting arbitrary payloads much in the same manner as EAP transports arbitrary authentication payloads. Additionally, EAP/SIG provides a fragmentation support. To reuse the existing authentication protocols, EAP/SIG permits to transport the actual authentication payload as is, by encapsulating it in its own message format. By using the EAP Response/Identity, EAP/SIG also features a datagram mode enabling asynchronous message exchanges with the network. EAP/SIG is typically initiated by the user by issuing the activation method of the transporting mechanism (e.g. Start in EAPOL). It can also be activated by the network by sending the EAP Request/Identity datagram [3]. The usage of EAP/SIG provides the following advantages: EAP is IP-independent and can be used during the L2 access phase Since all 802.1X APs blindly forward the EAP/SIG PDUs to a predefined central server, EAP/SIG provides a direct channel from the user to the authoritative network instance without requiring any delay-prone solicitation or advertisement broadcast messages. EAP/SIG does not require any changes to the base EAP, the 802.1X framework or the standard. EAP/SIG is particularly easy to deploy in the networks: since the access points do not need to implement the EAP/SIG method, the installation is limited to one single server. We show now how EAP/SIG can be used on the example of a user connecting to networks co-existing in the same geographic area. D. Resulting Architecture The network architecture applying EAP/SIG is shown in Figure 3. The user activates his terminal in an area with several overlapping access networks. The latter implement EAP/SIG. 1) Discovery and In-Session Service Discovery The user starts the EAP/SIG-enabled 802.1X client and triggers the usual 802.1X procedure between the terminal and a first network s access point (detected by the means defined in Figure 3 Proposed Architecture the standard). User s EAP Response/Identity message contains a user identifier extended by a request for available services. The access point (AP) automatically copies and forwards these data to the Signaling Server (SIGS) which may (but does not need to) be co-located with the 802.1X authentication server (AS). If SIGS and AS are not co-located, an AAA protocol can be used as a transport protocol between these two entities. Depending on the security policy of the solicited network, SIGS can either directly reply to the user with a list of available services and prices or wait until the AS has finished the user authentication phase. Generally, the AS will not be able to authenticate the user by itself and thus forward the incoming request to the virtual operator (VO). If user s network access identifier (NAI) is unknown, the request can be directly rejected. In this example, we suppose that the overlapping access networks are public WLANs with well-known basic service sets and price lists. Thus, SIGS directly submits its offers to the user using EAP/SIG as EAP-type in its message. Now, the user can easily decide which network he prefers to use. He then connects to the first network, continuing now until the end of the encapsulated EAP authentication procedure between the station and his virtual operator (VO). During this exchange, the visited network s AS, SIGS and the access point obtain key material, necessary for the subsequent reauthentications, encryption and signing of EAP/SIG datagrams and L2-traffic protection respectively. Here, SIGS, AS and the access points form the control plane of the network during the routers and the access points build the data plane. A while later, the user opens a video application and wishes to find the next streaming server. He thus initiates a service discovery procedure using the EAP/SIG channel. Normally, any suitable service discovery protocol data units (PDU) can be transported over EAP/SIG [8][9][10]. The SIGS replies with the address of the next suitable video streaming server.

5 2) Mobility When the user starts moving,.he wishes to preserve his open session. Normally, the L2 handovers would badly influence the quality of his video service. However, in our architecture SIGS can translate the incoming AAA signaling from the access points in a suitable mobility signaling which it directs to a mobile agent on a router. SIGS can thus advise the next router to change the routing for the user s IP address to the new access point right after the first AAA datagram arrived. The L2 handoffs thus do not remain transparent. SIGS can now drastically reduce the 802.1X latency by immediately delivering the session key material to the new access point without repeating the whole EAP authentication procedure. If the user has a micromobility client, this client could use the EAP/SIG channel to inform SIGS of an imminent L2 handoff. Again, this could a (micro-)mobility protocol to create buffers at the concerned routers in a timely manner. Once the router has received the respective command, it can forward it to its top hierarchy router and thus also perform an inter-domain handover, following a chosen mobility protocol (such as HAWAII, HFA or Mobile IP [13]). In this manner the 802.1X-delay can be shortened. The L2 handoff is not transparent for the mobility solution. Hence, the packet loss illustrated above could be avoided. 3) Other opportunities Using EAP/SIG, other problems can be solved or at least mitigated. One of these problems is e.g. the access point selection problem discussed in [20]. Using EAP/SIG, SIGS can perform a load balancing, assigning the requesting stations uniformly to the available overlapping access points. EAP/SIG also provides new opportunities. If a access network uses another access network as backbone, EAP/SIG can be used between the networks for management and signaling exchange (current load requests, resource reservation/release, etc.). Compared to the IP-based management exchanges, the advantage is that the EAP/SIG frames are perceived as management frames by the serving AP rendering the accounting for the served network more precise. Further, it is fairly easy to separate EAP/SIG traffic from user data traffic, whereas IP-based separation typically demands highly dynamic states. Finally, EAP/SIG provides integrated security and integrity mechanisms. Similarly, EAP/SIG can be used when an infrastructure network is to be prolonged by adhoc communications as proposed in [6]. EAP/SIG can be used to assign bonus points to the connected users sharing their bandwidth and giving access to other users over their stations. V. CONCLUSION The proposed extended usage of EAP opens several new possibilities like e.g. pre-authentication signaling and early service discovery. EAP and the related architecture have many different advantages such as: Security (independence of IP) Efficiency (no required periodic messages, no need for additional broadcast messages) Ease of use, deployment and implementation (no need for pre-configuration of stations, compatibility with the deployed WLANs). Due to the generality of the 802.1X concept and its similarity to the dial-up model, our proposition can be directly applied to a variety of popular network technologies. Thus, EAP/SIG could principally serve as a common access protocol in the future 4G architectures. REFERENCES. [1] L.M.S.C of the IEEE Computer Society, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Standard , 1999 Editions, [2] L.M.S.C of the IEEE Computer Society, Port-based network access control, IEEE Standard 802.1X, June [3] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Ed., Extensible Authentication Protocol (EAP), RFC 3748, IETF, June [4] F. Adrangi, V. Lortz, F. Bari, P. Eronen, M. Watson, Mediating Discovery in the Extensible Authentication Protocol (EAP), Internet draft, work in progress, IETF, draft-adrangi-eap-networkdiscovery-00.txt. [5] H. Yumiba, K. Imai and M. Yabusaki, IP-Based IMT Platform, IEEE Personal Communications Magazine, pp , October [6] J. Zhang, J. Li, S. Weinstein, N. Tu, Virtual operator based AAA in Wireless LAN hot spots with ad-hoc networking support, ACM Mobile Computing and Communications Review, pp , vol. 6, No. 3, July [7] IEEE i, Draft Supplement to IEEE Std Part 11: Specifications for Enhanced Security, IEEE draft, work in progress. [8] A. Misra, S. Das, A. McAuley, S. K. Das, Autoconfiguration, registration, and mobility management for pervasive computing, pp , IEEE Personal Communications, August [9] UPnP Forum, [10] OSGi Alliance, [11] IEEE P802.11F, Draft recommended practice for multi-vendor access point interoperability via an Inter- Point Protocol across distribution systems supporting IEEE operation, IEEE draft, work in progress. [12] A. Mishra, M. H. Shin, N. L. Petroni, T. C. Clancy, W. Arbaugh, Proactive Key Distribution Using Neighbor Graphs, IEEE Wireless Communications, pp , February [13] A. Campbell et al., Comparison of IP Micromobility Protocols, IEEE Wireless Communications, pp , February [14] S. Das et al., IDMP: An Intradomain Mobility Management Protocol for Next-Generation Wireless s, IEEE Wireless Communications, pp , June [15] A. Hecker, H. Labiod, An Efficient Micromobility Implementaion For 802.1X WLANs, to appear in Proc. 15 th IEEE PIMRC, Barcelona, Spain, September [16] W. Simpson, PPP Challenge Handshake Authentication Protocol (CHAP), RFC 1994, IETF, August [17] W. Simpson, Ed., The Point-to-Point Protocol (PPP), IETF RFC 1661, July [18] P. Calhoun, J. Loughney, E. Guttman, G. Zon, J. Arkko, Diameter Base Protocol, RFC 3588, IETF, September [19] K. Ahmavaara, H. Haverinen and R. Pichna, Interworking architecture between 3GPP and WLAN systems, IEEE Communications, pp , vol. 41, no. 11, November [20] G. Judd and P. Steenkiste, Fixing access point selection, in Proc. ACM SIGCOMM 2002 Poster session, August 2002.

Authentication and Security in IP based Multi Hop Networks

Authentication and Security in IP based Multi Hop Networks 7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security

More information

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS

A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS A NEW SIGNALLING PROTOCOL FOR SEAMLESS ROAMING IN HETEROGENEOUS WIRELESS SYSTEMS Azita Laily Yusof, Mahamod Ismail, Norbahiah Misran Dept of Electrical, Electronic & System Engineering, Universiti Kebangsaan

More information

On the Design of Mobility Management Scheme for 802.16-based Network Environment

On the Design of Mobility Management Scheme for 802.16-based Network Environment On the Design of obility anagement Scheme for 802.16-based Network Environment Junn-Yen Hu and Chun-Chuan Yang ultimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Seamless Handover of Streamed Video over UDP between Wireless LANs

Seamless Handover of Streamed Video over UDP between Wireless LANs Seamless Handover of Streamed Video over UDP between Wireless LANs Ger Cunningham, Seán Murphy, Liam Murphy Department of Computer Science University College Dublin Dublin, Ireland {ger.munningham,liam.murphy@ucd.ie,

More information

Security and Authentication Concepts

Security and Authentication Concepts Security and Authentication Concepts for UMTS/WLAN Convergence F. Fitzek M. Munari V. Pastesini S. Rossi L. Badia Dipartimento di Ingegneria, Università di Ferrara, via Saragat 1, 44100 Ferrara, Italy

More information

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions 1 2005 Nokia city_wlan_2005_haverinen.ppt / 2005-08-19 / HH Outline Key use cases of integrating Wireless

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Internet Engineering Task Force (IETF) Request for Comments: 6697 Category: Informational

Internet Engineering Task Force (IETF) Request for Comments: 6697 Category: Informational Internet Engineering Task Force (IETF) Request for Comments: 6697 Category: Informational ISSN: 2070-1721 G. Zorn, Ed. Network Zen Q. Wu T. Taylor Huawei Y. Nir Check Point K. Hoeper Motorola Solutions,

More information

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP

IP and Mobility. Requirements to a Mobile IP. Terminology in Mobile IP IP and Mobility Chapter 2 Technical Basics: Layer Methods for Medium Access: Layer 2 Chapter Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Telecommunication Networks: GSM, GPRS, UMTS

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

Lecture 3. WPA and 802.11i

Lecture 3. WPA and 802.11i Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture

More information

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS

MOBILITY SUPPORT USING INTELLIGENT USER SHADOWS FOR NEXT-GENERATION WIRELESS NETWORKS MOBILITY SUPPORT USING INTELLIGENT USER SADOWS FOR NEXT-GENERATION WIRELESS NETWORKS Gergely V. Záruba, Wei Wu, Mohan J. Kumar, Sajal K. Das enter for Research in Wireless Mobility and Networking Department

More information

IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices. Abstract

IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices. Abstract IEEE P802 Handoff ECSG Handoff for Multi-interfaced 802 Mobile Devices Date: May 12, 2003 Authors: Huai-An (Paul) Lin Intel Corp. 2111 NE 25 th Avenue, OR 97124 Phone: +1 503-264-6726 E-mail: huai-an.lin@intel.com

More information

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions

Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions Gateway Service for Integration of Heterogeneous Networks using Different Interworking Solutions Hyunho Park*, Hyeong Ho Lee*, H. Anthony Chan** * Electronics and Telecommunications Research Institute

More information

Research Article A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

Research Article A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol Hindawi Publishing Corporation EURA Journal on Wireless Communications and Networking Volume 2008, Article ID 348594, 8 pages doi:10.1155/2008/348594 Research Article A Two-Layered Mobility Architecture

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction

The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network. 1 Introduction The 3GPP and 3GPP2 Movements Towards an All IP Mobile Network Girish Patel Wireless Solutions Nortel Networks Richardson, TX grpatel@nortelnetworks.com Steven Dennett Personal Communications Sector Motorola

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Bridge Functions Consortium

Bridge Functions Consortium Port-Based Network Access Control Technical Document Revision 2.0 University of New Hampshire 121 Technology Drive, Suite 2 Durham, NH 03824-4716 Phone: +1-603-862-3525 http://www.iol.unh.edu Fax: +1-603-862-4181

More information

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis

Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks andres.arjona@nsn.com Hannu Verkasalo Helsinki University of Technology hannu.verkasalo@tkk.fi

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

SLIP and PPP. Gursharan Singh Tatla. mailme@gursharansingh.in www.eazynotes.com. 1 www.eazynotes.com

SLIP and PPP. Gursharan Singh Tatla. mailme@gursharansingh.in www.eazynotes.com. 1 www.eazynotes.com SLIP and PPP Gursharan Singh Tatla mailme@gursharansingh.in 1 Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are

More information

Heterogeneous network establishment assisted by cellular operators

Heterogeneous network establishment assisted by cellular operators Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed

More information

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Introduction to IPv6 and Benefits of IPv6

Introduction to IPv6 and Benefits of IPv6 Introduction to IPv6 and Benefits of IPv6 Ammar Yasir Korkusuz 2012 Bogazici University, Electrical-Electronics Engineering Department MSc. Student EE 545 TERM PROJECT Abstract: IPv6 is a new internet

More information

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005

Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice. 2005-05-11 Upperside WiFi Voice 2005 Service Announcements for Hot-Spots: Enabling Automated Access and Provider Selection for (WLAN-based) Voice 2005-05-11 Upperside WiFi Voice 2005 Jörg Ott Dirk Kutscher jo@netlab.hut.fi dku@tzi.org 2005

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Authentication in WLAN

Authentication in WLAN Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing

More information

An MPLS-Based Micro-mobility Solution

An MPLS-Based Micro-mobility Solution An MPLS-Based Micro-mobility Solution IEEE-802.21-Based Control Plane Rajendra Persaud 1, Ralf Wienzek 1, Gerald Berghoff 2, and Ralf Schanko 2 1 Chair of Computer Science 4, RWTH Aachen University, Germany

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Seamless Mobility over Broadband Wireless Networks

Seamless Mobility over Broadband Wireless Networks Seamless Mobility over Broadband Wireless Networks F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, T. Lunde Abstract A broadband wireless architecture with 802.11 (/WiFi) as a core coverage technology supported

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Mobility Management Advanced

Mobility Management Advanced Mobility Management Advanced Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Motivation Mobility Management Approaches in the TCP/IP Reference Model

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

Home Agent placement and assignment in WLAN with Cellular Networks

Home Agent placement and assignment in WLAN with Cellular Networks Home Agent placement and assignment in WLAN with Cellular Networks Selvakumar.R, Senior Lecturer, Department of Computer Science and Engineering V.M.K.V.Engineering College, Salem-636 308 Tamilnadu, India.

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

Abstract. 2 Overview of mobility in WLAN. 1 Introduction

Abstract. 2 Overview of mobility in WLAN. 1 Introduction A study of mobility in WLAN Fengping Li Helsinki University of Technology Telecommunication Software and Multimedia Laboratory fli@cc.hut.fi Abstract This paper studies mobility in wireless LAN (WLAN,

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

CME: A Middleware Architecture for Network-Aware Adaptive Applications

CME: A Middleware Architecture for Network-Aware Adaptive Applications CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,

More information

2. PREVAILING AUTHENTICATION SCHEMES 3. DISTRIBUTED AUTHENTICATION. 3.1 Single Base Station Scenario

2. PREVAILING AUTHENTICATION SCHEMES 3. DISTRIBUTED AUTHENTICATION. 3.1 Single Base Station Scenario Distributed Authentication for Low-Cost Wireless Networks Sridhar Machiraju Sprint Applied Research Machiraju@sprint.com Hao Chen University of California, Davis hchen@cs.ucdavis.edu Jean Bolot Sprint

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!

More information

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks

Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Integrating IP-based Micro-Mobility in Future Cellular Multimedia Networks Youssef Khouaja, Emmanuel Coelho-Alves, Philippe Bertin Le présent document contient des informations qui sont la propriété de

More information

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA

Birdstep Intelligent Mobile IP Client v2.0, Universal Edition. Seamless secure mobility across all networks. Copyright 2002 Birdstep Technology ASA White Paper Birdstep Intelligent Mobile IP Client v2.0, Universal Edition Seamless secure mobility across all networks Copyright 2002 Birdstep Technology ASA Haakon VII's gate 5B, N-0161 Oslo, Norway Tel:

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

Spring 2014. Final Project Report

Spring 2014. Final Project Report ENSC 427: COMMUNICATIONNETWORKS Spring 2014 Final Project Report Evaluation and Comparison of WiMAX (802.16a) and Wi-Fi (802.11a) http://www.sfu.ca/~tlan/ensc427webpage.html Group #11 Tian Lan tlan@sfu.ca

More information

1 Introduction to mobile telecommunications

1 Introduction to mobile telecommunications 1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.

More information

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

WHITE PAPER. IP-based Networks: Axis White Paper, 2002-1 - Copyright 2002, Axis Communications www.axis.com

WHITE PAPER. IP-based Networks: Axis White Paper, 2002-1 - Copyright 2002, Axis Communications www.axis.com WHITE PAPER IP-based Networks: Basics Axis White Paper, 2002-1 - Copyright 2002, Axis Communications TABLE OF CONTENTS 1. INTRODUCTION... 3 2. BASICS IN NETWORK COMMUNICATION... 3 3. TRANSMISSION FUNDAMENTALS...

More information

Untraceable Identity Management Framework for Mobile Access

Untraceable Identity Management Framework for Mobile Access Eighth International Conference on Intelligent Systems Design and Applications Untraceable Identity Management Framework for Mobile Access Min-Chih Kao*, Yi-Shiung Yeh *, and Chuan-Chi Wang ** *Department

More information

Mobility Extension for Broadband Satellite Multimedia

Mobility Extension for Broadband Satellite Multimedia Mobility Extension for Broadband Satellite Multimedia Y. Fun Hu, Prashant Pillai School of Engineering, Design & Technology University of Bradford Bradford, West Yorkshire, United Kingdom {y.f.hu, p.pillai}@bradford.ac.uk

More information

Mobile IP and Wireless Application Protocol

Mobile IP and Wireless Application Protocol Mobile IP and Wireless Application Protocol Mobile IP Uses Enable computers to maintain Internet connectivity while moving from one Internet attachment point to another Mobile user's point of attachment

More information

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks

Multichannel Virtual Access Points for Seamless Handoffs in IEEE 802.11 Wireless Networks Multichannel Virtual Access Points for Seamless Handoffs in IEEE 8. Wireless Networks Maria Eugenia Berezin, Franck Rousseau, Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

The Network Discovery and Selection Problem. Draft-ietf-eap-netsel-problem-06.txt Paul Congdon & Bernard Aboba IEEE 802.

The Network Discovery and Selection Problem. Draft-ietf-eap-netsel-problem-06.txt Paul Congdon & Bernard Aboba IEEE 802. The Network Discovery and Selection Problem Draft-ietf-eap-netsel-problem-06.txt Paul Congdon & Bernard Aboba IEEE 802.1af March 14, 2007 Terminology Network Access Identifier (NAI) The user identity submitted

More information

3G/Wi-Fi Seamless Offload

3G/Wi-Fi Seamless Offload Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...

More information

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

802.11: Mobility Within Same Subnet

802.11: Mobility Within Same Subnet What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

(Refer Slide Time: 01:38 01:37)

(Refer Slide Time: 01:38 01:37) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No: 29 IP Version 6 & Mobile IP Good day, in the last lecture we discussed

More information

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA

Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Access to GSM and GPRS mobile services over unlicensed spectrum technologies through UMA Snehlata Barde Sujata Khobragade Rasmiprava Singh NIT Raipur(C.G.) MATS university, Raipur MATS university,raipur

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Handover Management based on the Number of Retries for VoIP on WLANs

Handover Management based on the Number of Retries for VoIP on WLANs Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852

More information

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP

Mobile IP. Bheemarjuna Reddy Tamma IIT Hyderabad. Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP Mobile IP Bheemarjuna Reddy Tamma IIT Hyderabad Source: Slides of Charlie Perkins and Geert Heijenk on Mobile IP IP Refresher Mobile IP Basics 3 parts of Mobile IP: Outline Advertising Care-of Addresses

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

Mobility and cellular networks

Mobility and cellular networks Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

IPv6 Moving Network Testbed with Micro-Mobility Support

IPv6 Moving Network Testbed with Micro-Mobility Support IPv6 Moving Network Testbed with Micro-Mobility Support Miklós Aurél Rónai 1, Kristóf Fodor 1, Ralf Tönjes 2 Ericsson Research, 1 Traffic Lab (Hungary), 2 Eurolab (Germany) {Miklos.Ronai, Kristof.Fodor,

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

Authentication, Authorization and Accounting (AAA) Protocols

Authentication, Authorization and Accounting (AAA) Protocols Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian babak.shafieian@dai-labor.de 10.06.2009 Agententechnologien

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information